On 10/03/2014 03:47 PM, Bruce Dubbs wrote:
Craig Magee wrote:
On 3 October 2014 22:10, Mattias Schlenker <m...@mattiasschlenker.de>
wrote:
On UEFI you could do the same: Add LFS to an existing GRUB. On the
other
hand you could add an GRUBX64.EFI as LFSX64.EFI to the list of UEFI
bootloaders via efibootmgr. On a fresh machine with just LFS and no
other
systems you would probably use the default /EFI/BOOT/BOOTX64.EFI.
In my opinion this is to much complexity. Thus I would recommend not
creating partitions for LFS, but in any case use a separate drive. This
might even be a 32GB USB thumb drive (should cost less than 15€), do a
clean install (thus not thinking about dual boot configurations).
That is what I did recently. I built 64-bit LFS in a folder on my
fileserver (a Core Duo running Debian stable), then copied it to a USB
stick. I created two GPT partitions, one FAT32, one EXT2. By compiling
the kernel with a built-in command of root=PARTUUUID=(Id of EXT2
partition)
and placing it in /boot/BOOT/BOOTX64.EFI I now have a USB stick that
boots
on my Asus laptop and Mac by bringing up the boot options menu.
There's no specific reason to use GPT. My goal is to create a hybrid
table
I can install GRUB2 to with efiemu to see if I can get the stick to
boot on
older non-GPT aware BIOS systems. I don't know if that's a realistic
goal,
the fun part is finding out!
I find EFI to be okay for booting my system with as EFI entries can pass
arguments to the kernel and boot it directly without GRUB. I don't use
Windows so don't have any issues with it. GPT seems to be the
inevitable
future though, and is pretty darn neat.
A GPT partition table with a legacy BIOS is OK.
A MBR partition table with URFI is not OK.
Secure boot and UEFI are not synonymous. If you don't use windows,
the easiest way is to just disable secure boot.
Just one "tweak" to your statement. "Secure Boot" has nothing to do
with running windows. If you turn off secure boot, then you can make
the OS Boot Manager use any boot loader you chose. If I recall what you
did do your system, you re-formatted the hard drive and then installed
grub to your "boot" partition. You can do essentially the same thing by
"enabling BIOS Mode." Then you can use the PMBR layer--in essence your
boot partition--to install grub or lilo or any other boot loader. In
EFI Mode, you use the EFI partition as what the LFS book calls the "boot
partition." There *should* be an option in your BIOS settings to do
something like this.
Secure Boot merely has the OS boot manager look in the EFI variables for
"signed" keys and limits the boot loader selection to only those with
these keys--which microsoft controls.
In my research, I have encountered what I call "problems" because UEFI
firmware is still so manufacturer-dependent. There's no common jargon
yet. BIOS Mode, Legacy Mode, BIOS Legacy Mode are all synonymous. It
can get quite confusing.
There's some great info that explains all of this in almost excruciating
detail here:
http://www.rodsbooks.com/efi-bootloaders/index.html
Rod Smith, the author of the documents on the link, is the developer and
maintainer of rEFInd. Although I don't know specific dates, I have a
hunch that the stuff at his website was written before grub-2.02~beta2
got put in its final format.
I'm going to stop here. I could go on for awhile, but that would make
this excruciatingly long. My intent was only to amplify the remarks
about "Secure Boot."
Dan
--
http://lists.linuxfromscratch.org/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page