Syscall.h 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #pragma once
  7. #include <AK/StringView.h>
  8. #include <AK/Types.h>
  9. #include <AK/Userspace.h>
  10. #ifdef __serenity__
  11. # include <LibC/fd_set.h>
  12. #endif
  13. constexpr int syscall_vector = 0x82;
  14. extern "C" {
  15. struct pollfd;
  16. struct timeval;
  17. struct timespec;
  18. struct sockaddr;
  19. struct siginfo;
  20. struct stat;
  21. struct statvfs;
  22. typedef u32 socklen_t;
  23. }
  24. namespace Kernel {
  25. enum class NeedsBigProcessLock {
  26. Yes,
  27. No
  28. };
  29. // Declare all syscalls and associated metadata.
  30. //
  31. // NOTE: When declaring a new syscall or modifying an existing, please
  32. // ensure that the proper assert is present at the top of the syscall
  33. // implementation to both verify and document to any readers if the
  34. // syscall acquires the big process lock or not. The asserts are:
  35. // - VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  36. // - VERIFY_NO_PROCESS_BIG_LOCK(this)
  37. //
  38. #define ENUMERATE_SYSCALLS(S) \
  39. S(accept4, NeedsBigProcessLock::Yes) \
  40. S(access, NeedsBigProcessLock::Yes) \
  41. S(adjtime, NeedsBigProcessLock::Yes) \
  42. S(alarm, NeedsBigProcessLock::Yes) \
  43. S(allocate_tls, NeedsBigProcessLock::Yes) \
  44. S(anon_create, NeedsBigProcessLock::Yes) \
  45. S(beep, NeedsBigProcessLock::No) \
  46. S(bind, NeedsBigProcessLock::Yes) \
  47. S(chdir, NeedsBigProcessLock::Yes) \
  48. S(chmod, NeedsBigProcessLock::Yes) \
  49. S(chown, NeedsBigProcessLock::Yes) \
  50. S(clock_gettime, NeedsBigProcessLock::No) \
  51. S(clock_nanosleep, NeedsBigProcessLock::No) \
  52. S(clock_settime, NeedsBigProcessLock::Yes) \
  53. S(close, NeedsBigProcessLock::Yes) \
  54. S(connect, NeedsBigProcessLock::Yes) \
  55. S(create_inode_watcher, NeedsBigProcessLock::Yes) \
  56. S(create_thread, NeedsBigProcessLock::Yes) \
  57. S(dbgputstr, NeedsBigProcessLock::No) \
  58. S(detach_thread, NeedsBigProcessLock::Yes) \
  59. S(disown, NeedsBigProcessLock::Yes) \
  60. S(dump_backtrace, NeedsBigProcessLock::No) \
  61. S(dup2, NeedsBigProcessLock::Yes) \
  62. S(emuctl, NeedsBigProcessLock::Yes) \
  63. S(execve, NeedsBigProcessLock::Yes) \
  64. S(exit, NeedsBigProcessLock::Yes) \
  65. S(exit_thread, NeedsBigProcessLock::Yes) \
  66. S(fchdir, NeedsBigProcessLock::Yes) \
  67. S(fchmod, NeedsBigProcessLock::Yes) \
  68. S(fchown, NeedsBigProcessLock::Yes) \
  69. S(fcntl, NeedsBigProcessLock::Yes) \
  70. S(fork, NeedsBigProcessLock::Yes) \
  71. S(fstat, NeedsBigProcessLock::Yes) \
  72. S(fstatvfs, NeedsBigProcessLock::Yes) \
  73. S(fsync, NeedsBigProcessLock::Yes) \
  74. S(ftruncate, NeedsBigProcessLock::Yes) \
  75. S(futex, NeedsBigProcessLock::Yes) \
  76. S(get_dir_entries, NeedsBigProcessLock::Yes) \
  77. S(get_process_name, NeedsBigProcessLock::Yes) \
  78. S(get_stack_bounds, NeedsBigProcessLock::No) \
  79. S(get_thread_name, NeedsBigProcessLock::Yes) \
  80. S(getcwd, NeedsBigProcessLock::Yes) \
  81. S(getegid, NeedsBigProcessLock::Yes) \
  82. S(geteuid, NeedsBigProcessLock::Yes) \
  83. S(getgid, NeedsBigProcessLock::Yes) \
  84. S(getgroups, NeedsBigProcessLock::Yes) \
  85. S(gethostname, NeedsBigProcessLock::No) \
  86. S(getkeymap, NeedsBigProcessLock::No) \
  87. S(getpeername, NeedsBigProcessLock::Yes) \
  88. S(getpgid, NeedsBigProcessLock::Yes) \
  89. S(getpgrp, NeedsBigProcessLock::Yes) \
  90. S(getpid, NeedsBigProcessLock::No) \
  91. S(getppid, NeedsBigProcessLock::Yes) \
  92. S(getrandom, NeedsBigProcessLock::No) \
  93. S(getresgid, NeedsBigProcessLock::Yes) \
  94. S(getresuid, NeedsBigProcessLock::Yes) \
  95. S(getsid, NeedsBigProcessLock::Yes) \
  96. S(getsockname, NeedsBigProcessLock::Yes) \
  97. S(getsockopt, NeedsBigProcessLock::Yes) \
  98. S(gettid, NeedsBigProcessLock::No) \
  99. S(getuid, NeedsBigProcessLock::Yes) \
  100. S(inode_watcher_add_watch, NeedsBigProcessLock::Yes) \
  101. S(inode_watcher_remove_watch, NeedsBigProcessLock::Yes) \
  102. S(ioctl, NeedsBigProcessLock::Yes) \
  103. S(join_thread, NeedsBigProcessLock::Yes) \
  104. S(kill, NeedsBigProcessLock::Yes) \
  105. S(kill_thread, NeedsBigProcessLock::Yes) \
  106. S(killpg, NeedsBigProcessLock::Yes) \
  107. S(link, NeedsBigProcessLock::Yes) \
  108. S(listen, NeedsBigProcessLock::Yes) \
  109. S(lseek, NeedsBigProcessLock::Yes) \
  110. S(madvise, NeedsBigProcessLock::Yes) \
  111. S(map_time_page, NeedsBigProcessLock::Yes) \
  112. S(mkdir, NeedsBigProcessLock::Yes) \
  113. S(mknod, NeedsBigProcessLock::Yes) \
  114. S(mmap, NeedsBigProcessLock::Yes) \
  115. S(mount, NeedsBigProcessLock::Yes) \
  116. S(mprotect, NeedsBigProcessLock::Yes) \
  117. S(mremap, NeedsBigProcessLock::Yes) \
  118. S(msync, NeedsBigProcessLock::Yes) \
  119. S(msyscall, NeedsBigProcessLock::Yes) \
  120. S(munmap, NeedsBigProcessLock::Yes) \
  121. S(open, NeedsBigProcessLock::Yes) \
  122. S(perf_event, NeedsBigProcessLock::Yes) \
  123. S(perf_register_string, NeedsBigProcessLock::Yes) \
  124. S(pipe, NeedsBigProcessLock::Yes) \
  125. S(pledge, NeedsBigProcessLock::Yes) \
  126. S(poll, NeedsBigProcessLock::Yes) \
  127. S(prctl, NeedsBigProcessLock::Yes) \
  128. S(profiling_disable, NeedsBigProcessLock::Yes) \
  129. S(profiling_enable, NeedsBigProcessLock::Yes) \
  130. S(profiling_free_buffer, NeedsBigProcessLock::Yes) \
  131. S(ptrace, NeedsBigProcessLock::Yes) \
  132. S(ptsname, NeedsBigProcessLock::Yes) \
  133. S(purge, NeedsBigProcessLock::Yes) \
  134. S(read, NeedsBigProcessLock::Yes) \
  135. S(pread, NeedsBigProcessLock::Yes) \
  136. S(readlink, NeedsBigProcessLock::Yes) \
  137. S(readv, NeedsBigProcessLock::Yes) \
  138. S(realpath, NeedsBigProcessLock::Yes) \
  139. S(recvfd, NeedsBigProcessLock::Yes) \
  140. S(recvmsg, NeedsBigProcessLock::Yes) \
  141. S(rename, NeedsBigProcessLock::Yes) \
  142. S(rmdir, NeedsBigProcessLock::Yes) \
  143. S(sched_getparam, NeedsBigProcessLock::Yes) \
  144. S(sched_setparam, NeedsBigProcessLock::Yes) \
  145. S(sendfd, NeedsBigProcessLock::Yes) \
  146. S(sendmsg, NeedsBigProcessLock::Yes) \
  147. S(set_coredump_metadata, NeedsBigProcessLock::Yes) \
  148. S(set_mmap_name, NeedsBigProcessLock::Yes) \
  149. S(set_process_name, NeedsBigProcessLock::Yes) \
  150. S(set_thread_name, NeedsBigProcessLock::Yes) \
  151. S(setegid, NeedsBigProcessLock::Yes) \
  152. S(seteuid, NeedsBigProcessLock::Yes) \
  153. S(setgid, NeedsBigProcessLock::Yes) \
  154. S(setgroups, NeedsBigProcessLock::Yes) \
  155. S(sethostname, NeedsBigProcessLock::No) \
  156. S(setkeymap, NeedsBigProcessLock::Yes) \
  157. S(setpgid, NeedsBigProcessLock::Yes) \
  158. S(setresgid, NeedsBigProcessLock::Yes) \
  159. S(setresuid, NeedsBigProcessLock::Yes) \
  160. S(setreuid, NeedsBigProcessLock::Yes) \
  161. S(setsid, NeedsBigProcessLock::Yes) \
  162. S(setsockopt, NeedsBigProcessLock::Yes) \
  163. S(setuid, NeedsBigProcessLock::Yes) \
  164. S(shutdown, NeedsBigProcessLock::Yes) \
  165. S(sigaction, NeedsBigProcessLock::Yes) \
  166. S(sigaltstack, NeedsBigProcessLock::Yes) \
  167. S(sigpending, NeedsBigProcessLock::Yes) \
  168. S(sigprocmask, NeedsBigProcessLock::Yes) \
  169. S(sigreturn, NeedsBigProcessLock::Yes) \
  170. S(sigtimedwait, NeedsBigProcessLock::Yes) \
  171. S(socket, NeedsBigProcessLock::Yes) \
  172. S(socketpair, NeedsBigProcessLock::Yes) \
  173. S(stat, NeedsBigProcessLock::Yes) \
  174. S(statvfs, NeedsBigProcessLock::Yes) \
  175. S(symlink, NeedsBigProcessLock::Yes) \
  176. S(sync, NeedsBigProcessLock::No) \
  177. S(sysconf, NeedsBigProcessLock::No) \
  178. S(times, NeedsBigProcessLock::Yes) \
  179. S(ttyname, NeedsBigProcessLock::Yes) \
  180. S(umask, NeedsBigProcessLock::Yes) \
  181. S(umount, NeedsBigProcessLock::Yes) \
  182. S(uname, NeedsBigProcessLock::No) \
  183. S(unlink, NeedsBigProcessLock::Yes) \
  184. S(unveil, NeedsBigProcessLock::Yes) \
  185. S(utime, NeedsBigProcessLock::Yes) \
  186. S(waitid, NeedsBigProcessLock::Yes) \
  187. S(write, NeedsBigProcessLock::Yes) \
  188. S(writev, NeedsBigProcessLock::Yes) \
  189. S(yield, NeedsBigProcessLock::No)
  190. namespace Syscall {
  191. enum Function {
  192. #undef __ENUMERATE_SYSCALL
  193. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) SC_##sys_call,
  194. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  195. #undef __ENUMERATE_SYSCALL
  196. __Count
  197. };
  198. constexpr StringView to_string(Function function)
  199. {
  200. switch (function) {
  201. #undef __ENUMERATE_SYSCALL
  202. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) \
  203. case SC_##sys_call: \
  204. return #sys_call##sv;
  205. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  206. #undef __ENUMERATE_SYSCALL
  207. default:
  208. break;
  209. }
  210. return "Unknown"sv;
  211. }
  212. #ifdef __serenity__
  213. struct StringArgument {
  214. const char* characters;
  215. size_t length { 0 };
  216. };
  217. template<typename DataType, typename SizeType>
  218. struct MutableBufferArgument {
  219. DataType* data { nullptr };
  220. SizeType size { 0 };
  221. };
  222. struct StringListArgument {
  223. StringArgument* strings {};
  224. size_t length { 0 };
  225. };
  226. struct SC_mmap_params {
  227. void* addr;
  228. size_t size;
  229. size_t alignment;
  230. int32_t prot;
  231. int32_t flags;
  232. int32_t fd;
  233. int64_t offset;
  234. StringArgument name;
  235. };
  236. struct SC_mremap_params {
  237. void* old_address;
  238. size_t old_size;
  239. size_t new_size;
  240. int32_t flags;
  241. };
  242. struct SC_open_params {
  243. int dirfd;
  244. StringArgument path;
  245. int options;
  246. u16 mode;
  247. };
  248. struct SC_poll_params {
  249. struct pollfd* fds;
  250. unsigned nfds;
  251. const struct timespec* timeout;
  252. const u32* sigmask;
  253. };
  254. struct SC_clock_nanosleep_params {
  255. int clock_id;
  256. int flags;
  257. const struct timespec* requested_sleep;
  258. struct timespec* remaining_sleep;
  259. };
  260. struct SC_accept4_params {
  261. sockaddr* addr;
  262. socklen_t* addrlen;
  263. int sockfd;
  264. int flags;
  265. };
  266. struct SC_getsockopt_params {
  267. int sockfd;
  268. int level;
  269. int option;
  270. void* value;
  271. socklen_t* value_size;
  272. };
  273. struct SC_setsockopt_params {
  274. const void* value;
  275. int sockfd;
  276. int level;
  277. int option;
  278. socklen_t value_size;
  279. };
  280. struct SC_getsockname_params {
  281. int sockfd;
  282. sockaddr* addr;
  283. socklen_t* addrlen;
  284. };
  285. struct SC_getpeername_params {
  286. int sockfd;
  287. sockaddr* addr;
  288. socklen_t* addrlen;
  289. };
  290. struct SC_socketpair_params {
  291. int domain;
  292. int type;
  293. int protocol;
  294. int* sv;
  295. };
  296. struct SC_futex_params {
  297. u32* userspace_address;
  298. int futex_op;
  299. u32 val;
  300. union {
  301. const timespec* timeout;
  302. uintptr_t val2;
  303. };
  304. u32* userspace_address2;
  305. u32 val3;
  306. };
  307. struct SC_setkeymap_params {
  308. const u32* map;
  309. const u32* shift_map;
  310. const u32* alt_map;
  311. const u32* altgr_map;
  312. const u32* shift_altgr_map;
  313. StringArgument map_name;
  314. };
  315. struct SC_getkeymap_params {
  316. u32* map;
  317. u32* shift_map;
  318. u32* alt_map;
  319. u32* altgr_map;
  320. u32* shift_altgr_map;
  321. MutableBufferArgument<char, size_t> map_name;
  322. };
  323. struct SC_create_thread_params {
  324. unsigned int detach_state = 0; // JOINABLE or DETACHED
  325. int schedule_priority = 30; // THREAD_PRIORITY_NORMAL
  326. // FIXME: Implement guard pages in create_thread (unreadable pages at "overflow" end of stack)
  327. // "If an implementation rounds up the value of guardsize to a multiple of {PAGESIZE},
  328. // a call to pthread_attr_getguardsize() specifying attr shall store in the guardsize
  329. // parameter the guard size specified by the previous pthread_attr_setguardsize() function call"
  330. // ... ok, if you say so posix. Guess we get to lie to people about guard page size
  331. unsigned int guard_page_size = 0; // Rounded up to PAGE_SIZE
  332. unsigned int reported_guard_page_size = 0; // The lie we tell callers
  333. unsigned int stack_size = 4 * MiB; // Default PTHREAD_STACK_MIN
  334. void* stack_location; // nullptr means any, o.w. process virtual address
  335. # if ARCH(X86_64)
  336. FlatPtr rdi;
  337. FlatPtr rsi;
  338. FlatPtr rcx;
  339. FlatPtr rdx;
  340. # endif
  341. };
  342. struct SC_realpath_params {
  343. StringArgument path;
  344. MutableBufferArgument<char, size_t> buffer;
  345. };
  346. struct SC_set_mmap_name_params {
  347. void* addr;
  348. size_t size;
  349. StringArgument name;
  350. };
  351. struct SC_execve_params {
  352. StringArgument path;
  353. StringListArgument arguments;
  354. StringListArgument environment;
  355. };
  356. struct SC_readlink_params {
  357. StringArgument path;
  358. MutableBufferArgument<char, size_t> buffer;
  359. };
  360. struct SC_link_params {
  361. StringArgument old_path;
  362. StringArgument new_path;
  363. };
  364. struct SC_chown_params {
  365. StringArgument path;
  366. u32 uid;
  367. u32 gid;
  368. int dirfd;
  369. int follow_symlinks;
  370. };
  371. struct SC_mknod_params {
  372. StringArgument path;
  373. u16 mode;
  374. u32 dev;
  375. };
  376. struct SC_symlink_params {
  377. StringArgument target;
  378. StringArgument linkpath;
  379. };
  380. struct SC_rename_params {
  381. StringArgument old_path;
  382. StringArgument new_path;
  383. };
  384. struct SC_mount_params {
  385. StringArgument target;
  386. StringArgument fs_type;
  387. int source_fd;
  388. int flags;
  389. };
  390. struct SC_pledge_params {
  391. StringArgument promises;
  392. StringArgument execpromises;
  393. };
  394. struct SC_unveil_params {
  395. StringArgument path;
  396. StringArgument permissions;
  397. };
  398. struct SC_waitid_params {
  399. int idtype;
  400. int id;
  401. struct siginfo* infop;
  402. int options;
  403. };
  404. struct SC_stat_params {
  405. StringArgument path;
  406. struct stat* statbuf;
  407. int dirfd;
  408. int follow_symlinks;
  409. };
  410. struct SC_ptrace_buf_params {
  411. MutableBufferArgument<u8, size_t> buf;
  412. };
  413. struct SC_ptrace_params {
  414. int request;
  415. pid_t tid;
  416. void* addr;
  417. FlatPtr data;
  418. };
  419. struct SC_set_coredump_metadata_params {
  420. StringArgument key;
  421. StringArgument value;
  422. };
  423. struct SC_inode_watcher_add_watch_params {
  424. StringArgument user_path;
  425. int fd;
  426. u32 event_mask;
  427. };
  428. struct SC_statvfs_params {
  429. StringArgument path;
  430. struct statvfs* buf;
  431. };
  432. void initialize();
  433. int sync();
  434. # if ARCH(I386) || ARCH(X86_64)
  435. inline uintptr_t invoke(Function function)
  436. {
  437. uintptr_t result;
  438. # if ARCH(I386)
  439. asm volatile("int $0x82"
  440. : "=a"(result)
  441. : "a"(function)
  442. : "memory");
  443. # else
  444. asm volatile("syscall"
  445. : "=a"(result)
  446. : "a"(function)
  447. : "rcx", "r11", "memory");
  448. # endif
  449. return result;
  450. }
  451. template<typename T1>
  452. inline uintptr_t invoke(Function function, T1 arg1)
  453. {
  454. uintptr_t result;
  455. # if ARCH(I386)
  456. asm volatile("int $0x82"
  457. : "=a"(result)
  458. : "a"(function), "d"((uintptr_t)arg1)
  459. : "memory");
  460. # else
  461. asm volatile("syscall"
  462. : "=a"(result)
  463. : "a"(function), "d"((uintptr_t)arg1)
  464. : "rcx", "r11", "memory");
  465. # endif
  466. return result;
  467. }
  468. template<typename T1, typename T2>
  469. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2)
  470. {
  471. uintptr_t result;
  472. # if ARCH(I386)
  473. asm volatile("int $0x82"
  474. : "=a"(result)
  475. : "a"(function), "d"((uintptr_t)arg1), "c"((uintptr_t)arg2)
  476. : "memory");
  477. # else
  478. asm volatile("syscall"
  479. : "=a"(result)
  480. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2)
  481. : "rcx", "r11", "memory");
  482. # endif
  483. return result;
  484. }
  485. template<typename T1, typename T2, typename T3>
  486. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3)
  487. {
  488. uintptr_t result;
  489. # if ARCH(I386)
  490. asm volatile("int $0x82"
  491. : "=a"(result)
  492. : "a"(function), "d"((uintptr_t)arg1), "c"((uintptr_t)arg2), "b"((uintptr_t)arg3)
  493. : "memory");
  494. # else
  495. asm volatile("syscall"
  496. : "=a"(result)
  497. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3)
  498. : "rcx", "r11", "memory");
  499. # endif
  500. return result;
  501. }
  502. template<typename T1, typename T2, typename T3, typename T4>
  503. inline uintptr_t invoke(Function function, T1 arg1, T2 arg2, T3 arg3, T4 arg4)
  504. {
  505. uintptr_t result;
  506. # if ARCH(I386)
  507. asm volatile("int $0x82"
  508. : "=a"(result)
  509. : "a"(function), "d"((uintptr_t)arg1), "c"((uintptr_t)arg2), "b"((uintptr_t)arg3), "S"((uintptr_t)arg4)
  510. : "memory");
  511. # else
  512. asm volatile("syscall"
  513. : "=a"(result)
  514. : "a"(function), "d"((uintptr_t)arg1), "D"((uintptr_t)arg2), "b"((uintptr_t)arg3), "S"((uintptr_t)arg4)
  515. : "memory");
  516. # endif
  517. return result;
  518. }
  519. # endif
  520. #endif
  521. }
  522. #undef __ENUMERATE_SYSCALL
  523. #define __ENUMERATE_SYSCALL(sys_call, needs_lock) using Syscall::SC_##sys_call;
  524. ENUMERATE_SYSCALLS(__ENUMERATE_SYSCALL)
  525. #undef __ENUMERATE_SYSCALL
  526. }
  527. using namespace Kernel;