xref: /DragonOS/kernel/src/syscall/mod.rs (revision 7b32f5080f42bcbf7d2421013f3ea53c776a063c)
1 use core::{
2     ffi::{c_char, c_int, c_void, CStr},
3     sync::atomic::{AtomicBool, Ordering},
4 };
5 
6 use crate::{
7     libs::{futex::constant::FutexFlag, rand::GRandFlags},
8     process::fork::KernelCloneArgs,
9 };
10 
11 use num_traits::{FromPrimitive, ToPrimitive};
12 
13 use crate::{
14     arch::{cpu::cpu_reset, interrupt::TrapFrame, MMArch},
15     driver::base::{block::SeekFrom, device::DeviceNumber},
16     filesystem::vfs::{
17         fcntl::FcntlCommand,
18         file::FileMode,
19         syscall::{ModeType, PosixKstat, SEEK_CUR, SEEK_END, SEEK_MAX, SEEK_SET},
20         MAX_PATHLEN,
21     },
22     include::bindings::bindings::{PAGE_2M_SIZE, PAGE_4K_SIZE},
23     kinfo,
24     libs::align::page_align_up,
25     mm::{verify_area, MemoryManagementArch, VirtAddr},
26     net::syscall::SockAddr,
27     process::{fork::CloneFlags, Pid},
28     time::{
29         syscall::{PosixTimeZone, PosixTimeval},
30         TimeSpec,
31     },
32 };
33 
34 use self::user_access::{UserBufferReader, UserBufferWriter};
35 
36 pub mod user_access;
37 
38 #[repr(i32)]
39 #[derive(Debug, FromPrimitive, ToPrimitive, PartialEq, Eq, Clone)]
40 #[allow(dead_code, non_camel_case_types)]
41 pub enum SystemError {
42     /// 操作不被允许 Operation not permitted.
43     EPERM = 1,
44     /// 没有指定的文件或目录 No such file or directory.
45     ENOENT = 2,
46     /// 没有这样的进程 No such process.
47     ESRCH = 3,
48     /// 被中断的函数 Interrupted function.
49     EINTR = 4,
50     /// I/O错误 I/O error.
51     EIO = 5,
52     /// 没有这样的设备或地址 No such device or address.
53     ENXIO = 6,
54     /// 参数列表过长,或者在输出buffer中缺少空间 或者参数比系统内建的最大值要大 Argument list too long.
55     E2BIG = 7,
56     /// 可执行文件格式错误 Executable file format error
57     ENOEXEC = 8,
58     /// 错误的文件描述符 Bad file descriptor.
59     EBADF = 9,
60     /// 没有子进程 No child processes.
61     ECHILD = 10,
62     /// 资源不可用,请重试。 Resource unavailable, try again.(may be the same value as [EWOULDBLOCK])
63     ///
64     /// 操作将被禁止 Operation would block.(may be the same value as [EAGAIN]).
65     EAGAIN_OR_EWOULDBLOCK = 11,
66     /// 没有足够的空间 Not enough space.
67     ENOMEM = 12,
68     /// 访问被拒绝 Permission denied
69     EACCES = 13,
70     /// 错误的地址 Bad address
71     EFAULT = 14,
72     /// 需要块设备 Block device required
73     ENOTBLK = 15,
74     /// 设备或资源忙 Device or resource busy.
75     EBUSY = 16,
76     /// 文件已存在 File exists.
77     EEXIST = 17,
78     /// 跨设备连接 Cross-device link.
79     EXDEV = 18,
80     /// 没有指定的设备 No such device.
81     ENODEV = 19,
82     /// 不是目录 Not a directory.
83     ENOTDIR = 20,
84     /// 是一个目录 Is a directory
85     EISDIR = 21,
86     /// 不可用的参数 Invalid argument.
87     EINVAL = 22,
88     /// 系统中打开的文件过多 Too many files open in system.
89     ENFILE = 23,
90     /// 文件描述符的值过大 File descriptor value too large.
91     EMFILE = 24,
92     /// 不正确的I/O控制操作 Inappropriate I/O control operation.
93     ENOTTY = 25,
94     /// 文本文件忙 Text file busy.
95     ETXTBSY = 26,
96     /// 文件太大 File too large.
97     EFBIG = 27,
98     /// 设备上没有空间 No space left on device.
99     ENOSPC = 28,
100     /// 错误的寻道.当前文件是pipe,不允许seek请求  Invalid seek.
101     ESPIPE = 29,
102     /// 只读的文件系统 Read-only file system.
103     EROFS = 30,
104     /// 链接数过多 Too many links.
105     EMLINK = 31,
106     /// 断开的管道 Broken pipe.
107     EPIPE = 32,
108     /// 数学参数超出作用域 Mathematics argument out of domain of function.
109     EDOM = 33,
110     /// 结果过大 Result too large.
111     ERANGE = 34,
112     /// 资源死锁将要发生 Resource deadlock would occur.
113     EDEADLK = 35,
114     /// 文件名过长 Filename too long.
115     ENAMETOOLONG = 36,
116     /// 没有可用的锁 No locks available.
117     ENOLCK = 37,
118     /// 功能不支持 Function not supported.
119     ENOSYS = 38,
120     /// 目录非空 Directory not empty.
121     ENOTEMPTY = 39,
122     /// 符号链接级别过多 Too many levels of symbolic links.
123     ELOOP = 40,
124     /// 没有期待类型的消息 No message of the desired type.
125     ENOMSG = 41,
126     /// 标志符被移除 Identifier removed.
127     EIDRM = 42,
128     /// 通道号超出范围 Channel number out of range
129     ECHRNG = 43,
130     /// 二级不同步 Level 2 not synchronized
131     EL2NSYNC = 44,
132     /// 三级暂停 Level 3 halted
133     EL3HLT = 45,
134     /// 三级重置 Level 3 reset
135     EL3RST = 46,
136     /// 链接号超出范围 Link number out of range
137     ELNRNG = 47,
138     /// 未连接协议驱动程序 Protocol driver not attached
139     EUNATCH = 48,
140     /// 没有可用的CSI结构 No CSI structure available
141     ENOCSI = 49,
142     /// 二级暂停 Level 2 halted
143     EL2HLT = 50,
144     /// 无效交换 Invalid exchange
145     EBADE = 51,
146     /// 无效的请求描述符 Invalid request descriptor
147     EBADR = 52,
148     /// 交换满 Exchange full
149     EXFULL = 53,
150     /// 无阳极 No anode
151     ENOANO = 54,
152     /// 请求码无效 Invalid request code
153     EBADRQC = 55,
154     /// 无效插槽 Invalid slot
155     EBADSLT = 56,
156     /// 资源死锁 Resource deadlock would occur
157     EDEADLOCK = 57,
158     /// 错误的字体文件格式 Bad font file format
159     EBFONT = 58,
160     /// 不是STREAM Not a STREAM
161     ENOSTR = 59,
162     /// 队列头没有可读取的消息 No message is available on the STREAM head read queue.
163     ENODATA = 60,
164     /// 流式ioctl()超时 Stream ioctl() timeout
165     ETIME = 61,
166     /// 没有STREAM资源  No STREAM resources.
167     ENOSR = 62,
168     /// 机器不在网络上 Machine is not on the network
169     ENONET = 63,
170     /// 未安装软件包 Package not installed
171     ENOPKG = 64,
172     /// 远程对象 Object is remote
173     EREMOTE = 65,
174     /// 保留 Reserved.
175     ENOLINK = 66,
176     /// 外设错误 Advertise error.
177     EADV = 67,
178     /// 安装错误 Srmount error
179     ESRMNT = 68,
180     /// 发送时发生通信错误 Communication error on send
181     ECOMM = 69,
182     /// 协议错误 Protocol error.
183     EPROTO = 70,
184     /// 保留使用 Reserved.
185     EMULTIHOP = 71,
186     /// RFS特定错误 RFS specific error
187     EDOTDOT = 72,
188     /// 错误的消息 Bad message.
189     EBADMSG = 73,
190     /// 数值过大,产生溢出 Value too large to be stored in data type.
191     EOVERFLOW = 74,
192     /// 名称在网络上不是唯一的 Name not unique on network
193     ENOTUNIQ = 75,
194     /// 处于不良状态的文件描述符 File descriptor in bad state
195     EBADFD = 76,
196     /// 远程地址已更改 Remote address changed
197     EREMCHG = 77,
198     /// 无法访问所需的共享库 Can not access a needed shared library
199     ELIBACC = 78,
200     /// 访问损坏的共享库 Accessing a corrupted shared library
201     ELIBBAD = 79,
202     /// a. out中的.lib部分已损坏 .lib section in a.out corrupted
203     ELIBSCN = 80,
204     /// 尝试链接太多共享库 Attempting to link in too many shared libraries
205     ELIBMAX = 81,
206     /// 无法直接执行共享库 Cannot exec a shared library directly
207     ELIBEXEC = 82,
208     /// 不合法的字符序列 Illegal byte sequence.
209     EILSEQ = 83,
210     /// 中断的系统调用应该重新启动 Interrupted system call should be restarted
211     ERESTART = 84,
212     /// 流管道错误 Streams pipe error
213     ESTRPIPE = 85,
214     /// 用户太多 Too many users
215     EUSERS = 86,
216     /// 不是一个套接字 Not a socket.
217     ENOTSOCK = 87,
218     /// 需要目标地址 Destination address required.
219     EDESTADDRREQ = 88,
220     /// 消息过大 Message too large.
221     EMSGSIZE = 89,
222     /// 对于套接字而言,错误的协议 Protocol wrong type for socket.
223     EPROTOTYPE = 90,
224     /// 协议不可用 Protocol not available.
225     ENOPROTOOPT = 91,
226     /// 协议不被支持 Protocol not supported.
227     EPROTONOSUPPORT = 92,
228     /// 不支持套接字类型 Socket type not supported
229     ESOCKTNOSUPPORT = 93,
230     /// 套接字不支持该操作 Operation not supported on socket (may be the same value as [ENOTSUP]).
231     ///
232     /// 不被支持 Not supported (may be the same value as [EOPNOTSUPP]).
233     EOPNOTSUPP_OR_ENOTSUP = 94,
234     /// 不支持协议系列 Protocol family not supported
235     EPFNOSUPPORT = 95,
236     /// 地址family不支持 Address family not supported.
237     EAFNOSUPPORT = 96,
238     /// 地址正在被使用 Address in use.
239     EADDRINUSE = 97,
240     /// 地址不可用 Address  not available.
241     EADDRNOTAVAIL = 98,
242     /// 网络已关闭 Network is down.
243     ENETDOWN = 99,
244     /// 网络不可达 Network unreachable.
245     ENETUNREACH = 100,
246     /// 网络连接已断开 Connection aborted by network.
247     ENETRESET = 101,
248     /// 连接已断开 Connection aborted.
249     ECONNABORTED = 102,
250     /// 连接被重置 Connection reset.
251     ECONNRESET = 103,
252     /// 缓冲区空间不足 No buffer space available.
253     ENOBUFS = 104,
254     /// 套接字已连接 Socket is connected.
255     EISCONN = 105,
256     /// 套接字未连接 The socket is not connected.
257     ENOTCONN = 106,
258     /// 传输端点关闭后无法发送 Cannot send after transport endpoint shutdown
259     ESHUTDOWN = 107,
260     /// 引用太多:无法拼接 Too many references: cannot splice
261     ETOOMANYREFS = 108,
262     /// 连接超时 Connection timed out.
263     ETIMEDOUT = 109,
264     /// 连接被拒绝 Connection refused.
265     ECONNREFUSED = 110,
266     /// 主机已关闭 Host is down
267     EHOSTDOWN = 111,
268     /// 主机不可达 Host is unreachable.
269     EHOSTUNREACH = 112,
270     /// 连接已经在处理 Connection already in progress.
271     EALREADY = 113,
272     /// 操作正在处理 Operation in progress.
273     EINPROGRESS = 114,
274     /// 保留 Reserved.
275     ESTALE = 115,
276     /// 结构需要清理 Structure needs cleaning
277     EUCLEAN = 116,
278     /// 不是XENIX命名类型文件 Not a XENIX named type file
279     ENOTNAM = 117,
280     /// 没有可用的XENIX信号量 No XENIX semaphores available
281     ENAVAIL = 118,
282     /// 是命名类型文件 Is a named type file
283     EISNAM = 119,
284     /// 远程I/O错误 Remote I/O error
285     EREMOTEIO = 120,
286     /// 保留使用 Reserved
287     EDQUOT = 121,
288     /// 没有找到媒介 No medium found
289     ENOMEDIUM = 122,
290     /// 介质类型错误 Wrong medium type
291     EMEDIUMTYPE = 123,
292     /// 操作被取消 Operation canceled.
293     ECANCELED = 124,
294     /// 所需的密钥不可用 Required key not available
295     ENOKEY = 125,
296     /// 密钥已过期 Key has expired
297     EKEYEXPIRED = 126,
298     /// 密钥已被撤销 Key has been revoked
299     EKEYREVOKED = 127,
300     /// 密钥被服务拒绝 Key has been revoked
301     EKEYREJECTED = 128,
302     /// 之前的拥有者挂了 Previous owner died.
303     EOWNERDEAD = 129,
304     /// 状态不可恢复 State not recoverable.
305     ENOTRECOVERABLE = 130,
306     // VMX on 虚拟化开启指令出错
307     EVMXONFailed = 131,
308     // VMX off 虚拟化关闭指令出错
309     EVMXOFFFailed = 132,
310     // VMX VMWRITE 写入虚拟化VMCS内存出错
311     EVMWRITEFailed = 133,
312     EVMREADFailed = 134,
313     EVMPRTLDFailed = 135,
314     EVMLAUNCHFailed = 136,
315     KVM_HVA_ERR_BAD = 137,
316 }
317 
318 impl SystemError {
319     /// @brief 把posix错误码转换为系统错误枚举类型。
320     pub fn from_posix_errno(errno: i32) -> Option<SystemError> {
321         // posix 错误码是小于0的
322         if errno >= 0 {
323             return None;
324         }
325         return <Self as FromPrimitive>::from_i32(-errno);
326     }
327 
328     /// @brief 把系统错误枚举类型转换为负数posix错误码。
329     pub fn to_posix_errno(&self) -> i32 {
330         return -<Self as ToPrimitive>::to_i32(self).unwrap();
331     }
332 }
333 
334 // 定义系统调用号
335 pub const SYS_READ: usize = 0;
336 pub const SYS_WRITE: usize = 1;
337 pub const SYS_OPEN: usize = 2;
338 pub const SYS_CLOSE: usize = 3;
339 #[allow(dead_code)]
340 pub const SYS_STAT: usize = 4;
341 pub const SYS_FSTAT: usize = 5;
342 
343 #[allow(dead_code)]
344 pub const SYS_POLL: usize = 7;
345 pub const SYS_LSEEK: usize = 8;
346 pub const SYS_MMAP: usize = 9;
347 pub const SYS_MPROTECT: usize = 10;
348 pub const SYS_MUNMAP: usize = 11;
349 pub const SYS_BRK: usize = 12;
350 pub const SYS_SIGACTION: usize = 13;
351 #[allow(dead_code)]
352 pub const SYS_RT_SIGPROCMASK: usize = 14;
353 
354 pub const SYS_RT_SIGRETURN: usize = 15;
355 pub const SYS_IOCTL: usize = 16;
356 
357 #[allow(dead_code)]
358 pub const SYS_WRITEV: usize = 20;
359 
360 pub const SYS_DUP: usize = 32;
361 pub const SYS_DUP2: usize = 33;
362 
363 pub const SYS_NANOSLEEP: usize = 35;
364 
365 pub const SYS_GETPID: usize = 39;
366 
367 pub const SYS_SOCKET: usize = 41;
368 pub const SYS_CONNECT: usize = 42;
369 pub const SYS_ACCEPT: usize = 43;
370 pub const SYS_SENDTO: usize = 44;
371 pub const SYS_RECVFROM: usize = 45;
372 
373 pub const SYS_RECVMSG: usize = 47;
374 pub const SYS_SHUTDOWN: usize = 48;
375 pub const SYS_BIND: usize = 49;
376 pub const SYS_LISTEN: usize = 50;
377 pub const SYS_GETSOCKNAME: usize = 51;
378 pub const SYS_GETPEERNAME: usize = 52;
379 pub const SYS_SOCKET_PAIR: usize = 53;
380 pub const SYS_SETSOCKOPT: usize = 54;
381 pub const SYS_GETSOCKOPT: usize = 55;
382 
383 #[allow(dead_code)]
384 pub const SYS_CLONE: usize = 56;
385 pub const SYS_FORK: usize = 57;
386 pub const SYS_VFORK: usize = 58;
387 pub const SYS_EXECVE: usize = 59;
388 pub const SYS_EXIT: usize = 60;
389 pub const SYS_WAIT4: usize = 61;
390 pub const SYS_KILL: usize = 62;
391 
392 pub const SYS_FCNTL: usize = 72;
393 
394 pub const SYS_FTRUNCATE: usize = 77;
395 pub const SYS_GET_DENTS: usize = 78;
396 
397 pub const SYS_GETCWD: usize = 79;
398 
399 pub const SYS_CHDIR: usize = 80;
400 
401 pub const SYS_MKDIR: usize = 83;
402 
403 pub const SYS_GETTIMEOFDAY: usize = 96;
404 
405 #[allow(dead_code)]
406 pub const SYS_SIGALTSTACK: usize = 131;
407 
408 #[allow(dead_code)]
409 pub const SYS_ARCH_PRCTL: usize = 158;
410 
411 pub const SYS_REBOOT: usize = 169;
412 
413 pub const SYS_GETPPID: usize = 110;
414 pub const SYS_GETPGID: usize = 121;
415 
416 pub const SYS_MKNOD: usize = 133;
417 
418 #[allow(dead_code)]
419 pub const SYS_TKILL: usize = 200;
420 
421 #[allow(dead_code)]
422 pub const SYS_FUTEX: usize = 202;
423 
424 pub const SYS_GET_DENTS_64: usize = 217;
425 #[allow(dead_code)]
426 pub const SYS_SET_TID_ADDR: usize = 218;
427 
428 pub const SYS_EXIT_GROUP: usize = 231;
429 
430 pub const SYS_UNLINK_AT: usize = 263;
431 
432 pub const SYS_PIPE: usize = 293;
433 
434 #[allow(dead_code)]
435 pub const SYS_GET_RANDOM: usize = 318;
436 
437 // 与linux不一致的调用,在linux基础上累加
438 pub const SYS_PUT_STRING: usize = 100000;
439 pub const SYS_SBRK: usize = 100001;
440 /// todo: 该系统调用与Linux不一致,将来需要删除该系统调用!!! 删的时候记得改C版本的libc
441 pub const SYS_CLOCK: usize = 100002;
442 pub const SYS_SCHED: usize = 100003;
443 
444 #[derive(Debug)]
445 pub struct Syscall;
446 
447 extern "C" {
448     fn do_put_string(s: *const u8, front_color: u32, back_color: u32) -> usize;
449 }
450 
451 #[no_mangle]
452 pub extern "C" fn syscall_init() -> i32 {
453     kinfo!("Initializing syscall...");
454     Syscall::init().expect("syscall init failed");
455     kinfo!("Syscall init successfully!");
456     return 0;
457 }
458 
459 impl Syscall {
460     /// 初始化系统调用
461     pub fn init() -> Result<(), SystemError> {
462         static INIT_FLAG: AtomicBool = AtomicBool::new(false);
463         let prev = INIT_FLAG.swap(true, Ordering::SeqCst);
464         if prev {
465             panic!("Cannot initialize syscall more than once!");
466         }
467         return crate::arch::syscall::arch_syscall_init();
468     }
469     /// @brief 系统调用分发器,用于分发系统调用。
470     ///
471     /// 这个函数内,需要根据系统调用号,调用对应的系统调用处理函数。
472     /// 并且,对于用户态传入的指针参数,需要在本函数内进行越界检查,防止访问到内核空间。
473     pub fn handle(
474         syscall_num: usize,
475         args: &[usize],
476         frame: &mut TrapFrame,
477     ) -> Result<usize, SystemError> {
478         let r = match syscall_num {
479             SYS_PUT_STRING => {
480                 Self::put_string(args[0] as *const u8, args[1] as u32, args[2] as u32)
481             }
482             SYS_OPEN => {
483                 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) };
484                 let path: Result<&str, core::str::Utf8Error> = path.to_str();
485                 let res = if path.is_err() {
486                     Err(SystemError::EINVAL)
487                 } else {
488                     let path: &str = path.unwrap();
489 
490                     let flags = args[1];
491                     let open_flags: FileMode = FileMode::from_bits_truncate(flags as u32);
492                     Self::open(path, open_flags)
493                 };
494                 res
495             }
496             SYS_CLOSE => {
497                 let fd = args[0];
498 
499                 let res = Self::close(fd);
500 
501                 res
502             }
503             SYS_READ => {
504                 let fd = args[0] as i32;
505                 let buf_vaddr = args[1];
506                 let len = args[2];
507                 let from_user = frame.from_user();
508                 let mut user_buffer_writer =
509                     UserBufferWriter::new(buf_vaddr as *mut u8, len, from_user)?;
510 
511                 let user_buf = user_buffer_writer.buffer(0)?;
512                 let res = Self::read(fd, user_buf);
513                 res
514             }
515             SYS_WRITE => {
516                 let fd = args[0] as i32;
517                 let buf_vaddr = args[1];
518                 let len = args[2];
519                 let from_user = frame.from_user();
520                 let user_buffer_reader =
521                     UserBufferReader::new(buf_vaddr as *const u8, len, from_user)?;
522 
523                 let user_buf = user_buffer_reader.read_from_user(0)?;
524                 let res = Self::write(fd, user_buf);
525                 res
526             }
527 
528             SYS_LSEEK => {
529                 let fd = args[0] as i32;
530                 let offset = args[1] as i64;
531                 let whence = args[2] as u32;
532 
533                 let w = match whence {
534                     SEEK_SET => Ok(SeekFrom::SeekSet(offset)),
535                     SEEK_CUR => Ok(SeekFrom::SeekCurrent(offset)),
536                     SEEK_END => Ok(SeekFrom::SeekEnd(offset)),
537                     SEEK_MAX => Ok(SeekFrom::SeekEnd(0)),
538                     _ => Err(SystemError::EINVAL),
539                 }?;
540 
541                 Self::lseek(fd, w)
542             }
543             SYS_IOCTL => {
544                 let fd = args[0];
545                 let cmd = args[1];
546                 let data = args[2];
547                 Self::ioctl(fd, cmd as u32, data)
548             }
549 
550             SYS_FORK => Self::fork(frame),
551             SYS_VFORK => Self::vfork(frame),
552 
553             SYS_BRK => {
554                 let new_brk = VirtAddr::new(args[0]);
555                 Self::brk(new_brk).map(|vaddr| vaddr.data())
556             }
557 
558             SYS_SBRK => {
559                 let increment = args[0] as isize;
560                 Self::sbrk(increment).map(|vaddr: VirtAddr| vaddr.data())
561             }
562 
563             SYS_REBOOT => Self::reboot(),
564 
565             SYS_CHDIR => {
566                 // Closure for checking arguments
567                 let chdir_check = |arg0: usize| {
568                     if arg0 == 0 {
569                         return Err(SystemError::EFAULT);
570                     }
571                     let path_ptr = arg0 as *const c_char;
572                     let virt_addr = VirtAddr::new(path_ptr as usize);
573                     // 权限校验
574                     if path_ptr.is_null()
575                         || (frame.from_user()
576                             && verify_area(virt_addr, PAGE_2M_SIZE as usize).is_err())
577                     {
578                         return Err(SystemError::EINVAL);
579                     }
580                     let dest_path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
581                     let dest_path: &str = dest_path.to_str().map_err(|_| SystemError::EINVAL)?;
582                     if dest_path.len() == 0 {
583                         return Err(SystemError::EINVAL);
584                     } else if dest_path.len() > MAX_PATHLEN as usize {
585                         return Err(SystemError::ENAMETOOLONG);
586                     }
587 
588                     return Ok(dest_path);
589                 };
590 
591                 let r = chdir_check(args[0])?;
592                 Self::chdir(r)
593             }
594 
595             SYS_GET_DENTS | SYS_GET_DENTS_64 => {
596                 let fd = args[0] as i32;
597 
598                 let buf_vaddr = args[1];
599                 let len = args[2];
600                 let virt_addr: VirtAddr = VirtAddr::new(buf_vaddr);
601                 // 判断缓冲区是否来自用户态,进行权限校验
602                 let res = if frame.from_user() && verify_area(virt_addr, len as usize).is_err() {
603                     // 来自用户态,而buffer在内核态,这样的操作不被允许
604                     Err(SystemError::EPERM)
605                 } else if buf_vaddr == 0 {
606                     Err(SystemError::EFAULT)
607                 } else {
608                     let buf: &mut [u8] = unsafe {
609                         core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len)
610                     };
611                     Self::getdents(fd, buf)
612                 };
613 
614                 res
615             }
616 
617             SYS_EXECVE => {
618                 let path_ptr = args[0];
619                 let argv_ptr = args[1];
620                 let env_ptr = args[2];
621                 let virt_path_ptr = VirtAddr::new(path_ptr);
622                 let virt_argv_ptr = VirtAddr::new(argv_ptr);
623                 let virt_env_ptr = VirtAddr::new(env_ptr);
624                 // 权限校验
625                 if frame.from_user()
626                     && (verify_area(virt_path_ptr, MAX_PATHLEN as usize).is_err()
627                         || verify_area(virt_argv_ptr, PAGE_4K_SIZE as usize).is_err())
628                     || verify_area(virt_env_ptr, PAGE_4K_SIZE as usize).is_err()
629                 {
630                     Err(SystemError::EFAULT)
631                 } else {
632                     Self::execve(
633                         path_ptr as *const u8,
634                         argv_ptr as *const *const u8,
635                         env_ptr as *const *const u8,
636                         frame,
637                     )
638                     .map(|_| 0)
639                 }
640             }
641             SYS_WAIT4 => {
642                 let pid = args[0] as i64;
643                 let wstatus = args[1] as *mut i32;
644                 let options = args[2] as c_int;
645                 let rusage = args[3] as *mut c_void;
646                 // 权限校验
647                 // todo: 引入rusage之后,更正以下权限校验代码中,rusage的大小
648                 Self::wait4(pid, wstatus, options, rusage)
649             }
650 
651             SYS_EXIT => {
652                 let exit_code = args[0];
653                 Self::exit(exit_code)
654             }
655             SYS_MKDIR => {
656                 let path_ptr = args[0] as *const c_char;
657                 let mode = args[1];
658                 let virt_path_ptr = VirtAddr::new(path_ptr as usize);
659                 let security_check = || {
660                     if path_ptr.is_null()
661                         || (frame.from_user()
662                             && verify_area(virt_path_ptr, PAGE_2M_SIZE as usize).is_err())
663                     {
664                         return Err(SystemError::EINVAL);
665                     }
666                     let path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
667                     let path: &str = path.to_str().map_err(|_| SystemError::EINVAL)?.trim();
668 
669                     if path == "" {
670                         return Err(SystemError::EINVAL);
671                     }
672                     return Ok(path);
673                 };
674 
675                 let path = security_check();
676                 if path.is_err() {
677                     Err(path.unwrap_err())
678                 } else {
679                     Self::mkdir(path.unwrap(), mode)
680                 }
681             }
682 
683             SYS_NANOSLEEP => {
684                 let req = args[0] as *const TimeSpec;
685                 let rem = args[1] as *mut TimeSpec;
686                 let virt_req = VirtAddr::new(req as usize);
687                 let virt_rem = VirtAddr::new(rem as usize);
688                 if frame.from_user()
689                     && (verify_area(virt_req, core::mem::size_of::<TimeSpec>() as usize).is_err()
690                         || verify_area(virt_rem, core::mem::size_of::<TimeSpec>() as usize)
691                             .is_err())
692                 {
693                     Err(SystemError::EFAULT)
694                 } else {
695                     Self::nanosleep(req, rem)
696                 }
697             }
698 
699             SYS_CLOCK => Self::clock(),
700             SYS_PIPE => {
701                 let pipefd: *mut i32 = args[0] as *mut c_int;
702                 let arg1 = args[1];
703                 if pipefd.is_null() {
704                     Err(SystemError::EFAULT)
705                 } else {
706                     let flags = FileMode::from_bits_truncate(arg1 as u32);
707                     Self::pipe2(pipefd, flags)
708                 }
709             }
710 
711             SYS_UNLINK_AT => {
712                 let dirfd = args[0] as i32;
713                 let pathname = args[1] as *const c_char;
714                 let flags = args[2] as u32;
715                 let virt_pathname = VirtAddr::new(pathname as usize);
716                 if frame.from_user() && verify_area(virt_pathname, PAGE_4K_SIZE as usize).is_err() {
717                     Err(SystemError::EFAULT)
718                 } else if pathname.is_null() {
719                     Err(SystemError::EFAULT)
720                 } else {
721                     let get_path = || {
722                         let pathname: &CStr = unsafe { CStr::from_ptr(pathname) };
723 
724                         let pathname: &str = pathname.to_str().map_err(|_| SystemError::EINVAL)?;
725                         if pathname.len() >= MAX_PATHLEN {
726                             return Err(SystemError::ENAMETOOLONG);
727                         }
728                         return Ok(pathname.trim());
729                     };
730                     let pathname = get_path();
731                     if pathname.is_err() {
732                         Err(pathname.unwrap_err())
733                     } else {
734                         // kdebug!("sys unlinkat: dirfd: {}, pathname: {}", dirfd, pathname.as_ref().unwrap());
735                         Self::unlinkat(dirfd, pathname.unwrap(), flags)
736                     }
737                 }
738             }
739             SYS_KILL => {
740                 let pid = Pid::new(args[0]);
741                 let sig = args[1] as c_int;
742                 // kdebug!("KILL SYSCALL RECEIVED");
743                 Self::kill(pid, sig)
744             }
745 
746             SYS_SIGACTION => {
747                 let sig = args[0] as c_int;
748                 let act = args[1];
749                 let old_act = args[2];
750                 Self::sigaction(sig, act, old_act, frame.from_user())
751             }
752 
753             SYS_RT_SIGRETURN => {
754                 // 由于目前signal机制的实现,与x86_64强关联,因此暂时在arch/x86_64/syscall.rs中调用
755                 // todo: 未来需要将signal机制与平台解耦
756                 todo!()
757             }
758 
759             SYS_GETPID => Self::getpid().map(|pid| pid.into()),
760 
761             SYS_SCHED => Self::sched(frame.from_user()),
762             SYS_DUP => {
763                 let oldfd: i32 = args[0] as c_int;
764                 Self::dup(oldfd)
765             }
766             SYS_DUP2 => {
767                 let oldfd: i32 = args[0] as c_int;
768                 let newfd: i32 = args[1] as c_int;
769                 Self::dup2(oldfd, newfd)
770             }
771 
772             SYS_SOCKET => Self::socket(args[0], args[1], args[2]),
773             SYS_SETSOCKOPT => {
774                 let optval = args[3] as *const u8;
775                 let optlen = args[4] as usize;
776                 let virt_optval = VirtAddr::new(optval as usize);
777                 // 验证optval的地址是否合法
778                 if verify_area(virt_optval, optlen as usize).is_err() {
779                     // 地址空间超出了用户空间的范围,不合法
780                     Err(SystemError::EFAULT)
781                 } else {
782                     let data: &[u8] = unsafe { core::slice::from_raw_parts(optval, optlen) };
783                     Self::setsockopt(args[0], args[1], args[2], data)
784                 }
785             }
786             SYS_GETSOCKOPT => {
787                 let optval = args[3] as *mut u8;
788                 let optlen = args[4] as *mut usize;
789                 let virt_optval = VirtAddr::new(optval as usize);
790                 let virt_optlen = VirtAddr::new(optlen as usize);
791                 let security_check = || {
792                     // 验证optval的地址是否合法
793                     if verify_area(virt_optval, PAGE_4K_SIZE as usize).is_err() {
794                         // 地址空间超出了用户空间的范围,不合法
795                         return Err(SystemError::EFAULT);
796                     }
797 
798                     // 验证optlen的地址是否合法
799                     if verify_area(virt_optlen, core::mem::size_of::<u32>() as usize).is_err() {
800                         // 地址空间超出了用户空间的范围,不合法
801                         return Err(SystemError::EFAULT);
802                     }
803                     return Ok(());
804                 };
805                 let r = security_check();
806                 if r.is_err() {
807                     Err(r.unwrap_err())
808                 } else {
809                     Self::getsockopt(args[0], args[1], args[2], optval, optlen as *mut u32)
810                 }
811             }
812 
813             SYS_CONNECT => {
814                 let addr = args[1] as *const SockAddr;
815                 let addrlen = args[2] as usize;
816                 let virt_addr = VirtAddr::new(addr as usize);
817                 // 验证addr的地址是否合法
818                 if verify_area(virt_addr, addrlen as usize).is_err() {
819                     // 地址空间超出了用户空间的范围,不合法
820                     Err(SystemError::EFAULT)
821                 } else {
822                     Self::connect(args[0], addr, addrlen)
823                 }
824             }
825             SYS_BIND => {
826                 let addr = args[1] as *const SockAddr;
827                 let addrlen = args[2] as usize;
828                 let virt_addr = VirtAddr::new(addr as usize);
829                 // 验证addr的地址是否合法
830                 if verify_area(virt_addr, addrlen as usize).is_err() {
831                     // 地址空间超出了用户空间的范围,不合法
832                     Err(SystemError::EFAULT)
833                 } else {
834                     Self::bind(args[0], addr, addrlen)
835                 }
836             }
837 
838             SYS_SENDTO => {
839                 let buf = args[1] as *const u8;
840                 let len = args[2] as usize;
841                 let flags = args[3] as u32;
842                 let addr = args[4] as *const SockAddr;
843                 let addrlen = args[5] as usize;
844                 let virt_buf = VirtAddr::new(buf as usize);
845                 let virt_addr = VirtAddr::new(addr as usize);
846                 // 验证buf的地址是否合法
847                 if verify_area(virt_buf, len as usize).is_err() {
848                     // 地址空间超出了用户空间的范围,不合法
849                     Err(SystemError::EFAULT)
850                 } else if verify_area(virt_addr, addrlen as usize).is_err() {
851                     // 地址空间超出了用户空间的范围,不合法
852                     Err(SystemError::EFAULT)
853                 } else {
854                     let data: &[u8] = unsafe { core::slice::from_raw_parts(buf, len) };
855                     Self::sendto(args[0], data, flags, addr, addrlen)
856                 }
857             }
858 
859             SYS_RECVFROM => {
860                 let buf = args[1] as *mut u8;
861                 let len = args[2] as usize;
862                 let flags = args[3] as u32;
863                 let addr = args[4] as *mut SockAddr;
864                 let addrlen = args[5] as *mut usize;
865                 let virt_buf = VirtAddr::new(buf as usize);
866                 let virt_addrlen = VirtAddr::new(addrlen as usize);
867                 let virt_addr = VirtAddr::new(addr as usize);
868                 let security_check = || {
869                     // 验证buf的地址是否合法
870                     if verify_area(virt_buf, len as usize).is_err() {
871                         // 地址空间超出了用户空间的范围,不合法
872                         return Err(SystemError::EFAULT);
873                     }
874 
875                     // 验证addrlen的地址是否合法
876                     if verify_area(virt_addrlen, core::mem::size_of::<u32>() as usize).is_err() {
877                         // 地址空间超出了用户空间的范围,不合法
878                         return Err(SystemError::EFAULT);
879                     }
880 
881                     if verify_area(virt_addr, core::mem::size_of::<SockAddr>() as usize).is_err() {
882                         // 地址空间超出了用户空间的范围,不合法
883                         return Err(SystemError::EFAULT);
884                     }
885                     return Ok(());
886                 };
887                 let r = security_check();
888                 if r.is_err() {
889                     Err(r.unwrap_err())
890                 } else {
891                     let buf = unsafe { core::slice::from_raw_parts_mut(buf, len) };
892                     Self::recvfrom(args[0], buf, flags, addr, addrlen as *mut u32)
893                 }
894             }
895 
896             SYS_RECVMSG => {
897                 let msg = args[1] as *mut crate::net::syscall::MsgHdr;
898                 let flags = args[2] as u32;
899                 match UserBufferWriter::new(
900                     msg,
901                     core::mem::size_of::<crate::net::syscall::MsgHdr>(),
902                     true,
903                 ) {
904                     Err(e) => Err(e),
905                     Ok(mut user_buffer_writer) => {
906                         match user_buffer_writer.buffer::<crate::net::syscall::MsgHdr>(0) {
907                             Err(e) => Err(e),
908                             Ok(buffer) => {
909                                 let msg = &mut buffer[0];
910                                 Self::recvmsg(args[0], msg, flags)
911                             }
912                         }
913                     }
914                 }
915             }
916 
917             SYS_LISTEN => Self::listen(args[0], args[1]),
918             SYS_SHUTDOWN => Self::shutdown(args[0], args[1]),
919             SYS_ACCEPT => Self::accept(args[0], args[1] as *mut SockAddr, args[2] as *mut u32),
920             SYS_GETSOCKNAME => {
921                 Self::getsockname(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
922             }
923             SYS_GETPEERNAME => {
924                 Self::getpeername(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
925             }
926             SYS_GETTIMEOFDAY => {
927                 let timeval = args[0] as *mut PosixTimeval;
928                 let timezone_ptr = args[1] as *mut PosixTimeZone;
929                 Self::gettimeofday(timeval, timezone_ptr)
930             }
931             SYS_MMAP => {
932                 let len = page_align_up(args[1]);
933                 let virt_addr = VirtAddr::new(args[0] as usize);
934                 if verify_area(virt_addr, len as usize).is_err() {
935                     Err(SystemError::EFAULT)
936                 } else {
937                     Self::mmap(
938                         VirtAddr::new(args[0]),
939                         len,
940                         args[2],
941                         args[3],
942                         args[4] as i32,
943                         args[5],
944                     )
945                 }
946             }
947             SYS_MUNMAP => {
948                 let addr = args[0];
949                 let len = page_align_up(args[1]);
950                 if addr & (MMArch::PAGE_SIZE - 1) != 0 {
951                     // The addr argument is not a multiple of the page size
952                     Err(SystemError::EINVAL)
953                 } else {
954                     Self::munmap(VirtAddr::new(addr), len)
955                 }
956             }
957             SYS_MPROTECT => {
958                 let addr = args[0];
959                 let len = page_align_up(args[1]);
960                 if addr & (MMArch::PAGE_SIZE - 1) != 0 {
961                     // The addr argument is not a multiple of the page size
962                     Err(SystemError::EINVAL)
963                 } else {
964                     Self::mprotect(VirtAddr::new(addr), len, args[2])
965                 }
966             }
967 
968             SYS_GETCWD => {
969                 let buf = args[0] as *mut u8;
970                 let size = args[1] as usize;
971                 let security_check = || {
972                     verify_area(VirtAddr::new(buf as usize), size)?;
973                     return Ok(());
974                 };
975                 let r = security_check();
976                 if r.is_err() {
977                     Err(r.unwrap_err())
978                 } else {
979                     let buf = unsafe { core::slice::from_raw_parts_mut(buf, size) };
980                     Self::getcwd(buf).map(|ptr| ptr.data())
981                 }
982             }
983 
984             SYS_GETPGID => Self::getpgid(Pid::new(args[0])).map(|pid| pid.into()),
985 
986             SYS_GETPPID => Self::getppid().map(|pid| pid.into()),
987             SYS_FSTAT => {
988                 let fd = args[0] as i32;
989                 let kstat = args[1] as *mut PosixKstat;
990                 let vaddr = VirtAddr::new(kstat as usize);
991                 // FIXME 由于c中的verify_area与rust中的verify_area重名,所以在引入时加了前缀区分
992                 // TODO 应该将用了c版本的verify_area都改为rust的verify_area
993                 match verify_area(vaddr, core::mem::size_of::<PosixKstat>()) {
994                     Ok(_) => Self::fstat(fd, kstat),
995                     Err(e) => Err(e),
996                 }
997             }
998 
999             SYS_FCNTL => {
1000                 let fd = args[0] as i32;
1001                 let cmd: Option<FcntlCommand> =
1002                     <FcntlCommand as FromPrimitive>::from_u32(args[1] as u32);
1003                 let arg = args[2] as i32;
1004                 let res = if let Some(cmd) = cmd {
1005                     Self::fcntl(fd, cmd, arg)
1006                 } else {
1007                     Err(SystemError::EINVAL)
1008                 };
1009 
1010                 // kdebug!("FCNTL: fd: {}, cmd: {:?}, arg: {}, res: {:?}", fd, cmd, arg, res);
1011                 res
1012             }
1013 
1014             SYS_FTRUNCATE => {
1015                 let fd = args[0] as i32;
1016                 let len = args[1] as usize;
1017                 let res = Self::ftruncate(fd, len);
1018                 // kdebug!("FTRUNCATE: fd: {}, len: {}, res: {:?}", fd, len, res);
1019                 res
1020             }
1021 
1022             SYS_MKNOD => {
1023                 let path = args[0];
1024                 let flags = args[1];
1025                 let dev_t = args[2];
1026                 let flags: ModeType = ModeType::from_bits_truncate(flags as u32);
1027                 Self::mknod(path as *const i8, flags, DeviceNumber::from(dev_t))
1028             }
1029 
1030             SYS_CLONE => {
1031                 let parent_tid = VirtAddr::new(args[2]);
1032                 let child_tid = VirtAddr::new(args[3]);
1033 
1034                 // 地址校验
1035                 verify_area(parent_tid, core::mem::size_of::<i32>())?;
1036                 verify_area(child_tid, core::mem::size_of::<i32>())?;
1037 
1038                 let mut clone_args = KernelCloneArgs::new();
1039                 clone_args.flags = CloneFlags::from_bits_truncate(args[0] as u64);
1040                 clone_args.stack = args[1];
1041                 clone_args.parent_tid = parent_tid;
1042                 clone_args.child_tid = child_tid;
1043                 clone_args.tls = args[4];
1044                 Self::clone(frame, clone_args)
1045             }
1046 
1047             SYS_FUTEX => {
1048                 let uaddr = VirtAddr::new(args[0]);
1049                 let operation = FutexFlag::from_bits(args[1] as u32).ok_or(SystemError::ENOSYS)?;
1050                 let val = args[2] as u32;
1051                 let utime = args[3];
1052                 let uaddr2 = VirtAddr::new(args[4]);
1053                 let val3 = args[5] as u32;
1054 
1055                 verify_area(uaddr, core::mem::size_of::<u32>())?;
1056                 verify_area(uaddr2, core::mem::size_of::<u32>())?;
1057 
1058                 let mut timespec = None;
1059                 if utime != 0 && operation.contains(FutexFlag::FLAGS_HAS_TIMEOUT) {
1060                     let reader = UserBufferReader::new(
1061                         utime as *const TimeSpec,
1062                         core::mem::size_of::<TimeSpec>(),
1063                         true,
1064                     )?;
1065 
1066                     timespec = Some(reader.read_one_from_user::<TimeSpec>(0)?.clone());
1067                 }
1068 
1069                 Self::do_futex(uaddr, operation, val, timespec, uaddr2, utime as u32, val3)
1070             }
1071 
1072             SYS_WRITEV => Self::writev(args[0] as i32, args[1], args[2]),
1073 
1074             SYS_ARCH_PRCTL => Self::arch_prctl(args[0], args[1]),
1075 
1076             SYS_SET_TID_ADDR => Self::set_tid_address(args[0]),
1077 
1078             SYS_STAT => {
1079                 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) };
1080                 let path: Result<&str, core::str::Utf8Error> = path.to_str();
1081                 let res = if path.is_err() {
1082                     Err(SystemError::EINVAL)
1083                 } else {
1084                     let path: &str = path.unwrap();
1085                     let kstat = args[1] as *mut PosixKstat;
1086                     let vaddr = VirtAddr::new(kstat as usize);
1087                     match verify_area(vaddr, core::mem::size_of::<PosixKstat>()) {
1088                         Ok(_) => Self::stat(path, kstat),
1089                         Err(e) => Err(e),
1090                     }
1091                 };
1092 
1093                 res
1094             }
1095 
1096             // 目前为了适配musl-libc,以下系统调用先这样写着
1097             SYS_GET_RANDOM => {
1098                 let flags = GRandFlags::from_bits(args[2] as u8).ok_or(SystemError::EINVAL)?;
1099                 Self::get_random(args[0] as *mut u8, args[1], flags)
1100             }
1101 
1102             SYS_SOCKET_PAIR => {
1103                 unimplemented!()
1104             }
1105 
1106             SYS_POLL => {
1107                 kwarn!("SYS_POLL has not yet been implemented");
1108                 Ok(0)
1109             }
1110 
1111             SYS_RT_SIGPROCMASK => {
1112                 kwarn!("SYS_RT_SIGPROCMASK has not yet been implemented");
1113                 Ok(0)
1114             }
1115 
1116             SYS_TKILL => {
1117                 kwarn!("SYS_TKILL has not yet been implemented");
1118                 Ok(0)
1119             }
1120 
1121             SYS_SIGALTSTACK => {
1122                 kwarn!("SYS_SIGALTSTACK has not yet been implemented");
1123                 Ok(0)
1124             }
1125 
1126             SYS_EXIT_GROUP => {
1127                 kwarn!("SYS_EXIT_GROUP has not yet been implemented");
1128                 Ok(0)
1129             }
1130 
1131             _ => panic!("Unsupported syscall ID: {}", syscall_num),
1132         };
1133         return r;
1134     }
1135 
1136     pub fn put_string(
1137         s: *const u8,
1138         front_color: u32,
1139         back_color: u32,
1140     ) -> Result<usize, SystemError> {
1141         return Ok(unsafe { do_put_string(s, front_color, back_color) });
1142     }
1143 
1144     pub fn reboot() -> Result<usize, SystemError> {
1145         cpu_reset();
1146     }
1147 }
1148