Permalink
Cannot retrieve contributors at this time
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign up
Fetching contributors…
| /* | |
| * Copyright (c) 2018 Reisyukaku | |
| * | |
| * This program is free software; you can redistribute it and/or modify it | |
| * under the terms and conditions of the GNU General Public License, | |
| * version 2, as published by the Free Software Foundation. | |
| * | |
| * This program is distributed in the hope it will be useful, but WITHOUT | |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for | |
| * more details. | |
| * | |
| * You should have received a copy of the GNU General Public License | |
| * along with this program. If not, see <http://www.gnu.org/licenses/>. | |
| */ | |
| #include <string.h> | |
| #include <stddef.h> | |
| #include "hwinit.h" | |
| #include "fs.h" | |
| #include "package.h" | |
| #include "error.h" | |
| #include "bootloader.h" | |
| #include "firmware.h" | |
| static pk11_offs *pk11Offs = NULL; | |
| void drawSplash() { | |
| // Draw splashscreen to framebuffer. | |
| if(fopen("/ReiNX/splash.bin", "rb") != 0) { | |
| fread((void*)0xC0000000, fsize(), 1); | |
| fclose(); | |
| usleep(3000000); | |
| } | |
| } | |
| pk11_offs *pkg11_offsentify(u8 *pkg1) { | |
| for (u32 i = 0; _pk11_offs[i].id; i++) | |
| if (!memcmp(pkg1 + 0x10, _pk11_offs[i].id, 12)) | |
| return (pk11_offs *)&_pk11_offs[i]; | |
| return NULL; | |
| } | |
| void patch(pk11_offs *pk11, pkg2_hdr_t *pkg2, link_t *kips) { | |
| //Patch Secmon | |
| if(!customSecmon){ | |
| uPtr *rlc_ptr = NULL; | |
| uPtr *ver_ptr = NULL; | |
| uPtr *pk21_ptr = NULL; | |
| uPtr *hdrsig_ptr = NULL; | |
| uPtr *sha2_ptr = NULL; | |
| switch(pk11->kb) { | |
| case KB_FIRMWARE_VERSION_100_200: { | |
| u8 verPattern[] = {0x19, 0x00, 0x36, 0xE0, 0x03, 0x08, 0x91}; | |
| u8 hdrSigPattern[] = {0xFF, 0x97, 0xC0, 0x00, 0x00, 0x34, 0xA1, 0xFF, 0xFF}; | |
| u8 sha2Pattern[] = {0xE0, 0x03, 0x08, 0x91, 0xE1, 0x03, 0x13, 0xAA}; | |
| ver_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, verPattern, sizeof(verPattern)) + 0xB); | |
| hdrsig_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, hdrSigPattern, sizeof(hdrSigPattern)) + 0x3A); | |
| sha2_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, sha2Pattern, sizeof(sha2Pattern)) + 0x10); | |
| break; | |
| } | |
| case KB_FIRMWARE_VERSION_300: | |
| case KB_FIRMWARE_VERSION_301: { | |
| u8 verPattern[] = {0x2B, 0xFF, 0xFF, 0x97, 0x40, 0x19, 0x00, 0x36}; | |
| u8 hdrSigPattern[] = {0xF7, 0xFE, 0xFF, 0x97, 0x80, 0x1E, 0x00, 0x36}; | |
| u8 sha2Pattern[] = {0x07, 0xFF, 0xFF, 0x97, 0xC0, 0x18, 0x00, 0x36}; | |
| u8 pk21Pattern[] = {0x40, 0x19, 0x00, 0x36, 0xE0, 0x03, 0x08, 0x91}; | |
| ver_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, verPattern, sizeof(verPattern)) + 0x4); | |
| pk21_ptr = (uPtr*)memsearch((void *)pk11->secmon_base, 0x10000, pk21Pattern, sizeof(pk21Pattern)); | |
| hdrsig_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, hdrSigPattern, sizeof(hdrSigPattern)) + 0x4); | |
| sha2_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, sha2Pattern, sizeof(sha2Pattern)) + 0x4); | |
| break; | |
| } | |
| case KB_FIRMWARE_VERSION_400: { | |
| u8 verPattern[] = {0x00, 0x01, 0x00, 0x36, 0xFD, 0x7B, 0x41, 0xA9}; | |
| u8 hdrSigPattern[] = {0xE0, 0x03, 0x13, 0xAA, 0x4B, 0x28, 0x00, 0x94}; | |
| u8 sha2Pattern[] = {0xD3, 0xD5, 0xFF, 0x97, 0xE0, 0x03, 0x01, 0x32}; | |
| u8 pk21Pattern[] = {0xE0, 0x00, 0x00, 0x36, 0xE0, 0x03, 0x13, 0xAA, 0x63}; | |
| ver_ptr = (uPtr*)memsearch((void *)pk11->secmon_base, 0x10000, verPattern, sizeof(verPattern)); | |
| pk21_ptr = (uPtr*)memsearch((void *)pk11->secmon_base, 0x10000, pk21Pattern, sizeof(pk21Pattern)); | |
| hdrsig_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, hdrSigPattern, sizeof(hdrSigPattern)) + 0x8); | |
| sha2_ptr = (uPtr*)memsearch((void *)pk11->secmon_base, 0x10000, sha2Pattern, sizeof(sha2Pattern)); | |
| break; | |
| } | |
| case KB_FIRMWARE_VERSION_500: { | |
| u8 verPattern[] = {0x00, 0x01, 0x00, 0x36, 0xFD, 0x7B, 0x41, 0xA9}; | |
| u8 hdrSigPattern[] = {0x86, 0xFE, 0xFF, 0x97, 0x80, 0x00, 0x00, 0x36}; | |
| u8 sha2Pattern[] = {0xF2, 0xFB, 0xFF, 0x97, 0xE0, 0x03}; | |
| ver_ptr = (uPtr*)memsearch((void *)pk11->secmon_base, 0x10000, verPattern, sizeof(verPattern)); | |
| pk21_ptr = (uPtr*)((u32)ver_ptr - 0xC); | |
| hdrsig_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, hdrSigPattern, sizeof(hdrSigPattern)) + 0x4); | |
| sha2_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, sha2Pattern, sizeof(sha2Pattern))); | |
| break; | |
| } | |
| default: { | |
| u8 verPattern[] = {0x00, 0x01, 0x00, 0x36, 0xFD, 0x7B, 0x41, 0xA9}; | |
| u8 hdrSigPattern[] = { 0x9A, 0xFF, 0xFF, 0x97, 0x80, 0x00, 0x00, 0x36}; | |
| u8 sha2Pattern[] = {0x81, 0x00, 0x80, 0x72, 0xB5, 0xFB, 0xFF, 0x97}; | |
| ver_ptr = (uPtr*)memsearch((void *)pk11->secmon_base, 0x10000, verPattern, sizeof(verPattern)); | |
| pk21_ptr = (uPtr*)((u32)ver_ptr - 0xC); | |
| hdrsig_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, hdrSigPattern, sizeof(hdrSigPattern)) + 0x4); | |
| sha2_ptr = (uPtr*)(memsearch((void *)pk11->secmon_base, 0x10000, sha2Pattern, sizeof(sha2Pattern)) + 0x4); | |
| break; | |
| } | |
| } | |
| if (pk11->kb != KB_FIRMWARE_VERSION_100_200) { | |
| *pk21_ptr = NOP; | |
| }; | |
| *ver_ptr = NOP; | |
| *hdrsig_ptr = NOP; | |
| *sha2_ptr = NOP; | |
| } | |
| //Patch Kernel | |
| if(!customKern) { | |
| u32 crc = crc32c(pkg2->data, pkg2->sec_size[PKG2_SEC_KERNEL]); | |
| const pkg2_kernel_id_t * id = pkg2_identify(crc); | |
| kernel_patch_t * kpatch = id->kernel_patchset; | |
| if(kpatch!=NULL) { | |
| for(int i=0; kpatch[i].id!=-1; i++) { | |
| if(kpatch[i].id != ATM_ARR_PATCH) | |
| *(vu32 *)(pkg2->data + kpatch[i].off) = kpatch[i].val; | |
| else { | |
| u32 * temp = (u32 *)kpatch[i].ptr; | |
| for(int j=0; j< kpatch[i].val; j++) { | |
| *(vu32*)(pkg2->data + kpatch[i].off + j*4) = temp[j]; | |
| } | |
| } | |
| } | |
| } | |
| } | |
| u8 kipHash[0x20]; | |
| //Patch FS module (truly not my proudest code TODO cleanup) | |
| LIST_FOREACH_ENTRY(pkg2_kip1_info_t, ki, kips, link) { | |
| //Patch FS | |
| if(ki->kip1->tid == 0x0100000000000000) { | |
| print("Patching FS\n"); | |
| se_calc_sha256(&kipHash, ki->kip1, ki->size); | |
| se_calc_sha256(&kipHash, ki->kip1, ki->size); | |
| //Create header | |
| size_t sizeDiff = ki->kip1->sections[0].size_decomp - ki->kip1->sections[0].size_comp; | |
| size_t newSize = ki->size + sizeDiff; | |
| pkg2_kip1_t *moddedKip = malloc(newSize); | |
| memcpy(moddedKip, ki->kip1, newSize); | |
| u32 pos = 0; | |
| for(int i = 0; i < KIP1_NUM_SECTIONS; i++) { | |
| if(!i) { | |
| //Get decomp .text segment | |
| u8 *kipDecompText = blz_decompress(moddedKip->data, moddedKip->sections[i].size_comp); | |
| kippatchset_t *pset = kippatch_find_set(kipHash, kip_patches); | |
| if (!pset) { | |
| print(" could not find patchset with matching hash\n"); | |
| } else { | |
| int res = kippatch_apply_set(kipDecompText, moddedKip->sections[i].size_decomp, pset); | |
| if (res) error("kippatch_apply_set() failed\n"); | |
| } | |
| moddedKip->flags &= ~1; | |
| memcpy((void*)moddedKip->data, kipDecompText, moddedKip->sections[i].size_decomp); | |
| free(kipDecompText); | |
| pos += moddedKip->sections[i].size_comp; | |
| moddedKip->sections[i].size_comp = moddedKip->sections[i].size_decomp; | |
| } else { | |
| if(moddedKip->sections[i].offset == 0) continue; | |
| memcpy((void*)moddedKip->data + pos + sizeDiff, (void*)ki->kip1->data + pos, moddedKip->sections[i].size_comp); | |
| pos += moddedKip->sections[i].size_comp; | |
| } | |
| } | |
| free(ki->kip1); | |
| ki->size = newSize; | |
| ki->kip1 = moddedKip; | |
| } | |
| } | |
| } | |
| u8 loadFirm() { | |
| sdmmc_storage_t storage; | |
| sdmmc_t sdmmc; | |
| //Init nand | |
| sdmmc_storage_init_mmc(&storage, &sdmmc, SDMMC_4, SDMMC_BUS_WIDTH_8, 4); | |
| sdmmc_storage_set_mmc_partition(&storage, 1); | |
| // Read package1. | |
| u8 *package1 = ReadPackage1(&storage); | |
| // Setup firmware specific data. | |
| pk11Offs = pkg11_offsentify(package1); | |
| u8 *keyblob = (u8 *)malloc(NX_EMMC_BLOCKSIZE); | |
| sdmmc_storage_read(&storage, 0x180000 / NX_EMMC_BLOCKSIZE + pk11Offs->kb, 1, keyblob); | |
| keygen(keyblob, pk11Offs->kb, package1 + pk11Offs->tsec_off); | |
| free(keyblob); | |
| // Decrypt package1 and setup warmboot. | |
| print("Decrypting Package1...\n"); | |
| u8 *pkg11 = package1 + pk11Offs->pkg11_off; | |
| u32 pkg11_size = *(u32 *)pkg11; | |
| se_aes_crypt_ctr(11, pkg11 + 0x20, pkg11_size, pkg11 + 0x20, pkg11_size, pkg11 + 0x10); | |
| pkg1_unpack(pk11Offs, package1); | |
| PMC(APBDEV_PMC_SCRATCH1) = pk11Offs->warmboot_base; | |
| free(package1); | |
| //Read package2 | |
| u8 *pkg2 = ReadPackage2(&storage); | |
| // Unpack Package2. | |
| print("Unpacking package2...\n"); | |
| pkg2_hdr_t *dec_pkg2 = unpackFirmwarePackage(pkg2); | |
| LIST_INIT(kip1_info); | |
| pkg2_parse_kips(&kip1_info, dec_pkg2); | |
| // Patch firmware. | |
| print("Patching OS...\n"); | |
| patch(pk11Offs, dec_pkg2, &kip1_info); | |
| // Load all KIPs. | |
| char **sysmods = NULL; | |
| size_t cnt = enumerateDir(&sysmods, "/ReiNX/sysmodules", "*.kip"); | |
| for (u32 i = 0; i < cnt ; i++) { | |
| print("%kLoading %s\n%k", YELLOW, sysmods[i], DEFAULT_TEXT_COL); | |
| loadKip(&kip1_info, sysmods[i]); | |
| free(sysmods[i]); | |
| } | |
| free(sysmods); | |
| // Build Package2. | |
| buildFirmwarePackage(dec_pkg2->data, dec_pkg2->sec_size[PKG2_SEC_KERNEL], &kip1_info); | |
| } | |
| static void SE_lock() { | |
| for (u32 i = 0; i < 16; i++) | |
| se_key_acc_ctrl(i, 0x15); | |
| for (u32 i = 0; i < 2; i++) | |
| se_rsa_acc_ctrl(i, 1); | |
| SE(0x4) = 0; // Make this reg secure only. | |
| SE(SE_KEY_TABLE_ACCESS_LOCK_OFFSET) = 0; // Make all key access regs secure only. | |
| SE(SE_RSA_KEYTABLE_ACCESS_LOCK_OFFSET) = 0; // Make all rsa access regs secure only. | |
| SE(SE_SECURITY_0) &= 0xFFFFFFFB; // Make access lock regs secure only. | |
| } | |
| void launch() { | |
| u8 pre4x = pk11Offs->kb < KB_FIRMWARE_VERSION_400; | |
| se_aes_key_clear(0x8); | |
| se_aes_key_clear(0xB); | |
| if (pre4x) { | |
| if (pk11Offs->kb == KB_FIRMWARE_VERSION_300) | |
| PMC(APBDEV_PMC_SECURE_SCRATCH32) = 0xE3; | |
| else if (pk11Offs->kb == KB_FIRMWARE_VERSION_301) | |
| PMC(APBDEV_PMC_SECURE_SCRATCH32) = 0x104; | |
| se_key_acc_ctrl(12, 0xFF); | |
| se_key_acc_ctrl(13, 0xFF); | |
| } else { | |
| se_key_acc_ctrl(12, 0xFF); | |
| se_key_acc_ctrl(15, 0xFF); | |
| } | |
| // TODO: Don't Clear 'BootConfig' for retail >1.0.0. | |
| //memset((void *)0x4003D000, 0, 0x3000); | |
| SE_lock(); | |
| // Start boot process now that pk21 is loaded. | |
| *BOOT_STATE_ADDR = (pre4x ? BOOT_PKG2_LOADED : BOOT_PKG2_LOADED_4X); | |
| // Boot secmon and Wait for it get ready. | |
| cluster_boot_cpu0(pk11Offs->secmon_base); | |
| while (!*SECMON_STATE_ADDR) | |
| usleep(1); | |
| // Disable display. | |
| if (pre4x) | |
| display_end(); | |
| // Signal to finish boot process. | |
| *BOOT_STATE_ADDR = (pre4x ? BOOT_DONE : BOOT_DONE_4X);; | |
| // Halt ourselves in waitevent state. | |
| while (1) FLOW_CTLR(0x4) = 0x50000000; | |
| } | |
| void firmware() { | |
| display_init(); | |
| gfx_init_ctxt(&gfx_ctxt, display_init_framebuffer(), 720, 1280, 768); | |
| gfx_clear_color(&gfx_ctxt, 0xFF000000); | |
| gfx_con_init(&gfx_con, &gfx_ctxt); | |
| gfx_con_setcol(&gfx_con, DEFAULT_TEXT_COL, 0, 0); | |
| while (!sdMount()) { | |
| error("Failed to init SD card!\n"); | |
| print("Press POWER to power off, any other key to retry\n"); | |
| if (btn_wait() & BTN_POWER) | |
| i2c_send_byte(I2C_5, 0x3C, MAX77620_REG_ONOFFCNFG1, MAX77620_ONOFFCNFG1_PWR_OFF); | |
| btn_wait(); | |
| } | |
| if(PMC(APBDEV_PMC_SCRATCH49) != 69 && fopen("/ReiNX.bin", "rb")) { | |
| fread((void*)PAYLOAD_ADDR, fsize(), 1); | |
| fclose(); | |
| sdUnmount(); | |
| display_end(); | |
| CLOCK(CLK_RST_CONTROLLER_CLK_OUT_ENB_V) |= 0x400; // Enable AHUB clock. | |
| CLOCK(CLK_RST_CONTROLLER_CLK_OUT_ENB_Y) |= 0x40; // Enable APE clock. | |
| PMC(APBDEV_PMC_SCRATCH49) = 69; | |
| ((void (*)())PAYLOAD_ADDR)(); | |
| } | |
| SYSREG(AHB_AHB_SPARE_REG) = (volatile vu32)0xFFFFFF9F; | |
| PMC(APBDEV_PMC_SCRATCH49) = 0; | |
| print("Welcome to ReiNX %s!\n", VERSION); | |
| loadFirm(); | |
| drawSplash(); | |
| launch(); | |
| } |