From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 15919 invoked from network); 28 Apr 2021 08:39:34 -0000 Received: from 1ess.inri.net (216.126.196.35) by inbox.vuxu.org with ESMTPUTF8; 28 Apr 2021 08:39:34 -0000 Received: from ms11p00im-qufo17281301.me.com ([17.58.38.50]) by 1ess; Wed Apr 28 04:34:17 -0400 2021 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=me.com; s=1a1hai; t=1619598852; bh=IcMyXGnsDeWeTVYLxGuQrHGdnYtBQkJ3bvP4UcFrWXs=; h=From:Content-Type:Mime-Version:Subject:Date:To:Message-Id; b=Fty+gHs6jwHoXH80hIP0bI/TmJ6EW+VO4m2r/Z3V7qB3K19WCbaWnLkF8PsGgd9Ec /jy0bnfgKrjdVh7zoXRgobLKh1U0rj55EZ6ew0BxYFGdWGFn284/afxw1PQ2KKXU65 AcoOGoMvw+Llosa3P/jz5jiS6Lak30Cblnbx04A4/PQ5VNESH/cs2ooNEx9gCCtNUV t3/3vQ+shCSlNWfn3+DxyMwUI/ctF9jXS2J6OEVEAkBBh80St1LNc3o9rVPi/NWIS6 xchVYiId3k0P7tTFXmg9v7rqnriGio8vSM8Nw3F5TpryOSE9JXL8V7th5nWKRr0LBV p/P50nWv9P0jg== Received: from [192.168.1.49] (unknown [93.56.117.77]) by ms11p00im-qufo17281301.me.com (Postfix) with ESMTPSA id 59B74AC031E for <9front@9front.org>; Wed, 28 Apr 2021 08:34:12 +0000 (UTC) From: Daniel Morandini Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.40.0.2.32\)) Date: Wed, 28 Apr 2021 10:34:08 +0200 References: <6D4384786CBB244F0C93C0E93528A99C@felloff.net> To: 9front@9front.org In-Reply-To: <6D4384786CBB244F0C93C0E93528A99C@felloff.net> Message-Id: <97848FE6-A364-472A-A05F-A170F79886B4@me.com> X-Mailer: Apple Mail (2.3654.40.0.2.32) X-Proofpoint-Virus-Version: =?UTF-8?Q?vendor=3Dfsecure_engine=3D1.1.170-22c6f66c430a71ce266a39bfe25bc?= =?UTF-8?Q?2903e8d5c8f:6.0.391,18.0.761,17.0.607.475.0000000_definitions?= =?UTF-8?Q?=3D2021-04-28=5F02:2021-04-27=5F03,2021-04-28=5F02,2020-04-07?= =?UTF-8?Q?=5F01_signatures=3D0?= X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 phishscore=0 clxscore=1015 bulkscore=0 malwarescore=0 mlxlogscore=496 spamscore=0 suspectscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2104280057 List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: scale-out element CMS reduce/map-scale reduce/map-scale manager Subject: Re: [9front] Getting Started with Kernel Development? Reply-To: 9front@9front.org Precedence: bulk > boot(8): > > Booting Methods > ... > reboot starts another kernel. The device is of the form > bootfile [ ! method ] where bootfile is the path to > the kernel and method is any of the above boot meth- > ods that connects to the fileserver on where the > bootfile is located. > --- > > so you can put this in plan9.ini/cmdline.txt: > > bootargs=reboot!/sys/src/9/bcm/s9pi2!tls > > this will mount the file server using network boot > method (tls) and after that, ust load the kernel > from the specified path and start it. I did't notice it, amazing! Thank you cinap! Have a nice day you all, it's a wonderful morning here. Cheers, dan