I just noticed this project, and it’s been around for years, and I’ve been using UEFI and Python for years, sigh. 😦 It appears the developer is Max Wu of Phoenix. There is a blog, in addition to the tool. The blog has also been around for a long time, last post was last month, on UEFI topic not scoped to EfiPy.
EfiPy is a Python Module on UEFI shell which can access UEFI BIOS kernel interface: – System Table – Runtime Services – Boot Services
pAnalyzer package – Tracing UEFI protocol calling flow Output protocol flow to screen or file with XML format
CorePy (assembly package) – Simple Assembly code in Python environment.
EfiPy Shell package- Simple uefi shell program coded with EfiPy library to prove EfiPy workable
EfiPy leverage these open source packages – ctypes, CorePy.
This post details recent updates to a simple UEFI shell utility for displaying BMP images that I first released in 2015 and subsequently updated in 2017, and again this year. Source code for the previous versions is available on Github at UEFI-Utilities-2016 and UEFI-Utilities-2018 respectfully.[…]
[…] In this blog, we will describe the standard Secure Boot configuration of a Fedora 29 installation on a Dell Latitude E5470 laptop, which we use in our day-to-day work, and show you how to harden it to a reasonable extent.[…]
[PI 1.7] Finishing the PI 1.7 row with a humble plea to @vincentzimmer and other spec authors: please switch from Mantis ID (that makes Revision History of both UEFI and PI specs nearly useless) to Affected Sections (used by ACPI spec), because diffing 3k pages of PDFs is hard.
[PI 1.7] New required EFI_DELAYED_DISPATCH_PPI, an in-spec way to perform IO-bound or delayed initialization without stopping the world. Can be both really good (potential performance gain) and really bad (bad code that touches HOBs and/or PPIs can become a nightmare to debug). pic.twitter.com/CVOxWtuMbd
[PI 1.7] A bit of new return codes related to peripherals and boot modes (EFI_CHIPSET_EC_INTRUDER_DETECT and so on), and a whole new structure with EFI_STATUS to be returned with EFI_SW_DXE_BS_EC_BOOT_OPTION_LOAD_ERROR and EFI_SW_DXE_BS_EC_BOOT_OPTION_FAILED. pic.twitter.com/wBx6Zqxzlv
[PI 1.7] New PPI published by SEC Core for PEI Core to locate itself in the image. It was formerly required for PEI Core to reside in Boot Firmware Volume, now the req. is lifted. Will make life of OEMs using Intel FSP a bit easier and life of EFI modders a bit harder. pic.twitter.com/6jWU52yce6
I started this whole thing because I wanted to run my own kernel-mode code while still having access games protected by anti-cheat that don’t allow test signing, and I didn’t want to shell out the time and money required to get an EV certificate. […]I’m going to start out by patching binaries on disk, but the end result will be a UEFI application that patches all binaries in memory. […]