// Copyright 2022, The Android Open Source Project // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. //! Rust entry point. use crate::{ bionic, console, heap, layout::{UART_ADDRESSES, UART_PAGE_ADDR}, logger, memory::{switch_to_dynamic_page_tables, PAGE_SIZE, SIZE_16KB, SIZE_4KB}, power::{reboot, shutdown}, rand, }; use core::mem::size_of; use hypervisor_backends::{get_mmio_guard, Error}; use static_assertions::const_assert_eq; fn try_console_init() -> Result<(), Error> { if let Some(mmio_guard) = get_mmio_guard() { mmio_guard.enroll()?; // TODO(ptosi): Use MmioSharer::share() to properly track this MMIO_GUARD_MAP. // // The following call shares the UART but also anything else present in 0..granule. // // For 4KiB, that's only the UARTs. For 16KiB, it also covers the RTC and watchdog but, as // neither is used by vmbase clients (and as both are outside of the UART page), they // will never have valid stage-1 mappings to those devices. As a result, this // MMIO_GUARD_MAP isn't affected by the granule size in any visible way. Larger granule // sizes will need to be checked separately, if needed. assert!({ let granule = mmio_guard.granule()?; granule == SIZE_4KB || granule == SIZE_16KB }); // Validate the assumption above by ensuring that the UART is not moved to another page: const_assert_eq!(UART_PAGE_ADDR, 0); mmio_guard.map(UART_PAGE_ADDR)?; } // SAFETY: UART_PAGE is mapped at stage-1 (see entry.S) and was just MMIO-guarded. unsafe { console::init(&UART_ADDRESSES) }; Ok(()) } /// This is the entry point to the Rust code, called from the binary entry point in `entry.S`. #[no_mangle] extern "C" fn rust_entry(x0: u64, x1: u64, x2: u64, x3: u64) -> ! { heap::init(); if try_console_init().is_err() { // Don't panic (or log) here to avoid accessing the console. reboot() } logger::init().expect("Failed to initialize the logger"); // We initialize the logger to Off (like the log crate) and clients should log::set_max_level. const SIZE_OF_STACK_GUARD: usize = size_of::(); let mut stack_guard = [0u8; SIZE_OF_STACK_GUARD]; // We keep a null byte at the top of the stack guard to act as a string terminator. let random_guard = &mut stack_guard[..(SIZE_OF_STACK_GUARD - 1)]; if let Err(e) = rand::init() { panic!("Failed to initialize a source of entropy: {e}"); } if let Err(e) = rand::fill_with_entropy(random_guard) { panic!("Failed to get stack canary entropy: {e}"); } bionic::__get_tls().stack_guard = u64::from_ne_bytes(stack_guard); switch_to_dynamic_page_tables(); // Note: If rust_entry ever returned (which it shouldn't by being -> !), the compiler-injected // stack guard comparison would detect a mismatch and call __stack_chk_fail. // SAFETY: `main` is provided by the application using the `main!` macro, and we make sure it // has the right type. unsafe { main(x0, x1, x2, x3); } shutdown(); } extern "Rust" { /// Main function provided by the application using the `main!` macro. fn main(arg0: u64, arg1: u64, arg2: u64, arg3: u64); } /// Marks the main function of the binary. /// /// Once main is entered, it can assume that: /// - The panic_handler has been configured and panic!() and friends are available; /// - The global_allocator has been configured and heap memory is available; /// - The logger has been configured and the log::{info, warn, error, ...} macros are available. /// /// Example: /// /// ```rust /// use vmbase::main; /// use log::{info, LevelFilter}; /// /// main!(my_main); /// /// fn my_main() { /// log::set_max_level(LevelFilter::Info); /// info!("Hello world"); /// } /// ``` #[macro_export] macro_rules! main { ($name:path) => { // Export a symbol with a name matching the extern declaration above. #[export_name = "main"] fn __main(arg0: u64, arg1: u64, arg2: u64, arg3: u64) { // Ensure that the main function provided by the application has the correct type. $name(arg0, arg1, arg2, arg3) } }; } /// Prepends a Linux kernel header to the generated binary image. /// /// See https://docs.kernel.org/arch/arm64/booting.html /// ``` #[macro_export] macro_rules! generate_image_header { () => { #[cfg(not(target_endian = "little"))] compile_error!("Image header uses wrong endianness: bootloaders expect LE!"); core::arch::global_asm!( // This section gets linked at the start of the image. ".section .init.head, \"ax\"", // This prevents the macro from being called more than once. ".global image_header", "image_header:", // Linux uses a special NOP to be ELF-compatible; we're not. "nop", // code0 "b entry", // code1 ".quad 0", // text_offset ".quad bin_end - image_header", // image_size ".quad (1 << 1)", // flags (PAGE_SIZE=4KiB) ".quad 0", // res2 ".quad 0", // res3 ".quad 0", // res4 ".ascii \"ARM\x64\"", // magic ".long 0", // res5 ); }; } // If this fails, the image header flags are out-of-sync with PAGE_SIZE! static_assertions::const_assert_eq!(PAGE_SIZE, SIZE_4KB);