Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Jun 2015 17:10:50 +0800
From:      Julian Elischer <julian@freebsd.org>
To:        Konstantin Belousov <kostikbel@gmail.com>
Cc:        Don whY <Don.whY@gmx.com>, FreeBSD-Hackers Mailing List <freebsd-hackers@freebsd.org>
Subject:   Re: PXE boot an XIP image?
Message-ID:  <557FE81A.3090607@freebsd.org>
In-Reply-To: <20150616050438.GI2080@kib.kiev.ua>
References:  <557C073E.1060702@gmx.com> <557C2BD7.1000104@freebsd.org> <557C844F.1010107@gmx.com> <557E4480.6000603@freebsd.org> <557F0ED6.7010700@gmx.com> <557F91C4.8080602@freebsd.org> <20150616040208.GG2080@kib.kiev.ua> <557FA842.7060803@freebsd.org> <20150616050438.GI2080@kib.kiev.ua>

next in thread | previous in thread | raw e-mail | index | archive | help
On 6/16/15 1:04 PM, Konstantin Belousov wrote:
> On Tue, Jun 16, 2015 at 12:38:26PM +0800, Julian Elischer wrote:
>> On 6/16/15 12:02 PM, Konstantin Belousov wrote:
>>> Our tmpfs(5) provides the in-place execution capability, assuming the image
>>> has correctly aligned segments.
>> cool.. but I guess you'd have to load it up from the net before you
>> could use it.
>> Is this documented anywhere?
>>
> Documented what ? A way to populate tmpfs mount with some data ?
> I think tar xf might be enough.
No silly, the fact that it allows in-place execution where the text 
pages of
the binary are mapped directly to the text pages of the running 
process image.
>
>




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?557FE81A.3090607>