Re: L4-based microkernel on Intel SCC

2014-06-05 Thread Julian Stecklina
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/04/2014 10:07 AM, Masti Ramya Jayaram wrote:
 Hi all,
 
 In fact, I am looking for a micro-kernel based hypervisor (like
 L4:pistachio or Fiasco) to run on the SCC. The only pointer I found
 was a port of Fiasco OS for Intel SCC recently
 (http://os.inf.tu-dresden.de/papers_ps/partheymueller-beleg.pdf)
 and would like to try this.
 
 I had a few questions though:
 
 a. Is the public version of fiasco compatible with the SCC? If not,
 is it possible to get it?

The only major problem is booting Fiasco on the SCC. You will have to
write a simple boot loader that uses the SCC's tools to write all the
boot modules into the SCC's memory. After that it is rather
straight-forward, except for the special page attributes the SCC
supports, if you want to do message passing.

Regarding the code, maybe Markus (CCed) knows more.

 b. Since SCC uses a different compiler set (much older than gcc
 4.4), does the compilation work out of the box?

You don't need a special compiler for the SCC. Any version of gcc or
clang will work if you set the compilation target to Pentium.

 c. Finally, has anyone run L4Linux on top of the SCC?

Yes, I believe we did. Markus?

Btw, what do you want to achieve? The SCC is an abandoned and buggy
platform.

Julian
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iEYEARECAAYFAlOQPLQACgkQ2EtjUdW3H9lyQwCfd9Ns2xw315Q2qc4uhhgZCi7S
A8IAoMg7+wQMrsMZpKg0ZYX47DlKh6E7
=6DLL
-END PGP SIGNATURE-

___
l4-hackers mailing list
l4-hackers@os.inf.tu-dresden.de
http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers


Dresden Microkernel Hackers Meet-up

2014-06-05 Thread Julian Stecklina
Hey fellow microkernel hackers,

a lot of us are still in Dresden, but are now scattered across several
work places. Let's meet up and have some beer next week.

Please vote for when[1] and where[2] until Sunday 18:00 CEST. I'll send
one additional mail on Sunday evening to announce the results.

Forward this mail as you like. The more the merrier.

For all of you too far away: My apologies for the off-topic mail.

Julian


[1] https://dudle.inf.tu-dresden.de/ukernelbeerwhen/
[2] https://dudle.inf.tu-dresden.de/ukernelbeerwhat/



signature.asc
Description: OpenPGP digital signature
___
l4-hackers mailing list
l4-hackers@os.inf.tu-dresden.de
http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers


Re: L4-based microkernel on Intel SCC

2014-06-05 Thread Markus Partheymueller
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 The only major problem is booting Fiasco on the SCC. You will
 have to write a simple boot loader that uses the SCC's tools to
 write all the boot modules into the SCC's memory. After that it
 is rather straight-forward, except for the special page
 attributes the SCC supports, if you want to do message passing.
 
 Regarding the code, maybe Markus (CCed) knows more.
 
 Great! I hope to hear more from Markus.

Indeed, one major step was to load the respective data onto the SCC
and start it. The rest was to accommodate for the various
particularities (no VGA, no input devices, no fixed frequency timer
device, the special message passing buffer type, etc.)

The changes to the kernel have not been merged into upstream because
they were very specific to the SCC and of little more generic use. But
I can send you the patch if you want.

 You don't need a special compiler for the SCC. Any version of gcc
 or clang will work if you set the compilation target to Pentium.
 
 Ok.
 c. Finally, has anyone run L4Linux on top of the SCC?
 
 Yes, I believe we did. Markus?
 
 In this case, it would be great to simply replicate your setup!

Yes, you should be able to run almost every ELF binary (conditions may
apply...) produced by the L4Re build system (make elfimage
E=yourmoduleentry), including L4Linux. But I have to say that we did
not have the time for looking into larger deployments at the time. In
order to load and start ELF binaries on the SCC, I wrote an extension
to the sccKit that was available then. The way it worked was like this:

1) Extract ELF according to the ELF headers and copy it to the SCC's
memory

2) Place protected mode boot code and the reset vector in memory

3) Set up multiboot information structure (for memory maps)

4) Set up an I/O connection for providing serial connection with the core

Now, if I remember correctly, a lot of improvement has been made to
the sccKit and the whole interaction with the chip after I finished
this project (virtual framebuffers, serial output, etc.). So I tend to
doubt that this part of my (fairly outdated) work will be of any
practical use to you. But you could of course have a look at it.

So let me know if I should send you some examples, but keep in mind
that it is all horribly outdated.

Cheers

Markus

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTkGKNAAoJEEKdXT07x5qCAYIH/jh33NG8P59JvdPfAVrUED+H
E/UzsIxmzgivTqMriyeuuL7kAipg/YMN16kABWJCbwW+FmceyF5YTP56K3HM4BRe
+jwu1M05i0SdxRnJkYr89MGG29tbgfhKxvay0tylUnZb/FPJjfyOgU3if5dTnTY1
qh7fS99IDgWOhlGPjrqE6f5zcol8mUT0rmET+rk/UBmZIUmkRZVEjMXmgu7NQhoP
XkEVgChz+s+vXiFukXolmN3z5NlW6+3zFFy0q2p7c4dK3KCrXhQLLNNhzstKq9zK
/CiUFOCA3TdOp/AnRlVUPKwmqVvVWNuuI5o+2Jzx/h127YMOmPBo6nout/CiwaA=
=ngE/
-END PGP SIGNATURE-

___
l4-hackers mailing list
l4-hackers@os.inf.tu-dresden.de
http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers


Re: L4-based microkernel on Intel SCC

2014-06-05 Thread Ramya Masti
Markus Partheymueller mpartheym at os.inf.tu-dresden.de writes:

 
 The changes to the kernel have not been merged into upstream because
 they were very specific to the SCC and of little more generic use. But
 I can send you the patch if you want.
 
 That would be great! Also, do let me know the version of the compiler, 
fiasco and l4re you used just to be sure. Alternatively, the source tree 
will also work.

 Yes, you should be able to run almost every ELF binary (conditions may
 apply...) produced by the L4Re build system (make elfimage
 E=yourmoduleentry), including L4Linux. But I have to say that we did
 not have the time for looking into larger deployments at the time. In
 order to load and start ELF binaries on the SCC, I wrote an extension
 to the sccKit that was available then. The way it worked was like this:
 
 1) Extract ELF according to the ELF headers and copy it to the SCC's
 memory
 
 2) Place protected mode boot code and the reset vector in memory
 
 3) Set up multiboot information structure (for memory maps)
 
 4) Set up an I/O connection for providing serial connection with the core
 

1,2,3 are possible but 4 depends on the OS I guess. Send me this as well in 
any case and I will get back to you if I have problems.

 Now, if I remember correctly, a lot of improvement has been made to
 the sccKit and the whole interaction with the chip after I finished
 this project (virtual framebuffers, serial output, etc.). So I tend to
 doubt that this part of my (fairly outdated) work will be of any
 practical use to you. But you could of course have a look at it.
 

No problem. I will get back to you if I have problems.

Thanks,
Ramya




___
l4-hackers mailing list
l4-hackers@os.inf.tu-dresden.de
http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers


how to transfer capabilities from server to client

2014-06-05 Thread Yuxin Ren
Hi,
I want to write some code to transfer capabilities from server to client.
But I have no idea how to do this as I am not familiar with L4Re and its
interface.
Could anyone give me some example code or some hints?

Thank you very much.
Best
___
l4-hackers mailing list
l4-hackers@os.inf.tu-dresden.de
http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers


Re: how to transfer capabilities from server to client

2014-06-05 Thread Björn Döbel
Hi,

 I want to write some code to transfer capabilities from server to client.
 But I have no idea how to do this as I am not familiar with L4Re and its
 interface.
 Could anyone give me some example code or some hints?

please have a look at l4/pkg/examples/sys/map_irq

Kind regards,
Bjoern


___
l4-hackers mailing list
l4-hackers@os.inf.tu-dresden.de
http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers