* Extracting vendor blobs from edk2-coreboot payload
@ 2018-05-15 22:36 Anatol Pomozov
2018-05-17 19:30 ` Blibbet
0 siblings, 1 reply; 3+ messages in thread
From: Anatol Pomozov @ 2018-05-15 22:36 UTC (permalink / raw)
To: edk2-devel
Hello
I am trying to modify/rebuild a Coreboot+EDK2 rom for my hardware. To
do that I need Intel vendor blobs that I cannot find in web
unfortunately. Intel seems does not share the blobs publicly.
Here is the build script used to build my UEFI payload
https://github.com/MattDevo/edk2/blob/master/build-cpp-hswbdw-box.sh
it needs vbt.bin and IntelGopDriver.efi for Haswell.
So I would like to get my device rom image and extract all the blobs.
BaseTools located at the sourcetree seems focusing around building the
image. But I do not see anything related to splitting the result.
googling does not give a clear answer neither.
Is there a simple tool that allows to extract these Intel blobs from
Build/CorebootPayloadPkgX64/RELEASE_GCC5/FV/UEFIPAYLOAD.fd ?
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Extracting vendor blobs from edk2-coreboot payload
2018-05-15 22:36 Extracting vendor blobs from edk2-coreboot payload Anatol Pomozov
@ 2018-05-17 19:30 ` Blibbet
2018-05-17 19:34 ` Andrew Fish
0 siblings, 1 reply; 3+ messages in thread
From: Blibbet @ 2018-05-17 19:30 UTC (permalink / raw)
To: Anatol Pomozov; +Cc: edk2-devel
On 05/15/2018 03:36 PM, Anatol Pomozov wrote:
> [...] Is there a simple tool that allows to extract these Intel blobs from
> Build/CorebootPayloadPkgX64/RELEASE_GCC5/FV/UEFIPAYLOAD.fd ?
I expect most Tianocore tools focus on creating blobs, not reversing
them. If EDK2 has tools like this, I'd also like to learn about them. :-)
Have you tried UEFITool's UEFIExtract? If that doesn't work out, perhaps
CHIPSEC or UEFI Firmware Parser, all 3 of those tools have libraries to
parse UEFI blobs. Some phases of UEFIReverse might also help. The
freeware-based non-open source UEFI BIOS Updater (UBU) tool may also help.
https://github.com/LongSoft/UEFITool
https://github.com/jethrogb/uefireverse
https://github.com/theopolis/uefi-firmware-parser
https://github.com/chipsec/chipsec
HTH,
Lee Fisher
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Extracting vendor blobs from edk2-coreboot payload
2018-05-17 19:30 ` Blibbet
@ 2018-05-17 19:34 ` Andrew Fish
0 siblings, 0 replies; 3+ messages in thread
From: Andrew Fish @ 2018-05-17 19:34 UTC (permalink / raw)
To: Blibbet; +Cc: Anatol Pomozov, edk2-devel
There is a POSIX command line FV dumper tool in edk2 call VolInfo
https://github.com/tianocore/edk2/blob/master/BaseTools/Source/C/VolInfo/VolInfo.c
Thanks,
Andrew Fish
> On May 17, 2018, at 12:30 PM, Blibbet <blibbet@gmail.com> wrote:
>
> On 05/15/2018 03:36 PM, Anatol Pomozov wrote:
>> [...] Is there a simple tool that allows to extract these Intel blobs from
>> Build/CorebootPayloadPkgX64/RELEASE_GCC5/FV/UEFIPAYLOAD.fd ?
>
> I expect most Tianocore tools focus on creating blobs, not reversing
> them. If EDK2 has tools like this, I'd also like to learn about them. :-)
>
> Have you tried UEFITool's UEFIExtract? If that doesn't work out, perhaps
> CHIPSEC or UEFI Firmware Parser, all 3 of those tools have libraries to
> parse UEFI blobs. Some phases of UEFIReverse might also help. The
> freeware-based non-open source UEFI BIOS Updater (UBU) tool may also help.
>
> https://github.com/LongSoft/UEFITool
> https://github.com/jethrogb/uefireverse
> https://github.com/theopolis/uefi-firmware-parser
> https://github.com/chipsec/chipsec
>
> HTH,
> Lee Fisher
>
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org
> https://lists.01.org/mailman/listinfo/edk2-devel
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2018-05-17 19:34 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-05-15 22:36 Extracting vendor blobs from edk2-coreboot payload Anatol Pomozov
2018-05-17 19:30 ` Blibbet
2018-05-17 19:34 ` Andrew Fish
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox