mod.rs 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. use crate::{
  2. arch::{
  3. ipc::signal::X86_64SignalArch,
  4. syscall::nr::{SysCall, SYS_ARCH_PRCTL, SYS_RT_SIGRETURN},
  5. CurrentIrqArch,
  6. },
  7. exception::InterruptArch,
  8. ipc::signal_types::SignalArch,
  9. libs::align::SafeForZero,
  10. mm::VirtAddr,
  11. process::ProcessManager,
  12. syscall::{Syscall, SYS_SCHED},
  13. };
  14. use log::debug;
  15. use system_error::SystemError;
  16. use super::{
  17. interrupt::{entry::set_system_trap_gate, TrapFrame},
  18. mm::barrier::mfence,
  19. };
  20. pub mod nr;
  21. /// ### 存储PCB系统调用栈以及在syscall过程中暂存用户态rsp的结构体
  22. ///
  23. /// 在syscall指令中将会从该结构体中读取系统调用栈和暂存rsp,
  24. /// 使用`gsbase`寄存器实现,后续如果需要使用gsbase寄存器,需要相应设置正确的偏移量
  25. #[repr(C)]
  26. #[derive(Debug, Clone)]
  27. pub(super) struct X86_64GSData {
  28. pub(super) kaddr: VirtAddr,
  29. pub(super) uaddr: VirtAddr,
  30. }
  31. impl X86_64GSData {
  32. /// ### 设置系统调用栈,将会在下一个调度后写入KernelGsbase
  33. pub fn set_kstack(&mut self, kstack: VirtAddr) {
  34. self.kaddr = kstack;
  35. }
  36. }
  37. unsafe impl SafeForZero for X86_64GSData {}
  38. extern "C" {
  39. fn syscall_int();
  40. fn syscall_64();
  41. }
  42. macro_rules! syscall_return {
  43. ($val:expr, $regs:expr, $show:expr) => {{
  44. let ret = $val;
  45. $regs.rax = ret as u64;
  46. if $show {
  47. let pid = ProcessManager::current_pcb().pid();
  48. debug!("[SYS] [Pid: {:?}] [Retn: {:?}]", pid, ret as i64);
  49. }
  50. unsafe {
  51. CurrentIrqArch::interrupt_disable();
  52. }
  53. return;
  54. }};
  55. }
  56. macro_rules! normal_syscall_return {
  57. ($val:expr, $regs:expr, $show:expr) => {{
  58. let ret = $val;
  59. if $show {
  60. let pid = ProcessManager::current_pcb().pid();
  61. debug!("[SYS] [Pid: {:?}] [Retn: {:?}]", pid, ret);
  62. }
  63. $regs.rax = ret.unwrap_or_else(|e| e.to_posix_errno() as usize) as u64;
  64. unsafe {
  65. CurrentIrqArch::interrupt_disable();
  66. }
  67. return;
  68. }};
  69. }
  70. #[no_mangle]
  71. pub extern "sysv64" fn syscall_handler(frame: &mut TrapFrame) {
  72. let syscall_num = frame.rax as usize;
  73. // 防止sys_sched由于超时无法退出导致的死锁
  74. if syscall_num == SYS_SCHED {
  75. unsafe {
  76. CurrentIrqArch::interrupt_disable();
  77. }
  78. } else {
  79. unsafe {
  80. CurrentIrqArch::interrupt_enable();
  81. }
  82. }
  83. let args = [
  84. frame.rdi as usize,
  85. frame.rsi as usize,
  86. frame.rdx as usize,
  87. frame.r10 as usize,
  88. frame.r8 as usize,
  89. frame.r9 as usize,
  90. ];
  91. mfence();
  92. let pid = ProcessManager::current_pcb().pid();
  93. let mut show = (syscall_num != SYS_SCHED) && (pid.data() >= 7);
  94. // let mut show = true;
  95. let to_print = SysCall::try_from(syscall_num);
  96. if let Ok(to_print) = to_print {
  97. use SysCall::*;
  98. match to_print {
  99. SYS_ACCEPT | SYS_ACCEPT4 | SYS_BIND | SYS_CONNECT | SYS_SHUTDOWN | SYS_LISTEN => {
  100. show &= true;
  101. }
  102. SYS_RECVFROM | SYS_SENDTO | SYS_SENDMSG | SYS_RECVMSG => {
  103. show &= true;
  104. }
  105. SYS_SOCKET | SYS_GETSOCKNAME | SYS_GETPEERNAME | SYS_SOCKETPAIR | SYS_SETSOCKOPT
  106. | SYS_GETSOCKOPT => {
  107. show &= true;
  108. }
  109. SYS_OPEN | SYS_OPENAT | SYS_CREAT | SYS_CLOSE => {
  110. show &= true;
  111. }
  112. SYS_READ | SYS_WRITE | SYS_READV | SYS_WRITEV | SYS_PREAD64 | SYS_PWRITE64
  113. | SYS_PREADV | SYS_PWRITEV | SYS_PREADV2 => {
  114. show &= true;
  115. }
  116. _ => {
  117. show &= false;
  118. }
  119. }
  120. show = false;
  121. if show {
  122. debug!("[SYS] [Pid: {:?}] [Call: {:?}]", pid, to_print);
  123. }
  124. }
  125. // Arch specific syscall
  126. match syscall_num {
  127. SYS_RT_SIGRETURN => {
  128. syscall_return!(
  129. X86_64SignalArch::sys_rt_sigreturn(frame) as usize,
  130. frame,
  131. show
  132. );
  133. }
  134. SYS_ARCH_PRCTL => {
  135. normal_syscall_return!(Syscall::arch_prctl(args[0], args[1]), frame, show);
  136. }
  137. _ => {}
  138. }
  139. normal_syscall_return!(Syscall::handle(syscall_num, &args, frame), frame, show);
  140. }
  141. /// 系统调用初始化
  142. pub fn arch_syscall_init() -> Result<(), SystemError> {
  143. // info!("arch_syscall_init\n");
  144. unsafe { set_system_trap_gate(0x80, 0, VirtAddr::new(syscall_int as usize)) }; // 系统调用门
  145. unsafe { init_syscall_64() };
  146. return Ok(());
  147. }
  148. /// syscall指令初始化函数
  149. pub(super) unsafe fn init_syscall_64() {
  150. let mut efer = x86::msr::rdmsr(x86::msr::IA32_EFER);
  151. efer |= 0x1;
  152. x86::msr::wrmsr(x86::msr::IA32_EFER, efer);
  153. let syscall_base = (1_u16) << 3;
  154. let sysret_base = ((4_u16) << 3) | 3;
  155. let high = (u32::from(sysret_base) << 16) | u32::from(syscall_base);
  156. // 初始化STAR寄存器
  157. x86::msr::wrmsr(x86::msr::IA32_STAR, u64::from(high) << 32);
  158. // 初始化LSTAR,该寄存器存储syscall指令入口
  159. x86::msr::wrmsr(x86::msr::IA32_LSTAR, syscall_64 as usize as u64);
  160. x86::msr::wrmsr(x86::msr::IA32_FMASK, 0xfffffffe);
  161. }