From owner-freebsd-current@freebsd.org Tue Sep 6 16:17:05 2016 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 52937BC6D7C for ; Tue, 6 Sep 2016 16:17:05 +0000 (UTC) (envelope-from harry.gindi@live.com) Received: from BLU004-OMC1S7.hotmail.com (blu004-omc1s7.hotmail.com [65.55.116.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "*.outlook.com", Issuer "Microsoft IT SSL SHA2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0BDF7615 for ; Tue, 6 Sep 2016 16:17:04 +0000 (UTC) (envelope-from harry.gindi@live.com) Received: from NAM04-CO1-obe.outbound.protection.outlook.com ([65.55.116.8]) by BLU004-OMC1S7.hotmail.com over TLS secured channel with Microsoft SMTPSVC(7.5.7601.23008); Tue, 6 Sep 2016 09:16:58 -0700 Received: from CO1NAM04FT011.eop-NAM04.prod.protection.outlook.com (10.152.90.56) by CO1NAM04HT030.eop-NAM04.prod.protection.outlook.com (10.152.91.224) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384) id 15.1.587.6; Tue, 6 Sep 2016 16:16:57 +0000 Received: from SN1PR10MB0845.namprd10.prod.outlook.com (10.152.90.52) by CO1NAM04FT011.mail.protection.outlook.com (10.152.90.158) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384) id 15.1.587.6 via Frontend Transport; Tue, 6 Sep 2016 16:16:57 +0000 Received: from SN1PR10MB0845.namprd10.prod.outlook.com ([10.163.207.11]) by SN1PR10MB0845.namprd10.prod.outlook.com ([10.163.207.11]) with mapi id 15.01.0599.016; Tue, 6 Sep 2016 16:16:57 +0000 From: fpqc ?? To: "freebsd-current@freebsd.org" Subject: The state of UEFI support in the Kernel and installer Thread-Topic: The state of UEFI support in the Kernel and installer Thread-Index: AQHSCFhEq6z7L2s31E6yNfNG6zeyZw== Date: Tue, 6 Sep 2016 16:16:57 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=softfail (sender IP is 10.152.90.52) smtp.mailfrom=live.com; freebsd.org; dkim=none (message not signed) header.d=none;freebsd.org; dmarc=none action=none header.from=live.com; received-spf: SoftFail (protection.outlook.com: domain of transitioning live.com discourages use of 10.152.90.52 as permitted sender) x-ms-exchange-messagesentrepresentingtype: 1 x-tmn: [jqZESgbyB20EST1DPX4Qx/obCfqg7XnS] x-eopattributedmessage: 0 x-microsoft-exchange-diagnostics: 1; CO1NAM04HT030; 6:5PYQHkFWabuv4eQbuhp93OBry/zvYZZ0VdbGwJzWk7+5YXXKkniib56A7F9vId6DcEEbkw4l67DyX5YqTmGA4YSFBsLZiLQd50qgr9T9UZqJFEZNPg6c3q7yADjdiXpxfLCWp/B/IRMJW8BU/nD59V+aw+DGoqIPABzLPi98ZokvcD9NQwmjdAJdtwudRvGzKuF44lnd+ec98JKcREkSL4PRIOb4QuXgR73bAlVj26SpJw8Q5yUTDXkdZ1xwqofLYSCff9E+H4e/KsQ+NZKDyk6eUsfsJUZ3PxoJsrw6S7u28gS3MrzoScBItg2qI49sw/Df2BY2Z7Y4qssG5+QC/w==; 5:ILVORZu/98Y4Jld8PCu6AZop3nA5cIzMYkqczk2Qxmkf7tvb2MXVft99Kn+VLBv9Xqbkmh/BO904uNiU6f1RVs028qW7496YdmXnVImAqlqWvfqhs61Stx5DwKCLgCW9cmj5/TOd/GyPWZ/Zq+64oQ==; 24:BLuLTI4tkwzP52SahTsK3k60FdLc6O+WIjSL/RaDTJ0iXstvxZCndMjJy3TBmauK+KzEYUcZXavwlmDVVfcgci32LAWOGJs9LtvzrVHdvKU=; 7:VMiPOg+H5EKgaN6nRajnwOZV55cQcsgCXIRWboPeoREvzDF4F6PoNt1iJyxtbhCnPdt7TQF/sXb/jTwhukR7i2etkiQT3XFK7LtgqaWw0Cd9v3q7wBWVId3+u3PrJ9QLOgk0/yBh04qqW8o8Tof14o8I9bG2RCNbq6fsdWzaJla2UWevpJYFmKmGzCpZaOH1MQxv/f1EKb1sToTJHM//dnb6lgUbqlzXmI41TBnPKWjjQ3r2Mzt81fQeF51NW+mc x-forefront-antispam-report: EFV:NLI; SFV:NSPM; SFS:(10019020)(98900003); DIR:OUT; SFP:1102; SCL:1; SRVR:CO1NAM04HT030; H:SN1PR10MB0845.namprd10.prod.outlook.com; FPR:; SPF:None; LANG:en; x-ms-office365-filtering-correlation-id: 38d115e6-212b-45d9-296a-08d3d6713980 x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(1601124038)(1603103081)(1601125047); SRVR:CO1NAM04HT030; x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(432015012)(82015046); SRVR:CO1NAM04HT030; BCL:0; PCL:0; RULEID:; SRVR:CO1NAM04HT030; x-forefront-prvs: 0057EE387C spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: live.com X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Sep 2016 16:16:57.2439 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Internet X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1NAM04HT030 X-OriginalArrivalTime: 06 Sep 2016 16:16:58.0628 (UTC) FILETIME=[17C8CC40:01D2085A] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Sep 2016 16:17:05 -0000 I was reading this article from the 2013 Dev summit on UEFI: https://wiki.freebsd.org/201305DevSummit/UEFI In particular, I wanted to ask what is the status on these two goals (from = the article): The following issues exist: - The installer needs to be taught about creating EFI System Partitions (if= needed) or selecting an EFI System Partition to install our first- and sec= ond-stage boot code. - The installer needs to be taught about creating EFI boot entries for our = boot code once the kernel has an API for this. Right now, as of the latest -Current image, the installer does not ask if a= n EFI System partition already exists, which is rather scary. When doing a= manual (expert) partitioning scheme, the installer should ask for the loca= tion of the ESP if it exists, and if no ESP is specified for mounting, the = installer should warn that no bootloader will be installed. =20 The other problem is that as far as I can tell, there is no code that creat= es the EFI boot entry in any case. By default, the installer just moves ei= ther boot1.efi or loader.efi (not sure) to: (ESP)/EFI/bootx64.efi, which is the default location for EFI firmware. I was wondering if the ker= nel has the requisite API/driver for adding EFI boot entries yet. On (Arch= ) Linux, you can add an entry to the NVRAM with a tool called bootctl, whic= h is part of the sd-boot package. =20 Also, wondering if FreeBSD has any plan to add something like initramfs/EFI= Stub booting, which allows for much easier bootloader configuration with sd= -boot than the current FreeBSD EFI bootloader, which must be chainloaded an= d has its configuration stored off of the ESP. =20