From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id CD8B1C07E95 for ; Wed, 7 Jul 2021 07:58:32 +0000 (UTC) Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id EFAC261C71 for ; Wed, 7 Jul 2021 07:58:30 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org EFAC261C71 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=walle.cc Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 533EC82DBF; Wed, 7 Jul 2021 09:58:28 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=walle.cc Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=walle.cc header.i=@walle.cc header.b="U4DwuzJV"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id A5FE982C81; Wed, 7 Jul 2021 09:58:26 +0200 (CEST) Received: from ssl.serverraum.org (ssl.serverraum.org [176.9.125.105]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 99BD582C81 for ; Wed, 7 Jul 2021 09:58:23 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=walle.cc Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=michael@walle.cc Received: from ssl.serverraum.org (web.serverraum.org [172.16.0.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ssl.serverraum.org (Postfix) with ESMTPSA id E6F8F22249; Wed, 7 Jul 2021 09:58:22 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2016061301; t=1625644703; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=MfYfzzRay2H4Np9lAv2GMc0aopwe0vZ0CBh55NViDGg=; b=U4DwuzJVI4tGCj1yykB0AczXLj6GeorVX4RxZJTXMBUwqk8NQc2M04+9/fiW06wA1ZAx3n gwnVwO4qUt3gfWslFlAqWK1aFfdU90PjrdBMXvCNiNwKr/pWifc1n4Bw7/OOcah4F8s2VZ xOfLd5FbhSLrwpBHgcBP37d3Vg94J6A= MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Wed, 07 Jul 2021 09:58:22 +0200 From: Michael Walle To: "Matwey V. Kornilov" Cc: Simon Glass , Heinrich Schuchardt , U-Boot Mailing List , Alexander Graf , AKASHI Takahiro Subject: Re: [PATCH 1/1] efi_loader: improve block device integration with DM In-Reply-To: References: <20210617151532.10350-1-xypron.glpk@gmx.de> User-Agent: Roundcube Webmail/1.4.11 Message-ID: <3f6be7d46fba6e402a67d6a69b168792@walle.cc> X-Sender: michael@walle.cc X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Am 2021-07-07 09:45, schrieb Matwey V. Kornilov: > Can we just (temporarily) revert > > f3866909e350 ("distro_bootcmd: call EFI bootmgr even without having > /EFI/boot") > > until this issue is resolved properly? Because, currently it seems > like the commit breaking the things was introduced at some point and > cannot be fixed within a reasonable amount of time since it seems that > the issue is related to the EFI implementation design. Mh, that would then break booting boards with an EFI boot entry and without an /EFI/boot/ binary. Given that this is only a change in the environment, can't you workaround your issue by changing your environment until there is a proper fix? -michael