blob: 578d2826e7515c9663ee5e34ce9fa4c3e005245e [file] [log] [blame]
#!/bin/sh
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
# Script to resign a firmware image using a different set of keys
# for use on signing servers.
#
# arguments: src_fd, dst_fd, firmware_datakey, and firmware_keyblock
#
# src_fd: Input firmware image (in .fd format)
# dst_fd: output firmware image name
# firmware_datakey: Key used to sign firmware data (in .vbprivk format)
# firmware_keyblock: Key block for firmware data key (in .keyblock format)
#
# Both the dump_fmap tool and vbutil_firmware should be in the system path.
#
# This script parses the output of dump_fmap tool
#
# to determine the regions in the image containing "Firmware [A|B] Data" and
# "Firmware [A|B] Key", which contain firmware data and firmware vblocks
# respectively. It will then generate new vblocks using the set of keys
# passed as arguments and output a new firmware image, with this new firmware
# vblocks the old ones.
#
# Here is an example output of "dump_fmap -p" (section name, offset, size):
# Boot Stub 3932160 262144
# GBB Area 3670016 262144
# Recovery Firmware 2490368 1048576
# RO VPD 2359296 131072
# Firmware A Key 196608 65536
# Firmware A Data 262144 851968
# Firmware B Key 1114112 65536
# Firmware B Data 1179648 851968
# RW VPD 152064 4096
# Log Volume 0 131072
#
# This shows that Firmware A Data is at offset 262144(0x40000) in the .fd image
# and is of size 851968(0xd0000) bytes. This can be extracted to generate new
# vblocks which can then replace old vblock for Firmware A ("Firmware A Key"
# region at offset 196608(0x30000) and size 65536(0x10000) ).
# Load common constants and variables.
. "$(dirname "$0")/common_minimal.sh"
# Abort on error
set -e
# Check arguments
if [ $# -lt 7 ] || [ $# -gt 9 ]; then
echo "Usage: $PROG src_fd dst_fd firmware_datakey firmware_keyblock"\
"dev_firmware_datakey dev_firmware_keyblock kernel_subkey [version [flag]]"
exit 1
fi
# Make sure the tools we need are available.
for prog in cut dump_fmap md5sum vbutil_firmware; do
type "${prog}" &>/dev/null || \
{ echo "${prog} tool not found."; exit 1; }
done
SRC_FD=$1
DST_FD=$2
FIRMWARE_DATAKEY=$3
FIRMWARE_KEYBLOCK=$4
DEV_FIRMWARE_DATAKEY=$5
DEV_FIRMWARE_KEYBLOCK=$6
KERNEL_SUBKEY=$7
VERSION=$8
# This is the --flags in vbutil_firmware. It currently has only two values:
# 0 for RW-NORMAL firmware, and 1 for RO-NORMAL firmware (search "two_stop
# firmware" for more information).
PREAMBLE_FLAG=$9
# Disables using developer keyblocks
disable_dev_keyblock() {
DEV_FIRMWARE_KEYBLOCK=$FIRMWARE_KEYBLOCK
DEV_FIRMWARE_DATAKEY=$FIRMWARE_DATAKEY
}
# Compares if the contents in given files are the same.
is_the_same_binary_file() {
local hash1="$(md5sum -b "$1" | cut -d' ' -f1)"
local hash2="$(md5sum -b "$2" | cut -d' ' -f1)"
[ "$hash1" = "$hash2" ]
}
# Extract firmware body section from SRC_FD and truncate it to its body size
extract_firmware_image() {
local label="$1"
local root_key="$2"
local vblock_offset="$3"
local vblock_size="$4"
local vblock_image="$5"
local fw_offset="$6"
local fw_size="$7"
local fw_image="$8"
local fw_body_size=""
dd if="${SRC_FD}" of="${vblock_image}" skip="${vblock_offset}" bs=1 \
count="${vblock_size}" 2>/dev/null
dd if="${SRC_FD}" of="${fw_image}" skip="${fw_offset}" bs=1 \
count="${fw_size}" 2>/dev/null
fw_body_size="$(vbutil_firmware \
--verify "${vblock_image}" \
--signpubkey "${root_key}" \
--fv "${fw_image}" |
grep "Firmware body size:" |
sed 's/.*: *//')" || fw_body_size="${fw_size}"
if [ "${fw_body_size}" -gt "${fw_size}" ]; then
echo -n "Firmware ${label} body size exceeds its section: "
echo "${fw_body_size} > ${fw_size}"
return 1
elif [ "${fw_body_size}" -lt "${fw_size}" ]; then
dd if="${SRC_FD}" of="${fw_image}" skip="${fw_offset}" bs=1 \
count="${fw_body_size}" 2>/dev/null
fi
}
if [ -z "$VERSION" ]; then
VERSION=1
fi
echo "Using firmware version: $VERSION"
if [ ! -e $DEV_FIRMWARE_KEYBLOCK ] || [ ! -e $DEV_FIRMWARE_DATAKEY ] ; then
echo "No dev firmware keyblock/datakey found. Reusing normal keys."
disable_dev_keyblock
fi
# Parse offsets and size of firmware data and vblocks
for i in "A" "B"
do
line=$(dump_fmap -p $1 | grep "^Firmware $i Key") ||
line=$(dump_fmap -p $1 | grep "^VBLOCK_$i") ||
{ echo "Couldn't parse vblock section $i from dump_fmap output";
exit 1; }
offset="$(echo $line | sed -r -e 's/.* ([0-9]+) [0-9]+$/\1/')"
eval fw${i}_vblock_offset=$((offset))
size="$(echo $line | sed -r -e 's/.* [0-9]+ ([0-9]+)$/\1/')"
eval fw${i}_vblock_size=$((size))
line=$(dump_fmap -p $1 | grep "^Firmware $i Data") ||
line=$(dump_fmap -p $1 | grep "^FW_MAIN_$i") ||
{ echo "Couldn't parse Firmware $i section from dump_fmap output";
exit 1; }
offset="$(echo $line | sed -r -e 's/.* ([0-9]+) [0-9]+$/\1/')"
eval fw${i}_offset=$((offset))
size="$(echo $line | sed -r -e 's/.* [0-9]+ ([0-9]+)$/\1/')"
eval fw${i}_size=$((size))
done
temp_fwimage_a=$(make_temp_file)
temp_fwimage_b=$(make_temp_file)
temp_out_vb=$(make_temp_file)
temp_root_key=$(make_temp_file)
echo "Reading Root Key from GBB"
gbb_utility -g --rootkey="$temp_root_key" "${SRC_FD}"
echo "Extracting Firmware A and B"
extract_firmware_image "A" "${temp_root_key}" \
"${fwA_vblock_offset}" "${fwA_vblock_size}" "${temp_out_vb}" \
"${fwA_offset}" "${fwA_size}" "${temp_fwimage_a}"
extract_firmware_image "B" "${temp_root_key}" \
"${fwB_vblock_offset}" "${fwB_vblock_size}" "${temp_out_vb}" \
"${fwB_offset}" "${fwB_size}" "${temp_fwimage_b}"
echo "Determining preamble flag from existing firmware"
if [ -n "$PREAMBLE_FLAG" ]; then
PREAMBLE_FLAG="--flags $PREAMBLE_FLAG"
else
dd if="${SRC_FD}" of="${temp_out_vb}" skip="${fwA_vblock_offset}" bs=1 \
count="${fwA_vblock_size}" 2>/dev/null
flag="$(vbutil_firmware \
--verify "${temp_out_vb}" \
--signpubkey "${temp_root_key}" \
--fv "${temp_fwimage_a}" |
grep "Preamble flags:" |
sed 's/.*: *//')" || flag=""
[ -z "$flag" ] || PREAMBLE_FLAG="--flags $flag"
fi
echo "Using firmware preamble flag: $PREAMBLE_FLAG"
# Sanity check firmware type: "developer key block" should be only used if the
# content in firmware A/B are different; otherwise always use normal key blocks.
if is_the_same_binary_file "${temp_fwimage_a}" "${temp_fwimage_b}"; then
echo "Found firmware with same A/B content - ignoring DEV keyblock."
disable_dev_keyblock
fi
echo "Re-calculating Firmware A vblock"
vbutil_firmware \
--vblock "${temp_out_vb}" \
--keyblock "${DEV_FIRMWARE_KEYBLOCK}" \
--signprivate "${DEV_FIRMWARE_DATAKEY}" \
--version "${VERSION}" \
$PREAMBLE_FLAG \
--fv "${temp_fwimage_a}" \
--kernelkey "${KERNEL_SUBKEY}"
# Create a copy of the input image and put in the new vblock for firmware A
cp "${SRC_FD}" "${DST_FD}"
dd if="${temp_out_vb}" of="${DST_FD}" seek="${fwA_vblock_offset}" bs=1 \
count="${fwA_vblock_size}" conv=notrunc 2>/dev/null
echo "Re-calculating Firmware B vblock"
vbutil_firmware \
--vblock "${temp_out_vb}" \
--keyblock "${FIRMWARE_KEYBLOCK}" \
--signprivate "${FIRMWARE_DATAKEY}" \
--version "${VERSION}" \
$PREAMBLE_FLAG \
--fv "${temp_fwimage_b}" \
--kernelkey "${KERNEL_SUBKEY}"
# Destination image has already been created.
dd if="${temp_out_vb}" of="${DST_FD}" seek="${fwB_vblock_offset}" bs=1 \
count="${fwB_vblock_size}" conv=notrunc 2>/dev/null
echo "New signed image was output to ${DST_FD}"