On Thu, 14 Dec 2023 at 12:52, Martin Husemann <mar...@duskware.de> wrote:
>
> The web page does not give any technical details, so it is hard to tell
> how it is supposed to work.

I don't know, to be perfectly honest. I have not looked into it: it's
just a convenience tool that is both much quicker than writing an
image to disk, easier, and saves on rewriting keys: one key is a Linux
install key, and a Windows install key, and a few recovery
environments such as System Rescue.

> Since you tested it with FreeBSD: what devices shows up as root device
> there?

I can try it and check if you really need to know!

The source is here if you're curious:
https://github.com/ventoy/Ventoy

> Extracting the bootloader and dynamically generating the boot menu is the
> easy part, but how is the main part of the ISO filesystem provided to
> the kernel?

I think it mounts it on a separate virtual device, as the booted live
OS can see the raw Ventoy drive and UEFI partition _as well as_
running from its ISO file.

> On some architectures (and amd64 is one of them) the kernel booted from
> the ISO is not ramdisk based, but instead mounts the CD's ISO9660 file
> system as / (and sets up tmpfs for all writable parts).

You can choose whether to copy the ISO to a RAMdisk and boot from
that, if you have enough RAM and want to be able to remove the key.

> I don't see how that could work outside of an emulator.

It does, very well, and it works equally well on BIOS and UEFI.


-- 
Liam Proven ~ Profile: https://about.me/liamproven
Email: lpro...@cix.co.uk ~ gMail/gTalk/FB: lpro...@gmail.com
Twitter/LinkedIn: lproven ~ Skype: liamproven
IoM: (+44) 7624 277612: UK: (+44) 7939-087884
Czech [+ WhatsApp/Telegram/Signal]: (+420) 702-829-053

Reply via email to