Files
mop3/kernel/syscall/syscall.c

289 lines
7.0 KiB
C

#include <aux/compiler.h>
#include <libk/assert.h>
#include <libk/std.h>
#include <limine/requests.h>
#include <m/resource_buffer.h>
#include <m/status.h>
#include <m/syscall_defs.h>
#include <mm/pmm.h>
#include <proc/mem.h>
#include <proc/mutex.h>
#include <proc/proc.h>
#include <proc/resource.h>
#include <sync/spin_lock.h>
#include <sys/debug.h>
#include <sys/mm.h>
#include <sys/proc.h>
#include <syscall/syscall.h>
#define DEFINE_SYSCALL(name) \
int name (struct proc* UNUSED proc, void* UNUSED regs, uintptr_t UNUSED a1, uintptr_t UNUSED a2, \
uintptr_t UNUSED a3, uintptr_t UNUSED a4, uintptr_t UNUSED a5, uintptr_t UNUSED a6)
static void* sys_get_user_buffer (struct proc* proc, uintptr_t uvaddr, size_t size) {
struct limine_hhdm_response* hhdm = limine_hhdm_request.response;
spin_lock_ctx_t ctxprpd;
spin_lock (&proc->pd->lock, &ctxprpd);
if (!mm_validate_buffer (proc->pd, (uintptr_t)uvaddr, size, 0)) {
spin_unlock (&proc->pd->lock, &ctxprpd);
return NULL;
}
uintptr_t out_paddr = mm_v2p (proc->pd, uvaddr, 0);
spin_unlock (&proc->pd->lock, &ctxprpd);
uintptr_t out_kvaddr = (uintptr_t)hhdm->offset + out_paddr;
return (void*)out_kvaddr;
}
/* int proc_quit (void) */
DEFINE_SYSCALL (sys_proc_quit) {
proc_kill (proc, regs);
return ST_OK;
}
/* int proc_test (void) */
DEFINE_SYSCALL (sys_proc_test) {
char c = (char)a1;
DEBUG ("test syscall from %d! %c\n", proc->pid, c);
return ST_OK;
}
/* int proc_map (uintptr_t paddr, uintptr_t vaddr, size_t pages, uint32_t flags) */
DEFINE_SYSCALL (sys_proc_map) {
uintptr_t paddr = a1;
uintptr_t vaddr = a2;
size_t pages = (size_t)a3;
uint32_t flags = (uint32_t)a4;
if (vaddr % PAGE_SIZE != 0)
return -ST_UNALIGNED;
if (paddr % PAGE_SIZE != 0)
return -ST_UNALIGNED;
bool ok = proc_map (proc, paddr, vaddr, pages, flags);
return ok ? ST_OK : -ST_OOM_ERROR;
}
/* int proc_unmap (uintptr_t vaddr, size_t pages) */
DEFINE_SYSCALL (sys_proc_unmap) {
uintptr_t vaddr = a1;
size_t pages = (size_t)a2;
if (vaddr % PAGE_SIZE != 0)
return -ST_UNALIGNED;
bool ok = proc_unmap (proc, vaddr, pages);
return ok ? ST_OK : -ST_OOM_ERROR;
}
/* int proc_create_resource (int rid, int type, int vis, void* buffer) */
DEFINE_SYSCALL (sys_proc_create_resource) {
int rid = (int)a1;
int type = (int)a2;
int vis = (int)a3;
uintptr_t buffer_ptr = a4;
if (rid < 0)
return -ST_BAD_RESOURCE;
if (!(type == PR_MEM || type == PR_MUTEX))
return -ST_BAD_RESOURCE;
if (!(vis == RV_PRIVATE || vis == RV_PUBLIC))
return -ST_BAD_RESOURCE;
struct resource_buffer* rbuf = NULL;
if (buffer_ptr != 0) {
rbuf = sys_get_user_buffer (proc, buffer_ptr, sizeof (struct resource_buffer));
if (rbuf == NULL)
return -ST_BAD_ADDRESS_SPACE;
}
/* confusing data is invalid */
if ((rbuf != NULL) && (type != rbuf->type))
return -ST_BAD_RESOURCE;
switch (type) {
case PR_MEM: {
/* need rbuf to construct */
if (rbuf == NULL)
return -ST_BAD_RESOURCE;
struct proc_resource_mem_init mem_init = {
.managed = false,
.pages = rbuf->u.mem.pages,
};
struct proc_resource* resource = proc_create_resource (proc, rid, type, vis, &mem_init);
if (resource == NULL) {
return -ST_OOM_ERROR;
}
rbuf->u.mem.pages = resource->u.mem.pages;
rbuf->u.mem.paddr = resource->u.mem.paddr;
return resource->rid;
} break;
case PR_MUTEX: {
/* no rbuf is fine */
struct proc_resource* resource = proc_create_resource (proc, rid, type, vis, NULL);
if (resource == NULL) {
return -ST_OOM_ERROR;
}
return resource->rid;
} break;
}
assert (0);
}
/* int proc_mutex_lock (int mutex_rid, int vis) */
DEFINE_SYSCALL (sys_proc_mutex_lock) {
int rid = (int)a1;
int vis = (int)a2;
if (rid < 0)
return -ST_BAD_RESOURCE;
if (!(vis == RV_PUBLIC || vis == RV_PRIVATE))
return -ST_BAD_RESOURCE;
struct proc_resource* resource = proc_find_resource (proc, rid, vis);
if (resource == NULL)
return -ST_NOT_FOUND;
proc_mutex_lock (proc, &resource->u.mutex);
return ST_OK;
}
/* int proc_mutex_unlock (int mutex_rid, int vis) */
DEFINE_SYSCALL (sys_proc_mutex_unlock) {
int rid = (int)a1;
int vis = (int)a2;
if (rid < 0)
return -ST_BAD_RESOURCE;
if (!(vis == RV_PUBLIC || vis == RV_PRIVATE))
return -ST_BAD_RESOURCE;
struct proc_resource* resource = proc_find_resource (proc, rid, vis);
if (resource == NULL)
return -ST_NOT_FOUND;
int result = proc_mutex_unlock (proc, &resource->u.mutex) ? ST_OK : -ST_PERMISSION_ERROR;
if (result < 0)
return result;
return ST_OK;
}
/* int proc_drop_resource (int rid, int vis) */
DEFINE_SYSCALL (sys_proc_drop_resource) {
int rid = (int)a1;
int vis = (int)a2;
if (rid < 0)
return -ST_BAD_RESOURCE;
if (!(vis == RV_PUBLIC || vis == RV_PRIVATE))
return -ST_BAD_RESOURCE;
struct proc_resource* resource = proc_find_resource (proc, rid, vis);
if (resource == NULL)
return -ST_NOT_FOUND;
proc_drop_resource (proc, resource, true);
return ST_OK;
}
/* int proc_clone (uintptr_t vstack_top, size_t stack_size, void* entry) */
DEFINE_SYSCALL (sys_proc_clone) {
uintptr_t vstack_top = a1;
size_t stack_size = (size_t)a2;
uintptr_t entry = a3;
struct cpu* cpu = proc->cpu;
struct proc* new = proc_clone (proc, vstack_top, stack_size, entry);
DEBUG ("new=%p\n", new);
if (new == NULL) {
return -ST_OOM_ERROR;
}
int pid = new->pid;
proc_register (new, cpu);
return pid;
}
/* int proc_sched (void) */
DEFINE_SYSCALL (sys_proc_sched) {
proc_sched (regs);
return ST_OK;
}
/* int proc_translate_v2p (uintptr_t vaddr, uintptr_t* out_paddr) */
DEFINE_SYSCALL (sys_proc_translate_v2p) {
int result = ST_OK;
uintptr_t vaddr = a1;
uintptr_t out_paddr_buf = a2;
uintptr_t* out_paddr_buf_vaddr = sys_get_user_buffer (proc, out_paddr_buf, sizeof (uintptr_t));
if (out_paddr_buf_vaddr == NULL)
return -ST_BAD_ADDRESS_SPACE;
uintptr_t translated_addr = mm_v2p (proc->pd, vaddr, MM_PD_LOCK);
if (translated_addr == 0) {
result = -ST_BAD_ADDRESS_SPACE;
goto done;
}
*out_paddr_buf_vaddr = translated_addr;
done:
return result;
}
static syscall_handler_func_t handler_table[] = {
[SYS_PROC_QUIT] = &sys_proc_quit,
[SYS_PROC_TEST] = &sys_proc_test,
[SYS_PROC_MAP] = &sys_proc_map,
[SYS_PROC_UNMAP] = &sys_proc_unmap,
[SYS_PROC_CREATE_RESOURCE] = &sys_proc_create_resource,
[SYS_PROC_DROP_RESOURCE] = &sys_proc_drop_resource,
[SYS_PROC_MUTEX_LOCK] = &sys_proc_mutex_lock,
[SYS_PROC_MUTEX_UNLOCK] = &sys_proc_mutex_unlock,
[SYS_PROC_CLONE] = &sys_proc_clone,
[SYS_PROC_SCHED] = &sys_proc_sched,
[SYS_PROC_TRANSLATE_V2P] = &sys_proc_translate_v2p,
};
syscall_handler_func_t syscall_find_handler (int syscall_num) {
if (!(syscall_num >= 0 &&
syscall_num < (int)(sizeof (handler_table) / sizeof (handler_table[0])))) {
return NULL;
}
return handler_table[syscall_num];
}