BOOT(8) BOOT(8) NAME boot - connect to the root file server SYNOPSIS /boot [ -fkm ] [ -uusername ] [ method!fs-addr ] DESCRIPTION Boot is the first program run after a kernel has been loaded. It connects to the file server that will serve the root, performs any authentication needed to connect to that server, and exec(2)'s the init(8) program. It is started by the kernel, never run directly by the user. See booting(8) for information about the process of loading the kernel (and boot) into memory. Once loaded, the kernel initializes its data structures and devices. It sets the two environment variables /env/cputype and /env/terminal to describe the processor. It then binds a place-holder file server, root(3), onto / and crafts an initial process whose sole function is to exec(2) /boot, a binary which is compiled into root(3). The command line passed depends on the information passed from boot ROM to kernel. On the MIPS Magnum and SGI Power Series the command line passed to boot is the same as that given to the ROM monitor. On AT&T Gnots the command line is /68020/9gnot method!server On the Nextstation , no information is passed from the boot ROM or program. The command line is /68020/9nextstation On the PC, each line in the DOS file plan9.ini of the form name=value is passed to the boot program as an environment variable with the same name and value. The command line is /386/9pc method!server Boot must determine the file server to use and a method with which to connect to it. It must also set a user name to be used as the owner of devices and all console processes and an encryption key to be used when challenged. Boot will prompt for these. Method and address are prompted for first. The prompt lists all valid methods, with the default in brackets. Page 1 Plan 9 (printed 11/17/24) BOOT(8) BOOT(8) root is from (il, tcp, hs, local)[il]: A newline picks the default. Other possible responses are method or method!address. To aid in automatic reboot, the default is automatically taken on CPU servers if nothing is typed within 15 seconds. The other interactions depend on whether the system is a terminal or a CPU server. Terminal The terminal must have a username to set. If none is speci- fied with the -u option, boot will prompt for one on the console: user: The user will also be prompted for a password to be used as an encryption key on each attach(5): password: With most methods boot can now connect to the file server. However, with the serial line methods 9600 and 19200, the actual mechanics of setting up the complete connection are too varied to put into the boot program. Instead boot lets the user set up the connection. It prints a prompt on the console and then simulates a dumb terminal between the user and the serial line: Connect to file system now, type ctrl-d when done. (Use the view or down arrow key to send a break) The user can now type at a modem or a Datakit destination please: interface to set up the connection to a TSM8 card. At Murray Hill, a user would type nj/astro/plan85 at this point. When the user types a control-D, boot stops simulat- ing a terminal and starts the file system protocol over the serial line. Once connected, boot mounts the root file system before / and makes the connection available as #s/boot for subsequent processes to mount (see bind(2)). Boot completes by exec(2)'ing /$objtype/init -t. If the -m option is given it is also passed as an option to init. If the kernel has been built with the cache file system, cfs(4), the local disk partition /dev/[sh]d[01]cache exists, and the root file system is from a remote server, then the kernel will insert a user level cache process between the remote server and the local namespace that caches all remote accesses on the local partition. The -f flag commands cfs Page 2 Plan 9 (printed 11/17/24) BOOT(8) BOOT(8) to reformat the cache partition. CPU Servers The user owning devices and console processes on CPU servers and that user's domain and encryption key are read from NVRAM on all machines except PC's. PC's keep the informa- tion in the disk partition /dev/[sh]d[01]nvram. If a -k option is given or if no stored information is found boot will prompt for all three items and store them. password: authid: bootes authdom: research.att.com The key is used for mutual authentication of the server and its clients. The domain and id identify the owner of the key. Once connected, boot behaves as on the terminal except for exec(2)'ing /$objtype/init -c. Booting Methods The methods available to any system depend on what was com- piled into the kernel. The complete list of booting methods are listed below. cyc connect via a point-to-point fiber link using Cyclone boards. If specified, the address must be the number of the Cyclone board to be used, default 0. il connect via Ethernet using the IL protocol. tcp connect via Ethernet using the TCP protocol. This method is used only if the initial file server is on a Unix system. hs connect via Datakit using the high speed Datakit card. incon connect via Datakit using the Incon interface. 9600 connect via Datakit using the serial interface at 9600 baud. 19200 connect via Datakit using the serial interface at 19200 baud. local connect to the local file system. For the il and tcp methods, the address must be a numeric IP address. If no address is specified, a file server address Page 3 Plan 9 (printed 11/17/24) BOOT(8) BOOT(8) will be found from another system on the network using the BOOTP protocol and the Plan 9 vendor-specific fields. For the Datakit methods, hs, 9600, 19200, and incon, the address must be specified and must be a relative path name to the file server. If no address is specified, the address Nfs is used. FILES #s/boot SOURCE /sys/src/9/boot SEE ALSO root(3), bootp(8), init(8) Page 4 Plan 9 (printed 11/17/24)