ChanServ changed the topic of #linux-sunxi to: Allwinner/sunxi development - Did you try looking at our wiki? https://linux-sunxi.org - Don't ask to ask. Just ask and wait for an answer! - This channel is logged at https://oftc.irclog.whitequark.org/linux-sunxi
aggi has joined #linux-sunxi
apritzel has quit [Ping timeout: 480 seconds]
bauen1_ has quit [Ping timeout: 480 seconds]
bauen1 has joined #linux-sunxi
cnxsoft has joined #linux-sunxi
hexdump02 has joined #linux-sunxi
hexdump01 has quit [Ping timeout: 480 seconds]
cnxsoft1 has joined #linux-sunxi
cnxsoft has quit [Ping timeout: 480 seconds]
hexdump01 has joined #linux-sunxi
hexdump0815 has quit [Ping timeout: 480 seconds]
<Lightsword> how does FEL boot work when secure boot is enabled?
dsimic is now known as Guest12879
dsimic has joined #linux-sunxi
Guest12879 has quit [Ping timeout: 480 seconds]
bauen1 has quit [Ping timeout: 480 seconds]
<junari> jernej: Have you started work on the DE A523 yet? I looked at the BSP code and it looks like the main problem is related to the new INNO phy hdmi controller
smaeul_ has joined #linux-sunxi
smaeul has quit [Ping timeout: 480 seconds]
JohnDoe_71Rus has joined #linux-sunxi
bauen1 has joined #linux-sunxi
<Lightsword> I keep getting usb_bulk_send() ERROR -7: Operation timed out whenever I try to FEL boot a h616 for some reason
gsz has joined #linux-sunxi
smaeul_ has quit [Ping timeout: 480 seconds]
<junari> And does anyone have a user manual for the T527 (not a523)?
smaeul has joined #linux-sunxi
apritzel has joined #linux-sunxi
apritzel has quit [Ping timeout: 480 seconds]
hexdump02 has quit []
hexdump0815 has joined #linux-sunxi
<hexdump0815> not sure if this is of any help and the same thing, but i think some rockchip socs have a inno hdmi
bauen1 has quit [Ping timeout: 480 seconds]
bauen1 has joined #linux-sunxi
smaeul has quit [Read error: Connection reset by peer]
smaeul has joined #linux-sunxi
warpme has joined #linux-sunxi
Schimsalabim has quit [Ping timeout: 480 seconds]
Schimsalabim has joined #linux-sunxi
warpme has quit []
<junari> yes, I see that, but it's pretty hard to make sense of it all right now
<gamiee> Lightsword : hmm, I remember there are some differences between dies, maybe it's not implemented?
<gamiee> apritzel might know more
<Lightsword> gamiee, like some operations work at least, like sid-dump
Schimsalabim has quit [Read error: Connection reset by peer]
Schimsalabim has joined #linux-sunxi
<gamiee> Lightsword : oh which operation do you try?
<gamiee> (The one which fails)
evgeny_boger has joined #linux-sunxi
<Lightsword> gamiee, stuff like sunxi-fel --progress --verbose spl u-boot-sunxi-with-spl.bin
<gamiee> Lightsword : Do you see output in UART that SPL was executed? This sounds like chip did not get back into FEL (from SPL)
<Lightsword> gamiee, I have yet to get any uart output whatsoever on this board
<gamiee> Lightsword : well, then I would do that first. Else you can't very much know what happened.
<Lightsword> gamiee, been trying to figure out how to activate the uart over sd adapter
<gamiee> but isn't u-boot using UART which is exposed on headers, on on SD card? (idk what device do you use)
warpme has joined #linux-sunxi
<Lightsword> gamiee, it's one of these https://www.zeusbtc.com/ASIC-Miner-Repair/Parts-Tools-Details.asp?ID=1139, uart0 seems to be disabled in vendor uboot at least, the board had unpopulated USB headers which I re-activated, device normally runs off of internal NAND
apritzel has joined #linux-sunxi
<gamiee> Lightsword : you use mainline or vendor u-boot?
<Lightsword> gamiee, tried building mainline, seemed to have a similar issue with vendor u-boot binary
<gamiee> Lightsword : I am asking due which UART it uses.
<Lightsword> gamiee, well when I tried with mainline I configured the build to use sdcard uart
<apritzel> Lightsword: with secure boot enabled, you get FEL in non-secure world (SVC with SCR.NS set). In previous SoCs (definitely A64), you then just execute an "smc", which returns with the .NS bit cleared
<apritzel> this is what sunxi-fel implements: the moment it detects a non-secure FEL environment (by trying to read from secure SRAM, for instance), it issues this SMC
<apritzel> now there is some indication that this doesn't work anymore on more recent SoCs. For instance FEL was still non-secure after the smc on an A133
<apritzel> on the H616 it's less straight-forward to detect secure vs. non-secure, since it doesn't have secure SRAM
<gamiee> ohh, the device have secure boot enabled? Oops
<apritzel> now the reason nothing with mainline works in this case is that the BootROM runs AArch32, and to switch to AArch64 you need to be in the highest implemented exception level, which means secure SVC in our case
<gamiee> BTW, isn't FEL "security risk" when trying to achieve secure boot, since it let's you to write memory and execute literally anything? (I probably miss something, but I do not know the architecture that well)
<apritzel> that's why I typically but "secure boot" in quotation marks when talking about Allwinner ;-)
<apritzel> this smc returning with .NS cleared is clearly some backdoor built into the BootROM
<Lightsword> apritzel, so...any suggesions on how I should go about getting uart working or stuff booting off of usb fel?
<gamiee> So they still did not "fixed" it ? Eugh. I would at least hope there is some eFuse option to disable FEL, but I didn't saw that on wiki.
<apritzel> I am not sure you will get very far with FEL, if it's really true that the smc doesn't work any longer. I tried for a while, but couldn't find anything on this A133 tablet of mine
<apritzel> gamiee: they built this smc backdoor in deliberately, not sure AW actually *wants* to fix that, or if anybody really cares
paulk-ter has joined #linux-sunxi
<apritzel> Lightsword: you should still be able to execute code in FEL, so output something on the UART, or blink LEDs, you just cannot run 64-bit code or even 32-bit Linux (the GIC won't work)
<Lightsword> apritzel, how would I output to sdcard uart from FEL?
paulk-bis has quit [Ping timeout: 480 seconds]
<apritzel> Lightsword: go into uart0-helloworld-sdboot.c and add FLAG_UART_ON_PORTF to the H616 description
<apritzel> then compile this into the normal .sunxi (eGON) format and try to execute this via "sunxi-fel spl"
<gamiee> apritzel : oh... So in Secure Boot mode, FEL is running in non-secure mode, that still let write and read memory, and execute code. Thus I presume it can access eMMC, NAND etc. That sounds for me like backdoor. (to other side, it's named Secure Boot, not securing the chip itself or "hardening")
radxanaoki has joined #linux-sunxi
<apritzel> my hunch is it's a tick box for customers: Do you support secure boot? Yes, we do!
<gamiee> (also I wonder, how could Allwinner get Google Play certification with such "security level")
<apritzel> exactly with that trick: they demonstrate this secure boot method, and avoid talking about FEL (or this all ones/all zeroes ROTPK hash)
<gamiee> wow, congrats allwinner
<Lightsword> apritzel, it doesn't need to be signed or anything right?
<apritzel> no, it's sunxi-fel parsing and loading that image, so it has to be the normal unsigned eGON format
<apritzel> sunxi-fel doesn't even support TOC0. I made some patches a while ago, but there was a problem with them, and I didn't follow up on this
<gamiee> about the ROTPK hash all ones trick, I think it makes sense, it's unusual to see it, but mostly when you already have internal execution rights for doing this, it does not matter anyway you can disable ROTPK verification. (+ I probably saw similar mechanisms in several MCUs). But yeah, having FEL as is even in secure mode is... wrong.
<apritzel> gamiee: thing is all tablets I have seen with "secure boot" have ROTPK all zeros, so you can still create a valid TOC0, with your own made-up key and it boots
<apritzel> and those are the tablets that are sold, even on Amazon
<gamiee> sigh... Like, I would understand all of this for Chinese low-cost tablets, but the fact that Google gave them certification is .... mind blowing for me.
<Lightsword> btw one thing weird I had noticed was that the normal sd card that forces the system into FEL mode doesn't actually work on mine...but it seems that led flash image you sent me does actually for whatever reason put it in FEL mode
<Lightsword> lol, and somehow I end up trying to bring up a board where they really love putting in as much anti-reverse engineering techniques as possible
<apritzel> Lightsword: you mean the normal uart0-helloworld-sdboot image from sunxi-tools? That is out of the box just eGON, you would need to manually convert this into TOC0 - if you haven't done this
<apritzel> Lightsword: sorry, I meant the fel-sdboot image
<apritzel> right, this is eGON and only works on non-secure boards
<apritzel> Lightsword: you can build it yourself and use mkimage on the .bin to create a TOC0
<apritzel> I should probably push such a binary to the repo
<Lightsword> apritzel, ah, same commands as before for mkimage?
<apritzel> yes, load address could be 0x20060, for instance
<Lightsword> btw I ported the toc0 validator from libboot in some vendor bsp's to this simple c app https://gist.github.com/jameshilliard/93ac027cb6a6ec7b7b18f7fe9889cf4b
<apritzel> Lightsword: my tool literally ends with the same "go to FEL" sequence, but I am not sure it gets there even, it might just be that the BROM falls back to FEL because the SD card boot somehow failed
<Lightsword> yeah, kinda guessing it's just a boot failure
<Lightsword> anyways will give that a shot tomorrow, about to head to bed
warpme has quit []
apritzel has quit [Read error: Connection reset by peer]
bauen1 has quit [Ping timeout: 480 seconds]
warpme has joined #linux-sunxi
apritzel has joined #linux-sunxi
JohnDoe_71Rus has quit [Quit: KVIrc 5.2.6 Quasar http://www.kvirc.net/]
bauen1 has joined #linux-sunxi
radxanaoki has quit [Quit: radxanaoki]
kuba2k2 has joined #linux-sunxi
JohnDoe_71Rus has joined #linux-sunxi
Schimsalabim has quit [Ping timeout: 480 seconds]
Schimsalabim has joined #linux-sunxi
cnxsoft1 has quit [Ping timeout: 480 seconds]
warpme has quit []
warpme has joined #linux-sunxi
warpme has quit [Ping timeout: 480 seconds]
warpme has joined #linux-sunxi
<loki666> "go to FEL" sounds like "go to HELL"
<loki666> if you have a pronociation issue :p
ftg has joined #linux-sunxi
apritzel has quit [Ping timeout: 480 seconds]
warpme has quit [Quit: My MacBook Air has gone to sleep. ZZZzzz…]
warpme has joined #linux-sunxi
evgeny_boger has quit [Ping timeout: 480 seconds]
warpme has quit [Ping timeout: 480 seconds]
warpme has joined #linux-sunxi
Schimsalabim has quit [Read error: Connection reset by peer]
Schimsalabim has joined #linux-sunxi
<Lightsword> apritzel, do I build uart0-helloworld-sdboot.c with a 32 bit or 64 bit arm toolchain btw for h616?
warpme has quit [Quit: My MacBook Air has gone to sleep. ZZZzzz…]
warpme has joined #linux-sunxi
warpme has quit [Ping timeout: 480 seconds]
<Lightsword> is there any way to get say execution error codes or something over FEL?
<Lightsword> not sure how to debug something failing to execute
<gamiee> Lightsword : JTAG I presume
<Lightsword> gamiee, FEL itself doesn't have any registers or something it would write errors to?
warpme has joined #linux-sunxi
<gamiee> Lightsword : I don't think so.
warpme has quit [Ping timeout: 480 seconds]
warpme has joined #linux-sunxi
gsz has quit [Ping timeout: 480 seconds]
<Lightsword> is this the correct way to build and run uart0-helloworld-sdboot.c?
<Lightsword> mkimage -A arm -O Linux -T sunxi_egon -C none -a 0x20060 -e 0x20060 -n bootinfo -d uart0-helloworld-sdboot.sunxi bootinfo_sduart0.egon
<Lightsword> sunxi-fel --verbose --progress spl bootinfo_sduart0.egon
<Lightsword> oh, may have used the wrong file lol, it's supposed to be uart0-helloworld-sdboot.elf right?
JohnDoe_71Rus has quit [Quit: KVIrc 5.2.6 Quasar http://www.kvirc.net/]
<Lightsword> or is it uart0-helloworld-sdboot.sunxi?
warpme has quit [Quit: My MacBook Air has gone to sleep. ZZZzzz…]
hazardchem has quit [Read error: Connection reset by peer]
hazardchem has joined #linux-sunxi
warpme has joined #linux-sunxi
apritzel has joined #linux-sunxi
<apritzel> Lightsword: neither, it's .bin ;-)
<apritzel> .bin is "objcopy -O binary" from the .elf, .sunxi is "mkimage -T sunxi_egon" from the .bin, .toc0 is "mkimage -T sunxi_toc0" from .bin
<apritzel> the build system is not using mkimage for the .sunxi generation, as mkimage learned that trick a lot later only
<Lightsword> apritzel, ah, and what's correct sunxi-fel command to load it?
warpme has quit [Ping timeout: 480 seconds]
junari has quit [Remote host closed the connection]
<apritzel> sunxi-fel requires an eGON header - and only an eGON header, but that's actually not necessary, at the end it just upload some binary to SRAM
<Lightsword> so like sunxi-fel --verbose --progress write 0x2000 uart0-helloworld-sdboot.bin should work?
<Lightsword> and then "sunxi-fel --verbose --progress exec 0x2000"?
<apritzel> well, somewhat. First, it's 0x20000, but also the BROM's IRQ stack is at 0x21400 (don't ask why!)
<Lightsword> apritzel, so once I have the bin file what's the correct mkimage command to use with it?
<apritzel> that's why we have "sunxi-fel spl", which does quite some clever trickery to avoid that problem
<apritzel> mkimage -T sunxi-egon -d yourcode.bin yourcode.sunxi (I think)
<apritzel> (sunxi-tools uses mksunxiboot, which is a one-trick pony, predating mkimage's eGON capabilities)
<Lightsword> apritzel, um...so I build uart0-helloworld-sdboot.bin with sunxi-tools right? then I do mkimage -T sunxi_egon -d uart0-helloworld-sdboot.bin uart0-helloworld-sdboot.egon then I do sunxi-fel --verbose --progress spl uart0-helloworld-sdboot.egon to load it? is that right?
<apritzel> yes
<Lightsword> apritzel, any idea why I would get "=> Executing the SPL... done." then "usb_bulk_send() ERROR -7: Operation timed out"?
<Lightsword> I shouldn't try passing other options to mkimage right? like mkimage -A arm -O Linux -T sunxi_egon -C none -a 0x20060 -e 0x20060 -n bootinfo -d uart0-helloworld-sdboot.bin uart0-helloworld-sdboot.egon or something?
<apritzel> you can, but it shouldn't change anything, really. Those are mostly for the now so-called "U-Boot legacy image", which wants all those fields to populate
<apritzel> what we really need is the magic, the checksum, and the length in the eGON header
<Lightsword> apritzel, hmm, well I have no idea why this doesn't do anything, I mean it seems to upload fine but then times out when executing
<apritzel> which means the code hangs for some reason, and doesn't return to the FEL routine in the BROM
<apritzel> is that the original, unchanged uart0-helloworld-sdboot?
<Lightsword> apritzel, hmm, oh wait, I had added an infinite print loop
<Lightsword> apritzel, removed that and now it does seem to return back
<Lightsword> apritzel, so sounds like it is actually doing something then...but no uart output still, argh
<Lightsword> apritzel, one thing is that I've been triggering fel mode using a toc0 sd card that doesn't boot, then I swap the sd uart adapter in before executing sunxi-fel
<apritzel> Lightsword: you can also use "sunxi-fel writel 0x<address> 0x<value>" to directly write to MMIO, or "sunxi-fel readl" for reading, if you want to directly poke peripherals
<Lightsword> apritzel, does FLAG_UART_ON_PORTF actually work for sdcard uart on h616 boards? or is that kinda an unknown?
<apritzel> this switching should work, but PortF on H616 is indeed mostly untested
<apritzel> let me try this...
<Lightsword> oh, and to make a toc0 version of fel-sdboot I should do "make fel-sdboot.bin" then "mkimage -A arm -O Linux -T sunxi_toc0 -C none -a 0x20060 -e 0x20060 -n bootinfo -d fel-sdboot.bin fel-sdboot.toc0"?
warpme has joined #linux-sunxi
<apritzel> yes
<apritzel> I just see that you need to change MUX_2 to MUX3 in the H616 entry if you want UART on SD card