Make trojan compile in 64-bit mode

This commit is contained in:
Zhang Junyang
2023-11-16 11:56:17 +08:00
committed by Tate, Hongliang Tian
parent 953ff66fcc
commit acf4a057d9
17 changed files with 243 additions and 156 deletions

View File

@ -10,3 +10,7 @@ bytemuck = { version = "1.14.0", features = ["derive"] }
bitflags = "1.3" bitflags = "1.3"
serde = { version = "1.0.192", features = ["derive"] } serde = { version = "1.0.192", features = ["derive"] }
xmas-elf = "0.9.1" xmas-elf = "0.9.1"
[features]
default = []
trojan64 = []

View File

@ -2,13 +2,13 @@ mod mapping;
mod pe_header; mod pe_header;
use std::{ use std::{
error::Error, ffi::OsStr,
fs::File, fs::File,
io::{Read, Seek, Write}, io::{Read, Write},
path::Path, path::{Path, PathBuf},
}; };
use xmas_elf::program::{ProgramHeader, SegmentData}; use xmas_elf::program::SegmentData;
use mapping::{TrojanFileOffset, TrojanVA}; use mapping::{TrojanFileOffset, TrojanVA};
@ -22,18 +22,15 @@ fn trojan_to_flat_binary(elf_file: &[u8]) -> Vec<u8> {
let elf = xmas_elf::ElfFile::new(&elf_file).unwrap(); let elf = xmas_elf::ElfFile::new(&elf_file).unwrap();
let mut bin = Vec::<u8>::new(); let mut bin = Vec::<u8>::new();
for ph in elf.program_iter() { for program in elf.program_iter() {
let ProgramHeader::Ph32(program) = ph else {
panic!("Unexpected program header type");
};
if program.get_type().unwrap() == xmas_elf::program::Type::Load { if program.get_type().unwrap() == xmas_elf::program::Type::Load {
let SegmentData::Undefined(header_data) = program.get_data(&elf).unwrap() else { let SegmentData::Undefined(header_data) = program.get_data(&elf).unwrap() else {
panic!("Unexpected segment data type"); panic!("Unexpected segment data type");
}; };
let dst_file_offset = usize::from(TrojanFileOffset::from(TrojanVA::from( let dst_file_offset = usize::from(TrojanFileOffset::from(TrojanVA::from(
program.virtual_addr as usize, program.virtual_addr() as usize,
))); )));
let dst_file_length = program.file_size as usize; let dst_file_length = program.file_size() as usize;
if bin.len() < dst_file_offset + dst_file_length { if bin.len() < dst_file_offset + dst_file_length {
bin.resize(dst_file_offset + dst_file_length, 0); bin.resize(dst_file_offset + dst_file_length, 0);
} }
@ -64,7 +61,7 @@ fn fill_header_field(header: &mut [u8], offset: usize, value: &[u8]) {
fn fill_legacy_header_fields( fn fill_legacy_header_fields(
header: &mut [u8], header: &mut [u8],
kernel_len: usize, kernel_len: usize,
header_len: usize, trojan_len: usize,
payload_offset: TrojanVA, payload_offset: TrojanVA,
) { ) {
fill_header_field( fill_header_field(
@ -82,84 +79,98 @@ fn fill_legacy_header_fields(
fill_header_field( fill_header_field(
header, header,
0x260, /* init_size */ 0x260, /* init_size */
&((header_len + kernel_len) as u32).to_le_bytes(), &((trojan_len + kernel_len) as u32).to_le_bytes(),
); );
} }
pub fn make_bzimage(path: &Path, kernel_path: &Path, header_path: &Path) -> std::io::Result<()> { pub fn make_bzimage(path: &Path, kernel_path: &Path, trojan_src: &Path, trojan_out: &Path) {
let mut header_elf_file = Vec::new(); #[cfg(feature = "trojan64")]
File::open(header_path)?.read_to_end(&mut header_elf_file)?; let trojan = build_trojan_with_arch(trojan_src, trojan_out, "x86_64-unknown-none".as_ref());
let mut header = trojan_to_flat_binary(&header_elf_file);
// Pad the Linux boot header to let the payload starts with 8-byte alignment. #[cfg(not(feature = "trojan64"))]
header.resize((header.len() + 7) & !7, 0x00); let trojan = {
let arch = trojan_src.join("x86_64-i386_pm-none.json");
build_trojan_with_arch(trojan_src, trojan_out, arch.as_os_str())
};
let mut trojan_elf = Vec::new();
File::open(trojan)
.unwrap()
.read_to_end(&mut trojan_elf)
.unwrap();
let mut trojan = trojan_to_flat_binary(&trojan_elf);
// Pad the header with 8-byte alignment.
trojan.resize((trojan.len() + 7) & !7, 0x00);
let mut kernel = Vec::new(); let mut kernel = Vec::new();
File::open(kernel_path)?.read_to_end(&mut kernel)?; File::open(kernel_path)
.unwrap()
.read_to_end(&mut kernel)
.unwrap();
let payload = kernel; let payload = kernel;
let header_len = header.len(); let trojan_len = trojan.len();
let payload_len = payload.len(); let payload_len = payload.len();
let payload_offset = TrojanFileOffset::from(header_len); let payload_offset = TrojanFileOffset::from(trojan_len);
fill_legacy_header_fields(&mut header, payload_len, header_len, payload_offset.into()); fill_legacy_header_fields(&mut trojan, payload_len, trojan_len, payload_offset.into());
let mut kernel_image = File::create(path)?; let mut kernel_image = File::create(path).unwrap();
kernel_image.write_all(&header)?; kernel_image.write_all(&trojan).unwrap();
kernel_image.write_all(&payload)?; kernel_image.write_all(&payload).unwrap();
let image_size = header_len + payload_len; let image_size = trojan_len + payload_len;
// Since the Linux boot header starts at 0x1f1, we can write the PE/COFF header directly to the // Since the Linux boot header starts at 0x1f1, we can write the PE/COFF header directly to the
// start of the file without overwriting the Linux boot header. // start of the file without overwriting the Linux boot header.
let pe_header = pe_header::make_pe_coff_header(&header_elf_file, image_size); let pe_header = pe_header::make_pe_coff_header(&trojan_elf, image_size);
assert!( assert!(
pe_header.header_at_zero.len() <= 0x1f1, pe_header.header_at_zero.len() <= 0x1f1,
"PE/COFF header is too large" "PE/COFF header is too large"
); );
// FIXME: Oops, EFI hanover stucks, so I removed the pe header to let grub go through the legacy path. #[cfg(feature = "trojan64")]
kernel_image.seek(std::io::SeekFrom::Start(0))?; {
// kernel_image.write_all(&pe_header.header_at_zero)?; use std::io::{Seek, SeekFrom};
kernel_image.seek(std::io::SeekFrom::Start( kernel_image.seek(SeekFrom::Start(0)).unwrap();
usize::from(pe_header.relocs.0) as u64 kernel_image.write_all(&pe_header.header_at_zero).unwrap();
))?; kernel_image
// kernel_image.write_all(&pe_header.relocs.1)?; .seek(SeekFrom::Start(usize::from(pe_header.relocs.0) as u64))
.unwrap();
Ok(()) kernel_image.write_all(&pe_header.relocs.1).unwrap();
}
} }
pub fn build_linux_setup_header_from_trojan( fn build_trojan_with_arch(source_dir: &Path, out_dir: &Path, arch: &OsStr) -> PathBuf {
source_dir: &Path,
out_dir: &Path,
) -> Result<(), Box<dyn Error + Send + Sync>> {
// Build the setup header to ELF.
let target_json = source_dir.join("x86_64-i386_protected_mode.json");
let cargo = std::env::var("CARGO").unwrap(); let cargo = std::env::var("CARGO").unwrap();
let mut cmd = std::process::Command::new(cargo); let mut cmd = std::process::Command::new(cargo);
cmd.arg("install").arg("aster-boot-trojan"); cmd.arg("build");
cmd.arg("--debug"); cmd.arg("--package").arg("aster-boot-trojan");
cmd.arg("--locked"); cmd.arg("--manifest-path")
cmd.arg("--path").arg(source_dir.to_str().unwrap()); .arg(source_dir.join("Cargo.toml").as_os_str());
cmd.arg("--target").arg(target_json.as_os_str()); cmd.arg("--target").arg(arch);
cmd.arg("-Zbuild-std=core,compiler_builtins"); cmd.arg("-Zbuild-std=core,alloc,compiler_builtins");
cmd.arg("-Zbuild-std-features=compiler-builtins-mem"); cmd.arg("-Zbuild-std-features=compiler-builtins-mem");
// Specify the installation root.
cmd.arg("--root").arg(out_dir.as_os_str());
// Specify the build target directory to avoid cargo running // Specify the build target directory to avoid cargo running
// into a deadlock reading the workspace files. // into a deadlock reading the workspace files.
cmd.arg("--target-dir").arg(out_dir.as_os_str()); cmd.arg("--target-dir").arg(out_dir.as_os_str());
cmd.env_remove("RUSTFLAGS"); cmd.env_remove("RUSTFLAGS");
cmd.env_remove("CARGO_ENCODED_RUSTFLAGS"); cmd.env_remove("CARGO_ENCODED_RUSTFLAGS");
let output = cmd.output()?; let mut child = cmd.spawn().unwrap();
if !output.status.success() { let status = child.wait().unwrap();
std::io::stdout().write_all(&output.stdout).unwrap(); if !status.success() {
std::io::stderr().write_all(&output.stderr).unwrap(); panic!(
return Err(format!(
"Failed to build linux x86 setup header:\n\tcommand `{:?}`\n\treturned {}", "Failed to build linux x86 setup header:\n\tcommand `{:?}`\n\treturned {}",
cmd, output.status cmd, status
) );
.into());
} }
Ok(()) // If the arch is a builtin target rather than json, the path operation works as well.
let arch_name = Path::new(arch).file_stem().unwrap().to_str().unwrap();
let trojan_artifact = out_dir
.join(arch_name)
.join("debug")
.join("aster-boot-trojan");
trojan_artifact.to_owned()
} }

View File

@ -7,6 +7,7 @@ use std::{cmp::PartialOrd, convert::From, ops::Sub};
// is page-aligned and the legacy setup section size would be 0x1000. // is page-aligned and the legacy setup section size would be 0x1000.
pub const LEGACY_SETUP_SECS: usize = 7; pub const LEGACY_SETUP_SECS: usize = 7;
pub const LEGACY_SETUP_SEC_SIZE: usize = 0x200 * (LEGACY_SETUP_SECS + 1); pub const LEGACY_SETUP_SEC_SIZE: usize = 0x200 * (LEGACY_SETUP_SECS + 1);
pub const SETUP32_LMA: usize = 0x100000; pub const SETUP32_LMA: usize = 0x100000;
#[derive(PartialEq, Eq, PartialOrd, Ord, Debug, Clone, Copy)] #[derive(PartialEq, Eq, PartialOrd, Ord, Debug, Clone, Copy)]

View File

@ -6,5 +6,6 @@ edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies] [dependencies]
cfg-if = "1.0.0"
uart_16550 = "0.3.0" uart_16550 = "0.3.0"
xmas-elf = "0.8.0" xmas-elf = "0.8.0"

View File

@ -2,8 +2,17 @@ use std::path::PathBuf;
fn main() { fn main() {
let source_dir = PathBuf::from(std::env::var("CARGO_MANIFEST_DIR").unwrap()); let source_dir = PathBuf::from(std::env::var("CARGO_MANIFEST_DIR").unwrap());
let target_arch = std::env::var("TARGET").unwrap();
let linker_script = if target_arch == "x86_64-unknown-none" {
source_dir.join("src/arch/x86_64.linker.ld")
} else if target_arch == "x86_64-i386_pm-none" {
source_dir.join("src/arch/i386.linker.ld")
} else {
panic!("Unsupported target_arch: {}", target_arch);
};
println!("cargo:rerun-if-changed={}", linker_script.display());
println!( println!(
"cargo:rustc-link-arg-bins=--script={}", "cargo:rustc-link-arg-bins=--script={}",
source_dir.join("linker.ld").display() linker_script.display()
) );
} }

View File

@ -3,8 +3,7 @@
// more information on the Linux x86 Boot Protocol. // more information on the Linux x86 Boot Protocol.
// Some of the fields filled with a 0xab* values should be filled // Some of the fields filled with a 0xab* values should be filled
// by the runner, which is the only tool after building and can // by the torjan builder.
// access the info of the payload.
// Asterinas will use only a few of these fields, and some of them // Asterinas will use only a few of these fields, and some of them
// are filled by the loader and will be read by Asterinas. // are filled by the loader and will be read by Asterinas.
@ -47,11 +46,11 @@ xloadflags: .word 0b01111 # all handover protocols except kexec
cmdline_size: .long 4096-1 cmdline_size: .long 4096-1
hardware_subarch: .long 0 hardware_subarch: .long 0
hardware_subarch_data: .quad 0 hardware_subarch_data: .quad 0
payload_offset: .long 0xabababab # at 0x248/4, to be filled by the runner payload_offset: .long 0xabababab # at 0x248/4, to be filled by the builder
payload_length: .long 0xabababab # at 0x24c/4, to be filled by the runner payload_length: .long 0xabababab # at 0x24c/4, to be filled by the builder
setup_data: .quad 0 setup_data: .quad 0
pref_address: .quad CODE32_START - 0x200 * (SETUP_SECTS + 1); pref_address: .quad CODE32_START - 0x200 * (SETUP_SECTS + 1);
init_size: .long 0xabababab # at 0x260/4, to be filled by the runner init_size: .long 0xabababab # at 0x260/4, to be filled by the builder
handover_offset: .long start_of_setup32 handover_offset: .long CODE32_START
kernel_info_offset: .long 0 kernel_info_offset: .long 0
hdr_end: hdr_end:

View File

@ -1,4 +1,4 @@
ENTRY(start_of_setup64) ENTRY(start_of_setup32)
OUTPUT_ARCH(i386:x86) OUTPUT_ARCH(i386:x86)
OUTPUT_FORMAT(elf32-i386) OUTPUT_FORMAT(elf32-i386)
@ -6,24 +6,18 @@ SETUP32_LMA = 0x100000;
BOOTSECT_SIZE = 0x1000; BOOTSECT_SIZE = 0x1000;
BOOTSECT_START = SETUP32_LMA - BOOTSECT_SIZE; BOOTSECT_START = SETUP32_LMA - BOOTSECT_SIZE;
LEGACY_STACK_SIZE = 0x1000;
SECTIONS SECTIONS
{ {
. = BOOTSECT_START; . = BOOTSECT_START;
.header : { KEEP(*(.header)) } .header : { KEEP(*(.header)) }
. = SETUP32_LMA; . = SETUP32_LMA;
.setup : { .setup : { KEEP(*(.setup)) }
PROVIDE(__setup_start = .); .stack : { *(.stack) }
KEEP(*(.header))
PROVIDE(__setup_end = .);
}
.stack : { KEEP(*(.stack)) }
.text : { .text : { *(.text .text.*) }
PROVIDE(__text_start = .);
*(.text .text.*)
PROVIDE(__text_end = .);
}
.rodata : { *(.rodata .rodata.*) } .rodata : { *(.rodata .rodata.*) }
.data : { *(.data .data.*) } .data : { *(.data .data.*) }
@ -39,14 +33,4 @@ SECTIONS
.eh_frame_hdr : { .eh_frame_hdr : {
*(.eh_frame_hdr .eh_frame_hdr.*) *(.eh_frame_hdr .eh_frame_hdr.*)
} }
.symtab : {
*(.symtab .symtab.*)
}
.strtab : {
*(.strtab .strtab.*)
}
.shstrtab : {
*(.shstrtab .shstrtab.*)
}
} }

View File

@ -0,0 +1,18 @@
use core::arch::{asm, global_asm};
global_asm!(include_str!("header.S"));
global_asm!(include_str!("setup.S"));
#[no_mangle]
extern "cdecl" fn _trojan_entry_32(boot_params_ptr: u32) -> ! {
crate::trojan_entry(boot_params_ptr);
}
pub unsafe fn call_aster_entrypoint(entrypoint: u32, boot_params_ptr: u32) -> ! {
asm!("mov esi, {}", in(reg) boot_params_ptr);
asm!("mov eax, {}", in(reg) entrypoint);
asm!("jmp eax");
unreachable!();
}

View File

@ -0,0 +1,11 @@
cfg_if::cfg_if! {
if #[cfg(target_arch = "x86_64")] {
mod x86_64;
pub use x86_64::*;
} else if #[cfg(target_arch = "x86")] {
mod i386;
pub use i386::*;
} else {
compile_error!("Unsupported target_arch");
}
}

View File

@ -0,0 +1,28 @@
// 32-bit setup code starts here, and will be loaded at CODE32_START.
.section ".setup", "ax"
.code32
.global start_of_setup32
start_of_setup32:
mov eax, offset __stack_top
mov esp, eax
mov eax, offset halt
push eax # the return address
mov ebp, esp
add ebp, -4
push ebp
mov ebp, esp
.extern _trojan_entry_32
push esi # the boot_params pointer
call _trojan_entry_32
// Unreachable here.
halt:
hlt
jmp halt
// A small stack for the 32-bit code.
.section ".stack", "aw"
.align 8
.space 0x1000
__stack_top:

View File

@ -0,0 +1,16 @@
.section ".setup", "ax"
.code64
.org 0x200
// start_of_setup64 should be at start_of_setup32 + 0x200
.global start_of_setup64
start_of_setup64:
.extern _trojan_entry_64
lea rax, [rip + _trojan_entry_64]
push rsi
call rax
// Unreachable here.
halt:
hlt
jmp halt

View File

@ -0,0 +1,39 @@
ENTRY(start_of_setup64)
OUTPUT_ARCH(i386:x86-64)
OUTPUT_FORMAT(elf64-x86-64)
SETUP32_LMA = 0x100000;
BOOTSECT_SIZE = 0x1000;
BOOTSECT_START = SETUP32_LMA - BOOTSECT_SIZE;
LEGACY_STACK_SIZE = 0x1000;
SECTIONS
{
. = BOOTSECT_START;
.header : { KEEP(*(.header)) }
. = SETUP32_LMA;
.setup : { KEEP(*(.setup)) }
.text : { *(.text .text.*) }
.rodata : { *(.rodata .rodata.*) }
.data : { *(.data .data.*) }
.bss : {
PROVIDE(__bss_start = .);
*(.bss .bss.*) *(COMMON)
PROVIDE(__bss_end = .);
}
.eh_frame : {
*(.eh_frame .eh_frame.*)
}
.eh_frame_hdr : {
*(.eh_frame_hdr .eh_frame_hdr.*)
}
.rela.dyn : {
*(.rela.dyn .rela.dyn.*)
}
}

View File

@ -0,0 +1,18 @@
use core::arch::{asm, global_asm};
global_asm!(include_str!("header.S"));
global_asm!(include_str!("setup64.S"));
#[no_mangle]
extern "cdecl" fn _trojan_entry_64(boot_params_ptr: u64) -> ! {
crate::trojan_entry(boot_params_ptr as u32);
}
pub unsafe fn call_aster_entrypoint(entrypoint: u64, boot_params_ptr: u64) -> ! {
asm!("mov rsi, {}", in(reg) boot_params_ptr as u64);
asm!("mov rax, {}", in(reg) entrypoint as u64);
asm!("jmp rax");
unreachable!();
}

View File

@ -1,26 +1,12 @@
#![no_std] #![no_std]
#![no_main] #![no_main]
mod arch;
mod boot_params; mod boot_params;
mod console; mod console;
mod loader; mod loader;
use core::arch::{asm, global_asm}; fn trojan_entry(boot_params_ptr: u32) -> ! {
global_asm!(include_str!("header.S"));
global_asm!(include_str!("setup.S"));
unsafe fn call_aster_entrypoint(entrypoint: u32, boot_params_ptr: u32) -> ! {
asm!("mov esi, {}", in(reg) boot_params_ptr);
asm!("mov eax, {}", in(reg) entrypoint);
asm!("jmp eax");
unreachable!();
}
#[no_mangle]
pub extern "cdecl" fn _rust_setup_entry(boot_params_ptr: u32) -> ! {
// Safety: this init function is only called once. // Safety: this init function is only called once.
unsafe { console::init() }; unsafe { console::init() };
println!("[setup] boot_params_ptr: {:#x}", boot_params_ptr); println!("[setup] boot_params_ptr: {:#x}", boot_params_ptr);
@ -36,7 +22,7 @@ pub extern "cdecl" fn _rust_setup_entry(boot_params_ptr: u32) -> ! {
println!("[setup] entrypoint: {:#x}", entrypoint); println!("[setup] entrypoint: {:#x}", entrypoint);
// Safety: the entrypoint and the ptr is valid. // Safety: the entrypoint and the ptr is valid.
unsafe { call_aster_entrypoint(entrypoint, boot_params_ptr) }; unsafe { arch::call_aster_entrypoint(entrypoint.into(), boot_params_ptr.into()) };
} }
#[panic_handler] #[panic_handler]

View File

@ -1,39 +0,0 @@
// 32-bit setup code starts here, and will be loaded at CODE32_START.
.section ".setup", "ax"
.code32
.global start_of_setup32
start_of_setup32:
mov eax, offset stack_bottom
mov esp, eax
mov eax, offset halt
push eax # the return address
mov ebp, esp
add ebp, -4
push ebp
mov ebp, esp
.extern _rust_setup_entry
push esi # the boot_params pointer
call _rust_setup_entry
// Unreachable here.
halt:
hlt
jmp halt
.code64
.global start_of_setup64
.org 0x200
start_of_setup64:
// Unreachable here.
halt64:
hlt
jmp halt64
// A small stack for the legacy setup code.
.section ".stack", "aw"
SETUP_STACK_SIZE = 0x1000
.align 16
stack_top:
.skip SETUP_STACK_SIZE
stack_bottom:

View File

@ -1,4 +1,4 @@
use aster_boot_trojan_builder::{build_linux_setup_header_from_trojan, make_bzimage}; use aster_boot_trojan_builder::make_bzimage;
use std::{ use std::{
fs, fs,
@ -91,16 +91,17 @@ pub fn create_bootdev_image(
let target_path = match protocol { let target_path = match protocol {
BootProtocol::Linux => { BootProtocol::Linux => {
let trojan_install_dir = Path::new("target/-boot-trojan"); let trojan_src = Path::new("framework/libs/boot-trojan/trojan");
build_linux_setup_header_from_trojan( let trojan_out = Path::new("target/aster-boot-trojan");
Path::new("framework/libs/boot-trojan/trojan"),
trojan_install_dir,
)
.unwrap();
let header_path = trojan_install_dir.join("bin").join("aster-boot-trojan");
// Make the `bzImage`-compatible kernel image and place it in the boot directory. // Make the `bzImage`-compatible kernel image and place it in the boot directory.
let target_path = iso_root.join("boot").join("asterinaz"); let target_path = iso_root.join("boot").join("asterinaz");
make_bzimage(&target_path, &aster_path.as_path(), &header_path.as_path()).unwrap(); println!("[aster-runner] Building bzImage.");
make_bzimage(
&target_path,
&aster_path.as_path(),
&trojan_src,
&trojan_out,
);
target_path target_path
} }
BootProtocol::Multiboot | BootProtocol::Multiboot2 => { BootProtocol::Multiboot | BootProtocol::Multiboot2 => {