From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 7760 invoked from network); 25 Mar 2021 11:04:21 -0000 Received: from 1ess.inri.net (216.126.196.35) by inbox.vuxu.org with ESMTPUTF8; 25 Mar 2021 11:04:21 -0000 Received: from st43p00im-ztdg10063201.me.com ([17.58.63.182]) by 1ess; Thu Mar 25 06:55:53 -0400 2021 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=me.com; s=1a1hai; t=1616669746; bh=NfDxqJBO1lPxkliyV81LVnmnEdJvTl1P6ZOWVehWKOw=; h=From:Content-Type:Mime-Version:Subject:Date:To:Message-Id; b=s3NNOzbavRG6yRtgK5kisRhRoOH30lIMp4ch4Fd/nqgVqB2n3BZhnWYoJFL1bpS9J 2S36aWuN+s4HH0wkpn4oEXyFZcsUI6iAHnYrYSpHvTAfu8vO9+2LM+oCvbpE7gNjdp Q49gSTs3GBwAiUqSVV/PwtbXo6xu8G8b604kXuLG88QCCLdJJv0R9B0xIWkVXQxON7 J+T4q+avsnWPtxEWCSlwh0lqvwG2xSGuSrecHyuifnmERJd2bKGs8HR9qkSrLwX0vM IpmmJO5SBKounUIPJ/DLWuJnOm+q8v+DvmtcaGhrCXXNs9Ck92vVC0ASj1/4fIzQMJ bhOtpsuMc3hVA== Received: from [192.168.3.86] (unknown [46.234.244.221]) by st43p00im-ztdg10063201.me.com (Postfix) with ESMTPSA id AF7EF5405C4 for <9front@9front.org>; Thu, 25 Mar 2021 10:55:44 +0000 (UTC) From: Daniel Morandini Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.40.0.2.32\)) Date: Thu, 25 Mar 2021 11:55:42 +0100 References: <0BEAEA67139CE537F0AE008DC06176FA@felloff.net> <1721CD21-19AF-482A-B75D-F56A903A57A1@me.com> To: 9front@9front.org In-Reply-To: <1721CD21-19AF-482A-B75D-F56A903A57A1@me.com> Message-Id: <0AD69C97-A018-4009-AA84-CC4A28FCCA78@me.com> X-Mailer: Apple Mail (2.3654.40.0.2.32) X-Proofpoint-Virus-Version: =?UTF-8?Q?vendor=3Dfsecure_engine=3D1.1.170-22c6f66c430a71ce266a39bfe25bc?= =?UTF-8?Q?2903e8d5c8f:6.0.369,18.0.761,17.0.607.475.0000000_definitions?= =?UTF-8?Q?=3D2021-03-25=5F01:2021-03-24=5F02,2021-03-25=5F01,2020-04-07?= =?UTF-8?Q?=5F01_signatures=3D0?= X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=570 malwarescore=0 phishscore=0 mlxscore=0 bulkscore=0 spamscore=0 suspectscore=0 clxscore=1015 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2103250082 List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: immutable RESTful singleton-scale backend Subject: Re: [9front] PXE booting Rpi Reply-To: 9front@9front.org Precedence: bulk Hi people, some updates (pi is still not getting my cmdline.txt args): According to the UART logs, it looks like bootcode.bin is NOT fetching the cmdline.txt file. As soon as I do not know how and when this logs are emitted, I double checked on the kernel side: In bcm, I added a =E2=80=9Cconfdump=E2=80= =9D function that dumps confname and confval values up to nconf as soon as print is available, after the =E2=80=9Cbootargsinit=E2=80=9D call in = main.c: empty. I checked the Atag parsing code and it looks like we do not pass the `if(parseatags(va, len) =3D=3D 0 || parsedevtree(va, len) =3D=3D 0` line, hence no atag is parsed. I compared miller=E2=80=99s bcm code and its logic seemed pretty similar on this regard, I double checked by booting the rasp using his kernel and indeed no configuration is parsed in that case too. What I find wierd is that if I add the cmdline.txt file to the sd card directly it is NOT read as well. This is the contents of the file (xd -c cmdline.txt): ``` 0000000 u s e r =3D d a n \n 0000009 ``` Do you have any idea? I=E2=80=99m at the =E2=80=9Cwhat the fuck=E2=80=9D = point :D Cheers, dan=