2020-07-30 21:38:15 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
*
|
2021-04-22 08:24:48 +00:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
2020-07-30 21:38:15 +00:00
|
|
|
*/
|
|
|
|
|
2022-12-19 21:53:51 +00:00
|
|
|
#include <Kernel/Devices/HID/Management.h>
|
2023-02-24 17:45:37 +00:00
|
|
|
#include <Kernel/Tasks/Process.h>
|
2020-07-30 21:38:15 +00:00
|
|
|
|
|
|
|
namespace Kernel {
|
|
|
|
|
2021-01-30 20:35:54 +00:00
|
|
|
constexpr size_t map_name_max_size = 50;
|
|
|
|
|
2022-04-01 17:58:27 +00:00
|
|
|
ErrorOr<FlatPtr> Process::sys$setkeymap(Userspace<Syscall::SC_setkeymap_params const*> user_params)
|
2020-07-30 21:38:15 +00:00
|
|
|
{
|
2022-03-07 15:34:14 +00:00
|
|
|
VERIFY_NO_PROCESS_BIG_LOCK(this);
|
2021-12-29 09:11:45 +00:00
|
|
|
TRY(require_promise(Pledge::setkeymap));
|
2020-07-30 21:38:15 +00:00
|
|
|
|
2022-08-20 22:21:01 +00:00
|
|
|
auto credentials = this->credentials();
|
|
|
|
if (!credentials->is_superuser())
|
2021-03-01 12:49:16 +00:00
|
|
|
return EPERM;
|
2020-07-30 21:38:15 +00:00
|
|
|
|
2021-09-05 15:51:37 +00:00
|
|
|
auto params = TRY(copy_typed_from_user(user_params));
|
2020-07-30 21:38:15 +00:00
|
|
|
|
|
|
|
Keyboard::CharacterMapData character_map_data;
|
|
|
|
|
2021-09-05 15:38:37 +00:00
|
|
|
TRY(copy_n_from_user(character_map_data.map, params.map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.shift_map, params.shift_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.alt_map, params.alt_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.altgr_map, params.altgr_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.shift_altgr_map, params.shift_altgr_map, CHAR_MAP_SIZE));
|
2020-07-30 21:38:15 +00:00
|
|
|
|
2021-09-05 16:00:31 +00:00
|
|
|
auto map_name = TRY(get_syscall_path_argument(params.map_name));
|
|
|
|
if (map_name->length() > map_name_max_size)
|
2021-03-01 12:49:16 +00:00
|
|
|
return ENAMETOOLONG;
|
2021-05-29 14:59:40 +00:00
|
|
|
|
2022-01-21 13:22:36 +00:00
|
|
|
HIDManagement::the().set_maps(move(map_name), character_map_data);
|
2020-07-30 21:38:15 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-03-07 15:34:14 +00:00
|
|
|
ErrorOr<FlatPtr> Process::sys$getkeymap(Userspace<Syscall::SC_getkeymap_params const*> user_params)
|
2021-01-30 20:35:54 +00:00
|
|
|
{
|
2021-08-06 11:47:26 +00:00
|
|
|
VERIFY_NO_PROCESS_BIG_LOCK(this);
|
2021-12-29 09:11:45 +00:00
|
|
|
TRY(require_promise(Pledge::getkeymap));
|
2021-09-05 15:51:37 +00:00
|
|
|
auto params = TRY(copy_typed_from_user(user_params));
|
2021-01-30 20:35:54 +00:00
|
|
|
|
2022-03-07 15:34:14 +00:00
|
|
|
return HIDManagement::the().keymap_data().with([&](auto const& keymap_data) -> ErrorOr<FlatPtr> {
|
|
|
|
if (params.map_name.size < keymap_data.character_map_name->length())
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
TRY(copy_to_user(params.map_name.data, keymap_data.character_map_name->characters(), keymap_data.character_map_name->length()));
|
|
|
|
|
|
|
|
auto const& character_maps = keymap_data.character_map;
|
2023-03-24 08:59:28 +00:00
|
|
|
TRY(copy_n_to_user(params.map, character_maps.map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.shift_map, character_maps.shift_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.alt_map, character_maps.alt_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.altgr_map, character_maps.altgr_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.shift_altgr_map, character_maps.shift_altgr_map, CHAR_MAP_SIZE));
|
2022-03-07 15:34:14 +00:00
|
|
|
return 0;
|
|
|
|
});
|
2021-01-30 20:35:54 +00:00
|
|
|
}
|
|
|
|
|
2020-07-30 21:38:15 +00:00
|
|
|
}
|