mirror of
https://github.com/CTCaer/hekate.git
synced 2024-12-12 11:12:02 +00:00
5796ead851
So, it's time to move 1.0.0 secmon. If we want to continue having a full featured bootloader, this change is a must. It will move the secmon to 0x4002B000 + 0x20 (to keep the values addresses aligned). It fixes relocator patch. So now the payload size limit is 160KB - .bss (~158KB).
151 lines
5.2 KiB
C
Executable file
151 lines
5.2 KiB
C
Executable file
/*
|
|
* Copyright (c) 2018 naehrwert
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms and conditions of the GNU General Public License,
|
|
* version 2, as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include "pkg1.h"
|
|
#include "se.h"
|
|
|
|
#define _ADRP(r, o) 0x90000000 | ((((o) >> 12) & 0x3) << 29) | ((((o) >> 12) & 0x1FFFFC) << 3) | ((r) & 0x1F)
|
|
#define _MOVZX(r, i, s) 0xD2800000 | (((s) & 0x30) << 17) | (((i) & 0xFFFF) << 5) | ((r) & 0x1F)
|
|
#define _MOVKX(r, i, s) 0xF2800000 | (((s) & 0x30) << 17) | (((i) & 0xFFFF) << 5) | ((r) & 0x1F)
|
|
#define _BL(a, o) 0x94000000 | (((o) - (a)) >> 2) & 0x3FFFFFF
|
|
#define _NOP() 0xD503201F
|
|
|
|
//#define SM_100_ADR 0x40014020
|
|
#define SM_100_ADR 0x4002B020
|
|
|
|
PATCHSET_DEF(_secmon_1_patchset,
|
|
//Patch the relocator to be able to run from SM_100_ADR.
|
|
{ 0x1E0, _ADRP(0, 0x7C013000 - (SM_100_ADR - 0x40)) },
|
|
//Patch package2 decryption and signature/hash checks.
|
|
{ 0x9F0 + 0xADC, _NOP() }, //Header signature.
|
|
{ 0x9F0 + 0xB8C, _NOP() }, //Version.
|
|
{ 0x9F0 + 0xBB0, _NOP() } //Sections SHA2.
|
|
);
|
|
|
|
PATCHSET_DEF(_secmon_2_patchset,
|
|
//Patch package2 decryption and signature/hash checks.
|
|
{ 0xAC8 + 0xAAC, _NOP() }, //Header signature.
|
|
{ 0xAC8 + 0xB3C, _NOP() }, //Version.
|
|
{ 0xAC8 + 0xB58, _NOP() } //Sections SHA2.
|
|
);
|
|
|
|
PATCHSET_DEF(_secmon_3_patchset,
|
|
//Patch package2 decryption and signature/hash checks.
|
|
{ 0xAC8 + 0xAB4, _NOP() },
|
|
{ 0xAC8 + 0xA30, _NOP() }, //Header signature.
|
|
{ 0xAC8 + 0xAC0, _NOP() }, //Version.
|
|
{ 0xAC8 + 0xADC, _NOP() } //Sections SHA2.
|
|
);
|
|
|
|
PATCHSET_DEF(_secmon_4_patchset,
|
|
//Patch package2 decryption and signature/hash checks.
|
|
{ 0x1218 + 0x6E68, _NOP() }, //Header signature.
|
|
{ 0x1218 + 0x6E74, _NOP() }, //Version.
|
|
{ 0x1218 + 0x6FE4, _NOP() }, //Sections SHA2.
|
|
{ 0x1218 + 0x2DC, _NOP() } //Unknown.
|
|
);
|
|
|
|
PATCHSET_DEF(_secmon_5_patchset,
|
|
//Patch package2 decryption and signature/hash checks.
|
|
{ 0x12b0 + 0x4d0, _NOP() },
|
|
{ 0x12b0 + 0x4dc, _NOP() },
|
|
{ 0x12b0 + 0x794, _NOP() },
|
|
{ 0x12b0 + 0xb30, _NOP() }//,
|
|
//{ 0x12b0 + 0xa18 , _NOP() } // BootConfig Retail Check
|
|
);
|
|
|
|
// Include kernel patches here, so we can utilize pkg1 id
|
|
PATCHSET_DEF(_kernel_1_patchset,
|
|
{ 0x3764C, _NOP() }, // Disable SVC verifications
|
|
{ 0x44074, _MOVZX(8, 1, 0) } // Enable Debug Patch
|
|
);
|
|
|
|
PATCHSET_DEF(_kernel_2_patchset,
|
|
{ 0x54834, _NOP() }, // Disable SVC verifications
|
|
{ 0x6086C, _MOVZX(8, 1, 0) } // Enable Debug Patch
|
|
);
|
|
|
|
PATCHSET_DEF(_kernel_3_patchset,
|
|
{ 0x3BD24, _NOP() }, // Disable SVC verifications
|
|
{ 0x483FC, _MOVZX(8, 1, 0) } // Enable Debug Patch
|
|
);
|
|
|
|
PATCHSET_DEF(_kernel_4_patchset,
|
|
{ 0x41EB4, _NOP() }, // Disable SVC verifications
|
|
{ 0x4EBFC, _MOVZX(8, 1, 0) } // Enable Debug Patch
|
|
);
|
|
|
|
PATCHSET_DEF(_kernel_5_patchset,
|
|
{ 0xFFFFFFFF, 0xFFFFFFFF }, // TODO: MISSING
|
|
{ 0x5513C, _MOVZX(8, 1, 0) } // Enable Debug Patch
|
|
);
|
|
|
|
/*
|
|
* package1.1 header: <wb, ldr, sm>
|
|
* package1.1 layout:
|
|
* 1.0: {sm, ldr, wb} { 2, 1, 0 }
|
|
* 2.0: {wb, ldr, sm} { 0, 1, 2 }
|
|
* 3.0: {wb, ldr, sm} { 0, 1, 2 }
|
|
* 3.1: {wb, ldr, sm} { 0, 1, 2 }
|
|
* 4.0: {ldr, sm, wb} { 1, 2, 0 }
|
|
* 5.0: {ldr, sm, wb} { 1, 2, 0 }
|
|
*/
|
|
|
|
static const pkg1_id_t _pkg1_ids[] = {
|
|
{ "20161121183008", 0, 0x1900, 0x3FE0, { 2, 1, 0 }, SM_100_ADR, _secmon_1_patchset, _kernel_1_patchset }, //1.0.0 (Patched relocator)
|
|
{ "20170210155124", 0, 0x1900, 0x3FE0, { 0, 1, 2 }, 0x4002D000, _secmon_2_patchset, _kernel_2_patchset }, //2.0.0 - 2.3.0
|
|
{ "20170519101410", 1, 0x1A00, 0x3FE0, { 0, 1, 2 }, 0x4002D000, _secmon_3_patchset, _kernel_3_patchset }, //3.0.0
|
|
{ "20170710161758", 2, 0x1A00, 0x3FE0, { 0, 1, 2 }, 0x4002D000, _secmon_3_patchset, _kernel_3_patchset }, //3.0.1 - 3.0.2
|
|
{ "20170921172629", 3, 0x1800, 0x3FE0, { 1, 2, 0 }, 0x4002B000, _secmon_4_patchset, _kernel_4_patchset }, //4.0.0 - 4.1.0
|
|
{ "20180220163747", 4, 0x1900, 0x3FE0, { 1, 2, 0 }, 0x4002B000, _secmon_5_patchset, _kernel_5_patchset }, //5.0.0 - 5.0.2
|
|
{ NULL, 0, 0, 0, 0 } //End.
|
|
};
|
|
|
|
|
|
const pkg1_id_t *pkg1_identify(u8 *pkg1)
|
|
{
|
|
for (u32 i = 0; _pkg1_ids[i].id; i++)
|
|
if (!memcmp(pkg1 + 0x10, _pkg1_ids[i].id, 12))
|
|
return &_pkg1_ids[i];
|
|
return NULL;
|
|
}
|
|
|
|
void pkg1_decrypt(const pkg1_id_t *id, u8 *pkg1)
|
|
{
|
|
//Decrypt package1.
|
|
u8 *pkg11 = pkg1 + id->pkg11_off;
|
|
u32 pkg11_size = *(u32 *)pkg11;
|
|
se_aes_crypt_ctr(11, pkg11 + 0x20, pkg11_size, pkg11 + 0x20, pkg11_size, pkg11 + 0x10);
|
|
}
|
|
|
|
void pkg1_unpack(void *warmboot_dst, void *secmon_dst, const pkg1_id_t *id, u8 *pkg1)
|
|
{
|
|
pk11_hdr_t *hdr = (pk11_hdr_t *)(pkg1 + id->pkg11_off + 0x20);
|
|
|
|
u32 sec_size[3] = { hdr->wb_size, hdr->ldr_size, hdr->sm_size };
|
|
//u32 sec_off[3] = { hdr->wb_off, hdr->ldr_off, hdr->sm_off };
|
|
|
|
u8 *pdata = (u8 *)hdr + sizeof(pk11_hdr_t);
|
|
for (u32 i = 0; i < 3; i++)
|
|
{
|
|
if (id->sec_map[i] == 0 && warmboot_dst)
|
|
memcpy(warmboot_dst, pdata, sec_size[id->sec_map[i]]);
|
|
else if (id->sec_map[i] == 2 && secmon_dst)
|
|
memcpy(secmon_dst, pdata, sec_size[id->sec_map[i]]);
|
|
pdata += sec_size[id->sec_map[i]];
|
|
}
|
|
}
|