From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=17.171.2.32; helo=mail-in22.apple.com; envelope-from=afish@apple.com; receiver=edk2-devel@lists.01.org Received: from mail-in22.apple.com (mail-out22.apple.com [17.171.2.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 863CB207E5406 for ; Thu, 17 May 2018 12:34:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; d=apple.com; s=mailout2048s; c=relaxed/simple; q=dns/txt; i=@apple.com; t=1526585678; x=2390499278; h=From:Sender:Reply-To:Subject:Date:Message-id:To:Cc:MIME-version:Content-type: Content-transfer-encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-reply-to:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=C+27Xn1ZbzRI+lrw1RocKhEqD2gTyQUr9ToVm8Fs04U=; b=IFbWKpJOzcfQkYRuG7zQHrpJGVnZdiByseR3DRFlcLzCf0W7LNYN0PLqc6ec6R5R 7y06iHLpG/HeZ6hoCkmQV50CHBFOoGbO/grkkKu9c67swGUJUDHj/SnZnVwjuSJy TJeY1roouMK194YZacqTVlFA3ldab7RkGDIJIGRDaFL7mGSHzgmy34YFGGH0j8Sd 5hhdZxRNHfnerYs+RtuazIZ5dQv87FHxrHb8C+VGHPW9cIm/Hgagd3ksIA7B/FX4 jxuOlrPPDTCdCcLn253l8h3JDzAxtSpcHgtPOvhdIDEJLNLnUBMzx9V2Zy0+KPcA Em9oH4sXZAb+fXxGd2yTbw==; Received: from relay5.apple.com (relay5.apple.com [17.128.113.88]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail-in22.apple.com (Apple Secure Mail Relay) with SMTP id 28.A8.11907.E49DDFA5; Thu, 17 May 2018 12:34:38 -0700 (PDT) X-AuditID: 11ab0216-325f09e000002e83-51-5afdd94ed1c6 Received: from nwk-mmpp-sz12.apple.com (nwk-mmpp-sz12.apple.com [17.128.115.204]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by relay5.apple.com (Apple SCV relay) with SMTP id CA.29.23499.E49DDFA5; Thu, 17 May 2018 12:34:38 -0700 (PDT) MIME-version: 1.0 Received: from [17.235.20.43] (unknown [17.235.20.43]) by nwk-mmpp-sz12.apple.com (Oracle Communications Messaging Server 8.0.2.2.20180403 64bit (built Apr 3 2018)) with ESMTPSA id <0P8W00C4711OAGA0@nwk-mmpp-sz12.apple.com>; Thu, 17 May 2018 12:34:38 -0700 (PDT) Sender: afish@apple.com From: Andrew Fish In-reply-to: <384e133e-7c59-8382-7449-6fbf98cf69e6@gmail.com> Date: Thu, 17 May 2018 12:34:36 -0700 Cc: Anatol Pomozov , edk2-devel@lists.01.org Message-id: <4793C865-C720-4130-9ECB-70420B871641@apple.com> References: <384e133e-7c59-8382-7449-6fbf98cf69e6@gmail.com> To: Blibbet X-Mailer: Apple Mail (2.3445.6.18) X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrALMWRmVeSWpSXmKPExsUi2FAYoet382+Uwbv72hYvewst3r55z2ix 59BRZgdmj52z7rJ7dM/+xxLAFMVlk5Kak1mWWqRvl8CV0TX7BVPBJ86Kl1/vsDUwLuXoYuTk kBAwkWia3sTUxcjFISSwhknicNdVFpjEkrPfGSESG5gkfrxazAqS4BUQlPgx+R5QEQcHs4C8 xMHzsiBhZgEtie+PWlkg6vuZJOae3ww2SFhAXOLdmU3MELabxKOdk8DibALKEivmf2AHsTkF bCW63s5mA7FZBFQlHv5uYYUY6iYx4eccRoi9NhJTD/1nh1jQyihxY+8ksCIRoCNmXX7GCnG1 ksT/XUeYIeweNom9F9QmMArPQnL3LIS7ZyG5ewEj8ypG4dzEzBzdzDwjI73EgoKcVL3k/NxN jKAgX80ktoPx3mvDQ4wCHIxKPLwvJv6NEmJNLCuuzD3EKM3BoiTO+4ntUZSQQHpiSWp2ampB alF8UWlOavEhRiYOTqkGxsLpjd/VXybwPuOPsnC/8lTHUE3n1/4gia8qpps0lpQkP683TF5/ qqCcS9RiR87Lv+aLav1NfkqvWsbOY/51oYPitwezP/SEnZ730SVVWzXAI6ZCpn/t4fV16cG6 hyMd7n2o+agrFjlxyeq4lQovBWqPxFlf7pi/a9aCBGbd0w1Pj3rGzHyip8RSnJFoqMVcVJwI AGARktFTAgAA X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrMLMWRmVeSWpSXmKPExsUi2FB8Rtfv5t8og0VzhC1e9hZavH3zntFi z6GjzA7MHjtn3WX36J79jyWAKYrLJiU1J7MstUjfLoEro2v2C6aCT5wVL7/eYWtgXMrRxcjJ ISFgIrHk7HfGLkYuDiGBDUwSP14tZgVJ8AoISvyYfI+li5GDg1lAXuLgeVmQMLOAlsT3R60s EPX9TBJzz29mAUkIC4hLvDuziRnCdpN4tHMSWJxNQFlixfwP7CA2p4CtRNfb2WwgNouAqsTD 3y2sEEPdJCb8nMMIsddGYuqh/+wQC1oZJW7snQRWJAJ0xKzLz1ghrlaS+L/rCPMERoFZSG6d hXDrLCS3LmBkXsUoUJSak1hpqpdYUJCTqpecn7uJERyUhRE7GP8vszrEKMDBqMTD+2Li3ygh 1sSy4srcQ4wSHMxKIrx+lUAh3pTEyqrUovz4otKc1OJDjNIcLErivBKhf6KEBNITS1KzU1ML UotgskwcnFINjLoVaw8d+bypnX3m6l1dF5QuKwRo1c77FDrhqSPzc/sFX5fPPPit88Lvx1t0 Vj6v9k10fyGmsoXnbZJRsMzviD8P9y90CfrIGfH5ocT5pff9Ys6LL68XXisusPxXr9nE1hyx vQH1Kj8CLJO+mEyK/3dBu3qxi9nGpuZ7iS2xDxsYQmTSTh7e7avEUpyRaKjFXFScCAAinBkz RgIAAA== Subject: Re: Extracting vendor blobs from edk2-coreboot payload X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 May 2018 19:34:40 -0000 Content-transfer-encoding: 7BIT Content-type: text/plain; CHARSET=US-ASCII There is a POSIX command line FV dumper tool in edk2 call VolInfo https://github.com/tianocore/edk2/blob/master/BaseTools/Source/C/VolInfo/VolInfo.c Thanks, Andrew Fish > On May 17, 2018, at 12:30 PM, Blibbet wrote: > > On 05/15/2018 03:36 PM, Anatol Pomozov wrote: >> [...] Is there a simple tool that allows to extract these Intel blobs from >> Build/CorebootPayloadPkgX64/RELEASE_GCC5/FV/UEFIPAYLOAD.fd ? > > I expect most Tianocore tools focus on creating blobs, not reversing > them. If EDK2 has tools like this, I'd also like to learn about them. :-) > > Have you tried UEFITool's UEFIExtract? If that doesn't work out, perhaps > CHIPSEC or UEFI Firmware Parser, all 3 of those tools have libraries to > parse UEFI blobs. Some phases of UEFIReverse might also help. The > freeware-based non-open source UEFI BIOS Updater (UBU) tool may also help. > > https://github.com/LongSoft/UEFITool > https://github.com/jethrogb/uefireverse > https://github.com/theopolis/uefi-firmware-parser > https://github.com/chipsec/chipsec > > HTH, > Lee Fisher > > _______________________________________________ > edk2-devel mailing list > edk2-devel@lists.01.org > https://lists.01.org/mailman/listinfo/edk2-devel