1 use core::{ 2 ffi::{c_char, c_int, c_void, CStr}, 3 sync::atomic::{AtomicBool, Ordering}, 4 }; 5 6 use crate::{ 7 libs::{futex::constant::FutexFlag, rand::GRandFlags}, 8 process::fork::KernelCloneArgs, 9 }; 10 11 use num_traits::{FromPrimitive, ToPrimitive}; 12 13 use crate::{ 14 arch::{cpu::cpu_reset, interrupt::TrapFrame, MMArch}, 15 driver::base::{block::SeekFrom, device::DeviceNumber}, 16 filesystem::vfs::{ 17 fcntl::FcntlCommand, 18 file::FileMode, 19 syscall::{ModeType, PosixKstat, SEEK_CUR, SEEK_END, SEEK_MAX, SEEK_SET}, 20 MAX_PATHLEN, 21 }, 22 include::bindings::bindings::{PAGE_2M_SIZE, PAGE_4K_SIZE}, 23 kinfo, 24 libs::align::page_align_up, 25 mm::{verify_area, MemoryManagementArch, VirtAddr}, 26 net::syscall::SockAddr, 27 process::{fork::CloneFlags, Pid}, 28 time::{ 29 syscall::{PosixTimeZone, PosixTimeval}, 30 TimeSpec, 31 }, 32 }; 33 34 use self::user_access::{UserBufferReader, UserBufferWriter}; 35 36 pub mod user_access; 37 38 #[repr(i32)] 39 #[derive(Debug, FromPrimitive, ToPrimitive, PartialEq, Eq, Clone)] 40 #[allow(dead_code, non_camel_case_types)] 41 pub enum SystemError { 42 /// 操作不被允许 Operation not permitted. 43 EPERM = 1, 44 /// 没有指定的文件或目录 No such file or directory. 45 ENOENT = 2, 46 /// 没有这样的进程 No such process. 47 ESRCH = 3, 48 /// 被中断的函数 Interrupted function. 49 EINTR = 4, 50 /// I/O错误 I/O error. 51 EIO = 5, 52 /// 没有这样的设备或地址 No such device or address. 53 ENXIO = 6, 54 /// 参数列表过长,或者在输出buffer中缺少空间 或者参数比系统内建的最大值要大 Argument list too long. 55 E2BIG = 7, 56 /// 可执行文件格式错误 Executable file format error 57 ENOEXEC = 8, 58 /// 错误的文件描述符 Bad file descriptor. 59 EBADF = 9, 60 /// 没有子进程 No child processes. 61 ECHILD = 10, 62 /// 资源不可用,请重试。 Resource unavailable, try again.(may be the same value as [EWOULDBLOCK]) 63 /// 64 /// 操作将被禁止 Operation would block.(may be the same value as [EAGAIN]). 65 EAGAIN_OR_EWOULDBLOCK = 11, 66 /// 没有足够的空间 Not enough space. 67 ENOMEM = 12, 68 /// 访问被拒绝 Permission denied 69 EACCES = 13, 70 /// 错误的地址 Bad address 71 EFAULT = 14, 72 /// 需要块设备 Block device required 73 ENOTBLK = 15, 74 /// 设备或资源忙 Device or resource busy. 75 EBUSY = 16, 76 /// 文件已存在 File exists. 77 EEXIST = 17, 78 /// 跨设备连接 Cross-device link. 79 EXDEV = 18, 80 /// 没有指定的设备 No such device. 81 ENODEV = 19, 82 /// 不是目录 Not a directory. 83 ENOTDIR = 20, 84 /// 是一个目录 Is a directory 85 EISDIR = 21, 86 /// 不可用的参数 Invalid argument. 87 EINVAL = 22, 88 /// 系统中打开的文件过多 Too many files open in system. 89 ENFILE = 23, 90 /// 文件描述符的值过大 File descriptor value too large. 91 EMFILE = 24, 92 /// 不正确的I/O控制操作 Inappropriate I/O control operation. 93 ENOTTY = 25, 94 /// 文本文件忙 Text file busy. 95 ETXTBSY = 26, 96 /// 文件太大 File too large. 97 EFBIG = 27, 98 /// 设备上没有空间 No space left on device. 99 ENOSPC = 28, 100 /// 错误的寻道.当前文件是pipe,不允许seek请求 Invalid seek. 101 ESPIPE = 29, 102 /// 只读的文件系统 Read-only file system. 103 EROFS = 30, 104 /// 链接数过多 Too many links. 105 EMLINK = 31, 106 /// 断开的管道 Broken pipe. 107 EPIPE = 32, 108 /// 数学参数超出作用域 Mathematics argument out of domain of function. 109 EDOM = 33, 110 /// 结果过大 Result too large. 111 ERANGE = 34, 112 /// 资源死锁将要发生 Resource deadlock would occur. 113 EDEADLK = 35, 114 /// 文件名过长 Filename too long. 115 ENAMETOOLONG = 36, 116 /// 没有可用的锁 No locks available. 117 ENOLCK = 37, 118 /// 功能不支持 Function not supported. 119 ENOSYS = 38, 120 /// 目录非空 Directory not empty. 121 ENOTEMPTY = 39, 122 /// 符号链接级别过多 Too many levels of symbolic links. 123 ELOOP = 40, 124 /// 没有期待类型的消息 No message of the desired type. 125 ENOMSG = 41, 126 /// 标志符被移除 Identifier removed. 127 EIDRM = 42, 128 /// 通道号超出范围 Channel number out of range 129 ECHRNG = 43, 130 /// 二级不同步 Level 2 not synchronized 131 EL2NSYNC = 44, 132 /// 三级暂停 Level 3 halted 133 EL3HLT = 45, 134 /// 三级重置 Level 3 reset 135 EL3RST = 46, 136 /// 链接号超出范围 Link number out of range 137 ELNRNG = 47, 138 /// 未连接协议驱动程序 Protocol driver not attached 139 EUNATCH = 48, 140 /// 没有可用的CSI结构 No CSI structure available 141 ENOCSI = 49, 142 /// 二级暂停 Level 2 halted 143 EL2HLT = 50, 144 /// 无效交换 Invalid exchange 145 EBADE = 51, 146 /// 无效的请求描述符 Invalid request descriptor 147 EBADR = 52, 148 /// 交换满 Exchange full 149 EXFULL = 53, 150 /// 无阳极 No anode 151 ENOANO = 54, 152 /// 请求码无效 Invalid request code 153 EBADRQC = 55, 154 /// 无效插槽 Invalid slot 155 EBADSLT = 56, 156 /// 资源死锁 Resource deadlock would occur 157 EDEADLOCK = 57, 158 /// 错误的字体文件格式 Bad font file format 159 EBFONT = 58, 160 /// 不是STREAM Not a STREAM 161 ENOSTR = 59, 162 /// 队列头没有可读取的消息 No message is available on the STREAM head read queue. 163 ENODATA = 60, 164 /// 流式ioctl()超时 Stream ioctl() timeout 165 ETIME = 61, 166 /// 没有STREAM资源 No STREAM resources. 167 ENOSR = 62, 168 /// 机器不在网络上 Machine is not on the network 169 ENONET = 63, 170 /// 未安装软件包 Package not installed 171 ENOPKG = 64, 172 /// 远程对象 Object is remote 173 EREMOTE = 65, 174 /// 保留 Reserved. 175 ENOLINK = 66, 176 /// 外设错误 Advertise error. 177 EADV = 67, 178 /// 安装错误 Srmount error 179 ESRMNT = 68, 180 /// 发送时发生通信错误 Communication error on send 181 ECOMM = 69, 182 /// 协议错误 Protocol error. 183 EPROTO = 70, 184 /// 保留使用 Reserved. 185 EMULTIHOP = 71, 186 /// RFS特定错误 RFS specific error 187 EDOTDOT = 72, 188 /// 错误的消息 Bad message. 189 EBADMSG = 73, 190 /// 数值过大,产生溢出 Value too large to be stored in data type. 191 EOVERFLOW = 74, 192 /// 名称在网络上不是唯一的 Name not unique on network 193 ENOTUNIQ = 75, 194 /// 处于不良状态的文件描述符 File descriptor in bad state 195 EBADFD = 76, 196 /// 远程地址已更改 Remote address changed 197 EREMCHG = 77, 198 /// 无法访问所需的共享库 Can not access a needed shared library 199 ELIBACC = 78, 200 /// 访问损坏的共享库 Accessing a corrupted shared library 201 ELIBBAD = 79, 202 /// a. out中的.lib部分已损坏 .lib section in a.out corrupted 203 ELIBSCN = 80, 204 /// 尝试链接太多共享库 Attempting to link in too many shared libraries 205 ELIBMAX = 81, 206 /// 无法直接执行共享库 Cannot exec a shared library directly 207 ELIBEXEC = 82, 208 /// 不合法的字符序列 Illegal byte sequence. 209 EILSEQ = 83, 210 /// 中断的系统调用应该重新启动 Interrupted system call should be restarted 211 ERESTART = 84, 212 /// 流管道错误 Streams pipe error 213 ESTRPIPE = 85, 214 /// 用户太多 Too many users 215 EUSERS = 86, 216 /// 不是一个套接字 Not a socket. 217 ENOTSOCK = 87, 218 /// 需要目标地址 Destination address required. 219 EDESTADDRREQ = 88, 220 /// 消息过大 Message too large. 221 EMSGSIZE = 89, 222 /// 对于套接字而言,错误的协议 Protocol wrong type for socket. 223 EPROTOTYPE = 90, 224 /// 协议不可用 Protocol not available. 225 ENOPROTOOPT = 91, 226 /// 协议不被支持 Protocol not supported. 227 EPROTONOSUPPORT = 92, 228 /// 不支持套接字类型 Socket type not supported 229 ESOCKTNOSUPPORT = 93, 230 /// 套接字不支持该操作 Operation not supported on socket (may be the same value as [ENOTSUP]). 231 /// 232 /// 不被支持 Not supported (may be the same value as [EOPNOTSUPP]). 233 EOPNOTSUPP_OR_ENOTSUP = 94, 234 /// 不支持协议系列 Protocol family not supported 235 EPFNOSUPPORT = 95, 236 /// 地址family不支持 Address family not supported. 237 EAFNOSUPPORT = 96, 238 /// 地址正在被使用 Address in use. 239 EADDRINUSE = 97, 240 /// 地址不可用 Address not available. 241 EADDRNOTAVAIL = 98, 242 /// 网络已关闭 Network is down. 243 ENETDOWN = 99, 244 /// 网络不可达 Network unreachable. 245 ENETUNREACH = 100, 246 /// 网络连接已断开 Connection aborted by network. 247 ENETRESET = 101, 248 /// 连接已断开 Connection aborted. 249 ECONNABORTED = 102, 250 /// 连接被重置 Connection reset. 251 ECONNRESET = 103, 252 /// 缓冲区空间不足 No buffer space available. 253 ENOBUFS = 104, 254 /// 套接字已连接 Socket is connected. 255 EISCONN = 105, 256 /// 套接字未连接 The socket is not connected. 257 ENOTCONN = 106, 258 /// 传输端点关闭后无法发送 Cannot send after transport endpoint shutdown 259 ESHUTDOWN = 107, 260 /// 引用太多:无法拼接 Too many references: cannot splice 261 ETOOMANYREFS = 108, 262 /// 连接超时 Connection timed out. 263 ETIMEDOUT = 109, 264 /// 连接被拒绝 Connection refused. 265 ECONNREFUSED = 110, 266 /// 主机已关闭 Host is down 267 EHOSTDOWN = 111, 268 /// 主机不可达 Host is unreachable. 269 EHOSTUNREACH = 112, 270 /// 连接已经在处理 Connection already in progress. 271 EALREADY = 113, 272 /// 操作正在处理 Operation in progress. 273 EINPROGRESS = 114, 274 /// 保留 Reserved. 275 ESTALE = 115, 276 /// 结构需要清理 Structure needs cleaning 277 EUCLEAN = 116, 278 /// 不是XENIX命名类型文件 Not a XENIX named type file 279 ENOTNAM = 117, 280 /// 没有可用的XENIX信号量 No XENIX semaphores available 281 ENAVAIL = 118, 282 /// 是命名类型文件 Is a named type file 283 EISNAM = 119, 284 /// 远程I/O错误 Remote I/O error 285 EREMOTEIO = 120, 286 /// 保留使用 Reserved 287 EDQUOT = 121, 288 /// 没有找到媒介 No medium found 289 ENOMEDIUM = 122, 290 /// 介质类型错误 Wrong medium type 291 EMEDIUMTYPE = 123, 292 /// 操作被取消 Operation canceled. 293 ECANCELED = 124, 294 /// 所需的密钥不可用 Required key not available 295 ENOKEY = 125, 296 /// 密钥已过期 Key has expired 297 EKEYEXPIRED = 126, 298 /// 密钥已被撤销 Key has been revoked 299 EKEYREVOKED = 127, 300 /// 密钥被服务拒绝 Key has been revoked 301 EKEYREJECTED = 128, 302 /// 之前的拥有者挂了 Previous owner died. 303 EOWNERDEAD = 129, 304 /// 状态不可恢复 State not recoverable. 305 ENOTRECOVERABLE = 130, 306 // VMX on 虚拟化开启指令出错 307 EVMXONFailed = 131, 308 // VMX off 虚拟化关闭指令出错 309 EVMXOFFFailed = 132, 310 // VMX VMWRITE 写入虚拟化VMCS内存出错 311 EVMWRITEFailed = 133, 312 EVMREADFailed = 134, 313 EVMPRTLDFailed = 135, 314 EVMLAUNCHFailed = 136, 315 KVM_HVA_ERR_BAD = 137, 316 } 317 318 impl SystemError { 319 /// @brief 把posix错误码转换为系统错误枚举类型。 320 pub fn from_posix_errno(errno: i32) -> Option<SystemError> { 321 // posix 错误码是小于0的 322 if errno >= 0 { 323 return None; 324 } 325 return <Self as FromPrimitive>::from_i32(-errno); 326 } 327 328 /// @brief 把系统错误枚举类型转换为负数posix错误码。 329 pub fn to_posix_errno(&self) -> i32 { 330 return -<Self as ToPrimitive>::to_i32(self).unwrap(); 331 } 332 } 333 334 // 定义系统调用号 335 pub const SYS_READ: usize = 0; 336 pub const SYS_WRITE: usize = 1; 337 pub const SYS_OPEN: usize = 2; 338 pub const SYS_CLOSE: usize = 3; 339 #[allow(dead_code)] 340 pub const SYS_STAT: usize = 4; 341 pub const SYS_FSTAT: usize = 5; 342 343 #[allow(dead_code)] 344 pub const SYS_POLL: usize = 7; 345 pub const SYS_LSEEK: usize = 8; 346 pub const SYS_MMAP: usize = 9; 347 pub const SYS_MPROTECT: usize = 10; 348 pub const SYS_MUNMAP: usize = 11; 349 pub const SYS_BRK: usize = 12; 350 pub const SYS_SIGACTION: usize = 13; 351 #[allow(dead_code)] 352 pub const SYS_RT_SIGPROCMASK: usize = 14; 353 354 pub const SYS_RT_SIGRETURN: usize = 15; 355 pub const SYS_IOCTL: usize = 16; 356 357 #[allow(dead_code)] 358 pub const SYS_WRITEV: usize = 20; 359 360 pub const SYS_DUP: usize = 32; 361 pub const SYS_DUP2: usize = 33; 362 363 pub const SYS_NANOSLEEP: usize = 35; 364 365 pub const SYS_GETPID: usize = 39; 366 367 pub const SYS_SOCKET: usize = 41; 368 pub const SYS_CONNECT: usize = 42; 369 pub const SYS_ACCEPT: usize = 43; 370 pub const SYS_SENDTO: usize = 44; 371 pub const SYS_RECVFROM: usize = 45; 372 373 pub const SYS_RECVMSG: usize = 47; 374 pub const SYS_SHUTDOWN: usize = 48; 375 pub const SYS_BIND: usize = 49; 376 pub const SYS_LISTEN: usize = 50; 377 pub const SYS_GETSOCKNAME: usize = 51; 378 pub const SYS_GETPEERNAME: usize = 52; 379 pub const SYS_SOCKET_PAIR: usize = 53; 380 pub const SYS_SETSOCKOPT: usize = 54; 381 pub const SYS_GETSOCKOPT: usize = 55; 382 383 #[allow(dead_code)] 384 pub const SYS_CLONE: usize = 56; 385 pub const SYS_FORK: usize = 57; 386 pub const SYS_VFORK: usize = 58; 387 pub const SYS_EXECVE: usize = 59; 388 pub const SYS_EXIT: usize = 60; 389 pub const SYS_WAIT4: usize = 61; 390 pub const SYS_KILL: usize = 62; 391 392 pub const SYS_FCNTL: usize = 72; 393 394 pub const SYS_FTRUNCATE: usize = 77; 395 pub const SYS_GET_DENTS: usize = 78; 396 397 pub const SYS_GETCWD: usize = 79; 398 399 pub const SYS_CHDIR: usize = 80; 400 401 pub const SYS_MKDIR: usize = 83; 402 403 pub const SYS_GETTIMEOFDAY: usize = 96; 404 405 #[allow(dead_code)] 406 pub const SYS_SIGALTSTACK: usize = 131; 407 408 #[allow(dead_code)] 409 pub const SYS_ARCH_PRCTL: usize = 158; 410 411 pub const SYS_REBOOT: usize = 169; 412 413 pub const SYS_GETPPID: usize = 110; 414 pub const SYS_GETPGID: usize = 121; 415 416 pub const SYS_MKNOD: usize = 133; 417 418 #[allow(dead_code)] 419 pub const SYS_TKILL: usize = 200; 420 421 #[allow(dead_code)] 422 pub const SYS_FUTEX: usize = 202; 423 424 pub const SYS_GET_DENTS_64: usize = 217; 425 #[allow(dead_code)] 426 pub const SYS_SET_TID_ADDR: usize = 218; 427 428 pub const SYS_EXIT_GROUP: usize = 231; 429 430 pub const SYS_UNLINK_AT: usize = 263; 431 432 pub const SYS_PIPE: usize = 293; 433 434 #[allow(dead_code)] 435 pub const SYS_GET_RANDOM: usize = 318; 436 437 // 与linux不一致的调用,在linux基础上累加 438 pub const SYS_PUT_STRING: usize = 100000; 439 pub const SYS_SBRK: usize = 100001; 440 /// todo: 该系统调用与Linux不一致,将来需要删除该系统调用!!! 删的时候记得改C版本的libc 441 pub const SYS_CLOCK: usize = 100002; 442 pub const SYS_SCHED: usize = 100003; 443 444 #[derive(Debug)] 445 pub struct Syscall; 446 447 extern "C" { 448 fn do_put_string(s: *const u8, front_color: u32, back_color: u32) -> usize; 449 } 450 451 #[no_mangle] 452 pub extern "C" fn syscall_init() -> i32 { 453 kinfo!("Initializing syscall..."); 454 Syscall::init().expect("syscall init failed"); 455 kinfo!("Syscall init successfully!"); 456 return 0; 457 } 458 459 impl Syscall { 460 /// 初始化系统调用 461 pub fn init() -> Result<(), SystemError> { 462 static INIT_FLAG: AtomicBool = AtomicBool::new(false); 463 let prev = INIT_FLAG.swap(true, Ordering::SeqCst); 464 if prev { 465 panic!("Cannot initialize syscall more than once!"); 466 } 467 return crate::arch::syscall::arch_syscall_init(); 468 } 469 /// @brief 系统调用分发器,用于分发系统调用。 470 /// 471 /// 这个函数内,需要根据系统调用号,调用对应的系统调用处理函数。 472 /// 并且,对于用户态传入的指针参数,需要在本函数内进行越界检查,防止访问到内核空间。 473 pub fn handle( 474 syscall_num: usize, 475 args: &[usize], 476 frame: &mut TrapFrame, 477 ) -> Result<usize, SystemError> { 478 let r = match syscall_num { 479 SYS_PUT_STRING => { 480 Self::put_string(args[0] as *const u8, args[1] as u32, args[2] as u32) 481 } 482 SYS_OPEN => { 483 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) }; 484 let path: Result<&str, core::str::Utf8Error> = path.to_str(); 485 let res = if path.is_err() { 486 Err(SystemError::EINVAL) 487 } else { 488 let path: &str = path.unwrap(); 489 490 let flags = args[1]; 491 let open_flags: FileMode = FileMode::from_bits_truncate(flags as u32); 492 Self::open(path, open_flags) 493 }; 494 res 495 } 496 SYS_CLOSE => { 497 let fd = args[0]; 498 499 let res = Self::close(fd); 500 501 res 502 } 503 SYS_READ => { 504 let fd = args[0] as i32; 505 let buf_vaddr = args[1]; 506 let len = args[2]; 507 let from_user = frame.from_user(); 508 let mut user_buffer_writer = 509 UserBufferWriter::new(buf_vaddr as *mut u8, len, from_user)?; 510 511 let user_buf = user_buffer_writer.buffer(0)?; 512 let res = Self::read(fd, user_buf); 513 res 514 } 515 SYS_WRITE => { 516 let fd = args[0] as i32; 517 let buf_vaddr = args[1]; 518 let len = args[2]; 519 let from_user = frame.from_user(); 520 let user_buffer_reader = 521 UserBufferReader::new(buf_vaddr as *const u8, len, from_user)?; 522 523 let user_buf = user_buffer_reader.read_from_user(0)?; 524 let res = Self::write(fd, user_buf); 525 res 526 } 527 528 SYS_LSEEK => { 529 let fd = args[0] as i32; 530 let offset = args[1] as i64; 531 let whence = args[2] as u32; 532 533 let w = match whence { 534 SEEK_SET => Ok(SeekFrom::SeekSet(offset)), 535 SEEK_CUR => Ok(SeekFrom::SeekCurrent(offset)), 536 SEEK_END => Ok(SeekFrom::SeekEnd(offset)), 537 SEEK_MAX => Ok(SeekFrom::SeekEnd(0)), 538 _ => Err(SystemError::EINVAL), 539 }?; 540 541 Self::lseek(fd, w) 542 } 543 SYS_IOCTL => { 544 let fd = args[0]; 545 let cmd = args[1]; 546 let data = args[2]; 547 Self::ioctl(fd, cmd as u32, data) 548 } 549 550 SYS_FORK => Self::fork(frame), 551 SYS_VFORK => Self::vfork(frame), 552 553 SYS_BRK => { 554 let new_brk = VirtAddr::new(args[0]); 555 Self::brk(new_brk).map(|vaddr| vaddr.data()) 556 } 557 558 SYS_SBRK => { 559 let increment = args[0] as isize; 560 Self::sbrk(increment).map(|vaddr: VirtAddr| vaddr.data()) 561 } 562 563 SYS_REBOOT => Self::reboot(), 564 565 SYS_CHDIR => { 566 // Closure for checking arguments 567 let chdir_check = |arg0: usize| { 568 if arg0 == 0 { 569 return Err(SystemError::EFAULT); 570 } 571 let path_ptr = arg0 as *const c_char; 572 let virt_addr = VirtAddr::new(path_ptr as usize); 573 // 权限校验 574 if path_ptr.is_null() 575 || (frame.from_user() 576 && verify_area(virt_addr, PAGE_2M_SIZE as usize).is_err()) 577 { 578 return Err(SystemError::EINVAL); 579 } 580 let dest_path: &CStr = unsafe { CStr::from_ptr(path_ptr) }; 581 let dest_path: &str = dest_path.to_str().map_err(|_| SystemError::EINVAL)?; 582 if dest_path.len() == 0 { 583 return Err(SystemError::EINVAL); 584 } else if dest_path.len() > MAX_PATHLEN as usize { 585 return Err(SystemError::ENAMETOOLONG); 586 } 587 588 return Ok(dest_path); 589 }; 590 591 let r = chdir_check(args[0])?; 592 Self::chdir(r) 593 } 594 595 SYS_GET_DENTS | SYS_GET_DENTS_64 => { 596 let fd = args[0] as i32; 597 598 let buf_vaddr = args[1]; 599 let len = args[2]; 600 let virt_addr: VirtAddr = VirtAddr::new(buf_vaddr); 601 // 判断缓冲区是否来自用户态,进行权限校验 602 let res = if frame.from_user() && verify_area(virt_addr, len as usize).is_err() { 603 // 来自用户态,而buffer在内核态,这样的操作不被允许 604 Err(SystemError::EPERM) 605 } else if buf_vaddr == 0 { 606 Err(SystemError::EFAULT) 607 } else { 608 let buf: &mut [u8] = unsafe { 609 core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len) 610 }; 611 Self::getdents(fd, buf) 612 }; 613 614 res 615 } 616 617 SYS_EXECVE => { 618 let path_ptr = args[0]; 619 let argv_ptr = args[1]; 620 let env_ptr = args[2]; 621 let virt_path_ptr = VirtAddr::new(path_ptr); 622 let virt_argv_ptr = VirtAddr::new(argv_ptr); 623 let virt_env_ptr = VirtAddr::new(env_ptr); 624 // 权限校验 625 if frame.from_user() 626 && (verify_area(virt_path_ptr, MAX_PATHLEN as usize).is_err() 627 || verify_area(virt_argv_ptr, PAGE_4K_SIZE as usize).is_err()) 628 || verify_area(virt_env_ptr, PAGE_4K_SIZE as usize).is_err() 629 { 630 Err(SystemError::EFAULT) 631 } else { 632 Self::execve( 633 path_ptr as *const u8, 634 argv_ptr as *const *const u8, 635 env_ptr as *const *const u8, 636 frame, 637 ) 638 .map(|_| 0) 639 } 640 } 641 SYS_WAIT4 => { 642 let pid = args[0] as i64; 643 let wstatus = args[1] as *mut i32; 644 let options = args[2] as c_int; 645 let rusage = args[3] as *mut c_void; 646 // 权限校验 647 // todo: 引入rusage之后,更正以下权限校验代码中,rusage的大小 648 Self::wait4(pid, wstatus, options, rusage) 649 } 650 651 SYS_EXIT => { 652 let exit_code = args[0]; 653 Self::exit(exit_code) 654 } 655 SYS_MKDIR => { 656 let path_ptr = args[0] as *const c_char; 657 let mode = args[1]; 658 let virt_path_ptr = VirtAddr::new(path_ptr as usize); 659 let security_check = || { 660 if path_ptr.is_null() 661 || (frame.from_user() 662 && verify_area(virt_path_ptr, PAGE_2M_SIZE as usize).is_err()) 663 { 664 return Err(SystemError::EINVAL); 665 } 666 let path: &CStr = unsafe { CStr::from_ptr(path_ptr) }; 667 let path: &str = path.to_str().map_err(|_| SystemError::EINVAL)?.trim(); 668 669 if path == "" { 670 return Err(SystemError::EINVAL); 671 } 672 return Ok(path); 673 }; 674 675 let path = security_check(); 676 if path.is_err() { 677 Err(path.unwrap_err()) 678 } else { 679 Self::mkdir(path.unwrap(), mode) 680 } 681 } 682 683 SYS_NANOSLEEP => { 684 let req = args[0] as *const TimeSpec; 685 let rem = args[1] as *mut TimeSpec; 686 let virt_req = VirtAddr::new(req as usize); 687 let virt_rem = VirtAddr::new(rem as usize); 688 if frame.from_user() 689 && (verify_area(virt_req, core::mem::size_of::<TimeSpec>() as usize).is_err() 690 || verify_area(virt_rem, core::mem::size_of::<TimeSpec>() as usize) 691 .is_err()) 692 { 693 Err(SystemError::EFAULT) 694 } else { 695 Self::nanosleep(req, rem) 696 } 697 } 698 699 SYS_CLOCK => Self::clock(), 700 SYS_PIPE => { 701 let pipefd: *mut i32 = args[0] as *mut c_int; 702 let arg1 = args[1]; 703 if pipefd.is_null() { 704 Err(SystemError::EFAULT) 705 } else { 706 let flags = FileMode::from_bits_truncate(arg1 as u32); 707 Self::pipe2(pipefd, flags) 708 } 709 } 710 711 SYS_UNLINK_AT => { 712 let dirfd = args[0] as i32; 713 let pathname = args[1] as *const c_char; 714 let flags = args[2] as u32; 715 let virt_pathname = VirtAddr::new(pathname as usize); 716 if frame.from_user() && verify_area(virt_pathname, PAGE_4K_SIZE as usize).is_err() { 717 Err(SystemError::EFAULT) 718 } else if pathname.is_null() { 719 Err(SystemError::EFAULT) 720 } else { 721 let get_path = || { 722 let pathname: &CStr = unsafe { CStr::from_ptr(pathname) }; 723 724 let pathname: &str = pathname.to_str().map_err(|_| SystemError::EINVAL)?; 725 if pathname.len() >= MAX_PATHLEN { 726 return Err(SystemError::ENAMETOOLONG); 727 } 728 return Ok(pathname.trim()); 729 }; 730 let pathname = get_path(); 731 if pathname.is_err() { 732 Err(pathname.unwrap_err()) 733 } else { 734 // kdebug!("sys unlinkat: dirfd: {}, pathname: {}", dirfd, pathname.as_ref().unwrap()); 735 Self::unlinkat(dirfd, pathname.unwrap(), flags) 736 } 737 } 738 } 739 SYS_KILL => { 740 let pid = Pid::new(args[0]); 741 let sig = args[1] as c_int; 742 // kdebug!("KILL SYSCALL RECEIVED"); 743 Self::kill(pid, sig) 744 } 745 746 SYS_SIGACTION => { 747 let sig = args[0] as c_int; 748 let act = args[1]; 749 let old_act = args[2]; 750 Self::sigaction(sig, act, old_act, frame.from_user()) 751 } 752 753 SYS_RT_SIGRETURN => { 754 // 由于目前signal机制的实现,与x86_64强关联,因此暂时在arch/x86_64/syscall.rs中调用 755 // todo: 未来需要将signal机制与平台解耦 756 todo!() 757 } 758 759 SYS_GETPID => Self::getpid().map(|pid| pid.into()), 760 761 SYS_SCHED => Self::sched(frame.from_user()), 762 SYS_DUP => { 763 let oldfd: i32 = args[0] as c_int; 764 Self::dup(oldfd) 765 } 766 SYS_DUP2 => { 767 let oldfd: i32 = args[0] as c_int; 768 let newfd: i32 = args[1] as c_int; 769 Self::dup2(oldfd, newfd) 770 } 771 772 SYS_SOCKET => Self::socket(args[0], args[1], args[2]), 773 SYS_SETSOCKOPT => { 774 let optval = args[3] as *const u8; 775 let optlen = args[4] as usize; 776 let virt_optval = VirtAddr::new(optval as usize); 777 // 验证optval的地址是否合法 778 if verify_area(virt_optval, optlen as usize).is_err() { 779 // 地址空间超出了用户空间的范围,不合法 780 Err(SystemError::EFAULT) 781 } else { 782 let data: &[u8] = unsafe { core::slice::from_raw_parts(optval, optlen) }; 783 Self::setsockopt(args[0], args[1], args[2], data) 784 } 785 } 786 SYS_GETSOCKOPT => { 787 let optval = args[3] as *mut u8; 788 let optlen = args[4] as *mut usize; 789 let virt_optval = VirtAddr::new(optval as usize); 790 let virt_optlen = VirtAddr::new(optlen as usize); 791 let security_check = || { 792 // 验证optval的地址是否合法 793 if verify_area(virt_optval, PAGE_4K_SIZE as usize).is_err() { 794 // 地址空间超出了用户空间的范围,不合法 795 return Err(SystemError::EFAULT); 796 } 797 798 // 验证optlen的地址是否合法 799 if verify_area(virt_optlen, core::mem::size_of::<u32>() as usize).is_err() { 800 // 地址空间超出了用户空间的范围,不合法 801 return Err(SystemError::EFAULT); 802 } 803 return Ok(()); 804 }; 805 let r = security_check(); 806 if r.is_err() { 807 Err(r.unwrap_err()) 808 } else { 809 Self::getsockopt(args[0], args[1], args[2], optval, optlen as *mut u32) 810 } 811 } 812 813 SYS_CONNECT => { 814 let addr = args[1] as *const SockAddr; 815 let addrlen = args[2] as usize; 816 let virt_addr = VirtAddr::new(addr as usize); 817 // 验证addr的地址是否合法 818 if verify_area(virt_addr, addrlen as usize).is_err() { 819 // 地址空间超出了用户空间的范围,不合法 820 Err(SystemError::EFAULT) 821 } else { 822 Self::connect(args[0], addr, addrlen) 823 } 824 } 825 SYS_BIND => { 826 let addr = args[1] as *const SockAddr; 827 let addrlen = args[2] as usize; 828 let virt_addr = VirtAddr::new(addr as usize); 829 // 验证addr的地址是否合法 830 if verify_area(virt_addr, addrlen as usize).is_err() { 831 // 地址空间超出了用户空间的范围,不合法 832 Err(SystemError::EFAULT) 833 } else { 834 Self::bind(args[0], addr, addrlen) 835 } 836 } 837 838 SYS_SENDTO => { 839 let buf = args[1] as *const u8; 840 let len = args[2] as usize; 841 let flags = args[3] as u32; 842 let addr = args[4] as *const SockAddr; 843 let addrlen = args[5] as usize; 844 let virt_buf = VirtAddr::new(buf as usize); 845 let virt_addr = VirtAddr::new(addr as usize); 846 // 验证buf的地址是否合法 847 if verify_area(virt_buf, len as usize).is_err() { 848 // 地址空间超出了用户空间的范围,不合法 849 Err(SystemError::EFAULT) 850 } else if verify_area(virt_addr, addrlen as usize).is_err() { 851 // 地址空间超出了用户空间的范围,不合法 852 Err(SystemError::EFAULT) 853 } else { 854 let data: &[u8] = unsafe { core::slice::from_raw_parts(buf, len) }; 855 Self::sendto(args[0], data, flags, addr, addrlen) 856 } 857 } 858 859 SYS_RECVFROM => { 860 let buf = args[1] as *mut u8; 861 let len = args[2] as usize; 862 let flags = args[3] as u32; 863 let addr = args[4] as *mut SockAddr; 864 let addrlen = args[5] as *mut usize; 865 let virt_buf = VirtAddr::new(buf as usize); 866 let virt_addrlen = VirtAddr::new(addrlen as usize); 867 let virt_addr = VirtAddr::new(addr as usize); 868 let security_check = || { 869 // 验证buf的地址是否合法 870 if verify_area(virt_buf, len as usize).is_err() { 871 // 地址空间超出了用户空间的范围,不合法 872 return Err(SystemError::EFAULT); 873 } 874 875 // 验证addrlen的地址是否合法 876 if verify_area(virt_addrlen, core::mem::size_of::<u32>() as usize).is_err() { 877 // 地址空间超出了用户空间的范围,不合法 878 return Err(SystemError::EFAULT); 879 } 880 881 if verify_area(virt_addr, core::mem::size_of::<SockAddr>() as usize).is_err() { 882 // 地址空间超出了用户空间的范围,不合法 883 return Err(SystemError::EFAULT); 884 } 885 return Ok(()); 886 }; 887 let r = security_check(); 888 if r.is_err() { 889 Err(r.unwrap_err()) 890 } else { 891 let buf = unsafe { core::slice::from_raw_parts_mut(buf, len) }; 892 Self::recvfrom(args[0], buf, flags, addr, addrlen as *mut u32) 893 } 894 } 895 896 SYS_RECVMSG => { 897 let msg = args[1] as *mut crate::net::syscall::MsgHdr; 898 let flags = args[2] as u32; 899 match UserBufferWriter::new( 900 msg, 901 core::mem::size_of::<crate::net::syscall::MsgHdr>(), 902 true, 903 ) { 904 Err(e) => Err(e), 905 Ok(mut user_buffer_writer) => { 906 match user_buffer_writer.buffer::<crate::net::syscall::MsgHdr>(0) { 907 Err(e) => Err(e), 908 Ok(buffer) => { 909 let msg = &mut buffer[0]; 910 Self::recvmsg(args[0], msg, flags) 911 } 912 } 913 } 914 } 915 } 916 917 SYS_LISTEN => Self::listen(args[0], args[1]), 918 SYS_SHUTDOWN => Self::shutdown(args[0], args[1]), 919 SYS_ACCEPT => Self::accept(args[0], args[1] as *mut SockAddr, args[2] as *mut u32), 920 SYS_GETSOCKNAME => { 921 Self::getsockname(args[0], args[1] as *mut SockAddr, args[2] as *mut u32) 922 } 923 SYS_GETPEERNAME => { 924 Self::getpeername(args[0], args[1] as *mut SockAddr, args[2] as *mut u32) 925 } 926 SYS_GETTIMEOFDAY => { 927 let timeval = args[0] as *mut PosixTimeval; 928 let timezone_ptr = args[1] as *mut PosixTimeZone; 929 Self::gettimeofday(timeval, timezone_ptr) 930 } 931 SYS_MMAP => { 932 let len = page_align_up(args[1]); 933 let virt_addr = VirtAddr::new(args[0] as usize); 934 if verify_area(virt_addr, len as usize).is_err() { 935 Err(SystemError::EFAULT) 936 } else { 937 Self::mmap( 938 VirtAddr::new(args[0]), 939 len, 940 args[2], 941 args[3], 942 args[4] as i32, 943 args[5], 944 ) 945 } 946 } 947 SYS_MUNMAP => { 948 let addr = args[0]; 949 let len = page_align_up(args[1]); 950 if addr & (MMArch::PAGE_SIZE - 1) != 0 { 951 // The addr argument is not a multiple of the page size 952 Err(SystemError::EINVAL) 953 } else { 954 Self::munmap(VirtAddr::new(addr), len) 955 } 956 } 957 SYS_MPROTECT => { 958 let addr = args[0]; 959 let len = page_align_up(args[1]); 960 if addr & (MMArch::PAGE_SIZE - 1) != 0 { 961 // The addr argument is not a multiple of the page size 962 Err(SystemError::EINVAL) 963 } else { 964 Self::mprotect(VirtAddr::new(addr), len, args[2]) 965 } 966 } 967 968 SYS_GETCWD => { 969 let buf = args[0] as *mut u8; 970 let size = args[1] as usize; 971 let security_check = || { 972 verify_area(VirtAddr::new(buf as usize), size)?; 973 return Ok(()); 974 }; 975 let r = security_check(); 976 if r.is_err() { 977 Err(r.unwrap_err()) 978 } else { 979 let buf = unsafe { core::slice::from_raw_parts_mut(buf, size) }; 980 Self::getcwd(buf).map(|ptr| ptr.data()) 981 } 982 } 983 984 SYS_GETPGID => Self::getpgid(Pid::new(args[0])).map(|pid| pid.into()), 985 986 SYS_GETPPID => Self::getppid().map(|pid| pid.into()), 987 SYS_FSTAT => { 988 let fd = args[0] as i32; 989 let kstat = args[1] as *mut PosixKstat; 990 let vaddr = VirtAddr::new(kstat as usize); 991 // FIXME 由于c中的verify_area与rust中的verify_area重名,所以在引入时加了前缀区分 992 // TODO 应该将用了c版本的verify_area都改为rust的verify_area 993 match verify_area(vaddr, core::mem::size_of::<PosixKstat>()) { 994 Ok(_) => Self::fstat(fd, kstat), 995 Err(e) => Err(e), 996 } 997 } 998 999 SYS_FCNTL => { 1000 let fd = args[0] as i32; 1001 let cmd: Option<FcntlCommand> = 1002 <FcntlCommand as FromPrimitive>::from_u32(args[1] as u32); 1003 let arg = args[2] as i32; 1004 let res = if let Some(cmd) = cmd { 1005 Self::fcntl(fd, cmd, arg) 1006 } else { 1007 Err(SystemError::EINVAL) 1008 }; 1009 1010 // kdebug!("FCNTL: fd: {}, cmd: {:?}, arg: {}, res: {:?}", fd, cmd, arg, res); 1011 res 1012 } 1013 1014 SYS_FTRUNCATE => { 1015 let fd = args[0] as i32; 1016 let len = args[1] as usize; 1017 let res = Self::ftruncate(fd, len); 1018 // kdebug!("FTRUNCATE: fd: {}, len: {}, res: {:?}", fd, len, res); 1019 res 1020 } 1021 1022 SYS_MKNOD => { 1023 let path = args[0]; 1024 let flags = args[1]; 1025 let dev_t = args[2]; 1026 let flags: ModeType = ModeType::from_bits_truncate(flags as u32); 1027 Self::mknod(path as *const i8, flags, DeviceNumber::from(dev_t)) 1028 } 1029 1030 SYS_CLONE => { 1031 let parent_tid = VirtAddr::new(args[2]); 1032 let child_tid = VirtAddr::new(args[3]); 1033 1034 // 地址校验 1035 verify_area(parent_tid, core::mem::size_of::<i32>())?; 1036 verify_area(child_tid, core::mem::size_of::<i32>())?; 1037 1038 let mut clone_args = KernelCloneArgs::new(); 1039 clone_args.flags = CloneFlags::from_bits_truncate(args[0] as u64); 1040 clone_args.stack = args[1]; 1041 clone_args.parent_tid = parent_tid; 1042 clone_args.child_tid = child_tid; 1043 clone_args.tls = args[4]; 1044 Self::clone(frame, clone_args) 1045 } 1046 1047 SYS_FUTEX => { 1048 let uaddr = VirtAddr::new(args[0]); 1049 let operation = FutexFlag::from_bits(args[1] as u32).ok_or(SystemError::ENOSYS)?; 1050 let val = args[2] as u32; 1051 let utime = args[3]; 1052 let uaddr2 = VirtAddr::new(args[4]); 1053 let val3 = args[5] as u32; 1054 1055 verify_area(uaddr, core::mem::size_of::<u32>())?; 1056 verify_area(uaddr2, core::mem::size_of::<u32>())?; 1057 1058 let mut timespec = None; 1059 if utime != 0 && operation.contains(FutexFlag::FLAGS_HAS_TIMEOUT) { 1060 let reader = UserBufferReader::new( 1061 utime as *const TimeSpec, 1062 core::mem::size_of::<TimeSpec>(), 1063 true, 1064 )?; 1065 1066 timespec = Some(reader.read_one_from_user::<TimeSpec>(0)?.clone()); 1067 } 1068 1069 Self::do_futex(uaddr, operation, val, timespec, uaddr2, utime as u32, val3) 1070 } 1071 1072 SYS_WRITEV => Self::writev(args[0] as i32, args[1], args[2]), 1073 1074 SYS_ARCH_PRCTL => Self::arch_prctl(args[0], args[1]), 1075 1076 SYS_SET_TID_ADDR => Self::set_tid_address(args[0]), 1077 1078 SYS_STAT => { 1079 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) }; 1080 let path: Result<&str, core::str::Utf8Error> = path.to_str(); 1081 let res = if path.is_err() { 1082 Err(SystemError::EINVAL) 1083 } else { 1084 let path: &str = path.unwrap(); 1085 let kstat = args[1] as *mut PosixKstat; 1086 let vaddr = VirtAddr::new(kstat as usize); 1087 match verify_area(vaddr, core::mem::size_of::<PosixKstat>()) { 1088 Ok(_) => Self::stat(path, kstat), 1089 Err(e) => Err(e), 1090 } 1091 }; 1092 1093 res 1094 } 1095 1096 // 目前为了适配musl-libc,以下系统调用先这样写着 1097 SYS_GET_RANDOM => { 1098 let flags = GRandFlags::from_bits(args[2] as u8).ok_or(SystemError::EINVAL)?; 1099 Self::get_random(args[0] as *mut u8, args[1], flags) 1100 } 1101 1102 SYS_SOCKET_PAIR => { 1103 unimplemented!() 1104 } 1105 1106 SYS_POLL => { 1107 kwarn!("SYS_POLL has not yet been implemented"); 1108 Ok(0) 1109 } 1110 1111 SYS_RT_SIGPROCMASK => { 1112 kwarn!("SYS_RT_SIGPROCMASK has not yet been implemented"); 1113 Ok(0) 1114 } 1115 1116 SYS_TKILL => { 1117 kwarn!("SYS_TKILL has not yet been implemented"); 1118 Ok(0) 1119 } 1120 1121 SYS_SIGALTSTACK => { 1122 kwarn!("SYS_SIGALTSTACK has not yet been implemented"); 1123 Ok(0) 1124 } 1125 1126 SYS_EXIT_GROUP => { 1127 kwarn!("SYS_EXIT_GROUP has not yet been implemented"); 1128 Ok(0) 1129 } 1130 1131 _ => panic!("Unsupported syscall ID: {}", syscall_num), 1132 }; 1133 return r; 1134 } 1135 1136 pub fn put_string( 1137 s: *const u8, 1138 front_color: u32, 1139 back_color: u32, 1140 ) -> Result<usize, SystemError> { 1141 return Ok(unsafe { do_put_string(s, front_color, back_color) }); 1142 } 1143 1144 pub fn reboot() -> Result<usize, SystemError> { 1145 cpu_reset(); 1146 } 1147 } 1148