m1n1/proxyclient/tools/run_guest.py
Javier Alvarez 8a544a8b27
m1n1 entrypoint args for raw binary images (#240)
* tools/run_guest.py: Allow specifying entrypoint for raw images

This allows running images other than m1n1 that don't have the
entrypoint at 0x800. If unspecified, it defaults to 0x800 for m1n1.

Signed-off-by: Javier Alvarez <javier.alvarez@allthingsembedded.net>
2022-08-30 22:39:20 +09:00

103 lines
2.9 KiB
Python
Executable file

#!/usr/bin/env python3
# SPDX-License-Identifier: MIT
import sys, pathlib, traceback
sys.path.append(str(pathlib.Path(__file__).resolve().parents[1]))
import argparse, pathlib
from io import BytesIO
parser = argparse.ArgumentParser(description='Run a Mach-O payload under the hypervisor')
parser.add_argument('-s', '--symbols', type=pathlib.Path)
parser.add_argument('-m', '--script', type=pathlib.Path, action='append', default=[])
parser.add_argument('-c', '--command', action="append", default=[])
parser.add_argument('-S', '--shell', action="store_true")
parser.add_argument('-e', '--hook-exceptions', action="store_true")
parser.add_argument('-d', '--debug-xnu', action="store_true")
parser.add_argument('-l', '--logfile', type=pathlib.Path)
parser.add_argument('-C', '--cpus', default=None)
parser.add_argument('-r', '--raw', action="store_true")
parser.add_argument('-E', '--entry-point', action="store", type=int, help="Entry point for the raw image", default=0x800)
parser.add_argument('-a', '--append-payload', type=pathlib.Path, action="append", default=[])
parser.add_argument('payload', type=pathlib.Path)
parser.add_argument('boot_args', default=[], nargs="*")
args = parser.parse_args()
from m1n1.proxy import *
from m1n1.proxyutils import *
from m1n1.utils import *
from m1n1.shell import run_shell
from m1n1.hv import HV
from m1n1.hw.pmu import PMU
iface = UartInterface()
p = M1N1Proxy(iface, debug=False)
bootstrap_port(iface, p)
u = ProxyUtils(p, heap_size = 128 * 1024 * 1024)
hv = HV(iface, p, u)
hv.hook_exceptions = args.hook_exceptions
hv.init()
if args.cpus:
avail = [i.name for i in hv.adt["/cpus"]]
want = set(f"cpu{i}" for i in args.cpus)
for cpu in avail:
if cpu in want:
continue
try:
del hv.adt[f"/cpus/{cpu}"]
print(f"Disabled {cpu}")
except KeyError:
continue
if args.debug_xnu:
hv.adt["chosen"].debug_enabled = 1
if args.logfile:
hv.set_logfile(args.logfile.open("w"))
if len(args.boot_args) > 0:
boot_args = " ".join(args.boot_args)
hv.set_bootargs(boot_args)
symfile = None
if args.symbols:
symfile = args.symbols.open("rb")
payload = args.payload.open("rb")
if args.append_payload:
concat = BytesIO()
concat.write(payload.read())
for part in args.append_payload:
concat.write(part.open("rb").read())
concat.seek(0)
payload = concat
if args.raw:
hv.load_raw(payload.read(), args.entry_point)
else:
hv.load_macho(payload, symfile=symfile)
PMU(u).reset_panic_counter()
for i in args.script:
try:
hv.run_script(i)
except:
traceback.print_exc()
args.shell = True
for i in args.command:
try:
hv.run_code(i)
except:
traceback.print_exc()
args.shell = True
if args.shell:
run_shell(hv.shell_locals, "Entering hypervisor shell. Type ^D to start the guest.")
hv.start()