From owner-freebsd-cloud@freebsd.org Wed Apr 12 06:28:36 2017 Return-Path: Delivered-To: freebsd-cloud@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E849DD3A3C3; Wed, 12 Apr 2017 06:28:36 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id BA0EEED0; Wed, 12 Apr 2017 06:28:36 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (106-68-194-141.dyn.iinet.net.au [106.68.194.141]) (authenticated bits=0) by vps1.elischer.org (8.15.2/8.15.2) with ESMTPSA id v3C6ST0S059921 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Tue, 11 Apr 2017 23:28:33 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: amazon/xen... any way at all to pass a message/signal/semaphoere/morse-code to the boot loader? To: Leif Pedersen , freebsd-cloud@freebsd.org References: <0100015b6070c546-05c6cf24-36e1-487f-be5e-b2bb6efd4472-000000@email.amazonses.com> Cc: Toomas Soome , freebsd-xen@freebsd.org From: Julian Elischer Message-ID: Date: Wed, 12 Apr 2017 14:28:23 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-cloud@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "FreeBSD on cloud platforms \(EC2, GCE, Azure, etc.\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Apr 2017 06:28:37 -0000 On 12/4/17 1:30 pm, Leif Pedersen wrote: > I keep an extra EBS volume handy that has a simple recovery image. > If I get stuck into a trouble, I change the normal boot disk to sdb, > and attach my recovery volume as sda1. Essentially, the extra volume > is my "recovery partition". To make it cheaper, keep only a snapshot > of it. yes that's a technique I've used in the past. I'd prefer to find something simpler to do, which is why it'd be nice if one could just control some single bit that the bootloader could read. > > Same idea on Google Compute Engine. > > > > > On Apr 11, 2017 11:34 PM, "Colin Percival" > wrote: > > [CCing freebsd-cloud, which is the right place for discussions > of FreeBSD/EC2] > > On 04/11/17 21:03, Julian Elischer wrote: > > In Amazon ec2 they have no console access (though I heard > rumors that it was > > available I have not seen any sign of it) so I'd like to put a > "recovery > > partition" into an AMI. > > The trick is how to convince it to boot to that instead of the > regular action. > > Can you get what you want via gptboot's support for selecting > the partition > to boot via "bootonce" and "bootme" flags? > > > The ideal thing would be if there was way to 'influence' one > of the smbios > > values in some way, and have the boot code see it, but I'm > open to any > > suggestions. > > I really need only 1 bit of information to get through. > > > > Possibilties include "changing the VM to have only 2G of ram" > (we'd never do > > that in a real machine). > > or maybe temporarily removing all the disks other than the > root drive? Almost > > anything I could do to signal the boot code to behave differently. > > I don't think adding/removing disks will be useful, since the > extra disks will > be Xen blkfront devices; AFAIK the boot loader doesn't know > anything about > these. (The boot device is also a blkfront device but gets ATA > emulation for > the benefit of boot loaders.) > > Maybe you can repurpose some of the logic used for booting over > NFS? I've > never heard of people booting over NFS when the initial > bootstrap comes from > disk rather than PXE, but I assume it's possible...? > > -- > Colin Percival > Security Officer Emeritus, FreeBSD | The power to serve > Founder, Tarsnap | www.tarsnap.com | > Online backups for the truly paranoid > _______________________________________________ > freebsd-cloud@freebsd.org > mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-cloud > > To unsubscribe, send any mail to > "freebsd-cloud-unsubscribe@freebsd.org > " >