mirror of
https://github.com/AsahiLinux/m1n1
synced 2024-11-27 00:40:17 +00:00
d918b066b6
call allows the caller to override the function used for the function call, e.g. to use EL0. Use silent=True for find_all_regs.py Signed-off-by: Hector Martin <marcan@marcan.st>
169 lines
6.3 KiB
Python
169 lines
6.3 KiB
Python
import serial, os, struct, sys, time, json, os.path, lzma
|
|
from proxy import *
|
|
from tgtypes import *
|
|
import malloc
|
|
|
|
def load_registers():
|
|
data = json.load(open(os.path.join(os.path.dirname(__file__), "regs.json")))
|
|
for reg in data:
|
|
yield reg["name"], reg["enc"]
|
|
|
|
globals().update(dict(load_registers()))
|
|
|
|
class ProxyUtils(object):
|
|
def __init__(self, p):
|
|
self.iface = p.iface
|
|
self.proxy = p
|
|
self.base = p.get_base()
|
|
self.ba_addr = p.get_bootargs()
|
|
|
|
self.ba = self.iface.readstruct(self.ba_addr, BootArgs)
|
|
|
|
# We allocate a 128MB heap, 128MB after the m1n1 heap, without telling it about it.
|
|
# This frees up from having to coordinate memory management or free stuff after a Python
|
|
# script runs, at the expense that if m1n1 ever uses more than 128MB of heap it will
|
|
# clash with Python (m1n1 will normally not use *any* heap when running proxy ops though,
|
|
# except when running very high-level operations like booting a kernel, so this should be
|
|
# OK).
|
|
self.heap_size = 128 * 1024 * 1024
|
|
try:
|
|
self.heap_base = p.heapblock_alloc(0)
|
|
except ProxyRemoteError:
|
|
# Compat with versions that don't have heapblock yet
|
|
self.heap_base = (self.base + ((self.ba.top_of_kernel_data + 0xffff) & ~0xffff) -
|
|
self.ba.phys_base)
|
|
self.heap_base += 128 * 1024 * 1024 # We leave 128MB for m1n1 heap
|
|
self.heap = malloc.Heap(self.heap_base, self.heap_base + self.heap_size)
|
|
|
|
self.malloc = self.heap.malloc
|
|
self.memalign = self.heap.memalign
|
|
self.free = self.heap.free
|
|
|
|
self.code_buffer = self.malloc(0x10000)
|
|
|
|
def mrs(self, reg, silent=False, call=None):
|
|
if call is None:
|
|
call = self.proxy.call
|
|
op0, op1, CRn, CRm, op2 = reg
|
|
|
|
op = (((op0 & 1) << 19) | (op1 << 16) | (CRn << 12) |
|
|
(CRm << 8) | (op2 << 5) | 0xd5300000)
|
|
|
|
func = struct.pack("<II", op, 0xd65f03c0)
|
|
|
|
self.iface.writemem(self.code_buffer, func)
|
|
self.proxy.dc_cvau(self.code_buffer, 8)
|
|
self.proxy.ic_ivau(self.code_buffer, 8)
|
|
|
|
self.proxy.set_exc_guard(self.proxy.GUARD_MARK | (self.proxy.GUARD_SILENT if silent else 0))
|
|
retval = call(self.code_buffer)
|
|
cnt = self.proxy.get_exc_count()
|
|
self.proxy.set_exc_guard(self.proxy.GUARD_OFF)
|
|
if cnt:
|
|
raise ProxyError("Exception occurred")
|
|
return retval
|
|
|
|
def msr(self, reg, val, silent=False, el0=False, call=None):
|
|
if call is None:
|
|
call = self.proxy.call
|
|
op0, op1, CRn, CRm, op2 = reg
|
|
|
|
op = (((op0 & 1) << 19) | (op1 << 16) | (CRn << 12) |
|
|
(CRm << 8) | (op2 << 5) | 0xd5100000)
|
|
|
|
func = struct.pack("<II", op, 0xd65f03c0)
|
|
|
|
self.iface.writemem(self.code_buffer, func)
|
|
self.proxy.dc_cvau(self.code_buffer, 8)
|
|
self.proxy.ic_ivau(self.code_buffer, 8)
|
|
|
|
self.proxy.set_exc_guard(self.proxy.GUARD_SKIP | (self.proxy.GUARD_SILENT if silent else 0))
|
|
call(self.code_buffer, val)
|
|
cnt = self.proxy.get_exc_count()
|
|
self.proxy.set_exc_guard(self.proxy.GUARD_OFF)
|
|
if cnt:
|
|
raise ProxyError("Exception occurred")
|
|
|
|
def inst(self, op, r0=0, r1=0, r2=0, r3=0, silent=False, el0=False):
|
|
if call is None:
|
|
call = self.proxy.call
|
|
func = struct.pack("<II", op, 0xd65f03c0)
|
|
|
|
self.iface.writemem(self.code_buffer, func)
|
|
self.proxy.dc_cvau(self.code_buffer, 8)
|
|
self.proxy.ic_ivau(self.code_buffer, 8)
|
|
|
|
self.proxy.set_exc_guard(self.proxy.GUARD_SKIP | (self.proxy.GUARD_SILENT if silent else 0))
|
|
ret = call(self.code_buffer, r0, r1, r2, r3)
|
|
cnt = self.proxy.get_exc_count()
|
|
self.proxy.set_exc_guard(self.proxy.GUARD_OFF)
|
|
if cnt:
|
|
raise ProxyError("Exception occurred")
|
|
return ret
|
|
|
|
def compressed_writemem(self, dest, data, progress):
|
|
if not len(data):
|
|
return
|
|
|
|
payload = lzma.compress(data)
|
|
compressed_size = len(payload)
|
|
|
|
with self.heap.guarded_malloc(compressed_size) as compressed_addr:
|
|
self.iface.writemem(compressed_addr, payload, progress)
|
|
decompressed_size = self.proxy.xzdec(compressed_addr, compressed_size, dest, len(data))
|
|
|
|
assert decompressed_size == len(data)
|
|
|
|
class RegMonitor(object):
|
|
def __init__(self, utils):
|
|
self.utils = utils
|
|
self.proxy = utils.proxy
|
|
self.iface = self.proxy.iface
|
|
self.ranges = []
|
|
self.last = None
|
|
|
|
base = utils.base
|
|
self.scratch = utils.malloc(0x100000)
|
|
|
|
def add(self, start, size):
|
|
self.ranges.append((start, size))
|
|
self.last = [None] * len(self.ranges)
|
|
|
|
def poll(self):
|
|
if not self.ranges:
|
|
return
|
|
cur = []
|
|
for (start, size), last in zip(self.ranges, self.last):
|
|
self.proxy.memcpy32(self.scratch, start, size)
|
|
block = self.proxy.iface.readmem(self.scratch, size)
|
|
count = size // 4
|
|
|
|
words = struct.unpack("<%dI" % count, block)
|
|
cur.append(words)
|
|
if last == words:
|
|
continue
|
|
row = 8
|
|
for i in range(0, count, row):
|
|
if not last:
|
|
print("%016x" % (start + i * 4), end=" ")
|
|
for new in words[i:i+row]:
|
|
print("%08x" % new, end=" ")
|
|
print()
|
|
elif last[i:i+row] != words[i:i+row]:
|
|
print("%016x" % (start + i * 4), end=" ")
|
|
for old, new in zip(last[i:i+row], words[i:i+row]):
|
|
so = "%08x" % old
|
|
sn = s = "%08x" % new
|
|
if old != new:
|
|
s = "\x1b[32m"
|
|
ld = False
|
|
for a,b in zip(so, sn):
|
|
d = a != b
|
|
if ld != d:
|
|
s += "\x1b[31;1;4m" if d else "\x1b[32m"
|
|
ld = d
|
|
s += b
|
|
s += "\x1b[m"
|
|
print(s, end=" ")
|
|
print()
|
|
self.last = cur
|