]> git.proxmox.com Git - mirror_edk2.git/blame - IntelFsp2Pkg/Tools/SplitFspBin.py
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / IntelFsp2Pkg / Tools / SplitFspBin.py
CommitLineData
939c2355 1## @ SplitFspBin.py\r
cf1d4549 2#\r
48249243 3# Copyright (c) 2015 - 2022, Intel Corporation. All rights reserved.<BR>\r
9672cd30 4# SPDX-License-Identifier: BSD-2-Clause-Patent\r
cf1d4549
JY
5#\r
6##\r
7\r
8import os\r
9import sys\r
10import uuid\r
11import copy\r
12import struct\r
13import argparse\r
14from ctypes import *\r
c3f0829b 15from functools import reduce\r
cf1d4549
JY
16\r
17"""\r
8349b868 18This utility supports some operations for Intel FSP 1.x/2.x image.\r
cf1d4549 19It supports:\r
8349b868
CC
20 - Display FSP 1.x/2.x information header\r
21 - Split FSP 2.x image into individual FSP-T/M/S/O component\r
22 - Rebase FSP 1.x/2.x components to a different base address\r
23 - Generate FSP 1.x/2.x mapping C header file\r
c6ca1c01
MM
24"""\r
25\r
26CopyRightHeaderFile = """/*\r
27 *\r
28 * Automatically generated file; DO NOT EDIT.\r
29 * FSP mapping file\r
30 *\r
31 */\r
cf1d4549
JY
32"""\r
33\r
34class c_uint24(Structure):\r
35 """Little-Endian 24-bit Unsigned Integer"""\r
36 _pack_ = 1\r
c6ca1c01 37 _fields_ = [('Data', (c_uint8 * 3))]\r
cf1d4549
JY
38\r
39 def __init__(self, val=0):\r
40 self.set_value(val)\r
41\r
42 def __str__(self, indent=0):\r
43 return '0x%.6x' % self.value\r
44\r
c6ca1c01
MM
45 def __int__(self):\r
46 return self.get_value()\r
cf1d4549
JY
47\r
48 def set_value(self, val):\r
c6ca1c01
MM
49 self.Data[0:3] = Val2Bytes(val, 3)\r
50\r
51 def get_value(self):\r
52 return Bytes2Val(self.Data[0:3])\r
cf1d4549
JY
53\r
54 value = property(get_value, set_value)\r
55\r
56class EFI_FIRMWARE_VOLUME_HEADER(Structure):\r
57 _fields_ = [\r
c6ca1c01
MM
58 ('ZeroVector', ARRAY(c_uint8, 16)),\r
59 ('FileSystemGuid', ARRAY(c_uint8, 16)),\r
60 ('FvLength', c_uint64),\r
61 ('Signature', ARRAY(c_char, 4)),\r
62 ('Attributes', c_uint32),\r
63 ('HeaderLength', c_uint16),\r
64 ('Checksum', c_uint16),\r
65 ('ExtHeaderOffset', c_uint16),\r
66 ('Reserved', c_uint8),\r
67 ('Revision', c_uint8)\r
cf1d4549
JY
68 ]\r
69\r
70class EFI_FIRMWARE_VOLUME_EXT_HEADER(Structure):\r
71 _fields_ = [\r
c6ca1c01
MM
72 ('FvName', ARRAY(c_uint8, 16)),\r
73 ('ExtHeaderSize', c_uint32)\r
cf1d4549
JY
74 ]\r
75\r
76class EFI_FFS_INTEGRITY_CHECK(Structure):\r
77 _fields_ = [\r
c6ca1c01
MM
78 ('Header', c_uint8),\r
79 ('File', c_uint8)\r
cf1d4549
JY
80 ]\r
81\r
82class EFI_FFS_FILE_HEADER(Structure):\r
83 _fields_ = [\r
c6ca1c01
MM
84 ('Name', ARRAY(c_uint8, 16)),\r
85 ('IntegrityCheck', EFI_FFS_INTEGRITY_CHECK),\r
86 ('Type', c_uint8),\r
87 ('Attributes', c_uint8),\r
88 ('Size', c_uint24),\r
89 ('State', c_uint8)\r
cf1d4549
JY
90 ]\r
91\r
92class EFI_COMMON_SECTION_HEADER(Structure):\r
93 _fields_ = [\r
c6ca1c01
MM
94 ('Size', c_uint24),\r
95 ('Type', c_uint8)\r
96 ]\r
97\r
98class FSP_COMMON_HEADER(Structure):\r
99 _fields_ = [\r
100 ('Signature', ARRAY(c_char, 4)),\r
101 ('HeaderLength', c_uint32)\r
cf1d4549
JY
102 ]\r
103\r
104class FSP_INFORMATION_HEADER(Structure):\r
105 _fields_ = [\r
df25a545
CC
106 ('Signature', ARRAY(c_char, 4)),\r
107 ('HeaderLength', c_uint32),\r
108 ('Reserved1', c_uint16),\r
109 ('SpecVersion', c_uint8),\r
110 ('HeaderRevision', c_uint8),\r
111 ('ImageRevision', c_uint32),\r
112 ('ImageId', ARRAY(c_char, 8)),\r
113 ('ImageSize', c_uint32),\r
114 ('ImageBase', c_uint32),\r
115 ('ImageAttribute', c_uint16),\r
116 ('ComponentAttribute', c_uint16),\r
117 ('CfgRegionOffset', c_uint32),\r
118 ('CfgRegionSize', c_uint32),\r
119 ('Reserved2', c_uint32),\r
120 ('TempRamInitEntryOffset', c_uint32),\r
121 ('Reserved3', c_uint32),\r
122 ('NotifyPhaseEntryOffset', c_uint32),\r
123 ('FspMemoryInitEntryOffset', c_uint32),\r
124 ('TempRamExitEntryOffset', c_uint32),\r
125 ('FspSiliconInitEntryOffset', c_uint32),\r
126 ('FspMultiPhaseSiInitEntryOffset', c_uint32),\r
127 ('ExtendedImageRevision', c_uint16),\r
128 ('Reserved4', c_uint16),\r
129 ('FspMultiPhaseMemInitEntryOffset', c_uint32),\r
130 ('FspSmmInitEntryOffset', c_uint32)\r
cf1d4549
JY
131 ]\r
132\r
c6ca1c01
MM
133class FSP_PATCH_TABLE(Structure):\r
134 _fields_ = [\r
135 ('Signature', ARRAY(c_char, 4)),\r
136 ('HeaderLength', c_uint16),\r
137 ('HeaderRevision', c_uint8),\r
138 ('Reserved', c_uint8),\r
139 ('PatchEntryNum', c_uint32)\r
140 ]\r
141\r
142class EFI_IMAGE_DATA_DIRECTORY(Structure):\r
143 _fields_ = [\r
144 ('VirtualAddress', c_uint32),\r
145 ('Size', c_uint32)\r
146 ]\r
147\r
148class EFI_TE_IMAGE_HEADER(Structure):\r
149 _fields_ = [\r
150 ('Signature', ARRAY(c_char, 2)),\r
151 ('Machine', c_uint16),\r
152 ('NumberOfSections', c_uint8),\r
153 ('Subsystem', c_uint8),\r
154 ('StrippedSize', c_uint16),\r
155 ('AddressOfEntryPoint', c_uint32),\r
156 ('BaseOfCode', c_uint32),\r
157 ('ImageBase', c_uint64),\r
158 ('DataDirectoryBaseReloc', EFI_IMAGE_DATA_DIRECTORY),\r
159 ('DataDirectoryDebug', EFI_IMAGE_DATA_DIRECTORY)\r
160 ]\r
161\r
e8a70885
MM
162class EFI_IMAGE_DOS_HEADER(Structure):\r
163 _fields_ = [\r
164 ('e_magic', c_uint16),\r
165 ('e_cblp', c_uint16),\r
166 ('e_cp', c_uint16),\r
167 ('e_crlc', c_uint16),\r
168 ('e_cparhdr', c_uint16),\r
169 ('e_minalloc', c_uint16),\r
170 ('e_maxalloc', c_uint16),\r
171 ('e_ss', c_uint16),\r
172 ('e_sp', c_uint16),\r
173 ('e_csum', c_uint16),\r
174 ('e_ip', c_uint16),\r
175 ('e_cs', c_uint16),\r
176 ('e_lfarlc', c_uint16),\r
177 ('e_ovno', c_uint16),\r
178 ('e_res', ARRAY(c_uint16, 4)),\r
179 ('e_oemid', c_uint16),\r
180 ('e_oeminfo', c_uint16),\r
181 ('e_res2', ARRAY(c_uint16, 10)),\r
182 ('e_lfanew', c_uint16)\r
183 ]\r
184\r
185class EFI_IMAGE_FILE_HEADER(Structure):\r
186 _fields_ = [\r
187 ('Machine', c_uint16),\r
188 ('NumberOfSections', c_uint16),\r
189 ('TimeDateStamp', c_uint32),\r
190 ('PointerToSymbolTable', c_uint32),\r
191 ('NumberOfSymbols', c_uint32),\r
192 ('SizeOfOptionalHeader', c_uint16),\r
193 ('Characteristics', c_uint16)\r
194 ]\r
195\r
c6ca1c01
MM
196class PE_RELOC_BLOCK_HEADER(Structure):\r
197 _fields_ = [\r
198 ('PageRVA', c_uint32),\r
199 ('BlockSize', c_uint32)\r
200 ]\r
cf1d4549 201\r
e8a70885
MM
202class EFI_IMAGE_OPTIONAL_HEADER32(Structure):\r
203 _fields_ = [\r
204 ('Magic', c_uint16),\r
205 ('MajorLinkerVersion', c_uint8),\r
206 ('MinorLinkerVersion', c_uint8),\r
207 ('SizeOfCode', c_uint32),\r
208 ('SizeOfInitializedData', c_uint32),\r
209 ('SizeOfUninitializedData', c_uint32),\r
210 ('AddressOfEntryPoint', c_uint32),\r
211 ('BaseOfCode', c_uint32),\r
212 ('BaseOfData', c_uint32),\r
213 ('ImageBase', c_uint32),\r
214 ('SectionAlignment', c_uint32),\r
215 ('FileAlignment', c_uint32),\r
216 ('MajorOperatingSystemVersion', c_uint16),\r
217 ('MinorOperatingSystemVersion', c_uint16),\r
218 ('MajorImageVersion', c_uint16),\r
219 ('MinorImageVersion', c_uint16),\r
220 ('MajorSubsystemVersion', c_uint16),\r
221 ('MinorSubsystemVersion', c_uint16),\r
222 ('Win32VersionValue', c_uint32),\r
223 ('SizeOfImage', c_uint32),\r
224 ('SizeOfHeaders', c_uint32),\r
225 ('CheckSum' , c_uint32),\r
226 ('Subsystem', c_uint16),\r
227 ('DllCharacteristics', c_uint16),\r
228 ('SizeOfStackReserve', c_uint32),\r
229 ('SizeOfStackCommit' , c_uint32),\r
230 ('SizeOfHeapReserve', c_uint32),\r
231 ('SizeOfHeapCommit' , c_uint32),\r
232 ('LoaderFlags' , c_uint32),\r
233 ('NumberOfRvaAndSizes', c_uint32),\r
234 ('DataDirectory', ARRAY(EFI_IMAGE_DATA_DIRECTORY, 16))\r
235 ]\r
236\r
cc0d998b
CC
237class EFI_IMAGE_OPTIONAL_HEADER32_PLUS(Structure):\r
238 _fields_ = [\r
239 ('Magic', c_uint16),\r
240 ('MajorLinkerVersion', c_uint8),\r
241 ('MinorLinkerVersion', c_uint8),\r
242 ('SizeOfCode', c_uint32),\r
243 ('SizeOfInitializedData', c_uint32),\r
244 ('SizeOfUninitializedData', c_uint32),\r
245 ('AddressOfEntryPoint', c_uint32),\r
246 ('BaseOfCode', c_uint32),\r
247 ('ImageBase', c_uint64),\r
248 ('SectionAlignment', c_uint32),\r
249 ('FileAlignment', c_uint32),\r
250 ('MajorOperatingSystemVersion', c_uint16),\r
251 ('MinorOperatingSystemVersion', c_uint16),\r
252 ('MajorImageVersion', c_uint16),\r
253 ('MinorImageVersion', c_uint16),\r
254 ('MajorSubsystemVersion', c_uint16),\r
255 ('MinorSubsystemVersion', c_uint16),\r
256 ('Win32VersionValue', c_uint32),\r
257 ('SizeOfImage', c_uint32),\r
258 ('SizeOfHeaders', c_uint32),\r
259 ('CheckSum' , c_uint32),\r
260 ('Subsystem', c_uint16),\r
261 ('DllCharacteristics', c_uint16),\r
262 ('SizeOfStackReserve', c_uint64),\r
263 ('SizeOfStackCommit' , c_uint64),\r
264 ('SizeOfHeapReserve', c_uint64),\r
265 ('SizeOfHeapCommit' , c_uint64),\r
266 ('LoaderFlags' , c_uint32),\r
267 ('NumberOfRvaAndSizes', c_uint32),\r
268 ('DataDirectory', ARRAY(EFI_IMAGE_DATA_DIRECTORY, 16))\r
269 ]\r
270\r
271class EFI_IMAGE_OPTIONAL_HEADER(Union):\r
272 _fields_ = [\r
273 ('PeOptHdr', EFI_IMAGE_OPTIONAL_HEADER32),\r
274 ('PePlusOptHdr', EFI_IMAGE_OPTIONAL_HEADER32_PLUS)\r
275 ]\r
276\r
e8a70885
MM
277class EFI_IMAGE_NT_HEADERS32(Structure):\r
278 _fields_ = [\r
279 ('Signature', c_uint32),\r
280 ('FileHeader', EFI_IMAGE_FILE_HEADER),\r
cc0d998b 281 ('OptionalHeader', EFI_IMAGE_OPTIONAL_HEADER)\r
e8a70885
MM
282 ]\r
283\r
284\r
285class EFI_IMAGE_DIRECTORY_ENTRY:\r
286 EXPORT = 0\r
287 IMPORT = 1\r
288 RESOURCE = 2\r
289 EXCEPTION = 3\r
290 SECURITY = 4\r
291 BASERELOC = 5\r
292 DEBUG = 6\r
293 COPYRIGHT = 7\r
294 GLOBALPTR = 8\r
295 TLS = 9\r
296 LOAD_CONFIG = 10\r
297\r
c6ca1c01
MM
298class EFI_FV_FILETYPE:\r
299 ALL = 0x00\r
300 RAW = 0x01\r
301 FREEFORM = 0x02\r
302 SECURITY_CORE = 0x03\r
303 PEI_CORE = 0x04\r
304 DXE_CORE = 0x05\r
305 PEIM = 0x06\r
306 DRIVER = 0x07\r
307 COMBINED_PEIM_DRIVER = 0x08\r
308 APPLICATION = 0x09\r
309 SMM = 0x0a\r
310 FIRMWARE_VOLUME_IMAGE = 0x0b\r
311 COMBINED_SMM_DXE = 0x0c\r
312 SMM_CORE = 0x0d\r
313 OEM_MIN = 0xc0\r
314 OEM_MAX = 0xdf\r
315 DEBUG_MIN = 0xe0\r
316 DEBUG_MAX = 0xef\r
317 FFS_MIN = 0xf0\r
318 FFS_MAX = 0xff\r
319 FFS_PAD = 0xf0\r
320\r
321class EFI_SECTION_TYPE:\r
322 """Enumeration of all valid firmware file section types."""\r
323 ALL = 0x00\r
324 COMPRESSION = 0x01\r
325 GUID_DEFINED = 0x02\r
326 DISPOSABLE = 0x03\r
327 PE32 = 0x10\r
328 PIC = 0x11\r
329 TE = 0x12\r
330 DXE_DEPEX = 0x13\r
331 VERSION = 0x14\r
332 USER_INTERFACE = 0x15\r
333 COMPATIBILITY16 = 0x16\r
334 FIRMWARE_VOLUME_IMAGE = 0x17\r
335 FREEFORM_SUBTYPE_GUID = 0x18\r
336 RAW = 0x19\r
337 PEI_DEPEX = 0x1b\r
338 SMM_DEPEX = 0x1c\r
339\r
340def AlignPtr (offset, alignment = 8):\r
341 return (offset + alignment - 1) & ~(alignment - 1)\r
342\r
343def Bytes2Val (bytes):\r
344 return reduce(lambda x,y: (x<<8)|y, bytes[::-1] )\r
345\r
346def Val2Bytes (value, blen):\r
347 return [(value>>(i*8) & 0xff) for i in range(blen)]\r
348\r
c3f0829b
CC
349def IsIntegerType (val):\r
350 if sys.version_info[0] < 3:\r
351 if type(val) in (int, long):\r
352 return True\r
353 else:\r
354 if type(val) is int:\r
355 return True\r
356 return False\r
357\r
358def IsStrType (val):\r
359 if sys.version_info[0] < 3:\r
360 if type(val) is str:\r
361 return True\r
362 else:\r
363 if type(val) is bytes:\r
364 return True\r
365 return False\r
366\r
367def HandleNameStr (val):\r
368 if sys.version_info[0] < 3:\r
369 rep = "0x%X ('%s')" % (Bytes2Val (bytearray (val)), val)\r
370 else:\r
371 rep = "0x%X ('%s')" % (Bytes2Val (bytearray (val)), str (val, 'utf-8'))\r
372 return rep\r
373\r
c6ca1c01
MM
374def OutputStruct (obj, indent = 0, plen = 0):\r
375 if indent:\r
376 body = ''\r
377 else:\r
378 body = (' ' * indent + '<%s>:\n') % obj.__class__.__name__\r
379\r
380 if plen == 0:\r
381 plen = sizeof(obj)\r
382\r
383 max_key_len = 26\r
384 pstr = (' ' * (indent + 1) + '{0:<%d} = {1}\n') % max_key_len\r
385\r
386 for field in obj._fields_:\r
387 key = field[0]\r
388 val = getattr(obj, key)\r
389 rep = ''\r
390 if not isinstance(val, c_uint24) and isinstance(val, Structure):\r
391 body += pstr.format(key, val.__class__.__name__)\r
392 body += OutputStruct (val, indent + 1)\r
393 plen -= sizeof(val)\r
cf1d4549 394 else:\r
c3f0829b
CC
395 if IsStrType (val):\r
396 rep = HandleNameStr (val)\r
397 elif IsIntegerType (val):\r
9a95d110
CC
398 if (key == 'ImageRevision'):\r
399 FspImageRevisionMajor = ((val >> 24) & 0xFF)\r
400 FspImageRevisionMinor = ((val >> 16) & 0xFF)\r
401 FspImageRevisionRevision = ((val >> 8) & 0xFF)\r
402 FspImageRevisionBuildNumber = (val & 0xFF)\r
403 rep = '0x%08X' % val\r
404 elif (key == 'ExtendedImageRevision'):\r
405 FspImageRevisionRevision |= (val & 0xFF00)\r
406 FspImageRevisionBuildNumber |= ((val << 8) & 0xFF00)\r
407 rep = "0x%04X ('%02X.%02X.%04X.%04X')" % (val, FspImageRevisionMajor, FspImageRevisionMinor, FspImageRevisionRevision, FspImageRevisionBuildNumber)\r
408 elif field[1] == c_uint64:\r
409 rep = '0x%016X' % val\r
410 elif field[1] == c_uint32:\r
411 rep = '0x%08X' % val\r
412 elif field[1] == c_uint16:\r
413 rep = '0x%04X' % val\r
414 elif field[1] == c_uint8:\r
415 rep = '0x%02X' % val\r
416 else:\r
417 rep = '0x%X' % val\r
c6ca1c01
MM
418 elif isinstance(val, c_uint24):\r
419 rep = '0x%X' % val.get_value()\r
420 elif 'c_ubyte_Array' in str(type(val)):\r
421 if sizeof(val) == 16:\r
c3f0829b
CC
422 if sys.version_info[0] < 3:\r
423 rep = str(bytearray(val))\r
424 else:\r
425 rep = bytes(val)\r
426 rep = str(uuid.UUID(bytes_le = rep)).upper()\r
cf1d4549 427 else:\r
c6ca1c01
MM
428 res = ['0x%02X'%i for i in bytearray(val)]\r
429 rep = '[%s]' % (','.join(res))\r
430 else:\r
431 rep = str(val)\r
432 plen -= sizeof(field[1])\r
433 body += pstr.format(key, rep)\r
434 if plen <= 0:\r
435 break\r
436 return body\r
437\r
438class Section:\r
439 def __init__(self, offset, secdata):\r
440 self.SecHdr = EFI_COMMON_SECTION_HEADER.from_buffer (secdata, 0)\r
441 self.SecData = secdata[0:int(self.SecHdr.Size)]\r
442 self.Offset = offset\r
443\r
444class FirmwareFile:\r
445 def __init__(self, offset, filedata):\r
446 self.FfsHdr = EFI_FFS_FILE_HEADER.from_buffer (filedata, 0)\r
447 self.FfsData = filedata[0:int(self.FfsHdr.Size)]\r
448 self.Offset = offset\r
449 self.SecList = []\r
450\r
451 def ParseFfs(self):\r
452 ffssize = len(self.FfsData)\r
453 offset = sizeof(self.FfsHdr)\r
454 if self.FfsHdr.Name != '\xff' * 16:\r
9e639c1c 455 while offset < (ffssize - sizeof (EFI_COMMON_SECTION_HEADER)):\r
c6ca1c01
MM
456 sechdr = EFI_COMMON_SECTION_HEADER.from_buffer (self.FfsData, offset)\r
457 sec = Section (offset, self.FfsData[offset:offset + int(sechdr.Size)])\r
458 self.SecList.append(sec)\r
459 offset += int(sechdr.Size)\r
460 offset = AlignPtr(offset, 4)\r
461\r
462class FirmwareVolume:\r
463 def __init__(self, offset, fvdata):\r
464 self.FvHdr = EFI_FIRMWARE_VOLUME_HEADER.from_buffer (fvdata, 0)\r
465 self.FvData = fvdata[0 : self.FvHdr.FvLength]\r
466 self.Offset = offset\r
467 if self.FvHdr.ExtHeaderOffset > 0:\r
468 self.FvExtHdr = EFI_FIRMWARE_VOLUME_EXT_HEADER.from_buffer (self.FvData, self.FvHdr.ExtHeaderOffset)\r
cf1d4549 469 else:\r
c6ca1c01
MM
470 self.FvExtHdr = None\r
471 self.FfsList = []\r
472\r
473 def ParseFv(self):\r
474 fvsize = len(self.FvData)\r
475 if self.FvExtHdr:\r
476 offset = self.FvHdr.ExtHeaderOffset + self.FvExtHdr.ExtHeaderSize\r
cf1d4549 477 else:\r
c6ca1c01
MM
478 offset = self.FvHdr.HeaderLength\r
479 offset = AlignPtr(offset)\r
9e639c1c 480 while offset < (fvsize - sizeof (EFI_FFS_FILE_HEADER)):\r
c6ca1c01
MM
481 ffshdr = EFI_FFS_FILE_HEADER.from_buffer (self.FvData, offset)\r
482 if (ffshdr.Name == '\xff' * 16) and (int(ffshdr.Size) == 0xFFFFFF):\r
483 offset = fvsize\r
484 else:\r
485 ffs = FirmwareFile (offset, self.FvData[offset:offset + int(ffshdr.Size)])\r
486 ffs.ParseFfs()\r
487 self.FfsList.append(ffs)\r
488 offset += int(ffshdr.Size)\r
489 offset = AlignPtr(offset)\r
490\r
491class FspImage:\r
492 def __init__(self, offset, fih, fihoff, patch):\r
493 self.Fih = fih\r
494 self.FihOffset = fihoff\r
495 self.Offset = offset\r
496 self.FvIdxList = []\r
5a3641bf 497 self.Type = "XTMSIXXXOXXXXXXX"[(fih.ComponentAttribute >> 12) & 0x0F]\r
c6ca1c01
MM
498 self.PatchList = patch\r
499 self.PatchList.append(fihoff + 0x1C)\r
500\r
501 def AppendFv(self, FvIdx):\r
502 self.FvIdxList.append(FvIdx)\r
503\r
504 def Patch(self, delta, fdbin):\r
505 count = 0\r
506 applied = 0\r
507 for idx, patch in enumerate(self.PatchList):\r
508 ptype = (patch>>24) & 0x0F\r
509 if ptype not in [0x00, 0x0F]:\r
510 raise Exception('ERROR: Invalid patch type %d !' % ptype)\r
511 if patch & 0x80000000:\r
512 patch = self.Fih.ImageSize - (0x1000000 - (patch & 0xFFFFFF))\r
513 else:\r
514 patch = patch & 0xFFFFFF\r
515 if (patch < self.Fih.ImageSize) and (patch + sizeof(c_uint32) <= self.Fih.ImageSize):\r
516 offset = patch + self.Offset\r
517 value = Bytes2Val(fdbin[offset:offset+sizeof(c_uint32)])\r
518 value += delta\r
519 fdbin[offset:offset+sizeof(c_uint32)] = Val2Bytes(value, sizeof(c_uint32))\r
520 applied += 1\r
521 count += 1\r
522 # Don't count the FSP base address patch entry appended at the end\r
523 if count != 0:\r
524 count -= 1\r
525 applied -= 1\r
526 return (count, applied)\r
527\r
528class FirmwareDevice:\r
529 def __init__(self, offset, fdfile):\r
530 self.FvList = []\r
531 self.FspList = []\r
532 self.FdFile = fdfile\r
533 self.Offset = 0\r
534 hfsp = open (self.FdFile, 'rb')\r
535 self.FdData = bytearray(hfsp.read())\r
536 hfsp.close()\r
cf1d4549 537\r
c6ca1c01
MM
538 def ParseFd(self):\r
539 offset = 0\r
540 fdsize = len(self.FdData)\r
541 self.FvList = []\r
9e639c1c 542 while offset < (fdsize - sizeof (EFI_FIRMWARE_VOLUME_HEADER)):\r
c6ca1c01 543 fvh = EFI_FIRMWARE_VOLUME_HEADER.from_buffer (self.FdData, offset)\r
c3f0829b 544 if b'_FVH' != fvh.Signature:\r
c6ca1c01
MM
545 raise Exception("ERROR: Invalid FV header !")\r
546 fv = FirmwareVolume (offset, self.FdData[offset:offset + fvh.FvLength])\r
547 fv.ParseFv ()\r
548 self.FvList.append(fv)\r
549 offset += fv.FvHdr.FvLength\r
cf1d4549
JY
550\r
551 def CheckFsp (self):\r
c6ca1c01 552 if len(self.FspList) == 0:\r
cf1d4549
JY
553 return\r
554\r
555 fih = None\r
c6ca1c01 556 for fsp in self.FspList:\r
cf1d4549 557 if not fih:\r
c6ca1c01 558 fih = fsp.Fih\r
cf1d4549 559 else:\r
c6ca1c01 560 newfih = fsp.Fih\r
cf1d4549 561 if (newfih.ImageId != fih.ImageId) or (newfih.ImageRevision != fih.ImageRevision):\r
c6ca1c01
MM
562 raise Exception("ERROR: Inconsistent FSP ImageId or ImageRevision detected !")\r
563\r
564 def ParseFsp(self):\r
565 flen = 0\r
566 for idx, fv in enumerate(self.FvList):\r
567 # Check if this FV contains FSP header\r
568 if flen == 0:\r
569 if len(fv.FfsList) == 0:\r
570 continue\r
571 ffs = fv.FfsList[0]\r
572 if len(ffs.SecList) == 0:\r
573 continue\r
574 sec = ffs.SecList[0]\r
575 if sec.SecHdr.Type != EFI_SECTION_TYPE.RAW:\r
576 continue\r
577 fihoffset = ffs.Offset + sec.Offset + sizeof(sec.SecHdr)\r
578 fspoffset = fv.Offset\r
579 offset = fspoffset + fihoffset\r
580 fih = FSP_INFORMATION_HEADER.from_buffer (self.FdData, offset)\r
c3f0829b 581 if b'FSPH' != fih.Signature:\r
c6ca1c01
MM
582 continue\r
583\r
584 offset += fih.HeaderLength\r
585 offset = AlignPtr(offset, 4)\r
586 plist = []\r
587 while True:\r
588 fch = FSP_COMMON_HEADER.from_buffer (self.FdData, offset)\r
c3f0829b 589 if b'FSPP' != fch.Signature:\r
c6ca1c01
MM
590 offset += fch.HeaderLength\r
591 offset = AlignPtr(offset, 4)\r
592 else:\r
593 fspp = FSP_PATCH_TABLE.from_buffer (self.FdData, offset)\r
594 offset += sizeof(fspp)\r
595 pdata = (c_uint32 * fspp.PatchEntryNum).from_buffer(self.FdData, offset)\r
596 plist = list(pdata)\r
597 break\r
598\r
599 fsp = FspImage (fspoffset, fih, fihoffset, plist)\r
600 fsp.AppendFv (idx)\r
601 self.FspList.append(fsp)\r
602 flen = fsp.Fih.ImageSize - fv.FvHdr.FvLength\r
603 else:\r
604 fsp.AppendFv (idx)\r
605 flen -= fv.FvHdr.FvLength\r
606 if flen < 0:\r
607 raise Exception("ERROR: Incorrect FV size in image !")\r
608 self.CheckFsp ()\r
609\r
e8a70885
MM
610class PeTeImage:\r
611 def __init__(self, offset, data):\r
612 self.Offset = offset\r
613 tehdr = EFI_TE_IMAGE_HEADER.from_buffer (data, 0)\r
c3f0829b 614 if tehdr.Signature == b'VZ': # TE image\r
e8a70885 615 self.TeHdr = tehdr\r
c3f0829b 616 elif tehdr.Signature == b'MZ': # PE image\r
e8a70885
MM
617 self.TeHdr = None\r
618 self.DosHdr = EFI_IMAGE_DOS_HEADER.from_buffer (data, 0)\r
619 self.PeHdr = EFI_IMAGE_NT_HEADERS32.from_buffer (data, self.DosHdr.e_lfanew)\r
620 if self.PeHdr.Signature != 0x4550:\r
621 raise Exception("ERROR: Invalid PE32 header !")\r
cc0d998b
CC
622 if self.PeHdr.OptionalHeader.PeOptHdr.Magic == 0x10b: # PE32 image\r
623 if self.PeHdr.FileHeader.SizeOfOptionalHeader < EFI_IMAGE_OPTIONAL_HEADER32.DataDirectory.offset:\r
624 raise Exception("ERROR: Unsupported PE32 image !")\r
625 if self.PeHdr.OptionalHeader.PeOptHdr.NumberOfRvaAndSizes <= EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC:\r
626 raise Exception("ERROR: No relocation information available !")\r
627 elif self.PeHdr.OptionalHeader.PeOptHdr.Magic == 0x20b: # PE32+ image\r
628 if self.PeHdr.FileHeader.SizeOfOptionalHeader < EFI_IMAGE_OPTIONAL_HEADER32_PLUS.DataDirectory.offset:\r
629 raise Exception("ERROR: Unsupported PE32+ image !")\r
630 if self.PeHdr.OptionalHeader.PePlusOptHdr.NumberOfRvaAndSizes <= EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC:\r
631 raise Exception("ERROR: No relocation information available !")\r
632 else:\r
633 raise Exception("ERROR: Invalid PE32 optional header !")\r
e8a70885
MM
634 self.Offset = offset\r
635 self.Data = data\r
c6ca1c01
MM
636 self.RelocList = []\r
637\r
e8a70885
MM
638 def IsTeImage(self):\r
639 return self.TeHdr is not None\r
640\r
c6ca1c01 641 def ParseReloc(self):\r
e8a70885
MM
642 if self.IsTeImage():\r
643 rsize = self.TeHdr.DataDirectoryBaseReloc.Size\r
644 roffset = sizeof(self.TeHdr) - self.TeHdr.StrippedSize + self.TeHdr.DataDirectoryBaseReloc.VirtualAddress\r
645 else:\r
3e63a91b
CC
646 # Assuming PE32 image type (self.PeHdr.OptionalHeader.PeOptHdr.Magic == 0x10b)\r
647 rsize = self.PeHdr.OptionalHeader.PeOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].Size\r
648 roffset = self.PeHdr.OptionalHeader.PeOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].VirtualAddress\r
649 if self.PeHdr.OptionalHeader.PePlusOptHdr.Magic == 0x20b: # PE32+ image\r
cc0d998b
CC
650 rsize = self.PeHdr.OptionalHeader.PePlusOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].Size\r
651 roffset = self.PeHdr.OptionalHeader.PePlusOptHdr.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY.BASERELOC].VirtualAddress\r
e8a70885 652\r
c6ca1c01
MM
653 alignment = 4\r
654 offset = roffset\r
655 while offset < roffset + rsize:\r
656 offset = AlignPtr(offset, 4)\r
e8a70885 657 blkhdr = PE_RELOC_BLOCK_HEADER.from_buffer(self.Data, offset)\r
c6ca1c01
MM
658 offset += sizeof(blkhdr)\r
659 # Read relocation type,offset pairs\r
660 rlen = blkhdr.BlockSize - sizeof(PE_RELOC_BLOCK_HEADER)\r
c3f0829b 661 rnum = int (rlen/sizeof(c_uint16))\r
e8a70885 662 rdata = (c_uint16 * rnum).from_buffer(self.Data, offset)\r
c6ca1c01
MM
663 for each in rdata:\r
664 roff = each & 0xfff\r
665 rtype = each >> 12\r
cc0d998b 666 if rtype == 0: # IMAGE_REL_BASED_ABSOLUTE:\r
c6ca1c01 667 continue\r
cc0d998b 668 if ((rtype != 3) and (rtype != 10)): # IMAGE_REL_BASED_HIGHLOW and IMAGE_REL_BASED_DIR64\r
c6ca1c01
MM
669 raise Exception("ERROR: Unsupported relocation type %d!" % rtype)\r
670 # Calculate the offset of the relocation\r
e8a70885
MM
671 aoff = blkhdr.PageRVA + roff\r
672 if self.IsTeImage():\r
673 aoff += sizeof(self.TeHdr) - self.TeHdr.StrippedSize\r
c6ca1c01
MM
674 self.RelocList.append((rtype, aoff))\r
675 offset += sizeof(rdata)\r
676\r
677 def Rebase(self, delta, fdbin):\r
678 count = 0\r
679 if delta == 0:\r
680 return count\r
681\r
682 for (rtype, roff) in self.RelocList:\r
cc0d998b 683 if rtype == 3: # IMAGE_REL_BASED_HIGHLOW\r
c6ca1c01
MM
684 offset = roff + self.Offset\r
685 value = Bytes2Val(fdbin[offset:offset+sizeof(c_uint32)])\r
686 value += delta\r
687 fdbin[offset:offset+sizeof(c_uint32)] = Val2Bytes(value, sizeof(c_uint32))\r
688 count += 1\r
cc0d998b
CC
689 elif rtype == 10: # IMAGE_REL_BASED_DIR64\r
690 offset = roff + self.Offset\r
691 value = Bytes2Val(fdbin[offset:offset+sizeof(c_uint64)])\r
692 value += delta\r
693 fdbin[offset:offset+sizeof(c_uint64)] = Val2Bytes(value, sizeof(c_uint64))\r
694 count += 1\r
c6ca1c01
MM
695 else:\r
696 raise Exception('ERROR: Unknown relocation type %d !' % rtype)\r
697\r
e8a70885
MM
698 if self.IsTeImage():\r
699 offset = self.Offset + EFI_TE_IMAGE_HEADER.ImageBase.offset\r
700 size = EFI_TE_IMAGE_HEADER.ImageBase.size\r
701 else:\r
702 offset = self.Offset + self.DosHdr.e_lfanew\r
703 offset += EFI_IMAGE_NT_HEADERS32.OptionalHeader.offset\r
d448574e
MM
704 if self.PeHdr.OptionalHeader.PePlusOptHdr.Magic == 0x20b: # PE32+ image\r
705 offset += EFI_IMAGE_OPTIONAL_HEADER32_PLUS.ImageBase.offset\r
706 size = EFI_IMAGE_OPTIONAL_HEADER32_PLUS.ImageBase.size\r
707 else:\r
708 offset += EFI_IMAGE_OPTIONAL_HEADER32.ImageBase.offset\r
709 size = EFI_IMAGE_OPTIONAL_HEADER32.ImageBase.size\r
e8a70885
MM
710\r
711 value = Bytes2Val(fdbin[offset:offset+size]) + delta\r
712 fdbin[offset:offset+size] = Val2Bytes(value, size)\r
c6ca1c01
MM
713\r
714 return count\r
cf1d4549 715\r
c6ca1c01
MM
716def ShowFspInfo (fspfile):\r
717 fd = FirmwareDevice(0, fspfile)\r
718 fd.ParseFd ()\r
719 fd.ParseFsp ()\r
720\r
721 print ("\nFound the following %d Firmware Volumes in FSP binary:" % (len(fd.FvList)))\r
722 for idx, fv in enumerate(fd.FvList):\r
723 name = fv.FvExtHdr.FvName\r
cf1d4549 724 if not name:\r
c6ca1c01
MM
725 name = '\xff' * 16\r
726 else:\r
c3f0829b
CC
727 if sys.version_info[0] < 3:\r
728 name = str(bytearray(name))\r
729 else:\r
730 name = bytes(name)\r
731 guid = uuid.UUID(bytes_le = name)\r
c6ca1c01
MM
732 print ("FV%d:" % idx)\r
733 print (" GUID : %s" % str(guid).upper())\r
734 print (" Offset : 0x%08X" % fv.Offset)\r
735 print (" Length : 0x%08X" % fv.FvHdr.FvLength)\r
736 print ("\n")\r
737\r
738 for fsp in fd.FspList:\r
739 fvlist = map(lambda x : 'FV%d' % x, fsp.FvIdxList)\r
740 print ("FSP_%s contains %s" % (fsp.Type, ','.join(fvlist)))\r
741 print ("%s" % (OutputStruct(fsp.Fih, 0, fsp.Fih.HeaderLength)))\r
742\r
743def GenFspHdr (fspfile, outdir, hfile):\r
744 fd = FirmwareDevice(0, fspfile)\r
745 fd.ParseFd ()\r
746 fd.ParseFsp ()\r
747\r
748 if not hfile:\r
749 hfile = os.path.splitext(os.path.basename(fspfile))[0] + '.h'\r
750 fspname, ext = os.path.splitext(os.path.basename(hfile))\r
751 filename = os.path.join(outdir, fspname + ext)\r
752 hfsp = open(filename, 'w')\r
753 hfsp.write ('%s\n\n' % CopyRightHeaderFile)\r
754\r
755 firstfv = True\r
756 for fsp in fd.FspList:\r
757 fih = fsp.Fih\r
758 if firstfv:\r
c3f0829b
CC
759 if sys.version_info[0] < 3:\r
760 hfsp.write("#define FSP_IMAGE_ID 0x%016X /* '%s' */\n" % (Bytes2Val(bytearray(fih.ImageId)), fih.ImageId))\r
761 else:\r
762 hfsp.write("#define FSP_IMAGE_ID 0x%016X /* '%s' */\n" % (Bytes2Val(bytearray(fih.ImageId)), str (fih.ImageId, 'utf-8')))\r
c6ca1c01
MM
763 hfsp.write("#define FSP_IMAGE_REV 0x%08X \n\n" % fih.ImageRevision)\r
764 firstfv = False\r
765 fv = fd.FvList[fsp.FvIdxList[0]]\r
766 hfsp.write ('#define FSP%s_BASE 0x%08X\n' % (fsp.Type, fih.ImageBase))\r
767 hfsp.write ('#define FSP%s_OFFSET 0x%08X\n' % (fsp.Type, fv.Offset))\r
768 hfsp.write ('#define FSP%s_LENGTH 0x%08X\n\n' % (fsp.Type, fih.ImageSize))\r
769\r
770 hfsp.close()\r
771\r
772def SplitFspBin (fspfile, outdir, nametemplate):\r
773 fd = FirmwareDevice(0, fspfile)\r
774 fd.ParseFd ()\r
775 fd.ParseFsp ()\r
776\r
777 for fsp in fd.FspList:\r
8349b868
CC
778 if fsp.Fih.HeaderRevision < 3:\r
779 raise Exception("ERROR: FSP 1.x is not supported by the split command !")\r
c6ca1c01
MM
780 ftype = fsp.Type\r
781 if not nametemplate:\r
782 nametemplate = fspfile\r
783 fspname, ext = os.path.splitext(os.path.basename(nametemplate))\r
784 filename = os.path.join(outdir, fspname + '_' + fsp.Type + ext)\r
785 hfsp = open(filename, 'wb')\r
9062ab47 786 print ("Create FSP component file '%s'" % filename)\r
c6ca1c01
MM
787 for fvidx in fsp.FvIdxList:\r
788 fv = fd.FvList[fvidx]\r
789 hfsp.write(fv.FvData)\r
cf1d4549
JY
790 hfsp.close()\r
791\r
c6ca1c01
MM
792def RebaseFspBin (FspBinary, FspComponent, FspBase, OutputDir, OutputFile):\r
793 fd = FirmwareDevice(0, FspBinary)\r
794 fd.ParseFd ()\r
795 fd.ParseFsp ()\r
cf1d4549 796\r
c6ca1c01
MM
797 numcomp = len(FspComponent)\r
798 baselist = FspBase\r
799 if numcomp != len(baselist):\r
c3f0829b 800 print ("ERROR: Required number of base does not match number of FSP component !")\r
c6ca1c01 801 return\r
cf1d4549 802\r
c6ca1c01
MM
803 newfspbin = fd.FdData[:]\r
804\r
805 for idx, fspcomp in enumerate(FspComponent):\r
806\r
807 found = False\r
808 for fsp in fd.FspList:\r
8349b868
CC
809 # Is this FSP 1.x single binary?\r
810 if fsp.Fih.HeaderRevision < 3:\r
811 found = True\r
812 ftype = 'X'\r
813 break\r
c6ca1c01
MM
814 ftype = fsp.Type.lower()\r
815 if ftype == fspcomp:\r
816 found = True\r
817 break\r
818\r
819 if not found:\r
c3f0829b 820 print ("ERROR: Could not find FSP_%c component to rebase !" % fspcomp.upper())\r
c6ca1c01
MM
821 return\r
822\r
823 fspbase = baselist[idx]\r
824 if fspbase.startswith('0x'):\r
825 newbase = int(fspbase, 16)\r
826 else:\r
827 newbase = int(fspbase)\r
828 oldbase = fsp.Fih.ImageBase\r
829 delta = newbase - oldbase\r
c3f0829b 830 print ("Rebase FSP-%c from 0x%08X to 0x%08X:" % (ftype.upper(),oldbase,newbase))\r
c6ca1c01 831\r
e8a70885 832 imglist = []\r
c6ca1c01
MM
833 for fvidx in fsp.FvIdxList:\r
834 fv = fd.FvList[fvidx]\r
835 for ffs in fv.FfsList:\r
836 for sec in ffs.SecList:\r
e8a70885 837 if sec.SecHdr.Type in [EFI_SECTION_TYPE.TE, EFI_SECTION_TYPE.PE32]: # TE or PE32\r
c6ca1c01 838 offset = fd.Offset + fv.Offset + ffs.Offset + sec.Offset + sizeof(sec.SecHdr)\r
e8a70885 839 imglist.append ((offset, len(sec.SecData) - sizeof(sec.SecHdr)))\r
c6ca1c01
MM
840\r
841 fcount = 0\r
e8a70885
MM
842 pcount = 0\r
843 for (offset, length) in imglist:\r
844 img = PeTeImage(offset, fd.FdData[offset:offset + length])\r
845 img.ParseReloc()\r
846 pcount += img.Rebase(delta, newfspbin)\r
847 fcount += 1\r
848\r
c3f0829b 849 print (" Patched %d entries in %d TE/PE32 images." % (pcount, fcount))\r
c6ca1c01
MM
850\r
851 (count, applied) = fsp.Patch(delta, newfspbin)\r
c3f0829b 852 print (" Patched %d entries using FSP patch table." % applied)\r
c6ca1c01 853 if count != applied:\r
c3f0829b 854 print (" %d invalid entries are ignored !" % (count - applied))\r
c6ca1c01
MM
855\r
856 if OutputFile == '':\r
857 filename = os.path.basename(FspBinary)\r
858 base, ext = os.path.splitext(filename)\r
859 OutputFile = base + "_%08X" % newbase + ext\r
860\r
861 fspname, ext = os.path.splitext(os.path.basename(OutputFile))\r
862 filename = os.path.join(OutputDir, fspname + ext)\r
863 fd = open(filename, "wb")\r
864 fd.write(newfspbin)\r
865 fd.close()\r
cf1d4549
JY
866\r
867def main ():\r
c6ca1c01 868 parser = argparse.ArgumentParser()\r
9e639c1c 869 subparsers = parser.add_subparsers(title='commands', dest="which")\r
c6ca1c01
MM
870\r
871 parser_rebase = subparsers.add_parser('rebase', help='rebase a FSP into a new base address')\r
872 parser_rebase.set_defaults(which='rebase')\r
873 parser_rebase.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
48249243 874 parser_rebase.add_argument('-c', '--fspcomp', choices=['t','m','s','o','i'], nargs='+', dest='FspComponent', type=str, help='FSP component to rebase', default = "['t']", required = True)\r
c6ca1c01
MM
875 parser_rebase.add_argument('-b', '--newbase', dest='FspBase', nargs='+', type=str, help='Rebased FSP binary file name', default = '', required = True)\r
876 parser_rebase.add_argument('-o', '--outdir' , dest='OutputDir', type=str, help='Output directory path', default = '.')\r
877 parser_rebase.add_argument('-n', '--outfile', dest='OutputFile', type=str, help='Rebased FSP binary file name', default = '')\r
cf1d4549
JY
878\r
879 parser_split = subparsers.add_parser('split', help='split a FSP into multiple components')\r
880 parser_split.set_defaults(which='split')\r
881 parser_split.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
882 parser_split.add_argument('-o', '--outdir' , dest='OutputDir', type=str, help='Output directory path', default = '.')\r
883 parser_split.add_argument('-n', '--nametpl', dest='NameTemplate', type=str, help='Output name template', default = '')\r
cf1d4549
JY
884\r
885 parser_genhdr = subparsers.add_parser('genhdr', help='generate a header file for FSP binary')\r
886 parser_genhdr.set_defaults(which='genhdr')\r
887 parser_genhdr.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
888 parser_genhdr.add_argument('-o', '--outdir' , dest='OutputDir', type=str, help='Output directory path', default = '.')\r
889 parser_genhdr.add_argument('-n', '--hfile', dest='HFileName', type=str, help='Output header file name', default = '')\r
c6ca1c01
MM
890\r
891 parser_info = subparsers.add_parser('info', help='display FSP information')\r
892 parser_info.set_defaults(which='info')\r
893 parser_info.add_argument('-f', '--fspbin' , dest='FspBinary', type=str, help='FSP binary file path', required = True)\r
cf1d4549
JY
894\r
895 args = parser.parse_args()\r
c6ca1c01 896 if args.which in ['rebase', 'split', 'genhdr', 'info']:\r
cf1d4549 897 if not os.path.exists(args.FspBinary):\r
c6ca1c01
MM
898 raise Exception ("ERROR: Could not locate FSP binary file '%s' !" % args.FspBinary)\r
899 if hasattr(args, 'OutputDir') and not os.path.exists(args.OutputDir):\r
900 raise Exception ("ERROR: Invalid output directory '%s' !" % args.OutputDir)\r
901\r
902 if args.which == 'rebase':\r
903 RebaseFspBin (args.FspBinary, args.FspComponent, args.FspBase, args.OutputDir, args.OutputFile)\r
904 elif args.which == 'split':\r
905 SplitFspBin (args.FspBinary, args.OutputDir, args.NameTemplate)\r
cf1d4549 906 elif args.which == 'genhdr':\r
c6ca1c01
MM
907 GenFspHdr (args.FspBinary, args.OutputDir, args.HFileName)\r
908 elif args.which == 'info':\r
909 ShowFspInfo (args.FspBinary)\r
cf1d4549 910 else:\r
9e639c1c 911 parser.print_help()\r
cf1d4549 912\r
cf1d4549
JY
913 return 0\r
914\r
915if __name__ == '__main__':\r
916 sys.exit(main())\r