Syscall.h 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #pragma once
  7. #include <AK/Types.h>
  8. #include <AK/Userspace.h>
  9. #include <Kernel/API/POSIX/sched.h>
  10. #ifdef KERNEL
  11. # include <AK/Error.h>
  12. # include <Kernel/Arch/RegisterState.h>
  13. #endif
  14. constexpr int syscall_vector = 0x82;
  15. extern "C" {
  16. struct pollfd;
  17. struct timeval;
  18. struct timespec;
  19. struct sockaddr;
  20. struct siginfo;
  21. struct stat;
  22. struct statvfs;
  23. typedef u32 socklen_t;
  24. }
  25. namespace Kernel {
  26. enum class NeedsBigProcessLock {
  27. Yes,
  28. No
  29. };
  30. // Declare all syscalls and associated metadata.
  31. //
  32. // NOTE: When declaring a new syscall or modifying an existing, please
  33. // ensure that the proper assert is present at the top of the syscall
  34. // implementation to both verify and document to any readers if the
  35. // syscall acquires the big process lock or not. The asserts are:
  36. // - VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  37. // - VERIFY_NO_PROCESS_BIG_LOCK(this)
  38. //
  39. #define ENUMERATE_SYSCALLS(S) \
  40. S(accept4, NeedsBigProcessLock::No) \
  41. S(adjtime, NeedsBigProcessLock::No) \
  42. S(alarm, NeedsBigProcessLock::No) \
  43. S(allocate_tls, NeedsBigProcessLock::Yes) \
  44. S(anon_create, NeedsBigProcessLock::No) \
  45. S(annotate_mapping, NeedsBigProcessLock::No) \
  46. S(bind, NeedsBigProcessLock::No) \
  47. S(bindmount, NeedsBigProcessLock::No) \
  48. S(chdir, NeedsBigProcessLock::No) \
  49. S(chmod, NeedsBigProcessLock::No) \
  50. S(chown, NeedsBigProcessLock::No) \
  51. S(clock_gettime, NeedsBigProcessLock::No) \
  52. S(clock_nanosleep, NeedsBigProcessLock::No) \
  53. S(clock_getres, NeedsBigProcessLock::No) \
  54. S(clock_settime, NeedsBigProcessLock::No) \
  55. S(close, NeedsBigProcessLock::No) \
  56. S(connect, NeedsBigProcessLock::No) \
  57. S(create_inode_watcher, NeedsBigProcessLock::No) \
  58. S(create_thread, NeedsBigProcessLock::Yes) \
  59. S(dbgputstr, NeedsBigProcessLock::No) \
  60. S(detach_thread, NeedsBigProcessLock::Yes) \
  61. S(disown, NeedsBigProcessLock::No) \
  62. S(dump_backtrace, NeedsBigProcessLock::No) \
  63. S(dup2, NeedsBigProcessLock::No) \
  64. S(emuctl, NeedsBigProcessLock::No) \
  65. S(execve, NeedsBigProcessLock::Yes) \
  66. S(exit, NeedsBigProcessLock::Yes) \
  67. S(exit_thread, NeedsBigProcessLock::Yes) \
  68. S(faccessat, NeedsBigProcessLock::No) \
  69. S(fchdir, NeedsBigProcessLock::No) \
  70. S(fchmod, NeedsBigProcessLock::No) \
  71. S(fchown, NeedsBigProcessLock::No) \
  72. S(fcntl, NeedsBigProcessLock::No) \
  73. S(fork, NeedsBigProcessLock::No) \
  74. S(fstat, NeedsBigProcessLock::No) \
  75. S(fstatvfs, NeedsBigProcessLock::No) \
  76. S(fsopen, NeedsBigProcessLock::No) \
  77. S(fsmount, NeedsBigProcessLock::No) \
  78. S(fsync, NeedsBigProcessLock::No) \
  79. S(ftruncate, NeedsBigProcessLock::No) \
  80. S(futex, NeedsBigProcessLock::Yes) \
  81. S(futimens, NeedsBigProcessLock::No) \
  82. S(get_dir_entries, NeedsBigProcessLock::No) \
  83. S(get_root_session_id, NeedsBigProcessLock::No) \
  84. S(get_stack_bounds, NeedsBigProcessLock::No) \
  85. S(getcwd, NeedsBigProcessLock::No) \
  86. S(getegid, NeedsBigProcessLock::No) \
  87. S(geteuid, NeedsBigProcessLock::No) \
  88. S(getgid, NeedsBigProcessLock::No) \
  89. S(getgroups, NeedsBigProcessLock::No) \
  90. S(gethostname, NeedsBigProcessLock::No) \
  91. S(getkeymap, NeedsBigProcessLock::No) \
  92. S(getpeername, NeedsBigProcessLock::Yes) \
  93. S(getpgid, NeedsBigProcessLock::No) \
  94. S(getpgrp, NeedsBigProcessLock::No) \
  95. S(getpid, NeedsBigProcessLock::No) \
  96. S(getppid, NeedsBigProcessLock::No) \
  97. S(getrandom, NeedsBigProcessLock::No) \
  98. S(getresgid, NeedsBigProcessLock::No) \
  99. S(getresuid, NeedsBigProcessLock::No) \
  100. S(getrusage, NeedsBigProcessLock::No) \
  101. S(getsid, NeedsBigProcessLock::No) \
  102. S(getsockname, NeedsBigProcessLock::Yes) \
  103. S(getsockopt, NeedsBigProcessLock::No) \
  104. S(gettid, NeedsBigProcessLock::No) \
  105. S(getuid, NeedsBigProcessLock::No) \
  106. S(inode_watcher_add_watch, NeedsBigProcessLock::No) \
  107. S(inode_watcher_remove_watch, NeedsBigProcessLock::No) \
  108. S(ioctl, NeedsBigProcessLock::Yes) \
  109. S(join_thread, NeedsBigProcessLock::Yes) \
  110. S(jail_create, NeedsBigProcessLock::No) \
  111. S(jail_attach, NeedsBigProcessLock::No) \
  112. S(kill, NeedsBigProcessLock::No) \
  113. S(kill_thread, NeedsBigProcessLock::Yes) \
  114. S(killpg, NeedsBigProcessLock::No) \
  115. S(link, NeedsBigProcessLock::No) \
  116. S(listen, NeedsBigProcessLock::No) \
  117. S(lseek, NeedsBigProcessLock::No) \
  118. S(madvise, NeedsBigProcessLock::No) \
  119. S(map_time_page, NeedsBigProcessLock::No) \
  120. S(mkdir, NeedsBigProcessLock::No) \
  121. S(mknod, NeedsBigProcessLock::No) \
  122. S(mmap, NeedsBigProcessLock::No) \
  123. S(mprotect, NeedsBigProcessLock::No) \
  124. S(mremap, NeedsBigProcessLock::No) \
  125. S(msync, NeedsBigProcessLock::No) \
  126. S(munmap, NeedsBigProcessLock::No) \
  127. S(open, NeedsBigProcessLock::No) \
  128. S(perf_event, NeedsBigProcessLock::Yes) \
  129. S(perf_register_string, NeedsBigProcessLock::Yes) \
  130. S(pipe, NeedsBigProcessLock::No) \
  131. S(pledge, NeedsBigProcessLock::No) \
  132. S(poll, NeedsBigProcessLock::No) \
  133. S(posix_fallocate, NeedsBigProcessLock::No) \
  134. S(prctl, NeedsBigProcessLock::No) \
  135. S(profiling_disable, NeedsBigProcessLock::Yes) \
  136. S(profiling_enable, NeedsBigProcessLock::Yes) \
  137. S(profiling_free_buffer, NeedsBigProcessLock::Yes) \
  138. S(ptrace, NeedsBigProcessLock::Yes) \
  139. S(purge, NeedsBigProcessLock::Yes) \
  140. S(read, NeedsBigProcessLock::Yes) \
  141. S(pread, NeedsBigProcessLock::Yes) \
  142. S(readlink, NeedsBigProcessLock::No) \
  143. S(readv, NeedsBigProcessLock::Yes) \
  144. S(realpath, NeedsBigProcessLock::No) \
  145. S(recvfd, NeedsBigProcessLock::No) \
  146. S(recvmsg, NeedsBigProcessLock::Yes) \
  147. S(rename, NeedsBigProcessLock::No) \
  148. S(remount, NeedsBigProcessLock::No) \
  149. S(rmdir, NeedsBigProcessLock::No) \
  150. S(scheduler_get_parameters, NeedsBigProcessLock::No) \
  151. S(scheduler_set_parameters, NeedsBigProcessLock::No) \
  152. S(sendfd, NeedsBigProcessLock::No) \
  153. S(sendmsg, NeedsBigProcessLock::Yes) \
  154. S(set_mmap_name, NeedsBigProcessLock::No) \
  155. S(setegid, NeedsBigProcessLock::No) \
  156. S(seteuid, NeedsBigProcessLock::No) \
  157. S(setgid, NeedsBigProcessLock::No) \
  158. S(setgroups, NeedsBigProcessLock::No) \
  159. S(sethostname, NeedsBigProcessLock::No) \
  160. S(setkeymap, NeedsBigProcessLock::No) \
  161. S(setpgid, NeedsBigProcessLock::No) \
  162. S(setregid, NeedsBigProcessLock::No) \
  163. S(setresgid, NeedsBigProcessLock::No) \
  164. S(setresuid, NeedsBigProcessLock::No) \
  165. S(setreuid, NeedsBigProcessLock::No) \
  166. S(setsid, NeedsBigProcessLock::No) \
  167. S(setsockopt, NeedsBigProcessLock::No) \
  168. S(setuid, NeedsBigProcessLock::No) \
  169. S(shutdown, NeedsBigProcessLock::No) \
  170. S(sigaction, NeedsBigProcessLock::Yes) \
  171. S(sigaltstack, NeedsBigProcessLock::Yes) \
  172. S(sigpending, NeedsBigProcessLock::No) \
  173. S(sigprocmask, NeedsBigProcessLock::No) \
  174. S(sigreturn, NeedsBigProcessLock::No) \
  175. S(sigsuspend, NeedsBigProcessLock::No) \
  176. S(sigtimedwait, NeedsBigProcessLock::No) \
  177. S(socket, NeedsBigProcessLock::No) \
  178. S(socketpair, NeedsBigProcessLock::No) \
  179. S(stat, NeedsBigProcessLock::No) \
  180. S(statvfs, NeedsBigProcessLock::No) \
  181. S(symlink, NeedsBigProcessLock::No) \
  182. S(sync, NeedsBigProcessLock::No) \
  183. S(sysconf, NeedsBigProcessLock::No) \
  184. S(times, NeedsBigProcessLock::No) \
  185. S(umask, NeedsBigProcessLock::No) \
  186. S(umount, NeedsBigProcessLock::No) \
  187. S(uname, NeedsBigProcessLock::No) \
  188. S(unlink, NeedsBigProcessLock::No) \
  189. S(unveil, NeedsBigProcessLock::No) \
  190. S(utime, NeedsBigProcessLock::No) \
  191. S(utimensat, NeedsBigProcessLock::No) \
  192. S(waitid, NeedsBigProcessLock::Yes) \
  193. S(write, NeedsBigProcessLock::Yes) \
  194. S(pwritev, NeedsBigProcessLock::Yes) \
  195. S(yield, NeedsBigProcessLock::No)
  196. namespace Syscall {
  197. #ifdef KERNEL
  198. ErrorOr<FlatPtr> handle(RegisterState&, FlatPtr function, FlatPtr arg1, FlatPtr arg2, FlatPtr arg3, FlatPtr arg4);
  199. #endif
  200. enum Function {
  201. #undef __ENUMERATE_SYSCALL
  202. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) SC_##sys_call,
  203. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  204. #undef __ENUMERATE_SYSCALL
  205. __Count
  206. };
  207. #ifdef AK_OS_SERENITY
  208. struct StringArgument {
  209. char const* characters;
  210. size_t length { 0 };
  211. };
  212. template<typename DataType, typename SizeType>
  213. struct MutableBufferArgument {
  214. DataType* data { nullptr };
  215. SizeType size { 0 };
  216. };
  217. struct StringListArgument {
  218. StringArgument* strings {};
  219. size_t length { 0 };
  220. };
  221. struct SC_mmap_params {
  222. void* addr;
  223. size_t size;
  224. size_t alignment;
  225. int32_t prot;
  226. int32_t flags;
  227. int32_t fd;
  228. int64_t offset;
  229. StringArgument name;
  230. };
  231. struct SC_mremap_params {
  232. void* old_address;
  233. size_t old_size;
  234. size_t new_size;
  235. int32_t flags;
  236. };
  237. struct SC_open_params {
  238. int dirfd;
  239. StringArgument path;
  240. int options;
  241. u16 mode;
  242. };
  243. struct SC_poll_params {
  244. struct pollfd* fds;
  245. unsigned nfds;
  246. const struct timespec* timeout;
  247. u32 const* sigmask;
  248. };
  249. struct SC_clock_nanosleep_params {
  250. int clock_id;
  251. int flags;
  252. const struct timespec* requested_sleep;
  253. struct timespec* remaining_sleep;
  254. };
  255. struct SC_clock_getres_params {
  256. int clock_id;
  257. struct timespec* result;
  258. };
  259. struct SC_accept4_params {
  260. sockaddr* addr;
  261. socklen_t* addrlen;
  262. int sockfd;
  263. int flags;
  264. };
  265. struct SC_getsockopt_params {
  266. int sockfd;
  267. int level;
  268. int option;
  269. void* value;
  270. socklen_t* value_size;
  271. };
  272. struct SC_setsockopt_params {
  273. void const* value;
  274. int sockfd;
  275. int level;
  276. int option;
  277. socklen_t value_size;
  278. };
  279. struct SC_getsockname_params {
  280. int sockfd;
  281. sockaddr* addr;
  282. socklen_t* addrlen;
  283. };
  284. struct SC_getpeername_params {
  285. int sockfd;
  286. sockaddr* addr;
  287. socklen_t* addrlen;
  288. };
  289. struct SC_socketpair_params {
  290. int domain;
  291. int type;
  292. int protocol;
  293. int* sv;
  294. };
  295. struct SC_futex_params {
  296. u32* userspace_address;
  297. int futex_op;
  298. u32 val;
  299. union {
  300. timespec const* timeout;
  301. uintptr_t val2;
  302. };
  303. u32* userspace_address2;
  304. u32 val3;
  305. };
  306. struct SC_setkeymap_params {
  307. u32 const* map;
  308. u32 const* shift_map;
  309. u32 const* alt_map;
  310. u32 const* altgr_map;
  311. u32 const* shift_altgr_map;
  312. StringArgument map_name;
  313. };
  314. struct SC_jail_create_params {
  315. u64 index;
  316. StringArgument name;
  317. int flags;
  318. };
  319. struct SC_jail_attach_params {
  320. u64 index;
  321. };
  322. struct SC_getkeymap_params {
  323. u32* map;
  324. u32* shift_map;
  325. u32* alt_map;
  326. u32* altgr_map;
  327. u32* shift_altgr_map;
  328. MutableBufferArgument<char, size_t> map_name;
  329. };
  330. struct SC_create_thread_params {
  331. unsigned int detach_state = 0; // JOINABLE or DETACHED
  332. int schedule_priority = 30; // THREAD_PRIORITY_NORMAL
  333. // FIXME: Implement guard pages in create_thread (unreadable pages at "overflow" end of stack)
  334. // "If an implementation rounds up the value of guardsize to a multiple of {PAGESIZE},
  335. // a call to pthread_attr_getguardsize() specifying attr shall store in the guardsize
  336. // parameter the guard size specified by the previous pthread_attr_setguardsize() function call"
  337. // ... ok, if you say so posix. Guess we get to lie to people about guard page size
  338. unsigned int guard_page_size = 0; // Rounded up to PAGE_SIZE
  339. unsigned int reported_guard_page_size = 0; // The lie we tell callers
  340. unsigned int stack_size = 1 * MiB; // Equal to Thread::default_userspace_stack_size
  341. void* stack_location; // nullptr means any, o.w. process virtual address
  342. void* (*entry)(void*);
  343. void* entry_argument;
  344. };
  345. struct SC_realpath_params {
  346. StringArgument path;
  347. MutableBufferArgument<char, size_t> buffer;
  348. };
  349. struct SC_set_mmap_name_params {
  350. void* addr;
  351. size_t size;
  352. StringArgument name;
  353. };
  354. struct SC_execve_params {
  355. StringArgument path;
  356. StringListArgument arguments;
  357. StringListArgument environment;
  358. };
  359. struct SC_readlink_params {
  360. StringArgument path;
  361. MutableBufferArgument<char, size_t> buffer;
  362. int dirfd;
  363. };
  364. struct SC_link_params {
  365. StringArgument old_path;
  366. StringArgument new_path;
  367. };
  368. struct SC_chown_params {
  369. StringArgument path;
  370. u32 uid;
  371. u32 gid;
  372. int dirfd;
  373. int follow_symlinks;
  374. };
  375. struct SC_mknod_params {
  376. StringArgument path;
  377. u16 mode;
  378. dev_t dev;
  379. };
  380. struct SC_symlink_params {
  381. StringArgument target;
  382. StringArgument linkpath;
  383. int dirfd;
  384. };
  385. struct SC_rename_params {
  386. int olddirfd;
  387. StringArgument old_path;
  388. int newdirfd;
  389. StringArgument new_path;
  390. };
  391. struct SC_fsopen_params {
  392. StringArgument fs_type;
  393. int flags;
  394. };
  395. struct SC_fsmount_params {
  396. int mount_fd;
  397. StringArgument target;
  398. int source_fd;
  399. };
  400. struct SC_bindmount_params {
  401. StringArgument target;
  402. int source_fd;
  403. int flags;
  404. };
  405. struct SC_remount_params {
  406. StringArgument target;
  407. int flags;
  408. };
  409. struct SC_pledge_params {
  410. StringArgument promises;
  411. StringArgument execpromises;
  412. };
  413. struct SC_unveil_params {
  414. int flags;
  415. StringArgument path;
  416. StringArgument permissions;
  417. };
  418. struct SC_utimensat_params {
  419. int dirfd;
  420. StringArgument path;
  421. struct timespec const* times;
  422. int flag;
  423. };
  424. struct SC_futimens_params {
  425. int fd;
  426. struct timespec const* times;
  427. };
  428. struct SC_waitid_params {
  429. int idtype;
  430. int id;
  431. struct siginfo* infop;
  432. int options;
  433. };
  434. struct SC_stat_params {
  435. StringArgument path;
  436. struct stat* statbuf;
  437. int dirfd;
  438. int follow_symlinks;
  439. };
  440. struct SC_ptrace_buf_params {
  441. MutableBufferArgument<u8, size_t> buf;
  442. };
  443. struct SC_ptrace_params {
  444. int request;
  445. pid_t tid;
  446. void* addr;
  447. FlatPtr data;
  448. };
  449. struct SC_set_coredump_metadata_params {
  450. StringArgument key;
  451. StringArgument value;
  452. };
  453. struct SC_inode_watcher_add_watch_params {
  454. StringArgument user_path;
  455. int fd;
  456. u32 event_mask;
  457. };
  458. struct SC_statvfs_params {
  459. StringArgument path;
  460. struct statvfs* buf;
  461. };
  462. struct SC_chmod_params {
  463. int dirfd;
  464. StringArgument path;
  465. u16 mode;
  466. int follow_symlinks;
  467. };
  468. enum class SchedulerParametersMode : bool {
  469. Process,
  470. Thread,
  471. };
  472. struct SC_scheduler_parameters_params {
  473. pid_t pid_or_tid;
  474. SchedulerParametersMode mode;
  475. struct sched_param parameters;
  476. };
  477. struct SC_faccessat_params {
  478. int dirfd;
  479. StringArgument pathname;
  480. int mode;
  481. int flags;
  482. };
  483. void initialize();
  484. int sync();
  485. # if ARCH(X86_64) || ARCH(AARCH64)
  486. inline uintptr_t invoke(Function function)
  487. {
  488. uintptr_t result;
  489. # if ARCH(X86_64)
  490. asm volatile("syscall"
  491. : "=a"(result)
  492. : "a"(function)
  493. : "rcx", "r11", "memory");
  494. # elif ARCH(AARCH64)
  495. register uintptr_t x0 asm("x0");
  496. register uintptr_t x8 asm("x8") = function;
  497. asm volatile("svc #0"
  498. : "=r"(x0)
  499. : "r"(x8)
  500. : "memory");
  501. result = x0;
  502. # endif
  503. return result;
  504. }
  505. template<typename T1>
  506. inline uintptr_t invoke(Function function, T1 arg1)
  507. {
  508. uintptr_t result;
  509. # if ARCH(X86_64)
  510. asm volatile("syscall"
  511. : "=a"(result)
  512. : "a"(function), "d"((uintptr_t)arg1)
  513. : "rcx", "r11", "memory");
  514. # elif ARCH(AARCH64)
  515. register uintptr_t x0 asm("x0");
  516. register uintptr_t x1 asm("x1") = arg1;
  517. register uintptr_t x8 asm("x8") = function;
  518. asm volatile("svc #0"
  519. : "=r"(x0)
  520. : "r"(x1), "r"(x8)
  521. : "memory");
  522. result = x0;
  523. # endif
  524. return result;
  525. }
  526. template<typename T1, typename T2>
  527. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2)
  528. {
  529. uintptr_t result;
  530. # if ARCH(X86_64)
  531. asm volatile("syscall"
  532. : "=a"(result)
  533. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2)
  534. : "rcx", "r11", "memory");
  535. # elif ARCH(AARCH64)
  536. register uintptr_t x0 asm("x0");
  537. register uintptr_t x1 asm("x1") = arg1;
  538. register uintptr_t x2 asm("x2") = arg2;
  539. register uintptr_t x8 asm("x8") = function;
  540. asm volatile("svc #0"
  541. : "=r"(x0)
  542. : "r"(x1), "r"(x2), "r"(x8)
  543. : "memory");
  544. result = x0;
  545. # endif
  546. return result;
  547. }
  548. template<typename T1, typename T2, typename T3>
  549. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3)
  550. {
  551. uintptr_t result;
  552. # if ARCH(X86_64)
  553. asm volatile("syscall"
  554. : "=a"(result)
  555. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3)
  556. : "rcx", "r11", "memory");
  557. # elif ARCH(AARCH64)
  558. register uintptr_t x0 asm("x0");
  559. register uintptr_t x1 asm("x1") = arg1;
  560. register uintptr_t x2 asm("x2") = arg2;
  561. register uintptr_t x3 asm("x3") = arg3;
  562. register uintptr_t x8 asm("x8") = function;
  563. asm volatile("svc #0"
  564. : "=r"(x0)
  565. : "r"(x1), "r"(x2), "r"(x3), "r"(x8)
  566. : "memory");
  567. result = x0;
  568. # endif
  569. return result;
  570. }
  571. template<typename T1, typename T2, typename T3, typename T4>
  572. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3, T4 arg4)
  573. {
  574. uintptr_t result;
  575. # if ARCH(X86_64)
  576. asm volatile("syscall"
  577. : "=a"(result)
  578. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3), "S"((uintptr_t)arg4)
  579. : "memory");
  580. # elif ARCH(AARCH64)
  581. register uintptr_t x0 asm("x0");
  582. register uintptr_t x1 asm("x1") = arg1;
  583. register uintptr_t x2 asm("x2") = arg2;
  584. register uintptr_t x3 asm("x3") = arg3;
  585. register uintptr_t x4 asm("x4") = arg4;
  586. register uintptr_t x8 asm("x8") = function;
  587. asm volatile("svc #0"
  588. : "=r"(x0)
  589. : "r"(x1), "r"(x2), "r"(x3), "r"(x4), "r"(x8)
  590. : "memory");
  591. result = x0;
  592. # endif
  593. return result;
  594. }
  595. # endif
  596. #endif
  597. }
  598. #undef __ENUMERATE_SYSCALL
  599. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) using Syscall::SC_##sys_call;
  600. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  601. #undef __ENUMERATE_SYSCALL
  602. }
  603. using namespace Kernel;