From owner-freebsd-hackers@freebsd.org Thu Aug 13 15:10:44 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9C5459A06F1 for ; Thu, 13 Aug 2015 15:10:44 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (mail.metricspace.net [IPv6:2001:470:1f11:617::103]) by mx1.freebsd.org (Postfix) with ESMTP id 733BC7CA for ; Thu, 13 Aug 2015 15:10:44 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [172.20.3.30] (unknown [208.71.37.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 5DD771EEA; Thu, 13 Aug 2015 15:10:36 +0000 (UTC) Subject: Re: EFI ZFS loader success story To: Ganael Laplanche , freebsd-hackers@freebsd.org References: <201508121139.40852.ganael.laplanche@corp.ovh.com> <201508121447.59970.ganael.laplanche@corp.ovh.com> From: Eric McCorkle Message-ID: <55CCB372.9030901@metricspace.net> Date: Thu, 13 Aug 2015 11:10:42 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: <201508121447.59970.ganael.laplanche@corp.ovh.com> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="vhPIKVffB48IR87blpEq5rPKPawgLRgAc" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Aug 2015 15:10:44 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --vhPIKVffB48IR87blpEq5rPKPawgLRgAc Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Excellent! Thanks for testing it. On 08/12/2015 08:47 AM, Ganael Laplanche wrote: > On Wednesday, August 12, 2015 11:39:40 AM Ganael Laplanche wrote: >=20 >> Using the patch from this post : >> >> https://lists.freebsd.org/pipermail/freebsd-hackers/2015-June/047823.h= tml >> >> against -CURRENT (r286279), I've been able to boot my ZFS-root system,= >> yeah! >=20 > As a followup to : >=20 > https://lists.freebsd.org/pipermail/freebsd-hackers/2015-April/047608.h= tml >=20 >> Also, if someone with a UFS system could test that the modularization = didn't >> break UFS functionality, that'd be helpful. >=20 > I would like to add I've successfully booted a UFS root too (in UEFI mo= de)=20 > using your patch, with both loaders (either directly from loader.efi or= using=20 > boot1.efi + loader.efi). Here is how. >=20 > First, create partitions this way : >=20 > # gpart create -s gpt ada0 > # gpart add -s 800K -t efi ada0 > # gpart add -t freebsd-ufs ada0 >=20 > Then, install FreeBSD within the freebsd-ufs partition. >=20 > You can then choose between two ways of booting your system : >=20 > (let's consider the efi partition is mounted under /tmp/efi and the roo= t FS=20 > under /mnt) >=20 > 1) Using loader.efi : > --------------------- >=20 > # cp loader.efi /tmp/efi/efi/boot/BOOTx64.efi >=20 > # cat > /tmp/efi/boot/loader.rc << EOF > unload > set currdev=3Dpart1: > load boot/kernel/kernel > autoboot > EOF >=20 > 2) Using boot1.efi + loader.efi : > --------------------------------- >=20 > # cp boot1.efi /tmp/efi/efi/boot/BOOTx64.efi > # cp loader.efi /mnt/boot/ >=20 > Cleanup previous test : > # rm /tmp/efi/boot/loader.rc > # rmdir /tmp/efi/boot >=20 > Also, in both cases, do not forget to modify the fstab within /mnt/etc = to=20 > mount the root fs. >=20 > Regards, >=20 --vhPIKVffB48IR87blpEq5rPKPawgLRgAc Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBAgAGBQJVzLN1AAoJECuREQPg1IcE4coP/3m1NzQPp4W9GWnjRbNm6mTz jwwKAvMJ/lORmTe92o9KgJB/LhsuV4sG6eE3bTkZ+XY1HSr4nVSR0gEjSRnel66n 6pIfKDkMsDAqRERlZiAlWMuZAOPlHoYrjsADsguC0f9cJ1RVvw6G23How/Ny0jaN eWQYS55w1AMDig4g5AdLrnoan8O+Txk/I3O8FpQRLa45B3O/HwTmwkx+qB/Mqn4I pQEHdnJS8RbZuPiRVsCmWVZpo6JIgvd5+U3iUxamY/7LP+OqF3X4Udt7pxUAJFEE IXEVml7iQzECahzhMSizlvtSxJ/RAqmAripoAQbSjwfUjKjitv5IUTOgUqmAjiEO 6MzbTmo9IF/Q/hT7stdwm4JleIvU2DJGDlMyWIy0tWVGj8KxJ6A/FuDRjMLu+/74 0pYbpWB29ucpwp9fYlRmJmK1e/AzaBIaUK+L2DpyBc2TJZvb/BldxEkIHE/4fM6n qVS8jdyZJyF3fqpWJhiu5OnVy1EFn3Hkn6ES4orLRNgX5Z39X0aXsNZBcVBcoDBS qrle+4zTi7BKX+CweJnjC4+dy46T94SDqV15s6O5DwHJe4yPW8j/JsZ6ynIYE000 Rb75UJKXlUj7BnuuVHfl9BDxptQC3DM0d4Bur7Ojga/MJpdZ4R2AEvwSo5HKOJmh cesAH0D+S+Vnp8ACxB61 =B8ym -----END PGP SIGNATURE----- --vhPIKVffB48IR87blpEq5rPKPawgLRgAc--