[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Bug#140579: boot-floppies: [i386] boot-floppies 3.0.21 fail to load root.bin via tftp



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hi,

| Is anyone on this list able to test i386 / tftp and see if it's really
| broken?  If so, this is an "important" bug.  It's easy enough to fix
| -- e.g, just disable TFTP on i386 if we have to.

i have written this to the bug a few days ago:
i had a look at the cvs-sources of boot-floppies:
IMHO the bug is in /tftpboot.sh:

- ----- section where root.bin is appended -----

# append rootimage to the kernel
if [ "$arch" = sparc ]; then
	tilo -o $tftpimage.tmp $tftpimage $rootimage
	mv $tftpimage.tmp $tftpimage
elif [ "$arch" = arm ]; then
	if (echo $tftpimage | grep -q cats); then
		catsboot $tftpimage.tmp $tftpimage $rootimage
		mv $tftpimage.tmp $tftpimage
	fi
	if (echo $tftpimage | grep -q netwinder); then
		cat $rootimage >>$tftpimage
	fi
elif [ "$arch" = "mips" -o "$arch" = "mipsel" ]; then
		mips-specials/addinitrd $tftpimage $rootimage $tftpimage.tmp
		mv $tftpimage.tmp $tftpimage
fi

- ----- end section -----

a root.bin is only appended to sparc, arm, mips and mipsel. so the
bootfloppies should be broken on all other platforms.

Michael

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6d-cvs (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQE8qYh1BSpWS08ZgdgRAol/AJ45KoRmQ8wwZIG++3dED9+NCI3S3wCbBQiW
kJHKzrAzXrVTdz9svKez+zI=
=2gOM
-----END PGP SIGNATURE-----

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature


Reply to: