blob: e23da9792323edcff5806e554037435454b3868c [file] [log] [blame]
// Copyright 2016 The Fuchsia Authors
//
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file or at
// https://opensource.org/licenses/MIT
#include <assert.h>
#include <err.h>
#include <inttypes.h>
#include <platform.h>
#include <trace.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <kernel/cmdline.h>
#include <lib/console.h>
#include <lib/counters.h>
#include <lib/elf-psabi/sp.h>
#include <lib/vdso.h>
#include <lk/init.h>
#include <mexec.h>
#include <object/channel_dispatcher.h>
#include <object/handle.h>
#include <object/job_dispatcher.h>
#include <object/message_packet.h>
#include <object/process_dispatcher.h>
#include <object/resource_dispatcher.h>
#include <object/thread_dispatcher.h>
#include <object/vm_address_region_dispatcher.h>
#include <object/vm_object_dispatcher.h>
#include <vm/vm_object_paged.h>
#include <lib/zircon-internal/default_stack_size.h>
#include <zircon/processargs.h>
#if ENABLE_ENTROPY_COLLECTOR_TEST
#include <lib/crypto/entropy/quality_test.h>
#endif
static const size_t stack_size = ZIRCON_DEFAULT_STACK_SIZE;
#define STACK_VMO_NAME "userboot-initial-stack"
#define RAMDISK_VMO_NAME "userboot-raw-ramdisk"
#define CRASHLOG_VMO_NAME "crashlog"
namespace {
#include "userboot-code.h"
// This is defined in assembly by userboot-image.S; userboot-code.h
// gives details about the image's size and layout.
extern "C" const char userboot_image[];
KCOUNTER(init_time, "init.userboot.time.msec")
class UserbootImage : private RoDso {
public:
explicit UserbootImage(const VDso* vdso)
: RoDso("userboot", userboot_image,
USERBOOT_CODE_END, USERBOOT_CODE_START),
vdso_(vdso) {}
// The whole userboot image consists of the userboot rodso image
// immediately followed by the vDSO image. This returns the size
// of that combined image.
size_t size() const {
return RoDso::size() + vdso_->size();
}
zx_status_t Map(fbl::RefPtr<VmAddressRegionDispatcher> root_vmar,
uintptr_t* vdso_base, uintptr_t* entry) {
// Create a VMAR (placed anywhere) to hold the combined image.
KernelHandle<VmAddressRegionDispatcher> vmar_handle;
zx_rights_t vmar_rights;
zx_status_t status = root_vmar->Allocate(0, size(),
ZX_VM_CAN_MAP_READ |
ZX_VM_CAN_MAP_WRITE |
ZX_VM_CAN_MAP_EXECUTE |
ZX_VM_CAN_MAP_SPECIFIC,
&vmar_handle, &vmar_rights);
if (status != ZX_OK)
return status;
// Map userboot proper.
status = RoDso::Map(vmar_handle.dispatcher(), 0);
if (status == ZX_OK) {
*entry = vmar_handle.dispatcher()->vmar()->base() + USERBOOT_ENTRY;
// Map the vDSO right after it.
*vdso_base = vmar_handle.dispatcher()->vmar()->base() + RoDso::size();
// Releasing |vmar_handle| is safe because it has a no-op
// on_zero_handles(), otherwise the mapping routines would have
// to take ownership of the handle and manage its lifecycle.
status = vdso_->Map(vmar_handle.release(), RoDso::size());
}
return status;
}
private:
const VDso* vdso_;
};
// Keep a global reference to the kcounters vmo so that the kcounters
// memory always remains valid, even if userspace closes the last handle.
static fbl::RefPtr<VmObject> kcounters_vmo_ref;
} // anonymous namespace
// Get a handle to a VM object, with full rights except perhaps for writing.
static zx_status_t get_vmo_handle(fbl::RefPtr<VmObject> vmo, bool readonly,
fbl::RefPtr<VmObjectDispatcher>* disp_ptr,
Handle** ptr) {
if (!vmo)
return ZX_ERR_NO_MEMORY;
zx_rights_t rights;
fbl::RefPtr<Dispatcher> dispatcher;
zx_status_t result = VmObjectDispatcher::Create(
ktl::move(vmo), &dispatcher, &rights);
if (result == ZX_OK) {
if (disp_ptr)
*disp_ptr = fbl::RefPtr<VmObjectDispatcher>::Downcast(dispatcher);
if (readonly)
rights &= ~ZX_RIGHT_WRITE;
if (ptr)
*ptr = Handle::Make(ktl::move(dispatcher), rights).release();
}
return result;
}
static zx_status_t get_job_handle(Handle** ptr) {
zx_rights_t rights;
KernelHandle<JobDispatcher> handle;
zx_status_t result = JobDispatcher::Create(0u, GetRootJobDispatcher(), &handle, &rights);
if (result != ZX_OK)
return result;
HandleOwner handle_owner = Handle::Make(ktl::move(handle), rights);
if (!handle_owner)
return ZX_ERR_NO_MEMORY;
*ptr = handle_owner.release();
return ZX_OK;
}
static zx_status_t get_resource_handle(Handle** ptr) {
zx_rights_t rights;
KernelHandle<ResourceDispatcher> root;
zx_status_t result = ResourceDispatcher::Create(&root, &rights, ZX_RSRC_KIND_ROOT, 0, 0, 0,
"root");
if (result != ZX_OK)
return result;
HandleOwner handle_owner = Handle::Make(ktl::move(root), rights);
if (!handle_owner)
return ZX_ERR_NO_MEMORY;
*ptr = handle_owner.release();
return result;
}
// Create a channel and write the bootstrap message down one side of
// it, returning the handle to the other side.
static zx_status_t make_bootstrap_channel(
fbl::RefPtr<ProcessDispatcher> process,
MessagePacketPtr msg,
zx_handle_t* out) {
HandleOwner user_handle_owner;
KernelHandle<ChannelDispatcher> kernel_handle;
*out = ZX_HANDLE_INVALID;
{
KernelHandle<ChannelDispatcher> user_handle;
zx_rights_t rights;
zx_status_t status = ChannelDispatcher::Create(&user_handle, &kernel_handle, &rights);
if (status != ZX_OK)
return status;
user_handle_owner = Handle::Make(ktl::move(user_handle), rights);
if (!user_handle_owner)
return ZX_ERR_NO_MEMORY;
}
// Here it goes!
zx_status_t status = kernel_handle.dispatcher()->Write(ZX_KOID_INVALID, ktl::move(msg));
if (status != ZX_OK)
return status;
zx_handle_t hv = process->MapHandleToValue(user_handle_owner);
process->AddHandle(ktl::move(user_handle_owner));
*out = hv;
return ZX_OK;
}
enum bootstrap_handle_index {
BOOTSTRAP_VDSO,
BOOTSTRAP_VDSO_LAST_VARIANT = BOOTSTRAP_VDSO + VDso::variants() - 1,
BOOTSTRAP_RAMDISK,
BOOTSTRAP_RESOURCE_ROOT,
BOOTSTRAP_STACK,
BOOTSTRAP_PROC,
BOOTSTRAP_THREAD,
BOOTSTRAP_JOB,
BOOTSTRAP_VMAR_ROOT,
BOOTSTRAP_CRASHLOG,
#if ENABLE_ENTROPY_COLLECTOR_TEST
BOOTSTRAP_ENTROPY_FILE,
#endif
BOOTSTRAP_KCOUNTDESC,
BOOTSTRAP_KCOUNTERS,
BOOTSTRAP_HANDLES
};
struct bootstrap_message {
zx_proc_args_t header;
uint32_t handle_info[BOOTSTRAP_HANDLES];
char cmdline[CMDLINE_MAX];
};
static MessagePacketPtr prepare_bootstrap_message() {
const size_t data_size =
offsetof(struct bootstrap_message, cmdline) +
__kernel_cmdline_size;
bootstrap_message* msg =
static_cast<bootstrap_message*>(malloc(data_size));
if (msg == nullptr) {
return nullptr;
}
memset(&msg->header, 0, sizeof(msg->header));
msg->header.protocol = ZX_PROCARGS_PROTOCOL;
msg->header.version = ZX_PROCARGS_VERSION;
msg->header.environ_off = offsetof(struct bootstrap_message, cmdline);
msg->header.environ_num = static_cast<uint32_t>(__kernel_cmdline_count);
msg->header.handle_info_off =
offsetof(struct bootstrap_message, handle_info);
// Note indices for PA_VMO_KERNEL_FILE must be densely-packed since bootsvc
// just iterates up from 0 seeing if that info value is in the list, rather
// than iterating over the list checking for PA_VMO_KERNEL_FILE with any
// index. The index is not otherwise meaningful: the VMO name identifies
// the kernel file being exported.
int kernel_file_idx = 0;
for (int i = 0; i < BOOTSTRAP_HANDLES; ++i) {
uint32_t info = 0;
switch (static_cast<bootstrap_handle_index>(i)) {
case BOOTSTRAP_VDSO ... BOOTSTRAP_VDSO_LAST_VARIANT:
info = PA_HND(PA_VMO_VDSO, i - BOOTSTRAP_VDSO);
break;
case BOOTSTRAP_RAMDISK:
info = PA_HND(PA_VMO_BOOTDATA, 0);
break;
case BOOTSTRAP_RESOURCE_ROOT:
info = PA_HND(PA_RESOURCE, 0);
break;
case BOOTSTRAP_STACK:
info = PA_HND(PA_VMO_STACK, 0);
break;
case BOOTSTRAP_PROC:
info = PA_HND(PA_PROC_SELF, 0);
break;
case BOOTSTRAP_THREAD:
info = PA_HND(PA_THREAD_SELF, 0);
break;
case BOOTSTRAP_JOB:
info = PA_HND(PA_JOB_DEFAULT, 0);
break;
case BOOTSTRAP_VMAR_ROOT:
info = PA_HND(PA_VMAR_ROOT, 0);
break;
case BOOTSTRAP_CRASHLOG:
#if ENABLE_ENTROPY_COLLECTOR_TEST
case BOOTSTRAP_ENTROPY_FILE:
#endif
case BOOTSTRAP_KCOUNTDESC:
case BOOTSTRAP_KCOUNTERS:
info = PA_HND(PA_VMO_KERNEL_FILE, kernel_file_idx++);
break;
case BOOTSTRAP_HANDLES:
__builtin_unreachable();
}
msg->handle_info[i] = info;
}
memcpy(msg->cmdline, __kernel_cmdline, __kernel_cmdline_size);
MessagePacketPtr packet;
uint32_t num_handles = BOOTSTRAP_HANDLES;
zx_status_t status =
MessagePacket::Create(msg, static_cast<uint32_t>(data_size), num_handles, &packet);
free(msg);
if (status != ZX_OK) {
return nullptr;
}
return packet;
}
static void clog_to_vmo(const void* data, size_t off, size_t len, void* cookie) {
VmObject* vmo = static_cast<VmObject*>(cookie);
vmo->Write(data, off, len);
}
// Converts platform crashlog into a VMO
static zx_status_t crashlog_to_vmo(fbl::RefPtr<VmObject>* out) {
size_t size = platform_recover_crashlog(0, NULL, NULL);
fbl::RefPtr<VmObject> crashlog_vmo;
zx_status_t status = VmObjectPaged::Create(PMM_ALLOC_FLAG_ANY, 0u, size, &crashlog_vmo);
if (status != ZX_OK) {
return status;
}
platform_recover_crashlog(size, crashlog_vmo.get(), clog_to_vmo);
crashlog_vmo->set_name(CRASHLOG_VMO_NAME, sizeof(CRASHLOG_VMO_NAME) - 1);
mexec_stash_crashlog(crashlog_vmo);
*out = ktl::move(crashlog_vmo);
return ZX_OK;
}
static zx_status_t attempt_userboot() {
size_t rsize;
void* rbase = platform_get_ramdisk(&rsize);
if (rbase)
dprintf(INFO, "userboot: ramdisk %#15zx @ %p\n", rsize, rbase);
fbl::RefPtr<VmObject> stack_vmo;
zx_status_t status = VmObjectPaged::Create(PMM_ALLOC_FLAG_ANY, 0u, stack_size, &stack_vmo);
if (status != ZX_OK)
return status;
stack_vmo->set_name(STACK_VMO_NAME, sizeof(STACK_VMO_NAME) - 1);
fbl::RefPtr<VmObject> rootfs_vmo;
status = VmObjectPaged::CreateFromWiredPages(rbase, rsize, true, &rootfs_vmo);
if (status != ZX_OK)
return status;
rootfs_vmo->set_name(RAMDISK_VMO_NAME, sizeof(RAMDISK_VMO_NAME) - 1);
fbl::RefPtr<VmObject> crashlog_vmo;
status = crashlog_to_vmo(&crashlog_vmo);
if (status != ZX_OK)
return status;
// Prepare the bootstrap message packet. This puts its data (the
// kernel command line) in place, and allocates space for its handles.
// We'll fill in the handles as we create things.
MessagePacketPtr msg = prepare_bootstrap_message();
if (!msg)
return ZX_ERR_NO_MEMORY;
Handle** const handles = msg->mutable_handles();
DEBUG_ASSERT(msg->num_handles() == BOOTSTRAP_HANDLES);
status = get_vmo_handle(rootfs_vmo, false, nullptr,
&handles[BOOTSTRAP_RAMDISK]);
fbl::RefPtr<VmObjectDispatcher> stack_vmo_dispatcher;
if (status == ZX_OK)
status = get_vmo_handle(stack_vmo, false, &stack_vmo_dispatcher,
&handles[BOOTSTRAP_STACK]);
if (status == ZX_OK)
status = get_vmo_handle(crashlog_vmo, true, nullptr,
&handles[BOOTSTRAP_CRASHLOG]);
if (status == ZX_OK)
status = get_resource_handle(&handles[BOOTSTRAP_RESOURCE_ROOT]);
if (status == ZX_OK)
status = get_job_handle(&handles[BOOTSTRAP_JOB]);
#if ENABLE_ENTROPY_COLLECTOR_TEST
if (status == ZX_OK) {
if (crypto::entropy::entropy_was_lost) {
status = ZX_ERR_INTERNAL;
} else {
status = get_vmo_handle(
crypto::entropy::entropy_vmo,
/* readonly */ true, /* disp_ptr */ nullptr,
&handles[BOOTSTRAP_ENTROPY_FILE]);
}
}
#endif
if (status != ZX_OK)
return status;
fbl::RefPtr<VmObject> kcountdesc_vmo;
status = VmObjectPaged::CreateFromWiredPages(CounterDesc().VmoData(),
CounterDesc().VmoDataSize(),
true, &kcountdesc_vmo);
if (status != ZX_OK) {
return status;
}
kcountdesc_vmo->set_name(counters::DescriptorVmo::kVmoName,
sizeof(counters::DescriptorVmo::kVmoName) - 1);
status = get_vmo_handle(ktl::move(kcountdesc_vmo), true, nullptr,
&handles[BOOTSTRAP_KCOUNTDESC]);
if (status != ZX_OK) {
return status;
}
fbl::RefPtr<VmObject> kcounters_vmo;
status = VmObjectPaged::CreateFromWiredPages(CounterArena().VmoData(),
CounterArena().VmoDataSize(),
false, &kcounters_vmo);
if (status != ZX_OK) {
return status;
}
kcounters_vmo_ref = kcounters_vmo;
kcounters_vmo->set_name(counters::kArenaVmoName,
sizeof(counters::kArenaVmoName) - 1);
status = get_vmo_handle(ktl::move(kcounters_vmo), true, nullptr,
&handles[BOOTSTRAP_KCOUNTERS]);
if (status != ZX_OK) {
return status;
}
KernelHandle<ProcessDispatcher> process_handle;
KernelHandle<VmAddressRegionDispatcher> vmar_handle;
zx_rights_t rights, vmar_rights;
status = ProcessDispatcher::Create(GetRootJobDispatcher(), "userboot", 0,
&process_handle, &rights,
&vmar_handle, &vmar_rights);
if (status != ZX_OK)
return status;
auto proc = process_handle.dispatcher();
HandleOwner process_handle_owner = Handle::Make(ktl::move(process_handle), rights);
if (!process_handle_owner)
return ZX_ERR_NO_MEMORY;
handles[BOOTSTRAP_PROC] = process_handle_owner.release();
auto vmar = vmar_handle.dispatcher();
HandleOwner vmar_handle_owner = Handle::Make(ktl::move(vmar_handle), vmar_rights);
if (!vmar_handle_owner)
return ZX_ERR_NO_MEMORY;
handles[BOOTSTRAP_VMAR_ROOT] = vmar_handle_owner.release();
const VDso* vdso = VDso::Create();
for (size_t i = BOOTSTRAP_VDSO; i <= BOOTSTRAP_VDSO_LAST_VARIANT; ++i) {
HandleOwner vmo_handle =
vdso->vmo_handle(static_cast<VDso::Variant>(i - BOOTSTRAP_VDSO));
handles[i] = vmo_handle.release();
}
UserbootImage userboot(vdso);
uintptr_t vdso_base = 0;
uintptr_t entry = 0;
status = userboot.Map(vmar, &vdso_base, &entry);
if (status != ZX_OK)
return status;
// Map the stack anywhere.
fbl::RefPtr<VmMapping> stack_mapping;
status = vmar->Map(0,
ktl::move(stack_vmo), 0, stack_size,
ZX_VM_PERM_READ | ZX_VM_PERM_WRITE,
&stack_mapping);
if (status != ZX_OK)
return status;
uintptr_t stack_base = stack_mapping->base();
uintptr_t sp = compute_initial_stack_pointer(stack_base, stack_size);
// Create the user thread and stash its handle for the bootstrap message.
fbl::RefPtr<ThreadDispatcher> thread;
{
KernelHandle<ThreadDispatcher> thread_handle;
// Make a copy of proc, as we need to a keep a copy to pass over
// the bootstrap channel below.
status = ThreadDispatcher::Create(proc, 0, "userboot", &thread_handle, &rights);
if (status != ZX_OK)
return status;
thread = thread_handle.dispatcher();
HandleOwner thread_handle_owner = Handle::Make(ktl::move(thread_handle), rights);
if (!thread_handle_owner)
return ZX_ERR_NO_MEMORY;
handles[BOOTSTRAP_THREAD] = thread_handle_owner.release();
}
DEBUG_ASSERT(thread);
// All the handles are in place, so we can send the bootstrap message.
zx_handle_t hv;
status = make_bootstrap_channel(ktl::move(proc), ktl::move(msg), &hv);
if (status != ZX_OK)
return status;
dprintf(SPEW, "userboot: %-23s @ %#" PRIxPTR "\n", "entry point", entry);
// Start the process's initial thread.
status = thread->Start(
ThreadDispatcher::EntryState{entry, sp, static_cast<uintptr_t>(hv), vdso_base},
/* initial_thread= */ true);
if (status != ZX_OK) {
printf("userboot: failed to start initial thread: %d\n", status);
return status;
}
init_time.Add(current_time() / 1000000LL);
return ZX_OK;
}
void userboot_init(uint level) {
attempt_userboot();
}
LK_INIT_HOOK(userboot, userboot_init, LK_INIT_LEVEL_USER)