Syscall.h 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #pragma once
  7. #include <AK/Types.h>
  8. #include <AK/Userspace.h>
  9. #include <Kernel/API/POSIX/sched.h>
  10. #ifdef KERNEL
  11. # include <AK/Error.h>
  12. # include <Kernel/Arch/RegisterState.h>
  13. #endif
  14. constexpr int syscall_vector = 0x82;
  15. extern "C" {
  16. struct pollfd;
  17. struct timeval;
  18. struct timespec;
  19. struct sockaddr;
  20. struct siginfo;
  21. struct stat;
  22. struct statvfs;
  23. typedef u32 socklen_t;
  24. }
  25. namespace Kernel {
  26. enum class NeedsBigProcessLock {
  27. Yes,
  28. No
  29. };
  30. // Declare all syscalls and associated metadata.
  31. //
  32. // NOTE: When declaring a new syscall or modifying an existing, please
  33. // ensure that the proper assert is present at the top of the syscall
  34. // implementation to both verify and document to any readers if the
  35. // syscall acquires the big process lock or not. The asserts are:
  36. // - VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  37. // - VERIFY_NO_PROCESS_BIG_LOCK(this)
  38. //
  39. #define ENUMERATE_SYSCALLS(S) \
  40. S(accept4, NeedsBigProcessLock::No) \
  41. S(adjtime, NeedsBigProcessLock::No) \
  42. S(alarm, NeedsBigProcessLock::No) \
  43. S(allocate_tls, NeedsBigProcessLock::Yes) \
  44. S(anon_create, NeedsBigProcessLock::No) \
  45. S(annotate_mapping, NeedsBigProcessLock::No) \
  46. S(beep, NeedsBigProcessLock::No) \
  47. S(bind, NeedsBigProcessLock::No) \
  48. S(chdir, NeedsBigProcessLock::No) \
  49. S(chmod, NeedsBigProcessLock::No) \
  50. S(chown, NeedsBigProcessLock::No) \
  51. S(clock_gettime, NeedsBigProcessLock::No) \
  52. S(clock_nanosleep, NeedsBigProcessLock::No) \
  53. S(clock_getres, NeedsBigProcessLock::No) \
  54. S(clock_settime, NeedsBigProcessLock::No) \
  55. S(close, NeedsBigProcessLock::No) \
  56. S(connect, NeedsBigProcessLock::No) \
  57. S(create_inode_watcher, NeedsBigProcessLock::No) \
  58. S(create_thread, NeedsBigProcessLock::Yes) \
  59. S(dbgputstr, NeedsBigProcessLock::No) \
  60. S(detach_thread, NeedsBigProcessLock::Yes) \
  61. S(disown, NeedsBigProcessLock::No) \
  62. S(dump_backtrace, NeedsBigProcessLock::No) \
  63. S(dup2, NeedsBigProcessLock::No) \
  64. S(emuctl, NeedsBigProcessLock::No) \
  65. S(execve, NeedsBigProcessLock::Yes) \
  66. S(exit, NeedsBigProcessLock::Yes) \
  67. S(exit_thread, NeedsBigProcessLock::Yes) \
  68. S(faccessat, NeedsBigProcessLock::No) \
  69. S(fchdir, NeedsBigProcessLock::No) \
  70. S(fchmod, NeedsBigProcessLock::No) \
  71. S(fchown, NeedsBigProcessLock::No) \
  72. S(fcntl, NeedsBigProcessLock::No) \
  73. S(fork, NeedsBigProcessLock::Yes) \
  74. S(fstat, NeedsBigProcessLock::No) \
  75. S(fstatvfs, NeedsBigProcessLock::No) \
  76. S(fsync, NeedsBigProcessLock::No) \
  77. S(ftruncate, NeedsBigProcessLock::No) \
  78. S(futex, NeedsBigProcessLock::Yes) \
  79. S(get_dir_entries, NeedsBigProcessLock::Yes) \
  80. S(get_root_session_id, NeedsBigProcessLock::No) \
  81. S(get_stack_bounds, NeedsBigProcessLock::No) \
  82. S(get_thread_name, NeedsBigProcessLock::No) \
  83. S(getcwd, NeedsBigProcessLock::No) \
  84. S(getegid, NeedsBigProcessLock::No) \
  85. S(geteuid, NeedsBigProcessLock::No) \
  86. S(getgid, NeedsBigProcessLock::No) \
  87. S(getgroups, NeedsBigProcessLock::No) \
  88. S(gethostname, NeedsBigProcessLock::No) \
  89. S(getkeymap, NeedsBigProcessLock::No) \
  90. S(getpeername, NeedsBigProcessLock::Yes) \
  91. S(getpgid, NeedsBigProcessLock::No) \
  92. S(getpgrp, NeedsBigProcessLock::No) \
  93. S(getpid, NeedsBigProcessLock::No) \
  94. S(getppid, NeedsBigProcessLock::No) \
  95. S(getrandom, NeedsBigProcessLock::No) \
  96. S(getresgid, NeedsBigProcessLock::No) \
  97. S(getresuid, NeedsBigProcessLock::No) \
  98. S(getrusage, NeedsBigProcessLock::No) \
  99. S(getsid, NeedsBigProcessLock::No) \
  100. S(getsockname, NeedsBigProcessLock::Yes) \
  101. S(getsockopt, NeedsBigProcessLock::No) \
  102. S(gettid, NeedsBigProcessLock::No) \
  103. S(getuid, NeedsBigProcessLock::No) \
  104. S(inode_watcher_add_watch, NeedsBigProcessLock::No) \
  105. S(inode_watcher_remove_watch, NeedsBigProcessLock::No) \
  106. S(ioctl, NeedsBigProcessLock::Yes) \
  107. S(join_thread, NeedsBigProcessLock::Yes) \
  108. S(jail_create, NeedsBigProcessLock::No) \
  109. S(jail_attach, NeedsBigProcessLock::No) \
  110. S(kill, NeedsBigProcessLock::No) \
  111. S(kill_thread, NeedsBigProcessLock::Yes) \
  112. S(killpg, NeedsBigProcessLock::No) \
  113. S(link, NeedsBigProcessLock::No) \
  114. S(listen, NeedsBigProcessLock::No) \
  115. S(lseek, NeedsBigProcessLock::No) \
  116. S(madvise, NeedsBigProcessLock::No) \
  117. S(map_time_page, NeedsBigProcessLock::No) \
  118. S(mkdir, NeedsBigProcessLock::No) \
  119. S(mknod, NeedsBigProcessLock::No) \
  120. S(mmap, NeedsBigProcessLock::No) \
  121. S(mount, NeedsBigProcessLock::Yes) \
  122. S(mprotect, NeedsBigProcessLock::No) \
  123. S(mremap, NeedsBigProcessLock::No) \
  124. S(msync, NeedsBigProcessLock::No) \
  125. S(munmap, NeedsBigProcessLock::No) \
  126. S(open, NeedsBigProcessLock::No) \
  127. S(perf_event, NeedsBigProcessLock::Yes) \
  128. S(perf_register_string, NeedsBigProcessLock::Yes) \
  129. S(pipe, NeedsBigProcessLock::No) \
  130. S(pledge, NeedsBigProcessLock::No) \
  131. S(poll, NeedsBigProcessLock::Yes) \
  132. S(posix_fallocate, NeedsBigProcessLock::No) \
  133. S(prctl, NeedsBigProcessLock::No) \
  134. S(profiling_disable, NeedsBigProcessLock::Yes) \
  135. S(profiling_enable, NeedsBigProcessLock::Yes) \
  136. S(profiling_free_buffer, NeedsBigProcessLock::Yes) \
  137. S(ptrace, NeedsBigProcessLock::Yes) \
  138. S(purge, NeedsBigProcessLock::Yes) \
  139. S(read, NeedsBigProcessLock::Yes) \
  140. S(pread, NeedsBigProcessLock::Yes) \
  141. S(readlink, NeedsBigProcessLock::No) \
  142. S(readv, NeedsBigProcessLock::Yes) \
  143. S(realpath, NeedsBigProcessLock::No) \
  144. S(recvfd, NeedsBigProcessLock::No) \
  145. S(recvmsg, NeedsBigProcessLock::Yes) \
  146. S(rename, NeedsBigProcessLock::No) \
  147. S(rmdir, NeedsBigProcessLock::No) \
  148. S(scheduler_get_parameters, NeedsBigProcessLock::No) \
  149. S(scheduler_set_parameters, NeedsBigProcessLock::No) \
  150. S(sendfd, NeedsBigProcessLock::No) \
  151. S(sendmsg, NeedsBigProcessLock::Yes) \
  152. S(set_mmap_name, NeedsBigProcessLock::No) \
  153. S(set_thread_name, NeedsBigProcessLock::No) \
  154. S(setegid, NeedsBigProcessLock::No) \
  155. S(seteuid, NeedsBigProcessLock::No) \
  156. S(setgid, NeedsBigProcessLock::No) \
  157. S(setgroups, NeedsBigProcessLock::No) \
  158. S(sethostname, NeedsBigProcessLock::No) \
  159. S(setkeymap, NeedsBigProcessLock::No) \
  160. S(setpgid, NeedsBigProcessLock::No) \
  161. S(setregid, NeedsBigProcessLock::No) \
  162. S(setresgid, NeedsBigProcessLock::No) \
  163. S(setresuid, NeedsBigProcessLock::No) \
  164. S(setreuid, NeedsBigProcessLock::No) \
  165. S(setsid, NeedsBigProcessLock::No) \
  166. S(setsockopt, NeedsBigProcessLock::No) \
  167. S(setuid, NeedsBigProcessLock::No) \
  168. S(shutdown, NeedsBigProcessLock::No) \
  169. S(sigaction, NeedsBigProcessLock::Yes) \
  170. S(sigaltstack, NeedsBigProcessLock::Yes) \
  171. S(sigpending, NeedsBigProcessLock::No) \
  172. S(sigprocmask, NeedsBigProcessLock::No) \
  173. S(sigreturn, NeedsBigProcessLock::No) \
  174. S(sigsuspend, NeedsBigProcessLock::No) \
  175. S(sigtimedwait, NeedsBigProcessLock::No) \
  176. S(socket, NeedsBigProcessLock::No) \
  177. S(socketpair, NeedsBigProcessLock::No) \
  178. S(stat, NeedsBigProcessLock::No) \
  179. S(statvfs, NeedsBigProcessLock::No) \
  180. S(symlink, NeedsBigProcessLock::No) \
  181. S(sync, NeedsBigProcessLock::No) \
  182. S(sysconf, NeedsBigProcessLock::No) \
  183. S(times, NeedsBigProcessLock::No) \
  184. S(umask, NeedsBigProcessLock::No) \
  185. S(umount, NeedsBigProcessLock::Yes) \
  186. S(uname, NeedsBigProcessLock::No) \
  187. S(unlink, NeedsBigProcessLock::No) \
  188. S(unveil, NeedsBigProcessLock::No) \
  189. S(utime, NeedsBigProcessLock::No) \
  190. S(utimensat, NeedsBigProcessLock::No) \
  191. S(waitid, NeedsBigProcessLock::Yes) \
  192. S(write, NeedsBigProcessLock::Yes) \
  193. S(pwritev, NeedsBigProcessLock::Yes) \
  194. S(yield, NeedsBigProcessLock::No)
  195. namespace Syscall {
  196. #ifdef KERNEL
  197. ErrorOr<FlatPtr> handle(RegisterState&, FlatPtr function, FlatPtr arg1, FlatPtr arg2, FlatPtr arg3, FlatPtr arg4);
  198. #endif
  199. enum Function {
  200. #undef __ENUMERATE_SYSCALL
  201. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) SC_##sys_call,
  202. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  203. #undef __ENUMERATE_SYSCALL
  204. __Count
  205. };
  206. #ifdef AK_OS_SERENITY
  207. struct StringArgument {
  208. char const* characters;
  209. size_t length { 0 };
  210. };
  211. template<typename DataType, typename SizeType>
  212. struct MutableBufferArgument {
  213. DataType* data { nullptr };
  214. SizeType size { 0 };
  215. };
  216. struct StringListArgument {
  217. StringArgument* strings {};
  218. size_t length { 0 };
  219. };
  220. struct SC_mmap_params {
  221. void* addr;
  222. size_t size;
  223. size_t alignment;
  224. int32_t prot;
  225. int32_t flags;
  226. int32_t fd;
  227. int64_t offset;
  228. StringArgument name;
  229. };
  230. struct SC_mremap_params {
  231. void* old_address;
  232. size_t old_size;
  233. size_t new_size;
  234. int32_t flags;
  235. };
  236. struct SC_open_params {
  237. int dirfd;
  238. StringArgument path;
  239. int options;
  240. u16 mode;
  241. };
  242. struct SC_poll_params {
  243. struct pollfd* fds;
  244. unsigned nfds;
  245. const struct timespec* timeout;
  246. u32 const* sigmask;
  247. };
  248. struct SC_clock_nanosleep_params {
  249. int clock_id;
  250. int flags;
  251. const struct timespec* requested_sleep;
  252. struct timespec* remaining_sleep;
  253. };
  254. struct SC_clock_getres_params {
  255. int clock_id;
  256. struct timespec* result;
  257. };
  258. struct SC_accept4_params {
  259. sockaddr* addr;
  260. socklen_t* addrlen;
  261. int sockfd;
  262. int flags;
  263. };
  264. struct SC_getsockopt_params {
  265. int sockfd;
  266. int level;
  267. int option;
  268. void* value;
  269. socklen_t* value_size;
  270. };
  271. struct SC_setsockopt_params {
  272. void const* value;
  273. int sockfd;
  274. int level;
  275. int option;
  276. socklen_t value_size;
  277. };
  278. struct SC_getsockname_params {
  279. int sockfd;
  280. sockaddr* addr;
  281. socklen_t* addrlen;
  282. };
  283. struct SC_getpeername_params {
  284. int sockfd;
  285. sockaddr* addr;
  286. socklen_t* addrlen;
  287. };
  288. struct SC_socketpair_params {
  289. int domain;
  290. int type;
  291. int protocol;
  292. int* sv;
  293. };
  294. struct SC_futex_params {
  295. u32* userspace_address;
  296. int futex_op;
  297. u32 val;
  298. union {
  299. timespec const* timeout;
  300. uintptr_t val2;
  301. };
  302. u32* userspace_address2;
  303. u32 val3;
  304. };
  305. struct SC_setkeymap_params {
  306. u32 const* map;
  307. u32 const* shift_map;
  308. u32 const* alt_map;
  309. u32 const* altgr_map;
  310. u32 const* shift_altgr_map;
  311. StringArgument map_name;
  312. };
  313. struct SC_jail_create_params {
  314. u64 index;
  315. StringArgument name;
  316. };
  317. struct SC_jail_attach_params {
  318. u64 index;
  319. };
  320. struct SC_getkeymap_params {
  321. u32* map;
  322. u32* shift_map;
  323. u32* alt_map;
  324. u32* altgr_map;
  325. u32* shift_altgr_map;
  326. MutableBufferArgument<char, size_t> map_name;
  327. };
  328. struct SC_create_thread_params {
  329. unsigned int detach_state = 0; // JOINABLE or DETACHED
  330. int schedule_priority = 30; // THREAD_PRIORITY_NORMAL
  331. // FIXME: Implement guard pages in create_thread (unreadable pages at "overflow" end of stack)
  332. // "If an implementation rounds up the value of guardsize to a multiple of {PAGESIZE},
  333. // a call to pthread_attr_getguardsize() specifying attr shall store in the guardsize
  334. // parameter the guard size specified by the previous pthread_attr_setguardsize() function call"
  335. // ... ok, if you say so posix. Guess we get to lie to people about guard page size
  336. unsigned int guard_page_size = 0; // Rounded up to PAGE_SIZE
  337. unsigned int reported_guard_page_size = 0; // The lie we tell callers
  338. unsigned int stack_size = 1 * MiB; // Equal to Thread::default_userspace_stack_size
  339. void* stack_location; // nullptr means any, o.w. process virtual address
  340. # if ARCH(X86_64)
  341. FlatPtr rdi;
  342. FlatPtr rsi;
  343. FlatPtr rcx;
  344. FlatPtr rdx;
  345. # endif
  346. };
  347. struct SC_realpath_params {
  348. StringArgument path;
  349. MutableBufferArgument<char, size_t> buffer;
  350. };
  351. struct SC_set_mmap_name_params {
  352. void* addr;
  353. size_t size;
  354. StringArgument name;
  355. };
  356. struct SC_execve_params {
  357. StringArgument path;
  358. StringListArgument arguments;
  359. StringListArgument environment;
  360. };
  361. struct SC_readlink_params {
  362. StringArgument path;
  363. MutableBufferArgument<char, size_t> buffer;
  364. int dirfd;
  365. };
  366. struct SC_link_params {
  367. StringArgument old_path;
  368. StringArgument new_path;
  369. };
  370. struct SC_chown_params {
  371. StringArgument path;
  372. u32 uid;
  373. u32 gid;
  374. int dirfd;
  375. int follow_symlinks;
  376. };
  377. struct SC_mknod_params {
  378. StringArgument path;
  379. u16 mode;
  380. dev_t dev;
  381. };
  382. struct SC_symlink_params {
  383. StringArgument target;
  384. StringArgument linkpath;
  385. int dirfd;
  386. };
  387. struct SC_rename_params {
  388. int olddirfd;
  389. StringArgument old_path;
  390. int newdirfd;
  391. StringArgument new_path;
  392. };
  393. struct SC_mount_params {
  394. StringArgument target;
  395. StringArgument fs_type;
  396. int source_fd;
  397. int flags;
  398. };
  399. struct SC_pledge_params {
  400. StringArgument promises;
  401. StringArgument execpromises;
  402. };
  403. struct SC_unveil_params {
  404. int flags;
  405. StringArgument path;
  406. StringArgument permissions;
  407. };
  408. struct SC_utimensat_params {
  409. int dirfd;
  410. StringArgument path;
  411. struct timespec const* times;
  412. int flag;
  413. };
  414. struct SC_waitid_params {
  415. int idtype;
  416. int id;
  417. struct siginfo* infop;
  418. int options;
  419. };
  420. struct SC_stat_params {
  421. StringArgument path;
  422. struct stat* statbuf;
  423. int dirfd;
  424. int follow_symlinks;
  425. };
  426. struct SC_ptrace_buf_params {
  427. MutableBufferArgument<u8, size_t> buf;
  428. };
  429. struct SC_ptrace_params {
  430. int request;
  431. pid_t tid;
  432. void* addr;
  433. FlatPtr data;
  434. };
  435. struct SC_set_coredump_metadata_params {
  436. StringArgument key;
  437. StringArgument value;
  438. };
  439. struct SC_inode_watcher_add_watch_params {
  440. StringArgument user_path;
  441. int fd;
  442. u32 event_mask;
  443. };
  444. struct SC_statvfs_params {
  445. StringArgument path;
  446. struct statvfs* buf;
  447. };
  448. struct SC_chmod_params {
  449. int dirfd;
  450. StringArgument path;
  451. u16 mode;
  452. int follow_symlinks;
  453. };
  454. enum class SchedulerParametersMode : bool {
  455. Process,
  456. Thread,
  457. };
  458. struct SC_scheduler_parameters_params {
  459. pid_t pid_or_tid;
  460. SchedulerParametersMode mode;
  461. struct sched_param parameters;
  462. };
  463. struct SC_faccessat_params {
  464. int dirfd;
  465. StringArgument pathname;
  466. int mode;
  467. int flags;
  468. };
  469. void initialize();
  470. int sync();
  471. # if ARCH(X86_64) || ARCH(AARCH64)
  472. inline uintptr_t invoke(Function function)
  473. {
  474. uintptr_t result;
  475. # if ARCH(X86_64)
  476. asm volatile("syscall"
  477. : "=a"(result)
  478. : "a"(function)
  479. : "rcx", "r11", "memory");
  480. # elif ARCH(AARCH64)
  481. register uintptr_t x0 asm("x0");
  482. register uintptr_t x8 asm("x8") = function;
  483. asm volatile("svc #0"
  484. : "=r"(x0)
  485. : "r"(x8)
  486. : "memory");
  487. result = x0;
  488. # endif
  489. return result;
  490. }
  491. template<typename T1>
  492. inline uintptr_t invoke(Function function, T1 arg1)
  493. {
  494. uintptr_t result;
  495. # if ARCH(X86_64)
  496. asm volatile("syscall"
  497. : "=a"(result)
  498. : "a"(function), "d"((uintptr_t)arg1)
  499. : "rcx", "r11", "memory");
  500. # elif ARCH(AARCH64)
  501. register uintptr_t x0 asm("x0");
  502. register uintptr_t x1 asm("x1") = arg1;
  503. register uintptr_t x8 asm("x8") = function;
  504. asm volatile("svc #0"
  505. : "=r"(x0)
  506. : "r"(x1), "r"(x8)
  507. : "memory");
  508. result = x0;
  509. # endif
  510. return result;
  511. }
  512. template<typename T1, typename T2>
  513. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2)
  514. {
  515. uintptr_t result;
  516. # if ARCH(X86_64)
  517. asm volatile("syscall"
  518. : "=a"(result)
  519. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2)
  520. : "rcx", "r11", "memory");
  521. # elif ARCH(AARCH64)
  522. register uintptr_t x0 asm("x0");
  523. register uintptr_t x1 asm("x1") = arg1;
  524. register uintptr_t x2 asm("x2") = arg2;
  525. register uintptr_t x8 asm("x8") = function;
  526. asm volatile("svc #0"
  527. : "=r"(x0)
  528. : "r"(x1), "r"(x2), "r"(x8)
  529. : "memory");
  530. result = x0;
  531. # endif
  532. return result;
  533. }
  534. template<typename T1, typename T2, typename T3>
  535. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3)
  536. {
  537. uintptr_t result;
  538. # if ARCH(X86_64)
  539. asm volatile("syscall"
  540. : "=a"(result)
  541. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3)
  542. : "rcx", "r11", "memory");
  543. # elif ARCH(AARCH64)
  544. register uintptr_t x0 asm("x0");
  545. register uintptr_t x1 asm("x1") = arg1;
  546. register uintptr_t x2 asm("x2") = arg2;
  547. register uintptr_t x3 asm("x3") = arg3;
  548. register uintptr_t x8 asm("x8") = function;
  549. asm volatile("svc #0"
  550. : "=r"(x0)
  551. : "r"(x1), "r"(x2), "r"(x3), "r"(x8)
  552. : "memory");
  553. result = x0;
  554. # endif
  555. return result;
  556. }
  557. template<typename T1, typename T2, typename T3, typename T4>
  558. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3, T4 arg4)
  559. {
  560. uintptr_t result;
  561. # if ARCH(X86_64)
  562. asm volatile("syscall"
  563. : "=a"(result)
  564. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3), "S"((uintptr_t)arg4)
  565. : "memory");
  566. # elif ARCH(AARCH64)
  567. register uintptr_t x0 asm("x0");
  568. register uintptr_t x1 asm("x1") = arg1;
  569. register uintptr_t x2 asm("x2") = arg2;
  570. register uintptr_t x3 asm("x3") = arg3;
  571. register uintptr_t x4 asm("x4") = arg4;
  572. register uintptr_t x8 asm("x8") = function;
  573. asm volatile("svc #0"
  574. : "=r"(x0)
  575. : "r"(x1), "r"(x2), "r"(x3), "r"(x4), "r"(x8)
  576. : "memory");
  577. result = x0;
  578. # endif
  579. return result;
  580. }
  581. # endif
  582. #endif
  583. }
  584. #undef __ENUMERATE_SYSCALL
  585. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) using Syscall::SC_##sys_call;
  586. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  587. #undef __ENUMERATE_SYSCALL
  588. }
  589. using namespace Kernel;