diff options
author | Ben Wiederhake <BenWiederhake.GitHub@gmx.de> | 2021-02-11 22:01:49 +0100 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2021-02-13 00:40:31 +0100 |
commit | cb9a9a3e03ad61822be4e670b8c4ee1cc164a1d0 (patch) | |
tree | e1f3bc4ce52f919821cf98cf6bcfbc9985c0a1ad /Userland/Utilities/syscall.cpp | |
parent | 244c81bcf2fcfd5247e7725d1a8137d4a622ad88 (diff) | |
download | serenity-cb9a9a3e03ad61822be4e670b8c4ee1cc164a1d0.zip |
Utilities: Enable syscall(1) to use SC_*_params buffers
Diffstat (limited to 'Userland/Utilities/syscall.cpp')
-rw-r--r-- | Userland/Utilities/syscall.cpp | 115 |
1 files changed, 89 insertions, 26 deletions
diff --git a/Userland/Utilities/syscall.cpp b/Userland/Utilities/syscall.cpp index 29b03f77e8..f191e3ba6d 100644 --- a/Userland/Utilities/syscall.cpp +++ b/Userland/Utilities/syscall.cpp @@ -24,7 +24,10 @@ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ +#include <AK/Iterator.h> +#include <AK/Vector.h> #include <LibCore/ArgsParser.h> +#include <mman.h> #include <stdio.h> #include <stdlib.h> #include <string.h> @@ -33,9 +36,12 @@ #define SC_NARG 4 FlatPtr arg[SC_NARG]; -char buf[BUFSIZ]; +char outbuf[BUFSIZ]; -static FlatPtr parse(const char* s); +using Arguments = Vector<const char*>; +using ArgIter = Arguments::Iterator; + +static FlatPtr parse_from(ArgIter&); int main(int argc, char** argv) { @@ -46,45 +52,102 @@ int main(int argc, char** argv) Core::ArgsParser args_parser; args_parser.add_option(output_buffer, "Output the contents of the buffer (beware of stray zero bytes!)", "output-buffer", 'o'); args_parser.add_option(list_syscalls, "List all existing syscalls", "list-syscalls", 'l'); - args_parser.add_positional_argument(arguments, "Syscall arguments (can be strings, 'buf' for the output buffer, or numbers like 1234 or 0xffffffff)", "syscall-arguments"); + args_parser.add_positional_argument(arguments, "Syscall arguments; can be a string, 'buf' for the output buffer, or numbers like 1234 or 0xffffffff, or a buffer that must begin with '[' and end with ']'. If the first character is ',' (comma), the argument is interpreted as a string, no matter what. This is useful if the string is '[' or '0x0'.", "syscall-arguments"); args_parser.parse(argc, argv); - for (size_t i = 0; i < arguments.size(); i++) { - arg[i] = parse(arguments[i]); + ArgIter iter = arguments.begin(); + for (size_t i = 0; i < SC_NARG && !iter.is_end(); i++) { + arg[i] = parse_from(iter); + } + if (!iter.is_end()) { + fprintf(stderr, "Too many arguments (did you want to use '[ parameter buffers ]'?)\n"); + return -1; } - for (int sc = 0; sc < Syscall::Function::__Count; ++sc) { - if (strcmp(Syscall::to_string((Syscall::Function)sc), (char*)arg[0]) == 0) { - int rc = syscall(sc, arg[1], arg[2], arg[3]); - if (rc == -1) { - perror("syscall"); - } else { - if (output_buffer) - fwrite(buf, 1, sizeof(buf), stdout); + if (arg[0] > Syscall::Function::__Count) { + for (int sc = 0; sc < Syscall::Function::__Count; ++sc) { + if (strcmp(Syscall::to_string((Syscall::Function)sc), (char*)arg[0]) == 0) { + arg[0] = sc; + break; } - - fprintf(stderr, "Syscall return: %d\n", rc); - return 0; + } + if (arg[0] > Syscall::Function::__Count) { + fprintf(stderr, "Invalid syscall entry %s\n", (char*)arg[0]); + return -1; } } - fprintf(stderr, "Invalid syscall entry %s\n", (char*)arg[0]); - return -1; + int rc = syscall(arg[0], arg[1], arg[2], arg[3]); + if (rc == -1) + perror("syscall"); + if (output_buffer) + fwrite(outbuf, 1, sizeof(outbuf), stdout); + + fprintf(stderr, "Syscall return: %d\n", rc); + return 0; +} + +static FlatPtr as_buf(Vector<FlatPtr> params_vec) +{ + size_t params_size = sizeof(FlatPtr) * params_vec.size(); + size_t buf_size = round_up_to_power_of_two(params_size + 1, PAGE_SIZE); + void* buf = mmap(nullptr, buf_size, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE, 0, 0); + if (buf == MAP_FAILED) { + fprintf(stderr, "Warning: Could not allocate buffer of size %zu (low memory?)\n", buf_size); + exit(1); + } + // It's probably good to ensure zero-initialization. + memset(buf, 0, buf_size); + memcpy(buf, params_vec.data(), params_size); + // Leak the buffer here. We need to keep it until the special syscall happens, + // and we terminate immediately afterwards anyway. + return (FlatPtr)buf; } -FlatPtr parse(const char* s) +static FlatPtr parse_parameter_buffer(ArgIter& iter) { - char* t; - FlatPtr l; + Vector<FlatPtr> params_vec; + while (!iter.is_end()) { + if (strcmp(*iter, "]") == 0) { + ++iter; + return as_buf(params_vec); + } - if (strcmp(s, "buf") == 0) { - return (FlatPtr)buf; + params_vec.append(parse_from(iter)); } - l = strtoul(s, &t, 0); - if (t > s && *t == 0) { + fprintf(stderr, "Warning: Treating unmatched ']' as literal string\n"); + exit(1); + ASSERT_NOT_REACHED(); +} + +static FlatPtr parse_from(ArgIter& iter) +{ + const char* this_arg = *iter; + ++iter; + + // Is it a forced literal? + if (this_arg[0] == ',') + return (FlatPtr)(this_arg + 1); + + // Is it the output buffer? + if (strcmp(this_arg, "buf") == 0) + return (FlatPtr)outbuf; + + // Is it a parameter buffer? + if (strcmp(this_arg, "[") == 0) + return parse_parameter_buffer(iter); + + // Is it a number? + char* endptr = nullptr; + FlatPtr l = strtoul(this_arg, &endptr, 0); + if (*endptr == 0) { return l; } - return (FlatPtr)s; + // Then it must be a string: + if (strcmp(this_arg, "]") == 0) + fprintf(stderr, "Warning: Treating unmatched ']' as literal string\n"); + + return (FlatPtr)this_arg; } |