| // Copyright 2016 The Fuchsia Authors |
| // |
| // Use of this source code is governed by a MIT-style |
| // license that can be found in the LICENSE file or at |
| // https://opensource.org/licenses/MIT |
| |
| #include <inttypes.h> |
| #include <lib/boot-options/boot-options.h> |
| #include <lib/console.h> |
| #include <lib/counters.h> |
| #include <lib/crashlog.h> |
| #include <lib/elfldltl/machine.h> |
| #include <lib/instrumentation/vmo.h> |
| #include <lib/userabi/rodso.h> |
| #include <lib/userabi/userboot.h> |
| #include <lib/userabi/userboot_internal.h> |
| #include <lib/userabi/vdso.h> |
| #include <lib/zircon-internal/default_stack_size.h> |
| #include <platform.h> |
| #include <stdio.h> |
| #include <trace.h> |
| #include <zircon/errors.h> |
| #include <zircon/types.h> |
| |
| #include <ktl/algorithm.h> |
| #include <lk/init.h> |
| #include <object/channel_dispatcher.h> |
| #include <object/handle.h> |
| #include <object/job_dispatcher.h> |
| #include <object/message_packet.h> |
| #include <object/process_dispatcher.h> |
| #include <object/thread_dispatcher.h> |
| #include <object/vm_address_region_dispatcher.h> |
| #include <object/vm_object_dispatcher.h> |
| #include <phys/handoff.h> |
| #include <platform/crashlog.h> |
| #include <vm/vm_object_paged.h> |
| |
| #if ENABLE_ENTROPY_COLLECTOR_TEST |
| #include <lib/crypto/entropy/quality_test.h> |
| #endif |
| |
| #include <ktl/enforce.h> |
| |
| namespace { |
| |
| class VmoBuffer { |
| public: |
| explicit VmoBuffer(fbl::RefPtr<VmObjectPaged> vmo) : size_(vmo->size()), vmo_(ktl::move(vmo)) {} |
| |
| explicit VmoBuffer(size_t size = PAGE_SIZE, uint32_t options = VmObjectPaged::kResizable) { |
| zx_status_t status = VmObjectPaged::Create(PMM_ALLOC_FLAG_ANY, options, size, &vmo_); |
| ZX_ASSERT(status == ZX_OK); |
| size_ = vmo_->size(); |
| } |
| |
| int Write(const ktl::string_view str) { |
| // Enlarge the VMO as needed if it was created as resizable. |
| if (str.size() > size_ - offset_ && vmo_->is_resizable()) { |
| DEBUG_ASSERT(vmo_->size() < offset_ + str.size()); |
| size_t minimum_size = offset_ + str.size(); |
| size_t page_aligned_size = fbl::round_up(minimum_size, size_t{PAGE_SIZE}); |
| zx_status_t status = vmo_->Resize(page_aligned_size); |
| if (status == ZX_OK) { |
| // Update unlocked cache of the size. |
| size_ = vmo_->size(); |
| } else if (offset_ == size_) { |
| // None left to write without the resize. |
| // Otherwise proceed to write what can be written. |
| return static_cast<int>(status); |
| } |
| } |
| |
| const size_t todo = ktl::min(str.size(), size_ - offset_); |
| |
| if (zx_status_t res = vmo_->Write(str.data(), offset_, todo); res != ZX_OK) { |
| DEBUG_ASSERT(static_cast<int>(res) < 0); |
| return res; |
| } |
| |
| offset_ += todo; |
| DEBUG_ASSERT(todo <= ktl::numeric_limits<int>::max()); |
| return static_cast<int>(todo); |
| } |
| |
| const fbl::RefPtr<VmObjectPaged>& vmo() const { return vmo_; } |
| |
| size_t content_size() const { return offset_; } |
| |
| private: |
| size_t offset_{0}; |
| size_t size_; |
| fbl::RefPtr<VmObjectPaged> vmo_; |
| }; |
| |
| constexpr const char kStackVmoName[] = "userboot-initial-stack"; |
| constexpr const char kCrashlogVmoName[] = "crashlog"; |
| constexpr const char kBootOptionsVmoname[] = "boot-options.txt"; |
| |
| constexpr size_t stack_size = ZIRCON_DEFAULT_STACK_SIZE; |
| |
| #include "userboot-code.h" |
| |
| KCOUNTER(timeline_userboot, "boot.timeline.userboot") |
| KCOUNTER(init_time, "init.userboot.time.msec") |
| |
| class UserbootImage : private RoDso { |
| public: |
| UserbootImage(fbl::RefPtr<VmObject> vmo, const VDso* vdso) |
| : RoDso(ktl::move(vmo), USERBOOT_CODE_END, USERBOOT_CODE_START), vdso_(vdso) {} |
| |
| // The whole userboot image consists of the userboot rodso image |
| // immediately followed by the vDSO image. This returns the size |
| // of that combined image. |
| size_t size() const { return RoDso::size() + vdso_->size(); } |
| |
| zx_status_t Map(fbl::RefPtr<VmAddressRegionDispatcher> root_vmar, uintptr_t* vdso_base, |
| uintptr_t* entry) { |
| // Create a VMAR (placed anywhere) to hold the combined image. |
| KernelHandle<VmAddressRegionDispatcher> vmar_handle; |
| zx_rights_t vmar_rights; |
| zx_status_t status = root_vmar->Allocate( |
| 0, size(), |
| ZX_VM_CAN_MAP_READ | ZX_VM_CAN_MAP_WRITE | ZX_VM_CAN_MAP_EXECUTE | ZX_VM_CAN_MAP_SPECIFIC, |
| &vmar_handle, &vmar_rights); |
| if (status != ZX_OK) |
| return status; |
| |
| // Map userboot proper. |
| status = RoDso::Map(vmar_handle.dispatcher(), 0); |
| if (status == ZX_OK) { |
| *entry = vmar_handle.dispatcher()->vmar()->base() + USERBOOT_ENTRY; |
| |
| // Map the vDSO right after it. |
| *vdso_base = vmar_handle.dispatcher()->vmar()->base() + RoDso::size(); |
| |
| // Releasing |vmar_handle| is safe because it has a no-op |
| // on_zero_handles(), otherwise the mapping routines would have |
| // to take ownership of the handle and manage its lifecycle. |
| status = vdso_->Map(vmar_handle.release(), RoDso::size()); |
| } |
| return status; |
| } |
| |
| private: |
| const VDso* vdso_; |
| }; |
| |
| // Keep a global reference to the kcounters vmo so that the kcounters |
| // memory always remains valid, even if userspace closes the last handle. |
| fbl::RefPtr<VmObject> kcounters_vmo_ref; |
| |
| // Get a handle to a VM object, with full rights except perhaps for writing. |
| zx_status_t get_vmo_handle(fbl::RefPtr<VmObject> vmo, bool readonly, uint64_t content_size, |
| fbl::RefPtr<VmObjectDispatcher>* disp_ptr, Handle** ptr) { |
| if (!vmo) |
| return ZX_ERR_NO_MEMORY; |
| |
| zx_rights_t rights; |
| KernelHandle<VmObjectDispatcher> vmo_kernel_handle; |
| zx_status_t result = VmObjectDispatcher::Create(ktl::move(vmo), content_size, |
| VmObjectDispatcher::InitialMutability::kMutable, |
| &vmo_kernel_handle, &rights); |
| if (result == ZX_OK) { |
| if (disp_ptr) |
| *disp_ptr = vmo_kernel_handle.dispatcher(); |
| if (readonly) |
| rights &= ~ZX_RIGHT_WRITE; |
| if (ptr) |
| *ptr = Handle::Make(ktl::move(vmo_kernel_handle), rights).release(); |
| } |
| return result; |
| } |
| |
| HandleOwner get_job_handle() { |
| return Handle::Dup(GetRootJobHandle(), JobDispatcher::default_rights()); |
| } |
| |
| // Converts platform crashlog into a VMO |
| zx_status_t crashlog_to_vmo(fbl::RefPtr<VmObject>* out, size_t* out_size) { |
| PlatformCrashlog::Interface& crashlog = PlatformCrashlog::Get(); |
| |
| size_t size = crashlog.Recover(nullptr); |
| fbl::RefPtr<VmObjectPaged> crashlog_vmo; |
| size_t aligned_size; |
| zx_status_t status = VmObject::RoundSize(size, &aligned_size); |
| if (status != ZX_OK) { |
| return status; |
| } |
| status = VmObjectPaged::Create(PMM_ALLOC_FLAG_ANY, 0u, aligned_size, &crashlog_vmo); |
| |
| if (status != ZX_OK) { |
| return status; |
| } |
| |
| if (size) { |
| VmoBuffer vmo_buffer{crashlog_vmo}; |
| FILE vmo_file = FILE{&vmo_buffer}; |
| crashlog.Recover(&vmo_file); |
| } |
| |
| crashlog_vmo->set_name(kCrashlogVmoName, sizeof(kCrashlogVmoName) - 1); |
| |
| // Stash the recovered crashlog so that it may be propagated to the next |
| // kernel instance in case we later mexec. |
| crashlog_stash(crashlog_vmo); |
| |
| *out = ktl::move(crashlog_vmo); |
| *out_size = size; |
| |
| // Now that we have recovered the old crashlog, enable crashlog uptime |
| // updates. This will cause systems with a RAM based crashlog to periodically |
| // create a payload-less crashlog indicating a SW reboot reason of "unknown" |
| // along with an uptime indicator. If the system spontaneously reboots (due |
| // to something like a WDT, or brownout) we will be able to recover this log |
| // and know that we spontaneously rebooted, and have some idea of how long we |
| // were running before we did. |
| crashlog.EnableCrashlogUptimeUpdates(true); |
| return ZX_OK; |
| } |
| |
| UserbootImage bootstrap_vmos(ktl::span<Handle*, userboot::kHandleCount> handles) { |
| // The instrumentation VMOs need to be created prior to the rootfs as the information for these |
| // vmos is in the phys handoff region, which becomes inaccessible once the rootfs is created. |
| zx_status_t status = InstrumentationData::GetVmos(&handles[userboot::kFirstInstrumentationData]); |
| ASSERT(status == ZX_OK); |
| |
| HandoffEnd end = EndHandoff(); |
| |
| for (size_t i = 0; i < PhysVmo::kMaxExtraHandoffPhysVmos; ++i) { |
| handles[userboot::kFirstExtraPhysVmo + i] = end.extra_phys_vmos[i].release(); |
| } |
| |
| handles[userboot::kZbi] = end.zbi.release(); |
| |
| KernelHandle<VmObjectDispatcher> vdso_kernel_handles[userboot::kNumVdsoVariants]; |
| KernelHandle<VmObjectDispatcher> time_values_handle; |
| const VDso* vdso = |
| VDso::Create(ktl::move(end.vdso), ktl::span{vdso_kernel_handles}, &time_values_handle); |
| handles[userboot::kTimeValues] = |
| Handle::Make(ktl::move(time_values_handle), (vdso->vmo_rights() & (~ZX_RIGHT_EXECUTE))) |
| .release(); |
| ASSERT(handles[userboot::kTimeValues]); |
| for (size_t i = 0; i < userboot::kNumVdsoVariants; ++i) { |
| handles[userboot::kFirstVdso + i] = |
| Handle::Make(ktl::move(vdso_kernel_handles[i]), vdso->vmo_rights()).release(); |
| ASSERT(handles[userboot::kFirstVdso + i]); |
| } |
| DEBUG_ASSERT(handles[userboot::kFirstVdso + 1]->dispatcher() == vdso->dispatcher()); |
| if (gBootOptions->always_use_next_vdso) { |
| ktl::swap(handles[userboot::kFirstVdso], handles[userboot::kFirstVdso + 1]); |
| } |
| |
| // Crashlog. |
| fbl::RefPtr<VmObject> crashlog_vmo; |
| size_t crashlog_size = 0; |
| status = crashlog_to_vmo(&crashlog_vmo, &crashlog_size); |
| ASSERT(status == ZX_OK); |
| status = |
| get_vmo_handle(crashlog_vmo, true, crashlog_size, nullptr, &handles[userboot::kCrashlog]); |
| ASSERT(status == ZX_OK); |
| |
| // Boot options. |
| { |
| VmoBuffer boot_options; |
| FILE boot_options_file{&boot_options}; |
| gBootOptions->Show(/*defaults=*/false, &boot_options_file); |
| boot_options.vmo()->set_name(kBootOptionsVmoname, sizeof(kBootOptionsVmoname) - 1); |
| status = get_vmo_handle(boot_options.vmo(), false, boot_options.content_size(), nullptr, |
| &handles[userboot::kBootOptions]); |
| ZX_ASSERT(status == ZX_OK); |
| } |
| |
| #if ENABLE_ENTROPY_COLLECTOR_TEST |
| ASSERT(!crypto::entropy::entropy_was_lost); |
| status = |
| get_vmo_handle(crypto::entropy::entropy_vmo, true, crypto::entropy::entropy_vmo_content_size, |
| nullptr, &handles[kEntropyTestData]); |
| ASSERT(status == ZX_OK); |
| #endif |
| |
| // kcounters names table. |
| fbl::RefPtr<VmObjectPaged> kcountdesc_vmo; |
| status = VmObjectPaged::CreateFromWiredPages(CounterDesc().VmoData(), CounterDesc().VmoDataSize(), |
| true, &kcountdesc_vmo); |
| ASSERT(status == ZX_OK); |
| kcountdesc_vmo->set_name(counters::DescriptorVmo::kVmoName, |
| sizeof(counters::DescriptorVmo::kVmoName) - 1); |
| status = get_vmo_handle(ktl::move(kcountdesc_vmo), true, CounterDesc().VmoContentSize(), nullptr, |
| &handles[userboot::kCounterNames]); |
| ASSERT(status == ZX_OK); |
| |
| // kcounters live data. |
| fbl::RefPtr<VmObjectPaged> kcounters_vmo; |
| status = VmObjectPaged::CreateFromWiredPages(CounterArena().VmoData(), |
| CounterArena().VmoDataSize(), false, &kcounters_vmo); |
| ASSERT(status == ZX_OK); |
| kcounters_vmo_ref = kcounters_vmo; |
| kcounters_vmo->set_name(counters::kArenaVmoName, sizeof(counters::kArenaVmoName) - 1); |
| status = get_vmo_handle(ktl::move(kcounters_vmo), true, CounterArena().VmoContentSize(), nullptr, |
| &handles[userboot::kCounters]); |
| ASSERT(status == ZX_OK); |
| |
| return {ktl::move(end.userboot), vdso}; |
| } |
| |
| } // namespace |
| |
| void userboot_init() { |
| // Prepare the bootstrap message packet. This allocates space for its |
| // handles, which we'll fill in as we create things. |
| MessagePacketPtr msg; |
| zx_status_t status = MessagePacket::Create(nullptr, 0, userboot::kHandleCount, &msg); |
| ASSERT(status == ZX_OK); |
| |
| DEBUG_ASSERT(msg->num_handles() == userboot::kHandleCount); |
| ktl::span<Handle*, userboot::kHandleCount> handles{msg->mutable_handles(), msg->num_handles()}; |
| |
| // Create the process. |
| KernelHandle<ProcessDispatcher> process_handle; |
| KernelHandle<VmAddressRegionDispatcher> vmar_handle; |
| zx_rights_t process_rights, vmar_rights; |
| status = ProcessDispatcher::Create(GetRootJobDispatcher(), "userboot", 0, &process_handle, |
| &process_rights, &vmar_handle, &vmar_rights); |
| ASSERT(status == ZX_OK); |
| |
| // It needs its own process and root VMAR handles. |
| auto process = process_handle.dispatcher(); |
| auto vmar = vmar_handle.dispatcher(); |
| HandleOwner proc_handle_owner = Handle::Make(ktl::move(process_handle), process_rights); |
| HandleOwner vmar_handle_owner = Handle::Make(ktl::move(vmar_handle), vmar_rights); |
| ASSERT(proc_handle_owner); |
| ASSERT(vmar_handle_owner); |
| handles[userboot::kProcSelf] = proc_handle_owner.release(); |
| handles[userboot::kVmarRootSelf] = vmar_handle_owner.release(); |
| handles[userboot::kMmioResource] = get_resource_handle(ZX_RSRC_KIND_MMIO).release(); |
| ASSERT(handles[userboot::kMmioResource]); |
| handles[userboot::kIrqResource] = get_resource_handle(ZX_RSRC_KIND_IRQ).release(); |
| ASSERT(handles[userboot::kIrqResource]); |
| #if ARCH_X86 |
| handles[userboot::kIoportResource] = get_resource_handle(ZX_RSRC_KIND_IOPORT).release(); |
| ASSERT(handles[userboot::kIoportResource]); |
| #elif ARCH_ARM64 |
| handles[userboot::kSmcResource] = get_resource_handle(ZX_RSRC_KIND_SMC).release(); |
| ASSERT(handles[userboot::kSmcResource]); |
| #endif |
| handles[userboot::kSystemResource] = get_resource_handle(ZX_RSRC_KIND_SYSTEM).release(); |
| ASSERT(handles[userboot::kSystemResource]); |
| handles[userboot::kRootJob] = get_job_handle().release(); |
| ASSERT(handles[userboot::kRootJob]); |
| |
| UserbootImage userboot = bootstrap_vmos(handles); |
| |
| // Make the channel that will hold the message. |
| KernelHandle<ChannelDispatcher> user_handle, kernel_handle; |
| zx_rights_t channel_rights; |
| status = ChannelDispatcher::Create(&user_handle, &kernel_handle, &channel_rights); |
| ASSERT(status == ZX_OK); |
| |
| // Transfer it in. |
| status = kernel_handle.dispatcher()->Write(ZX_KOID_INVALID, ktl::move(msg)); |
| ASSERT(status == ZX_OK); |
| |
| // Inject the user-side channel handle into the process. |
| HandleOwner user_handle_owner = Handle::Make(ktl::move(user_handle), channel_rights); |
| ASSERT(user_handle_owner); |
| zx_handle_t hv = process->handle_table().MapHandleToValue(user_handle_owner); |
| process->handle_table().AddHandle(ktl::move(user_handle_owner)); |
| |
| // Map in the userboot image along with the vDSO. |
| uintptr_t vdso_base = 0; |
| uintptr_t entry = 0; |
| status = userboot.Map(vmar, &vdso_base, &entry); |
| ASSERT(status == ZX_OK); |
| |
| // Map the stack anywhere. |
| uintptr_t stack_base; |
| { |
| fbl::RefPtr<VmObjectPaged> stack_vmo; |
| status = VmObjectPaged::Create(PMM_ALLOC_FLAG_ANY, 0u, stack_size, &stack_vmo); |
| ASSERT(status == ZX_OK); |
| stack_vmo->set_name(kStackVmoName, sizeof(kStackVmoName) - 1); |
| |
| zx::result<VmAddressRegion::MapResult> stack_mapping_result = |
| vmar->Map(0, ktl::move(stack_vmo), 0, stack_size, ZX_VM_PERM_READ | ZX_VM_PERM_WRITE); |
| ASSERT(stack_mapping_result.is_ok()); |
| stack_base = stack_mapping_result->base; |
| } |
| uintptr_t sp = elfldltl::AbiTraits<>::InitialStackPointer(stack_base, stack_size); |
| |
| // Create the user thread. |
| fbl::RefPtr<ThreadDispatcher> thread; |
| { |
| KernelHandle<ThreadDispatcher> thread_handle; |
| zx_rights_t thread_rights; |
| status = |
| ThreadDispatcher::Create(ktl::move(process), 0, "userboot", &thread_handle, &thread_rights); |
| ASSERT(status == ZX_OK); |
| status = thread_handle.dispatcher()->Initialize(); |
| ASSERT(status == ZX_OK); |
| thread = thread_handle.dispatcher(); |
| } |
| ASSERT(thread); |
| |
| // Create a root job observer, restarting the system if the root job becomes childless. |
| StartRootJobObserver(); |
| |
| dprintf(SPEW, "userboot: %-23s @ %#" PRIxPTR "\n", "entry point", entry); |
| |
| // Start the process's initial thread. |
| auto arg1 = static_cast<uintptr_t>(hv); |
| status = thread->Start(ThreadDispatcher::EntryState{entry, sp, arg1, vdso_base}, |
| /* ensure_initial_thread= */ true); |
| ASSERT(status == ZX_OK); |
| |
| timeline_userboot.Set(current_mono_ticks()); |
| init_time.Add(current_mono_time() / 1000000LL); |
| } |