From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2607:f8b0:400c:c08::22e; helo=mail-ua0-x22e.google.com; envelope-from=anatol.pomozov@gmail.com; receiver=edk2-devel@lists.01.org Received: from mail-ua0-x22e.google.com (mail-ua0-x22e.google.com [IPv6:2607:f8b0:400c:c08::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 66C9C209603C1 for ; Tue, 15 May 2018 15:37:02 -0700 (PDT) Received: by mail-ua0-x22e.google.com with SMTP id b25-v6so1285406uak.3 for ; Tue, 15 May 2018 15:37:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=EqXcr/MvuW13zzuZ3l3Y1qYjdfEzYhhBlc38Bfif+R8=; b=q/8/lq1XseLzEXVte5xkMSpM3MKCLO6C+Zbf9FvKd3UIOm95pmuxFn6nkzirPXMjB2 yGbxjrqHkOcwtccHuIUlZCdMWcGi/AJepp0bJ5srKJFPRADZw9Pb8c4CxFrmrYtKek0a HpjIDG6uaEKEzNxfV7sdZ3+cpsEsqbaSFJu7PyEDCSnnUOaODqIv7GjrlcXa524yavt4 RGpkQZhLGcC8vzbD9BJdXtC4Geql62lfMt/yblVBnth+j80OINKLntbZEk5ceS6G/dgn utUNscDzVmsbBG3OmBEBptVUIV4ROqPpzrGxWWcY1/JrzDS0XULo87vno34OOJQ6s2Vs PG4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=EqXcr/MvuW13zzuZ3l3Y1qYjdfEzYhhBlc38Bfif+R8=; b=BoNFTa1ozATdtj0yIHPTd/nG3YlwrsOVDOJWbe80+mG6uyq0DKbx5YW3pot3CfYk8o xf5Z7jHMRfcdgpqqQ3OyoOOaSGFho2zPDgf+fJ6QI914iUcs7wJvTcRR92lTxT0uT4El syELEPP5RyHPRNgQ5kXUhc/cfKDcZkUg7YYx6Une4ecKlbvl/Hy0Ur+pvggZIdtx8QFk q+v6L/SLCQ2glylhFZYwsaNHs2kvjOc87a0CQ+FF2ErxiKavwmboQpv55iQOj8JW5vTL 9oiVB0/PO7pmknrwBgXZqoUhAmHFMhNHIW8osRElBuUDjk4tm4WEFjy1CdMXPZyz1flo ZuYQ== X-Gm-Message-State: ALKqPwcBpbIuAxESAwSZ2DCMs4yw9wGxYVDGC1Vj+JrPw2GFRQLB7JrX htViC/qXvGEZGfO9pk4G5rzxr6VUrMk1GHC46HmbmHQB X-Google-Smtp-Source: AB8JxZqh6JUaWdWEUkhQiQTEKRFdIktVtq6HFxH0Fx/YGVu7ub5YhpLrgF4QGZ7Fjk+EmY/2FJrxy9kaAe6k/JsIm9o= X-Received: by 2002:a9f:37e3:: with SMTP id q90-v6mr19038160uaq.189.1526423819122; Tue, 15 May 2018 15:36:59 -0700 (PDT) MIME-Version: 1.0 Received: by 10.31.21.205 with HTTP; Tue, 15 May 2018 15:36:58 -0700 (PDT) From: Anatol Pomozov Date: Tue, 15 May 2018 15:36:58 -0700 Message-ID: To: edk2-devel@lists.01.org Subject: Extracting vendor blobs from edk2-coreboot payload X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 May 2018 22:37:02 -0000 Content-Type: text/plain; charset="UTF-8" Hello I am trying to modify/rebuild a Coreboot+EDK2 rom for my hardware. To do that I need Intel vendor blobs that I cannot find in web unfortunately. Intel seems does not share the blobs publicly. Here is the build script used to build my UEFI payload https://github.com/MattDevo/edk2/blob/master/build-cpp-hswbdw-box.sh it needs vbt.bin and IntelGopDriver.efi for Haswell. So I would like to get my device rom image and extract all the blobs. BaseTools located at the sourcetree seems focusing around building the image. But I do not see anything related to splitting the result. googling does not give a clear answer neither. Is there a simple tool that allows to extract these Intel blobs from Build/CorebootPayloadPkgX64/RELEASE_GCC5/FV/UEFIPAYLOAD.fd ?