-
Notifications
You must be signed in to change notification settings - Fork 13
/
elf_loader.rs
179 lines (153 loc) · 6.82 KB
/
elf_loader.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
//! Loads Kernel Built-ins.
//!
//! Loads the initial kernel binaries. The end-game goal is to have 5 kernel built-ins:
//!
//! - sm: The Service Manager. Plays a pivotal role for permission checking.
//! - pm: The Process Manager.
//! - loader: Loads ELFs into an address space.
//! - fs: Provides access to the FileSystem.
//! - boot: Controls the boot chain. Asks PM to start user services. Akin to the init.
//!
//! Because the 'normal' ELF loader lives in userspace in the Loader executable, kernel
//! built-ins require their own loading mechanism. On i386, we use GRUB modules to send
//! the built-ins to the kernel, and load them with a primitive ELF loader. This loader
//! does not do any dynamic loading or provide ASLR (though that is up for change)
use multiboot2::ModuleTag;
use core::slice;
use xmas_elf::ElfFile;
use xmas_elf::program::{ProgramHeader, Type::Load, SegmentData};
use crate::mem::{VirtualAddress, PhysicalAddress};
use crate::paging::{PAGE_SIZE, MappingAccessRights, process_memory::ProcessMemory, kernel_memory::get_kernel_memory};
use crate::frame_allocator::PhysicalMemRegion;
use crate::utils::{self, align_up};
use crate::error::KernelError;
/// Represents a grub module once mapped in kernel memory
#[derive(Debug)]
pub struct MappedGrubModule<'a> {
/// The address of the mapping, in KernelLand.
pub mapping_addr: VirtualAddress,
/// The start of the module in the mapping, if it was not page aligned.
pub start: VirtualAddress,
/// The length of the module.
pub len: usize,
/// The module parsed as an ElfFile.
pub elf: Result<ElfFile<'a>, &'static str>
}
/// Maps a grub module, which already lives in reserved physical memory, into the KernelLand.
///
/// # Error:
///
/// * VirtualMemoryExhaustion: cannot find virtual memory where to map it.
pub fn map_grub_module(module: &ModuleTag) -> Result<MappedGrubModule<'_>, KernelError> {
let start_address_aligned = PhysicalAddress(utils::align_down(module.start_address() as usize, PAGE_SIZE));
// Use start_address_aligned to calculate the number of pages, to avoid an off-by-one.
let module_len_aligned = utils::align_up(module.end_address() as usize - start_address_aligned.addr(), PAGE_SIZE);
let mapping_addr = {
let mut page_table = get_kernel_memory();
let vaddr = page_table.find_virtual_space(module_len_aligned)?;
let module_phys_location = unsafe {
// safe, they were not tracked before
PhysicalMemRegion::reconstruct(start_address_aligned, module_len_aligned)
};
page_table.map_phys_region_to(module_phys_location, vaddr, MappingAccessRights::k_r());
vaddr
};
// the module offset in the mapping
let start = mapping_addr + (module.start_address() as usize % PAGE_SIZE);
let len = module.end_address() as usize - module.start_address() as usize;
// try parsing it as an elf
let elf = ElfFile::new(unsafe {
slice::from_raw_parts(start.addr() as *const u8, len)
});
Ok(MappedGrubModule {
mapping_addr,
start,
len,
elf
})
}
impl<'a> Drop for MappedGrubModule<'a> {
/// Unmap the module, but do not deallocate physical memory
fn drop(&mut self) {
get_kernel_memory().unmap_no_dealloc( self.mapping_addr,
utils::align_up(self.len, PAGE_SIZE)
);
}
}
/// Gets the desired kernel access controls for a process based on the
/// .kernel_caps section in its elf
pub fn get_kacs<'a>(module: &'a MappedGrubModule<'_>) -> Option<&'a [u8]> {
let elf = module.elf.as_ref().expect("Failed parsing multiboot module as elf");
elf.find_section_by_name(".kernel_caps")
.map(|section| section.raw_data(&elf))
}
/// Loads the given kernel built-in into the given page table.
/// Returns address of entry point
pub fn load_builtin(process_memory: &mut ProcessMemory, module: &MappedGrubModule<'_>) -> usize {
let elf = module.elf.as_ref().expect("Failed parsing multiboot module as elf");
// load all segments into the page_table we had above
for ph in elf.program_iter().filter(|ph|
ph.get_type().expect("Failed to get type of elf program header") == Load)
{
load_segment(process_memory, ph, &elf);
}
// return the entry point
// TODO: ASLR
// BODY: We should generate a random aslr base.
let entry_point = 0x400000 + elf.header.pt2.entry_point();
info!("Entry point : {:#x?}", entry_point);
entry_point as usize
}
/// Loads an elf segment by coping file_size bytes to the right address,
/// and filling remaining with 0s.
/// This is used by NOBITS sections (.bss), this way we initialize them to 0.
#[allow(clippy::match_bool)] // more readable
fn load_segment(process_memory: &mut ProcessMemory, segment: ProgramHeader<'_>, elf_file: &ElfFile) {
// Map the segment memory in KernelLand
let mem_size_total = align_up(segment.mem_size() as usize, PAGE_SIZE);
// Map as readonly if specified
let mut flags = MappingAccessRights::USER_ACCESSIBLE;
if segment.flags().is_read() {
flags |= MappingAccessRights::READABLE
};
if segment.flags().is_write() {
flags |= MappingAccessRights::WRITABLE
};
if segment.flags().is_execute() {
flags |= MappingAccessRights::EXECUTABLE
}
let virtual_addr = 0x400000 + segment.virtual_addr() as usize;
// Create the mapping in UserLand
let userspace_addr = VirtualAddress(virtual_addr);
process_memory.create_regular_mapping(userspace_addr, mem_size_total, flags)
.expect("Cannot load segment");
// Mirror it in KernelLand
let mirror = process_memory.mirror_mapping(userspace_addr, mem_size_total)
.expect("Cannot mirror segment to load");
let kernel_addr = mirror.addr();
// Copy the segment data
match segment.get_data(elf_file).expect("Error getting elf segment data")
{
SegmentData::Undefined(elf_data) =>
{
let dest_ptr = kernel_addr.addr() as *mut u8;
let dest = unsafe { slice::from_raw_parts_mut(dest_ptr, mem_size_total) };
let (dest_data, dest_pad) = dest.split_at_mut(segment.file_size() as usize);
// Copy elf data
dest_data.copy_from_slice(elf_data);
// Fill remaining with 0s
for byte in dest_pad.iter_mut() {
*byte = 0x00;
}
},
x => { panic ! ("Unexpected Segment data {:?}", x) }
}
info!("Loaded segment - VirtAddr {:#010x}, FileSize {:#010x}, MemSize {:#010x} {}{}{}",
virtual_addr, segment.file_size(), segment.mem_size(),
match segment.flags().is_read() { true => 'R', false => ' '},
match segment.flags().is_write() { true => 'W', false => ' '},
match segment.flags().is_execute() { true => 'X', false => ' '},
);
// unmap it from KernelLand, leaving it mapped only in UserLand
drop(mirror);
}