From nobody Fri Oct 31 23:10:57 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=quarantine dis=none) header.from=suse.com ARC-Seal: i=1; a=rsa-sha256; t=1745924822; cv=none; d=zohomail.com; s=zohoarc; b=TlalkkoNj95Jh58ZiZBktAF7ZJeuENVIEVJrOKHMAWzmy9CtckPkMdAcHlSa5shhqXUGU1sXrT2J4x7WlBtDJoowGHRjpcQCY9d6ZUnNl01dzfZX//KeMumvO5IqsxnUyYtxA3hLfXEmbnwLYvLx5J4dUtZwNHokmPJiDWw4G84= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1745924822; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=pmW3Z8PxhY68j0KGzwNsOgL5CZUZko1PJrOiOnKvPqw=; b=DbJiisEd5eExkwep/M0OA2KE+WJ+I0LsAwJpoFpeV71OCtLcp7hlulsJgL8o95VZaUbZtI+stgMjGa6/SbMs6yn3ErNcuNgrkQ+RGg2UKlWphs1I0wbo2YpBsc5aG+9PcVPGx4yLx4yme1L9b3JuNIaQnlwgsGvSBNkl1GkibDA= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1745924822090673.1749856161101; Tue, 29 Apr 2025 04:07:02 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.971956.1360353 (Exim 4.92) (envelope-from ) id 1u9inZ-0001ma-61; Tue, 29 Apr 2025 11:06:49 +0000 Received: by outflank-mailman (output) from mailman id 971956.1360353; Tue, 29 Apr 2025 11:06:49 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1u9inZ-0001mP-3V; Tue, 29 Apr 2025 11:06:49 +0000 Received: by outflank-mailman (input) for mailman id 971956; Tue, 29 Apr 2025 11:06:48 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1u9inY-0001lr-1W for xen-devel@lists.xenproject.org; Tue, 29 Apr 2025 11:06:48 +0000 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 093b7c7d-24ea-11f0-9ffb-bf95429c2676; Tue, 29 Apr 2025 13:06:44 +0200 (CEST) Received: from imap1.dmz-prg2.suse.org (unknown [10.150.64.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 4CA0421199; Tue, 29 Apr 2025 11:06:44 +0000 (UTC) Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id F068D13A8B; Tue, 29 Apr 2025 11:06:43 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id Qu7uOMOyEGgNOwAAD6G6ig (envelope-from ); Tue, 29 Apr 2025 11:06:43 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 093b7c7d-24ea-11f0-9ffb-bf95429c2676 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1745924804; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pmW3Z8PxhY68j0KGzwNsOgL5CZUZko1PJrOiOnKvPqw=; b=sJ3FmXh5ti0nWyTBhLLCatLPMsOZ9sqjmCf/U7WfwScO1b9BK9kMGBF1X4Q4esTg6XqBqe pVNpBENbJ8yJ5EXlySTkQfGGEQyKYVBaRxoF+6xgRbcgCT3YAXptyk04eeTAfdL5ZHGY/y +FEkRqbr5zBWqU3lhO/aLgkSfOZa9hY= Authentication-Results: smtp-out1.suse.de; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1745924804; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pmW3Z8PxhY68j0KGzwNsOgL5CZUZko1PJrOiOnKvPqw=; b=sJ3FmXh5ti0nWyTBhLLCatLPMsOZ9sqjmCf/U7WfwScO1b9BK9kMGBF1X4Q4esTg6XqBqe pVNpBENbJ8yJ5EXlySTkQfGGEQyKYVBaRxoF+6xgRbcgCT3YAXptyk04eeTAfdL5ZHGY/y +FEkRqbr5zBWqU3lhO/aLgkSfOZa9hY= From: Juergen Gross To: xen-devel@lists.xenproject.org Cc: Juergen Gross , Anthony PERARD , Andrew Cooper , Michal Orzel , Jan Beulich , Julien Grall , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v3 1/4] docs: remove qemu-traditional support from documentation Date: Tue, 29 Apr 2025 13:06:31 +0200 Message-ID: <20250429110636.30518-2-jgross@suse.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250429110636.30518-1-jgross@suse.com> References: <20250429110636.30518-1-jgross@suse.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Spam-Level: X-Spamd-Result: default: False [-2.80 / 50.00]; BAYES_HAM(-3.00)[100.00%]; MID_CONTAINS_FROM(1.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; R_MISSING_CHARSET(0.50)[]; NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain]; RCPT_COUNT_SEVEN(0.00)[9]; RCVD_VIA_SMTP_AUTH(0.00)[]; MIME_TRACE(0.00)[0:+]; ARC_NA(0.00)[]; DKIM_SIGNED(0.00)[suse.com:s=susede1]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DBL_BLOCKED_OPENRESOLVER(0.00)[imap1.dmz-prg2.suse.org:helo,suse.com:email,suse.com:mid]; RCVD_TLS_ALL(0.00)[] X-Spam-Score: -2.80 X-Spam-Flag: NO X-ZohoMail-DKIM: pass (identity @suse.com) X-ZM-MESSAGEID: 1745924824185019000 Content-Type: text/plain; charset="utf-8" In preparation to no longer support qemu-traditional (including qemu-stubdom), remove it from documentation. Signed-off-by: Juergen Gross Reviewed-by: Anthony PERARD --- V2: - mention "qemu_xen_traditional" in xenstore-paths.pandoc as a removed device model variant (Andrew Cooper) - don't drop Config.mk related documentation for QEMU_TRADITIONAL_REVISION (Jan Beulich) V3: - drop another opengl reference (Anthony Perard) - drop 2 superfluous sentences for gfx_passthru (Anthony Perard) - reword a bios_path_override note (Anthony Perard) --- docs/man/xl-pci-configuration.5.pod | 4 +- docs/man/xl.cfg.5.pod.in | 49 +++-------------- docs/misc/stubdom.txt | 52 ------------------- docs/misc/xenstore-paths.pandoc | 3 +- docs/process/branching-checklist.txt | 3 -- docs/process/release-technician-checklist.txt | 2 - docs/process/xen-release-management.pandoc | 2 +- 7 files changed, 13 insertions(+), 102 deletions(-) diff --git a/docs/man/xl-pci-configuration.5.pod b/docs/man/xl-pci-configur= ation.5.pod index ec76f590b7..0691f06ad3 100644 --- a/docs/man/xl-pci-configuration.5.pod +++ b/docs/man/xl-pci-configuration.5.pod @@ -111,8 +111,8 @@ if this parameter is not specified. =3Ditem Description =20 By default pciback only allows PV guests to write "known safe" values -into PCI configuration space, likewise QEMU (both qemu-xen and -qemu-xen-traditional) imposes the same constraint on HVM guests. +into PCI configuration space, likewise QEMU imposes the same constraint +on HVM guests. However, many devices require writes to other areas of the configuration s= pace in order to operate properly. This option tells the backend (pciback or Q= EMU) to allow all writes to the PCI configuration space of this device by this diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in index 7339c44efd..c388899306 100644 --- a/docs/man/xl.cfg.5.pod.in +++ b/docs/man/xl.cfg.5.pod.in @@ -841,7 +841,7 @@ This option does not control the emulated graphics card= presented to an HVM guest. See B below for how to configure the emulated device. If B options are used in a PV guest configuration, B will pick up B, B, -B, B, B, B, B and +B, B, B, B and B to construct the paravirtual framebuffer device for the guest. =20 Each B is a comma-separated list of C @@ -895,12 +895,6 @@ is used. Specifies the path to the X authority file that should be used to connect to the X server when the B option is used. =20 -=3Ditem B - -Enable OpenGL acceleration of the SDL display. Only effects machines -using B and only if the -device-model was compiled with OpenGL support. The default is 0 (disabled). - =3Ditem B =20 Configure the keymap to use for the keyboard associated with this @@ -1215,17 +1209,11 @@ working graphics passthrough. See the XenVGAPassthr= oughTestedAdapters L wiki p= age for graphics cards currently supported by B. =20 -B is currently supported both with the qemu-xen-traditional -device-model and upstream qemu-xen device-model. - When given as a boolean the B option either disables graphics card passthrough or enables autodetection. =20 When given as a string the B option describes the type -of device to enable. Note that this behavior is only supported with the -upstream qemu-xen device-model. With qemu-xen-traditional IGD (Intel Graph= ics -Device) is always assumed and options other than autodetect or explicit IGD -will result in an error. +of device to enable. =20 Currently, valid values for the option are: =20 @@ -1903,10 +1891,7 @@ it may be useful to request a different one, like UE= FI. =20 =3Ditem B =20 -Loads ROMBIOS, a 16-bit x86 compatible BIOS. This is used by default -when B. This is the only BIOS -option supported when B. This= is -the BIOS used by all previous Xen versions. +Loads ROMBIOS, a 16-bit x86 compatible BIOS. =20 =3Ditem B =20 @@ -1926,8 +1911,7 @@ Override the path to the blob to be used as BIOS. The= blob provided here MUST be consistent with the B which you have specified. You should not normally need to specify this option. =20 -This option does not have any effect if using B or -B. +Requires B. =20 =3Ditem B =20 @@ -2516,15 +2500,10 @@ Sets the amount of RAM which the emulated video car= d will contain, which in turn limits the resolutions and bit depths which will be available. =20 -When using the qemu-xen-traditional device-model, the default as well as -minimum amount of video RAM for stdvga is 8 MB, which is sufficient for e.= g. -1600x1200 at 32bpp. For the upstream qemu-xen device-model, the default and -minimum is 16 MB. +When using stdvga, the default and minimum is 16 MB. =20 -When using the emulated Cirrus graphics card (B) and the -qemu-xen-traditional device-model, the amount of video RAM is fixed at 4 M= B, -which is sufficient for 1024x768 at 32 bpp. For the upstream qemu-xen -device-model, the default and minimum is 8 MB. +When using the emulated Cirrus graphics card (B), the +default and minimum is 8 MB. =20 For QXL vga, both the default and minimal are 128MB. If B is set less than 128MB, an error will be triggered. @@ -2590,12 +2569,6 @@ B manpage. The default is B. Specifies that the display should be presented via an X window (using Simple DirectMedia Layer). The default is (0) not enabled. =20 -=3Ditem B - -Enable OpenGL acceleration of the SDL display. Only effects machines -using B and only if the -device-model was compiled with OpenGL support. Default is (0) false. - =3Ditem B =20 Enable or disable the virtual graphics device. The default is to @@ -2925,11 +2898,6 @@ Valid values are: Use the device-model merged into the upstream QEMU project. This device-model is the default for Linux dom0. =20 -=3Ditem B - -Use the device-model based upon the historical Xen fork of QEMU. -This device-model is still the default for NetBSD dom0. - =3Dback =20 It is recommended to accept the default value for new guests. If @@ -2949,8 +2917,7 @@ to specify this option. Override the path to the kernel image used as device-model stubdomain. The binary provided here MUST be consistent with the B which you have specified. -In case of B it is expected to be MiniOS-based stubd= omain -image, in case of B it is expected to be Linux-based stubdomain +In case of B it is expected to be Linux-based stubdomain kernel. =20 =3Ditem B diff --git a/docs/misc/stubdom.txt b/docs/misc/stubdom.txt index 64c220db20..cfcba4ba96 100644 --- a/docs/misc/stubdom.txt +++ b/docs/misc/stubdom.txt @@ -23,58 +23,6 @@ and https://wiki.xen.org/wiki/Device_Model_Stub_Domains = for more information on device model stub domains =20 =20 -Toolstack to MiniOS ioemu stubdomain protocol ---------------------------------------------- - -This section describe communication protocol between toolstack and -qemu-traditional running in MiniOS stubdomain. The protocol include -expectations of both qemu and stubdomain itself. - -Setup (done by toolstack, expected by stubdomain): - - Block devices for target domain are connected as PV disks to stubdomain, - according to configuration order, starting with xvda - - Network devices for target domain are connected as PV nics to stubdomai= n, - according to configuration order, starting with 0 - - if graphics output is expected, VFB and VKB devices are set for stubdom= ain - (its backend is responsible for exposing them using appropriate protocol - like VNC or Spice) - - other target domain's devices are not connected at this point to stubdo= main - (may be hot-plugged later) - - QEMU command line (space separated arguments) is stored in - /vm//image/dmargs xenstore path - - target domain id is stored in /local/domain//target xenstor= e path -?? - bios type is stored in /local/domain//hvmloader/bios - - stubdomain's console 0 is connected to qemu log file - - stubdomain's console 1 is connected to qemu save file (for saving state) - - stubdomain's console 2 is connected to qemu save file (for restoring st= ate) - - next consoles are connected according to target guest's serial console = configuration - -Startup: -1. PV stubdomain is started with ioemu-stubdom.gz kernel and no initrd -2. stubdomain initialize relevant devices -3. stubdomain signal readiness by writing "running" to /local/domain//device-model//state xenstore path -4. now stubdomain is considered running - -Runtime control (hotplug etc): -Toolstack can issue command through xenstore. The sequence is (from toolst= ack POV): -1. Write parameter to /local/domain//device-model//= parameter. -2. Write command to /local/domain//device-model//co= mmand. -3. Wait for command result in /local/domain//device-model//state (command specific value). -4. Write "running" back to /local/domain//device-model//state. - -Defined commands: - - "pci-ins" - PCI hot plug, results: - - "pci-inserted" - success - - "pci-insert-failed" - failure - - "pci-rem" - PCI hot remove, results: - - "pci-removed" - success - - ?? - - "save" - save domain state to console 1, results: - - "paused" - success - - "continue" - resume domain execution, after loading state from console = 2 (require -loadvm command argument), results: - - "running" - success - - Toolstack to Linux ioemu stubdomain protocol -------------------------------------------- =20 diff --git a/docs/misc/xenstore-paths.pandoc b/docs/misc/xenstore-paths.pan= doc index a604f6b1c6..01a340fafc 100644 --- a/docs/misc/xenstore-paths.pandoc +++ b/docs/misc/xenstore-paths.pandoc @@ -636,7 +636,8 @@ Trustworthy copy of /local/domain/$DOMID/backend/$KIND/= $DEVID/$NODE. =20 #### /libxl/$DOMID/dm-version ("qemu_xen"|"qemu_xen_traditional") =3D [n,I= NTERNAL] =20 -The device model version for a domain. +The device model version for a domain. Note that "qemu_xen_traditional" is +a device model variant which has been removed from Xen. =20 #### /libxl/$DOMID/remus/netbuf/$DEVID/ifb =3D STRING [n,INTERNAL] =20 diff --git a/docs/process/branching-checklist.txt b/docs/process/branching-= checklist.txt index 3dfa8ec257..aa7a27eed5 100644 --- a/docs/process/branching-checklist.txt +++ b/docs/process/branching-checklist.txt @@ -14,8 +14,6 @@ ov=3D4.0 cd ~/git/qemu-xen.git git branch staging-$v staging git branch stable-$v master - cd ~/git/qemu-xen-traditional.git - git branch stable-$v master =20 # make branch in libvirt ssh xen@xenbits.xen.org @@ -63,7 +61,6 @@ ov=3D4.0 cp xen--staging.patchbot-reported-heads xen--staging-$v.patchbot-repor= ted-heads cp qemu-xen--master.patchbot-reported-heads qemu-xen--stable-$v.patch= bot-reported-heads cp qemu-xen--staging.patchbot-reported-heads qemu-xen--staging-$v.pat= chbot-reported-heads - cp qemu-xen-traditional--master.patchbot-reported-heads qemu-xen-tradi= tional--stable-$v.patchbot-reported-heads =20 #emacs versions perl -i~ -pe 'next unless m/\b\Q'$ov'\E\b/; $x=3D$_; $x=3D~ s/\b\Q'$ov= '\E\b/'$v'/g; print $x;' versions diff --git a/docs/process/release-technician-checklist.txt b/docs/process/r= elease-technician-checklist.txt index 7bbe7c1489..829e8ec47b 100644 --- a/docs/process/release-technician-checklist.txt +++ b/docs/process/release-technician-checklist.txt @@ -32,8 +32,6 @@ t=3DRELEASE-$r git show # should show appropriate intended commit git-tag -u 'Xen.org Xen tree code signing' -m "Xen $v" xen-$v =20 - git-push xenbits.xen.org:/home/xen/git/qemu-xen-traditional.git $s:stabl= e-$x xen-$v - # consider making tag in minios, and updating xen.git Config.mk git checkout SOMETHING git show # should show appropriate intended commit diff --git a/docs/process/xen-release-management.pandoc b/docs/process/xen-= release-management.pandoc index 7826419dad..5da18f6da1 100644 --- a/docs/process/xen-release-management.pandoc +++ b/docs/process/xen-release-management.pandoc @@ -193,7 +193,7 @@ from the last RC: =20 1. Send out commit moratorium emails to committers@. =20 -2. Check all the trees (mini-os, qemu-trad, qemu-xen, seabios, ovmf etc). +2. Check all the trees (mini-os, qemu-xen, seabios, ovmf etc). They have the correct commits and all security patches applied. There will= be tools provided. =20 --=20 2.43.0