2020-07-30 23:38:15 +02:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
*
|
2021-04-22 01:24:48 -07:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
2020-07-30 23:38:15 +02:00
|
|
|
*/
|
|
|
|
|
2022-12-19 23:53:51 +02:00
|
|
|
#include <Kernel/Devices/HID/Management.h>
|
2023-02-24 19:45:37 +02:00
|
|
|
#include <Kernel/Tasks/Process.h>
|
2020-07-30 23:38:15 +02:00
|
|
|
|
|
|
|
namespace Kernel {
|
|
|
|
|
2021-01-30 21:35:54 +01:00
|
|
|
constexpr size_t map_name_max_size = 50;
|
|
|
|
|
2022-04-01 20:58:27 +03:00
|
|
|
ErrorOr<FlatPtr> Process::sys$setkeymap(Userspace<Syscall::SC_setkeymap_params const*> user_params)
|
2020-07-30 23:38:15 +02:00
|
|
|
{
|
2022-03-07 16:34:14 +01:00
|
|
|
VERIFY_NO_PROCESS_BIG_LOCK(this);
|
2021-12-29 01:11:45 -08:00
|
|
|
TRY(require_promise(Pledge::setkeymap));
|
2020-07-30 23:38:15 +02:00
|
|
|
|
2022-08-20 18:21:01 -04:00
|
|
|
auto credentials = this->credentials();
|
|
|
|
if (!credentials->is_superuser())
|
2021-03-01 13:49:16 +01:00
|
|
|
return EPERM;
|
2020-07-30 23:38:15 +02:00
|
|
|
|
2021-09-05 17:51:37 +02:00
|
|
|
auto params = TRY(copy_typed_from_user(user_params));
|
2020-07-30 23:38:15 +02:00
|
|
|
|
|
|
|
Keyboard::CharacterMapData character_map_data;
|
|
|
|
|
2021-09-05 17:38:37 +02:00
|
|
|
TRY(copy_n_from_user(character_map_data.map, params.map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.shift_map, params.shift_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.alt_map, params.alt_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.altgr_map, params.altgr_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_from_user(character_map_data.shift_altgr_map, params.shift_altgr_map, CHAR_MAP_SIZE));
|
2020-07-30 23:38:15 +02:00
|
|
|
|
2021-09-05 18:00:31 +02:00
|
|
|
auto map_name = TRY(get_syscall_path_argument(params.map_name));
|
|
|
|
if (map_name->length() > map_name_max_size)
|
2021-03-01 13:49:16 +01:00
|
|
|
return ENAMETOOLONG;
|
2021-05-29 16:59:40 +02:00
|
|
|
|
2022-01-21 15:22:36 +02:00
|
|
|
HIDManagement::the().set_maps(move(map_name), character_map_data);
|
2020-07-30 23:38:15 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-03-07 16:34:14 +01:00
|
|
|
ErrorOr<FlatPtr> Process::sys$getkeymap(Userspace<Syscall::SC_getkeymap_params const*> user_params)
|
2021-01-30 21:35:54 +01:00
|
|
|
{
|
2021-08-06 14:47:26 +03:00
|
|
|
VERIFY_NO_PROCESS_BIG_LOCK(this);
|
2021-12-29 01:11:45 -08:00
|
|
|
TRY(require_promise(Pledge::getkeymap));
|
2021-09-05 17:51:37 +02:00
|
|
|
auto params = TRY(copy_typed_from_user(user_params));
|
2021-01-30 21:35:54 +01:00
|
|
|
|
2022-03-07 16:34:14 +01:00
|
|
|
return HIDManagement::the().keymap_data().with([&](auto const& keymap_data) -> ErrorOr<FlatPtr> {
|
|
|
|
if (params.map_name.size < keymap_data.character_map_name->length())
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
TRY(copy_to_user(params.map_name.data, keymap_data.character_map_name->characters(), keymap_data.character_map_name->length()));
|
|
|
|
|
|
|
|
auto const& character_maps = keymap_data.character_map;
|
2023-03-24 09:59:28 +01:00
|
|
|
TRY(copy_n_to_user(params.map, character_maps.map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.shift_map, character_maps.shift_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.alt_map, character_maps.alt_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.altgr_map, character_maps.altgr_map, CHAR_MAP_SIZE));
|
|
|
|
TRY(copy_n_to_user(params.shift_altgr_map, character_maps.shift_altgr_map, CHAR_MAP_SIZE));
|
2022-03-07 16:34:14 +01:00
|
|
|
return 0;
|
|
|
|
});
|
2021-01-30 21:35:54 +01:00
|
|
|
}
|
|
|
|
|
2020-07-30 23:38:15 +02:00
|
|
|
}
|