From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gproxy1.mail.unifiedlayer.com (gproxy1-pub.mail.unifiedlayer.com [69.89.25.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 4637781CEB for ; Mon, 31 Oct 2016 22:23:48 -0700 (PDT) Received: from cmgw3 (cmgw4 [10.0.90.84]) by gproxy1.mail.unifiedlayer.com (Postfix) with ESMTP id 1E638177D06 for ; Mon, 31 Oct 2016 23:13:18 -0600 (MDT) Received: from host178.hostmonster.com ([74.220.207.178]) by cmgw3 with id 2VDE1u00K3rUk6a01VDHRx; Mon, 31 Oct 2016 23:13:18 -0600 X-Authority-Analysis: v=2.1 cv=WL/sABcR c=1 sm=1 tr=0 a=T9j9BJDXZ+Y9yhL2qmiybA==:117 a=T9j9BJDXZ+Y9yhL2qmiybA==:17 a=L9H7d07YOLsA:10 a=9cW_t1CCXrUA:10 a=s5jvgZ67dGcA:10 a=IkcTkHD0fZMA:10 a=CH0kA5CcgfcA:10 a=i3X5FwGiAAAA:8 a=RD81zUMiyiQEyaX-p9sA:9 a=QEXdDO2ut3YA:10 a=mmqRlSCDY2ywfjPLJ4af:22 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=notabs.org; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID: Date:Subject:In-Reply-To:References:To:From; bh=3IDvY77Sl3mPRzguL/bB0cP5ZvmBerLp1enm8fVzYxw=; b=N3pTVrAfiKeWC3LicjT31z+o93 Ho7SjTkVIibSjzZ66mTZYHaVdigq0Jmmiz1t7qtg5lJE1FgzMPPGD9ETTc6c9CiYlBIsWxlWQKKLn pzZHFKbBfncupLK29HhUD0Qt2; Received: from c-73-77-215-81.hsd1.tx.comcast.net ([73.77.215.81]:6673 helo=p672600k) by host178.hostmonster.com with esmtpa (Exim 4.86_1) (envelope-from ) id 1c1RNq-0001u3-3k; Mon, 31 Oct 2016 23:13:14 -0600 From: "Scott Duplichan" To: =?UTF-8?Q?'Janne_He=C3=9F'?= , References: In-Reply-To: Date: Tue, 1 Nov 2016 00:13:01 -0500 Message-ID: <000701d233fe$9ee679a0$dcb36ce0$@notabs.org> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQGj2xgNjpcq28f7xbAQFaM/JxDwD6EgQLCw X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host178.hostmonster.com X-AntiAbuse: Original Domain - lists.01.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - notabs.org X-BWhitelist: no X-Source-IP: 73.77.215.81 X-Exim-ID: 1c1RNq-0001u3-3k X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: c-73-77-215-81.hsd1.tx.comcast.net (p672600k) [73.77.215.81]:6673 X-Source-Auth: scott+notabs.org X-Email-Count: 2 X-Source-Cap: bm90YWJzb3I7bm90YWJzb3I7aG9zdDE3OC5ob3N0bW9uc3Rlci5jb20= Subject: Re: Building and integrating CorebootPayloadPkg X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Nov 2016 05:23:48 -0000 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Content-Language: en-us ]From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of = Janne He=C3=9F ]Sent: Monday, October 31, 2016 08:08 AM ]To: edk2-devel@lists.01.org ]Subject: [edk2] Building and integrating CorebootPayloadPkg ] ]Hello everyone, ] ]I'm currently trying to build CorebootPayloadPkg to integrate it into = my ]coreboot. ]I follewed the instructions in ]CorebootPayloadPkg/BuildAndIntegrationInstructions.txt to build ]UEFIPAYLOAD.fd. ]The instructions tell me to add choose this file as an executable elf ]payload in the coreboot configuration. ]Now, when building coreboot, I end up with the following output: ] ]> Performing operation on 'COREBOOT' region... ]> E: The stage file is not in ELF format! ]> E: skipping 32 bytes of FV padding ]> E: skipping 28 bytes of section padding ]> E: Could not add [UEFIPAYLOAD.fd, 852750 bytes (832 KB)@0x0]; too = big? ]> E: Failed to add 'UEFIPAYLOAD.fd' into ROM image. ]> E: Failed while operating on 'COREBOOT' region! ]> E: The image will be left unmodified. ]> make: *** [build/coreboot.pre] Error 1 ] ]As the script tells me to check if the payload is too big, I set my = BIOS ]chip size to 12 MB in the config just to make sure this is not a = problem. ]This didn't help. ]I also asked on #coreboot, where I was told to use the cbfstool to ]include my payload which failed with the same message. ] ]So to me it looks like whatever UEFIPAYLOAD.fd is, it is not a Coreboot ]payload. ]Are there any commands missing from the documentation that I need to ]build a valid payload? ] ]Thanks in advance. ] ]Regards ]Janne You should ignore the message: E: The stage file is not in ELF format! Cbfstool is complaining about the size, after compression, of the = payload. I don't know why your attempt to expand the flash size failed. I never tried that because the board I was using is limited to 1MB of flash. For that board, I could make a CorebootPayloadPkg release build fit, but not a NOOPT build. Here is a passing example: $ build/cbfstool build/coreboot.rom add-payload -f = /l/edk2build/edk2/Build/CorebootPayloadPkgX64/RELEASE_VS2010x86/FV/UEFIPA= YLOAD.fd -n fallback/payload -c lzma E: The stage file is not in ELF format! E: skipping 32 bytes of FV padding E: skipping 28 bytes of section padding $ build/cbfstool build/coreboot.rom print coreboot.rom: 1024 kB, bootblocksize 960, romsize 1048576, offset 0x0 alignment: 64 bytes, architecture: x86 Name Offset Type Size cmos_layout.bin 0x0 cmos_layout 1776 pci1002,9610.rom 0x740 optionrom 65536 cpu_microcode_blob.bin 0x10780 microcode 14336 fallback/romstage 0x14000 stage 84225 fallback/ramstage 0x28940 stage 84072 (empty) 0x3d200 null 55640 config 0x4ab80 raw 4900 revision 0x4bf00 raw 701 fallback/payload 0x4c200 payload 630897 (empty) 0xe62c0 null 104728 Here is a failing example: $ build/cbfstool build/coreboot.rom remove -n fallback/payload $ build/cbfstool build/coreboot.rom add-payload -f = /l/edk2build/edk2/Build/CorebootPayloadPkgX64/NOOPT_VS2010x86/FV/UEFIPAYL= OAD.fd -n fallback/payload -c lzma E: The stage file is not in ELF format! E: skipping 32 bytes of FV padding E: skipping 28 bytes of section padding E: Could not add = [L:/edk2build/edk2/Build/CorebootPayloadPkgX64/NOOPT_VS2010x86/FV/UEFIPAY= LOAD.fd, 855646 bytes (835 KB)@0x0]; too big? E: Failed to add = 'L:/edk2build/edk2/Build/CorebootPayloadPkgX64/NOOPT_VS2010x86/FV/UEFIPAY= LOAD.fd' into ROM image. Thanks, Scott