2019-03-04 23:05:42 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018 naehrwert
|
|
|
|
*
|
2019-05-11 22:51:44 +01:00
|
|
|
* Copyright (c) 2018-2019 CTCaer
|
2019-03-04 23:05:42 +00:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2020-12-22 15:34:14 +00:00
|
|
|
|
2019-03-04 23:05:42 +00:00
|
|
|
#include <string.h>
|
|
|
|
|
2020-12-22 15:34:14 +00:00
|
|
|
#include "config.h"
|
|
|
|
#include <gfx/di.h>
|
|
|
|
#include <gfx_utils.h>
|
2019-09-17 16:51:30 +01:00
|
|
|
#include "gfx/tui.h"
|
2020-01-04 11:53:44 +00:00
|
|
|
#include "hos/pkg1.h"
|
2020-12-22 15:34:14 +00:00
|
|
|
#include <libs/fatfs/ff.h>
|
|
|
|
#include <mem/heap.h>
|
|
|
|
#include <mem/minerva.h>
|
|
|
|
#include <power/max77620.h>
|
|
|
|
#include <rtc/max77620-rtc.h>
|
|
|
|
#include <soc/bpmp.h>
|
2019-03-04 23:05:42 +00:00
|
|
|
#include "soc/hw_init.h"
|
2019-09-17 16:51:30 +01:00
|
|
|
#include "storage/emummc.h"
|
2020-01-04 11:53:44 +00:00
|
|
|
#include "storage/nx_emmc.h"
|
2020-12-22 15:34:14 +00:00
|
|
|
#include <storage/nx_sd.h>
|
|
|
|
#include <storage/sdmmc.h>
|
|
|
|
#include <utils/btn.h>
|
|
|
|
#include <utils/dirlist.h>
|
2020-12-22 18:40:53 +00:00
|
|
|
#include <utils/ini.h>
|
2020-12-22 15:34:14 +00:00
|
|
|
#include <utils/sprintf.h>
|
|
|
|
#include <utils/util.h>
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2019-10-06 20:28:54 +01:00
|
|
|
#include "incognito/incognito.h"
|
2019-03-04 23:05:42 +00:00
|
|
|
|
|
|
|
sdmmc_t sd_sdmmc;
|
|
|
|
sdmmc_storage_t sd_storage;
|
2020-01-04 11:53:44 +00:00
|
|
|
__attribute__ ((aligned (16))) FATFS sd_fs;
|
2019-03-04 23:05:42 +00:00
|
|
|
static bool sd_mounted;
|
|
|
|
|
2019-09-17 05:18:41 +01:00
|
|
|
hekate_config h_cfg;
|
2020-01-04 11:53:44 +00:00
|
|
|
boot_cfg_t __attribute__((section ("._boot_cfg"))) b_cfg;
|
|
|
|
|
|
|
|
volatile nyx_storage_t *nyx_str = (nyx_storage_t *)NYX_STORAGE_ADDR;
|
2019-03-04 23:05:42 +00:00
|
|
|
|
|
|
|
bool sd_mount()
|
|
|
|
{
|
2020-01-04 11:53:44 +00:00
|
|
|
if (sd_mounted)
|
|
|
|
return true;
|
|
|
|
|
2020-05-30 16:24:47 +01:00
|
|
|
if (!sdmmc_storage_init_sd(&sd_storage, &sd_sdmmc, SDMMC_BUS_WIDTH_4, SDHCI_TIMING_UHS_SDR104))
|
2020-01-04 11:53:44 +00:00
|
|
|
{
|
|
|
|
EPRINTF("Failed to init SD card.\nMake sure that it is inserted.\nOr that SD reader is properly seated!");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
int res = 0;
|
|
|
|
res = f_mount(&sd_fs, "sd:", 1);
|
|
|
|
if (res == FR_OK)
|
|
|
|
{
|
|
|
|
sd_mounted = 1;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
EPRINTFARGS("Failed to mount SD card (FatFS Error %d).\nMake sure that a FAT partition exists..", res);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
2019-03-04 23:05:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void sd_unmount()
|
|
|
|
{
|
2020-01-04 11:53:44 +00:00
|
|
|
if (sd_mounted)
|
|
|
|
{
|
|
|
|
f_mount(NULL, "sd:", 1);
|
|
|
|
sdmmc_storage_end(&sd_storage);
|
|
|
|
sd_mounted = false;
|
|
|
|
}
|
2019-03-04 23:05:42 +00:00
|
|
|
}
|
|
|
|
|
2019-05-11 22:51:44 +01:00
|
|
|
void *sd_file_read(const char *path, u32 *fsize)
|
2019-03-04 23:05:42 +00:00
|
|
|
{
|
2020-01-04 11:53:44 +00:00
|
|
|
FIL fp;
|
|
|
|
if (f_open(&fp, path, FA_READ) != FR_OK)
|
|
|
|
return NULL;
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
u32 size = f_size(&fp);
|
|
|
|
if (fsize)
|
|
|
|
*fsize = size;
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
void *buf = malloc(size);
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
if (f_read(&fp, buf, size, NULL) != FR_OK)
|
|
|
|
{
|
|
|
|
free(buf);
|
|
|
|
f_close(&fp);
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2019-05-11 22:51:44 +01:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
f_close(&fp);
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
return buf;
|
2019-03-04 23:05:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int sd_save_to_file(void *buf, u32 size, const char *filename)
|
|
|
|
{
|
2020-01-04 11:53:44 +00:00
|
|
|
FIL fp;
|
|
|
|
u32 res = 0;
|
|
|
|
res = f_open(&fp, filename, FA_CREATE_ALWAYS | FA_WRITE);
|
|
|
|
if (res)
|
|
|
|
{
|
|
|
|
EPRINTFARGS("Error (%d) creating file\n%s.\n", res, filename);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
f_write(&fp, buf, size, NULL);
|
|
|
|
f_close(&fp);
|
|
|
|
|
|
|
|
return 0;
|
2019-03-04 23:05:42 +00:00
|
|
|
}
|
|
|
|
|
2019-04-18 17:47:34 +01:00
|
|
|
// This is a safe and unused DRAM region for our payloads.
|
2020-01-04 11:53:44 +00:00
|
|
|
#define RELOC_META_OFF 0x7C
|
|
|
|
#define PATCHED_RELOC_SZ 0x94
|
2019-04-18 17:47:34 +01:00
|
|
|
#define PATCHED_RELOC_STACK 0x40007000
|
2020-01-04 11:53:44 +00:00
|
|
|
#define PATCHED_RELOC_ENTRY 0x40010000
|
|
|
|
#define EXT_PAYLOAD_ADDR 0xC03C0000
|
|
|
|
#define RCM_PAYLOAD_ADDR (EXT_PAYLOAD_ADDR + ALIGN(PATCHED_RELOC_SZ, 0x10))
|
2020-06-03 14:00:41 +01:00
|
|
|
#define COREBOOT_END_ADDR 0xD0000000
|
2020-01-04 11:53:44 +00:00
|
|
|
#define CBFS_DRAM_EN_ADDR 0x4003e000
|
|
|
|
#define CBFS_DRAM_MAGIC 0x4452414D // "DRAM"
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-06-03 14:00:41 +01:00
|
|
|
static void *coreboot_addr;
|
|
|
|
|
2019-04-18 17:47:34 +01:00
|
|
|
void reloc_patcher(u32 payload_dst, u32 payload_src, u32 payload_size)
|
2019-03-04 23:05:42 +00:00
|
|
|
{
|
2020-01-04 11:53:44 +00:00
|
|
|
memcpy((u8 *)payload_src, (u8 *)IPL_LOAD_ADDR, PATCHED_RELOC_SZ);
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
volatile reloc_meta_t *relocator = (reloc_meta_t *)(payload_src + RELOC_META_OFF);
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
relocator->start = payload_dst - ALIGN(PATCHED_RELOC_SZ, 0x10);
|
|
|
|
relocator->stack = PATCHED_RELOC_STACK;
|
|
|
|
relocator->end = payload_dst + payload_size;
|
|
|
|
relocator->ep = payload_dst;
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
if (payload_size == 0x7000)
|
|
|
|
{
|
2020-06-03 14:00:41 +01:00
|
|
|
memcpy((u8 *)(payload_src + ALIGN(PATCHED_RELOC_SZ, 0x10)), coreboot_addr, 0x7000); //Bootblock
|
2020-01-04 11:53:44 +00:00
|
|
|
*(vu32 *)CBFS_DRAM_EN_ADDR = CBFS_DRAM_MAGIC;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int launch_payload(char *path)
|
|
|
|
{
|
|
|
|
gfx_clear_grey(0x1B);
|
|
|
|
gfx_con_setpos(0, 0);
|
|
|
|
if (!path)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (sd_mount())
|
|
|
|
{
|
|
|
|
FIL fp;
|
|
|
|
if (f_open(&fp, path, FA_READ))
|
|
|
|
{
|
|
|
|
EPRINTFARGS("Payload file is missing!\n(%s)", path);
|
|
|
|
sd_unmount();
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read and copy the payload to our chosen address
|
|
|
|
void *buf;
|
|
|
|
u32 size = f_size(&fp);
|
|
|
|
|
|
|
|
if (size < 0x30000)
|
|
|
|
buf = (void *)RCM_PAYLOAD_ADDR;
|
|
|
|
else
|
2020-06-03 14:00:41 +01:00
|
|
|
{
|
|
|
|
coreboot_addr = (void *)(COREBOOT_END_ADDR - size);
|
|
|
|
buf = coreboot_addr;
|
|
|
|
}
|
2020-01-04 11:53:44 +00:00
|
|
|
|
|
|
|
if (f_read(&fp, buf, size, NULL))
|
|
|
|
{
|
|
|
|
f_close(&fp);
|
|
|
|
sd_unmount();
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
f_close(&fp);
|
|
|
|
|
|
|
|
sd_unmount();
|
|
|
|
|
|
|
|
if (size < 0x30000)
|
|
|
|
{
|
|
|
|
reloc_patcher(PATCHED_RELOC_ENTRY, EXT_PAYLOAD_ADDR, ALIGN(size, 0x10));
|
|
|
|
|
|
|
|
reconfig_hw_workaround(false, byte_swap_32(*(u32 *)(buf + size - sizeof(u32))));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
reloc_patcher(PATCHED_RELOC_ENTRY, EXT_PAYLOAD_ADDR, 0x7000);
|
|
|
|
reconfig_hw_workaround(true, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Some cards (Sandisk U1), do not like a fast power cycle. Wait min 100ms.
|
|
|
|
sdmmc_storage_init_wait_sd();
|
|
|
|
|
|
|
|
void (*ext_payload_ptr)() = (void *)EXT_PAYLOAD_ADDR;
|
|
|
|
|
|
|
|
// Launch our payload.
|
|
|
|
(*ext_payload_ptr)();
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void launch_tools()
|
|
|
|
{
|
|
|
|
u8 max_entries = 61;
|
|
|
|
char *filelist = NULL;
|
|
|
|
char *file_sec = NULL;
|
|
|
|
char *dir = NULL;
|
|
|
|
|
|
|
|
ment_t *ments = (ment_t *)malloc(sizeof(ment_t) * (max_entries + 3));
|
|
|
|
|
|
|
|
gfx_clear_grey(0x1B);
|
|
|
|
gfx_con_setpos(0, 0);
|
|
|
|
|
|
|
|
if (sd_mount())
|
|
|
|
{
|
|
|
|
dir = (char *)malloc(256);
|
|
|
|
|
|
|
|
memcpy(dir, "sd:/bootloader/payloads", 24);
|
|
|
|
|
2020-12-22 18:40:53 +00:00
|
|
|
filelist = dirlist(dir, NULL, false, false);
|
2020-01-04 11:53:44 +00:00
|
|
|
|
|
|
|
u32 i = 0;
|
|
|
|
u32 i_off = 2;
|
|
|
|
|
|
|
|
if (filelist)
|
|
|
|
{
|
|
|
|
// Build configuration menu.
|
|
|
|
u32 color_idx = 0;
|
|
|
|
|
|
|
|
ments[0].type = MENT_BACK;
|
|
|
|
ments[0].caption = "Back";
|
|
|
|
ments[0].color = colors[(color_idx++) % 6];
|
|
|
|
ments[1].type = MENT_CHGLINE;
|
|
|
|
ments[1].color = colors[(color_idx++) % 6];
|
|
|
|
if (!f_stat("sd:/atmosphere/reboot_payload.bin", NULL))
|
|
|
|
{
|
|
|
|
ments[i_off].type = INI_CHOICE;
|
|
|
|
ments[i_off].caption = "reboot_payload.bin";
|
|
|
|
ments[i_off].color = colors[(color_idx++) % 6];
|
|
|
|
ments[i_off].data = "sd:/atmosphere/reboot_payload.bin";
|
|
|
|
i_off++;
|
|
|
|
}
|
|
|
|
if (!f_stat("sd:/ReiNX.bin", NULL))
|
|
|
|
{
|
|
|
|
ments[i_off].type = INI_CHOICE;
|
|
|
|
ments[i_off].caption = "ReiNX.bin";
|
|
|
|
ments[i_off].color = colors[(color_idx++) % 6];
|
|
|
|
ments[i_off].data = "sd:/ReiNX.bin";
|
|
|
|
i_off++;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (true)
|
|
|
|
{
|
|
|
|
if (i > max_entries || !filelist[i * 256])
|
|
|
|
break;
|
|
|
|
ments[i + i_off].type = INI_CHOICE;
|
|
|
|
ments[i + i_off].caption = &filelist[i * 256];
|
|
|
|
ments[i + i_off].color = colors[(color_idx++) % 6];
|
|
|
|
ments[i + i_off].data = &filelist[i * 256];
|
|
|
|
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i > 0)
|
|
|
|
{
|
|
|
|
memset(&ments[i + i_off], 0, sizeof(ment_t));
|
|
|
|
menu_t menu = { ments, "Choose a file to launch", 0, 0 };
|
|
|
|
|
|
|
|
file_sec = (char *)tui_do_menu(&menu);
|
|
|
|
|
|
|
|
if (!file_sec)
|
|
|
|
{
|
|
|
|
free(ments);
|
|
|
|
free(dir);
|
|
|
|
free(filelist);
|
|
|
|
sd_unmount();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
EPRINTF("No payloads or modules found.");
|
|
|
|
|
|
|
|
free(ments);
|
|
|
|
free(filelist);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
free(ments);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (file_sec)
|
|
|
|
{
|
|
|
|
if (memcmp("sd:/", file_sec, 4)) {
|
|
|
|
memcpy(dir + strlen(dir), "/", 2);
|
|
|
|
memcpy(dir + strlen(dir), file_sec, strlen(file_sec) + 1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
memcpy(dir, file_sec, strlen(file_sec) + 1);
|
|
|
|
|
|
|
|
if (launch_payload(dir))
|
|
|
|
{
|
|
|
|
EPRINTF("Failed to launch payload.");
|
|
|
|
free(dir);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
sd_unmount();
|
|
|
|
free(dir);
|
|
|
|
|
|
|
|
btn_wait();
|
2019-03-04 23:05:42 +00:00
|
|
|
}
|
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
void incognito_sysnand()
|
2019-09-17 16:51:30 +01:00
|
|
|
{
|
2019-10-03 17:16:41 +01:00
|
|
|
|
2019-09-17 16:51:30 +01:00
|
|
|
h_cfg.emummc_force_disable = true;
|
|
|
|
b_cfg.extra_cfg &= ~EXTRA_CFG_DUMP_EMUMMC;
|
2019-10-03 17:16:41 +01:00
|
|
|
if (!dump_keys())
|
2019-10-04 19:48:24 +01:00
|
|
|
goto out;
|
|
|
|
if (!incognito())
|
2019-10-03 17:16:41 +01:00
|
|
|
{
|
2019-10-04 19:48:24 +01:00
|
|
|
gfx_printf("%kError applying Incognito!\nWill restore backup!\n", COLOR_RED);
|
|
|
|
backupProdinfo();
|
|
|
|
}
|
2019-10-07 19:02:42 +01:00
|
|
|
if (!verifyProdinfo(NULL))
|
2019-10-04 19:48:24 +01:00
|
|
|
{
|
|
|
|
gfx_printf("%kThis should not happen!\nTry restoring or restore via NAND backup from hekate!\n", COLOR_RED);
|
2019-10-03 17:16:41 +01:00
|
|
|
}
|
2019-10-04 19:48:24 +01:00
|
|
|
out:
|
2019-09-28 23:18:17 +01:00
|
|
|
cleanUp();
|
2019-10-03 17:16:41 +01:00
|
|
|
gfx_printf("\n%k---------------\n%kPress any key to return to the main menu.", COLOR_YELLOW, COLOR_ORANGE);
|
2019-09-28 23:18:17 +01:00
|
|
|
btn_wait();
|
2019-09-17 16:51:30 +01:00
|
|
|
}
|
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
void incognito_emunand()
|
2019-09-17 16:51:30 +01:00
|
|
|
{
|
|
|
|
if (h_cfg.emummc_force_disable)
|
|
|
|
return;
|
|
|
|
emu_cfg.enabled = 1;
|
|
|
|
b_cfg.extra_cfg |= EXTRA_CFG_DUMP_EMUMMC;
|
2019-10-03 17:16:41 +01:00
|
|
|
if (!dump_keys())
|
2019-10-04 19:48:24 +01:00
|
|
|
goto out;
|
|
|
|
if (!incognito())
|
2019-10-03 17:16:41 +01:00
|
|
|
{
|
2019-10-04 19:48:24 +01:00
|
|
|
gfx_printf("%kError applying Incognito!\nWill restore backup!\n", COLOR_RED);
|
|
|
|
backupProdinfo();
|
|
|
|
}
|
2019-10-07 19:02:42 +01:00
|
|
|
if (!verifyProdinfo(NULL))
|
2019-10-04 19:48:24 +01:00
|
|
|
{
|
|
|
|
gfx_printf("%kThis should not happen!\nTry restoring or restore via NAND backup from hekate!\n", COLOR_RED);
|
2019-10-03 17:16:41 +01:00
|
|
|
}
|
2019-10-04 19:48:24 +01:00
|
|
|
out:
|
2019-09-28 23:18:17 +01:00
|
|
|
cleanUp();
|
2019-10-03 17:16:41 +01:00
|
|
|
gfx_printf("\n%k---------------\n%kPress any key to return to the main menu.", COLOR_YELLOW, COLOR_ORANGE);
|
|
|
|
btn_wait();
|
2019-09-28 23:18:17 +01:00
|
|
|
}
|
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
void backup_sysnand()
|
|
|
|
{
|
2020-12-23 13:58:36 +00:00
|
|
|
gfx_printf("\n%kBacking-up sysnand", COLOR_YELLOW);
|
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
h_cfg.emummc_force_disable = true;
|
2019-09-28 23:18:17 +01:00
|
|
|
b_cfg.extra_cfg &= ~EXTRA_CFG_DUMP_EMUMMC;
|
2019-10-03 17:16:41 +01:00
|
|
|
if (!dump_keys())
|
2019-10-04 19:48:24 +01:00
|
|
|
goto out;
|
|
|
|
|
2019-09-28 23:18:17 +01:00
|
|
|
backupProdinfo();
|
2019-10-04 19:48:24 +01:00
|
|
|
out:
|
2019-09-28 23:18:17 +01:00
|
|
|
cleanUp();
|
2019-10-03 17:16:41 +01:00
|
|
|
gfx_printf("\n%k---------------\n%kPress any key to return to the main menu.", COLOR_YELLOW, COLOR_ORANGE);
|
|
|
|
btn_wait();
|
2019-09-28 23:18:17 +01:00
|
|
|
}
|
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
void backup_emunand()
|
|
|
|
{
|
|
|
|
if (h_cfg.emummc_force_disable)
|
2019-09-28 23:18:17 +01:00
|
|
|
return;
|
|
|
|
emu_cfg.enabled = 1;
|
|
|
|
b_cfg.extra_cfg |= EXTRA_CFG_DUMP_EMUMMC;
|
2019-10-03 17:16:41 +01:00
|
|
|
if (!dump_keys())
|
2019-10-04 19:48:24 +01:00
|
|
|
goto out;
|
2019-09-28 23:18:17 +01:00
|
|
|
|
|
|
|
backupProdinfo();
|
2019-10-04 19:48:24 +01:00
|
|
|
out:
|
2019-09-28 23:18:17 +01:00
|
|
|
cleanUp();
|
2019-10-03 17:16:41 +01:00
|
|
|
gfx_printf("\n%k---------------\n%kPress any key to return to the main menu.", COLOR_YELLOW, COLOR_ORANGE);
|
|
|
|
btn_wait();
|
2019-09-28 23:18:17 +01:00
|
|
|
}
|
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
void restore_sysnand()
|
|
|
|
{
|
|
|
|
h_cfg.emummc_force_disable = true;
|
2019-09-28 23:18:17 +01:00
|
|
|
b_cfg.extra_cfg &= ~EXTRA_CFG_DUMP_EMUMMC;
|
2019-10-03 17:16:41 +01:00
|
|
|
if (!dump_keys())
|
2019-10-04 19:48:24 +01:00
|
|
|
goto out;
|
2019-09-28 23:18:17 +01:00
|
|
|
|
|
|
|
restoreProdinfo();
|
2019-10-07 19:02:42 +01:00
|
|
|
if (!verifyProdinfo(NULL))
|
2019-10-04 19:48:24 +01:00
|
|
|
{
|
2019-10-07 19:02:42 +01:00
|
|
|
gfx_printf("%kThis should not happen!\nTry again or restore via NAND backup from hekate!\n", COLOR_RED);
|
2019-10-04 19:48:24 +01:00
|
|
|
}
|
|
|
|
out:
|
2019-09-28 23:18:17 +01:00
|
|
|
cleanUp();
|
2019-10-03 17:16:41 +01:00
|
|
|
gfx_printf("\n%k---------------\n%kPress any key to return to the main menu.", COLOR_YELLOW, COLOR_ORANGE);
|
|
|
|
btn_wait();
|
2019-09-17 16:51:30 +01:00
|
|
|
}
|
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
void restore_emunand()
|
|
|
|
{
|
|
|
|
if (h_cfg.emummc_force_disable)
|
2019-09-28 23:18:17 +01:00
|
|
|
return;
|
|
|
|
emu_cfg.enabled = 1;
|
|
|
|
b_cfg.extra_cfg |= EXTRA_CFG_DUMP_EMUMMC;
|
2019-10-03 17:16:41 +01:00
|
|
|
if (!dump_keys())
|
2019-10-04 19:48:24 +01:00
|
|
|
goto out;
|
2019-09-28 23:18:17 +01:00
|
|
|
|
|
|
|
restoreProdinfo();
|
2019-10-07 19:02:42 +01:00
|
|
|
if (!verifyProdinfo(NULL))
|
2019-10-04 19:48:24 +01:00
|
|
|
{
|
2019-10-07 19:02:42 +01:00
|
|
|
gfx_printf("%kThis should not happen!\nTry again or restore via NAND backup from hekate!\n", COLOR_RED);
|
2019-10-04 19:48:24 +01:00
|
|
|
}
|
|
|
|
out:
|
2019-09-28 23:18:17 +01:00
|
|
|
cleanUp();
|
2019-10-03 17:16:41 +01:00
|
|
|
gfx_printf("\n%k---------------\n%kPress any key to return to the main menu.", COLOR_YELLOW, COLOR_ORANGE);
|
|
|
|
btn_wait();
|
2019-09-28 23:18:17 +01:00
|
|
|
}
|
2019-10-04 19:48:24 +01:00
|
|
|
|
2019-09-17 16:51:30 +01:00
|
|
|
ment_t ment_top[] = {
|
2019-09-28 23:18:17 +01:00
|
|
|
MDEF_HANDLER("Backup (SysNAND)", backup_sysnand, COLOR_ORANGE),
|
|
|
|
MDEF_HANDLER("Backup (emuMMC)", backup_emunand, COLOR_ORANGE),
|
2019-10-04 00:27:43 +01:00
|
|
|
MDEF_CAPTION("", COLOR_YELLOW),
|
|
|
|
MDEF_HANDLER("Incognito (SysNAND)", incognito_sysnand, COLOR_ORANGE),
|
|
|
|
MDEF_HANDLER("Incognito (emuMMC)", incognito_emunand, COLOR_ORANGE),
|
|
|
|
|
2019-09-28 23:18:17 +01:00
|
|
|
MDEF_CAPTION("", COLOR_YELLOW),
|
|
|
|
MDEF_HANDLER("Restore (SysNAND)", restore_sysnand, COLOR_ORANGE),
|
|
|
|
MDEF_HANDLER("Restore (emuMMC)", restore_emunand, COLOR_ORANGE),
|
|
|
|
MDEF_CAPTION("", COLOR_YELLOW),
|
2019-10-03 17:16:41 +01:00
|
|
|
MDEF_CAPTION("---------------", COLOR_YELLOW),
|
2020-01-04 11:53:44 +00:00
|
|
|
MDEF_HANDLER("Payloads...", launch_tools, COLOR_RED),
|
|
|
|
MDEF_CAPTION("---------------", COLOR_YELLOW),
|
2019-10-03 17:16:41 +01:00
|
|
|
MDEF_HANDLER("Reboot (Normal)", reboot_normal, COLOR_GREEN),
|
|
|
|
MDEF_HANDLER("Reboot (RCM)", reboot_rcm, COLOR_BLUE),
|
|
|
|
MDEF_HANDLER("Power off", power_off, COLOR_VIOLET),
|
|
|
|
MDEF_END()};
|
2019-09-17 16:51:30 +01:00
|
|
|
|
2019-10-03 17:16:41 +01:00
|
|
|
menu_t menu_top = {ment_top, NULL, 0, 0};
|
2019-09-17 16:51:30 +01:00
|
|
|
|
2019-03-04 23:05:42 +00:00
|
|
|
extern void pivot_stack(u32 stack_top);
|
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
// todo: chainload to reboot payload or payloads folder option?
|
|
|
|
|
2019-05-11 22:51:44 +01:00
|
|
|
void ipl_main()
|
|
|
|
{
|
2020-12-22 18:40:53 +00:00
|
|
|
// Do initial HW configuration. This is compatible with consecutive reruns without a reset.
|
2020-01-04 11:53:44 +00:00
|
|
|
config_hw();
|
2020-12-22 18:40:53 +00:00
|
|
|
|
|
|
|
// Pivot the stack so we have enough space.
|
2020-01-04 11:53:44 +00:00
|
|
|
pivot_stack(IPL_STACK_TOP);
|
2020-12-22 18:40:53 +00:00
|
|
|
|
|
|
|
// Tegra/Horizon configuration goes to 0x80000000+, package2 goes to 0xA9800000, we place our heap in between.
|
2020-01-04 11:53:44 +00:00
|
|
|
heap_init(IPL_HEAP_START);
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-12-22 18:40:53 +00:00
|
|
|
#ifdef DEBUG_UART_PORT
|
|
|
|
uart_send(DEBUG_UART_PORT, (u8 *)"hekate: Hello!\r\n", 16);
|
|
|
|
uart_wait_idle(DEBUG_UART_PORT, UART_TX_IDLE);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// Set bootloader's default configuration.
|
2020-01-04 11:53:44 +00:00
|
|
|
set_default_configuration();
|
2019-09-17 05:18:41 +01:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
sd_mount();
|
2020-12-22 18:40:53 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
minerva_init();
|
|
|
|
minerva_change_freq(FREQ_1600);
|
2019-03-04 23:05:42 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
display_init();
|
2020-12-22 18:40:53 +00:00
|
|
|
|
|
|
|
u32 *fb = display_init_framebuffer_pitch();
|
2020-01-04 11:53:44 +00:00
|
|
|
gfx_init_ctxt(fb, 720, 1280, 720);
|
2020-12-22 18:40:53 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
gfx_con_init();
|
2020-12-22 18:40:53 +00:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
display_backlight_pwm_init();
|
2019-09-15 05:16:10 +01:00
|
|
|
|
2020-12-22 18:40:53 +00:00
|
|
|
// Overclock BPMP.
|
2020-01-04 11:53:44 +00:00
|
|
|
bpmp_clk_rate_set(BPMP_CLK_DEFAULT_BOOST);
|
2019-09-17 16:51:30 +01:00
|
|
|
|
2020-12-22 18:40:53 +00:00
|
|
|
emummc_load_cfg();
|
|
|
|
// Ignore whether emummc is enabled.
|
|
|
|
h_cfg.emummc_force_disable = emu_cfg.sector == 0 && !emu_cfg.path;
|
2019-09-17 16:51:30 +01:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
// if (b_cfg.boot_cfg & BOOT_CFG_SEPT_RUN)
|
|
|
|
// {
|
|
|
|
// if (!(b_cfg.extra_cfg & EXTRA_CFG_DUMP_EMUMMC))
|
|
|
|
// h_cfg.emummc_force_disable = true;
|
|
|
|
// dump_keys();
|
|
|
|
// }
|
|
|
|
|
|
|
|
if (h_cfg.emummc_force_disable)
|
|
|
|
{
|
|
|
|
ment_top[1].type = MENT_CAPTION;
|
|
|
|
ment_top[1].color = 0xFF555555;
|
|
|
|
ment_top[1].handler = NULL;
|
|
|
|
}
|
2019-09-17 16:51:30 +01:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
while (true)
|
|
|
|
tui_do_menu(&menu_top);
|
2019-09-17 16:51:30 +01:00
|
|
|
|
2020-01-04 11:53:44 +00:00
|
|
|
while (true)
|
|
|
|
bpmp_halt();
|
2019-03-04 23:05:42 +00:00
|
|
|
}
|