mirror of https://github.com/acidanthera/audk.git
209 lines
8.4 KiB
Python
209 lines
8.4 KiB
Python
## @file
|
|
# Generate PCD table for 'Patchable In Module' type PCD with given .map file.
|
|
# The Patch PCD table like:
|
|
#
|
|
# PCD Name Offset in binary
|
|
# ======== ================
|
|
#
|
|
# Copyright (c) 2008 - 2014, Intel Corporation. All rights reserved.<BR>
|
|
# This program and the accompanying materials
|
|
# are licensed and made available under the terms and conditions of the BSD License
|
|
# which accompanies this distribution. The full text of the license may be found at
|
|
# http://opensource.org/licenses/bsd-license.php
|
|
#
|
|
# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
#
|
|
#
|
|
|
|
#====================================== External Libraries ========================================
|
|
import optparse
|
|
import Common.LongFilePathOs as os
|
|
import re
|
|
import array
|
|
|
|
from Common.BuildToolError import *
|
|
import Common.EdkLogger as EdkLogger
|
|
from Common.Misc import PeImageClass
|
|
from Common.BuildVersion import gBUILD_VERSION
|
|
from Common.LongFilePathSupport import OpenLongFilePath as open
|
|
|
|
# Version and Copyright
|
|
__version_number__ = ("0.10" + " " + gBUILD_VERSION)
|
|
__version__ = "%prog Version " + __version_number__
|
|
__copyright__ = "Copyright (c) 2008 - 2010, Intel Corporation. All rights reserved."
|
|
|
|
#====================================== Internal Libraries ========================================
|
|
|
|
#============================================== Code ===============================================
|
|
secRe = re.compile('^([\da-fA-F]+):([\da-fA-F]+) +([\da-fA-F]+)[Hh]? +([.\w\$]+) +(\w+)', re.UNICODE)
|
|
symRe = re.compile('^([\da-fA-F]+):([\da-fA-F]+) +([\.\-:\\\\\w\?@\$]+) +([\da-fA-F]+)', re.UNICODE)
|
|
|
|
def parsePcdInfoFromMapFile(mapfilepath, efifilepath):
|
|
""" Parse map file to get binary patch pcd information
|
|
@param path Map file absolution path
|
|
|
|
@return a list which element hold (PcdName, Offset, SectionName)
|
|
"""
|
|
lines = []
|
|
try:
|
|
f = open(mapfilepath, 'r')
|
|
lines = f.readlines()
|
|
f.close()
|
|
except:
|
|
return None
|
|
|
|
if len(lines) == 0: return None
|
|
firstline = lines[0].strip()
|
|
if (firstline.startswith("Archive member included ") and
|
|
firstline.endswith(" file (symbol)")):
|
|
return _parseForGCC(lines, efifilepath)
|
|
return _parseGeneral(lines, efifilepath)
|
|
|
|
def _parseForGCC(lines, efifilepath):
|
|
""" Parse map file generated by GCC linker """
|
|
status = 0
|
|
imageBase = -1
|
|
sections = []
|
|
bpcds = []
|
|
for line in lines:
|
|
line = line.strip()
|
|
# status machine transection
|
|
if status == 0 and line == "Memory Configuration":
|
|
status = 1
|
|
continue
|
|
elif status == 1 and line == 'Linker script and memory map':
|
|
status = 2
|
|
continue
|
|
elif status ==2 and line == 'START GROUP':
|
|
status = 3
|
|
continue
|
|
|
|
# status handler
|
|
if status == 2:
|
|
m = re.match('^([\w_\.]+) +([\da-fA-Fx]+) +([\da-fA-Fx]+)$', line)
|
|
if m != None:
|
|
sections.append(m.groups(0))
|
|
if status == 2:
|
|
m = re.match("^([\da-fA-Fx]+) +[_]+gPcd_BinaryPatch_([\w_\d]+)$", line)
|
|
if m != None:
|
|
bpcds.append((m.groups(0)[1], int(m.groups(0)[0], 16) , int(sections[-1][1], 16), sections[-1][0]))
|
|
|
|
# get section information from efi file
|
|
efisecs = PeImageClass(efifilepath).SectionHeaderList
|
|
if efisecs == None or len(efisecs) == 0:
|
|
return None
|
|
#redirection
|
|
redirection = 0
|
|
for efisec in efisecs:
|
|
for section in sections:
|
|
if section[0].strip() == efisec[0].strip() and section[0].strip() == '.text':
|
|
redirection = int(section[1], 16) - efisec[1]
|
|
pcds = []
|
|
for pcd in bpcds:
|
|
for efisec in efisecs:
|
|
if pcd[1] >= efisec[1] and pcd[1] < efisec[1]+efisec[3]:
|
|
#assert efisec[0].strip() == pcd[3].strip() and efisec[1] + redirection == pcd[2], "There are some differences between map file and efi file"
|
|
pcds.append([pcd[0], efisec[2] + pcd[1] - efisec[1] - redirection, efisec[0]])
|
|
return pcds
|
|
|
|
def _parseGeneral(lines, efifilepath):
|
|
""" For MSFT, ICC, EBC
|
|
@param lines line array for map file
|
|
|
|
@return a list which element hold (PcdName, Offset, SectionName)
|
|
"""
|
|
status = 0 #0 - beginning of file; 1 - PE section definition; 2 - symbol table
|
|
secs = [] # key = section name
|
|
bPcds = []
|
|
|
|
|
|
for line in lines:
|
|
line = line.strip()
|
|
if re.match("^Start[' ']+Length[' ']+Name[' ']+Class", line):
|
|
status = 1
|
|
continue
|
|
if re.match("^Address[' ']+Publics by Value[' ']+Rva\+Base", line):
|
|
status = 2
|
|
continue
|
|
if re.match("^entry point at", line):
|
|
status = 3
|
|
continue
|
|
if status == 1 and len(line) != 0:
|
|
m = secRe.match(line)
|
|
assert m != None, "Fail to parse the section in map file , line is %s" % line
|
|
sec_no, sec_start, sec_length, sec_name, sec_class = m.groups(0)
|
|
secs.append([int(sec_no, 16), int(sec_start, 16), int(sec_length, 16), sec_name, sec_class])
|
|
if status == 2 and len(line) != 0:
|
|
m = symRe.match(line)
|
|
assert m != None, "Fail to parse the symbol in map file, line is %s" % line
|
|
sec_no, sym_offset, sym_name, vir_addr = m.groups(0)
|
|
sec_no = int(sec_no, 16)
|
|
sym_offset = int(sym_offset, 16)
|
|
vir_addr = int(vir_addr, 16)
|
|
m2 = re.match('^[_]+gPcd_BinaryPatch_([\w]+)', sym_name)
|
|
if m2 != None:
|
|
# fond a binary pcd entry in map file
|
|
for sec in secs:
|
|
if sec[0] == sec_no and (sym_offset >= sec[1] and sym_offset < sec[1] + sec[2]):
|
|
bPcds.append([m2.groups(0)[0], sec[3], sym_offset, vir_addr, sec_no])
|
|
|
|
if len(bPcds) == 0: return None
|
|
|
|
# get section information from efi file
|
|
efisecs = PeImageClass(efifilepath).SectionHeaderList
|
|
if efisecs == None or len(efisecs) == 0:
|
|
return None
|
|
|
|
pcds = []
|
|
for pcd in bPcds:
|
|
index = 0
|
|
for efisec in efisecs:
|
|
index = index + 1
|
|
if pcd[1].strip() == efisec[0].strip():
|
|
pcds.append([pcd[0], efisec[2] + pcd[2], efisec[0]])
|
|
elif pcd[4] == index:
|
|
pcds.append([pcd[0], efisec[2] + pcd[2], efisec[0]])
|
|
return pcds
|
|
|
|
def generatePcdTable(list, pcdpath):
|
|
try:
|
|
f = open(pcdpath, 'w')
|
|
except:
|
|
pass
|
|
|
|
f.write('PCD Name Offset Section Name\r\n')
|
|
|
|
for pcditem in list:
|
|
f.write('%-30s 0x%-08X %-6s\r\n' % (pcditem[0], pcditem[1], pcditem[2]))
|
|
f.close()
|
|
|
|
#print 'Success to generate Binary Patch PCD table at %s!' % pcdpath
|
|
|
|
if __name__ == '__main__':
|
|
UsageString = "%prog -m <MapFile> -e <EfiFile> -o <OutFile>"
|
|
AdditionalNotes = "\nPCD table is generated in file name with .BinaryPcdTable.txt postfix"
|
|
parser = optparse.OptionParser(description=__copyright__, version=__version__, usage=UsageString)
|
|
parser.add_option('-m', '--mapfile', action='store', dest='mapfile',
|
|
help='Absolute path of module map file.')
|
|
parser.add_option('-e', '--efifile', action='store', dest='efifile',
|
|
help='Absolute path of EFI binary file.')
|
|
parser.add_option('-o', '--outputfile', action='store', dest='outfile',
|
|
help='Absolute path of output file to store the got patchable PCD table.')
|
|
|
|
(options, args) = parser.parse_args()
|
|
|
|
if options.mapfile == None or options.efifile == None:
|
|
print parser.get_usage()
|
|
elif os.path.exists(options.mapfile) and os.path.exists(options.efifile):
|
|
list = parsePcdInfoFromMapFile(options.mapfile, options.efifile)
|
|
if list != None:
|
|
if options.outfile != None:
|
|
generatePcdTable(list, options.outfile)
|
|
else:
|
|
generatePcdTable(list, options.mapfile.replace('.map', '.BinaryPcdTable.txt'))
|
|
else:
|
|
print 'Fail to generate Patch PCD Table based on map file and efi file'
|
|
else:
|
|
print 'Fail to generate Patch PCD Table for fail to find map file or efi file!'
|