asterinas/README.md

237 lines
12 KiB
Markdown
Raw Normal View History

# Asterinas
2022-05-18 06:26:07 +00:00
Asterinas is a _secure_, _fast_, and _general-purpose_ OS kernel, written in Rust and providing Linux-compatible ABI.
2022-05-18 06:26:07 +00:00
Asterinas is designed and implemented with an emphasis on security, rendering it highly attractive for usage scenarios where Linux ABI is indispensable, but Linux itself is deemed insecure given its sheer size of TCB and its nature of being memory unsafe. An instance of such usage is employing Asterinas as the guest OS for VM TEEs (e.g., [AMD SEV](https://www.amd.com/en/developer/sev.html) and [Intel TDX](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html)).
2022-05-18 06:26:07 +00:00
## What's unique about Asterinas
2022-05-18 06:26:07 +00:00
Asterinas is a _zero-cost_, _least-privilege_ OS kernel. A least-privilege OS is one that adheres to the principle of least privileges, which mandates that every unit (e.g., a subsystem, a module, a function, or even an object) of the OS has the minimum authority and permissions required to perform its tasks. This approach reduces the security risk associated with any single element's bugs or flaws. By "zero-cost", we means the same as in Rust's philosophy of zero-cost abstractions, which emphasizes that high-level abstractions (like those that enable least privilege principles) should be available to developers to use, but not come at the cost of performance. Thus, a zero-cost, least-privilege OS enhances its security without compromising its performance.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
Some prior OSes do abide by the [principle of least privilege](https://en.wikipedia.org/wiki/Principle_of_least_privilege), but come with considerable performance costs. Take [seL4](https://sel4.systems/) as an example. A [seL4-based multi-server OS](https://docs.sel4.systems/projects/camkes/) minimizes the scope of the OS running in the privileged CPU mode to the seL4 microkernel. The bulk of OS functionalities are implemented by process-based servers, which are separated by process boundary and only allowed to communicate with each other through well-defined interfaces, usually based on RPC. Each service can only access kernel resources represented by [seL4 capabilities](), each of which is restricted with respect to its scope and permissions. All these security measures contribute to the enhanced security of the OS, but result in a considerable runtime costs due to context switching, message passing, and runtime checks.
2022-05-18 06:26:07 +00:00
Asterinas is unique in practicing the principle of least privilege without sacrificing the performance. This is achieved by realizing the full potential of Rust, which, compared to the traditional system programming language like C/C++, offers unique features like an expressive type system, memory safety with unsafe extensions, powerful macros, and a customizable toolchain. By leveraging these unique features, Asterinas is able to construct zero-cost abstractions that enable least privileges at the following three levels.
2022-05-18 06:26:07 +00:00
1. The architectural level. Asterinas is architected as a _framekernel_, where the entire OS resides in a single address space and unsafe Rust code is restricted to a tiny portion of the OS called Asterinas Framework. The Framework exposes safe APIs to the rest of Asterinas, which implements the most of OS functionalities in safe Rust code completely. Thanks to the framekernel architecture, Asterinas's TCB for memory safety is minimized.
2022-05-18 06:26:07 +00:00
![Architecture](docs/src/images/arch_comparison.png)
2. The component level. Upon Asterinas Framework is a set of OS components, each of which is responsible for a particular OS functionality, feature, or device. These OS components are Rust crates with two traits: (1) containing safe Rust code, as demanded by the framekernel architecture, and (2) being governed by Asterinas Component System, which can enforce a fine-grained access control to their public APIs. The access control policy is specified in a configuration file and enforced at compile time, using a static analysis tool.
2022-05-18 06:26:07 +00:00
3. The object level. Asterinas promotes the philosophy of _everything-is-a-capability_, which means all kernel resources, from files to threads, from virtual memory to physical pages, should be accessed through [capabilities](https://en.wikipedia.org/wiki/Capability-based_security). In Asterinas, capabilities are implemented as Rust objects that are constrained in their creation, acquisition, and usage. One common form of capabilities is those with access rights. Wherever possible, access rights are encoded in types (rather than values) so that they can be checked at compile time, eliminating any runtime costs.
2022-05-18 06:26:07 +00:00
As a zero-cost, least-privilege OS, Asterinas provides the best of both worlds: the performance of a monolithic kernel and the security of a microkernel. Like a monolithic kernel, the different parts of Asterinas can communicate with the most efficient means, e.g., function calls and memory sharing. In the same spirit as a microkernel, the fundamental security properties of the OS depend on a minimum amount of code (i.e., Asterinas Framework).
2022-05-18 06:26:07 +00:00
## Build, test and debug Asterinas
2022-05-18 06:26:07 +00:00
2023-07-05 06:08:58 +00:00
While most of the code is written in Rust, the project-scope build process is governed by Makefile. The development environment is managed with Docker. Please ensure Docker is installed and can be run without sudo privilege.
2022-08-08 22:43:47 +00:00
2023-04-10 03:12:42 +00:00
### Preparation
1. Download the latest source code of asterinas.
2022-08-31 07:10:40 +00:00
```bash
2023-07-05 06:08:58 +00:00
git clone [repository url]
2022-08-31 07:10:40 +00:00
```
2023-07-05 06:08:58 +00:00
2. After downloading the source code, run the following command to pull the development image.
2022-08-31 07:10:40 +00:00
```bash
docker pull asterinas/asterinas:0.2.2
2022-08-31 07:10:40 +00:00
```
2023-07-05 06:08:58 +00:00
3. Start the development container.
2022-08-17 03:22:49 +00:00
```bash
docker run -it --privileged --network=host --device=/dev/kvm -v `pwd`:/root/asterinas asterinas/asterinas:0.2.2
2022-08-17 03:22:49 +00:00
```
2023-07-05 06:08:58 +00:00
**All build and test commands should be run inside the development container.**
### Build
2023-07-05 06:08:58 +00:00
1. Build the project.
2023-04-10 03:12:42 +00:00
```bash
make build
2023-02-07 08:05:21 +00:00
```
2023-07-05 06:08:58 +00:00
2. If everything goes well, then we can run the OS.
2023-02-07 08:05:21 +00:00
```bash
2023-04-10 03:12:42 +00:00
make run
2023-02-07 08:05:21 +00:00
```
### Unit Test
#### User mode unit tests
2023-11-08 15:59:23 +00:00
Many of our crates does not require running on bare metal environment and can be tested through the standard Cargo testing framework. A specific list of which crates can be tested with `cargo test` is listed in the `Makefile` of the root workspace, and by using Make you can test all these crates together.
```bash
make test
```
Nevertheless, you could enter the directory of a specific crate and invoke `cargo test` to perform user mode unit tests and doctests.
#### Kernel mode unit tests
2023-12-25 03:12:25 +00:00
We can run unit tests in kernel mode for crates like `aster-frame` or `aster-std`. This is powered by our [ktest](framework/libs/ktest) framework.
2022-08-08 22:43:47 +00:00
```bash
2023-11-08 15:59:23 +00:00
make run KTEST=1
2023-11-04 08:41:30 +00:00
```
2023-11-08 15:59:23 +00:00
You could also specify tests in a crate or a subset of tests to run.
2023-11-04 08:41:30 +00:00
```bash
2023-12-25 03:12:25 +00:00
make run KTEST=1 KTEST_WHITELIST=failing_assertion,aster_frame::test::expect_panic KTEST_CRATES=aster-frame
2022-08-17 03:22:49 +00:00
```
#### Component check
2023-07-05 06:08:58 +00:00
If we want to check access control policy among components, install some standalone tools (e.g., `cargo-component`).
2023-04-10 03:12:42 +00:00
``` bash
make tools
```
2023-07-05 06:08:58 +00:00
2023-04-10 03:12:42 +00:00
Then we can use the tool to check access control policy.
2022-08-17 03:22:49 +00:00
```bash
2023-04-10 03:12:42 +00:00
cargo component-check
2022-08-17 03:22:49 +00:00
```
2023-11-04 08:41:30 +00:00
### Integration Test
2023-05-29 05:29:53 +00:00
2023-11-02 09:37:21 +00:00
#### Regression Test
This command will automatically run Asterinas with the test binaries in `regression/apps` directory.
2023-11-02 09:37:21 +00:00
```bash
make run AUTO_TEST=regression
```
#### Syscall Test
This command will build the syscall test binary and automatically run Asterinas with the tests using QEMU.
2023-05-29 05:29:53 +00:00
```bash
make run AUTO_TEST=syscall
2023-05-29 05:29:53 +00:00
```
Alternatively, if you wish to test it interactively inside a shell in Asterinas.
```bash
make run BUILD_SYSCALL_TEST=1
2023-05-29 05:29:53 +00:00
```
Then, we can run the following script using the Asterinas shell to run all syscall test cases.
2023-05-29 05:29:53 +00:00
```bash
/opt/syscall_test/run_syscall_test.sh
```
### Debug
To debug Asterinas using [QEMU GDB remote debugging](https://qemu-project.gitlab.io/qemu/system/gdb.html), you could compile Asterinas in debug mode, start a Asterinas instance and run the GDB interactive shell in another terminal.
To start a QEMU Asterinas VM and wait for debugging connection:
```bash
make run GDB_SERVER=1 ENABLE_KVM=0
```
To get the GDB interactive shell:
```bash
make run GDB_CLIENT=1
```
Currently, the Asterinas runner's debugging interface is exposed by unix socket. Thus there shouldn't be multiple debugging instances in the same container. To add debug symbols for the underlying infrastructures such as UEFI firmware or bootloader, please check the runner's source code for details.
## Code organization
The codebase of Asterinas is organized as below.
* `runner/`: creating a bootable Asterinas kernel image along with an initramfs image. It also supports `cargo run` since it is the only package with `main()`.
* `kernel/`: defining the entry point of the Asterinas kernel.
* `framework/`: the privileged half of Asterinas (allowed to use `unsafe` keyword)
2023-12-25 03:12:25 +00:00
* `aster-frame`: providing the safe Rust abstractions for low-level resources like CPU, memory, interrupts, etc;
* `libs`: Privileged libraries.
* `services/`: the unprivileged half of Asterinas (not allowed to use `unsafe` directly), implementing most of the OS functionalities.
* `comps/`: Asterinas OS components;
* `libs/`: Asterinas OS libraries;
2023-12-25 03:12:25 +00:00
* `aster-std`: this is where system calls are implemented. Currently, this crate is too big. It will eventually be decomposed into smaller crates.
* `tests/`: providing integration tests written in Rust.
* `regression/`: providing user-space tests written in C.
* `docs/`: The Asterinas book (needs a major update).
## Development status
Asterinas is under active development. The list below summarizes the progress of important planned features.
* Technical novelty
- [X] Asterinas Framework
- [X] Asterinas Component System
- [X] Asterinas Capabilities
* High-level stuff
* Process management
- [X] Essential system calls (fork, execve, etc.)
* Supported file formats:
- [X] ELF
- [X] Scripts (Shebang)
- [X] Process group
- [ ] Process credentials
* Thread management
- [X] Essential system calls (clone, futex, etc.)
* Scheduling
- [X] Essential system calls (yield, nanosleep, etc.)
* Sleeping
* Schedulers
- [ ] Scheduler framework
- [X] Round-robin scheduler
- [ ] Preemption
* Memory management
- [X] Essential system calls (mmap, munmap, etc.)
* Mapping types
- [X] Anonymous
- [X] File-backed
* Optimizations
- [X] On-demand paging
- [X] Copy-on-write
* File system
* Essential system calls
- [X] File I/O (read, write, etc.)
- [X] FS operations (create, unlink, etc.)
* VFS
- [X] The VFS framework
- [X] Dentry cache
- [X] Page cache
* File systems
- [X] Ramfs
- [X] Initramfs
- [X] Procfs
- [ ] Ext2/3/4
* Inter-process communication
* POSIX signals
- [X] Essential system calls (sigaction, sigreturn, kill, etc.)
2023-08-08 04:29:30 +00:00
- [X] Pipe
* Network I/O
* I/O multiplexing
2023-08-08 04:29:30 +00:00
- [X] poll
- [X] select
- [X] epoll
* Socket types
2023-08-08 04:29:30 +00:00
- [X] TCP sockets
- [X] Unix sockets
- [ ] UDP sockets
* Time and clocks
* Low-level stuff
* Devices
- [X] PCI
- [X] System time
- [X] Tty
- [X] Virtio-blk
2023-08-08 04:29:30 +00:00
- [X] Virtio-net
- [ ] Device abstraction layer
* CPU archs
- [X] x86-64
- [ ] AMD SEV
- [ ] Intel TDX
- [ ] Arm
- [ ] RISC-V
* Misc
- [ ] Multi-core support
- [ ] User-mode development
2023-09-05 08:32:02 +00:00
## License
The Asterinas project is proudly released as a free software
2023-11-07 00:32:19 +00:00
under the license of [GNU General Public License version 2](LICENSE-GPL).
See [COPYRIGHT](COPYRIGHT) for details.