boot(8) 맨 페이지 - 윈디하나의 솔라나라

개요

섹션
맨 페이지 이름
검색(S)

boot(8)

System Administration Commands                                         boot(8)



NAME
       boot - start the system kernel or a standalone program

SYNOPSIS
   SPARC
       boot [OBP names] [file] [-aLV] [-F object] [-D default-file]
            [-Z dataset] [-B prop [=val]]
            [boot-flags] [−−] [client-program-args]

   x86
       kernel$ root_path/platform/i86pc/amd64/kernel/unix
            /platform/i86pc/amd64/kernel/unix [boot-args]
            [-B prop=[val]] [,prop[=[val]]...]]

DESCRIPTION
       Bootstrapping is the process of loading and executing a standalone pro‐
       gram. For the purpose  of  this  discussion,  bootstrapping  means  the
       process  of  loading and executing the bootable operating system. Typi‐
       cally, the standalone program is the operating system kernel (see  ker‐
       nel(8)),  but any standalone program can be booted instead. On a SPARC-
       based system, the diagnostic monitor for a machine is a good example of
       a  standalone  program  other  than  the  operating  system that can be
       booted.


       If the standalone is identified  as  a  dynamically-linked  executable,
       boot will load the interpreter (linker/loader) as indicated by the exe‐
       cutable format and then transfer control to  the  interpreter.  If  the
       standalone  is  statically-linked,  it will jump directly to the stand‐
       alone.


       Once the kernel is loaded, it starts the UNIX system, mounts the neces‐
       sary file systems (see vfstab(5)), and runs /usr/sbin/init to bring the
       system to the "initdefault" state specified in /etc/inittab. See  init‐
       tab(5).

   Verified Boot
       Verified  boot  in  Oracle Solaris secures a system's boot process. The
       feature protects the system from threats such as the following:

           o      Corruption of kernel modules


           o      Insertion or substitution of malicious  programs  that  mas‐
                  querade   as  legitimate  kernel  modules,  such  as  Trojan
                  viruses, spyware, and rootkits


           o      Installation of unauthorized third-party kernel modules



       Malicious programs can pass information to third  parties  as  well  as
       alter  the behavior of Oracle Solaris. Although third-party modules are
       typically non-malicious, they might violate policies that control  site
       changes.  Therefore, the system also needs protection from unauthorized
       installation of these modules.


       A firmware upgrade for some SPARC platforms may be required to use ver‐
       ified  boot.  For  more  information,  see the section Firmware Upgrade
       Needed for Verified Boot in Securing Systems and  Attached  Devices  in
       Oracle Solaris 11.4.


       In  Oracle  Solaris,  verified boot is configurable not only on systems
       but also on Kernel Zones and LDOMS.

       Note -




         By default, any domain created by using a version of Oracle VM Server
         for  SPARC  earlier than version 3.4 sets boot-policy=warning. If the
         kernel module is unsigned or corrupted, this setting results in warn‐
         ing  messages  being issued while the domain boots after an Oracle VM
         Server for SPARC update.




       For more information on verified boot, see the Using Verified Boot sec‐
       tion in Securing Systems and Attached Devices in Oracle Solaris 11.4.

   SPARC Bootstrap Procedure
       On  SPARC  based systems, the bootstrap procedure on most machines con‐
       sists of the following basic phases.


       After the machine is turned on, the system firmware (in PROM)  executes
       power-on self-test (POST). The form and scope of these tests depends on
       the version of the firmware in your system.


       After the tests have been completed successfully, the firmware attempts
       to  autoboot  if  the appropriate flag has been set in the non-volatile
       storage area used by the firmware. The name of the file  to  load,  and
       the device to load it from can also be manipulated.


       These  flags  and names can be set using the eeprom(8) command from the
       shell, or by using PROM commands from the ok prompt  after  the  system
       has been halted.


       The  second  level  program  is either a filesystem-specific boot block
       (when booting from a disk), or inetboot or wanboot (when booting across
       the network).


       Network Booting


       Network  booting  occurs  in  two steps: the client first obtains an IP
       address and any other parameters necessary to permit  it  to  load  the
       second-stage booter. The second-stage booter in turn loads the boot ar‐
       chive from the boot device.


       An IP address can be obtained in one of three ways: RARP, DHCP, or man‐
       ual configuration, depending on the functions available in and configu‐
       ration of the PROM. Machines of the  sun4v  kernel  architectures  have
       DHCP-capable PROMs.


       The boot command syntax for specifying the two methods of network boot‐
       ing are:

         boot net:rarp
         boot net:dhcp



       The command:

         boot net



       without a rarp or dhcp specifier, invokes the default method  for  net‐
       work booting over the network interface for which net is an alias.


       By  default,  network boot is performed using untagged Ethernet frames.
       On recent sun4v SPARC systems, it is possible to network  boot  over  a
       VLAN  that  requires  tagging by the client, rather than relying on the
       switch to provide automatic tagging. This functionality is  enabled  by
       specifying  the  VLAN id as a modifier to the net path, For example, to
       boot on VLAN 816, the command would be:

         boot net:vlan=816



       VLAN tagging is not supported with RARP configuration. When  specifying
       DHCP  configuration in the boot command, the vlan modifier must precede
       the dhcp modifier on the command line, for example:

         boot net:vlan=816,dhcp



       The sequence of events for network  booting  using  RARP/bootparams  is
       described  in  the  following paragraphs. The sequence for DHCP follows
       the RARP/bootparams description.


       When booting over the network using RARP/bootparams, the PROM begins by
       broadcasting  a  reverse  ARP request until it receives a reply. When a
       reply is received, the PROM then broadcasts a TFTP request to fetch the
       first block of inetboot. Subsequent requests will be sent to the server
       that initially answered the first block request. After  loading,  inet‐
       boot  will also use reverse ARP to fetch its IP address, then broadcast
       bootparams RPC calls (see bootparams(5)) to locate configuration infor‐
       mation  and  its root file system. inetboot then loads the boot archive
       by means of NFS and transfers control to that archive.


       When booting over the network using DHCP, the PROM broadcasts the hard‐
       ware  address  and kernel architecture and requests an IP address, boot
       parameters, and network configuration information. After a DHCP  server
       responds  and  is  selected  (from among potentially multiple servers),
       that server sends to the client an IP address and all other information
       needed  to  boot  the  client.  After  receipt of this information, the
       client PROM examines the name of the file to be loaded, and will behave
       in  one of two ways, depending on whether the file's name appears to be
       an HTTP URL. If it does not, the PROM downloads  inetboot,  loads  that
       file  into  memory,  and  executes it. inetboot loads the boot archive,
       which takes over the machine and  releases  inetboot.  Startup  scripts
       then  initiate the DHCP agent (see dhcpagent(8)), which implements fur‐
       ther DHCP activities.


       If the file to be loaded is an HTTP URL, the PROM will use HTTP to load
       the  referenced  file.  If  the client has been configured with an HMAC
       SHA-1 key, it will check the integrity of the loaded file  before  pro‐
       ceeding  to  execute it. The file is expected to be the wanboot binary.
       The WAN boot process can be configured to  use  either  DHCP  or  NVRAM
       properties  to  discover  the install server and router and the proxies
       needed to connect to it. When wanboot begins executing,  it  determines
       whether  sufficient  information is available to it to allow it to pro‐
       ceed. If any necessary information is missing, it will either exit with
       an  appropriate  error or bring up a command interpreter and prompt for
       further configuration information. Once wanboot has obtained the neces‐
       sary  information,  it  loads  the  boot loader into memory by means of
       HTTP. If an encryption key has been installed on  the  client,  wanboot
       will  verify  the  boot  loader's  signature and its accompanying hash.
       Presence of an encryption key but no hashing key is an error.


       The wanboot boot loader can communicate with the  client  using  either
       HTTP  or secure HTTP. If the former, and if the client has been config‐
       ured with an HMAC SHA-1 key, the boot loader will perform an  integrity
       check  of  the  root  file  system.  Once the root file system has been
       loaded into memory (and possibly had an integrity check performed), the
       boot  archive  is  transferred  from  the  server.  If  provided with a
       boot_logger URL by means of  the  wanboot.conf(5)  file,  wanboot  will
       periodically log its progress.


       Not  all PROMs are capable of consuming URLs. You can determine whether
       a client is so capable using the list-security-keys OBP command.


       WAN booting is not currently available on the x86 platform.


       The wanboot Command Line


       When the client program is wanboot, it accepts  client-program-args  of
       the form:

         boot ... -o opt1[,opt2[,...]]



       where each option may be an action:

       dhcp

           Require  wanboot  to  obtain  configuration  parameters by means of
           DHCP.


       prompt

           Cause wanboot to enter its command interpreter.


       <cmd>

           One of the interpreter commands listed below.



       ...or an assignment, using the  interpreter's  parameter  names  listed
       below.


       The wanboot Command Interpreter


       The  wanboot  command interpreter is invoked by supplying a client-pro‐
       gram-args of "-o prompt" when booting. Input consists  of  single  com‐
       mands  or assignments, or a comma-separated list of commands or assign‐
       ments. The configuration parameters are:

       host-ip

           IP address of the client (in dotted-decimal notation)


       router-ip

           IP address of the default router (in dotted-decimal notation)


       subnet-mask

           subnet mask (in dotted-decimal notation)


       client-id

           DHCP client identifier (a quoted ASCII string or hex ASCII)


       hostname

           hostname to request in DHCP transactions (ASCII)


       http-proxy

           HTTP proxy server specification (IPADDR[:PORT])



       The key names are:

       3des

           the triple DES encryption key (48 hex ASCII characters)


       aes

           the AES encryption key (32 hex ASCII characters)


       sha1

           the HMAC SHA-1 signature key (40 hex ASCII characters)



       Finally, the URL or the WAN boot CGI is referred to by means of:

       bootserver

           URL of WAN boot's CGI (the equivalent of OBP's file parameter)



       The interpreter accepts the following commands:

       help

           Print a brief description of the available commands


       var=val

           Assign val to var, where var is one of the configuration  parameter
           names, the key names, or bootserver.


       var=

           Unset parameter var.


       list

           List all parameters and their values (key values retrieved by means
           of OBP are never shown).


       prompt

           Prompt for values for unset parameters. The name of each  parameter
           and  its current value (if any) is printed, and the user can accept
           this value (press Return) or enter a new value.


       go

           Once the user is satisfied that all values have been entered, leave
           the interpreter and continue booting.


       quiet

           Does  not  print  progress messages to the console during wanbootfs
           and miniroot download. This reduces the likelihood of TCP  retrans‐
           missions  in  these  early stage downloads, which can significantly
           increase the download time.


       exit

           Quit the boot interpreter and return to OBP's ok prompt.



       Any of these assignments or commands can be passed on the command  line
       as  part  of  the -o options, subject to the OBP limit of 128 bytes for
       boot arguments. For example, -o   list,go  would  simply  list  current
       (default) values of the parameters and then continue booting.

   iSCSI Boot
       iSCSI boot is supported on both x86 and SPARC.

   iSCSI Boot on x86
       For  iSCSI  boot  on  x86,  the host being booted must be equipped with
       NIC(s) capable of iBFT (iSCSI Boot Firmware Table) or  have  the  main‐
       board's  BIOS be iBFT-capable. iBFT, defined in the Advanced Configura‐
       tion and Power Interface (ACPI) 3.0b specification, specifies  a  block
       of  information that contains various parameters that are useful to the
       iSCSI Boot process.


       Firmware implementing iBFT presents an iSCSI disk in  the  BIOS  during
       startup  as  a  bootable  device  by establishing the connection to the
       iSCSI target. The rest of the process of iSCSI booting is the  same  as
       booting from a local disk.


       To  configure  the iBFT properly, users need to refer to the documenta‐
       tion from their hardware vendors.

   iSCSI Boot on SPARC
       iSCSI boot on SPARC is supported with OpenBoot level  4.31  and  above,
       and does not require a specific NIC.


       The boot command in OpenBoot takes a series of keywords to identify the
       destination iSCSI target, following the keyword=value format. The  com‐
       plete form of the iSCSI boot command is:

         boot net:iscsi-target-ip=t-ip,iscsi-target-name=name
              host-ip=h-ip[,router-ip=r-ip]
              [,subnet-mask=m-ip]
              [,iscsi-port=port]
              [,iscsi-lun=lun]
              [,iscsi-partition=partition]



       The descriptions of the preceding keywords are as follows:

       host-ip              IP address of booting host.


       router-ip            IP address of routing gateway.


       subnet-mask          Subnet mask of host-ip.


       iscsi-target-ip      IP address of iSCSI target storing OS.


       iscsi-target-name    Name of iSCSI target storing OS.


       iscsi-partition      Partition containing the bootable root.


       iscsi-port           IP port of the target.


       iscsi-lun            LUN to be booted off on target.



       The  values  of iscsi-target-ip, route-ip, and subnet-mask are in stan‐
       dard, IPv4 dotted-decimal format; for example, 255.255.255.0  for  sub‐
       net-mask. IPv6 is not supported in the current OpenBoot implementation.


       The  value  of  iscsi-port,  a  decimal number, is in the range of 1 to
       65535.


       The value of iscsi-lun is in the format of a  dashed  hexadecimal  LUN,
       ffff-ffff-ffff-ffff. Please refer to section 5 of RFC 4173 for details.
       Leading zeroes and trailing dashes can be excluded, thus, 3, for  exam‐
       ple, is equivalent to 0003-0000-0000-0000.


       The  value  of  iscsi-partition is one ASCII character, used to specify
       the root partition. Most commonly, it is a.


       The value of iscsi-target-name is in the format of a string, as  speci‐
       fied by RFC 3720 and RFC 3722.


       Two  security keys are added to provide CHAP authentication on the tar‐
       get side. These are:

       chap-user        CHAP name


       chap-password    CHAP secret



       Currently these two keys can be set with  the  command  set-ascii-secu‐
       rity-key at the Open Boot PROM (ok) prompt. For example:

         ok set-ascii-security-key chap-user chap name
         ok set-ascii-security-key chap-password chap password



       Bi-directional authentication is not yet supported. These two variables
       can be changed only under the Open Boot PROM prompt.


       RFC 4173 is supported, to retrieve iSCSI boot information from  a  DHCP
       server. The DHCP server must specify the Root Path option for the boot‐
       ing client, after which the client can do an iSCSI boot by means of the
       simple command:

         boot net:dhcp



       Currently  the  key  boot-device  is used to retrieve the physical boot
       device path during iSCSI boot. This key is setup during Oracle  Solaris
       installation. A manually modified key value might break iSCSI boot.

   Booting from Disk
       When  booting  from  disk,  the  OpenBoot  PROM firmware reads the boot
       blocks from the partition specified as the boot device. This standalone
       booter  usually  contains a file reader capable of reading the boot ar‐
       chive.


       If the pathname to the standalone is relative (does not  begin  with  a
       slash),  the  second level boot will look for the standalone in a plat‐
       form-dependent search path. This path is guaranteed to  contain  /plat‐
       form/platform-name.  Many SPARC platforms next search the platform-spe‐
       cific path entry /platform/hardware-class-name. See  filesystem(7).  If
       the  pathname  is  absolute, boot will use the specified path. The boot
       program then loads the standalone at the appropriate address, and  then
       transfers control.


       Once the boot archive has been transferred from the boot device, Oracle
       Solaris can initialize and take  over  control  of  the  machine.  This
       process is further described in the "Boot Archive Phase," below, and is
       identical on all platforms.


       If the filename is not given on the command line  or  otherwise  speci‐
       fied,  for  example,  by  the boot-file NVRAM variable, boot chooses an
       appropriate default file to load based on what software is installed on
       the system and the capabilities of the hardware and firmware.


       The path to the kernel must not contain any whitespace.

   Booting from ZFS
       Booting  from  ZFS  differs  from booting from UFS in that, with ZFS, a
       device specifier identifies a storage pool, not a single root file sys‐
       tem.  A  storage  pool can contain multiple bootable datasets (that is,
       root file systems). Therefore, when booting from ZFS, it is not  suffi‐
       cient to specify a boot device. One must also identify a root file sys‐
       tem within the pool that was identified by the boot device. By default,
       the  dataset  selected  for booting is the one identified by the pool's
       bootfs property. This default selection can be overridden by specifying
       an  alternate bootable dataset with the -Z option. Use the -L option to
       list the bootable datasets within a ZFS pool.

   Boot Archive Phase
       The boot archive contains a file system image that is mounted using  an
       in-memory disk. The image is self-describing, specifically containing a
       file system reader in the boot block. This file  system  reader  mounts
       and  opens  the RAM disk image, then reads and executes the kernel con‐
       tained within it. By default, this kernel is in:

         /platform/`uname -i`/kernel/unix



       If booting from ZFS, the pathnames of both the archive and  the  kernel
       file  are  resolved in the root file system (that is, dataset) selected
       for booting as described in the previous section.


       The initialization of the kernel continues by loading necessary drivers
       and  modules  from  the in-memory filesystem until I/O can be turned on
       and the root filesystem mounted. Once the root filesystem  is  mounted,
       the in-memory filesystem is no longer needed and is discarded.

   OpenBoot PROM boot Command Behavior
       The OpenBoot boot command takes arguments of the following form:

         ok boot [device-specifier] [arguments]



       The default boot command has no arguments:

         ok boot



       If no device-specifier is given on the boot command line, OpenBoot typ‐
       ically uses the boot-device  or  diag-device   NVRAM  variable.  If  no
       optional  arguments  are  given on the command line, OpenBoot typically
       uses the boot-file or diag-file  NVRAM variable as default  boot  argu‐
       ments. (If the system is in diagnostics mode, diag-device and diag-file
       are used instead of boot-device and boot-file).


       arguments may include more than one string. All  argument  strings  are
       passed to the secondary booter; they are not interpreted by OpenBoot.


       If  any  arguments are specified on the boot command line, then neither
       the boot-file nor the diag-file  NVRAM variable is used.  The  contents
       of  the NVRAM variables are not merged with command line arguments. For
       example, the command:

         ok boot -s



       ignores the settings in both boot-file and diag-file; it interprets the
       string  "-s"  as arguments. boot will not use the contents of boot-file
       or diag-file.


       With older PROMs, the command:

         ok boot net



       took no arguments, using instead the settings in boot-file or diag-file
       (if  set)  as  the  default file name and arguments to pass to boot. In
       most cases, it is best to allow the boot command to choose an appropri‐
       ate  default  based upon the system type, system hardware and firmware,
       and upon what is installed on the root file system. Changing  boot-file
       or diag-file can generate unexpected results in certain circumstances.


       This behavior is found on most OpenBoot 2.x and 3.x based systems. Note
       that differences may occur on some platforms.


       The command:

         ok boot cdrom



       ...also normally takes no arguments. Accordingly, if boot-file  is  set
       to  the 64-bit kernel filename and you attempt to boot the installation
       CD or DVD with boot cdrom, boot will fail  if  the  installation  media
       contains only a 32-bit kernel.


       Because the contents of boot-file or diag-file can be ignored depending
       on the form of the boot command used, reliance upon boot-file should be
       discouraged for most production systems.


       When executing a WAN boot from a local (CD or DVD) copy of wanboot, one
       must use:

         ok boot cdrom -F wanboot - install



       Modern PROMs have enhanced the network boot support package to  support
       the following syntax for arguments to be processed by the package:


       [protocol,] [key=value,]*


       All  arguments  are  optional  and  can appear in any order. Commas are
       required unless the argument is at the end of the list.  If  specified,
       an  argument  takes  precedence over any default values, or, if booting
       using DHCP, over configuration information provided by  a  DHCP  server
       for those parameters.


       protocol, above, specifies the address discovery protocol to be used.


       Configuration  parameters,  listed  below,  are  specified as key=value
       attribute pairs.

       tftp-server

           IP address of the TFTP server


       file

           file to download using TFTP or URL for WAN boot


       host-ip

           IP address of the client (in dotted-decimal notation)


       router-ip

           IP address of the default router


       subnet-mask

           subnet mask (in dotted-decimal notation)


       client-id

           DHCP client identifier


       hostname

           hostname to use in DHCP transactions


       http-proxy

           HTTP proxy server specification (IPADDR[:PORT])


       tftp-retries

           maximum number of TFTP retries


       dhcp-retries

           maximum number of DHCP retries



       The list of arguments to be processed by the network boot support pack‐
       age is specified in one of two ways:

           o      As arguments passed to the package's open method, or


           o      arguments  listed  in  the NVRAM variable network-boot-argu‐
                  ments.



       Arguments specified in network-boot-arguments will be processed only if
       there are no arguments passed to the package's open method.


       Argument Values


       protocol  specifies  the  address  discovery  protocol  to  be used. If
       present, the possible values are rarp or dhcp.


       If other configuration parameters are specified in the new  syntax  and
       style  specified  by  this  document, absence of the protocol parameter
       implies manual configuration.


       If no other configuration parameters are specified, or if  those  argu‐
       ments  are  specified in the positional parameter syntax currently sup‐
       ported, the absence of the protocol parameter causes the  network  boot
       support  package to use the platform-specific default address discovery
       protocol.


       Manual configuration requires  that  the  client  be  provided  its  IP
       address,  the name of the boot file, and the address of the server pro‐
       viding the boot file image. Depending on the network configuration,  it
       might be required that subnet-mask and router-ip also be specified.


       If  the  protocol  argument  is not specified, the network boot support
       package uses the platform-specific default address discovery protocol.


       tftp-server is the IP address (in standard  IPv4  dotted-decimal  nota‐
       tion)  of  the  TFTP server that provides the file to download if using
       TFTP.


       When using DHCP, the value, if specified, overrides the  value  of  the
       TFTP server specified in the DHCP response.


       The  TFTP  RRQ is unicast to the server if one is specified as an argu‐
       ment or in the DHCP response. Otherwise, the TFTP RRQ is broadcast.


       file specifies the file to be loaded by TFTP from the TFTP  server,  or
       the URL if using HTTP. The use of HTTP is triggered if the file name is
       a URL, that is, the file name starts with http: (case-insensitive).


       When using RARP and TFTP, the default file name is the ASCII  hexadeci‐
       mal  representation of the IP address of the client, as documented in a
       preceding section of this document.


       When using DHCP, this argument, if specified, overrides the name of the
       boot file specified in the DHCP response.


       When using DHCP and TFTP, the default file name is constructed from the
       root node's name property, with commas (,) replaced by periods (.).


       When specified on the command  line,  the  filename  must  not  contain
       slashes (/).


       The  format  of  URLs is described in RFC 2396. The HTTP server must be
       specified as an IP address (in standard IPv4 dotted-decimal  notation).
       The  optional  port  number  is  specified in decimal. If a port is not
       specified, port 80 (decimal) is implied.


       The URL presented must be "safe-encoded", that is, the package does not
       apply  escape  encodings  to  the URL presented. URLs containing commas
       must be presented as a quoted string. Quoting URLs is  optional  other‐
       wise.


       host-ip specifies the IP address (in standard IPv4 dotted-decimal nota‐
       tion) of the client, the system being booted.  If  using  RARP  as  the
       address  discovery protocol, specifying this argument makes use of RARP
       unnecessary.


       If DHCP is used, specifying the host-ip argument causes the  client  to
       follow  the  steps  required of a client with an "Externally Configured
       Network Address", as specified in RFC 2131.


       router-ip is the IP address (in standard IPv4 dotted-decimal  notation)
       of a router on a directly connected network. The router will be used as
       the first hop for communications spanning networks. If this argument is
       supplied, the router specified here takes precedence over the preferred
       router specified in the DHCP response.


       subnet-mask (specified in standard IPv4 dotted-decimal notation) is the
       subnet mask on the client's network. If the subnet mask is not provided
       (either by means of this argument or in the DHCP response), the default
       mask appropriate to the network class (Class A, B, or C) of the address
       assigned to the booting client will be assumed.


       client-id specifies the unique identifier  for  the  client.  The  DHCP
       client identifier is derived from this value. Client identifiers can be
       specified as:

           o      The ASCII hexadecimal representation of the identifier, or


           o      a quoted string



       Thus, client-id="openboot" and client-id=6f70656e626f6f74  both  repre‐
       sent a DHCP client identifier of 6F70656E626F6F74.


       Identifiers  specified  on the command line must must not include slash
       (/) or spaces.


       The maximum length of the DHCP client identifier is  32  bytes,  or  64
       characters  representing  32 bytes if using the ASCII hexadecimal form.
       If the latter form is used, the number of characters in the  identifier
       must be an even number. Valid characters are 0-9, a-f, and A-F.


       For  correct  identification  of clients, the client identifier must be
       unique among the client identifiers used on the  subnet  to  which  the
       client  is attached. System administrators are responsible for choosing
       identifiers that meet this requirement.


       Specifying a client identifier on a command line takes precedence  over
       any other DHCP mechanism of specifying identifiers.


       hostname  (specified  as a string) specifies the hostname to be used in
       DHCP transactions. The name might or might not be  qualified  with  the
       local  domain  name.  The maximum length of the hostname is 255 charac‐
       ters.

       Note -



         The hostname parameter can  be  used  in  service  environments  that
         require  that  the  client  provide  the desired hostname to the DHCP
         server. Clients provide the desired  hostname  to  the  DHCP  server,
         which  can  then register the hostname and IP address assigned to the
         client with DNS.



       http-proxy is specified in the following standard notation for a host:

         host [":"" port]



       ...where host is specified as an IP address (in standard  IPv4  dotted-
       decimal  notation)  and the optional port is specified in decimal. If a
       port is not specified, port 8080 (decimal) is implied.


       tftp-retries is the maximum number of retries  (specified  in  decimal)
       attempted  before  the  TFTP  process  is  determined  to  have failed.
       Defaults to using infinite retries.


       dhcp-retries is the maximum number of retries  (specified  in  decimal)
       attempted  before  the  DHCP  process  is  determined  to  have failed.
       Defaults to of using infinite retries.

   x86 Bootstrap Procedure
       On x86 based systems, the bootstrapping process consists of two concep‐
       tually  distinct phases, kernel loading and kernel initialization. Ker‐
       nel loading is implemented in GRUB (GRand Unified Bootloader) using the
       firmware on the system board and firmware extensions in ROMs on periph‐
       eral boards. The system firmware loads GRUB. The loading mechanism dif‐
       fers,  depending  on the type of system firmware that is shipped on the
       system board.


       For systems with BIOS firmware, the first physical  sector  of  a  hard
       disk (known as the boot sector) is loaded into memory and its code exe‐
       cuted. Traditionally, this code has inspected the DOS partition  table,
       has  found  the  partition marked as the active one, and has loaded the
       first sector from that partition into memory, and  (finally)  has  exe‐
       cuted  that  code. Disks that are partitioned with the GPT (GUID Parti‐
       tion Table) must have boot sector code that behaves differently,  load‐
       ing code from another location (because the GPT scheme does not reserve
       the first sector of each partition for boot sector  code  storage).  In
       the  case  of  GRUB  running on BIOS firmware, that other location is a
       dedicated partition known as the BIOS Boot Partition. Once GRUB's  boot
       sector  code  loads the rest of GRUB into memory, the boot process con‐
       tinues in earnest. Booting from a DVD, the firmware's  reading  special
       data  structures  (defined  by the El Torito Bootable CD Specification)
       from the disc and loading sectors from the DVD into memory, as  defined
       by  those  structures. These sectors comprise the first stage boot pro‐
       gram. This boot program then loads the next stage, which, in  the  case
       of  Oracle  Solaris,  is GRUB itself. Booting from the network is yet a
       different process on BIOS systems. Bootable  network  adapters  include
       firmware  that  complies  with  the PXE (Preboot eXecution Environment)
       specification.  When  activated,  the  PXE  firmware  performs  a  DHCP
       exchange  on  the  network,  and  downloads  the BootFile that the DHCP
       server included in the DHCP response from the TFTP server that is  also
       in  the  DHCP response. For Oracle Solaris, this BootFile (pxegrub2, or
       equivalent) is GRUB itself. GRUB then proceeds, ultimately, to download
       the  UNIX kernel and the boot archive (see below), loads them into mem‐
       ory, and transfers control to UNIX.


       For systems with UEFI-based firmware, the boot process is quite differ‐
       ent.  The  UEFI  firmware  looks  for the EFI System Partition (ESP) on
       disks that it has enumerated, and loads and executes UEFI boot programs
       according  to  a  UEFI-specification-defined process. The net result is
       that a UEFI boot application is loaded into memory  and  executed.  For
       Oracle  Solaris,  that  UEFI  boot  application is GRUB, which has been
       specifically built to run as a UEFI boot application. The boot  process
       then  continues largely as it does on systems with BIOS firmware. Boot‐
       ing from a DVD also involves a search for a UEFI boot application,  but
       the  search  method  is quite different and uses data structures on the
       DVD defined by the El Torito Bootable CD Specification. The UEFI speci‐
       fication defines how the El Torito specification is used to locate UEFI
       boot applications. The boot process for network boot on a  UEFI  system
       is very similar to that of a BIOS system, except that UEFI systems make
       a slightly different DHCP  request,  which  provides  the  DHCP  server
       enough  information  to customize the BootFile that is returned for the
       UEFI system. Recall that UEFI systems require UEFI  boot  applications,
       not  BIOS-targeted  boot programs, which would otherwise be returned as
       the BootFile from the DHCP  server.  Once  the  UEFI  boot  application
       (which  is  GRUB itself) specified in the BootFile (grub2netx64.efi, or
       equivalent) is downloaded to the UEFI client, it (GRUB) is executed. As
       with  the BIOS network boot process, GRUB downloads the UNIX kernel and
       boot archive from the DHCP-specified TFTP server, loads them into  mem‐
       ory, then transfers control to UNIX.


       Once  GRUB is running, it executes script commands in its configuration
       file, grub.cfg, and, when directed to do so, loads the  Oracle  Solaris
       kernel  (UNIX  kernel) and a pre-constructed boot archive that contains
       kernel modules and essential data required for boot.


       If the device identified by GRUB as the  boot  device  contains  a  ZFS
       storage  pool,  the  grub.cfg file used to create the GRUB menu will be
       found in the pool's top level dataset. (This is the  dataset  with  the
       same name as the pool itself.) There is always exactly one such dataset
       in a pool, so this dataset is well-suited for pool-wide  data  such  as
       the GRUB configuration files and data. After the system is booted, this
       dataset is mounted at /poolname in the root file system.


       There can be multiple bootable datasets (that is,  root  file  systems)
       within  a pool. The default root file system in a pool is identified by
       the pool's bootfs property (see zpool(8)). If a specific  bootfs  (file
       system  consistent  with the naming scheme /root/name) is not specified
       (by means of the zfs-bootfs command in a GRUB menuentry  block  in  the
       grub.cfg),  the default bootfs root file system is used. Each GRUB menu
       entry may specify the bootfs to  use,  enabling  the  administrator  to
       select from many bootable Oracle Solaris instances in a pool.


       Kernel  initialization  starts  when GRUB finishes loading the boot ar‐
       chive and hands control over to the unix binary. At  this  point,  GRUB
       becomes  inactive and no more I/O occurs with the boot device. The UNIX
       operating system initializes, links in the necessary modules  from  the
       boot  archive  and mounts the root file system on the real root device.
       At this point, the kernel regains storage I/O, mounts  additional  file
       systems  (see  vfstab(5)), and starts various operating system services
       (see smf(7)).

   Enabling Automatic Rebooting (x86)
       The Oracle Solaris operating system supports an  smf(7)  property  that
       enables  a system to automatically reboot from the current boot device,
       to recover from conditions such as an out-of-date boot archive.


       The service svc:/system/boot-config:default contains the boolean  prop‐
       erty  auto-reboot-safe, which is set to false by default. Setting it to
       true communicates that both the system's firmware and default GRUB menu
       entry  are  set to boot from the current boot device. The value of this
       property can be changed using svccfg(8) and svcadm(8). For example,  to
       set  auto-reboot-safe  to  enable  automatic rebooting, enter a command
       such as:

         example# svccfg -s svc:/system/boot-config:default \
               setprop config/auto-reboot-safe = true



       Most systems are configured for automatic reboot from the current  boot
       device.  However,  in some instances, automatic rebooting to an unknown
       operating  system  might  produce  undesirable   results.   For   these
       instances,  the  auto-reboot-safe  property  allows  you to specify the
       behavior you want.

   Failsafe Mode
       A requirement of booting from a root filesystem image built into a boot
       archive  then  remounting  root onto the actual root device is that the
       contents of the boot archive and the root filesystem  must  be  consis‐
       tent. Otherwise, the proper operation and integrity of the machine can‐
       not be guaranteed.


       The term "consistent" means that all files  and  modules  in  the  root
       filesystem are also present in the boot archive and have identical con‐
       tents. Since the boot strategy requires first reading and mounting  the
       boot  archive as the first-stage root image, all unloadable kernel mod‐
       ules and initialization derived from the contents of the  boot  archive
       are  required  to  match the real root filesystem. Without such consis‐
       tency, it is possible that the system could be running  with  a  kernel
       module  or  parameter setting applied to the root device before reboot,
       but not yet updated in  the  root  archive.  This  inconsistency  could
       result in system instability or data loss.


       Once  the  root filesystem is mounted, and before relinquishing the in-
       memory filesystem, Oracle Solaris performs a  consistency  verification
       against  the  two file systems. If an inconsistency is detected, Oracle
       Solaris will automatically try to fix it and reboot into the same  boot
       environment.  If  this  fails  (or if the system is an x86 machine that
       does not support fast reboot and has auto-reboot-safe not set to true),
       then  the  failsafe  mode will be entered. Correcting the inconsistency
       requires the administrator take one of two steps. The recommended  pro‐
       cedure  is  to  reboot to a boot environment known to be consistent and
       rebuild the boot archive. This ensures that a known  kernel  is  booted
       and  functioning  for  the  archive rebuild process. Alternatively, the
       administrator can elect to clear the inconsistent boot archive  service
       state  and  continue  system bring-up if the inconsistency is such that
       correct system operation will not be impaired. See svcadm(8).


       If the boot archive service is cleared and system bring-up is continued
       (the  second alternative above), the system may be running with unload‐
       able kernel drivers or other modules that are out-of-date with  respect
       to  the  root filesystem. As such, correct system operation may be com‐
       promised.


       To ensure that the boot archive is consistent, the normal system  shut‐
       down process, as initiated by reboot(8) and shutdown(8), checks for and
       applies updates to the boot archive at the conclusion of the  umountall
       milestone.


       An  update  to  any kernel file, driver, module or driver configuration
       file that needs to be included in the boot archive after the  umountall
       service  is  complete  will result in a failed boot archive consistency
       check during the next boot. To avoid this, it is recommended to  always
       shut down a machine cleanly.


       If  an  update is required to the kernel after completion of the umoun‐
       tall service, the administrator may elect to  rebuild  the  archive  by
       invoking:

         # bootadm update-archive


OPTIONS
   SPARC
       The following SPARC options are supported:

       -a

           The  boot  program  interprets  this flag to mean ask me, and so it
           prompts for the name of the  standalone.  The  '-a'  flag  is  then
           passed to the standalone program.


       -B prop[=[val]]...

           One  or more properties, optionally with values to be passed to the
           kernel. Multiple  properties  may  be  supplied  with  separate  -B
           options  or  separated  by  a  comma. Properties without values are
           treated as boolean. Property names must meet  the  requirements  of
           IEEE 1275-1994.


       -D default-file

           Explicitly  specify the default-file. On some systems, boot chooses
           a dynamic default file, used when none is otherwise specified. This
           option allows the default-file to be explicitly set and can be use‐
           ful when booting kmdb(1) since, by default, kmdb loads the default-
           file as exported by the boot program.


       -F object

           Boot  using the named object. The object must be either an ELF exe‐
           cutable or bootable object containing a boot block. The primary use
           is to boot the failsafe or wanboot boot archive.


       -L

           List the bootable datasets within a ZFS pool. You can select one of
           the bootable datasets in the list, after  which  detailed  instruc‐
           tions  for  booting  that  dataset are displayed. Boot the selected
           dataset by following the instructions.  This  option  is  supported
           only when the boot device contains a ZFS storage pool.


       -V

           Display verbose debugging information.


       boot-flags

           The boot program passes all boot-flags to file. They are not inter‐
           preted by boot. See the kernel(8)  and  kmdb(1)  manual  pages  for
           information about the options available with the default standalone
           program.


       client-program-args

           The boot program passes all client-program-args to file.  They  are
           not interpreted by boot.


       file

           Name  of a standalone program to boot. If a filename is not explic‐
           itly specified, either on the boot command line or in the boot-file
           NVRAM variable, boot chooses an appropriate default filename.


       OBP names

           Specify  the open boot prom designations. For example, on an Oracle
           T3-2                                                        system,
           /pci@400/pci@1/pci@0/pci@4/scsi@0/disk@w5000cca0153966b9,0   refers
           to LUN 0 of a SAS disk attached to the onboard SAS controller.


       -Z dataset

           Boot from the root file system in the specified ZFS dataset.


   x86
       The following x86 options are supported:

       -B prop=val...

           One or more properties, optionally with values to be passed to  the
           kernel.  Multiple  properties  may  be  supplied  with  separate -B
           options or separated by a comma. Properties without values are  set
           to  "true".  Use  of  this option is the equivalent of the command:
           eeprom prop=val. See eeprom(8) for available properties  and  valid
           values.


       boot-args

           The  boot program passes all boot-args to file. They are not inter‐
           preted by boot. See kernel(8) and kmdb(1) for information about the
           options available with the kernel.



       Unless   otherwise   specified,   an   x86   system  will  boot  /plat‐
       form/i86pc/kernel/amd64/unix.

X86 BOOT SEQUENCE DETAILS
       After a PC-compatible machine is turned on, the  system  firmware  exe‐
       cutes  a  power-on self test (POST), runs BIOS extensions in peripheral
       board ROMs, and locates and installs firmware extensions  from  periph‐
       eral  board  ROMs,  and begins the boot process through a firmware-spe‐
       cific mechanism.


       For BIOS systems, software interrupt INT 19h is executed. The  INT  19h
       handler  typically performs the standard PC-compatible boot, which con‐
       sists of trying to read the first physical sector from the  first  hard
       disk. The processor then jumps to the first byte of the sector image in
       memory.


       For UEFI firmware,  the  process  is  quite  different,  as  previously
       explained in the "x86 Bootstrap Procedure" section, above.

X86 PRIMARY BIOS BOOT
       The  first  sector  on  a  disk  medium contains the master boot record
       (which is either GRUB's first stage loader if GRUB is installed in  the
       MBR,  or another boot loader). This code is responsible for loading the
       next stage boot loader. For GRUB, that means loading the rest  of  GRUB
       into  memory.  Once  that is done, GRUB is fully functional. It locates
       the GRUB prefix (the directory that  contains  the  GRUB  configuration
       file and GRUB loadable modules) and reads and executes the GRUB config‐
       uration file /boot/grub/grub.cfg. A similar sequence occurs for DVD  or
       CD  boot, but the master boot record location and contents are dictated
       by the El Torito specification (as previously described).


       The first sector on a hard disk contains the master boot record  (MBR),
       which  contains  the  master  boot  program and the DOS partition table
       (also referred to as the FDISK table, named for the program that  main‐
       tained  it in DOS). If the disk is partitioned with the GPT scheme, the
       master boot program must be specialized to load  the  next  stage  boot
       loader  into  memory  from a safe location on the disk. That safe loca‐
       tion, in the case of GRUB, is a special GPT partition called  the  BIOS
       Boot  Partition  (BBP).  This partition does not contain a file system,
       just empty space in which the second stage portion of GRUB can  reside.
       It  is from the BBP that the master boot program completes GRUB's load‐
       ing.


       If the disk is partitioned with the traditional DOS scheme, the  master
       boot  program  finds  the  active partition in the DOS partition table,
       loads its first sector, and jumps to that which it loaded into  memory.
       This  completes  the standard PC-compatible hard disk boot sequence. If
       GRUB's first stage is installed in the MBR (see the -m  option  of  the
       bootadm(8)   install-bootloader subcommand), then the remainder of GRUB
       is loaded directly from the Oracle Solaris DOS partition, regardless of
       the active partition.


       The Oracle Solaris DOS partition begins with a one-cylinder boot slice,
       which contains GRUB's first stage loader in the first sector, the stan‐
       dard  Oracle  Solaris disk label and volume table of contents (VTOC) in
       the second and third sectors, and the GRUB second stage loader  in  the
       fiftieth and subsequent sectors. The area from sector 4 to 49 is unused
       (because it had been used to store boot blocks for  older  versions  of
       Oracle Solaris). When the DOS partition for the Oracle Solaris software
       is the active partition, the master boot program  (mboot,  the  generic
       master  boot  program) loads the partition boot program from the Oracle
       Solaris partition's first sector into memory and jumps to  it.  It,  in
       turn,  reads  GRUB's  second  stage loader into memory and jumps to it.
       Once the GRUB menu is displayed, the user can choose to boot an operat‐
       ing system on a different partition, a different disk, or possibly from
       the network (provided the proper firmware support is present).


       For network booting, the supported method is Intel's Preboot  eXecution
       Environment  (PXE)  standard.  When booting from the network using PXE,
       the system or network adapter BIOS uses DHCP to locate a network  boot‐
       strap  program  (pxegrub2)  on a boot server and reads it using Trivial
       File Transfer Protocol (TFTP). The BIOS executes the pxegrub2 by  jump‐
       ing  to  its first byte in memory. The pxegrub program downloads a con‐
       figuration file and presents the entries to user.

X86 KERNEL STARTUP
       The kernel  startup  process  is  independent  of  the  kernel  loading
       process.  During  kernel startup, console I/O goes to the device speci‐
       fied by the console property.


       When booting from UFS, the root device is  specified  by  the  bootpath
       property,  and  the  root  file  system type is specified by the fstype
       property. These properties  should  be  setup  by  the  Oracle  Solaris
       Install/Upgrade process in /boot/solaris/bootenv.rc and can be overrid‐
       den with the -B option, described above (see the eeprom(8) man page).


       When booting from ZFS, the root device is specified by a  set  of  boot
       parameters  specified on the multiboot command line in the GRUB menuen‐
       try. These boot parameters are synthesized by the GRUB zfs-bootfs  com‐
       mand  and  are  stored  in  the GRUB environment variable whose name is
       specified as the second argument to zfs-bootfs. This variable  is  then
       supplied,  along  with the -B kernel argument to pass vital ZFS parame‐
       ters that identify the root filesystem to  the  kernel.  (The  previous
       version  of Oracle Solaris GRUB used the substitution macro $ZFS-BOOTFS
       for this purpose. This is no longer supported, because  $ZFS-BOOTFS  is
       not a valid GRUB variable name.)


       If  the  console  is not specified as a kernel argument, the console is
       derived from the /boot/solaris/bootenv.rc on the root  file  system  of
       the  Oracle  Solaris instance that is being booted. If no console vari‐
       able is present in that file, the default console device is set to  the
       graphical text console, and system keyboard (USB and PS/2 keyboards are
       supported).


       It is important to note that the Oracle Solaris console can be  config‐
       ured  differently  from the GRUB console. For example, the GRUB console
       can be configured (see bootadm(8)'s set-menu  subcommand)  to  use  the
       screen  and  keyboard,  while  Oracle Solaris uses the serial port. The
       console transition will occur when GRUB  transfers  control  to  Oracle
       Solaris when the menu entry is booted.

EXAMPLES
   SPARC
       Example 1 To Boot the Default Kernel In Single-User Interactive Mode



       To  boot the default kernel in single-user interactive mode, respond to
       the ok prompt with one of the following:


         boot -as

         boot disk3 -as



       Example 2 Network Booting with WAN Boot-Capable PROMs



       To illustrate some of the subtle repercussions of various boot  command
       line  invocations,  assume  that the network-boot-arguments are set and
       that net is devaliased as shown in the commands below.



       In the following command, device arguments in the device alias are pro‐
       cessed by the device driver. The network boot support package processes
       arguments in network-boot-arguments.


         boot net




       The command below results in no device arguments. The network boot sup‐
       port package processes arguments in network-boot-arguments.


         boot net:




       The command below results in no device arguments. rarp is the only net‐
       work boot support package argument. network-boot-arguments is ignored.


         boot net:rarp




       In the command below, the specified device arguments are  honored.  The
       network  boot support package processes arguments in network-boot-argu‐
       ments.


         boot net:speed=100,duplex=full



       Example 3 Using wanboot with Older PROMs



       The command below results in the wanboot binary being loaded  from  DVD
       or  CD,  at which time wanboot will perform DHCP and then drop into its
       command interpreter to allow the user to enter keys and any other  nec‐
       essary configuration.


         boot cdrom -F wanboot -o dhcp,prompt



   x86
       Example 4 To Boot the Default Kernel in Single-User Interactive Mode



       To  boot  the  default kernel in single-user interactive mode, edit the
       GRUB multiboot2 command line to read:


         multiboot2 root_path/platform/i86pc/kernel/amd64/unix \
         /platform/i86pc/kernel/amd64/unix -as



FILES
       /etc/inittab

           Table in which the initdefault state is specified


       /usr/sbin/init

           Program that brings the system to the initdefault state


   SPARC Only
       /platform/platform-name/kernel/sparcv9/unix

           Default program to boot system.


   x86 Only
       /boot

           Directory containing boot-related files.


       /rpool/boot/grub/grub.cfg

           Menu of bootable operating systems displayed by GRUB. /rpool  is  a
           common  convention.  The pathname is configurable, depending on the
           capabilities of your installer. This file should  never  be  edited
           directly,  as  it is auto-generated without notice. For an adminis‐
           trator-editable file, see custom.cfg, listed below.


       /rpool/boot/grub/custom.cfg

           Administrator-customizable supplemental  GRUB  configuration  file.
           This file is "sourced" by grub.cfg after all other system-generated
           grub.cfg content is processed. This file will  never  be  automati‐
           cally  overwritten,  and  can  contain any valid GRUB configuration
           file syntax.


       /rpool/boot/grub/menu.conf

           Data file used by the Oracle  Solaris  boot  administration  infra‐
           structure  to  store  details  of boot loader configuration that is
           ultimately used to build the GRUB configuration file (grub.cfg).


       /platform/i86pc/kernel/amd64/unix

           Default program to boot system.


SEE ALSO
       kmdb(1), uname(1),  uadmin(2),  bootparams(5),  inittab(5),  vfstab(5),
       wanboot.conf(5), attributes(7), filesystem(7), smf(7), bootadm(8), eep‐
       rom(8), init(8), kernel(8), shutdown(8), svcadm(8), svccfg(8), zpool(8)

       RFC 903, A Reverse Address Resolution Protocol

           https://www.ietf.org/rfc/rfc903.txt


       RFC 2131, Dynamic Host Configuration Protocol

           https://www.ietf.org/rfc/rfc2131.txt


       RFC 2132, DHCP Options and BOOTP Vendor Extensions

           https://www.ietf.org/rfc/rfc2132.txt


       RFC 2396, Uniform Resource Identifiers (URI): Generic Syntax

           https://www.ietf.org/rfc/rfc2396.txt



       Booting and Shutting Down Oracle Solaris 11.4 Systems


       Oracle OpenBoot 4.x Administration Guide

WARNINGS
       The boot utility is unable to determine which  files  can  be  used  as
       bootable  programs.  If  the  booting of a file that is not bootable is
       requested, the boot utility loads it and branches to it.  What  happens
       after that is unpredictable.

NOTES
       platform-name  can  be found using the -i option of uname(1). hardware-
       class-name can be found using the -m option of uname(1).



Oracle Solaris 11.4               25 Mar 2020                          boot(8)
맨 페이지 내용의 저작권은 맨 페이지 작성자에게 있습니다.
RSS ATOM XHTML 5 CSS3