> Authentication-Results: xs4all.nl; spf=pass smtp.mailfrom=gmail.com; > dkim=pass header.d=gmail.com; dmarc=pass header.from=gmail.com > DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; > d=gmail.com; s=20120113; > h=date:from:to:cc:subject:message-id:references:mime-version > :content-disposition:in-reply-to:user-agent; > bh=T9XNXLMah28uy/HrVS9RJf/rLWXZStlU7V7otMZ+uhI=; > b=yMcy2FX8TRGfZhGvIUwVHu+xtIb6/DiYjk6OtZFfDsrRFsIAtxSoW56qW9ZC079TRG > Dtutq/aXNIxN39VKwcFZzF+C2A8drcLZ8AZb2/I8CHXU9AuoNfHtNSYi++EMMqpGRmRn > hhWqzBQyzcTvMWTIg2/SJVb5fmuUftGNTwyJ1t+Z/qtuBcqscyjFaU7BIfZ7EEF252ZA > u+5akMW4mxD5CsPLLtdWS+qKpoof+Hx+ulpz6iiD/7RFzirMbTNeDCKXp4WXL7SbyXFb > Zbx2HCGX4pYbioU0Je79gJjvgeGMqA1YK9gL4/dR4GZygwaSUIpUWlfJyheqFh5UkGJ8 > Nv0A== > X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; > d=1e100.net; s=20130820; > h=x-gm-message-state:date:from:to:cc:subject:message-id:references > :mime-version:content-disposition:in-reply-to:user-agent; > bh=T9XNXLMah28uy/HrVS9RJf/rLWXZStlU7V7otMZ+uhI=; > b=RKjDzsibmXWod4KFW3n9CQYHQMdKXBWetXXpovYt2Vn1DkZQbV6nN/PydsswtLiAFb > oXGMQUnDtrvhwTC5k712HskL2dUbbyjZAce2xwztoV+NDjRLsnJuOFVQGweaOAZV8cyu > 6OM2Flvdel/V5Vs5TsJ1P89y0JxlSQrEtOu3oi34vwwlSG/Vp0FfeobPwXr2Nb6Su1eo > 6Fj/orIoTzF9KL+O2JtAifcyzN5PwNLEZc+JiLeI+MkcZyU5Hw4UQWq2leUiILMhScbh > 4gNuurZZw5KfxJlas6YTDmgC1Ps+GzO+VRRE2h8qmuKl1lIedt/1RbfnfYF+Th9Hnlhz > MdHg== > X-Gm-Message-State: > ALyK8tLKOQ3/C1Qp4LjOoZWseQg8DPWunaS2I5WJZynNPcfWOVqNAdt4nt1+vWEtlu0YcQ== > X-Received: by 10.25.19.170 with SMTP id 42mr13804048lft.147.1468843086494; > Mon, 18 Jul 2016 04:58:06 -0700 (PDT) > Date: Mon, 18 Jul 2016 14:58:03 +0300 > From: Artturi Alm <[email protected]> > Cc: [email protected] > Content-Disposition: inline > X-XS4ALL-DNSBL-Checked: mxdrop307.xs4all.net checked 209.85.215.66 against > DNS blacklists > X-CNFS-Analysis: v=2.2 cv=NvCTSIVJ c=1 sm=0 tr=0 > a=c3/uowWAhNvhj84YtCdEzQ==:117 a=kj9zAlcOel0A:10 a=cAmyUtKerLwA:10 > a=pGLkceISAAAA:8 a=w9bwA6rLjmvJg5QQyqEA:9 a=6kGIvZw6iX1k4Y-7sg4_:22 > X-Virus-Scanned: by XS4ALL Virus Scanner > X-XS4ALL-Spam-Score: -0.1 () DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, > FREEMAIL_FROM, SPF_PASS > X-XS4ALL-Spam: NO > Envelope-To: [email protected] > > On Mon, Jul 18, 2016 at 12:25:27PM +0200, Mark Kettenis wrote: > > > Date: Mon, 18 Jul 2016 11:52:15 +0300 > > > From: Artturi Alm <[email protected]> > > > > > > iHi, > > > > > > optimistic as always, this would be one item off the list making me own > > > this shit.:) octeon might benefit also, but haven't tested on one. > > > didn't figure out how to make a proper diff for ports/sysutils/u-boot/ > > > against cvs, so here is diff to be applied directly on top of recent > > > u-boot master. whacked out of sys/lib/libsa/. > > > > Having ffs support in u-boot would indeed be useful. That said, the > > recommended way to load OpenBSD kernels is through the efiboot > > bootloader as it will provide the kernel with initial entropy. > > > > Ultimately this code should be contributed back upstream. We don't > > really want to maintain large patches like this in the ports tree. > > > > Cheers, > > > > Mark > > > > > > i haven't looked at u-boot sources with concentration on efiboot > yet, but is it in some standard that efiboot is to be loaded from > fat partition or something? code in the diff does work like rest of > 'std' filesystems in u-boot so that: "load usb 0:4 ${kernel_addr} > /efi/boot/bootarm.efi && bootefi ${kernel_addr}" will do the right > thing leaving out the detail about which filesystem there is @ > usb0:4, and afaict. u-boot doesnt respect mbr type and ie. will try > to 'mount' 0xa6-partitions with ext2 too.
The UEFI standard requirse the EFI system partition to be FAT32. While u-boot doesn't actually care, and allows all possible partition types, a "real" UEFI implementation is likely to support only this filesystem type.
