syscall.h 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130
  1. /*
  2. * Copyright (c) 2017, Intel Corporation
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #ifndef ZEPHYR_INCLUDE_SYSCALL_H_
  7. #define ZEPHYR_INCLUDE_SYSCALL_H_
  8. #include <syscall_list.h>
  9. #include <arch/syscall.h>
  10. #include <stdbool.h>
  11. #ifndef _ASMLANGUAGE
  12. #include <zephyr/types.h>
  13. #include <linker/sections.h>
  14. #ifdef __cplusplus
  15. extern "C" {
  16. #endif
  17. /*
  18. * System Call Declaration macros
  19. *
  20. * These macros are used in public header files to declare system calls.
  21. * They generate inline functions which have different implementations
  22. * depending on the current compilation context:
  23. *
  24. * - Kernel-only code, or CONFIG_USERSPACE disabled, these inlines will
  25. * directly call the implementation
  26. * - User-only code, these inlines will marshal parameters and elevate
  27. * privileges
  28. * - Mixed or indeterminate code, these inlines will do a runtime check
  29. * to determine what course of action is needed.
  30. *
  31. * All system calls require a verifier function and an implementation
  32. * function. These must follow a naming convention. For a system call
  33. * named k_foo():
  34. *
  35. * - The handler function will be named z_vrfy_k_foo(). Handler
  36. * functions have the same type signature as the wrapped call,
  37. * verify arguments passed up from userspace, and call the
  38. * implementation function. See documentation for that typedef for
  39. * more information. - The implementation function will be named
  40. * z_impl_k_foo(). This is the actual implementation of the system
  41. * call.
  42. */
  43. /**
  44. * @typedef _k_syscall_handler_t
  45. * @brief System call handler function type
  46. *
  47. * These are kernel-side skeleton functions for system calls. They are
  48. * necessary to sanitize the arguments passed into the system call:
  49. *
  50. * - Any kernel object or device pointers are validated with _SYSCALL_IS_OBJ()
  51. * - Any memory buffers passed in are checked to ensure that the calling thread
  52. * actually has access to them
  53. * - Many kernel calls do no sanity checking of parameters other than
  54. * assertions. The handler must check all of these conditions using
  55. * _SYSCALL_ASSERT()
  56. * - If the system call has more than 6 arguments, then arg6 will be a pointer
  57. * to some struct containing arguments 6+. The struct itself needs to be
  58. * validated like any other buffer passed in from userspace, and its members
  59. * individually validated (if necessary) and then passed to the real
  60. * implementation like normal arguments
  61. *
  62. * Even if the system call implementation has no return value, these always
  63. * return something, even 0, to prevent register leakage to userspace.
  64. *
  65. * Once everything has been validated, the real implementation will be executed.
  66. *
  67. * @param arg1 system call argument 1
  68. * @param arg2 system call argument 2
  69. * @param arg3 system call argument 3
  70. * @param arg4 system call argument 4
  71. * @param arg5 system call argument 5
  72. * @param arg6 system call argument 6
  73. * @param ssf System call stack frame pointer. Used to generate kernel oops
  74. * via _arch_syscall_oops_at(). Contents are arch-specific.
  75. * @return system call return value, or 0 if the system call implementation
  76. * return void
  77. *
  78. */
  79. typedef uintptr_t (*_k_syscall_handler_t)(uintptr_t arg1, uintptr_t arg2,
  80. uintptr_t arg3, uintptr_t arg4,
  81. uintptr_t arg5, uintptr_t arg6,
  82. void *ssf);
  83. /* True if a syscall function must trap to the kernel, usually a
  84. * compile-time decision.
  85. */
  86. static ALWAYS_INLINE bool z_syscall_trap(void)
  87. {
  88. bool ret = false;
  89. #ifdef CONFIG_USERSPACE
  90. #if defined(__ZEPHYR_SUPERVISOR__)
  91. ret = false;
  92. #elif defined(__ZEPHYR_USER__)
  93. ret = true;
  94. #else
  95. ret = arch_is_user_context();
  96. #endif
  97. #endif
  98. return ret;
  99. }
  100. /**
  101. * Indicate whether the CPU is currently in user mode
  102. *
  103. * @return true if the CPU is currently running with user permissions
  104. */
  105. __pinned_func
  106. static inline bool k_is_user_context(void)
  107. {
  108. #ifdef CONFIG_USERSPACE
  109. return arch_is_user_context();
  110. #else
  111. return false;
  112. #endif
  113. }
  114. #ifdef __cplusplus
  115. }
  116. #endif
  117. #endif /* _ASMLANGUAGE */
  118. #endif