1177 lines
34 KiB
C
1177 lines
34 KiB
C
/*
|
|
* cbfstool, CLI utility for CBFS file manipulation
|
|
*
|
|
* Copyright (C) 2009 coresystems GmbH
|
|
* written by Patrick Georgi <patrick.georgi@coresystems.de>
|
|
* Copyright (C) 2012 Google, Inc.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <strings.h>
|
|
#include <ctype.h>
|
|
#include <unistd.h>
|
|
#include <getopt.h>
|
|
#include "common.h"
|
|
#include "cbfs.h"
|
|
#include "cbfs_image.h"
|
|
#include "cbfs_sections.h"
|
|
#include "fit.h"
|
|
#include "partitioned_file.h"
|
|
|
|
#define SECTION_WITH_FIT_TABLE "BOOTBLOCK"
|
|
|
|
struct command {
|
|
const char *name;
|
|
const char *optstring;
|
|
int (*function) (void);
|
|
// Whether to populate param.image_region before invoking function
|
|
bool accesses_region;
|
|
// Whether to write that region's contents back to image_file at the end
|
|
bool modifies_region;
|
|
};
|
|
|
|
static struct param {
|
|
partitioned_file_t *image_file;
|
|
struct buffer *image_region;
|
|
const char *name;
|
|
const char *filename;
|
|
const char *fmap;
|
|
const char *region_name;
|
|
const char *bootblock;
|
|
const char *ignore_section;
|
|
uint64_t u64val;
|
|
uint32_t type;
|
|
uint32_t baseaddress;
|
|
uint32_t baseaddress_assigned;
|
|
uint32_t loadaddress;
|
|
uint32_t copyoffset;
|
|
uint32_t copyoffset_assigned;
|
|
uint32_t headeroffset;
|
|
uint32_t headeroffset_assigned;
|
|
uint32_t entrypoint;
|
|
uint32_t size;
|
|
uint32_t alignment;
|
|
uint32_t pagesize;
|
|
uint32_t cbfsoffset;
|
|
uint32_t cbfsoffset_assigned;
|
|
uint32_t arch;
|
|
bool top_aligned;
|
|
bool fill_partial_upward;
|
|
bool fill_partial_downward;
|
|
bool show_immutable;
|
|
int fit_empty_entries;
|
|
enum comp_algo algo;
|
|
/* for linux payloads */
|
|
char *initrd;
|
|
char *cmdline;
|
|
} param = {
|
|
/* All variables not listed are initialized as zero. */
|
|
.arch = CBFS_ARCHITECTURE_UNKNOWN,
|
|
.algo = CBFS_COMPRESS_NONE,
|
|
.headeroffset = ~0,
|
|
.region_name = SECTION_NAME_PRIMARY_CBFS,
|
|
};
|
|
|
|
static bool region_is_flashmap(const char *region)
|
|
{
|
|
return partitioned_file_region_check_magic(param.image_file, region,
|
|
FMAP_SIGNATURE, strlen(FMAP_SIGNATURE));
|
|
}
|
|
|
|
/* @return Same as cbfs_is_valid_cbfs(), but for a named region. */
|
|
static bool region_is_modern_cbfs(const char *region)
|
|
{
|
|
return partitioned_file_region_check_magic(param.image_file, region,
|
|
CBFS_FILE_MAGIC, strlen(CBFS_FILE_MAGIC));
|
|
}
|
|
|
|
/*
|
|
* Converts between offsets from the start of the specified image region and
|
|
* "top-aligned" offsets from the top of the entire flash image. Works in either
|
|
* direction: pass in one type of offset and receive the other type.
|
|
* N.B. A top-aligned offset is always a positive number, and should not be
|
|
* confused with a top-aliged *address*, which is its arithmetic inverse. */
|
|
static unsigned convert_to_from_top_aligned(const struct buffer *region,
|
|
unsigned offset)
|
|
{
|
|
assert(region);
|
|
|
|
size_t image_size = partitioned_file_total_size(param.image_file);
|
|
return image_size - region->offset - offset;
|
|
}
|
|
|
|
typedef int (*convert_buffer_t)(struct buffer *buffer, uint32_t *offset);
|
|
|
|
static int cbfs_add_integer_component(const char *name,
|
|
uint64_t u64val,
|
|
uint32_t offset,
|
|
uint32_t headeroffset) {
|
|
struct cbfs_image image;
|
|
struct buffer buffer;
|
|
int i, ret = 1;
|
|
|
|
if (!name) {
|
|
ERROR("You need to specify -n/--name.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (buffer_create(&buffer, 8, name) != 0)
|
|
return 1;
|
|
|
|
for (i = 0; i < 8; i++)
|
|
buffer.data[i] = (u64val >> i*8) & 0xff;
|
|
|
|
if (cbfs_image_from_buffer(&image, param.image_region, headeroffset)) {
|
|
ERROR("Selected image region is not a CBFS.\n");
|
|
goto done;
|
|
}
|
|
|
|
if (cbfs_get_entry(&image, name)) {
|
|
ERROR("'%s' already in ROM image.\n", name);
|
|
goto done;
|
|
}
|
|
|
|
if (IS_TOP_ALIGNED_ADDRESS(offset))
|
|
offset = convert_to_from_top_aligned(param.image_region,
|
|
-offset);
|
|
|
|
if (cbfs_add_entry(&image, &buffer, name, CBFS_COMPONENT_RAW, offset) !=
|
|
0) {
|
|
ERROR("Failed to add %llu into ROM image as '%s'.\n",
|
|
(long long unsigned)u64val, name);
|
|
goto done;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
done:
|
|
buffer_delete(&buffer);
|
|
return ret;
|
|
}
|
|
|
|
static int cbfs_add_component(const char *filename,
|
|
const char *name,
|
|
uint32_t type,
|
|
uint32_t offset,
|
|
uint32_t headeroffset,
|
|
convert_buffer_t convert)
|
|
{
|
|
if (!filename) {
|
|
ERROR("You need to specify -f/--filename.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (!name) {
|
|
ERROR("You need to specify -n/--name.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (type == 0) {
|
|
ERROR("You need to specify a valid -t/--type.\n");
|
|
return 1;
|
|
}
|
|
|
|
struct cbfs_image image;
|
|
if (cbfs_image_from_buffer(&image, param.image_region, headeroffset))
|
|
return 1;
|
|
|
|
struct buffer buffer;
|
|
if (buffer_from_file(&buffer, filename) != 0) {
|
|
ERROR("Could not load file '%s'.\n", filename);
|
|
return 1;
|
|
}
|
|
|
|
if (convert && convert(&buffer, &offset) != 0) {
|
|
ERROR("Failed to parse file '%s'.\n", filename);
|
|
buffer_delete(&buffer);
|
|
return 1;
|
|
}
|
|
|
|
if (cbfs_get_entry(&image, name)) {
|
|
ERROR("'%s' already in ROM image.\n", name);
|
|
buffer_delete(&buffer);
|
|
return 1;
|
|
}
|
|
|
|
if (IS_TOP_ALIGNED_ADDRESS(offset))
|
|
offset = convert_to_from_top_aligned(param.image_region,
|
|
-offset);
|
|
|
|
if (cbfs_add_entry(&image, &buffer, name, type, offset) != 0) {
|
|
ERROR("Failed to add '%s' into ROM image.\n", filename);
|
|
buffer_delete(&buffer);
|
|
return 1;
|
|
}
|
|
|
|
buffer_delete(&buffer);
|
|
return 0;
|
|
}
|
|
|
|
static int cbfstool_convert_mkstage(struct buffer *buffer, uint32_t *offset)
|
|
{
|
|
struct buffer output;
|
|
int ret;
|
|
ret = parse_elf_to_stage(buffer, &output, param.algo, offset,
|
|
param.ignore_section);
|
|
if (ret != 0)
|
|
return -1;
|
|
buffer_delete(buffer);
|
|
// direct assign, no dupe.
|
|
memcpy(buffer, &output, sizeof(*buffer));
|
|
return 0;
|
|
}
|
|
|
|
static int cbfstool_convert_mkpayload(struct buffer *buffer,
|
|
unused uint32_t *offset)
|
|
{
|
|
struct buffer output;
|
|
int ret;
|
|
/* per default, try and see if payload is an ELF binary */
|
|
ret = parse_elf_to_payload(buffer, &output, param.algo);
|
|
|
|
/* If it's not an ELF, see if it's a UEFI FV */
|
|
if (ret != 0)
|
|
ret = parse_fv_to_payload(buffer, &output, param.algo);
|
|
|
|
/* If it's neither ELF nor UEFI Fv, try bzImage */
|
|
if (ret != 0)
|
|
ret = parse_bzImage_to_payload(buffer, &output,
|
|
param.initrd, param.cmdline, param.algo);
|
|
|
|
/* Not a supported payload type */
|
|
if (ret != 0) {
|
|
ERROR("Not a supported payload type (ELF / FV).\n");
|
|
buffer_delete(buffer);
|
|
return -1;
|
|
}
|
|
|
|
buffer_delete(buffer);
|
|
// direct assign, no dupe.
|
|
memcpy(buffer, &output, sizeof(*buffer));
|
|
return 0;
|
|
}
|
|
|
|
static int cbfstool_convert_mkflatpayload(struct buffer *buffer,
|
|
unused uint32_t *offset)
|
|
{
|
|
struct buffer output;
|
|
if (parse_flat_binary_to_payload(buffer, &output,
|
|
param.loadaddress,
|
|
param.entrypoint,
|
|
param.algo) != 0) {
|
|
return -1;
|
|
}
|
|
buffer_delete(buffer);
|
|
// direct assign, no dupe.
|
|
memcpy(buffer, &output, sizeof(*buffer));
|
|
return 0;
|
|
}
|
|
|
|
static int cbfs_add(void)
|
|
{
|
|
return cbfs_add_component(param.filename,
|
|
param.name,
|
|
param.type,
|
|
param.baseaddress,
|
|
param.headeroffset,
|
|
NULL);
|
|
}
|
|
|
|
static int cbfs_add_stage(void)
|
|
{
|
|
return cbfs_add_component(param.filename,
|
|
param.name,
|
|
CBFS_COMPONENT_STAGE,
|
|
param.baseaddress,
|
|
param.headeroffset,
|
|
cbfstool_convert_mkstage);
|
|
}
|
|
|
|
static int cbfs_add_payload(void)
|
|
{
|
|
return cbfs_add_component(param.filename,
|
|
param.name,
|
|
CBFS_COMPONENT_PAYLOAD,
|
|
param.baseaddress,
|
|
param.headeroffset,
|
|
cbfstool_convert_mkpayload);
|
|
}
|
|
|
|
static int cbfs_add_flat_binary(void)
|
|
{
|
|
if (param.loadaddress == 0) {
|
|
ERROR("You need to specify a valid "
|
|
"-l/--load-address.\n");
|
|
return 1;
|
|
}
|
|
if (param.entrypoint == 0) {
|
|
ERROR("You need to specify a valid "
|
|
"-e/--entry-point.\n");
|
|
return 1;
|
|
}
|
|
return cbfs_add_component(param.filename,
|
|
param.name,
|
|
CBFS_COMPONENT_PAYLOAD,
|
|
param.baseaddress,
|
|
param.headeroffset,
|
|
cbfstool_convert_mkflatpayload);
|
|
}
|
|
|
|
static int cbfs_add_integer(void)
|
|
{
|
|
return cbfs_add_integer_component(param.name,
|
|
param.u64val,
|
|
param.baseaddress,
|
|
param.headeroffset);
|
|
}
|
|
|
|
static int cbfs_remove(void)
|
|
{
|
|
if (!param.name) {
|
|
ERROR("You need to specify -n/--name.\n");
|
|
return 1;
|
|
}
|
|
|
|
struct cbfs_image image;
|
|
if (cbfs_image_from_buffer(&image, param.image_region,
|
|
param.headeroffset))
|
|
return 1;
|
|
|
|
if (cbfs_remove_entry(&image, param.name) != 0) {
|
|
ERROR("Removing file '%s' failed.\n",
|
|
param.name);
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int cbfs_create(void)
|
|
{
|
|
struct cbfs_image image;
|
|
memset(&image, 0, sizeof(image));
|
|
buffer_clone(&image.buffer, param.image_region);
|
|
|
|
if (param.fmap) {
|
|
if (param.arch != CBFS_ARCHITECTURE_UNKNOWN || param.size ||
|
|
param.baseaddress_assigned ||
|
|
param.headeroffset_assigned ||
|
|
param.cbfsoffset_assigned ||
|
|
param.alignment ||
|
|
param.bootblock) {
|
|
ERROR("Since -M was provided, -m, -s, -b, -o, -H, -a, and -B should be omitted\n");
|
|
return 1;
|
|
}
|
|
|
|
return cbfs_image_create(&image, image.buffer.size);
|
|
}
|
|
|
|
if (param.arch == CBFS_ARCHITECTURE_UNKNOWN) {
|
|
ERROR("You need to specify -m/--machine arch.\n");
|
|
return 1;
|
|
}
|
|
|
|
struct buffer bootblock;
|
|
if (!param.bootblock) {
|
|
DEBUG("-B not given, creating image without bootblock.\n");
|
|
buffer_create(&bootblock, 0, "(dummy)");
|
|
} else if (buffer_from_file(&bootblock, param.bootblock)) {
|
|
return 1;
|
|
}
|
|
|
|
if (!param.alignment)
|
|
param.alignment = 64; // default CBFS entry alignment
|
|
|
|
// Set default offsets. x86, as usual, needs to be a special snowflake.
|
|
if (!param.baseaddress_assigned) {
|
|
if (param.arch == CBFS_ARCHITECTURE_X86) {
|
|
// Make sure there's at least enough room for rel_offset
|
|
param.baseaddress = param.size -
|
|
MAX(bootblock.size, sizeof(int32_t));
|
|
DEBUG("x86 -> bootblock lies at end of ROM (%#x).\n",
|
|
param.baseaddress);
|
|
} else {
|
|
param.baseaddress = 0;
|
|
DEBUG("bootblock starts at address 0x0.\n");
|
|
}
|
|
}
|
|
if (!param.headeroffset_assigned) {
|
|
if (param.arch == CBFS_ARCHITECTURE_X86) {
|
|
param.headeroffset = param.baseaddress -
|
|
sizeof(struct cbfs_header);
|
|
DEBUG("x86 -> CBFS header before bootblock (%#x).\n",
|
|
param.headeroffset);
|
|
} else {
|
|
param.headeroffset = align_up(param.baseaddress +
|
|
bootblock.size, sizeof(uint32_t));
|
|
DEBUG("CBFS header placed behind bootblock (%#x).\n",
|
|
param.headeroffset);
|
|
}
|
|
}
|
|
if (!param.cbfsoffset_assigned) {
|
|
if (param.arch == CBFS_ARCHITECTURE_X86) {
|
|
param.cbfsoffset = 0;
|
|
DEBUG("x86 -> CBFS entries start at address 0x0.\n");
|
|
} else {
|
|
param.cbfsoffset = align_up(param.headeroffset +
|
|
sizeof(struct cbfs_header),
|
|
param.alignment);
|
|
DEBUG("CBFS entries start beind master header (%#x).\n",
|
|
param.cbfsoffset);
|
|
}
|
|
}
|
|
|
|
int ret = cbfs_legacy_image_create(&image,
|
|
param.arch,
|
|
param.alignment,
|
|
&bootblock,
|
|
param.baseaddress,
|
|
param.headeroffset,
|
|
param.cbfsoffset);
|
|
buffer_delete(&bootblock);
|
|
return ret;
|
|
}
|
|
|
|
static int cbfs_locate(void)
|
|
{
|
|
if (!param.filename) {
|
|
ERROR("You need to specify -f/--filename.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (!param.name) {
|
|
ERROR("You need to specify -n/--name.\n");
|
|
return 1;
|
|
}
|
|
|
|
struct cbfs_image image;
|
|
if (cbfs_image_from_buffer(&image, param.image_region,
|
|
param.headeroffset))
|
|
return 1;
|
|
|
|
if (cbfs_get_entry(&image, param.name))
|
|
WARN("'%s' already in CBFS.\n", param.name);
|
|
|
|
struct buffer buffer;
|
|
if (buffer_from_file(&buffer, param.filename) != 0) {
|
|
ERROR("Cannot load %s.\n", param.filename);
|
|
return 1;
|
|
}
|
|
|
|
int32_t address = cbfs_locate_entry(&image, param.name, buffer.size,
|
|
param.pagesize, param.alignment);
|
|
buffer_delete(&buffer);
|
|
|
|
if (address == -1) {
|
|
ERROR("'%s' can't fit in CBFS for page-size %#x, align %#x.\n",
|
|
param.name, param.pagesize, param.alignment);
|
|
return 1;
|
|
}
|
|
|
|
if (param.top_aligned)
|
|
address = -convert_to_from_top_aligned(param.image_region,
|
|
address);
|
|
|
|
printf("0x%x\n", address);
|
|
return 0;
|
|
}
|
|
|
|
static int cbfs_layout(void)
|
|
{
|
|
const struct fmap *fmap = partitioned_file_get_fmap(param.image_file);
|
|
if (!fmap) {
|
|
LOG("This is a legacy image composed entirely of a single CBFS.\n");
|
|
return 1;
|
|
}
|
|
|
|
printf("This image contains the following sections that can be %s with this tool:\n",
|
|
param.show_immutable ? "accessed" : "manipulated");
|
|
puts("");
|
|
for (unsigned i = 0; i < fmap->nareas; ++i) {
|
|
const struct fmap_area *current = fmap->areas + i;
|
|
|
|
bool readonly = partitioned_file_fmap_count(param.image_file,
|
|
partitioned_file_fmap_select_children_of, current) ||
|
|
region_is_flashmap((const char *)current->name);
|
|
if (!param.show_immutable && readonly)
|
|
continue;
|
|
|
|
printf("'%s'", current->name);
|
|
|
|
// Detect consecutive sections that describe the same region and
|
|
// show them as aliases. This cannot find equivalent entries
|
|
// that aren't adjacent; however, fmaptool doesn't generate
|
|
// FMAPs with such sections, so this convenience feature works
|
|
// for all but the strangest manually created FMAP binaries.
|
|
// TODO: This could be done by parsing the FMAP into some kind
|
|
// of tree that had duplicate lists in addition to child lists,
|
|
// which would allow covering that weird, unlikely case as well.
|
|
unsigned lookahead;
|
|
for (lookahead = 1; i + lookahead < fmap->nareas;
|
|
++lookahead) {
|
|
const struct fmap_area *consecutive =
|
|
fmap->areas + i + lookahead;
|
|
if (consecutive->offset != current->offset ||
|
|
consecutive->size != current->size)
|
|
break;
|
|
printf(", '%s'", consecutive->name);
|
|
}
|
|
if (lookahead > 1)
|
|
fputs(" are aliases for the same region", stdout);
|
|
|
|
const char *qualifier = "";
|
|
if (readonly)
|
|
qualifier = "read-only, ";
|
|
else if (region_is_modern_cbfs((const char *)current->name))
|
|
qualifier = "CBFS, ";
|
|
printf(" (%ssize %u)\n", qualifier, current->size);
|
|
|
|
i += lookahead - 1;
|
|
}
|
|
puts("");
|
|
|
|
if (param.show_immutable) {
|
|
puts("It is at least possible to perform the read action on every section listed above.");
|
|
} else {
|
|
puts("It is possible to perform either the write action or the CBFS add/remove actions on every section listed above.");
|
|
puts("To see the image's read-only sections as well, rerun with the -w option.");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int cbfs_print(void)
|
|
{
|
|
struct cbfs_image image;
|
|
if (cbfs_image_from_buffer(&image, param.image_region,
|
|
param.headeroffset))
|
|
return 1;
|
|
cbfs_print_directory(&image);
|
|
return 0;
|
|
}
|
|
|
|
static int cbfs_extract(void)
|
|
{
|
|
if (!param.filename) {
|
|
ERROR("You need to specify -f/--filename.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (!param.name) {
|
|
ERROR("You need to specify -n/--name.\n");
|
|
return 1;
|
|
}
|
|
|
|
struct cbfs_image image;
|
|
if (cbfs_image_from_buffer(&image, param.image_region,
|
|
param.headeroffset))
|
|
return 1;
|
|
|
|
return cbfs_export_entry(&image, param.name, param.filename);
|
|
}
|
|
|
|
static int cbfs_write(void)
|
|
{
|
|
if (!param.filename) {
|
|
ERROR("You need to specify a valid input -f/--file.\n");
|
|
return 1;
|
|
}
|
|
if (!partitioned_file_is_partitioned(param.image_file)) {
|
|
ERROR("This operation isn't valid on legacy images having CBFS master headers\n");
|
|
return 1;
|
|
}
|
|
|
|
if (region_is_modern_cbfs(param.region_name)) {
|
|
ERROR("Target image region '%s' is a CBFS and must be manipulated using add and remove\n",
|
|
param.region_name);
|
|
return 1;
|
|
}
|
|
|
|
struct buffer new_content;
|
|
if (buffer_from_file(&new_content, param.filename))
|
|
return 1;
|
|
|
|
if (buffer_check_magic(&new_content, FMAP_SIGNATURE,
|
|
strlen(FMAP_SIGNATURE))) {
|
|
ERROR("File '%s' appears to be an FMAP and cannot be added to an existing image\n",
|
|
param.filename);
|
|
buffer_delete(&new_content);
|
|
return 1;
|
|
}
|
|
if (buffer_check_magic(&new_content, CBFS_FILE_MAGIC,
|
|
strlen(CBFS_FILE_MAGIC))) {
|
|
ERROR("File '%s' appears to be a CBFS and cannot be inserted into a raw region\n",
|
|
param.filename);
|
|
buffer_delete(&new_content);
|
|
return 1;
|
|
}
|
|
|
|
unsigned offset = 0;
|
|
if (param.fill_partial_upward && param.fill_partial_downward) {
|
|
ERROR("You may only specify one of -u and -d.\n");
|
|
buffer_delete(&new_content);
|
|
return 1;
|
|
} else if (!param.fill_partial_upward && !param.fill_partial_downward) {
|
|
if (new_content.size != param.image_region->size) {
|
|
ERROR("File to add is %zu bytes and would not fill %zu-byte target region (did you mean to pass either -u or -d?)\n",
|
|
new_content.size, param.image_region->size);
|
|
buffer_delete(&new_content);
|
|
return 1;
|
|
}
|
|
} else {
|
|
if (new_content.size > param.image_region->size) {
|
|
ERROR("File to add is %zu bytes and would overflow %zu-byte target region\n",
|
|
new_content.size, param.image_region->size);
|
|
buffer_delete(&new_content);
|
|
return 1;
|
|
}
|
|
WARN("Written area will abut %s of target region: any unused space will keep its current contents\n",
|
|
param.fill_partial_upward ? "bottom" : "top");
|
|
if (param.fill_partial_downward)
|
|
offset = param.image_region->size - new_content.size;
|
|
}
|
|
|
|
memcpy(param.image_region->data + offset, new_content.data,
|
|
new_content.size);
|
|
buffer_delete(&new_content);
|
|
return 0;
|
|
}
|
|
|
|
static int cbfs_read(void)
|
|
{
|
|
if (!param.filename) {
|
|
ERROR("You need to specify a valid output -f/--file.\n");
|
|
return 1;
|
|
}
|
|
if (!partitioned_file_is_partitioned(param.image_file)) {
|
|
ERROR("This operation isn't valid on legacy images having CBFS master headers\n");
|
|
return 1;
|
|
}
|
|
|
|
return buffer_write_file(param.image_region, param.filename);
|
|
}
|
|
|
|
static int cbfs_update_fit(void)
|
|
{
|
|
if (!param.name) {
|
|
ERROR("You need to specify -n/--name.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (param.fit_empty_entries <= 0) {
|
|
ERROR("Invalid number of fit entries "
|
|
"(-x/--empty-fits): %d\n", param.fit_empty_entries);
|
|
return 1;
|
|
}
|
|
|
|
// Decide which region to read/write the FIT table from/to.
|
|
struct buffer bootblock;
|
|
if (partitioned_file_is_partitioned(param.image_file)) {
|
|
if (!partitioned_file_read_region(&bootblock, param.image_file,
|
|
SECTION_WITH_FIT_TABLE))
|
|
return 1;
|
|
} else {
|
|
// In legacy images, the bootblock is part of the CBFS.
|
|
buffer_clone(&bootblock, param.image_region);
|
|
}
|
|
|
|
struct cbfs_image image;
|
|
if (cbfs_image_from_buffer(&image, param.image_region,
|
|
param.headeroffset))
|
|
return 1;
|
|
|
|
if (fit_update_table(&bootblock, &image, param.name,
|
|
param.fit_empty_entries, convert_to_from_top_aligned))
|
|
return 1;
|
|
|
|
// The region to be written depends on the type of image, so we write it
|
|
// here rather than having main() write the CBFS region back as usual.
|
|
return !partitioned_file_write_region(param.image_file, &bootblock);
|
|
}
|
|
|
|
static int cbfs_copy(void)
|
|
{
|
|
if (!param.copyoffset_assigned) {
|
|
ERROR("You need to specify -D/--copy_offset.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (!param.size) {
|
|
ERROR("You need to specify -s/--size.\n");
|
|
return 1;
|
|
}
|
|
|
|
struct cbfs_image image;
|
|
if (cbfs_image_from_buffer(&image, param.image_region,
|
|
param.headeroffset))
|
|
return 1;
|
|
|
|
if (!cbfs_is_legacy_cbfs(&image)) {
|
|
ERROR("This operation is only valid on legacy images having CBFS master headers\n");
|
|
return 1;
|
|
}
|
|
|
|
return cbfs_copy_instance(&image, param.copyoffset, param.size);
|
|
}
|
|
|
|
static bool cbfs_is_legacy_format(struct buffer *buffer)
|
|
{
|
|
// Legacy CBFSes are those containing the deprecated CBFS master header.
|
|
return cbfs_find_header(buffer->data, buffer->size, -1);
|
|
}
|
|
|
|
static const struct command commands[] = {
|
|
{"add", "H:r:f:n:t:b:vh?", cbfs_add, true, true},
|
|
{"add-flat-binary", "H:r:f:n:l:e:c:b:vh?", cbfs_add_flat_binary, true,
|
|
true},
|
|
{"add-payload", "H:r:f:n:t:c:b:C:I:vh?", cbfs_add_payload, true, true},
|
|
{"add-stage", "H:r:f:n:t:c:b:S:vh?", cbfs_add_stage, true, true},
|
|
{"add-int", "H:r:i:n:b:vh?", cbfs_add_integer, true, true},
|
|
{"copy", "H:D:s:h?", cbfs_copy, true, true},
|
|
{"create", "M:r:s:B:b:H:a:o:m:vh?", cbfs_create, true, true},
|
|
{"extract", "H:r:n:f:vh?", cbfs_extract, true, false},
|
|
{"locate", "H:r:f:n:P:a:Tvh?", cbfs_locate, true, false},
|
|
{"layout", "wvh?", cbfs_layout, false, false},
|
|
{"print", "H:r:vh?", cbfs_print, true, false},
|
|
{"read", "r:f:vh?", cbfs_read, true, false},
|
|
{"remove", "H:r:n:vh?", cbfs_remove, true, true},
|
|
{"update-fit", "H:r:n:x:vh?", cbfs_update_fit, true, false},
|
|
{"write", "r:f:udvh?", cbfs_write, true, true},
|
|
};
|
|
|
|
static struct option long_options[] = {
|
|
{"alignment", required_argument, 0, 'a' },
|
|
{"base-address", required_argument, 0, 'b' },
|
|
{"bootblock", required_argument, 0, 'B' },
|
|
{"cmdline", required_argument, 0, 'C' },
|
|
{"compression", required_argument, 0, 'c' },
|
|
{"copy-offset", required_argument, 0, 'D' },
|
|
{"empty-fits", required_argument, 0, 'x' },
|
|
{"entry-point", required_argument, 0, 'e' },
|
|
{"file", required_argument, 0, 'f' },
|
|
{"fill-downward", no_argument, 0, 'd' },
|
|
{"fill-upward", no_argument, 0, 'u' },
|
|
{"flashmap", required_argument, 0, 'M' },
|
|
{"fmap-regions", required_argument, 0, 'r' },
|
|
{"header-offset", required_argument, 0, 'H' },
|
|
{"help", no_argument, 0, 'h' },
|
|
{"ignore-sec", required_argument, 0, 'S' },
|
|
{"initrd", required_argument, 0, 'I' },
|
|
{"int", required_argument, 0, 'i' },
|
|
{"load-address", required_argument, 0, 'l' },
|
|
{"machine", required_argument, 0, 'm' },
|
|
{"name", required_argument, 0, 'n' },
|
|
{"offset", required_argument, 0, 'o' },
|
|
{"page-size", required_argument, 0, 'P' },
|
|
{"size", required_argument, 0, 's' },
|
|
{"top-aligned", required_argument, 0, 'T' },
|
|
{"type", required_argument, 0, 't' },
|
|
{"verbose", no_argument, 0, 'v' },
|
|
{"with-readonly", no_argument, 0, 'w' },
|
|
{NULL, 0, 0, 0 }
|
|
};
|
|
|
|
static int dispatch_command(struct command command)
|
|
{
|
|
if (command.accesses_region) {
|
|
assert(param.image_file);
|
|
|
|
if (partitioned_file_is_partitioned(param.image_file)) {
|
|
LOG("Performing operation on '%s' region...\n",
|
|
param.region_name);
|
|
}
|
|
if (!partitioned_file_read_region(param.image_region,
|
|
param.image_file, param.region_name)) {
|
|
ERROR("The image will be left unmodified.\n");
|
|
return 1;
|
|
}
|
|
|
|
if (command.modifies_region) {
|
|
// We (intentionally) don't support overwriting the FMAP
|
|
// section. If you find yourself wanting to do this,
|
|
// consider creating a new image rather than performing
|
|
// whatever hacky transformation you were planning.
|
|
if (region_is_flashmap(param.region_name)) {
|
|
ERROR("Image region '%s' is read-only because it contains the FMAP.\n",
|
|
param.region_name);
|
|
ERROR("The image will be left unmodified.\n");
|
|
return 1;
|
|
}
|
|
// We don't allow writing raw data to regions that
|
|
// contain nested regions, since doing so would
|
|
// overwrite all such subregions.
|
|
if (partitioned_file_region_contains_nested(
|
|
param.image_file, param.region_name)) {
|
|
ERROR("Image region '%s' is read-only because it contains nested regions.\n",
|
|
param.region_name);
|
|
ERROR("The image will be left unmodified.\n");
|
|
return 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (command.function()) {
|
|
if (partitioned_file_is_partitioned(param.image_file)) {
|
|
ERROR("Failed while operating on '%s' region!\n",
|
|
param.region_name);
|
|
ERROR("The image will be left unmodified.\n");
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void usage(char *name)
|
|
{
|
|
printf
|
|
("cbfstool: Management utility for CBFS formatted ROM images\n\n"
|
|
"USAGE:\n" " %s [-h]\n"
|
|
" %s FILE COMMAND [-v] [PARAMETERS]...\n\n" "OPTIONs:\n"
|
|
" -H header_offset Do not search for header; use this offset*\n"
|
|
" -T Output top-aligned memory address\n"
|
|
" -u Accept short data; fill upward/from bottom\n"
|
|
" -d Accept short data; fill downward/from top\n"
|
|
" -v Provide verbose output\n"
|
|
" -h Display this help message\n\n"
|
|
"COMMANDs:\n"
|
|
" add [-r image,regions] -f FILE -n NAME -t TYPE \\\n"
|
|
" [-b base-address] "
|
|
"Add a component\n"
|
|
" add-payload [-r image,regions] -f FILE -n NAME \\\n"
|
|
" [-c compression] [-b base-address] "
|
|
"Add a payload to the ROM\n"
|
|
" (linux specific: [-C cmdline] [-I initrd])\n"
|
|
" add-stage [-r image,regions] -f FILE -n NAME \\\n"
|
|
" [-c compression] [-b base] [-S section-to-ignore] "
|
|
"Add a stage to the ROM\n"
|
|
" add-flat-binary [-r image,regions] -f FILE -n NAME \\\n"
|
|
" -l load-address -e entry-point [-c compression] \\\n"
|
|
" [-b base] "
|
|
"Add a 32bit flat mode binary\n"
|
|
" add-int [-r image,regions] -i INTEGER -n NAME [-b base] "
|
|
"Add a raw 64-bit integer value\n"
|
|
" remove [-r image,regions] -n NAME "
|
|
"Remove a component\n"
|
|
" copy -D new_header_offset -s region size \\\n"
|
|
" [-H source header offset] "
|
|
"Create a copy (duplicate) cbfs instance*\n"
|
|
" create -m ARCH -s size [-b bootblock offset] \\\n"
|
|
" [-o CBFS offset] [-H header offset] [-B bootblock] \\\n"
|
|
" [-a align] "
|
|
"Create a legacy ROM file with CBFS master header*\n"
|
|
" create -M flashmap [-r list,of,regions,containing,cbfses] "
|
|
"Create a new-style partitioned firmware image\n"
|
|
" locate [-r image,regions] -f FILE -n NAME [-P page-size] \\\n"
|
|
" [-a align] [-T] "
|
|
"Find a place for a file of that size\n"
|
|
" layout [-w] "
|
|
"List mutable (or, with -w, readable) image regions\n"
|
|
" print [-r image,regions] "
|
|
"Show the contents of the ROM\n"
|
|
" extract [-r image,regions] -n NAME -f FILE "
|
|
"Extracts a raw payload from ROM\n"
|
|
" write -r image,regions -f file [-u | -d] "
|
|
"Write file into same-size [or larger] raw region\n"
|
|
" read [-r fmap-region] -f file "
|
|
"Extract raw region contents into binary file\n"
|
|
" update-fit [-r image,regions] -n MICROCODE_BLOB_NAME \\\n"
|
|
" -x EMTPY_FIT_ENTRIES "
|
|
"Updates the FIT table with microcode entries\n"
|
|
"\n"
|
|
"OFFSETs:\n"
|
|
" Numbers accompanying -b, -H, and -o switches* may be provided\n"
|
|
" in two possible formats: if their value is greater than\n"
|
|
" 0x80000000, they are interpreted as a top-aligned x86 memory\n"
|
|
" address; otherwise, they are treated as an offset into flash.\n"
|
|
"ARCHes:\n"
|
|
" arm64, arm, mips, x86\n"
|
|
"TYPEs:\n", name, name
|
|
);
|
|
print_supported_filetypes();
|
|
|
|
printf(
|
|
"\n* Note that these actions and switches are only valid when\n"
|
|
" working with legacy images whose structure is described\n"
|
|
" primarily by a CBFS master header. New-style images, in\n"
|
|
" contrast, exclusively make use of an FMAP to describe their\n"
|
|
" layout: this must minimally contain an '%s' section\n"
|
|
" specifying the location of this FMAP itself and a '%s'\n"
|
|
" section describing the primary CBFS. It should also be noted\n"
|
|
" that, when working with such images, the -F and -r switches\n"
|
|
" default to '%s' for convenience, and both the -b switch to\n"
|
|
" CBFS operations and the output of the locate action become\n"
|
|
" relative to the selected CBFS region's lowest address.\n"
|
|
" The one exception to this rule is the top-aligned address,\n"
|
|
" which is always relative to the end of the entire image\n"
|
|
" rather than relative to the local region; this is true for\n"
|
|
" for both input (sufficiently large) and output (-T) data.\n",
|
|
SECTION_NAME_FMAP, SECTION_NAME_PRIMARY_CBFS,
|
|
SECTION_NAME_PRIMARY_CBFS
|
|
);
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
size_t i;
|
|
int c;
|
|
|
|
if (argc < 3) {
|
|
usage(argv[0]);
|
|
return 1;
|
|
}
|
|
|
|
char *image_name = argv[1];
|
|
char *cmd = argv[2];
|
|
optind += 2;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(commands); i++) {
|
|
if (strcmp(cmd, commands[i].name) != 0)
|
|
continue;
|
|
|
|
while (1) {
|
|
char *suffix = NULL;
|
|
int option_index = 0;
|
|
|
|
c = getopt_long(argc, argv, commands[i].optstring,
|
|
long_options, &option_index);
|
|
if (c == -1)
|
|
break;
|
|
|
|
/* filter out illegal long options */
|
|
if (strchr(commands[i].optstring, c) == NULL) {
|
|
/* TODO maybe print actual long option instead */
|
|
ERROR("%s: invalid option -- '%c'\n",
|
|
argv[0], c);
|
|
c = '?';
|
|
}
|
|
|
|
switch(c) {
|
|
case 'n':
|
|
param.name = optarg;
|
|
break;
|
|
case 't':
|
|
if (intfiletype(optarg) != ((uint64_t) - 1))
|
|
param.type = intfiletype(optarg);
|
|
else
|
|
param.type = strtoul(optarg, NULL, 0);
|
|
if (param.type == 0)
|
|
WARN("Unknown type '%s' ignored\n",
|
|
optarg);
|
|
break;
|
|
case 'c':
|
|
if (!strncasecmp(optarg, "lzma", 5))
|
|
param.algo = CBFS_COMPRESS_LZMA;
|
|
else if (!strncasecmp(optarg, "none", 5))
|
|
param.algo = CBFS_COMPRESS_NONE;
|
|
else
|
|
WARN("Unknown compression '%s'"
|
|
" ignored.\n", optarg);
|
|
break;
|
|
case 'M':
|
|
param.fmap = optarg;
|
|
break;
|
|
case 'r':
|
|
param.region_name = optarg;
|
|
break;
|
|
case 'b':
|
|
param.baseaddress = strtoul(optarg, NULL, 0);
|
|
// baseaddress may be zero on non-x86, so we
|
|
// need an explicit "baseaddress_assigned".
|
|
param.baseaddress = strtoul(optarg, NULL, 0);
|
|
param.baseaddress_assigned = 1;
|
|
break;
|
|
case 'l':
|
|
param.loadaddress = strtoul(optarg, NULL, 0);
|
|
break;
|
|
case 'e':
|
|
param.entrypoint = strtoul(optarg, NULL, 0);
|
|
break;
|
|
case 's':
|
|
param.size = strtoul(optarg, &suffix, 0);
|
|
if (tolower(suffix[0])=='k') {
|
|
param.size *= 1024;
|
|
}
|
|
if (tolower(suffix[0])=='m') {
|
|
param.size *= 1024 * 1024;
|
|
}
|
|
break;
|
|
case 'B':
|
|
param.bootblock = optarg;
|
|
break;
|
|
case 'H':
|
|
param.headeroffset = strtoul(
|
|
optarg, NULL, 0);
|
|
param.headeroffset_assigned = 1;
|
|
break;
|
|
case 'D':
|
|
param.copyoffset = strtoul(optarg, NULL, 0);
|
|
param.copyoffset_assigned = 1;
|
|
break;
|
|
case 'a':
|
|
param.alignment = strtoul(optarg, NULL, 0);
|
|
break;
|
|
case 'P':
|
|
param.pagesize = strtoul(optarg, NULL, 0);
|
|
break;
|
|
case 'o':
|
|
param.cbfsoffset = strtoul(optarg, NULL, 0);
|
|
param.cbfsoffset_assigned = 1;
|
|
break;
|
|
case 'f':
|
|
param.filename = optarg;
|
|
break;
|
|
case 'i':
|
|
param.u64val = strtoull(optarg, NULL, 0);
|
|
break;
|
|
case 'T':
|
|
param.top_aligned = true;
|
|
break;
|
|
case 'u':
|
|
param.fill_partial_upward = true;
|
|
break;
|
|
case 'd':
|
|
param.fill_partial_downward = true;
|
|
break;
|
|
case 'w':
|
|
param.show_immutable = true;
|
|
break;
|
|
case 'x':
|
|
param.fit_empty_entries = strtol(optarg, NULL, 0);
|
|
break;
|
|
case 'v':
|
|
verbose++;
|
|
break;
|
|
case 'm':
|
|
param.arch = string_to_arch(optarg);
|
|
break;
|
|
case 'I':
|
|
param.initrd = optarg;
|
|
break;
|
|
case 'C':
|
|
param.cmdline = optarg;
|
|
break;
|
|
case 'S':
|
|
param.ignore_section = optarg;
|
|
break;
|
|
case 'h':
|
|
case '?':
|
|
usage(argv[0]);
|
|
return 1;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (commands[i].function == cbfs_create) {
|
|
if (param.fmap) {
|
|
struct buffer flashmap;
|
|
if (buffer_from_file(&flashmap, param.fmap))
|
|
return 1;
|
|
param.image_file = partitioned_file_create(
|
|
image_name, &flashmap);
|
|
buffer_delete(&flashmap);
|
|
} else if (param.size) {
|
|
param.image_file = partitioned_file_create_flat(
|
|
image_name, param.size);
|
|
} else {
|
|
ERROR("You need to specify a valid -M/--flashmap or -s/--size.\n");
|
|
return 1;
|
|
}
|
|
} else {
|
|
param.image_file =
|
|
partitioned_file_reopen(image_name,
|
|
cbfs_is_legacy_format);
|
|
}
|
|
if (!param.image_file)
|
|
return 1;
|
|
|
|
unsigned num_regions = 1;
|
|
for (const char *list = strchr(param.region_name, ','); list;
|
|
list = strchr(list + 1, ','))
|
|
++num_regions;
|
|
|
|
// If the action needs to read an image region, as indicated by
|
|
// having accesses_region set in its command struct, that
|
|
// region's buffer struct will be stored here and the client
|
|
// will receive a pointer to it via param.image_region. It
|
|
// need not write the buffer back to the image file itself,
|
|
// since this behavior can be requested via its modifies_region
|
|
// field. Additionally, it should never free the region buffer,
|
|
// as that is performed automatically once it completes.
|
|
struct buffer image_regions[num_regions];
|
|
memset(image_regions, 0, sizeof(image_regions));
|
|
|
|
bool seen_primary_cbfs = false;
|
|
char region_name_scratch[strlen(param.region_name) + 1];
|
|
strcpy(region_name_scratch, param.region_name);
|
|
param.region_name = strtok(region_name_scratch, ",");
|
|
for (unsigned region = 0; region < num_regions; ++region) {
|
|
if (!param.region_name) {
|
|
ERROR("Encountered illegal degenerate region name in -r list\n");
|
|
ERROR("The image will be left unmodified.\n");
|
|
partitioned_file_close(param.image_file);
|
|
return 1;
|
|
}
|
|
|
|
if (strcmp(param.region_name, SECTION_NAME_PRIMARY_CBFS)
|
|
== 0)
|
|
seen_primary_cbfs = true;
|
|
|
|
param.image_region = image_regions + region;
|
|
if (dispatch_command(commands[i])) {
|
|
partitioned_file_close(param.image_file);
|
|
return 1;
|
|
}
|
|
|
|
param.region_name = strtok(NULL, ",");
|
|
}
|
|
|
|
if (commands[i].function == cbfs_create && !seen_primary_cbfs) {
|
|
ERROR("The creation -r list must include the mandatory '%s' section.\n",
|
|
SECTION_NAME_PRIMARY_CBFS);
|
|
ERROR("The image will be left unmodified.\n");
|
|
partitioned_file_close(param.image_file);
|
|
return 1;
|
|
}
|
|
|
|
if (commands[i].modifies_region) {
|
|
assert(param.image_file);
|
|
assert(commands[i].accesses_region);
|
|
for (unsigned region = 0; region < num_regions;
|
|
++region) {
|
|
|
|
if (!partitioned_file_write_region(
|
|
param.image_file,
|
|
image_regions + region)) {
|
|
partitioned_file_close(
|
|
param.image_file);
|
|
return 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
partitioned_file_close(param.image_file);
|
|
return 0;
|
|
}
|
|
|
|
ERROR("Unknown command '%s'.\n", cmd);
|
|
usage(argv[0]);
|
|
return 1;
|
|
}
|