xref: /DragonOS/kernel/src/syscall/mod.rs (revision bf4a48994a2b284ee34aa49a66b4dec1b6ebc07c)
1 use core::{
2     ffi::{c_char, c_int, c_void, CStr},
3     sync::atomic::{AtomicBool, Ordering},
4 };
5 
6 use crate::{
7     arch::syscall::{
8         SYS_ACCESS, SYS_CHMOD, SYS_CLOCK_GETTIME, SYS_FACCESSAT, SYS_FACCESSAT2, SYS_FCHMOD,
9         SYS_FCHMODAT, SYS_LSTAT, SYS_PRLIMIT64, SYS_READV, SYS_SYSINFO, SYS_UMASK, SYS_UNLINK,
10     },
11     libs::{futex::constant::FutexFlag, rand::GRandFlags},
12     process::{
13         fork::KernelCloneArgs,
14         resource::{RLimit64, RUsage},
15     },
16 };
17 
18 use num_traits::{FromPrimitive, ToPrimitive};
19 
20 use crate::{
21     arch::{cpu::cpu_reset, interrupt::TrapFrame, MMArch},
22     driver::base::{block::SeekFrom, device::DeviceNumber},
23     filesystem::vfs::{
24         fcntl::FcntlCommand,
25         file::FileMode,
26         syscall::{ModeType, PosixKstat, SEEK_CUR, SEEK_END, SEEK_MAX, SEEK_SET},
27         MAX_PATHLEN,
28     },
29     include::bindings::bindings::{PAGE_2M_SIZE, PAGE_4K_SIZE},
30     kinfo,
31     libs::align::page_align_up,
32     mm::{verify_area, MemoryManagementArch, VirtAddr},
33     net::syscall::SockAddr,
34     process::{fork::CloneFlags, Pid},
35     time::{
36         syscall::{PosixTimeZone, PosixTimeval},
37         TimeSpec,
38     },
39 };
40 
41 use self::{
42     misc::SysInfo,
43     user_access::{UserBufferReader, UserBufferWriter},
44 };
45 
46 pub mod misc;
47 pub mod user_access;
48 
49 #[repr(i32)]
50 #[derive(Debug, FromPrimitive, ToPrimitive, PartialEq, Eq, Clone)]
51 #[allow(dead_code, non_camel_case_types)]
52 pub enum SystemError {
53     /// 操作不被允许 Operation not permitted.
54     EPERM = 1,
55     /// 没有指定的文件或目录 No such file or directory.
56     ENOENT = 2,
57     /// 没有这样的进程 No such process.
58     ESRCH = 3,
59     /// 被中断的函数 Interrupted function.
60     EINTR = 4,
61     /// I/O错误 I/O error.
62     EIO = 5,
63     /// 没有这样的设备或地址 No such device or address.
64     ENXIO = 6,
65     /// 参数列表过长,或者在输出buffer中缺少空间 或者参数比系统内建的最大值要大 Argument list too long.
66     E2BIG = 7,
67     /// 可执行文件格式错误 Executable file format error
68     ENOEXEC = 8,
69     /// 错误的文件描述符 Bad file descriptor.
70     EBADF = 9,
71     /// 没有子进程 No child processes.
72     ECHILD = 10,
73     /// 资源不可用,请重试。 Resource unavailable, try again.(may be the same value as [EWOULDBLOCK])
74     ///
75     /// 操作将被禁止 Operation would block.(may be the same value as [EAGAIN]).
76     EAGAIN_OR_EWOULDBLOCK = 11,
77     /// 没有足够的空间 Not enough space.
78     ENOMEM = 12,
79     /// 访问被拒绝 Permission denied
80     EACCES = 13,
81     /// 错误的地址 Bad address
82     EFAULT = 14,
83     /// 需要块设备 Block device required
84     ENOTBLK = 15,
85     /// 设备或资源忙 Device or resource busy.
86     EBUSY = 16,
87     /// 文件已存在 File exists.
88     EEXIST = 17,
89     /// 跨设备连接 Cross-device link.
90     EXDEV = 18,
91     /// 没有指定的设备 No such device.
92     ENODEV = 19,
93     /// 不是目录 Not a directory.
94     ENOTDIR = 20,
95     /// 是一个目录 Is a directory
96     EISDIR = 21,
97     /// 不可用的参数 Invalid argument.
98     EINVAL = 22,
99     /// 系统中打开的文件过多 Too many files open in system.
100     ENFILE = 23,
101     /// 文件描述符的值过大 File descriptor value too large.
102     EMFILE = 24,
103     /// 不正确的I/O控制操作 Inappropriate I/O control operation.
104     ENOTTY = 25,
105     /// 文本文件忙 Text file busy.
106     ETXTBSY = 26,
107     /// 文件太大 File too large.
108     EFBIG = 27,
109     /// 设备上没有空间 No space left on device.
110     ENOSPC = 28,
111     /// 错误的寻道.当前文件是pipe,不允许seek请求  Invalid seek.
112     ESPIPE = 29,
113     /// 只读的文件系统 Read-only file system.
114     EROFS = 30,
115     /// 链接数过多 Too many links.
116     EMLINK = 31,
117     /// 断开的管道 Broken pipe.
118     EPIPE = 32,
119     /// 数学参数超出作用域 Mathematics argument out of domain of function.
120     EDOM = 33,
121     /// 结果过大 Result too large.
122     ERANGE = 34,
123     /// 资源死锁将要发生 Resource deadlock would occur.
124     EDEADLK = 35,
125     /// 文件名过长 Filename too long.
126     ENAMETOOLONG = 36,
127     /// 没有可用的锁 No locks available.
128     ENOLCK = 37,
129     /// 功能不支持 Function not supported.
130     ENOSYS = 38,
131     /// 目录非空 Directory not empty.
132     ENOTEMPTY = 39,
133     /// 符号链接级别过多 Too many levels of symbolic links.
134     ELOOP = 40,
135     /// 没有期待类型的消息 No message of the desired type.
136     ENOMSG = 41,
137     /// 标志符被移除 Identifier removed.
138     EIDRM = 42,
139     /// 通道号超出范围 Channel number out of range
140     ECHRNG = 43,
141     /// 二级不同步 Level 2 not synchronized
142     EL2NSYNC = 44,
143     /// 三级暂停 Level 3 halted
144     EL3HLT = 45,
145     /// 三级重置 Level 3 reset
146     EL3RST = 46,
147     /// 链接号超出范围 Link number out of range
148     ELNRNG = 47,
149     /// 未连接协议驱动程序 Protocol driver not attached
150     EUNATCH = 48,
151     /// 没有可用的CSI结构 No CSI structure available
152     ENOCSI = 49,
153     /// 二级暂停 Level 2 halted
154     EL2HLT = 50,
155     /// 无效交换 Invalid exchange
156     EBADE = 51,
157     /// 无效的请求描述符 Invalid request descriptor
158     EBADR = 52,
159     /// 交换满 Exchange full
160     EXFULL = 53,
161     /// 无阳极 No anode
162     ENOANO = 54,
163     /// 请求码无效 Invalid request code
164     EBADRQC = 55,
165     /// 无效插槽 Invalid slot
166     EBADSLT = 56,
167     /// 资源死锁 Resource deadlock would occur
168     EDEADLOCK = 57,
169     /// 错误的字体文件格式 Bad font file format
170     EBFONT = 58,
171     /// 不是STREAM Not a STREAM
172     ENOSTR = 59,
173     /// 队列头没有可读取的消息 No message is available on the STREAM head read queue.
174     ENODATA = 60,
175     /// 流式ioctl()超时 Stream ioctl() timeout
176     ETIME = 61,
177     /// 没有STREAM资源  No STREAM resources.
178     ENOSR = 62,
179     /// 机器不在网络上 Machine is not on the network
180     ENONET = 63,
181     /// 未安装软件包 Package not installed
182     ENOPKG = 64,
183     /// 远程对象 Object is remote
184     EREMOTE = 65,
185     /// 保留 Reserved.
186     ENOLINK = 66,
187     /// 外设错误 Advertise error.
188     EADV = 67,
189     /// 安装错误 Srmount error
190     ESRMNT = 68,
191     /// 发送时发生通信错误 Communication error on send
192     ECOMM = 69,
193     /// 协议错误 Protocol error.
194     EPROTO = 70,
195     /// 保留使用 Reserved.
196     EMULTIHOP = 71,
197     /// RFS特定错误 RFS specific error
198     EDOTDOT = 72,
199     /// 错误的消息 Bad message.
200     EBADMSG = 73,
201     /// 数值过大,产生溢出 Value too large to be stored in data type.
202     EOVERFLOW = 74,
203     /// 名称在网络上不是唯一的 Name not unique on network
204     ENOTUNIQ = 75,
205     /// 处于不良状态的文件描述符 File descriptor in bad state
206     EBADFD = 76,
207     /// 远程地址已更改 Remote address changed
208     EREMCHG = 77,
209     /// 无法访问所需的共享库 Can not access a needed shared library
210     ELIBACC = 78,
211     /// 访问损坏的共享库 Accessing a corrupted shared library
212     ELIBBAD = 79,
213     /// a. out中的.lib部分已损坏 .lib section in a.out corrupted
214     ELIBSCN = 80,
215     /// 尝试链接太多共享库 Attempting to link in too many shared libraries
216     ELIBMAX = 81,
217     /// 无法直接执行共享库 Cannot exec a shared library directly
218     ELIBEXEC = 82,
219     /// 不合法的字符序列 Illegal byte sequence.
220     EILSEQ = 83,
221     /// 中断的系统调用应该重新启动 Interrupted system call should be restarted
222     ERESTART = 84,
223     /// 流管道错误 Streams pipe error
224     ESTRPIPE = 85,
225     /// 用户太多 Too many users
226     EUSERS = 86,
227     /// 不是一个套接字 Not a socket.
228     ENOTSOCK = 87,
229     /// 需要目标地址 Destination address required.
230     EDESTADDRREQ = 88,
231     /// 消息过大 Message too large.
232     EMSGSIZE = 89,
233     /// 对于套接字而言,错误的协议 Protocol wrong type for socket.
234     EPROTOTYPE = 90,
235     /// 协议不可用 Protocol not available.
236     ENOPROTOOPT = 91,
237     /// 协议不被支持 Protocol not supported.
238     EPROTONOSUPPORT = 92,
239     /// 不支持套接字类型 Socket type not supported
240     ESOCKTNOSUPPORT = 93,
241     /// 套接字不支持该操作 Operation not supported on socket (may be the same value as [ENOTSUP]).
242     ///
243     /// 不被支持 Not supported (may be the same value as [EOPNOTSUPP]).
244     EOPNOTSUPP_OR_ENOTSUP = 94,
245     /// 不支持协议系列 Protocol family not supported
246     EPFNOSUPPORT = 95,
247     /// 地址family不支持 Address family not supported.
248     EAFNOSUPPORT = 96,
249     /// 地址正在被使用 Address in use.
250     EADDRINUSE = 97,
251     /// 地址不可用 Address  not available.
252     EADDRNOTAVAIL = 98,
253     /// 网络已关闭 Network is down.
254     ENETDOWN = 99,
255     /// 网络不可达 Network unreachable.
256     ENETUNREACH = 100,
257     /// 网络连接已断开 Connection aborted by network.
258     ENETRESET = 101,
259     /// 连接已断开 Connection aborted.
260     ECONNABORTED = 102,
261     /// 连接被重置 Connection reset.
262     ECONNRESET = 103,
263     /// 缓冲区空间不足 No buffer space available.
264     ENOBUFS = 104,
265     /// 套接字已连接 Socket is connected.
266     EISCONN = 105,
267     /// 套接字未连接 The socket is not connected.
268     ENOTCONN = 106,
269     /// 传输端点关闭后无法发送 Cannot send after transport endpoint shutdown
270     ESHUTDOWN = 107,
271     /// 引用太多:无法拼接 Too many references: cannot splice
272     ETOOMANYREFS = 108,
273     /// 连接超时 Connection timed out.
274     ETIMEDOUT = 109,
275     /// 连接被拒绝 Connection refused.
276     ECONNREFUSED = 110,
277     /// 主机已关闭 Host is down
278     EHOSTDOWN = 111,
279     /// 主机不可达 Host is unreachable.
280     EHOSTUNREACH = 112,
281     /// 连接已经在处理 Connection already in progress.
282     EALREADY = 113,
283     /// 操作正在处理 Operation in progress.
284     EINPROGRESS = 114,
285     /// 保留 Reserved.
286     ESTALE = 115,
287     /// 结构需要清理 Structure needs cleaning
288     EUCLEAN = 116,
289     /// 不是XENIX命名类型文件 Not a XENIX named type file
290     ENOTNAM = 117,
291     /// 没有可用的XENIX信号量 No XENIX semaphores available
292     ENAVAIL = 118,
293     /// 是命名类型文件 Is a named type file
294     EISNAM = 119,
295     /// 远程I/O错误 Remote I/O error
296     EREMOTEIO = 120,
297     /// 保留使用 Reserved
298     EDQUOT = 121,
299     /// 没有找到媒介 No medium found
300     ENOMEDIUM = 122,
301     /// 介质类型错误 Wrong medium type
302     EMEDIUMTYPE = 123,
303     /// 操作被取消 Operation canceled.
304     ECANCELED = 124,
305     /// 所需的密钥不可用 Required key not available
306     ENOKEY = 125,
307     /// 密钥已过期 Key has expired
308     EKEYEXPIRED = 126,
309     /// 密钥已被撤销 Key has been revoked
310     EKEYREVOKED = 127,
311     /// 密钥被服务拒绝 Key has been revoked
312     EKEYREJECTED = 128,
313     /// 之前的拥有者挂了 Previous owner died.
314     EOWNERDEAD = 129,
315     /// 状态不可恢复 State not recoverable.
316     ENOTRECOVERABLE = 130,
317     // VMX on 虚拟化开启指令出错
318     EVMXONFailed = 131,
319     // VMX off 虚拟化关闭指令出错
320     EVMXOFFFailed = 132,
321     // VMX VMWRITE 写入虚拟化VMCS内存出错
322     EVMWRITEFailed = 133,
323     EVMREADFailed = 134,
324     EVMPRTLDFailed = 135,
325     EVMLAUNCHFailed = 136,
326     KVM_HVA_ERR_BAD = 137,
327 
328     // === 以下错误码不应该被用户态程序使用 ===
329     ERESTARTSYS = 512,
330 }
331 
332 impl SystemError {
333     /// @brief 把posix错误码转换为系统错误枚举类型。
334     pub fn from_posix_errno(errno: i32) -> Option<SystemError> {
335         // posix 错误码是小于0的
336         if errno >= 0 {
337             return None;
338         }
339         return <Self as FromPrimitive>::from_i32(-errno);
340     }
341 
342     /// @brief 把系统错误枚举类型转换为负数posix错误码。
343     pub fn to_posix_errno(&self) -> i32 {
344         return -<Self as ToPrimitive>::to_i32(self).unwrap();
345     }
346 }
347 
348 // 定义系统调用号
349 pub const SYS_READ: usize = 0;
350 pub const SYS_WRITE: usize = 1;
351 pub const SYS_OPEN: usize = 2;
352 pub const SYS_CLOSE: usize = 3;
353 pub const SYS_STAT: usize = 4;
354 pub const SYS_FSTAT: usize = 5;
355 
356 pub const SYS_POLL: usize = 7;
357 pub const SYS_LSEEK: usize = 8;
358 pub const SYS_MMAP: usize = 9;
359 pub const SYS_MPROTECT: usize = 10;
360 
361 pub const SYS_MUNMAP: usize = 11;
362 pub const SYS_BRK: usize = 12;
363 pub const SYS_SIGACTION: usize = 13;
364 pub const SYS_RT_SIGPROCMASK: usize = 14;
365 pub const SYS_RT_SIGRETURN: usize = 15;
366 
367 pub const SYS_IOCTL: usize = 16;
368 
369 pub const SYS_WRITEV: usize = 20;
370 
371 pub const SYS_MADVISE: usize = 28;
372 
373 pub const SYS_DUP: usize = 32;
374 pub const SYS_DUP2: usize = 33;
375 
376 pub const SYS_NANOSLEEP: usize = 35;
377 
378 pub const SYS_GETPID: usize = 39;
379 
380 pub const SYS_SOCKET: usize = 41;
381 pub const SYS_CONNECT: usize = 42;
382 pub const SYS_ACCEPT: usize = 43;
383 pub const SYS_SENDTO: usize = 44;
384 pub const SYS_RECVFROM: usize = 45;
385 
386 pub const SYS_RECVMSG: usize = 47;
387 pub const SYS_SHUTDOWN: usize = 48;
388 pub const SYS_BIND: usize = 49;
389 pub const SYS_LISTEN: usize = 50;
390 pub const SYS_GETSOCKNAME: usize = 51;
391 pub const SYS_GETPEERNAME: usize = 52;
392 pub const SYS_SOCKET_PAIR: usize = 53;
393 pub const SYS_SETSOCKOPT: usize = 54;
394 pub const SYS_GETSOCKOPT: usize = 55;
395 
396 pub const SYS_CLONE: usize = 56;
397 pub const SYS_FORK: usize = 57;
398 pub const SYS_VFORK: usize = 58;
399 pub const SYS_EXECVE: usize = 59;
400 pub const SYS_EXIT: usize = 60;
401 pub const SYS_WAIT4: usize = 61;
402 pub const SYS_KILL: usize = 62;
403 
404 pub const SYS_FCNTL: usize = 72;
405 
406 pub const SYS_FTRUNCATE: usize = 77;
407 pub const SYS_GET_DENTS: usize = 78;
408 
409 pub const SYS_GETCWD: usize = 79;
410 
411 pub const SYS_CHDIR: usize = 80;
412 
413 pub const SYS_MKDIR: usize = 83;
414 
415 pub const SYS_READLINK: usize = 89;
416 
417 pub const SYS_GETTIMEOFDAY: usize = 96;
418 pub const SYS_GETRUSAGE: usize = 98;
419 
420 pub const SYS_GETUID: usize = 102;
421 pub const SYS_SYSLOG: usize = 103;
422 pub const SYS_GETGID: usize = 104;
423 pub const SYS_SETUID: usize = 105;
424 
425 pub const SYS_SETGID: usize = 106;
426 pub const SYS_GETEUID: usize = 107;
427 pub const SYS_GETEGID: usize = 108;
428 
429 pub const SYS_GETPPID: usize = 110;
430 pub const SYS_GETPGID: usize = 121;
431 
432 pub const SYS_SIGALTSTACK: usize = 131;
433 pub const SYS_MKNOD: usize = 133;
434 
435 pub const SYS_ARCH_PRCTL: usize = 158;
436 
437 pub const SYS_REBOOT: usize = 169;
438 
439 pub const SYS_GETTID: usize = 186;
440 
441 #[allow(dead_code)]
442 pub const SYS_TKILL: usize = 200;
443 
444 #[allow(dead_code)]
445 pub const SYS_FUTEX: usize = 202;
446 
447 pub const SYS_GET_DENTS_64: usize = 217;
448 #[allow(dead_code)]
449 pub const SYS_SET_TID_ADDR: usize = 218;
450 
451 pub const SYS_EXIT_GROUP: usize = 231;
452 
453 pub const SYS_UNLINK_AT: usize = 263;
454 
455 pub const SYS_READLINK_AT: usize = 267;
456 
457 pub const SYS_ACCEPT4: usize = 288;
458 
459 pub const SYS_PIPE: usize = 293;
460 
461 #[allow(dead_code)]
462 pub const SYS_GET_RANDOM: usize = 318;
463 
464 // 与linux不一致的调用,在linux基础上累加
465 pub const SYS_PUT_STRING: usize = 100000;
466 pub const SYS_SBRK: usize = 100001;
467 /// todo: 该系统调用与Linux不一致,将来需要删除该系统调用!!! 删的时候记得改C版本的libc
468 pub const SYS_CLOCK: usize = 100002;
469 pub const SYS_SCHED: usize = 100003;
470 
471 #[derive(Debug)]
472 pub struct Syscall;
473 
474 extern "C" {
475     fn do_put_string(s: *const u8, front_color: u32, back_color: u32) -> usize;
476 }
477 
478 #[no_mangle]
479 pub extern "C" fn syscall_init() -> i32 {
480     kinfo!("Initializing syscall...");
481     Syscall::init().expect("syscall init failed");
482     kinfo!("Syscall init successfully!");
483     return 0;
484 }
485 
486 impl Syscall {
487     /// 初始化系统调用
488     pub fn init() -> Result<(), SystemError> {
489         static INIT_FLAG: AtomicBool = AtomicBool::new(false);
490         let prev = INIT_FLAG.swap(true, Ordering::SeqCst);
491         if prev {
492             panic!("Cannot initialize syscall more than once!");
493         }
494         return crate::arch::syscall::arch_syscall_init();
495     }
496     /// @brief 系统调用分发器,用于分发系统调用。
497     ///
498     /// 这个函数内,需要根据系统调用号,调用对应的系统调用处理函数。
499     /// 并且,对于用户态传入的指针参数,需要在本函数内进行越界检查,防止访问到内核空间。
500     pub fn handle(
501         syscall_num: usize,
502         args: &[usize],
503         frame: &mut TrapFrame,
504     ) -> Result<usize, SystemError> {
505         let r = match syscall_num {
506             SYS_PUT_STRING => {
507                 Self::put_string(args[0] as *const u8, args[1] as u32, args[2] as u32)
508             }
509             SYS_OPEN => {
510                 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) };
511                 let path: Result<&str, core::str::Utf8Error> = path.to_str();
512                 let res = if path.is_err() {
513                     Err(SystemError::EINVAL)
514                 } else {
515                     let path: &str = path.unwrap();
516 
517                     let flags = args[1];
518                     let open_flags: FileMode = FileMode::from_bits_truncate(flags as u32);
519                     Self::open(path, open_flags, true)
520                 };
521                 res
522             }
523             SYS_CLOSE => {
524                 let fd = args[0];
525 
526                 let res = Self::close(fd);
527 
528                 res
529             }
530             SYS_READ => {
531                 let fd = args[0] as i32;
532                 let buf_vaddr = args[1];
533                 let len = args[2];
534                 let from_user = frame.from_user();
535                 let mut user_buffer_writer =
536                     UserBufferWriter::new(buf_vaddr as *mut u8, len, from_user)?;
537 
538                 let user_buf = user_buffer_writer.buffer(0)?;
539                 let res = Self::read(fd, user_buf);
540                 res
541             }
542             SYS_WRITE => {
543                 let fd = args[0] as i32;
544                 let buf_vaddr = args[1];
545                 let len = args[2];
546                 let from_user = frame.from_user();
547                 let user_buffer_reader =
548                     UserBufferReader::new(buf_vaddr as *const u8, len, from_user)?;
549 
550                 let user_buf = user_buffer_reader.read_from_user(0)?;
551                 let res = Self::write(fd, user_buf);
552                 res
553             }
554 
555             SYS_LSEEK => {
556                 let fd = args[0] as i32;
557                 let offset = args[1] as i64;
558                 let whence = args[2] as u32;
559 
560                 let w = match whence {
561                     SEEK_SET => Ok(SeekFrom::SeekSet(offset)),
562                     SEEK_CUR => Ok(SeekFrom::SeekCurrent(offset)),
563                     SEEK_END => Ok(SeekFrom::SeekEnd(offset)),
564                     SEEK_MAX => Ok(SeekFrom::SeekEnd(0)),
565                     _ => Err(SystemError::EINVAL),
566                 }?;
567 
568                 Self::lseek(fd, w)
569             }
570             SYS_IOCTL => {
571                 let fd = args[0];
572                 let cmd = args[1];
573                 let data = args[2];
574                 Self::ioctl(fd, cmd as u32, data)
575             }
576 
577             SYS_FORK => Self::fork(frame),
578             SYS_VFORK => Self::vfork(frame),
579 
580             SYS_BRK => {
581                 let new_brk = VirtAddr::new(args[0]);
582                 Self::brk(new_brk).map(|vaddr| vaddr.data())
583             }
584 
585             SYS_SBRK => {
586                 let increment = args[0] as isize;
587                 Self::sbrk(increment).map(|vaddr: VirtAddr| vaddr.data())
588             }
589 
590             SYS_REBOOT => Self::reboot(),
591 
592             SYS_CHDIR => {
593                 // Closure for checking arguments
594                 let chdir_check = |arg0: usize| {
595                     if arg0 == 0 {
596                         return Err(SystemError::EFAULT);
597                     }
598                     let path_ptr = arg0 as *const c_char;
599                     let virt_addr = VirtAddr::new(path_ptr as usize);
600                     // 权限校验
601                     if path_ptr.is_null()
602                         || (frame.from_user()
603                             && verify_area(virt_addr, PAGE_2M_SIZE as usize).is_err())
604                     {
605                         return Err(SystemError::EINVAL);
606                     }
607                     let dest_path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
608                     let dest_path: &str = dest_path.to_str().map_err(|_| SystemError::EINVAL)?;
609                     if dest_path.len() == 0 {
610                         return Err(SystemError::EINVAL);
611                     } else if dest_path.len() > MAX_PATHLEN as usize {
612                         return Err(SystemError::ENAMETOOLONG);
613                     }
614 
615                     return Ok(dest_path);
616                 };
617 
618                 let r = chdir_check(args[0])?;
619                 Self::chdir(r)
620             }
621 
622             SYS_GET_DENTS | SYS_GET_DENTS_64 => {
623                 let fd = args[0] as i32;
624 
625                 let buf_vaddr = args[1];
626                 let len = args[2];
627                 let virt_addr: VirtAddr = VirtAddr::new(buf_vaddr);
628                 // 判断缓冲区是否来自用户态,进行权限校验
629                 let res = if frame.from_user() && verify_area(virt_addr, len as usize).is_err() {
630                     // 来自用户态,而buffer在内核态,这样的操作不被允许
631                     Err(SystemError::EPERM)
632                 } else if buf_vaddr == 0 {
633                     Err(SystemError::EFAULT)
634                 } else {
635                     let buf: &mut [u8] = unsafe {
636                         core::slice::from_raw_parts_mut::<'static, u8>(buf_vaddr as *mut u8, len)
637                     };
638                     Self::getdents(fd, buf)
639                 };
640 
641                 res
642             }
643 
644             SYS_EXECVE => {
645                 let path_ptr = args[0];
646                 let argv_ptr = args[1];
647                 let env_ptr = args[2];
648                 let virt_path_ptr = VirtAddr::new(path_ptr);
649                 let virt_argv_ptr = VirtAddr::new(argv_ptr);
650                 let virt_env_ptr = VirtAddr::new(env_ptr);
651                 // 权限校验
652                 if frame.from_user()
653                     && (verify_area(virt_path_ptr, MAX_PATHLEN as usize).is_err()
654                         || verify_area(virt_argv_ptr, PAGE_4K_SIZE as usize).is_err())
655                     || verify_area(virt_env_ptr, PAGE_4K_SIZE as usize).is_err()
656                 {
657                     Err(SystemError::EFAULT)
658                 } else {
659                     Self::execve(
660                         path_ptr as *const u8,
661                         argv_ptr as *const *const u8,
662                         env_ptr as *const *const u8,
663                         frame,
664                     )
665                     .map(|_| 0)
666                 }
667             }
668             SYS_WAIT4 => {
669                 let pid = args[0] as i32;
670                 let wstatus = args[1] as *mut i32;
671                 let options = args[2] as c_int;
672                 let rusage = args[3] as *mut c_void;
673                 // 权限校验
674                 // todo: 引入rusage之后,更正以下权限校验代码中,rusage的大小
675                 Self::wait4(pid.into(), wstatus, options, rusage)
676             }
677 
678             SYS_EXIT => {
679                 let exit_code = args[0];
680                 Self::exit(exit_code)
681             }
682             SYS_MKDIR => {
683                 let path_ptr = args[0] as *const c_char;
684                 let mode = args[1];
685                 let virt_path_ptr = VirtAddr::new(path_ptr as usize);
686                 let security_check = || {
687                     if path_ptr.is_null()
688                         || (frame.from_user()
689                             && verify_area(virt_path_ptr, PAGE_2M_SIZE as usize).is_err())
690                     {
691                         return Err(SystemError::EINVAL);
692                     }
693                     let path: &CStr = unsafe { CStr::from_ptr(path_ptr) };
694                     let path: &str = path.to_str().map_err(|_| SystemError::EINVAL)?.trim();
695 
696                     if path == "" {
697                         return Err(SystemError::EINVAL);
698                     }
699                     return Ok(path);
700                 };
701 
702                 let path = security_check();
703                 if path.is_err() {
704                     Err(path.unwrap_err())
705                 } else {
706                     Self::mkdir(path.unwrap(), mode)
707                 }
708             }
709 
710             SYS_NANOSLEEP => {
711                 let req = args[0] as *const TimeSpec;
712                 let rem = args[1] as *mut TimeSpec;
713                 let virt_req = VirtAddr::new(req as usize);
714                 let virt_rem = VirtAddr::new(rem as usize);
715                 if frame.from_user()
716                     && (verify_area(virt_req, core::mem::size_of::<TimeSpec>() as usize).is_err()
717                         || verify_area(virt_rem, core::mem::size_of::<TimeSpec>() as usize)
718                             .is_err())
719                 {
720                     Err(SystemError::EFAULT)
721                 } else {
722                     Self::nanosleep(req, rem)
723                 }
724             }
725 
726             SYS_CLOCK => Self::clock(),
727             SYS_PIPE => {
728                 let pipefd: *mut i32 = args[0] as *mut c_int;
729                 let arg1 = args[1];
730                 if pipefd.is_null() {
731                     Err(SystemError::EFAULT)
732                 } else {
733                     let flags = FileMode::from_bits_truncate(arg1 as u32);
734                     Self::pipe2(pipefd, flags)
735                 }
736             }
737 
738             SYS_UNLINK_AT => {
739                 let dirfd = args[0] as i32;
740                 let pathname = args[1] as *const c_char;
741                 let flags = args[2] as u32;
742                 let virt_pathname = VirtAddr::new(pathname as usize);
743                 if frame.from_user() && verify_area(virt_pathname, PAGE_4K_SIZE as usize).is_err() {
744                     Err(SystemError::EFAULT)
745                 } else if pathname.is_null() {
746                     Err(SystemError::EFAULT)
747                 } else {
748                     let get_path = || {
749                         let pathname: &CStr = unsafe { CStr::from_ptr(pathname) };
750 
751                         let pathname: &str = pathname.to_str().map_err(|_| SystemError::EINVAL)?;
752                         if pathname.len() >= MAX_PATHLEN {
753                             return Err(SystemError::ENAMETOOLONG);
754                         }
755                         return Ok(pathname.trim());
756                     };
757                     let pathname = get_path();
758                     if pathname.is_err() {
759                         Err(pathname.unwrap_err())
760                     } else {
761                         // kdebug!("sys unlinkat: dirfd: {}, pathname: {}", dirfd, pathname.as_ref().unwrap());
762                         Self::unlinkat(dirfd, pathname.unwrap(), flags)
763                     }
764                 }
765             }
766 
767             SYS_UNLINK => {
768                 let pathname = args[0] as *const u8;
769                 Self::unlink(pathname)
770             }
771             SYS_KILL => {
772                 let pid = Pid::new(args[0]);
773                 let sig = args[1] as c_int;
774                 // kdebug!("KILL SYSCALL RECEIVED");
775                 Self::kill(pid, sig)
776             }
777 
778             SYS_SIGACTION => {
779                 let sig = args[0] as c_int;
780                 let act = args[1];
781                 let old_act = args[2];
782                 Self::sigaction(sig, act, old_act, frame.from_user())
783             }
784 
785             SYS_RT_SIGRETURN => {
786                 // 由于目前signal机制的实现,与x86_64强关联,因此暂时在arch/x86_64/syscall.rs中调用
787                 // todo: 未来需要将signal机制与平台解耦
788                 todo!()
789             }
790 
791             SYS_GETPID => Self::getpid().map(|pid| pid.into()),
792 
793             SYS_SCHED => Self::sched(frame.from_user()),
794             SYS_DUP => {
795                 let oldfd: i32 = args[0] as c_int;
796                 Self::dup(oldfd)
797             }
798             SYS_DUP2 => {
799                 let oldfd: i32 = args[0] as c_int;
800                 let newfd: i32 = args[1] as c_int;
801                 Self::dup2(oldfd, newfd)
802             }
803 
804             SYS_SOCKET => Self::socket(args[0], args[1], args[2]),
805             SYS_SETSOCKOPT => {
806                 let optval = args[3] as *const u8;
807                 let optlen = args[4] as usize;
808                 let virt_optval = VirtAddr::new(optval as usize);
809                 // 验证optval的地址是否合法
810                 if verify_area(virt_optval, optlen as usize).is_err() {
811                     // 地址空间超出了用户空间的范围,不合法
812                     Err(SystemError::EFAULT)
813                 } else {
814                     let data: &[u8] = unsafe { core::slice::from_raw_parts(optval, optlen) };
815                     Self::setsockopt(args[0], args[1], args[2], data)
816                 }
817             }
818             SYS_GETSOCKOPT => {
819                 let optval = args[3] as *mut u8;
820                 let optlen = args[4] as *mut usize;
821                 let virt_optval = VirtAddr::new(optval as usize);
822                 let virt_optlen = VirtAddr::new(optlen as usize);
823                 let security_check = || {
824                     // 验证optval的地址是否合法
825                     if verify_area(virt_optval, PAGE_4K_SIZE as usize).is_err() {
826                         // 地址空间超出了用户空间的范围,不合法
827                         return Err(SystemError::EFAULT);
828                     }
829 
830                     // 验证optlen的地址是否合法
831                     if verify_area(virt_optlen, core::mem::size_of::<u32>() as usize).is_err() {
832                         // 地址空间超出了用户空间的范围,不合法
833                         return Err(SystemError::EFAULT);
834                     }
835                     return Ok(());
836                 };
837                 let r = security_check();
838                 if r.is_err() {
839                     Err(r.unwrap_err())
840                 } else {
841                     Self::getsockopt(args[0], args[1], args[2], optval, optlen as *mut u32)
842                 }
843             }
844 
845             SYS_CONNECT => {
846                 let addr = args[1] as *const SockAddr;
847                 let addrlen = args[2] as usize;
848                 let virt_addr = VirtAddr::new(addr as usize);
849                 // 验证addr的地址是否合法
850                 if verify_area(virt_addr, addrlen as usize).is_err() {
851                     // 地址空间超出了用户空间的范围,不合法
852                     Err(SystemError::EFAULT)
853                 } else {
854                     Self::connect(args[0], addr, addrlen)
855                 }
856             }
857             SYS_BIND => {
858                 let addr = args[1] as *const SockAddr;
859                 let addrlen = args[2] as usize;
860                 let virt_addr = VirtAddr::new(addr as usize);
861                 // 验证addr的地址是否合法
862                 if verify_area(virt_addr, addrlen as usize).is_err() {
863                     // 地址空间超出了用户空间的范围,不合法
864                     Err(SystemError::EFAULT)
865                 } else {
866                     Self::bind(args[0], addr, addrlen)
867                 }
868             }
869 
870             SYS_SENDTO => {
871                 let buf = args[1] as *const u8;
872                 let len = args[2] as usize;
873                 let flags = args[3] as u32;
874                 let addr = args[4] as *const SockAddr;
875                 let addrlen = args[5] as usize;
876                 let virt_buf = VirtAddr::new(buf as usize);
877                 let virt_addr = VirtAddr::new(addr as usize);
878                 // 验证buf的地址是否合法
879                 if verify_area(virt_buf, len as usize).is_err() {
880                     // 地址空间超出了用户空间的范围,不合法
881                     Err(SystemError::EFAULT)
882                 } else if verify_area(virt_addr, addrlen as usize).is_err() {
883                     // 地址空间超出了用户空间的范围,不合法
884                     Err(SystemError::EFAULT)
885                 } else {
886                     let data: &[u8] = unsafe { core::slice::from_raw_parts(buf, len) };
887                     Self::sendto(args[0], data, flags, addr, addrlen)
888                 }
889             }
890 
891             SYS_RECVFROM => {
892                 let buf = args[1] as *mut u8;
893                 let len = args[2] as usize;
894                 let flags = args[3] as u32;
895                 let addr = args[4] as *mut SockAddr;
896                 let addrlen = args[5] as *mut usize;
897                 let virt_buf = VirtAddr::new(buf as usize);
898                 let virt_addrlen = VirtAddr::new(addrlen as usize);
899                 let virt_addr = VirtAddr::new(addr as usize);
900                 let security_check = || {
901                     // 验证buf的地址是否合法
902                     if verify_area(virt_buf, len as usize).is_err() {
903                         // 地址空间超出了用户空间的范围,不合法
904                         return Err(SystemError::EFAULT);
905                     }
906 
907                     // 验证addrlen的地址是否合法
908                     if verify_area(virt_addrlen, core::mem::size_of::<u32>() as usize).is_err() {
909                         // 地址空间超出了用户空间的范围,不合法
910                         return Err(SystemError::EFAULT);
911                     }
912 
913                     if verify_area(virt_addr, core::mem::size_of::<SockAddr>() as usize).is_err() {
914                         // 地址空间超出了用户空间的范围,不合法
915                         return Err(SystemError::EFAULT);
916                     }
917                     return Ok(());
918                 };
919                 let r = security_check();
920                 if r.is_err() {
921                     Err(r.unwrap_err())
922                 } else {
923                     let buf = unsafe { core::slice::from_raw_parts_mut(buf, len) };
924                     Self::recvfrom(args[0], buf, flags, addr, addrlen as *mut u32)
925                 }
926             }
927 
928             SYS_RECVMSG => {
929                 let msg = args[1] as *mut crate::net::syscall::MsgHdr;
930                 let flags = args[2] as u32;
931                 match UserBufferWriter::new(
932                     msg,
933                     core::mem::size_of::<crate::net::syscall::MsgHdr>(),
934                     true,
935                 ) {
936                     Err(e) => Err(e),
937                     Ok(mut user_buffer_writer) => {
938                         match user_buffer_writer.buffer::<crate::net::syscall::MsgHdr>(0) {
939                             Err(e) => Err(e),
940                             Ok(buffer) => {
941                                 let msg = &mut buffer[0];
942                                 Self::recvmsg(args[0], msg, flags)
943                             }
944                         }
945                     }
946                 }
947             }
948 
949             SYS_LISTEN => Self::listen(args[0], args[1]),
950             SYS_SHUTDOWN => Self::shutdown(args[0], args[1]),
951             SYS_ACCEPT => Self::accept(args[0], args[1] as *mut SockAddr, args[2] as *mut u32),
952             SYS_ACCEPT4 => Self::accept4(
953                 args[0],
954                 args[1] as *mut SockAddr,
955                 args[2] as *mut u32,
956                 args[3] as u32,
957             ),
958             SYS_GETSOCKNAME => {
959                 Self::getsockname(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
960             }
961             SYS_GETPEERNAME => {
962                 Self::getpeername(args[0], args[1] as *mut SockAddr, args[2] as *mut u32)
963             }
964             SYS_GETTIMEOFDAY => {
965                 let timeval = args[0] as *mut PosixTimeval;
966                 let timezone_ptr = args[1] as *mut PosixTimeZone;
967                 Self::gettimeofday(timeval, timezone_ptr)
968             }
969             SYS_MMAP => {
970                 let len = page_align_up(args[1]);
971                 let virt_addr = VirtAddr::new(args[0] as usize);
972                 if verify_area(virt_addr, len as usize).is_err() {
973                     Err(SystemError::EFAULT)
974                 } else {
975                     Self::mmap(
976                         VirtAddr::new(args[0]),
977                         len,
978                         args[2],
979                         args[3],
980                         args[4] as i32,
981                         args[5],
982                     )
983                 }
984             }
985             SYS_MUNMAP => {
986                 let addr = args[0];
987                 let len = page_align_up(args[1]);
988                 if addr & (MMArch::PAGE_SIZE - 1) != 0 {
989                     // The addr argument is not a multiple of the page size
990                     Err(SystemError::EINVAL)
991                 } else {
992                     Self::munmap(VirtAddr::new(addr), len)
993                 }
994             }
995             SYS_MPROTECT => {
996                 let addr = args[0];
997                 let len = page_align_up(args[1]);
998                 if addr & (MMArch::PAGE_SIZE - 1) != 0 {
999                     // The addr argument is not a multiple of the page size
1000                     Err(SystemError::EINVAL)
1001                 } else {
1002                     Self::mprotect(VirtAddr::new(addr), len, args[2])
1003                 }
1004             }
1005 
1006             SYS_GETCWD => {
1007                 let buf = args[0] as *mut u8;
1008                 let size = args[1] as usize;
1009                 let security_check = || {
1010                     verify_area(VirtAddr::new(buf as usize), size)?;
1011                     return Ok(());
1012                 };
1013                 let r = security_check();
1014                 if r.is_err() {
1015                     Err(r.unwrap_err())
1016                 } else {
1017                     let buf = unsafe { core::slice::from_raw_parts_mut(buf, size) };
1018                     Self::getcwd(buf).map(|ptr| ptr.data())
1019                 }
1020             }
1021 
1022             SYS_GETPGID => Self::getpgid(Pid::new(args[0])).map(|pid| pid.into()),
1023 
1024             SYS_GETPPID => Self::getppid().map(|pid| pid.into()),
1025             SYS_FSTAT => {
1026                 let fd = args[0] as i32;
1027                 let kstat = args[1] as *mut PosixKstat;
1028                 let vaddr = VirtAddr::new(kstat as usize);
1029                 // FIXME 由于c中的verify_area与rust中的verify_area重名,所以在引入时加了前缀区分
1030                 // TODO 应该将用了c版本的verify_area都改为rust的verify_area
1031                 match verify_area(vaddr, core::mem::size_of::<PosixKstat>()) {
1032                     Ok(_) => Self::fstat(fd, kstat),
1033                     Err(e) => Err(e),
1034                 }
1035             }
1036 
1037             SYS_FCNTL => {
1038                 let fd = args[0] as i32;
1039                 let cmd: Option<FcntlCommand> =
1040                     <FcntlCommand as FromPrimitive>::from_u32(args[1] as u32);
1041                 let arg = args[2] as i32;
1042                 let res = if let Some(cmd) = cmd {
1043                     Self::fcntl(fd, cmd, arg)
1044                 } else {
1045                     Err(SystemError::EINVAL)
1046                 };
1047 
1048                 // kdebug!("FCNTL: fd: {}, cmd: {:?}, arg: {}, res: {:?}", fd, cmd, arg, res);
1049                 res
1050             }
1051 
1052             SYS_FTRUNCATE => {
1053                 let fd = args[0] as i32;
1054                 let len = args[1] as usize;
1055                 let res = Self::ftruncate(fd, len);
1056                 // kdebug!("FTRUNCATE: fd: {}, len: {}, res: {:?}", fd, len, res);
1057                 res
1058             }
1059 
1060             SYS_MKNOD => {
1061                 let path = args[0];
1062                 let flags = args[1];
1063                 let dev_t = args[2];
1064                 let flags: ModeType = ModeType::from_bits_truncate(flags as u32);
1065                 Self::mknod(path as *const i8, flags, DeviceNumber::from(dev_t))
1066             }
1067 
1068             SYS_CLONE => {
1069                 let parent_tid = VirtAddr::new(args[2]);
1070                 let child_tid = VirtAddr::new(args[3]);
1071 
1072                 // 地址校验
1073                 verify_area(parent_tid, core::mem::size_of::<i32>())?;
1074                 verify_area(child_tid, core::mem::size_of::<i32>())?;
1075 
1076                 let mut clone_args = KernelCloneArgs::new();
1077                 clone_args.flags = CloneFlags::from_bits_truncate(args[0] as u64);
1078                 clone_args.stack = args[1];
1079                 clone_args.parent_tid = parent_tid;
1080                 clone_args.child_tid = child_tid;
1081                 clone_args.tls = args[4];
1082                 Self::clone(frame, clone_args)
1083             }
1084 
1085             SYS_FUTEX => {
1086                 let uaddr = VirtAddr::new(args[0]);
1087                 let operation = FutexFlag::from_bits(args[1] as u32).ok_or(SystemError::ENOSYS)?;
1088                 let val = args[2] as u32;
1089                 let utime = args[3];
1090                 let uaddr2 = VirtAddr::new(args[4]);
1091                 let val3 = args[5] as u32;
1092 
1093                 verify_area(uaddr, core::mem::size_of::<u32>())?;
1094                 verify_area(uaddr2, core::mem::size_of::<u32>())?;
1095 
1096                 let mut timespec = None;
1097                 if utime != 0 && operation.contains(FutexFlag::FLAGS_HAS_TIMEOUT) {
1098                     let reader = UserBufferReader::new(
1099                         utime as *const TimeSpec,
1100                         core::mem::size_of::<TimeSpec>(),
1101                         true,
1102                     )?;
1103 
1104                     timespec = Some(reader.read_one_from_user::<TimeSpec>(0)?.clone());
1105                 }
1106 
1107                 Self::do_futex(uaddr, operation, val, timespec, uaddr2, utime as u32, val3)
1108             }
1109 
1110             SYS_READV => Self::readv(args[0] as i32, args[1], args[2]),
1111             SYS_WRITEV => Self::writev(args[0] as i32, args[1], args[2]),
1112 
1113             SYS_ARCH_PRCTL => Self::arch_prctl(args[0], args[1]),
1114 
1115             SYS_SET_TID_ADDR => Self::set_tid_address(args[0]),
1116 
1117             SYS_STAT | SYS_LSTAT => {
1118                 let path: &CStr = unsafe { CStr::from_ptr(args[0] as *const c_char) };
1119                 let path: Result<&str, core::str::Utf8Error> = path.to_str();
1120                 let res = if path.is_err() {
1121                     Err(SystemError::EINVAL)
1122                 } else {
1123                     let path: &str = path.unwrap();
1124                     let kstat = args[1] as *mut PosixKstat;
1125                     let vaddr = VirtAddr::new(kstat as usize);
1126                     match verify_area(vaddr, core::mem::size_of::<PosixKstat>()) {
1127                         Ok(_) => {
1128                             if syscall_num == SYS_STAT {
1129                                 Self::stat(path, kstat)
1130                             } else {
1131                                 Self::lstat(path, kstat)
1132                             }
1133                         }
1134                         Err(e) => Err(e),
1135                     }
1136                 };
1137 
1138                 res
1139             }
1140 
1141             // 目前为了适配musl-libc,以下系统调用先这样写着
1142             SYS_GET_RANDOM => {
1143                 let flags = GRandFlags::from_bits(args[2] as u8).ok_or(SystemError::EINVAL)?;
1144                 Self::get_random(args[0] as *mut u8, args[1], flags)
1145             }
1146 
1147             SYS_SOCKET_PAIR => {
1148                 unimplemented!()
1149             }
1150 
1151             SYS_POLL => {
1152                 kwarn!("SYS_POLL has not yet been implemented");
1153                 Ok(0)
1154             }
1155 
1156             SYS_RT_SIGPROCMASK => {
1157                 kwarn!("SYS_RT_SIGPROCMASK has not yet been implemented");
1158                 Ok(0)
1159             }
1160 
1161             SYS_TKILL => {
1162                 kwarn!("SYS_TKILL has not yet been implemented");
1163                 Ok(0)
1164             }
1165 
1166             SYS_SIGALTSTACK => {
1167                 kwarn!("SYS_SIGALTSTACK has not yet been implemented");
1168                 Ok(0)
1169             }
1170 
1171             SYS_EXIT_GROUP => {
1172                 kwarn!("SYS_EXIT_GROUP has not yet been implemented");
1173                 Ok(0)
1174             }
1175 
1176             SYS_MADVISE => {
1177                 kwarn!("SYS_MADVISE has not yet been implemented");
1178                 Ok(0)
1179             }
1180             SYS_GETTID => Self::gettid().map(|tid| tid.into()),
1181             SYS_GETUID => Self::getuid().map(|uid| uid.into()),
1182             SYS_SYSLOG => {
1183                 kwarn!("SYS_SYSLOG has not yet been implemented");
1184                 Ok(0)
1185             }
1186             SYS_GETGID => Self::getgid().map(|gid| gid.into()),
1187             SYS_SETUID => {
1188                 kwarn!("SYS_SETUID has not yet been implemented");
1189                 Ok(0)
1190             }
1191             SYS_SETGID => {
1192                 kwarn!("SYS_SETGID has not yet been implemented");
1193                 Ok(0)
1194             }
1195             SYS_GETEUID => Self::geteuid().map(|euid| euid.into()),
1196             SYS_GETEGID => Self::getegid().map(|egid| egid.into()),
1197             SYS_GETRUSAGE => {
1198                 let who = args[0] as c_int;
1199                 let rusage = args[1] as *mut RUsage;
1200                 Self::get_rusage(who, rusage)
1201             }
1202 
1203             SYS_READLINK => {
1204                 let path = args[0] as *const u8;
1205                 let buf = args[1] as *mut u8;
1206                 let bufsiz = args[2] as usize;
1207                 Self::readlink(path, buf, bufsiz)
1208             }
1209 
1210             SYS_READLINK_AT => {
1211                 let dirfd = args[0] as i32;
1212                 let pathname = args[1] as *const u8;
1213                 let buf = args[2] as *mut u8;
1214                 let bufsiz = args[3] as usize;
1215                 Self::readlink_at(dirfd, pathname, buf, bufsiz)
1216             }
1217 
1218             SYS_PRLIMIT64 => {
1219                 let pid = args[0];
1220                 let pid = Pid::new(pid);
1221                 let resource = args[1];
1222                 let new_limit = args[2] as *const RLimit64;
1223                 let old_limit = args[3] as *mut RLimit64;
1224 
1225                 Self::prlimit64(pid, resource, new_limit, old_limit)
1226             }
1227 
1228             SYS_ACCESS => {
1229                 let pathname = args[0] as *const u8;
1230                 let mode = args[1] as u32;
1231                 Self::access(pathname, mode)
1232             }
1233 
1234             SYS_FACCESSAT => {
1235                 let dirfd = args[0] as i32;
1236                 let pathname = args[1] as *const u8;
1237                 let mode = args[2] as u32;
1238                 Self::faccessat2(dirfd, pathname, mode, 0)
1239             }
1240 
1241             SYS_FACCESSAT2 => {
1242                 let dirfd = args[0] as i32;
1243                 let pathname = args[1] as *const u8;
1244                 let mode = args[2] as u32;
1245                 let flags = args[3] as u32;
1246                 Self::faccessat2(dirfd, pathname, mode, flags)
1247             }
1248 
1249             SYS_CLOCK_GETTIME => {
1250                 let clockid = args[0] as i32;
1251                 let timespec = args[1] as *mut TimeSpec;
1252                 Self::clock_gettime(clockid, timespec)
1253             }
1254 
1255             SYS_SYSINFO => {
1256                 let info = args[0] as *mut SysInfo;
1257                 Self::sysinfo(info)
1258             }
1259 
1260             SYS_UMASK => {
1261                 let mask = args[0] as u32;
1262                 Self::umask(mask)
1263             }
1264 
1265             SYS_CHMOD => {
1266                 let pathname = args[0] as *const u8;
1267                 let mode = args[1] as u32;
1268                 Self::chmod(pathname, mode)
1269             }
1270             SYS_FCHMOD => {
1271                 let fd = args[0] as i32;
1272                 let mode = args[1] as u32;
1273                 Self::fchmod(fd, mode)
1274             }
1275             SYS_FCHMODAT => {
1276                 let dirfd = args[0] as i32;
1277                 let pathname = args[1] as *const u8;
1278                 let mode = args[2] as u32;
1279                 Self::fchmodat(dirfd, pathname, mode)
1280             }
1281 
1282             _ => panic!("Unsupported syscall ID: {}", syscall_num),
1283         };
1284         return r;
1285     }
1286 
1287     pub fn put_string(
1288         s: *const u8,
1289         front_color: u32,
1290         back_color: u32,
1291     ) -> Result<usize, SystemError> {
1292         return Ok(unsafe { do_put_string(s, front_color, back_color) });
1293     }
1294 
1295     pub fn reboot() -> Result<usize, SystemError> {
1296         cpu_reset();
1297     }
1298 }
1299