1 // Copyright 2022, The Android Open Source Project
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 // http://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14
15 //! Project Rialto main source file.
16
17 #![no_main]
18 #![no_std]
19
20 mod communication;
21 mod error;
22 mod exceptions;
23 mod fdt;
24
25 extern crate alloc;
26
27 use crate::communication::VsockStream;
28 use crate::error::{Error, Result};
29 use crate::fdt::{read_dice_range_from, read_is_strict_boot, read_vendor_hashtree_root_digest};
30 use alloc::boxed::Box;
31 use ciborium_io::Write;
32 use core::num::NonZeroUsize;
33 use core::slice;
34 use diced_open_dice::{bcc_handover_parse, DiceArtifacts};
35 use log::{debug, error, info};
36 use service_vm_comm::{ServiceVmRequest, VmType};
37 use service_vm_fake_chain::service_vm;
38 use service_vm_requests::{process_request, RequestContext};
39 use virtio_drivers::{
40 device::socket::{VsockAddr, VMADDR_CID_HOST},
41 transport::{
42 pci::bus::{ConfigurationAccess, PciRoot},
43 DeviceType, Transport,
44 },
45 Hal,
46 };
47 use vmbase::{
48 configure_heap,
49 fdt::pci::PciInfo,
50 fdt::SwiotlbInfo,
51 generate_image_header,
52 layout::crosvm,
53 main,
54 memory::{
55 init_shared_pool, map_rodata, map_rodata_outside_main_memory, resize_available_memory,
56 SIZE_128KB,
57 },
58 power::reboot,
59 virtio::{
60 pci::{self, PciTransportIterator, VirtIOSocket},
61 HalImpl,
62 },
63 };
64
host_addr(fdt: &libfdt::Fdt) -> Result<VsockAddr>65 fn host_addr(fdt: &libfdt::Fdt) -> Result<VsockAddr> {
66 Ok(VsockAddr { cid: VMADDR_CID_HOST, port: vm_type(fdt)?.port() })
67 }
68
vm_type(fdt: &libfdt::Fdt) -> Result<VmType>69 fn vm_type(fdt: &libfdt::Fdt) -> Result<VmType> {
70 if read_is_strict_boot(fdt)? {
71 Ok(VmType::ProtectedVm)
72 } else {
73 Ok(VmType::NonProtectedVm)
74 }
75 }
76
77 /// # Safety
78 ///
79 /// Behavior is undefined if any of the following conditions are violated:
80 /// * The `fdt_addr` must be a valid pointer and points to a valid `Fdt`.
try_main(fdt_addr: usize) -> Result<()>81 unsafe fn try_main(fdt_addr: usize) -> Result<()> {
82 info!("Welcome to Rialto!");
83
84 let fdt_size = NonZeroUsize::new(crosvm::FDT_MAX_SIZE).unwrap();
85 map_rodata(fdt_addr, fdt_size)?;
86 // SAFETY: The tracker validated the range to be in main memory, mapped, and not overlap.
87 let fdt = unsafe { slice::from_raw_parts(fdt_addr as *mut u8, fdt_size.into()) };
88 // We do not need to validate the DT since it is already validated in pvmfw.
89 let fdt = libfdt::Fdt::from_slice(fdt)?;
90
91 let memory_range = fdt.first_memory_range()?;
92 resize_available_memory(&memory_range).inspect_err(|_| {
93 error!("Failed to use memory range value from DT: {memory_range:#x?}");
94 })?;
95
96 let swiotlb_range = SwiotlbInfo::new_from_fdt(fdt)
97 .inspect_err(|_| {
98 error!("Rialto failed when access swiotlb");
99 })?
100 .and_then(|info| info.fixed_range());
101 init_shared_pool(swiotlb_range).inspect_err(|_| {
102 error!("Failed to initialize shared pool.");
103 })?;
104
105 let bcc_handover: Box<dyn DiceArtifacts> = match vm_type(fdt)? {
106 VmType::ProtectedVm => {
107 let dice_range = read_dice_range_from(fdt)?;
108 info!("DICE range: {dice_range:#x?}");
109 let dice_size = dice_range.len().try_into().unwrap();
110 // SAFETY: The DICE memory region has been generated by pvmfw and doesn't overlap.
111 unsafe { map_rodata_outside_main_memory(dice_range.start, dice_size) }.inspect_err(
112 |_| {
113 error!("Failed to use DICE range from DT: {dice_range:#x?}");
114 },
115 )?;
116 let dice_start = dice_range.start as *const u8;
117 // SAFETY: There's no memory overlap and the region is mapped as read-only data.
118 let bcc_handover = unsafe { slice::from_raw_parts(dice_start, dice_range.len()) };
119 Box::new(bcc_handover_parse(bcc_handover)?)
120 }
121 // Currently, a sample DICE data is used for non-protected VMs, as these VMs only run
122 // in tests at the moment.
123 VmType::NonProtectedVm => Box::new(service_vm::fake_service_vm_dice_artifacts()?),
124 };
125
126 let pci_info = PciInfo::from_fdt(fdt)?;
127 debug!("PCI: {pci_info:#x?}");
128 let mut pci_root = pci::initialize(pci_info).map_err(Error::PciInitializationFailed)?;
129 let socket_device = find_socket_device::<HalImpl>(&mut pci_root)?;
130 debug!("Found socket device: guest cid = {:?}", socket_device.guest_cid());
131 let vendor_hashtree_root_digest = read_vendor_hashtree_root_digest(fdt)?;
132 let request_context =
133 RequestContext { dice_artifacts: bcc_handover.as_ref(), vendor_hashtree_root_digest };
134
135 let mut vsock_stream = VsockStream::new(socket_device, host_addr(fdt)?)?;
136 while let ServiceVmRequest::Process(req) = vsock_stream.read_request()? {
137 info!("Received request: {}", req.name());
138 let response = process_request(req, &request_context);
139 info!("Sending response: {}", response.name());
140 vsock_stream.write_response(&response)?;
141 vsock_stream.flush()?;
142 }
143 vsock_stream.shutdown()?;
144
145 Ok(())
146 }
147
find_socket_device<T: Hal>( pci_root: &mut PciRoot<impl ConfigurationAccess>, ) -> Result<VirtIOSocket<T>>148 fn find_socket_device<T: Hal>(
149 pci_root: &mut PciRoot<impl ConfigurationAccess>,
150 ) -> Result<VirtIOSocket<T>> {
151 PciTransportIterator::<T, _>::new(pci_root)
152 .find(|t| DeviceType::Socket == t.device_type())
153 .map(VirtIOSocket::<T>::new)
154 .transpose()
155 .map_err(Error::VirtIOSocketCreationFailed)?
156 .ok_or(Error::MissingVirtIOSocketDevice)
157 }
158
159 /// Entry point for Rialto.
main(fdt_addr: u64, _a1: u64, _a2: u64, _a3: u64)160 pub fn main(fdt_addr: u64, _a1: u64, _a2: u64, _a3: u64) {
161 log::set_max_level(log::LevelFilter::Debug);
162 // SAFETY: `fdt_addr` is supposed to be a valid pointer and points to
163 // a valid `Fdt`.
164 if let Err(e) = unsafe { try_main(fdt_addr as usize) } {
165 error!("Rialto failed with {e}");
166 reboot()
167 }
168 }
169
170 generate_image_header!();
171 main!(main);
172 configure_heap!(SIZE_128KB * 2);
173