vendor.sh 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. # SPDX-License-Identifier: GPL-3.0-only
  2. # Copyright (c) 2022 Caleb La Grange <thonkpeasant@protonmail.com>
  3. # Copyright (c) 2022 Ferass El Hafidi <vitali64pmemail@protonmail.com>
  4. # Copyright (c) 2023-2025 Leah Rowe <leah@libreboot.org>
  5. # These are variables and functions, extending the functionality of
  6. # inject.sh, to be used with lbmk; they are kept separate here, so that
  7. # the main inject.sh can be as similar as possible between lbmk and cbmk,
  8. # so that cherry-picking lbmk patches into cbmk yields fewer merge conflicts.
  9. # When reading this file, you should imagine that it is part of inject.sh,
  10. # with inject.sh concatenated onto vendor.sh; they are inexorably intertwined.
  11. # The main "mk" script sources vendor.sh first, and then inject.sh, in lbmk.
  12. e6400_unpack="$xbmkpwd/src/bios_extract/dell_inspiron_1100_unpacker.py"
  13. me7updateparser="$xbmkpwd/util/me7_update_parser/me7_update_parser.py"
  14. pfs_extract="$xbmkpwd/src/biosutilities/Dell_PFS_Extract.py"
  15. uefiextract="$xbmkpwd/elf/uefitool/uefiextract"
  16. vendir="vendorfiles"
  17. appdir="$vendir/app"
  18. vfix="DO_NOT_FLASH_YET._FIRST,_INJECT_FILES_VIA_INSTRUCTIONS_ON_LIBREBOOT.ORG_"
  19. # lbmk-specific extension to the "cv" variable (not suitable for cbmk)
  20. cvchk="CONFIG_INCLUDE_SMSC_SCH5545_EC_FW CONFIG_HAVE_MRC CONFIG_HAVE_ME_BIN \
  21. CONFIG_LENOVO_TBFW_BIN CONFIG_VGA_BIOS_FILE CONFIG_FSP_M_FILE \
  22. CONFIG_FSP_S_FILE CONFIG_KBC1126_FW1 CONFIG_KBC1126_FW2"
  23. # lbmk-specific extensions to the "cv" variable (not suitable for cbmk)
  24. cvxbmk="CONFIG_ME_BIN_PATH CONFIG_SMSC_SCH5545_EC_FW_FILE CONFIG_FSP_FULL_FD \
  25. CONFIG_KBC1126_FW1_OFFSET CONFIG_KBC1126_FW2_OFFSET CONFIG_FSP_USE_REPO \
  26. CONFIG_VGA_BIOS_ID CONFIG_BOARD_DELL_E6400 CONFIG_FSP_S_CBFS \
  27. CONFIG_HAVE_REFCODE_BLOB CONFIG_REFCODE_BLOB_FILE CONFIG_FSP_FD_PATH \
  28. CONFIG_IFD_BIN_PATH CONFIG_MRC_FILE CONFIG_FSP_M_CBFS"
  29. # lbmk-specific extensions; mostly used for downloading vendor files
  30. eval "`setvars "" has_hashes EC_hash DL_hash DL_url_bkup MRC_refcode_gbe vcfg \
  31. E6400_VGA_DL_hash E6400_VGA_DL_url E6400_VGA_DL_url_bkup E6400_VGA_offset \
  32. E6400_VGA_romname SCH5545EC_DL_url_bkup SCH5545EC_DL_hash _dest mecleaner \
  33. kbc1126_ec_dump MRC_refcode_cbtree _dl SCH5545EC_DL_url EC_url rom DL_url \
  34. nuke cbfstoolref FSPFD_hash _7ztest ME11bootguard ME11delta xromsize \
  35. ME11version ME11sku ME11pch _me _metmp mfs TBFW_url_bkup TBFW_url cbdir \
  36. TBFW_hash TBFW_size hashfile EC_url_bkup FSPM_bin_hash FSPS_bin_hash \
  37. EC_FW1_hash EC_FW2_hash ME_bin_hash MRC_bin_hash REF_bin_hash _dl_bin \
  38. SCH5545EC_bin_hash TBFW_bin_hash E6400_VGA_bin_hash _pre_dest`"
  39. download()
  40. {
  41. [ $# -gt 0 ] || err "No argument given"
  42. export PATH="$PATH:/sbin"
  43. board="$1" && check_target && readkconfig download
  44. }
  45. getfiles()
  46. {
  47. [ -z "$CONFIG_HAVE_ME_BIN" ] || fetch intel_me "$DL_url" \
  48. "$DL_url_bkup" "$DL_hash" "$CONFIG_ME_BIN_PATH" curl "$ME_bin_hash"
  49. [ -z "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" ] || fetch sch5545ec \
  50. "$SCH5545EC_DL_url" "$SCH5545EC_DL_url_bkup" "$SCH5545EC_DL_hash" \
  51. "$CONFIG_SMSC_SCH5545_EC_FW_FILE" "curl" "$SCH5545EC_bin_hash"
  52. [ -z "$CONFIG_KBC1126_FW1" ] || fetch kbc1126ec "$EC_url" \
  53. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW1" curl "$EC_FW1_hash"
  54. [ -z "$CONFIG_KBC1126_FW2" ] || fetch kbc1126ec "$EC_url" \
  55. "$EC_url_bkup" "$EC_hash" "$CONFIG_KBC1126_FW2" curl "$EC_FW2_hash"
  56. [ -z "$CONFIG_VGA_BIOS_FILE" ] || fetch e6400vga "$E6400_VGA_DL_url" \
  57. "$E6400_VGA_DL_url_bkup" "$E6400_VGA_DL_hash" \
  58. "$CONFIG_VGA_BIOS_FILE" "curl" "$E6400_VGA_bin_hash"
  59. [ -z "$CONFIG_HAVE_MRC" ] || fetch "mrc" "$MRC_url" "$MRC_url_bkup" \
  60. "$MRC_hash" "$CONFIG_MRC_FILE" "curl" "$MRC_bin_hash"
  61. [ -z "$CONFIG_REFCODE_BLOB_FILE" ] || fetch "refcode" "$MRC_url" \
  62. "$MRC_url_bkup" "$MRC_hash" "$CONFIG_REFCODE_BLOB_FILE" "curl" \
  63. "$REF_bin_hash"
  64. [ -z "$CONFIG_LENOVO_TBFW_BIN" ] || fetch "tbfw" "$TBFW_url" \
  65. "$TBFW_url_bkup" "$TBFW_hash" "$CONFIG_LENOVO_TBFW_BIN" "curl" \
  66. "$TBFW_bin_hash"
  67. [ -z "$CONFIG_FSP_M_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  68. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_M_FILE" "copy" \
  69. "$FSPM_bin_hash"
  70. [ -z "$CONFIG_FSP_S_FILE" ] || fetch "fsp" "$CONFIG_FSP_FD_PATH" \
  71. "$CONFIG_FSP_FD_PATH" "$FSPFD_hash" "$CONFIG_FSP_S_FILE" "copy" \
  72. "$FSPS_bin_hash"; :
  73. }
  74. fetch()
  75. {
  76. dl_type="$1"
  77. dl="$2"
  78. dl_bkup="$3"
  79. dlsum="$4"
  80. _dest="${5##*../}"
  81. _pre_dest="$XBMK_CACHE/tmpdl/check" || err "!fetch, mktemp, $*"
  82. dlop="$6"
  83. binsum="$7"
  84. [ "$5" = "/dev/null" ] && return 0
  85. _dl="$XBMK_CACHE/file/$dlsum" # internet file to extract from e.g. .exe
  86. _dl_bin="$XBMK_CACHE/file/$binsum" # extracted file e.g. me.bin
  87. # an extracted vendor file will be placed in pre_dest first, for
  88. # verifying its checksum. if it matches, it is later moved to _dest
  89. remkdir "${_pre_dest%/*}" "$appdir"
  90. # HACK: if grabbing fsp from coreboot, fix the path for lbmk
  91. [ "$dl_type" = "fsp" ] && for _cdl in dl dl_bkup; do
  92. eval "$_cdl=\"\${$_cdl##*../}\"; _cdp=\"\$$_cdl\""
  93. [ -f "$_cdp" ] || _cdp="$cbdir/$_cdp"
  94. [ -f "$_cdp" ] && eval "$_cdl=\"$_cdp\""; :
  95. done; :
  96. # download the file (from the internet) to extract from
  97. xbget "$dlop" "$dl" "$dl_bkup" "$_dl" "$dlsum"
  98. x_ rm -Rf "${_dl}_extracted"
  99. # skip extraction if a cached extracted file exists
  100. ( xbget copy "$_dl_bin" "$_dl_bin" "$_dest" "$binsum" 2>/dev/null ) || :
  101. [ -f "$_dest" ] && return 0
  102. x_ mkdir -p "${_dest%/*}"
  103. [ "$dl_type" = "fsp" ] || extract_archive "$_dl" "$appdir" || \
  104. [ "$dl_type" = "e6400vga" ] || err "$_dest $dl_type: !extract"
  105. x_ extract_$dl_type "$_dl" "$appdir"
  106. set -u -e
  107. # some functions don't output directly to the given file, _pre_dest.
  108. # instead, they put multiple files there, but we need the one matching
  109. # the given hashsum. So, search for a matching file via bruteforce:
  110. ( fx_ "eval mkdst \"$binsum\"" x_ find "${_pre_dest%/*}" -type f ) || :
  111. bad_checksum "$binsum" "$_dest" || [ ! -f "$_dest" ] || return 0
  112. [ -z "$binsum" ] && printf "'%s': checksum undefined\n" "$_dest" 1>&2
  113. [ -L "$_dest" ] && printf "WARNING: '%s' is a link!\n" "$_dest" 1>&2
  114. [ -L "$_dest" ] || x_ rm -f "$_dest"
  115. err "Could not safely extract '$_dest', for board '$board'"
  116. }
  117. mkdst()
  118. {
  119. bad_checksum "$1" "$2" && x_ rm -f "$2" && return 0
  120. x_ mv "$2" "$_dl_bin"
  121. x_ cp "$_dl_bin" "$_dest"
  122. exit 1
  123. }
  124. extract_intel_me()
  125. {
  126. e "$mecleaner" f not && err "$cbdir: me_cleaner missing"
  127. _7ztest="$xbloc/metmp/a"
  128. _metmp="$xbloc/me.bin"
  129. x_ rm -f "$_metmp" "$xbloc/a"
  130. mfs="" && [ "$ME11bootguard" = "y" ] && mfs="--whitelist MFS" && \
  131. chkvars ME11delta ME11version ME11sku ME11pch
  132. [ "$ME11bootguard" = "y" ] && x_ ./mk -f deguard
  133. set +u +e
  134. x_ rm -Rf "$xbmkpwd/metmp"
  135. ( fx_ find_me x_ find "$xbmkpwd/$appdir" -type f ) || :
  136. [ "$ME11bootguard" != "y" ] && x_ mv "$_metmp" "$_pre_dest" && return 0
  137. (
  138. x_ cd src/deguard/
  139. x_ ./finalimage.py --delta "data/delta/$ME11delta" --version \
  140. "$ME11version" --pch "$ME11pch" --sku "$ME11sku" \
  141. --fake-fpfs data/fpfs/zero --input "$_metmp" --output "$_pre_dest"
  142. ) || err "Error running deguard for $_dest"; :
  143. }
  144. find_me()
  145. {
  146. [ -f "$_metmp" ] && exit 1
  147. [ -L "$1" ] && return 0
  148. _7ztest="${_7ztest}a" && _r="-r" && [ -n "$mfs" ] && _r=""
  149. "$mecleaner" $mfs $_r -t -O "$xbloc/a" -M "$_metmp" "$1" || \
  150. "$mecleaner" $mfs $_r -t -O "$_metmp" "$1" || "$me7updateparser" \
  151. -O "$_metmp" "$1" || extract_archive "$1" "$_7ztest" || return 0
  152. [ -f "$_metmp" ] && exit 1
  153. ( fx_ find_me x_ find "$_7ztest" -type f ) || exit 1; :
  154. }
  155. extract_archive()
  156. {
  157. innoextract "$1" -d "$2" || python "$pfs_extract" "$1" -e || 7z x \
  158. "$1" -o"$2" || unar "$1" -o "$2" || unzip "$1" -d "$2" || return 1
  159. [ ! -d "${_dl}_extracted" ] || x_ cp -R "${_dl}_extracted" "$2"; :
  160. }
  161. extract_kbc1126ec()
  162. {
  163. (
  164. x_ cd "$appdir/"
  165. mv Rompaq/68*.BIN ec.bin || unar -D ROM.CAB Rom.bin || unar -D \
  166. Rom.CAB Rom.bin || unar -D 68*.CAB Rom.bin || err "!kbc1126 unar"
  167. [ -f "ec.bin" ] || x_ mv Rom.bin ec.bin
  168. x_ e ec.bin f && x_ "$kbc1126_ec_dump" ec.bin
  169. ) || err "$board: can't extract kbc1126 ec firmware"
  170. x_ e "$appdir/ec.bin.fw1" f && x_ e "$appdir/ec.bin.fw2" f
  171. x_ cp "$appdir/"ec.bin.fw* "${_pre_dest%/*}/"
  172. }
  173. extract_e6400vga()
  174. {
  175. set +u +e
  176. chkvars E6400_VGA_offset E6400_VGA_romname
  177. tail -c +$E6400_VGA_offset "$_dl" | gunzip > "$appdir/bios.bin" || :
  178. (
  179. x_ cd "$appdir"
  180. x_ e "bios.bin" f
  181. "$e6400_unpack" bios.bin || printf "TODO: fix dell extract util\n"
  182. ) || err "can't extract e6400 vga rom"
  183. x_ cp "$appdir/$E6400_VGA_romname" "$_pre_dest"
  184. }
  185. extract_sch5545ec()
  186. {
  187. # full system ROM (UEFI), to extract with UEFIExtract:
  188. _bios="${_dl}_extracted/Firmware/1 $dlsum -- 1 System BIOS vA.28.bin"
  189. # this is the SCH5545 firmware, inside of the extracted UEFI ROM:
  190. _sch5545ec_fw="$_bios.dump/4 7A9354D9-0468-444A-81CE-0BF617D890DF"
  191. _sch5545ec_fw="$_sch5545ec_fw/54 D386BEB8-4B54-4E69-94F5-06091F67E0D3"
  192. _sch5545ec_fw="$_sch5545ec_fw/0 Raw section/body.bin" # <-- this!
  193. x_ "$uefiextract" "$_bios"
  194. x_ cp "$_sch5545ec_fw" "$_pre_dest"
  195. }
  196. # Lenovo ThunderBolt firmware updates:
  197. # https://pcsupport.lenovo.com/us/en/products/laptops-and-netbooks/thinkpad-t-series-laptops/thinkpad-t480-type-20l5-20l6/20l5/solutions/ht508988
  198. extract_tbfw()
  199. {
  200. chkvars TBFW_size
  201. fx_ copytb x_ find "$appdir" -type f -name "TBT.bin"
  202. }
  203. copytb()
  204. {
  205. [ -f "$1" ] && [ ! -L "$1" ] && x_ dd if=/dev/null of="$1" bs=1 \
  206. seek=$TBFW_size && x_ mv "$1" "$_pre_dest" && return 1; :
  207. }
  208. extract_fsp()
  209. {
  210. x_ python "$cbdir/3rdparty/fsp/Tools/SplitFspBin.py" split -f "$1" \
  211. -o "${_pre_dest%/*}" -n "Fsp.fd"
  212. }
  213. setvfile()
  214. {
  215. [ -n "$vcfg" ] && for c in $cvchk; do
  216. vcmd="[ \"\${$c}\" != \"/dev/null\" ] && [ -n \"\${$c}\" ]"
  217. eval "$vcmd && getvfile \"\$@\" && return 0"
  218. done && return 1; :
  219. }
  220. getvfile()
  221. {
  222. eval "`setcfg "config/vendor/$vcfg/pkg.cfg" 1`"
  223. bootstrap && [ $# -gt 0 ] && getfiles && return 0 # download
  224. fx_ prep x_ find "$tmpromdir" -maxdepth 1 -type f -name "*.rom"
  225. ( check_vendor_hashes ) || err "$archive: Can't verify hashes"; :
  226. }
  227. bootstrap()
  228. {
  229. cbdir="src/coreboot/$tree"
  230. mecleaner="$xbmkpwd/$cbdir/util/me_cleaner/me_cleaner.py"
  231. kbc1126_ec_dump="$xbmkpwd/$cbdir/util/kbc1126/kbc1126_ec_dump"
  232. cbfstool="elf/coreboot/$tree/cbfstool"
  233. rmodtool="elf/coreboot/$tree/rmodtool"
  234. x_ ./mk -f coreboot "${cbdir##*/}"
  235. fx_ "x_ ./mk -b" printf "uefitool\nbiosutilities\nbios_extract\n"
  236. [ -d "${kbc1126_ec_dump%/*}" ] && x_ make -C "$cbdir/util/kbc1126"
  237. [ -n "$MRC_refcode_cbtree" ] && \
  238. cbfstoolref="elf/coreboot/$MRC_refcode_cbtree/cbfstool" && \
  239. x_ ./mk -d coreboot "$MRC_refcode_cbtree"; :
  240. }
  241. prep()
  242. {
  243. _xrom="$1"
  244. _xromname="${1##*/}"
  245. _xromnew="${_xrom%/*}/${_xromname#"$vfix"}"
  246. [ "$nuke" = "nuke" ] && _xromnew="${_xrom%/*}/$vfix${_xrom##*/}"
  247. e "$_xrom" f missing && return 0
  248. [ -z "${_xromname#"$vfix"}" ] && err "$_xromname / $vfix: name match"
  249. # Remove the prefix and 1-byte pad
  250. if [ "$nuke" != "nuke" ] && \
  251. [ "${_xromname#"$vfix"}" != "$_xromname" ]; then
  252. xromsize="$(expr $(stat -c '%s' "$_xrom") - 1)" || err "!int"
  253. [ $xromsize -lt 524288 ] && err "too small, $xromsize: $_xrom"
  254. x_ dd if="$_xrom" of="$_xromnew" bs=$xromsize count=1
  255. x_ rm -f "$_xrom"
  256. _xrom="$_xromnew"
  257. fi
  258. [ "$nuke" != "nuke" ] || ( mksha512 "$_xrom" "vendorhashes" ) || err
  259. add_vfiles "$_xrom" || return 1 # if break return, can still change MAC
  260. [ "$nuke" != "nuke" ] && return 0
  261. # Rename the file, prefixing a warning saying not to flash
  262. cat "$_xrom" config/data/coreboot/0 > "$_xromnew" || err "!pad $_xrom"
  263. x_ rm -f "$_xrom"
  264. }
  265. mksha512()
  266. {
  267. [ "${1%/*}" != "$1" ] && x_ cd "${1%/*}"
  268. sha512sum ./"${1##*/}" >> "$2" || err "!sha512sum \"$1\" > \"$2\""
  269. }
  270. add_vfiles()
  271. {
  272. rom="$1"
  273. if [ "$has_hashes" != "y" ] && [ "$nuke" != "nuke" ]; then
  274. printf "'%s' has no hash file. Skipping.\n" "$archive" 1>&2
  275. return 1
  276. elif [ "$has_hashes" = "y" ] && [ "$nuke" = "nuke" ]; then
  277. printf "'%s' has a hash file. Skipping nuke.\n" "$archive" 1>&2
  278. return 1
  279. fi
  280. [ -n "$CONFIG_HAVE_REFCODE_BLOB" ] && vfile "fallback/refcode" \
  281. "$CONFIG_REFCODE_BLOB_FILE" "stage"
  282. [ "$CONFIG_HAVE_MRC" = "y" ] && vfile "mrc.bin" "$CONFIG_MRC_FILE" \
  283. "mrc" "0xfffa0000"
  284. [ "$CONFIG_HAVE_ME_BIN" = "y" ] && vfile IFD "$CONFIG_ME_BIN_PATH" me
  285. [ -n "$CONFIG_KBC1126_FW1" ] && vfile ecfw1.bin \
  286. "$CONFIG_KBC1126_FW1" raw "$CONFIG_KBC1126_FW1_OFFSET"
  287. [ -n "$CONFIG_KBC1126_FW2" ] && vfile ecfw2.bin \
  288. "$CONFIG_KBC1126_FW2" raw "$CONFIG_KBC1126_FW2_OFFSET"
  289. [ -n "$CONFIG_VGA_BIOS_FILE" ] && [ -n "$CONFIG_VGA_BIOS_ID" ] && \
  290. vfile "pci$CONFIG_VGA_BIOS_ID.rom" "$CONFIG_VGA_BIOS_FILE" optionrom
  291. [ "$CONFIG_INCLUDE_SMSC_SCH5545_EC_FW" = "y" ] && \
  292. [ -n "$CONFIG_SMSC_SCH5545_EC_FW_FILE" ] && \
  293. vfile sch5545_ecfw.bin "$CONFIG_SMSC_SCH5545_EC_FW_FILE" raw
  294. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  295. [ -n "$CONFIG_FSP_M_FILE" ] && \
  296. vfile "$CONFIG_FSP_M_CBFS" "$CONFIG_FSP_M_FILE" fsp --xip
  297. [ -z "$CONFIG_FSP_USE_REPO" ] && [ -z "$CONFIG_FSP_FULL_FD" ] && \
  298. [ -n "$CONFIG_FSP_S_FILE" ] && \
  299. vfile "$CONFIG_FSP_S_CBFS" "$CONFIG_FSP_S_FILE" fsp
  300. printf "ROM image successfully patched: %s\n" "$rom"
  301. xchanged="y"
  302. }
  303. vfile()
  304. {
  305. [ "$2" = "/dev/null" ] && return 0
  306. cbfsname="$1"
  307. _dest="${2##*../}"
  308. _t="$3"
  309. _offset=""
  310. if [ "$_t" = "fsp" ] && [ $# -gt 3 ]; then
  311. _offset="$4"
  312. elif [ $# -gt 3 ] && _offset="-b $4" && [ -z "$4" ]; then
  313. err "vfile $*, $rom: offset given but empty (undefined)"
  314. fi
  315. [ "$nuke" = "nuke" ] || x_ e "$_dest" f
  316. if [ "$cbfsname" = "IFD" ]; then
  317. [ "$nuke" = "nuke" ] || x_ "$ifdtool" $ifdprefix -i \
  318. $_t:$_dest "$rom" -O "$rom"
  319. [ "$nuke" != "nuke" ] || x_ "$ifdtool" $ifdprefix --nuke \
  320. $_t "$rom" -O "$rom"
  321. elif [ "$nuke" = "nuke" ]; then
  322. x_ "$cbfstool" "$rom" remove -n "$cbfsname"
  323. elif [ "$_t" = "stage" ]; then # the only stage we handle is refcode
  324. x_ rm -f "$xbloc/refcode"
  325. x_ "$rmodtool" -i "$_dest" -o "$xbloc/refcode"
  326. x_ "$cbfstool" "$rom" add-stage -f "$xbloc/refcode" \
  327. -n "$cbfsname" -t stage
  328. else
  329. x_ "$cbfstool" "$rom" add -f "$_dest" -n "$cbfsname" \
  330. -t $_t $_offset
  331. fi
  332. xchanged="y"; :
  333. }
  334. check_vendor_hashes()
  335. {
  336. x_ cd "$tmpromdir"
  337. [ "$has_hashes" = "n" ] || [ "$nuke" = "nuke" ] || sha512sum \
  338. --status -c "$hashfile" || x_ sha1sum --status -c "$hashfile"
  339. x_ rm -f "$hashfile"
  340. }