inject.sh 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488
  1. # SPDX-License-Identifier: GPL-3.0-only
  2. # Copyright (c) 2022 Caleb La Grange <thonkpeasant@protonmail.com>
  3. # Copyright (c) 2022 Ferass El Hafidi <vitali64pmemail@protonmail.com>
  4. # Copyright (c) 2023-2025 Leah Rowe <leah@libreboot.org>
  5. e6400_unpack="$xbmkpwd/src/bios_extract/dell_inspiron_1100_unpacker.py"
  6. me7updateparser="$xbmkpwd/util/me7_update_parser/me7_update_parser.py"
  7. pfs_extract="$xbmkpwd/src/biosutilities/Dell_PFS_Extract.py"
  8. uefiextract="$xbmkpwd/elf/uefitool/uefiextract"
  9. vendir="vendorfiles"
  10. appdir="$vendir/app"
  11. cbcfgsdir="config/coreboot"
  12. hashfiles="vendorhashes blobhashes" # blobhashes for backwards compatibility
  13. dontflash="!!! AN ERROR OCCURED! Please DO NOT flash if injection failed. !!!"
  14. vfix="DO_NOT_FLASH_YET._FIRST,_INJECT_FILES_VIA_INSTRUCTIONS_ON_LIBREBOOT.ORG_"
  15. tmpromdel="$xbmklocal/DO_NOT_FLASH"
  16. nvm="util/nvmutil/nvm"
  17. ifdtool="elf/ifdtool/default/ifdtool"
  18. cvchk="CONFIG_HAVE_MRC CONFIG_HAVE_ME_BIN CONFIG_KBC1126_FIRMWARE \
  19. CONFIG_VGA_BIOS_FILE CONFIG_INCLUDE_SMSC_SCH5545_EC_FW \
  20. CONFIG_LENOVO_TBFW_BIN CONFIG_FSP_M_FILE CONFIG_FSP_S_FILE"
  21. cv="CONFIG_ME_BIN_PATH CONFIG_SMSC_SCH5545_EC_FW_FILE CONFIG_KBC1126_FW1 \
  22. CONFIG_KBC1126_FW2 CONFIG_KBC1126_FW1_OFFSET CONFIG_KBC1126_FW2_OFFSET \
  23. CONFIG_VGA_BIOS_ID CONFIG_BOARD_DELL_E6400 CONFIG_FSP_S_CBFS \
  24. CONFIG_HAVE_REFCODE_BLOB CONFIG_REFCODE_BLOB_FILE CONFIG_GBE_BIN_PATH \
  25. CONFIG_IFD_BIN_PATH CONFIG_FSP_FD_PATH CONFIG_MRC_FILE CONFIG_FSP_M_CBFS \
  26. CONFIG_FSP_USE_REPO CONFIG_FSP_FULL_FD $cvchk"
  27. eval "`setvars "" has_hashes EC_hash DL_hash DL_url_bkup MRC_refcode_gbe vcfg \
  28. E6400_VGA_DL_hash E6400_VGA_DL_url E6400_VGA_DL_url_bkup E6400_VGA_offset \
  29. E6400_VGA_romname SCH5545EC_DL_url_bkup SCH5545EC_DL_hash _dest tree \
  30. mecleaner kbc1126_ec_dump MRC_refcode_cbtree new_mac _dl SCH5545EC_DL_url \
  31. archive EC_url boarddir rom cbdir DL_url nukemode cbfstoolref FSPFD_hash \
  32. _7ztest ME11bootguard ME11delta ME11version ME11sku ME11pch tmpromdir \
  33. IFD_platform ifdprefix _me _metmp mfs TBFW_url_bkup TBFW_url \
  34. TBFW_hash TBFW_size hashfile xromsize xchanged EC_url_bkup need_files \
  35. vfile cbcfg $cv`"
  36. download()
  37. {
  38. [ $# -gt 0 ] || err "No argument given"
  39. export PATH="$PATH:/sbin"
  40. board="$1" && readcfg && readkconfig && bootstrap && getfiles; :
  41. }
  42. readkconfig()
  43. {
  44. x_ rm -f "$xbmktmp/cbcfg"
  45. fx_ scankconfig x_ find "$boarddir/config" -type f
  46. eval "`setcfg "$xbmktmp/cbcfg" 1`"
  47. for c in $cvchk; do
  48. eval "[ \"\${$c}\" = \"/dev/null\" ] && continue"
  49. eval "[ -z \"\${$c}\" ] && continue"
  50. eval "`setcfg "$vfile"`"
  51. return 0
  52. done
  53. return 1
  54. }
  55. scankconfig()
  56. {
  57. for cbc in $cv; do
  58. grep "$cbc" "$1" 1>>"$xbmktmp/cbcfg" 2>/dev/null || :
  59. done
  60. }
  61. bootstrap()
  62. {
  63. x_ ./mk -f coreboot ${cbdir##*/}
  64. mk -b uefitool biosutilities bios_extract
  65. [ -d "${kbc1126_ec_dump%/*}" ] && x_ make -C "$cbdir/util/kbc1126"
  66. [ -n "$MRC_refcode_cbtree" ] && \
  67. cbfstoolref="elf/cbfstool/$MRC_refcode_cbtree/cbfstool" && \
  68. x_ ./mk -d coreboot "$MRC_refcode_cbtree"; :
  69. }
  70. getfiles()
  71. {
  72. [ -z "$CONFIG_HAVE_ME_BIN" ] || fetch intel_me "$DL_url" \
  73. "$DL_url_bkup" "$DL_hash" "$CONFIG_ME_BIN_PATH"
  74. [ -z "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" ] || fetch sch5545ec \
  75. "$SCH5545EC_DL_url" "$SCH5545EC_DL_url_bkup" "$SCH5545EC_DL_hash" \
  76. "$CONFIG_SMSC_SCH5545_EC_FW_FILE"
  77. [ -z "$CONFIG_KBC1126_FIRMWARE" ] || fetch kbc1126ec "$EC_url" \
  78. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW1"
  79. [ -z "$CONFIG_VGA_BIOS_FILE" ] || fetch e6400vga "$E6400_VGA_DL_url" \
  80. "$E6400_VGA_DL_url_bkup" "$E6400_VGA_DL_hash" "$CONFIG_VGA_BIOS_FILE"
  81. [ -z "$CONFIG_HAVE_MRC" ] || fetch "mrc" "$MRC_url" "$MRC_url_bkup" \
  82. "$MRC_hash" "$CONFIG_MRC_FILE"
  83. [ -n "$CONFIG_REFCODE_BLOB_FILE" ] && fetch "refcode" "$MRC_url" \
  84. "$MRC_url_bkup" "$MRC_hash" "$CONFIG_REFCODE_BLOB_FILE"
  85. [ -z "$CONFIG_LENOVO_TBFW_BIN" ] || fetch "tbfw" "$TBFW_url" \
  86. "$TBFW_url_bkup" "$TBFW_hash" "$CONFIG_LENOVO_TBFW_BIN"
  87. [ -z "$CONFIG_FSP_M_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  88. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_M_FILE" copy
  89. [ -z "$CONFIG_FSP_S_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  90. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_S_FILE" copy; :
  91. }
  92. fetch()
  93. {
  94. dl_type="$1"
  95. dl="$2"
  96. dl_bkup="$3"
  97. dlsum="$4"
  98. _dest="${5##*../}"
  99. [ "$5" = "/dev/null" ] && return 0
  100. _dl="$XBMK_CACHE/file/$dlsum"
  101. # HACK: if grabbing fsp from coreboot, fix the path for lbmk
  102. [ "$dl_type" = "fsp" ] && for _cdl in dl dl_bkup; do
  103. eval "$_cdl=\"\${$_cdl##*../}\"; _cdp=\"\$$_cdl\""
  104. [ -f "$_cdp" ] || _cdp="$cbdir/$_cdp"
  105. [ -f "$_cdp" ] && eval "$_cdl=\"$_cdp\""
  106. done; :
  107. dlop="curl" && [ $# -gt 5 ] && dlop="$6"
  108. xbmkget "$dl" "$dl_bkup" "$_dl" "$dlsum" "$dlop"
  109. rm -Rf "${_dl}_extracted" || err "!rm ${_ul}_extracted. $dontflash"
  110. e "$_dest" f && return 0
  111. x_ mkdir -p "${_dest%/*}"
  112. remkdir "$appdir"
  113. [ "$dl_type" = "fsp" ] || extract_archive "$_dl" "$appdir" || \
  114. [ "$dl_type" = "e6400vga" ] || err "$_dest $dl_type: !extract"
  115. x_ extract_$dl_type "$_dl" "$appdir"
  116. set -u -e
  117. e "$_dest" f missing && err "!extract_$dl_type. $dontflash"; :
  118. }
  119. extract_intel_me()
  120. {
  121. e "$mecleaner" f not && err "$cbdir: me_cleaner missing. $dontflash"
  122. _7ztest="$xbmklocal/metmp/a"
  123. _me="$xbmkpwd/$_dest"
  124. _metmp="$xbmklocal/me.bin"
  125. x_ rm -f "$_metmp" "$xbmklocal/a"
  126. mfs="" && [ "$ME11bootguard" = "y" ] && mfs="--whitelist MFS" && \
  127. chkvars ME11delta ME11version ME11sku ME11pch
  128. [ "$ME11bootguard" = "y" ] && x_ ./mk -f deguard
  129. set +u +e && fx_ find_me x_ find "$xbmkpwd/$appdir" -type f
  130. [ "$ME11bootguard" != "y" ] && x_ mv "$_metmp" "$_me" && return 0
  131. (
  132. x_ cd src/deguard/
  133. x_ ./finalimage.py --delta "data/delta/$ME11delta" --version \
  134. "$ME11version" --pch "$ME11pch" --sku "$ME11sku" \
  135. --fake-fpfs data/fpfs/zero --input "$_metmp" --output "$_me"
  136. ) || err "Error running deguard for $_me - $dontflash"; :
  137. }
  138. find_me()
  139. {
  140. e "$_metmp" f && x_ rm -Rf "$xbmklocal/metmp" && return 1
  141. [ -L "$1" ] && return 0
  142. _7ztest="${_7ztest}a" && _r="-r" && [ -n "$mfs" ] && _r=""
  143. "$mecleaner" $mfs $_r -t -O "$xbmklocal/a" -M "$_metmp" "$1" || \
  144. "$mecleaner" $mfs $_r -t -O "$_metmp" "$1" || "$me7updateparser" \
  145. -O "$_metmp" "$1" || extract_archive "$1" "$_7ztest" || return 0
  146. fx_ find_me x_ find "$_7ztest" -type f || return 1; :
  147. }
  148. extract_archive()
  149. {
  150. innoextract "$1" -d "$2" || python "$pfs_extract" "$1" -e || 7z x \
  151. "$1" -o"$2" || unar "$1" -o "$2" || unzip "$1" -d "$2" || return 1
  152. [ ! -d "${_dl}_extracted" ] || x_ cp -R "${_dl}_extracted" "$2"; :
  153. }
  154. extract_kbc1126ec()
  155. {
  156. (
  157. x_ cd "$appdir/"
  158. mv Rompaq/68*.BIN ec.bin || unar -D ROM.CAB Rom.bin || unar -D \
  159. Rom.CAB Rom.bin || unar -D 68*.CAB Rom.bin || err "!kbc1126 unar"
  160. [ -f "ec.bin" ] || x_ mv Rom.bin ec.bin
  161. x_ e ec.bin f && x_ "$kbc1126_ec_dump" ec.bin
  162. ) || err "$board: can't extract kbc1126 ec firmware - $dontflash"
  163. x_ e "$appdir/ec.bin.fw1" f && x_ e "$appdir/ec.bin.fw2" f
  164. x_ cp "$appdir/"ec.bin.fw* "${_dest%/*}/"
  165. }
  166. extract_e6400vga()
  167. {
  168. set +u +e
  169. chkvars E6400_VGA_offset E6400_VGA_romname
  170. tail -c +$E6400_VGA_offset "$_dl" | gunzip > "$appdir/bios.bin" || :
  171. (
  172. x_ cd "$appdir"
  173. x_ e "bios.bin" f
  174. "$e6400_unpack" bios.bin || printf "TODO: fix dell extract util\n"
  175. ) || err "can't extract e6400 vga rom - $dontflosh"
  176. x_ cp "$appdir/$E6400_VGA_romname" "$_dest"
  177. }
  178. extract_sch5545ec()
  179. {
  180. # full system ROM (UEFI), to extract with UEFIExtract:
  181. _bios="${_dl}_extracted/Firmware/1 $dlsum -- 1 System BIOS vA.28.bin"
  182. # this is the SCH5545 firmware, inside of the extracted UEFI ROM:
  183. _sch5545ec_fw="$_bios.dump/4 7A9354D9-0468-444A-81CE-0BF617D890DF"
  184. _sch5545ec_fw="$_sch5545ec_fw/54 D386BEB8-4B54-4E69-94F5-06091F67E0D3"
  185. _sch5545ec_fw="$_sch5545ec_fw/0 Raw section/body.bin" # <-- this!
  186. "$uefiextract" "$_bios" || err "sch5545 !extract - $dontflash"
  187. x_ cp "$_sch5545ec_fw" "$_dest"
  188. }
  189. # Lenovo ThunderBolt firmware updates:
  190. # https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/thinkpad-t-series-laptops/thinkpad-t480-type-20l5-20l6/20l5/solutions/ht508988
  191. extract_tbfw()
  192. {
  193. chkvars TBFW_size; fx_ copytb x_ find "$appdir" -type f -name "TBT.bin"
  194. }
  195. copytb()
  196. {
  197. [ -f "$1" ] && [ ! -L "$1" ] && x_ dd if=/dev/null of="$1" bs=1 \
  198. seek=$TBFW_size && x_ mv "$1" "$_dest" && return 1; :
  199. }
  200. extract_fsp()
  201. {
  202. x_ python "$cbdir/3rdparty/fsp/Tools/SplitFspBin.py" split -f "$1" \
  203. -o "${_dest%/*}" -n "Fsp.fd"
  204. }
  205. inject()
  206. {
  207. need_files="n"
  208. remkdir "$tmpromdel"
  209. set +u +e
  210. [ $# -lt 1 ] && err "No options specified. - $dontflash"
  211. eval "`setvars "" nukemode new_mac xchanged`"
  212. archive="$1";
  213. new_mac="xx:xx:xx:xx:xx:xx"
  214. [ $# -gt 1 ] && case "$2" in
  215. nuke)
  216. new_mac=""
  217. nukemode="nuke" ;;
  218. setmac)
  219. [ $# -gt 2 ] && new_mac="$3" && \
  220. [ -z "$new_mac" ] && err "Empty MAC address specified" ;;
  221. *) err "Unrecognised inject mode: '$2'"
  222. esac
  223. [ "$new_mac" = "keep" ] && new_mac=""
  224. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  225. x_ make -C util/nvmutil clean && x_ make -C util/nvmutil
  226. check_release "$archive" || err "'$archive' is not a release archive"
  227. readcfg && need_files="y"
  228. if [ "$need_files" = "y" ] || [ -n "$new_mac" ]; then
  229. [ "$nukemode" != "nuke" ] && [ "$need_files" = "y" ] && \
  230. x_ ./mk download "$board"
  231. patch_release_roms
  232. fi
  233. xtype="patched" && [ "$nukemode" = "nuke" ] && xtype="nuked"
  234. [ "$xchanged" != "y" ] && printf "\n'%s' *NOT* modified.\n" "$archive"
  235. [ "$xchanged" = "y" ] && printf "\n'%s' %s.\n" "$archive" "$xtype"; :
  236. }
  237. check_release()
  238. {
  239. [ -L "$archive" ] && err "'$archive' is a symlink. $dontflash"
  240. e "$archive" f missing && return 1
  241. archivename="`basename "$archive"`"
  242. [ -z "$archivename" ] && err "Can't determine archive name. $dontflash"
  243. case "$archivename" in
  244. *_src.tar.xz)
  245. err "'$archive' is a src archive, silly!" ;;
  246. grub_*|seagrub_*|custom_*|seauboot_*|seabios_withgrub_*)
  247. return 1 ;;
  248. *.tar.xz) _stripped_prefix="${archivename#*_}"
  249. board="${_stripped_prefix%.tar.xz}" ;;
  250. *) err "'$archive': could not detect board type - $dontflash"
  251. esac; :
  252. }
  253. readcfg()
  254. {
  255. if [ "$board" = "serprog_rp2040" ] || [ "$board" = "serprog_stm32" ] \
  256. || [ "$board" = "serprog_pico" ]; then
  257. return 1
  258. fi
  259. boarddir="$cbcfgsdir/$board"
  260. eval "`setcfg "$boarddir/target.cfg"`"
  261. chkvars tree && x_ ./mk -d coreboot "$tree"
  262. [ -z "$vcfg" ] && return 1
  263. vfile="config/vendor/$vcfg/pkg.cfg"
  264. [ -L "$vfile" ] && err "'$archive', '$board': $vfile is a symlink"
  265. [ -f "$vfile" ] || err "'$archive', '$board': $vfile doesn't exist"
  266. cbdir="src/coreboot/$tree"
  267. cbfstool="elf/cbfstool/$tree/cbfstool"
  268. rmodtool="elf/cbfstool/$tree/rmodtool"
  269. mecleaner="$xbmkpwd/$cbdir/util/me_cleaner/me_cleaner.py"
  270. kbc1126_ec_dump="$xbmkpwd/$cbdir/util/kbc1126/kbc1126_ec_dump"
  271. cbfstool="elf/cbfstool/$tree/cbfstool"
  272. ifdtool="elf/ifdtool/$tree/ifdtool"
  273. [ -n "$IFD_platform" ] && ifdprefix="-p $IFD_platform"; :
  274. }
  275. patch_release_roms()
  276. {
  277. has_hashes="n"
  278. tmpromdir="$xbmklocal/DO_NOT_FLASH/bin/$board"
  279. remkdir "${tmpromdir%"/bin/$board"}"
  280. x_ tar -xf "$archive" -C "${tmpromdir%"/bin/$board"}"
  281. for _hashes in $hashfiles; do
  282. [ "$need_files" = "y" ] && e "$tmpromdir/$_hashes" f && \
  283. has_hashes="y" && hashfile="$_hashes" && break; :
  284. done
  285. readkconfig || exit 0; [ "$need_files" = "n" ] || \
  286. fx_ prep x_ find "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  287. (
  288. cd "$tmpromdir" || err "patch '$archive': can't cd $tmpromdir"
  289. # NOTE: For compatibility with older rom releases, defer to sha1
  290. if [ "$has_hashes" = "y" ] && [ "$nukemode" != "nuke" ]; then
  291. sha512sum --status -c "$hashfile" || \
  292. x_ sha1sum --status -c "$hashfile"
  293. x_ rm -f "$hashfile"
  294. fi
  295. ) || err "'$archive' -> Can't verify vendor hashes. $dontflash"
  296. [ -z "$new_mac" ] || [ -z "$CONFIG_GBE_BIN_PATH" ] || modify_mac
  297. [ "$xchanged" = "y" ] || rm -Rf "$tmpromdel" || :
  298. [ "$xchanged" = "y" ] || return 0
  299. (
  300. x_ cd "${tmpromdir%"/bin/$board"}"
  301. mkrom_tarball "bin/$board"
  302. ) || err "Cannot re-generate '$archive' - $dontflash"
  303. mv "${tmpromdir%"/bin/$board"}/bin/${relname}_${board}.tar.xz" \
  304. "$archive" || err "'$archive' -> Can't overwrite - $dontflash"; :
  305. }
  306. prep()
  307. {
  308. _xrom="$1"
  309. _xromname="${1##*/}"
  310. _xromnew="${_xrom%/*}/${_xromname#"$vfix"}"
  311. [ "$nukemode" = "nuke" ] && _xromnew="${_xrom%/*}/$vfix${_xrom##*/}"
  312. e "$_xrom" f missing && return 0
  313. [ -z "${_xromname#"$vfix"}" ] && err "$_xromname / $vfix: name match"
  314. # Remove the prefix and 1-byte pad
  315. if [ "$nukemode" != "nuke" ] && \
  316. [ "${_xromname#"$vfix"}" != "$_xromname" ]; then
  317. xromsize="$(expr $(stat -c '%s' "$_xrom") - 1)" || err "!int"
  318. [ $xromsize -lt 524288 ] && err "too small, $xromsize: $_xrom"
  319. x_ dd if="$_xrom" of="$_xromnew" bs=$xromsize count=1
  320. rm -f "$_xrom" || err "Can't rm $_xrom - $dontflash"
  321. _xrom="$_xromnew"
  322. fi
  323. [ "$nukemode" = "nuke" ] && mksha512sum "$_xrom" "vendorhashes"
  324. patch_rom "$_xrom" || return 1 # if break return, can still change MAC
  325. [ "$nukemode" != "nuke" ] && return 0
  326. # Rename the file, prefixing a warning saying not to flash
  327. cat "$_xrom" config/data/coreboot/0 > "$_xromnew" || err "!pad $_xrom"
  328. x_ rm -f "$_xrom"
  329. }
  330. patch_rom()
  331. {
  332. rom="$1"
  333. if [ "$has_hashes" != "y" ] && [ "$nukemode" != "nuke" ]; then
  334. printf "'%s' has no hash file. Skipping.\n" "$archive" 1>&2
  335. return 1
  336. elif [ "$has_hashes" = "y" ] && [ "$nukemode" = "nuke" ]; then
  337. printf "'%s' has a hash file. Skipping nuke.\n" "$archive" 1>&2
  338. return 1
  339. fi
  340. [ -n "$CONFIG_HAVE_REFCODE_BLOB" ] && insert "fallback/refcode" \
  341. "$CONFIG_REFCODE_BLOB_FILE" "stage"
  342. [ "$CONFIG_HAVE_MRC" = "y" ] && insert "mrc.bin" "$CONFIG_MRC_FILE" \
  343. "mrc" "0xfffa0000"
  344. [ "$CONFIG_HAVE_ME_BIN" = "y" ] && insert IFD "$CONFIG_ME_BIN_PATH" me
  345. [ "$CONFIG_KBC1126_FIRMWARE" = "y" ] && insert ecfw1.bin \
  346. "$CONFIG_KBC1126_FW1" raw "$CONFIG_KBC1126_FW1_OFFSET" && insert \
  347. ecfw2.bin "$CONFIG_KBC1126_FW2" raw "$CONFIG_KBC1126_FW2_OFFSET"
  348. [ -n "$CONFIG_VGA_BIOS_FILE" ] && [ -n "$CONFIG_VGA_BIOS_ID" ] && \
  349. insert "pci$CONFIG_VGA_BIOS_ID.rom" "$CONFIG_VGA_BIOS_FILE" optionrom
  350. [ "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" = "y" ] && \
  351. [ -n "$CONFIG_SMSC_SCH5545_EC_FW_FILE" ] && \
  352. insert sch5545_ecfw.bin "$CONFIG_SMSC_SCH5545_EC_FW_FILE" raw
  353. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  354. [ -n "$CONFIG_FSP_M_FILE" ] && \
  355. insert "$CONFIG_FSP_M_CBFS" "$CONFIG_FSP_M_FILE" fsp --xip
  356. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  357. [ -n "$CONFIG_FSP_S_FILE" ] && \
  358. insert "$CONFIG_FSP_S_CBFS" "$CONFIG_FSP_S_FILE" fsp
  359. printf "ROM image successfully patched: %s\n" "$rom"
  360. xchanged="y"
  361. }
  362. insert()
  363. {
  364. [ "$2" = "/dev/null" ] && return 0
  365. cbfsname="$1"
  366. _dest="${2##*../}"
  367. _t="$3"
  368. _offset=""
  369. if [ "$_t" = "fsp" ] && [ $# -gt 3 ]; then
  370. _offset="$4"
  371. elif [ $# -gt 3 ] && _offset="-b $4" && [ -z "$4" ]; then
  372. err "insert $*, $rom: offset given but empty (undefined)"
  373. fi
  374. [ "$nukemode" = "nuke" ] || x_ e "$_dest" f
  375. if [ "$cbfsname" = "IFD" ]; then
  376. [ "$nukemode" = "nuke" ] || "$ifdtool" $ifdprefix -i \
  377. $_t:$_dest "$rom" -O "$rom" || \
  378. err "failed: insert '$_t' '$_dest' on '$rom'"
  379. [ "$nukemode" != "nuke" ] || "$ifdtool" $ifdprefix --nuke $_t \
  380. "$rom" -O "$rom" || err "$rom: !nuke IFD/$_t"
  381. elif [ "$nukemode" = "nuke" ]; then
  382. x_ "$cbfstool" "$rom" remove -n "$cbfsname"
  383. elif [ "$_t" = "stage" ]; then # the only stage we handle is refcode
  384. x_ rm -f "$xbmklocal/refcode"
  385. "$rmodtool" -i "$_dest" -o "$xbmklocal/refcode" || "!reloc ref"
  386. "$cbfstool" "$rom" add-stage -f "$xbmklocal/refcode" \
  387. -n "$cbfsname" -t stage || err "$rom: !add ref"
  388. else
  389. "$cbfstool" "$rom" add -f "$_dest" -n "$cbfsname" \
  390. -t $_t $_offset || err "$rom !add $_t ($_dest)"
  391. fi
  392. xchanged="y"; :
  393. }
  394. modify_mac()
  395. {
  396. x_ cp "${CONFIG_GBE_BIN_PATH##*../}" "$xbmklocal/gbe"
  397. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  398. x_ "$nvm" "$xbmklocal/gbe" setmac "$new_mac"
  399. fx_ newmac x_ find "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  400. }
  401. newmac()
  402. {
  403. e "$1" f && xchanged="y" && x_ \
  404. "$ifdtool" $ifdprefix -i GbE:"$xbmklocal/gbe" "$1" -O "$1"; :
  405. }