From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-19.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1A685C07E95 for ; Fri, 2 Jul 2021 19:08:06 +0000 (UTC) Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 98A4F6141C for ; Fri, 2 Jul 2021 19:08:05 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 98A4F6141C Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=chromium.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id DDB7782BE1; Fri, 2 Jul 2021 21:07:05 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=chromium.org header.i=@chromium.org header.b="MA97yiX4"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 7BD5C82A29; Fri, 2 Jul 2021 21:06:48 +0200 (CEST) Received: from mail-ot1-x331.google.com (mail-ot1-x331.google.com [IPv6:2607:f8b0:4864:20::331]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 686B7829BA for ; Fri, 2 Jul 2021 21:06:43 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=sjg@chromium.org Received: by mail-ot1-x331.google.com with SMTP id c12-20020a9d684c0000b029047762db628aso7038912oto.13 for ; Fri, 02 Jul 2021 12:06:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=t88UjTgQpCLdwV7GZDWvpd6pd3yn6oiBoJ2E2QPofCk=; b=MA97yiX4MiqOlehbOe7XOFEQiVpKlg9Xo4Fdi5JaeK3d7Yds3CTF5SHWHutOSMkpAq TvdEvTGldGuSnap2BK6Qn9Il0xCvh6mKvOQzdBYG+ZGEY3Jsntuqvv+K6FVsUBNTYPa2 gbb0a2emLRYoBP6hXcPoNy4jhV1AZsFxtQavk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=t88UjTgQpCLdwV7GZDWvpd6pd3yn6oiBoJ2E2QPofCk=; b=jIjHnLwB6RZ0/QKiFJXgxR1R9cd65q3MuaHmxMLFf1AIrFNqLwT4nAPb0HWL+99wLS JqLijGCM1SmgfnCMvyyHm7lYaOJVLHL10y158ACch5U8ZfEuA9NO48rFY424OEEFo5+i kg+9iSEegVRwvPzKMqO4AEn2e+KDWEHP/hlqxdwStO7mEfwmJD20g0cotMaMamRf3EgN KbqAiWozSCa03pOP1yIYJE4p0ZyePT+v+z7L5fpBuX35wzmuEu0wRkpAd3R6llbGY7Iw lRCAv1w/rqfIS9DGIajIIoZIBNuAL8eVyr2OjD3UZXQDgj+rgNzUlqLYQTPrFGXT1Jw/ QcNQ== X-Gm-Message-State: AOAM532VE//tgEsLmu8jNK+EUaEqe+1FXwan2wMFzR8DvoInYRW5poxE WlTJeKP5t9TYVR5z0WD/2uZdD0hiVHlZbfqc X-Google-Smtp-Source: ABdhPJzYeKDco8RL8RYdnW88FC2Oe1VPDfveNpnUgApixmAFVmecFdlGiGj15VifE49bBHtyO0dOnA== X-Received: by 2002:a9d:69cb:: with SMTP id v11mr621137oto.304.1625252801545; Fri, 02 Jul 2021 12:06:41 -0700 (PDT) Received: from kiwi.bld.corp.google.com (c-67-190-101-114.hsd1.co.comcast.net. [67.190.101.114]) by smtp.gmail.com with ESMTPSA id v8sm772625oth.69.2021.07.02.12.06.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 02 Jul 2021 12:06:41 -0700 (PDT) From: Simon Glass To: U-Boot Mailing List Cc: Ilias Apalodimas , =?UTF-8?q?Pali=20Roh=C3=A1r?= , Mark Kettenis , Heinrich Schuchardt , Simon Glass Subject: [PATCH v2 8/9] Add an option for EBBR Date: Fri, 2 Jul 2021 12:36:19 -0600 Message-Id: <20210702183620.1542680-5-sjg@chromium.org> X-Mailer: git-send-email 2.32.0.93.g670b81a890-goog In-Reply-To: <20210702183620.1542680-1-sjg@chromium.org> References: <20210702183620.1542680-1-sjg@chromium.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Add a new Kconfig option for EBBR so that the naming is more explicit. Make it select EFI_LOADER which is required for EBBR to work. Copy over the same 'default' setting so that there is no change in which boards enable it. Signed-off-by: Simon Glass --- Changes in v2: - Split out new patch to create an option for EBBR common/Kconfig.boot | 16 ++++++++++++++++ lib/efi_loader/Kconfig | 1 - 2 files changed, 16 insertions(+), 1 deletion(-) diff --git a/common/Kconfig.boot b/common/Kconfig.boot index 89a3161f1fa..111032e1202 100644 --- a/common/Kconfig.boot +++ b/common/Kconfig.boot @@ -300,6 +300,22 @@ config LEGACY_IMAGE_FORMAT loaded. If a board needs the legacy image format support in this case, enable it here. +config EBBR + bool "Enable support for Embeeded Boot Base Requirements (EBBR)" + select EFI_LOADER + default y if !ARM || SYS_CPU = armv7 || SYS_CPU = armv8 + help + Enable this to support ARM's EBBR boot method. This bases everything + on UEFI protocols. + + This Embedded Base Boot Requirements (EBBR) specification defines an + interface between platform firmware and an operating system that is + suitable for embedded platforms. EBBR-compliant platforms present a + consistent interface that will boot an EBBR-compliant operating + system without any custom tailoring required. For example, an Arm + A-class embedded platform will benefit from a standard interface that + supports features such as secure boot and firmware update. + config SUPPORT_RAW_INITRD bool "Enable raw initrd images" help diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig index 466abfed300..bc5fb3f5e03 100644 --- a/lib/efi_loader/Kconfig +++ b/lib/efi_loader/Kconfig @@ -10,7 +10,6 @@ config EFI_LOADER depends on !EFI_STUB || !X86_64 || EFI_STUB_64BIT # We need EFI_STUB_32BIT to be set on x86_32 with EFI_STUB depends on !EFI_STUB || !X86 || X86_64 || EFI_STUB_32BIT - default y if !ARM || SYS_CPU = armv7 || SYS_CPU = armv8 select LIB_UUID select HAVE_BLOCK_DEVICE select REGEX -- 2.32.0.93.g670b81a890-goog