1
0
Fork 0
mirror of https://gitlab.com/bztsrc/bootboot.git synced 2023-02-13 20:54:32 -05:00
bztsrc--bootboot/aarch64-rpi/fs.h

302 lines
9.6 KiB
C
Raw Normal View History

2018-06-05 14:34:03 -04:00
/*
* aarch64-rpi/fs.h
2018-11-09 05:59:14 -05:00
*
2021-01-15 15:07:25 -05:00
* Copyright (C) 2017 - 2021 bzt (bztsrc@gitlab)
2018-06-05 14:34:03 -04:00
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation
* files (the "Software"), to deal in the Software without
* restriction, including without limitation the rights to use, copy,
* modify, merge, publish, distribute, sublicense, and/or sell copies
* of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
* WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
* DEALINGS IN THE SOFTWARE.
2018-11-09 05:59:14 -05:00
*
2018-06-05 14:34:03 -04:00
* This file is part of the BOOTBOOT Protocol package.
* @brief Filesystem drivers for initial ramdisk.
2018-11-09 05:59:14 -05:00
*
2018-06-05 14:34:03 -04:00
*/
/**
* FS/Z initrd (OS/Z's native file system)
*/
file_t fsz_initrd(unsigned char *initrd_p, char *kernel)
{
file_t ret = { NULL, 0 };
if(initrd_p==NULL || memcmp(initrd_p + 512,"FS/Z",4) || kernel==NULL){
2018-06-05 14:34:03 -04:00
return ret;
}
2018-11-09 05:59:14 -05:00
unsigned char passphrase[256],chk[32],iv[32];
unsigned int i,j,k,l,ss=1<<(*((uint16_t*)(initrd_p+520))+11);
unsigned char *ent, *in=(initrd_p+*((uint64_t*)(initrd_p+560))*ss);
2018-11-09 05:59:14 -05:00
SHA256_CTX ctx;
2018-06-05 14:34:03 -04:00
DBG(" * FS/Z ");
DBG(kernel);
DBG("\n");
2018-11-09 05:59:14 -05:00
//decrypt initrd
if(*((uint32_t*)(initrd_p+708))!=0 && ((initrd_p[518]>>2)&7)!=0) {
2018-11-09 05:59:14 -05:00
puts("BOOTBOOT-PANIC: Unsupported cipher\n");
return ret;
}
while(*((uint32_t*)(initrd_p+708))!=0) {
2018-11-09 05:59:14 -05:00
puts(" * Passphrase? ");
l=ReadLine(passphrase,sizeof(passphrase));
if(!l) {
puts("\n");
return ret;
}
if(*((uint32_t*)(initrd_p+708))!=crc32_calc((char*)passphrase,l)) {
2018-11-09 05:59:14 -05:00
puts("\rBOOTBOOT-ERROR: Bad passphrase\n");
continue;
}
puts("\r * Decrypting...\r");
SHA256_Init(&ctx);
SHA256_Update(&ctx,passphrase,l);
SHA256_Update(&ctx,initrd_p+512,6);
2018-11-09 05:59:14 -05:00
SHA256_Final(chk,&ctx);
for(i=0;i<28;i++) initrd_p[i+680]^=chk[i];
2018-11-09 05:59:14 -05:00
SHA256_Init(&ctx);
SHA256_Update(&ctx,initrd_p+680,28);
2018-11-09 05:59:14 -05:00
SHA256_Final(iv,&ctx);
for(k=ss,j=1;j<*((uint32_t*)(initrd_p+528));j++) {
2018-11-09 05:59:14 -05:00
memcpy(chk,iv,32);
for(i=0;i<ss;i++) {
if(i%32==0) {
SHA256_Init(&ctx);
SHA256_Update(&ctx,&chk,32);
SHA256_Update(&ctx,&j,4);
SHA256_Final(chk,&ctx);
}
2018-11-09 09:12:33 -05:00
initrd_p[k++]^=chk[i%32]^iv[i%32];
2018-11-09 05:59:14 -05:00
}
}
memset(initrd_p+680,0,28+4);
*((uint32_t*)(initrd_p+1020))=crc32_calc((char *)initrd_p+512,508);
2018-11-09 05:59:14 -05:00
puts(" \r");
}
2018-06-05 14:34:03 -04:00
// Get the inode
char *s,*e;
s=e=kernel;
i=0;
again:
while(*e!='/'&&*e!=0){e++;}
if(*e=='/'){e++;}
if(!memcmp(in,"FSIN",4)){
2018-06-05 14:34:03 -04:00
//is it inlined?
if(!memcmp(initrd_p[518]&1? in + 2048 : in + 1024,"FSDR",4)){
ent=(initrd_p[518]&1? in + 2048 : in + 1024);
} else if(!memcmp(initrd_p+*((uint64_t*)(in+448))*ss,"FSDR",4)){
2018-06-05 14:34:03 -04:00
// go, get the sector pointed
ent=(initrd_p+*((uint64_t*)(in+448))*ss);
2018-06-05 14:34:03 -04:00
} else {
return ret;
}
//skip header
unsigned char *hdr=ent; ent+=128;
2018-06-05 14:34:03 -04:00
//iterate on directory entries
int j=*((uint64_t*)(hdr+16));
2018-06-05 14:34:03 -04:00
while(j-->0){
if(!memcmp(ent + 17,s,e-s)) {
2018-06-05 14:34:03 -04:00
if(*e==0) {
i=*((uint64_t*)(ent+0));
2018-06-05 14:34:03 -04:00
break;
} else {
s=e;
in=(initrd_p+*((uint64_t*)(ent+0))*ss);
2018-06-05 14:34:03 -04:00
goto again;
}
}
ent+=128;
2018-06-05 14:34:03 -04:00
}
} else {
i=0;
}
if(i!=0) {
// fid -> inode ptr -> data ptr
unsigned char *in=(initrd_p+i*ss);
if(!memcmp(in,"FSIN",4)){
ret.size=*((uint64_t*)(in+464));
switch(in[488]) {
case 0xFF:
2018-06-05 14:34:03 -04:00
// inline data
ret.ptr=(uint8_t*)(initrd_p+i*ss+(initrd_p[518]&1? 2048 : 1024));
2018-06-05 14:34:03 -04:00
break;
case 0x80:
case 0x7F:
2018-06-05 14:34:03 -04:00
// sector directory or list inlined
ret.ptr=(uint8_t*)(initrd_p + *((uint64_t*)(initrd_p[518]&1? in + 2048 : in + 1024))*ss);
2018-06-05 14:34:03 -04:00
break;
case 0:
2018-06-05 14:34:03 -04:00
// direct data
ret.ptr=(uint8_t*)(initrd_p + *((uint64_t*)(in+448)) * ss);
2018-06-05 14:34:03 -04:00
break;
// sector directory (only one level supported here, and no holes in files)
case 0x81:
case 1:
ret.ptr=(uint8_t*)(initrd_p + *((uint64_t*)(initrd_p + *((uint64_t*)(in+448))*ss)) * ss);
2018-06-05 14:34:03 -04:00
break;
default:
ret.size=0;
break;
}
}
}
return ret;
}
/**
* cpio archive
*/
file_t cpio_initrd(unsigned char *initrd_p, char *kernel)
{
unsigned char *ptr=initrd_p;
int k;
file_t ret = { NULL, 0 };
2018-11-09 05:59:14 -05:00
if(initrd_p==NULL || kernel==NULL ||
2018-06-05 14:34:03 -04:00
(memcmp(initrd_p,"070701",6) && memcmp(initrd_p,"070702",6) && memcmp(initrd_p,"070707",6)))
return ret;
DBG(" * cpio ");
DBG(kernel);
DBG("\n");
k=strlen((unsigned char*)kernel);
// hpodc archive
while(!memcmp(ptr,"070707",6)){
int ns=oct2bin(ptr+8*6+11,6);
int fs=oct2bin(ptr+8*6+11+6,11);
2020-06-15 00:21:29 -04:00
if(!memcmp(ptr+9*6+2*11,kernel,k+1) ||
(ptr[9*6+2*11] == '.' && ptr[9*6+2*11+1] == '/' && !memcmp(ptr+9*6+2*11+2,kernel,k+1))) {
2018-06-05 14:34:03 -04:00
ret.size=fs;
ret.ptr=(uint8_t*)(ptr+9*6+2*11+ns);
return ret;
}
ptr+=(76+ns+fs);
}
// newc and crc archive
while(!memcmp(ptr,"07070",5)){
int fs=hex2bin(ptr+8*6+6,8);
int ns=hex2bin(ptr+8*11+6,8);
2020-06-15 00:21:29 -04:00
if(!memcmp(ptr+110,kernel,k+1) || (ptr[110] == '.' && ptr[111] == '/' && !memcmp(ptr+112,kernel,k+1))) {
2018-06-05 14:34:03 -04:00
ret.size=fs;
ret.ptr=(uint8_t*)(ptr+((110+ns+3)/4)*4);
return ret;
}
ptr+=((110+ns+3)/4)*4 + ((fs+3)/4)*4;
}
return ret;
}
/**
* ustar tarball archive
*/
file_t tar_initrd(unsigned char *initrd_p, char *kernel)
{
unsigned char *ptr=initrd_p;
int k;
file_t ret = { NULL, 0 };
if(initrd_p==NULL || kernel==NULL || memcmp(initrd_p+257,"ustar",5))
return ret;
DBG(" * tar ");
DBG(kernel);
DBG("\n");
k=strlen((unsigned char*)kernel);
while(!memcmp(ptr+257,"ustar",5)){
int fs=oct2bin(ptr+0x7c,11);
2020-06-15 00:21:29 -04:00
if(!memcmp(ptr,kernel,k+1) || (ptr[0] == '.' && ptr[1] == '/' && !memcmp(ptr+2,kernel,k+1))) {
2018-06-05 14:34:03 -04:00
ret.size=fs;
ret.ptr=(uint8_t*)(ptr+512);
return ret;
}
ptr+=(((fs+511)/512)+1)*512;
}
return ret;
}
/**
* Simple File System
*/
file_t sfs_initrd(unsigned char *initrd_p, char *kernel)
{
unsigned char *ptr, *end;
int k,bs,ver;
file_t ret = { NULL, 0 };
if(initrd_p==NULL || kernel==NULL || (memcmp(initrd_p+0x1AC,"SFS",3) && memcmp(initrd_p+0x1A6,"SFS",3)))
return ret;
// 1.0 Brendan's version, 1.10 BenLunt's version
ver=!memcmp(initrd_p+0x1A6,"SFS",3)?10:0;
bs=1<<(7+(uint8_t)initrd_p[ver?0x1B6:0x1BC]);
end=initrd_p + *((uint64_t *)&initrd_p[ver?0x1AA:0x1B0]) * bs; // base + total_number_of_blocks * blocksize
// get index area
ptr=end - *((uint64_t *)&initrd_p[ver?0x19E:0x1A4]); // end - size of index area
// got a Starting Marker Entry?
if(ptr[0]!=2)
return ret;
DBG(" * SFS 1.");
DBG(ver?"10":"0");
DBG(kernel);
DBG("\n");
k=strlen((unsigned char*)kernel);
// iterate on index until we reach the end or Volume Identifier
while(ptr<end && ptr[0]!=0x01){
ptr+=64;
// file entry?
if(ptr[0]!=0x12)
continue;
// filename match?
if(!memcmp(ptr+(ver?0x23:0x22),kernel,k+1)){
ret.size=*((uint64_t*)&ptr[ver?0x1B:0x1A]); // file_length
ret.ptr=initrd_p + *((uint64_t*)&ptr[ver?0x0B:0x0A]) * bs; // base + start_block * blocksize
break;
}
}
return ret;
}
/**
* James Molloy's initrd (for some reason it's popular among hobby OS developers)
* http://www.jamesmolloy.co.uk/tutorial_html
*/
file_t jamesm_initrd(unsigned char *initrd_p, char *kernel)
{
unsigned char *ptr=initrd_p+4;
int i,k,nf=*((int*)initrd_p);
file_t ret = { NULL, 0 };
2020-06-19 23:00:46 -04:00
// no real magic, so we assume initrd contains at least one file...
if(initrd_p==NULL || kernel==NULL || initrd_p[2]!=0 || initrd_p[3]!=0 || initrd_p[4]!=0xBF)
2018-06-05 14:34:03 -04:00
return ret;
DBG(" * JamesM ");
DBG(kernel);
DBG("\n");
k=strlen((unsigned char*)kernel);
for(i=0;i<nf && ptr[0]==0xBF;i++) {
if(!memcmp(ptr+1,kernel,k+1)){
ret.ptr=*((uint32_t*)(ptr+65)) + initrd_p;
ret.size=*((uint32_t*)(ptr+69));
}
ptr+=73;
}
return ret;
}
/**
* Static file system drivers registry
*/
file_t (*fsdrivers[]) (unsigned char *, char *) = {
fsz_initrd,
cpio_initrd,
tar_initrd,
sfs_initrd,
jamesm_initrd,
NULL
};