]> git.proxmox.com Git - mirror_edk2.git/blob - BaseTools/Source/Python/GenPatchPcdTable/GenPatchPcdTable.py
59748763a553d2711470f4b06879767a95055330
[mirror_edk2.git] / BaseTools / Source / Python / GenPatchPcdTable / GenPatchPcdTable.py
1 ## @file
2 # Generate PCD table for 'Patchable In Module' type PCD with given .map file.
3 # The Patch PCD table like:
4 #
5 # PCD Name Offset in binary
6 # ======== ================
7 #
8 # Copyright (c) 2008 - 2018, Intel Corporation. All rights reserved.<BR>
9 # This program and the accompanying materials
10 # are licensed and made available under the terms and conditions of the BSD License
11 # which accompanies this distribution. The full text of the license may be found at
12 # http://opensource.org/licenses/bsd-license.php
13 #
14 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
15 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
16 #
17 #
18
19 #====================================== External Libraries ========================================
20 import optparse
21 import Common.LongFilePathOs as os
22 import re
23 import array
24
25 from Common.BuildToolError import *
26 import Common.EdkLogger as EdkLogger
27 from Common.Misc import PeImageClass
28 from Common.BuildVersion import gBUILD_VERSION
29 from Common.LongFilePathSupport import OpenLongFilePath as open
30
31 # Version and Copyright
32 __version_number__ = ("0.10" + " " + gBUILD_VERSION)
33 __version__ = "%prog Version " + __version_number__
34 __copyright__ = "Copyright (c) 2008 - 2010, Intel Corporation. All rights reserved."
35
36 #====================================== Internal Libraries ========================================
37
38 #============================================== Code ===============================================
39 secRe = re.compile('^([\da-fA-F]+):([\da-fA-F]+) +([\da-fA-F]+)[Hh]? +([.\w\$]+) +(\w+)', re.UNICODE)
40 symRe = re.compile('^([\da-fA-F]+):([\da-fA-F]+) +([\.\-:\\\\\w\?@\$<>]+) +([\da-fA-F]+)', re.UNICODE)
41
42 def parsePcdInfoFromMapFile(mapfilepath, efifilepath):
43 """ Parse map file to get binary patch pcd information
44 @param path Map file absolution path
45
46 @return a list which element hold (PcdName, Offset, SectionName)
47 """
48 lines = []
49 try:
50 f = open(mapfilepath, 'r')
51 lines = f.readlines()
52 f.close()
53 except:
54 return None
55
56 if len(lines) == 0: return None
57 firstline = lines[0].strip()
58 if (firstline.startswith("Archive member included ") and
59 firstline.endswith(" file (symbol)")):
60 return _parseForGCC(lines, efifilepath)
61 if firstline.startswith("# Path:"):
62 return _parseForXcode(lines, efifilepath)
63 return _parseGeneral(lines, efifilepath)
64
65 def _parseForXcode(lines, efifilepath):
66 valuePattern = re.compile('^([\da-fA-FxX]+)([\s\S]*)([_]*_gPcd_BinaryPatch_([\w]+))')
67 status = 0
68 pcds = []
69 for line in lines:
70 line = line.strip()
71 if status == 0 and line == "# Symbols:":
72 status = 1
73 continue
74 if status == 1 and len(line) != 0:
75 if '_gPcd_BinaryPatch_' in line:
76 m = valuePattern.match(line)
77 if m is not None:
78 pcds.append((m.groups(0)[3], int(m.groups(0)[0], 16)))
79 return pcds
80
81 def _parseForGCC(lines, efifilepath):
82 """ Parse map file generated by GCC linker """
83 valuePattern = re.compile('^([\w_\.]+) +([\da-fA-Fx]+) +([\da-fA-Fx]+)$')
84 dataPattern = re.compile('^.data._gPcd_BinaryPatch_([\w_\d]+)$')
85 pcdPattern = re.compile('^([\da-fA-Fx]+) +([\da-fA-Fx]+)')
86 status = 0
87 imageBase = -1
88 sections = []
89 bpcds = []
90 for index, line in enumerate(lines):
91 line = line.strip()
92 # status machine transection
93 if status == 0 and line == "Memory Configuration":
94 status = 1
95 continue
96 elif status == 1 and line == 'Linker script and memory map':
97 status = 2
98 continue
99 elif status ==2 and line == 'START GROUP':
100 status = 3
101 continue
102
103 # status handler
104 if status == 3:
105 m = valuePattern.match(line)
106 if m is not None:
107 sections.append(m.groups(0))
108 if status == 3:
109 m = dataPattern.match(line)
110 if m is not None:
111 if lines[index + 1]:
112 PcdName = m.groups(0)[0]
113 m = pcdPattern.match(lines[index + 1].strip())
114 if m is not None:
115 bpcds.append((PcdName, int(m.groups(0)[0], 16) , int(sections[-1][1], 16), sections[-1][0]))
116
117 # get section information from efi file
118 efisecs = PeImageClass(efifilepath).SectionHeaderList
119 if efisecs is None or len(efisecs) == 0:
120 return None
121 #redirection
122 redirection = 0
123 for efisec in efisecs:
124 for section in sections:
125 if section[0].strip() == efisec[0].strip() and section[0].strip() == '.text':
126 redirection = int(section[1], 16) - efisec[1]
127 pcds = []
128 for pcd in bpcds:
129 for efisec in efisecs:
130 if pcd[1] >= efisec[1] and pcd[1] < efisec[1]+efisec[3]:
131 #assert efisec[0].strip() == pcd[3].strip() and efisec[1] + redirection == pcd[2], "There are some differences between map file and efi file"
132 pcds.append([pcd[0], efisec[2] + pcd[1] - efisec[1] - redirection, efisec[0]])
133 return pcds
134
135 def _parseGeneral(lines, efifilepath):
136 """ For MSFT, ICC, EBC
137 @param lines line array for map file
138
139 @return a list which element hold (PcdName, Offset, SectionName)
140 """
141 status = 0 #0 - beginning of file; 1 - PE section definition; 2 - symbol table
142 secs = [] # key = section name
143 bPcds = []
144 startPattern = re.compile("^Start[' ']+Length[' ']+Name[' ']+Class")
145 addressPattern = re.compile("^Address[' ']+Publics by Value[' ']+Rva\+Base")
146 symPattern = re.compile('^[_]+gPcd_BinaryPatch_([\w]+)')
147
148 for line in lines:
149 line = line.strip()
150 if startPattern.match(line):
151 status = 1
152 continue
153 if addressPattern.match(line):
154 status = 2
155 continue
156 if line.startswith("entry point at"):
157 status = 3
158 continue
159 if status == 1 and len(line) != 0:
160 m = secRe.match(line)
161 assert m is not None, "Fail to parse the section in map file , line is %s" % line
162 sec_no, sec_start, sec_length, sec_name, sec_class = m.groups(0)
163 secs.append([int(sec_no, 16), int(sec_start, 16), int(sec_length, 16), sec_name, sec_class])
164 if status == 2 and len(line) != 0:
165 m = symRe.match(line)
166 assert m is not None, "Fail to parse the symbol in map file, line is %s" % line
167 sec_no, sym_offset, sym_name, vir_addr = m.groups(0)
168 sec_no = int(sec_no, 16)
169 sym_offset = int(sym_offset, 16)
170 vir_addr = int(vir_addr, 16)
171 m2 = symPattern.match(sym_name)
172 if m2 is not None:
173 # fond a binary pcd entry in map file
174 for sec in secs:
175 if sec[0] == sec_no and (sym_offset >= sec[1] and sym_offset < sec[1] + sec[2]):
176 bPcds.append([m2.groups(0)[0], sec[3], sym_offset, vir_addr, sec_no])
177
178 if len(bPcds) == 0: return None
179
180 # get section information from efi file
181 efisecs = PeImageClass(efifilepath).SectionHeaderList
182 if efisecs is None or len(efisecs) == 0:
183 return None
184
185 pcds = []
186 for pcd in bPcds:
187 index = 0
188 for efisec in efisecs:
189 index = index + 1
190 if pcd[1].strip() == efisec[0].strip():
191 pcds.append([pcd[0], efisec[2] + pcd[2], efisec[0]])
192 elif pcd[4] == index:
193 pcds.append([pcd[0], efisec[2] + pcd[2], efisec[0]])
194 return pcds
195
196 def generatePcdTable(list, pcdpath):
197 try:
198 f = open(pcdpath, 'w')
199 except:
200 pass
201
202 f.write('PCD Name Offset Section Name\r\n')
203
204 for pcditem in list:
205 f.write('%-30s 0x%-08X %-6s\r\n' % (pcditem[0], pcditem[1], pcditem[2]))
206 f.close()
207
208 #print 'Success to generate Binary Patch PCD table at %s!' % pcdpath
209
210 if __name__ == '__main__':
211 UsageString = "%prog -m <MapFile> -e <EfiFile> -o <OutFile>"
212 AdditionalNotes = "\nPCD table is generated in file name with .BinaryPcdTable.txt postfix"
213 parser = optparse.OptionParser(description=__copyright__, version=__version__, usage=UsageString)
214 parser.add_option('-m', '--mapfile', action='store', dest='mapfile',
215 help='Absolute path of module map file.')
216 parser.add_option('-e', '--efifile', action='store', dest='efifile',
217 help='Absolute path of EFI binary file.')
218 parser.add_option('-o', '--outputfile', action='store', dest='outfile',
219 help='Absolute path of output file to store the got patchable PCD table.')
220
221 (options, args) = parser.parse_args()
222
223 if options.mapfile is None or options.efifile is None:
224 print parser.get_usage()
225 elif os.path.exists(options.mapfile) and os.path.exists(options.efifile):
226 list = parsePcdInfoFromMapFile(options.mapfile, options.efifile)
227 if list is not None:
228 if options.outfile is not None:
229 generatePcdTable(list, options.outfile)
230 else:
231 generatePcdTable(list, options.mapfile.replace('.map', '.BinaryPcdTable.txt'))
232 else:
233 print 'Fail to generate Patch PCD Table based on map file and efi file'
234 else:
235 print 'Fail to generate Patch PCD Table for fail to find map file or efi file!'