Actions
OMAPBootrom » History » Revision 9
« Previous |
Revision 9/23
(diff)
| Next »
Denis 'GNUtoo' Carikli, 03/29/2020 12:28 AM
OMAPBootrom¶
Generic documentation¶
TODO: Read the various TRM and push the info to wikidata:- check the various SOCs the sram size limit in the TRM.
- check the load address / memory mapping of MLO in case of USB boot or boot from eMMC in the TRM.
- Check mmc1 booting constraint (card size, look if < 4GiB works) in the TRM
- Read the TRM sections about SYS_BOOT and booting and document that, ideally write a tool for it, or upstream the code in some other tool.
Documentation¶
The droiddevelopers website has some information on trying to use bugs run free software on several Motorola devices.
Device | SOC |
Motorola Milestone | OMAP 3430 |
Motorola Milestone 2 | OMAP 3630 |
Motorola Defy | OMAP3630? |
Motorola Defy+ (MB526) | OMAP3 (which one?) |
- It has documentation on the structure of signed MLOs
- Read droiddevelopers more to understand restricted boot better.
- Also the OMAP wiki might have some information on OMAP restricted boot.
- Also look if there is substancial information in the Technical Reference Manual (TRM) about fuses but that's unlikely.
Code¶
- As march 2020, there are no fuses driver or code for any OMAP in either u-boot, Barebox, Linux, or crucible.
- U-boot documentation mention TI tools that have to be obtained after signing an NDA
- TODO: check if chipsec has infos on OMAP fuses
Possible attacks¶
- Even if it's unlikely, once we understand the OMAP restricted boot better, we could check if some devices are signed but not in enforcing mode.
Other ideas¶
- On IRC there was some interest in replacing the SOC by simply unsoldering it and resoldering a GP OMAP.
- TODO: check if the stock bootloader still work with that or how to make sure that the device is working after the SOC has been replaced for the first time ever. Example: run the stock bootloader on a single board computer with UART.
- TODO: Write code that init the display
- Find how to handle the amount of work combined with the insecurity of the supply chain for the OMAPs
Links¶
- http://www.droid-developers.org : This attempts to run user code on several Motorolla smartphones. It includes analysis of the boot chain:
Updated by Denis 'GNUtoo' Carikli about 5 years ago · 9 revisions