/* * Copyright (c) 2018 naehrwert * Copyright (c) 2022-2025 CTCaer * * This program is free software; you can redistribute it and/or modify it * under the terms and conditions of the GNU General Public License, * version 2, as published by the Free Software Foundation. * * This program is distributed in the hope it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #ifndef _PKG1_H_ #define _PKG1_H_ #include #define PKG1_MAGIC 0x31314B50 #define PK11_SECTION_WB 0 #define PK11_SECTION_LD 1 #define PK11_SECTION_SM 2 #define PKG1_BOOTLOADER_SIZE SZ_256K #define PKG1_BOOTLOADER_MAIN_OFFSET (0x100000 / EMMC_BLOCKSIZE) #define PKG1_BOOTLOADER_BACKUP_OFFSET (0x140000 / EMMC_BLOCKSIZE) #define PKG1_BOOTLOADER_SAFE_OFFSET (0x000000 / EMMC_BLOCKSIZE) #define PKG1_HOS_EKS_OFFSET (0x180000 / EMMC_BLOCKSIZE) #define PKG1_ERISTA_ON_MARIKO_MAGIC 0xE59FD00C // For 4.0.0 Erista and up. #define PKG1_MARIKO_ON_ERISTA_MAGIC 0x40010040 // Mariko pkg1 entrypoint. typedef struct _patch_t { u32 off; u32 val; } patch_t; #define PATCHSET_DEF(name, ...) \ const patch_t name[] = { \ __VA_ARGS__, \ { 0xFFFFFFFF, 0xFFFFFFFF } \ } typedef struct _bl_hdr_t210b01_t { /* 0x000 */ u8 aes_mac[0x10]; /* 0x010 */ u8 rsa_sig[0x100]; /* 0x110 */ u8 salt[0x20]; /* 0x130 */ u8 sha256[0x20]; /* 0x150 */ u32 version; /* 0x154 */ u32 size; /* 0x158 */ u32 load_addr; /* 0x15C */ u32 entrypoint; /* 0x160 */ u8 rsvd[0x10]; } bl_hdr_t210b01_t; typedef struct _eks_keys_t { u8 master_kekseed[SE_KEY_128_SIZE]; u8 random_data[0x70]; u8 package1_key[SE_KEY_128_SIZE]; } eks_keys_t; typedef struct _pkg1_eks_t { u8 cmac[SE_KEY_128_SIZE]; u8 ctr[SE_AES_IV_SIZE]; eks_keys_t keys; u8 padding[0x150]; } pkg1_eks_t; typedef struct _pk1_hdr_t { /* 0x00 */ u32 si_sha256; // Secure Init. /* 0x04 */ u32 sm_sha256; // Secure Monitor. /* 0x08 */ u32 sl_sha256; // Secure Loader. /* 0x0C */ u32 unk; // what's this? It's not warmboot. /* 0x10 */ char timestamp[14]; /* 0x1E */ u8 keygen; /* 0x1F */ u8 version; } pk1_hdr_t; typedef struct _pkg1_id_t { const char *id; u16 mkey; u16 fuses; u16 tsec_off; u16 pkg11_off; u32 secmon_base; u32 warmboot_base; const patch_t *secmon_patchset; } pkg1_id_t; typedef struct _pk11_hdr_t { /* 0x00 */ u32 magic; /* 0x04 */ u32 wb_size; /* 0x08 */ u32 wb_off; /* 0x0C */ u32 pad; /* 0x10 */ u32 ldr_size; /* 0x14 */ u32 ldr_off; /* 0x18 */ u32 sm_size; /* 0x1C */ u32 sm_off; } pk11_hdr_t; /* * NX BIT - Secure monitor mailbox * * On older versions the Tegra BIT was remaining intact. * The bootloader info from BCT was copied in the mailbox at 0x40002E10. * On >= 4.0.0 the boot reason was replaced by BCT boot type. * On newer versions (>= 7.0.0) the Tegra BIT is replaced with NX BIT. * That also includes secmon state mailbox and pkg1 and pkg11 headers. */ #define NX_BIT1_MAILBOX_ADDR 0x40002E00 #define NX_BIT7_MAILBOX_ADDR 0x40000000 enum { SECMON_STATE_NOT_READY = 0, PKG1_STATE_NOT_READY = 0, PKG1_STATE_NXBC_COPIED = 1, PKG1_STATE_DRAM_READY = 2, PKG1_STATE_PKG2_READY_OLD = 3, PKG1_STATE_PKG2_READY = 4 }; #define NX_BIT_BL_ATTR_SAFE_MODE BIT(0) #define NX_BIT_BL_ATTR_SMC_BLACKLIST_STANDARD BIT(1) // Accounted only on >= 8.0.0. #define NX_BIT_BL_ATTR_SMC_BLACKLIST_DEVICEUD BIT(2) // Accounted only on >= 8.0.0. #define NX_BIT_BL_ATTR_SMC_BLACKLIST_SAFEMODE BIT(3) // Accounted only on >= 8.0.0. typedef struct _nx_bit_t { /* 0x00 */ u32 secldr_tmr_start; /* 0x04 */ u32 secldr_tmr_end; /* 0x08 */ u32 secmon_tmr_start; /* 0x0C */ u32 secmon_tmr_end; /* 0x10 */ u32 bl_version; /* 0x14 */ u32 bl_start_block; /* 0x18 */ u32 bl_start_page; /* 0x1C */ u32 bl_attribute; // bit0: Safe, bit1-4: SMC blacklist mask. /* 0x20 */ u32 boot_type; // 0: None, 1: Coldboot, 2: RMC, 3: UART, 4: Exit RCM. /* 0x24 */ u8 padding_nxbit[12]; /* 0x30 */ pk1_hdr_t pk1_hdr; // (>= 7.0.0). /* 0x50 */ pk11_hdr_t pk11_hdr; // (>= 7.0.0). /* 0x70 */ u8 padding_pkg1[0x88]; /* 0xF8 */ vu32 secldr_state; /* 0xFC */ vu32 secmon_state; u8 padding_mail[0x100]; } nx_bit_t; const pkg1_id_t *pkg1_get_latest(); const pkg1_id_t *pkg1_identify(u8 *pkg1); bool pkg1_decrypt(const pkg1_id_t *id, u8 *pkg1); const u8 *pkg1_unpack(void *wm_dst, u32 *wb_sz, void *sm_dst, void *ldr_dst, const pkg1_id_t *id, u8 *pkg1); void pkg1_secmon_patch(void *hos_ctxt, u32 secmon_base, bool t210b01); void pkg1_warmboot_patch(void *hos_ctxt); int pkg1_warmboot_config(void *hos_ctxt, u32 warmboot_base, u32 fuses_fw, u8 mkey); void pkg1_warmboot_rsa_mod(u32 warmboot_base); #endif