#include <stdio.h> #include <unistd.h> #include TREZOR_BOARD #include "boot_internal.h" #include "bootui.h" #include "common.h" #include "display.h" #include "flash.h" #include "model.h" #include "rust_ui.h" #ifdef USE_OPTIGA #include "secret.h" #endif #include "emulator.h" #undef FIRMWARE_START uint8_t *FIRMWARE_START = 0; // Simulation of a boot command normally grabbed during reset processing boot_command_t g_boot_command = BOOT_COMMAND_NONE; // Simulation of a boot args normally sitting at the BOOT_ARGS region uint8_t g_boot_args[BOOT_ARGS_SIZE]; void set_core_clock(int) {} int bootloader_main(void); bool sector_is_empty(const flash_area_t *area) { const uint8_t *storage = flash_area_get_address(area, 0, 0); size_t storage_size = flash_area_get_size(area); for (size_t i = 0; i < storage_size; i++) { if (storage[i] != 0xFF) { return false; } } return true; } void usage(void) { printf("Usage: ./build/bootloader/bootloader_emu [options]\n"); printf("Options:\n"); printf(" -s stay in bootloader\n"); printf(" -e MESSAGE [TITLE [FOOTER]] display error screen and stop\n"); printf(" -c COLOR_VARIANT set color variant\n"); printf(" -b BITCOIN_ONLY set bitcoin only flag\n"); printf( " -f FIRMWARE run interaction-less update for the specified image\n"); #ifdef USE_OPTIGA printf(" -l lock bootloader\n"); #endif printf(" -h show this help\n"); } bool load_firmware(const char *filename) { // read the first 6 kB of firmware file into a buffer FILE *file = fopen(filename, "rb"); if (!file) { printf("Failed to open file '%s'\n", filename); return false; } uint8_t buffer[6 * 1024]; size_t read = fread(buffer, 1, sizeof(buffer), file); fclose(file); if (read != sizeof(buffer)) { printf("File '%s' does not contain a valid firmware image.\n"); return false; } // read vendor and image header vendor_header vhdr; if (sectrue != read_vendor_header(buffer, &vhdr)) { printf("File '%s' does not contain a valid vendor header.\n"); return false; } const image_header *hdr = read_image_header( buffer + vhdr.hdrlen, FIRMWARE_IMAGE_MAGIC, FIRMWARE_IMAGE_MAXSIZE); if (hdr != (const image_header *)(buffer + vhdr.hdrlen)) { printf("File '%s' does not contain a valid firmware image.\n"); return false; } // hash it into boot_args BLAKE2S_CTX ctx; blake2s_Init(&ctx, BLAKE2S_DIGEST_LENGTH); blake2s_Update(&ctx, buffer, vhdr.hdrlen + hdr->hdrlen); blake2s_Final(&ctx, g_boot_args, BLAKE2S_DIGEST_LENGTH); return true; } __attribute__((noreturn)) void display_error_and_die(const char *message, const char *title, const char *footer) { if (footer == NULL) { footer = "PLEASE VISIT\nTREZOR.IO/RSOD"; } if (title == NULL) { title = "INTERNAL ERROR"; } display_init(); display_backlight(180); screen_fatal_error_rust(title, message, footer); display_refresh(); #if USE_TOUCH printf("Click screen to exit.\n"); #elif USE_BUTTON printf("Press both buttons to exit.\n"); #endif ui_click(); exit(0); } __attribute__((noreturn)) int main(int argc, char **argv) { flash_init(); FIRMWARE_START = (uint8_t *)flash_area_get_address(&FIRMWARE_AREA, 0, 0); // simulate non-empty storage so that we know whether it was erased or not if (sector_is_empty(&STORAGE_AREAS[0])) { secbool ret = flash_area_write_word(&STORAGE_AREAS[0], 16, 0x12345678); (void)ret; } int opt; bool display_error = false; uint8_t set_variant = 0xff; uint8_t color_variant = 0; uint8_t bitcoin_only = 0; while ((opt = getopt(argc, argv, "hslec:b:f:")) != -1) { switch (opt) { case 's': g_boot_command = BOOT_COMMAND_STOP_AND_WAIT; break; case 'e': display_error = true; break; case 'c': set_variant = 1; color_variant = atoi(optarg); break; case 'b': set_variant = 1; bitcoin_only = atoi(optarg); break; case 'f': g_boot_command = BOOT_COMMAND_INSTALL_UPGRADE; if (!load_firmware(optarg)) { exit(1); } break; #ifdef USE_OPTIGA case 'l': // write bootloader-lock secret secret_write_header(); break; #endif default: usage(); exit(1); } } if (display_error) { const char *message, *title = NULL, *footer = NULL; if (optind < argc) { message = argv[optind++]; if (optind < argc) { title = argv[optind++]; if (optind < argc) { footer = argv[optind++]; } } } else { message = "No message specified"; } display_error_and_die(message, title, footer); } // write variant to OTP const uint8_t otp_data[] = {set_variant, color_variant, bitcoin_only}; (void)!flash_otp_write(FLASH_OTP_BLOCK_DEVICE_VARIANT, 0, otp_data, sizeof(otp_data)); bootloader_main(); hal_delay(3000); jump_to(NULL); } void display_set_little_endian(void) {} void display_reinit(void) {} void mpu_config_bootloader(void) {} void mpu_config_off(void) {} __attribute__((noreturn)) void jump_to(void *addr) { bool storage_is_erased = sector_is_empty(&STORAGE_AREAS[0]) && sector_is_empty(&STORAGE_AREAS[1]); if (storage_is_erased) { printf("STORAGE WAS ERASED\n"); screen_fatal_error_rust("BOOTLOADER EXIT", "Jumped to firmware", "STORAGE WAS ERASED"); } else { printf("storage was retained\n"); screen_fatal_error_rust("BOOTLOADER EXIT", "Jumped to firmware", "STORAGE WAS RETAINED"); } display_backlight(180); display_refresh(); hal_delay(3000); exit(0); } void ensure_compatible_settings(void) {} void main_clean_exit(int code) { exit(code); }