From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mx.groups.io with SMTP id smtpd.web09.3520.1603917690722165684 for ; Wed, 28 Oct 2020 13:41:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=rXMaraHO; spf=pass (domain: intel.com, ip: 134.134.136.24, mailfrom: jaben.carsey@intel.com) IronPort-SDR: 5efE6o4TtfvBRkuj/yr3WNlRrMBVGRgQeeL/UEsvd6ZXXQShUgM4x1S03NYw6TaAdP8GCYsql0 pG/YCs6+T+0A== X-IronPort-AV: E=McAfee;i="6000,8403,9788"; a="168463742" X-IronPort-AV: E=Sophos;i="5.77,428,1596524400"; d="scan'208,217";a="168463742" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Oct 2020 13:41:26 -0700 IronPort-SDR: HfvIoyIEu+I7bPZXGvzbwbQOlp+Ae9EMmtQjHg653HIwtM36dXkquU2adChg9PrOd9zDCVAeo1 KLCOyU+7TYGQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,428,1596524400"; d="scan'208,217";a="351150569" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmsmga004.fm.intel.com with ESMTP; 28 Oct 2020 13:41:25 -0700 Received: from orsmsx605.amr.corp.intel.com (10.22.229.18) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 28 Oct 2020 13:41:25 -0700 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx605.amr.corp.intel.com (10.22.229.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Frontend Transport; Wed, 28 Oct 2020 13:41:25 -0700 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.177) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Wed, 28 Oct 2020 13:41:24 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Gkq514HqnVk7ogMv2tAGDqWX7tmjzHUWnaQbqfTJcbrvR8BLkWyuB4wiSXdVRrLClJO/KNnNfhvCPJzlok6NfWGr5UM4IVDjGbme6FuCGoMbN/I2OaoPY6iyNp2V78Uzbf0qpNW2ZB1F+mVlI/ii07vokeviyrfqMzBxDcKFkOLbSMS2WFmHJItsQH6WW5bdkTecSWW6HDHhgwo+uhaWHU68DWoYaY8znuhvgPKxc6xPK6BdMSUP7TrhTIOh7Tl9291RdInRJN3f2F0er68q4I6jRNEFdBaY1YMRZUyJQvdOoEaQBgX6XEPoo8OErGjyLB/SHUXyPG9J0vbEM9pCJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WxKt06TmGxXWejWhKjs5X8w4z8PTlSdg8G9lsxhvQhs=; b=a/Jncm89/wE1JYTOG2Jjgybgj5P3zdxE0lfrbDET5mS2ij+MghjBdAonwB5F/WudGoMkq174GZz8/v1hAupeRUwnK+hIs3VPjwRRfa1FljybAoqTVAc9z+MSoBWqaJ86N3agOUzJzfDqFFVQ00renEzik2pwQ5qjqFHnFljBT6VAtfOBJ/09boMc0XanEftPMJEt6fvyaYUpKIoOSfodDKU4JN29GiMpw3hKUaq07d6zmPqwLW4sKqaOdoj4qsPrmffJ/1lr9DIfRMHNmY7QUYzeh0+O6YwU6PqysvqSu3KmDxs9BvylPXBYOF3w1mMxFiBzoodLjNQH8bBCMm2YFg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WxKt06TmGxXWejWhKjs5X8w4z8PTlSdg8G9lsxhvQhs=; b=rXMaraHOEpTPeM+3MMd9JSD3boI9p/J3Y5TLxi+8d9FQToNqwnDsSJvQVjTtJTdiYOtQ6CcT1cCq6LARl5EkxKhWLCaqli/eb/FCp9E6HRey7nWXKd+0B5jY2bZC5L69waRAFxxvToSwK1DuFcIWfdp12a+DuzcsAla+qfVOhuY= Received: from MW3PR11MB4620.namprd11.prod.outlook.com (2603:10b6:303:54::14) by MWHPR11MB1280.namprd11.prod.outlook.com (2603:10b6:300:2b::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3477.22; Wed, 28 Oct 2020 20:41:21 +0000 Received: from MW3PR11MB4620.namprd11.prod.outlook.com ([fe80::94c3:a064:3265:a9dd]) by MW3PR11MB4620.namprd11.prod.outlook.com ([fe80::94c3:a064:3265:a9dd%4]) with mapi id 15.20.3499.019; Wed, 28 Oct 2020 20:41:21 +0000 From: "Carsey, Jaben" To: "devel@edk2.groups.io" , "Ni, Ray" CC: "Zimmer, Vincent" , "Ma, Maurice" , "Rangarajan, Ravi P" , "Dong, Guo" , "Hau, Tze-ming" Subject: Re: RFC: Universal Payload Interface Thread-Topic: RFC: Universal Payload Interface Thread-Index: Adao2l6sYj5IjEbTTh6huilOXmakLQEkCMEg Date: Wed, 28 Oct 2020 20:41:21 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-reaction: no-action dlp-version: 11.5.1.3 dlp-product: dlpe-windows authentication-results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=intel.com; x-originating-ip: [50.38.100.207] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 6ad8bbb4-73b6-4023-0817-08d87b81d43c x-ms-traffictypediagnostic: MWHPR11MB1280: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: lEoGzDtO/O/3+8fDQ0pOMuR2Jh/Y+9TCtBraPSpqT4x4LYMq0eLPh+2Zwkp6Tn2Qvn0MbGMI2BsOu6m16XHtwKtgGr6wi4rEfNnf3eIaPqUHkWak75lWnBd0IP16G+7l2W3nH9YkAO/f9Qsfz0xlAvM1IeOrbdzsLMc/Zo8BVyuhIM6QEYqnIq14Po7gutWv/jeOe084wFr8VQBkqKdPKc+LZplD5MojP1tKC3oiw+HgBZ7UUrAx9aJqia75ItuWsTIkvHNv3QkSBsgvG0h+Tujm7WfTg3rCR9+Kp/0MhpAjezJfHPEEEPT0o6saAqP28xLF+E/Ah1JiAJhreslHC9tGvsY7ONohRhVktiJlX3kg8ZsiuMfVxexZEMMKYrhkHdRQ24/p3Gb8PdsbG/jhJHQ2LEkrQ24k7c5NO3pwfSNcqkAsHY4xxcurIgUhaePk72s7D/hDAptybRMo9lUSlA== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW3PR11MB4620.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(39860400002)(396003)(366004)(136003)(376002)(346002)(316002)(966005)(71200400001)(55016002)(86362001)(166002)(9686003)(2906002)(107886003)(83380400001)(8676002)(33656002)(64756008)(5660300002)(26005)(6636002)(66556008)(7696005)(76236003)(186003)(52536014)(4326008)(66476007)(110136005)(76116006)(21615005)(66946007)(54906003)(53546011)(6506007)(8936002)(66446008)(478600001)(460985005);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: oiulZrZgyBE2lRcjvO+al+7c7I3DZvm/1eMbVeODUz/HAp0HF3U+N0/i85bSm3QWjP9aUpvlDZZxAqvLAaJBTCDfKqBeAlboLYZs2fNjvIVa3zlvL7HhlUQsiQz+NK/TKH1Z6mPSZtwCZVpD9YSKy6xzyqEfXDWeCPCQlkMt+HCVywgnkrJOsuInfRtDr/4+2vV8lfqbgco48I2aLSIPSZ10IXLMlOk0Nl+5tPSNCz00JXhuwbhQS73B63x5JHdC7xGgtuC1dtRobdArbhPTCp7KGkcQhrSkSv0vNsKTTHlc80Cs0jEMpH2m8zu6tpoo3tvTuoWykpr3Xz95msodUzReAO090Vot9j4T2jlBNaiyd8ns4s68+jasC0daLUOJRV1apbqRQp5pf1YRs9CrR24hEoYqBVCzyv32E+J0O9RGWF2fDet6PIH1bVPFyetSQhL5WEtjhAHBLiQHT0MG45oJYoicGyqOQbkpL1e67ngNxuTdZnpdLiq/wpduDDfwJPE65QY7qwUzTKFXNju3Pk2kJjHt2WuV/q/Syh1lEhqgWk6lJ5rQrY10yKwGT0nYIrlY0X1iebbQCeeE/Bh3jXZf/uJy3eye3caxQLPFqQ11iZuzIkvIYGEcWnvfhlbH93r2QxZ/z4lMH7dUvph8Sw== MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW3PR11MB4620.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 6ad8bbb4-73b6-4023-0817-08d87b81d43c X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Oct 2020 20:41:21.2884 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Dq3QhOnEyobEpw/mjrIzcmzgiFpXf4Db3LiDpP5THVVB2XHsFmJMoiWGoOU2ckoPRUkbeOljxE8qmKiY7JsdTA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1280 Return-Path: jaben.carsey@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_MW3PR11MB462013990F47E649EB056FFA9C170MW3PR11MB4620namp_" --_000_MW3PR11MB462013990F47E649EB056FFA9C170MW3PR11MB4620namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Ray Is there any more information on "Payload Image Extend Header"? This is me= ntioned, but I don't see detailed information. -Jaben From: devel@edk2.groups.io On Behalf Of Ni, Ray Sent: Thursday, October 22, 2020 6:18 PM To: devel@edk2.groups.io Cc: Zimmer, Vincent ; Ma, Maurice ; Rangarajan, Ravi P ; Dong, Guo ; Hau, Tze-ming ; Ni, Ray Subject: [edk2-devel] RFC: Universal Payload Interface With the fact that there are many different firmware implementations, we t= ried to decouple today's monolithic UEFI firmware binary to two independent= components: bootloader and payload. Basically, bootloader initializes the silicon hardware and payload prepare= s the OS required data and services. Bootloader passes control to payload. https://universalpayload.github.io/documentation/spec/spec.html defines th= e universal interface between bootloader and payload. So that different boo= tloaders can work with different payloads, initializing different hardware = and booting different OSes. The interface document is in very draft phase. Any feedback is welcome. We also developed the POC code to demonstrate the idea. Please use below s= teps to get the code that uses SBL as the bootloader and EDKII UEFI Payload= as the payload. This POC is being developed for QEMU Q35 virtual machine. 1. Run "git clone https://github.com/universalpayload/tools.git payload= " This step downloads the initial tools that will setup the dev environment. 1. Run "py -3 clone_and_build_sbl_with_uefipayload.py" in the "payload"= directory This script downloads branched SBL (https://github.com/universalpayload/sl= imbootloader.git) and edk2 (https://github.com/universalpayload/edk2.git). Then it builds the firmware binary "SlimBootloader.bin" in "codeworkspace"= directory. 1. Boot QEMU by running "qemu-system-x86_64.exe -machine q35 -pflash c= odeworkspace\SlimBootloader.bin -serial file:test.log" Because the code is under active development, please contact us when you c= annot build or boot successfully. Besides the SBL, we modified coreboot (https://github.com/universalpayload= /coreboot.git) to let it conform to the universal interface as a bootloader= . Besides the EDK2 UEFI Payload, we created a payload (https://github.com/un= iversalpayload/linuxpayload.git) that can boot Linux. Thanks, Ray --_000_MW3PR11MB462013990F47E649EB056FFA9C170MW3PR11MB4620namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Ray

 

Is there any more information on “Payload Image Extend Header”? This is mention= ed, but I don’t see detailed information.

 

-Jaben

 

From: devel@edk2.groups.io <devel@edk2.gr= oups.io> On Behalf Of Ni, Ray
Sent: Thursday, October 22, 2020 6:18 PM
To: devel@edk2.groups.io
Cc: Zimmer, Vincent <vincent.zimmer@intel.com>; Ma, Maurice &= lt;maurice.ma@intel.com>; Rangarajan, Ravi P <ravi.p.rangarajan@intel= .com>; Dong, Guo <guo.dong@intel.com>; Hau, Tze-ming <tze-ming.= hau@intel.com>; Ni, Ray <ray.ni@intel.com>
Subject: [edk2-devel] RFC: Universal Payload Interface

 

With the fact that there are many different firmwar= e implementations, we tried to decouple today’s monolithic UEFI firmw= are binary to two independent components: bootloader and payload.

 

Basically, bootloader initializes the silicon hardw= are and payload prepares the OS required data and services. Bootloader pass= es control to payload.

 

https://universalpayload.github.io/documentation/s= pec/spec.html defines the universal interface between bootloader and pa= yload. So that different bootloaders can work with different payloads, initializing different hardware and boo= ting different OSes.

The interface document is in very draft phase. Any = feedback is welcome.

 

We also developed the POC code to demonstrate the i= dea. Please use below steps to get the code that uses SBL as the bootloader= and EDKII UEFI Payload as the payload. This POC is being developed for QEM= U Q35 virtual machine.

  1. Run “git clone https://github.c= om/universalpayload/tools.git payload”

This step downloads the initial tools that w= ill setup the dev environment.

  1. Run “py -3 clone_and_build_sbl_with_uefipayload.py” in t= he “payload” directory

This script downloads branched SBL (https://github= .com/universalpayload/slimbootloader.git) and edk2 (https://github.com/universalpayload/e= dk2.git).

Then it builds the firmware binary “Sl= imBootloader.bin” in “codeworkspace” directory.

  1. Boot QEMU by running “qemu-system-x86_64.exe -machine q35 -pfl= ash  codeworkspace\SlimBootloader.bin  -serial file:test.log̶= 1;

 

Because the code is under active development, pleas= e contact us when you cannot build or boot successfully.

 

Besides the SBL, we modified coreboot (https://github.com/univers= alpayload/coreboot.git) to let it conform to the universal interface as= a bootloader.

Besides the EDK2 UEFI Payload, we created a payload= (https://= github.com/universalpayload/linuxpayload.git) that can boot Linux.=

 

Thanks,

Ray

 

--_000_MW3PR11MB462013990F47E649EB056FFA9C170MW3PR11MB4620namp_--