From owner-freebsd-hackers@FreeBSD.ORG Sat Jun 13 10:34:53 2015 Return-Path: Delivered-To: freebsd-hackers@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 67C3E5A2 for ; Sat, 13 Jun 2015 10:34:53 +0000 (UTC) (envelope-from Don.whY@gmx.com) Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EB4406AC for ; Sat, 13 Jun 2015 10:34:52 +0000 (UTC) (envelope-from Don.whY@gmx.com) Received: from [192.168.1.115] ([67.212.197.98]) by mail.gmx.com (mrgmx001) with ESMTPSA (Nemesis) id 0MgKUo-1YhFg20ud4-00Nhf3 for ; Sat, 13 Jun 2015 12:34:44 +0200 Message-ID: <557C073E.1060702@gmx.com> Date: Sat, 13 Jun 2015 03:34:38 -0700 From: Don whY User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Thunderbird/31.1.1 MIME-Version: 1.0 To: FreeBSD-Hackers Mailing List Subject: PXE boot an XIP image? Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K0:29J5+nso+N/eABtGK4AnKLJ9s0npFEu5j3SP8pBwetnV+ISrqIx RirJ4HOM/kN3ib+IM52flMeTb51JJZ6xX6AhY0aOSRrplcL/1CBHLD82gevEL++7T3FUZZW 5qU94qziZQCe0AHs+9sJ+0jHYo4ASGe3TbPUfRB1zNgXsW4DMvzFBj46Q5laahrYlacSHza 71ZgxCrh+Ke86JTfV+bYQ== X-UI-Out-Filterresults: notjunk:1;V01:K0:TfawNQWlR2E=:FYcwiLkKLu2YVy9CYn7ya4 hbv5WoCaWWK+WwyF/pWxAjVhQAV94JUwLMr3/IheTRAshS4136Sf0hvcpYfRA42R/MCXJZ4VH 46IKKG2WU/Bk4wO5LyewkkEwHARolHnxMKw1nLaV/6O+3GOLOn9X42c7rMg+o2HRS82PTXiFx GNmi+sy5jK0D4Ld53YX1KF0asj2BwtkuJBgrvoQFKKUlAEUOZ1ZN3nc1EmRKwySA+ZB3wR+b7 OEpizm89XbMjCj3rkfx2NS+OYY8S8hCk7SSXAOCT1hYubm65pq34M0HazqE66GWGC2q0gxxtR K/DaQoG6bqlYtj63kpqiYkxKGYq0a+ypap9Ar6h93PdbxsK78uF1KLMlkOft1OOrDk+J7qalv KnJEhntPUdFbRVMJpIvNiXXLZ9hXlmdBChjc1qK5p0F102VEr4HGTOAG6KUKS1U4uVvs31dqo U53tg2RNV+e7uxnSRnaZ9bY/npyW3q5UheQehBv6xMxQvcLFhYJDbrgCN0eixXftq/c0qC598 FfpumE7typeVp/xm1JDD8thJrnDUGUfkbYDS2C3pkYyntKRoHbdYi35hD/cAMDGb+8T6ggEZH Vuf2XNs6e9V1PBNdL3nM6/i4Pn2698KR1ojeJD3+Yw6/EPFlg7KWWovGYhdBYvjdQseycpuZA LC4pDXexQ7mS5UolGEGC0fHlNgMajz9rLFqjIP66sKut6E8vR82LYz9SRF3rk4ryk0Bw= X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 13 Jun 2015 10:34:53 -0000 Hi, Apologies as to whether this belongs here... or on -embedded. :< I'd like to PXE boot a kernel then fetch (any choice of protocol) a *single* image to load into RAM thereafter not requiring any access to external media to operate. I.e., as if the image had resided in the device all along. A crude approach *might* be something like crunchgen'ing init with all of the (static linked) binaries that are required and letting the loaded kernel NFS read (load) that init(1). Obviously, I'd trim the kernel and other binaries down to the bare essentials to minimize RAM requirements (as there would be no swap, etc.) [I.e., creating a tiny filesystem that simply links every executable back to this *one* image] In practice, this won't (?) really work as hoped. Any pointers on a proven technique to achieve these results? Thanks!