On 13.12.21 16:48, Anmol wrote:
> Hi,
>
> I am trying to get virtio-over-ivshmem working with Xilinx-MPSoC(arm64)
> board.
>
> Things I have prepared/setup:
> -> Collected the patches of virtio-ivshmem from `queues/jailhouse-5.14`
> and applied them to the `xilinx_rebase_v5.4`.
>
> These patches includes:
> - uio: Enable read-only mappings (with some modifications, as xilinx
> `renamed uio.c -> uio_core.c & unified into uio.ko`)
> - WIP-ivshmem-Add-header-file
> - WIP-virtio-Add-virtio-over-ivshmem-transport-driver
> - WIP-uio-Add-driver-for-inter-VM-shared-memory-device
> - WIP-tools-Add-virtio-ivshmem-console-demo
> - WIP-tools-Add-virtio-ivshmem-block-demo
> - virtio: ivshmem: check peer_state early
>
> -> Cross-Compiled `virtio-ivshmem-{console, block}`.
> -> Added common shared PCI devices to the root and non-root cell.
> -> Root cell contains (`uio_ivshmem` driver)
> -> I can see `/dev/uio0`.
> -> Non-root cells contain (contain `virtio_ivshmem`).
>
> -> Also, after loading the jailhouse it's showing PCI devices I have added:
>
> ```
> Adding virtual PCI device 00:0c.0 to cell "ZynqMP-ZCU102"
> Adding virtual PCI device 00:0d.0 to cell "ZynqMP-ZCU102"
>
> ```
>
> After testing it, I am getting this(even after cross compiling the
> application):,
>
> root:~# ./virtio-ivshmem-console /dev/uio0 disk.img
> -sh: ./virtio-ivshmem-console: cannot execute binary file: Exec format error
>
> I am a little confused here, please let me know about anything I am missing.
>
Double-check with "file virtio-ivshmem-console" if that binary is really
of the right type. Also use "ldd virtio-ivshmem-console" on the target
to see if it lacks some dependencies there (due to mismatch in toolchains).
Jan
--
Siemens AG, T RDA IOT
Corporate Competence Center Embedded Linux
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/jailhouse-dev/7a34f1dd-243c-2df1-4bfa-b2b86faac8d9%40siemens.com.