From patchwork Tue Apr 10 22:41:52 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 896962 X-Patchwork-Delegate: agraf@suse.de Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=gmx.de Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 40LMcY2hg6z9rxx for ; Wed, 11 Apr 2018 08:42:21 +1000 (AEST) Received: by lists.denx.de (Postfix, from userid 105) id DF448C21DE8; Tue, 10 Apr 2018 22:42:14 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=FREEMAIL_FROM, RCVD_IN_DNSWL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 359C6C21C3F; Tue, 10 Apr 2018 22:42:12 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 4DAEEC21C2C; Tue, 10 Apr 2018 22:42:10 +0000 (UTC) Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) by lists.denx.de (Postfix) with ESMTPS id 65AECC21C2C for ; Tue, 10 Apr 2018 22:42:09 +0000 (UTC) Received: from workstation4.fritz.box ([62.143.246.157]) by mail.gmx.com (mrgmx102 [212.227.17.174]) with ESMTPSA (Nemesis) id 0MSY2q-1ewA4h3GoW-00RbzT; Wed, 11 Apr 2018 00:42:07 +0200 From: Heinrich Schuchardt To: Alexander Graf Date: Wed, 11 Apr 2018 00:41:52 +0200 Message-Id: <20180410224152.1156-1-xypron.glpk@gmx.de> X-Mailer: git-send-email 2.14.2 X-Provags-ID: V03:K1:KuZoYylvLOZ9DbTUZ6/hEtvfTJs3q/K/0W1PyYu2VBtHDItIlsy WjDKVFvcY7GXXm45vr5jnpd2vLn46XxbNdjcH9BQYl0tA9xQyMPrzIDoqViH6svyPYbVael HG8uWGKpS7FEYFPMA2Q5I/99/n7+z2vnWtSY0GCs0y9XiH6S+k4aXHeN0PI2sFAzgjw0xSv AHC3rIv4VospIoEN5mjOQ== X-UI-Out-Filterresults: notjunk:1; V01:K0:gNCcXM5L9Po=:dUjrg38nJRdfUef2qmSmfs z8H06WWE2xEd8irNg5+nEB4aZ44nE2eWkhoMGyHM8J6No7Fphm/zW1l7zvg0ge4pk37+xTlh8 Km/qc2JizbTWfD2FDmlUhH5MBkYp+HPB1tZ7URygaLSj6Wp+C/9f7zH5KWxuKxHBaepy5gfg7 NjPgq10Dmm0CcUegw2g6XGuIXuOlKapq4gdRi6JFsFmM9RhqZZyMcN/Q9Xk+1hFFxAFJrzWUu j9LdRQg5Zk1wgpLtpnR5WtSrluwzn3GH/NbZcgL9V1b6JPiAG7eIp0lgUwrpB1MnCzqvarJiT geBkhBli4kwM20OPHGQ/q1/0Fnl+9xSJXXq3FmpcqxEJcMcNyT4ofU5FLb8jefv5EkeO47vX0 ECwUPTGu1TClr8py5jOKel8swquMEKhCvTYSoFqO/oQB0zyl3pVxT0NyQd0TGIs/RgbdfpUUL oXTPONo7Vgk8KusYhELNUYKd+b073QFVGRXmrY4v1uqVsgT6N5PDrfgrMFvN7d9jNshIX9Zuw ATxAmPSnz/IwF/Zo6HUVD1OgO6EI/EgRW/Qgoo/2pW2xjiV4UgVGZ4RpvK6E3UITrcFqZvFOi A2WXC/ezpzAgRxi9W2c7/zV84IGFBUszpPw0i1/7LSXf/QfCB2k7UNGUC0RL4X1j8Fx5QuV7i HTuyT7zhawnEVTulGu0uwp2lMLgxJBY0R0phq0zuTIeZr13G1tFsYo0spSxl4tp6mWbRmtwij BRbQtJ3MKkRo9IOwz4s2ZAhEVDzNvMy6BmuAGmVigZDVmueSDELaRhBlSCm+EkRf27Ls2hWTE p80aw18IjySX5tzuGYcGB1aw2+l3Q== Cc: u-boot@lists.denx.de, Heinrich Schuchardt Subject: [U-Boot] [PATCH 1/1][for v2018.05] efi_loader: no support for ARMV7_NONSEC=y X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" We do not support bootefi booting ARMv7 in non-secure mode. Signed-off-by: Heinrich Schuchardt --- doc/README.uefi | 2 ++ lib/efi_loader/Kconfig | 2 ++ 2 files changed, 4 insertions(+) diff --git a/doc/README.uefi b/doc/README.uefi index 7403be3614..ba66b16743 100644 --- a/doc/README.uefi +++ b/doc/README.uefi @@ -324,6 +324,8 @@ This driver is only available if U-Boot is configured with * persistence * runtime support +* support bootefi booting ARMv7 in non-secure mode (CONFIG_ARMV7_NONSEC=y) + ## Links * [1](http://uefi.org/specifications) diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig index 83d75c4fdc..d38780b604 100644 --- a/lib/efi_loader/Kconfig +++ b/lib/efi_loader/Kconfig @@ -1,6 +1,8 @@ config EFI_LOADER bool "Support running EFI Applications in U-Boot" depends on (ARM || X86) && OF_LIBFDT + # We do not support bootefi booting ARMv7 in non-secure mode + depends on !ARMV7_NONSEC # We need EFI_STUB_64BIT to be set on x86_64 with EFI_STUB depends on !EFI_STUB || !X86_64 || EFI_STUB_64BIT # We need EFI_STUB_32BIT to be set on x86_32 with EFI_STUB