mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-02 03:43:06 +00:00
0c918484fb
- .patch out a `git submodule update` from `make preparation`. - Place the `ipp-crypto/fips_cert.h` header somewhere sgx-sdk can find it. Diff: <https://github.com/intel/linux-sgx/compare/sgx_2.23...sgx_2.24> Changelog: <https://github.com/intel/linux-sgx/releases/tag/sgx_2.24>
299 lines
8.4 KiB
Nix
299 lines
8.4 KiB
Nix
{ lib
|
|
, stdenv
|
|
, fetchFromGitHub
|
|
, autoconf
|
|
, automake
|
|
, binutils
|
|
, callPackage
|
|
, cmake
|
|
, file
|
|
, gdb
|
|
, git
|
|
, libtool
|
|
, linkFarmFromDrvs
|
|
, ocaml
|
|
, ocamlPackages
|
|
, openssl
|
|
, perl
|
|
, python3
|
|
, texinfo
|
|
, validatePkgConfig
|
|
, writeShellApplication
|
|
, writeShellScript
|
|
, writeText
|
|
, debug ? false
|
|
}:
|
|
stdenv.mkDerivation rec {
|
|
pname = "sgx-sdk";
|
|
# Version as given in se_version.h
|
|
version = "2.24.100.3";
|
|
# Version as used in the Git tag
|
|
versionTag = "2.24";
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "intel";
|
|
repo = "linux-sgx";
|
|
rev = "sgx_${versionTag}";
|
|
hash = "sha256-1urEdfMKNUqqyJ3wQ10+tvtlRuAKELpaCWIOzjCbYKw=";
|
|
fetchSubmodules = true;
|
|
};
|
|
|
|
postUnpack = ''
|
|
# Make sure this is the right version of linux-sgx
|
|
grep -q '"${version}"' "$src/common/inc/internal/se_version.h" \
|
|
|| (echo "Could not find expected version ${version} in linux-sgx source" >&2 && exit 1)
|
|
'';
|
|
|
|
patches = [
|
|
# There's a `make preparation` step that downloads some prebuilt binaries
|
|
# and applies some patches to the in-repo git submodules. This patch removes
|
|
# the parts that download things, since we can't do that inside the sandbox.
|
|
./disable-downloads.patch
|
|
|
|
# This patch disable mtime in bundled zip file for reproducible builds.
|
|
#
|
|
# Context: The `aesm_service` binary depends on a vendored library called
|
|
# `CppMicroServices`. At build time, this lib creates and then bundles
|
|
# service resources into a zip file and then embeds this zip into the
|
|
# binary. Without changes, the `aesm_service` will be different after every
|
|
# build because the embedded zip file contents have different modified times.
|
|
./cppmicroservices-no-mtime.patch
|
|
];
|
|
|
|
postPatch = ''
|
|
patchShebangs linux/installer/bin/build-installpkg.sh \
|
|
linux/installer/common/sdk/createTarball.sh \
|
|
linux/installer/common/sdk/install.sh \
|
|
external/sgx-emm/create_symlink.sh
|
|
|
|
make preparation
|
|
'';
|
|
|
|
# We need `cmake` as a build input but don't use it to kick off the build phase
|
|
dontUseCmakeConfigure = true;
|
|
|
|
# SDK built with stackprotector produces broken enclaves which crash at runtime.
|
|
# Disable all to be safe, SDK build configures compiler mitigations manually.
|
|
hardeningDisable = [ "all" ];
|
|
|
|
nativeBuildInputs = [
|
|
autoconf
|
|
automake
|
|
cmake
|
|
file
|
|
git
|
|
ocaml
|
|
ocamlPackages.ocamlbuild
|
|
perl
|
|
python3
|
|
texinfo
|
|
validatePkgConfig
|
|
];
|
|
|
|
buildInputs = [
|
|
libtool
|
|
openssl
|
|
];
|
|
|
|
BINUTILS_DIR = "${binutils}/bin";
|
|
|
|
# Build external/ippcp_internal first. The Makefile is rewritten to make the
|
|
# build faster by splitting different versions of ipp-crypto builds and to
|
|
# avoid patching the Makefile for reproducibility issues.
|
|
preBuild =
|
|
let
|
|
ipp-crypto-no_mitigation = callPackage ./ipp-crypto.nix { };
|
|
|
|
sgx-asm-pp = "python ${src}/build-scripts/sgx-asm-pp.py --assembler=nasm";
|
|
|
|
nasm-load = writeShellScript "nasm-load" "${sgx-asm-pp} --MITIGATION-CVE-2020-0551=LOAD $@";
|
|
ipp-crypto-cve_2020_0551_load = callPackage ./ipp-crypto.nix {
|
|
extraCmakeFlags = [ "-DCMAKE_ASM_NASM_COMPILER=${nasm-load}" ];
|
|
};
|
|
|
|
nasm-cf = writeShellScript "nasm-cf" "${sgx-asm-pp} --MITIGATION-CVE-2020-0551=CF $@";
|
|
ipp-crypto-cve_2020_0551_cf = callPackage ./ipp-crypto.nix {
|
|
extraCmakeFlags = [ "-DCMAKE_ASM_NASM_COMPILER=${nasm-cf}" ];
|
|
};
|
|
in
|
|
''
|
|
echo "Setting up IPP crypto build artifacts"
|
|
|
|
pushd 'external/ippcp_internal'
|
|
|
|
install -D -m a+rw ${ipp-crypto-no_mitigation}/lib/intel64/libippcp.a \
|
|
lib/linux/intel64/no_mitigation/libippcp.a
|
|
install -D -m a+rw ${ipp-crypto-cve_2020_0551_load}/lib/intel64/libippcp.a \
|
|
lib/linux/intel64/cve_2020_0551_load/libippcp.a
|
|
install -D -m a+rw ${ipp-crypto-cve_2020_0551_cf}/lib/intel64/libippcp.a \
|
|
lib/linux/intel64/cve_2020_0551_cf/libippcp.a
|
|
|
|
cp -r ${ipp-crypto-no_mitigation}/include/* inc/
|
|
|
|
mkdir inc/ippcp
|
|
cp ${ipp-crypto-no_mitigation}/include/fips_cert.h inc/ippcp/
|
|
|
|
rm inc/ippcp.h
|
|
patch ${ipp-crypto-no_mitigation}/include/ippcp.h -i ./inc/ippcp21u11.patch -o ./inc/ippcp.h
|
|
|
|
install -D ${ipp-crypto-no_mitigation.src}/LICENSE license/LICENSE
|
|
|
|
popd
|
|
'';
|
|
|
|
buildFlags = [
|
|
"sdk_install_pkg"
|
|
] ++ lib.optionals debug [
|
|
"DEBUG=1"
|
|
];
|
|
|
|
postBuild = ''
|
|
patchShebangs linux/installer/bin/sgx_linux_x64_sdk_${version}.bin
|
|
'';
|
|
|
|
installPhase = ''
|
|
runHook preInstall
|
|
|
|
installDir=$TMPDIR
|
|
./linux/installer/bin/sgx_linux_x64_sdk_${version}.bin -prefix $installDir
|
|
installDir=$installDir/sgxsdk
|
|
|
|
echo "Move files created by installer"
|
|
|
|
mkdir -p $out/bin
|
|
pushd $out
|
|
|
|
mv $installDir/bin/sgx-gdb $out/bin
|
|
mkdir $out/bin/x64
|
|
for file in $installDir/bin/x64/*; do
|
|
mv $file bin/
|
|
ln -sr bin/$(basename $file) bin/x64/
|
|
done
|
|
rmdir $installDir/bin/{x64,}
|
|
|
|
# Move `lib64` to `lib` and symlink `lib64`
|
|
mv $installDir/lib64 lib
|
|
ln -s lib/ lib64
|
|
|
|
# Fixup the symlinks for libsgx_urts.so.* -> libsgx_urts.so
|
|
for file in lib/libsgx_urts.so.*; do
|
|
ln -srf lib/libsgx_urts.so $file
|
|
done
|
|
|
|
mv $installDir/include/ .
|
|
|
|
mkdir -p share/
|
|
mv $installDir/{SampleCode,licenses} share/
|
|
|
|
mkdir -p share/bin
|
|
mv $installDir/{environment,buildenv.mk} share/bin/
|
|
ln -s share/bin/{environment,buildenv.mk} .
|
|
|
|
# pkgconfig should go to lib/
|
|
mv $installDir/pkgconfig lib/
|
|
ln -s lib/pkgconfig/ .
|
|
|
|
# Also create the `sdk_libs` for compat. All the files
|
|
# link to libraries in `lib64/`, we shouldn't link the entire
|
|
# directory, however, as there seems to be some ambiguity between
|
|
# SDK and PSW libraries.
|
|
mkdir sdk_libs/
|
|
for file in $installDir/sdk_libs/*; do
|
|
ln -sr lib/$(basename $file) sdk_libs/
|
|
rm $file
|
|
done
|
|
rmdir $installDir/sdk_libs
|
|
|
|
# No uninstall script required
|
|
rm $installDir/uninstall.sh
|
|
|
|
# Create an `sgxsdk` symlink which points to `$out` for compat
|
|
ln -sr . sgxsdk
|
|
|
|
# Make sure we didn't forget any files
|
|
rmdir $installDir || (echo "Error: The directory $installDir still contains unhandled files: $(ls -A $installDir)" >&2 && exit 1)
|
|
|
|
popd
|
|
|
|
runHook postInstall
|
|
'';
|
|
|
|
preFixup = ''
|
|
echo "Strip sgxsdk prefix"
|
|
for path in "$out/share/bin/environment" "$out/bin/sgx-gdb"; do
|
|
substituteInPlace $path --replace "$TMPDIR/sgxsdk" "$out"
|
|
done
|
|
|
|
echo "Fixing pkg-config files"
|
|
sed -i "s|prefix=.*|prefix=$out|g" $out/lib/pkgconfig/*.pc
|
|
|
|
echo "Fixing SGX_SDK default in samples"
|
|
substituteInPlace $out/share/SampleCode/LocalAttestation/buildenv.mk \
|
|
--replace '/opt/intel/sgxsdk' "$out"
|
|
for file in $out/share/SampleCode/*/Makefile; do
|
|
substituteInPlace $file \
|
|
--replace '/opt/intel/sgxsdk' "$out"
|
|
done
|
|
|
|
echo "Fixing BINUTILS_DIR in buildenv.mk"
|
|
substituteInPlace $out/share/bin/buildenv.mk \
|
|
--replace 'BINUTILS_DIR ?= /usr/local/bin' \
|
|
'BINUTILS_DIR ?= ${BINUTILS_DIR}'
|
|
|
|
echo "Fixing GDB path in bin/sgx-gdb"
|
|
substituteInPlace $out/bin/sgx-gdb --replace '/usr/local/bin/gdb' '${gdb}/bin/gdb'
|
|
'';
|
|
|
|
doInstallCheck = true;
|
|
|
|
installCheckPhase = ''
|
|
runHook preInstallCheck
|
|
|
|
# Make sure all symlinks are valid
|
|
output=$(find "$out" -type l -exec test ! -e {} \; -print)
|
|
if [[ -n "$output" ]]; then
|
|
echo "Broken symlinks:"
|
|
echo "$output"
|
|
exit 1
|
|
fi
|
|
|
|
runHook postInstallCheck
|
|
'';
|
|
|
|
setupHook = writeText "setup-hook.sh" ''
|
|
sgxsdk() {
|
|
export SGX_SDK=@out@
|
|
}
|
|
|
|
postHooks+=(sgxsdk)
|
|
'';
|
|
|
|
passthru.tests = callPackage ../samples { sgxMode = "SIM"; };
|
|
|
|
# Run tests in SGX hardware mode on an SGX-enabled machine
|
|
# $(nix-build -A sgx-sdk.runTestsHW)/bin/run-tests-hw
|
|
passthru.runTestsHW =
|
|
let
|
|
testsHW = lib.filterAttrs (_: v: v ? "name") (callPackage ../samples { sgxMode = "HW"; });
|
|
testsHWLinked = linkFarmFromDrvs "sgx-samples-hw-bundle" (lib.attrValues testsHW);
|
|
in
|
|
writeShellApplication {
|
|
name = "run-tests-hw";
|
|
text = ''
|
|
for test in ${testsHWLinked}/*; do
|
|
printf '*** Running test %s ***\n\n' "$(basename "$test")"
|
|
printf 'a\n' | "$test/bin/app"
|
|
printf '\n'
|
|
done
|
|
'';
|
|
};
|
|
|
|
meta = {
|
|
description = "Intel SGX SDK for Linux built with IPP Crypto Library";
|
|
homepage = "https://github.com/intel/linux-sgx";
|
|
maintainers = with lib.maintainers; [ phlip9 sbellem arturcygan veehaitch ];
|
|
platforms = [ "x86_64-linux" ];
|
|
license = [ lib.licenses.bsd3 ];
|
|
};
|
|
}
|