2020-05-05 07:33:16 +01:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020 Atmosphère-NX
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
#include <exosphere.hpp>
|
|
|
|
#include "secmon_boot.hpp"
|
|
|
|
#include "secmon_boot_functions.hpp"
|
2020-05-12 02:54:35 +01:00
|
|
|
#include "../smc/secmon_random_cache.hpp"
|
2020-06-12 03:17:20 +01:00
|
|
|
#include "../smc/secmon_smc_handler.hpp"
|
2020-05-12 21:27:53 +01:00
|
|
|
#include "../secmon_cache.hpp"
|
|
|
|
#include "../secmon_cpu_context.hpp"
|
2020-05-05 07:33:16 +01:00
|
|
|
#include "../secmon_misc.hpp"
|
2020-05-12 21:27:53 +01:00
|
|
|
#include "../secmon_setup.hpp"
|
2020-05-05 07:33:16 +01:00
|
|
|
|
|
|
|
namespace ams::secmon {
|
|
|
|
|
2020-05-12 21:27:53 +01:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
constexpr inline const uintptr_t Package2LoadAddress = MemoryRegionDramPackage2Payloads.GetAddress();
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2020-05-05 07:33:16 +01:00
|
|
|
void Main() {
|
|
|
|
/* Set library register addresses. */
|
2020-05-14 11:49:48 +01:00
|
|
|
actmon::SetRegisterAddress(MemoryRegionVirtualDeviceActivityMonitor.GetAddress());
|
|
|
|
clkrst::SetRegisterAddress(MemoryRegionVirtualDeviceClkRst.GetAddress());
|
|
|
|
flow::SetRegisterAddress(MemoryRegionVirtualDeviceFlowController.GetAddress());
|
|
|
|
fuse::SetRegisterAddress(MemoryRegionVirtualDeviceFuses.GetAddress());
|
|
|
|
gic::SetRegisterAddress(MemoryRegionVirtualDeviceGicDistributor.GetAddress(), MemoryRegionVirtualDeviceGicCpuInterface.GetAddress());
|
|
|
|
i2c::SetRegisterAddress(i2c::Port_1, MemoryRegionVirtualDeviceI2c1.GetAddress());
|
|
|
|
i2c::SetRegisterAddress(i2c::Port_5, MemoryRegionVirtualDeviceI2c5.GetAddress());
|
|
|
|
pinmux::SetRegisterAddress(MemoryRegionVirtualDeviceApbMisc.GetAddress(), MemoryRegionVirtualDeviceGpio.GetAddress());
|
|
|
|
pmc::SetRegisterAddress(MemoryRegionVirtualDevicePmc.GetAddress());
|
2020-06-29 04:32:45 +01:00
|
|
|
se::SetRegisterAddress(MemoryRegionVirtualDeviceSecurityEngine.GetAddress(), MemoryRegionVirtualDeviceSecurityEngine2.GetAddress());
|
2020-05-14 11:49:48 +01:00
|
|
|
uart::SetRegisterAddress(MemoryRegionVirtualDeviceUart.GetAddress());
|
|
|
|
wdt::SetRegisterAddress(MemoryRegionVirtualDeviceTimer.GetAddress());
|
|
|
|
util::SetRegisterAddress(MemoryRegionVirtualDeviceTimer.GetAddress());
|
2020-05-05 07:33:16 +01:00
|
|
|
|
|
|
|
/* Get the secure monitor parameters. */
|
|
|
|
auto &secmon_params = *reinterpret_cast<pkg1::SecureMonitorParameters *>(MemoryRegionVirtualDeviceBootloaderParams.GetAddress());
|
|
|
|
|
|
|
|
/* Perform initialization. */
|
|
|
|
{
|
|
|
|
/* Perform initial setup. */
|
|
|
|
/* This checks the security engine's validity, and configures common interrupts in the GIC. */
|
|
|
|
/* This also initializes the global configuration context. */
|
|
|
|
secmon::Setup1();
|
2020-11-15 11:23:23 +00:00
|
|
|
AMS_SECMON_LOG("%s\n", "Boot begin.");
|
2020-05-05 07:33:16 +01:00
|
|
|
|
|
|
|
/* Save the boot info. */
|
|
|
|
secmon::SaveBootInfo(secmon_params);
|
|
|
|
|
|
|
|
/* Perform cold-boot specific init. */
|
|
|
|
secmon::boot::InitializeColdBoot();
|
|
|
|
|
|
|
|
/* Setup the SoC security measures. */
|
|
|
|
secmon::SetupSocSecurity();
|
|
|
|
|
2020-05-12 02:54:35 +01:00
|
|
|
/* Setup the Cpu core context. */
|
|
|
|
secmon::SetupCpuCoreContext();
|
2020-05-05 07:33:16 +01:00
|
|
|
|
|
|
|
/* Clear the crt0 code that was present in iram. */
|
2020-11-15 09:36:50 +00:00
|
|
|
secmon::boot::ClearIramBootCode();
|
|
|
|
|
|
|
|
/* Clear the debug code from iram, if we're not in debug config. */
|
|
|
|
#if !defined(AMS_BUILD_FOR_DEBUGGING) && !defined(AMS_BUILD_FOR_AUDITING)
|
|
|
|
secmon::boot::ClearIramDebugCode();
|
|
|
|
#endif
|
2020-05-05 07:33:16 +01:00
|
|
|
|
|
|
|
/* Alert the bootloader that we're initialized. */
|
|
|
|
secmon_params.secmon_state = pkg1::SecureMonitorState_Initialized;
|
|
|
|
}
|
2020-05-12 08:32:09 +01:00
|
|
|
|
|
|
|
/* Wait for NX Bootloader to finish loading the BootConfig. */
|
|
|
|
secmon::boot::WaitForNxBootloader(secmon_params, pkg1::BootloaderState_LoadedBootConfig);
|
|
|
|
hw::DataSynchronizationBarrierInnerShareable();
|
|
|
|
|
|
|
|
/* Load the bootconfig. */
|
|
|
|
secmon::boot::LoadBootConfig(MemoryRegionPhysicalIramBootConfig.GetPointer());
|
|
|
|
|
|
|
|
/* Verify or clear the boot config. */
|
|
|
|
secmon::boot::VerifyOrClearBootConfig();
|
|
|
|
|
|
|
|
/* Get the boot config. */
|
|
|
|
const auto &bc = secmon::GetBootConfig();
|
|
|
|
|
|
|
|
/* Set the tsc value by the boot config. */
|
|
|
|
{
|
|
|
|
constexpr u64 TscMask = (static_cast<u64>(1) << 55) - 1;
|
|
|
|
|
|
|
|
secmon::boot::EnableTsc(bc.data.GetInitialTscValue() & TscMask);
|
|
|
|
}
|
2020-05-12 09:18:10 +01:00
|
|
|
|
|
|
|
/* Wait for NX Bootloader to initialize DRAM. */
|
|
|
|
secmon::boot::WaitForNxBootloader(secmon_params, pkg1::BootloaderState_InitializedDram);
|
|
|
|
|
|
|
|
/* Secure the PMC and MC. */
|
|
|
|
secmon::SetupPmcAndMcSecure();
|
|
|
|
|
|
|
|
/* Copy warmboot to dram. */
|
|
|
|
{
|
|
|
|
/* Define warmboot extents. */
|
|
|
|
const void * const src = MemoryRegionPhysicalIramWarmbootBin.GetPointer();
|
|
|
|
void * const dst = MemoryRegionVirtualDramSecureDataStoreWarmbootFirmware.GetPointer();
|
|
|
|
const size_t size = MemoryRegionPhysicalIramWarmbootBin.GetSize();
|
|
|
|
|
|
|
|
/* Ensure we copy the correct data. */
|
|
|
|
hw::FlushDataCache(src, size);
|
|
|
|
hw::DataSynchronizationBarrierInnerShareable();
|
|
|
|
|
|
|
|
/* Copy warmboot.bin to its secure dram location. */
|
|
|
|
std::memcpy(dst, src, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Setup the GPU carveout's magic numbers. */
|
|
|
|
secmon::boot::WriteGpuCarveoutMagicNumbers();
|
|
|
|
|
|
|
|
/* Wait for NX bootloader to load Package2. */
|
|
|
|
secmon::boot::WaitForNxBootloader(secmon_params, pkg1::BootloaderState_LoadedPackage2);
|
2020-05-12 19:40:29 +01:00
|
|
|
|
|
|
|
/* Parse and decrypt the package2 header. */
|
2020-05-14 02:10:54 +01:00
|
|
|
pkg2::Package2Meta &pkg2_meta = secmon::boot::GetEphemeralPackage2Meta();
|
2020-05-12 21:27:53 +01:00
|
|
|
const uintptr_t pkg2_payloads_start = MemoryRegionDramPackage2.GetAddress() + sizeof(pkg2::Package2Header);
|
2020-05-12 19:40:29 +01:00
|
|
|
{
|
|
|
|
/* Read the encrypred header. */
|
|
|
|
pkg2::Package2Header encrypted_header;
|
|
|
|
|
|
|
|
const auto *dram_header = MemoryRegionDramPackage2.GetPointer<pkg2::Package2Header>();
|
|
|
|
hw::FlushDataCache(dram_header, sizeof(*dram_header));
|
|
|
|
hw::DataSynchronizationBarrierInnerShareable();
|
|
|
|
|
|
|
|
std::memcpy(std::addressof(encrypted_header), dram_header, sizeof(encrypted_header));
|
|
|
|
|
|
|
|
/* Atmosphere extension: support plaintext package2, identified by all-zeroes signature and decrypted header. */
|
|
|
|
secmon::boot::UpdateBootConfigForPackage2Header(encrypted_header);
|
|
|
|
|
|
|
|
/* Verify the package2 header's signature. */
|
|
|
|
secmon::boot::VerifyPackage2HeaderSignature(encrypted_header, !bc.signed_data.IsPackage2SignatureVerificationDisabled());
|
|
|
|
|
|
|
|
/* Decrypt the package2 header. */
|
|
|
|
secmon::boot::DecryptPackage2Header(std::addressof(pkg2_meta), encrypted_header.meta, !bc.signed_data.IsPackage2EncryptionDisabled());
|
|
|
|
}
|
|
|
|
|
2020-05-12 21:27:53 +01:00
|
|
|
/* Verify the package2 header. */
|
|
|
|
secmon::boot::VerifyPackage2Header(pkg2_meta);
|
|
|
|
|
|
|
|
/* Save the package2 hash if in recovery boot. */
|
|
|
|
if (secmon::IsRecoveryBoot()) {
|
|
|
|
se::Sha256Hash hash;
|
|
|
|
secmon::boot::CalculatePackage2Hash(std::addressof(hash), pkg2_meta, MemoryRegionDramPackage2.GetAddress());
|
|
|
|
secmon::SetPackage2Hash(hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Verify the package2 payloads. */
|
2020-11-15 11:23:23 +00:00
|
|
|
secmon::boot::CheckVerifyResult(secmon::boot::VerifyPackage2Payloads(pkg2_meta, pkg2_payloads_start), pkg1::ErrorInfo_InvalidPackage2Payload, "pkg2 payload FAIL");
|
2020-05-12 21:27:53 +01:00
|
|
|
|
|
|
|
/* Decrypt/Move the package2 payloads to the right places. */
|
|
|
|
secmon::boot::DecryptAndLoadPackage2Payloads(Package2LoadAddress, pkg2_meta, pkg2_payloads_start, !bc.signed_data.IsPackage2EncryptionDisabled());
|
|
|
|
|
|
|
|
/* Ensure that the CPU sees correct package2 data. */
|
|
|
|
secmon::FlushEntireDataCache();
|
|
|
|
secmon::EnsureInstructionConsistency();
|
|
|
|
|
|
|
|
/* Set the core's entrypoint and argument. */
|
|
|
|
secmon::SetEntryContext(0, Package2LoadAddress + pkg2_meta.entrypoint, 0);
|
|
|
|
|
2020-11-15 09:36:50 +00:00
|
|
|
/* Clear the boot keys from iram. */
|
|
|
|
secmon::boot::ClearIramBootKeys();
|
|
|
|
|
|
|
|
/* Unmap the identity mapping. */
|
|
|
|
secmon::boot::UnmapPhysicalIdentityMapping();
|
|
|
|
|
2020-05-12 21:27:53 +01:00
|
|
|
/* Unmap DRAM. */
|
|
|
|
secmon::boot::UnmapDram();
|
|
|
|
|
|
|
|
/* Wait for NX bootloader to be done. */
|
|
|
|
secmon::boot::WaitForNxBootloader(secmon_params, pkg1::BootloaderState_Done);
|
|
|
|
|
|
|
|
/* Perform final initialization. */
|
|
|
|
secmon::SetupSocProtections();
|
|
|
|
secmon::SetupCpuSErrorDebug();
|
2020-06-12 03:17:20 +01:00
|
|
|
|
|
|
|
/* Configure the smc handler tables to reflect the current target firmware. */
|
|
|
|
secmon::smc::ConfigureSmcHandlersForTargetFirmware();
|
2020-11-15 10:47:44 +00:00
|
|
|
|
2020-11-15 11:23:23 +00:00
|
|
|
AMS_SECMON_LOG("%s\n", "Boot end.");
|
2020-05-05 07:33:16 +01:00
|
|
|
}
|
|
|
|
|
2020-05-12 21:27:53 +01:00
|
|
|
}
|