syscall_handler.h 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550
  1. /*
  2. * Copyright (c) 2017, Intel Corporation
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #ifndef ZEPHYR_INCLUDE_SYSCALL_HANDLER_H_
  7. #define ZEPHYR_INCLUDE_SYSCALL_HANDLER_H_
  8. #ifdef CONFIG_USERSPACE
  9. #ifndef _ASMLANGUAGE
  10. #include <kernel.h>
  11. #include <sys/arch_interface.h>
  12. #include <sys/math_extras.h>
  13. #include <stdbool.h>
  14. #include <logging/log.h>
  15. extern const _k_syscall_handler_t _k_syscall_table[K_SYSCALL_LIMIT];
  16. enum _obj_init_check {
  17. _OBJ_INIT_TRUE = 0,
  18. _OBJ_INIT_FALSE = -1,
  19. _OBJ_INIT_ANY = 1
  20. };
  21. /**
  22. * Return true if we are currently handling a system call from user mode
  23. *
  24. * Inside z_vrfy functions, we always know that we are handling
  25. * a system call invoked from user context.
  26. *
  27. * However, some checks that are only relevant to user mode must
  28. * instead be placed deeper within the implementation. This
  29. * API is useful to conditionally make these checks.
  30. *
  31. * For performance reasons, whenever possible, checks should be placed
  32. * in the relevant z_vrfy function since these are completely skipped
  33. * when a syscall is invoked.
  34. *
  35. * This will return true only if we are handling a syscall for a
  36. * user thread. If the system call was invoked from supervisor mode,
  37. * or we are not handling a system call, this will return false.
  38. *
  39. * @return whether the current context is handling a syscall for a user
  40. * mode thread
  41. */
  42. static inline bool z_is_in_user_syscall(void)
  43. {
  44. /* This gets set on entry to the syscall's generasted z_mrsh
  45. * function and then cleared on exit. This code path is only
  46. * encountered when a syscall is made from user mode, system
  47. * calls from supervisor mode bypass everything directly to
  48. * the implementation function.
  49. */
  50. return !k_is_in_isr() && _current->syscall_frame != NULL;
  51. }
  52. /**
  53. * Ensure a system object is a valid object of the expected type
  54. *
  55. * Searches for the object and ensures that it is indeed an object
  56. * of the expected type, that the caller has the right permissions on it,
  57. * and that the object has been initialized.
  58. *
  59. * This function is intended to be called on the kernel-side system
  60. * call handlers to validate kernel object pointers passed in from
  61. * userspace.
  62. *
  63. * @param ko Kernel object metadata pointer, or NULL
  64. * @param otype Expected type of the kernel object, or K_OBJ_ANY if type
  65. * doesn't matter
  66. * @param init Indicate whether the object needs to already be in initialized
  67. * or uninitialized state, or that we don't care
  68. * @return 0 If the object is valid
  69. * -EBADF if not a valid object of the specified type
  70. * -EPERM If the caller does not have permissions
  71. * -EINVAL Object is not initialized
  72. */
  73. int z_object_validate(struct z_object *ko, enum k_objects otype,
  74. enum _obj_init_check init);
  75. /**
  76. * Dump out error information on failed z_object_validate() call
  77. *
  78. * @param retval Return value from z_object_validate()
  79. * @param obj Kernel object we were trying to verify
  80. * @param ko If retval=-EPERM, struct z_object * that was looked up, or NULL
  81. * @param otype Expected type of the kernel object
  82. */
  83. extern void z_dump_object_error(int retval, const void *obj,
  84. struct z_object *ko, enum k_objects otype);
  85. /**
  86. * Kernel object validation function
  87. *
  88. * Retrieve metadata for a kernel object. This function is implemented in
  89. * the gperf script footer, see gen_kobject_list.py
  90. *
  91. * @param obj Address of kernel object to get metadata
  92. * @return Kernel object's metadata, or NULL if the parameter wasn't the
  93. * memory address of a kernel object
  94. */
  95. extern struct z_object *z_object_find(const void *obj);
  96. typedef void (*_wordlist_cb_func_t)(struct z_object *ko, void *context);
  97. /**
  98. * Iterate over all the kernel object metadata in the system
  99. *
  100. * @param func function to run on each struct z_object
  101. * @param context Context pointer to pass to each invocation
  102. */
  103. extern void z_object_wordlist_foreach(_wordlist_cb_func_t func, void *context);
  104. /**
  105. * Copy all kernel object permissions from the parent to the child
  106. *
  107. * @param parent Parent thread, to get permissions from
  108. * @param child Child thread, to copy permissions to
  109. */
  110. extern void z_thread_perms_inherit(struct k_thread *parent,
  111. struct k_thread *child);
  112. /**
  113. * Grant a thread permission to a kernel object
  114. *
  115. * @param ko Kernel object metadata to update
  116. * @param thread The thread to grant permission
  117. */
  118. extern void z_thread_perms_set(struct z_object *ko, struct k_thread *thread);
  119. /**
  120. * Revoke a thread's permission to a kernel object
  121. *
  122. * @param ko Kernel object metadata to update
  123. * @param thread The thread to grant permission
  124. */
  125. extern void z_thread_perms_clear(struct z_object *ko, struct k_thread *thread);
  126. /*
  127. * Revoke access to all objects for the provided thread
  128. *
  129. * NOTE: Unlike z_thread_perms_clear(), this function will not clear
  130. * permissions on public objects.
  131. *
  132. * @param thread Thread object to revoke access
  133. */
  134. extern void z_thread_perms_all_clear(struct k_thread *thread);
  135. /**
  136. * Clear initialization state of a kernel object
  137. *
  138. * Intended for thread objects upon thread exit, or for other kernel objects
  139. * that were released back to an object pool.
  140. *
  141. * @param object Address of the kernel object
  142. */
  143. void z_object_uninit(const void *obj);
  144. /**
  145. * Initialize and reset permissions to only access by the caller
  146. *
  147. * Intended for scenarios where objects are fetched from slab pools
  148. * and may have had different permissions set during prior usage.
  149. *
  150. * This is only intended for pools of objects, where such objects are
  151. * acquired and released to the pool. If an object has already been used,
  152. * we do not want stale permission information hanging around, the object
  153. * should only have permissions on the caller. Objects which are not
  154. * managed by a pool-like mechanism should not use this API.
  155. *
  156. * The object will be marked as initialized and the calling thread
  157. * granted access to it.
  158. *
  159. * @param object Address of the kernel object
  160. */
  161. void z_object_recycle(const void *obj);
  162. /**
  163. * @brief Obtain the size of a C string passed from user mode
  164. *
  165. * Given a C string pointer and a maximum size, obtain the true
  166. * size of the string (not including the trailing NULL byte) just as
  167. * if calling strnlen() on it, with the same semantics of strnlen() with
  168. * respect to the return value and the maxlen parameter.
  169. *
  170. * Any memory protection faults triggered by the examination of the string
  171. * will be safely handled and an error code returned.
  172. *
  173. * NOTE: Doesn't guarantee that user mode has actual access to this
  174. * string, you will need to still do a Z_SYSCALL_MEMORY_READ()
  175. * with the obtained size value to guarantee this.
  176. *
  177. * @param src String to measure size of
  178. * @param maxlen Maximum number of characters to examine
  179. * @param err Pointer to int, filled in with -1 on memory error, 0 on
  180. * success
  181. * @return undefined on error, or strlen(src) if that is less than maxlen, or
  182. * maxlen if there were no NULL terminating characters within the
  183. * first maxlen bytes.
  184. */
  185. static inline size_t z_user_string_nlen(const char *src, size_t maxlen,
  186. int *err)
  187. {
  188. return arch_user_string_nlen(src, maxlen, err);
  189. }
  190. /**
  191. * @brief Copy data from userspace into a resource pool allocation
  192. *
  193. * Given a pointer and a size, allocate a similarly sized buffer in the
  194. * caller's resource pool and copy all the data within it to the newly
  195. * allocated buffer. This will need to be freed later with k_free().
  196. *
  197. * Checks are done to ensure that the current thread would have read
  198. * access to the provided buffer.
  199. *
  200. * @param src Source memory address
  201. * @param size Size of the memory buffer
  202. * @return An allocated buffer with the data copied within it, or NULL
  203. * if some error condition occurred
  204. */
  205. extern void *z_user_alloc_from_copy(const void *src, size_t size);
  206. /**
  207. * @brief Copy data from user mode
  208. *
  209. * Given a userspace pointer and a size, copies data from it into a provided
  210. * destination buffer, performing checks to ensure that the caller would have
  211. * appropriate access when in user mode.
  212. *
  213. * @param dst Destination memory buffer
  214. * @param src Source memory buffer, in userspace
  215. * @param size Number of bytes to copy
  216. * @retval 0 On success
  217. * @retval EFAULT On memory access error
  218. */
  219. extern int z_user_from_copy(void *dst, const void *src, size_t size);
  220. /**
  221. * @brief Copy data to user mode
  222. *
  223. * Given a userspace pointer and a size, copies data to it from a provided
  224. * source buffer, performing checks to ensure that the caller would have
  225. * appropriate access when in user mode.
  226. *
  227. * @param dst Destination memory buffer, in userspace
  228. * @param src Source memory buffer
  229. * @param size Number of bytes to copy
  230. * @retval 0 On success
  231. * @retval EFAULT On memory access error
  232. */
  233. extern int z_user_to_copy(void *dst, const void *src, size_t size);
  234. /**
  235. * @brief Copy a C string from userspace into a resource pool allocation
  236. *
  237. * Given a C string and maximum length, duplicate the string using an
  238. * allocation from the calling thread's resource pool. This will need to be
  239. * freed later with k_free().
  240. *
  241. * Checks are performed to ensure that the string is valid memory and that
  242. * the caller has access to it in user mode.
  243. *
  244. * @param src Source string pointer, in userspace
  245. * @param maxlen Maximum size of the string including trailing NULL
  246. * @return The duplicated string, or NULL if an error occurred.
  247. */
  248. extern char *z_user_string_alloc_copy(const char *src, size_t maxlen);
  249. /**
  250. * @brief Copy a C string from userspace into a provided buffer
  251. *
  252. * Given a C string and maximum length, copy the string into a buffer.
  253. *
  254. * Checks are performed to ensure that the string is valid memory and that
  255. * the caller has access to it in user mode.
  256. *
  257. * @param dst Destination buffer
  258. * @param src Source string pointer, in userspace
  259. * @param maxlen Maximum size of the string including trailing NULL
  260. * @retval 0 on success
  261. * @retval EINVAL if the source string is too long with respect
  262. * to maxlen
  263. * @retval EFAULT On memory access error
  264. */
  265. extern int z_user_string_copy(char *dst, const char *src, size_t maxlen);
  266. #define Z_OOPS(expr) \
  267. do { \
  268. if (expr) { \
  269. arch_syscall_oops(_current->syscall_frame); \
  270. } \
  271. } while (false)
  272. /**
  273. * @brief Runtime expression check for system call arguments
  274. *
  275. * Used in handler functions to perform various runtime checks on arguments,
  276. * and generate a kernel oops if anything is not expected, printing a custom
  277. * message.
  278. *
  279. * @param expr Boolean expression to verify, a false result will trigger an
  280. * oops
  281. * @param fmt Printf-style format string (followed by appropriate variadic
  282. * arguments) to print on verification failure
  283. * @return False on success, True on failure
  284. */
  285. #define Z_SYSCALL_VERIFY_MSG(expr, fmt, ...) ({ \
  286. bool expr_copy = !(expr); \
  287. if (expr_copy) { \
  288. LOG_MODULE_DECLARE(os, CONFIG_KERNEL_LOG_LEVEL); \
  289. LOG_ERR("syscall %s failed check: " fmt, \
  290. __func__, ##__VA_ARGS__); \
  291. } \
  292. expr_copy; })
  293. /**
  294. * @brief Runtime expression check for system call arguments
  295. *
  296. * Used in handler functions to perform various runtime checks on arguments,
  297. * and generate a kernel oops if anything is not expected.
  298. *
  299. * @param expr Boolean expression to verify, a false result will trigger an
  300. * oops. A stringified version of this expression will be printed.
  301. * @return 0 on success, nonzero on failure
  302. */
  303. #define Z_SYSCALL_VERIFY(expr) Z_SYSCALL_VERIFY_MSG(expr, #expr)
  304. /**
  305. * @brief Runtime check that a user thread has read and/or write permission to
  306. * a memory area
  307. *
  308. * Checks that the particular memory area is readable and/or writeable by the
  309. * currently running thread if the CPU was in user mode, and generates a kernel
  310. * oops if it wasn't. Prevents userspace from getting the kernel to read and/or
  311. * modify memory the thread does not have access to, or passing in garbage
  312. * pointers that would crash/pagefault the kernel if dereferenced.
  313. *
  314. * @param ptr Memory area to examine
  315. * @param size Size of the memory area
  316. * @param write If the thread should be able to write to this memory, not just
  317. * read it
  318. * @return 0 on success, nonzero on failure
  319. */
  320. #define Z_SYSCALL_MEMORY(ptr, size, write) \
  321. Z_SYSCALL_VERIFY_MSG(arch_buffer_validate((void *)ptr, size, write) \
  322. == 0, \
  323. "Memory region %p (size %zu) %s access denied", \
  324. (void *)(ptr), (size_t)(size), \
  325. write ? "write" : "read")
  326. /**
  327. * @brief Runtime check that a user thread has read permission to a memory area
  328. *
  329. * Checks that the particular memory area is readable by the currently running
  330. * thread if the CPU was in user mode, and generates a kernel oops if it
  331. * wasn't. Prevents userspace from getting the kernel to read memory the thread
  332. * does not have access to, or passing in garbage pointers that would
  333. * crash/pagefault the kernel if dereferenced.
  334. *
  335. * @param ptr Memory area to examine
  336. * @param size Size of the memory area
  337. * @return 0 on success, nonzero on failure
  338. */
  339. #define Z_SYSCALL_MEMORY_READ(ptr, size) \
  340. Z_SYSCALL_MEMORY(ptr, size, 0)
  341. /**
  342. * @brief Runtime check that a user thread has write permission to a memory area
  343. *
  344. * Checks that the particular memory area is readable and writable by the
  345. * currently running thread if the CPU was in user mode, and generates a kernel
  346. * oops if it wasn't. Prevents userspace from getting the kernel to read or
  347. * modify memory the thread does not have access to, or passing in garbage
  348. * pointers that would crash/pagefault the kernel if dereferenced.
  349. *
  350. * @param ptr Memory area to examine
  351. * @param size Size of the memory area
  352. * @param 0 on success, nonzero on failure
  353. */
  354. #define Z_SYSCALL_MEMORY_WRITE(ptr, size) \
  355. Z_SYSCALL_MEMORY(ptr, size, 1)
  356. #define Z_SYSCALL_MEMORY_ARRAY(ptr, nmemb, size, write) \
  357. ({ \
  358. size_t product; \
  359. Z_SYSCALL_VERIFY_MSG(!size_mul_overflow((size_t)(nmemb), \
  360. (size_t)(size), \
  361. &product), \
  362. "%zux%zu array is too large", \
  363. (size_t)(nmemb), (size_t)(size)) || \
  364. Z_SYSCALL_MEMORY(ptr, product, write); \
  365. })
  366. /**
  367. * @brief Validate user thread has read permission for sized array
  368. *
  369. * Used when the memory region is expressed in terms of number of elements and
  370. * each element size, handles any overflow issues with computing the total
  371. * array bounds. Otherwise see _SYSCALL_MEMORY_READ.
  372. *
  373. * @param ptr Memory area to examine
  374. * @param nmemb Number of elements in the array
  375. * @param size Size of each array element
  376. * @return 0 on success, nonzero on failure
  377. */
  378. #define Z_SYSCALL_MEMORY_ARRAY_READ(ptr, nmemb, size) \
  379. Z_SYSCALL_MEMORY_ARRAY(ptr, nmemb, size, 0)
  380. /**
  381. * @brief Validate user thread has read/write permission for sized array
  382. *
  383. * Used when the memory region is expressed in terms of number of elements and
  384. * each element size, handles any overflow issues with computing the total
  385. * array bounds. Otherwise see _SYSCALL_MEMORY_WRITE.
  386. *
  387. * @param ptr Memory area to examine
  388. * @param nmemb Number of elements in the array
  389. * @param size Size of each array element
  390. * @return 0 on success, nonzero on failure
  391. */
  392. #define Z_SYSCALL_MEMORY_ARRAY_WRITE(ptr, nmemb, size) \
  393. Z_SYSCALL_MEMORY_ARRAY(ptr, nmemb, size, 1)
  394. static inline int z_obj_validation_check(struct z_object *ko,
  395. const void *obj,
  396. enum k_objects otype,
  397. enum _obj_init_check init)
  398. {
  399. int ret;
  400. ret = z_object_validate(ko, otype, init);
  401. #ifdef CONFIG_LOG
  402. if (ret != 0) {
  403. z_dump_object_error(ret, obj, ko, otype);
  404. }
  405. #else
  406. ARG_UNUSED(obj);
  407. #endif
  408. return ret;
  409. }
  410. #define Z_SYSCALL_IS_OBJ(ptr, type, init) \
  411. Z_SYSCALL_VERIFY_MSG(z_obj_validation_check( \
  412. z_object_find((const void *)ptr), \
  413. (const void *)ptr, \
  414. type, init) == 0, "access denied")
  415. /**
  416. * @brief Runtime check driver object pointer for presence of operation
  417. *
  418. * Validates if the driver object is capable of performing a certain operation.
  419. *
  420. * @param ptr Untrusted device instance object pointer
  421. * @param api_struct Name of the driver API struct (e.g. gpio_driver_api)
  422. * @param op Driver operation (e.g. manage_callback)
  423. * @return 0 on success, nonzero on failure
  424. */
  425. #define Z_SYSCALL_DRIVER_OP(ptr, api_name, op) \
  426. ({ \
  427. struct api_name *__device__ = (struct api_name *) \
  428. ((const struct device *)ptr)->api; \
  429. Z_SYSCALL_VERIFY_MSG(__device__->op != NULL, \
  430. "Operation %s not defined for driver " \
  431. "instance %p", \
  432. # op, __device__); \
  433. })
  434. /**
  435. * @brief Runtime check that device object is of a specific driver type
  436. *
  437. * Checks that the driver object passed in is initialized, the caller has
  438. * correct permissions, and that it belongs to the specified driver
  439. * subsystems. Additionally, all devices store a structure pointer of the
  440. * driver's API. If this doesn't match the value provided, the check will fail.
  441. *
  442. * This provides an easy way to determine if a device object not only
  443. * belongs to a particular subsystem, but is of a specific device driver
  444. * implementation. Useful for defining out-of-subsystem system calls
  445. * which are implemented for only one driver.
  446. *
  447. * @param _device Untrusted device pointer
  448. * @param _dtype Expected kernel object type for the provided device pointer
  449. * @param _api Expected driver API structure memory address
  450. * @return 0 on success, nonzero on failure
  451. */
  452. #define Z_SYSCALL_SPECIFIC_DRIVER(_device, _dtype, _api) \
  453. ({ \
  454. const struct device *_dev = (const struct device *)_device; \
  455. Z_SYSCALL_OBJ(_dev, _dtype) || \
  456. Z_SYSCALL_VERIFY_MSG(_dev->api == _api, \
  457. "API structure mismatch"); \
  458. })
  459. /**
  460. * @brief Runtime check kernel object pointer for non-init functions
  461. *
  462. * Calls z_object_validate and triggers a kernel oops if the check fails.
  463. * For use in system call handlers which are not init functions; a fatal
  464. * error will occur if the object is not initialized.
  465. *
  466. * @param ptr Untrusted kernel object pointer
  467. * @param type Expected kernel object type
  468. * @return 0 on success, nonzero on failure
  469. */
  470. #define Z_SYSCALL_OBJ(ptr, type) \
  471. Z_SYSCALL_IS_OBJ(ptr, type, _OBJ_INIT_TRUE)
  472. /**
  473. * @brief Runtime check kernel object pointer for non-init functions
  474. *
  475. * See description of _SYSCALL_IS_OBJ. No initialization checks are done.
  476. * Intended for init functions where objects may be re-initialized at will.
  477. *
  478. * @param ptr Untrusted kernel object pointer
  479. * @param type Expected kernel object type
  480. * @return 0 on success, nonzero on failure
  481. */
  482. #define Z_SYSCALL_OBJ_INIT(ptr, type) \
  483. Z_SYSCALL_IS_OBJ(ptr, type, _OBJ_INIT_ANY)
  484. /**
  485. * @brief Runtime check kernel object pointer for non-init functions
  486. *
  487. * See description of _SYSCALL_IS_OBJ. Triggers a fatal error if the object is
  488. * initialized. Intended for init functions where objects, once initialized,
  489. * can only be re-used when their initialization state expires due to some
  490. * other mechanism.
  491. *
  492. * @param ptr Untrusted kernel object pointer
  493. * @param type Expected kernel object type
  494. * @return 0 on success, nonzero on failure
  495. */
  496. #define Z_SYSCALL_OBJ_NEVER_INIT(ptr, type) \
  497. Z_SYSCALL_IS_OBJ(ptr, type, _OBJ_INIT_FALSE)
  498. #include <driver-validation.h>
  499. #endif /* _ASMLANGUAGE */
  500. #endif /* CONFIG_USERSPACE */
  501. #endif /* ZEPHYR_INCLUDE_SYSCALL_HANDLER_H_ */