From owner-freebsd-xen@freebsd.org Wed Apr 12 04:03:49 2017 Return-Path: Delivered-To: freebsd-xen@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E2624D37E3F for ; Wed, 12 Apr 2017 04:03:49 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 28F64F28; Wed, 12 Apr 2017 04:03:49 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (106-68-194-141.dyn.iinet.net.au [106.68.194.141]) (authenticated bits=0) by vps1.elischer.org (8.15.2/8.15.2) with ESMTPSA id v3C43a9W059430 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Tue, 11 Apr 2017 21:03:40 -0700 (PDT) (envelope-from julian@freebsd.org) To: Colin Percival , FreeBSD Lists , Toomas Soome From: Julian Elischer Subject: amazon/xen... any way at all to pass a message/signal/semaphoere/morse-code to the boot loader? Message-ID: Date: Wed, 12 Apr 2017 12:03:30 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Apr 2017 04:03:50 -0000 In Amazon ec2 they have no console access (though I heard rumors that it was available I have not seen any sign of it) so I'd like to put a "recovery partition" into an AMI. The trick is how to convince it to boot to that instead of the regular action. The ideal thing would be if there was way to 'influence' one of the smbios values in some way, and have the boot code see it, but I'm open to any suggestions. I really need only 1 bit of information to get through. Possibilties include "changing the VM to have only 2G of ram" (we'd never do that in a real machine). or maybe temporarily removing all the disks other than the root drive? Almost anything I could do to signal the boot code to behave differently.