]> git.proxmox.com Git - mirror_edk2.git/blame - IntelFsp2Pkg/Tools/SplitFspBin.py
BaseTools: Add HOST_APPLICATION module type.
[mirror_edk2.git] / IntelFsp2Pkg / Tools / SplitFspBin.py
CommitLineData
cf1d4549
JY
1## @ FspTool.py\r
2#\r
8349b868 3# Copyright (c) 2015 - 2019, Intel Corporation. All rights reserved.<BR>\r
9672cd30 4# SPDX-License-Identifier: BSD-2-Clause-Patent\r
cf1d4549
JY
5#\r
6##\r
7\r
8import os\r
9import sys\r
10import uuid\r
11import copy\r
12import struct\r
13import argparse\r
14from ctypes import *\r
c3f0829b 15from functools import reduce\r
cf1d4549
JY
16\r
17"""\r
8349b868 18This utility supports some operations for Intel FSP 1.x/2.x image.\r
cf1d4549 19It supports:\r
8349b868
CC
20 - Display FSP 1.x/2.x information header\r
21 - Split FSP 2.x image into individual FSP-T/M/S/O component\r
22 - Rebase FSP 1.x/2.x components to a different base address\r
23 - Generate FSP 1.x/2.x mapping C header file\r
c6ca1c01
MM
24"""\r
25\r
26CopyRightHeaderFile = """/*\r
27 *\r
28 * Automatically generated file; DO NOT EDIT.\r
29 * FSP mapping file\r
30 *\r
31 */\r
cf1d4549
JY
32"""\r
33\r
34class c_uint24(Structure):\r
35 """Little-Endian 24-bit Unsigned Integer"""\r
36 _pack_ = 1\r
c6ca1c01 37 _fields_ = [('Data', (c_uint8 * 3))]\r
cf1d4549
JY
38\r
39 def __init__(self, val=0):\r
40 self.set_value(val)\r
41\r
42 def __str__(self, indent=0):\r
43 return '0x%.6x' % self.value\r
44\r
c6ca1c01
MM
45 def __int__(self):\r
46 return self.get_value()\r
cf1d4549
JY
47\r
48 def set_value(self, val):\r
c6ca1c01
MM
49 self.Data[0:3] = Val2Bytes(val, 3)\r
50\r
51 def get_value(self):\r
52 return Bytes2Val(self.Data[0:3])\r
cf1d4549
JY
53\r
54 value = property(get_value, set_value)\r
55\r
56class EFI_FIRMWARE_VOLUME_HEADER(Structure):\r
57 _fields_ = [\r
c6ca1c01
MM
58 ('ZeroVector', ARRAY(c_uint8, 16)),\r
59 ('FileSystemGuid', ARRAY(c_uint8, 16)),\r
60 ('FvLength', c_uint64),\r
61 ('Signature', ARRAY(c_char, 4)),\r
62 ('Attributes', c_uint32),\r
63 ('HeaderLength', c_uint16),\r
64 ('Checksum', c_uint16),\r
65 ('ExtHeaderOffset', c_uint16),\r
66 ('Reserved', c_uint8),\r
67 ('Revision', c_uint8)\r
cf1d4549
JY
68 ]\r
69\r
70class EFI_FIRMWARE_VOLUME_EXT_HEADER(Structure):\r
71 _fields_ = [\r
c6ca1c01
MM
72 ('FvName', ARRAY(c_uint8, 16)),\r
73 ('ExtHeaderSize', c_uint32)\r
cf1d4549
JY
74 ]\r
75\r
76class EFI_FFS_INTEGRITY_CHECK(Structure):\r
77 _fields_ = [\r
c6ca1c01
MM
78 ('Header', c_uint8),\r
79 ('File', c_uint8)\r
cf1d4549
JY
80 ]\r
81\r
82class EFI_FFS_FILE_HEADER(Structure):\r
83 _fields_ = [\r
c6ca1c01
MM
84 ('Name', ARRAY(c_uint8, 16)),\r
85 ('IntegrityCheck', EFI_FFS_INTEGRITY_CHECK),\r
86 ('Type', c_uint8),\r
87 ('Attributes', c_uint8),\r
88 ('Size', c_uint24),\r
89 ('State', c_uint8)\r
cf1d4549
JY
90 ]\r
91\r
92class EFI_COMMON_SECTION_HEADER(Structure):\r
93 _fields_ = [\r
c6ca1c01
MM
94 ('Size', c_uint24),\r
95 ('Type', c_uint8)\r
96 ]\r
97\r
98class FSP_COMMON_HEADER(Structure):\r
99 _fields_ = [\r
100 ('Signature', ARRAY(c_char, 4)),\r
101 ('HeaderLength', c_uint32)\r
cf1d4549
JY
102 ]\r
103\r
104class FSP_INFORMATION_HEADER(Structure):\r
105 _fields_ = [\r
c6ca1c01
MM
106 ('Signature', ARRAY(c_char, 4)),\r
107 ('HeaderLength', c_uint32),\r
108 ('Reserved1', c_uint16),\r
109 ('SpecVersion', c_uint8),\r
110 ('HeaderRevision', c_uint8),\r
111 ('ImageRevision', c_uint32),\r
112 ('ImageId', ARRAY(c_char, 8)),\r
113 ('ImageSize', c_uint32),\r
114 ('ImageBase', c_uint32),\r
115 ('ImageAttribute', c_uint16),\r
116 ('ComponentAttribute', c_uint16),\r
117 ('CfgRegionOffset', c_uint32),\r
118 ('CfgRegionSize', c_uint32),\r
119 ('Reserved2', c_uint32),\r
120 ('TempRamInitEntryOffset', c_uint32),\r
121 ('Reserved3', c_uint32),\r
122 ('NotifyPhaseEntryOffset', c_uint32),\r
123 ('FspMemoryInitEntryOffset', c_uint32),\r
124 ('TempRamExitEntryOffset', c_uint32),\r
125 ('FspSiliconInitEntryOffset', c_uint32)\r
cf1d4549
JY
126 ]\r
127\r
c6ca1c01
MM
128class FSP_PATCH_TABLE(Structure):\r
129 _fields_ = [\r
130 ('Signature', ARRAY(c_char, 4)),\r
131 ('HeaderLength', c_uint16),\r
132 ('HeaderRevision', c_uint8),\r
133 ('Reserved', c_uint8),\r
134 ('PatchEntryNum', c_uint32)\r
135 ]\r
136\r
137class EFI_IMAGE_DATA_DIRECTORY(Structure):\r
138 _fields_ = [\r
139 ('VirtualAddress', c_uint32),\r
140 ('Size', c_uint32)\r
141 ]\r
142\r
143class EFI_TE_IMAGE_HEADER(Structure):\r
144 _fields_ = [\r
145 ('Signature', ARRAY(c_char, 2)),\r
146 ('Machine', c_uint16),\r
147 ('NumberOfSections', c_uint8),\r
148 ('Subsystem', c_uint8),\r
149 ('StrippedSize', c_uint16),\r
150 ('AddressOfEntryPoint', c_uint32),\r
151 ('BaseOfCode', c_uint32),\r
152 ('ImageBase', c_uint64),\r
153 ('DataDirectoryBaseReloc', EFI_IMAGE_DATA_DIRECTORY),\r
154 ('DataDirectoryDebug', EFI_IMAGE_DATA_DIRECTORY)\r
155 ]\r
156\r
e8a70885
MM
157class EFI_IMAGE_DOS_HEADER(Structure):\r
158 _fields_ = [\r
159 ('e_magic', c_uint16),\r
160 ('e_cblp', c_uint16),\r
161 ('e_cp', c_uint16),\r
162 ('e_crlc', c_uint16),\r
163 ('e_cparhdr', c_uint16),\r
164 ('e_minalloc', c_uint16),\r
165 ('e_maxalloc', c_uint16),\r
166 ('e_ss', c_uint16),\r
167 ('e_sp', c_uint16),\r
168 ('e_csum', c_uint16),\r
169 ('e_ip', c_uint16),\r
170 ('e_cs', c_uint16),\r
171 ('e_lfarlc', c_uint16),\r
172 ('e_ovno', c_uint16),\r
173 ('e_res', ARRAY(c_uint16, 4)),\r
174 ('e_oemid', c_uint16),\r
175 ('e_oeminfo', c_uint16),\r
176 ('e_res2', ARRAY(c_uint16, 10)),\r
177 ('e_lfanew', c_uint16)\r
178 ]\r
179\r
180class EFI_IMAGE_FILE_HEADER(Structure):\r
181 _fields_ = [\r
182 ('Machine', c_uint16),\r
183 ('NumberOfSections', c_uint16),\r
184 ('TimeDateStamp', c_uint32),\r
185 ('PointerToSymbolTable', c_uint32),\r
186 ('NumberOfSymbols', c_uint32),\r
187 ('SizeOfOptionalHeader', c_uint16),\r
188 ('Characteristics', c_uint16)\r
189 ]\r
190\r
c6ca1c01
MM
191class PE_RELOC_BLOCK_HEADER(Structure):\r
192 _fields_ = [\r
193 ('PageRVA', c_uint32),\r
194 ('BlockSize', c_uint32)\r
195 ]\r
cf1d4549 196\r
e8a70885
MM
197class EFI_IMAGE_OPTIONAL_HEADER32(Structure):\r
198 _fields_ = [\r
199 ('Magic', c_uint16),\r
200 ('MajorLinkerVersion', c_uint8),\r
201 ('MinorLinkerVersion', c_uint8),\r
202 ('SizeOfCode', c_uint32),\r
203 ('SizeOfInitializedData', c_uint32),\r
204 ('SizeOfUninitializedData', c_uint32),\r
205 ('AddressOfEntryPoint', c_uint32),\r
206 ('BaseOfCode', c_uint32),\r
207 ('BaseOfData', c_uint32),\r
208 ('ImageBase', c_uint32),\r
209 ('SectionAlignment', c_uint32),\r
210 ('FileAlignment', c_uint32),\r
211 ('MajorOperatingSystemVersion', c_uint16),\r
212 ('MinorOperatingSystemVersion', c_uint16),\r
213 ('MajorImageVersion', c_uint16),\r
214 ('MinorImageVersion', c_uint16),\r
215 ('MajorSubsystemVersion', c_uint16),\r
216 ('MinorSubsystemVersion', c_uint16),\r
217 ('Win32VersionValue', c_uint32),\r
218 ('SizeOfImage', c_uint32),\r
219 ('SizeOfHeaders', c_uint32),\r
220 ('CheckSum' , c_uint32),\r
221 ('Subsystem', c_uint16),\r
222 ('DllCharacteristics', c_uint16),\r
223 ('SizeOfStackReserve', c_uint32),\r
224 ('SizeOfStackCommit' , c_uint32),\r
225 ('SizeOfHeapReserve', c_uint32),\r
226 ('SizeOfHeapCommit' , c_uint32),\r
227 ('LoaderFlags' , c_uint32),\r
228 ('NumberOfRvaAndSizes', c_uint32),\r
229 ('DataDirectory', ARRAY(EFI_IMAGE_DATA_DIRECTORY, 16))\r
230 ]\r
231\r
cc0d998b
CC
232class EFI_IMAGE_OPTIONAL_HEADER32_PLUS(Structure):\r
233 _fields_ = [\r
234 ('Magic', c_uint16),\r
235 ('MajorLinkerVersion', c_uint8),\r
236 ('MinorLinkerVersion', c_uint8),\r
237 ('SizeOfCode', c_uint32),\r
238 ('SizeOfInitializedData', c_uint32),\r
239 ('SizeOfUninitializedData', c_uint32),\r
240 ('AddressOfEntryPoint', c_uint32),\r
241 ('BaseOfCode', c_uint32),\r
242 ('ImageBase', c_uint64),\r
243 ('SectionAlignment', c_uint32),\r
244 ('FileAlignment', c_uint32),\r
245 ('MajorOperatingSystemVersion', c_uint16),\r
246 ('MinorOperatingSystemVersion', c_uint16),\r
247 ('MajorImageVersion', c_uint16),\r
248 ('MinorImageVersion', c_uint16),\r
249 ('MajorSubsystemVersion', c_uint16),\r
250 ('MinorSubsystemVersion', c_uint16),\r
251 ('Win32VersionValue', c_uint32),\r
252 ('SizeOfImage', c_uint32),\r
253 ('SizeOfHeaders', c_uint32),\r
254 ('CheckSum' , c_uint32),\r
255 ('Subsystem', c_uint16),\r
256 ('DllCharacteristics', c_uint16),\r
257 ('SizeOfStackReserve', c_uint64),\r
258 ('SizeOfStackCommit' , c_uint64),\r
259 ('SizeOfHeapReserve', c_uint64),\r
260 ('SizeOfHeapCommit' , c_uint64),\r
261 ('LoaderFlags' , c_uint32),\r
262 ('NumberOfRvaAndSizes', c_uint32),\r
263 ('DataDirectory', ARRAY(EFI_IMAGE_DATA_DIRECTORY, 16))\r
264 ]\r
265\r
266class EFI_IMAGE_OPTIONAL_HEADER(Union):\r
267 _fields_ = [\r
268 ('PeOptHdr', EFI_IMAGE_OPTIONAL_HEADER32),\r
269 ('PePlusOptHdr', EFI_IMAGE_OPTIONAL_HEADER32_PLUS)\r
270 ]\r
271\r
e8a70885
MM
272class EFI_IMAGE_NT_HEADERS32(Structure):\r
273 _fields_ = [\r
274 ('Signature', c_uint32),\r
275 ('FileHeader', EFI_IMAGE_FILE_HEADER),\r
cc0d998b 276 ('OptionalHeader', EFI_IMAGE_OPTIONAL_HEADER)\r
e8a70885
MM
277 ]\r
278\r
279\r
280class EFI_IMAGE_DIRECTORY_ENTRY:\r
281 EXPORT = 0\r
282 IMPORT = 1\r
283 RESOURCE = 2\r
284 EXCEPTION = 3\r
285 SECURITY = 4\r
286 BASERELOC = 5\r
287 DEBUG = 6\r
288 COPYRIGHT = 7\r
289 GLOBALPTR = 8\r
290 TLS = 9\r
291 LOAD_CONFIG = 10\r
292\r
c6ca1c01
MM
293class EFI_FV_FILETYPE:\r
294 ALL = 0x00\r
295 RAW = 0x01\r
296 FREEFORM = 0x02\r
297 SECURITY_CORE = 0x03\r
298 PEI_CORE = 0x04\r
299 DXE_CORE = 0x05\r
300 PEIM = 0x06\r
301 DRIVER = 0x07\r
302 COMBINED_PEIM_DRIVER = 0x08\r
303 APPLICATION = 0x09\r
304 SMM = 0x0a\r
305 FIRMWARE_VOLUME_IMAGE = 0x0b\r
306 COMBINED_SMM_DXE = 0x0c\r
307 SMM_CORE = 0x0d\r
308 OEM_MIN = 0xc0\r
309 OEM_MAX = 0xdf\r
310 DEBUG_MIN = 0xe0\r
311 DEBUG_MAX = 0xef\r
312 FFS_MIN = 0xf0\r
313 FFS_MAX = 0xff\r
314 FFS_PAD = 0xf0\r
315\r
316class EFI_SECTION_TYPE:\r
317 """Enumeration of all valid firmware file section types."""\r
318 ALL = 0x00\r
319 COMPRESSION = 0x01\r
320 GUID_DEFINED = 0x02\r
321 DISPOSABLE = 0x03\r
322 PE32 = 0x10\r
323 PIC = 0x11\r
324 TE = 0x12\r
325 DXE_DEPEX = 0x13\r
326 VERSION = 0x14\r
327 USER_INTERFACE = 0x15\r
328 COMPATIBILITY16 = 0x16\r
329 FIRMWARE_VOLUME_IMAGE = 0x17\r
330 FREEFORM_SUBTYPE_GUID = 0x18\r
331 RAW = 0x19\r
332 PEI_DEPEX = 0x1b\r
333 SMM_DEPEX = 0x1c\r
334\r
335def AlignPtr (offset, alignment = 8):\r
336 return (offset + alignment - 1) & ~(alignment - 1)\r
337\r
338def Bytes2Val (bytes):\r
339 return reduce(lambda x,y: (x<<8)|y, bytes[::-1] )\r
340\r
341def Val2Bytes (value, blen):\r
342 return [(value>>(i*8) & 0xff) for i in range(blen)]\r
343\r
c3f0829b
CC
344def IsIntegerType (val):\r
345 if sys.version_info[0] < 3:\r
346 if type(val) in (int, long):\r
347 return True\r
348 else:\r
349 if type(val) is int:\r
350 return True\r
351 return False\r
352\r
353def IsStrType (val):\r
354 if sys.version_info[0] < 3:\r
355 if type(val) is str:\r
356 return True\r
357 else:\r
358 if type(val) is bytes:\r
359 return True\r
360 return False\r
361\r
362def HandleNameStr (val):\r
363 if sys.version_info[0] < 3:\r
364 rep = "0x%X ('%s')" % (Bytes2Val (bytearray (val)), val)\r
365 else:\r
366 rep = "0x%X ('%s')" % (Bytes2Val (bytearray (val)), str (val, 'utf-8'))\r
367 return rep\r
368\r
c6ca1c01
MM
369def OutputStruct (obj, indent = 0, plen = 0):\r
370 if indent:\r
371 body = ''\r
372 else:\r
373 body = (' ' * indent + '<%s>:\n') % obj.__class__.__name__\r
374\r
375 if plen == 0:\r
376 plen = sizeof(obj)\r
377\r
378 max_key_len = 26\r
379 pstr = (' ' * (indent + 1) + '{0:<%d} = {1}\n') % max_key_len\r
380\r
381 for field in obj._fields_:\r
382 key = field[0]\r
383 val = getattr(obj, key)\r
384 rep = ''\r
385 if not isinstance(val, c_uint24) and isinstance(val, Structure):\r
386 body += pstr.format(key, val.__class__.__name__)\r
387 body += OutputStruct (val, indent + 1)\r
388 plen -= sizeof(val)\r
cf1d4549 389 else:\r
c3f0829b
CC
390 if IsStrType (val):\r
391 rep = HandleNameStr (val)\r
392 elif IsIntegerType (val):\r
c6ca1c01
MM
393 rep = '0x%X' % val\r
394 elif isinstance(val, c_uint24):\r
395 rep = '0x%X' % val.get_value()\r
396 elif 'c_ubyte_Array' in str(type(val)):\r
397 if sizeof(val) == 16:\r
c3f0829b
CC
398 if sys.version_info[0] < 3:\r
399 rep = str(bytearray(val))\r
400 else:\r
401 rep = bytes(val)\r
402 rep = str(uuid.UUID(bytes_le = rep)).upper()\r
cf1d4549 403 else:\r
c6ca1c01
MM
404 res = ['0x%02X'%i for i in bytearray(val)]\r
405 rep = '[%s]' % (','.join(res))\r
406 else:\r
407 rep = str(val)\r
408 plen -= sizeof(field[1])\r
409 body += pstr.format(key, rep)\r
410 if plen <= 0:\r
411 break\r
412 return body\r
413\r
414class Section:\r
415 def __init__(self, offset, secdata):\r
416 self.SecHdr = EFI_COMMON_SECTION_HEADER.from_buffer (secdata, 0)\r
417 self.SecData = secdata[0:int(self.SecHdr.Size)]\r
418 self.Offset = offset\r
419\r
420class FirmwareFile:\r
421 def __init__(self, offset, filedata):\r
422 self.FfsHdr = EFI_FFS_FILE_HEADER.from_buffer (filedata, 0)\r
423 self.FfsData = filedata[0:int(self.FfsHdr.Size)]\r
424 self.Offset = offset\r
425 self.SecList = []\r
426\r
427 def ParseFfs(self):\r
428 ffssize = len(self.FfsData)\r
429 offset = sizeof(self.FfsHdr)\r
430 if self.FfsHdr.Name != '\xff' * 16:\r
431 while offset < ffssize:\r
432 sechdr = EFI_COMMON_SECTION_HEADER.from_buffer (self.FfsData, offset)\r
433 sec = Section (offset, self.FfsData[offset:offset + int(sechdr.Size)])\r
434 self.SecList.append(sec)\r
435 offset += int(sechdr.Size)\r
436 offset = AlignPtr(offset, 4)\r
437\r
438class FirmwareVolume:\r
439 def __init__(self, offset, fvdata):\r
440 self.FvHdr = EFI_FIRMWARE_VOLUME_HEADER.from_buffer (fvdata, 0)\r
441 self.FvData = fvdata[0 : self.FvHdr.FvLength]\r
442 self.Offset = offset\r
443 if self.FvHdr.ExtHeaderOffset > 0:\r
444 self.FvExtHdr = EFI_FIRMWARE_VOLUME_EXT_HEADER.from_buffer (self.FvData, self.FvHdr.ExtHeaderOffset)\r
cf1d4549 445 else:\r
c6ca1c01
MM
446 self.FvExtHdr = None\r
447 self.FfsList = []\r
448\r
449 def ParseFv(self):\r
450 fvsize = len(self.FvData)\r
451 if self.FvExtHdr:\r
452 offset = self.FvHdr.ExtHeaderOffset + self.FvExtHdr.ExtHeaderSize\r
cf1d4549 453 else:\r
c6ca1c01
MM
454 offset = self.FvHdr.HeaderLength\r
455 offset = AlignPtr(offset)\r
456 while offset < fvsize:\r
457 ffshdr = EFI_FFS_FILE_HEADER.from_buffer (self.FvData, offset)\r
458 if (ffshdr.Name == '\xff' * 16) and (int(ffshdr.Size) == 0xFFFFFF):\r
459 offset = fvsize\r
460 else:\r
461 ffs = FirmwareFile (offset, self.FvData[offset:offset + int(ffshdr.Size)])\r
462 ffs.ParseFfs()\r
463 self.FfsList.append(ffs)\r
464 offset += int(ffshdr.Size)\r
465 offset = AlignPtr(offset)\r
466\r
467class FspImage:\r
468 def __init__(self, offset, fih, fihoff, patch):\r
469 self.Fih = fih\r
470 self.FihOffset = fihoff\r
471 self.Offset = offset\r
472 self.FvIdxList = []\r
473 self.Type = "XTMSXXXXOXXXXXXX"[(fih.ComponentAttribute >> 12) & 0x0F]\r
474 self.PatchList = patch\r
475 self.PatchList.append(fihoff + 0x1C)\r
476\r
477 def AppendFv(self, FvIdx):\r
478 self.FvIdxList.append(FvIdx)\r
479\r
480 def Patch(self, delta, fdbin):\r
481 count = 0\r
482 applied = 0\r
483 for idx, patch in enumerate(self.PatchList):\r
484 ptype = (patch>>24) & 0x0F\r
485 if ptype not in [0x00, 0x0F]:\r
486 raise Exception('ERROR: Invalid patch type %d !' % ptype)\r
487 if patch & 0x80000000:\r
488 patch = self.Fih.ImageSize - (0x1000000 - (patch & 0xFFFFFF))\r
489 else:\r
490 patch = patch & 0xFFFFFF\r
491 if (patch < self.Fih.ImageSize) and (patch + sizeof(c_uint32) <= self.Fih.ImageSize):\r
492 offset = patch + self.Offset\r
493 value = Bytes2Val(fdbin[offset:offset+sizeof(c_uint32)])\r
494 value += delta\r
495 fdbin[offset:offset+sizeof(c_uint32)] = Val2Bytes(value, sizeof(c_uint32))\r
496 applied += 1\r
497 count += 1\r
498 # Don't count the FSP base address patch entry appended at the end\r
499 if count != 0:\r
500 count -= 1\r
501 applied -= 1\r
502 return (count, applied)\r
503\r
504class FirmwareDevice:\r
505 def __init__(self, offset, fdfile):\r
506 self.FvList = []\r
507 self.FspList = []\r
508 self.FdFile = fdfile\r
509 self.Offset = 0\r
510 hfsp = open (self.FdFile, 'rb')\r
511 self.FdData = bytearray(hfsp.read())\r
512 hfsp.close()\r
cf1d4549 513\r
c6ca1c01
MM
514 def ParseFd(self):\r
515 offset = 0\r
516 fdsize = len(self.FdData)\r
517 self.FvList = []\r
518 while offset < fdsize:\r
519 fvh = EFI_FIRMWARE_VOLUME_HEADER.from_buffer (self.FdData, offset)\r
c3f0829b 520 if b'_FVH' != fvh.Signature:\r
c6ca1c01
MM
521 raise Exception("ERROR: Invalid FV header !")\r
522 fv = FirmwareVolume (offset, self.FdData[offset:offset + fvh.FvLength])\r
523 fv.ParseFv ()\r
524 self.FvList.append(fv)\r
525 offset += fv.FvHdr.FvLength\r
cf1d4549
JY
526\r
527 def CheckFsp (self):\r
c6ca1c01 528 if len(self.FspList) == 0:\r
cf1d4549
JY
529 return\r
530\r
531 fih = None\r
c6ca1c01 532 for fsp in self.FspList:\r
cf1d4549 533 if not fih:\r
c6ca1c01 534 fih = fsp.Fih\r
cf1d4549 535 else:\r
c6ca1c01 536 newfih = fsp.Fih\r
cf1d4549 537 if (newfih.ImageId != fih.ImageId) or (newfih.ImageRevision != fih.ImageRevision):\r
c6ca1c01
MM
538 raise Exception("ERROR: Inconsistent FSP ImageId or ImageRevision detected !")\r
539\r
540 def ParseFsp(self):\r
541 flen = 0\r
542 for idx, fv in enumerate(self.FvList):\r
543 # Check if this FV contains FSP header\r
544 if flen == 0:\r
545 if len(fv.FfsList) == 0:\r
546 continue\r
547 ffs = fv.FfsList[0]\r
548 if len(ffs.SecList) == 0:\r
549 continue\r
550 sec = ffs.SecList[0]\r
551 if sec.SecHdr.Type != EFI_SECTION_TYPE.RAW:\r
552 continue\r
553 fihoffset = ffs.Offset + sec.Offset + sizeof(sec.SecHdr)\r
554 fspoffset = fv.Offset\r
555 offset = fspoffset + fihoffset\r
556 fih = FSP_INFORMATION_HEADER.from_buffer (self.FdData, offset)\r
c3f0829b 557 if b'FSPH' != fih.Signature:\r
c6ca1c01
MM
558 continue\r
559\r
560 offset += fih.HeaderLength\r
561 offset = AlignPtr(offset, 4)\r
562 plist = []\r
563 while True:\r
564 fch = FSP_COMMON_HEADER.from_buffer (self.FdData, offset)\r
c3f0829b 565 if b'FSPP' != fch.Signature:\r
c6ca1c01
MM
566 offset += fch.HeaderLength\r
567 offset = AlignPtr(offset, 4)\r
568 else:\r
569 fspp = FSP_PATCH_TABLE.from_buffer (self.FdData, offset)\r
570 offset += sizeof(fspp)\r
571 pdata = (c_uint32 * fspp.PatchEntryNum).from_buffer(self.FdData, offset)\r
572 plist = list(pdata)\r
573 break\r
574\r
575 fsp = FspImage (fspoffset, fih, fihoffset, plist)\r
576 fsp.AppendFv (idx)\r
577 self.FspList.append(fsp)\r
578 flen = fsp.Fih.ImageSize - fv.FvHdr.FvLength\r
579 else:\r
580 fsp.AppendFv (idx)\r
581 flen -= fv.FvHdr.FvLength\r
582 if flen < 0:\r
583 raise Exception("ERROR: Incorrect FV size in image !")\r
584 self.CheckFsp ()\r
585\r
e8a70885
MM
586class PeTeImage:\r
587 def __init__(self, offset, data):\r
588 self.Offset = offset\r
589 tehdr = EFI_TE_IMAGE_HEADER.from_buffer (data, 0)\r
c3f0829b 590 if tehdr.Signature == b'VZ': # TE image\r
e8a70885 591 self.TeHdr = tehdr\r
c3f0829b 592 elif tehdr.Signature == b'MZ': # PE image\r
e8a70885
MM
593 self.TeHdr = None\r
594 self.DosHdr = EFI_IMAGE_DOS_HEADER.from_buffer (data, 0)\r
595 self.PeHdr = EFI_IMAGE_NT_HEADERS32.from_buffer (data, self.DosHdr.e_lfanew)\r
596 if self.PeHdr.Signature != 0x4550:\r
597 raise Exception("ERROR: Invalid PE32 header !")\r
cc0d998b
CC
598 if self.PeHdr.OptionalHeader.PeOptHdr.Magic == 0x10b: # PE32 image\r
599 if self.PeHdr.FileHeader.SizeOfOptionalHeader < EFI_IMAGE_OPTIONAL_HEADER32.DataDirectory.offset:\r
600 raise Exception("ERROR: Unsupported PE32 image !")\r
601 if self.PeHdr.OptionalHeader.PeOptHdr.NumberOfRvaAndSizes <= EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC:\r
602 raise Exception("ERROR: No relocation information available !")\r
603 elif self.PeHdr.OptionalHeader.PeOptHdr.Magic == 0x20b: # PE32+ image\r
604 if self.PeHdr.FileHeader.SizeOfOptionalHeader < EFI_IMAGE_OPTIONAL_HEADER32_PLUS.DataDirectory.offset:\r
605 raise Exception("ERROR: Unsupported PE32+ image !")\r
606 if self.PeHdr.OptionalHeader.PePlusOptHdr.NumberOfRvaAndSizes <= EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC:\r
607 raise Exception("ERROR: No relocation information available !")\r
608 else:\r
609 raise Exception("ERROR: Invalid PE32 optional header !")\r
e8a70885
MM
610 self.Offset = offset\r
611 self.Data = data\r
c6ca1c01
MM
612 self.RelocList = []\r
613\r
e8a70885
MM
614 def IsTeImage(self):\r
615 return self.TeHdr is not None\r
616\r
c6ca1c01 617 def ParseReloc(self):\r
e8a70885
MM
618 if self.IsTeImage():\r
619 rsize = self.TeHdr.DataDirectoryBaseReloc.Size\r
620 roffset = sizeof(self.TeHdr) - self.TeHdr.StrippedSize + self.TeHdr.DataDirectoryBaseReloc.VirtualAddress\r
621 else:\r
cc0d998b
CC
622 if self.PeHdr.OptionalHeader.PeOptHdr.Magic == 0x10b: # PE32 image\r
623 rsize = self.PeHdr.OptionalHeader.PeOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].Size\r
624 roffset = self.PeHdr.OptionalHeader.PeOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].VirtualAddress\r
625 if self.PeHdr.OptionalHeader.PeOptHdr.Magic == 0x20b: # PE32+ image\r
626 rsize = self.PeHdr.OptionalHeader.PePlusOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].Size\r
627 roffset = self.PeHdr.OptionalHeader.PePlusOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].VirtualAddress\r
e8a70885 628\r
c6ca1c01
MM
629 alignment = 4\r
630 offset = roffset\r
631 while offset < roffset + rsize:\r
632 offset = AlignPtr(offset, 4)\r
e8a70885 633 blkhdr = PE_RELOC_BLOCK_HEADER.from_buffer(self.Data, offset)\r
c6ca1c01
MM
634 offset += sizeof(blkhdr)\r
635 # Read relocation type,offset pairs\r
636 rlen = blkhdr.BlockSize - sizeof(PE_RELOC_BLOCK_HEADER)\r
c3f0829b 637 rnum = int (rlen/sizeof(c_uint16))\r
e8a70885 638 rdata = (c_uint16 * rnum).from_buffer(self.Data, offset)\r
c6ca1c01
MM
639 for each in rdata:\r
640 roff = each & 0xfff\r
641 rtype = each >> 12\r
cc0d998b 642 if rtype == 0: # IMAGE_REL_BASED_ABSOLUTE:\r
c6ca1c01 643 continue\r
cc0d998b 644 if ((rtype != 3) and (rtype != 10)): # IMAGE_REL_BASED_HIGHLOW and IMAGE_REL_BASED_DIR64\r
c6ca1c01
MM
645 raise Exception("ERROR: Unsupported relocation type %d!" % rtype)\r
646 # Calculate the offset of the relocation\r
e8a70885
MM
647 aoff = blkhdr.PageRVA + roff\r
648 if self.IsTeImage():\r
649 aoff += sizeof(self.TeHdr) - self.TeHdr.StrippedSize\r
c6ca1c01
MM
650 self.RelocList.append((rtype, aoff))\r
651 offset += sizeof(rdata)\r
652\r
653 def Rebase(self, delta, fdbin):\r
654 count = 0\r
655 if delta == 0:\r
656 return count\r
657\r
658 for (rtype, roff) in self.RelocList:\r
cc0d998b 659 if rtype == 3: # IMAGE_REL_BASED_HIGHLOW\r
c6ca1c01
MM
660 offset = roff + self.Offset\r
661 value = Bytes2Val(fdbin[offset:offset+sizeof(c_uint32)])\r
662 value += delta\r
663 fdbin[offset:offset+sizeof(c_uint32)] = Val2Bytes(value, sizeof(c_uint32))\r
664 count += 1\r
cc0d998b
CC
665 elif rtype == 10: # IMAGE_REL_BASED_DIR64\r
666 offset = roff + self.Offset\r
667 value = Bytes2Val(fdbin[offset:offset+sizeof(c_uint64)])\r
668 value += delta\r
669 fdbin[offset:offset+sizeof(c_uint64)] = Val2Bytes(value, sizeof(c_uint64))\r
670 count += 1\r
c6ca1c01
MM
671 else:\r
672 raise Exception('ERROR: Unknown relocation type %d !' % rtype)\r
673\r
e8a70885
MM
674 if self.IsTeImage():\r
675 offset = self.Offset + EFI_TE_IMAGE_HEADER.ImageBase.offset\r
676 size = EFI_TE_IMAGE_HEADER.ImageBase.size\r
677 else:\r
678 offset = self.Offset + self.DosHdr.e_lfanew\r
679 offset += EFI_IMAGE_NT_HEADERS32.OptionalHeader.offset\r
680 offset += EFI_IMAGE_OPTIONAL_HEADER32.ImageBase.offset\r
681 size = EFI_IMAGE_OPTIONAL_HEADER32.ImageBase.size\r
682\r
683 value = Bytes2Val(fdbin[offset:offset+size]) + delta\r
684 fdbin[offset:offset+size] = Val2Bytes(value, size)\r
c6ca1c01
MM
685\r
686 return count\r
cf1d4549 687\r
c6ca1c01
MM
688def ShowFspInfo (fspfile):\r
689 fd = FirmwareDevice(0, fspfile)\r
690 fd.ParseFd ()\r
691 fd.ParseFsp ()\r
692\r
693 print ("\nFound the following %d Firmware Volumes in FSP binary:" % (len(fd.FvList)))\r
694 for idx, fv in enumerate(fd.FvList):\r
695 name = fv.FvExtHdr.FvName\r
cf1d4549 696 if not name:\r
c6ca1c01
MM
697 name = '\xff' * 16\r
698 else:\r
c3f0829b
CC
699 if sys.version_info[0] < 3:\r
700 name = str(bytearray(name))\r
701 else:\r
702 name = bytes(name)\r
703 guid = uuid.UUID(bytes_le = name)\r
c6ca1c01
MM
704 print ("FV%d:" % idx)\r
705 print (" GUID : %s" % str(guid).upper())\r
706 print (" Offset : 0x%08X" % fv.Offset)\r
707 print (" Length : 0x%08X" % fv.FvHdr.FvLength)\r
708 print ("\n")\r
709\r
710 for fsp in fd.FspList:\r
711 fvlist = map(lambda x : 'FV%d' % x, fsp.FvIdxList)\r
712 print ("FSP_%s contains %s" % (fsp.Type, ','.join(fvlist)))\r
713 print ("%s" % (OutputStruct(fsp.Fih, 0, fsp.Fih.HeaderLength)))\r
714\r
715def GenFspHdr (fspfile, outdir, hfile):\r
716 fd = FirmwareDevice(0, fspfile)\r
717 fd.ParseFd ()\r
718 fd.ParseFsp ()\r
719\r
720 if not hfile:\r
721 hfile = os.path.splitext(os.path.basename(fspfile))[0] + '.h'\r
722 fspname, ext = os.path.splitext(os.path.basename(hfile))\r
723 filename = os.path.join(outdir, fspname + ext)\r
724 hfsp = open(filename, 'w')\r
725 hfsp.write ('%s\n\n' % CopyRightHeaderFile)\r
726\r
727 firstfv = True\r
728 for fsp in fd.FspList:\r
729 fih = fsp.Fih\r
730 if firstfv:\r
c3f0829b
CC
731 if sys.version_info[0] < 3:\r
732 hfsp.write("#define FSP_IMAGE_ID 0x%016X /* '%s' */\n" % (Bytes2Val(bytearray(fih.ImageId)), fih.ImageId))\r
733 else:\r
734 hfsp.write("#define FSP_IMAGE_ID 0x%016X /* '%s' */\n" % (Bytes2Val(bytearray(fih.ImageId)), str (fih.ImageId, 'utf-8')))\r
c6ca1c01
MM
735 hfsp.write("#define FSP_IMAGE_REV 0x%08X \n\n" % fih.ImageRevision)\r
736 firstfv = False\r
737 fv = fd.FvList[fsp.FvIdxList[0]]\r
738 hfsp.write ('#define FSP%s_BASE 0x%08X\n' % (fsp.Type, fih.ImageBase))\r
739 hfsp.write ('#define FSP%s_OFFSET 0x%08X\n' % (fsp.Type, fv.Offset))\r
740 hfsp.write ('#define FSP%s_LENGTH 0x%08X\n\n' % (fsp.Type, fih.ImageSize))\r
741\r
742 hfsp.close()\r
743\r
744def SplitFspBin (fspfile, outdir, nametemplate):\r
745 fd = FirmwareDevice(0, fspfile)\r
746 fd.ParseFd ()\r
747 fd.ParseFsp ()\r
748\r
749 for fsp in fd.FspList:\r
8349b868
CC
750 if fsp.Fih.HeaderRevision < 3:\r
751 raise Exception("ERROR: FSP 1.x is not supported by the split command !")\r
c6ca1c01
MM
752 ftype = fsp.Type\r
753 if not nametemplate:\r
754 nametemplate = fspfile\r
755 fspname, ext = os.path.splitext(os.path.basename(nametemplate))\r
756 filename = os.path.join(outdir, fspname + '_' + fsp.Type + ext)\r
757 hfsp = open(filename, 'wb')\r
9062ab47 758 print ("Create FSP component file '%s'" % filename)\r
c6ca1c01
MM
759 for fvidx in fsp.FvIdxList:\r
760 fv = fd.FvList[fvidx]\r
761 hfsp.write(fv.FvData)\r
cf1d4549
JY
762 hfsp.close()\r
763\r
c6ca1c01
MM
764def RebaseFspBin (FspBinary, FspComponent, FspBase, OutputDir, OutputFile):\r
765 fd = FirmwareDevice(0, FspBinary)\r
766 fd.ParseFd ()\r
767 fd.ParseFsp ()\r
cf1d4549 768\r
c6ca1c01
MM
769 numcomp = len(FspComponent)\r
770 baselist = FspBase\r
771 if numcomp != len(baselist):\r
c3f0829b 772 print ("ERROR: Required number of base does not match number of FSP component !")\r
c6ca1c01 773 return\r
cf1d4549 774\r
c6ca1c01
MM
775 newfspbin = fd.FdData[:]\r
776\r
777 for idx, fspcomp in enumerate(FspComponent):\r
778\r
779 found = False\r
780 for fsp in fd.FspList:\r
8349b868
CC
781 # Is this FSP 1.x single binary?\r
782 if fsp.Fih.HeaderRevision < 3:\r
783 found = True\r
784 ftype = 'X'\r
785 break\r
c6ca1c01
MM
786 ftype = fsp.Type.lower()\r
787 if ftype == fspcomp:\r
788 found = True\r
789 break\r
790\r
791 if not found:\r
c3f0829b 792 print ("ERROR: Could not find FSP_%c component to rebase !" % fspcomp.upper())\r
c6ca1c01
MM
793 return\r
794\r
795 fspbase = baselist[idx]\r
796 if fspbase.startswith('0x'):\r
797 newbase = int(fspbase, 16)\r
798 else:\r
799 newbase = int(fspbase)\r
800 oldbase = fsp.Fih.ImageBase\r
801 delta = newbase - oldbase\r
c3f0829b 802 print ("Rebase FSP-%c from 0x%08X to 0x%08X:" % (ftype.upper(),oldbase,newbase))\r
c6ca1c01 803\r
e8a70885 804 imglist = []\r
c6ca1c01
MM
805 for fvidx in fsp.FvIdxList:\r
806 fv = fd.FvList[fvidx]\r
807 for ffs in fv.FfsList:\r
808 for sec in ffs.SecList:\r
e8a70885 809 if sec.SecHdr.Type in [EFI_SECTION_TYPE.TE, EFI_SECTION_TYPE.PE32]: # TE or PE32\r
c6ca1c01 810 offset = fd.Offset + fv.Offset + ffs.Offset + sec.Offset + sizeof(sec.SecHdr)\r
e8a70885 811 imglist.append ((offset, len(sec.SecData) - sizeof(sec.SecHdr)))\r
c6ca1c01
MM
812\r
813 fcount = 0\r
e8a70885
MM
814 pcount = 0\r
815 for (offset, length) in imglist:\r
816 img = PeTeImage(offset, fd.FdData[offset:offset + length])\r
817 img.ParseReloc()\r
818 pcount += img.Rebase(delta, newfspbin)\r
819 fcount += 1\r
820\r
c3f0829b 821 print (" Patched %d entries in %d TE/PE32 images." % (pcount, fcount))\r
c6ca1c01
MM
822\r
823 (count, applied) = fsp.Patch(delta, newfspbin)\r
c3f0829b 824 print (" Patched %d entries using FSP patch table." % applied)\r
c6ca1c01 825 if count != applied:\r
c3f0829b 826 print (" %d invalid entries are ignored !" % (count - applied))\r
c6ca1c01
MM
827\r
828 if OutputFile == '':\r
829 filename = os.path.basename(FspBinary)\r
830 base, ext = os.path.splitext(filename)\r
831 OutputFile = base + "_%08X" % newbase + ext\r
832\r
833 fspname, ext = os.path.splitext(os.path.basename(OutputFile))\r
834 filename = os.path.join(OutputDir, fspname + ext)\r
835 fd = open(filename, "wb")\r
836 fd.write(newfspbin)\r
837 fd.close()\r
cf1d4549
JY
838\r
839def main ():\r
c6ca1c01
MM
840 parser = argparse.ArgumentParser()\r
841 subparsers = parser.add_subparsers(title='commands')\r
842\r
843 parser_rebase = subparsers.add_parser('rebase', help='rebase a FSP into a new base address')\r
844 parser_rebase.set_defaults(which='rebase')\r
845 parser_rebase.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
846 parser_rebase.add_argument('-c', '--fspcomp', choices=['t','m','s','o'], nargs='+', dest='FspComponent', type=str, help='FSP component to rebase', default = "['t']", required = True)\r
847 parser_rebase.add_argument('-b', '--newbase', dest='FspBase', nargs='+', type=str, help='Rebased FSP binary file name', default = '', required = True)\r
848 parser_rebase.add_argument('-o', '--outdir' , dest='OutputDir', type=str, help='Output directory path', default = '.')\r
849 parser_rebase.add_argument('-n', '--outfile', dest='OutputFile', type=str, help='Rebased FSP binary file name', default = '')\r
cf1d4549
JY
850\r
851 parser_split = subparsers.add_parser('split', help='split a FSP into multiple components')\r
852 parser_split.set_defaults(which='split')\r
853 parser_split.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
854 parser_split.add_argument('-o', '--outdir' , dest='OutputDir', type=str, help='Output directory path', default = '.')\r
855 parser_split.add_argument('-n', '--nametpl', dest='NameTemplate', type=str, help='Output name template', default = '')\r
cf1d4549
JY
856\r
857 parser_genhdr = subparsers.add_parser('genhdr', help='generate a header file for FSP binary')\r
858 parser_genhdr.set_defaults(which='genhdr')\r
859 parser_genhdr.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
860 parser_genhdr.add_argument('-o', '--outdir' , dest='OutputDir', type=str, help='Output directory path', default = '.')\r
861 parser_genhdr.add_argument('-n', '--hfile', dest='HFileName', type=str, help='Output header file name', default = '')\r
c6ca1c01
MM
862\r
863 parser_info = subparsers.add_parser('info', help='display FSP information')\r
864 parser_info.set_defaults(which='info')\r
865 parser_info.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
cf1d4549
JY
866\r
867 args = parser.parse_args()\r
c6ca1c01 868 if args.which in ['rebase', 'split', 'genhdr', 'info']:\r
cf1d4549 869 if not os.path.exists(args.FspBinary):\r
c6ca1c01
MM
870 raise Exception ("ERROR: Could not locate FSP binary file '%s' !" % args.FspBinary)\r
871 if hasattr(args, 'OutputDir') and not os.path.exists(args.OutputDir):\r
872 raise Exception ("ERROR: Invalid output directory '%s' !" % args.OutputDir)\r
873\r
874 if args.which == 'rebase':\r
875 RebaseFspBin (args.FspBinary, args.FspComponent, args.FspBase, args.OutputDir, args.OutputFile)\r
876 elif args.which == 'split':\r
877 SplitFspBin (args.FspBinary, args.OutputDir, args.NameTemplate)\r
cf1d4549 878 elif args.which == 'genhdr':\r
c6ca1c01
MM
879 GenFspHdr (args.FspBinary, args.OutputDir, args.HFileName)\r
880 elif args.which == 'info':\r
881 ShowFspInfo (args.FspBinary)\r
cf1d4549
JY
882 else:\r
883 pass\r
884\r
cf1d4549
JY
885 return 0\r
886\r
887if __name__ == '__main__':\r
888 sys.exit(main())\r