From nobody Sun Jul 18 23:50:13 2021 X-Original-To: freebsd-current@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 8DF851272190 for ; Sun, 18 Jul 2021 23:50:15 +0000 (UTC) (envelope-from 0100017abc06ffdd-9d095532-19fd-4fd9-a034-2d3708a90fb7-000000@amazonses.com) Received: from a8-24.smtp-out.amazonses.com (a8-24.smtp-out.amazonses.com [54.240.8.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4GShYL1tvHz3sJr for ; Sun, 18 Jul 2021 23:50:13 +0000 (UTC) (envelope-from 0100017abc06ffdd-9d095532-19fd-4fd9-a034-2d3708a90fb7-000000@amazonses.com) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1626652213; h=Subject:To:References:From:Message-ID:Date:MIME-Version:In-Reply-To:Content-Type:Content-Transfer-Encoding:Feedback-ID; bh=s3OZ519Wp0KES5cBOX+XrbblGb2PY9RK/Aw59iYc6T4=; b=iFI7sCYsuODsWLYmf02I2+Cz1w/pRi8eAMla4BPoP7j4wOEAwQ7AUaqtUtNDnheM aqu4yjU+fL6HF5T36/N6JWttN63uIr7sp3CfoIsurAH18uEO+pYjrrYdDH+Vp0Zv5XW uJEn7XxxZWVeXo0ZOuqAmk/aMazkmLvINzHsf3uk= Subject: Re: EFI boot partition overwritten: mount -t msdosfs (or mount_msdosfs(8)) To: freebsd-current@freebsd.org References: <0100017aaf3bd028-56a36bdb-37e1-4d14-9d10-4ff2367110d4-000000@email.amazonses.com> <8400d4f1-0c39-c5f6-ed37-12d6fb78f7c8@gmail.com> From: Thomas Laus Message-ID: <0100017abc06ffdd-9d095532-19fd-4fd9-a034-2d3708a90fb7-000000@email.amazonses.com> Date: Sun, 18 Jul 2021 23:50:13 +0000 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 List-Id: Discussions about the use of FreeBSD-current List-Archive: https://lists.freebsd.org/archives/freebsd-current List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-current@freebsd.org MIME-Version: 1.0 In-Reply-To: <8400d4f1-0c39-c5f6-ed37-12d6fb78f7c8@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Feedback-ID: 1.us-east-1.9pbSdi8VQuDGy3n7CRAr3/hYnLCug78GrsPo0xSgBOs=:AmazonSES X-SES-Outgoing: 2021.07.18-54.240.8.24 X-Rspamd-Queue-Id: 4GShYL1tvHz3sJr X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; dkim=pass header.d=amazonses.com header.s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug header.b=iFI7sCYs; dmarc=none; spf=pass (mx1.freebsd.org: domain of 0100017abc06ffdd-9d095532-19fd-4fd9-a034-2d3708a90fb7-000000@amazonses.com designates 54.240.8.24 as permitted sender) smtp.mailfrom=0100017abc06ffdd-9d095532-19fd-4fd9-a034-2d3708a90fb7-000000@amazonses.com X-Spamd-Result: default: False [1.30 / 15.00]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[amazonses.com:s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug]; FORGED_MUA_THUNDERBIRD_MSGID_UNKNOWN(2.50)[]; FROM_HAS_DN(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[54.240.8.24:from]; R_SPF_ALLOW(-0.20)[+ip4:54.240.0.0/18:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[acm.org]; NEURAL_SPAM_MEDIUM(1.00)[1.000]; RCPT_COUNT_ONE(0.00)[1]; SPAMHAUS_ZRD(0.00)[54.240.8.24:from:127.0.2.255]; DKIM_TRACE(0.00)[amazonses.com:+]; NEURAL_HAM_SHORT(-1.00)[-1.000]; RCVD_IN_DNSWL_NONE(0.00)[54.240.8.24:from]; NEURAL_HAM_LONG(-1.00)[-1.000]; FORGED_SENDER(0.30)[lausts@acm.org,0100017abc06ffdd-9d095532-19fd-4fd9-a034-2d3708a90fb7-000000@amazonses.com]; RCVD_COUNT_ZERO(0.00)[0]; MIME_TRACE(0.00)[0:+]; RBL_DBL_DONT_QUERY_IPS(0.00)[54.240.8.24:from]; ASN(0.00)[asn:14618, ipnet:54.240.8.0/21, country:US]; FROM_NEQ_ENVFROM(0.00)[lausts@acm.org,0100017abc06ffdd-9d095532-19fd-4fd9-a034-2d3708a90fb7-000000@amazonses.com]; MAILMAN_DEST(0.00)[freebsd-current] X-Spam: Yes X-ThisMailContainsUnwantedMimeParts: N On 7/18/21 2:21 PM, Graham Perrin wrote: > On 16/07/2021 18:35, Warner Losh wrote: >> # newfs_msdos -F 32 /dev/ada0p4 >> # mount -t msdos /dev/ada0p4 /boot/efi > > > Typo: msdosfs, not msdos. > > Alternatively, mount_msdosfs(8). > > Alternatively (I agree, even better), incorporate things such as this in > the Handbook :-) > > Then have the (ahem) book of answers to frequently asked questions link > to the Handbook. > I agree with having this information in the Handbook. Writing the contents of the EFI partition has changed filenames through the recent release cycles. FreeBSD 12.0 + uses "dd(1) the /boot/boot1.efifat file". FreeBSD 13.0 has a gptboot.efi in the /boot directory I was tempted to use 'gpart bootcode -p /boot/gptboot.efi' like writing the boot record on a ZFS system but was concerned about digging a bigger hole. Warner Losh has still another way of writing the EFI partition contents. Once the Handbook defines a 'standard' method, the /usr/src/UPDATING file can just reference it. Tom -- Public Keys: PGP KeyID = 0x5F22FDC1 GnuPG KeyID = 0x620836CF