7.3 KiB
The security model of _place_holder; Cosmos will evolve and mature as Cosmos does, however the base model is presented here.
Goals
Most operating systems today use hardware to enforce security between the kernel, user code, etc. This creates a lot of overhead at runtime and decreases performance. Intel CPUs have built this into the hardware, but adds a fair bit of circuitry and complexity. Despite being in hardware, it still incurs a measureable performance penalty. Since Cosmos can control execution and rebuild its compiler and recompile all code at any time, Cosmos can be much more flexible and most restrictions can be enforced at compile or installation time rather than the need to perform such CPU checks in live CPU code. This creates huge performance gains but also allows a lot more flexibility.
Future
Currently only basic checking is implemented into the compiler. This means that some restrictions are implemented whilst some must be checked manually.
Currently only this is implemented:
- Restriction of references list to higher levels only. ie HAL can reference Core but not vice versa. Also via attribute. That is an assembly level attribute to mark which level an assembly is.
In the future both of these will also be implemented:
- Restriction of core level exclusive abilities at the assembly level by attribute.
- Restrict access to BCL and other assemblies. ie Core should never need XML or other higher level services. Make a defined list of what is allowed and verify against it.
For now we must be vigilant to watch these restrictions manually.
Using rings
It is not possible to run Hardware code in the kernel because it is in ring USER. This means that you cant access the display code in your kernel. To get around this one must create some code in ring 2 (SYSTEM) which allows you to interface between the two. To do this follow this guide:
Guide:
To do this right click on your solution on the right hand side and click Add->New Project. Then add a new COSMOS C# OS, call it Hardware. Now you need to both delete the NEW Cosmos boot project (called HardwareBoot) and the Kernel.cs file found within the main Hardware project.
The next job is to allow this project to talk to the screen. To do this right click on the references section of the Hardware project->add references. Now search for cosmos and add all the references (by selecting them with shift-click then pressing ENTER)
Now go into the AssemblyInfo.cs of the Hardware project file and add the lines bellow:
using Cosmos.Common; [assembly: Ring(Ring.System)] Well done, you now have a project running in Ring 2.
Levels
Many operating systems refer to their security "areas" as rings. ie Kernel ring, etc. Rings are harder to draw in text and make diagramming a bit harder, so for now we will refer to our "areas" as levels.
Cosmos is split into the following levels:
- 0 Core
- 1 Hardware
- 2 System
- 3 User
Each level can only communicate with adjacent levels. That is User can only talk to System, but not Core.
To make an assembly part of a specific level, you'll have to mark it with the attribute below to specify on what ring this code is (add the attribute in AssemblyInfo.cs).
[assembly: Ring(Ring.User)]
The following are valid enums for the attribute.
public enum Ring
{
Core = 0,
HAL = 1,
System = 2,
User = 3,
}
0 Core Level
Core level has special permissions which basically let it do anyting it wants. core code should be very limited with most kernel code existing in the System level. Core code should be kept to a minimum with code not requiring special permissions should be moved or split into the system level.
Special abilities that core has exclusively:
- Assembly plugs
Core 0 exists to provide access to direct hardware. C# code should mostly exist in level 1 instead, with level 0 being intended for code that can exist only in level 0 such as assembly code.
Examples:
- Plugs that must be implemented in assembly
- Memory management
- Direct generic IO access to map to C# functions
1 HAL (Hardware) Level
From the HAL (hardware abstraction level) level up, none of the special permissions available in core level are available. If such code is needed, it must be split between system and core.
HAL in some senses might be thought of as a sub level of level 0, but exists to help separate assembly and other such code. HAL must not simply proxy access to code. For example, level 0 will expose functions to directly access IO ports, but level 2 should never be able to perform such raw access. HAL must wrap and encapselate such access. For example, instead of proxying access to a specific port drivers exists in HAL to expose access to a specific device such as an IDE controller.
Examples:
- Hardware specific drivers - any code that needs to talk to hardware via core.0.
2 System Level
System level contains all such code that is not wrapping hardware directly but instead adding higher level functionality. ie file systems, etc. The distinction between level 1 and 2 is a manual one and no technical restrictions currently exist aside from the restriction of higher level reference only.
System.2 should not contain system applications, but instead system functionality.
Examples:
- File systems
- BCL plugs
- Network stacks
3 User Level
No Cosmos.3.User project exists because level 3 is user code. ie applications. When a user creates a new application (or currently monolithic project) the code is level 3.
Examples:
- User applications
- System applications
We considered adding a special "playground" ring, which is able to do more. This would aid in adding new code in playground which is targetted at System level. However, this adds a possibility you functionally don't really need: You only need to add 1 or maybe 2 extra projects, but this give you the physical separation from the start, preventing you to make circular references.
Older Ring Docs
Core Ring
In the core ring, "anything goes". This also means that code which does not require such privileges should not exist in the core ring. The core ring should be restricted to code which truly needs such unfettered access.
Priviliges that exist only in the core ring:
- Use of pointers and direct access to memory
- Access to x86 IO ports.
- Explicit assembly language code
- Unsafe code
The core ring includes functionality such as:
- Threading
- Memory management
Assemblies which are part of the core are restricted.
The core ring exposes objects which allow the hardware ring to access memory indirectly, and in a controlled restricted fashion. For example to allow a driver to acccess video RAM, a memory object can be created by the core ring which allows access to only the specific block of memory needed by the video driver.
Hardware Ring
The hardware ring contains drivers and code for accessing hardware via more generic objects exposed by the kernel ring.
The hardware ring includes functionality such as:
- IDE
- SATA
- Ethernet
- USB Controller
The hardware ring may be further split into two levels at a later date. For example, a driver may exist for the USB Controller and it would require access to the core ring. But drivers implementing USB devices do not need to talk to hardware directly, but instead talk to the USB Controller driver.