blob: 2bc0e29827f81d5a21d90e225aafdc69445fed75 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
|
/*
* ========================================================
*
* NewOS
* Copyright Mahrouss Logic, all rights reserved.
*
* ========================================================
*/
#include <KernelKit/ProcessScheduler.hpp>
#include <KernelKit/ThreadLocalStorage.hxx>
///! BUGS: 0
/***********************************************************************************/
/// @file ThreadLocalStorage.cxx
/// @brief TLS implementation in kernel.
/***********************************************************************************/
using namespace NewOS;
/**
* Check for cookie inside TIB.
* @param tib the TIB to check.
* @return if the cookie is enabled.
*/
Boolean tls_check_tib(ThreadInformationBlock* tib) {
if (!tib) return false;
Encoder encoder;
const char* tibAsBytes = encoder.AsBytes(tib);
kcout << "NewOS: Checking for a valid cookie...\r\n";
return tibAsBytes[0] == kCookieMag0 && tibAsBytes[1] == kCookieMag1 &&
tibAsBytes[2] == kCookieMag2;
}
/**
* System call implementation of the TLS check.
* @param ptr
* @return
*/
EXTERN_C Void tls_check_syscall_impl(NewOS::HAL::StackFramePtr stackPtr) noexcept {
ThreadInformationBlock* tib = (ThreadInformationBlock*)stackPtr->Gs;
if (!tls_check_tib(tib)) {
kcout << "NewOS: Verification failed, Crashing...\r\n";
ProcessScheduler::Shared().Leak().GetCurrent().Leak().Crash();
}
kcout << "NewOS: Verification succeeded! Keeping on...\r\n";
}
|