vendor.sh 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402
  1. # SPDX-License-Identifier: GPL-3.0-only
  2. # Copyright (c) 2022 Caleb La Grange <thonkpeasant@protonmail.com>
  3. # Copyright (c) 2022 Ferass El Hafidi <vitali64pmemail@protonmail.com>
  4. # Copyright (c) 2023-2024 Leah Rowe <leah@libreboot.org>
  5. e6400_unpack="$PWD/src/bios_extract/dell_inspiron_1100_unpacker.py"
  6. me7updateparser="$PWD/util/me7_update_parser/me7_update_parser.py"
  7. pfs_extract="$PWD/src/biosutilities/Dell_PFS_Extract.py"
  8. uefiextract="$PWD/elf/uefitool/uefiextract"
  9. vendir="vendorfiles"
  10. appdir="$vendir/app"
  11. cbcfgsdir="config/coreboot"
  12. cv="CONFIG_HAVE_ME_BIN CONFIG_ME_BIN_PATH CONFIG_INCLUDE_SMSC_SCH5545_EC_FW \
  13. CONFIG_SMSC_SCH5545_EC_FW_FILE CONFIG_KBC1126_FIRMWARE CONFIG_KBC1126_FW1 \
  14. CONFIG_KBC1126_FW2 CONFIG_KBC1126_FW1_OFFSET CONFIG_KBC1126_FW2_OFFSET \
  15. CONFIG_VGA_BIOS_FILE CONFIG_VGA_BIOS_ID CONFIG_BOARD_DELL_E6400 \
  16. CONFIG_HAVE_MRC CONFIG_MRC_FILE CONFIG_HAVE_REFCODE_BLOB \
  17. CONFIG_REFCODE_BLOB_FILE CONFIG_GBE_BIN_PATH CONFIG_IFD_BIN_PATH"
  18. eval `setvars "" EC_url_bkup EC_hash DL_hash DL_url_bkup MRC_refcode_gbe vcfg \
  19. E6400_VGA_DL_hash E6400_VGA_DL_url E6400_VGA_DL_url_bkup E6400_VGA_offset \
  20. E6400_VGA_romname SCH5545EC_DL_url_bkup SCH5545EC_DL_hash _dest tree \
  21. mecleaner kbc1126_ec_dump MRC_refcode_cbtree new_mac _dl SCH5545EC_DL_url \
  22. archive EC_url boarddir rom cbdir DL_url nukemode cbfstoolref vrelease \
  23. verify _7ztest ME11bootguard ME11delta ME11version ME11sku ME11pch \
  24. IFD_platform ifdprefix cdir sdir _me _metmp mfs $cv`
  25. vendor_download()
  26. {
  27. [ $# -gt 0 ] || $err "No argument given"; export PATH="$PATH:/sbin"
  28. board="$1"; readcfg && readkconfig && bootstrap && getfiles; :
  29. }
  30. readkconfig()
  31. {
  32. check_defconfig "$boarddir" 1>"$TMPDIR/vendorcfg.list" && return 1
  33. rm -f "$TMPDIR/tmpcbcfg" || $err "!rm -f \"$TMPDIR/tmpcbcfg\""
  34. while read -r cbcfgfile; do
  35. for cbc in $cv; do
  36. rm -f "$TMPDIR/tmpcbcfg2" || \
  37. $err "!rm $TMPDIR/tmpcbcfg2"
  38. grep "$cbc" "$cbcfgfile" 1>"$TMPDIR/tmpcbcfg2" \
  39. 2>/dev/null || :
  40. [ -f "$TMPDIR/tmpcbcfg2" ] || continue
  41. cat "$TMPDIR/tmpcbcfg2" >> "$TMPDIR/tmpcbcfg" || \
  42. $err "!cat $TMPDIR/tmpcbcfg2"
  43. done
  44. done < "$TMPDIR/vendorcfg.list"
  45. eval `setcfg "$TMPDIR/tmpcbcfg"`
  46. for c in CONFIG_HAVE_MRC CONFIG_HAVE_ME_BIN CONFIG_KBC1126_FIRMWARE \
  47. CONFIG_VGA_BIOS_FILE CONFIG_INCLUDE_SMSC_SCH5545_EC_FW; do
  48. eval "[ \"\${$c}\" = \"/dev/null\" ] && continue"
  49. eval "[ -z \"\${$c}\" ] && continue"
  50. eval `setcfg "config/vendor/$vcfg/pkg.cfg"`; return 0
  51. done
  52. printf "Vendor files not needed for: %s\n" "$board" 1>&2; return 1
  53. }
  54. bootstrap()
  55. {
  56. x_ ./mk -f coreboot ${cbdir##*/}
  57. mk -b uefitool biosutilities bios_extract
  58. [ -d "${kbc1126_ec_dump%/*}" ] && x_ make -C "$cbdir/util/kbc1126"
  59. [ -n "$MRC_refcode_cbtree" ] && \
  60. cbfstoolref="elf/cbfstool/$MRC_refcode_cbtree/cbfstool" && \
  61. x_ ./mk -d coreboot $MRC_refcode_cbtree; return 0
  62. }
  63. getfiles()
  64. {
  65. [ -z "$CONFIG_HAVE_ME_BIN" ] || fetch intel_me "$DL_url" \
  66. "$DL_url_bkup" "$DL_hash" "$CONFIG_ME_BIN_PATH"
  67. [ -z "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" ] || fetch sch5545ec \
  68. "$SCH5545EC_DL_url" "$SCH5545EC_DL_url_bkup" "$SCH5545EC_DL_hash" \
  69. "$CONFIG_SMSC_SCH5545_EC_FW_FILE"
  70. [ -z "$CONFIG_KBC1126_FIRMWARE" ] || fetch kbc1126ec "$EC_url" \
  71. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW1"
  72. [ -z "$CONFIG_VGA_BIOS_FILE" ] || fetch e6400vga "$E6400_VGA_DL_url" \
  73. "$E6400_VGA_DL_url_bkup" "$E6400_VGA_DL_hash" "$CONFIG_VGA_BIOS_FILE"
  74. [ -z "$CONFIG_HAVE_MRC" ] || fetch "mrc" "$MRC_url" "$MRC_url_bkup" \
  75. "$MRC_hash" "$CONFIG_MRC_FILE"; return 0
  76. }
  77. fetch()
  78. {
  79. dl_type="$1"; dl="$2"; dl_bkup="$3"; dlsum="$4"; _dest="${5##*../}"
  80. [ "$5" = "/dev/null" ] && return 0; _dl="$XBMK_CACHE/file/$dlsum"
  81. download "$dl" "$dl_bkup" "$_dl" "$dlsum"
  82. rm -Rf "${_dl}_extracted" || $err "!rm -Rf ${_ul}_extracted"
  83. e "$_dest" f && return 0
  84. mkdir -p "${_dest%/*}" || $err "mkdirs: !mkdir -p ${_dest%/*}"
  85. remkdir "$appdir"; extract_archive "$_dl" "$appdir" || \
  86. [ "$dl_type" = "e6400vga" ] || $err "mkd $_dest $dl_type: !extract"
  87. eval "extract_$dl_type"; set -u -e
  88. e "$_dest" f missing && $err "!extract_$dl_type"; :
  89. }
  90. extract_intel_me()
  91. {
  92. e "$mecleaner" f not && $err "$cbdir: me_cleaner missing"
  93. cdir="$PWD/$appdir"
  94. _me="$PWD/$_dest"
  95. _metmp="$PWD/tmp/me.bin"
  96. mfs="" && [ "$ME11bootguard" = "y" ] && mfs="--whitelist MFS" && \
  97. chkvars ME11delta ME11version ME11sku ME11pch
  98. [ "$ME11bootguard" = "y" ] && x_ ./mk -f deguard
  99. x_ mkdir -p tmp
  100. extract_intel_me_bruteforce
  101. if [ "$ME11bootguard" = "y" ]; then
  102. apply_me11_deguard_mod
  103. else
  104. mv "$_metmp" "$_me" || $err "!mv $_metmp" "$_me"
  105. fi
  106. }
  107. extract_intel_me_bruteforce()
  108. {
  109. [ $# -gt 0 ] && cdir="$1"
  110. e "$_metmp" f && return 0
  111. [ -z "$sdir" ] && sdir="$(mktemp -d)"
  112. mkdir -p "$sdir" || $err "extract_intel_me: !mkdir -p \"$sdir\""
  113. set +u +e
  114. (
  115. [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  116. cd "$cdir" || $err "extract_intel_me: !cd \"$cdir\""
  117. for i in *; do
  118. [ -f "$_metmp" ] && break
  119. [ -L "$i" ] && continue
  120. if [ -f "$i" ]; then
  121. _r="-r" && [ -n "$mfs" ] && _r=""
  122. "$mecleaner" $mfs $_r -t -O "$sdir/vendorfile" \
  123. -M "$_metmp" "$i" && break
  124. "$mecleaner" $mfs $_r -t -O "$_metmp" "$i" && break
  125. "$me7updateparser" -O "$_metmp" "$i" && break
  126. _7ztest="${_7ztest}a"
  127. extract_archive "$i" "$_7ztest" || continue
  128. extract_intel_me_bruteforce "$cdir/$_7ztest"
  129. elif [ -d "$i" ]; then
  130. extract_intel_me_bruteforce "$cdir/$i"
  131. else
  132. continue
  133. fi
  134. cdir="$1"; [ "${cdir#/a}" != "$cdir" ] && cdir="${cdir#/}"
  135. cd "$cdir" || :
  136. done
  137. )
  138. rm -Rf "$sdir" || $err "extract_intel_me: !rm -Rf $sdir"
  139. }
  140. apply_me11_deguard_mod()
  141. {
  142. (
  143. x_ cd src/deguard/
  144. ./finalimage.py --delta "data/delta/$ME11delta" \
  145. --version "$ME11version" \
  146. --pch "$ME11pch" --sku "$ME11sku" --fake-fpfs data/fpfs/zero \
  147. --input "$_metmp" --output "$_me" || \
  148. $err "Error running deguard for $_me"
  149. ) || $err "Error running deguard for $_me"
  150. }
  151. extract_archive()
  152. {
  153. geteltorito "$1" > "$2/vendor.img" || \
  154. innoextract "$1" -d "$2" || python "$pfs_extract" "$1" -e || 7z x \
  155. "$1" -o"$2" || unar "$1" -o "$2" || unzip "$1" -d "$2" || return 1
  156. [ ! -d "${_dl}_extracted" ] || cp -R "${_dl}_extracted" "$2" || \
  157. $err "!mv '${_dl}_extracted' '$2'"; :
  158. }
  159. extract_kbc1126ec()
  160. {
  161. e "$kbc1126_ec_dump" f missing && $err "$cbdir: kbc1126 util missing"
  162. (
  163. x_ cd "$appdir/"; mv Rompaq/68*.BIN ec.bin || :
  164. if [ ! -f "ec.bin" ]; then
  165. unar -D ROM.CAB Rom.bin || unar -D Rom.CAB Rom.bin || \
  166. unar -D 68*.CAB Rom.bin || $err "can't extract Rom.bin"
  167. x_ mv Rom.bin ec.bin
  168. fi
  169. [ -f ec.bin ] || $err "extract_kbc1126_ec $board: can't extract"
  170. "$kbc1126_ec_dump" ec.bin || $err "!1126ec $board extract ecfw"
  171. ) || $err "can't extract kbc1126 ec firmware"
  172. e "$appdir/ec.bin.fw1" f not && $err "$board: kbc1126ec fetch failed"
  173. e "$appdir/ec.bin.fw2" f not && $err "$board: kbc1126ec fetch failed"
  174. cp "$appdir/"ec.bin.fw* "${_dest%/*}/" || $err "!cp 1126ec $_dest"
  175. }
  176. extract_e6400vga()
  177. {
  178. set +u +e
  179. chkvars E6400_VGA_offset E6400_VGA_romname
  180. tail -c +$E6400_VGA_offset "$_dl" | gunzip > "$appdir/bios.bin" || :
  181. (
  182. x_ cd "$appdir"
  183. [ -f "bios.bin" ] || $err "extract_e6400vga: can't extract bios.bin"
  184. "$e6400_unpack" bios.bin || printf "TODO: fix dell extract util\n"
  185. ) || $err "can't extract e6400 vga rom"
  186. cp "$appdir/$E6400_VGA_romname" "$_dest" || \
  187. $err "extract_e6400vga $board: can't copy vga rom to $_dest"
  188. }
  189. extract_sch5545ec()
  190. {
  191. # full system ROM (UEFI), to extract with UEFIExtract:
  192. _bios="${_dl}_extracted/Firmware/1 $dlsum -- 1 System BIOS vA.28.bin"
  193. # this is the SCH5545 firmware, inside of the extracted UEFI ROM:
  194. _sch5545ec_fw="$_bios.dump/4 7A9354D9-0468-444A-81CE-0BF617D890DF"
  195. _sch5545ec_fw="$_sch5545ec_fw/54 D386BEB8-4B54-4E69-94F5-06091F67E0D3"
  196. _sch5545ec_fw="$_sch5545ec_fw/0 Raw section/body.bin" # <-- this!
  197. "$uefiextract" "$_bios" || $err "sch5545 !extract"
  198. cp "$_sch5545ec_fw" "$_dest" || $err "$_dest: !sch5545 copy"
  199. }
  200. vendor_inject()
  201. {
  202. set +u +e; [ $# -lt 1 ] && $err "No options specified."
  203. [ "$1" = "listboards" ] && eval "ls -1 config/coreboot || :; exit 0"
  204. archive="$1"; while getopts n:r:b:m: option; do
  205. case "$option" in
  206. n) nukemode="$OPTARG" ;;
  207. r) rom="$OPTARG" ;;
  208. b) board="$OPTARG" ;;
  209. m) new_mac="$OPTARG"; chkvars new_mac ;;
  210. *) : ;;
  211. esac
  212. done
  213. check_board || return 0
  214. [ "$nukemode" = "nuke" ] || x_ ./vendor download $board
  215. [ "$vrelease" != "y" ] && patch_rom "$rom"
  216. [ "$vrelease" = "y" ] && patch_release_roms; :
  217. }
  218. check_board()
  219. {
  220. failcheck="y" && check_release "$archive" && failcheck="n"
  221. if [ "$failcheck" = "y" ]; then
  222. [ -f "$rom" ] || $err "check_board \"$rom\": invalid path"
  223. [ -z "${rom+x}" ] && $err "check_board: no rom specified"
  224. [ -n "${board+x}" ] || board="$(detect_board "$rom")"
  225. else
  226. vrelease="y"; board="$(detect_board "$archive")"
  227. fi
  228. readcfg || return 1; return 0
  229. }
  230. check_release()
  231. {
  232. [ -f "$archive" ] || return 1
  233. [ "${archive##*.}" = "xz" ] || return 1
  234. printf "%s\n" "Release archive $archive detected"
  235. }
  236. # This function tries to determine the board from the filename of the rom.
  237. # It will only succeed if the filename is not changed from the build/download
  238. detect_board()
  239. {
  240. path="$1"; filename="$(basename "$path")"
  241. case "$filename" in
  242. grub_*|seagrub_*|custom_*)
  243. board="$(echo "$filename" | cut -d '_' -f2-3)" ;;
  244. seabios_withgrub_*)
  245. board="$(echo "$filename" | cut -d '_' -f3-4)" ;;
  246. *.tar.xz) _stripped_prefix="${filename#*_}"
  247. board="${_stripped_prefix%.tar.xz}" ;;
  248. *) $err "detect_board $filename: could not detect board type"
  249. esac; printf "%s\n" "$board"
  250. }
  251. readcfg()
  252. {
  253. if [ "$board" = "serprog_rp2040" ] || \
  254. [ "$board" = "serprog_stm32" ]; then
  255. return 1
  256. fi; boarddir="$cbcfgsdir/$board"
  257. eval `setcfg "$boarddir/target.cfg"`; chkvars vcfg tree
  258. cbdir="src/coreboot/$tree"
  259. cbfstool="elf/cbfstool/$tree/cbfstool"
  260. mecleaner="$PWD/$cbdir/util/me_cleaner/me_cleaner.py"
  261. kbc1126_ec_dump="$PWD/$cbdir/util/kbc1126/kbc1126_ec_dump"
  262. cbfstool="elf/cbfstool/$tree/cbfstool"
  263. ifdtool="elf/ifdtool/$tree/ifdtool"
  264. [ -n "$IFD_platform" ] && ifdprefix="-p $IFD_platform"
  265. x_ ./mk -d coreboot $tree
  266. }
  267. patch_release_roms()
  268. {
  269. remkdir "tmp/romdir"; tar -xf "$archive" -C "tmp/romdir" || \
  270. $err "patch_release_roms: !tar -xf \"$archive\" -C \"tmp/romdir\""
  271. for x in "tmp/romdir/bin/"*/*.rom ; do
  272. patch_rom "$x"
  273. done
  274. (
  275. cd "tmp/romdir/bin/"* || $err "patch roms: !cd tmp/romdir/bin/*"
  276. # NOTE: For compatibility with older rom releases, defer to sha1
  277. [ "$verify" != "y" ] || [ "$nukemode" = "nuke" ] || \
  278. sha512sum --status -c vendorhashes || \
  279. sha1sum --status -c vendorhashes || sha512sum --status -c \
  280. blobhashes || sha1sum --status -c blobhashes || \
  281. $err "patch_release_roms: ROMs did not match expected hashes"
  282. ) || $err "can't verify vendor hashes"
  283. [ -n "$new_mac" ] && for x in "tmp/romdir/bin/"*/*.rom ; do
  284. [ -f "$x" ] && modify_gbe "$x"
  285. done
  286. x_ mkdir -p bin/release
  287. mv tmp/romdir/bin/* bin/release/ || $err "$board: !mv release roms"
  288. }
  289. patch_rom()
  290. {
  291. rom="$1"
  292. readkconfig || exit 0
  293. [ "$CONFIG_HAVE_MRC" = "y" ] && inject "mrc.bin" "$CONFIG_MRC_FILE" \
  294. "mrc" "0xfffa0000"
  295. [ -n "$CONFIG_HAVE_REFCODE_BLOB" ] && inject "fallback/refcode" \
  296. "$CONFIG_REFCODE_BLOB_FILE" "stage"
  297. [ "$CONFIG_HAVE_ME_BIN" = "y" ] && inject IFD "$CONFIG_ME_BIN_PATH" me
  298. [ "$CONFIG_KBC1126_FIRMWARE" = "y" ] && inject ecfw1.bin \
  299. "$CONFIG_KBC1126_FW1" raw "$CONFIG_KBC1126_FW1_OFFSET" && inject \
  300. ecfw2.bin "$CONFIG_KBC1126_FW2" raw "$CONFIG_KBC1126_FW2_OFFSET"
  301. [ -n "$CONFIG_VGA_BIOS_FILE" ] && [ -n "$CONFIG_VGA_BIOS_ID" ] && \
  302. inject "pci$CONFIG_VGA_BIOS_ID.rom" "$CONFIG_VGA_BIOS_FILE" optionrom
  303. [ "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" = "y" ] && \
  304. [ -n "$CONFIG_SMSC_SCH5545_EC_FW_FILE" ] && \
  305. inject sch5545_ecfw.bin "$CONFIG_SMSC_SCH5545_EC_FW_FILE" raw
  306. [ -n "$new_mac" ] && [ "$vrelease" != "y" ] && modify_gbe "$rom"
  307. printf "ROM image successfully patched: %s\n" "$rom"
  308. }
  309. inject()
  310. {
  311. [ $# -lt 3 ] && $err "$@, $rom: usage: inject name path type (offset)"
  312. [ "$2" = "/dev/null" ] && return 0; verify="y"
  313. eval `setvars "" cbfsname _dest _t _offset`
  314. cbfsname="$1"; _dest="${2##*../}"; _t="$3"
  315. [ $# -gt 3 ] && _offset="-b $4" && [ -z "$4" ] && \
  316. $err "inject $@, $rom: offset passed, but empty (not defined)"
  317. e "$_dest" f n && [ "$nukemode" != "nuke" ] && $err "!inject $dl_type"
  318. if [ "$cbfsname" = "IFD" ]; then
  319. [ "$nukemode" = "nuke" ] || "$ifdtool" $ifdprefix -i \
  320. $_t:$_dest "$rom" -O "$rom" || \
  321. $err "failed: inject '$_t' '$_dest' on '$rom'"
  322. [ "$nukemode" != "nuke" ] || "$ifdtool" $ifdprefix --nuke $_t \
  323. "$rom" -O "$rom" || $err "$rom: !nuke IFD/$_t"; return 0
  324. elif [ "$nukemode" = "nuke" ]; then
  325. "$cbfstool" "$rom" remove -n "$cbfsname" || \
  326. $err "inject $rom: can't remove $cbfsname"; return 0
  327. fi
  328. [ "$_t" != "stage" ] || "$cbfstool" "$rom" add-stage -f \
  329. "$_dest" -n "$cbfsname" -t stage -c lzma || $err "$rom: !add ref"
  330. [ "$_t" = "stage" ] || "$cbfstool" "$rom" add -f "$_dest" \
  331. -n "$cbfsname" -t $_t $_offset || $err "$rom !add $_t ($_dest)"; :
  332. }
  333. modify_gbe()
  334. {
  335. chkvars CONFIG_GBE_BIN_PATH
  336. e "${CONFIG_GBE_BIN_PATH##*../}" f n && $err "missing gbe file"
  337. x_ make -C util/nvmutil
  338. x_ cp "${CONFIG_GBE_BIN_PATH##*../}" "$TMPDIR/gbe"
  339. x_ "util/nvmutil/nvm" "$TMPDIR/gbe" setmac $new_mac
  340. "$ifdtool" $ifdprefix -i GbE:"$TMPDIR/gbe" "$1" -O "$1" || \
  341. $err "Cannot insert modified GbE region into target image."
  342. }