[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] qemu-xen-3.4-testing: Fix read-only image file handling



You need to bring your qemu repo up to date. Throw it away, or go into it
and 'git pull -a'.

 -- Keir

On 04/06/2010 14:00, "Michal Novotny" <minovotn@xxxxxxxxxx> wrote:

> Well, now the kernel is booting but when I'm trying to recompile tools
> and stubdom images it's not OK returning those errors:
> 
> ...
> qemu successfuly configured for Xen qemu-dm build
> make -C ioemu-dir install
> === PCI passthrough capability has been enabled ===
> make[3]: Entering directory
> `/home2/shared/xen-unstable.hg/tools/ioemu-remote'
> === PCI passthrough capability has been enabled ===
> === PCI passthrough capability has been enabled ===
> make[4]: Entering directory
> `/home2/shared/xen-unstable.hg/tools/ioemu-remote/i386-dm'
> CC i386-dm/vl.o
> /home2/shared/xen-unstable.hg/tools/ioemu-dir/vl.c: In function ?main¹:
> /home2/shared/xen-unstable.hg/tools/ioemu-dir/vl.c:5729: warning:
> implicit declaration of function ?dma_helper_init¹
> /home2/shared/xen-unstable.hg/tools/ioemu-dir/vl.c:5731: error: too few
> arguments to function ?xc_interface_open¹
> make[4]: *** [vl.o] Error 1
> make[4]: Leaving directory
> `/home2/shared/xen-unstable.hg/tools/ioemu-remote/i386-dm'
> make[3]: *** [subdir-i386-dm] Error 2
> make[3]: Leaving directory
> `/home2/shared/xen-unstable.hg/tools/ioemu-remote'
> make[2]: *** [subdir-install-ioemu-dir] Error 2
> make[2]: Leaving directory `/home2/shared/xen-unstable.hg/tools'
> make[1]: *** [subdirs-install] Error 2
> make[1]: Leaving directory `/home2/shared/xen-unstable.hg/tools'
> make: *** [install-tools] Error 2
> #
> 
> The command I used for compilation is `make install-xen && make
> install-tools && make install-stubdom && make install-docs` on the
> latest updated xen-unstable staging mercurial tree so I need to
> investigate this further. Nevertheless, the dom0 2.6.31.13 is booting on
> RHEL-5 which is good. That links you gave me Pasi helped, thanks! Now I
> need to resolve those tools issues.
> 
> Michal
> 
> On 06/04/2010 12:57 PM, Michal Novotny wrote:
>> On 06/04/2010 12:42 PM, Pasi Kärkkäinen wrote:
>>> On Fri, Jun 04, 2010 at 11:37:51AM +0200, Michal Novotny wrote:
>>>> Oh, one more thing I've discovered now. Since the codebase for
>>>> qemu-xen-unstable is looking the same like for qemu-xen-3.4-testing and
>>>> the patch is applicable without any modifications it could be working
>>>> for xen-4.1 unstable as well, unfortunately I was not able to boot
>>>> PVOPS
>>>> kernel since it always ends up in kernel panic, maybe the missing
>>>> drivers or something like that.
>>>> 
>>> What kernel version? Did you use xen/stable-2.6.32.x branch from
>>> xen.git?
>> 
>> It's the one that's being automatically downloaded from git as
>> linux-2.6-pvops.git. The URL is
>> git://git.kernel.org/pub/scm/linux/kernel/git/jeremy/xen.git with the
>> "fetch" being set to "+refs/heads/*:refs/remotes/xen/*". This is the
>> .git/config automatically created by `make world` in xen-unstable tree:
>> 
>> [core]
>> repositoryformatversion = 0
>> filemode = true
>> bare = false
>> logallrefupdates = true
>> [remote "xen"]
>> url = git://git.kernel.org/pub/scm/linux/kernel/git/jeremy/xen.git
>> fetch = +refs/heads/*:refs/remotes/xen/*
>> [branch "xen/stable-2.6.31.x"]
>> remote = xen
>> merge = refs/heads/xen/stable-2.6.31.x
>> 
>> By default it's using uhci-hcd/ehci-hcd and ohci-hcd as builtins but I
>> needed to change it to be modules since otherwise it's being stuck.
>> I'm trying this on RHEL-5 dom0 (I'm having second partition RHEL-5
>> with upstream xen).
>>> See my example .config files from:
>>> http://wiki.xensource.com/xenwiki/XenParavirtOps in the
>>> "troubleshooting" section.
>> 
>> I'll have a look, thanks for the link.
>> 
>>> Works on F12/F13 dom0's.
>>> 
>>> For el5 dom0 you might need these:
>>> http://wiki.xensource.com/xenwiki/2.6.18-to-2.6.31-and-higher
>> 
>> Oh, ok, this may be very useful since I'm trying this on RHEL-5. Thanks!
>> 
>>> aka
>>> CONFIG_SYSFS_DEPRECATED=y
>>> CONFIG_SYSFS_DEPRECATED_V2=y
>>> 
>>> Also atm I think you need CONFIG_XEN_XENBUS_FRONTEND=y in the .config
>>> because of the recently added pv-on-hvm drivers (you'll get build
>>> failure without that option),
>>> so you need XEN_PCIDEV_FRONTEND XEN_BLKDEV_FRONTEND or
>>> XEN_NETDEV_FRONTEND or XEN_FBDEV_FRONTEND needs to be =y.
>>> 
>> 
>> Great! Thanks for your help Pasi! If anything I'll let you know.
>> 
>> Michal
>> 
>>> -- Pasi
>>> 
>>> 
>>>> On 06/03/2010 04:12 PM, Michal Novotny wrote:
>>>>> Oh, just one more thing that should be mentioned:
>>>>> 
>>>>> When you want to mount an image that is set as read-only in the domain
>>>>> configuration file but you omit to set mode to read-only it results
>>>>> into I/O errors when processing the requests. Remounting as read-only
>>>>> or unmounting and remounting using the `mount /dev/* /path/to/mount -o
>>>>> ro` shall do the mounting the correct way, i.e. with no I/O errors, so
>>>>> make sure you mount those disks as read-only otherwise you can be
>>>>> getting errors like:
>>>>> 
>>>>> end_request: I/O error, dev hdb, sector 52
>>>>> 
>>>>> Buffer I/O error on device hdb1, logical block 1
>>>>> 
>>>>> lost page write due to I/O error on hdb1
>>>>> 
>>>>> 
>>>>> and for IDE devices you'll be getting several additional DeviceFault
>>>>> errors since mounting the device read-write (default setting) writes
>>>>> some data onto a disk at the mount-time.
>>>>> 
>>>>> Michal
>>>>> 
>>>>> On 06/03/2010 04:04 PM, Michal Novotny wrote:
>>>>>> [Well, I did send an e-mail to the list using git but it's not here
>>>>>> so I'm forwarding the e-mail to the list for sure:]
>>>>>> 
>>>>>> Hi,
>>>>>> this is the patch for qemu-xen-3.4-testing to fix the read-only
>>>>>> image file handling since the image file was always treated as
>>>>>> read-write which means that all the HVM guests were able to
>>>>>> write to all the disk images available in domain configuration
>>>>>> file no matter what the mode of the image was defined. This
>>>>>> patch fixes this functionality to honor the O_RDONLY in the
>>>>>> BDRV_O_ACCESS flag in block.c and also fixes the IDE and SCSI
>>>>>> interfaces that uses it.
>>>>>> 
>>>>>> It's been tested on RHEL-5 with xen-3.4-testing version of
>>>>>> upstream xen with xen-3.4-testing qemu implementation.
>>>>>> 
>>>>>> For SCSI devices the DATA PROTECT request sense has been added
>>>>>> as found at: http://en.wikipedia.org/wiki/SCSI_Request_Sense_Command
>>>>>> 
>>>>>> file no matter what the mode of the image was defined. This
>>>>>> patch fixes this functionality to honor the O_RDONLY in the
>>>>>> BDRV_O_ACCESS flag in block.c and also fixes the IDE and SCSI
>>>>>> interfaces that uses it.
>>>>>> 
>>>>>> It's been tested on RHEL-5 with xen-3.4-testing version of
>>>>>> Michal
>>>>>> 
>>>>>> Signed-off-by: Michal Novotny<minovotn@xxxxxxxxxx>
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> Xen-devel mailing list
>>>>>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>>>>>> http://lists.xensource.com/xen-devel
>>>>> 
>>>> 
>>>> -- 
>>>> Michal Novotny<minovotn@xxxxxxxxxx>, RHCE
>>>> Virtualization Team (xen userspace), Red Hat
>>>> 
>>>> 
>>>> _______________________________________________
>>>> Xen-devel mailing list
>>>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>>>> http://lists.xensource.com/xen-devel
>> 
>> 
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.