Compare commits
4 Commits
5115465001
...
802649ae28
Author | SHA1 | Date |
---|---|---|
anonymix007 | 802649ae28 | |
gerblesh | bbec1c87d3 | |
anonymix007 | 098e44d03c | |
anonymix007 | cf331f1c9b |
|
@ -71,6 +71,8 @@
|
||||||
<varname>Cmdline=</varname>/<option>--cmdline=</option>,
|
<varname>Cmdline=</varname>/<option>--cmdline=</option>,
|
||||||
<varname>OSRelease=</varname>/<option>--os-release=</option>,
|
<varname>OSRelease=</varname>/<option>--os-release=</option>,
|
||||||
<varname>DeviceTree=</varname>/<option>--devicetree=</option>,
|
<varname>DeviceTree=</varname>/<option>--devicetree=</option>,
|
||||||
|
<varname>DeviceTreeAuto=</varname>/<option>--devicetree-auto=</option>,
|
||||||
|
<varname>HWIDs=</varname>/<option>--hwids=</option>,
|
||||||
<varname>Splash=</varname>/<option>--splash=</option>,
|
<varname>Splash=</varname>/<option>--splash=</option>,
|
||||||
<varname>PCRPKey=</varname>/<option>--pcrpkey=</option>,
|
<varname>PCRPKey=</varname>/<option>--pcrpkey=</option>,
|
||||||
<varname>Uname=</varname>/<option>--uname=</option>,
|
<varname>Uname=</varname>/<option>--uname=</option>,
|
||||||
|
@ -374,6 +376,35 @@
|
||||||
<xi:include href="version-info.xml" xpointer="v253"/></listitem>
|
<xi:include href="version-info.xml" xpointer="v253"/></listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
<varlistentry>
|
||||||
|
<term><varname>DeviceTreeAuto=<replaceable>PATH</replaceable>...</varname></term>
|
||||||
|
<term><option>--devicetree-auto=<replaceable>PATH</replaceable></option></term>
|
||||||
|
|
||||||
|
<listitem><para>Zero or more automatically selectable DeviceTree files. In the configuration file, items are separated by
|
||||||
|
whitespace. Each DeviceTree will be in a separate <literal>.dtbauto</literal> section.</para>
|
||||||
|
|
||||||
|
<xi:include href="version-info.xml" xpointer="v257"/></listitem>
|
||||||
|
</varlistentry>
|
||||||
|
|
||||||
|
<varlistentry>
|
||||||
|
<term><varname>HWIDs=<replaceable>PATH</replaceable></varname></term>
|
||||||
|
<term><option>--hwids=<replaceable>PATH</replaceable></option></term>
|
||||||
|
|
||||||
|
<listitem><para>The hardware ID device table (the <literal>.hwids</literal> section). The argument is a
|
||||||
|
path to a directory with JSON HWID device description files. Each file needs to contain a single JSON object with a <literal>name</literal>, <literal>compatible</literal> and <literal>hwids</literal> keys. The <literal>name</literal> and <literal>compatible</literal> keys must have string values and the <literal>hwids</literal> key must have a list of strings as value, where the strings must be valid UUIDs that represent CHIDs/HWIDs.
|
||||||
|
Example:
|
||||||
|
<programlisting><xi:include href="ukify_hwid.json.example" parse="text" /></programlisting>
|
||||||
|
Here <literal>Example Laptop 16 Gen 7</literal> is the device <literal>name</literal> (as defined by the manufacturer),
|
||||||
|
<literal>example,laptop-16-g7</literal> is the <literal>compatible</literal> (as defined by the kernel) and <literal>hwids</literal>
|
||||||
|
is an array of CHIDs/HWIDs (extracted i.e. from <command>fwupdtool hwids</command> output).
|
||||||
|
If not specified, the section will not be present. It is recommended to specify this parameter if automatically
|
||||||
|
selectable DeviceTrees are to be used.
|
||||||
|
|
||||||
|
</para>
|
||||||
|
|
||||||
|
<xi:include href="version-info.xml" xpointer="v257"/></listitem>
|
||||||
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><varname>Uname=<replaceable>VERSION</replaceable></varname></term>
|
<term><varname>Uname=<replaceable>VERSION</replaceable></varname></term>
|
||||||
<term><option>--uname=<replaceable>VERSION</replaceable></option></term>
|
<term><option>--uname=<replaceable>VERSION</replaceable></option></term>
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
{
|
||||||
|
"name": "Example Laptop 16 Gen 7",
|
||||||
|
"compatible": "example,laptop-16-g7",
|
||||||
|
"hwids": [
|
||||||
|
"5dc05bf4-01f6-4089-b464-a08c47ea9295",
|
||||||
|
"3e3f8f3c-2003-46f2-811c-85554f7d5952"
|
||||||
|
]
|
||||||
|
}
|
|
@ -289,7 +289,8 @@ int write_string_file_full(
|
||||||
const char *fn,
|
const char *fn,
|
||||||
const char *line,
|
const char *line,
|
||||||
WriteStringFileFlags flags,
|
WriteStringFileFlags flags,
|
||||||
const struct timespec *ts) {
|
const struct timespec *ts,
|
||||||
|
const char *label_fn) {
|
||||||
|
|
||||||
bool call_label_ops_post = false, made_file = false;
|
bool call_label_ops_post = false, made_file = false;
|
||||||
_cleanup_fclose_ FILE *f = NULL;
|
_cleanup_fclose_ FILE *f = NULL;
|
||||||
|
@ -321,7 +322,8 @@ int write_string_file_full(
|
||||||
mode_t mode = write_string_file_flags_to_mode(flags);
|
mode_t mode = write_string_file_flags_to_mode(flags);
|
||||||
|
|
||||||
if (FLAGS_SET(flags, WRITE_STRING_FILE_LABEL|WRITE_STRING_FILE_CREATE)) {
|
if (FLAGS_SET(flags, WRITE_STRING_FILE_LABEL|WRITE_STRING_FILE_CREATE)) {
|
||||||
r = label_ops_pre(dir_fd, fn, mode);
|
const char *lookup = label_fn ? label_fn : fn;
|
||||||
|
r = label_ops_pre(dir_fd, lookup, mode);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
goto fail;
|
goto fail;
|
||||||
|
|
||||||
|
|
|
@ -51,12 +51,13 @@ int write_string_stream_full(FILE *f, const char *line, WriteStringFileFlags fla
|
||||||
static inline int write_string_stream(FILE *f, const char *line, WriteStringFileFlags flags) {
|
static inline int write_string_stream(FILE *f, const char *line, WriteStringFileFlags flags) {
|
||||||
return write_string_stream_full(f, line, flags, /* ts= */ NULL);
|
return write_string_stream_full(f, line, flags, /* ts= */ NULL);
|
||||||
}
|
}
|
||||||
int write_string_file_full(int dir_fd, const char *fn, const char *line, WriteStringFileFlags flags, const struct timespec *ts);
|
|
||||||
|
int write_string_file_full(int dir_fd, const char *fn, const char *line, WriteStringFileFlags flags, const struct timespec *ts, const char *label_fn);
|
||||||
static inline int write_string_file(const char *fn, const char *line, WriteStringFileFlags flags) {
|
static inline int write_string_file(const char *fn, const char *line, WriteStringFileFlags flags) {
|
||||||
return write_string_file_full(AT_FDCWD, fn, line, flags, /* ts= */ NULL);
|
return write_string_file_full(AT_FDCWD, fn, line, flags, /* ts= */ NULL, /*label_fn=*/ NULL);
|
||||||
}
|
}
|
||||||
static inline int write_string_file_at(int dir_fd, const char *fn, const char *line, WriteStringFileFlags flags) {
|
static inline int write_string_file_at(int dir_fd, const char *fn, const char *line, WriteStringFileFlags flags) {
|
||||||
return write_string_file_full(dir_fd, fn, line, flags, /* ts= */ NULL);
|
return write_string_file_full(dir_fd, fn, line, flags, /* ts= */ NULL, /*label_fn=*/ NULL);
|
||||||
}
|
}
|
||||||
int write_string_filef(const char *fn, WriteStringFileFlags flags, const char *format, ...) _printf_(3, 4);
|
int write_string_filef(const char *fn, WriteStringFileFlags flags, const char *format, ...) _printf_(3, 4);
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
||||||
|
|
||||||
|
#include <errno.h>
|
||||||
#include <fcntl.h>
|
#include <fcntl.h>
|
||||||
#include <getopt.h>
|
#include <getopt.h>
|
||||||
#include <linux/loop.h>
|
#include <linux/loop.h>
|
||||||
|
@ -45,6 +46,7 @@
|
||||||
#include "process-util.h"
|
#include "process-util.h"
|
||||||
#include "rm-rf.h"
|
#include "rm-rf.h"
|
||||||
#include "sort-util.h"
|
#include "sort-util.h"
|
||||||
|
#include "selinux-util.h"
|
||||||
#include "string-table.h"
|
#include "string-table.h"
|
||||||
#include "string-util.h"
|
#include "string-util.h"
|
||||||
#include "terminal-util.h"
|
#include "terminal-util.h"
|
||||||
|
@ -899,6 +901,7 @@ static int resolve_mutable_directory(
|
||||||
_cleanup_free_ char *path = NULL, *resolved_path = NULL, *dir_name = NULL;
|
_cleanup_free_ char *path = NULL, *resolved_path = NULL, *dir_name = NULL;
|
||||||
const char *root = arg_root, *base = MUTABLE_EXTENSIONS_BASE_DIR;
|
const char *root = arg_root, *base = MUTABLE_EXTENSIONS_BASE_DIR;
|
||||||
int r;
|
int r;
|
||||||
|
_cleanup_close_ int atfd = -EBADF;
|
||||||
|
|
||||||
assert(hierarchy);
|
assert(hierarchy);
|
||||||
assert(ret_resolved_mutable_directory);
|
assert(ret_resolved_mutable_directory);
|
||||||
|
@ -943,6 +946,14 @@ static int resolve_mutable_directory(
|
||||||
r = mkdir_p(path_in_root, 0700);
|
r = mkdir_p(path_in_root, 0700);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to create a directory '%s': %m", path_in_root);
|
return log_error_errno(r, "Failed to create a directory '%s': %m", path_in_root);
|
||||||
|
|
||||||
|
atfd = open(path_in_root, O_DIRECTORY|O_CLOEXEC);
|
||||||
|
if (atfd < 0)
|
||||||
|
return log_error_errno(errno, "Failed to open directory '%s': %m", path_in_root);
|
||||||
|
|
||||||
|
r = mac_selinux_fix_full(atfd, NULL, hierarchy, 0);
|
||||||
|
if (r < 0)
|
||||||
|
return log_error_errno(r, "Failed to fix SELinux label for '%s': %m", path_in_root);
|
||||||
}
|
}
|
||||||
|
|
||||||
r = chase(path, root, CHASE_PREFIX_ROOT, &resolved_path, NULL);
|
r = chase(path, root, CHASE_PREFIX_ROOT, &resolved_path, NULL);
|
||||||
|
@ -1289,6 +1300,7 @@ static int mount_overlayfs_with_op(
|
||||||
|
|
||||||
int r;
|
int r;
|
||||||
const char *top_layer = NULL;
|
const char *top_layer = NULL;
|
||||||
|
_cleanup_close_ int atfd = -EBADF;
|
||||||
|
|
||||||
assert(op);
|
assert(op);
|
||||||
assert(overlay_path);
|
assert(overlay_path);
|
||||||
|
@ -1301,10 +1313,28 @@ static int mount_overlayfs_with_op(
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to make directory '%s': %m", meta_path);
|
return log_error_errno(r, "Failed to make directory '%s': %m", meta_path);
|
||||||
|
|
||||||
|
atfd = open(meta_path, O_DIRECTORY|O_CLOEXEC);
|
||||||
|
if (atfd < 0)
|
||||||
|
return log_error_errno(errno, "Failed to open directory '%s': %m", meta_path);
|
||||||
|
|
||||||
|
r = mac_selinux_fix_full(atfd, NULL, op->hierarchy, 0);
|
||||||
|
if (r < 0)
|
||||||
|
return log_error_errno(r, "Failed to fix SELinux label for '%s': %m", meta_path);
|
||||||
|
|
||||||
if (op->upper_dir && op->work_dir) {
|
if (op->upper_dir && op->work_dir) {
|
||||||
r = mkdir_p(op->work_dir, 0700);
|
r = mkdir_p(op->work_dir, 0700);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to make directory '%s': %m", op->work_dir);
|
return log_error_errno(r, "Failed to make directory '%s': %m", op->work_dir);
|
||||||
|
_cleanup_close_ int dfd = -EBADF;
|
||||||
|
|
||||||
|
dfd = open(op->work_dir, O_DIRECTORY|O_CLOEXEC);
|
||||||
|
if (dfd < 0)
|
||||||
|
return log_error_errno(errno, "Failed to open directory '%s': %m", op->work_dir);
|
||||||
|
|
||||||
|
r = mac_selinux_fix_full(dfd, NULL, op->hierarchy, 0);
|
||||||
|
if (r < 0)
|
||||||
|
return log_error_errno(r, "Failed to fix SELinux label for '%s': %m", op->work_dir);
|
||||||
|
|
||||||
top_layer = op->upper_dir;
|
top_layer = op->upper_dir;
|
||||||
} else {
|
} else {
|
||||||
assert(!strv_isempty(op->lower_dirs));
|
assert(!strv_isempty(op->lower_dirs));
|
||||||
|
@ -1325,7 +1355,7 @@ static int mount_overlayfs_with_op(
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int write_extensions_file(ImageClass image_class, char **extensions, const char *meta_path) {
|
static int write_extensions_file(ImageClass image_class, char **extensions, const char *meta_path, const char *hierarchy) {
|
||||||
_cleanup_free_ char *f = NULL, *buf = NULL;
|
_cleanup_free_ char *f = NULL, *buf = NULL;
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
|
@ -1343,14 +1373,15 @@ static int write_extensions_file(ImageClass image_class, char **extensions, cons
|
||||||
if (!buf)
|
if (!buf)
|
||||||
return log_oom();
|
return log_oom();
|
||||||
|
|
||||||
r = write_string_file(f, buf, WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755);
|
const char *hierarchy_path = path_join(hierarchy, image_class_info[image_class].dot_directory_name, image_class_info[image_class].short_identifier_plural);
|
||||||
|
r = write_string_file_full(AT_FDCWD,f, buf, WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755|WRITE_STRING_FILE_LABEL, NULL, hierarchy_path);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to write extension meta file '%s': %m", f);
|
return log_error_errno(r, "Failed to write extension meta file '%s': %m", f);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int write_dev_file(ImageClass image_class, const char *meta_path, const char *overlay_path) {
|
static int write_dev_file(ImageClass image_class, const char *meta_path, const char *overlay_path, const char *hierarchy) {
|
||||||
_cleanup_free_ char *f = NULL;
|
_cleanup_free_ char *f = NULL;
|
||||||
struct stat st;
|
struct stat st;
|
||||||
int r;
|
int r;
|
||||||
|
@ -1372,14 +1403,15 @@ static int write_dev_file(ImageClass image_class, const char *meta_path, const c
|
||||||
/* Modifying the underlying layers while the overlayfs is mounted is technically undefined, but at
|
/* Modifying the underlying layers while the overlayfs is mounted is technically undefined, but at
|
||||||
* least it won't crash or deadlock, as per the kernel docs about overlayfs:
|
* least it won't crash or deadlock, as per the kernel docs about overlayfs:
|
||||||
* https://www.kernel.org/doc/html/latest/filesystems/overlayfs.html#changes-to-underlying-filesystems */
|
* https://www.kernel.org/doc/html/latest/filesystems/overlayfs.html#changes-to-underlying-filesystems */
|
||||||
r = write_string_file(f, FORMAT_DEVNUM(st.st_dev), WRITE_STRING_FILE_CREATE);
|
const char *hierarchy_path = path_join(hierarchy, image_class_info[image_class].dot_directory_name, image_class_info[image_class].short_identifier_plural);
|
||||||
|
r = write_string_file_full(AT_FDCWD, f, FORMAT_DEVNUM(st.st_dev), WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_LABEL, NULL, hierarchy_path);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to write '%s': %m", f);
|
return log_error_errno(r, "Failed to write '%s': %m", f);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int write_work_dir_file(ImageClass image_class, const char *meta_path, const char *work_dir) {
|
static int write_work_dir_file(ImageClass image_class, const char *meta_path, const char *work_dir, const char* hierarchy) {
|
||||||
_cleanup_free_ char *escaped_work_dir_in_root = NULL, *f = NULL;
|
_cleanup_free_ char *escaped_work_dir_in_root = NULL, *f = NULL;
|
||||||
char *work_dir_in_root = NULL;
|
char *work_dir_in_root = NULL;
|
||||||
int r;
|
int r;
|
||||||
|
@ -1406,7 +1438,8 @@ static int write_work_dir_file(ImageClass image_class, const char *meta_path, co
|
||||||
escaped_work_dir_in_root = cescape(work_dir_in_root);
|
escaped_work_dir_in_root = cescape(work_dir_in_root);
|
||||||
if (!escaped_work_dir_in_root)
|
if (!escaped_work_dir_in_root)
|
||||||
return log_oom();
|
return log_oom();
|
||||||
r = write_string_file(f, escaped_work_dir_in_root, WRITE_STRING_FILE_CREATE);
|
const char *hierarchy_path = path_join(hierarchy, image_class_info[image_class].dot_directory_name, "work_dir");
|
||||||
|
r = write_string_file_full(AT_FDCWD, f, escaped_work_dir_in_root, WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_LABEL, NULL, hierarchy_path);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to write '%s': %m", f);
|
return log_error_errno(r, "Failed to write '%s': %m", f);
|
||||||
|
|
||||||
|
@ -1418,8 +1451,10 @@ static int store_info_in_meta(
|
||||||
char **extensions,
|
char **extensions,
|
||||||
const char *meta_path,
|
const char *meta_path,
|
||||||
const char *overlay_path,
|
const char *overlay_path,
|
||||||
const char *work_dir) {
|
const char *work_dir,
|
||||||
|
const char *hierarchy) {
|
||||||
|
_cleanup_free_ char *f = NULL;
|
||||||
|
_cleanup_close_ int atfd = -EBADF;
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
assert(extensions);
|
assert(extensions);
|
||||||
|
@ -1427,15 +1462,32 @@ static int store_info_in_meta(
|
||||||
assert(overlay_path);
|
assert(overlay_path);
|
||||||
/* work_dir may be NULL */
|
/* work_dir may be NULL */
|
||||||
|
|
||||||
r = write_extensions_file(image_class, extensions, meta_path);
|
f = path_join(meta_path, image_class_info[image_class].dot_directory_name);
|
||||||
|
if (!f)
|
||||||
|
return log_oom();
|
||||||
|
|
||||||
|
r = mkdir_p(f, 0755);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
r = write_dev_file(image_class, meta_path, overlay_path);
|
atfd = open(f, O_DIRECTORY|O_CLOEXEC);
|
||||||
|
if (atfd < 0)
|
||||||
|
return log_error_errno(errno, "Failed to open directory '%s': %m", f);
|
||||||
|
|
||||||
|
r = mac_selinux_fix_full(atfd, NULL, hierarchy, 0);
|
||||||
|
|
||||||
|
if (r < 0)
|
||||||
|
return log_error_errno(r, "Failed to fix SELinux label for '%s': %m", hierarchy);
|
||||||
|
|
||||||
|
r = write_extensions_file(image_class, extensions, meta_path, hierarchy);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
r = write_work_dir_file(image_class, meta_path, work_dir);
|
r = write_dev_file(image_class, meta_path, overlay_path, hierarchy);
|
||||||
|
if (r < 0)
|
||||||
|
return r;
|
||||||
|
|
||||||
|
r = write_work_dir_file(image_class, meta_path, work_dir, hierarchy);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
|
@ -1501,6 +1553,8 @@ static int merge_hierarchy(
|
||||||
assert(overlay_path);
|
assert(overlay_path);
|
||||||
assert(workspace_path);
|
assert(workspace_path);
|
||||||
|
|
||||||
|
mac_selinux_init();
|
||||||
|
|
||||||
r = determine_used_extensions(hierarchy, paths, &used_paths, &extensions_used);
|
r = determine_used_extensions(hierarchy, paths, &used_paths, &extensions_used);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
@ -1528,7 +1582,7 @@ static int merge_hierarchy(
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
r = store_info_in_meta(image_class, extensions, meta_path, overlay_path, op->work_dir);
|
r = store_info_in_meta(image_class, extensions, meta_path, overlay_path, op->work_dir, op->hierarchy);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
|
|
|
@ -42,6 +42,7 @@ import subprocess
|
||||||
import sys
|
import sys
|
||||||
import tempfile
|
import tempfile
|
||||||
import textwrap
|
import textwrap
|
||||||
|
import uuid
|
||||||
from collections.abc import Iterable, Iterator, Sequence
|
from collections.abc import Iterable, Iterator, Sequence
|
||||||
from hashlib import sha256
|
from hashlib import sha256
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
|
@ -1013,14 +1014,9 @@ def merge_sbat(input_pe: list[Path], input_text: list[str]) -> str:
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
# Keep in sync with EFI_GUID (src/boot/efi.h)
|
|
||||||
# uint32_t Data1, uint16_t Data2, uint16_t Data3, uint8_t Data4[8]
|
|
||||||
EFI_GUID = tuple[int, int, int, tuple[int, int, int, int, int, int, int, int]]
|
|
||||||
EFI_GUID_STRUCT_SIZE = 4 + 2 + 2 + 1 * 8
|
|
||||||
|
|
||||||
# Keep in sync with Device (DEVICE_TYPE_DEVICETREE) from src/boot/chid.h
|
# Keep in sync with Device (DEVICE_TYPE_DEVICETREE) from src/boot/chid.h
|
||||||
# uint32_t descriptor, EFI_GUID chid, uint32_t name_offset, uint32_t compatible_offset
|
# uint32_t descriptor, EFI_GUID chid, uint32_t name_offset, uint32_t compatible_offset
|
||||||
DEVICE_STRUCT_SIZE = 4 + EFI_GUID_STRUCT_SIZE + 4 + 4
|
DEVICE_STRUCT_SIZE = 4 + 16 + 4 + 4
|
||||||
NULL_DEVICE = b'\0' * DEVICE_STRUCT_SIZE
|
NULL_DEVICE = b'\0' * DEVICE_STRUCT_SIZE
|
||||||
DEVICE_TYPE_DEVICETREE = 1
|
DEVICE_TYPE_DEVICETREE = 1
|
||||||
|
|
||||||
|
@ -1029,29 +1025,21 @@ def device_make_descriptor(device_type: int, size: int) -> int:
|
||||||
return (size) | (device_type << 28)
|
return (size) | (device_type << 28)
|
||||||
|
|
||||||
|
|
||||||
def pack_device(offsets: dict[str, int], name: str, compatible: str, chids: list[EFI_GUID]) -> bytes:
|
DEVICETREE_DESCRIPTOR = device_make_descriptor(DEVICE_TYPE_DEVICETREE, DEVICE_STRUCT_SIZE)
|
||||||
|
|
||||||
|
|
||||||
|
def pack_device(offsets: dict[str, int], name: str, compatible: str, chids: set[uuid.UUID]) -> bytes:
|
||||||
data = b''
|
data = b''
|
||||||
|
|
||||||
for data1, data2, data3, data4 in chids:
|
for chid in sorted(chids):
|
||||||
data += struct.pack(
|
data += struct.pack('<I', DEVICETREE_DESCRIPTOR)
|
||||||
'<IIHH8BII',
|
data += chid.bytes_le
|
||||||
device_make_descriptor(DEVICE_TYPE_DEVICETREE, DEVICE_STRUCT_SIZE),
|
data += struct.pack('<II', offsets[name], offsets[compatible])
|
||||||
data1,
|
|
||||||
data2,
|
|
||||||
data3,
|
|
||||||
*data4,
|
|
||||||
offsets[name],
|
|
||||||
offsets[compatible],
|
|
||||||
)
|
|
||||||
|
|
||||||
assert len(data) == DEVICE_STRUCT_SIZE * len(chids)
|
assert len(data) == DEVICE_STRUCT_SIZE * len(chids)
|
||||||
return data
|
return data
|
||||||
|
|
||||||
|
|
||||||
def hex_pairs_list(string: str) -> list[int]:
|
|
||||||
return [int(string[i : i + 2], 16) for i in range(0, len(string), 2)]
|
|
||||||
|
|
||||||
|
|
||||||
def pack_strings(strings: set[str], base: int) -> tuple[bytes, dict[str, int]]:
|
def pack_strings(strings: set[str], base: int) -> tuple[bytes, dict[str, int]]:
|
||||||
blob = b''
|
blob = b''
|
||||||
offsets = {}
|
offsets = {}
|
||||||
|
@ -1064,56 +1052,22 @@ def pack_strings(strings: set[str], base: int) -> tuple[bytes, dict[str, int]]:
|
||||||
|
|
||||||
|
|
||||||
def parse_hwid_dir(path: Path) -> bytes:
|
def parse_hwid_dir(path: Path) -> bytes:
|
||||||
hwid_files = path.rglob('*.txt')
|
hwid_files = path.rglob('*.json')
|
||||||
|
|
||||||
strings: set[str] = set()
|
strings: set[str] = set()
|
||||||
devices: collections.defaultdict[tuple[str, str], list[EFI_GUID]] = collections.defaultdict(list)
|
devices: collections.defaultdict[tuple[str, str], set[uuid.UUID]] = collections.defaultdict(set)
|
||||||
|
|
||||||
uuid_regexp = re.compile(
|
|
||||||
r'\{[0-9a-f]{8}-[0-9a-f]{4}-[0-5][0-9a-f]{3}-[089ab][0-9a-f]{3}-[0-9a-f]{12}\}', re.I
|
|
||||||
)
|
|
||||||
|
|
||||||
for hwid_file in hwid_files:
|
for hwid_file in hwid_files:
|
||||||
content = hwid_file.open().readlines()
|
data = json.loads(hwid_file.read_text(encoding='UTF-8'))
|
||||||
|
|
||||||
data: dict[str, str] = {
|
for k in ['name', 'compatible', 'hwids']:
|
||||||
'Manufacturer': '',
|
if k not in data:
|
||||||
'Family': '',
|
|
||||||
'Compatible': '',
|
|
||||||
}
|
|
||||||
uuids: list[EFI_GUID] = []
|
|
||||||
|
|
||||||
for line in content:
|
|
||||||
for k in data:
|
|
||||||
if line.startswith(k):
|
|
||||||
data[k] = line.split(':')[1].strip()
|
|
||||||
break
|
|
||||||
else:
|
|
||||||
uuid = uuid_regexp.match(line)
|
|
||||||
if uuid is not None:
|
|
||||||
d1, d2, d3, d4, d5 = uuid.group(0)[1:-1].split('-')
|
|
||||||
|
|
||||||
data1 = int(d1, 16)
|
|
||||||
data2 = int(d2, 16)
|
|
||||||
data3 = int(d3, 16)
|
|
||||||
data4 = cast(
|
|
||||||
tuple[int, int, int, int, int, int, int, int],
|
|
||||||
tuple(hex_pairs_list(d4) + hex_pairs_list(d5)),
|
|
||||||
)
|
|
||||||
|
|
||||||
uuids.append((data1, data2, data3, data4))
|
|
||||||
|
|
||||||
for k, v in data.items():
|
|
||||||
if not v:
|
|
||||||
raise ValueError(f'hwid description file "{hwid_file}" does not contain "{k}"')
|
raise ValueError(f'hwid description file "{hwid_file}" does not contain "{k}"')
|
||||||
|
|
||||||
name = data['Manufacturer'] + ' ' + data['Family']
|
strings |= {data['name'], data['compatible']}
|
||||||
compatible = data['Compatible']
|
|
||||||
|
|
||||||
strings |= set([name, compatible])
|
# (name, compatible) pair uniquely identifies the device
|
||||||
|
devices[(data['name'], data['compatible'])] |= {uuid.UUID(u) for u in data['hwids']}
|
||||||
# (compatible, name) pair uniquely identifies the device
|
|
||||||
devices[(compatible, name)] += uuids
|
|
||||||
|
|
||||||
total_device_structs = 1
|
total_device_structs = 1
|
||||||
for dev, uuids in devices.items():
|
for dev, uuids in devices.items():
|
||||||
|
@ -1122,7 +1076,7 @@ def parse_hwid_dir(path: Path) -> bytes:
|
||||||
strings_blob, offsets = pack_strings(strings, total_device_structs * DEVICE_STRUCT_SIZE)
|
strings_blob, offsets = pack_strings(strings, total_device_structs * DEVICE_STRUCT_SIZE)
|
||||||
|
|
||||||
devices_blob = b''
|
devices_blob = b''
|
||||||
for (compatible, name), uuids in devices.items():
|
for (name, compatible), uuids in devices.items():
|
||||||
devices_blob += pack_device(offsets, name, compatible, uuids)
|
devices_blob += pack_device(offsets, name, compatible, uuids)
|
||||||
|
|
||||||
devices_blob += NULL_DEVICE
|
devices_blob += NULL_DEVICE
|
||||||
|
|
|
@ -29,7 +29,7 @@ static int apply_timestamp(const char *path, struct timespec *ts) {
|
||||||
timespec_load_nsec(ts)) < 0)
|
timespec_load_nsec(ts)) < 0)
|
||||||
return log_oom();
|
return log_oom();
|
||||||
|
|
||||||
r = write_string_file_full(AT_FDCWD, path, message, WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_ATOMIC|WRITE_STRING_FILE_LABEL, ts);
|
r = write_string_file_full(AT_FDCWD, path, message, WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_ATOMIC|WRITE_STRING_FILE_LABEL, ts, NULL);
|
||||||
if (r == -EROFS)
|
if (r == -EROFS)
|
||||||
log_debug_errno(r, "Cannot create \"%s\", file system is read-only.", path);
|
log_debug_errno(r, "Cannot create \"%s\", file system is read-only.", path);
|
||||||
else if (r < 0)
|
else if (r < 0)
|
||||||
|
|
Loading…
Reference in New Issue