From patchwork Fri Oct 2 16:01:22 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Romain Naour X-Patchwork-Id: 1375913 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=busybox.net (client-ip=140.211.166.138; helo=whitealder.osuosl.org; envelope-from=buildroot-bounces@busybox.net; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=kF/P6OFS; dkim-atps=neutral Received: from whitealder.osuosl.org (smtp1.osuosl.org [140.211.166.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4C2vr00jvjz9sPB for ; Sat, 3 Oct 2020 02:01:35 +1000 (AEST) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id CED2386B9E; Fri, 2 Oct 2020 16:01:32 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y3wDFT-vCYnm; Fri, 2 Oct 2020 16:01:30 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by whitealder.osuosl.org (Postfix) with ESMTP id CE5BF86AF9; Fri, 2 Oct 2020 16:01:30 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from hemlock.osuosl.org (smtp2.osuosl.org [140.211.166.133]) by ash.osuosl.org (Postfix) with ESMTP id B7B5D1BF94D for ; Fri, 2 Oct 2020 16:01:28 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by hemlock.osuosl.org (Postfix) with ESMTP id B4D4286F92 for ; Fri, 2 Oct 2020 16:01:28 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from hemlock.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hGN+ZSg2p7Wl for ; Fri, 2 Oct 2020 16:01:28 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by hemlock.osuosl.org (Postfix) with ESMTPS id E3ADE86F8A for ; Fri, 2 Oct 2020 16:01:27 +0000 (UTC) Received: by mail-wr1-f66.google.com with SMTP id o5so2366270wrn.13 for ; Fri, 02 Oct 2020 09:01:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=bjXbHvdamq7WVbtvH+FM/bCDIat4dnTLcOmEQqF7pRY=; b=kF/P6OFSmjVjWaY/hDv1ALjzwH1xPLwz5LQiIBNWEnSnluySjx8i7vpipqfq0v0tQt wauit6njdnC4n16pR/uTNXPJQVGHgp4Q6/zFQ1ArXYVfxM093f3+9Q0ADAMUaZookXK2 HrXl68xBdnjHK2PCifeMrUvjfKZQld7dIuDYX1VfSImhlhT5komeWrUR10J3bZb1UsaO rPVShBOYmCcgw9JVY9O1zacM3XRew5emhZkF3xCDzw+FEfQrIoAYrYlwTF6ZVDiETkxr zr6LGlvPejKHSKkneqeGFbrFhptONSAdujiFWgWe+wlZlW1kCUmY+Eq+kN/NhrDGatQD BB1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=bjXbHvdamq7WVbtvH+FM/bCDIat4dnTLcOmEQqF7pRY=; b=sMT0xa4IHSzRFPfZfyTcY8c66UH4BqTAUUuBlFi0MijwD7QH1rmuD0sVkL97rXq9tu xoyzpB7wjlMEciQqSYL676G4BDod3DzJQRKE678ZmeDZXv4SotlHKhf6y4sPBSI0j97K GR63yRBW2Mr6c0fxznP9uRXUV1zS3Fwfpmu7953ZKbfErS8lXD1mxSafYCYAdIyw8ZJ/ nYGG5EooHoUC8/iSuJpqI+AIzaOXYnO15fgQwGDH5B/dkfMMNIt8Nd5rvafipNvSPf2Q oKssgUzgb3lbDr6CzyKPAypi/etEt9pka6cMwfGSwA2yLNrQVZdygJimeoPXnhBaFCFj tBzA== X-Gm-Message-State: AOAM5330uYUzH1SoqxUup5PdY+vkgP8NXVGK5UKY2LZAnt6Lh9LSTriU Ppu+0qSBLDcUiAgi1gG8EAoC2HD19tY= X-Google-Smtp-Source: ABdhPJzKNwv5Wk4mW7zx16EBzbEaw6EFEr5wjYKZPZzjOBjbQZzvdU0kQzr8a0RJi4MNXlg/X2epIA== X-Received: by 2002:adf:ef45:: with SMTP id c5mr3826198wrp.384.1601654486202; Fri, 02 Oct 2020 09:01:26 -0700 (PDT) Received: from localhost.localdomain (2a01cb058f8a18003dbee9eed79eb521.ipv6.abo.wanadoo.fr. [2a01:cb05:8f8a:1800:3dbe:e9ee:d79e:b521]) by smtp.gmail.com with ESMTPSA id t15sm2158695wrp.20.2020.10.02.09.01.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 02 Oct 2020 09:01:25 -0700 (PDT) From: Romain Naour To: buildroot@buildroot.org Date: Fri, 2 Oct 2020 18:01:22 +0200 Message-Id: <20201002160122.1530178-1-romain.naour@gmail.com> X-Mailer: git-send-email 2.25.4 MIME-Version: 1.0 Subject: [Buildroot] [PATCH] board/qemu/riscv64-virt: update qemu cmdline for Qemu >= 5.1 X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Jugurtha BELKALEM , Romain Naour , Mark Corbin , Alistair Francis Errors-To: buildroot-bounces@busybox.net Sender: "buildroot" Since 52f188140cd28e90103edf67db6c2cabb979f5d6 (qemu version bump to 5.1), the image generated by qemu_riscv64_virt_defconfig doesn't boot anyore with the following error: rom: requested regions overlap (rom phdr #0: [...]/images//fw_jump.elf. free=0x000000008000e240, addr=0x0000000080000000) qemu-system-riscv64: rom check and register reset failed Update the qemu command line as described in the Qemu wiki for riscv64 [1] Fixes: https://gitlab.com/jugurthaB/buildroot/-/jobs/686104707 [1] https://wiki.qemu.org/Documentation/Platforms/RISCV#Booting_64-bit_OpenEmbedded_Images Signed-off-by: Romain Naour Cc: Jugurtha BELKALEM Cc: Alistair Francis Cc: Mark Corbin Reviewed-by: Alistair Francis --- board/qemu/riscv64-virt/readme.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/board/qemu/riscv64-virt/readme.txt b/board/qemu/riscv64-virt/readme.txt index 81b5246e66..747a9ea674 100644 --- a/board/qemu/riscv64-virt/readme.txt +++ b/board/qemu/riscv64-virt/readme.txt @@ -1,5 +1,5 @@ Run Linux in emulation with: - qemu-system-riscv64 -M virt -kernel output/images/fw_jump.elf -device loader,file=output/images/Image,addr=0x80200000 -append "rootwait root=/dev/vda ro" -drive file=output/images/rootfs.ext2,format=raw,id=hd0 -device virtio-blk-device,drive=hd0 -netdev user,id=net0 -device virtio-net-device,netdev=net0 -nographic # qemu_riscv64_virt_defconfig + qemu-system-riscv64 -M virt -bios output/images/fw_jump.elf -kernel output/images/Image -append "rootwait root=/dev/vda ro" -drive file=output/images/rootfs.ext2,format=raw,id=hd0 -device virtio-blk-device,drive=hd0 -netdev user,id=net0 -device virtio-net-device,netdev=net0 -nographic # qemu_riscv64_virt_defconfig The login prompt will appear in the terminal that started Qemu.