7 #define DONT_INCLUDE_SYSCALL_NAMES 1
8 #include "../../Usermode/Libraries/ld-acess.so_src/include_exp/acess/sys.h"
9 #include "../syscalls.h"
14 #define DEBUG(v...) do{if(gbSyscallDebugEnabled)Debug(v);}while(0)
15 #define PAGE_SIZE 4096
17 #define TODO() Warning("TODO: %s", __func__)
19 typedef struct sFILE FILE;
21 extern void exit(int) __attribute__ ((noreturn));
22 extern int printf(const char *, ...);
23 extern int fprintf(FILE *,const char *, ...);
24 extern int sprintf(char *,const char *, ...);
25 extern int vprintf(const char *, va_list);
26 extern int strncmp(const char *, const char *, size_t);
29 extern int giSyscall_ClientID; // Needed for execve
30 extern void _InitSyscalls(void);
31 extern void _CloseSyscalls(void);
33 extern void Warning(const char *Format, ...);
34 extern void Debug(const char *Format, ...);
35 extern int AllocateMemory(uintptr_t VirtAddr, size_t ByteCount);
38 #define NATIVE_FILE_MASK 0x40000000
42 int gbSyscallDebugEnabled = 0;
43 char *gsExecutablePath = "./ld-acess";
47 int acess__SysChdir(const char *Path)
49 return _Syscall(SYS_CHDIR, ">s", Path);
52 int acess__SysOpen(const char *Path, unsigned int Flags)
54 if( strncmp(Path, "$$$$", 4) == 0 )
56 return native_open(Path+4, Flags) | NATIVE_FILE_MASK;
58 if( strncmp(Path, "/Devices/shm/", 13) == 0 )
60 const char* tag = Path + 13;
61 Warning("TODO: Handle open SHM \"%s\"", tag);
62 return native_shm(tag, Flags) | NATIVE_FILE_MASK;
64 SYSTRACE("open(\"%s\", 0x%x)", Path, Flags);
65 return _Syscall(SYS_OPEN, ">s >i", Path, Flags);
68 void acess__SysClose(int FD)
70 if(FD & NATIVE_FILE_MASK) {
71 return native_close(FD & (NATIVE_FILE_MASK-1));
73 SYSTRACE("close(%i)", FD);
74 _Syscall(SYS_CLOSE, ">i", FD);
77 int acess__SysReopen(int FD, const char *Path, int Flags) {
78 SYSTRACE("reopen(0x%x, \"%s\", 0x%x)", FD, Path, Flags);
79 return _Syscall(SYS_REOPEN, ">i >s >i", FD, Path, Flags);
82 int acess__SysCopyFD(int srcfd, int dstfd) {
83 SYSTRACE("_SysCopyFD(%i, %i)", srcfd, dstfd);
84 return _Syscall(SYS_COPYFD, ">i >i", srcfd, dstfd);
87 int acess__SysFDFlags(int fd, int mask, int newflags) {
88 return _Syscall(SYS_FDFLAGS, ">i >i >i", fd, mask, newflags);
91 size_t acess__SysRead(int FD, void *Dest, size_t Bytes) {
92 if(FD & NATIVE_FILE_MASK)
93 return native_read(FD & (NATIVE_FILE_MASK-1), Dest, Bytes);
94 SYSTRACE("_SysRead(0x%x, 0x%x, *%p)", FD, Bytes, Dest);
95 return _Syscall(SYS_READ, ">i >i <d", FD, Bytes, Bytes, Dest);
98 size_t acess__SysWrite(int FD, const void *Src, size_t Bytes) {
99 if(FD & NATIVE_FILE_MASK)
100 return native_write(FD & (NATIVE_FILE_MASK-1), Src, Bytes);
101 SYSTRACE("_SysWrite(0x%x, 0x%x, %p\"%.*s\")", FD, Bytes, Src, Bytes, (char*)Src);
102 return _Syscall(SYS_WRITE, ">i >i >d", FD, Bytes, Bytes, Src);
104 uint64_t acess__SysTruncate(int fd, uint64_t size) {
109 int acess__SysSeek(int FD, int64_t Ofs, int Dir)
111 if(FD & NATIVE_FILE_MASK) {
112 return native_seek(FD & (NATIVE_FILE_MASK-1), Ofs, Dir);
114 SYSTRACE("_SysSeek(0x%x, 0x%llx, %i)", FD, Ofs, Dir);
115 return _Syscall(SYS_SEEK, ">i >I >i", FD, Ofs, Dir);
118 uint64_t acess__SysTell(int FD)
120 if(FD & NATIVE_FILE_MASK)
121 return native_tell( FD & (NATIVE_FILE_MASK-1) );
122 SYSTRACE("_SysTell(0x%x)", FD);
123 return _Syscall(SYS_TELL, ">i", FD);
126 int acess__SysIOCtl(int fd, int id, void *data) {
128 SYSTRACE("_SysIOCtl(%i, %i, %p)", fd, id, data);
129 // NOTE: The length here is hacky and could break
130 len = (data == NULL ? 0 : PAGE_SIZE - ((uintptr_t)data % PAGE_SIZE));
131 return _Syscall(SYS_IOCTL, ">i >i ?d", fd, id, len, data);
133 int acess__SysFInfo(int fd, t_sysFInfo *info, int maxacls) {
134 SYSTRACE("_SysFInfo(%i, %p, %i)", fd, info, maxacls);
135 return _Syscall(SYS_FINFO, ">i <d >i",
137 sizeof(t_sysFInfo)+maxacls*sizeof(t_sysACL), info,
142 int acess__SysReadDir(int fd, char *dest) {
143 SYSTRACE("_SysReadDir(%i, %p)", fd, dest);
144 return _Syscall(SYS_READDIR, ">i <d", fd, 256, dest);
147 int acess__SysSelect(int nfds, fd_set *read, fd_set *write, fd_set *error, int64_t *timeout, uint32_t events)
149 SYSTRACE("_SysSelect(%i, %p, %p, %p, %p, 0x%x)", nfds, read, write, error, timeout, events);
150 return _Syscall(SYS_SELECT, ">i ?d ?d ?d >d >i", nfds,
151 read ? (nfds+7)/8 : 0, read,
152 write ? (nfds+7)/8 : 0, write,
153 error ? (nfds+7)/8 : 0, error,
154 sizeof(*timeout), timeout,
158 int acess__SysMkDir(const char *pathname)
163 int acess__SysUnlink(const char *pathname)
169 void* acess__SysMMap(void *addr, size_t length, unsigned int _flags, int fd, uint64_t offset)
174 int acess__SysMUnMap(void *addr, size_t length)
179 uint64_t acess__SysMarshalFD(int FD)
184 int acess__SysUnMarshalFD(uint64_t Handle)
190 int acess__SysOpenChild(int fd, char *name, int flags) {
191 SYSTRACE("_SysOpenChild(0x%x, '%s', 0x%x)", fd, name, flags);
192 return _Syscall(SYS_OPENCHILD, ">i >s >i", fd, name, flags);
195 int acess__SysGetACL(int fd, t_sysACL *dest) {
196 SYSTRACE("%s(0x%x, %p)", __func__, fd, dest);
197 return _Syscall(SYS_GETACL, ">i <d", fd, sizeof(t_sysACL), dest);
200 int acess__SysMount(const char *Device, const char *Directory, const char *Type, const char *Options) {
201 SYSTRACE("_SysMount('%s', '%s', '%s', '%s')", Device, Directory, Type, Options);
202 return _Syscall(SYS_MOUNT, ">s >s >s >s", Device, Directory, Type, Options);
207 int acess__SysSetFaultHandler(int (*Handler)(int)) {
208 printf("TODO: Set fault handler (asked to set to %p)\n", Handler);
212 void acess__SysSetName(const char *Name)
218 int acess__SysGetName(char *NameDest)
225 int acess__SysSetPri(int Priority)
233 void *acess_SysLoadBin(const char *path, void **entry)
240 int acess__SysUnloadBin(void *base)
248 int acess__SysLoadModule(const char *Path)
254 // --- Timekeeping ---
255 int64_t acess__SysTimestamp(void)
259 // return now()*1000;
263 // --- Memory Management ---
264 uint64_t acess__SysGetPhys(uintptr_t vaddr)
271 uint64_t acess__SysAllocate(uintptr_t vaddr)
273 if( AllocateMemory(vaddr, 0x1000) == -1 ) // Allocate a page
276 return vaddr; // Just ignore the need for paddrs :)
279 // --- Process Management ---
280 int acess__SysClone(int flags, void *stack)
283 Warning("Win32 does not support anything like fork(2), cannot emulate");
286 extern int fork(void);
287 if(flags & CLONE_VM) {
288 int ret, newID, kernel_tid=0;
289 Debug("USERSIDE fork()");
291 newID = _Syscall(SYS_AN_FORK, "<d", sizeof(int), &kernel_tid);
300 giSyscall_ClientID = newID;
305 // Return the acess TID instead
310 Warning("ERROR: Threads currently unsupported\n");
316 int acess__SysKill(int pid, int sig)
318 // TODO: Impliment SysKill
322 int acess__SysExecVE(char *path, char **argv, const char **envp)
326 DEBUG("acess_execve: (path='%s', argv=%p, envp=%p)", path, argv, envp);
328 // Get argument count
329 for( argc = 0; argv[argc]; argc ++ ) ;
330 DEBUG(" acess_execve: argc = %i", argc);
332 const char *new_argv[7+argc+1];
333 char client_id_str[11];
334 char socket_fd_str[11];
335 sprintf(client_id_str, "%i", giSyscall_ClientID);
336 sprintf(socket_fd_str, "%i", gSocket);
337 new_argv[0] = "ld-acess"; // TODO: Get path to ld-acess executable
338 new_argv[1] = "--key"; // Set client ID for Request.c
339 new_argv[2] = client_id_str;
340 new_argv[3] = "--socket"; // Socket
341 new_argv[4] = socket_fd_str;
342 new_argv[5] = "--binary"; // Set the binary path (instead of using argv[0])
344 for( i = 0; i < argc; i ++ ) new_argv[7+i] = argv[i];
345 new_argv[7+i] = NULL;
349 for( i = 0; i < argc; i ++ )
350 printf("\"%s\" ", new_argv[i]);
354 printf("envp = %p\n", envp);
355 for( i = 0; envp[i]; i ++ )
356 printf("%i: \"%s\"\n", i, envp[i]);
357 printf("envc = %i\n", i);
361 // Call actual execve
362 return native_execve("./ld-acess", new_argv, envp);
365 int acess__SysSpawn(const char *binary, const char **argv, const char **envp, int nfd, int fds[], struct s_sys_spawninfo *info)
368 while( argv[argc++] );
370 Debug("_SysSpawn('%s', %p (%i), %p, %i, %p, %p)",
371 binary, argv, argc, envp, nfd, fds, info);
375 newID = _Syscall(SYS_AN_SPAWN, "<d >d >d",
376 sizeof(int), &kernel_tid,
377 nfd*sizeof(int), fds,
378 info ? sizeof(*info) : 0, info);
380 const char *new_argv[5+argc+1];
382 char client_id_str[11];
383 sprintf(client_id_str, "%i", newID);
384 new_argv[new_argc++] = gsExecutablePath; // TODO: Get path to ld-acess executable
385 new_argv[new_argc++] = "--key";
386 new_argv[new_argc++] = client_id_str;
387 new_argv[new_argc++] = "--binary";
388 new_argv[new_argc++] = binary;
389 for( i = 0; argv[i]; i ++)
390 new_argv[new_argc++] = argv[i];
391 new_argv[new_argc++] = NULL;
393 // TODO: Debug output?
395 native_spawn(gsExecutablePath, new_argv, envp);
400 //void acess_sleep(void)
402 // DEBUG("%s()", __func__);
403 // _Syscall(SYS_SLEEP, "");
406 void acess__SysTimedSleep(int64_t Delay)
408 DEBUG("%s(%lli)", __func__, Delay);
409 // Not accurate, but fuck it
410 //if( Delay > 1000 ) sleep(Delay / 1000);
411 //if( Delay % 1000 ) usleep( (Delay % 1000) * 1000 );
412 //_Syscall(SYS_TIMEDSLEEP, ">I", Delay);
415 int acess__SysWaitTID(int TID, int *ExitStatus)
417 DEBUG("%s(%i, %p)", __func__, TID, ExitStatus);
418 return _Syscall(SYS_WAITTID, ">i <d", TID, sizeof(int), &ExitStatus);
421 int acess_setuid(int ID) { return _Syscall(SYS_SETUID, ">i", ID); }
422 int acess_setgid(int ID) { return _Syscall(SYS_SETGID, ">i", ID); }
423 int acess_gettid(void) { return _Syscall(SYS_GETTID, ""); }
424 int acess__SysGetPID(void) { return _Syscall(SYS_GETPID, ""); }
425 int acess__SysGetUID(void) { return _Syscall(SYS_GETUID, ""); }
426 int acess__SysGetGID(void) { return _Syscall(SYS_GETGID, ""); }
427 int acess_getgid(void) { return _Syscall(SYS_GETGID, ""); }
429 int acess__SysSendMessage(int DestTID, int Length, void *Data)
431 DEBUG("%s(%i, 0x%x, %p)", __func__, DestTID, Length, Data);
432 return _Syscall(SYS_SENDMSG, ">i >d", DestTID, Length, Data);
435 int acess__SysGetMessage(int *SourceTID, int BufLen, void *Data)
437 DEBUG("%s(%p, %p)", __func__, SourceTID, Data);
438 return _Syscall(SYS_GETMSG, "<d <d",
439 SourceTID ? sizeof(uint32_t) : 0, SourceTID,
444 int acess__SysWaitEvent(int Mask)
446 DEBUG("%s(%x)", __func__, Mask);
447 return _Syscall(SYS_WAITEVENT, ">i", Mask);
451 static void int_dbgheader(void )
453 printf("[_SysDebug %i] ", giSyscall_ClientID);
455 void acess__SysDebug(const char *Format, ...)
459 va_start(args, Format);
461 vprintf(Format, args);
467 void acess__SysDebugHex(const char *tag, const void *data, size_t size)
470 printf("%s (Hexdump of %p+%zi)\r\n", tag, data, size);
472 #define CH(n) ((' '<=cdat[(n)]&&cdat[(n)]<0x7F) ? cdat[(n)] : '.')
474 const uint8_t *cdat = data;
475 unsigned int pos = 0;
481 " %02x %02x %02x %02x %02x %02x %02x %02x "
482 " %02x %02x %02x %02x %02x %02x %02x %02x "
483 " %c%c%c%c%c%c%c%c %c%c%c%c%c%c%c%c\r\n",
485 cdat[ 0], cdat[ 1], cdat[ 2], cdat[ 3], cdat[ 4], cdat[ 5], cdat[ 6], cdat[ 7],
486 cdat[ 8], cdat[ 9], cdat[10], cdat[11], cdat[12], cdat[13], cdat[14], cdat[15],
487 CH(0), CH(1), CH(2), CH(3), CH(4), CH(5), CH(6), CH(7),
488 CH(8), CH(9), CH(10), CH(11), CH(12), CH(13), CH(14), CH(15)
497 printf("%04x: ", pos);
498 for(int i = 0; i < size; i ++)
499 printf("%02x ", cdat[i]);
500 for(int i = size; i < 16; i ++)
503 for(int i = 0; i < size; i ++)
514 void acess__exit(int Status)
516 DEBUG("_exit(%i)", Status);
517 _Syscall(SYS_EXIT, ">i", Status);
521 uint32_t acess__SysSetMemFlags(uintptr_t vaddr, uint32_t flags, uint32_t mask)
523 // TODO: Impliment acess__SysSetMemFlags?
528 // === Symbol List ===
530 # define DEFSYM(name) {#name, &acess_##name}
532 const tSym caBuiltinSymbols[] = {
537 DEFSYM(_SysOpenChild),
566 DEFSYM(_SysSendMessage),
567 DEFSYM(_SysGetMessage),
569 DEFSYM(_SysAllocate),
570 DEFSYM(_SysSetMemFlags),
572 {"_ZN4_sys5debugEPKcz", &acess__SysDebug},
573 DEFSYM(_SysDebugHex),
574 {"_ZN4_sys7hexdumpEPKcPKvj", &acess__SysDebugHex},
575 DEFSYM(_SysSetFaultHandler),
576 DEFSYM(_SysWaitEvent),
581 const int ciNumBuiltinSymbols = sizeof(caBuiltinSymbols)/sizeof(caBuiltinSymbols[0]);