From 9c39cb698e9cc3f0376118eeb11c96189f4d11bd Mon Sep 17 00:00:00 2001 From: Berkus Decker Date: Mon, 21 Aug 2023 19:58:20 +0300 Subject: [PATCH] wip: adding ttt --- Cargo.toml | 3 +- machine/Makefile.toml | 3 + machine/src/arch/aarch64/memory/mmu/mod.rs | 2 +- tools/ttt/Cargo.toml | 26 ++ tools/ttt/Makefile.toml | 56 ++++ tools/ttt/src/main.rs | 299 +++++++++++++++++++++ 6 files changed, 387 insertions(+), 2 deletions(-) create mode 100644 tools/ttt/Cargo.toml create mode 100644 tools/ttt/Makefile.toml create mode 100644 tools/ttt/src/main.rs diff --git a/Cargo.toml b/Cargo.toml index 257ea73..667a25b 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -3,7 +3,8 @@ members = [ "nucleus", "machine", "bin/chainboot", - "bin/chainofcommand" + "bin/chainofcommand", + "tools/ttt" ] resolver = "2" diff --git a/machine/Makefile.toml b/machine/Makefile.toml index 97630db..93a396f 100644 --- a/machine/Makefile.toml +++ b/machine/Makefile.toml @@ -6,3 +6,6 @@ disabled = true [tasks.hopper] disabled = true + +[tasks.kernel-binary] +disabled = true diff --git a/machine/src/arch/aarch64/memory/mmu/mod.rs b/machine/src/arch/aarch64/memory/mmu/mod.rs index b796bc3..ed55a9b 100644 --- a/machine/src/arch/aarch64/memory/mmu/mod.rs +++ b/machine/src/arch/aarch64/memory/mmu/mod.rs @@ -27,7 +27,7 @@ use { tock_registers::interfaces::{ReadWriteable, Readable, Writeable}, }; -pub(crate) mod translation_table; +pub mod translation_table; //-------------------------------------------------------------------------------------------------- // Private Definitions diff --git a/tools/ttt/Cargo.toml b/tools/ttt/Cargo.toml new file mode 100644 index 0000000..b7cc513 --- /dev/null +++ b/tools/ttt/Cargo.toml @@ -0,0 +1,26 @@ +[package] +name = "ttt" +version = "0.0.1" +authors = ["Berkus Decker "] +description = "Translation tables tool" +license = "BlueOak-1.0.0" +categories = ["no-std", "embedded", "os"] +publish = false +edition = "2021" + +[badges] +maintenance = { status = "experimental" } + +[features] +rpi3 = ["machine/rpi3"] +rpi4 = ["machine/rpi4"] + +[dependencies] +machine = { path = "../../machine" } +clap = "4.4" +colored = "2" +prettytable-rs = "0.10" +goblin = { version = "0.7", default-features = false, features = ["std", "alloc", "elf32", "elf64"] } +anyhow = "1.0" +fehler = "1.0" +bytes = "1.5" diff --git a/tools/ttt/Makefile.toml b/tools/ttt/Makefile.toml new file mode 100644 index 0000000..c9ffa44 --- /dev/null +++ b/tools/ttt/Makefile.toml @@ -0,0 +1,56 @@ +[tasks.build] +command = "cargo" +args = ["build"] + +[tasks.chainofcommand] +dependencies = ["build"] + +[tasks.build-device] +disabled = true + +[tasks.test] +command = "cargo" +args = ["test"] + +[tasks.clippy] +command = "cargo" +args = ["clippy", "--", "-D", "warnings"] + +[tasks.hopper] +disabled = true + +[tasks.kernel-binary] +disabled = true + +[tasks.zellij-nucleus] +disabled = true + +[tasks.zellij-cb] +disabled = true + +[tasks.zellij-cb-gdb] +disabled = true + +[tasks.nm] +disabled = true + +[tasks.qemu] +disabled = true + +[tasks.qemu-gdb] +disabled = true + +[tasks.qemu-cb] +disabled = true + +[tasks.sdcard] +disabled = true + +[tasks.cb-eject] +disabled = true + +[tasks.gdb] +disabled = true + +[tasks.gdb-cb] +disabled = true diff --git a/tools/ttt/src/main.rs b/tools/ttt/src/main.rs new file mode 100644 index 0000000..651ab8e --- /dev/null +++ b/tools/ttt/src/main.rs @@ -0,0 +1,299 @@ +use { + anyhow::{anyhow, Result}, + clap::{Arg, Command}, + colored::*, + goblin::{ + elf::{program_header::ProgramHeader, Elf}, + error, Object, + }, + machine::{ + memory::{ + mmu::{ + translation_table::interface::TranslationTable, AccessPermissions, AttributeFields, + MemAttributes, + }, + Address, Physical, Virtual, + }, + platform::memory::{map, mmu::KernelGranule}, + }, + std::{fmt, iter::Map, path::Path}, +}; + +// ttt /path/to/kernel.elf +fn main() -> Result<()> { + let matches = Command::new("ttt - translation tables tool") + .about("Patch kernel ELF file with calculated MMU mappings") + .disable_version_flag(true) + .arg( + Arg::new("kernel") + .long("kernel") + .help("Path of the kernel ELF file to patch") + .default_value("nucleus.elf"), + ) + .get_matches(); + let kernel_elf_path = matches + .get_one::("kernel") + .expect("kernel file must be specified"); + + let kernel_elf = KernelElf::new(kernel_elf_path).unwrap(); + + let platform = RaspberryPi::new(); // formerly BSP + + let translation_tables = + /*machine::arch::aarch64::memory::mmu::translation_tables::*/TranslationTables::new(); + + map_kernel_binary(&kernel_elf, translation_tables)?; + + patch_kernel_tables(kernel_elf_path, translation_tables, platform); + patch_kernel_base_addr(kernel_elf_path, translation_tables, platform); +} + +struct KernelElf { + elf: Elf, +} + +impl KernelElf { + pub fn new(path: &Path) -> Result { + let mut elf = Elf::new(path)?; + Ok(Self { elf }) + } + + pub fn symbol_value(&self, symbol_name: &str) -> Result { + let symbol = self + .elf + .syms + .iter() + .find(|sym| self.elf.strtab.get_at(sym.st_name) == Some(symbol_name)) + .ok_or_else(|| anyhow!("symbol {} not found", symbol_name))?; + Ok(symbol.st_value) + } + + pub fn segment_containing_virt_addr(&self, virt_addr: u64) -> Result { + for segment in self.elf.program_headers() { + if segment.vm_range().contains(virt_addr) { + return Ok(segment); + } + } + Err(anyhow!( + "virtual address {:#x} not in any segment", + virt_addr + )) + } + + pub fn virt_to_phys(&self, virt_addr: u64) -> Result { + let segment = self.segment_containing_virt_addr(virt_addr)?; + let translation_offset = segment.p_vaddr.checked_sub(virt_addr); + Ok(segment.p_paddr + translation_offset) + } + + pub fn virt_to_file_offset(&self, virt_addr: u64) -> Result { + let segment = self.segment_containing_virt_addr(virt_addr)?; + let translation_offset = segment.p_vaddr.checked_sub(virt_addr); + Ok(segment.p_offset + translation_offset) + } + + pub fn sections_in_segment_as_string(&self, segment: &ProgramHeader) -> Result { + Ok(self + .elf + .section_headers() + .iter() + .filter(|section| segment.vm_range().contains(§ion.sh_addr)) + .filter(|section| section.is_alloc()) + .sort(|a, b| a.sh_addr.cmp(&b.sh_addr)) + .map(|section| format!("{}", self.elf.strtab.get_at(section.sh_name)?)) + .collect::>() + .join(" ")) + } + + pub fn segment_acc_perms(segment: &ProgramHeader) -> Result { + if segment.is_read() && segment.is_write() { + Ok(AccessPermissions::ReadWrite) + } else if segment.is_read() { + Ok(AccessPermissions::ReadOnly) + } else { + Err(anyhow!("Invalid segment access permissions")) + } + } + + pub fn generate_mapping_descriptors(&self) -> Result> { + #[cfg(any(feature = "rpi3", feature = "rpi4"))] + use machine::platform::raspberrypi::memory::mmu::KernelGranule; + Ok(self + .elf + .program_headers() + .iter() + .filter(|segment| segment.is_alloc()) + .map(|segment| { + // Assume each segment is page aligned. + let size = segment.vm_range().len().align_up(KernelGranule::SIZE); + let virt_start_addr = segment.p_vaddr; + let phys_start_addr = segment.p_paddr; + let virt_region = MemoryRegion::new(virt_start_addr, size, KernelGranule::SIZE)?; + let phys_region = MemoryRegion::new(phys_start_addr, size, KernelGranule::SIZE)?; + + let attributes = AttributeFields { + mem_attributes: MemAttributes::CacheableDRAM, + acc_perms: Self::segment_acc_perms(segment)?, + execute_never: !segment.is_executable(), + }; + + MappingDescriptor { + name: self.sections_in_segment_as_string(&segment)?, + virt_region, + phys_region, + attributes, + } + }) + .collect()) + } +} + +struct RaspberryPi { + pub kernel_virt_addr_space_size: usize, + pub virt_addr_of_kernel_tables: Address, + pub virt_addr_of_phys_kernel_tables_base_addr: Address, +} + +impl RaspberryPi { + // attr_reader :kernel_granule, :kernel_virt_addr_space_size + + pub fn new(elf: &KernelElf) -> Result { + Self { + kernel_virt_addr_space_size: elf.symbol_value("__kernel_virt_addr_space_size")? + as usize, + virt_addr_of_kernel_tables: elf.symbol_value("KERNEL_TABLES")?, + virt_addr_of_phys_kernel_tables_base_addr: elf + .symbol_value("PHYS_KERNEL_TABLES_BASE_ADDR")?, + } + } + + pub fn phys_addr_of_kernel_tables(&self) -> Result { + kernel_elf.virt_to_phys(self.virt_addr_of_kernel_tables) + } + + pub fn kernel_tables_offset_in_file(&self) -> Result { + kernel_elf.virt_to_file_offset(self.virt_addr_of_kernel_tables) + } + + // def phys_kernel_tables_base_addr_offset_in_file + // KERNEL_ELF.virt_addr_to_file_offset(@virt_addr_of_phys_kernel_tables_base_addr) + // end + + pub fn phys_addr_space_end_page() -> Address { + map::END + } +} + +// # An array where each value is the start address of a Page. +// class MemoryRegion < Array +// def initialize(start_addr, size, granule_size) +// raise unless start_addr.aligned?(granule_size) +// raise unless size.positive? +// raise unless (size % granule_size).zero? +// +// num_pages = size / granule_size +// super(num_pages) do |i| +// (i * granule_size) + start_addr +// end +// end +// end +struct MemoryRegion { + start: Address, + size: usize, + granularity: usize, +} + +impl MemoryRegion { + pub fn new(start: Address, size: usize, granularity: usize) -> Result { + Ok(Self { + start, + size, + granularity, + }) + } +} + +/// A container that describes a virt-to-phys region mapping. +struct MappingDescriptor { + pub name: String, + pub virt_region: MemoryRegion, + pub phys_region: MemoryRegion, + pub attributes: AttributeFields, +} + +impl MappingDescriptor { + pub fn print_header() {} + pub fn print_divider() {} +} + +impl fmt::Display for MappingDescriptor { + fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { + write!(f, "MappingDescriptor") + // def to_s + // name = @name.ljust(self.class.max_section_name_length) + // virt_start = @virt_region.first.to_hex_underscore(with_leading_zeros: true) + // phys_start = @phys_region.first.to_hex_underscore(with_leading_zeros: true) + // size = ((@virt_region.size * 65_536) / 1024).to_s.rjust(3) + // + // "#{name} | #{virt_start} | #{phys_start} | #{size} KiB | #{@attributes}" + // end + } +} + +fn map_kernel_binary(kernel: &KernelElf, translation_tables: &mut TranslationTables) -> Result<()> { + let mapping_descriptors = kernel.generate_mapping_descriptors()?; + + // Generate_mapping_descriptors updates the header being printed + // with this call.So it must come afterwards. + mapping_descriptors.print_header(); + + // @todo use prettytable-rs + + let _ = mapping_descriptors.enumerate(|i, desc| { + println!("{:>12} {}", "Generating".green().bold(), i); + + translation_tables.map_at(desc.virt_region, desc.phys_region, desc.attributes); + }); + + mapping_descriptors.print_divider(); + Ok(()) +} + +fn patch_kernel_tables( + kernel_elf_path: &str, + translation_tables: &TranslationTable, + platform: &RaspberryPi, +) { + println!( + "{:>12} Kernel table struct at ELF file offset {}", + "Patching".bold(), + platform.kernel_tables_offset_in_file.to_hex_underscore() + ); + + // patch a file section with new data + File.binwrite( + kernel_elf_path, + translation_tables.to_binary(), + platform.kernel_tables_offset_in_file, + ); +} + +fn patch_kernel_base_addr( + kernel_elf_path: &str, + translation_tables: &TranslationTable, + platform: &RaspberryPi, +) { + println!( + "{:>12} Kernel tables physical base address start argument to value {} at ELF file offset {}", + "Patching".green().bold(), + translation_tables.phys_tables_base_addr.to_hex_underscore(), + platform.phys_kernel_tables_base_addr_offset_in_file.to_hex_underscore() + ); + + // patch a file section with new data + File.binwrite( + kernel_elf_path, + translation_tables.phys_tables_base_addr_binary, + platform.phys_kernel_tables_base_addr_offset_in_file, + ); +}