From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <5264E0C0.2010609@robinlea.com> Date: Mon, 21 Oct 2013 15:07:28 +0700 From: john francis lee User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130329 Thunderbird/17.0.5 MIME-Version: 1.0 To: Fans of the OS Plan 9 from Bell Labs <9fans@9fans.net> References: <167d2d7f07d071a5b4928b9ddb9d0406@ladd.quanstro.net> In-Reply-To: <167d2d7f07d071a5b4928b9ddb9d0406@ladd.quanstro.net> Content-Type: multipart/alternative; boundary="------------090908090905050506090405" Subject: Re: [9fans] 64-bit usb boot environment Topicbox-Message-UUID: 87b4d2a6-ead8-11e9-9d60-3106f5b1d025 This is a multi-part message in MIME format. --------------090908090905050506090405 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Object not found The object /other/usbtest.bz2 does not exist on this server. errstr: '/usr/web/ftp/other/usbtest.bz2' directory entry not found uri host: header host: ftp.quanstro.net actual host: ladd.quanstro.net On 10/21/2013 11:48 AM, erik quanstrom wrote: > this isn't perfect, or complete, but there is a minimal > 64-bit and/or 386/pae usb boot environment here > http://ftp.quanstro.net/other/usbtest.bz2. it's only 10mb, > so it should be a quick download. the reason > for building this was to quickly debug a system that wouldn't > install, but it might be interesting to try out. > > a few random notes and gotchas: > > 0. with dhcp, one can get to get to the full distribution with: > ip/ipconfig && ndb/dns && 9fs atom > > 1. you will find the usb boot device @ /dev/sdu0, a loopback > device. > > 2. there is a bug in kfs (patched in 9atom; patch submitted to > sources) to be aware of. so be careful if using tools from > sources on 64-bit kernels. > > 3. finally, there's (by plan 9 standards) quite a bit of acpi support > in the 64-bit kernel. power events have been somewhat rashly > turned on, and may cause trouble. > > as always, i'd be interested in any reports of success or failure. > > - erik > -- john francis lee 246/3 Moo 22 Thanon Kaew Wai Mueang Chiangrai 57000 Thailand Hi there, NSA 'analysts', in-house and/or contracted. Just reminding you that if you are reading this you are committing a crime, that you are felons mocking the 4th Amendment of our US Constitution ... "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." ... and that someday, really soon I hope, you're going to have to pay for your crimes. You're breaking international laws as well, so if you're thinking of the 'I was only following orders!' 'defense' ... Please see Nuremberg Principle IV ... "The fact that a person acted pursuant to order of his Government or of a superior does not relieve him from responsibility under international law, provided a moral choice was in fact possible to him". ... and start exercising your moral choice. Look upon Thomas Andrews Drake and Edward Snowden as your exemplars and Patron Saints. --------------090908090905050506090405 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit

Object not found

The object /other/usbtest.bz2 does not exist on this server.

errstr: '/usr/web/ftp/other/usbtest.bz2' directory entry not found
uri host:
header host: ftp.quanstro.net
actual host: ladd.quanstro.net



On 10/21/2013 11:48 AM, erik quanstrom wrote:
this isn't perfect, or complete, but there is a minimal
64-bit and/or 386/pae usb boot environment here
http://ftp.quanstro.net/other/usbtest.bz2.  it's only 10mb,
so it should be a quick download.  the reason
for building this was to quickly debug a system that wouldn't
install, but it might be interesting to try out.

a few random notes and gotchas:

0.  with dhcp, one can get to get to the full distribution with:
	ip/ipconfig && ndb/dns && 9fs atom

1.  you will find the usb boot device @ /dev/sdu0, a loopback
device.

2.  there is a bug in kfs (patched in 9atom; patch submitted to
sources) to be aware of.  so be careful if using tools from
sources on 64-bit kernels.

3.  finally, there's (by plan 9 standards) quite a bit of acpi support
in the 64-bit kernel.  power events have been somewhat rashly
turned on, and may cause trouble.

as always, i'd be interested in any reports of success or failure.

- erik



--
john francis lee
246/3 Moo 22
Thanon Kaew Wai
Mueang Chiangrai 57000
Thailand

Hi there, NSA 'analysts', in-house and/or contracted.

Just reminding you that if you are reading this you are committing a crime, that you are felons mocking the 4th Amendment of our US Constitution ...

  "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

... and that someday, really soon I hope, you're going to have to pay for your crimes.

You're breaking international laws as well, so if you're thinking of the 'I was only following orders!' 'defense' ... Please see Nuremberg Principle IV ...

  "The fact that a person acted pursuant to order of his Government or of a superior does not relieve him from responsibility under international law, provided a moral choice was in fact possible to him".

... and start exercising your moral choice. Look upon Thomas Andrews Drake and Edward Snowden as your exemplars and Patron Saints.
--------------090908090905050506090405--