inject.sh 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531
  1. # SPD-License-Identifier: GPL-3.0-only
  2. # Copyright (c) 2022 Caleb La Grange <thonkpeasant@protonmail.com>
  3. # Copyright (c) 2022 Ferass El Hafidi <vitali64pmemail@protonmail.com>
  4. # Copyright (c) 2023-2025 Leah Rowe <leah@libreboot.org>
  5. e6400_unpack="$xbmkpwd/src/bios_extract/dell_inspiron_1100_unpacker.py"
  6. me7updateparser="$xbmkpwd/util/me7_update_parser/me7_update_parser.py"
  7. pfs_extract="$xbmkpwd/src/biosutilities/Dell_PFS_Extract.py"
  8. uefiextract="$xbmkpwd/elf/uefitool/uefiextract"
  9. vendir="vendorfiles"
  10. appdir="$vendir/app"
  11. cbcfgsdir="config/coreboot"
  12. hashfiles="vendorhashes blobhashes" # blobhashes for backwards compatibility
  13. dontflash="!!! AN ERROR OCCURED! Please DO NOT flash if injection failed. !!!"
  14. vfix="DO_NOT_FLASH_YET._FIRST,_INJECT_FILES_VIA_INSTRUCTIONS_ON_LIBREBOOT.ORG_"
  15. vguide="https://libreboot.org/docs/install/ivy_has_common.html"
  16. tmpromdel="$xbmklocal/DO_NOT_FLASH"
  17. nvm="util/nvmutil/nvm"
  18. ifdtool="elf/ifdtool/default/ifdtool"
  19. cvchk="CONFIG_HAVE_MRC CONFIG_HAVE_ME_BIN CONFIG_KBC1126_FIRMWARE \
  20. CONFIG_VGA_BIOS_FILE CONFIG_INCLUDE_SMSC_SCH5545_EC_FW \
  21. CONFIG_LENOVO_TBFW_BIN CONFIG_FSP_M_FILE CONFIG_FSP_S_FILE"
  22. cv="CONFIG_ME_BIN_PATH CONFIG_SMSC_SCH5545_EC_FW_FILE CONFIG_KBC1126_FW1 \
  23. CONFIG_KBC1126_FW2 CONFIG_KBC1126_FW1_OFFSET CONFIG_KBC1126_FW2_OFFSET \
  24. CONFIG_VGA_BIOS_ID CONFIG_BOARD_DELL_E6400 CONFIG_FSP_S_CBFS \
  25. CONFIG_HAVE_REFCODE_BLOB CONFIG_REFCODE_BLOB_FILE CONFIG_GBE_BIN_PATH \
  26. CONFIG_IFD_BIN_PATH CONFIG_FSP_FD_PATH CONFIG_MRC_FILE CONFIG_FSP_M_CBFS \
  27. CONFIG_FSP_USE_REPO CONFIG_FSP_FULL_FD $cvchk"
  28. eval "`setvars "" has_hashes EC_hash DL_hash DL_url_bkup MRC_refcode_gbe vcfg \
  29. E6400_VGA_DL_hash E6400_VGA_DL_url E6400_VGA_DL_url_bkup E6400_VGA_offset \
  30. E6400_VGA_romname SCH5545EC_DL_url_bkup SCH5545EC_DL_hash _dest tree \
  31. mecleaner kbc1126_ec_dump MRC_refcode_cbtree new_mac _dl SCH5545EC_DL_url \
  32. archive EC_url boarddir rom cbdir DL_url nukemode cbfstoolref FSPFD_hash \
  33. _7ztest ME11bootguard ME11delta ME11version ME11sku ME11pch tmpromdir \
  34. IFD_platform ifdprefix cdir sdir _me _metmp mfs TBFW_url_bkup TBFW_url \
  35. TBFW_hash TBFW_size hashfile xromsize xchanged EC_url_bkup need_files \
  36. vfile cbcfg $cv`"
  37. download()
  38. {
  39. [ $# -gt 0 ] || err "No argument given"
  40. export PATH="$PATH:/sbin"
  41. board="$1" && readcfg && readkconfig && bootstrap && getfiles; :
  42. }
  43. readkconfig()
  44. {
  45. x_ rm -f "$xbmktmp/cbcfg"
  46. cbcfg="`check_defconfig "$boarddir"`" || for cbc in $cv; do
  47. grep "$cbc" "$cbcfg" 1>>"$xbmktmp/cbcfg" 2>/dev/null || :
  48. done
  49. eval "`setcfg "$xbmktmp/cbcfg" 1`"
  50. for c in $cvchk; do
  51. eval "[ \"\${$c}\" = \"/dev/null\" ] && continue"
  52. eval "[ -z \"\${$c}\" ] && continue"
  53. eval "`setcfg "$vfile"`"
  54. return 0
  55. done
  56. return 1
  57. }
  58. bootstrap()
  59. {
  60. x_ ./mk -f coreboot ${cbdir##*/}
  61. mk -b uefitool biosutilities bios_extract
  62. [ -d "${kbc1126_ec_dump%/*}" ] && x_ make -C "$cbdir/util/kbc1126"
  63. [ -n "$MRC_refcode_cbtree" ] && \
  64. cbfstoolref="elf/cbfstool/$MRC_refcode_cbtree/cbfstool" && \
  65. x_ ./mk -d coreboot "$MRC_refcode_cbtree"; :
  66. }
  67. getfiles()
  68. {
  69. [ -z "$CONFIG_HAVE_ME_BIN" ] || fetch intel_me "$DL_url" \
  70. "$DL_url_bkup" "$DL_hash" "$CONFIG_ME_BIN_PATH"
  71. [ -z "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" ] || fetch sch5545ec \
  72. "$SCH5545EC_DL_url" "$SCH5545EC_DL_url_bkup" "$SCH5545EC_DL_hash" \
  73. "$CONFIG_SMSC_SCH5545_EC_FW_FILE"
  74. [ -z "$CONFIG_KBC1126_FIRMWARE" ] || fetch kbc1126ec "$EC_url" \
  75. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW1"
  76. [ -z "$CONFIG_VGA_BIOS_FILE" ] || fetch e6400vga "$E6400_VGA_DL_url" \
  77. "$E6400_VGA_DL_url_bkup" "$E6400_VGA_DL_hash" "$CONFIG_VGA_BIOS_FILE"
  78. [ -z "$CONFIG_HAVE_MRC" ] || fetch "mrc" "$MRC_url" "$MRC_url_bkup" \
  79. "$MRC_hash" "$CONFIG_MRC_FILE"
  80. [ -n "$CONFIG_REFCODE_BLOB_FILE" ] && fetch "refcode" "$MRC_url" \
  81. "$MRC_url_bkup" "$MRC_hash" "$CONFIG_REFCODE_BLOB_FILE"
  82. [ -z "$CONFIG_LENOVO_TBFW_BIN" ] || fetch "tbfw" "$TBFW_url" \
  83. "$TBFW_url_bkup" "$TBFW_hash" "$CONFIG_LENOVO_TBFW_BIN"
  84. [ -z "$CONFIG_FSP_M_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  85. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_M_FILE" copy
  86. [ -z "$CONFIG_FSP_S_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  87. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_S_FILE" copy; :
  88. }
  89. fetch()
  90. {
  91. dl_type="$1"
  92. dl="$2"
  93. dl_bkup="$3"
  94. dlsum="$4"
  95. _dest="${5##*../}"
  96. [ "$5" = "/dev/null" ] && return 0
  97. _dl="$XBMK_CACHE/file/$dlsum"
  98. # HACK: if grabbing fsp from coreboot, fix the path for lbmk
  99. [ "$dl_type" = "fsp" ] && for _cdl in dl dl_bkup; do
  100. eval "$_cdl=\"\${$_cdl##*../}\"; _cdp=\"\$$_cdl\""
  101. [ -f "$_cdp" ] || _cdp="$cbdir/$_cdp"
  102. [ -f "$_cdp" ] && eval "$_cdl=\"$_cdp\""
  103. done; :
  104. dlop="curl" && [ $# -gt 5 ] && dlop="$6"
  105. xbmkget "$dl" "$dl_bkup" "$_dl" "$dlsum" "$dlop"
  106. rm -Rf "${_dl}_extracted" || err "!rm ${_ul}_extracted. $dontflash"
  107. e "$_dest" f && return 0
  108. x_ mkdir -p "${_dest%/*}"
  109. remkdir "$appdir"
  110. [ "$dl_type" = "fsp" ] || extract_archive "$_dl" "$appdir" || \
  111. [ "$dl_type" = "e6400vga" ] || err "$_dest $dl_type: !extract"
  112. x_ extract_$dl_type "$_dl" "$appdir"
  113. set -u -e
  114. e "$_dest" f missing && err "!extract_$dl_type. $dontflash"; :
  115. }
  116. extract_intel_me()
  117. {
  118. e "$mecleaner" f not && err "$cbdir: me_cleaner missing. $dontflash"
  119. cdir="$xbmkpwd/$appdir"
  120. _me="$xbmkpwd/$_dest"
  121. _metmp="$xbmklocal/me.bin"
  122. mfs="" && [ "$ME11bootguard" = "y" ] && mfs="--whitelist MFS" && \
  123. chkvars ME11delta ME11version ME11sku ME11pch
  124. [ "$ME11bootguard" = "y" ] && x_ ./mk -f deguard
  125. extract_intel_me_bruteforce
  126. [ "$ME11bootguard" != "y" ] && x_ mv "$_metmp" "$_me" && return 0
  127. (
  128. x_ cd src/deguard/
  129. x_ ./finalimage.py --delta "data/delta/$ME11delta" --version \
  130. "$ME11version" --pch "$ME11pch" --sku "$ME11sku" \
  131. --fake-fpfs data/fpfs/zero --input "$_metmp" --output "$_me"
  132. ) || err "Error running deguard for $_me - $dontflash"; :
  133. }
  134. extract_intel_me_bruteforce()
  135. {
  136. [ $# -gt 0 ] && cdir="$1"
  137. e "$_metmp" f && return 0
  138. [ -z "$sdir" ] && sdir="$(mktemp -d)"
  139. x_ mkdir -p "$sdir"
  140. set +u +e
  141. (
  142. [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  143. cd "$cdir" || err "extract_intel_me: !cd \"$cdir\" - $dontflash"
  144. for i in *; do
  145. c=0 && e "$_metmp" f && break
  146. [ -L "$i" ] && continue
  147. [ -e "$i" ] || continue
  148. [ -d "$i" ] && extract_intel_me_bruteforce "$cdir/$i" && c=1
  149. if [ $c -eq 0 ] && [ -f "$i" ]; then
  150. _r="-r" && [ -n "$mfs" ] && _r=""
  151. "$mecleaner" $mfs $_r -t -O "$sdir/vendorfile" \
  152. -M "$_metmp" "$i" && break
  153. "$mecleaner" $mfs $_r -t -O "$_metmp" "$i" && break
  154. "$me7updateparser" -O "$_metmp" "$i" && break
  155. _7ztest="${_7ztest}a"
  156. extract_archive "$i" "$_7ztest" || continue
  157. extract_intel_me_bruteforce "$cdir/$_7ztest"
  158. fi
  159. cdir="$1"; [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  160. cd "$cdir" || :
  161. done
  162. ) || :
  163. rm -Rf "$sdir" || err "extract_intel_me: !rm -Rf $sdir - $dontflash"
  164. }
  165. extract_archive()
  166. {
  167. innoextract "$1" -d "$2" || python "$pfs_extract" "$1" -e || 7z x \
  168. "$1" -o"$2" || unar "$1" -o "$2" || unzip "$1" -d "$2" || return 1
  169. [ ! -d "${_dl}_extracted" ] || x_ cp -R "${_dl}_extracted" "$2"; :
  170. }
  171. extract_kbc1126ec()
  172. {
  173. x_ e "$kbc1126_ec_dump" f
  174. (
  175. x_ cd "$appdir/"
  176. mv Rompaq/68*.BIN ec.bin || :
  177. if [ ! -f "ec.bin" ]; then
  178. unar -D ROM.CAB Rom.bin || unar -D Rom.CAB Rom.bin || \
  179. unar -D 68*.CAB Rom.bin || err "kbc1126 unar failed"
  180. x_ mv Rom.bin ec.bin
  181. fi
  182. x_ e ec.bin f && x_ "$kbc1126_ec_dump" ec.bin
  183. ) || err "$board: can't extract kbc1126 ec firmware - $dontflash"
  184. x_ e "$appdir/ec.bin.fw1" f && x_ e "$appdir/ec.bin.fw2" f
  185. x_ cp "$appdir/"ec.bin.fw* "${_dest%/*}/"
  186. }
  187. extract_e6400vga()
  188. {
  189. set +u +e
  190. chkvars E6400_VGA_offset E6400_VGA_romname
  191. tail -c +$E6400_VGA_offset "$_dl" | gunzip > "$appdir/bios.bin" || :
  192. (
  193. x_ cd "$appdir"
  194. x_ e "bios.bin" f
  195. "$e6400_unpack" bios.bin || printf "TODO: fix dell extract util\n"
  196. ) || err "can't extract e6400 vga rom - $dontflosh"
  197. x_ cp "$appdir/$E6400_VGA_romname" "$_dest"
  198. }
  199. extract_sch5545ec()
  200. {
  201. # full system ROM (UEFI), to extract with UEFIExtract:
  202. _bios="${_dl}_extracted/Firmware/1 $dlsum -- 1 System BIOS vA.28.bin"
  203. # this is the SCH5545 firmware, inside of the extracted UEFI ROM:
  204. _sch5545ec_fw="$_bios.dump/4 7A9354D9-0468-444A-81CE-0BF617D890DF"
  205. _sch5545ec_fw="$_sch5545ec_fw/54 D386BEB8-4B54-4E69-94F5-06091F67E0D3"
  206. _sch5545ec_fw="$_sch5545ec_fw/0 Raw section/body.bin" # <-- this!
  207. "$uefiextract" "$_bios" || err "sch5545 !extract - $dontflash"
  208. x_ cp "$_sch5545ec_fw" "$_dest"
  209. }
  210. # Lenovo ThunderBolt firmware updates:
  211. # https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/thinkpad-t-series-laptops/thinkpad-t480-type-20l5-20l6/20l5/solutions/ht508988
  212. extract_tbfw()
  213. {
  214. chkvars TBFW_size && fe_ copy_tbfw "$appdir" -type f -name "TBT.bin"
  215. }
  216. copy_tbfw()
  217. {
  218. [ -f "$1" ] && [ ! -L "$1" ] && x_ dd if=/dev/null of="$1" bs=1 \
  219. seek=$TBFW_size && x_ mv "$1" "$_dest" && return 1; :
  220. }
  221. extract_fsp()
  222. {
  223. x_ python "$cbdir/3rdparty/fsp/Tools/SplitFspBin.py" split -f "$1" \
  224. -o "$2" -n "Fsp.fd" && x_ cp "$appdir/"Fsp_*.fd "${_dest%/*}"
  225. }
  226. fail_inject()
  227. {
  228. [ -L "$tmpromdel" ] || [ ! -d "$tmpromdel" ] || \
  229. rm -Rf "$tmpromdel" || :
  230. printf "\n\n%s\n\n" "$dontflash" 1>&2
  231. printf "WARNING: File '%s' was NOT modified.\n\n" "$archive" 1>&2
  232. printf "Please MAKE SURE vendor files are inserted before flashing\n\n"
  233. err_ "$1"
  234. }
  235. inject()
  236. {
  237. need_files="n"
  238. xbmk_err="fail_inject"
  239. remkdir "$tmpromdel"
  240. set +u +e
  241. [ $# -lt 1 ] && err "No options specified. - $dontflash"
  242. eval "`setvars "" nukemode new_mac xchanged`"
  243. archive="$1";
  244. new_mac="xx:xx:xx:xx:xx:xx"
  245. [ $# -gt 1 ] && case "$2" in
  246. nuke)
  247. new_mac=""
  248. nukemode="nuke" ;;
  249. setmac)
  250. [ $# -gt 2 ] && new_mac="$3" && \
  251. [ -z "$new_mac" ] && err "Empty MAC address specified" ;;
  252. *) err "Unrecognised inject mode: '$2'"
  253. esac
  254. [ "$new_mac" = "keep" ] && new_mac=""
  255. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  256. x_ make -C util/nvmutil clean && x_ make -C util/nvmutil
  257. check_release "$archive" || err "'$archive' is not a release archive"
  258. readcfg && need_files="y"
  259. if [ "$need_files" = "y" ] || [ -n "$new_mac" ]; then
  260. [ "$nukemode" != "nuke" ] && [ "$need_files" = "y" ] && \
  261. x_ ./mk download "$board"
  262. patch_release_roms
  263. fi
  264. xtype="patched" && [ "$nukemode" = "nuke" ] && xtype="nuked"
  265. [ "$xchanged" != "y" ] && printf "\n'%s' *NOT* modified.\n" "$archive"
  266. [ "$xchanged" = "y" ] && printf "\n'%s' %s.\n" "$archive" "$xtype"; :
  267. }
  268. check_release()
  269. {
  270. [ -L "$archive" ] && err "'$archive' is a symlink. $dontflash"
  271. e "$archive" f missing && return 1
  272. archivename="`basename "$archive"`"
  273. [ -z "$archivename" ] && err "Can't determine archive name. $dontflash"
  274. case "$archivename" in
  275. *_src.tar.xz)
  276. err "'$archive' is a src archive, silly!" ;;
  277. grub_*|seagrub_*|custom_*|seauboot_*|seabios_withgrub_*)
  278. return 1 ;;
  279. *.tar.xz) _stripped_prefix="${archivename#*_}"
  280. board="${_stripped_prefix%.tar.xz}" ;;
  281. *) err "'$archive': could not detect board type - $dontflash"
  282. esac; :
  283. }
  284. readcfg()
  285. {
  286. if [ "$board" = "serprog_rp2040" ] || [ "$board" = "serprog_stm32" ] \
  287. || [ "$board" = "serprog_pico" ]; then
  288. return 1
  289. fi
  290. boarddir="$cbcfgsdir/$board"
  291. eval "`setcfg "$boarddir/target.cfg"`"
  292. chkvars tree && x_ ./mk -d coreboot "$tree"
  293. [ -z "$vcfg" ] && return 1
  294. vfile="config/vendor/$vcfg/pkg.cfg"
  295. [ -L "$vfile" ] && err "'$archive', '$board': $vfile is a symlink"
  296. [ -f "$vfile" ] || err "'$archive', '$board': $vfile doesn't exist"
  297. cbdir="src/coreboot/$tree"
  298. cbfstool="elf/cbfstool/$tree/cbfstool"
  299. rmodtool="elf/cbfstool/$tree/rmodtool"
  300. mecleaner="$xbmkpwd/$cbdir/util/me_cleaner/me_cleaner.py"
  301. kbc1126_ec_dump="$xbmkpwd/$cbdir/util/kbc1126/kbc1126_ec_dump"
  302. cbfstool="elf/cbfstool/$tree/cbfstool"
  303. ifdtool="elf/ifdtool/$tree/ifdtool"
  304. [ -n "$IFD_platform" ] && ifdprefix="-p $IFD_platform"; :
  305. }
  306. patch_release_roms()
  307. {
  308. has_hashes="n"
  309. tmpromdir="$xbmklocal/DO_NOT_FLASH/bin/$board"
  310. remkdir "${tmpromdir%"/bin/$board"}"
  311. x_ tar -xf "$archive" -C "${tmpromdir%"/bin/$board"}"
  312. for _hashes in $hashfiles; do
  313. [ "$need_files" = "y" ] || break
  314. e "$tmpromdir/$_hashes" f && has_hashes="y" && \
  315. hashfile="$_hashes" && break; :
  316. done
  317. if readkconfig; then
  318. fe_ prep_rom "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  319. [ "$nukemode" != "nuke" ] || \
  320. printf "Make sure you inserted vendor files: %s\n" \
  321. "$vguide" > "$tmpromdir/README.md" || :
  322. else
  323. printf "Skipping vendorfiles on '%s'\n" "$archive" 1>&2
  324. need_files="n"
  325. fi
  326. (
  327. [ "$need_files" = "y" ] || exit 0
  328. cd "$tmpromdir" || err "patch '$archive': can't cd $tmpromdir"
  329. # NOTE: For compatibility with older rom releases, defer to sha1
  330. if [ "$has_hashes" = "y" ] && [ "$nukemode" != "nuke" ]; then
  331. sha512sum --status -c "$hashfile" || \
  332. x_ sha1sum --status -c "$hashfile"
  333. x_ rm -f "$hashfile"
  334. fi
  335. ) || err "'$archive' -> Can't verify vendor hashes. $dontflash"
  336. [ -z "$new_mac" ] || modify_mac || printf "\nGbE not defined\n" 1>&2
  337. [ "$xchanged" = "y" ] || rm -Rf "$tmpromdel" || :
  338. [ "$xchanged" = "y" ] || return 0
  339. (
  340. x_ cd "${tmpromdir%"/bin/$board"}"
  341. mkrom_tarball "bin/$board"
  342. ) || err "Cannot re-generate '$archive' - $dontflash"
  343. mv "${tmpromdir%"/bin/$board"}/bin/${relname}_${board}.tar.xz" \
  344. "$archive" || err "'$archive' -> Can't overwrite - $dontflash"; :
  345. }
  346. prep_rom()
  347. {
  348. _xrom="$1"
  349. _xromname="${1##*/}"
  350. _xromnew="${_xrom%/*}/${_xromname#"$vfix"}"
  351. [ "$nukemode" = "nuke" ] && _xromnew="${_xrom%/*}/$vfix${_xrom##*/}"
  352. e "$_xrom" f missing && return 0
  353. [ -z "${_xromname#"$vfix"}" ] && err "$_xromname / $vfix: name match"
  354. # Remove the prefix and 1-byte pad
  355. if [ "$nukemode" != "nuke" ] && \
  356. [ "${_xromname#"$vfix"}" != "$_xromname" ]; then
  357. xromsize="$(expr $(stat -c '%s' "$_xrom") - 1)" || err "!int"
  358. [ $xromsize -lt 524288 ] && err "too small, $xromsize: $_xrom"
  359. x_ dd if="$_xrom" of="$_xromnew" bs=$xromsize count=1
  360. rm -f "$_xrom" || err "Can't rm $_xrom - $dontflash"
  361. _xrom="$_xromnew"
  362. fi
  363. [ "$nukemode" = "nuke" ] && mksha512sum "$_xrom" "vendorhashes"
  364. patch_rom "$_xrom" || return 1 # if break return, can still change MAC
  365. [ "$nukemode" != "nuke" ] && return 0
  366. # Rename the file, prefixing a warning saying not to flash
  367. cat "$_xrom" config/data/coreboot/0 > "$_xromnew" || err "!pad $_xrom"
  368. x_ rm -f "$_xrom"
  369. }
  370. patch_rom()
  371. {
  372. rom="$1"
  373. if [ "$has_hashes" != "y" ] && [ "$nukemode" != "nuke" ]; then
  374. printf "'%s' has no hash file. Skipping.\n" "$archive" 1>&2
  375. return 1
  376. elif [ "$has_hashes" = "y" ] && [ "$nukemode" = "nuke" ]; then
  377. printf "'%s' has a hash file. Skipping nuke.\n" "$archive" 1>&2
  378. return 1
  379. fi
  380. [ -n "$CONFIG_HAVE_REFCODE_BLOB" ] && insert "fallback/refcode" \
  381. "$CONFIG_REFCODE_BLOB_FILE" "stage"
  382. [ "$CONFIG_HAVE_MRC" = "y" ] && insert "mrc.bin" "$CONFIG_MRC_FILE" \
  383. "mrc" "0xfffa0000"
  384. [ "$CONFIG_HAVE_ME_BIN" = "y" ] && insert IFD "$CONFIG_ME_BIN_PATH" me
  385. [ "$CONFIG_KBC1126_FIRMWARE" = "y" ] && insert ecfw1.bin \
  386. "$CONFIG_KBC1126_FW1" raw "$CONFIG_KBC1126_FW1_OFFSET" && insert \
  387. ecfw2.bin "$CONFIG_KBC1126_FW2" raw "$CONFIG_KBC1126_FW2_OFFSET"
  388. [ -n "$CONFIG_VGA_BIOS_FILE" ] && [ -n "$CONFIG_VGA_BIOS_ID" ] && \
  389. insert "pci$CONFIG_VGA_BIOS_ID.rom" "$CONFIG_VGA_BIOS_FILE" optionrom
  390. [ "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" = "y" ] && \
  391. [ -n "$CONFIG_SMSC_SCH5545_EC_FW_FILE" ] && \
  392. insert sch5545_ecfw.bin "$CONFIG_SMSC_SCH5545_EC_FW_FILE" raw
  393. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  394. [ -n "$CONFIG_FSP_M_FILE" ] && \
  395. insert "$CONFIG_FSP_M_CBFS" "$CONFIG_FSP_M_FILE" fsp --xip
  396. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  397. [ -n "$CONFIG_FSP_S_FILE" ] && \
  398. insert "$CONFIG_FSP_S_CBFS" "$CONFIG_FSP_S_FILE" fsp
  399. printf "ROM image successfully patched: %s\n" "$rom"
  400. xchanged="y"
  401. }
  402. insert()
  403. {
  404. [ "$2" = "/dev/null" ] && return 0
  405. cbfsname="$1"
  406. _dest="${2##*../}"
  407. _t="$3"
  408. _offset=""
  409. if [ "$_t" = "fsp" ] && [ $# -gt 3 ]; then
  410. _offset="$4"
  411. elif [ $# -gt 3 ] && _offset="-b $4" && [ -z "$4" ]; then
  412. err "insert $*, $rom: offset given but empty (undefined)"
  413. fi
  414. [ "$nukemode" = "nuke" ] || x_ e "$_dest" f
  415. if [ "$cbfsname" = "IFD" ]; then
  416. [ "$nukemode" = "nuke" ] || "$ifdtool" $ifdprefix -i \
  417. $_t:$_dest "$rom" -O "$rom" || \
  418. err "failed: insert '$_t' '$_dest' on '$rom'"
  419. [ "$nukemode" != "nuke" ] || "$ifdtool" $ifdprefix --nuke $_t \
  420. "$rom" -O "$rom" || err "$rom: !nuke IFD/$_t"
  421. elif [ "$nukemode" = "nuke" ]; then
  422. x_ "$cbfstool" "$rom" remove -n "$cbfsname"
  423. elif [ "$_t" = "stage" ]; then # the only stage we handle is refcode
  424. x_ rm -f "$xbmklocal/refcode"
  425. "$rmodtool" -i "$_dest" -o "$xbmklocal/refcode" || "!reloc ref"
  426. "$cbfstool" "$rom" add-stage -f "$xbmklocal/refcode" \
  427. -n "$cbfsname" -t stage || err "$rom: !add ref"
  428. else
  429. "$cbfstool" "$rom" add -f "$_dest" -n "$cbfsname" \
  430. -t $_t $_offset || err "$rom !add $_t ($_dest)"
  431. fi
  432. xchanged="y"; :
  433. }
  434. modify_mac()
  435. {
  436. [ -n "$CONFIG_GBE_BIN_PATH" ] || return 1
  437. x_ cp "${CONFIG_GBE_BIN_PATH##*../}" "$xbmklocal/gbe"
  438. [ -n "$new_mac" ] && [ "$new_mac" != "restore" ] && \
  439. x_ "$nvm" "$xbmklocal/gbe" setmac "$new_mac"
  440. fe_ newmac "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  441. printf "\nGbE NVM written to '%s':\n" "$archive"
  442. x_ "$nvm" "$xbmklocal/gbe" dump | grep -v "bytes read from file" || :
  443. }
  444. newmac()
  445. {
  446. e "$1" f && xchanged="y" && x_ \
  447. "$ifdtool" $ifdprefix -i GbE:"$xbmklocal/gbe" "$1" -O "$1"; :
  448. }