From owner-freebsd-questions@freebsd.org Fri Dec 25 15:21:47 2020 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 357774C4600 for ; Fri, 25 Dec 2020 15:21:47 +0000 (UTC) (envelope-from vas@sibptus.ru) Received: from admin.sibptus.ru (admin.sibptus.ru [IPv6:2001:19f0:5001:21dc::10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4D2VzG0WLQz3Lmj for ; Fri, 25 Dec 2020 15:21:45 +0000 (UTC) (envelope-from vas@sibptus.ru) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sibptus.ru; s=20181118; h=In-Reply-To:Message-ID:Subject:To:From:Date; bh=vIDh/p4YHFHfj95Uun5DdMuOL92wqgs4r1ZA2BT2PIs=; b=BxodF9r59SDfg4Dh3GI1Toreav BtcVm7wk13WAJ82rnx57eR7GrRD+3uRUVKB+hCkgj6pjeY4HeHsFALV9PnbegDybqWakUzmnrhPaY Fd0MLC2X4vfun7TMjLTAwoYqxyihQUPi1ny3yRtj+hLlA7JjDOwsLMdpKgOJpWXM5oOU=; Received: from vas by admin.sibptus.ru with local (Exim 4.94 (FreeBSD)) (envelope-from ) id 1ksouQ-000K0U-Oq for freebsd-questions@freebsd.org; Fri, 25 Dec 2020 22:21:38 +0700 Date: Fri, 25 Dec 2020 22:21:38 +0700 From: Victor Sudakov To: freebsd-questions@freebsd.org Subject: Re: EFI, UEFI, PXE: FreeBSD-12.1-RELEASE-amd64-bootonly.iso boot from SAN device failed, error 0x7f22208e Message-ID: <20201225152138.GA76538@admin.sibptus.ru> References: <20201223025406.GA25600@admin.sibptus.ru> <20201223104459.GA36737@admin.sibptus.ru> <6cbaa416-0262-c85f-8e74-19a8ac95605d@gmail.com> <20201224134403.GB13527@admin.sibptus.ru> <20201225084305.GA60871@admin.sibptus.ru> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="qMm9M+Fa2AknHoGS" Content-Disposition: inline In-Reply-To: X-PGP-Key: http://admin.sibptus.ru/~vas/ X-PGP-Fingerprint: 10E3 1171 1273 E007 C2E9 3532 0DA4 F259 9B5E C634 X-Rspamd-Queue-Id: 4D2VzG0WLQz3Lmj X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=sibptus.ru header.s=20181118 header.b=BxodF9r5; dmarc=pass (policy=none) header.from=sibptus.ru; spf=pass (mx1.freebsd.org: domain of vas@sibptus.ru designates 2001:19f0:5001:21dc::10 as permitted sender) smtp.mailfrom=vas@sibptus.ru X-Spamd-Result: default: False [-6.10 / 15.00]; ARC_NA(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[2001:19f0:5001:21dc::10:from]; R_DKIM_ALLOW(-0.20)[sibptus.ru:s=20181118]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; TO_DN_NONE(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; RCPT_COUNT_ONE(0.00)[1]; SPAMHAUS_ZRD(0.00)[2001:19f0:5001:21dc::10:from:127.0.2.255]; DKIM_TRACE(0.00)[sibptus.ru:+]; DMARC_POLICY_ALLOW(-0.50)[sibptus.ru,none]; NEURAL_HAM_SHORT(-1.00)[-1.000]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:20473, ipnet:2001:19f0:5000::/38, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-questions] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Dec 2020 15:21:47 -0000 --qMm9M+Fa2AknHoGS Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Rick Miller wrote: > > > > I've never thought I will have to build a kernel with an MFS image > > within (outside of NanoBSD). How are you going to boot this kernel from > > iPXE? Put it on an ISO image and sanboot the ISO? > > >=20 > Yes. That is precisely how it is accomplished. I see. >=20 > Is it not possible to fetch a GENERIC kernel by loader.efi, then fetch > > an MFSROOT image as a separate file? This is the way I did the job > > during the pxelinux (old BIOS based netboot) times. > > >=20 > It seems you refer to loading a kernel and separate ramdisk or initrd. I'= ve > heard it rumored there could be preliminary experimental code to accompli= sh > this, but don't have any evidence. It works very well in the old pxeboot environment: 1. Place kernel as /tftpboot/boot/kernel/kernel.gz 2. Place mfsroot as /tftpboot/mfsroot.gz 3. Configure pxelinux.0 to chainload /pxeboot from TFTP. 4. pxeboot loads the kernel and mfsroot. To accomplish (4), I have the following lines in /tftpboot/boot/loader.conf: mfs_load=3D"YES" mfs_type=3D"mfs_root" mfs_name=3D"/mfsroot" ahci_load=3D"YES" vfs.root.mountfrom=3D"ufs:/dev/md0" All this however has become obsolete with the introduction of UEFI. --=20 Victor Sudakov, VAS4-RIPE, VAS47-RIPN 2:5005/49@fidonet http://vas.tomsk.ru/ --qMm9M+Fa2AknHoGS Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJf5gOCAAoJEA2k8lmbXsY0CRcH/itpoW3Of4rWFYgVn75OU0eP xq3lOtTVY3ue4H4wCYQlHPNHNsi/DxRuHdlsgvQyCcZ3YtGSJW/qllrtvGHOTvvG zIWC3Xs5S/HOcqBV8vS+pTzDZt/G0+dGbAfAPY15fXZRcTPLyeoe+Bdwrsd+Jtgt NhzYjD61B7S/zvEx7NRBhk6hJynyxA0ldF5sWGOj0FV5foQwo2jRtl0YXgJqyR1p Ni9UdGm2Bts2o7pcX5NCNw4YzSmQP8bKzZdtGpUtrroPmhiKVp9rkJIr59anfoKI W0gUfmGuF/ct7EMCYyapmQPY47DdoJCBAJDPppfZvfMgd3uhG8slHzkDaT8GFKU= =8isv -----END PGP SIGNATURE----- --qMm9M+Fa2AknHoGS--