db_main.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501
  1. /* Copyright (C) 2014 Stony Brook University
  2. This file is part of Graphene Library OS.
  3. Graphene Library OS is free software: you can redistribute it and/or
  4. modify it under the terms of the GNU Lesser General Public License
  5. as published by the Free Software Foundation, either version 3 of the
  6. License, or (at your option) any later version.
  7. Graphene Library OS is distributed in the hope that it will be useful,
  8. but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. GNU Lesser General Public License for more details.
  11. You should have received a copy of the GNU Lesser General Public License
  12. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  13. /*
  14. * db_main.c
  15. *
  16. * This file contains the main function of the PAL loader, which loads and
  17. * processes environment, arguments and manifest.
  18. */
  19. #include "pal_defs.h"
  20. #include "pal.h"
  21. #include "pal_internal.h"
  22. #include "pal_debug.h"
  23. #include "pal_error.h"
  24. #include "pal_rtld.h"
  25. #include "api.h"
  26. #include <sysdeps/generic/ldsodefs.h>
  27. #include <elf/elf.h>
  28. PAL_CONTROL __pal_control;
  29. PAL_CONTROL * pal_control_addr (void)
  30. {
  31. return &__pal_control;
  32. }
  33. struct pal_internal_state pal_state;
  34. static void load_libraries (void)
  35. {
  36. /* we will not make any assumption for where the libraries are loaded */
  37. char cfgbuf[CONFIG_MAX];
  38. ssize_t len, ret = 0;
  39. /* loader.preload:
  40. any other libraries to preload. The can be multiple URIs,
  41. seperated by commas */
  42. len = get_config(pal_state.root_config, "loader.preload", cfgbuf,
  43. CONFIG_MAX);
  44. if (len <= 0)
  45. return;
  46. char * c = cfgbuf, * library_name = c;
  47. for (;; c++)
  48. if (*c == ',' || !(*c)) {
  49. if (c > library_name) {
  50. #if PROFILING == 1
  51. unsigned long before_load_library = _DkSystemTimeQuery();
  52. #endif
  53. *c = 0;
  54. if ((ret = load_elf_object(library_name, OBJECT_PRELOAD)) < 0)
  55. INIT_FAIL(-ret, "Unable to load preload library");
  56. #if PROFILING == 1
  57. pal_state.linking_time +=
  58. _DkSystemTimeQuery() - before_load_library;
  59. #endif
  60. }
  61. if (c == cfgbuf + len)
  62. break;
  63. library_name = c + 1;
  64. }
  65. }
  66. static void read_environments (const char *** envpp)
  67. {
  68. struct config_store * store = pal_state.root_config;
  69. const char ** envp = *envpp;
  70. char * cfgbuf;
  71. /* loader.env.*: rewriting host environment variables */
  72. struct setenv {
  73. const char * str;
  74. int len, idx;
  75. } * setenvs = NULL;
  76. int nsetenvs = 0;
  77. if (!pal_state.root_config)
  78. return;
  79. ssize_t cfgsize = get_config_entries_size(store, "loader.env");
  80. /* XXX Propagate this error? */
  81. if (cfgsize < 0)
  82. return;
  83. cfgbuf = malloc(cfgsize);
  84. assert(cfgbuf);
  85. nsetenvs = get_config_entries(store, "loader.env", cfgbuf, cfgsize);
  86. if (nsetenvs <= 0) {
  87. free(cfgbuf);
  88. return;
  89. }
  90. setenvs = __alloca(sizeof(struct setenv) * nsetenvs);
  91. char * cfg = cfgbuf;
  92. for (int i = 0 ; i < nsetenvs ; i++) {
  93. size_t len = strlen(cfg);
  94. char * str = __alloca(len + 1);
  95. setenvs[i].str = str;
  96. setenvs[i].len = len;
  97. setenvs[i].idx = -1;
  98. memcpy(str, cfg, len + 1);
  99. cfg += len + 1;
  100. }
  101. int nenvs = 0, noverwrite = 0;
  102. for (const char ** e = envp ; *e ; e++, nenvs++)
  103. for (int i = 0 ; i < nsetenvs ; i++)
  104. if (!memcmp(setenvs[i].str, *e, setenvs[i].len) &&
  105. (*e)[setenvs[i].len] == '=') {
  106. setenvs[i].idx = nenvs;
  107. noverwrite++;
  108. break;
  109. }
  110. /* TODO: This code appears to rely on the memory buffer being zero-
  111. * initialized, so we use calloc here to get zeroed memory. We should
  112. * audit this code to verify that it's correct. */
  113. const char ** new_envp =
  114. calloc((nenvs + nsetenvs - noverwrite + 1), sizeof(const char *));
  115. memcpy(new_envp, envp, sizeof(const char *) * nenvs);
  116. envp = new_envp;
  117. char key[CONFIG_MAX] = "loader.env.";
  118. int prefix_len = static_strlen("loader.env.");
  119. const char ** ptr;
  120. free(cfgbuf);
  121. cfgbuf = __alloca(sizeof(char) * CONFIG_MAX);
  122. for (int i = 0 ; i < nsetenvs ; i++) {
  123. const char * str = setenvs[i].str;
  124. int len = setenvs[i].len;
  125. int idx = setenvs[i].idx;
  126. ssize_t bytes;
  127. ptr = &envp[(idx == -1) ? nenvs++ : idx];
  128. memcpy(key + prefix_len, str, len + 1);
  129. if ((bytes = get_config(store, key, cfgbuf, CONFIG_MAX)) > 0) {
  130. char * e = malloc(len + bytes + 2);
  131. memcpy(e, str, len);
  132. e[len] = '=';
  133. memcpy(e + len + 1, cfgbuf, bytes + 1);
  134. *ptr = e;
  135. } else {
  136. char * e = malloc(len + 2);
  137. memcpy(e, str, len);
  138. e[len] = '=';
  139. e[len + 1] = 0;
  140. *ptr = e;
  141. }
  142. }
  143. *envpp = envp;
  144. }
  145. static void set_debug_type (void)
  146. {
  147. char cfgbuf[CONFIG_MAX];
  148. ssize_t ret = 0;
  149. if (!pal_state.root_config)
  150. return;
  151. ret = get_config(pal_state.root_config, "loader.debug_type",
  152. cfgbuf, CONFIG_MAX);
  153. if (ret <= 0)
  154. return;
  155. PAL_HANDLE handle = NULL;
  156. if (!strcmp_static(cfgbuf, "inline")) {
  157. ret = _DkStreamOpen(&handle, "dev:tty", PAL_ACCESS_RDWR, 0, 0, 0);
  158. } else if (!strcmp_static(cfgbuf, "file")) {
  159. ret = get_config(pal_state.root_config, "loader.debug_file",
  160. cfgbuf, CONFIG_MAX);
  161. if (ret <= 0)
  162. INIT_FAIL(PAL_ERROR_INVAL, "debug file not specified");
  163. ret = _DkStreamOpen(&handle, cfgbuf,
  164. PAL_ACCESS_RDWR,
  165. PAL_SHARE_OWNER_R|PAL_SHARE_OWNER_W,
  166. PAL_CREATE_TRY, 0);
  167. } else if (!strcmp_static(cfgbuf, "none")) {
  168. ret = 0;
  169. } else {
  170. INIT_FAIL(PAL_ERROR_INVAL, "unknown debug type");
  171. }
  172. if (ret < 0)
  173. INIT_FAIL(-ret, "cannot open debug stream");
  174. __pal_control.debug_stream = handle;
  175. }
  176. static int loader_filter (const char * key, int len)
  177. {
  178. /* try to do this as fast as possible */
  179. return (len > 7 && key[0] == 'l' && key[1] == 'o' && key[2] == 'a' && key[3] == 'd' &&
  180. key[4] == 'e' && key[5] == 'r' && key[6] == '.') ? 0 : 1;
  181. }
  182. /* 'pal_main' must be called by the host-specific bootloader */
  183. noreturn void pal_main (
  184. PAL_NUM instance_id, /* current instance id */
  185. PAL_HANDLE manifest_handle, /* manifest handle if opened */
  186. PAL_HANDLE exec_handle, /* executable handle if opened */
  187. PAL_PTR exec_loaded_addr, /* executable addr if loaded */
  188. PAL_HANDLE parent_process, /* parent process if it's a child */
  189. PAL_HANDLE first_thread, /* first thread handle */
  190. PAL_STR * arguments, /* application arguments */
  191. PAL_STR * environments /* environment variables */
  192. )
  193. {
  194. #if PROFILING == 1
  195. __pal_control.host_specific_startup_time =
  196. _DkSystemTimeQuery() - pal_state.start_time;
  197. #endif
  198. pal_state.instance_id = instance_id;
  199. pal_state.pagesize = _DkGetPagesize();
  200. pal_state.alloc_align = _DkGetAllocationAlignment();
  201. pal_state.alloc_shift = pal_state.alloc_align - 1;
  202. pal_state.alloc_mask = ~pal_state.alloc_shift;
  203. init_slab_mgr(pal_state.alloc_align);
  204. pal_state.parent_process = parent_process;
  205. char uri_buf[URI_MAX];
  206. char * manifest_uri = NULL, * exec_uri = NULL;
  207. ssize_t ret;
  208. if (exec_handle) {
  209. ret = _DkStreamGetName(exec_handle, uri_buf, URI_MAX);
  210. if (ret < 0)
  211. INIT_FAIL(-ret, "cannot get executable name");
  212. exec_uri = malloc_copy(uri_buf, ret + 1);
  213. }
  214. if (manifest_handle) {
  215. ret = _DkStreamGetName(manifest_handle, uri_buf, URI_MAX);
  216. if (ret < 0)
  217. INIT_FAIL(-ret, "cannot get manifest name");
  218. manifest_uri = malloc_copy(uri_buf, ret + 1);
  219. } else {
  220. if (!exec_handle)
  221. INIT_FAIL(PAL_ERROR_INVAL, "Must have manifest or executable");
  222. #if PROFILING == 1
  223. unsigned long before_find_manifest = _DkSystemTimeQuery();
  224. #endif
  225. /* try open "<execname>.manifest" */
  226. size_t len = sizeof(uri_buf);
  227. ret = get_norm_path(exec_uri, uri_buf, &len);
  228. if (ret < 0) {
  229. INIT_FAIL(-ret, "cannot normalize exec_uri");
  230. }
  231. strcpy_static(uri_buf + len, ".manifest", sizeof(uri_buf) - len);
  232. ret = _DkStreamOpen(&manifest_handle, uri_buf, PAL_ACCESS_RDONLY, 0, 0, 0);
  233. if (ret) {
  234. /* try open "file:manifest" */
  235. manifest_uri = "file:manifest";
  236. ret = _DkStreamOpen(&manifest_handle, manifest_uri, PAL_ACCESS_RDONLY,
  237. 0, 0, 0);
  238. if (ret) {
  239. #if PROFILING == 1
  240. pal_state.manifest_loading_time +=
  241. _DkSystemTimeQuery() - before_find_manifest;
  242. #endif
  243. /* well, there is no manifest file, leave it alone */
  244. printf("Can't find any manifest, will run without one.\n");
  245. }
  246. }
  247. }
  248. /* load manifest if there is one */
  249. if (!pal_state.root_config && manifest_handle) {
  250. #if PROFILING == 1
  251. unsigned long before_load_manifest = _DkSystemTimeQuery();
  252. #endif
  253. PAL_STREAM_ATTR attr;
  254. ret = _DkStreamAttributesQueryByHandle(manifest_handle, &attr);
  255. if (ret < 0)
  256. INIT_FAIL(-ret, "cannot open manifest file");
  257. void * cfg_addr = NULL;
  258. int cfg_size = attr.pending_size;
  259. ret = _DkStreamMap(manifest_handle, &cfg_addr,
  260. PAL_PROT_READ, 0,
  261. ALLOC_ALIGNUP(cfg_size));
  262. if (ret < 0)
  263. INIT_FAIL(-ret, "cannot open manifest file");
  264. struct config_store * root_config = malloc(sizeof(struct config_store));
  265. root_config->raw_data = cfg_addr;
  266. root_config->raw_size = cfg_size;
  267. root_config->malloc = malloc;
  268. root_config->free = free;
  269. const char * errstring = NULL;
  270. if ((ret = read_config(root_config, loader_filter, &errstring)) < 0) {
  271. if (_DkStreamGetName(manifest_handle, uri_buf, URI_MAX) > 0)
  272. printf("reading manifest \"%s\" failed\n", uri_buf);
  273. INIT_FAIL(-ret, errstring);
  274. }
  275. pal_state.root_config = root_config;
  276. #if PROFILING == 1
  277. pal_state.manifest_loading_time +=
  278. _DkSystemTimeQuery() - before_load_manifest;
  279. #endif
  280. }
  281. /* if there is no executable, try to find one in the manifest */
  282. if (!exec_handle && pal_state.root_config) {
  283. ret = get_config(pal_state.root_config, "loader.exec",
  284. uri_buf, URI_MAX);
  285. if (ret > 0) {
  286. exec_uri = malloc_copy(uri_buf, ret + 1);
  287. ret = _DkStreamOpen(&exec_handle, exec_uri, PAL_ACCESS_RDONLY,
  288. 0, 0, 0);
  289. if (ret < 0)
  290. INIT_FAIL(-ret, "cannot open executable");
  291. }
  292. }
  293. /* If we still don't have an exec in the manifest, but we have a manifest
  294. * try implicitly from the manifest name */
  295. if ((!exec_handle) && manifest_uri) {
  296. size_t manifest_strlen = strlen(manifest_uri);
  297. size_t exec_strlen = manifest_strlen - 9;
  298. int success = 0;
  299. // Try .manifest
  300. if (!strcmp_static(&manifest_uri[exec_strlen], ".manifest")) {
  301. success = 1;
  302. } else {
  303. exec_strlen -= 4;
  304. if (!strcmp_static(&manifest_uri[exec_strlen], ".manifest.sgx")) {
  305. success = 1;
  306. }
  307. }
  308. if (success) {
  309. exec_uri = malloc(exec_strlen + 1);
  310. if (!exec_uri)
  311. INIT_FAIL(-PAL_ERROR_NOMEM, "Cannot allocate URI buf");
  312. memcpy (exec_uri, manifest_uri, exec_strlen);
  313. exec_uri[exec_strlen] = '\0';
  314. ret = _DkStreamOpen(&exec_handle, exec_uri, PAL_ACCESS_RDONLY,
  315. 0, 0, 0);
  316. // DEP 3/20/17: There are cases where we want to let
  317. // the PAL start up without a main executable. Don't
  318. // die here, just free the exec_uri buffer.
  319. if (ret < 0) {
  320. free(exec_uri);
  321. exec_uri = NULL;
  322. }
  323. }
  324. }
  325. /* must be a ELF */
  326. if (exec_handle && check_elf_object(exec_handle) < 0)
  327. INIT_FAIL(PAL_ERROR_INVAL, "executable is not a ELF binary");
  328. pal_state.manifest = manifest_uri;
  329. pal_state.manifest_handle = manifest_handle;
  330. pal_state.exec = exec_uri;
  331. pal_state.exec_handle = exec_handle;
  332. if (pal_state.root_config && *arguments
  333. && (strendswith(*arguments, ".manifest") || strendswith(*arguments, ".manifest.sgx"))) {
  334. /* Run as a manifest file,
  335. * replace argv[0] with the contents of the manifest's loader.execname */
  336. char cfgbuf[CONFIG_MAX];
  337. ret = get_config(pal_state.root_config, "loader.execname", cfgbuf, CONFIG_MAX);
  338. if (ret > 0)
  339. *arguments = malloc_copy(cfgbuf, ret + 1);
  340. }
  341. read_environments(&environments);
  342. if (pal_state.root_config)
  343. load_libraries();
  344. if (exec_handle) {
  345. #if PROFILING == 1
  346. unsigned long before_load_exec = _DkSystemTimeQuery();
  347. #endif
  348. if (exec_loaded_addr) {
  349. ret = add_elf_object(exec_loaded_addr, exec_handle, OBJECT_EXEC);
  350. } else {
  351. ret = load_elf_object_by_handle(exec_handle, OBJECT_EXEC);
  352. }
  353. if (ret < 0)
  354. INIT_FAIL(ret, pal_strerror(ret));
  355. #if PROFILING == 1
  356. pal_state.linking_time += _DkSystemTimeQuery() - before_load_exec;
  357. #endif
  358. }
  359. #if PROFILING == 1
  360. unsigned long before_tail = _DkSystemTimeQuery();
  361. #endif
  362. set_debug_type();
  363. __pal_control.host_type = XSTRINGIFY(HOST_TYPE);
  364. __pal_control.process_id = _DkGetProcessId();
  365. __pal_control.host_id = _DkGetHostId();
  366. __pal_control.manifest_handle = manifest_handle;
  367. __pal_control.executable = exec_uri;
  368. __pal_control.parent_process = parent_process;
  369. __pal_control.first_thread = first_thread;
  370. _DkGetAvailableUserAddressRange(&__pal_control.user_address.start,
  371. &__pal_control.user_address.end,
  372. &__pal_control.user_address_hole.start,
  373. &__pal_control.user_address_hole.end);
  374. __pal_control.pagesize = pal_state.pagesize;
  375. __pal_control.alloc_align = pal_state.alloc_align;
  376. __pal_control.broadcast_stream = _DkBroadcastStreamOpen();
  377. if (_DkGetCPUInfo(&__pal_control.cpu_info) < 0) {
  378. goto out_fail;
  379. }
  380. __pal_control.mem_info.mem_total = _DkMemoryQuota();
  381. #if PROFILING == 1
  382. pal_state.tail_startup_time += _DkSystemTimeQuery() - before_tail;
  383. __pal_control.relocation_time = pal_state.relocation_time;
  384. __pal_control.linking_time = pal_state.linking_time;
  385. __pal_control.manifest_loading_time
  386. = pal_state.manifest_loading_time;
  387. __pal_control.allocation_time = pal_state.slab_time;
  388. __pal_control.child_creation_time = (parent_process == NULL) ? 0 : pal_state.start_time -
  389. pal_state.process_create_time;
  390. #endif
  391. /* Now we will start the execution */
  392. start_execution(arguments, environments);
  393. out_fail:
  394. /* We wish we will never reached here */
  395. INIT_FAIL(PAL_ERROR_DENIED, "unexpected termination");
  396. }
  397. void write_log (int nstrs, ...)
  398. {
  399. const char ** strs = __alloca(sizeof(const char *) * nstrs);
  400. int len = 0;
  401. va_list ap;
  402. va_start(ap, nstrs);
  403. for (int i = 0 ; i < nstrs ; i++) {
  404. strs[i] = va_arg(ap, char *);
  405. len += strlen(strs[i]);
  406. }
  407. va_end(ap);
  408. char * buf = __alloca(len);
  409. int cnt = 0;
  410. for (int i = 0 ; i < nstrs ; i++) {
  411. int l = strlen(strs[i]);
  412. memcpy(buf + cnt, strs[i], l);
  413. cnt += l;
  414. }
  415. _DkStreamWrite(pal_state.log_stream, 0, cnt, buf, NULL, 0);
  416. }