blob: 892dc9f96e8dc7923e0f85445162c4bd524bab19 [file] [log] [blame]
Andrew Walbranb996b4a2022-04-22 15:15:41 +00001// Copyright 2022, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! Rust entry point.
16
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000017use crate::{
Pierre-Clément Tosi32d96792024-04-29 01:19:37 +010018 bionic, console, heap,
19 hyp::{self, MMIO_GUARD_GRANULE_SIZE},
20 logger,
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000021 power::{reboot, shutdown},
Pierre-Clément Tosi62ffc0d2023-06-30 09:31:56 +000022 rand,
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000023};
Pierre-Clément Tosi62ffc0d2023-06-30 09:31:56 +000024use core::mem::size_of;
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000025
26fn try_console_init() -> Result<(), hyp::Error> {
27 console::init();
28
Pierre-Clément Tosia9b345f2024-04-27 01:01:42 +010029 if let Some(mmio_guard) = hyp::get_mmio_guard() {
Pierre-Clément Tosi15ae4a52023-07-11 13:31:31 +000030 mmio_guard.enroll()?;
Pierre-Clément Tosi32d96792024-04-29 01:19:37 +010031
32 // TODO(ptosi): Use MmioSharer::share() to properly track this MMIO_GUARD_MAP.
33 //
34 // MmioSharer only supports MMIO_GUARD_GRANULE_SIZE so fail early here if needed.
35 assert_eq!(mmio_guard.granule()?, MMIO_GUARD_GRANULE_SIZE);
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000036 mmio_guard.map(console::BASE_ADDRESS)?;
37 }
38
39 Ok(())
40}
Andrew Walbranb996b4a2022-04-22 15:15:41 +000041
42/// This is the entry point to the Rust code, called from the binary entry point in `entry.S`.
43#[no_mangle]
Andrew Walbrane03395a2022-04-29 15:15:49 +000044extern "C" fn rust_entry(x0: u64, x1: u64, x2: u64, x3: u64) -> ! {
Andrew Walbranc06e7342023-07-05 14:00:51 +000045 // SAFETY: Only called once, from here, and inaccessible to client code.
Pierre-Clément Tosi8ca7a442023-06-22 13:47:15 +000046 unsafe { heap::init() };
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000047
48 if try_console_init().is_err() {
49 // Don't panic (or log) here to avoid accessing the console.
50 reboot()
51 }
52
53 logger::init().expect("Failed to initialize the logger");
54 // We initialize the logger to Off (like the log crate) and clients should log::set_max_level.
55
Pierre-Clément Tosi62ffc0d2023-06-30 09:31:56 +000056 const SIZE_OF_STACK_GUARD: usize = size_of::<u64>();
57 let mut stack_guard = [0u8; SIZE_OF_STACK_GUARD];
58 // We keep a null byte at the top of the stack guard to act as a string terminator.
59 let random_guard = &mut stack_guard[..(SIZE_OF_STACK_GUARD - 1)];
60
Pierre-Clément Tosi20daaef2023-10-26 11:34:55 +010061 if let Err(e) = rand::init() {
62 panic!("Failed to initialize a source of entropy: {e}");
63 }
64
65 if let Err(e) = rand::fill_with_entropy(random_guard) {
66 panic!("Failed to get stack canary entropy: {e}");
67 }
68
Pierre-Clément Tosi62ffc0d2023-06-30 09:31:56 +000069 bionic::__get_tls().stack_guard = u64::from_ne_bytes(stack_guard);
70
71 // Note: If rust_entry ever returned (which it shouldn't by being -> !), the compiler-injected
72 // stack guard comparison would detect a mismatch and call __stack_chk_fail.
73
Andrew Walbranc06e7342023-07-05 14:00:51 +000074 // SAFETY: `main` is provided by the application using the `main!` macro, and we make sure it
75 // has the right type.
Andrew Walbranb996b4a2022-04-22 15:15:41 +000076 unsafe {
Andrew Walbrane03395a2022-04-29 15:15:49 +000077 main(x0, x1, x2, x3);
Andrew Walbranb996b4a2022-04-22 15:15:41 +000078 }
79 shutdown();
80}
81
82extern "Rust" {
83 /// Main function provided by the application using the `main!` macro.
Andrew Walbrane03395a2022-04-29 15:15:49 +000084 fn main(arg0: u64, arg1: u64, arg2: u64, arg3: u64);
Andrew Walbranb996b4a2022-04-22 15:15:41 +000085}
86
87/// Marks the main function of the binary.
88///
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000089/// Once main is entered, it can assume that:
90/// - The panic_handler has been configured and panic!() and friends are available;
91/// - The global_allocator has been configured and heap memory is available;
92/// - The logger has been configured and the log::{info, warn, error, ...} macros are available.
93///
Andrew Walbranb996b4a2022-04-22 15:15:41 +000094/// Example:
95///
96/// ```rust
Pierre-Clément Tosid3305482023-06-29 15:03:48 +000097/// use vmbase::main;
Jakob Vukalovicef996292023-04-13 14:28:34 +000098/// use log::{info, LevelFilter};
Andrew Walbranb996b4a2022-04-22 15:15:41 +000099///
100/// main!(my_main);
101///
102/// fn my_main() {
Pierre-Clément Tosid3305482023-06-29 15:03:48 +0000103/// log::set_max_level(LevelFilter::Info);
Jakob Vukalovicef996292023-04-13 14:28:34 +0000104/// info!("Hello world");
Andrew Walbranb996b4a2022-04-22 15:15:41 +0000105/// }
106/// ```
107#[macro_export]
108macro_rules! main {
109 ($name:path) => {
110 // Export a symbol with a name matching the extern declaration above.
111 #[export_name = "main"]
Andrew Walbrane03395a2022-04-29 15:15:49 +0000112 fn __main(arg0: u64, arg1: u64, arg2: u64, arg3: u64) {
Andrew Walbranb996b4a2022-04-22 15:15:41 +0000113 // Ensure that the main function provided by the application has the correct type.
Andrew Walbrane03395a2022-04-29 15:15:49 +0000114 $name(arg0, arg1, arg2, arg3)
Andrew Walbranb996b4a2022-04-22 15:15:41 +0000115 }
116 };
117}