mirror of
https://github.com/Atmosphere-NX/Atmosphere
synced 2024-12-22 20:31:14 +00:00
exo: shuffle logic around to support debug code region in iram
This commit is contained in:
parent
ee3a7e7740
commit
2ef41f0027
11 changed files with 86 additions and 43 deletions
|
@ -5,7 +5,7 @@ define ATMOSPHERE_ADD_TARGET
|
||||||
|
|
||||||
ATMOSPHERE_BUILD_CONFIGS += $(strip $1)
|
ATMOSPHERE_BUILD_CONFIGS += $(strip $1)
|
||||||
|
|
||||||
$(strip $1): exosphere$(strip $2).bin warmboot/warmboot$(strip $2).bin
|
$(strip $1): exosphere$(strip $2).bin check_warmboot_$(strip $1)
|
||||||
@cp warmboot/warmboot$(strip $2).bin warmboot$(strip $2).bin
|
@cp warmboot/warmboot$(strip $2).bin warmboot$(strip $2).bin
|
||||||
|
|
||||||
exosphere$(strip $2).bin: loader_stub/loader_stub$(strip $2).bin
|
exosphere$(strip $2).bin: loader_stub/loader_stub$(strip $2).bin
|
||||||
|
@ -13,10 +13,13 @@ exosphere$(strip $2).bin: loader_stub/loader_stub$(strip $2).bin
|
||||||
@printf LENY >> exosphere$(strip $2).bin
|
@printf LENY >> exosphere$(strip $2).bin
|
||||||
@echo "Built exosphere$(strip $2).bin..."
|
@echo "Built exosphere$(strip $2).bin..."
|
||||||
|
|
||||||
warmboot/warmboot$(strip $2).bin:
|
check_program_$(strip $1):
|
||||||
|
@$$(MAKE) -C program $(strip $1)
|
||||||
|
|
||||||
|
check_warmboot_$(strip $1):
|
||||||
@$$(MAKE) -C warmboot $(strip $1)
|
@$$(MAKE) -C warmboot $(strip $1)
|
||||||
|
|
||||||
loader_stub/loader_stub$(strip $2).bin:
|
loader_stub/loader_stub$(strip $2).bin: check_program_$(strip $1)
|
||||||
@$$(MAKE) -C loader_stub $(strip $1)
|
@$$(MAKE) -C loader_stub $(strip $1)
|
||||||
|
|
||||||
clean-$(strip $1): clean-program-$(strip $1) clean-loader_stub-$(strip $1) clean-warmboot-$(strip $1)
|
clean-$(strip $1): clean-program-$(strip $1) clean-loader_stub-$(strip $1) clean-warmboot-$(strip $1)
|
||||||
|
@ -49,4 +52,4 @@ clean-loader_stub:
|
||||||
clean-warmboot:
|
clean-warmboot:
|
||||||
@$(MAKE) -C warmboot clean
|
@$(MAKE) -C warmboot clean
|
||||||
|
|
||||||
.PHONY: all clean clean-program clean-loader_stub clean-warmboot $(foreach config,$(ATMOSPHERE_BUILD_CONFIGS),clean-$(config) clean-program-$(config) clean-loader_stub-$(config) clean-warmboot-$(config))
|
.PHONY: all clean clean-program clean-loader_stub clean-warmboot $(foreach config,$(ATMOSPHERE_BUILD_CONFIGS),check_program_$(config) check_warmboot_$(strip $1) clean-$(config) clean-program-$(config) clean-loader_stub-$(config) clean-warmboot-$(config))
|
||||||
|
|
|
@ -32,7 +32,6 @@ namespace ams::secmon::loader {
|
||||||
/* Uncompress the boot image. */
|
/* Uncompress the boot image. */
|
||||||
Uncompress(secmon::MemoryRegionPhysicalIramBootCodeImage.GetPointer(), secmon::MemoryRegionPhysicalIramBootCodeImage.GetSize(), relocated_boot_code, boot_code_lz4_size);
|
Uncompress(secmon::MemoryRegionPhysicalIramBootCodeImage.GetPointer(), secmon::MemoryRegionPhysicalIramBootCodeImage.GetSize(), relocated_boot_code, boot_code_lz4_size);
|
||||||
|
|
||||||
|
|
||||||
/* Jump to the boot image. */
|
/* Jump to the boot image. */
|
||||||
reinterpret_cast<void (*)()>(secmon::MemoryRegionPhysicalIramBootCodeImage.GetAddress())();
|
reinterpret_cast<void (*)()>(secmon::MemoryRegionPhysicalIramBootCodeImage.GetAddress())();
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,8 @@ MEMORY
|
||||||
{
|
{
|
||||||
NULL : ORIGIN = 0, LENGTH = 4K
|
NULL : ORIGIN = 0, LENGTH = 4K
|
||||||
unused_region : ORIGIN = 0x1000, LENGTH = 4K
|
unused_region : ORIGIN = 0x1000, LENGTH = 4K
|
||||||
iram_boot_code : ORIGIN = 0x040032000, LENGTH = 48K
|
iram_boot_code : ORIGIN = 0x040032000, LENGTH = 4K
|
||||||
|
iram_boot_keys : ORIGIN = 0x040033000, LENGTH = 4K
|
||||||
tzram : ORIGIN = 0x07C010000, LENGTH = 64K
|
tzram : ORIGIN = 0x07C010000, LENGTH = 64K
|
||||||
|
|
||||||
/* Warmboot code follows the vectors in memory. */
|
/* Warmboot code follows the vectors in memory. */
|
||||||
|
@ -13,9 +14,10 @@ MEMORY
|
||||||
warmboot_text : ORIGIN = ORIGIN(tzram) + 10K, LENGTH = 2K
|
warmboot_text : ORIGIN = ORIGIN(tzram) + 10K, LENGTH = 2K
|
||||||
|
|
||||||
main : ORIGIN = 0x1F00C0000, LENGTH = 48K
|
main : ORIGIN = 0x1F00C0000, LENGTH = 48K
|
||||||
tzram_boot : ORIGIN = 0x1F01C0000, LENGTH = 8K
|
debug_code : ORIGIN = 0x1F0150000, LENGTH = 16K
|
||||||
|
tzram_boot : ORIGIN = 0x1F01C0800, LENGTH = 6K
|
||||||
|
|
||||||
glob : ORIGIN = 0x040032000, LENGTH = 64K
|
glob : ORIGIN = 0x040032000, LENGTH = 128K
|
||||||
}
|
}
|
||||||
|
|
||||||
SECTIONS
|
SECTIONS
|
||||||
|
@ -85,19 +87,30 @@ SECTIONS
|
||||||
KEEP (*(.dtors))
|
KEEP (*(.dtors))
|
||||||
} >iram_boot_code AT>glob
|
} >iram_boot_code AT>glob
|
||||||
|
|
||||||
__bootcode_end__ = ABSOLUTE(.);
|
.boot_code.fill : {
|
||||||
|
|
||||||
__program_start__ = ABSOLUTE(.);
|
|
||||||
|
|
||||||
.tzram_boot_volatile_data : {
|
|
||||||
KEEP (*(.volatile_keys .volatile_keys.*))
|
|
||||||
} >tzram_boot AT>glob
|
|
||||||
|
|
||||||
.tzram_boot_volatile_data.fill : {
|
|
||||||
FILL(0x00000000);
|
FILL(0x00000000);
|
||||||
. = ORIGIN(tzram_boot) + 0x7FF;
|
. = ORIGIN(iram_boot_code) + 0xFFF;
|
||||||
BYTE(0x00);
|
BYTE(0x00);
|
||||||
} >tzram_boot AT>glob
|
} >iram_boot_code AT>glob
|
||||||
|
|
||||||
|
.boot_code_volatile_keys : {
|
||||||
|
KEEP (*(.volatile_keys .volatile_keys.*))
|
||||||
|
} >iram_boot_keys AT>glob
|
||||||
|
|
||||||
|
.boot_keys.fill : {
|
||||||
|
FILL(0x00000000);
|
||||||
|
. = ORIGIN(iram_boot_keys) + 0xFFF;
|
||||||
|
BYTE(0x00);
|
||||||
|
} >iram_boot_keys AT>glob
|
||||||
|
|
||||||
|
.debug_code : {
|
||||||
|
KEEP (*(.text._ZN3ams3log6PrintfEPKcz .text._ZN3ams3log7VPrintfEPKcSt9__va_list .text._ZN3ams3log4DumpEPKvm))
|
||||||
|
KEEP (*(.text._ZN3ams4util10TVSNPrintfEPcmPKcSt9__va_list .text._ZN3ams4util12_GLOBAL__N_114TVSNPrintfImplEPcmPKcSt9__va_list .text._ZZN3ams4util12_GLOBAL__N_114TVSNPrintfImplEPcmPKcSt9__va_listENKUlbmE3_clEbm))
|
||||||
|
} >debug_code AT>glob
|
||||||
|
|
||||||
|
__bootcode_end__ = ABSOLUTE(.) - ORIGIN(debug_code) + 0x40034000;
|
||||||
|
|
||||||
|
__program_start__ = __bootcode_end__;
|
||||||
|
|
||||||
.tzram_boot_code :
|
.tzram_boot_code :
|
||||||
{
|
{
|
||||||
|
@ -147,7 +160,6 @@ SECTIONS
|
||||||
. = ALIGN(0x100);
|
. = ALIGN(0x100);
|
||||||
} >main AT>glob
|
} >main AT>glob
|
||||||
|
|
||||||
|
|
||||||
.warmboot :
|
.warmboot :
|
||||||
{
|
{
|
||||||
KEEP (*(.warmboot.text.start)) /* Should be first */
|
KEEP (*(.warmboot.text.start)) /* Should be first */
|
||||||
|
|
|
@ -49,9 +49,19 @@ namespace ams::secmon::boot {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void ClearIram() {
|
void ClearIramBootCode() {
|
||||||
/* Clear the boot code image from where it was loaded in IRAM. */
|
/* Clear the boot code image from where it was loaded in IRAM. */
|
||||||
util::ClearMemory(MemoryRegionPhysicalIramBootCodeImage.GetPointer(), MemoryRegionPhysicalIramBootCodeImage.GetSize());
|
util::ClearMemory(MemoryRegionPhysicalIramBootCodeCode.GetPointer(), MemoryRegionPhysicalIramBootCodeCode.GetSize());
|
||||||
|
}
|
||||||
|
|
||||||
|
void ClearIramBootKeys() {
|
||||||
|
/* Clear the boot keys from where they were loaded in IRAM. */
|
||||||
|
util::ClearMemory(MemoryRegionPhysicalIramBootCodeKeys.GetPointer(), MemoryRegionPhysicalIramBootCodeKeys.GetSize());
|
||||||
|
}
|
||||||
|
|
||||||
|
void ClearIramDebugCode() {
|
||||||
|
/* Clear the boot code image from where it was loaded in IRAM. */
|
||||||
|
util::ClearMemory(MemoryRegionPhysicalDebugCode.GetPointer(), MemoryRegionPhysicalDebugCode.GetSize());
|
||||||
}
|
}
|
||||||
|
|
||||||
void WaitForNxBootloader(const pkg1::SecureMonitorParameters ¶ms, pkg1::BootloaderState state) {
|
void WaitForNxBootloader(const pkg1::SecureMonitorParameters ¶ms, pkg1::BootloaderState state) {
|
||||||
|
|
|
@ -18,7 +18,9 @@
|
||||||
|
|
||||||
namespace ams::secmon::boot {
|
namespace ams::secmon::boot {
|
||||||
|
|
||||||
void ClearIram();
|
void ClearIramBootCode();
|
||||||
|
void ClearIramBootKeys();
|
||||||
|
void ClearIramDebugCode();
|
||||||
|
|
||||||
void WaitForNxBootloader(const pkg1::SecureMonitorParameters ¶ms, pkg1::BootloaderState state);
|
void WaitForNxBootloader(const pkg1::SecureMonitorParameters ¶ms, pkg1::BootloaderState state);
|
||||||
|
|
||||||
|
|
|
@ -70,7 +70,12 @@ namespace ams::secmon {
|
||||||
secmon::SetupCpuCoreContext();
|
secmon::SetupCpuCoreContext();
|
||||||
|
|
||||||
/* Clear the crt0 code that was present in iram. */
|
/* Clear the crt0 code that was present in iram. */
|
||||||
secmon::boot::ClearIram();
|
secmon::boot::ClearIramBootCode();
|
||||||
|
|
||||||
|
/* Clear the debug code from iram, if we're not in debug config. */
|
||||||
|
#if !defined(AMS_BUILD_FOR_DEBUGGING) && !defined(AMS_BUILD_FOR_AUDITING)
|
||||||
|
secmon::boot::ClearIramDebugCode();
|
||||||
|
#endif
|
||||||
|
|
||||||
/* Alert the bootloader that we're initialized. */
|
/* Alert the bootloader that we're initialized. */
|
||||||
secmon_params.secmon_state = pkg1::SecureMonitorState_Initialized;
|
secmon_params.secmon_state = pkg1::SecureMonitorState_Initialized;
|
||||||
|
@ -117,9 +122,6 @@ namespace ams::secmon {
|
||||||
std::memcpy(dst, src, size);
|
std::memcpy(dst, src, size);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Unmap the identity mapping. */
|
|
||||||
secmon::boot::UnmapPhysicalIdentityMapping();
|
|
||||||
|
|
||||||
/* Setup the GPU carveout's magic numbers. */
|
/* Setup the GPU carveout's magic numbers. */
|
||||||
secmon::boot::WriteGpuCarveoutMagicNumbers();
|
secmon::boot::WriteGpuCarveoutMagicNumbers();
|
||||||
|
|
||||||
|
@ -172,6 +174,12 @@ namespace ams::secmon {
|
||||||
/* Set the core's entrypoint and argument. */
|
/* Set the core's entrypoint and argument. */
|
||||||
secmon::SetEntryContext(0, Package2LoadAddress + pkg2_meta.entrypoint, 0);
|
secmon::SetEntryContext(0, Package2LoadAddress + pkg2_meta.entrypoint, 0);
|
||||||
|
|
||||||
|
/* Clear the boot keys from iram. */
|
||||||
|
secmon::boot::ClearIramBootKeys();
|
||||||
|
|
||||||
|
/* Unmap the identity mapping. */
|
||||||
|
secmon::boot::UnmapPhysicalIdentityMapping();
|
||||||
|
|
||||||
/* Unmap DRAM. */
|
/* Unmap DRAM. */
|
||||||
secmon::boot::UnmapDram();
|
secmon::boot::UnmapDram();
|
||||||
|
|
||||||
|
|
|
@ -17,6 +17,7 @@ def split_binary(data):
|
||||||
assert D == 0xDDDDDDDDDDDDDDDD
|
assert D == 0xDDDDDDDDDDDDDDDD
|
||||||
data = data[0x40:]
|
data = data[0x40:]
|
||||||
|
|
||||||
|
#print ('%X %X %X %X' % (START, BOOT_CODE_START, BOOT_CODE_END, PROGRAM_START))
|
||||||
boot_code = data[BOOT_CODE_START - START:BOOT_CODE_END - BOOT_CODE_START]
|
boot_code = data[BOOT_CODE_START - START:BOOT_CODE_END - BOOT_CODE_START]
|
||||||
program = data[PROGRAM_START - START:]
|
program = data[PROGRAM_START - START:]
|
||||||
return [('boot_code%s.lz4', lz4_compress(boot_code)), ('program%s.lz4', lz4_compress(program))]
|
return [('boot_code%s.lz4', lz4_compress(boot_code)), ('program%s.lz4', lz4_compress(program))]
|
||||||
|
|
|
@ -224,7 +224,7 @@ namespace ams::secmon {
|
||||||
static_assert(MemoryRegionVirtual.Contains(MemoryRegionVirtualIramSc7Firmware));
|
static_assert(MemoryRegionVirtual.Contains(MemoryRegionVirtualIramSc7Firmware));
|
||||||
static_assert(MemoryRegionPhysicalIram.Contains(MemoryRegionPhysicalIramSc7Firmware));
|
static_assert(MemoryRegionPhysicalIram.Contains(MemoryRegionPhysicalIramSc7Firmware));
|
||||||
|
|
||||||
constexpr inline const MemoryRegion MemoryRegionPhysicalIramSecureMonitorDebug(UINT64_C(0x40030000), 0x8000);
|
constexpr inline const MemoryRegion MemoryRegionPhysicalIramSecureMonitorDebug(UINT64_C(0x40034000), 0x4000);
|
||||||
static_assert(MemoryRegionPhysicalIram.Contains(MemoryRegionPhysicalIramSecureMonitorDebug));
|
static_assert(MemoryRegionPhysicalIram.Contains(MemoryRegionPhysicalIramSecureMonitorDebug));
|
||||||
|
|
||||||
constexpr inline const MemoryRegion MemoryRegionVirtualDebugCode = MemoryRegion(UINT64_C(0x1F0150000), 0x4000);
|
constexpr inline const MemoryRegion MemoryRegionVirtualDebugCode = MemoryRegion(UINT64_C(0x1F0150000), 0x4000);
|
||||||
|
@ -289,7 +289,6 @@ namespace ams::secmon {
|
||||||
static_assert(MemoryRegionVirtual.Contains(MemoryRegionVirtualTzramConfigurationData));
|
static_assert(MemoryRegionVirtual.Contains(MemoryRegionVirtualTzramConfigurationData));
|
||||||
static_assert(MemoryRegionPhysicalTzramNonVolatile.Contains(MemoryRegionPhysicalTzramConfigurationData));
|
static_assert(MemoryRegionPhysicalTzramNonVolatile.Contains(MemoryRegionPhysicalTzramConfigurationData));
|
||||||
|
|
||||||
|
|
||||||
constexpr inline const MemoryRegion MemoryRegionVirtualTzramL1PageTable = MemoryRegion(UINT64_C(0x1F01FCFC0), 0x40);
|
constexpr inline const MemoryRegion MemoryRegionVirtualTzramL1PageTable = MemoryRegion(UINT64_C(0x1F01FCFC0), 0x40);
|
||||||
constexpr inline const MemoryRegion MemoryRegionPhysicalTzramL1PageTable = MemoryRegion( UINT64_C(0x7C01EFC0), 0x40);
|
constexpr inline const MemoryRegion MemoryRegionPhysicalTzramL1PageTable = MemoryRegion( UINT64_C(0x7C01EFC0), 0x40);
|
||||||
static_assert(MemoryRegionPhysicalTzramConfigurationData.Contains(MemoryRegionPhysicalTzramL1PageTable));
|
static_assert(MemoryRegionPhysicalTzramConfigurationData.Contains(MemoryRegionPhysicalTzramL1PageTable));
|
||||||
|
@ -299,8 +298,11 @@ namespace ams::secmon {
|
||||||
static_assert(MemoryRegionVirtual.Contains(MemoryRegionVirtualTzramL2L3PageTable));
|
static_assert(MemoryRegionVirtual.Contains(MemoryRegionVirtualTzramL2L3PageTable));
|
||||||
static_assert(MemoryRegionPhysicalTzramNonVolatile.Contains(MemoryRegionPhysicalTzramL2L3PageTable));
|
static_assert(MemoryRegionPhysicalTzramNonVolatile.Contains(MemoryRegionPhysicalTzramL2L3PageTable));
|
||||||
|
|
||||||
constexpr inline const MemoryRegion MemoryRegionPhysicalTzramFullProgramImage = MemoryRegion(UINT64_C(0x7C010000), 0xE000);
|
constexpr inline const MemoryRegion MemoryRegionPhysicalTzramFullProgramImage = MemoryRegion(UINT64_C(0x7C010800), 0xD800);
|
||||||
constexpr inline const MemoryRegion MemoryRegionPhysicalIramBootCodeImage = MemoryRegion(UINT64_C(0x40032000), 0xC000);
|
constexpr inline const MemoryRegion MemoryRegionPhysicalIramBootCodeImage = MemoryRegion(UINT64_C(0x40032000), 0x6000);
|
||||||
|
|
||||||
|
constexpr inline const MemoryRegion MemoryRegionPhysicalIramBootCodeCode = MemoryRegion(UINT64_C(0x40032000), 0x1000);
|
||||||
|
constexpr inline const MemoryRegion MemoryRegionPhysicalIramBootCodeKeys = MemoryRegion(UINT64_C(0x40033000), 0x1000);
|
||||||
|
|
||||||
constexpr inline const MemoryRegion MemoryRegionPhysicalIramWarmbootBin = MemoryRegion(UINT64_C(0x4003E000), 0x17F0);
|
constexpr inline const MemoryRegion MemoryRegionPhysicalIramWarmbootBin = MemoryRegion(UINT64_C(0x4003E000), 0x17F0);
|
||||||
constexpr inline const MemoryRegion MemoryRegionPhysicalIramBootConfig = MemoryRegion(UINT64_C(0x4003F800), 0x400);
|
constexpr inline const MemoryRegion MemoryRegionPhysicalIramBootConfig = MemoryRegion(UINT64_C(0x4003F800), 0x400);
|
||||||
|
|
|
@ -30,17 +30,19 @@ namespace ams::secmon {
|
||||||
u8 package2_dev_rsa_modulus[0x100];
|
u8 package2_dev_rsa_modulus[0x100];
|
||||||
u8 package2_prod_rsa_modulus[0x100];
|
u8 package2_prod_rsa_modulus[0x100];
|
||||||
u8 package2_aes_key[0x10];
|
u8 package2_aes_key[0x10];
|
||||||
|
u8 padding[0xCF0];
|
||||||
};
|
};
|
||||||
|
static_assert(util::is_pod<VolatileKeys>::value);
|
||||||
|
static_assert(sizeof(VolatileKeys) == 0x1000);
|
||||||
|
|
||||||
/* Nintendo uses the bottom 0x740 of this as a stack for warmboot setup, and another 0x740 for the core 0/1/2 SMC stacks. */
|
/* Nintendo uses the bottom 0x740 of this as a stack for warmboot setup, and another 0x740 for the core 0/1/2 SMC stacks. */
|
||||||
/* This is...wasteful. The warmboot stack is not deep. We will thus save 1K+ of nonvolatile storage by keeping the random cache in here. */
|
/* This is...wasteful. The warmboot stack is not deep. We will thus save 1K+ of nonvolatile storage by keeping the random cache in here. */
|
||||||
struct VolatileData {
|
struct VolatileData {
|
||||||
|
u8 se_work_block[crypto::AesEncryptor128::BlockSize];
|
||||||
union {
|
union {
|
||||||
u8 random_cache[0x400];
|
u8 random_cache[0x400];
|
||||||
VolatileKeys keys;
|
|
||||||
pkg2::Package2Meta pkg2_meta;
|
pkg2::Package2Meta pkg2_meta;
|
||||||
};
|
};
|
||||||
u8 se_work_block[crypto::AesEncryptor128::BlockSize];
|
|
||||||
u8 reserved_danger_zone[0x30]; /* This memory is "available", but careful consideration must be taken before declaring it used. */
|
u8 reserved_danger_zone[0x30]; /* This memory is "available", but careful consideration must be taken before declaring it used. */
|
||||||
u8 warmboot_stack[0x380];
|
u8 warmboot_stack[0x380];
|
||||||
u8 core012_smc_stack[0x6C0];
|
u8 core012_smc_stack[0x6C0];
|
||||||
|
@ -48,8 +50,6 @@ namespace ams::secmon {
|
||||||
};
|
};
|
||||||
static_assert(util::is_pod<VolatileData>::value);
|
static_assert(util::is_pod<VolatileData>::value);
|
||||||
static_assert(sizeof(VolatileData) == 0x1000);
|
static_assert(sizeof(VolatileData) == 0x1000);
|
||||||
static_assert(sizeof(VolatileKeys{}.boot_config_rsa_modulus) == sizeof(pkg2::Package2Meta));
|
|
||||||
static_assert(offsetof(VolatileData, keys.boot_config_rsa_modulus) == offsetof(VolatileData, pkg2_meta));
|
|
||||||
|
|
||||||
ALWAYS_INLINE VolatileData &GetVolatileData() {
|
ALWAYS_INLINE VolatileData &GetVolatileData() {
|
||||||
return *MemoryRegionVirtualTzramVolatileData.GetPointer<VolatileData>();
|
return *MemoryRegionVirtualTzramVolatileData.GetPointer<VolatileData>();
|
||||||
|
@ -69,17 +69,21 @@ namespace ams::secmon {
|
||||||
|
|
||||||
namespace boot {
|
namespace boot {
|
||||||
|
|
||||||
|
ALWAYS_INLINE VolatileKeys &GetVolatileKeys() {
|
||||||
|
return *MemoryRegionPhysicalIramBootCodeKeys.GetPointer<VolatileKeys>();
|
||||||
|
}
|
||||||
|
|
||||||
ALWAYS_INLINE const u8 *GetBootConfigRsaModulus() {
|
ALWAYS_INLINE const u8 *GetBootConfigRsaModulus() {
|
||||||
return GetVolatileData().keys.boot_config_rsa_modulus;
|
return GetVolatileKeys().boot_config_rsa_modulus;
|
||||||
}
|
}
|
||||||
|
|
||||||
ALWAYS_INLINE const u8 *GetPackage2RsaModulus(bool is_prod) {
|
ALWAYS_INLINE const u8 *GetPackage2RsaModulus(bool is_prod) {
|
||||||
auto &volatile_data = GetVolatileData();
|
auto &keys = GetVolatileKeys();
|
||||||
return is_prod ? volatile_data.keys.package2_prod_rsa_modulus : volatile_data.keys.package2_dev_rsa_modulus;
|
return is_prod ? keys.package2_prod_rsa_modulus : keys.package2_dev_rsa_modulus;
|
||||||
}
|
}
|
||||||
|
|
||||||
ALWAYS_INLINE const u8 *GetPackage2AesKey() {
|
ALWAYS_INLINE const u8 *GetPackage2AesKey() {
|
||||||
return GetVolatileData().keys.package2_aes_key;
|
return GetVolatileKeys().package2_aes_key;
|
||||||
}
|
}
|
||||||
|
|
||||||
ALWAYS_INLINE pkg2::Package2Meta &GetEphemeralPackage2Meta() {
|
ALWAYS_INLINE pkg2::Package2Meta &GetEphemeralPackage2Meta() {
|
||||||
|
|
|
@ -25,7 +25,8 @@ namespace ams::mitm::bpc {
|
||||||
constexpr uintptr_t IramBase = 0x40000000ull;
|
constexpr uintptr_t IramBase = 0x40000000ull;
|
||||||
constexpr uintptr_t IramPayloadBase = 0x40010000ull;
|
constexpr uintptr_t IramPayloadBase = 0x40010000ull;
|
||||||
constexpr size_t IramSize = 0x40000;
|
constexpr size_t IramSize = 0x40000;
|
||||||
constexpr size_t IramPayloadMaxSize = 0x20000;
|
constexpr size_t IramPayloadMaxSize = 0x24000;
|
||||||
|
constexpr size_t IramFatalErrorContextOffset = 0x2E000;
|
||||||
|
|
||||||
/* Helper enum. */
|
/* Helper enum. */
|
||||||
enum class RebootType : u32 {
|
enum class RebootType : u32 {
|
||||||
|
@ -64,7 +65,7 @@ namespace ams::mitm::bpc {
|
||||||
if (ctx != nullptr) {
|
if (ctx != nullptr) {
|
||||||
std::memset(g_work_page, 0xCC, sizeof(g_work_page));
|
std::memset(g_work_page, 0xCC, sizeof(g_work_page));
|
||||||
std::memcpy(g_work_page, ctx, sizeof(*ctx));
|
std::memcpy(g_work_page, ctx, sizeof(*ctx));
|
||||||
exosphere::CopyToIram(IramPayloadBase + IramPayloadMaxSize, g_work_page, sizeof(g_work_page));
|
exosphere::CopyToIram(IramPayloadBase + IramFatalErrorContextOffset, g_work_page, sizeof(g_work_page));
|
||||||
}
|
}
|
||||||
|
|
||||||
exosphere::ForceRebootToIramPayload();
|
exosphere::ForceRebootToIramPayload();
|
||||||
|
|
|
@ -26,7 +26,8 @@ namespace ams::boot {
|
||||||
constexpr uintptr_t IramBase = 0x40000000ull;
|
constexpr uintptr_t IramBase = 0x40000000ull;
|
||||||
constexpr uintptr_t IramPayloadBase = 0x40010000ull;
|
constexpr uintptr_t IramPayloadBase = 0x40010000ull;
|
||||||
constexpr size_t IramSize = 0x40000;
|
constexpr size_t IramSize = 0x40000;
|
||||||
constexpr size_t IramPayloadMaxSize = 0x20000;
|
constexpr size_t IramPayloadMaxSize = 0x24000;
|
||||||
|
constexpr size_t IramFatalErrorContextOffset = 0x2E000;
|
||||||
|
|
||||||
/* Globals. */
|
/* Globals. */
|
||||||
alignas(os::MemoryPageSize) u8 g_work_page[os::MemoryPageSize];
|
alignas(os::MemoryPageSize) u8 g_work_page[os::MemoryPageSize];
|
||||||
|
@ -57,7 +58,7 @@ namespace ams::boot {
|
||||||
if (ctx != nullptr) {
|
if (ctx != nullptr) {
|
||||||
std::memset(g_work_page, 0xCC, sizeof(g_work_page));
|
std::memset(g_work_page, 0xCC, sizeof(g_work_page));
|
||||||
std::memcpy(g_work_page, ctx, sizeof(*ctx));
|
std::memcpy(g_work_page, ctx, sizeof(*ctx));
|
||||||
exosphere::CopyToIram(IramPayloadBase + IramPayloadMaxSize, g_work_page, sizeof(g_work_page));
|
exosphere::CopyToIram(IramPayloadBase + IramFatalErrorContextOffset, g_work_page, sizeof(g_work_page));
|
||||||
}
|
}
|
||||||
|
|
||||||
exosphere::ForceRebootToIramPayload();
|
exosphere::ForceRebootToIramPayload();
|
||||||
|
|
Loading…
Reference in a new issue