inject.sh 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545
  1. # SPDX-License-Identifier: GPL-3.0-only
  2. # Copyright (c) 2022 Caleb La Grange <thonkpeasant@protonmail.com>
  3. # Copyright (c) 2022 Ferass El Hafidi <vitali64pmemail@protonmail.com>
  4. # Copyright (c) 2023-2025 Leah Rowe <leah@libreboot.org>
  5. e6400_unpack="$xbmkpwd/src/bios_extract/dell_inspiron_1100_unpacker.py"
  6. me7updateparser="$xbmkpwd/util/me7_update_parser/me7_update_parser.py"
  7. pfs_extract="$xbmkpwd/src/biosutilities/Dell_PFS_Extract.py"
  8. uefiextract="$xbmkpwd/elf/uefitool/uefiextract"
  9. vendir="vendorfiles"
  10. appdir="$vendir/app"
  11. cbcfgsdir="config/coreboot"
  12. hashfiles="vendorhashes blobhashes" # blobhashes for backwards compatibility
  13. dontflash="!!! AN ERROR OCCURED! Please DO NOT flash if injection failed. !!!"
  14. vfix="DO_NOT_FLASH_YET._FIRST,_INJECT_FILES_VIA_INSTRUCTIONS_ON_LIBREBOOT.ORG_"
  15. vguide="https://libreboot.org/docs/install/ivy_has_common.html"
  16. tmpromdel="$xbmklocal/DO_NOT_FLASH"
  17. nvm="util/nvmutil/nvm"
  18. ifdtool="elf/ifdtool/default/ifdtool"
  19. cvchk="CONFIG_HAVE_MRC CONFIG_HAVE_ME_BIN CONFIG_KBC1126_FIRMWARE \
  20. CONFIG_VGA_BIOS_FILE CONFIG_INCLUDE_SMSC_SCH5545_EC_FW \
  21. CONFIG_LENOVO_TBFW_BIN CONFIG_FSP_M_FILE CONFIG_FSP_S_FILE"
  22. cv="CONFIG_ME_BIN_PATH CONFIG_SMSC_SCH5545_EC_FW_FILE CONFIG_KBC1126_FW1 \
  23. CONFIG_KBC1126_FW2 CONFIG_KBC1126_FW1_OFFSET CONFIG_KBC1126_FW2_OFFSET \
  24. CONFIG_VGA_BIOS_ID CONFIG_BOARD_DELL_E6400 CONFIG_FSP_S_CBFS \
  25. CONFIG_HAVE_REFCODE_BLOB CONFIG_REFCODE_BLOB_FILE CONFIG_GBE_BIN_PATH \
  26. CONFIG_IFD_BIN_PATH CONFIG_FSP_FD_PATH CONFIG_MRC_FILE CONFIG_FSP_M_CBFS \
  27. CONFIG_FSP_USE_REPO CONFIG_FSP_FULL_FD $cvchk"
  28. eval "`setvars "" has_hashes EC_hash DL_hash DL_url_bkup MRC_refcode_gbe vcfg \
  29. E6400_VGA_DL_hash E6400_VGA_DL_url E6400_VGA_DL_url_bkup E6400_VGA_offset \
  30. E6400_VGA_romname SCH5545EC_DL_url_bkup SCH5545EC_DL_hash _dest tree \
  31. mecleaner kbc1126_ec_dump MRC_refcode_cbtree new_mac _dl SCH5545EC_DL_url \
  32. archive EC_url boarddir rom cbdir DL_url nukemode cbfstoolref FSPFD_hash \
  33. _7ztest ME11bootguard ME11delta ME11version ME11sku ME11pch tmpromdir \
  34. IFD_platform ifdprefix cdir sdir _me _metmp mfs TBFW_url_bkup TBFW_url \
  35. TBFW_hash TBFW_size hashfile xromsize xchanged EC_url_bkup need_files \
  36. vfile cbcfg $cv`"
  37. download()
  38. {
  39. [ $# -gt 0 ] || err "No argument given"
  40. export PATH="$PATH:/sbin"
  41. board="$1" && readcfg && readkconfig && bootstrap && getfiles; :
  42. }
  43. readkconfig()
  44. {
  45. x_ rm -f "$xbmktmp/cbcfg"
  46. cbcfg="`check_defconfig "$boarddir"`" || for cbc in $cv; do
  47. grep "$cbc" "$cbcfg" 1>>"$xbmktmp/cbcfg" 2>/dev/null || :
  48. done
  49. eval "`setcfg "$xbmktmp/cbcfg" 1`"
  50. for c in $cvchk; do
  51. eval "[ \"\${$c}\" = \"/dev/null\" ] && continue"
  52. eval "[ -z \"\${$c}\" ] && continue"
  53. eval "`setcfg "$vfile"`"
  54. return 0
  55. done
  56. return 1
  57. }
  58. bootstrap()
  59. {
  60. x_ ./mk -f coreboot ${cbdir##*/}
  61. mk -b uefitool biosutilities bios_extract
  62. [ -d "${kbc1126_ec_dump%/*}" ] && x_ make -C "$cbdir/util/kbc1126"
  63. [ -n "$MRC_refcode_cbtree" ] && \
  64. cbfstoolref="elf/cbfstool/$MRC_refcode_cbtree/cbfstool" && \
  65. x_ ./mk -d coreboot "$MRC_refcode_cbtree"; :
  66. }
  67. getfiles()
  68. {
  69. [ -z "$CONFIG_HAVE_ME_BIN" ] || fetch intel_me "$DL_url" \
  70. "$DL_url_bkup" "$DL_hash" "$CONFIG_ME_BIN_PATH"
  71. [ -z "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" ] || fetch sch5545ec \
  72. "$SCH5545EC_DL_url" "$SCH5545EC_DL_url_bkup" "$SCH5545EC_DL_hash" \
  73. "$CONFIG_SMSC_SCH5545_EC_FW_FILE"
  74. [ -z "$CONFIG_KBC1126_FIRMWARE" ] || fetch kbc1126ec "$EC_url" \
  75. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW1"
  76. [ -z "$CONFIG_VGA_BIOS_FILE" ] || fetch e6400vga "$E6400_VGA_DL_url" \
  77. "$E6400_VGA_DL_url_bkup" "$E6400_VGA_DL_hash" "$CONFIG_VGA_BIOS_FILE"
  78. [ -z "$CONFIG_HAVE_MRC" ] || fetch "mrc" "$MRC_url" "$MRC_url_bkup" \
  79. "$MRC_hash" "$CONFIG_MRC_FILE"
  80. [ -n "$CONFIG_REFCODE_BLOB_FILE" ] && fetch "refcode" "$MRC_url" \
  81. "$MRC_url_bkup" "$MRC_hash" "$CONFIG_REFCODE_BLOB_FILE"
  82. [ -z "$CONFIG_LENOVO_TBFW_BIN" ] || fetch "tbfw" "$TBFW_url" \
  83. "$TBFW_url_bkup" "$TBFW_hash" "$CONFIG_LENOVO_TBFW_BIN"
  84. [ -z "$CONFIG_FSP_M_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  85. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_M_FILE" copy
  86. [ -z "$CONFIG_FSP_S_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  87. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_S_FILE" copy; :
  88. }
  89. fetch()
  90. {
  91. dl_type="$1"
  92. dl="$2"
  93. dl_bkup="$3"
  94. dlsum="$4"
  95. _dest="${5##*../}"
  96. [ "$5" = "/dev/null" ] && return 0
  97. _dl="$XBMK_CACHE/file/$dlsum"
  98. # HACK: if grabbing fsp from coreboot, fix the path for lbmk
  99. [ "$dl_type" = "fsp" ] && for _cdl in dl dl_bkup; do
  100. eval "$_cdl=\"\${$_cdl##*../}\"; _cdp=\"\$$_cdl\""
  101. [ -f "$_cdp" ] || _cdp="$cbdir/$_cdp"
  102. [ -f "$_cdp" ] && eval "$_cdl=\"$_cdp\""
  103. done; :
  104. dlop="curl" && [ $# -gt 5 ] && dlop="$6"
  105. xbmkget "$dl" "$dl_bkup" "$_dl" "$dlsum" "$dlop"
  106. rm -Rf "${_dl}_extracted" || err "!rm ${_ul}_extracted. $dontflash"
  107. e "$_dest" f && return 0
  108. x_ mkdir -p "${_dest%/*}"
  109. remkdir "$appdir"
  110. extract_archive "$_dl" "$appdir" "$dl_type" || \
  111. [ "$dl_type" = "e6400vga" ] || err "$_dest $dl_type: !extract"
  112. eval "extract_$dl_type"
  113. set -u -e
  114. e "$_dest" f missing && err "!extract_$dl_type. $dontflash"; :
  115. }
  116. extract_intel_me()
  117. {
  118. e "$mecleaner" f not && err "$cbdir: me_cleaner missing. $dontflash"
  119. cdir="$xbmkpwd/$appdir"
  120. _me="$xbmkpwd/$_dest"
  121. _metmp="$xbmklocal/me.bin"
  122. mfs="" && [ "$ME11bootguard" = "y" ] && mfs="--whitelist MFS" && \
  123. chkvars ME11delta ME11version ME11sku ME11pch
  124. [ "$ME11bootguard" = "y" ] && x_ ./mk -f deguard
  125. extract_intel_me_bruteforce
  126. if [ "$ME11bootguard" = "y" ]; then
  127. apply_me11_deguard_mod
  128. else
  129. mv "$_metmp" "$_me" || err "!mv $_metmp $_me - $dontflash"
  130. fi
  131. }
  132. extract_intel_me_bruteforce()
  133. {
  134. [ $# -gt 0 ] && cdir="$1"
  135. e "$_metmp" f && return 0
  136. [ -z "$sdir" ] && sdir="$(mktemp -d)"
  137. x_ mkdir -p "$sdir"
  138. set +u +e
  139. (
  140. [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  141. cd "$cdir" || err "extract_intel_me: !cd \"$cdir\" - $dontflash"
  142. for i in *; do
  143. e "$_metmp" f && break
  144. [ -L "$i" ] && continue
  145. if [ -f "$i" ]; then
  146. _r="-r" && [ -n "$mfs" ] && _r=""
  147. "$mecleaner" $mfs $_r -t -O "$sdir/vendorfile" \
  148. -M "$_metmp" "$i" && break
  149. "$mecleaner" $mfs $_r -t -O "$_metmp" "$i" && break
  150. "$me7updateparser" -O "$_metmp" "$i" && break
  151. _7ztest="${_7ztest}a"
  152. extract_archive "$i" "$_7ztest" || continue
  153. extract_intel_me_bruteforce "$cdir/$_7ztest"
  154. elif [ -d "$i" ]; then
  155. extract_intel_me_bruteforce "$cdir/$i"
  156. else
  157. continue
  158. fi
  159. cdir="$1"; [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  160. cd "$cdir" || :
  161. done
  162. ) || :
  163. rm -Rf "$sdir" || err "extract_intel_me: !rm -Rf $sdir - $dontflash"
  164. }
  165. apply_me11_deguard_mod()
  166. {
  167. (
  168. x_ cd src/deguard/
  169. x_ ./finalimage.py --delta "data/delta/$ME11delta" \
  170. --version "$ME11version" \
  171. --pch "$ME11pch" --sku "$ME11sku" --fake-fpfs data/fpfs/zero \
  172. --input "$_metmp" --output "$_me"
  173. ) || err "Error running deguard for $_me - $dontflash"
  174. }
  175. extract_archive()
  176. {
  177. [ $# -gt 2 ] && [ "$3" = "fsp" ] && x_ python \
  178. "$cbdir/3rdparty/fsp/Tools/SplitFspBin.py" split -f "$1" -o "$2" \
  179. -n "Fsp.fd" && return 0
  180. innoextract "$1" -d "$2" || python "$pfs_extract" "$1" -e || 7z x \
  181. "$1" -o"$2" || unar "$1" -o "$2" || unzip "$1" -d "$2" || return 1
  182. [ ! -d "${_dl}_extracted" ] || x_ cp -R "${_dl}_extracted" "$2"; :
  183. }
  184. extract_kbc1126ec()
  185. {
  186. x_ e "$kbc1126_ec_dump" f
  187. (
  188. x_ cd "$appdir/"
  189. mv Rompaq/68*.BIN ec.bin || :
  190. if [ ! -f "ec.bin" ]; then
  191. unar -D ROM.CAB Rom.bin || unar -D Rom.CAB Rom.bin || \
  192. unar -D 68*.CAB Rom.bin || err "kbc1126 unar failed"
  193. x_ mv Rom.bin ec.bin
  194. fi
  195. x_ e ec.bin f && x_ "$kbc1126_ec_dump" ec.bin
  196. ) || err "$board: can't extract kbc1126 ec firmware - $dontflash"
  197. x_ e "$appdir/ec.bin.fw1" f && x_ e "$appdir/ec.bin.fw2" f
  198. x_ cp "$appdir/"ec.bin.fw* "${_dest%/*}/"
  199. }
  200. extract_e6400vga()
  201. {
  202. set +u +e
  203. chkvars E6400_VGA_offset E6400_VGA_romname
  204. tail -c +$E6400_VGA_offset "$_dl" | gunzip > "$appdir/bios.bin" || :
  205. (
  206. x_ cd "$appdir"
  207. x_ e "bios.bin" f
  208. "$e6400_unpack" bios.bin || printf "TODO: fix dell extract util\n"
  209. ) || err "can't extract e6400 vga rom - $dontflosh"
  210. x_ cp "$appdir/$E6400_VGA_romname" "$_dest"
  211. }
  212. extract_sch5545ec()
  213. {
  214. # full system ROM (UEFI), to extract with UEFIExtract:
  215. _bios="${_dl}_extracted/Firmware/1 $dlsum -- 1 System BIOS vA.28.bin"
  216. # this is the SCH5545 firmware, inside of the extracted UEFI ROM:
  217. _sch5545ec_fw="$_bios.dump/4 7A9354D9-0468-444A-81CE-0BF617D890DF"
  218. _sch5545ec_fw="$_sch5545ec_fw/54 D386BEB8-4B54-4E69-94F5-06091F67E0D3"
  219. _sch5545ec_fw="$_sch5545ec_fw/0 Raw section/body.bin" # <-- this!
  220. "$uefiextract" "$_bios" || err "sch5545 !extract - $dontflash"
  221. x_ cp "$_sch5545ec_fw" "$_dest"
  222. }
  223. # Lenovo ThunderBolt firmware updates:
  224. # https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/thinkpad-t-series-laptops/thinkpad-t480-type-20l5-20l6/20l5/solutions/ht508988
  225. extract_tbfw()
  226. {
  227. chkvars TBFW_size && fe_ copy_tbfw "$appdir" -type f -name "TBT.bin"
  228. [ -f "$_dest" ] || err "$board: Could not extract tbfw"; :
  229. }
  230. copy_tbfw()
  231. {
  232. [ -f "$1" ] && [ ! -L "$1" ] && x_ dd if=/dev/null of="$1" bs=1 \
  233. seek=$TBFW_size && x_ mv "$1" "$_dest" && return 1; :
  234. }
  235. extract_fsp()
  236. {
  237. x_ cp "$appdir/"Fsp_*.fd "${_dest%/*}"
  238. }
  239. fail_inject()
  240. {
  241. [ -L "$tmpromdel" ] || [ ! -d "$tmpromdel" ] || \
  242. rm -Rf "$tmpromdel" || :
  243. printf "\n\n%s\n\n" "$dontflash" 1>&2
  244. printf "WARNING: File '%s' was NOT modified.\n\n" "$archive" 1>&2
  245. printf "Please MAKE SURE vendor files are inserted before flashing\n\n"
  246. err_ "$1"
  247. }
  248. inject()
  249. {
  250. need_files="n"
  251. xbmk_err="fail_inject"
  252. remkdir "$tmpromdel"
  253. set +u +e
  254. [ $# -lt 1 ] && err "No options specified. - $dontflash"
  255. eval "`setvars "" nukemode new_mac xchanged`"
  256. archive="$1";
  257. new_mac="xx:xx:xx:xx:xx:xx"
  258. [ $# -gt 1 ] && case "$2" in
  259. nuke)
  260. new_mac=""
  261. nukemode="nuke" ;;
  262. setmac)
  263. [ $# -gt 2 ] && new_mac="$3" && \
  264. [ -z "$new_mac" ] && err "Empty MAC address specified" ;;
  265. *) err "Unrecognised inject mode: '$2'"
  266. esac
  267. [ "$new_mac" = "keep" ] && new_mac=""
  268. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  269. x_ make -C util/nvmutil clean && x_ make -C util/nvmutil
  270. check_release "$archive" || err "'$archive' is not a release archive"
  271. readcfg && need_files="y"
  272. if [ "$need_files" = "y" ] || [ -n "$new_mac" ]; then
  273. [ "$nukemode" != "nuke" ] && [ "$need_files" = "y" ] && \
  274. x_ ./mk download "$board"
  275. patch_release_roms
  276. fi
  277. xtype="patched" && [ "$nukemode" = "nuke" ] && xtype="nuked"
  278. [ "$xchanged" != "y" ] && printf "\n'%s' *NOT* modified.\n" "$archive"
  279. [ "$xchanged" = "y" ] && printf "\n'%s' %s.\n" "$archive" "$xtype"; :
  280. }
  281. check_release()
  282. {
  283. [ -L "$archive" ] && err "'$archive' is a symlink. $dontflash"
  284. e "$archive" f missing && return 1
  285. archivename="`basename "$archive"`"
  286. [ -z "$archivename" ] && err "Can't determine archive name. $dontflash"
  287. case "$archivename" in
  288. *_src.tar.xz)
  289. err "'$archive' is a src archive, silly!" ;;
  290. grub_*|seagrub_*|custom_*|seauboot_*|seabios_withgrub_*)
  291. return 1 ;;
  292. *.tar.xz) _stripped_prefix="${archivename#*_}"
  293. board="${_stripped_prefix%.tar.xz}" ;;
  294. *) err "'$archive': could not detect board type - $dontflash"
  295. esac; :
  296. }
  297. readcfg()
  298. {
  299. if [ "$board" = "serprog_rp2040" ] || [ "$board" = "serprog_stm32" ] \
  300. || [ "$board" = "serprog_pico" ]; then
  301. return 1
  302. fi
  303. boarddir="$cbcfgsdir/$board"
  304. eval "`setcfg "$boarddir/target.cfg"`"
  305. chkvars tree && x_ ./mk -d coreboot "$tree"
  306. [ -z "$vcfg" ] && return 1
  307. vfile="config/vendor/$vcfg/pkg.cfg"
  308. [ -L "$vfile" ] && err "'$archive', '$board': $vfile is a symlink"
  309. [ -f "$vfile" ] || err "'$archive', '$board': $vfile doesn't exist"
  310. cbdir="src/coreboot/$tree"
  311. cbfstool="elf/cbfstool/$tree/cbfstool"
  312. rmodtool="elf/cbfstool/$tree/rmodtool"
  313. mecleaner="$xbmkpwd/$cbdir/util/me_cleaner/me_cleaner.py"
  314. kbc1126_ec_dump="$xbmkpwd/$cbdir/util/kbc1126/kbc1126_ec_dump"
  315. cbfstool="elf/cbfstool/$tree/cbfstool"
  316. ifdtool="elf/ifdtool/$tree/ifdtool"
  317. [ -n "$IFD_platform" ] && ifdprefix="-p $IFD_platform"; :
  318. }
  319. patch_release_roms()
  320. {
  321. has_hashes="n"
  322. tmpromdir="$xbmklocal/DO_NOT_FLASH/bin/$board"
  323. remkdir "${tmpromdir%"/bin/$board"}"
  324. x_ tar -xf "$archive" -C "${tmpromdir%"/bin/$board"}"
  325. for _hashes in $hashfiles; do
  326. [ "$need_files" = "y" ] || break
  327. e "$tmpromdir/$_hashes" f && has_hashes="y" && \
  328. hashfile="$_hashes" && break; :
  329. done
  330. if readkconfig; then
  331. fe_ prep_rom "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  332. [ "$nukemode" != "nuke" ] || \
  333. printf "Make sure you inserted vendor files: %s\n" \
  334. "$vguide" > "$tmpromdir/README.md" || :
  335. else
  336. printf "Skipping vendorfiles on '%s'\n" "$archive" 1>&2
  337. need_files="n"
  338. fi
  339. (
  340. [ "$need_files" = "y" ] || exit 0
  341. cd "$tmpromdir" || err "patch '$archive': can't cd $tmpromdir"
  342. # NOTE: For compatibility with older rom releases, defer to sha1
  343. if [ "$has_hashes" = "y" ] && [ "$nukemode" != "nuke" ]; then
  344. sha512sum --status -c "$hashfile" || \
  345. x_ sha1sum --status -c "$hashfile"
  346. x_ rm -f "$hashfile"
  347. fi
  348. ) || err "'$archive' -> Can't verify vendor hashes. $dontflash"
  349. [ -z "$new_mac" ] || modify_mac || printf "\nGbE not defined\n" 1>&2
  350. [ "$xchanged" = "y" ] || rm -Rf "$tmpromdel" || :
  351. [ "$xchanged" = "y" ] || return 0
  352. (
  353. x_ cd "${tmpromdir%"/bin/$board"}"
  354. mkrom_tarball "bin/$board"
  355. ) || err "Cannot re-generate '$archive' - $dontflash"
  356. mv "${tmpromdir%"/bin/$board"}/bin/${relname}_${board}.tar.xz" \
  357. "$archive" || err "'$archive' -> Can't overwrite - $dontflash"; :
  358. }
  359. prep_rom()
  360. {
  361. _xrom="$1"
  362. _xromname="${1##*/}"
  363. _xromnew="${_xrom%/*}/${_xromname#"$vfix"}"
  364. [ "$nukemode" = "nuke" ] && _xromnew="${_xrom%/*}/$vfix${_xrom##*/}"
  365. e "$_xrom" f missing && return 0
  366. [ -z "${_xromname#"$vfix"}" ] && err "$_xromname / $vfix: name match"
  367. # Remove the prefix and 1-byte pad
  368. if [ "$nukemode" != "nuke" ] && \
  369. [ "${_xromname#"$vfix"}" != "$_xromname" ]; then
  370. xromsize="$(expr $(stat -c '%s' "$_xrom") - 1)" || err "!int"
  371. [ $xromsize -lt 524288 ] && err "too small, $xromsize: $_xrom"
  372. x_ dd if="$_xrom" of="$_xromnew" bs=$xromsize count=1
  373. rm -f "$_xrom" || err "Can't rm $_xrom - $dontflash"
  374. _xrom="$_xromnew"
  375. fi
  376. [ "$nukemode" = "nuke" ] && mksha512sum "$_xrom" "vendorhashes"
  377. patch_rom "$_xrom" || return 1 # if break return, can still change MAC
  378. [ "$nukemode" != "nuke" ] && return 0
  379. # Rename the file, prefixing a warning saying not to flash
  380. cat "$_xrom" config/data/coreboot/0 > "$_xromnew" || err "!pad $_xrom"
  381. x_ rm -f "$_xrom"
  382. }
  383. patch_rom()
  384. {
  385. rom="$1"
  386. if [ "$has_hashes" != "y" ] && [ "$nukemode" != "nuke" ]; then
  387. printf "'%s' has no hash file. Skipping.\n" "$archive" 1>&2
  388. return 1
  389. elif [ "$has_hashes" = "y" ] && [ "$nukemode" = "nuke" ]; then
  390. printf "'%s' has a hash file. Skipping nuke.\n" "$archive" 1>&2
  391. return 1
  392. fi
  393. [ -n "$CONFIG_HAVE_REFCODE_BLOB" ] && insert "fallback/refcode" \
  394. "$CONFIG_REFCODE_BLOB_FILE" "stage"
  395. [ "$CONFIG_HAVE_MRC" = "y" ] && insert "mrc.bin" "$CONFIG_MRC_FILE" \
  396. "mrc" "0xfffa0000"
  397. [ "$CONFIG_HAVE_ME_BIN" = "y" ] && insert IFD "$CONFIG_ME_BIN_PATH" me
  398. [ "$CONFIG_KBC1126_FIRMWARE" = "y" ] && insert ecfw1.bin \
  399. "$CONFIG_KBC1126_FW1" raw "$CONFIG_KBC1126_FW1_OFFSET" && insert \
  400. ecfw2.bin "$CONFIG_KBC1126_FW2" raw "$CONFIG_KBC1126_FW2_OFFSET"
  401. [ -n "$CONFIG_VGA_BIOS_FILE" ] && [ -n "$CONFIG_VGA_BIOS_ID" ] && \
  402. insert "pci$CONFIG_VGA_BIOS_ID.rom" "$CONFIG_VGA_BIOS_FILE" optionrom
  403. [ "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" = "y" ] && \
  404. [ -n "$CONFIG_SMSC_SCH5545_EC_FW_FILE" ] && \
  405. insert sch5545_ecfw.bin "$CONFIG_SMSC_SCH5545_EC_FW_FILE" raw
  406. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  407. [ -n "$CONFIG_FSP_M_FILE" ] && \
  408. insert "$CONFIG_FSP_M_CBFS" "$CONFIG_FSP_M_FILE" fsp --xip
  409. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  410. [ -n "$CONFIG_FSP_S_FILE" ] && \
  411. insert "$CONFIG_FSP_S_CBFS" "$CONFIG_FSP_S_FILE" fsp
  412. printf "ROM image successfully patched: %s\n" "$rom"
  413. xchanged="y"
  414. }
  415. insert()
  416. {
  417. [ "$2" = "/dev/null" ] && return 0
  418. cbfsname="$1"
  419. _dest="${2##*../}"
  420. _t="$3"
  421. _offset=""
  422. if [ "$_t" = "fsp" ] && [ $# -gt 3 ]; then
  423. _offset="$4"
  424. elif [ $# -gt 3 ] && _offset="-b $4" && [ -z "$4" ]; then
  425. err "insert $*, $rom: offset given but empty (undefined)"
  426. fi
  427. [ "$nukemode" = "nuke" ] || x_ e "$_dest" f
  428. if [ "$cbfsname" = "IFD" ]; then
  429. [ "$nukemode" = "nuke" ] || "$ifdtool" $ifdprefix -i \
  430. $_t:$_dest "$rom" -O "$rom" || \
  431. err "failed: insert '$_t' '$_dest' on '$rom'"
  432. [ "$nukemode" != "nuke" ] || "$ifdtool" $ifdprefix --nuke $_t \
  433. "$rom" -O "$rom" || err "$rom: !nuke IFD/$_t"
  434. elif [ "$nukemode" = "nuke" ]; then
  435. x_ "$cbfstool" "$rom" remove -n "$cbfsname"
  436. elif [ "$_t" = "stage" ]; then # the only stage we handle is refcode
  437. x_ rm -f "$xbmklocal/refcode"
  438. "$rmodtool" -i "$_dest" -o "$xbmklocal/refcode" || "!reloc ref"
  439. "$cbfstool" "$rom" add-stage -f "$xbmklocal/refcode" \
  440. -n "$cbfsname" -t stage || err "$rom: !add ref"
  441. else
  442. "$cbfstool" "$rom" add -f "$_dest" -n "$cbfsname" \
  443. -t $_t $_offset || err "$rom !add $_t ($_dest)"
  444. fi
  445. xchanged="y"; :
  446. }
  447. modify_mac()
  448. {
  449. [ -n "$CONFIG_GBE_BIN_PATH" ] || return 1
  450. x_ cp "${CONFIG_GBE_BIN_PATH##*../}" "$xbmklocal/gbe"
  451. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  452. x_ "$nvm" "$xbmklocal/gbe" setmac "$new_mac"
  453. fe_ newmac "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  454. printf "\nGbE NVM written to '%s':\n" "$archive"
  455. x_ "$nvm" "$xbmklocal/gbe" dump | grep -v "bytes read from file" || :
  456. }
  457. newmac()
  458. {
  459. e "$1" f && xchanged="y" && x_ \
  460. "$ifdtool" $ifdprefix -i GbE:"$xbmklocal/gbe" "$1" -O "$1"; :
  461. }