On Wed, Nov 05, 2014 at 11:33:21PM -0500, Ted Unangst wrote:
> On Wed, Nov 05, 2014 at 23:04, John Merriam wrote:
> > Hello.  I am trying to create a 'headless' setup using a softraid crypto
> > root with serial console on OpenBSD 5.6-release amd64.
> > 
> > I have everything installed and working just fine, except I'm having a
> > problem getting the 'headless' part going.
> > 
> > I followed the instructions in section 7.6 of the FAQ at
> > http://www.openbsd.org/faq/faq7.html#SerCon   I edited /etc/ttys to
> > enable the getty for tty00.  I added 'set tty com0' to /etc/boot.conf
> > 
> > It doesn't seem to work though.  The Passphrase: prompt is still output
> > to pc0, not com0.
> > 
> > If I enter a bogus password at the Passphrase: prompt on pc0 to get to a
> > boot> prompt, I can enter 'set tty com0' after which I get a Passphrase:
> > prompt on com0 and everything works fine.
> > 
> > It seems like for some reason /etc/boot.conf is not being seen/used?  I
> > would guess it might have something to do with the softraid crypto root
> > setup but I don't know.
> 
> Right. boot.conf is encrypted, so of course it can't be read until
> after the passphrase has been read.
> 
> > Is there a bit that needs flipping somewhere to get the serial console
> > to work with crypto root?  Any info or pointers on this would be greatly
> > appreciated.  Thanks.
> 
> If you look in sys/arch/amd64/stand/libsa/bioscons.c you'll see two
> functions, pc_probe and com_probe, which set cn->cn_pri. You'll need
> to swap MIDPRI and LOWPRI and rebuild, then rerun installboot.
> 
> That either makes sense or is a bunch of gibberish. I haven't actually
> worked this out, so I can't give you a precise recipe.

Alternatively, you could make a small unencrypted "a" partition on the
disk with just an /etc/boot.conf file that contains the following:

set tty com0
boot sr0a:/bsd

Then do the crypto softraid install to another partition and it should
boot like you'd expect.

See: http://permalink.gmane.org/gmane.os.openbsd.misc/206003

Reply via email to