From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2607:f8b0:400e:c01::233; helo=mail-pl0-x233.google.com; envelope-from=blibbet@gmail.com; receiver=edk2-devel@lists.01.org Received: from mail-pl0-x233.google.com (mail-pl0-x233.google.com [IPv6:2607:f8b0:400e:c01::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id C542D207E5405 for ; Thu, 17 May 2018 12:30:58 -0700 (PDT) Received: by mail-pl0-x233.google.com with SMTP id ay10-v6so3130217plb.1 for ; Thu, 17 May 2018 12:30:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:cc:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=WIPBzIzU09+Ff1z47EO/kqoLkVjZ5tC02eFdX/6db2M=; b=JXxbDCBW5j5KDVamt2TQVdbopXAM10uNw0EiftppQA1BOnxza+ExgOOEuRnAwYGrpH uE1nPjJSvC791NZQwkydzDzSc2+JcHVO/By2ij5kqT2bfMbjlrx+0J/WlYb2NJ0lNbZq rHl9cVowKFos1YgfLmd7Rt+Hi0NSWyooMg4T4R79qLVuleBc+vjGj5HmW0PTcHizSfVJ yIWNY8VlJeGFRlaf1ow2g4843SIDb2JJciekdDSkY+pjFq8Ao/axChIV1FHa/+lI1fDq n+R83hdBaUSa1zBpvQJ86mzM1yjzJA182Kjua2XFxwqEYHuDUj93zuEESzBstFWzktF9 MWzQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:cc:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=WIPBzIzU09+Ff1z47EO/kqoLkVjZ5tC02eFdX/6db2M=; b=fHmvC/xLySip0cC6RGatJdH12gXAI/A/TkXbhttw1JLFxKNp2JBOGmuIYWdOGuOIHX DeHotSWcwCg1ICIXhc97mk8VJ7QcYFRnMPJ5GrQySxMui0YKRoi8W3wOIpCEHqSU0O7l dHtEVdD0B4IbwMqJeSh0ZDCfe8D8NV31+8pE/Q83rcKM6x3Znj/0/FlDt95qZU2k6zaU /hcypKVS8NMUzaGKNws/SJPnm1Kr0OqaWCHHV0aJRwKITVZ4u0BO42woZEgswQp3bMSa 3gGEhjZvQEDgZAuB5idoLWr0Is7tLKcAHOimN40jBxUHO+yq7Pulttl/xHvtA/CnKjlk KU+w== X-Gm-Message-State: ALKqPweP1pN3FIRPnCZ5ZnwfCcn2pv+Kd4ruj1T/cAY219Hvp1+dErn0 7ex8q2Xfpr269ix5fnuBUgnXFw== X-Google-Smtp-Source: AB8JxZrGdnxbSKPihhLZAMNqaLadvvru0AON06l5J2gibxei2Cg64MP7LVbAdDYrI/lj2/dT3RJWRQ== X-Received: by 2002:a17:902:8217:: with SMTP id x23-v6mr6312543pln.380.1526585457895; Thu, 17 May 2018 12:30:57 -0700 (PDT) Received: from [192.168.1.100] ([50.125.2.93]) by smtp.gmail.com with ESMTPSA id k13-v6sm11036419pfj.186.2018.05.17.12.30.56 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 17 May 2018 12:30:57 -0700 (PDT) To: Anatol Pomozov References: From: Blibbet Cc: edk2-devel@lists.01.org Message-ID: <384e133e-7c59-8382-7449-6fbf98cf69e6@gmail.com> Date: Thu, 17 May 2018 12:30:55 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Subject: Re: Extracting vendor blobs from edk2-coreboot payload X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 May 2018 19:30:58 -0000 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US On 05/15/2018 03:36 PM, Anatol Pomozov wrote: > [...] Is there a simple tool that allows to extract these Intel blobs from > Build/CorebootPayloadPkgX64/RELEASE_GCC5/FV/UEFIPAYLOAD.fd ? I expect most Tianocore tools focus on creating blobs, not reversing them. If EDK2 has tools like this, I'd also like to learn about them. :-) Have you tried UEFITool's UEFIExtract? If that doesn't work out, perhaps CHIPSEC or UEFI Firmware Parser, all 3 of those tools have libraries to parse UEFI blobs. Some phases of UEFIReverse might also help. The freeware-based non-open source UEFI BIOS Updater (UBU) tool may also help. https://github.com/LongSoft/UEFITool https://github.com/jethrogb/uefireverse https://github.com/theopolis/uefi-firmware-parser https://github.com/chipsec/chipsec HTH, Lee Fisher