Changes

Jump to navigation Jump to search
16,864 bytes added ,  24 February
no edit summary
= Secure Monitor Calls calls
The secure monitor provides two top level handlers of which each provides a range of sub handlers.
Secure Monitor Calls calls follow the ARM SMC calling convention up to a small change:
{| class=wikitable
! Bit number || Bit mask || Description
SMC arguments are passed using registers X0-X7 with X0 always sending the call sub-id and returning the result of the call.
== ID 0 FunctionId0 ==Functions exposed to user-mode processes using [[SVC|svcCallSecureMonitor]]. SMCs should be called from CPUID 3 (where SPL runs).
{| class=wikitable
! Sub-ID Value || Name |-| In 0xC3000401 || OutSetConfig
|-
| 0xC3000401 || SetConfig || 0xC3000002 ||[[#GetConfig]] (same as in [[#FunctionId1]])
|-
| 0xC3000002 || GetConfig (Same as ID 1, Sub-ID 4) || 0xC3000003 ||GetResult
|-
| 0xC3000003 || CheckStatus || 0xC3000404 ||GetResultData
|-
| 0xC3000404 || GetResult || 0xC3000E05 ||ExpMod
|-
| 0xC3000E05 || ExpMod || 0xC3000006 ||[[#GenerateRandomBytes]] (same as in [[#FunctionId1]])
|-
| 0xC3000006 || GetRandomBytes (Same as ID 1, Sub-ID 5) || 0xC3000007 ||[[#GenerateAesKek]]
|-
| 0xC3000007 0xC3000008 || [[#GenerateAesKekLoadAesKey]] || ||
|-
| 0xC3000008 0xC3000009 || [[#LoadAesKeyComputeAes]] || ||
|-
| 0xC3000009 0xC300000A || [[#CryptAesGenerateSpecificAesKey]] || ||
|-
| 0xC300000A 0xC300040B || [[#GenerateSpecificAesKeyComputeCmac]] || ||
|-
| 0xC300040B [1.0.0-4.1.0] 0xC300100C || [[#ComputeCmacImportEsKey]] || ||
|-
| 0xC300100C [5.0.0+] 0xC300D60C || [[#LoadRsaPrivateKeyReEncryptRsaPrivateKey]] || ||
|-
| [1.0.0-4.1.0] 0xC300100D || [[#DecryptRsaPrivateKey]] || ||
|-
| 0xC300100E [5.0.0+] 0xC300100D || [[#LoadRsaPublicKeyDecryptOrImportRsaPrivateKey]] || ||
|-
| 0xC300060F [1.0.0-4.1.0] 0xC300100E || [[#PublicRsaImportLotusKey]] || ||
|-
| 0xC3000610 0xC300060F || [[#UnwrapRsaWrappedTitleKeyStorageExpMod]] || ||
|-
| 0xC3000011 0xC3000610 || [[#LoadTitleKeyUnwrapTitleKey]] || ||
|-
| 0xC3000011 || [[#LoadTitleKey]]|-| 0xC3000012 || [2.0.0+] UnwrapAesWrappedTitleKey || ||[[#UnwrapCommonTitleKey]]
|}
** This means: Plaintext kek keys never leave TrustZone.
** Further, this means: Actual AES/RSA keys never leave TrustZone.
 
Note:
The [[#CryptoUsecase|CryptoUsecase_TitleKey]] represents a RSA wrapped AES key.
=== GenerateAesKek ===
Takes a session kek created with [[#GenerateAesKek]], and a wrapped AES key.
The session kek must have been created with CryptoUsecase_Aes[[#CryptoUsecase|CryptoUsecase Aes]].
=== CryptAes ComputeAes ===Encrypts/decrypts using Aes AES (CTR and CBC). Takes an [[#CipherMode]].
Key must be set prior using one of the [[#LoadAesKey]], or [[#GenerateSpecificAesKey]] or [[#LoadRsaWrappedAesKey]] commands.
=== GenerateSpecificAesKey ===
Todo: This one seems unrelated to [[#CryptoUsecase]]Takes a wrapped AES key and decrypts it using static data.
=== LoadRsaPrivateKey ComputeCmac ===Calculates CMAC over input data. === ImportEsKey ===
Takes a session kek created with [[#GenerateAesKek]], a wrapped AES key, and a wrapped RSA private key.
The session kek must have been created with CryptoUsecase_TitleKey[[#CryptoUsecase|CryptoUsecase TitleKey]]. [5.0.0] This function was removed and replaced with [[#ReEncryptRsaPrivateKey]]. === ReEncryptRsaPrivateKey ===Takes in two session keks created with [[#GenerateAesKek]], two wrapped AES keys, an enum member, and a wrapped RSA private key. Decrypts and validates the wrapped RSA private key with the first kek/wrapped key, and re-encrypts it with the second if valid. The re-encrypted key is then passed to the user, for use with [[#DecryptOrImportRsaPrivateKey]].
=== DecryptRsaPrivateKey ===
Takes a session kek created with [[#GenerateAesKek]], a wrapped AES key, an enum member, and a wrapped RSA private key. The session kek must have been created with [[#CryptoUsecase|CryptoUsecase RsaPrivate]]. [4.0.0+] The SMC handler when certain conditions pass and FunctionId0==0xC300100D now returns error 0x6 instead of calling the handler funcptr. [5.0.0+] This function was replaced by [[#DecryptOrImportRsaPrivateKey]]. === DecryptOrImportRsaPrivateKey ===This function replaced [[#DecryptRsaPrivateKey]] in [[5.0.0]], adding an additional [[#DecryptOrImportMode]]. This SMC extends DecryptRsaPrivateKey's original functionality to enable importing private keys into the security engine instead of decrypting them, when certain enum members are passed.
The === ImportLotusKey ===Takes a session kek must have been created with CryptoUsecase_PrivateRsa[[#GenerateAesKek]], and a wrapped RSA key.
The session kek must have been created with [[{Unknown version}+#CryptoUsecase|CryptoUsecase RsaSecureExpMod]] The SMC handler when certain conditions pass and SMC_ID==0xC300100D now returns error 0x6 instead of calling the handler funcptr.
=== LoadRsaPublicKey ===Takes a session kek created with [[#GenerateAesKek]5.0.0], and a wrapped RSA public keyThis function was removed.
The session kek must have been created === SecureExpMod ===Performs an ExpMod operation using an exponent previously loaded with CryptoUsecase_PublicRsathe [[#ImportLotusKey]] command.
=== PublicRsa ===Encrypts using Rsa public key[5.0.0+] This now uses any exponent previously loaded with [[#DecryptOrImportRsaPrivateKey]] and takes an [[#SecureExpModMode]].
=== UnwrapTitleKey ===Takes an Rsa-Oaep-wrapped TitleKey, an RSA Public Key must be set prior using the [[#LoadRsaPublicKey]] command, and a label hash.
=== UnwrapRsaWrappedTitleKey ===Takes a session kek created Performs an ExpMod operation using an exponent previously loaded with the [[#GenerateAesKekImportEsKey]]command, and then validates/extracts a wrapped RSA public keyTitlekey from the resulting message.
Returns a session-unique AES key especially for use in [[#LoadTitleKey]].
The session kek must have been created [5.0.0+] This now uses any exponent previously loaded with CryptoUsecase_TitleKey[[#DecryptOrImportRsaPrivateKey]].
=== LoadTitleKey ===
Takes a session-unique AES key from [[#UnwrapCommonTitleKey]] or [[#UnwrapTitleKey]]. === UnwrapCommonTitleKey ===Takes an AES-wrapped TitleKey and returns a sealed AES key. == FunctionId1 ==Functions exposed to the kernel internally.
=== enum CryptoUsecase ===
{| class=wikitable
! Value || Name
|-
| 0xC4000001 || [[#CpuSuspend]]|-| 0x84000002 || [[#CpuOff]]|-| 0xC4000003 || [[#CpuOn]]|-| 0xC3000004 || [[#GetConfig]] (same as in [[#FunctionId0]])|-| 0xC3000005 || [[#GenerateRandomBytes]] (same as in [[#FunctionId0]])|-| 0xC3000006 || [[#Panic]]|-| 0xC3000007 || [2.0.0+] [[#ConfigureCarveout]]|-| 0xC3000008 || [2.0.0 +] [[#ReadWriteRegister]]|} === CpuSuspend ===Takes an u64 '''PowerState''', an u64 '''EntrypointAddr''' and an u64 '''ContextId'''. No output. Suspends the CPU (CPU0). The kernel calls this SMC on shutdown with '''PowerState''' set to 0x0201001B (power level: 0x02==system; power type: 0x01==powerdown; ID: 0x1B). === CpuOff ===No input/output. Turns off the CPU (CPU1, CPU2 or CPU3). === CpuOn ===Takes an u64 '''TargetCpu''', an u64 '''EntrypointAddr''' and an u64 '''ContextId'''. Returns [[#Result]]. Turns on the CPU (CPU1, CPU2 or CPU3). === GetConfig ===Takes a [[#ConfigItem]]. Returns [[#Result]] and a '''ConfigVal'''. ==== ConfigItem ===={|class="wikitable" border="1"| CryptoUsecase_Aes-! Value || Name|-| 1 || [[#DisableProgramVerification]]|-| 2 || [[#DramId]]|-| 3 || [[#SecurityEngineInterruptNumber]]|-| 4 || [[#FuseVersion]]|-| 5 || [[#HardwareType]]|-| 6 || [[#IsRetail]]|-| 7 || [[#IsRecoveryBoot]]|-| 8 || [[#DeviceId]]|-| 9 || [1.0.0-4.0.0] [[#BootReason]]|-| 10 || [[#MemoryMode]]|-| 11 || [[#IsDebugMode]]|-| 12 || [[#KernelConfiguration]]|-| 13 || [[#IsChargerHiZModeEnabled]]|-| 14 || [4.0.0+] [[#IsQuest]]|-| 15 || [5.0.0+] [[#RegulatorType]]|-| 16 || [5.0.0+] [[#DeviceUniqueKeyGeneration]]|-| 17 || [5.0.0+] [[#Package2Hash]]|} ===== DisableProgramVerification =====[[Process Manager services|PM]] checks this item and if non-zero, calls fsp-pr SetEnabledProgramVerification(false). ===== DramId ====={| class="wikitable" border="1"|-! Value! Description|-| 0| EristaIcosaSamsung4gb|-| 1| EristaIcosaHynix4gb|-| 2| EristaIcosaMicron4gb|-| 3| Reserved|-| 4| EristaIcosaSamsung6gb|-| 5| [4.0.0+] Reserved|-| 6| [4.0.0+] Reserved|-| 7| [5.0.0+] MarikoIowax1x2Samsung4gb ([4.0.0-4.1.0] Reserved)|-| 8| [5.0.0+] MarikoIowaSamsung4gb|-| 9| [5.0.0+] MarikoIowaSamsung8gb|-| 10| [6.0.0+] MarikoIowaHynix4gb ([5.0.0-5.1.0] Reserved)|-| 11| [7.0.0+] MarikoIowaMicron4gb ([5.0.0-6.2.0] Reserved)|-| 12| [5.0.0+] MarikoHoagSamsung4gb|-| 13| [5.0.0+] MarikoHoagSamsung8gb|-| 14| [7.0.0+] MarikoHoagHynix4gb ([5.0.0-6.2.0] Reserved)|-| 15| [7.0.0+] MarikoHoagMicron4gb ([5.0.0-6.2.0] Reserved)|-| 16| [8.0.0+] MarikoIowaSamsung4gbY|-| 17| [9.0.0+] MarikoIowaSamsung1y4gbX|-| 18| [9.0.0+] MarikoIowaSamsung1y8gbX|-| 19| [9.0.0+] MarikoHoagSamsung1y4gbX|-| 20| [9.0.0+] MarikoIowaSamsung1y4gbY|-| 21| [9.0.0+] MarikoIowaSamsung1y8gbY|-| 22| [9.0.0+] MarikoIowaSamsung1y4gbA|} This is extracted directly from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]]. [[PCV_services|PCV]] selects memory training tables based on DramId.{| class="wikitable" border="1"|-! SoC! Platform! DramId! Revision! DVFS version|-| T210| jetson-tx1| N/A| 0x07| 11_40800_01_V9.8.3_V1.6 11_68000_01_V9.8.3_V1.6 11_102000_01_V9.8.3_V1.6 11_204000_05_V9.8.3_V1.6 11_408000_02_V9.8.3_V1.6 11_665600_03_V9.8.3_V1.6 11_800000_01_V9.8.3_V1.6 11_1065600_01_V9.8.3_V1.6 11_1331200_01_V9.8.3_V1.6 11_1600000_02_V9.8.3_V1.6|-| T210| nx-abcb| EristaIcosaSamsung4gb| 0x07| 10_40800_NoCfgVersion_V9.8.7_V1.6 10_68000_NoCfgVersion_V9.8.7_V1.6 10_102000_NoCfgVersion_V9.8.7_V1.6 10_204000_NoCfgVersion_V9.8.7_V1.6 10_408000_NoCfgVersion_V9.8.7_V1.6 10_665600_NoCfgVersion_V9.8.7_V1.6 10_800000_NoCfgVersion_V9.8.7_V1.6 10_1065600_NoCfgVersion_V9.8.7_V1.6 10_1331200_NoCfgVersion_V9.8.7_V1.6 10_1600000_NoCfgVersion_V9.8.7_V1.6|-| T210| nx-abcb| EristaIcosaMicron4gb| 0x07| 10_40800_NoCfgVersion_V9.8.4_V1.6 10_68000_NoCfgVersion_V9.8.4_V1.6 10_102000_NoCfgVersion_V9.8.4_V1.6 10_204000_NoCfgVersion_V9.8.4_V1.6 10_408000_NoCfgVersion_V9.8.4_V1.6 10_665600_NoCfgVersion_V9.8.4_V1.6 10_800000_NoCfgVersion_V9.8.4_V1.6 10_1065600_NoCfgVersion_V9.8.4_V1.6 10_1331200_NoCfgVersion_V9.8.4_V1.6 10_1600000_NoCfgVersion_V9.8.4_V1.6|-| T210| nx-abcb| EristaIcosaHynix4gb| 0x07| 10_40800_NoCfgVersion_V9.8.4_V1.6 10_68000_NoCfgVersion_V9.8.4_V1.6 10_102000_NoCfgVersion_V9.8.4_V1.6 10_204000_NoCfgVersion_V9.8.4_V1.6 10_408000_NoCfgVersion_V9.8.4_V1.6 10_665600_NoCfgVersion_V9.8.4_V1.6 10_800000_NoCfgVersion_V9.8.4_V1.6 10_1065600_NoCfgVersion_V9.8.4_V1.6 10_1331200_NoCfgVersion_V9.8.4_V1.6 10_1600000_NoCfgVersion_V9.8.4_V1.6|-| T210| nx-abca2| EristaIcosaSamsung4gb, EristaIcosaMicron4gb| 0x07| 10_40800_NoCfgVersion_V9.8.7_V1.6 10_68000_NoCfgVersion_V9.8.7_V1.6 10_102000_NoCfgVersion_V9.8.7_V1.6 10_204000_NoCfgVersion_V9.8.7_V1.6 10_408000_NoCfgVersion_V9.8.7_V1.6 10_665600_NoCfgVersion_V9.8.7_V1.6 10_800000_NoCfgVersion_V9.8.7_V1.6 10_1065600_NoCfgVersion_V9.8.7_V1.6 10_1331200_NoCfgVersion_V9.8.7_V1.6 10_1600000_NoCfgVersion_V9.8.7_V1.6|-| T210| nx-abca2| EristaIcosaHynix4gb| 0x07| 10_40800_NoCfgVersion_V9.8.7_V1.6 10_68000_NoCfgVersion_V9.8.7_V1.6 10_102000_NoCfgVersion_V9.8.7_V1.6 10_204000_NoCfgVersion_V9.8.7_V1.6 10_408000_NoCfgVersion_V9.8.7_V1.6 10_665600_NoCfgVersion_V9.8.7_V1.6 10_800000_NoCfgVersion_V9.8.7_V1.6 10_1065600_NoCfgVersion_V9.8.7_V1.6 10_1331200_NoCfgVersion_V9.8.7_V1.6 10_1600000_NoCfgVersion_V9.8.7_V1.6|-| T210| nx-abca2| EristaIcosaSamsung6gb| 0x07| 10_40800_NoCfgVersion_V9.8.7_V1.6 10_68000_NoCfgVersion_V9.8.7_V1.6 10_102000_NoCfgVersion_V9.8.7_V1.6 10_204000_NoCfgVersion_V9.8.7_V1.6 10_408000_NoCfgVersion_V9.8.7_V1.6 10_665600_NoCfgVersion_V9.8.7_V1.6 10_800000_NoCfgVersion_V9.8.7_V1.6 10_1065600_NoCfgVersion_V9.8.7_V1.6 10_1331200_NoCfgVersion_V9.8.7_V1.6 10_1600000_NoCfgVersion_V9.8.7_V1.6|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowax1x2Samsung4gb| 0x03| 01_204000_NoCfgVersion_V0.3.1_V2.0 01_1331200.0_NoCfgVersion_V0.3.1_V2.0 01_1600000_NoCfgVersion_V0.3.1_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowaSamsung4gb, MarikoHoagSamsung4gb| 0x03| 01_204000_NoCfgVersion_V0.3.1_V2.0 01_1331200.0_NoCfgVersion_V0.3.1_V2.0 01_1600000_NoCfgVersion_V0.3.1_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowaSamsung8gb, MarikoHoagSamsung8gb| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowaHynix4gb, MarikoHoagHynix4gb| 0x03| 01_204000_NoCfgVersion_V0.3.1_V2.0 01_1331200.0_NoCfgVersion_V0.3.1_V2.0 01_1600000_NoCfgVersion_V0.3.1_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowaMicron4gb, MarikoHoagMicron4gb| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowaSamsung4gbY| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowaSamsung1y4gbX| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoIowaSamsung1y8gbX| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0|-| T214| nx-abca2, nx-abcb, nx-abcc| MarikoHoagSamsung1y4gbX| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0
|-
| 1 T214|nx-abca2, nx-abcb, nx-abcc| CryptoUsecase_PrivateRsaMarikoIowaSamsung1y4gbY| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0
|-
| 2 T214|nx-abca2, nx-abcb, nx-abcc| CryptoUsecase_PublicRsaMarikoIowaSamsung1y8gbY| 0x03| 01_204000_NoCfgVersion_V0.4.2_V2.0 01_1331200.0_NoCfgVersion_V0.4.2_V2.0 01_1600000_NoCfgVersion_V0.4.2_V2.0
|-
| 3 T214|nx-abca2, nx-abcb, nx-abcc| CryptoUsecase_3MarikoIowaSamsung1y4gbA| 0x03| 01_204000_NoCfgVersion_V0.4.5_V2.0 01_1331200.0_NoCfgVersion_V0.4.5_V2.0 01_1600000_NoCfgVersion_V0.4.5_V2.0
|}
'''nx-abca2''' ('''Icosa''' in '''Erista''', '''Iowa''' in '''Mariko''') hardware types are variations of the retail, EDEV and SDEV form factors. '''nx-abcb''' ('''Copper''' in '''Erista''', '''Calcio''' in '''Mariko''') is a prototype unit. Among other differences, this has extra hardware to support HDMI output. [8.0.0+] '''nx-abcc''' ('''Hoag''') was added for the Lite retail and HDEV form factors. '''Erista''' memory is LPDDR4, while '''Mariko''' memory is LPDDR4X. ===== SecurityEngineInterruptNumber =====SPL uses this for setting up the security engine IRQ. ===== FuseVersion =====The current [[Package2#Versions|Package1 Maxver Constant]] - 1. ===== HardwareType =====[1.0.0+] This item is obtained by checking bits 8 and 2 from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]]. It can be:* 0 ('''Icosa'''; Erista retail, EDEV and SDEV), if development flag (bit 8) is '''Retail''' and production flag (bit 2) is '''Production'''.* 1 ('''Copper'''; Erista prototype), if development flag (bit 8) is '''Development''' and production flag (bit 2) is '''Prototype'''.* 3 (Invalid). Value 2 is reserved and considered invalid. [4.0.0+] This item is obtained by checking bits 8, 2 and 16-19 from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]]. It can be:* 0 ('''Icosa'''; Erista retail, EDEV and SDEV), if development flag (bit 8) is '''Retail''' and production flag (bit 2) is '''Production'''.* 1 ('''Copper'''; Erista prototype), if development flag (bit 8) is '''Development''' and production flag (bit 2) is '''Prototype'''.* 3 ('''Iowa'''; Mariko retail, EDEV and SDEV), if new hardware type (bits 16-19) is '''Iowa'''.* 4 (Invalid). Value 2 is reserved and considered invalid. [7.0.0+] This item can be obtained by checking bits 8, 2 and 16-19 from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]], but is now only 0 (Icosa) or 0xF (Invalid) in retail units. [8.0.0+] This item can be obtained by checking bits 8, 2 and 16-19 from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]]. It can be:* 0 ('''Icosa'''; Erista retail, EDEV and SDEV), if development flag (bit 8) is '''Retail''' and production flag (bit 2) is '''Production'''.* 1 ('''Copper'''; Erista prototype), if development flag (bit 8) is '''Development''' and production flag (bit 2) is '''Prototype'''.* 2 ('''Hoag'''; Mariko Lite retail and HDEV), if new hardware type (bits 16-19) is '''Hoag'''.* 3 ('''Iowa'''; Mariko retail, EDEV and SDEV), if new hardware type (bits 16-19) is '''Iowa'''.* 4 ('''Calcio'''; Mariko prototype), if development flag (bit 8) is '''Development''' and production flag (bit 2) is '''Prototype'''.* 5 (Invalid). It is still only 0 (Icosa) or 0xF (Invalid) in retail units. == ID === IsRetail =====This item is obtained by checking bits 9 and 0-1 from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]]. It can be 0 (Debug), 1 (Retail) or 2 (Invalid). ===== IsRecoveryBoot =====Functions exposed Used to determine if the system is booting from SafeMode firmware. Under normal circumstances, this just returns bit 0 of the active [[BCT#bootloader0_info|bootloader info]]'s attribute field. ===== DeviceId =====[[NIM_services|NIM]] checks if this item matches the kernel internally[[Settings_services|set:cal]] DeviceId with byte7 cleared. If they don't match, a panic is thrown.
===== BootReason =====
{| class=wikitable
! SubValue || Description|-| 0 || Invalid|-| 1 || AcOk|-| 2 || OnKey|-| 3 || RtcAlarm1|-ID |4 | Name |RtcAlarm2|} Used to determine how the system booted. ===== MemoryMode ====={| class="wikitable" border="1"|-! Bits! Description|-| 0-3| Purpose (0 = None, 1 = ForStandard, 2 = ForAppletDev, 3 = ForSystemDev)|-| 4-7| Size (0 = 4GB, 1 = 6GB, 2 = 8GB)|} [[Process Manager services|PM]] and the kernel decide memory arrangement based on MemoryMode.{| class="wikitable" border="1"|-! MemoryArrange! MemoryMode! Description|-| 0| 0x01| Standard |-| 1| 0x02| StandardForAppletDev|-| 2| 0x03| StandardForSystemDev|-| In 3|0x11| OutExpanded
|-
| 0xC4000001 4|0x12| [[#CpuSuspend]] || X1=power_state, X2=entrypoint_addr, X3=context_id || NoneExpandedForAppletDev
|-
| 0x84000002 5|0x21| ExpandedForMarikoDev|} ===== IsDebugMode =====Kernel uses this to determine behavior of svcBreak positive arguments. It will break instead of just force-exiting the process which is what happens on retail. [2.0.0+] This is also used with certain debug [[#CpuOffSVC|SVCs]] . [3.0.0+] [[Loader services|RO]] checks this and if set then skipping NRR rsa signatures is allowed. ===== KernelConfiguration ====={| None || Noneclass="wikitable" border="1"
|-
| 0xC4000003 || [[#CpuOn]] || X1=target_cpu, X2=entrypoint_addr, X3=context_id, X4,X5,X6,X7=0 || X0=result! Bits! Description
|-
| 0xC3000004 || [[#GetConfig]] (Same as ID 0, Sub-ID 2) || W1=config_item, X2,X3,X4,X5,X6,X7=0 || X0=result, X1,X2,X3,X4=config_valEnableNonZeroFillMemory
|-
| 0xC3000005 1|| [[#GetRandomBytes]] (Same as ID 0, Sub-ID 6) || X1=size, X2,X3,X4,X5,X6,X7=0 || X0=result, X1,X2,X3,X4,X5,X6,X7=rand_bytesEnableUserExceptionHandler
|-
| 0xC3000006 2|| [[#Panic]] || W1=panic_color, X2,X3,X4,X5,X6,X7=0 || X0=resultPerformanceMonitoringUnit
|-
| 0xC3000007 |3| [28.0.0+] [[#ProtectKernelRegion]] || X1=carveout_index, X2=region_phys_addr, X3=region_size, X4,X5,X6,X7=0 || X0=resultEnableApplicationExtraThread
|-
| 0xC3000008 8|CallShowErrorOnPanic| [2.0.0+] [[#ReadWriteRegister]] -|16-17| X1=reg_addr, W2=rw_mask, W3=in_val, X4,X5,X6,X7=0 || X0=result, W1=out_valMemorySize
|}
Kernel reads this when setting up memory-related code. EnableNonZeroFillMemory is a boolean determining whether kernel should it will memset various allocated memory-regions with 0x58, 0x59, 0x5A ('X', 'Y', 'Z') instead of zero. This allows Nintendo devs to find uninitialized memory bugs. EnableUserExceptionHandler is a boolean determining whether kernel should forcefully enable usermode exception handlers (when false, only certain aborts (((1LL << (esr >> 26)) & 0x1115804400224001) == 0, typically data/prefetch aborts) that occur when the faulting address is in a readable region with MemoryType_CodeStatic will trigger usermode exception handlers). PerformanceMonitoringUnit is a boolean determining whether kernel should enable usermode access to the Performance Monitors (whether PMUSERENR_EL0 should be 1 or 0). EnableApplicationExtraThread is a boolean determining whether the kernel should increase the KThread slabheap capacity by 160. This also increases object capacities that are calculated based on number of threads. CallShowErrorOnPanic is a boolean determining whether kernel should call smcPanic on error instead of infinite-looping. MemorySize determines how much memory is available. 00/03 = 4 GB, 01 = 6 GB, 02 = 8 GB. ===== IsChargerHiZModeEnabled =====This tells if the TI Charger (bq24192) is active. ==== CpuSuspend = IsQuest =====Standard ARM PCSI SMCThis item is bit 10 from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]]. Suspends  [4.0.0+] [[Settings_services|Settings]] uses this value to overwrite the CPU quest flag from [[Settings_services#set:sys|GetQuestFlag]]. This is used to detect if a Switch is a kiosk unit for display at retail stores. ===== RegulatorType ====={| class="wikitable" border="1"|-! Value! SoC! GPU! Power Blocks|-| 0| T210| GM20B (CPU00x12B)| max77620_sd0, max77621_cpu and max77621_gpu|-| 1| T214| GM20B_B (0x12E)| max77620_sd0, max77812_cpu and max77812_gpu|-| 2| T214| GM20B_B (0x12E)| max77620_sd0, max77812_cpu and max77812_gpu|} This item is currently hardcoded to 0.
The kernel calls [5.0.0+] [[PCV_services|PCV]] uses this SMC on shutdown value in combination with '''power_state''' set [[#HardwareType|HardwareType]] to 0x0201001B (configure power level: 0x02==system; power type: 0x01==powerdown; ID: 0x1B)blocks and memory tables for different hardware.
=== CpuOff == DeviceUniqueKeyGeneration =====Standard ARM PCSI SMC. Turns off the CPU (CPU1This item is obtained from [[Fuse_registers#FUSE_RESERVED_ODM2|FUSE_RESERVED_ODM2]] if bit 11 from [[Fuse_registers#FUSE_RESERVED_ODM4|FUSE_RESERVED_ODM4]] is set, CPU2 or CPU3)[[Fuse_registers#FUSE_RESERVED_ODM0|FUSE_RESERVED_ODM0]] matches 0x8E61ECAE and [[Fuse_registers#FUSE_RESERVED_ODM1|FUSE_RESERVED_ODM1]] matches 0xF2BA3BB2.
=== CpuOn ===Standard ARM PCSI SMC[5. Turns on 0.0+] [[Filesystem services|FS]] can now use this value for the CPU (CPU1, CPU2 or CPU3)'''KeyGeneration''' parameter when calling [[#GenerateAesKek|GenerateAesKek]] during "GetBisEncryptionKey".
=== GetConfig == Package2Hash =====Takes This is a '''config_item''' and returns SHA-256 hash calculated over the [[Package2|package2]] image. Since the hash calculation is an optional step in pkg2ldr, this item is only valid in recovery mode. Otherwise, an associated '''config_val'''error is returned instead.
=== GetRandomBytes GenerateRandomBytes ===Takes a an u64 '''sizeRndSize''' . Returns [[#Result]] and returns '''rand_bytesRndData'''.
The kernel limits '''sizeRndSize''' to 0x38 (for fitting in return registers).
=== Panic ===
Issues Takes an u32 '''PanicColor''' and issues a system panic.
The kernel always calls this with '''panic_colorPanicColor''' set to 0xF00.
=== ProtectKernelRegion ConfigureCarveout ===Configures memory controller carveout regionsTakes an u64 '''CarveoutIdx''', an u64 '''CarveoutAddr''' and an u64 '''CarveoutSize'''. Returns [[#Result]].
If '''carveout_indexCarveoutIdx''' is 0, '''region_phys_addrCarveoutAddr''' and '''region_sizeCarveoutSize''' are used to configure '''MC_SECURITY_CARVEOUT4'''.If '''carveout_indexCarveoutIdx''' is 1, '''region_phys_addrCarveoutAddr''' and '''region_sizeCarveoutSize''' are used to configure '''MC_SECURITY_CARVEOUT5'''.Any other '''carveout_indexCarveoutIdx''' values are invalid.
The kernel calls this with '''carveout_indexCarveoutIdx''' set to 0, '''region_phys_addrCarveoutAddr''' set to 0x80060000 and '''region_sizeCarveoutSize''' set to a dynamically calculated size which covers all the kernel and built-in sysmodules' DRAM regions.
=== ReadWriteRegister ===
Takes an u64 '''RegAddr''', an u32 '''RwMask''' and an u32 '''InValue'''. Returns [[#Result]] and an u32 '''OutValue'''.
 
Relays [[SVC#svcReadWriteRegister|svcReadWriteRegister]] to the Secure Monitor.
= Errors CryptoUsecase ={| class=wikitable! Value || Name|-| 0 || Aes|-| 1 || RsaPrivate|-| 2 || RsaSecureExpMod|-| 3 || TitleKey|} TitleKey represents a RSA wrapped AES key. = CipherMode ={| class=wikitable! Value || Name|-| 0 || CbcEncrypt|-| 1 || CbcDecrypt|-| 2 || Ctr|} = DecryptOrImportMode ={| class=wikitable! Value || Name|-| 0 || DecryptRsaPrivateKey|-| 1 || ImportLotusKey|-| 2 || ImportEsKey|-| 3 || ImportSslKey|-| 4 || ImportDrmKey|} = SecureExpModMode ={| class=wikitable! Value || Name|-| 0 || Lotus|-| 1 || Ssl|-| 2 || Drm|} = Result =
{| class=wikitable
! Value || Description
|-
| 0 || Success|-| 1 || Not implemented|-| 2 || Invalid inputargument|-| 3 || In progress|-| 4 || No async operation|-| 5 || Invalid async operation
|-
| 3 [8.0.0+] 6 || BusyNot permitted
|}

Navigation menu