From owner-freebsd-virtualization@freebsd.org Mon Mar 11 20:35:43 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 88F62152DC75 for ; Mon, 11 Mar 2019 20:35:43 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: from gndrsh.dnsmgr.net (br1.CN84in.dnsmgr.net [69.59.192.140]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 92ABD82836 for ; Mon, 11 Mar 2019 20:35:42 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: from gndrsh.dnsmgr.net (localhost [127.0.0.1]) by gndrsh.dnsmgr.net (8.13.3/8.13.3) with ESMTP id x2BKZeLU011551; Mon, 11 Mar 2019 13:35:40 -0700 (PDT) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: (from freebsd-rwg@localhost) by gndrsh.dnsmgr.net (8.13.3/8.13.3/Submit) id x2BKZd0a011550; Mon, 11 Mar 2019 13:35:39 -0700 (PDT) (envelope-from freebsd-rwg) From: "Rodney W. Grimes" Message-Id: <201903112035.x2BKZd0a011550@gndrsh.dnsmgr.net> Subject: Re: bhyve: Detecting that a guest kernel has booted In-Reply-To: To: "Patrick M. Hausen" Date: Mon, 11 Mar 2019 13:35:39 -0700 (PDT) CC: "Rodney W. Grimes" , Shawn Webb , freebsd-virtualization@freebsd.org X-Mailer: ELM [version 2.4ME+ PL121h (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII X-Rspamd-Queue-Id: 92ABD82836 X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [1.63 / 15.00]; ARC_NA(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; FROM_HAS_DN(0.00)[]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[dnsmgr.net]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.50)[0.495,0]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MX_GOOD(-0.01)[cached: gndrsh.dnsmgr.net]; NEURAL_SPAM_LONG(0.64)[0.643,0]; NEURAL_HAM_SHORT(-0.40)[-0.405,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:13868, ipnet:69.59.192.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(0.00)[ip: (0.05), ipnet: 69.59.192.0/19(0.03), asn: 13868(0.01), country: US(-0.07)] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Mar 2019 20:35:43 -0000 > Hi all, > > > Am 11.03.2019 um 19:09 schrieb Rodney W. Grimes : > > I have no love for them either, but until we get our UEFI updated > > it is a rather sad state of affairs. > > I routinely boot FreeBSD, Ubuntu and Windows 10 with > UEFI, so I don?t see much that I would consider broken. All 64 bit oses, afaik we can not boot anything 32 bit with our current uefi, which is: This branch is 8930 commits behind tianocore:master. And depends on an external git belonging to Peter Grehan, who is now gone from the project. > > Missing persistence of boot variables (correct term?) is > the only thing that I know of - what else makes it a > sad state, currently? Our GOP code frequently blows up vnc clients is another issue, not sure if that is in the uefi stuff, or if we just have bad vnc layered on top of it. It throws recs that are out of bounds. The embeded PXE code is also rather dated. > Patrick -- Rod Grimes rgrimes@freebsd.org