From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 5F76FC433EF for ; Thu, 20 Jan 2022 08:38:23 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 23BC38383B; Thu, 20 Jan 2022 09:38:21 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=walle.cc Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=walle.cc header.i=@walle.cc header.b="ibsyWQ8X"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id A43CD837FD; Thu, 20 Jan 2022 09:38:19 +0100 (CET) Received: from ssl.serverraum.org (ssl.serverraum.org [IPv6:2a01:4f8:151:8464::1:2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id D056683388 for ; Thu, 20 Jan 2022 09:38:15 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=walle.cc Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=michael@walle.cc Received: from ssl.serverraum.org (web.serverraum.org [172.16.0.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ssl.serverraum.org (Postfix) with ESMTPSA id 20BC422247; Thu, 20 Jan 2022 09:38:14 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2016061301; t=1642667894; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xivfp2QUpUWhDL+TB/JfxWlIvO0q58yoxseDfVFRJ4Y=; b=ibsyWQ8Xk+IAzivJR5GE55IxXK6bs9JIcqGMpfM4gC2vvLnYyUpSwj/1miFwhLiO4C96b5 53PUfyx64fnqsNim0r7VbJpOg7NXHzTuG+HdpQc/NXFSJw5hAHKAcCWK3QWDzIfByzy8ry +zxsuFOEaQ2HQjV21pQ1qygw3U2Bavo= MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Thu, 20 Jan 2022 09:38:13 +0100 From: Michael Walle To: Simon Glass Cc: Daniel Schwierzeck , Dennis Gilmore , Ilias Apalodimas , Steffen Jaeckel , Jaehoon Chung , Lukas Auer , Marek Vasut , Michal Simek , Pavel Herrmann , Peng Fan , Tom Rini , U-Boot Mailing List , Heinrich Schuchardt Subject: Re: [PATCH v3 00/31] Initial implementation of standard boot In-Reply-To: References: <20220119014315.1938157-1-sjg@chromium.org> <20220119080908.2899725-1-michael@walle.cc> User-Agent: Roundcube Webmail/1.4.12 Message-ID: X-Sender: michael@walle.cc X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Hi, Am 2022-01-19 15:56, schrieb Simon Glass: > On Wed, 19 Jan 2022 at 01:09, Michael Walle wrote: >> >> >> > The bootflow feature provide a built-in way for U-Boot to automatically >> > boot an Operating System without custom scripting and other customisation. >> > This is called 'standard boot' since it provides a standard way for >> > U-Boot to boot a distro, without scripting. >> > >> > It introduces the following concepts: >> > >> > - bootdev - a device which can hold a distro >> > - bootmeth - a method to scan a bootdev to find bootflows (owned by >> > U-Boot) >> > - bootflow - a description of how to boot (owned by the distro) >> > >> > This series provides an implementation of these, enabled to scan for >> > bootflows from MMC, USB and Ethernet. It supports the existing distro >> > boot as well as the EFI loader flow (bootefi/bootmgr). It works >> > similiarly to the existing script-based approach, but is native to >> > U-Boot. >> > >> > With this we can boot on a Raspberry Pi 3 with just one command: >> > >> > bootflow scan -lb >> > >> > which means to scan, listing (-l) each bootflow and trying to boot each >> > one (-b). The final patch shows this. >> >> I wanted to give this a try, but I only get the following output: >> >> => setenv boot_targets usb0 >> => bootflow scan -lb >> Scanning for bootflows in all bootdevs >> Seq Method State Uclass Part Name >> Filename >> --- ----------- ------ -------- ---- ------------------------ >> ---------------- >> Unknown seq 0 for label 'usb0' >> --- ----------- ------ -------- ---- ------------------------ >> ---------------- >> (0 bootflows, 0 valid) >> >> where usb0 is a debian installation medium. > > Yes that's not working yet. Can you try an mmc device for testing? Ok thanks for confirming. Yes I can test with a sd card, but I'll probably do it when there is support for loading a device tree by the fdtfile. -michael