c9eef2d697
Most tools used for compliance and SBOM generation use SPDX identifiers This change brings us a step closer to an easy SBOM generation. Signed-off-by: Alin Jerpelea <alin.jerpelea@sony.com>
375 lines
8.2 KiB
C
375 lines
8.2 KiB
C
/****************************************************************************
|
|
* tools/cxd56/mkspk.c
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
* this work for additional information regarding copyright ownership. The
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
* "License"); you may not use this file except in compliance with the
|
|
* License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations
|
|
* under the License.
|
|
*
|
|
****************************************************************************/
|
|
|
|
/****************************************************************************
|
|
* Included Files
|
|
****************************************************************************/
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <stdint.h>
|
|
#include <stdbool.h>
|
|
#include <assert.h>
|
|
|
|
#include "mkspk.h"
|
|
|
|
/****************************************************************************
|
|
* Private Types
|
|
****************************************************************************/
|
|
|
|
struct args
|
|
{
|
|
int core;
|
|
char *elffile;
|
|
char *savename;
|
|
char *outputfile;
|
|
};
|
|
|
|
/****************************************************************************
|
|
* Private Data
|
|
****************************************************************************/
|
|
|
|
static uint8_t vmk[16] =
|
|
"\x27\xc0\xaf\x1b\x5d\xcb\xc6\xc5\x58\x22\x1c\xdd\xaf\xf3\x20\x21";
|
|
|
|
static struct args g_options =
|
|
{
|
|
0
|
|
};
|
|
|
|
/****************************************************************************
|
|
* Private Functions
|
|
****************************************************************************/
|
|
|
|
static struct args *parse_args(int argc, char **argv)
|
|
{
|
|
int opt;
|
|
int show_help;
|
|
struct args *args = &g_options;
|
|
char *endp;
|
|
|
|
show_help = 0;
|
|
|
|
if (argc < 2)
|
|
{
|
|
show_help = 1;
|
|
}
|
|
|
|
memset(args, 0, sizeof(*args));
|
|
args->core = -1;
|
|
|
|
while ((opt = getopt(argc, argv, "h:c:")) != -1)
|
|
{
|
|
switch (opt)
|
|
{
|
|
case 'c':
|
|
args->core = strtol(optarg, &endp, 0);
|
|
if (*endp)
|
|
{
|
|
fprintf(stderr, "Invalid core number \"%s\"\n", optarg);
|
|
show_help = 1;
|
|
}
|
|
break;
|
|
|
|
case 'h':
|
|
default:
|
|
show_help = 1;
|
|
}
|
|
}
|
|
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
args->elffile = argv[0];
|
|
args->savename = argv[1];
|
|
argc -= 2;
|
|
argv += 2;
|
|
|
|
if (argc > 0)
|
|
{
|
|
args->outputfile = strdup(argv[0]);
|
|
}
|
|
else
|
|
{
|
|
show_help = 1;
|
|
}
|
|
|
|
/* Sanity checks for options */
|
|
|
|
if (show_help == 1)
|
|
{
|
|
fprintf(stderr,
|
|
"mkspk [-c <number>] <filename> <save name> [<output file>]\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (args->core < 0)
|
|
{
|
|
fprintf(stderr, "Core number is not set. Please use -c option.\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (strlen(args->savename) > 63)
|
|
{
|
|
fprintf(stderr, "savename too long.\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
return args;
|
|
}
|
|
|
|
static struct elf_file *load_elf(const char *filename)
|
|
{
|
|
size_t fsize;
|
|
int pos;
|
|
char *buf;
|
|
FILE *fp;
|
|
struct elf_file *ef;
|
|
Elf32_Shdr *sh;
|
|
uint16_t i;
|
|
int ret;
|
|
|
|
fp = fopen(filename, "rb");
|
|
if (!fp)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ef = malloc(sizeof(*ef));
|
|
if (!ef)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
pos = fseek(fp, 0, SEEK_END);
|
|
fsize = (size_t) ftell(fp);
|
|
fseek(fp, pos, SEEK_SET);
|
|
|
|
buf = malloc(fsize);
|
|
if (!buf)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ret = fread(buf, fsize, 1, fp);
|
|
fclose(fp);
|
|
if (ret != 1)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ef->data = buf;
|
|
|
|
ef->ehdr = (Elf32_Ehdr *) buf;
|
|
|
|
Elf32_Ehdr *h = (Elf32_Ehdr *) buf;
|
|
|
|
if (!(h->e_ident[EI_MAG0] == 0x7f &&
|
|
h->e_ident[EI_MAG1] == 'E' &&
|
|
h->e_ident[EI_MAG2] == 'L' && h->e_ident[EI_MAG3] == 'F'))
|
|
{
|
|
free(ef);
|
|
free(buf);
|
|
return NULL;
|
|
}
|
|
|
|
ef->phdr = (Elf32_Phdr *) (buf + ef->ehdr->e_phoff);
|
|
ef->shdr = (Elf32_Shdr *) (buf + ef->ehdr->e_shoff);
|
|
ef->shstring = buf + ef->shdr[ef->ehdr->e_shstrndx].sh_offset;
|
|
|
|
for (i = 0, sh = ef->shdr; i < ef->ehdr->e_shnum; i++, sh++)
|
|
{
|
|
if (sh->sh_type == SHT_SYMTAB)
|
|
{
|
|
ef->symtab = (Elf32_Sym *) (buf + sh->sh_offset);
|
|
ef->nsyms = sh->sh_size / sh->sh_entsize;
|
|
continue;
|
|
}
|
|
|
|
if (sh->sh_type == SHT_STRTAB)
|
|
{
|
|
if (!strcmp(".strtab", ef->shstring + sh->sh_name))
|
|
{
|
|
ef->string = buf + sh->sh_offset;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ef;
|
|
}
|
|
|
|
static void *create_image(struct elf_file *elf, int core, char *savename,
|
|
int *image_size)
|
|
{
|
|
char *img;
|
|
struct spk_header *header;
|
|
struct spk_prog_info *pi;
|
|
Elf32_Phdr *ph;
|
|
Elf32_Sym *sym;
|
|
char *name;
|
|
int snlen;
|
|
int nphs;
|
|
int psize;
|
|
int imgsize;
|
|
int i;
|
|
int j;
|
|
uint32_t offset;
|
|
uint32_t sp;
|
|
|
|
snlen = alignup(strlen(savename) + 1, 16);
|
|
|
|
nphs = 0;
|
|
psize = 0;
|
|
for (i = 0, ph = elf->phdr; i < elf->ehdr->e_phnum; i++, ph++)
|
|
{
|
|
if (ph->p_type != PT_LOAD || ph->p_memsz == 0)
|
|
{
|
|
continue;
|
|
}
|
|
|
|
nphs++;
|
|
psize += alignup(ph->p_filesz, 16);
|
|
}
|
|
|
|
imgsize = sizeof(*header) + snlen + (nphs * 16) + psize;
|
|
|
|
img = malloc(imgsize + 32);
|
|
if (!img)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
*image_size = imgsize;
|
|
sym = elf->symtab;
|
|
name = elf->string;
|
|
sp = 0;
|
|
|
|
for (j = 0; j < elf->nsyms; j++, sym++)
|
|
{
|
|
if (!strcmp("__stack", name + sym->st_name))
|
|
{
|
|
sp = sym->st_value;
|
|
}
|
|
}
|
|
|
|
memset(img, 0, imgsize);
|
|
|
|
header = (struct spk_header *)img;
|
|
header->magic[0] = 0xef;
|
|
header->magic[1] = 'M';
|
|
header->magic[2] = 'O';
|
|
header->magic[3] = 'D';
|
|
header->cpu = core;
|
|
|
|
header->entry = elf->ehdr->e_entry;
|
|
header->stack = sp;
|
|
header->core = core;
|
|
|
|
header->binaries = nphs;
|
|
header->phoffs = sizeof(*header) + snlen;
|
|
header->mode = 0777;
|
|
|
|
strncpy(img + sizeof(*header), savename, 63);
|
|
|
|
ph = elf->phdr;
|
|
pi = (struct spk_prog_info *)(img + header->phoffs);
|
|
offset = ((char *)pi - img) + (nphs * sizeof(*pi));
|
|
for (i = 0; i < elf->ehdr->e_phnum; i++, ph++)
|
|
{
|
|
if (ph->p_type != PT_LOAD || ph->p_memsz == 0)
|
|
continue;
|
|
pi->load_address = ph->p_paddr;
|
|
pi->offset = offset;
|
|
pi->size = alignup(ph->p_filesz, 16); /* need 16 bytes align for
|
|
* decryption */
|
|
pi->memsize = ph->p_memsz;
|
|
|
|
memcpy(img + pi->offset, elf->data + ph->p_offset, ph->p_filesz);
|
|
|
|
offset += alignup(ph->p_filesz, 16);
|
|
pi++;
|
|
}
|
|
|
|
return img;
|
|
}
|
|
|
|
/****************************************************************************
|
|
* Public Functions
|
|
****************************************************************************/
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
struct args *args;
|
|
struct elf_file *elf;
|
|
struct cipher *c;
|
|
uint8_t *spkimage;
|
|
int size = 0;
|
|
FILE *fp;
|
|
char footer[16];
|
|
|
|
args = parse_args(argc, argv);
|
|
|
|
elf = load_elf(args->elffile);
|
|
if (!elf)
|
|
{
|
|
fprintf(stderr, "Loading ELF %s failure.\n", args->elffile);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
spkimage = create_image(elf, args->core, args->savename, &size);
|
|
free(elf);
|
|
|
|
c = cipher_init(vmk, NULL);
|
|
cipher_calc_cmac(c, spkimage, size, (uint8_t *) spkimage + size);
|
|
cipher_deinit(c);
|
|
|
|
size += 16; /* Extend CMAC size */
|
|
|
|
snprintf(footer, 16, "MKSPK_BN_FOOTER");
|
|
footer[15] = '\0';
|
|
|
|
fp = fopen(args->outputfile, "wb");
|
|
if (!fp)
|
|
{
|
|
fprintf(stderr, "Output file open error.\n");
|
|
free(spkimage);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
fwrite(spkimage, size, 1, fp);
|
|
fwrite(footer, 16, 1, fp);
|
|
|
|
fclose(fp);
|
|
|
|
printf("File %s is successfully created.\n", args->outputfile);
|
|
free(args->outputfile);
|
|
|
|
memset(spkimage, 0, size);
|
|
free(spkimage);
|
|
|
|
exit(EXIT_SUCCESS);
|
|
}
|