mirror of
https://source.denx.de/u-boot/u-boot.git
synced 2025-12-21 01:12:11 +01:00
Background:
I have several customers that will be using a certain remote signing
service for signing their images, in order that the private keys are
never exposed outside that company's secure servers. This is done via
a pkcs#11 interface that talks to the remote signing server, and all
of that works quite well.
However, the way this particular signing service works is that one
must upfront create a "signing session", where one indicates which
keys one will use and, importantly, how many times each key will (may)
be used. Then, depending on the keys requested and the customer's
configuration, one or more humans must authorize that signing session
So for example, if official release keys are to be used, maybe two
different people from upper management must authorize, while if
development keys are requested, the developer himself can authorize
the session.
Once authorized, the requester receives a token that must then be used
for signing via one of the keys associated to that session.
I have that integrated in Yocto in a way that when a CI starts a BSP
build, it automatically works out which keys will be needed (e.g. one
for signing U-Boot, another for signing a kernel FIT image) based on
bitbake metadata, requests an appropriate signing session, and the
appropriate people are then notified and can then look at the details
of that CI pipeline and confirm that it is legitimate.
The problem:
The way mkimage does FIT image signing means that the remote server
can be asked to perform a signature an unbounded number of times, or
at least a number of times that cannot be determined upfront. This
means that currently, I need to artificially say that a kernel key
will be used, say, 10 times, even when only a single FIT image with
just one configuration node is created.
Part of the security model is that once the number of signings using a
given key has been depleted, the authorization token becomes useless
even if somehow leaked from the CI - and _if_ it is leaked/compromised
and abused before the CI has gotten around to do its signings, the
build will then fail with a clear indication of the
compromise. Clearly, having to specify a "high enough" expected use
count is counter to that part of the security model, because it will
inevitably leave some allowed uses behind.
While not perfect, we can give a reasonable estimate of an upper bound
on the necessary extra size by simply counting the number of hash and
signature nodes in the FIT image.
As indicated in the comments, one could probably make it even more
precise, and if there would ever be signatures larger than 512 bytes,
probably one would have to do that. But this works well enough in
practice for now, and is in fact an improvement in the normal case:
Currently, starting with size_inc of 0 is guaranteed to fail, so we
always enter the loop at least twice, even when not doing any signing
but merely filling hash values.
Just in case I've missed anything, keep the loop incrementing 1024
bytes at a time, and also, in case the estimate turns out to be over
64K, ensure that we do at least one attempt by changing to a do-while
loop.
With a little debug printf, creating a FIT image with three
configuration nodes previously resulted in
Trying size_inc=0
Trying size_inc=1024
Trying size_inc=2048
Trying size_inc=3072
Succeeded at size_inc=3072
and dumping info from the signing session (where I've artifically
asked for 10 uses of the kernel key) shows
"keyid": "kernel-dev-20250218",
"usagecount": 9,
"maxusagecount": 10
corresponding to 1+2+3+3 signatures requested (so while the loop count
is roughly linear in the number of config nodes, the number of
signings is quadratic).
With this, I instead get
Trying size_inc=3456
Succeeded at size_inc=3456
and the expected
"keyid": "kernel-dev-20250218",
"usagecount": 3,
"maxusagecount": 10
thus allowing me to set maxusagecount correctly.
Update a binman test case accordingly: With the previous behaviour,
mkimage would try size_inc=0 and then size_inc=1024 and then
succeed. With this patch, we first try, and succeed, with 4*128=512
due to the four hash nodes (and no signature nodes) in 161_fit.dts, so
the image ends up 512 bytes smaller.
Signed-off-by: Rasmus Villemoes <ravi@prevas.dk>
1072 lines
27 KiB
C
1072 lines
27 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* (C) Copyright 2008 Semihalf
|
|
*
|
|
* (C) Copyright 2000-2004
|
|
* DENX Software Engineering
|
|
* Wolfgang Denk, wd@denx.de
|
|
*
|
|
* Updated-by: Prafulla Wadaskar <prafulla@marvell.com>
|
|
* FIT image specific code abstracted from mkimage.c
|
|
* some functions added to address abstraction
|
|
*
|
|
* All rights reserved.
|
|
*/
|
|
|
|
#include "imagetool.h"
|
|
#include "fit_common.h"
|
|
#include "mkimage.h"
|
|
#include <image.h>
|
|
#include <string.h>
|
|
#include <stdarg.h>
|
|
#include <version.h>
|
|
#include <u-boot/crc.h>
|
|
|
|
static struct legacy_img_hdr header;
|
|
|
|
static int fit_estimate_hash_sig_size(struct image_tool_params *params, const char *fname)
|
|
{
|
|
bool signing = IMAGE_ENABLE_SIGN && (params->keydir || params->keyfile);
|
|
struct stat sbuf;
|
|
void *fdt;
|
|
int fd;
|
|
int estimate = 0;
|
|
int depth, noffset;
|
|
const char *name;
|
|
|
|
fd = mmap_fdt(params->cmdname, fname, 0, &fdt, &sbuf, false, true);
|
|
if (fd < 0)
|
|
return -EIO;
|
|
|
|
/*
|
|
* Walk the FIT image, looking for nodes named hash* and
|
|
* signature*. Since the interesting nodes are subnodes of an
|
|
* image or configuration node, we are only interested in
|
|
* those at depth exactly 3.
|
|
*
|
|
* The estimate for a hash node is based on a sha512 digest
|
|
* being 64 bytes, with another 64 bytes added to account for
|
|
* fdt structure overhead (the tags and the name of the
|
|
* "value" property).
|
|
*
|
|
* The estimate for a signature node is based on an rsa4096
|
|
* signature being 512 bytes, with another 512 bytes to
|
|
* account for fdt overhead and the various other properties
|
|
* (hashed-nodes etc.) that will also be filled in.
|
|
*
|
|
* One could try to be more precise in the estimates by
|
|
* looking at the "algo" property and, in the case of
|
|
* configuration signatures, the sign-images property. Also,
|
|
* when signing an already created FIT image, the hash nodes
|
|
* already have properly sized value properties, so one could
|
|
* also take pre-existence of "value" properties in hash nodes
|
|
* into account. But this rather simple approach should work
|
|
* well enough in practice.
|
|
*/
|
|
for (depth = 0, noffset = fdt_next_node(fdt, 0, &depth);
|
|
noffset >= 0 && depth > 0;
|
|
noffset = fdt_next_node(fdt, noffset, &depth)) {
|
|
if (depth != 3)
|
|
continue;
|
|
|
|
name = fdt_get_name(fdt, noffset, NULL);
|
|
if (!strncmp(name, FIT_HASH_NODENAME, strlen(FIT_HASH_NODENAME)))
|
|
estimate += 128;
|
|
|
|
if (signing && !strncmp(name, FIT_SIG_NODENAME, strlen(FIT_SIG_NODENAME)))
|
|
estimate += 1024;
|
|
}
|
|
|
|
munmap(fdt, sbuf.st_size);
|
|
close(fd);
|
|
|
|
return estimate;
|
|
}
|
|
|
|
static int fit_add_file_data(struct image_tool_params *params, size_t size_inc,
|
|
const char *tmpfile)
|
|
{
|
|
int tfd, destfd = 0;
|
|
void *dest_blob = NULL;
|
|
off_t destfd_size = 0;
|
|
struct stat sbuf;
|
|
void *ptr;
|
|
int ret = 0;
|
|
|
|
tfd = mmap_fdt(params->cmdname, tmpfile, size_inc, &ptr, &sbuf, true,
|
|
false);
|
|
if (tfd < 0) {
|
|
fprintf(stderr, "Cannot map FDT file '%s'\n", tmpfile);
|
|
return -EIO;
|
|
}
|
|
|
|
if (params->keydest) {
|
|
struct stat dest_sbuf;
|
|
|
|
destfd = mmap_fdt(params->cmdname, params->keydest, size_inc,
|
|
&dest_blob, &dest_sbuf, false,
|
|
false);
|
|
if (destfd < 0) {
|
|
ret = -EIO;
|
|
goto err_keydest;
|
|
}
|
|
destfd_size = dest_sbuf.st_size;
|
|
}
|
|
|
|
/* for first image creation, add a timestamp at offset 0 i.e., root */
|
|
if (params->datafile || params->reset_timestamp) {
|
|
time_t time = imagetool_get_source_date(params->cmdname,
|
|
sbuf.st_mtime);
|
|
ret = fit_set_timestamp(ptr, 0, time);
|
|
}
|
|
|
|
if (CONFIG_IS_ENABLED(FIT_SIGNATURE) && !ret)
|
|
ret = fit_pre_load_data(params->keydir, dest_blob, ptr);
|
|
|
|
if (!ret) {
|
|
ret = fit_cipher_data(params->keydir, dest_blob, ptr,
|
|
params->comment,
|
|
params->require_keys,
|
|
params->engine_id,
|
|
params->cmdname);
|
|
}
|
|
|
|
if (!ret) {
|
|
ret = fit_add_verification_data(params->keydir,
|
|
params->keyfile, dest_blob, ptr,
|
|
params->comment,
|
|
params->require_keys,
|
|
params->engine_id,
|
|
params->cmdname,
|
|
params->algo_name,
|
|
¶ms->summary);
|
|
}
|
|
|
|
if (dest_blob) {
|
|
munmap(dest_blob, destfd_size);
|
|
close(destfd);
|
|
}
|
|
|
|
err_keydest:
|
|
munmap(ptr, sbuf.st_size);
|
|
close(tfd);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* fit_calc_size() - Calculate the approximate size of the FIT we will generate
|
|
*/
|
|
static int fit_calc_size(struct image_tool_params *params)
|
|
{
|
|
struct content_info *cont;
|
|
int size, total_size;
|
|
|
|
size = imagetool_get_filesize(params, params->datafile);
|
|
if (size < 0)
|
|
return -1;
|
|
total_size = size;
|
|
|
|
if (params->fit_ramdisk) {
|
|
size = imagetool_get_filesize(params, params->fit_ramdisk);
|
|
if (size < 0)
|
|
return -1;
|
|
total_size += size;
|
|
}
|
|
|
|
for (cont = params->content_head; cont; cont = cont->next) {
|
|
size = imagetool_get_filesize(params, cont->fname);
|
|
if (size < 0)
|
|
return -1;
|
|
|
|
/* Add space for properties and hash node */
|
|
total_size += size + 300;
|
|
}
|
|
|
|
/* Add plenty of space for headers, properties, nodes, etc. */
|
|
total_size += 4096;
|
|
|
|
return total_size;
|
|
}
|
|
|
|
static int fdt_property_file(struct image_tool_params *params,
|
|
void *fdt, const char *name, const char *fname)
|
|
{
|
|
struct stat sbuf;
|
|
void *ptr;
|
|
int ret;
|
|
int fd;
|
|
|
|
fd = open(fname, O_RDONLY | O_BINARY);
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: Can't open %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (fstat(fd, &sbuf) < 0) {
|
|
fprintf(stderr, "%s: Can't stat %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
goto err;
|
|
}
|
|
|
|
ret = fdt_property_placeholder(fdt, "data", sbuf.st_size, &ptr);
|
|
if (ret)
|
|
goto err;
|
|
ret = read(fd, ptr, sbuf.st_size);
|
|
if (ret != sbuf.st_size) {
|
|
fprintf(stderr, "%s: Can't read %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
goto err;
|
|
}
|
|
close(fd);
|
|
|
|
return 0;
|
|
err:
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
static int fdt_property_strf(void *fdt, const char *name, const char *fmt, ...)
|
|
{
|
|
char str[100];
|
|
va_list ptr;
|
|
|
|
va_start(ptr, fmt);
|
|
vsnprintf(str, sizeof(str), fmt, ptr);
|
|
va_end(ptr);
|
|
return fdt_property_string(fdt, name, str);
|
|
}
|
|
|
|
static void get_basename(char *str, int size, const char *fname)
|
|
{
|
|
const char *p, *start, *end;
|
|
int len;
|
|
|
|
/*
|
|
* Use the base name as the 'name' field. So for example:
|
|
*
|
|
* "arch/arm/dts/sun7i-a20-bananapro.dtb"
|
|
* becomes "sun7i-a20-bananapro"
|
|
*/
|
|
p = strrchr(fname, '/');
|
|
start = p ? p + 1 : fname;
|
|
p = strrchr(fname, '.');
|
|
end = p ? p : fname + strlen(fname);
|
|
len = end - start;
|
|
if (len >= size)
|
|
len = size - 1;
|
|
memcpy(str, start, len);
|
|
str[len] = '\0';
|
|
}
|
|
|
|
/**
|
|
* fit_add_hash_or_sign() - Add a hash or signature node
|
|
*
|
|
* @params: Image parameters
|
|
* @fdt: Device tree to add to (in sequential-write mode)
|
|
* @is_images_subnode: true to add hash even if key name hint is provided
|
|
*
|
|
* If do_add_hash is false (default) and there is a key name hint, try to add
|
|
* a sign node to parent. Otherwise, just add a CRC. Rationale: if conf have
|
|
* to be signed, image/dt have to be hashed even if there is a key name hint.
|
|
*/
|
|
static void fit_add_hash_or_sign(struct image_tool_params *params, void *fdt,
|
|
bool is_images_subnode)
|
|
{
|
|
const char *hash_algo = "crc32";
|
|
bool do_hash = false;
|
|
bool do_sign = false;
|
|
|
|
switch (params->auto_fit) {
|
|
case AF_OFF:
|
|
break;
|
|
case AF_HASHED_IMG:
|
|
do_hash = is_images_subnode;
|
|
break;
|
|
case AF_SIGNED_IMG:
|
|
do_sign = is_images_subnode;
|
|
break;
|
|
case AF_SIGNED_CONF:
|
|
if (is_images_subnode) {
|
|
do_hash = true;
|
|
hash_algo = "sha1";
|
|
} else {
|
|
do_sign = true;
|
|
}
|
|
break;
|
|
default:
|
|
fprintf(stderr,
|
|
"%s: Unsupported auto FIT mode %u\n",
|
|
params->cmdname, params->auto_fit);
|
|
break;
|
|
}
|
|
|
|
if (do_hash) {
|
|
fdt_begin_node(fdt, FIT_HASH_NODENAME);
|
|
fdt_property_string(fdt, FIT_ALGO_PROP, hash_algo);
|
|
fdt_end_node(fdt);
|
|
}
|
|
|
|
if (do_sign) {
|
|
fdt_begin_node(fdt, FIT_SIG_NODENAME);
|
|
fdt_property_string(fdt, FIT_ALGO_PROP, params->algo_name);
|
|
fdt_property_string(fdt, FIT_KEY_HINT, params->keyname);
|
|
fdt_end_node(fdt);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* fit_write_images() - Write out a list of images to the FIT
|
|
*
|
|
* We always include the main image (params->datafile). If there are device
|
|
* tree files, we include an fdt- node for each of those too.
|
|
*/
|
|
static int fit_write_images(struct image_tool_params *params, char *fdt)
|
|
{
|
|
struct content_info *cont;
|
|
const char *typename;
|
|
char str[100];
|
|
int upto;
|
|
int ret;
|
|
|
|
fdt_begin_node(fdt, "images");
|
|
|
|
/* First the main image */
|
|
typename = genimg_get_type_short_name(params->fit_image_type);
|
|
snprintf(str, sizeof(str), "%s-1", typename);
|
|
fdt_begin_node(fdt, str);
|
|
fdt_property_string(fdt, FIT_DESC_PROP, params->imagename);
|
|
fdt_property_string(fdt, FIT_TYPE_PROP, typename);
|
|
fdt_property_string(fdt, FIT_ARCH_PROP,
|
|
genimg_get_arch_short_name(params->arch));
|
|
fdt_property_string(fdt, FIT_OS_PROP,
|
|
genimg_get_os_short_name(params->os));
|
|
fdt_property_string(fdt, FIT_COMP_PROP,
|
|
genimg_get_comp_short_name(params->comp));
|
|
fdt_property_u32(fdt, FIT_LOAD_PROP, params->addr);
|
|
fdt_property_u32(fdt, FIT_ENTRY_PROP, params->ep);
|
|
|
|
/*
|
|
* Put data last since it is large. SPL may only load the first part
|
|
* of the DT, so this way it can access all the above fields.
|
|
*/
|
|
ret = fdt_property_file(params, fdt, FIT_DATA_PROP, params->datafile);
|
|
if (ret)
|
|
return ret;
|
|
fit_add_hash_or_sign(params, fdt, true);
|
|
fdt_end_node(fdt);
|
|
|
|
/* Now the device tree files if available */
|
|
upto = 0;
|
|
for (cont = params->content_head; cont; cont = cont->next) {
|
|
if (cont->type != IH_TYPE_FLATDT)
|
|
continue;
|
|
typename = genimg_get_type_short_name(cont->type);
|
|
snprintf(str, sizeof(str), "%s-%d", FIT_FDT_PROP, ++upto);
|
|
fdt_begin_node(fdt, str);
|
|
|
|
get_basename(str, sizeof(str), cont->fname);
|
|
fdt_property_string(fdt, FIT_DESC_PROP, str);
|
|
ret = fdt_property_file(params, fdt, FIT_DATA_PROP,
|
|
cont->fname);
|
|
if (ret)
|
|
return ret;
|
|
fdt_property_string(fdt, FIT_TYPE_PROP, typename);
|
|
fdt_property_string(fdt, FIT_ARCH_PROP,
|
|
genimg_get_arch_short_name(params->arch));
|
|
fdt_property_string(fdt, FIT_COMP_PROP,
|
|
genimg_get_comp_short_name(IH_COMP_NONE));
|
|
fit_add_hash_or_sign(params, fdt, true);
|
|
if (ret)
|
|
return ret;
|
|
fdt_end_node(fdt);
|
|
}
|
|
|
|
/* And a ramdisk file if available */
|
|
if (params->fit_ramdisk) {
|
|
fdt_begin_node(fdt, FIT_RAMDISK_PROP "-1");
|
|
|
|
fdt_property_string(fdt, FIT_TYPE_PROP, FIT_RAMDISK_PROP);
|
|
fdt_property_string(fdt, FIT_OS_PROP,
|
|
genimg_get_os_short_name(params->os));
|
|
fdt_property_string(fdt, FIT_ARCH_PROP,
|
|
genimg_get_arch_short_name(params->arch));
|
|
|
|
ret = fdt_property_file(params, fdt, FIT_DATA_PROP,
|
|
params->fit_ramdisk);
|
|
if (ret)
|
|
return ret;
|
|
fit_add_hash_or_sign(params, fdt, true);
|
|
if (ret)
|
|
return ret;
|
|
fdt_end_node(fdt);
|
|
}
|
|
|
|
fdt_end_node(fdt);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* fit_write_configs() - Write out a list of configurations to the FIT
|
|
*
|
|
* If there are device tree files, we include a configuration for each, which
|
|
* selects the main image (params->datafile) and its corresponding device
|
|
* tree file.
|
|
*
|
|
* Otherwise we just create a configuration with the main image in it.
|
|
*/
|
|
static void fit_write_configs(struct image_tool_params *params, char *fdt)
|
|
{
|
|
struct content_info *cont;
|
|
const char *typename;
|
|
char str[100];
|
|
int upto;
|
|
|
|
fdt_begin_node(fdt, "configurations");
|
|
fdt_property_string(fdt, FIT_DEFAULT_PROP, "conf-1");
|
|
|
|
upto = 0;
|
|
for (cont = params->content_head; cont; cont = cont->next) {
|
|
if (cont->type != IH_TYPE_FLATDT)
|
|
continue;
|
|
typename = genimg_get_type_short_name(cont->type);
|
|
snprintf(str, sizeof(str), "conf-%d", ++upto);
|
|
fdt_begin_node(fdt, str);
|
|
|
|
get_basename(str, sizeof(str), cont->fname);
|
|
fdt_property_string(fdt, FIT_DESC_PROP, str);
|
|
|
|
typename = genimg_get_type_short_name(params->fit_image_type);
|
|
snprintf(str, sizeof(str), "%s-1", typename);
|
|
fdt_property_string(fdt, typename, str);
|
|
fdt_property_string(fdt, FIT_LOADABLE_PROP, str);
|
|
|
|
if (params->fit_ramdisk)
|
|
fdt_property_string(fdt, FIT_RAMDISK_PROP,
|
|
FIT_RAMDISK_PROP "-1");
|
|
|
|
snprintf(str, sizeof(str), FIT_FDT_PROP "-%d", upto);
|
|
fdt_property_string(fdt, FIT_FDT_PROP, str);
|
|
fit_add_hash_or_sign(params, fdt, false);
|
|
fdt_end_node(fdt);
|
|
}
|
|
|
|
if (!upto) {
|
|
fdt_begin_node(fdt, "conf-1");
|
|
typename = genimg_get_type_short_name(params->fit_image_type);
|
|
snprintf(str, sizeof(str), "%s-1", typename);
|
|
fdt_property_string(fdt, typename, str);
|
|
|
|
if (params->fit_ramdisk)
|
|
fdt_property_string(fdt, FIT_RAMDISK_PROP,
|
|
FIT_RAMDISK_PROP "-1");
|
|
fit_add_hash_or_sign(params, fdt, false);
|
|
|
|
fdt_end_node(fdt);
|
|
}
|
|
|
|
fdt_end_node(fdt);
|
|
}
|
|
|
|
static int fit_build_fdt(struct image_tool_params *params, char *fdt, int size)
|
|
{
|
|
int ret;
|
|
|
|
ret = fdt_create(fdt, size);
|
|
if (ret)
|
|
return ret;
|
|
fdt_finish_reservemap(fdt);
|
|
fdt_begin_node(fdt, "");
|
|
fdt_property_strf(fdt, FIT_DESC_PROP,
|
|
"%s image with one or more FDT blobs",
|
|
genimg_get_type_name(params->fit_image_type));
|
|
fdt_property_strf(fdt, "creator", "U-Boot mkimage %s", PLAIN_VERSION);
|
|
fdt_property_u32(fdt, "#address-cells", 1);
|
|
ret = fit_write_images(params, fdt);
|
|
if (ret)
|
|
return ret;
|
|
fit_write_configs(params, fdt);
|
|
fdt_end_node(fdt);
|
|
ret = fdt_finish(fdt);
|
|
if (ret)
|
|
return ret;
|
|
|
|
return fdt_totalsize(fdt);
|
|
}
|
|
|
|
static int fit_build(struct image_tool_params *params, const char *fname)
|
|
{
|
|
char *buf;
|
|
int size;
|
|
int ret;
|
|
int fd;
|
|
|
|
size = fit_calc_size(params);
|
|
if (size < 0)
|
|
return -1;
|
|
buf = calloc(1, size);
|
|
if (!buf) {
|
|
fprintf(stderr, "%s: Out of memory (%d bytes)\n",
|
|
params->cmdname, size);
|
|
return -1;
|
|
}
|
|
ret = fit_build_fdt(params, buf, size);
|
|
if (ret < 0) {
|
|
fprintf(stderr, "%s: Failed to build FIT image\n",
|
|
params->cmdname);
|
|
goto err_buf;
|
|
}
|
|
size = ret;
|
|
fd = open(fname, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0666);
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: Can't open %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
goto err_buf;
|
|
}
|
|
ret = write(fd, buf, size);
|
|
if (ret != size) {
|
|
fprintf(stderr, "%s: Can't write %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
goto err;
|
|
}
|
|
close(fd);
|
|
free(buf);
|
|
|
|
return 0;
|
|
err:
|
|
close(fd);
|
|
err_buf:
|
|
free(buf);
|
|
return -1;
|
|
}
|
|
|
|
/**
|
|
* fit_extract_data() - Move all data outside the FIT
|
|
*
|
|
* This takes a normal FIT file and removes all the 'data' properties from it.
|
|
* The data is placed in an area after the FIT so that it can be accessed
|
|
* using an offset into that area. The 'data' properties turn into
|
|
* 'data-offset' properties.
|
|
*
|
|
* This function cannot cope with FITs with 'data-offset' properties. All
|
|
* data must be in 'data' properties on entry.
|
|
*/
|
|
static int fit_extract_data(struct image_tool_params *params, const char *fname)
|
|
{
|
|
void *buf = NULL;
|
|
int buf_ptr;
|
|
int fit_size, unpadded_size, new_size, pad_boundary;
|
|
int fd;
|
|
struct stat sbuf;
|
|
void *fdt;
|
|
int ret;
|
|
int images;
|
|
int node;
|
|
int image_number;
|
|
int align_size;
|
|
|
|
align_size = params->bl_len ? params->bl_len : 4;
|
|
fd = mmap_fdt(params->cmdname, fname, 0, &fdt, &sbuf, false, false);
|
|
if (fd < 0)
|
|
return -EIO;
|
|
fit_size = fdt_totalsize(fdt);
|
|
|
|
images = fdt_path_offset(fdt, FIT_IMAGES_PATH);
|
|
if (images < 0) {
|
|
debug("%s: Cannot find /images node: %d\n", __func__, images);
|
|
ret = -EINVAL;
|
|
goto err_munmap;
|
|
}
|
|
image_number = fdtdec_get_child_count(fdt, images);
|
|
|
|
/*
|
|
* Allocate space to hold the image data we will extract,
|
|
* extral space allocate for image alignment to prevent overflow.
|
|
*/
|
|
buf = calloc(1, fit_size + (align_size * image_number));
|
|
if (!buf) {
|
|
ret = -ENOMEM;
|
|
goto err_munmap;
|
|
}
|
|
buf_ptr = 0;
|
|
|
|
for (node = fdt_first_subnode(fdt, images);
|
|
node >= 0;
|
|
node = fdt_next_subnode(fdt, node)) {
|
|
const char *data;
|
|
int len;
|
|
|
|
data = fdt_getprop(fdt, node, FIT_DATA_PROP, &len);
|
|
if (!data)
|
|
continue;
|
|
memcpy(buf + buf_ptr, data, len);
|
|
debug("Extracting data size %x\n", len);
|
|
|
|
ret = fdt_delprop(fdt, node, FIT_DATA_PROP);
|
|
if (ret) {
|
|
ret = -EPERM;
|
|
goto err_munmap;
|
|
}
|
|
if (params->external_offset > 0) {
|
|
/* An external offset positions the data absolutely. */
|
|
fdt_setprop_u32(fdt, node, FIT_DATA_POSITION_PROP,
|
|
params->external_offset + buf_ptr);
|
|
} else {
|
|
fdt_setprop_u32(fdt, node, FIT_DATA_OFFSET_PROP,
|
|
buf_ptr);
|
|
}
|
|
fdt_setprop_u32(fdt, node, FIT_DATA_SIZE_PROP, len);
|
|
buf_ptr += ALIGN(len, align_size);
|
|
}
|
|
|
|
/* Pack the FDT and place the data after it */
|
|
fdt_pack(fdt);
|
|
|
|
unpadded_size = fdt_totalsize(fdt);
|
|
new_size = ALIGN(unpadded_size, align_size);
|
|
fdt_set_totalsize(fdt, new_size);
|
|
if (unpadded_size < fit_size) {
|
|
pad_boundary = new_size < fit_size ? new_size : fit_size;
|
|
memset(fdt + unpadded_size, 0, pad_boundary - unpadded_size);
|
|
}
|
|
debug("Size reduced from %x to %x\n", fit_size, fdt_totalsize(fdt));
|
|
debug("External data size %x\n", buf_ptr);
|
|
munmap(fdt, sbuf.st_size);
|
|
|
|
if (ftruncate(fd, new_size)) {
|
|
debug("%s: Failed to truncate file: %s\n", __func__,
|
|
strerror(errno));
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
|
|
/* Check if an offset for the external data was set. */
|
|
if (params->external_offset > 0) {
|
|
if (params->external_offset < new_size) {
|
|
fprintf(stderr,
|
|
"External offset %x overlaps FIT length %x\n",
|
|
params->external_offset, new_size);
|
|
ret = -EINVAL;
|
|
goto err;
|
|
}
|
|
new_size = params->external_offset;
|
|
}
|
|
if (lseek(fd, new_size, SEEK_SET) < 0) {
|
|
debug("%s: Failed to seek to end of file: %s\n", __func__,
|
|
strerror(errno));
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
if (write(fd, buf, buf_ptr) != buf_ptr) {
|
|
debug("%s: Failed to write external data to file %s\n",
|
|
__func__, strerror(errno));
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
free(buf);
|
|
close(fd);
|
|
return 0;
|
|
|
|
err_munmap:
|
|
munmap(fdt, sbuf.st_size);
|
|
err:
|
|
free(buf);
|
|
close(fd);
|
|
return ret;
|
|
}
|
|
|
|
static int fit_import_data(struct image_tool_params *params, const char *fname)
|
|
{
|
|
void *fdt, *old_fdt;
|
|
void *data = NULL;
|
|
const char *ext_data_prop = NULL;
|
|
int fit_size, new_size, size, data_base;
|
|
int fd;
|
|
struct stat sbuf;
|
|
int ret;
|
|
int images;
|
|
int confs;
|
|
int node;
|
|
|
|
fd = mmap_fdt(params->cmdname, fname, 0, &old_fdt, &sbuf, false, false);
|
|
if (fd < 0)
|
|
return -EIO;
|
|
fit_size = fdt_totalsize(old_fdt);
|
|
data_base = ALIGN(fit_size, 4);
|
|
|
|
/* Allocate space to hold the new FIT */
|
|
size = sbuf.st_size + 16384;
|
|
fdt = calloc(1, size);
|
|
if (!fdt) {
|
|
fprintf(stderr, "%s: Failed to allocate memory (%d bytes)\n",
|
|
__func__, size);
|
|
ret = -ENOMEM;
|
|
goto err_munmap;
|
|
}
|
|
ret = fdt_open_into(old_fdt, fdt, size);
|
|
if (ret) {
|
|
debug("%s: Failed to expand FIT: %s\n", __func__,
|
|
fdt_strerror(errno));
|
|
ret = -EINVAL;
|
|
goto err_munmap;
|
|
}
|
|
|
|
images = fdt_path_offset(fdt, FIT_IMAGES_PATH);
|
|
if (images < 0) {
|
|
debug("%s: Cannot find /images node: %d\n", __func__, images);
|
|
ret = -EINVAL;
|
|
goto err_munmap;
|
|
}
|
|
|
|
for (node = fdt_first_subnode(fdt, images);
|
|
node >= 0;
|
|
node = fdt_next_subnode(fdt, node)) {
|
|
int buf_ptr;
|
|
int len;
|
|
|
|
/*
|
|
* FIT_DATA_OFFSET_PROP and FIT_DATA_POSITION_PROP are never both present,
|
|
* but if they are, prefer FIT_DATA_OFFSET_PROP as it was there first
|
|
*/
|
|
buf_ptr = fdtdec_get_int(fdt, node, FIT_DATA_POSITION_PROP, -1);
|
|
if (buf_ptr != -1) {
|
|
ext_data_prop = FIT_DATA_POSITION_PROP;
|
|
data = old_fdt + buf_ptr;
|
|
}
|
|
buf_ptr = fdtdec_get_int(fdt, node, FIT_DATA_OFFSET_PROP, -1);
|
|
if (buf_ptr != -1) {
|
|
ext_data_prop = FIT_DATA_OFFSET_PROP;
|
|
data = old_fdt + data_base + buf_ptr;
|
|
}
|
|
len = fdtdec_get_int(fdt, node, FIT_DATA_SIZE_PROP, -1);
|
|
if (!data || len == -1)
|
|
continue;
|
|
debug("Importing data size %x\n", len);
|
|
|
|
ret = fdt_setprop(fdt, node, FIT_DATA_PROP, data, len);
|
|
ret = fdt_delprop(fdt, node, ext_data_prop);
|
|
|
|
if (ret) {
|
|
debug("%s: Failed to write property: %s\n", __func__,
|
|
fdt_strerror(ret));
|
|
ret = -EINVAL;
|
|
goto err_munmap;
|
|
}
|
|
}
|
|
|
|
confs = fdt_path_offset(fdt, FIT_CONFS_PATH);
|
|
static const char * const props[] = { FIT_KERNEL_PROP,
|
|
FIT_RAMDISK_PROP,
|
|
FIT_FDT_PROP,
|
|
FIT_LOADABLE_PROP,
|
|
FIT_FPGA_PROP,
|
|
FIT_FIRMWARE_PROP,
|
|
FIT_SCRIPT_PROP};
|
|
|
|
fdt_for_each_subnode(node, fdt, confs) {
|
|
const char *conf_name = fdt_get_name(fdt, node, NULL);
|
|
|
|
for (int i = 0; i < ARRAY_SIZE(props); i++) {
|
|
int count = fdt_stringlist_count(fdt, node, props[i]);
|
|
|
|
if (count < 0)
|
|
continue;
|
|
|
|
for (int j = 0; j < count; j++) {
|
|
const char *img_name =
|
|
fdt_stringlist_get(fdt, node, props[i], j, NULL);
|
|
if (!img_name || !*img_name)
|
|
continue;
|
|
|
|
int img = fdt_subnode_offset(fdt, images, img_name);
|
|
|
|
if (img < 0) {
|
|
fprintf(stderr,
|
|
"Error: configuration '%s' references undefined image '%s' in property '%s'\n",
|
|
conf_name, img_name, props[i]);
|
|
ret = FDT_ERR_NOTFOUND;
|
|
goto err_munmap;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
munmap(old_fdt, sbuf.st_size);
|
|
|
|
/* Close the old fd so we can re-use it. */
|
|
close(fd);
|
|
|
|
/* Pack the FDT and place the data after it */
|
|
fdt_pack(fdt);
|
|
|
|
new_size = fdt_totalsize(fdt);
|
|
debug("Size expanded from %x to %x\n", fit_size, new_size);
|
|
|
|
fd = open(fname, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0666);
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: Can't open %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
if (write(fd, fdt, new_size) != new_size) {
|
|
debug("%s: Failed to write external data to file %s\n",
|
|
__func__, strerror(errno));
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
|
|
free(fdt);
|
|
close(fd);
|
|
return 0;
|
|
|
|
err_munmap:
|
|
munmap(old_fdt, sbuf.st_size);
|
|
err:
|
|
free(fdt);
|
|
close(fd);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* fit_handle_file - main FIT file processing function
|
|
*
|
|
* fit_handle_file() runs dtc to convert .its to .itb, includes
|
|
* binary data, updates timestamp property and calculates hashes.
|
|
*
|
|
* datafile - .its file
|
|
* imagefile - .itb file
|
|
*
|
|
* returns:
|
|
* only on success, otherwise calls exit (EXIT_FAILURE);
|
|
*/
|
|
static int fit_handle_file(struct image_tool_params *params)
|
|
{
|
|
char tmpfile[MKIMAGE_MAX_TMPFILE_LEN];
|
|
char bakfile[MKIMAGE_MAX_TMPFILE_LEN + 4] = {0};
|
|
char cmd[MKIMAGE_MAX_DTC_CMDLINE_LEN];
|
|
size_t size_inc;
|
|
int ret = EXIT_FAILURE;
|
|
|
|
/* Flattened Image Tree (FIT) format handling */
|
|
debug ("FIT format handling\n");
|
|
|
|
/* call dtc to include binary properties into the tmp file */
|
|
if (strlen (params->imagefile) +
|
|
strlen (MKIMAGE_TMPFILE_SUFFIX) + 1 > sizeof (tmpfile)) {
|
|
fprintf (stderr, "%s: Image file name (%s) too long, "
|
|
"can't create tmpfile.\n",
|
|
params->imagefile, params->cmdname);
|
|
return (EXIT_FAILURE);
|
|
}
|
|
sprintf (tmpfile, "%s%s", params->imagefile, MKIMAGE_TMPFILE_SUFFIX);
|
|
|
|
/* We either compile the source file, or use the existing FIT image */
|
|
if (params->auto_fit) {
|
|
if (fit_build(params, tmpfile)) {
|
|
fprintf(stderr, "%s: failed to build FIT\n",
|
|
params->cmdname);
|
|
return EXIT_FAILURE;
|
|
}
|
|
*cmd = '\0';
|
|
} else if (params->datafile) {
|
|
/* dtc -I dts -O dtb -p 500 -o tmpfile datafile */
|
|
snprintf(cmd, sizeof(cmd), "%s %s -o \"%s\" \"%s\"",
|
|
MKIMAGE_DTC, params->dtc, tmpfile, params->datafile);
|
|
debug("Trying to execute \"%s\"\n", cmd);
|
|
} else {
|
|
snprintf(cmd, sizeof(cmd), "cp \"%s\" \"%s\"",
|
|
params->imagefile, tmpfile);
|
|
}
|
|
if (strlen(cmd) >= MKIMAGE_MAX_DTC_CMDLINE_LEN - 1) {
|
|
fprintf(stderr, "WARNING: command-line for FIT creation might be truncated and will probably fail.\n");
|
|
}
|
|
|
|
if (*cmd && system(cmd) == -1) {
|
|
fprintf (stderr, "%s: system(%s) failed: %s\n",
|
|
params->cmdname, cmd, strerror(errno));
|
|
goto err_system;
|
|
}
|
|
|
|
/* Move the data so it is internal to the FIT, if needed */
|
|
ret = fit_import_data(params, tmpfile);
|
|
if (ret)
|
|
goto err_system;
|
|
|
|
/*
|
|
* Copy the tmpfile to bakfile, then in the following loop
|
|
* we copy bakfile to tmpfile. So we always start from the
|
|
* beginning.
|
|
*/
|
|
sprintf(bakfile, "%s%s", tmpfile, ".bak");
|
|
rename(tmpfile, bakfile);
|
|
|
|
/*
|
|
* Set hashes for images in the blob and compute
|
|
* signatures. We do an attempt at estimating the expected
|
|
* extra size, but just in case that is not sufficient, keep
|
|
* trying adding 1K, with a reasonable upper bound of 64K
|
|
* total, until we succeed.
|
|
*/
|
|
size_inc = fit_estimate_hash_sig_size(params, bakfile);
|
|
if (size_inc < 0)
|
|
goto err_system;
|
|
do {
|
|
if (copyfile(bakfile, tmpfile) < 0) {
|
|
printf("Can't copy %s to %s\n", bakfile, tmpfile);
|
|
ret = -EIO;
|
|
break;
|
|
}
|
|
ret = fit_add_file_data(params, size_inc, tmpfile);
|
|
if (!ret || ret != -ENOSPC)
|
|
break;
|
|
size_inc += 1024;
|
|
} while (size_inc < 64 * 1024);
|
|
|
|
if (ret) {
|
|
fprintf(stderr, "%s Can't add hashes to FIT blob: %d\n",
|
|
params->cmdname, ret);
|
|
goto err_system;
|
|
}
|
|
|
|
/* Move the data so it is external to the FIT, if requested */
|
|
if (params->external_data) {
|
|
ret = fit_extract_data(params, tmpfile);
|
|
if (ret)
|
|
goto err_system;
|
|
}
|
|
|
|
if (rename (tmpfile, params->imagefile) == -1) {
|
|
fprintf (stderr, "%s: Can't rename %s to %s: %s\n",
|
|
params->cmdname, tmpfile, params->imagefile,
|
|
strerror (errno));
|
|
unlink (tmpfile);
|
|
unlink(bakfile);
|
|
unlink (params->imagefile);
|
|
return EXIT_FAILURE;
|
|
}
|
|
unlink(bakfile);
|
|
return EXIT_SUCCESS;
|
|
|
|
err_system:
|
|
unlink(tmpfile);
|
|
unlink(bakfile);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* fit_image_extract - extract a FIT component image
|
|
* @fit: pointer to the FIT format image header
|
|
* @image_noffset: offset of the component image node
|
|
* @file_name: name of the file to store the FIT sub-image
|
|
*
|
|
* returns:
|
|
* zero in case of success or a negative value if fail.
|
|
*/
|
|
static int fit_image_extract(
|
|
const void *fit,
|
|
int image_noffset,
|
|
const char *file_name)
|
|
{
|
|
const void *file_data;
|
|
size_t file_size = 0;
|
|
int ret;
|
|
|
|
/* get the data address and size of component at offset "image_noffset" */
|
|
ret = fit_image_get_data(fit, image_noffset, &file_data, &file_size);
|
|
if (ret) {
|
|
fprintf(stderr, "Could not get component information\n");
|
|
return ret;
|
|
}
|
|
|
|
/* save the "file_data" into the file specified by "file_name" */
|
|
return imagetool_save_subimage(file_name, (ulong) file_data, file_size);
|
|
}
|
|
|
|
/**
|
|
* fit_extract_contents - retrieve a sub-image component from the FIT image
|
|
* @ptr: pointer to the FIT format image header
|
|
* @params: command line parameters
|
|
*
|
|
* returns:
|
|
* zero in case of success or a negative value if fail.
|
|
*/
|
|
static int fit_extract_contents(void *ptr, struct image_tool_params *params)
|
|
{
|
|
int images_noffset;
|
|
int noffset;
|
|
int ndepth;
|
|
const void *fit = ptr;
|
|
int count = 0;
|
|
const char *p;
|
|
|
|
/* Indent string is defined in header image.h */
|
|
p = IMAGE_INDENT_STRING;
|
|
|
|
/* Find images parent node offset */
|
|
images_noffset = fdt_path_offset(fit, FIT_IMAGES_PATH);
|
|
if (images_noffset < 0) {
|
|
printf("Can't find images parent node '%s' (%s)\n",
|
|
FIT_IMAGES_PATH, fdt_strerror(images_noffset));
|
|
return -1;
|
|
}
|
|
|
|
/* Avoid any overrun */
|
|
count = fit_get_subimage_count(fit, images_noffset);
|
|
if ((params->pflag < 0) || (count <= params->pflag)) {
|
|
printf("No such component at '%d'\n", params->pflag);
|
|
return -1;
|
|
}
|
|
|
|
/* Process its subnodes, extract the desired component from image */
|
|
for (ndepth = 0, count = 0,
|
|
noffset = fdt_next_node(fit, images_noffset, &ndepth);
|
|
(noffset >= 0) && (ndepth > 0);
|
|
noffset = fdt_next_node(fit, noffset, &ndepth)) {
|
|
if (ndepth == 1) {
|
|
/*
|
|
* Direct child node of the images parent node,
|
|
* i.e. component image node.
|
|
*/
|
|
if (params->pflag == count) {
|
|
printf("Extracted:\n%s Image %u (%s)\n", p,
|
|
count, fit_get_name(fit, noffset, NULL));
|
|
|
|
fit_image_print(fit, noffset, p);
|
|
|
|
return fit_image_extract(fit, noffset,
|
|
params->outfile);
|
|
}
|
|
|
|
count++;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int fit_check_params(struct image_tool_params *params)
|
|
{
|
|
if (params->auto_fit)
|
|
return 0;
|
|
return ((params->dflag && params->fflag) ||
|
|
(params->fflag && params->lflag) ||
|
|
(params->lflag && params->dflag));
|
|
}
|
|
|
|
U_BOOT_IMAGE_TYPE(
|
|
fitimage,
|
|
"FIT Image support",
|
|
sizeof(struct legacy_img_hdr),
|
|
(void *)&header,
|
|
fit_check_params,
|
|
fit_verify_header,
|
|
fit_print_header,
|
|
NULL,
|
|
fit_extract_contents,
|
|
fit_check_image_types,
|
|
fit_handle_file,
|
|
NULL /* FIT images use DTB header */
|
|
);
|