X-Original-To: alpine-user@lists.alpinelinux.org Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-oln040092069013.outbound.protection.outlook.com [40.92.69.13]) by lists.alpinelinux.org (Postfix) with ESMTP id 657ABF83166 for ; Sun, 10 Feb 2019 18:36:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zP3rw166nUkbB2qVT9phSAkDMGTWIOKzP8cEwu7rYtk=; b=ri297fsJltK5MHt61s/bb6/XLoojgrEfZl45pxFteqm5cUy7buJ1P15yOi70qXumD9oI17ZTPbu/fT1lAx5Wix4C+WswHQbLtZzGQwSy4W8EpP/c5PlopCNRewQFB+6VhZ0St6nk6yFUfpUyv1AiRzreJH5l+OkbylWgyssotBi28mn5BK2lkNO/AdR22tQvjPEWSQPFvBnLKBBMqn6pq6NF5SMxJyC8pz7dZRDKL4vex5ddYHOyoXB1v8AlPSo2aHhxI0w9aTSoCCq7rinn/yw048dXjpkkbsh6eF1fZbzUTKE5eekxoN+i1hWnA2LQyfFzh+RGgtvt1mIQBMy0jQ== Received: from AM5EUR02FT011.eop-EUR02.prod.protection.outlook.com (10.152.8.59) by AM5EUR02HT216.eop-EUR02.prod.protection.outlook.com (10.152.9.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1580.10; Sun, 10 Feb 2019 18:36:08 +0000 Received: from AM0PR0402MB3699.eurprd04.prod.outlook.com (10.152.8.54) by AM5EUR02FT011.mail.protection.outlook.com (10.152.8.101) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1580.10 via Frontend Transport; Sun, 10 Feb 2019 18:36:08 +0000 Received: from AM0PR0402MB3699.eurprd04.prod.outlook.com ([fe80::6d76:4137:b962:60d]) by AM0PR0402MB3699.eurprd04.prod.outlook.com ([fe80::6d76:4137:b962:60d%4]) with mapi id 15.20.1601.023; Sun, 10 Feb 2019 18:36:05 +0000 From: Marco Boom To: "alpine-user@lists.alpinelinux.org" Subject: [alpine-user] RE: Boot Issue: How do I setup Xen with dom 0 Alpine Linux, LUKS LVM and GRUB on a UEFI platform? Thread-Topic: Boot Issue: How do I setup Xen with dom 0 Alpine Linux, LUKS LVM and GRUB on a UEFI platform? Thread-Index: AQHUt02KLGoMo/eN6USXj32lLQ5Lh6XZcA87gAAAKfc= Date: Sun, 10 Feb 2019 18:36:05 +0000 Message-ID: References: , In-Reply-To: Accept-Language: nl-NL, en-US Content-Language: nl-NL X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-incomingtopheadermarker: OriginalChecksum:FB094280E4926425840252DD79B887F4FA905D422BE753703A0C88793A352E8A;UpperCasedChecksum:A2F299DDBEBFFE9C7C984964BCE505975C4E86F5535F6D85F43A9BA0E5C0E8C1;SizeAsReceived:7233;Count:45 x-ms-exchange-messagesentrepresentingtype: 1 x-tmn: [z2WqqpiU68vE/hIHVb5nCcBeHisNH5U9] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;AM5EUR02HT216;6:bMQSA3WCO1YtwUPlUQNNteQViYNq+1jLzFHEHjq7HLMi2LEXypg4S36yqjnlePaFoZUb3YpAaX4tq/LGKKzBZK1fXxckXXZKGL25ueRltScPJ2+JlxGt/2YUA6Xlw8sYs2eCKL/Y29GjRHesENQZuodWPN3EkHj1iB7LVsR7RkrFtk9kE1NVQrWFX9ahxMOxFzkaudUV4OQXBmEvrwIpNSJa2WOz040kcmL2BoAQs82oYABhag89ZeDiR+y5UBU3LMwFBl75wQBu1O6kGRPTOWdDc27+UOhO36tDGqI4WyIx8wWoD/xAhNNrdqY9DP/aabPiu9EsajMo3KWDiYsbBuy2hg2xnyM+BRSMI/XSQ09ATrSp5iFFPZAekks3cT7UVWyNYmVRhFvsV7rQFFPL66PRCYeiGadj8pUz1WChtlOg4SSogpGxp8mkyZ+tHY2VZP20tfbOplJsfYRV77nJ6g==;5:RtJ8XuUlLprGcSN49aWYKxB40h6D2mJZ/hPpjMX4ZWKkFGmMWdX5OhAZyyzhWc8t6CzyfGs1CXHEgHFGhCoqkA46NWi07KEd+U0ptiBOMx9icMuL6ypcIPg8G3szbLJIdi4D7kMUNMeBNU7Ixqjo7AYZrWPyD+eQv9PFwDOlwZewvt/AryrZzF6VKLAUwqX+Iy/RqNVRzQODuwztwe2/aQ==;7:F0iNbJDp+Stx4L4xdIjVVQbvacQ4B592H1LzQOLxu8U5MiI5ZgBcOJSd7vmnBDTgKVtSe3js/lCU4OuyBNqdPUT+j8mgJcvA14EwD0bds6fI8Qg3RWxu7iq+LzRyj8oj7KxEy4n3qpeULo8sbIU1wA== x-incomingheadercount: 45 x-eopattributedmessage: 0 x-microsoft-antispam: BCL:0;PCL:0;RULEID:(2390118)(7020095)(201702061078)(5061506573)(5061507331)(1603103135)(2017031320274)(2017031322404)(2017031323274)(2017031324274)(1601125500)(1603101475)(1701031045);SRVR:AM5EUR02HT216; x-ms-traffictypediagnostic: AM5EUR02HT216: x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(4566010)(82015058);SRVR:AM5EUR02HT216;BCL:0;PCL:0;RULEID:;SRVR:AM5EUR02HT216; x-microsoft-antispam-message-info: kSKtx+U8IRsNT9sUv11nthc0fT2HTc8O4oCDcG10tJuQmL8EzzP6nLFAZyc1v41h Content-Type: multipart/mixed; boundary="_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_" X-Mailinglist: alpine-user Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: MIME-Version: 1.0 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: f12efbb0-867f-4c93-8261-502eceebfafa X-MS-Exchange-CrossTenant-Network-Message-Id: 9e3131b2-3464-4ec4-0a14-08d68f869ddd X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: f12efbb0-867f-4c93-8261-502eceebfafa X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Feb 2019 18:36:05.5621 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Internet X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5EUR02HT216 --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: multipart/related; boundary="_013_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_"; type="multipart/alternative" --_013_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: multipart/alternative; boundary="_000_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_" --_000_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable Apparently there were multiple issues with my setup, so I have updated the = scripts. * Using as much as the same tools during normal setup (eg replacing par= ted with sfdisk) * Different disk layout. The boot partition is gone. The physical disk = /dev/sda contains an esp and luks partition. On the luks partition is an lv= m group containing a swap and root partition. The boot folder is inside the= root partition and mounts the esp partition on /boot/efi. This disk layout= asks for a decryption password twice (once by GRUB2 and once by the ramdis= k). * UEFI and BIOS mode simultanously installed when the OS setup will be = run in UEFI mode. This makes it possible to start the system in UEFI or BIO= S mode, which can be chosen during each boot cycle. * Using GRUB2 configuration scripts to generate the GRUB2 config file i= nstead of manually building the config file. * Fixing some issues with the GRUB2 Xen configuration script. (I didn= =92t find the repository where this script is stored. A pull request could = be made in order to fix these issues in the package). So, now the system supports UEFI mode and BIOS mode, I have tested the Xen = setup in both modes. The system works in BIOS mode but when I start in UEFI= mode I still get a black screen after the Xen kernel is loaded. Maybe this= is an GRUB2 EFI issue since I have found some older messages indicating a = similar problem. But according to Xen documentation it should be able to st= art Xen in UEFI mode by now. Does someone knows the details about EFI, GRUB= 2 and Xen? With kind regards, Marco Boom Van: Marco Boom Verzonden: Monday, January 28, 2019 10:08:00 PM Aan: alpine-user@lists.alpinelinux.org Onderwerp: Boot Issue: How do I setup Xen with dom 0 Alpine Linux, LUKS LVM= and GRUB on a UEFI platform? Hi, I would like to have the following setup: a system in UEFI mode with a hard= disk with GPT partitions. The disk should contain an (unencrypted) EFI Sys= tem Partition, encrypted boot partition and encrypted lvm partition. GRUB s= hould be the bootloader and on top of it I want the Xen kernel and Alpine L= inux as dom 0. In order to install Alpine Linux without Xen I downloaded the ISO image and= burned it on a USB drive with Rufus (GPT, iso mode). Then I I boot from US= B drive in UEFI mode and I can install Alpine successfully. To install Alpine Linux with the customized partitions I run the following = commands (I=92m sorry for the massive amount of code that follows. It is al= so attached as shell files. If you don=92t have much time: scroll down to t= he second to last paragraph.): Setting up Alpine Linux: setup-keymap us us-intl setup-hostname -n localhost hostname=3D$(cat $ROOT/etc/hostname 2>/dev/null) setup-interfaces -i </dev/null passwd setup-timezone -z Europe/Amsterdam setup-proxy none setup-apkrepos -f setup-sshd -c none setup-ntp -c chrony Install tools: apk update apk add cryptsetup e2fsprogs grub-efi haveged lvm2 parted rc-service haveged start # optionally: only needed to wipe disks Creating disk partitions: parted --script /dev/sda mklabel gpt parted --script --align=3Doptimal /dev/sda mkpart fat32 0% 538MB parted --script /dev/sda set 1 esp on parted --script --align=3Doptimal /dev/sda mkpart non-fs 538MB 748MB parted --script --align=3Doptimal /dev/sda mkpart non-fs 748MB 100% parted --script /dev/sda set 3 LVM on # optionally: wiping disks, but this takes too much time for test setups haveged -n 0 | dd of=3D/dev/sda1 haveged -n 0 | dd of=3D/dev/sda2 haveged -n 0 | dd of=3D/dev/sda3 Creating file systems: mkfs.vfat /dev/sda1 # fat32 for ESP cryptsetup luksFormat --type luks /dev/sda2 cryptsetup open --type luks /dev/sda2 bootcrypt mkfs.ext4 /dev/mapper/bootcrypt # encrypted boot partition with ext4 cryptsetup luksFormat --type luks2 /dev/sda3 cryptsetup open --type luks2 /dev/sda3 lvmcrypt pvcreate /dev/mapper/lvmcrypt # encrypted lvm partition vgcreate vg0 /dev/mapper/lvmcrypt lvcreate -L 512M vg0 -n swap lvcreate -l 100%FREE vg0 -n root lvscan # check lvm partitions mkfs.ext4 /dev/vg0/root # ext4 on lvm root partition (alias /dev/mapper/vg0= -root) mkswap /dev/vg0/swap # swap lvm partition (alias /dev/mapper/vg0-swap) Creating mounts and folders, installing Alpine Linux: mount -t ext4 /dev/vg0/root /mnt/ mkdir -p /mnt/boot/ mount -t ext4 /dev/mapper/bootcrypt /mnt/boot/ mkdir -p /mnt/boot/efi/ mount -t vfat /dev/sda1 /mnt/boot/efi/ USE_EFI=3D1 # seems to be ignored by the setup-disk script, can be removed setup-disk -m sys /mnt/ Update configuration: boot_UUID=3D$(blkid | awk "\$1 =3D=3D \"/dev/sda2:\" { print \$2 }" | cut -= d'"' -f2) lvm_UUID=3D$(blkid | awk "\$1 =3D=3D \"/dev/sda3:\" { print \$2 }" | cut -d= '"' -f2) root_UUID=3D$(blkid | awk "\$1 =3D=3D \"/dev/mapper/vg0-root:\" { print \$2= }" | cut -d'"' -f2) swap_UUID=3D$(blkid | awk "\$1 =3D=3D \"/dev/mapper/vg0-swap:\" { print \$2= }" | cut -d'"' -f2) printf "target=3D'bootcrypt'\n" >> /mnt/etc/conf.d/dmcrypt printf "source=3DUUID=3D\"$boot_UUID\"\n" >> /mnt/etc/conf.d/dmcrypt #chroot /mnt rc-update add dmcrypt boot (there seems to be a bug in openrc:= https://github.com/OpenRC/openrc/issues/243) chroot /mnt ln -s /etc/init.d/dmcrypt /etc/runlevels/boot/dmcrypt # tempora= ry workaround printf "UUID=3D$swap_UUID\tswap\tswap\tdefault\t0 0\n" >> /mnt/etc/fstab printf 'features=3D"ata base ide scsi usb virtio ext4 lvm cryptsetup"\n' > = /mnt/etc/mkinitfs/mkinitfs.conf mkinitfs -c /mnt/etc/mkinitfs/mkinitfs.conf -b /mnt/ $(ls /mnt/lib/modules/= ) mkdir -p /mnt/boot/grub/ mkdir -p /etc/default/ cat > /mnt/boot/grub/grub.cfg <> /etc/default/grub <> /etc/modules fi done apk add xen xen-hypervisor for svc in xenstored xenconsoled xendomains xenqemu; do rc-update add $svc default done grubcfg=3D$(cat /boot/grub/grub.cfg) cat > /boot/grub/grub.cfg <

Apparently there were multiple issues with my setup,= so I have updated the scripts.

 

  • Using as much as the same tools during normal setup (eg replacing par= ted with sfdisk)
  • Different disk layout. The boot parti= tion is gone. The physical disk /dev/sda contains an esp and luks partition= . On the luks partition is an lvm group containing a swap and root partitio= n. The boot folder is inside the root partition and mounts the esp partition = on /boot/efi. This disk layout asks for a decryption password twice (once b= y GRUB2 and once by the ramdisk).
  • UEFI and BIOS mode s= imultanously installed when the OS setup will be run in UEFI mode. This mak= es it possible to start the system in UEFI or BIOS mode, which can be chose= n during each boot cycle.
  • Using GRUB2 configuration scripts to gene= rate the GRUB2 config file instead of manually building the config file.
  • Fixing some issues with the GRUB2 Xen configuration scri= pt. (I didn=92t find the repository where this script is stored. A pull req= uest could be made in order to fix these issues in the package).

 

So, now the system supports UEFI mode and BIOS mode,= I have tested the Xen setup in both modes. The system works in BIOS mode b= ut when I start in UEFI mode I still get a black screen after the Xen kerne= l is loaded. Maybe this is an GRUB2 EFI issue since I have found some older messages indicating a similar prob= lem. But according to Xen documentation it should be able to start Xen in U= EFI mode by now. Does someone knows the details about EFI, GRUB2 and Xen?

 

With kind regards,

Marco Boom

 

Van: Marco Boom <marco.boom@outlook.com>
Verzonden: Monday, January 28, 2019 10:08:00 PM
Aan: alpine-user@lists.alpinelinux.org
Onderwerp: Boot Issue: How do I setup Xen with dom 0 Alpine Linux, L= UKS LVM and GRUB on a UEFI platform?

 

Hi,

I would = like to have the following setup: a system in UEFI mode with a hard disk wi= th GPT partitions. The disk should contain an (unencrypted) EFI System Part= ition, encrypted boot partition and encrypted lvm partition. GRUB should be the bootloader and on top of it I = want the Xen kernel and Alpine Linux as dom 0.

In order= to install Alpine Linux without Xen I downloaded the ISO image and burned = it on a USB drive with Rufus (GPT, iso mode). Then I I boot from USB drive = in UEFI mode and I can install Alpine successfully.

To insta= ll Alpine Linux with the customized partitions I run the following commands= (I=92m sorry for the massive amount of code that follows. It is also attac= hed as shell files. If you don=92t have much time: scroll down to the second to last paragraph.):

Setting = up Alpine Linux:

setup-keymap =
us us-intl
setup-hostnam=
e -n localhost
hostname=3D$(=
cat $ROOT/etc/hostname 2>/dev/null)
setup-interfa=
ces -i <<EOF
auto lo<=
/o:p>
iface lo inet=
 loopback
 
auto eth0
iface eth0 in=
et dhcp
  &=
nbsp; hostname $hostname
 
auto eth1
iface eth1 in=
et dhcp
  &=
nbsp; hostname $hostname
EOF
/etc/init.d/n=
etworking --quiet start >/dev/null
passwd
setup-timezon=
e -z Europe/Amsterdam
setup-proxy n=
one
setup-apkrepo=
s -f
setup-sshd -c=
 none
setup-ntp -c =
chrony

 

Install = tools:

apk update
apk add crypt=
setup e2fsprogs grub-efi haveged lvm2 parted
rc-service ha=
veged start # optionally: only needed to wipe disks

 

Creating= disk partitions:

parted --scri=
pt /dev/sda mklabel gpt
parted --scri=
pt --align=3Doptimal /dev/sda mkpart fat32 0% 538MB
parted --scri=
pt /dev/sda set 1 esp on
parted --scri=
pt --align=3Doptimal /dev/sda mkpart non-fs 538MB 748MB
parted --scri=
pt --align=3Doptimal /dev/sda mkpart non-fs 748MB 100%
parted --scri=
pt /dev/sda set 3 LVM on
 
# optionally:=
 wiping disks, but this takes too much time for test setups
haveged -n 0 =
| dd of=3D/dev/sda1
haveged -n 0 =
| dd of=3D/dev/sda2
haveged -n 0 =
| dd of=3D/dev/sda3

 

Creating= file systems:

mkfs.vfat /de=
v/sda1 # fat32 for ESP
 
cryptsetup lu=
ksFormat --type luks /dev/sda2
cryptsetup op=
en --type luks /dev/sda2 bootcrypt
mkfs.ext4 /de=
v/mapper/bootcrypt # encrypted boot partition with ext4
 
cryptsetup lu=
ksFormat --type luks2 /dev/sda3
cryptsetup op=
en --type luks2 /dev/sda3 lvmcrypt
pvcreate /dev=
/mapper/lvmcrypt # encrypted lvm partition
vgcreate vg0 =
/dev/mapper/lvmcrypt
lvcreate -L 5=
12M vg0 -n swap
lvcreate -l 1=
00%FREE vg0 -n root
lvscan # chec=
k lvm partitions
mkfs.ext4 /de=
v/vg0/root # ext4 on lvm root partition (alias /dev/mapper/vg0-root)
mkswap /dev/v=
g0/swap # swap lvm partition (alias /dev/mapper/vg0-swap)=

 

Creating= mounts and folders, installing Alpine Linux:

mount -t ext4=
 /dev/vg0/root /mnt/
mkdir -p /mnt=
/boot/
mount -t ext4=
 /dev/mapper/bootcrypt /mnt/boot/
mkdir -p /mnt=
/boot/efi/
mount -t vfat=
 /dev/sda1 /mnt/boot/efi/
USE_EFI=3D1 #=
 seems to be ignored by the setup-disk script, can be removed
setup-disk -m=
 sys /mnt/

 

Update c= onfiguration:

boot_UUID=3D$=
(blkid | awk "\$1 =3D=3D \"/dev/sda2:\" { print \$2 }" =
| cut -d'"' -f2)
lvm_UUID=3D$(=
blkid | awk "\$1 =3D=3D \"/dev/sda3:\" { print \$2 }" |=
 cut -d'"' -f2)
root_UUID=3D$=
(blkid | awk "\$1 =3D=3D \"/dev/mapper/vg0-root:\" { print \=
$2 }" | cut -d'"' -f2)
swap_UUID=3D$=
(blkid | awk "\$1 =3D=3D \"/dev/mapper/vg0-swap:\" { print \=
$2 }" | cut -d'"' -f2)
 
printf "=
target=3D'bootcrypt'\n" >> /mnt/etc/conf.d/dmcrypt
printf "=
source=3DUUID=3D\"$boot_UUID\"\n" >> /mnt/etc/conf.d/d=
mcrypt
#chroot /mnt =
rc-update add dmcrypt boot (there seems to be a bug in openrc: https://gith=
ub.com/OpenRC/openrc/issues/243)
chroot /mnt l=
n -s /etc/init.d/dmcrypt /etc/runlevels/boot/dmcrypt # temporary workaround=
printf "=
UUID=3D$swap_UUID\tswap\tswap\tdefault\t0 0\n" >> /mnt/etc/fstab=
printf 'featu=
res=3D"ata base ide scsi usb virtio ext4 lvm cryptsetup"\n' > =
/mnt/etc/mkinitfs/mkinitfs.conf
mkinitfs -c /=
mnt/etc/mkinitfs/mkinitfs.conf -b /mnt/ $(ls /mnt/lib/modules/)<=
/span>
 
mkdir -p /mnt=
/boot/grub/
mkdir -p /etc=
/default/
cat > /mnt=
/boot/grub/grub.cfg <<EOF
set timeout=
=3D2
insmod all_vi=
deo
menuentry &qu=
ot;Alpine Linux" {
  &=
nbsp; linux   /boot/vmlinuz-vanilla modules=3Dsd-mod,usb-storage,=
ext4 cryptroot=3DUUID=3D$lvm_UUID cryptdm=3Dlvmcrypt root=3DUUID=3D$root_UU=
ID nomodeset quiet rootfstype=3Dext4
  &=
nbsp; initrd  /boot/initramfs-vanilla
}<=
/span>
EOF
cat >> =
/etc/default/grub <<EOF
GRUB_ENABLE_C=
RYPTODISK=3Dy
EOF
grub-install =
--target=3Dx86_64-efi --bootloader-id=3Dalpine --boot-directory=3D/mnt/boot=
 --efi-directory=3D/mnt/boot/efi --recheck --no-nvram
install -D /m=
nt/boot/efi/EFI/alpine/grubx64.efi /mnt/boot/efi/EFI/boot/bootx64.efi<=
/o:p>

 

In this = way GRUB asks for the boot partition password, initramfs (or kernel or some= thing else?) asks for the lvm partition password and finally OpenRC asks fo= r the boot partition password (internet provides enough sources why the boot partition needs to be decrypted twice= ).

Finish s= etup:

umount /mnt/b=
oot/efi/
umount /mnt/b=
oot/
umount /mnt/<=
o:p>
swapoff -a
vgchange -a n=
cryptsetup lu=
ksClose lvmcrypt
cryptsetup lu=
ksClose bootcrypt
 
reboot

 

So at th= is point I have the system in UEFI mode with GPT partitions, LUKS, LVM, GRU= B and Alpine Linux. I can use Alpine Linux as expected and no issues seems = to be here.

Now I wa= nt to install Xen and run the following commands:

for mod in xe=
n_netback xen_blkback xenfs xen_pciback xen_wdt tun; do=
  &=
nbsp; if modprobe $mod; then
  &=
nbsp;     grep -q -q $mod /etc/modules || echo $mod >=
;> /etc/modules
  &=
nbsp; fi
done
 
apk add xen x=
en-hypervisor
 
for svc in xe=
nstored xenconsoled xendomains xenqemu; do
  &=
nbsp; rc-update add $svc default
done
 
grubcfg=3D$(c=
at /boot/grub/grub.cfg)
cat > /boo=
t/grub/grub.cfg <<EOF
menuentry &qu=
ot;Xen Alpine Linux" {
  &=
nbsp; multiboot2  /boot/xen.gz placeholder smt=3D1
  &=
nbsp; module2 /boot/vmlinuz-vanilla placeholder modules=3Dsd-mod,usb-storag=
e,ext4 cryptroot=3DUUID=3D$lvm_UUID cryptdm=3Dlvmcrypt root=3DUUID=3D$root_=
UUID nomodeset quiet rootfstype=3Dext4
  &=
nbsp; module2 /boot/initramfs-vanilla
}<=
/span>
 
$grubcfg=
EOF

 

When I c= hoose Xen Alpine Linux from the boot options Xen seems to start without err= ors, but after it relinquishes the console I got a black screen and the key= board does not respond anymore. The same happens when I remove the quiet kernel option from grub.cfg. It does = not output any additional information. How can I fix this issue or is this = setup not supported?

I've not= iced that when I use multiboot and module instead of multiboot2 and module2= Xen throws the error "(XEN) ACPI Error (tbxfroot-8217): A valid RSDP = was not found [20070126]" and turns ACPI off but this time after it relinquishes the console, the system asks for t= he password of the lvm partition. But the problem here is that the keyboard= does not respond, so I cannot fill in the password and continue the boot p= rocess.

 

 

With kind regards,

Marco Boom

 

 

--_000_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_-- --_013_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: image/png; name="A6F983630DBB4EDC9008FDC8B826E0EE.png" Content-Description: A6F983630DBB4EDC9008FDC8B826E0EE.png Content-Disposition: inline; filename="A6F983630DBB4EDC9008FDC8B826E0EE.png"; size=161; creation-date="Sun, 10 Feb 2019 18:36:04 GMT"; modification-date="Sun, 10 Feb 2019 18:36:04 GMT" Content-ID: Content-Transfer-Encoding: base64 iVBORw0KGgoAAAANSUhEUgAAArYAAAACCAYAAAHawK8wAAAAAXNSR0IArs4c6QAAAARnQU1BAACx jwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAAAA2SURBVEhL7dQBCQAgDETR61/KBCYwjIIdNhi8 B7/AMZa1z1VNxi3MuBqXo5Wkhv6zDQAAjJY8PdQ6chL9M8AAAAAASUVORK5CYII= --_013_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_-- --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="01_setup-config.sh" Content-Description: 01_setup-config.sh Content-Disposition: attachment; filename="01_setup-config.sh"; size=439; creation-date="Sun, 10 Feb 2019 18:35:02 GMT"; modification-date="Sun, 10 Feb 2019 18:35:02 GMT" Content-ID: Content-Transfer-Encoding: base64 IyEvYmluL3NoCgpzZXR1cC1rZXltYXAgdXMgdXMtaW50bApzZXR1cC1ob3N0bmFtZSAtbiBsb2Nh bGhvc3QKaG9zdG5hbWU9JChjYXQgJFJPT1QvZXRjL2hvc3RuYW1lIDI+L2Rldi9udWxsKQpzZXR1 cC1pbnRlcmZhY2VzIC1pIDw8RU9GCmF1dG8gbG8KaWZhY2UgbG8gaW5ldCBsb29wYmFjawoKYXV0 byBldGgwCmlmYWNlIGV0aDAgaW5ldCBkaGNwCglob3N0bmFtZSAkaG9zdG5hbWUKCmF1dG8gZXRo MQppZmFjZSBldGgxIGluZXQgZGhjcAoJaG9zdG5hbWUgJGhvc3RuYW1lCkVPRgovZXRjL2luaXQu ZC9uZXR3b3JraW5nIC0tcXVpZXQgc3RhcnQgPi9kZXYvbnVsbApwYXNzd2QKc2V0dXAtdGltZXpv bmUgLXogRXVyb3BlL0Ftc3RlcmRhbQpzZXR1cC1wcm94eSBub25lCnNldHVwLWFwa3JlcG9zIC1m CnNldHVwLXNzaGQgLWMgbm9uZQpzZXR1cC1udHAgLWMgY2hyb255Cg== --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="02_install-utils.sh" Content-Description: 02_install-utils.sh Content-Disposition: attachment; filename="02_install-utils.sh"; size=115; creation-date="Sun, 10 Feb 2019 18:35:03 GMT"; modification-date="Sun, 10 Feb 2019 18:35:03 GMT" Content-ID: Content-Transfer-Encoding: base64 IyEvYmluL3NoCgphcGsgdXBkYXRlCmFwayBhZGQgY3J5cHRzZXR1cCBlMmZzcHJvZ3MgZ3J1Yi1i aW9zIGdydWItZWZpIGhhdmVnZWQgbHZtMiBzZmRpc2sKcmMtc2VydmljZSBoYXZlZ2VkIHN0YXJ0 Cg== --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="03_create-partitions.sh" Content-Description: 03_create-partitions.sh Content-Disposition: attachment; filename="03_create-partitions.sh"; size=69; creation-date="Sun, 10 Feb 2019 18:35:03 GMT"; modification-date="Sun, 10 Feb 2019 18:35:03 GMT" Content-ID: Content-Transfer-Encoding: base64 IyEvYmluL3NoCgpzZmRpc2sgLXEgLVggZG9zIC9kZXYvc2RhIDw8RU9GCiwxMDBNLFUsKgosLFYK RU9GCm1kZXYgLXMK --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="04_create-fs.sh" Content-Description: 04_create-fs.sh Content-Disposition: attachment; filename="04_create-fs.sh"; size=305; creation-date="Sun, 10 Feb 2019 18:35:03 GMT"; modification-date="Sun, 10 Feb 2019 18:35:03 GMT" Content-ID: <06C13AF5E168B94C9B7C02827F15C03A@eurprd04.prod.outlook.com> Content-Transfer-Encoding: base64 IyEvYmluL3NoCgpta2ZzLnZmYXQgL2Rldi9zZGExCgpjcnlwdHNldHVwIGx1a3NGb3JtYXQgLS10 eXBlIGx1a3MgL2Rldi9zZGEyCmNyeXB0c2V0dXAgbHVrc09wZW4gLS10eXBlIGx1a3MgL2Rldi9z ZGEyIHNkYTJfY3J5cHQKcHZjcmVhdGUgL2Rldi9tYXBwZXIvc2RhMl9jcnlwdAp2Z2NyZWF0ZSB2 ZzAgL2Rldi9tYXBwZXIvc2RhMl9jcnlwdApsdmNyZWF0ZSAtTCAyNTZNIHZnMCAtbiBzd2FwCmx2 Y3JlYXRlIC1MIDFHIHZnMCAtbiByb290Cmx2c2Nhbgpta2ZzLmV4dDQgL2Rldi92ZzAvcm9vdApt a3N3YXAgL2Rldi92ZzAvc3dhcAo= --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="05_prepare-disk.sh" Content-Description: 05_prepare-disk.sh Content-Disposition: attachment; filename="05_prepare-disk.sh"; size=128; creation-date="Sun, 10 Feb 2019 18:35:03 GMT"; modification-date="Sun, 10 Feb 2019 18:35:03 GMT" Content-ID: <1E782C6DD2410D43AA41CD9DCCA2AAE6@eurprd04.prod.outlook.com> Content-Transfer-Encoding: base64 IyEvYmluL3NoCgptb3VudCAtdCBleHQ0IC9kZXYvdmcwL3Jvb3QgL21udApta2RpciAtcCAvbW50 L2Jvb3QvZWZpCm1vdW50IC10IHZmYXQgL2Rldi9zZGExIC9tbnQvYm9vdC9lZmkKc2V0dXAtZGlz ayAtbSBzeXMgL21udAo= --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="06_update-config.sh" Content-Description: 06_update-config.sh Content-Disposition: attachment; filename="06_update-config.sh"; size=1469; creation-date="Sun, 10 Feb 2019 18:35:03 GMT"; modification-date="Sun, 10 Feb 2019 18:35:03 GMT" Content-ID: Content-Transfer-Encoding: base64 IyEvYmluL3NoCgouIGZ1bmN0aW9ucy5zaAoKbHZtX1VVSUQ9JChnZXRVVUlEICcvZGV2L3NkYTIn KQpyb290X1VVSUQ9JChnZXRVVUlEICcvZGV2L21hcHBlci92ZzAtcm9vdCcpCnN3YXBfVVVJRD0k KGdldFVVSUQgJy9kZXYvbWFwcGVyL3ZnMC1zd2FwJykKCnByaW50ZiAiVVVJRD0kc3dhcF9VVUlE XHRzd2FwXHRzd2FwXHRkZWZhdWx0XHQwIDBcbiIgPj4gL21udC9ldGMvZnN0YWIKc2V0VmFsdWUg Jy9tbnQvZXRjL21raW5pdGZzL21raW5pdGZzLmNvbmYnICdmZWF0dXJlcycgJyJhdGEgYmFzZSBp ZGUgc2NzaSB1c2IgdmlydGlvIGV4dDQgbHZtIGNyeXB0c2V0dXAiJwpta2luaXRmcyAtYyAvbW50 L2V0Yy9ta2luaXRmcy9ta2luaXRmcy5jb25mIC1iIC9tbnQgJChscyAvbW50L2xpYi9tb2R1bGVz KQoKbWtkaXIgLXAgL21udC9ib290L2dydWIKbWtkaXIgLXAgL21udC9ldGMvZGVmYXVsdApta2Rp ciAtcCAvZXRjL2RlZmF1bHQKc2V0VmFsdWUgJy9tbnQvZXRjL2RlZmF1bHQvZ3J1YicgJ0dSVUJf Q01ETElORV9MSU5VWCcgImNyeXB0cm9vdD1cIlVVSUQ9JGx2bV9VVUlEIGNyeXB0ZG09c2RhMl9j cnlwdCByb290PVVVSUQ9JHJvb3RfVVVJRFwiIgpzZXRWYWx1ZSAnL21udC9ldGMvZGVmYXVsdC9n cnViJyAnR1JVQl9ERUZBVUxUJyAnc2F2ZWQnCnNldFZhbHVlICcvbW50L2V0Yy9kZWZhdWx0L2dy dWInICdHUlVCX0VOQUJMRV9DUllQVE9ESVNLJyAneScKc2V0VmFsdWUgJy9tbnQvZXRjL2RlZmF1 bHQvZ3J1YicgJ0dSVUJfU0FWRURFRkFVTFQnICd0cnVlJwpzZXRWYWx1ZSAnL2V0Yy9kZWZhdWx0 L2dydWInICdHUlVCX0VOQUJMRV9DUllQVE9ESVNLJyAneScKcGFydGl0aW9uVGFibGU9JChzZmRp c2sgLWQgL2Rldi9zZGEgfCBncmVwICdsYWJlbDogJyB8IHNlZCAtZSAncy9eLio6IC8vJykKaWYg WyAtZCAnL3N5cy9maXJtd2FyZS9lZmknIF07IHRoZW4KICAgIGdydWItaW5zdGFsbCAtLXRhcmdl dD14ODZfNjQtZWZpIC0tYm9vdGxvYWRlci1pZD1hbHBpbmUgLS1ib290LWRpcmVjdG9yeT0vbW50 L2Jvb3QgLS1lZmktZGlyZWN0b3J5PS9tbnQvYm9vdC9lZmkgLS1yZWNoZWNrIC0tbm8tbnZyYW0K ICAgIGluc3RhbGwgLUQgL21udC9ib290L2VmaS9FRkkvYWxwaW5lL2dydWJ4NjQuZWZpIC9tbnQv Ym9vdC9lZmkvRUZJL2Jvb3QvYm9vdHg2NC5lZmkKZmkKaWYgWyAiJHBhcnRpdGlvblRhYmxlIiA9 ICJkb3MiIF07IHRoZW4KICAgIGdydWItaW5zdGFsbCAtLXRhcmdldD1pMzg2LXBjIC0tYm9vdC1k aXJlY3Rvcnk9L21udC9ib290IC9kZXYvc2RhCmZpCm1vdW50IC1vIGJpbmQgL2RldiAvbW50L2Rl dgptb3VudCAtbyBiaW5kIC9wcm9jIC9tbnQvcHJvYwptb3VudCAtbyBiaW5kIC9zeXMgL21udC9z eXMKY2hyb290IC9tbnQgZ3J1Yi1ta2NvbmZpZyAtbyAvYm9vdC9ncnViL2dydWIuY2ZnCnVtb3Vu dCAvbW50L3N5cwp1bW91bnQgL21udC9wcm9jCnVtb3VudCAvbW50L2Rldgo= --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="07_finish-setup.sh" Content-Description: 07_finish-setup.sh Content-Disposition: attachment; filename="07_finish-setup.sh"; size=109; creation-date="Sun, 10 Feb 2019 18:35:04 GMT"; modification-date="Sun, 10 Feb 2019 18:35:04 GMT" Content-ID: Content-Transfer-Encoding: base64 IyEvYmluL3NoCgp1bW91bnQgL21udC9ib290L2VmaQp1bW91bnQgL21udApzd2Fwb2ZmIC1hCnZn Y2hhbmdlIC1hIG4KY3J5cHRzZXR1cCBsdWtzQ2xvc2Ugc2RhMl9jcnlwdAoKcmVib290Cg== --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="08_install-xen.sh" Content-Description: 08_install-xen.sh Content-Disposition: attachment; filename="08_install-xen.sh"; size=1804; creation-date="Sun, 10 Feb 2019 18:35:04 GMT"; modification-date="Sun, 10 Feb 2019 18:35:04 GMT" Content-ID: Content-Transfer-Encoding: base64 IyEvYmluL3NoCgouIGZ1bmN0aW9ucy5zaAoKYXBrIGFkZCBicmlkZ2UgeGVuIHhlbi1oeXBlcnZp c29yCgpmb3Igc3ZjIGluIHhlbmNvbnNvbGVkIHhlbmRvbWFpbnMgeGVucWVtdSB4ZW5zdG9yZWQ7 IGRvCiAgICByYy11cGRhdGUgYWRkICRzdmMgZGVmYXVsdApkb25lCgpmb3IgbW9kIGluIHR1biB4 ZW5fYmxrYmFjayB4ZW5fbmV0YmFjayB4ZW5fcGNpYmFjayB4ZW5fd2R0IHhlbmZzOyBkbwogICAg aWYgbW9kcHJvYmUgJG1vZDsgdGhlbgogICAgICAgIGdyZXAgLXEgLXEgJG1vZCAvZXRjL21vZHVs ZXMgfHwgZWNobyAkbW9kID4+IC9ldGMvbW9kdWxlcwogICAgZmkKZG9uZSAKCmdydWJDb25maWdG aWxlPScvZXRjL2dydWIuZC8yMF9saW51eF94ZW4nCnNlZCAtaSAtZSAnMjNzLyQvXG5pZiBbIC1m IFwvZXRjXC91cGRhdGUtZXh0bGludXguY29uZiBdOyB0aGVuLycgJGdydWJDb25maWdGaWxlCnNl ZCAtaSAtZSAiMjRzLyQvXG4kKHByaW50ZiAnXHQnKS4gXC9ldGNcL3VwZGF0ZS1leHRsaW51eC5j b25mLyIgJGdydWJDb25maWdGaWxlCnNlZCAtaSAtZSAiMjVzLyQvXG4kKHByaW50ZiAnXHQnKUdS VUJfQ01ETElORV9MSU5VWF9ERUZBVUxUPVwibW9kdWxlcz1cJHttb2R1bGVzfSBcJHtkZWZhdWx0 X2tlcm5lbF9vcHRzfSBcJHtHUlVCX0NNRExJTkVfTElOVVhfREVGQVVMVH1cIi8iICRncnViQ29u ZmlnRmlsZQpzZWQgLWkgLWUgJzI2cy8kL1xuZmkvJyAkZ3J1YkNvbmZpZ0ZpbGUKc2VkIC1pIC1l ICcxMjlzL211bHRpYm9vdC9tdWx0aWJvb3QyLycgJGdydWJDb25maWdGaWxlCnNlZCAtaSAtZSAn MTMxcy9tb2R1bGUvbW9kdWxlMi8nICRncnViQ29uZmlnRmlsZQpzZWQgLWkgLWUgJzEzOHMvbW9k dWxlL21vZHVsZTIvJyAkZ3J1YkNvbmZpZ0ZpbGUKc2VkIC1pIC1lICIyMjFzLyQvXG4kKHByaW50 ZiAnXHQnKXRhZz1cIlwkKGJhc2VuYW1lIFwke3JlbF9kaXJuYW1lfVwvXCR7YmFzZW5hbWV9IHwg Y3V0IC1iOS0pXCIvIiAkZ3J1YkNvbmZpZ0ZpbGUKc2VkIC1pIC1lICIyMjhzLyQvXG4kKHByaW50 ZiAnXHQnKSAgIFwiaW5pdHJhbWZzLVwke3RhZ31cIiBcXFwvIiAkZ3J1YkNvbmZpZ0ZpbGUKCmV4 dGVuZFZhbHVlICcvZXRjL2RlZmF1bHQvZ3J1YicgJ0dSVUJfQ01ETElORV9YRU4nICciZG9tMF9t ZW09MjU2TSxtYXg6MjU2TSBkb20wX21heF92Y3B1cz0xIGRvbTBfdmNwdXNfcGluIicKc2V0WGVu VmFsdWUgJy9ldGMveGVuL3hlbmQtY29uZmlnLnN4cCcgJ2RvbTAtbWluLW1lbScgJzI1NicKc2V0 WGVuVmFsdWUgJy9ldGMveGVuL3hlbmQtY29uZmlnLnN4cCcgJ2RvbTAtY3B1cycgJzEnCnNldFhl blZhbHVlICcvZXRjL3hlbi94ZW5kLWNvbmZpZy5zeHAnICdlbmFibGUtZG9tMC1iYWxsb29uaW5n JyAnbm8nCnNldFZhbHVlICcvZXRjL3hlbi94bC5jb25mJyAnYXV0b2JhbGxvb24nICciMCInCgpo b3N0bmFtZT0kKGNhdCAvZXRjL2hvc3RuYW1lIDI+L2Rldi9udWxsKQpzZXR1cC1pbnRlcmZhY2Vz IC1pIDw8RU9GCmF1dG8gbG8KaWZhY2UgbG8gaW5ldCBsb29wYmFjawoKYXV0byBldGgwCmlmYWNl IGV0aDAgaW5ldCBtYW51YWwKCWhvc3RuYW1lICRob3N0bmFtZQoKYXV0byBldGgxCmlmYWNlIGV0 aDEgaW5ldCBkaGNwCglob3N0bmFtZSAkaG9zdG5hbWUKCmF1dG8gYnIwCmlmYWNlIGJyMCBpbmV0 IHN0YXRpYwoJYWRkcmVzcyAxOTIuMTY4LjIuMzYKCW5ldG1hc2sgMjU1LjI1NS4yNTUuMAoJZ2F0 ZXdheSAxOTIuMTY4LjIuMjU0CglicmlkZ2VfcG9ydHMgZXRoMAoJYnJpZGdlX3N0cCAwCkVPRgoK Z3J1Yi1ta2NvbmZpZyAtbyAvYm9vdC9ncnViL2dydWIuY2ZnCg== --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_ Content-Type: application/x-sh; name="functions.sh" Content-Description: functions.sh Content-Disposition: attachment; filename="functions.sh"; size=899; creation-date="Sun, 10 Feb 2019 18:35:04 GMT"; modification-date="Sun, 10 Feb 2019 18:35:04 GMT" Content-ID: <0C4B58FDC59DF8458F5BD63EF932BBA4@eurprd04.prod.outlook.com> Content-Transfer-Encoding: base64 IyEvYmluL3NoCgpleHRlbmRWYWx1ZSgpIHsKICAgIGxvY2FsIGZpbGU9JDEKICAgIGxvY2FsIGtl eT0kMgogICAgbG9jYWwgdmFsdWU9JDMKCiAgICBpZiBbIC1mICRmaWxlIF0gJiYgZ3JlcCAtcSAk a2V5ICRmaWxlOyB0aGVuCiAgICAgICAgbG9jYWwgdmFsdWU9JChlY2hvICR2YWx1ZSB8IHNlZCAt ZSAncy8iLy9nJykKICAgICAgICAuICRmaWxlCiAgICAgICAgZXZhbCB2YWw9XCQka2V5CiAgICAg ICAgc2VkIC1pIC1lICJzLy4qJGtleT0uKi8ka2V5PVwiJHZhbCAkdmFsdWVcIi8iICRmaWxlCiAg ICBlbHNlCiAgICAgICAgcHJpbnRmICIka2V5PSR2YWx1ZVxuIiA+PiAkZmlsZQogICAgZmkKfQoK Z2V0VVVJRCgpIHsKICAgIGxvY2FsIGRldj0kMQogICAgZWNobyAkKGJsa2lkIHwgIGdyZXAgJGRl diB8IHNlZCAtZSAncy9eLiogVVVJRD0iLy87cy8iLiokLy8nKQp9CgpzZXRYZW5WYWx1ZSgpIHsK ICAgIGxvY2FsIGZpbGU9JDEKICAgIGxvY2FsIGtleT0kMgogICAgbG9jYWwgdmFsdWU9JDMKCiAg ICBpZiBbIC1mICRmaWxlIF0gJiYgZ3JlcCAtcSAka2V5ICRmaWxlOyB0aGVuCiAgICAgICAgc2Vk IC1pIC1lICJzLy4qKCRrZXkgLiovKCRrZXkgJHZhbHVlKS8iICRmaWxlCiAgICBlbHNlCiAgICAg ICAgcHJpbnRmICIoJGtleSAkdmFsdWUpXG4iID4+ICRmaWxlCiAgICBmaQp9CgpzZXRWYWx1ZSgp IHsKICAgIGxvY2FsIGZpbGU9JDEKICAgIGxvY2FsIGtleT0kMgogICAgbG9jYWwgdmFsdWU9JDMK CiAgICBpZiBbIC1mICRmaWxlIF0gJiYgZ3JlcCAtcSAka2V5ICRmaWxlOyB0aGVuCiAgICAgICAg c2VkIC1pIC1lICJzLy4qJGtleT0uKi8ka2V5PSR2YWx1ZS8iICRmaWxlCiAgICBlbHNlCiAgICAg ICAgcHJpbnRmICIka2V5PSR2YWx1ZVxuIiA+PiAkZmlsZQogICAgZmkKfQo= --_014_AM0PR0402MB3699FE8C04951328F93552488F6B0AM0PR0402MB3699_-- --- Unsubscribe: alpine-user+unsubscribe@lists.alpinelinux.org Help: alpine-user+help@lists.alpinelinux.org ---