From owner-freebsd-hackers@FreeBSD.ORG Tue Jun 16 06:43:23 2015 Return-Path: Delivered-To: freebsd-hackers@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 04FBD401; Tue, 16 Jun 2015 06:43:23 +0000 (UTC) (envelope-from Don.whY@gmx.com) Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 84CBEAA6; Tue, 16 Jun 2015 06:43:22 +0000 (UTC) (envelope-from Don.whY@gmx.com) Received: from [192.168.1.115] ([67.212.197.98]) by mail.gmx.com (mrgmx103) with ESMTPSA (Nemesis) id 0MRocn-1Ybqog399l-00Sz0t; Tue, 16 Jun 2015 08:43:20 +0200 Message-ID: <557FC599.1040807@gmx.com> Date: Mon, 15 Jun 2015 23:43:37 -0700 From: Don whY User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Thunderbird/31.1.1 MIME-Version: 1.0 To: Julian Elischer , FreeBSD-Hackers Mailing List Subject: Re: PXE boot an XIP image? References: <557C073E.1060702@gmx.com> <557C2BD7.1000104@freebsd.org> <557C844F.1010107@gmx.com> <557E4480.6000603@freebsd.org> <557F0ED6.7010700@gmx.com> <557F91C4.8080602@freebsd.org> In-Reply-To: <557F91C4.8080602@freebsd.org> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K0:hH/tMylvFiq68SJ2atdRdnL8km5iyyamgthNNAxp2BPMkbQ4XRh MLAdggTg8fj0bHZ2fIUYH0A09cv1qcQDVc43S4o1NmudM5VuGZr1jxOKSKpXZ4rRttKlevx 0kNLQNGx8LzRMi89z+I6AWaK4T8mfHb4xA6mNvRZkDCKSXv3PXorqZ/H+PoAAM4Li3cuupj xEblqQUGYoN2QVKO/YH1Q== X-UI-Out-Filterresults: notjunk:1;V01:K0:ZsFFHylIYcU=:eel2y7S9FGhEMdw/6fzs5r a7lk1RSRJYx5plXr2S49PMA1enxeNarWnkBaDBHTvmLjrz9DsrgV/dS0EL/5edOVJgYagCYzc MVWX6Zk+9UR2Q1iMtooM4TMolYwZudKN+2MKoneNNP0BfGJ6XdTKaHbO28oOwvm9DpDQIAgbY XwrvNEJAS3d4VoDUk3HrNBbf4e6Olx1yHdvnh8UnnoQmac/gNvXQwW8PA/9vH03FCd1WFSe1i KeVmCRIwE0vi6Xt3d1ypaLMb1UA0LBELzwNLHUTPr9WyYKzCvkeRFPmmY6q4ttI//d1QaO4gE oTgvhnmX+OTQVUJa/edVuXSR2Uxa8vnTUMgeJd8Hfmn75DyxM3aXBkvNk+4tc+ZKZtiMs6SAq ExCF+x8Tr6RnU0GPNovc5TazyyafOjZzUSwDXjvRVbi5Rvdn1FU84ZgoFMa2kxwx86qt1s4Mf HDfOiWJTWlsTSq4ro8nvQnfS9H8l0uyRzVufgX724bCeT8l1hVf7vScOeRouvwLsDwndmk03W hmqNGWwRBfHzBQXQa0Esr+9Hx3eyxmv1iWvnpx4BjfW81QiEyvWOOe+O9NIpy3Ky42ddVBaxF kgmnDPEKeN+Sq+NKjRvZdESqFxZAUJU/RVc7UUsHgEA75MLyjmhEbRev5nPhBc2QxNgh90UOC YAMUHyosBJPFn3tWlc0uSkKsLYuXq9S+n+cMITbdRjbhwfDve1EqHrcIo96qZI/KZ6LQ= X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jun 2015 06:43:23 -0000 On 6/15/2015 8:02 PM, Julian Elischer wrote: > On 6/16/15 1:43 AM, Don whY wrote: >> >> I was looking for more of a "hack" to exploit existing characteristics in a >> novel way -- in much the same way that crunchgen can be considered a "hack". >> I just can't see a trick to work-around this basic "load/execute" assumption >> inherent in UN*X and other "desktop" OS's. > > I think the two parts of the equation are: > and image activator that loads the text segment by sharing > and a matching filesystem that has an interface by which pages of a file > can be available on a refcounted basis to the VM. > given those two things it maybe able to have only no shared data taking up > extra space on execute. > > For me it wouldn't be worth the extra work, but I could imagine some very small > machines where it may be an advantage. I'm *sure* it has little-to-no value in a "resource-rich" environment (e.g., most places where UN*X variants are deployed). OTOH, SoC-based systems (typically resource-starved) win each time you can save a byte! I was hoping I could build on a FOSS platform and leave much of the products' support/evolution to "others". Building on a proprietary RTOS makes that impractical. :-/