Syscall.h 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #pragma once
  7. #include <AK/Types.h>
  8. #include <AK/Userspace.h>
  9. #include <Kernel/API/POSIX/sched.h>
  10. constexpr int syscall_vector = 0x82;
  11. extern "C" {
  12. struct pollfd;
  13. struct timeval;
  14. struct timespec;
  15. struct sockaddr;
  16. struct siginfo;
  17. struct stat;
  18. struct statvfs;
  19. typedef u32 socklen_t;
  20. }
  21. namespace Kernel {
  22. enum class NeedsBigProcessLock {
  23. Yes,
  24. No
  25. };
  26. // Declare all syscalls and associated metadata.
  27. //
  28. // NOTE: When declaring a new syscall or modifying an existing, please
  29. // ensure that the proper assert is present at the top of the syscall
  30. // implementation to both verify and document to any readers if the
  31. // syscall acquires the big process lock or not. The asserts are:
  32. // - VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  33. // - VERIFY_NO_PROCESS_BIG_LOCK(this)
  34. //
  35. #define ENUMERATE_SYSCALLS(S) \
  36. S(accept4, NeedsBigProcessLock::No) \
  37. S(adjtime, NeedsBigProcessLock::No) \
  38. S(alarm, NeedsBigProcessLock::Yes) \
  39. S(allocate_tls, NeedsBigProcessLock::Yes) \
  40. S(anon_create, NeedsBigProcessLock::No) \
  41. S(annotate_mapping, NeedsBigProcessLock::No) \
  42. S(beep, NeedsBigProcessLock::No) \
  43. S(bind, NeedsBigProcessLock::No) \
  44. S(chdir, NeedsBigProcessLock::No) \
  45. S(chmod, NeedsBigProcessLock::No) \
  46. S(chown, NeedsBigProcessLock::No) \
  47. S(clock_gettime, NeedsBigProcessLock::No) \
  48. S(clock_nanosleep, NeedsBigProcessLock::No) \
  49. S(clock_getres, NeedsBigProcessLock::No) \
  50. S(clock_settime, NeedsBigProcessLock::No) \
  51. S(close, NeedsBigProcessLock::No) \
  52. S(connect, NeedsBigProcessLock::No) \
  53. S(create_inode_watcher, NeedsBigProcessLock::Yes) \
  54. S(create_thread, NeedsBigProcessLock::Yes) \
  55. S(dbgputstr, NeedsBigProcessLock::No) \
  56. S(detach_thread, NeedsBigProcessLock::Yes) \
  57. S(disown, NeedsBigProcessLock::Yes) \
  58. S(dump_backtrace, NeedsBigProcessLock::No) \
  59. S(dup2, NeedsBigProcessLock::No) \
  60. S(emuctl, NeedsBigProcessLock::No) \
  61. S(execve, NeedsBigProcessLock::Yes) \
  62. S(exit, NeedsBigProcessLock::Yes) \
  63. S(exit_thread, NeedsBigProcessLock::Yes) \
  64. S(faccessat, NeedsBigProcessLock::Yes) \
  65. S(fchdir, NeedsBigProcessLock::No) \
  66. S(fchmod, NeedsBigProcessLock::No) \
  67. S(fchown, NeedsBigProcessLock::No) \
  68. S(fcntl, NeedsBigProcessLock::Yes) \
  69. S(fork, NeedsBigProcessLock::Yes) \
  70. S(fstat, NeedsBigProcessLock::No) \
  71. S(fstatvfs, NeedsBigProcessLock::No) \
  72. S(fsync, NeedsBigProcessLock::No) \
  73. S(ftruncate, NeedsBigProcessLock::No) \
  74. S(futex, NeedsBigProcessLock::Yes) \
  75. S(get_dir_entries, NeedsBigProcessLock::Yes) \
  76. S(get_process_name, NeedsBigProcessLock::Yes) \
  77. S(get_root_session_id, NeedsBigProcessLock::No) \
  78. S(get_stack_bounds, NeedsBigProcessLock::No) \
  79. S(get_thread_name, NeedsBigProcessLock::Yes) \
  80. S(getcwd, NeedsBigProcessLock::No) \
  81. S(getegid, NeedsBigProcessLock::No) \
  82. S(geteuid, NeedsBigProcessLock::No) \
  83. S(getgid, NeedsBigProcessLock::No) \
  84. S(getgroups, NeedsBigProcessLock::No) \
  85. S(gethostname, NeedsBigProcessLock::No) \
  86. S(getkeymap, NeedsBigProcessLock::No) \
  87. S(getpeername, NeedsBigProcessLock::Yes) \
  88. S(getpgid, NeedsBigProcessLock::Yes) \
  89. S(getpgrp, NeedsBigProcessLock::Yes) \
  90. S(getpid, NeedsBigProcessLock::No) \
  91. S(getppid, NeedsBigProcessLock::No) \
  92. S(getrandom, NeedsBigProcessLock::No) \
  93. S(getresgid, NeedsBigProcessLock::No) \
  94. S(getresuid, NeedsBigProcessLock::No) \
  95. S(getrusage, NeedsBigProcessLock::Yes) \
  96. S(getsid, NeedsBigProcessLock::Yes) \
  97. S(getsockname, NeedsBigProcessLock::Yes) \
  98. S(getsockopt, NeedsBigProcessLock::No) \
  99. S(gettid, NeedsBigProcessLock::No) \
  100. S(getuid, NeedsBigProcessLock::No) \
  101. S(inode_watcher_add_watch, NeedsBigProcessLock::Yes) \
  102. S(inode_watcher_remove_watch, NeedsBigProcessLock::Yes) \
  103. S(ioctl, NeedsBigProcessLock::Yes) \
  104. S(join_thread, NeedsBigProcessLock::Yes) \
  105. S(jail_create, NeedsBigProcessLock::No) \
  106. S(jail_attach, NeedsBigProcessLock::No) \
  107. S(kill, NeedsBigProcessLock::Yes) \
  108. S(kill_thread, NeedsBigProcessLock::Yes) \
  109. S(killpg, NeedsBigProcessLock::Yes) \
  110. S(link, NeedsBigProcessLock::No) \
  111. S(listen, NeedsBigProcessLock::No) \
  112. S(lseek, NeedsBigProcessLock::No) \
  113. S(madvise, NeedsBigProcessLock::Yes) \
  114. S(map_time_page, NeedsBigProcessLock::Yes) \
  115. S(mkdir, NeedsBigProcessLock::No) \
  116. S(mknod, NeedsBigProcessLock::No) \
  117. S(mmap, NeedsBigProcessLock::Yes) \
  118. S(mount, NeedsBigProcessLock::Yes) \
  119. S(mprotect, NeedsBigProcessLock::Yes) \
  120. S(mremap, NeedsBigProcessLock::Yes) \
  121. S(msync, NeedsBigProcessLock::Yes) \
  122. S(munmap, NeedsBigProcessLock::Yes) \
  123. S(open, NeedsBigProcessLock::Yes) \
  124. S(perf_event, NeedsBigProcessLock::Yes) \
  125. S(perf_register_string, NeedsBigProcessLock::Yes) \
  126. S(pipe, NeedsBigProcessLock::No) \
  127. S(pledge, NeedsBigProcessLock::Yes) \
  128. S(poll, NeedsBigProcessLock::Yes) \
  129. S(posix_fallocate, NeedsBigProcessLock::No) \
  130. S(prctl, NeedsBigProcessLock::Yes) \
  131. S(profiling_disable, NeedsBigProcessLock::Yes) \
  132. S(profiling_enable, NeedsBigProcessLock::Yes) \
  133. S(profiling_free_buffer, NeedsBigProcessLock::Yes) \
  134. S(ptrace, NeedsBigProcessLock::Yes) \
  135. S(purge, NeedsBigProcessLock::Yes) \
  136. S(read, NeedsBigProcessLock::Yes) \
  137. S(pread, NeedsBigProcessLock::Yes) \
  138. S(readlink, NeedsBigProcessLock::No) \
  139. S(readv, NeedsBigProcessLock::Yes) \
  140. S(realpath, NeedsBigProcessLock::No) \
  141. S(recvfd, NeedsBigProcessLock::No) \
  142. S(recvmsg, NeedsBigProcessLock::Yes) \
  143. S(rename, NeedsBigProcessLock::No) \
  144. S(rmdir, NeedsBigProcessLock::No) \
  145. S(scheduler_get_parameters, NeedsBigProcessLock::No) \
  146. S(scheduler_set_parameters, NeedsBigProcessLock::No) \
  147. S(sendfd, NeedsBigProcessLock::No) \
  148. S(sendmsg, NeedsBigProcessLock::Yes) \
  149. S(set_coredump_metadata, NeedsBigProcessLock::No) \
  150. S(set_mmap_name, NeedsBigProcessLock::Yes) \
  151. S(set_process_name, NeedsBigProcessLock::Yes) \
  152. S(set_thread_name, NeedsBigProcessLock::Yes) \
  153. S(setegid, NeedsBigProcessLock::No) \
  154. S(seteuid, NeedsBigProcessLock::No) \
  155. S(setgid, NeedsBigProcessLock::No) \
  156. S(setgroups, NeedsBigProcessLock::No) \
  157. S(sethostname, NeedsBigProcessLock::No) \
  158. S(setkeymap, NeedsBigProcessLock::No) \
  159. S(setpgid, NeedsBigProcessLock::Yes) \
  160. S(setregid, NeedsBigProcessLock::No) \
  161. S(setresgid, NeedsBigProcessLock::No) \
  162. S(setresuid, NeedsBigProcessLock::No) \
  163. S(setreuid, NeedsBigProcessLock::No) \
  164. S(setsid, NeedsBigProcessLock::Yes) \
  165. S(setsockopt, NeedsBigProcessLock::No) \
  166. S(setuid, NeedsBigProcessLock::No) \
  167. S(shutdown, NeedsBigProcessLock::No) \
  168. S(sigaction, NeedsBigProcessLock::Yes) \
  169. S(sigaltstack, NeedsBigProcessLock::Yes) \
  170. S(sigpending, NeedsBigProcessLock::Yes) \
  171. S(sigprocmask, NeedsBigProcessLock::Yes) \
  172. S(sigreturn, NeedsBigProcessLock::Yes) \
  173. S(sigsuspend, NeedsBigProcessLock::Yes) \
  174. S(sigtimedwait, NeedsBigProcessLock::Yes) \
  175. S(socket, NeedsBigProcessLock::No) \
  176. S(socketpair, NeedsBigProcessLock::No) \
  177. S(stat, NeedsBigProcessLock::No) \
  178. S(statvfs, NeedsBigProcessLock::No) \
  179. S(symlink, NeedsBigProcessLock::No) \
  180. S(sync, NeedsBigProcessLock::No) \
  181. S(sysconf, NeedsBigProcessLock::No) \
  182. S(times, NeedsBigProcessLock::Yes) \
  183. S(umask, NeedsBigProcessLock::Yes) \
  184. S(umount, NeedsBigProcessLock::Yes) \
  185. S(uname, NeedsBigProcessLock::No) \
  186. S(unlink, NeedsBigProcessLock::No) \
  187. S(unveil, NeedsBigProcessLock::No) \
  188. S(utime, NeedsBigProcessLock::No) \
  189. S(utimensat, NeedsBigProcessLock::No) \
  190. S(waitid, NeedsBigProcessLock::Yes) \
  191. S(write, NeedsBigProcessLock::Yes) \
  192. S(pwritev, NeedsBigProcessLock::Yes) \
  193. S(yield, NeedsBigProcessLock::No)
  194. namespace Syscall {
  195. enum Function {
  196. #undef __ENUMERATE_SYSCALL
  197. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) SC_##sys_call,
  198. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  199. #undef __ENUMERATE_SYSCALL
  200. __Count
  201. };
  202. #ifdef AK_OS_SERENITY
  203. struct StringArgument {
  204. char const* characters;
  205. size_t length { 0 };
  206. };
  207. template<typename DataType, typename SizeType>
  208. struct MutableBufferArgument {
  209. DataType* data { nullptr };
  210. SizeType size { 0 };
  211. };
  212. struct StringListArgument {
  213. StringArgument* strings {};
  214. size_t length { 0 };
  215. };
  216. struct SC_mmap_params {
  217. void* addr;
  218. size_t size;
  219. size_t alignment;
  220. int32_t prot;
  221. int32_t flags;
  222. int32_t fd;
  223. int64_t offset;
  224. StringArgument name;
  225. };
  226. struct SC_mremap_params {
  227. void* old_address;
  228. size_t old_size;
  229. size_t new_size;
  230. int32_t flags;
  231. };
  232. struct SC_open_params {
  233. int dirfd;
  234. StringArgument path;
  235. int options;
  236. u16 mode;
  237. };
  238. struct SC_poll_params {
  239. struct pollfd* fds;
  240. unsigned nfds;
  241. const struct timespec* timeout;
  242. u32 const* sigmask;
  243. };
  244. struct SC_clock_nanosleep_params {
  245. int clock_id;
  246. int flags;
  247. const struct timespec* requested_sleep;
  248. struct timespec* remaining_sleep;
  249. };
  250. struct SC_clock_getres_params {
  251. int clock_id;
  252. struct timespec* result;
  253. };
  254. struct SC_accept4_params {
  255. sockaddr* addr;
  256. socklen_t* addrlen;
  257. int sockfd;
  258. int flags;
  259. };
  260. struct SC_getsockopt_params {
  261. int sockfd;
  262. int level;
  263. int option;
  264. void* value;
  265. socklen_t* value_size;
  266. };
  267. struct SC_setsockopt_params {
  268. void const* value;
  269. int sockfd;
  270. int level;
  271. int option;
  272. socklen_t value_size;
  273. };
  274. struct SC_getsockname_params {
  275. int sockfd;
  276. sockaddr* addr;
  277. socklen_t* addrlen;
  278. };
  279. struct SC_getpeername_params {
  280. int sockfd;
  281. sockaddr* addr;
  282. socklen_t* addrlen;
  283. };
  284. struct SC_socketpair_params {
  285. int domain;
  286. int type;
  287. int protocol;
  288. int* sv;
  289. };
  290. struct SC_futex_params {
  291. u32* userspace_address;
  292. int futex_op;
  293. u32 val;
  294. union {
  295. timespec const* timeout;
  296. uintptr_t val2;
  297. };
  298. u32* userspace_address2;
  299. u32 val3;
  300. };
  301. struct SC_setkeymap_params {
  302. u32 const* map;
  303. u32 const* shift_map;
  304. u32 const* alt_map;
  305. u32 const* altgr_map;
  306. u32 const* shift_altgr_map;
  307. StringArgument map_name;
  308. };
  309. struct SC_jail_create_params {
  310. u64 index;
  311. StringArgument name;
  312. };
  313. struct SC_jail_attach_params {
  314. u64 index;
  315. };
  316. struct SC_getkeymap_params {
  317. u32* map;
  318. u32* shift_map;
  319. u32* alt_map;
  320. u32* altgr_map;
  321. u32* shift_altgr_map;
  322. MutableBufferArgument<char, size_t> map_name;
  323. };
  324. struct SC_create_thread_params {
  325. unsigned int detach_state = 0; // JOINABLE or DETACHED
  326. int schedule_priority = 30; // THREAD_PRIORITY_NORMAL
  327. // FIXME: Implement guard pages in create_thread (unreadable pages at "overflow" end of stack)
  328. // "If an implementation rounds up the value of guardsize to a multiple of {PAGESIZE},
  329. // a call to pthread_attr_getguardsize() specifying attr shall store in the guardsize
  330. // parameter the guard size specified by the previous pthread_attr_setguardsize() function call"
  331. // ... ok, if you say so posix. Guess we get to lie to people about guard page size
  332. unsigned int guard_page_size = 0; // Rounded up to PAGE_SIZE
  333. unsigned int reported_guard_page_size = 0; // The lie we tell callers
  334. unsigned int stack_size = 1 * MiB; // Equal to Thread::default_userspace_stack_size
  335. void* stack_location; // nullptr means any, o.w. process virtual address
  336. # if ARCH(X86_64)
  337. FlatPtr rdi;
  338. FlatPtr rsi;
  339. FlatPtr rcx;
  340. FlatPtr rdx;
  341. # endif
  342. };
  343. struct SC_realpath_params {
  344. StringArgument path;
  345. MutableBufferArgument<char, size_t> buffer;
  346. };
  347. struct SC_set_mmap_name_params {
  348. void* addr;
  349. size_t size;
  350. StringArgument name;
  351. };
  352. struct SC_execve_params {
  353. StringArgument path;
  354. StringListArgument arguments;
  355. StringListArgument environment;
  356. };
  357. struct SC_readlink_params {
  358. StringArgument path;
  359. MutableBufferArgument<char, size_t> buffer;
  360. int dirfd;
  361. };
  362. struct SC_link_params {
  363. StringArgument old_path;
  364. StringArgument new_path;
  365. };
  366. struct SC_chown_params {
  367. StringArgument path;
  368. u32 uid;
  369. u32 gid;
  370. int dirfd;
  371. int follow_symlinks;
  372. };
  373. struct SC_mknod_params {
  374. StringArgument path;
  375. u16 mode;
  376. u32 dev;
  377. };
  378. struct SC_symlink_params {
  379. StringArgument target;
  380. StringArgument linkpath;
  381. int dirfd;
  382. };
  383. struct SC_rename_params {
  384. int olddirfd;
  385. StringArgument old_path;
  386. int newdirfd;
  387. StringArgument new_path;
  388. };
  389. struct SC_mount_params {
  390. StringArgument target;
  391. StringArgument fs_type;
  392. int source_fd;
  393. int flags;
  394. };
  395. struct SC_pledge_params {
  396. StringArgument promises;
  397. StringArgument execpromises;
  398. };
  399. struct SC_unveil_params {
  400. int flags;
  401. StringArgument path;
  402. StringArgument permissions;
  403. };
  404. struct SC_utimensat_params {
  405. int dirfd;
  406. StringArgument path;
  407. struct timespec const* times;
  408. int flag;
  409. };
  410. struct SC_waitid_params {
  411. int idtype;
  412. int id;
  413. struct siginfo* infop;
  414. int options;
  415. };
  416. struct SC_stat_params {
  417. StringArgument path;
  418. struct stat* statbuf;
  419. int dirfd;
  420. int follow_symlinks;
  421. };
  422. struct SC_ptrace_buf_params {
  423. MutableBufferArgument<u8, size_t> buf;
  424. };
  425. struct SC_ptrace_params {
  426. int request;
  427. pid_t tid;
  428. void* addr;
  429. FlatPtr data;
  430. };
  431. struct SC_set_coredump_metadata_params {
  432. StringArgument key;
  433. StringArgument value;
  434. };
  435. struct SC_inode_watcher_add_watch_params {
  436. StringArgument user_path;
  437. int fd;
  438. u32 event_mask;
  439. };
  440. struct SC_statvfs_params {
  441. StringArgument path;
  442. struct statvfs* buf;
  443. };
  444. struct SC_chmod_params {
  445. int dirfd;
  446. StringArgument path;
  447. u16 mode;
  448. int follow_symlinks;
  449. };
  450. enum class SchedulerParametersMode : bool {
  451. Process,
  452. Thread,
  453. };
  454. struct SC_scheduler_parameters_params {
  455. pid_t pid_or_tid;
  456. SchedulerParametersMode mode;
  457. struct sched_param parameters;
  458. };
  459. struct SC_faccessat_params {
  460. int dirfd;
  461. StringArgument pathname;
  462. int mode;
  463. int flags;
  464. };
  465. void initialize();
  466. int sync();
  467. # if ARCH(X86_64) || ARCH(AARCH64)
  468. inline uintptr_t invoke(Function function)
  469. {
  470. uintptr_t result;
  471. # if ARCH(X86_64)
  472. asm volatile("syscall"
  473. : "=a"(result)
  474. : "a"(function)
  475. : "rcx", "r11", "memory");
  476. # elif ARCH(AARCH64)
  477. register uintptr_t x0 asm("x0");
  478. register uintptr_t x8 asm("x8") = function;
  479. asm volatile("svc #0"
  480. : "=r"(x0)
  481. : "r"(x8)
  482. : "memory");
  483. result = x0;
  484. # endif
  485. return result;
  486. }
  487. template<typename T1>
  488. inline uintptr_t invoke(Function function, T1 arg1)
  489. {
  490. uintptr_t result;
  491. # if ARCH(X86_64)
  492. asm volatile("syscall"
  493. : "=a"(result)
  494. : "a"(function), "d"((uintptr_t)arg1)
  495. : "rcx", "r11", "memory");
  496. # elif ARCH(AARCH64)
  497. register uintptr_t x0 asm("x0");
  498. register uintptr_t x1 asm("x1") = arg1;
  499. register uintptr_t x8 asm("x8") = function;
  500. asm volatile("svc #0"
  501. : "=r"(x0)
  502. : "r"(x1), "r"(x8)
  503. : "memory");
  504. result = x0;
  505. # endif
  506. return result;
  507. }
  508. template<typename T1, typename T2>
  509. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2)
  510. {
  511. uintptr_t result;
  512. # if ARCH(X86_64)
  513. asm volatile("syscall"
  514. : "=a"(result)
  515. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2)
  516. : "rcx", "r11", "memory");
  517. # elif ARCH(AARCH64)
  518. register uintptr_t x0 asm("x0");
  519. register uintptr_t x1 asm("x1") = arg1;
  520. register uintptr_t x2 asm("x2") = arg2;
  521. register uintptr_t x8 asm("x8") = function;
  522. asm volatile("svc #0"
  523. : "=r"(x0)
  524. : "r"(x1), "r"(x2), "r"(x8)
  525. : "memory");
  526. result = x0;
  527. # endif
  528. return result;
  529. }
  530. template<typename T1, typename T2, typename T3>
  531. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3)
  532. {
  533. uintptr_t result;
  534. # if ARCH(X86_64)
  535. asm volatile("syscall"
  536. : "=a"(result)
  537. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3)
  538. : "rcx", "r11", "memory");
  539. # elif ARCH(AARCH64)
  540. register uintptr_t x0 asm("x0");
  541. register uintptr_t x1 asm("x1") = arg1;
  542. register uintptr_t x2 asm("x2") = arg2;
  543. register uintptr_t x3 asm("x3") = arg3;
  544. register uintptr_t x8 asm("x8") = function;
  545. asm volatile("svc #0"
  546. : "=r"(x0)
  547. : "r"(x1), "r"(x2), "r"(x3), "r"(x8)
  548. : "memory");
  549. result = x0;
  550. # endif
  551. return result;
  552. }
  553. template<typename T1, typename T2, typename T3, typename T4>
  554. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3, T4 arg4)
  555. {
  556. uintptr_t result;
  557. # if ARCH(X86_64)
  558. asm volatile("syscall"
  559. : "=a"(result)
  560. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3), "S"((uintptr_t)arg4)
  561. : "memory");
  562. # elif ARCH(AARCH64)
  563. register uintptr_t x0 asm("x0");
  564. register uintptr_t x1 asm("x1") = arg1;
  565. register uintptr_t x2 asm("x2") = arg2;
  566. register uintptr_t x3 asm("x3") = arg3;
  567. register uintptr_t x4 asm("x4") = arg4;
  568. register uintptr_t x8 asm("x8") = function;
  569. asm volatile("svc #0"
  570. : "=r"(x0)
  571. : "r"(x1), "r"(x2), "r"(x3), "r"(x4), "r"(x8)
  572. : "memory");
  573. result = x0;
  574. # endif
  575. return result;
  576. }
  577. # endif
  578. #endif
  579. }
  580. #undef __ENUMERATE_SYSCALL
  581. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) using Syscall::SC_##sys_call;
  582. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  583. #undef __ENUMERATE_SYSCALL
  584. }
  585. using namespace Kernel;