From owner-freebsd-questions@FreeBSD.ORG Fri Jun 27 21:22:04 2014 Return-Path: Delivered-To: questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A5A76DE3 for ; Fri, 27 Jun 2014 21:22:04 +0000 (UTC) Received: from be-well.ilk.org (be-well.ilk.org [23.30.133.173]) by mx1.freebsd.org (Postfix) with ESMTP id 7C9012E99 for ; Fri, 27 Jun 2014 21:22:04 +0000 (UTC) Received: by be-well.ilk.org (Postfix, from userid 1147) id 1961D33C48; Fri, 27 Jun 2014 17:22:03 -0400 (EDT) From: Lowell Gilbert To: paul beard Subject: Re: what should uname -v be telling me here? References: <44lhsi5ugm.fsf@be-well.ilk.org> <20140627223650.25210a53.freebsd@edvax.de> Reply-To: "questions\@freebsd.org" Date: Fri, 27 Jun 2014 17:22:02 -0400 In-Reply-To: (paul beard's message of "Fri, 27 Jun 2014 13:57:06 -0700") Message-ID: <44y4wi3v5x.fsf@be-well.ilk.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain Cc: "questions@freebsd.org" X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Jun 2014 21:22:04 -0000 paul beard writes: > On Fri, Jun 27, 2014 at 1:36 PM, Polytropon wrote: >> You need to find out where /boot resides (in my case, >> it's on ad4s1a, which is mounted at /) to identify the boot >> device (or to be precise, the device the kernel has been read >> from). > > > I keep thinking this should be something you ought to be able to > discover without being on console. I realize the BIOS can't be > interrogated but if I knew that the active kernel was ad3:/boot/kernel > or ad2:/boot/kernel, it would be useful. Kind of surprised that > doesn't appear anywhere in dmesg or that it can't be read out of > somewhere. The boot procedure has to load and boot the kernel without having the kernel available to create the device nomenclature. [Kind of obvious, if you think about it.] So interrogating the firmware is the only way the kernel *could* know where it was booted from. That's impossible in the BIOS world, and even if there were a table indicating it in an ACPI table, that would only tell you which disk the bootloader came from, which isn't necessarily where the kernel came from.