-
Notifications
You must be signed in to change notification settings - Fork 215
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add support for position independent executables #206
Conversation
I've started working on an implementation in https://github.com/Freax13/bootloader/tree/aslr in case someone is interested. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great, thanks a lot!
I just noticed that simply writing to the elf file in https://github.com/Freax13/bootloader/blob/5d61efd72e201aff401031119ae0662d7a175f72/src/binary/load_kernel.rs#L400 is wildly unsound: We have an immutable reference to that memory, so we can't just write to it. We can probably copy the memory to a new frame similar to what we do in |
Oh yeah, you're right. Instead of copying, we could also wrap the kernel slice in an Just FYI: I'm currently working on a redesign of the bootloader crate in the The UEFI implementation already seems to work. The challenge is to implement the same approach for the BIOS bootloader too. |
That wouldn't work, we'd need to wrap each
Very cool! I have a feeling that will make a lot of things a lot easier!
Yes and no, we still need to make sure that the relocations don't overlap with any other structures of the elf file. Considering that elf files contain a bunch of tables and addresses that could all possibly overlap and reference each other, I don't think modifying the file in place is a good approach. AFAICT, the redesign hasn't (yet) changed kernel loading by much, so I'll continue working on this pr support for now, however if you have plans to make significant changes |
Yeah, I think you're right that changing the file in-place is not a good idea.
I don't think that I'll change the kernel loading, only the loading of the kernel slice and the configuration. |
I fixed the aliasing issues by lazily coping to new frames before writing. |
Not sure why CI failed, I don't think it has anything to do with this pr. |
I also got these macOS test errors on CI occasionally over the past few days. Not sure what's going on, but I agree that it seems unrelated to this PR. |
They might be related to rust-lang/cargo#8941. I think the problem is that multiple tests build and use the I pushed a workaround in e8dc356 that runs the tests sequentially on macOS. As a longer-term solution, I'm thinking about using the upcoming "artifact dependencies" feature of cargo, but I'm not sure if this use case will be supported by cargo (see my question on zulip). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I left one comment, otherwise this looks good to me. I haven't tested the code though.
There seems to be a small type error:
|
Oops, that's embarassing. Should be fixed now. |
Thanks! |
So this doesn't actually initialize the kernel correctly and causes a #GP immediately when using |
Could you provide an example of a kernel that doesn't get initialized properly? I just ran the |
After overwriting the |
@Freax13 mine for some reason doesn't do that. And I'm waiting on the 0.11 release so the build process doesn't depend on the TOML dependencies list. |
So I just tried adding |
The bootloader itself must be built without PIE. Did you make sure that you used the bootloader from the master branch and not from crates.io? |
Yes. I added this to my dependencies section in Cargo.toml: bootloader = { git = "https://github.com/rust-osdev/bootloader" } I'm building it using this cargo-makefile ruleset: [tasks.default]
run_task = { name = ["check_pciids", "format", "build", "run"] }
#...
[tasks.format]
command = "cargo"
args = ["fmt", "--all"]
[tasks.build]
run_task = { name = ["check_kernel", "clippy_kernel", "build_kernel", "build_bootloader"] }
dependencies = ["format"]
[tasks.build_kernel]
command = "cargo"
args = ["rustc", "-Zbuild-std=core,compiler_builtins,alloc", "-Zbuild-std-features=compiler-builtins-mem", "--target", "x86_64-unknown-none", "--", "-C", "relocation-model=static"]
[tasks.build_bootloader]
script_runner = "@rust"
script = '''
//!```cargo
//![dependencies]
//!bootloader-locator = "*"
//!```
use std::process::Command;
use std::env::var;
use bootloader_locator::locate_bootloader;
fn main() {
let mut bootloader_location = locate_bootloader("bootloader").expect("Could not find bootloader");
bootloader_location.pop();
let bootloader_location = bootloader_location.into_os_string();
let bootloader_location = bootloader_location.to_str().unwrap();
let cwd = var("CARGO_MAKE_WORKING_DIRECTORY").expect("CARGO_MAKE_WORKING_DIRECTORY not set");
let mut builder_command = Command::new("cargo");
builder_command.current_dir(bootloader_location);
builder_command.args(&["builder", "--kernel-manifest", &(cwd.clone() + "/Cargo.toml"), "--kernel-binary", &(cwd.clone() + "/target/x86_64-unknown-none/debug/kernel"), "--target-dir", &(cwd.clone() + "/target"), "--out-dir", &(cwd.clone() + "/target/x86_64-unknown-none/debug")]);
builder_command.status().expect("Failed to run cargo builder");
}
'''
[tasks.run]
command = "qemu-system-x86_64"
args = ["-enable-kvm", "-machine", "q35,smm=off,vmport=off", "-cpu", "host,kvm=on", "-m", "8G", "-device", "virtio-balloon", "-nographic", "-device", "qemu-xhci,id=input", "-device", "usb-kbd,bus=input.0", "-device", "usb-tablet,bus=input.0", "-audiodev", "pa,id=audio0,out.mixing-engine=off,out.stream-name=kernel,in.stream-name=kernel", "-device", "intel-hda", "-device", "hda-duplex,audiodev=audio0", "-rtc", "base=localtime,clock=host,driftfix=slew", "-drive", "format=raw,file=${CARGO_MAKE_WORKING_DIRECTORY}/target/x86_64-unknown-none/debug/boot-uefi-kernel.img", "-drive", "if=pflash,format=raw,file=/usr/share/OVMF/x64/OVMF_CODE.fd,readonly=on", "-drive", "file=disk-nvme.qcow2,if=none,id=NVME01", "-device", "nvme,drive=NVME01,serial=0001", "-drive", "id=disk,file=disk-sata.qcow2,if=none", "-device", "ahci,id=ahci", "-device", "ide-hd,drive=disk,bus=ahci.0", "-debugcon", "file:qemu.log", "-global", "isa-debugcon.iobase=0x402", "-d", "int", "-D", "qemu2.log", "-device", "qemu-xhci,id=audio", "-device", "usb-audio,audiodev=usbaudio,bus=audio.0", "-audiodev", "pa,id=usbaudio,out.mixing-engine=off,out.stream-name=kernel-alsa,in.stream-name=kernel-alsa", "-device", "virtio-net,netdev=nic", "-netdev", "user,hostname=kernel,id=nic", "-device", "virtio-rng-pci,rng=rng0", "-object", "rng-random,id=rng0,filename=/dev/urandom", "-device", "virtio-gpu", "-global", "driver=cfi.pflash01,property=secure,value=on", "-no-reboot"]
dependencies=["build"]
[tasks.check_kernel]
command = "cargo"
args = ["check", "-Zbuild-std=core,compiler_builtins,alloc", "-Zbuild-std-features=compiler-builtins-mem", "--target", "x86_64-unknown-none"]
[tasks.clippy_kernel]
command = "cargo"
args = ["clippy", "-Zbuild-std=core,compiler_builtins,alloc", "-Zbuild-std-features=compiler-builtins-mem", "--target", "x86_64-unknown-none"] I don't know if the above tasks (check/clippy) break the build in some way. It doesn't (appear) to do so, but my kernel (still) isn't booting, so I'm really not sure what else to try at this point. |
This works for me. I forked your repo and commited all the changes I made to it: https://github.com/Freax13/kernel. I recommend running |
@Freax13 So I tried your build and it works for me. I then tried applying your changes and my copy still doesn't work. I am soooooooo confused at this point... |
This pr adds support for position independent executables. This is not particularly useful by itself, however I plan to follow this up with a pr implementing ASLR. For now the bootloader always loads the kernel at
0x400000
.This pr only implements one type of relocation:
R_AMD64_RELATIVE
. I've used code similar to this to relocate code in userspace andR_AMD64_RELATIVE
was the only relocation type I ever came across. I didn't implement any others types because I don't how to make rust emit them and thus am unable to test the implementations for any other types. If the code encounters any other type it will panic, stating that the type is not implemented. If this ever happens it should be trivial to implement the relocation and add a corresponding test.I also didn't implement relocations using the symbol table for the same reason: I never saw them emitted by rust and couldn't test them.
I've added a test kernel
pie
testing relocations.