inject.sh 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538
  1. # SPDX-License-Identifier: GPL-3.0-only
  2. # Copyright (c) 2022 Caleb La Grange <thonkpeasant@protonmail.com>
  3. # Copyright (c) 2022 Ferass El Hafidi <vitali64pmemail@protonmail.com>
  4. # Copyright (c) 2023-2025 Leah Rowe <leah@libreboot.org>
  5. e6400_unpack="$xbmkpwd/src/bios_extract/dell_inspiron_1100_unpacker.py"
  6. me7updateparser="$xbmkpwd/util/me7_update_parser/me7_update_parser.py"
  7. pfs_extract="$xbmkpwd/src/biosutilities/Dell_PFS_Extract.py"
  8. uefiextract="$xbmkpwd/elf/uefitool/uefiextract"
  9. vendir="vendorfiles"
  10. appdir="$vendir/app"
  11. cbcfgsdir="config/coreboot"
  12. hashfiles="vendorhashes blobhashes" # blobhashes for backwards compatibility
  13. dontflash="!!! AN ERROR OCCURED! Please DO NOT flash if injection failed. !!!"
  14. vfix="DO_NOT_FLASH_YET._FIRST,_INJECT_FILES_VIA_INSTRUCTIONS_ON_LIBREBOOT.ORG_"
  15. vguide="https://libreboot.org/docs/install/ivy_has_common.html"
  16. tmpromdel="$xbmklocal/DO_NOT_FLASH"
  17. nvm="util/nvmutil/nvm"
  18. ifdtool="elf/ifdtool/default/ifdtool"
  19. cvchk="CONFIG_HAVE_MRC CONFIG_HAVE_ME_BIN CONFIG_KBC1126_FIRMWARE \
  20. CONFIG_VGA_BIOS_FILE CONFIG_INCLUDE_SMSC_SCH5545_EC_FW \
  21. CONFIG_LENOVO_TBFW_BIN CONFIG_FSP_M_FILE CONFIG_FSP_S_FILE"
  22. cv="CONFIG_ME_BIN_PATH CONFIG_SMSC_SCH5545_EC_FW_FILE CONFIG_KBC1126_FW1 \
  23. CONFIG_KBC1126_FW2 CONFIG_KBC1126_FW1_OFFSET CONFIG_KBC1126_FW2_OFFSET \
  24. CONFIG_VGA_BIOS_ID CONFIG_BOARD_DELL_E6400 CONFIG_FSP_S_CBFS \
  25. CONFIG_HAVE_REFCODE_BLOB CONFIG_REFCODE_BLOB_FILE CONFIG_GBE_BIN_PATH \
  26. CONFIG_IFD_BIN_PATH CONFIG_FSP_FD_PATH CONFIG_MRC_FILE CONFIG_FSP_M_CBFS \
  27. CONFIG_FSP_USE_REPO CONFIG_FSP_FULL_FD $cvchk"
  28. eval "`setvars "" has_hashes EC_hash DL_hash DL_url_bkup MRC_refcode_gbe vcfg \
  29. E6400_VGA_DL_hash E6400_VGA_DL_url E6400_VGA_DL_url_bkup E6400_VGA_offset \
  30. E6400_VGA_romname SCH5545EC_DL_url_bkup SCH5545EC_DL_hash _dest tree \
  31. mecleaner kbc1126_ec_dump MRC_refcode_cbtree new_mac _dl SCH5545EC_DL_url \
  32. archive EC_url boarddir rom cbdir DL_url nukemode cbfstoolref FSPFD_hash \
  33. _7ztest ME11bootguard ME11delta ME11version ME11sku ME11pch tmpromdir \
  34. IFD_platform ifdprefix cdir sdir _me _metmp mfs TBFW_url_bkup TBFW_url \
  35. TBFW_hash TBFW_size hashfile xromsize xchanged EC_url_bkup need_files \
  36. vfile cbcfg $cv`"
  37. download()
  38. {
  39. [ $# -gt 0 ] || err "No argument given"
  40. export PATH="$PATH:/sbin"
  41. board="$1" && readcfg && readkconfig && bootstrap && getfiles; :
  42. }
  43. readkconfig()
  44. {
  45. x_ rm -f "$xbmktmp/cbcfg"
  46. cbcfg="`check_defconfig "$boarddir"`" || for cbc in $cv; do
  47. grep "$cbc" "$cbcfg" 1>>"$xbmktmp/cbcfg" 2>/dev/null || :
  48. done
  49. eval "`setcfg "$xbmktmp/cbcfg" 1`"
  50. for c in $cvchk; do
  51. eval "[ \"\${$c}\" = \"/dev/null\" ] && continue"
  52. eval "[ -z \"\${$c}\" ] && continue"
  53. eval "`setcfg "$vfile"`"
  54. return 0
  55. done
  56. return 1
  57. }
  58. bootstrap()
  59. {
  60. x_ ./mk -f coreboot ${cbdir##*/}
  61. mk -b uefitool biosutilities bios_extract
  62. [ -d "${kbc1126_ec_dump%/*}" ] && x_ make -C "$cbdir/util/kbc1126"
  63. [ -n "$MRC_refcode_cbtree" ] && \
  64. cbfstoolref="elf/cbfstool/$MRC_refcode_cbtree/cbfstool" && \
  65. x_ ./mk -d coreboot "$MRC_refcode_cbtree"; :
  66. }
  67. getfiles()
  68. {
  69. [ -z "$CONFIG_HAVE_ME_BIN" ] || fetch intel_me "$DL_url" \
  70. "$DL_url_bkup" "$DL_hash" "$CONFIG_ME_BIN_PATH"
  71. [ -z "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" ] || fetch sch5545ec \
  72. "$SCH5545EC_DL_url" "$SCH5545EC_DL_url_bkup" "$SCH5545EC_DL_hash" \
  73. "$CONFIG_SMSC_SCH5545_EC_FW_FILE"
  74. [ -z "$CONFIG_KBC1126_FIRMWARE" ] || fetch kbc1126ec "$EC_url" \
  75. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW1"
  76. [ -z "$CONFIG_VGA_BIOS_FILE" ] || fetch e6400vga "$E6400_VGA_DL_url" \
  77. "$E6400_VGA_DL_url_bkup" "$E6400_VGA_DL_hash" "$CONFIG_VGA_BIOS_FILE"
  78. [ -z "$CONFIG_HAVE_MRC" ] || fetch "mrc" "$MRC_url" "$MRC_url_bkup" \
  79. "$MRC_hash" "$CONFIG_MRC_FILE"
  80. [ -n "$CONFIG_REFCODE_BLOB_FILE" ] && fetch "refcode" "$MRC_url" \
  81. "$MRC_url_bkup" "$MRC_hash" "$CONFIG_REFCODE_BLOB_FILE"
  82. [ -z "$CONFIG_LENOVO_TBFW_BIN" ] || fetch "tbfw" "$TBFW_url" \
  83. "$TBFW_url_bkup" "$TBFW_hash" "$CONFIG_LENOVO_TBFW_BIN"
  84. [ -z "$CONFIG_FSP_M_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  85. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_M_FILE" copy
  86. [ -z "$CONFIG_FSP_S_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  87. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_S_FILE" copy; :
  88. }
  89. fetch()
  90. {
  91. dl_type="$1"
  92. dl="$2"
  93. dl_bkup="$3"
  94. dlsum="$4"
  95. _dest="${5##*../}"
  96. [ "$5" = "/dev/null" ] && return 0
  97. _dl="$XBMK_CACHE/file/$dlsum"
  98. # HACK: if grabbing fsp from coreboot, fix the path for lbmk
  99. [ "$dl_type" = "fsp" ] && for _cdl in dl dl_bkup; do
  100. eval "$_cdl=\"\${$_cdl##*../}\"; _cdp=\"\$$_cdl\""
  101. [ -f "$_cdp" ] || _cdp="$cbdir/$_cdp"
  102. [ -f "$_cdp" ] && eval "$_cdl=\"$_cdp\""
  103. done; :
  104. dlop="curl" && [ $# -gt 5 ] && dlop="$6"
  105. xbmkget "$dl" "$dl_bkup" "$_dl" "$dlsum" "$dlop"
  106. rm -Rf "${_dl}_extracted" || err "!rm ${_ul}_extracted. $dontflash"
  107. e "$_dest" f && return 0
  108. x_ mkdir -p "${_dest%/*}"
  109. remkdir "$appdir"
  110. extract_archive "$_dl" "$appdir" "$dl_type" || \
  111. [ "$dl_type" = "e6400vga" ] || err "$_dest $dl_type: !extract"
  112. eval "extract_$dl_type"
  113. set -u -e
  114. e "$_dest" f missing && err "!extract_$dl_type. $dontflash"; :
  115. }
  116. extract_intel_me()
  117. {
  118. e "$mecleaner" f not && err "$cbdir: me_cleaner missing. $dontflash"
  119. cdir="$xbmkpwd/$appdir"
  120. _me="$xbmkpwd/$_dest"
  121. _metmp="$xbmklocal/me.bin"
  122. mfs="" && [ "$ME11bootguard" = "y" ] && mfs="--whitelist MFS" && \
  123. chkvars ME11delta ME11version ME11sku ME11pch
  124. [ "$ME11bootguard" = "y" ] && x_ ./mk -f deguard
  125. extract_intel_me_bruteforce
  126. if [ "$ME11bootguard" = "y" ]; then (
  127. x_ cd src/deguard/
  128. x_ ./finalimage.py --delta "data/delta/$ME11delta" --version \
  129. "$ME11version" --pch "$ME11pch" --sku "$ME11sku" \
  130. --fake-fpfs data/fpfs/zero --input "$_metmp" --output "$_me"
  131. ) || err "Error running deguard for $_me - $dontflash"
  132. else
  133. mv "$_metmp" "$_me" || err "!mv $_metmp $_me - $dontflash"
  134. fi
  135. }
  136. extract_intel_me_bruteforce()
  137. {
  138. [ $# -gt 0 ] && cdir="$1"
  139. e "$_metmp" f && return 0
  140. [ -z "$sdir" ] && sdir="$(mktemp -d)"
  141. x_ mkdir -p "$sdir"
  142. set +u +e
  143. (
  144. [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  145. cd "$cdir" || err "extract_intel_me: !cd \"$cdir\" - $dontflash"
  146. for i in *; do
  147. e "$_metmp" f && break
  148. [ -L "$i" ] && continue
  149. if [ -f "$i" ]; then
  150. _r="-r" && [ -n "$mfs" ] && _r=""
  151. "$mecleaner" $mfs $_r -t -O "$sdir/vendorfile" \
  152. -M "$_metmp" "$i" && break
  153. "$mecleaner" $mfs $_r -t -O "$_metmp" "$i" && break
  154. "$me7updateparser" -O "$_metmp" "$i" && break
  155. _7ztest="${_7ztest}a"
  156. extract_archive "$i" "$_7ztest" || continue
  157. extract_intel_me_bruteforce "$cdir/$_7ztest"
  158. elif [ -d "$i" ]; then
  159. extract_intel_me_bruteforce "$cdir/$i"
  160. else
  161. continue
  162. fi
  163. cdir="$1"; [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  164. cd "$cdir" || :
  165. done
  166. ) || :
  167. rm -Rf "$sdir" || err "extract_intel_me: !rm -Rf $sdir - $dontflash"
  168. }
  169. extract_archive()
  170. {
  171. [ $# -gt 2 ] && [ "$3" = "fsp" ] && x_ python \
  172. "$cbdir/3rdparty/fsp/Tools/SplitFspBin.py" split -f "$1" -o "$2" \
  173. -n "Fsp.fd" && return 0
  174. innoextract "$1" -d "$2" || python "$pfs_extract" "$1" -e || 7z x \
  175. "$1" -o"$2" || unar "$1" -o "$2" || unzip "$1" -d "$2" || return 1
  176. [ ! -d "${_dl}_extracted" ] || x_ cp -R "${_dl}_extracted" "$2"; :
  177. }
  178. extract_kbc1126ec()
  179. {
  180. x_ e "$kbc1126_ec_dump" f
  181. (
  182. x_ cd "$appdir/"
  183. mv Rompaq/68*.BIN ec.bin || :
  184. if [ ! -f "ec.bin" ]; then
  185. unar -D ROM.CAB Rom.bin || unar -D Rom.CAB Rom.bin || \
  186. unar -D 68*.CAB Rom.bin || err "kbc1126 unar failed"
  187. x_ mv Rom.bin ec.bin
  188. fi
  189. x_ e ec.bin f && x_ "$kbc1126_ec_dump" ec.bin
  190. ) || err "$board: can't extract kbc1126 ec firmware - $dontflash"
  191. x_ e "$appdir/ec.bin.fw1" f && x_ e "$appdir/ec.bin.fw2" f
  192. x_ cp "$appdir/"ec.bin.fw* "${_dest%/*}/"
  193. }
  194. extract_e6400vga()
  195. {
  196. set +u +e
  197. chkvars E6400_VGA_offset E6400_VGA_romname
  198. tail -c +$E6400_VGA_offset "$_dl" | gunzip > "$appdir/bios.bin" || :
  199. (
  200. x_ cd "$appdir"
  201. x_ e "bios.bin" f
  202. "$e6400_unpack" bios.bin || printf "TODO: fix dell extract util\n"
  203. ) || err "can't extract e6400 vga rom - $dontflosh"
  204. x_ cp "$appdir/$E6400_VGA_romname" "$_dest"
  205. }
  206. extract_sch5545ec()
  207. {
  208. # full system ROM (UEFI), to extract with UEFIExtract:
  209. _bios="${_dl}_extracted/Firmware/1 $dlsum -- 1 System BIOS vA.28.bin"
  210. # this is the SCH5545 firmware, inside of the extracted UEFI ROM:
  211. _sch5545ec_fw="$_bios.dump/4 7A9354D9-0468-444A-81CE-0BF617D890DF"
  212. _sch5545ec_fw="$_sch5545ec_fw/54 D386BEB8-4B54-4E69-94F5-06091F67E0D3"
  213. _sch5545ec_fw="$_sch5545ec_fw/0 Raw section/body.bin" # <-- this!
  214. "$uefiextract" "$_bios" || err "sch5545 !extract - $dontflash"
  215. x_ cp "$_sch5545ec_fw" "$_dest"
  216. }
  217. # Lenovo ThunderBolt firmware updates:
  218. # https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/thinkpad-t-series-laptops/thinkpad-t480-type-20l5-20l6/20l5/solutions/ht508988
  219. extract_tbfw()
  220. {
  221. chkvars TBFW_size && fe_ copy_tbfw "$appdir" -type f -name "TBT.bin"
  222. [ -f "$_dest" ] || err "$board: Could not extract tbfw"; :
  223. }
  224. copy_tbfw()
  225. {
  226. [ -f "$1" ] && [ ! -L "$1" ] && x_ dd if=/dev/null of="$1" bs=1 \
  227. seek=$TBFW_size && x_ mv "$1" "$_dest" && return 1; :
  228. }
  229. extract_fsp()
  230. {
  231. x_ cp "$appdir/"Fsp_*.fd "${_dest%/*}"
  232. }
  233. fail_inject()
  234. {
  235. [ -L "$tmpromdel" ] || [ ! -d "$tmpromdel" ] || \
  236. rm -Rf "$tmpromdel" || :
  237. printf "\n\n%s\n\n" "$dontflash" 1>&2
  238. printf "WARNING: File '%s' was NOT modified.\n\n" "$archive" 1>&2
  239. printf "Please MAKE SURE vendor files are inserted before flashing\n\n"
  240. err_ "$1"
  241. }
  242. inject()
  243. {
  244. need_files="n"
  245. xbmk_err="fail_inject"
  246. remkdir "$tmpromdel"
  247. set +u +e
  248. [ $# -lt 1 ] && err "No options specified. - $dontflash"
  249. eval "`setvars "" nukemode new_mac xchanged`"
  250. archive="$1";
  251. new_mac="xx:xx:xx:xx:xx:xx"
  252. [ $# -gt 1 ] && case "$2" in
  253. nuke)
  254. new_mac=""
  255. nukemode="nuke" ;;
  256. setmac)
  257. [ $# -gt 2 ] && new_mac="$3" && \
  258. [ -z "$new_mac" ] && err "Empty MAC address specified" ;;
  259. *) err "Unrecognised inject mode: '$2'"
  260. esac
  261. [ "$new_mac" = "keep" ] && new_mac=""
  262. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  263. x_ make -C util/nvmutil clean && x_ make -C util/nvmutil
  264. check_release "$archive" || err "'$archive' is not a release archive"
  265. readcfg && need_files="y"
  266. if [ "$need_files" = "y" ] || [ -n "$new_mac" ]; then
  267. [ "$nukemode" != "nuke" ] && [ "$need_files" = "y" ] && \
  268. x_ ./mk download "$board"
  269. patch_release_roms
  270. fi
  271. xtype="patched" && [ "$nukemode" = "nuke" ] && xtype="nuked"
  272. [ "$xchanged" != "y" ] && printf "\n'%s' *NOT* modified.\n" "$archive"
  273. [ "$xchanged" = "y" ] && printf "\n'%s' %s.\n" "$archive" "$xtype"; :
  274. }
  275. check_release()
  276. {
  277. [ -L "$archive" ] && err "'$archive' is a symlink. $dontflash"
  278. e "$archive" f missing && return 1
  279. archivename="`basename "$archive"`"
  280. [ -z "$archivename" ] && err "Can't determine archive name. $dontflash"
  281. case "$archivename" in
  282. *_src.tar.xz)
  283. err "'$archive' is a src archive, silly!" ;;
  284. grub_*|seagrub_*|custom_*|seauboot_*|seabios_withgrub_*)
  285. return 1 ;;
  286. *.tar.xz) _stripped_prefix="${archivename#*_}"
  287. board="${_stripped_prefix%.tar.xz}" ;;
  288. *) err "'$archive': could not detect board type - $dontflash"
  289. esac; :
  290. }
  291. readcfg()
  292. {
  293. if [ "$board" = "serprog_rp2040" ] || [ "$board" = "serprog_stm32" ] \
  294. || [ "$board" = "serprog_pico" ]; then
  295. return 1
  296. fi
  297. boarddir="$cbcfgsdir/$board"
  298. eval "`setcfg "$boarddir/target.cfg"`"
  299. chkvars tree && x_ ./mk -d coreboot "$tree"
  300. [ -z "$vcfg" ] && return 1
  301. vfile="config/vendor/$vcfg/pkg.cfg"
  302. [ -L "$vfile" ] && err "'$archive', '$board': $vfile is a symlink"
  303. [ -f "$vfile" ] || err "'$archive', '$board': $vfile doesn't exist"
  304. cbdir="src/coreboot/$tree"
  305. cbfstool="elf/cbfstool/$tree/cbfstool"
  306. rmodtool="elf/cbfstool/$tree/rmodtool"
  307. mecleaner="$xbmkpwd/$cbdir/util/me_cleaner/me_cleaner.py"
  308. kbc1126_ec_dump="$xbmkpwd/$cbdir/util/kbc1126/kbc1126_ec_dump"
  309. cbfstool="elf/cbfstool/$tree/cbfstool"
  310. ifdtool="elf/ifdtool/$tree/ifdtool"
  311. [ -n "$IFD_platform" ] && ifdprefix="-p $IFD_platform"; :
  312. }
  313. patch_release_roms()
  314. {
  315. has_hashes="n"
  316. tmpromdir="$xbmklocal/DO_NOT_FLASH/bin/$board"
  317. remkdir "${tmpromdir%"/bin/$board"}"
  318. x_ tar -xf "$archive" -C "${tmpromdir%"/bin/$board"}"
  319. for _hashes in $hashfiles; do
  320. [ "$need_files" = "y" ] || break
  321. e "$tmpromdir/$_hashes" f && has_hashes="y" && \
  322. hashfile="$_hashes" && break; :
  323. done
  324. if readkconfig; then
  325. fe_ prep_rom "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  326. [ "$nukemode" != "nuke" ] || \
  327. printf "Make sure you inserted vendor files: %s\n" \
  328. "$vguide" > "$tmpromdir/README.md" || :
  329. else
  330. printf "Skipping vendorfiles on '%s'\n" "$archive" 1>&2
  331. need_files="n"
  332. fi
  333. (
  334. [ "$need_files" = "y" ] || exit 0
  335. cd "$tmpromdir" || err "patch '$archive': can't cd $tmpromdir"
  336. # NOTE: For compatibility with older rom releases, defer to sha1
  337. if [ "$has_hashes" = "y" ] && [ "$nukemode" != "nuke" ]; then
  338. sha512sum --status -c "$hashfile" || \
  339. x_ sha1sum --status -c "$hashfile"
  340. x_ rm -f "$hashfile"
  341. fi
  342. ) || err "'$archive' -> Can't verify vendor hashes. $dontflash"
  343. [ -z "$new_mac" ] || modify_mac || printf "\nGbE not defined\n" 1>&2
  344. [ "$xchanged" = "y" ] || rm -Rf "$tmpromdel" || :
  345. [ "$xchanged" = "y" ] || return 0
  346. (
  347. x_ cd "${tmpromdir%"/bin/$board"}"
  348. mkrom_tarball "bin/$board"
  349. ) || err "Cannot re-generate '$archive' - $dontflash"
  350. mv "${tmpromdir%"/bin/$board"}/bin/${relname}_${board}.tar.xz" \
  351. "$archive" || err "'$archive' -> Can't overwrite - $dontflash"; :
  352. }
  353. prep_rom()
  354. {
  355. _xrom="$1"
  356. _xromname="${1##*/}"
  357. _xromnew="${_xrom%/*}/${_xromname#"$vfix"}"
  358. [ "$nukemode" = "nuke" ] && _xromnew="${_xrom%/*}/$vfix${_xrom##*/}"
  359. e "$_xrom" f missing && return 0
  360. [ -z "${_xromname#"$vfix"}" ] && err "$_xromname / $vfix: name match"
  361. # Remove the prefix and 1-byte pad
  362. if [ "$nukemode" != "nuke" ] && \
  363. [ "${_xromname#"$vfix"}" != "$_xromname" ]; then
  364. xromsize="$(expr $(stat -c '%s' "$_xrom") - 1)" || err "!int"
  365. [ $xromsize -lt 524288 ] && err "too small, $xromsize: $_xrom"
  366. x_ dd if="$_xrom" of="$_xromnew" bs=$xromsize count=1
  367. rm -f "$_xrom" || err "Can't rm $_xrom - $dontflash"
  368. _xrom="$_xromnew"
  369. fi
  370. [ "$nukemode" = "nuke" ] && mksha512sum "$_xrom" "vendorhashes"
  371. patch_rom "$_xrom" || return 1 # if break return, can still change MAC
  372. [ "$nukemode" != "nuke" ] && return 0
  373. # Rename the file, prefixing a warning saying not to flash
  374. cat "$_xrom" config/data/coreboot/0 > "$_xromnew" || err "!pad $_xrom"
  375. x_ rm -f "$_xrom"
  376. }
  377. patch_rom()
  378. {
  379. rom="$1"
  380. if [ "$has_hashes" != "y" ] && [ "$nukemode" != "nuke" ]; then
  381. printf "'%s' has no hash file. Skipping.\n" "$archive" 1>&2
  382. return 1
  383. elif [ "$has_hashes" = "y" ] && [ "$nukemode" = "nuke" ]; then
  384. printf "'%s' has a hash file. Skipping nuke.\n" "$archive" 1>&2
  385. return 1
  386. fi
  387. [ -n "$CONFIG_HAVE_REFCODE_BLOB" ] && insert "fallback/refcode" \
  388. "$CONFIG_REFCODE_BLOB_FILE" "stage"
  389. [ "$CONFIG_HAVE_MRC" = "y" ] && insert "mrc.bin" "$CONFIG_MRC_FILE" \
  390. "mrc" "0xfffa0000"
  391. [ "$CONFIG_HAVE_ME_BIN" = "y" ] && insert IFD "$CONFIG_ME_BIN_PATH" me
  392. [ "$CONFIG_KBC1126_FIRMWARE" = "y" ] && insert ecfw1.bin \
  393. "$CONFIG_KBC1126_FW1" raw "$CONFIG_KBC1126_FW1_OFFSET" && insert \
  394. ecfw2.bin "$CONFIG_KBC1126_FW2" raw "$CONFIG_KBC1126_FW2_OFFSET"
  395. [ -n "$CONFIG_VGA_BIOS_FILE" ] && [ -n "$CONFIG_VGA_BIOS_ID" ] && \
  396. insert "pci$CONFIG_VGA_BIOS_ID.rom" "$CONFIG_VGA_BIOS_FILE" optionrom
  397. [ "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" = "y" ] && \
  398. [ -n "$CONFIG_SMSC_SCH5545_EC_FW_FILE" ] && \
  399. insert sch5545_ecfw.bin "$CONFIG_SMSC_SCH5545_EC_FW_FILE" raw
  400. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  401. [ -n "$CONFIG_FSP_M_FILE" ] && \
  402. insert "$CONFIG_FSP_M_CBFS" "$CONFIG_FSP_M_FILE" fsp --xip
  403. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  404. [ -n "$CONFIG_FSP_S_FILE" ] && \
  405. insert "$CONFIG_FSP_S_CBFS" "$CONFIG_FSP_S_FILE" fsp
  406. printf "ROM image successfully patched: %s\n" "$rom"
  407. xchanged="y"
  408. }
  409. insert()
  410. {
  411. [ "$2" = "/dev/null" ] && return 0
  412. cbfsname="$1"
  413. _dest="${2##*../}"
  414. _t="$3"
  415. _offset=""
  416. if [ "$_t" = "fsp" ] && [ $# -gt 3 ]; then
  417. _offset="$4"
  418. elif [ $# -gt 3 ] && _offset="-b $4" && [ -z "$4" ]; then
  419. err "insert $*, $rom: offset given but empty (undefined)"
  420. fi
  421. [ "$nukemode" = "nuke" ] || x_ e "$_dest" f
  422. if [ "$cbfsname" = "IFD" ]; then
  423. [ "$nukemode" = "nuke" ] || "$ifdtool" $ifdprefix -i \
  424. $_t:$_dest "$rom" -O "$rom" || \
  425. err "failed: insert '$_t' '$_dest' on '$rom'"
  426. [ "$nukemode" != "nuke" ] || "$ifdtool" $ifdprefix --nuke $_t \
  427. "$rom" -O "$rom" || err "$rom: !nuke IFD/$_t"
  428. elif [ "$nukemode" = "nuke" ]; then
  429. x_ "$cbfstool" "$rom" remove -n "$cbfsname"
  430. elif [ "$_t" = "stage" ]; then # the only stage we handle is refcode
  431. x_ rm -f "$xbmklocal/refcode"
  432. "$rmodtool" -i "$_dest" -o "$xbmklocal/refcode" || "!reloc ref"
  433. "$cbfstool" "$rom" add-stage -f "$xbmklocal/refcode" \
  434. -n "$cbfsname" -t stage || err "$rom: !add ref"
  435. else
  436. "$cbfstool" "$rom" add -f "$_dest" -n "$cbfsname" \
  437. -t $_t $_offset || err "$rom !add $_t ($_dest)"
  438. fi
  439. xchanged="y"; :
  440. }
  441. modify_mac()
  442. {
  443. [ -n "$CONFIG_GBE_BIN_PATH" ] || return 1
  444. x_ cp "${CONFIG_GBE_BIN_PATH##*../}" "$xbmklocal/gbe"
  445. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  446. x_ "$nvm" "$xbmklocal/gbe" setmac "$new_mac"
  447. fe_ newmac "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  448. printf "\nGbE NVM written to '%s':\n" "$archive"
  449. x_ "$nvm" "$xbmklocal/gbe" dump | grep -v "bytes read from file" || :
  450. }
  451. newmac()
  452. {
  453. e "$1" f && xchanged="y" && x_ \
  454. "$ifdtool" $ifdprefix -i GbE:"$xbmklocal/gbe" "$1" -O "$1"; :
  455. }