1
Fork 0
mirror of https://github.com/RGBCube/serenity synced 2025-05-14 07:54:58 +00:00
serenity/Userland/Libraries/LibC/serenity.cpp
Andreas Kling e87eac9273 Userland: Add LibSystem and funnel all syscalls through it
This achieves two things:

- Programs can now intentionally perform arbitrary syscalls by calling
  syscall(). This allows us to work on things like syscall fuzzing.

- It restricts the ability of userspace to make syscalls to a single
  4KB page of code. In order to call the kernel directly, an attacker
  must now locate this page and call through it.
2021-02-05 12:23:39 +01:00

152 lines
4.7 KiB
C++

/*
* Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice, this
* list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <errno.h>
#include <serenity.h>
#include <string.h>
#include <syscall.h>
extern "C" {
int disown(pid_t pid)
{
int rc = syscall(SC_disown, pid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int module_load(const char* path, size_t path_length)
{
int rc = syscall(SC_module_load, path, path_length);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int module_unload(const char* name, size_t name_length)
{
int rc = syscall(SC_module_unload, name, name_length);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int profiling_enable(pid_t pid)
{
int rc = syscall(SC_profiling_enable, pid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int profiling_disable(pid_t pid)
{
int rc = syscall(SC_profiling_disable, pid);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int futex(uint32_t* userspace_address, int futex_op, uint32_t value, const struct timespec* timeout, uint32_t* userspace_address2, uint32_t value3)
{
int rc;
switch (futex_op & FUTEX_CMD_MASK) {
//case FUTEX_CMP_REQUEUE:
// FUTEX_CMP_REQUEUE_PI:
case FUTEX_WAKE_OP: {
// These interpret timeout as a u32 value for val2
Syscall::SC_futex_params params {
.userspace_address = userspace_address,
.futex_op = futex_op,
.val = value,
.val2 = (uint32_t)timeout,
.userspace_address2 = userspace_address2,
.val3 = value3
};
rc = syscall(SC_futex, &params);
break;
}
default: {
Syscall::SC_futex_params params {
.userspace_address = userspace_address,
.futex_op = futex_op,
.val = value,
.timeout = timeout,
.userspace_address2 = userspace_address2,
.val3 = value3
};
rc = syscall(SC_futex, &params);
break;
}
}
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int purge(int mode)
{
int rc = syscall(SC_purge, mode);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int perf_event(int type, uintptr_t arg1, FlatPtr arg2)
{
int rc = syscall(SC_perf_event, type, arg1, arg2);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int get_stack_bounds(uintptr_t* user_stack_base, size_t* user_stack_size)
{
int rc = syscall(SC_get_stack_bounds, user_stack_base, user_stack_size);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int anon_create(size_t size, int options)
{
int rc = syscall(SC_anon_create, size, options);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int serenity_readlink(const char* path, size_t path_length, char* buffer, size_t buffer_size)
{
Syscall::SC_readlink_params small_params {
{ path, path_length },
{ buffer, buffer_size }
};
int rc = syscall(SC_readlink, &small_params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
int setkeymap(const char* name, const u32* map, u32* const shift_map, const u32* alt_map, const u32* altgr_map, const u32* shift_altgr_map)
{
Syscall::SC_setkeymap_params params { map, shift_map, alt_map, altgr_map, shift_altgr_map, { name, strlen(name) } };
return syscall(SC_setkeymap, &params);
}
int getkeymap(char* name_buffer, size_t name_buffer_size, u32* map, u32* shift_map, u32* alt_map, u32* altgr_map, u32* shift_altgr_map)
{
Syscall::SC_getkeymap_params params {
map,
shift_map,
alt_map,
altgr_map,
shift_altgr_map,
{ name_buffer, name_buffer_size }
};
int rc = syscall(SC_getkeymap, &params);
__RETURN_WITH_ERRNO(rc, rc, -1);
}
}