Emulator.cpp 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386
  1. /*
  2. * Copyright (c) 2020, Andreas Kling <kling@serenityos.org>
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright notice, this
  9. * list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright notice,
  12. * this list of conditions and the following disclaimer in the documentation
  13. * and/or other materials provided with the distribution.
  14. *
  15. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  16. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  17. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  18. * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
  19. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  20. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  21. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  22. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  23. * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  24. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  25. */
  26. #include "Emulator.h"
  27. #include "SimpleRegion.h"
  28. #include "SoftCPU.h"
  29. #include <AK/LexicalPath.h>
  30. #include <AK/LogStream.h>
  31. #include <Kernel/API/Syscall.h>
  32. #include <fcntl.h>
  33. #include <stdio.h>
  34. #include <string.h>
  35. #include <sys/mman.h>
  36. #include <sys/stat.h>
  37. #include <unistd.h>
  38. //#define DEBUG_SPAM
  39. namespace UserspaceEmulator {
  40. static constexpr u32 stack_location = 0x10000000;
  41. static constexpr size_t stack_size = 64 * KB;
  42. Emulator::Emulator(const String& executable_path, NonnullRefPtr<ELF::Loader> elf)
  43. : m_elf(move(elf))
  44. , m_cpu(*this)
  45. , m_executable_path(executable_path)
  46. {
  47. setup_stack();
  48. }
  49. void Emulator::setup_stack()
  50. {
  51. auto stack_region = make<SimpleRegion>(stack_location, stack_size);
  52. m_mmu.add_region(move(stack_region));
  53. m_cpu.set_esp(stack_location + stack_size);
  54. m_cpu.push_string(LexicalPath(m_executable_path).basename());
  55. u32 argv0 = m_cpu.esp();
  56. m_cpu.push32(0); // char** envp = { nullptr }
  57. u32 envp = m_cpu.esp();
  58. m_cpu.push32(0); // char** argv = { argv0, nullptr }
  59. m_cpu.push32(argv0);
  60. u32 argv = m_cpu.esp();
  61. m_cpu.push32(0); // (alignment)
  62. u32 argc = 1;
  63. m_cpu.push32(envp);
  64. m_cpu.push32(argv);
  65. m_cpu.push32(argc);
  66. m_cpu.push32(0); // (alignment)
  67. }
  68. bool Emulator::load_elf()
  69. {
  70. m_elf->image().for_each_program_header([&](const ELF::Image::ProgramHeader& program_header) {
  71. if (program_header.type() == PT_LOAD) {
  72. auto region = make<SimpleRegion>(program_header.vaddr().get(), program_header.size_in_memory());
  73. memcpy(region->data(), program_header.raw_data(), program_header.size_in_image());
  74. mmu().add_region(move(region));
  75. return;
  76. }
  77. if (program_header.type() == PT_TLS) {
  78. auto tcb_region = make<SimpleRegion>(0x20000000, program_header.size_in_memory());
  79. memcpy(tcb_region->data(), program_header.raw_data(), program_header.size_in_image());
  80. auto tls_region = make<SimpleRegion>(0, 4);
  81. tls_region->write32(0, tcb_region->base() + 8);
  82. mmu().add_region(move(tcb_region));
  83. mmu().set_tls_region(move(tls_region));
  84. return;
  85. }
  86. });
  87. m_cpu.set_eip(m_elf->image().entry().get());
  88. return true;
  89. }
  90. class ELFSymbolProvider final : public X86::SymbolProvider {
  91. public:
  92. ELFSymbolProvider(ELF::Loader& loader)
  93. : m_loader(loader)
  94. {
  95. }
  96. virtual String symbolicate(FlatPtr address, u32* offset = nullptr) const
  97. {
  98. return m_loader.symbolicate(address, offset);
  99. }
  100. private:
  101. ELF::Loader& m_loader;
  102. };
  103. int Emulator::exec()
  104. {
  105. ELFSymbolProvider symbol_provider(*m_elf);
  106. bool trace = false;
  107. while (!m_shutdown) {
  108. u32 base_eip = 0;
  109. if (trace)
  110. base_eip = m_cpu.eip();
  111. auto insn = X86::Instruction::from_stream(m_cpu, true, true);
  112. if (trace)
  113. out() << (const void*)base_eip << " \033[33;1m" << insn.to_string(base_eip, &symbol_provider) << "\033[0m";
  114. (m_cpu.*insn.handler())(insn);
  115. if (trace)
  116. m_cpu.dump();
  117. }
  118. return m_exit_status;
  119. }
  120. void Emulator::dump_backtrace()
  121. {
  122. u32 offset = 0;
  123. String symbol = m_elf->symbolicate(m_cpu.eip(), &offset);
  124. printf("> %#08x %s +%#x\n", m_cpu.eip(), symbol.characters(), offset);
  125. u32 frame_ptr = m_cpu.ebp();
  126. while (frame_ptr) {
  127. u32 ret_ptr = m_mmu.read32({ 0x20, frame_ptr + 4 });
  128. if (!ret_ptr)
  129. return;
  130. symbol = m_elf->symbolicate(ret_ptr, &offset);
  131. printf("> %#08x %s +%#x\n", ret_ptr, symbol.characters(), offset);
  132. frame_ptr = m_mmu.read32({ 0x20, frame_ptr });
  133. }
  134. }
  135. u32 Emulator::virt_syscall(u32 function, u32 arg1, u32 arg2, u32 arg3)
  136. {
  137. (void)arg2;
  138. (void)arg3;
  139. #ifdef DEBUG_SPAM
  140. dbgprintf("Syscall: %s (%x)\n", Syscall::to_string((Syscall::Function)function), function);
  141. #endif
  142. switch (function) {
  143. case SC_mmap:
  144. return virt$mmap(arg1);
  145. case SC_gettid:
  146. return virt$gettid();
  147. case SC_getpid:
  148. return virt$getpid();
  149. case SC_pledge:
  150. return virt$pledge(arg1);
  151. case SC_unveil:
  152. return virt$unveil(arg1);
  153. case SC_getuid:
  154. return virt$getuid();
  155. case SC_getgid:
  156. return virt$getgid();
  157. case SC_close:
  158. return virt$close(arg1);
  159. case SC_fstat:
  160. return virt$fstat(arg1, arg2);
  161. case SC_write:
  162. return virt$write(arg1, arg2, arg3);
  163. case SC_read:
  164. return virt$read(arg1, arg2, arg3);
  165. case SC_mprotect:
  166. return virt$mprotect(arg1, arg2, arg3);
  167. case SC_madvise:
  168. return virt$madvise(arg1, arg2, arg3);
  169. case SC_open:
  170. return virt$open(arg1);
  171. case SC_fcntl:
  172. return virt$fcntl(arg1, arg2, arg3);
  173. case SC_getgroups:
  174. return virt$getgroups(arg1, arg2);
  175. case SC_lseek:
  176. return virt$lseek(arg1, arg2, arg3);
  177. case SC_get_process_name:
  178. return virt$get_process_name(arg1, arg2);
  179. case SC_exit:
  180. virt$exit((int)arg1);
  181. return 0;
  182. default:
  183. warn() << "Unimplemented syscall!";
  184. dump_backtrace();
  185. TODO();
  186. }
  187. }
  188. int Emulator::virt$fstat(int fd, FlatPtr statbuf)
  189. {
  190. struct stat local_statbuf;
  191. int rc = syscall(SC_fstat, fd, &local_statbuf);
  192. if (rc < 0)
  193. return rc;
  194. mmu().copy_to_vm(statbuf, &local_statbuf, sizeof(local_statbuf));
  195. return rc;
  196. }
  197. int Emulator::virt$close(int fd)
  198. {
  199. return syscall(SC_close, fd);
  200. }
  201. int Emulator::virt$get_process_name(FlatPtr buffer, int size)
  202. {
  203. if (size < 9)
  204. return -ENAMETOOLONG;
  205. mmu().copy_to_vm(buffer, "EMULATED", 9);
  206. return 0;
  207. }
  208. int Emulator::virt$lseek(int fd, off_t offset, int whence)
  209. {
  210. return syscall(SC_lseek, fd, offset, whence);
  211. }
  212. int Emulator::virt$getgroups(ssize_t count, FlatPtr groups)
  213. {
  214. if (!count)
  215. return syscall(SC_getgroups, 0, nullptr);
  216. auto buffer = ByteBuffer::create_uninitialized(count * sizeof(gid_t));
  217. int rc = syscall(SC_getgroups, count, buffer.data());
  218. if (rc < 0)
  219. return rc;
  220. mmu().copy_to_vm(groups, buffer.data(), buffer.size());
  221. return 0;
  222. }
  223. u32 Emulator::virt$fcntl(int fd, int cmd, u32 arg)
  224. {
  225. switch (cmd) {
  226. case F_DUPFD:
  227. case F_GETFD:
  228. case F_SETFD:
  229. case F_GETFL:
  230. case F_SETFL:
  231. case F_ISTTY:
  232. break;
  233. default:
  234. TODO();
  235. }
  236. return syscall(SC_fcntl, fd, cmd, arg);
  237. }
  238. u32 Emulator::virt$open(u32 params_addr)
  239. {
  240. Syscall::SC_open_params params;
  241. mmu().copy_from_vm(&params, params_addr, sizeof(params));
  242. auto path = mmu().copy_buffer_from_vm((FlatPtr)params.path.characters, params.path.length);
  243. int fd = openat_with_path_length(params.dirfd, (const char*)path.data(), path.size(), params.options, params.mode);
  244. if (fd < 0)
  245. return -errno;
  246. return fd;
  247. }
  248. u32 Emulator::virt$mmap(u32 params_addr)
  249. {
  250. Syscall::SC_mmap_params params;
  251. mmu().copy_from_vm(&params, params_addr, sizeof(params));
  252. ASSERT(params.addr == 0);
  253. ASSERT(params.flags & MAP_ANONYMOUS);
  254. // FIXME: Write a proper VM allocator
  255. static u32 next_address = 0x30000000;
  256. u32 final_address = 0;
  257. u32 final_size = round_up_to_power_of_two(params.size, PAGE_SIZE);
  258. if (params.alignment) {
  259. // FIXME: What if alignment is not a power of 2?
  260. final_address = round_up_to_power_of_two(next_address, params.alignment);
  261. } else {
  262. final_address = next_address;
  263. }
  264. next_address = final_address + final_size;
  265. mmu().add_region(make<SimpleRegion>(final_address, final_size));
  266. return final_address;
  267. }
  268. u32 Emulator::virt$gettid()
  269. {
  270. return gettid();
  271. }
  272. u32 Emulator::virt$getpid()
  273. {
  274. return getpid();
  275. }
  276. u32 Emulator::virt$pledge(u32)
  277. {
  278. return 0;
  279. }
  280. u32 Emulator::virt$unveil(u32)
  281. {
  282. return 0;
  283. }
  284. u32 Emulator::virt$mprotect(FlatPtr, size_t, int)
  285. {
  286. return 0;
  287. }
  288. u32 Emulator::virt$madvise(FlatPtr, size_t, int)
  289. {
  290. return 0;
  291. }
  292. uid_t Emulator::virt$getuid()
  293. {
  294. return getuid();
  295. }
  296. gid_t Emulator::virt$getgid()
  297. {
  298. return getgid();
  299. }
  300. u32 Emulator::virt$write(int fd, FlatPtr data, ssize_t size)
  301. {
  302. if (size < 0)
  303. return -EINVAL;
  304. auto buffer = mmu().copy_buffer_from_vm(data, size);
  305. return syscall(SC_write, fd, buffer.data(), buffer.size());
  306. }
  307. u32 Emulator::virt$read(int fd, FlatPtr buffer, ssize_t size)
  308. {
  309. if (size < 0)
  310. return -EINVAL;
  311. auto local_buffer = ByteBuffer::create_uninitialized(size);
  312. int nread = syscall(SC_read, fd, local_buffer.data(), local_buffer.size());
  313. if (nread < 0)
  314. return nread;
  315. mmu().copy_to_vm(buffer, local_buffer.data(), local_buffer.size());
  316. return nread;
  317. }
  318. void Emulator::virt$exit(int status)
  319. {
  320. dbg() << "exit(" << status << "), shutting down!";
  321. m_exit_status = status;
  322. m_shutdown = true;
  323. }
  324. }