From owner-freebsd-hackers Sat Jan 22 5:34:26 2000 Delivered-To: freebsd-hackers@freebsd.org Received: from mimer.webgiro.com (mimer.webgiro.com [212.209.29.5]) by hub.freebsd.org (Postfix) with ESMTP id B809015799 for ; Sat, 22 Jan 2000 05:34:17 -0800 (PST) (envelope-from abial@webgiro.com) Received: by mimer.webgiro.com (Postfix, from userid 66) id 531C02DC0A; Sat, 22 Jan 2000 14:34:03 +0100 (CET) Received: by mx.webgiro.com (Postfix, from userid 1001) id 166B47811; Sat, 22 Jan 2000 14:34:35 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by mx.webgiro.com (Postfix) with ESMTP id 0CE8710E10; Sat, 22 Jan 2000 14:34:35 +0100 (CET) Date: Sat, 22 Jan 2000 14:34:35 +0100 (CET) From: Andrzej Bialecki To: Michael Kennett Cc: freebsd-hackers@freebsd.org Subject: Re: Great FICL Hacks In-Reply-To: <200001220959.RAA09095@laurasia.com.au> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Sat, 22 Jan 2000, Michael Kennett wrote: > I've been playing around with the boot loader(8), which seems to be a > very powerful piece of software. However I'm really only using the 'load', > 'unload', and 'boot' functions. I'd be interested in hearing about more > powerful uses of this software. > > Are there any great hacks of FICL that people have done? /usr/share/examples/bootforth. As well as, of course, /boot/*.4th . It seems that currently Daniel Sobral is the best source to answer more advanced questions... Andrzej Bialecki // WebGiro AB, Sweden (http://www.webgiro.com) // ------------------------------------------------------------------- // ------ FreeBSD: The Power to Serve. http://www.freebsd.org -------- // --- Small & Embedded FreeBSD: http://www.freebsd.org/~picobsd/ ---- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message