From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B7314C433EF for ; Wed, 27 Oct 2021 14:08:53 +0000 (UTC) Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 44A8960EFE for ; Wed, 27 Oct 2021 14:08:53 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 44A8960EFE Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=chromium.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=lists.denx.de Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id B8EFA835B8; Wed, 27 Oct 2021 16:08:51 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=chromium.org header.i=@chromium.org header.b="eIleEkl0"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id E7E31835BA; Wed, 27 Oct 2021 16:08:48 +0200 (CEST) Received: from mail-ua1-x935.google.com (mail-ua1-x935.google.com [IPv6:2607:f8b0:4864:20::935]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id EC535835B4 for ; Wed, 27 Oct 2021 16:08:44 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=sjg@google.com Received: by mail-ua1-x935.google.com with SMTP id o26so5186363uab.5 for ; Wed, 27 Oct 2021 07:08:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HYHL6SDDuyThYfYp7H2VCkDnHteLxE7xxlgHhr4Y1Is=; b=eIleEkl0IVq/TFZNrM6dxa1V+zWngSKFu0EOV6F12TiRI5wHPN9gUUuYER+g/trekj JXcaTcr/03oUmOVfp1+JgogLHBvuJXElV0NNBuNNjop3ODERMxL9+FmLqttEDg26MH0b 2wMM3UUdfMmQxza38ndlcsJKLJR9Kob6FAStA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HYHL6SDDuyThYfYp7H2VCkDnHteLxE7xxlgHhr4Y1Is=; b=yul9gxD0sP3xRmz4CqIV314SHxyPXyVSLkVdlx6iCxJSwWBpoaBFIGiIFUg2f3vwc6 rvkUtMf9c9zJsTxH5tbvcYuwPXWh03wMJDTP3YGmOxlVJuSJh1s89BUeDHxYnRY5Kt0A K+LJ63GBvu85vUvgT3ZX3qK8/PVJ6e5SfPw/76AW1k4qzNhYsGVw20YswNoqRnZBUVND hJfNovfG+vsTMwX3+OwBKj0ZIgKzaMZx1oaAQaxSpjU68GCssEPnUHu5ubCPxddfxp3Z FTa+weEW3p9N79yNOP4peJbSXIJ1VTQxCe44BUo99aXlaA3wo2cUAopn00eKwfBwEayB DPuw== X-Gm-Message-State: AOAM5325OM9wfcD850wx/hTzGEXIQaidTqP9zozJqOoCfiPSPhZcxs5a 0y9WyKrtbW2SQeYtYxiYy6vuUPGy6GdLgtsuGQLu3Q== X-Google-Smtp-Source: ABdhPJxD/rYkHINqGbB07VgZOPichNZoImN/CiA7Bm9iNGU9aqg65h019joiCZIucwaccqa4Egn8wwwuHU3ENILllC4= X-Received: by 2002:a67:3087:: with SMTP id w129mr2417096vsw.15.1635343723445; Wed, 27 Oct 2021 07:08:43 -0700 (PDT) MIME-Version: 1.0 References: <20211023232635.9195-1-sjg@chromium.org> <20211023232635.9195-22-sjg@chromium.org> <8dbc39d9-fce4-9fbc-09b7-ec6505b49d26@gmx.de> In-Reply-To: <8dbc39d9-fce4-9fbc-09b7-ec6505b49d26@gmx.de> From: Simon Glass Date: Wed, 27 Oct 2021 08:08:32 -0600 Message-ID: Subject: Re: [PATCH v2 31/41] bootstd: Add an implementation of EFI boot To: Heinrich Schuchardt Cc: Michal Simek , Tom Rini , Ilias Apalodimas , Daniel Schwierzeck , Steffen Jaeckel , =?UTF-8?B?TWFyZWsgQmVow7pu?= , Lukas Auer , Dennis Gilmore , U-Boot Mailing List Content-Type: text/plain; charset="UTF-8" X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Hi Heinrich, Ilias, On Wed, 27 Oct 2021 at 06:03, Heinrich Schuchardt wrote: > > > > On 10/24/21 01:26, Simon Glass wrote: > > Add a bootmeth driver which handles EFI boot, using EFI_LOADER. > > > > In effect, this provides the same functionality as the 'bootefi' command > > and shares the same code. But the interface into it is via a bootmeth, > > so it does not require any special scripts, etc. > > > > For now this requires the 'bootefi' command be enabled. Future work may > > tidy this up so that it can be used without CONFIG_CMDLINE being enabled. > > Booting via the boot manager must occur without issuing a command on the > command line. How will the boot method in this file be invoked? > > The bootefi command may be implemented by invoking a boot method. A boot > method invoking a command does not make sense to me. What do you mean? What other way is there to boot an image at present? The same thing happens with PXE, for example today, although I have sent a series to start to change that. The idea here is that to boot something on U-Boot you use 'bootflow scan -b' and everything happens automatically. In all cases (at present) this involves running commands, whether it is bootm, bootefi, etc. > > Best regards > > Heinrich > > > > > Signed-off-by: Simon Glass > > --- [..] Regards, Simon