From owner-freebsd-hackers@freebsd.org Wed Aug 12 12:48:10 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9C8689A0B7D for ; Wed, 12 Aug 2015 12:48:10 +0000 (UTC) (envelope-from ganael.laplanche@corp.ovh.com) Received: from 2.mo175.mail-out.ovh.net (2.mo175.mail-out.ovh.net [178.33.255.145]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 62E60829 for ; Wed, 12 Aug 2015 12:48:10 +0000 (UTC) (envelope-from ganael.laplanche@corp.ovh.com) Received: from MBX002.OVH.local (corp.ovh.com [5.196.251.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mo175.mail-out.ovh.net (Postfix) with ESMTPS id A2CD0FF825B; Wed, 12 Aug 2015 14:48:00 +0200 (CEST) Received: from desk533202.ovh.net (5.196.2.34) by MBX002.OVH.local (172.16.2.2) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 12 Aug 2015 14:47:30 +0200 From: Ganael Laplanche Organization: OVH To: Subject: Re: EFI ZFS loader success story Date: Wed, 12 Aug 2015 14:47:59 +0200 User-Agent: KMail/1.13.7 (Linux/3.2.0-4-amd64; KDE/4.8.4; x86_64; ; ) CC: Eric McCorkle References: <201508121139.40852.ganael.laplanche@corp.ovh.com> In-Reply-To: <201508121139.40852.ganael.laplanche@corp.ovh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Message-ID: <201508121447.59970.ganael.laplanche@corp.ovh.com> X-Originating-IP: [5.196.2.34] X-ClientProxiedBy: cas01.OVH.local (172.16.1.1) To MBX002.OVH.local (172.16.2.2) X-Ovh-Tracer-Id: 4647996290770123304 X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrfeekfedrfeefucetufdoteggucfrrhhofhhilhgvmecuqfggjfenuceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddm X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Aug 2015 12:48:10 -0000 On Wednesday, August 12, 2015 11:39:40 AM Ganael Laplanche wrote: > Using the patch from this post : >=20 > https://lists.freebsd.org/pipermail/freebsd-hackers/2015-June/047823.html >=20 > against -CURRENT (r286279), I've been able to boot my ZFS-root system, > yeah! As a followup to : https://lists.freebsd.org/pipermail/freebsd-hackers/2015-April/047608.html > Also, if someone with a UFS system could test that the modularization did= n't > break UFS functionality, that'd be helpful. I would like to add I've successfully booted a UFS root too (in UEFI mode)= =20 using your patch, with both loaders (either directly from loader.efi or usi= ng=20 boot1.efi + loader.efi). Here is how. =46irst, create partitions this way : # gpart create -s gpt ada0 # gpart add -s 800K -t efi ada0 # gpart add -t freebsd-ufs ada0 Then, install FreeBSD within the freebsd-ufs partition. You can then choose between two ways of booting your system : (let's consider the efi partition is mounted under /tmp/efi and the root FS= =20 under /mnt) 1) Using loader.efi : =2D-------------------- # cp loader.efi /tmp/efi/efi/boot/BOOTx64.efi # cat > /tmp/efi/boot/loader.rc << EOF unload set currdev=3Dpart1: load boot/kernel/kernel autoboot EOF 2) Using boot1.efi + loader.efi : =2D-------------------------------- # cp boot1.efi /tmp/efi/efi/boot/BOOTx64.efi # cp loader.efi /mnt/boot/ Cleanup previous test : # rm /tmp/efi/boot/loader.rc # rmdir /tmp/efi/boot Also, in both cases, do not forget to modify the fstab within /mnt/etc to=20 mount the root fs. Regards, =2D-=20 Gana=EBl LAPLANCHE