2018-06-05 14:34:03 -04:00
|
|
|
/*
|
|
|
|
* aarch64-rpi/fs.h
|
2018-11-09 05:59:14 -05:00
|
|
|
*
|
2021-01-15 15:07:25 -05:00
|
|
|
* Copyright (C) 2017 - 2021 bzt (bztsrc@gitlab)
|
2018-06-05 14:34:03 -04:00
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person
|
|
|
|
* obtaining a copy of this software and associated documentation
|
|
|
|
* files (the "Software"), to deal in the Software without
|
|
|
|
* restriction, including without limitation the rights to use, copy,
|
|
|
|
* modify, merge, publish, distribute, sublicense, and/or sell copies
|
|
|
|
* of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
|
|
|
|
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
|
|
|
* WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
|
|
* DEALINGS IN THE SOFTWARE.
|
2018-11-09 05:59:14 -05:00
|
|
|
*
|
2018-06-05 14:34:03 -04:00
|
|
|
* This file is part of the BOOTBOOT Protocol package.
|
|
|
|
* @brief Filesystem drivers for initial ramdisk.
|
2018-11-09 05:59:14 -05:00
|
|
|
*
|
2018-06-05 14:34:03 -04:00
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* FS/Z initrd (OS/Z's native file system)
|
|
|
|
*/
|
|
|
|
file_t fsz_initrd(unsigned char *initrd_p, char *kernel)
|
|
|
|
{
|
|
|
|
file_t ret = { NULL, 0 };
|
2020-06-15 21:35:19 -04:00
|
|
|
if(initrd_p==NULL || memcmp(initrd_p + 512,"FS/Z",4) || kernel==NULL){
|
2018-06-05 14:34:03 -04:00
|
|
|
return ret;
|
|
|
|
}
|
2018-11-09 05:59:14 -05:00
|
|
|
unsigned char passphrase[256],chk[32],iv[32];
|
2020-06-15 21:35:19 -04:00
|
|
|
unsigned int i,j,k,l,ss=1<<(*((uint16_t*)(initrd_p+520))+11);
|
|
|
|
unsigned char *ent, *in=(initrd_p+*((uint64_t*)(initrd_p+560))*ss);
|
2018-11-09 05:59:14 -05:00
|
|
|
SHA256_CTX ctx;
|
2018-06-05 14:34:03 -04:00
|
|
|
DBG(" * FS/Z ");
|
|
|
|
DBG(kernel);
|
|
|
|
DBG("\n");
|
2018-11-09 05:59:14 -05:00
|
|
|
//decrypt initrd
|
2020-06-15 21:35:19 -04:00
|
|
|
if(*((uint32_t*)(initrd_p+708))!=0 && ((initrd_p[518]>>2)&7)!=0) {
|
2018-11-09 05:59:14 -05:00
|
|
|
puts("BOOTBOOT-PANIC: Unsupported cipher\n");
|
|
|
|
return ret;
|
|
|
|
}
|
2020-06-15 21:35:19 -04:00
|
|
|
while(*((uint32_t*)(initrd_p+708))!=0) {
|
2018-11-09 05:59:14 -05:00
|
|
|
puts(" * Passphrase? ");
|
|
|
|
l=ReadLine(passphrase,sizeof(passphrase));
|
|
|
|
if(!l) {
|
|
|
|
puts("\n");
|
|
|
|
return ret;
|
|
|
|
}
|
2020-06-15 21:35:19 -04:00
|
|
|
if(*((uint32_t*)(initrd_p+708))!=crc32_calc((char*)passphrase,l)) {
|
2018-11-09 05:59:14 -05:00
|
|
|
puts("\rBOOTBOOT-ERROR: Bad passphrase\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
puts("\r * Decrypting...\r");
|
|
|
|
SHA256_Init(&ctx);
|
|
|
|
SHA256_Update(&ctx,passphrase,l);
|
2020-06-15 21:35:19 -04:00
|
|
|
SHA256_Update(&ctx,initrd_p+512,6);
|
2018-11-09 05:59:14 -05:00
|
|
|
SHA256_Final(chk,&ctx);
|
2020-06-15 21:35:19 -04:00
|
|
|
for(i=0;i<28;i++) initrd_p[i+680]^=chk[i];
|
2018-11-09 05:59:14 -05:00
|
|
|
SHA256_Init(&ctx);
|
2020-06-15 21:35:19 -04:00
|
|
|
SHA256_Update(&ctx,initrd_p+680,28);
|
2018-11-09 05:59:14 -05:00
|
|
|
SHA256_Final(iv,&ctx);
|
2020-06-15 21:35:19 -04:00
|
|
|
for(k=ss,j=1;j<*((uint32_t*)(initrd_p+528));j++) {
|
2018-11-09 05:59:14 -05:00
|
|
|
memcpy(chk,iv,32);
|
|
|
|
for(i=0;i<ss;i++) {
|
|
|
|
if(i%32==0) {
|
|
|
|
SHA256_Init(&ctx);
|
|
|
|
SHA256_Update(&ctx,&chk,32);
|
|
|
|
SHA256_Update(&ctx,&j,4);
|
|
|
|
SHA256_Final(chk,&ctx);
|
|
|
|
}
|
2018-11-09 09:12:33 -05:00
|
|
|
initrd_p[k++]^=chk[i%32]^iv[i%32];
|
2018-11-09 05:59:14 -05:00
|
|
|
}
|
|
|
|
}
|
2020-06-15 21:35:19 -04:00
|
|
|
memset(initrd_p+680,0,28+4);
|
|
|
|
*((uint32_t*)(initrd_p+1020))=crc32_calc((char *)initrd_p+512,508);
|
2018-11-09 05:59:14 -05:00
|
|
|
puts(" \r");
|
|
|
|
}
|
2018-06-05 14:34:03 -04:00
|
|
|
// Get the inode
|
|
|
|
char *s,*e;
|
|
|
|
s=e=kernel;
|
|
|
|
i=0;
|
|
|
|
again:
|
|
|
|
while(*e!='/'&&*e!=0){e++;}
|
|
|
|
if(*e=='/'){e++;}
|
2020-06-15 21:35:19 -04:00
|
|
|
if(!memcmp(in,"FSIN",4)){
|
2018-06-05 14:34:03 -04:00
|
|
|
//is it inlined?
|
2020-06-15 21:35:19 -04:00
|
|
|
if(!memcmp(initrd_p[518]&1? in + 2048 : in + 1024,"FSDR",4)){
|
|
|
|
ent=(initrd_p[518]&1? in + 2048 : in + 1024);
|
|
|
|
} else if(!memcmp(initrd_p+*((uint64_t*)(in+448))*ss,"FSDR",4)){
|
2018-06-05 14:34:03 -04:00
|
|
|
// go, get the sector pointed
|
2020-06-15 21:35:19 -04:00
|
|
|
ent=(initrd_p+*((uint64_t*)(in+448))*ss);
|
2018-06-05 14:34:03 -04:00
|
|
|
} else {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
//skip header
|
2020-06-15 21:35:19 -04:00
|
|
|
unsigned char *hdr=ent; ent+=128;
|
2018-06-05 14:34:03 -04:00
|
|
|
//iterate on directory entries
|
2020-06-15 21:35:19 -04:00
|
|
|
int j=*((uint64_t*)(hdr+16));
|
2018-06-05 14:34:03 -04:00
|
|
|
while(j-->0){
|
2020-06-15 21:35:19 -04:00
|
|
|
if(!memcmp(ent + 17,s,e-s)) {
|
2018-06-05 14:34:03 -04:00
|
|
|
if(*e==0) {
|
2020-06-15 21:35:19 -04:00
|
|
|
i=*((uint64_t*)(ent+0));
|
2018-06-05 14:34:03 -04:00
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
s=e;
|
2020-06-15 21:35:19 -04:00
|
|
|
in=(initrd_p+*((uint64_t*)(ent+0))*ss);
|
2018-06-05 14:34:03 -04:00
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
}
|
2020-06-15 21:35:19 -04:00
|
|
|
ent+=128;
|
2018-06-05 14:34:03 -04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
i=0;
|
|
|
|
}
|
|
|
|
if(i!=0) {
|
|
|
|
// fid -> inode ptr -> data ptr
|
2020-06-15 21:35:19 -04:00
|
|
|
unsigned char *in=(initrd_p+i*ss);
|
|
|
|
if(!memcmp(in,"FSIN",4)){
|
|
|
|
ret.size=*((uint64_t*)(in+464));
|
|
|
|
switch(in[488]) {
|
|
|
|
case 0xFF:
|
2018-06-05 14:34:03 -04:00
|
|
|
// inline data
|
2020-06-15 21:35:19 -04:00
|
|
|
ret.ptr=(uint8_t*)(initrd_p+i*ss+(initrd_p[518]&1? 2048 : 1024));
|
2018-06-05 14:34:03 -04:00
|
|
|
break;
|
2020-06-15 21:35:19 -04:00
|
|
|
case 0x80:
|
|
|
|
case 0x7F:
|
2018-06-05 14:34:03 -04:00
|
|
|
// sector directory or list inlined
|
2020-06-15 21:35:19 -04:00
|
|
|
ret.ptr=(uint8_t*)(initrd_p + *((uint64_t*)(initrd_p[518]&1? in + 2048 : in + 1024))*ss);
|
2018-06-05 14:34:03 -04:00
|
|
|
break;
|
2020-06-15 21:35:19 -04:00
|
|
|
case 0:
|
2018-06-05 14:34:03 -04:00
|
|
|
// direct data
|
2020-06-15 21:35:19 -04:00
|
|
|
ret.ptr=(uint8_t*)(initrd_p + *((uint64_t*)(in+448)) * ss);
|
2018-06-05 14:34:03 -04:00
|
|
|
break;
|
|
|
|
// sector directory (only one level supported here, and no holes in files)
|
2020-06-15 21:35:19 -04:00
|
|
|
case 0x81:
|
|
|
|
case 1:
|
|
|
|
ret.ptr=(uint8_t*)(initrd_p + *((uint64_t*)(initrd_p + *((uint64_t*)(in+448))*ss)) * ss);
|
2018-06-05 14:34:03 -04:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret.size=0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cpio archive
|
|
|
|
*/
|
|
|
|
file_t cpio_initrd(unsigned char *initrd_p, char *kernel)
|
|
|
|
{
|
|
|
|
unsigned char *ptr=initrd_p;
|
|
|
|
int k;
|
|
|
|
file_t ret = { NULL, 0 };
|
2018-11-09 05:59:14 -05:00
|
|
|
if(initrd_p==NULL || kernel==NULL ||
|
2018-06-05 14:34:03 -04:00
|
|
|
(memcmp(initrd_p,"070701",6) && memcmp(initrd_p,"070702",6) && memcmp(initrd_p,"070707",6)))
|
|
|
|
return ret;
|
|
|
|
DBG(" * cpio ");
|
|
|
|
DBG(kernel);
|
|
|
|
DBG("\n");
|
|
|
|
k=strlen((unsigned char*)kernel);
|
|
|
|
// hpodc archive
|
|
|
|
while(!memcmp(ptr,"070707",6)){
|
|
|
|
int ns=oct2bin(ptr+8*6+11,6);
|
|
|
|
int fs=oct2bin(ptr+8*6+11+6,11);
|
2020-06-15 00:21:29 -04:00
|
|
|
if(!memcmp(ptr+9*6+2*11,kernel,k+1) ||
|
|
|
|
(ptr[9*6+2*11] == '.' && ptr[9*6+2*11+1] == '/' && !memcmp(ptr+9*6+2*11+2,kernel,k+1))) {
|
2018-06-05 14:34:03 -04:00
|
|
|
ret.size=fs;
|
|
|
|
ret.ptr=(uint8_t*)(ptr+9*6+2*11+ns);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ptr+=(76+ns+fs);
|
|
|
|
}
|
|
|
|
// newc and crc archive
|
|
|
|
while(!memcmp(ptr,"07070",5)){
|
|
|
|
int fs=hex2bin(ptr+8*6+6,8);
|
|
|
|
int ns=hex2bin(ptr+8*11+6,8);
|
2020-06-15 00:21:29 -04:00
|
|
|
if(!memcmp(ptr+110,kernel,k+1) || (ptr[110] == '.' && ptr[111] == '/' && !memcmp(ptr+112,kernel,k+1))) {
|
2018-06-05 14:34:03 -04:00
|
|
|
ret.size=fs;
|
|
|
|
ret.ptr=(uint8_t*)(ptr+((110+ns+3)/4)*4);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ptr+=((110+ns+3)/4)*4 + ((fs+3)/4)*4;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ustar tarball archive
|
|
|
|
*/
|
|
|
|
file_t tar_initrd(unsigned char *initrd_p, char *kernel)
|
|
|
|
{
|
|
|
|
unsigned char *ptr=initrd_p;
|
|
|
|
int k;
|
|
|
|
file_t ret = { NULL, 0 };
|
|
|
|
if(initrd_p==NULL || kernel==NULL || memcmp(initrd_p+257,"ustar",5))
|
|
|
|
return ret;
|
|
|
|
DBG(" * tar ");
|
|
|
|
DBG(kernel);
|
|
|
|
DBG("\n");
|
|
|
|
k=strlen((unsigned char*)kernel);
|
|
|
|
while(!memcmp(ptr+257,"ustar",5)){
|
|
|
|
int fs=oct2bin(ptr+0x7c,11);
|
2020-06-15 00:21:29 -04:00
|
|
|
if(!memcmp(ptr,kernel,k+1) || (ptr[0] == '.' && ptr[1] == '/' && !memcmp(ptr+2,kernel,k+1))) {
|
2018-06-05 14:34:03 -04:00
|
|
|
ret.size=fs;
|
|
|
|
ret.ptr=(uint8_t*)(ptr+512);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ptr+=(((fs+511)/512)+1)*512;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Simple File System
|
|
|
|
*/
|
|
|
|
file_t sfs_initrd(unsigned char *initrd_p, char *kernel)
|
|
|
|
{
|
|
|
|
unsigned char *ptr, *end;
|
|
|
|
int k,bs,ver;
|
|
|
|
file_t ret = { NULL, 0 };
|
|
|
|
if(initrd_p==NULL || kernel==NULL || (memcmp(initrd_p+0x1AC,"SFS",3) && memcmp(initrd_p+0x1A6,"SFS",3)))
|
|
|
|
return ret;
|
|
|
|
// 1.0 Brendan's version, 1.10 BenLunt's version
|
|
|
|
ver=!memcmp(initrd_p+0x1A6,"SFS",3)?10:0;
|
|
|
|
bs=1<<(7+(uint8_t)initrd_p[ver?0x1B6:0x1BC]);
|
|
|
|
end=initrd_p + *((uint64_t *)&initrd_p[ver?0x1AA:0x1B0]) * bs; // base + total_number_of_blocks * blocksize
|
|
|
|
// get index area
|
|
|
|
ptr=end - *((uint64_t *)&initrd_p[ver?0x19E:0x1A4]); // end - size of index area
|
|
|
|
// got a Starting Marker Entry?
|
|
|
|
if(ptr[0]!=2)
|
|
|
|
return ret;
|
|
|
|
DBG(" * SFS 1.");
|
|
|
|
DBG(ver?"10":"0");
|
|
|
|
DBG(kernel);
|
|
|
|
DBG("\n");
|
|
|
|
k=strlen((unsigned char*)kernel);
|
|
|
|
// iterate on index until we reach the end or Volume Identifier
|
|
|
|
while(ptr<end && ptr[0]!=0x01){
|
|
|
|
ptr+=64;
|
|
|
|
// file entry?
|
|
|
|
if(ptr[0]!=0x12)
|
|
|
|
continue;
|
|
|
|
// filename match?
|
|
|
|
if(!memcmp(ptr+(ver?0x23:0x22),kernel,k+1)){
|
|
|
|
ret.size=*((uint64_t*)&ptr[ver?0x1B:0x1A]); // file_length
|
|
|
|
ret.ptr=initrd_p + *((uint64_t*)&ptr[ver?0x0B:0x0A]) * bs; // base + start_block * blocksize
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* James Molloy's initrd (for some reason it's popular among hobby OS developers)
|
|
|
|
* http://www.jamesmolloy.co.uk/tutorial_html
|
|
|
|
*/
|
|
|
|
file_t jamesm_initrd(unsigned char *initrd_p, char *kernel)
|
|
|
|
{
|
|
|
|
unsigned char *ptr=initrd_p+4;
|
|
|
|
int i,k,nf=*((int*)initrd_p);
|
|
|
|
file_t ret = { NULL, 0 };
|
2020-06-19 23:00:46 -04:00
|
|
|
// no real magic, so we assume initrd contains at least one file...
|
|
|
|
if(initrd_p==NULL || kernel==NULL || initrd_p[2]!=0 || initrd_p[3]!=0 || initrd_p[4]!=0xBF)
|
2018-06-05 14:34:03 -04:00
|
|
|
return ret;
|
|
|
|
DBG(" * JamesM ");
|
|
|
|
DBG(kernel);
|
|
|
|
DBG("\n");
|
|
|
|
k=strlen((unsigned char*)kernel);
|
|
|
|
for(i=0;i<nf && ptr[0]==0xBF;i++) {
|
|
|
|
if(!memcmp(ptr+1,kernel,k+1)){
|
|
|
|
ret.ptr=*((uint32_t*)(ptr+65)) + initrd_p;
|
|
|
|
ret.size=*((uint32_t*)(ptr+69));
|
|
|
|
}
|
|
|
|
ptr+=73;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Static file system drivers registry
|
|
|
|
*/
|
|
|
|
file_t (*fsdrivers[]) (unsigned char *, char *) = {
|
|
|
|
fsz_initrd,
|
|
|
|
cpio_initrd,
|
|
|
|
tar_initrd,
|
|
|
|
sfs_initrd,
|
|
|
|
jamesm_initrd,
|
|
|
|
NULL
|
|
|
|
};
|