inject.sh 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556
  1. # SPDX-License-Identifier: GPL-3.0-only
  2. # Copyright (c) 2022 Caleb La Grange <thonkpeasant@protonmail.com>
  3. # Copyright (c) 2022 Ferass El Hafidi <vitali64pmemail@protonmail.com>
  4. # Copyright (c) 2023-2025 Leah Rowe <leah@libreboot.org>
  5. e6400_unpack="$xbmkpwd/src/bios_extract/dell_inspiron_1100_unpacker.py"
  6. me7updateparser="$xbmkpwd/util/me7_update_parser/me7_update_parser.py"
  7. pfs_extract="$xbmkpwd/src/biosutilities/Dell_PFS_Extract.py"
  8. uefiextract="$xbmkpwd/elf/uefitool/uefiextract"
  9. vendir="vendorfiles"
  10. appdir="$vendir/app"
  11. cbcfgsdir="config/coreboot"
  12. hashfiles="vendorhashes blobhashes" # blobhashes for backwards compatibility
  13. dontflash="!!! AN ERROR OCCURED! Please DO NOT flash if injection failed. !!!"
  14. vfix="DO_NOT_FLASH_YET._FIRST,_INJECT_FILES_VIA_INSTRUCTIONS_ON_LIBREBOOT.ORG_"
  15. vguide="https://libreboot.org/docs/install/ivy_has_common.html"
  16. tmpromdel="$xbmklocal/DO_NOT_FLASH"
  17. nvm="util/nvmutil/nvm"
  18. ifdtool="elf/ifdtool/default/ifdtool"
  19. cvchk="CONFIG_HAVE_MRC CONFIG_HAVE_ME_BIN CONFIG_KBC1126_FIRMWARE \
  20. CONFIG_VGA_BIOS_FILE CONFIG_INCLUDE_SMSC_SCH5545_EC_FW \
  21. CONFIG_LENOVO_TBFW_BIN CONFIG_FSP_M_FILE CONFIG_FSP_S_FILE"
  22. cv="CONFIG_ME_BIN_PATH CONFIG_SMSC_SCH5545_EC_FW_FILE CONFIG_KBC1126_FW1 \
  23. CONFIG_KBC1126_FW2 CONFIG_KBC1126_FW1_OFFSET CONFIG_KBC1126_FW2_OFFSET \
  24. CONFIG_VGA_BIOS_ID CONFIG_BOARD_DELL_E6400 CONFIG_FSP_S_CBFS \
  25. CONFIG_HAVE_REFCODE_BLOB CONFIG_REFCODE_BLOB_FILE CONFIG_GBE_BIN_PATH \
  26. CONFIG_IFD_BIN_PATH CONFIG_FSP_FD_PATH CONFIG_MRC_FILE CONFIG_FSP_M_CBFS \
  27. CONFIG_FSP_USE_REPO CONFIG_FSP_FULL_FD $cvchk"
  28. eval "`setvars "" has_hashes EC_hash DL_hash DL_url_bkup MRC_refcode_gbe vcfg \
  29. E6400_VGA_DL_hash E6400_VGA_DL_url E6400_VGA_DL_url_bkup E6400_VGA_offset \
  30. E6400_VGA_romname SCH5545EC_DL_url_bkup SCH5545EC_DL_hash _dest tree \
  31. mecleaner kbc1126_ec_dump MRC_refcode_cbtree new_mac _dl SCH5545EC_DL_url \
  32. archive EC_url boarddir rom cbdir DL_url nukemode cbfstoolref FSPFD_hash \
  33. _7ztest ME11bootguard ME11delta ME11version ME11sku ME11pch tmpromdir \
  34. IFD_platform ifdprefix cdir sdir _me _metmp mfs TBFW_url_bkup TBFW_url \
  35. TBFW_hash TBFW_size hashfile xromsize xchanged EC_url_bkup need_files \
  36. vfile cbcfg $cv`"
  37. download()
  38. {
  39. [ $# -gt 0 ] || $err "No argument given"
  40. export PATH="$PATH:/sbin"
  41. board="$1" && readcfg && readkconfig && bootstrap && getfiles; :
  42. }
  43. readkconfig()
  44. {
  45. x_ rm -f "$xbmktmp/cbcfg"
  46. cbcfg="`check_defconfig "$boarddir"`" || for cbc in $cv; do
  47. grep "$cbc" "$cbcfg" 1>>"$xbmktmp/cbcfg" 2>/dev/null || :
  48. done
  49. eval "`setcfg "$xbmktmp/cbcfg" 1`"
  50. for c in $cvchk; do
  51. eval "[ \"\${$c}\" = \"/dev/null\" ] && continue"
  52. eval "[ -z \"\${$c}\" ] && continue"
  53. eval "`setcfg "$vfile"`"
  54. return 0
  55. done
  56. return 1
  57. }
  58. bootstrap()
  59. {
  60. x_ ./mk -f coreboot ${cbdir##*/}
  61. mk -b uefitool biosutilities bios_extract
  62. [ -d "${kbc1126_ec_dump%/*}" ] && x_ make -C "$cbdir/util/kbc1126"
  63. [ -n "$MRC_refcode_cbtree" ] && \
  64. cbfstoolref="elf/cbfstool/$MRC_refcode_cbtree/cbfstool" && \
  65. x_ ./mk -d coreboot "$MRC_refcode_cbtree"; :
  66. }
  67. getfiles()
  68. {
  69. [ -z "$CONFIG_HAVE_ME_BIN" ] || fetch intel_me "$DL_url" \
  70. "$DL_url_bkup" "$DL_hash" "$CONFIG_ME_BIN_PATH"
  71. [ -z "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" ] || fetch sch5545ec \
  72. "$SCH5545EC_DL_url" "$SCH5545EC_DL_url_bkup" "$SCH5545EC_DL_hash" \
  73. "$CONFIG_SMSC_SCH5545_EC_FW_FILE"
  74. [ -z "$CONFIG_KBC1126_FIRMWARE" ] || fetch kbc1126ec "$EC_url" \
  75. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW1"
  76. [ -z "$CONFIG_VGA_BIOS_FILE" ] || fetch e6400vga "$E6400_VGA_DL_url" \
  77. "$E6400_VGA_DL_url_bkup" "$E6400_VGA_DL_hash" "$CONFIG_VGA_BIOS_FILE"
  78. [ -z "$CONFIG_HAVE_MRC" ] || fetch "mrc" "$MRC_url" "$MRC_url_bkup" \
  79. "$MRC_hash" "$CONFIG_MRC_FILE"
  80. [ -n "$CONFIG_REFCODE_BLOB_FILE" ] && fetch "refcode" "$MRC_url" \
  81. "$MRC_url_bkup" "$MRC_hash" "$CONFIG_REFCODE_BLOB_FILE"
  82. [ -z "$CONFIG_LENOVO_TBFW_BIN" ] || fetch "tbfw" "$TBFW_url" \
  83. "$TBFW_url_bkup" "$TBFW_hash" "$CONFIG_LENOVO_TBFW_BIN"
  84. #
  85. # in the future, we might have libre fsp-s and then fsp-m.
  86. # therefore, handle them separately, in case one of them is libre; if
  87. # one of them was, the path wouldn't be set.
  88. #
  89. [ -z "$CONFIG_FSP_M_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  90. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_M_FILE" copy
  91. [ -z "$CONFIG_FSP_S_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  92. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_S_FILE" copy; :
  93. }
  94. fetch()
  95. {
  96. dl_type="$1"
  97. dl="$2"
  98. dl_bkup="$3"
  99. dlsum="$4"
  100. _dest="${5##*../}"
  101. [ "$5" = "/dev/null" ] && return 0
  102. _dl="$XBMK_CACHE/file/$dlsum"
  103. # HACK: if grabbing fsp from coreboot, fix the path for lbmk
  104. [ "$dl_type" = "fsp" ] && for _cdl in dl dl_bkup; do
  105. eval "$_cdl=\"\${$_cdl##*../}\"; _cdp=\"\$$_cdl\""
  106. [ -f "$_cdp" ] || _cdp="$cbdir/$_cdp"
  107. [ -f "$_cdp" ] && eval "$_cdl=\"$_cdp\""
  108. done; :
  109. dlop="curl" && [ $# -gt 5 ] && dlop="$6"
  110. xbmkget "$dl" "$dl_bkup" "$_dl" "$dlsum" "$dlop"
  111. rm -Rf "${_dl}_extracted" || $err "!rm ${_ul}_extracted. $dontflash"
  112. e "$_dest" f && return 0
  113. x_ mkdir -p "${_dest%/*}"
  114. remkdir "$appdir"
  115. extract_archive "$_dl" "$appdir" "$dl_type" || \
  116. [ "$dl_type" = "e6400vga" ] || $err "$_dest $dl_type: !extract"
  117. eval "extract_$dl_type"
  118. set -u -e
  119. e "$_dest" f missing && $err "!extract_$dl_type. $dontflash"; :
  120. }
  121. extract_intel_me()
  122. {
  123. e "$mecleaner" f not && $err "$cbdir: me_cleaner missing. $dontflash"
  124. cdir="$xbmkpwd/$appdir"
  125. _me="$xbmkpwd/$_dest"
  126. _metmp="$xbmklocal/me.bin"
  127. mfs="" && [ "$ME11bootguard" = "y" ] && mfs="--whitelist MFS" && \
  128. chkvars ME11delta ME11version ME11sku ME11pch
  129. [ "$ME11bootguard" = "y" ] && x_ ./mk -f deguard
  130. extract_intel_me_bruteforce
  131. if [ "$ME11bootguard" = "y" ]; then
  132. apply_me11_deguard_mod
  133. else
  134. mv "$_metmp" "$_me" || $err "!mv $_metmp $_me - $dontflash"
  135. fi
  136. }
  137. extract_intel_me_bruteforce()
  138. {
  139. [ $# -gt 0 ] && cdir="$1"
  140. e "$_metmp" f && return 0
  141. [ -z "$sdir" ] && sdir="$(mktemp -d)"
  142. x_ mkdir -p "$sdir"
  143. set +u +e
  144. (
  145. [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  146. cd "$cdir" || $err "extract_intel_me: !cd \"$cdir\" - $dontflash"
  147. for i in *; do
  148. e "$_metmp" f && break
  149. [ -L "$i" ] && continue
  150. if [ -f "$i" ]; then
  151. _r="-r" && [ -n "$mfs" ] && _r=""
  152. "$mecleaner" $mfs $_r -t -O "$sdir/vendorfile" \
  153. -M "$_metmp" "$i" && break
  154. "$mecleaner" $mfs $_r -t -O "$_metmp" "$i" && break
  155. "$me7updateparser" -O "$_metmp" "$i" && break
  156. _7ztest="${_7ztest}a"
  157. extract_archive "$i" "$_7ztest" || continue
  158. extract_intel_me_bruteforce "$cdir/$_7ztest"
  159. elif [ -d "$i" ]; then
  160. extract_intel_me_bruteforce "$cdir/$i"
  161. else
  162. continue
  163. fi
  164. cdir="$1"; [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  165. cd "$cdir" || :
  166. done
  167. ) || :
  168. rm -Rf "$sdir" || $err "extract_intel_me: !rm -Rf $sdir - $dontflash"
  169. }
  170. apply_me11_deguard_mod()
  171. {
  172. (
  173. x_ cd src/deguard/
  174. x_ ./finalimage.py --delta "data/delta/$ME11delta" \
  175. --version "$ME11version" \
  176. --pch "$ME11pch" --sku "$ME11sku" --fake-fpfs data/fpfs/zero \
  177. --input "$_metmp" --output "$_me"
  178. ) || $err "Error running deguard for $_me - $dontflash"
  179. }
  180. extract_archive()
  181. {
  182. [ $# -gt 2 ] && [ "$3" = "fsp" ] && x_ python \
  183. "$cbdir/3rdparty/fsp/Tools/SplitFspBin.py" split -f "$1" -o "$2" \
  184. -n "Fsp.fd" && return 0
  185. innoextract "$1" -d "$2" || python "$pfs_extract" "$1" -e || 7z x \
  186. "$1" -o"$2" || unar "$1" -o "$2" || unzip "$1" -d "$2" || return 1
  187. [ ! -d "${_dl}_extracted" ] || x_ cp -R "${_dl}_extracted" "$2"; :
  188. }
  189. extract_kbc1126ec()
  190. {
  191. x_ e "$kbc1126_ec_dump" f
  192. (
  193. x_ cd "$appdir/"
  194. mv Rompaq/68*.BIN ec.bin || :
  195. if [ ! -f "ec.bin" ]; then
  196. unar -D ROM.CAB Rom.bin || unar -D Rom.CAB Rom.bin || \
  197. unar -D 68*.CAB Rom.bin || $err "kbc1126 unar failed"
  198. x_ mv Rom.bin ec.bin
  199. fi
  200. x_ e ec.bin f && x_ "$kbc1126_ec_dump" ec.bin
  201. ) || $err "$board: can't extract kbc1126 ec firmware - $dontflash"
  202. x_ e "$appdir/ec.bin.fw1" f && x_ e "$appdir/ec.bin.fw2" f
  203. x_ cp "$appdir/"ec.bin.fw* "${_dest%/*}/"
  204. }
  205. extract_e6400vga()
  206. {
  207. set +u +e
  208. chkvars E6400_VGA_offset E6400_VGA_romname
  209. tail -c +$E6400_VGA_offset "$_dl" | gunzip > "$appdir/bios.bin" || :
  210. (
  211. x_ cd "$appdir"
  212. x_ e "bios.bin" f
  213. "$e6400_unpack" bios.bin || printf "TODO: fix dell extract util\n"
  214. ) || $err "can't extract e6400 vga rom - $dontflosh"
  215. x_ cp "$appdir/$E6400_VGA_romname" "$_dest"
  216. }
  217. extract_sch5545ec()
  218. {
  219. # full system ROM (UEFI), to extract with UEFIExtract:
  220. _bios="${_dl}_extracted/Firmware/1 $dlsum -- 1 System BIOS vA.28.bin"
  221. # this is the SCH5545 firmware, inside of the extracted UEFI ROM:
  222. _sch5545ec_fw="$_bios.dump/4 7A9354D9-0468-444A-81CE-0BF617D890DF"
  223. _sch5545ec_fw="$_sch5545ec_fw/54 D386BEB8-4B54-4E69-94F5-06091F67E0D3"
  224. _sch5545ec_fw="$_sch5545ec_fw/0 Raw section/body.bin" # <-- this!
  225. "$uefiextract" "$_bios" || $err "sch5545 !extract - $dontflash"
  226. x_ cp "$_sch5545ec_fw" "$_dest"
  227. }
  228. # Lenovo ThunderBolt firmware updates:
  229. # https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/thinkpad-t-series-laptops/thinkpad-t480-type-20l5-20l6/20l5/solutions/ht508988
  230. extract_tbfw()
  231. {
  232. chkvars TBFW_size
  233. fe_ copy_tbfw "$appdir" -type f -name "TBT.bin"
  234. [ -f "$_dest" ] || $err "$board: Could not extract tbfw"; :
  235. }
  236. copy_tbfw()
  237. {
  238. [ -f "$1" ] || return 0
  239. [ -L "$1" ] && return 0
  240. x_ dd if=/dev/null of="$1" bs=1 seek=$TBFW_size
  241. x_ mv "$1" "$_dest"
  242. return 1
  243. }
  244. extract_fsp()
  245. {
  246. x_ cp "$appdir/"Fsp_*.fd "${_dest%/*}"
  247. }
  248. fail_inject()
  249. {
  250. [ -L "$tmpromdel" ] || [ ! -d "$tmpromdel" ] || \
  251. rm -Rf "$tmpromdel" || :
  252. printf "\n\n%s\n\n" "$dontflash" 1>&2
  253. printf "WARNING: File '%s' was NOT modified.\n\n" "$archive" 1>&2
  254. printf "Please MAKE SURE vendor files are inserted before flashing\n\n"
  255. err_ "$1"
  256. }
  257. inject()
  258. {
  259. need_files="n"
  260. err="fail_inject"
  261. remkdir "$tmpromdel"
  262. set +u +e
  263. [ $# -lt 1 ] && $err "No options specified. - $dontflash"
  264. eval "`setvars "" nukemode new_mac xchanged`"
  265. archive="$1";
  266. new_mac="xx:xx:xx:xx:xx:xx"
  267. [ $# -gt 1 ] && case "$2" in
  268. nuke)
  269. new_mac=""
  270. nukemode="nuke" ;;
  271. setmac)
  272. [ $# -gt 2 ] && new_mac="$3" && \
  273. [ -z "$new_mac" ] && $err "Empty MAC address specified" ;;
  274. *) $err "Unrecognised inject mode: '$2'"
  275. esac
  276. [ "$new_mac" = "keep" ] && new_mac=""
  277. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  278. x_ make -C util/nvmutil clean && x_ make -C util/nvmutil
  279. check_release "$archive" || $err "'$archive' is not a release archive"
  280. readcfg && need_files="y"
  281. if [ "$need_files" = "y" ] || [ -n "$new_mac" ]; then
  282. [ "$nukemode" != "nuke" ] && [ "$need_files" = "y" ] && \
  283. x_ ./mk download "$board"
  284. patch_release_roms
  285. fi
  286. xtype="patched" && [ "$nukemode" = "nuke" ] && xtype="nuked"
  287. [ "$xchanged" != "y" ] && printf "\n'%s' *NOT* modified.\n" "$archive"
  288. [ "$xchanged" = "y" ] && printf "\n'%s' %s.\n" "$archive" "$xtype"; :
  289. }
  290. check_release()
  291. {
  292. [ -L "$archive" ] && $err "'$archive' is a symlink. $dontflash"
  293. e "$archive" f missing && return 1
  294. archivename="`basename "$archive"`"
  295. [ -z "$archivename" ] && $err "Can't determine archive name. $dontflash"
  296. case "$archivename" in
  297. *_src.tar.xz)
  298. $err "'$archive' is a src archive, silly!" ;;
  299. grub_*|seagrub_*|custom_*|seauboot_*|seabios_withgrub_*)
  300. return 1 ;;
  301. *.tar.xz) _stripped_prefix="${archivename#*_}"
  302. board="${_stripped_prefix%.tar.xz}" ;;
  303. *) $err "'$archive': could not detect board type - $dontflash"
  304. esac; :
  305. }
  306. readcfg()
  307. {
  308. if [ "$board" = "serprog_rp2040" ] || [ "$board" = "serprog_stm32" ] \
  309. || [ "$board" = "serprog_pico" ]; then
  310. return 1
  311. fi
  312. boarddir="$cbcfgsdir/$board"
  313. eval "`setcfg "$boarddir/target.cfg"`"
  314. chkvars tree && x_ ./mk -d coreboot "$tree"
  315. [ -z "$vcfg" ] && return 1
  316. vfile="config/vendor/$vcfg/pkg.cfg"
  317. [ -L "$vfile" ] && $err "'$archive', '$board': $vfile is a symlink"
  318. [ -f "$vfile" ] || $err "'$archive', '$board': $vfile doesn't exist"
  319. cbdir="src/coreboot/$tree"
  320. cbfstool="elf/cbfstool/$tree/cbfstool"
  321. rmodtool="elf/cbfstool/$tree/rmodtool"
  322. mecleaner="$xbmkpwd/$cbdir/util/me_cleaner/me_cleaner.py"
  323. kbc1126_ec_dump="$xbmkpwd/$cbdir/util/kbc1126/kbc1126_ec_dump"
  324. cbfstool="elf/cbfstool/$tree/cbfstool"
  325. ifdtool="elf/ifdtool/$tree/ifdtool"
  326. [ -n "$IFD_platform" ] && ifdprefix="-p $IFD_platform"; :
  327. }
  328. patch_release_roms()
  329. {
  330. has_hashes="n"
  331. tmpromdir="$xbmklocal/DO_NOT_FLASH/bin/$board"
  332. remkdir "${tmpromdir%"/bin/$board"}"
  333. x_ tar -xf "$archive" -C "${tmpromdir%"/bin/$board"}"
  334. for _hashes in $hashfiles; do
  335. [ "$need_files" = "y" ] || break
  336. e "$tmpromdir/$_hashes" f && has_hashes="y" && \
  337. hashfile="$_hashes" && break; :
  338. done
  339. if readkconfig; then
  340. fe_ prep_rom "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  341. [ "$nukemode" != "nuke" ] || \
  342. printf "Make sure you inserted vendor files: %s\n" \
  343. "$vguide" > "$tmpromdir/README.md" || :
  344. else
  345. printf "Skipping vendorfiles on '%s'\n" "$archive" 1>&2
  346. need_files="n"
  347. fi
  348. (
  349. [ "$need_files" = "y" ] || exit 0
  350. cd "$tmpromdir" || $err "patch '$archive': can't cd $tmpromdir"
  351. # NOTE: For compatibility with older rom releases, defer to sha1
  352. if [ "$has_hashes" = "y" ] && [ "$nukemode" != "nuke" ]; then
  353. sha512sum --status -c "$hashfile" || \
  354. x_ sha1sum --status -c "$hashfile"
  355. x_ rm -f "$hashfile"
  356. fi
  357. ) || $err "'$archive' -> Can't verify vendor hashes. $dontflash"
  358. [ -z "$new_mac" ] || modify_mac || printf "\nGbE not defined\n" 1>&2
  359. [ "$xchanged" = "y" ] || rm -Rf "$tmpromdel" || :
  360. [ "$xchanged" = "y" ] || return 0
  361. (
  362. x_ cd "${tmpromdir%"/bin/$board"}"
  363. mkrom_tarball "bin/$board"
  364. ) || $err "Cannot re-generate '$archive' - $dontflash"
  365. mv "${tmpromdir%"/bin/$board"}/bin/${relname}_${board}.tar.xz" \
  366. "$archive" || $err "'$archive' -> Can't overwrite - $dontflash"; :
  367. }
  368. prep_rom()
  369. {
  370. _xrom="$1"
  371. _xromname="${1##*/}"
  372. _xromnew="${_xrom%/*}/${_xromname#"$vfix"}"
  373. [ "$nukemode" = "nuke" ] && _xromnew="${_xrom%/*}/$vfix${_xrom##*/}"
  374. e "$_xrom" f missing && return 0
  375. [ -z "${_xromname#"$vfix"}" ] && $err "$_xromname / $vfix: name match"
  376. # Remove the prefix and 1-byte pad
  377. if [ "$nukemode" != "nuke" ] && \
  378. [ "${_xromname#"$vfix"}" != "$_xromname" ]; then
  379. xromsize="$(expr $(stat -c '%s' "$_xrom") - 1)" || $err "!int"
  380. [ $xromsize -lt 524288 ] && $err "too small, $xromsize: $_xrom"
  381. x_ dd if="$_xrom" of="$_xromnew" bs=$xromsize count=1
  382. rm -f "$_xrom" || $err "Can't rm $_xrom - $dontflash"
  383. _xrom="$_xromnew"
  384. fi
  385. [ "$nukemode" = "nuke" ] && mksha512sum "$_xrom" "vendorhashes"
  386. patch_rom "$_xrom" || return 1 # if break return, can still change MAC
  387. [ "$nukemode" != "nuke" ] && return 0
  388. # Rename the file, prefixing a warning saying not to flash
  389. cat "$_xrom" config/data/coreboot/0 > "$_xromnew" || $err "!pad $_xrom"
  390. x_ rm -f "$_xrom"
  391. }
  392. patch_rom()
  393. {
  394. rom="$1"
  395. if [ "$has_hashes" != "y" ] && [ "$nukemode" != "nuke" ]; then
  396. printf "'%s' has no hash file. Skipping.\n" "$archive" 1>&2
  397. return 1
  398. elif [ "$has_hashes" = "y" ] && [ "$nukemode" = "nuke" ]; then
  399. printf "'%s' has a hash file. Skipping nuke.\n" "$archive" 1>&2
  400. return 1
  401. fi
  402. [ -n "$CONFIG_HAVE_REFCODE_BLOB" ] && insert "fallback/refcode" \
  403. "$CONFIG_REFCODE_BLOB_FILE" "stage"
  404. [ "$CONFIG_HAVE_MRC" = "y" ] && insert "mrc.bin" "$CONFIG_MRC_FILE" \
  405. "mrc" "0xfffa0000"
  406. [ "$CONFIG_HAVE_ME_BIN" = "y" ] && insert IFD "$CONFIG_ME_BIN_PATH" me
  407. [ "$CONFIG_KBC1126_FIRMWARE" = "y" ] && insert ecfw1.bin \
  408. "$CONFIG_KBC1126_FW1" raw "$CONFIG_KBC1126_FW1_OFFSET" && insert \
  409. ecfw2.bin "$CONFIG_KBC1126_FW2" raw "$CONFIG_KBC1126_FW2_OFFSET"
  410. [ -n "$CONFIG_VGA_BIOS_FILE" ] && [ -n "$CONFIG_VGA_BIOS_ID" ] && \
  411. insert "pci$CONFIG_VGA_BIOS_ID.rom" "$CONFIG_VGA_BIOS_FILE" optionrom
  412. [ "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" = "y" ] && \
  413. [ -n "$CONFIG_SMSC_SCH5545_EC_FW_FILE" ] && \
  414. insert sch5545_ecfw.bin "$CONFIG_SMSC_SCH5545_EC_FW_FILE" raw
  415. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  416. [ -n "$CONFIG_FSP_M_FILE" ] && \
  417. insert "$CONFIG_FSP_M_CBFS" "$CONFIG_FSP_M_FILE" fsp --xip
  418. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  419. [ -n "$CONFIG_FSP_S_FILE" ] && \
  420. insert "$CONFIG_FSP_S_CBFS" "$CONFIG_FSP_S_FILE" fsp
  421. printf "ROM image successfully patched: %s\n" "$rom"
  422. xchanged="y"
  423. }
  424. insert()
  425. {
  426. [ "$2" = "/dev/null" ] && return 0
  427. cbfsname="$1"
  428. _dest="${2##*../}"
  429. _t="$3"
  430. _offset=""
  431. if [ "$_t" = "fsp" ] && [ $# -gt 3 ]; then
  432. _offset="$4"
  433. elif [ $# -gt 3 ] && _offset="-b $4" && [ -z "$4" ]; then
  434. $err "insert $*, $rom: offset given but empty (undefined)"
  435. fi
  436. [ "$nukemode" = "nuke" ] || x_ e "$_dest" f
  437. if [ "$cbfsname" = "IFD" ]; then
  438. [ "$nukemode" = "nuke" ] || "$ifdtool" $ifdprefix -i \
  439. $_t:$_dest "$rom" -O "$rom" || \
  440. $err "failed: insert '$_t' '$_dest' on '$rom'"
  441. [ "$nukemode" != "nuke" ] || "$ifdtool" $ifdprefix --nuke $_t \
  442. "$rom" -O "$rom" || $err "$rom: !nuke IFD/$_t"
  443. elif [ "$nukemode" = "nuke" ]; then
  444. x_ "$cbfstool" "$rom" remove -n "$cbfsname"
  445. elif [ "$_t" = "stage" ]; then # the only stage we handle is refcode
  446. x_ rm -f "$xbmklocal/refcode"
  447. "$rmodtool" -i "$_dest" -o "$xbmklocal/refcode" || "!reloc ref"
  448. "$cbfstool" "$rom" add-stage -f "$xbmklocal/refcode" \
  449. -n "$cbfsname" -t stage || $err "$rom: !add ref"
  450. else
  451. "$cbfstool" "$rom" add -f "$_dest" -n "$cbfsname" \
  452. -t $_t $_offset || $err "$rom !add $_t ($_dest)"
  453. fi
  454. xchanged="y"; :
  455. }
  456. modify_mac()
  457. {
  458. [ -n "$CONFIG_GBE_BIN_PATH" ] || return 1
  459. x_ cp "${CONFIG_GBE_BIN_PATH##*../}" "$xbmklocal/gbe"
  460. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  461. x_ "$nvm" "$xbmklocal/gbe" setmac "$new_mac"
  462. fe_ newmac "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  463. printf "\nGbE NVM written to '%s':\n" "$archive"
  464. x_ "$nvm" "$xbmklocal/gbe" dump | grep -v "bytes read from file" || :
  465. }
  466. newmac()
  467. {
  468. e "$1" f && xchanged="y" && x_ \
  469. "$ifdtool" $ifdprefix -i GbE:"$xbmklocal/gbe" "$1" -O "$1"; :
  470. }