Created
June 12, 2015 00:35
-
-
Save Cr4sh/b70e9f27c27697837ea7 to your computer and use it in GitHub Desktop.
Intel DQ77KB SW SMI dumper
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
''' | |
Extract SW SMI handlers information from | |
Intel DQ77KB board SMRAM dump. | |
Example: | |
$ python smi_handlers.py TSEG.bin | |
0xcc: 0xd70259d8 | |
0xb8: 0xd706673c | |
0xba: 0xd706e970 | |
0x05: 0xd706b474 | |
0x04: 0xd706b45c | |
0x03: 0xd706b2e0 | |
0x01: 0xd706b2dc | |
0xa1: 0xd70664c4 | |
0xa0: 0xd706636c | |
0x40: 0xd70254f8 | |
''' | |
import sys, os, struct | |
def main(): | |
path = sys.argv[1] | |
data = open(path, 'rb').read() | |
for i in range(len(data)): | |
# get range from string | |
data_at = lambda offs, size: data[i + offs : i + offs + size] | |
# | |
# 00: "SMIH" | |
# 04: handler address (qword) | |
# 0c: SW SMI value (byte) | |
# | |
if data_at(0, 4) == 'SMIH': | |
addr, val = struct.unpack('QB', data_at(4, 8 + 1)) | |
if val != 0 and addr < 0xffffffff: | |
print '0x%.2x: 0x%.8x' % (val, addr) | |
if __name__ == '__main__': | |
sys.exit(main()) | |
# | |
# EoF | |
# |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment