From xen-users-bounces@lists.xenproject.org Mon Jan 01 12:01:26 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jan 2018 12:01:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eVylI-0006Wn-PC; Mon, 01 Jan 2018 12:00:12 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=wmgc=d4=tierra.net=nobody@srs-us1.protection.inumbo.net>)
 id 1eVylH-0006Wd-5q
 for xen-users@lists.xenproject.org; Mon, 01 Jan 2018 12:00:11 +0000
X-Inumbo-ID: 299b26e5-eeeb-11e7-b4a6-bc764e045a96
Received: from smtp02-other-4.daemonmail.net (unknown [216.104.163.159])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTP
 id 299b26e5-eeeb-11e7-b4a6-bc764e045a96;
 Mon, 01 Jan 2018 12:59:04 +0100 (CET)
Received: from mxw-in03.daemonmail.net (unknown [216.104.161.13])
 by smtp02-other-4.daemonmail.net (Postfix) with ESMTP id 83453A1B18
 for <xen-users@lists.xenproject.org>; Mon,  1 Jan 2018 04:00:07 -0800 (PST)
X-Best-Tracker: 
Received: by mxw-in03.daemonmail.net (Postfix, from userid 65534)
 id 6218E454D9; Mon,  1 Jan 2018 04:00:07 -0800 (PST)
To: xen-users@lists.xenproject.org
Precedence: bulk
X-Autoresponder: 27
X-Loopdetect: Mon Jan  1 04:00:07 2018
From: "Robert McNicol" <rmcnicol@servicemasterbc.ca>
Include-Original-Message: No
Message-Id: <20180101120007.6218E454D9@mxw-in03.daemonmail.net>
Date: Mon,  1 Jan 2018 04:00:07 -0800 (PST)
Subject: [Xen-users] Out of office
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

SSB3aWxsIGJlIGF3YXkgZnJvbSB0aGUgb2ZmaWNlIGJlZ2lubmluZyBGcmlkYXkgRGVjIDIybmQu
IEkgd2lsbCBiZSByZXR1cm5pbmcgVHVlc2RheSBKYW4gMm5kLiBJIHdpbGwgbm90IGhhdmUgYWNj
ZXNzIHRvIGVtYWlsIGR1cmluZyB0aGlzIHRpbWUuIElGIHlvdSBoYXZlIGFuIGltbWVkaWF0ZSBu
ZWVkLCBjb250YWN0IEN5bnRoaWEgYXQgZXh0IDIyOS4KClJvYmVydCBNY05pY29sClN5c3RlbXMg
QWRtaW5pc3RyYXRvcgpTZXJ2aWNlTWFzdGVyIFJlc3RvcmUgfCBGcmFzZXIgVmFsbGV5CgoKX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1h
aWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54
ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Tue Jan 02 11:44:35 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jan 2018 11:44:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eWKyj-0004S3-Vx; Tue, 02 Jan 2018 11:43:33 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=pqwu=d5=gmx.de=xensemann@srs-us1.protection.inumbo.net>)
 id 1eWKyi-0004Ru-F2
 for xen-users@lists.xenproject.org; Tue, 02 Jan 2018 11:43:32 +0000
X-Inumbo-ID: ffa0c100-efb1-11e7-b4a6-bc764e045a96
Received: from mout.gmx.net (unknown [212.227.17.20])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id ffa0c100-efb1-11e7-b4a6-bc764e045a96;
 Tue, 02 Jan 2018 12:42:24 +0100 (CET)
Received: from [213.138.33.34] ([213.138.33.34]) by
 3c-app-gmx-bs68.server.lan (via HTTP); Tue, 2 Jan 2018 12:43:28 +0100
MIME-Version: 1.0
Message-ID: <trinity-491b7efe-1ad6-4d34-a970-9b45d23402fd-1514893408628@3c-app-gmx-bs68>
From: "Xen Mann" <xensemann@gmx.de>
To: XensemannIMAP <xensemann@gmx.de>
Date: Tue, 2 Jan 2018 12:43:28 +0100
Importance: normal
Sensitivity: Normal
In-Reply-To: <148f21dd-c5b7-00ce-eba3-a01d6a6b77d9@gmx.de>
References: <148f21dd-c5b7-00ce-eba3-a01d6a6b77d9@gmx.de>
X-UI-Message-Type: mail
X-Priority: 3
X-Provags-ID: V03:K1:LM4wvw9mCfh8xkBLQKdVOl+mwPSnKUadLwnNvHmjt1F
 zFqUikC3/21jc0XG/3refXUdSHtJZoPqfw4NEIq6hQTpcUaAgS
 8sUmpfH83719FqN+NmsGWHPjp0sdgMx4l6xCzKZPzWkp6rXJ4S
 Km45RBBLKz+tj4VobRlBbEBlIXqB2IumpCRWRnObZO1AwybMxE
 bjHHkoi0eyGr2mhaCwfdDWOnkySA5eUbyTWA+JEd23QQIonyyE
 lcnlSlJ6Jf6n1fY69KnZHZz4uzrUWfZ3VT5l7qL6/ATSMg1EYH 1UyqLU=
X-UI-Out-Filterresults: notjunk:1;V01:K0:UjFGBjg+rQA=:1rTeLFg4YDgJn9PL10IA8U
 I3qQ7nl757spSP8ySqws2H+bOATZtrOYgKtoUe03ZSrTWwyfeeRaeIpgQtWVNOng54Yno2ikW
 1y1LX50eJi2RQBwFHWpDnVPogJgUfWMWDnIxAWrWuNDq26zrGWlKKypiIKT/9UL2juaJMRzgU
 SwScjCccxpUXCx1+1dEkS43pMg8Pmwon0FzQ8VXt8Cgok27KhRhQa+HUGqZHACDIm6E31O/7R
 dM6E+wpgeMUafijEzkP0PLmM495dHl4roUWI8Klb7TMIy+EUxY7NhMgti+4azEB7aXQBw+WpR
 q8sT+xq0hPBtmvw+18imaYul9P1uavIzY+6386ktlYqCJJfiWfRFtfK/MWUDtriIrcxBHON9g
 l8yLUwILsQoCq5JwejAuxHGLvSajTmqzSbUHFO084qu6d1wC6h34FxkRgD3VebHSEGeC4Bg4H
 UdDg3H35I2WOTWKMrO3HIURGHa5j6mCQXVY0su2D2yf9Lp9zY46P
Cc: xen-user-list <xen-users@lists.xenproject.org>
Subject: Re: [Xen-users] XEN 4.6 / 4.9 - PCI-Passthrough USB 3.0 win7 /
 Win10 not working
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 03 01:08:15 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jan 2018 01:08:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eWXWG-00045z-58; Wed, 03 Jan 2018 01:07:00 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=jnlq=d6=gmail.com=cjritola@srs-us1.protection.inumbo.net>)
 id 1eWXWE-00045t-Ju
 for xen-users@lists.xenproject.org; Wed, 03 Jan 2018 01:06:58 +0000
X-Inumbo-ID: 3c018d50-f022-11e7-b4a6-bc764e045a96
Received: from mail-lf0-x22e.google.com (unknown [2a00:1450:4010:c07::22e])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 3c018d50-f022-11e7-b4a6-bc764e045a96;
 Wed, 03 Jan 2018 02:05:49 +0100 (CET)
Received: by mail-lf0-x22e.google.com with SMTP id j143so172020lfg.0
 for <xen-users@lists.xenproject.org>; Tue, 02 Jan 2018 17:06:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=U2yMKxmrEDdl/wcnyv5IeE7T8acUXdEERe943OITF3g=;
 b=cIqr7yb2KBQvQqTyuF4PrUYJB39DVm43AFL18Y/mfss/IM17OIxj65Xqj+FIHNlnhD
 FTvrgN/3FZ+MEI2GmFHa0k6A+39wL9VQDQch5Mk4Ab8ctBxkBP8NHCUeOuukz0iNdBAv
 /w3EEVaIyAmbiARpzBpuY40Y944e79pRtpcU8cppv3quIw8fcLDiM4DN3h6MbKJKK/TD
 +uXE/bLLz/VqkZG4C21gEbCcdg9bMwgC6igh+5HrPF9nPRk7axDw0uMfS+m0hBXHZjrk
 z8l7bJ/zQClThMA48NQmRr62mQQ2C4PVBI89r64ah095NH1A1uIHSLPjBnKcmv3rMZ+E
 RN2A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=U2yMKxmrEDdl/wcnyv5IeE7T8acUXdEERe943OITF3g=;
 b=O9Re5MTMn5M7wfve9OgkHio0IQWf+zc7eMzIDegevr2G6bxFpMvn9flGu0loz1U3OY
 25MwHEYvK7QiiGw3bDtNwkxegWqlP/qCy0GNwU0ZTHa156D5QqOqukhBLBFjkv5uWQdP
 CuUJIy8JXoITd86p+aQdsxgBD6fIqnlL6HXN4GgwAs3UJi26UIsP4gdne2oZf8moXAtY
 gV4p+LuSvpP6fSmh5PvZlbtFFL6X6zZ9V4+TLXJLN2jE4Cd19+Il/0Om0g1F7MIQL8pQ
 eI/6TlG4Smg/S7+v6zWiCVDWowViHKVNN8V14ontDJ0mIi/mquPk0bDe5sDzrCaBmLLq
 Myjg==
X-Gm-Message-State: AKGB3mKWzcBWOji7rYUoEe0y+wLrX1baikHuVsvipowtPhmaJS6UO1gM
 QswOPmW4IgXWW3JoPKVPC7lUZEz4axflzwuaUS0=
X-Google-Smtp-Source: ACJfBouvNLHkgiI02kxgyYNJrSnA6PQvChJO6PT7D9GOCfLKx8DjWRCxpcm6xMcVgnd26D9O/kObbIMZ3zm8mAKH7ks=
X-Received: by 10.46.127.9 with SMTP id a9mr29898582ljd.44.1514941615033; Tue,
 02 Jan 2018 17:06:55 -0800 (PST)
MIME-Version: 1.0
Received: by 10.25.42.207 with HTTP; Tue, 2 Jan 2018 17:06:54 -0800 (PST)
In-Reply-To: <trinity-491b7efe-1ad6-4d34-a970-9b45d23402fd-1514893408628@3c-app-gmx-bs68>
References: <148f21dd-c5b7-00ce-eba3-a01d6a6b77d9@gmx.de>
 <trinity-491b7efe-1ad6-4d34-a970-9b45d23402fd-1514893408628@3c-app-gmx-bs68>
From: Chuck Ritola <cjritola@gmail.com>
Date: Tue, 2 Jan 2018 20:06:54 -0500
Message-ID: <CA+RexfF-NbAJ2YBSeYnMw4deWb9erP-ZZp6nBNsyQddqU6iqHg@mail.gmail.com>
To: Xen Mann <xensemann@gmx.de>
Cc: xen-user-list <xen-users@lists.xenproject.org>
Subject: Re: [Xen-users] XEN 4.6 / 4.9 - PCI-Passthrough USB 3.0 win7 /
 Win10 not working
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 03 19:47:39 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jan 2018 19:47:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eWozs-0002uu-QT; Wed, 03 Jan 2018 19:46:44 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=kthk=d6=ubuntu.com=psusi@srs-us1.protection.inumbo.net>)
 id 1eWozs-0002uo-8O
 for xen-users@lists.xenproject.org; Wed, 03 Jan 2018 19:46:44 +0000
X-Inumbo-ID: 0fdc5602-f0bf-11e7-b0d7-9f685aff125f
Received: from vps.thesusis.net (unknown [34.202.238.73])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 0fdc5602-f0bf-11e7-b0d7-9f685aff125f;
 Wed, 03 Jan 2018 19:48:25 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by vps.thesusis.net (Postfix) with ESMTP id 90E6524254;
 Wed,  3 Jan 2018 14:27:45 -0500 (EST)
Received: from vps.thesusis.net ([IPv6:::1])
 by localhost (vps.thesusis.net [IPv6:::1]) (amavisd-new, port 10024)
 with ESMTP id Jvu_K6r21657; Wed,  3 Jan 2018 14:27:45 -0500 (EST)
Received: from [192.168.1.145] (unknown [72.239.163.216])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested) (Authenticated sender: psusi)
 by vps.thesusis.net (Postfix) with ESMTPSA id 4B3A824250;
 Wed,  3 Jan 2018 14:27:45 -0500 (EST)
To: rayj <ray3960852@gmail.com>, xen-users@lists.xenproject.org
References: <20171227120010.7BDB33ED16@mxw-in04.daemonmail.net>
 <5f80669e-97bf-9f25-2006-15bd4e987139@gmail.com>
From: Phillip Susi <psusi@ubuntu.com>
Message-ID: <1eb99f22-7dc3-c265-b1da-6dcdcc4a9f85@ubuntu.com>
Date: Wed, 3 Jan 2018 14:27:44 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <5f80669e-97bf-9f25-2006-15bd4e987139@gmail.com>
Content-Language: en-US
Subject: Re: [Xen-users] Guest Type for Network Management
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 03 22:31:12 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jan 2018 22:31:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eWrY6-0006W6-Ls; Wed, 03 Jan 2018 22:30:14 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=eqdu=d6=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eWrY5-0006VU-1M
 for xen-users@lists.xen.org; Wed, 03 Jan 2018 22:30:13 +0000
X-Inumbo-ID: 7fa1b434-f0d5-11e7-b4a6-bc764e045a96
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 7fa1b434-f0d5-11e7-b4a6-bc764e045a96;
 Wed, 03 Jan 2018 23:29:02 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eWrXs-0003qS-Ce; Wed, 03 Jan 2018 22:30:00 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1eWrXs-0007D0-Bg; Wed, 03 Jan 2018 22:30:00 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eWrXs-0007D0-Bg@xenbits.xenproject.org>
Date: Wed, 03 Jan 2018 22:30:00 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 - Information leak via side
 effects of speculative execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-254

        Information leak via side effects of speculative execution

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

SP1, "Bounds-check bypass": Poison the branch predictor, such that
operating system or hypervisor code is speculatively executed past
boundary and security checks.  This would allow an attacker to, for
instance, cause speculative code in the normal hypercall / emulation
path to execute with wild array indexes.

SP2, "Branch Target Injection": Poison the branch predictor.
Well-abstracted code often involves calling function pointers via
indirect branches; reading these function pointers may involve a
(slow) memory access, so the CPU attempts to guess where indirect
branches will lead.  Poisoning this enables an attacker to
speculatively branch to any code that exists in the hypervisor.

SP3, "Rogue Data Load": On some processors, certain pagetable
permission checks only happen when the instruction is retired;
effectively meaning that speculative execution is not subject to
pagetable permission checks.  On such processors, an attacker can
speculatively execute arbitrary code in userspace with, effectively,
the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/

Additional Xen-specific background:

64-bit Xen hypervisors on systems with less than 5TiB of RAM map all
of physical RAM, so code speculatively executed in a hypervisor
context can read all of system RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (HVM and PVH guests run in a separate
address space to the hypervisor.)  However, only 64-bit PV guests can
generate addresses large enough to point to hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, or SP2 on systems where SMEP (supervisor mode execute protection)
is enabled: an attacker is limited to windows of code after bound
checks of user-supplied indexes.  For SP2 without SMEP, or SP3, an
attacker can write arbitrary code to speculatively execute.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.

For SP3, only Intel processors are vulnerable. Furthermore, only
64-bit PV guests can exploit SP3 against Xen.  PVH and 32-bit PV
guests cannot exploit SP3.

We believe that ARM is affected, but unfortunately due to the
accelerated schedule, we haven't been able to get concrete input from
ARM.  We are asking ARM and will publish more information when it is
available.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by running guests in HVM or PVH mode.

For guests with legacy PV kernels which cannot be run in HVM mode, we
have developed a "shim" hypervisor that allows PV guests to run in PVH
mode.  Unfortunately, due to the accelerated schedule, this is not yet
ready to release.  We expect to have it ready for 4.10, as well as PVH
backports to 4.9 and 4.8, available over the next few days.

RESOLUTION
==========

There is no available resolution for SP1 or SP3.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.

When we have useful information we will send an update.

NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaTVlQAAoJEIP+FMlX6CvZRIkH/3LGBnVPE6/4eBYwUTAZZ1bC
+PLMLiUpSZuSwxbKrt80Tuu8hXBWPvf9bTL5gwEg0IGbypLmehoRc1Xj1Ra+9U2h
PVcmyoP2rcgENSqGKqv8CKHI0xt1QqXK0hF2L7q370+3crgNAx79T+nJf11SAsnA
m3MUvi7eDm1BUf4sIYlePkVcSbxcyjcejGKr/aAwo4Ku3aInO0lgapb8kjYiMKME
wgQ9oOVLuSvkTwcOCTnJaMF3FkpFATq6VpmtbRDNkeSd8yrF3d9C/GAoPwoMt6oY
zLNBs77T5LfrQtLJ62aOeXmPcu3vZOZlTH89+1IBLef4Gs5eqD5rTfKcTc8AaPE=
=70SF
-----END PGP SIGNATURE-----

--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Wed Jan 03 23:05:34 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jan 2018 23:05:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eWs54-0000ur-IH; Wed, 03 Jan 2018 23:04:18 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=my+n=d6=alstadheim.priv.no=hakon@srs-us1.protection.inumbo.net>)
 id 1eWs53-0000ul-G7
 for xen-users@lists.xenproject.org; Wed, 03 Jan 2018 23:04:18 +0000
X-Inumbo-ID: a723d887-f0da-11e7-b0d7-9f685aff125f
Received: from asav21.altibox.net (unknown [109.247.116.8])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id a723d887-f0da-11e7-b0d7-9f685aff125f;
 Wed, 03 Jan 2018 23:05:56 +0000 (UTC)
Received: from postfix-relay.alstadheim.priv.no
 (148-252-124.122.3p.ntebredband.no [148.252.124.122])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 (Authenticated sender: hakon.alstadheim@ntebb.no)
 by asav21.altibox.net (Postfix) with ESMTPSA id 9D5858006E
 for <xen-users@lists.xenproject.org>; Thu,  4 Jan 2018 00:04:07 +0100 (CET)
X-Finnesikke-B-A-I-T: finnesikke@alstadheim.priv.no
Received: from smtps.alstadheim.priv.no (localhost [127.0.0.1])
 by postfix-relay.alstadheim.priv.no (Postfix) with ESMTP id 739E6C007EFD
 for <xen-users@lists.xenproject.org>; Thu,  4 Jan 2018 00:04:06 +0100 (CET)
Received: from [192.168.2.201] (unknown [192.168.2.201])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested) (Authenticated sender: hakon)
 by smtps.alstadheim.priv.no (Postfix) with ESMTPSA id 50FFC172FE6
 for <xen-users@lists.xenproject.org>; Thu,  4 Jan 2018 00:04:06 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alstadheim.priv.no;
 s=smtp; t=1515020646;
 bh=LmfHZK4dBhDogLZr4KwEgUr8bs5e0KJeIYyb7eKK6rE=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=EuXVUlkh3p3AibS/rjlVzUXEQOeupr56RjoZPAjtbc9s4Jplig+inNikaU/3FXNap
 32qDWbJ01d2qgCro/PmUpTL42BKqRUywgce5Nc7OOl7YcSFu8MoHuHW/+HSQcxSXJq
 /A9/PAxPZG3iA+qtO3Vw/kPAh/vHDFkDPL3QVT54=
To: xen-users@lists.xenproject.org
References: <148f21dd-c5b7-00ce-eba3-a01d6a6b77d9@gmx.de>
 <trinity-491b7efe-1ad6-4d34-a970-9b45d23402fd-1514893408628@3c-app-gmx-bs68>
 <CA+RexfF-NbAJ2YBSeYnMw4deWb9erP-ZZp6nBNsyQddqU6iqHg@mail.gmail.com>
From: =?UTF-8?Q?H=c3=a5kon_Alstadheim?= <hakon@alstadheim.priv.no>
Message-ID: <2c2b7a1c-cfdf-dccf-adf0-f697384feb15@alstadheim.priv.no>
Date: Thu, 4 Jan 2018 00:04:05 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <CA+RexfF-NbAJ2YBSeYnMw4deWb9erP-ZZp6nBNsyQddqU6iqHg@mail.gmail.com>
Content-Language: en-US
X-CMAE-Score: 0
X-CMAE-Analysis: v=2.2 cv=ANFV9ctm c=1 sm=1 tr=0
 a=F9oVK6qnXDsgXOhIrcsnOQ==:117 a=F9oVK6qnXDsgXOhIrcsnOQ==:17
 a=IkcTkHD0fZMA:10 a=RgaUWeydRksA:10 a=ahX1VNfGgNOJLUsYQ70A:9
 a=QEXdDO2ut3YA:10
Subject: Re: [Xen-users] XEN 4.6 / 4.9 - PCI-Passthrough USB 3.0 win7 /
 Win10 not working
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

CgpEZW4gMDMuIGphbi4gMjAxOCAwMjowNiwgc2tyZXYgQ2h1Y2sgUml0b2xhOgo+IE9uIFR1ZSwg
SmFuIDIsIDIwMTggYXQgNjo0MyBBTSwgWGVuIE1hbm4gPHhlbnNlbWFubkBnbXguZGU+IHdyb3Rl
OgpbLi4uXQoKPj4+IEZvciAxNi4wNCBhbmQgd2luWFAgdGhpcyBpcyB3b3JraW5nIGdyZWF0ISBU
aGUgUENJZSBDYXJkIGFwcGVhcnMgaW4KPj4+IFdpbmRvd3MgZGV2aWNlIG1hbmFnZXIsIHRoZSBh
dHRhY2hlZCBVU0ItRGV2aWNlIHNob3dzIHVwIGluIHRoZSBkZXZpY2UKPj4+IG1hbmFnZXIgYW5k
IHdvcmtzIGxpa2UgYSBjaGFybS4KPj4+Cj4+PiBIb3dldmVyLCB0aGlzIGlzIG5vdCBwb3NzaWJs
ZSBmb3IgbXkgc3lzdGVtIHdpdGggd2luNyBhbmQgV2luMTAgYW5kIHRoZQo+Pj4gdmVyeSBzYW1l
IHNldHVwLgpbLi4uXQoKPj4gLT4gV2h5IGlzIHBhc3N0aHJvdWdoIG9mIFVTQi1QQ0ktQ2FyZHMg
d29ya2luZyBmb3IgWFAgYW5kIFVidW50dSAxNi4wNCwKPj4gZXZlbiBpZiB0aG9zZSBVU0ItQ2Fy
ZHMgZG8gbm90IHN1cHBvcnQgRkxSZXNldC4KPiAKPiAuLi4gVGhlIGxhY2sgb2YgZnVuY3Rpb24t
bGV2ZWwtcmVzZXQgc3VwcG9ydCBkb2VzIG5vdCBndWFyYW50ZWUKPiBmYWlsdXJlIG9mIHBhc3N0
aHJvdWdoLCB0aG91Z2ggaXQgb2Z0ZW4gY2FuIGludHJvZHVjZSB1bmRlZmluZWQKPiBiZWhhdmlv
ciB3aGVuIG11bHRpcGxlIGRvbVVzIHVzZSB0aGUgZGV2aWNlIGNvbnNlY3V0aXZlbHkuIFRoZXNl
IGNsZWFyCj4gYWZ0ZXIgdGhlIGhvc3QgaXMgcmVzZXQuIEZyb20gd2hhdCBJJ3ZlIHNlZW4sIG1v
c3QgZGV2aWNlcyBkbyBub3QKPiBzdXBwb3J0IEZMUmVzZXQgYnV0IG1hbnkgd2lsbCBwYXNzLXRo
cm91Z2ggYW5kIGJlIHVzYWJsZS4KPiAKPiBJdCB3b3VsZCBiZSBnb29kIHByYWN0aWNlIHRvIGVu
c3VyZSBkb20wIGJpbmRzIHBjaWJhY2sgdG8gdGhlCj4gcGFzc2VkLXRocm91Z2ggZGV2aWNlcyBv
biBib290IHNvIGl0IGRvZXMgbm90IGluaXRpYWxpemUgdGhlIGRldmljZXMKPiBwcmVtYXR1cmVs
eS4gRWxzZSwgdGhleSBtYXkgYmUgaW4gYW4gaW50b2xlcmFibGUgc3RhdGUgd2hlbiB0aGUgZG9t
VQo+IE9TIHRyaWVzIHRvIGluaXRpYWxpemUgdGhlbS4KPiAKCkJpb3MgJiBGaXJtd2FyZSB3aWxs
IChhdCBsZWFzdCBwYXJ0bHkpIGluaXRpYWxpemUgVVNCLWNhcmRzIHRvIGFsbG93CnVzYi1rZXli
b2FyZHMgdG8gd29yayBkdXJpbmcgYm9vdCwgc28gaGlkaW5nIHRoZSBjYXJkIGZyb20gZG9tMCBt
aWdodApub3QgaGVscCB0aGF0IG11Y2guCgpJJ20gbm90IGEgcHJvZ3JhbW1lciBzbyB3aGF0IGZv
bGxvd3MgaXMgdG8gYmUgdGFrZW4gd2l0aCBhIGdyYWluIG9mIHNhbHQuCgoKSSBiZWxpZXZlIHRo
ZXJlIGlzIGEgaGFuZG9mZiBwcm90b2NvbCBiZXR3ZWVuIGJpb3MgYW5kIGRvbTAgdGhhdCBtZWFu
cwpkb20wIHdpbGwgbWFuYWdlLiBUaGlzIE1JR0hUIG1lYW4gdGhhdCBkb21VcyB3aWxsIG5vdCBi
ZSBzbyBmb3J0dW5hdGUuCkFsbCB0aGlzIG1pZ2h0IGJlIGFmZmVjdGVkIGJ5IHZhcmlvdXMgYmlv
cyBzZXR0aW5ncyAoc29tZXRoaW5nIGxpa2UKbGVnYWN5IGludDx3aGF0ZXZlcj4gYW1vbmcgb3Ro
ZXIgdGhpbmdzKSAuIFNvIHRpbmtlcmluZyBtaWdodCBsZXQgeW91Cm11ZGRsZSB0aHJvdWdoLCBh
bmQgdGhlbiBhbiB1cGRhdGUgb3IgdGhlIHBoYXNlIG9mIHRoZSBtb29uIHdpbGwgbWVzcwp5b3Ug
dXAgYWdhaW4uCgpJIGhhdmUgc2ltaWxhciBwcm9ibGVtcyBvbiBteSBzeXN0ZW0sIGFuZCBJIGhh
dmUgYmVlbiB3b25kZXJpbmcgaWYgZ29pbmcKZnVsbCBVRUZJIG9uIGJvdGggdGhlIGhhcmR3YXJl
IGFuZCB0aGUgZG9tVXMgbWlnaHQgaGVscC4KCkkgaGF2ZSBub3QgYmVlbiBhYmxlIHRvIHRyeSBv
dXQgdGhhdCB0aGVvcnksIHNpbmNlIEkgYW0gaGF2aW5nIHRyb3VibGUKYm9vdGluZyB1c2luZyA8
Y29kZT5iaW9zID0gIm92bWYiPC9jb2RlPiAuIEkgaGF2ZSBiZWVuIGFibGUgdG8gYm9vdApkb21V
cyB1c2luZyBvdm1mIG9uIG9jY2FzaW9uLCBidXQgZXZlbiB0aGVuIGR1bVUgYm9vdCBoYW5ncyBm
b3Igc2V2ZXJhbAptaW51dGVzLCBwcm9iYWJseSBsb29raW5nIGZvciBmbG9wcGllcyBvciBzb21l
dGhpbmcuIExvbmcgc3RvcnksIHFlbXUKZml4ZXMgYXJlIGluIHRoZSB3b3JrcyBJIGJlbGl2ZS4K
Cl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fClhlbi11c2Vy
cyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJzQGxpc3RzLnhlbnByb2plY3Qub3JnCmh0dHBzOi8vbGlz
dHMueGVucHJvamVjdC5vcmcvbWFpbG1hbi9saXN0aW5mby94ZW4tdXNlcnM=

From xen-users-bounces@lists.xenproject.org Thu Jan 04 12:03:25 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jan 2018 12:03:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eX4E6-0002k5-KU; Thu, 04 Jan 2018 12:02:26 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=nnt9=d7=citrix.com=prvs=5354c80be=george.dunlap@srs-us1.protection.inumbo.net>)
 id 1eX4E4-0002jc-T1
 for xen-users@lists.xen.org; Thu, 04 Jan 2018 12:02:24 +0000
X-Inumbo-ID: 5da4dbbf-f147-11e7-b0d7-9f685aff125f
Received: from SMTP02.CITRIX.COM (unknown [66.165.176.63])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 5da4dbbf-f147-11e7-b0d7-9f685aff125f;
 Thu, 04 Jan 2018 12:04:07 +0000 (UTC)
X-IronPort-AV: E=Sophos;i="5.45,507,1508803200"; d="scan'208";a="464662015"
To: Xen.org security team <security@xen.org>, <xen-devel@lists.xen.org>,
 <xen-users@lists.xen.org>, Sarah Newman <srn@prgmr.com>
References: <E1eWrXs-0007D0-Bg@xenbits.xenproject.org>
From: George Dunlap <george.dunlap@citrix.com>
Message-ID: <47904d2e-c057-7321-9c52-eabd04c103dc@citrix.com>
Date: Thu, 4 Jan 2018 12:02:16 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <E1eWrXs-0007D0-Bg@xenbits.xenproject.org>
Content-Language: en-US
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: Re: [Xen-users] Xen Security Advisory 254 - Information leak via
 side effects of speculative execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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=

From xen-users-bounces@lists.xenproject.org Thu Jan 04 13:04:04 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jan 2018 13:04:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eX5Ar-0008MW-7n; Thu, 04 Jan 2018 13:03:09 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=zi/c=d7=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eX5Aq-0008M5-9C
 for xen-users@lists.xen.org; Thu, 04 Jan 2018 13:03:08 +0000
X-Inumbo-ID: d8e17796-f14f-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id d8e17796-f14f-11e7-b0d7-9f685aff125f;
 Thu, 04 Jan 2018 13:04:50 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eX5AX-0001lq-SB; Thu, 04 Jan 2018 13:02:49 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1eX5AX-0003nj-R9; Thu, 04 Jan 2018 13:02:49 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eX5AX-0003nj-R9@xenbits.xenproject.org>
Date: Thu, 04 Jan 2018 13:02:49 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 253 - x86: memory leak with MSR
	emulation
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-253
                              version 2

                  x86: memory leak with MSR emulation

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

In Xen 4.10, new infrastructure was introduced as part of an overhaul to
how MSR emulation happens for guests.  Unfortunately, one tracking
structure isn't freed when a vcpu is destroyed.

IMPACT
======

A memory allocation of 8 bytes is leaked each time a vcpu is destroyed.

A malicious guest may, by frequently rebooting over extended periods of
time, run the system out of memory, resulting in a Denial of Service
(DoS).

VULNERABLE SYSTEMS
==================

Xen versions 4.10 and later are affected.  Xen 4.9 and earlier are not
affected.

Only x86 systems are affected.  ARM systems are not.

All guest kinds can exploit this vulnerability.

MITIGATION
==========

Limiting the frequency with which a guest is able to reboot, will
limit the memory leak.

Rebooting each host (after migrating its guests) periodically will
reclaim the leaked space.

CREDITS
=======

This issue was discovered by Andrew Cooper of Citrix.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa253.patch           Xen 4.10, xen-unstable

$ sha256sum xsa253*
bba1abb5e4368421de29385e37f8477bf3534d3ba3ff7e2aae9c9d3da53f1393  xsa253.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaTiXyAAoJEIP+FMlX6CvZ/CIH/3LEbyAmWUSs4C2Rt0EENDLO
JnnAGXWIy3DsffGiG9zOhfYiItn2iD+J+EcO+WC5lGPBSkX1KiXdsWVla/dJuy0F
frx5pdqJNSHFihK/6fGU0WnSBFz6o2gkn2hOnzWfpxNLiJMrHCI6GEOcdMx6xtOQ
9QZAa7rCN1aRx0Lx1LjuvaqPwy4rJ294zLnwarMoN10KZ3oRVbQ8mf4kN+/X+hlK
9MxUj99WYZWcJhcRLGiQALPdRQeabh72/ZTFsfIAwPxaEgT6YhwFrFDG526iNcM0
MkruO8HeD+byrQrni/qgB5EAIyPsFuBfvzddHzPA+9sSrf4QDjQWPFihQ3ti+xg=
=sQVC
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa253.patch"
Content-Disposition: attachment; filename="xsa253.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Thu Jan 04 21:27:07 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jan 2018 21:27:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXD1V-0007Yz-Js; Thu, 04 Jan 2018 21:26:01 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=xvyi=d7=gmx.de=xensemann@srs-us1.protection.inumbo.net>)
 id 1eXD1T-0007Yt-Mf
 for xen-users@lists.xenproject.org; Thu, 04 Jan 2018 21:25:59 +0000
X-Inumbo-ID: aed760cd-f195-11e7-b4a6-bc764e045a96
Received: from mout.gmx.net (unknown [212.227.15.18])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id aed760cd-f195-11e7-b4a6-bc764e045a96;
 Thu, 04 Jan 2018 22:24:45 +0100 (CET)
Received: from [192.168.2.103] ([79.193.113.243]) by mail.gmx.com (mrgmx003
 [212.227.17.190]) with ESMTPSA (Nemesis) id 0MILxX-1eTcvH2gpT-004EBt; Thu, 04
 Jan 2018 22:25:52 +0100
To: =?UTF-8?Q?H=c3=a5kon_Alstadheim?= <hakon@alstadheim.priv.no>,
 Chuck Ritola <cjritola@gmail.com>
References: <148f21dd-c5b7-00ce-eba3-a01d6a6b77d9@gmx.de>
 <trinity-491b7efe-1ad6-4d34-a970-9b45d23402fd-1514893408628@3c-app-gmx-bs68>
 <CA+RexfF-NbAJ2YBSeYnMw4deWb9erP-ZZp6nBNsyQddqU6iqHg@mail.gmail.com>
 <2c2b7a1c-cfdf-dccf-adf0-f697384feb15@alstadheim.priv.no>
From: Xensemann <xensemann@gmx.de>
Message-ID: <94bdadbe-abf0-9f11-b053-fac6f9304604@gmx.de>
Date: Thu, 4 Jan 2018 22:25:51 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <2c2b7a1c-cfdf-dccf-adf0-f697384feb15@alstadheim.priv.no>
Content-Language: en-GB
X-Provags-ID: V03:K0:D5W4y5pdlpjyVy32C1Zv+rsaOMks8LA63KF1HxQLzOVOVhqFh2C
 24rbmu3UHdHVW7YtEfWWkf2+Ttmrlz0wQK9P+rMuOhiYazYJdMhj8FMgac/Q91BSaa81tM8
 PhqyVlUPgUvo75CraJ64pco6HN0Hc9282AnmveztGAZ4B5MVWAeWgiyV5/CO+7KHyKjWffH
 iakwXhHBYmM+EZXz1pEsw==
X-UI-Out-Filterresults: notjunk:1;V01:K0:meioGlBgzsU=:Vbt53qVW8UPpv2gtxRaCG5
 xlkEoS8bBjpHLe9z+qUtdjPRKC5YNQqabxCuWmowCbJDzieu9OqcEshBhY+qKI0vmwYqyo4wH
 XpeMhmPO4pGEOEnxORlNsZlSRcCigUO6s3/vFRGJeWLAndSfhw3QpyWELfh63oTaB7lbhPLJz
 H0r72pYUPb3bgxIB0ufDCPxt3VhxzEEvG4lEt6eNvPFB0QTCd5yYH7z3wFdrkJc/a8TH9kbzl
 OwdGPKkGoz9YEaPBtEaokAI0YRy4x6kab0ijvmV+5ovQgH74J+1qm69nk8lWN3y1LP7mUCbrn
 KDbTJT2diNg6jfG+ysfCZeQPDXkjSg8lXYwSCQgCct9zLESAyJsk4MqKGP0EbNE6WBIkF/uly
 13YXP20TJpr0akVvQCBOKlFlXa0eLHI0CbQdZzBqRnhTKSykK/MNn4HkRtg1Ta8FTm3QQ2a4a
 zUh5HzQ2rkcp68NY/48AeppUJcQzrnSnk654ahfbxJOGRHt7Hjl2B1n10yWuVDVxpRBRe+sK8
 AvDTXbe6Qu3LLJGjvT9Yvb4UfIGgnAq9bO3PoVz8cWpMq8YsWEqkN1hcqT+5BpKQ4g4o4sNBr
 GI3YEoZ63cXNaD2QM1sEdcKb3GoF/Fz4aaQ04AOUSJq56huF7ZZLOiDceTUX9TRIhVqOj0HCy
 O4mJmD/u8Ik4h1L1swMeJHd63vR0q1Ahbxy+VdHh58AlBDmnTgNq5qBVrGvxCuAmj4ehlNENJ
 wa7db6ki1GCQw+ariRU9xlDZP7TSYkx+eQoXsuYESNQS89V8USKFWZ2w4dBF/Pw8VdHwewi3W
 WL7lNNJdsxlMoLCvI49URj6uqCJ+m7tLKTF8/4MRmCWBZtlfzg=
Cc: xen-user-list <xen-users@lists.xenproject.org>
Subject: Re: [Xen-users] XEN 4.6 / 4.9 - PCI-Passthrough USB 3.0 win7 /
 Win10 not working
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

QW0gMDQuMDEuMjAxOCB1bSAwMDowNCBzY2hyaWViIEjDpWtvbiBBbHN0YWRoZWltOgo+IAo+IAo+
IERlbiAwMy4gamFuLiAyMDE4IDAyOjA2LCBza3JldiBDaHVjayBSaXRvbGE6Cj4+IE9uIFR1ZSwg
SmFuIDIsIDIwMTggYXQgNjo0MyBBTSwgWGVuIE1hbm4gPHhlbnNlbWFubkBnbXguZGU+IHdyb3Rl
Ogo+IFsuLi5dCj4gCj4+Pj4gRm9yIDE2LjA0IGFuZCB3aW5YUCB0aGlzIGlzIHdvcmtpbmcgZ3Jl
YXQhIFRoZSBQQ0llIENhcmQgYXBwZWFycyBpbgo+Pj4+IFdpbmRvd3MgZGV2aWNlIG1hbmFnZXIs
IHRoZSBhdHRhY2hlZCBVU0ItRGV2aWNlIHNob3dzIHVwIGluIHRoZSBkZXZpY2UKPj4+PiBtYW5h
Z2VyIGFuZCB3b3JrcyBsaWtlIGEgY2hhcm0uCj4+Pj4KPj4+PiBIb3dldmVyLCB0aGlzIGlzIG5v
dCBwb3NzaWJsZSBmb3IgbXkgc3lzdGVtIHdpdGggd2luNyBhbmQgV2luMTAgYW5kIHRoZQo+Pj4+
IHZlcnkgc2FtZSBzZXR1cC4KPiBbLi4uXQo+IAo+Pj4gLT4gV2h5IGlzIHBhc3N0aHJvdWdoIG9m
IFVTQi1QQ0ktQ2FyZHMgd29ya2luZyBmb3IgWFAgYW5kIFVidW50dSAxNi4wNCwKPj4+IGV2ZW4g
aWYgdGhvc2UgVVNCLUNhcmRzIGRvIG5vdCBzdXBwb3J0IEZMUmVzZXQuCj4+Cj4+IC4uLiBUaGUg
bGFjayBvZiBmdW5jdGlvbi1sZXZlbC1yZXNldCBzdXBwb3J0IGRvZXMgbm90IGd1YXJhbnRlZQo+
PiBmYWlsdXJlIG9mIHBhc3N0aHJvdWdoLCB0aG91Z2ggaXQgb2Z0ZW4gY2FuIGludHJvZHVjZSB1
bmRlZmluZWQKPj4gYmVoYXZpb3Igd2hlbiBtdWx0aXBsZSBkb21VcyB1c2UgdGhlIGRldmljZSBj
b25zZWN1dGl2ZWx5LiBUaGVzZSBjbGVhcgo+PiBhZnRlciB0aGUgaG9zdCBpcyByZXNldC4gRnJv
bSB3aGF0IEkndmUgc2VlbiwgbW9zdCBkZXZpY2VzIGRvIG5vdAo+PiBzdXBwb3J0IEZMUmVzZXQg
YnV0IG1hbnkgd2lsbCBwYXNzLXRocm91Z2ggYW5kIGJlIHVzYWJsZS4KPj4KPj4gSXQgd291bGQg
YmUgZ29vZCBwcmFjdGljZSB0byBlbnN1cmUgZG9tMCBiaW5kcyBwY2liYWNrIHRvIHRoZQo+PiBw
YXNzZWQtdGhyb3VnaCBkZXZpY2VzIG9uIGJvb3Qgc28gaXQgZG9lcyBub3QgaW5pdGlhbGl6ZSB0
aGUgZGV2aWNlcwo+PiBwcmVtYXR1cmVseS4gRWxzZSwgdGhleSBtYXkgYmUgaW4gYW4gaW50b2xl
cmFibGUgc3RhdGUgd2hlbiB0aGUgZG9tVQo+PiBPUyB0cmllcyB0byBpbml0aWFsaXplIHRoZW0u
CklzIGl0IHBvc3NpYmxlIHRvIGRldGVjdCB0aGlzIGludG9sZXJhYmxlIHN0YXRlLCBpcyB0aGVy
ZSBhIHRlc3QgdGhhdCBJCmNhbiBydW4gdG8gZ2V0IGNsb3NlciB0byB0aGlzIHNvdXJjZSBvZiB0
aGUgcHJvYmxlbT8KPj4KPiAKPiBCaW9zICYgRmlybXdhcmUgd2lsbCAoYXQgbGVhc3QgcGFydGx5
KSBpbml0aWFsaXplIFVTQi1jYXJkcyB0byBhbGxvdwo+IHVzYi1rZXlib2FyZHMgdG8gd29yayBk
dXJpbmcgYm9vdCwgc28gaGlkaW5nIHRoZSBjYXJkIGZyb20gZG9tMCBtaWdodAo+IG5vdCBoZWxw
IHRoYXQgbXVjaC4KT24gTXkgTW90aGVyYm9hcmQgKEludGVsIEMyMzYgQ2hpcHNldCkgSSBjYW4n
dCB1c2UgVVNCLWRldmljZXMgYXR0YWNoZWQKdG8gdGhlIFBDSS1DYXJkIGZyb20gRXRyb250ZWNo
LiBTbyBmb3IgZXhhbXBsZSB3aXRoIGl0IEkgY2FuJ3Qgc2VsZWN0CnRoZSBHUlVCIGVudHJ5IHRv
IGJvb3QgZnJvbS4gRG9uJ3Qga25vdyBpZiBpdCBkb2VzIG1lYW4gYW55dGhpbmcuCkkgcHJvYmFi
bHkgY291bGQgcnVuIGEgcXVpY2sgdGVzdCB3aXRoIGFsbCBteSBVU0ItUENJZSBDYXJkcyBpZiB0
aGV5IGFyZQpyZWNvZ25pc2VkIGlmIHRoaXMgaGVscHMuCk9yIGNhbiBpdCBiZSB0aGF0IGJpb3Mg
b25seSB1c2VzIGNoaXBzZXQgVVNCPwo+IAo+IEknbSBub3QgYSBwcm9ncmFtbWVyIHNvIHdoYXQg
Zm9sbG93cyBpcyB0byBiZSB0YWtlbiB3aXRoIGEgZ3JhaW4gb2Ygc2FsdC4KPiAKPiAKPiBJIGJl
bGlldmUgdGhlcmUgaXMgYSBoYW5kb2ZmIHByb3RvY29sIGJldHdlZW4gYmlvcyBhbmQgZG9tMCB0
aGF0IG1lYW5zCj4gZG9tMCB3aWxsIG1hbmFnZS4gVGhpcyBNSUdIVCBtZWFuIHRoYXQgZG9tVXMg
d2lsbCBub3QgYmUgc28gZm9ydHVuYXRlLgo+IEFsbCB0aGlzIG1pZ2h0IGJlIGFmZmVjdGVkIGJ5
IHZhcmlvdXMgYmlvcyBzZXR0aW5ncyAoc29tZXRoaW5nIGxpa2UKPiBsZWdhY3kgaW50PHdoYXRl
dmVyPiBhbW9uZyBvdGhlciB0aGluZ3MpLgpkb20wIG9yIGRvbVUgYmlvcyBzZXR0aW5ncz8KPiBT
byB0aW5rZXJpbmcgbWlnaHQgbGV0IHlvdQo+IG11ZGRsZSB0aHJvdWdoLCBhbmQgdGhlbiBhbiB1
cGRhdGUgb3IgdGhlIHBoYXNlIG9mIHRoZSBtb29uIHdpbGwgbWVzcwo+IHlvdSB1cCBhZ2Fpbi4g
CkhleSEgSSBnb3QgbXkgc2VsZiBhIHdhbGwgY2xvY2sgZGlzcGxheWluZyB0aGUgcGhhc2UsIHVz
ZWxlc3MuIEJ1dCBub3cgSQpjYW4gdXNlIHRoaXMgZm9yIGRlYnVnZ2luZywgZXZlbiBieSBkYXkh
ID0pCj4gCj4gSSBoYXZlIHNpbWlsYXIgcHJvYmxlbXMgb24gbXkgc3lzdGVtLCBhbmQgSSBoYXZl
IGJlZW4gd29uZGVyaW5nIGlmIGdvaW5nCj4gZnVsbCBVRUZJIG9uIGJvdGggdGhlIGhhcmR3YXJl
IGFuZCB0aGUgZG9tVXMgbWlnaHQgaGVscC4KPiAKPiBJIGhhdmUgbm90IGJlZW4gYWJsZSB0byB0
cnkgb3V0IHRoYXQgdGhlb3J5LCBzaW5jZSBJIGFtIGhhdmluZyB0cm91YmxlCj4gYm9vdGluZyB1
c2luZyA8Y29kZT5iaW9zID0gIm92bWYiPC9jb2RlPiAuIEkgaGF2ZSBiZWVuIGFibGUgdG8gYm9v
dAo+IGRvbVVzIHVzaW5nIG92bWYgb24gb2NjYXNpb24sIGJ1dCBldmVuIHRoZW4gZHVtVSBib290
IGhhbmdzIGZvciBzZXZlcmFsCj4gbWludXRlcywgcHJvYmFibHkgbG9va2luZyBmb3IgZmxvcHBp
ZXMgb3Igc29tZXRoaW5nLiBMb25nIHN0b3J5LCBxZW11Cj4gZml4ZXMgYXJlIGluIHRoZSB3b3Jr
cyBJIGJlbGl2ZS4KSXMgaXQgcG9zc2libGUgdG8gZ2V0IGNvbnRhY3QgdG8gdGhpcyB0ZWFtPyBP
ZmZlcmluZyBoZWxwIGluIHRlc3RpbmcgYQpyZWxlYXNlIG9uIGRpZmZlcmVudCBIYXJkd2FyZSBv
ciBzbz8KPiAKCiMjIyBTbyB0aGUgcHJvYmxlbSBvZiBzdWNjZXNzZnVsIHBhc3NpbmcgVVNCLVBD
SWUgdG8gYSBWTSB3aXRoIFhlbiAjIyMKCiMjIENvbGxlY3RlZCBrbm93bGVkZ2UgYW5kIGlkZWFz
OiAjIwoKLXRoaXMgbWF5YmUgbWlnaHQgbm90IGJlIGEgZGlyZWN0IHF1ZXN0aW9uIGFib3V0IFdp
blhQIHZzLiBXaW4xMAogICAoY29uc2VudD8pCi1kb20wIEJJT1MgY29uZmlnICYgdWVmaSB2cy4g
bGVnYWN5IChUb3VjaGluZyBVU0ItUENJIGRldmljZSkKICAgKEhha29uIEFsc3RhZGhlaW0pIDE4
LTAxLTA0Ci1tb3N0IGRldmljZXMgZG8gbm90IHN1cHBvcnQgRkxSZXNldCBidXQgbWFueSB3aWxs
IHBhc3MtdGhyb3VnaCBhbmQgYmUKdXNhYmxlCiAgIChDaHVjayBSaXRvbGEpIDE4LTAxLTA0Ci1J
bnRvbGVyYWJsZSBzdGF0ZSBvZiBQQ0kuIEF2b2lkOiBCaW5kIHBjaWJhY2sgb24gYm9vdCB0aW1l
LCB0byBnaXZlCmRvbVUgdW50b3VjaGVkIFBDSSBkZXZpY2UKICAgKENodWNrIFJpdG9sYSkgMTgt
MDEtMDQKCgojIyBPcGVuIHF1ZXN0aW9ucyAjIwoKQ2FuIHRoZSBEb21VLVBDSSBEcml2ZXIgZnJv
bSB0aGUgUENJLUhhcmR3YXJlIHZlbmRvciBiZSBpbnZvbHZlZCB3aXRoCnRoaXMgcHJvYmxlbT8K
ClNob3VsZCBJIGdpdmUgaXQgYSB0cnkgdG8gY29tcGlsZSBhIGtlcm5lbCBteSBzZWxmIHdoaWNo
IGhhcyBwY2liYWNrCmluY2x1ZGVkIGFuZCBub3QgbG9hZGVkIGFzIGEgbW9kZWw/CgpXaGF0IGhh
cHBlbnMgd2hlbiBJJ20gcGFzc2luZyBhIFBDSS1EZXZpY2UgdG8gc2V2ZXJhbCBtYWNoaW5lcz8K
U2F5IHRoZSBwY2ktZGV2aWNlIGlzIG5vdCBpbml0aWFsaXplZCBieSBkdW0wIGRyaXZlcnMuCmZp
cnN0IGRvbVUgLT4gaW5pdAogICAuLi5kb2luZyBzb21lIHN0dWZmCmZpcnN0IGRvbVUgLT4gZGVp
bml0ID8Kc2Vjb25kIGRvbVUgLT4gaW5pdCA/CiAgIC4uLmRvaW5nIHNvbWUgc3R1ZmYgPwpzZW9u
ZCBkb21VIC0+ZGVpbml0ID8KCi0+IFdoeSBvbmx5IGludGVybmFsIChjaGlwc2V0KSBVU0ItSG9z
dCBDb250cm9sbGVyIGlzIHdvcmtpbmcgZm9yIFdpbjc/Ci0+IElzIHRoZXJlIGEgZGlmZmVyZW5j
ZSBiZXR3ZWVuIGluIHdpblhQJjE2LjA0IHZzLiB3aW43JndpbjEwPwoKX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApY
ZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9y
Zy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Fri Jan 05 00:22:57 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 00:22:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXFli-00056e-Jv; Fri, 05 Jan 2018 00:21:54 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=aahh=ea=gmail.com=j.faisal@srs-us1.protection.inumbo.net>)
 id 1eXFlh-00056Y-4d
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 00:21:53 +0000
X-Inumbo-ID: 41fd4a14-f1ae-11e7-b4a6-bc764e045a96
Received: from mail-lf0-x22d.google.com (unknown [2a00:1450:4010:c07::22d])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 41fd4a14-f1ae-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 01:20:40 +0100 (CET)
Received: by mail-lf0-x22d.google.com with SMTP id u84so3517134lff.7
 for <xen-users@lists.xenproject.org>; Thu, 04 Jan 2018 16:21:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=i375ydnQ9ihya2olNuAq/BaaZpcov70GAoQeQDmkNNk=;
 b=P8ln1+YB41d5zCOSEm3lVuNG/T5u2DGm7CtBpjyxbLysMBcSI+Viu2YgJc2ygtr8yi
 /3S7TQAFf7aVIcN/AntbANOTkWOM12JAU1Ur1PxVrngCBJcIDFwmOIpqnAuWmcdu2l7P
 AP8qrNA+dpv0wPpJgN+vp1AjFdZa4FZiV+nXunhxw2wneDI02ociUmDreFaJFskHGDlE
 HI5GApzwJGRmLi21fYS1L8UqJ8B0hvOMsVvCnB2gYtClz4Fa5us1cKTMQ6ouTrIjBQWv
 /Q0xobvwkWnQFjnAdmc7NghB85P2NEdHfRIWD1zf+9IfBH7NGTcRwe8Sq53Fxp+UnKxq
 6E5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=i375ydnQ9ihya2olNuAq/BaaZpcov70GAoQeQDmkNNk=;
 b=ekYQwO0JMKVxMkN6hEuKOwtKotrzKJxVEFGC8k68EW9RkSxJnW+hrWS89i3NjzyJcy
 8qu659TDMY9DAiJrEhre3XJMJJuko5N5nbYSaQSYMj2UV13TGYbs8fpSqF0ccv3F6sUA
 dUZMBUVcnjJEAtNyjfdRoNRh6qDi9MUuhbqz844dF28Aj+Ap/wIKsQATDYXIjtB4jnKl
 +yQULk5TZpFi/LimZcxnMcegvRTy4e3NTf2Gqy4oZ4IbhURgYVEVAcFg4FOzpwSfTnDy
 wSscgFHLeoL37WMIxf2XaaJzbfgi0kkLybpr1BE+zr8bKMXQbHVQaWwSbTelU1rRhbhn
 phMg==
X-Gm-Message-State: AKwxytebu+kckUA7YbTukVL3NkT5e7m/e0jm3H4DjFdWkPnazQohu80v
 9YFVbOG8gEo4ueV2rhRX/cWvglthJJrHpzKqdWE+xIFE
X-Google-Smtp-Source: ACJfBouUdXxshG8vv783+8u1jH9z7V4rAcK1Ll9R8tU+umycd38Dqpx17O+rNXOjKkimbXRpCmV3/EuXfJtff5HoRwU=
X-Received: by 10.25.38.208 with SMTP id m199mr658813lfm.10.1515111708887;
 Thu, 04 Jan 2018 16:21:48 -0800 (PST)
MIME-Version: 1.0
Received: by 10.25.23.217 with HTTP; Thu, 4 Jan 2018 16:21:48 -0800 (PST)
From: Jamshaid Faisal <j.faisal@gmail.com>
Date: Fri, 5 Jan 2018 05:21:48 +0500
Message-ID: <CAA=xqWqDJxKH9_tc+jb+-iMq0jnOC3_WSwc35+JYeurLVLXE8Q@mail.gmail.com>
To: xen-users@lists.xenproject.org
Subject: [Xen-users] XEN+RBD(ceph)+qemu+Centos7 HV reboots during W2k12
	cloned DomU startup
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============5195720804402795535=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============5195720804402795535==
Content-Type: multipart/alternative; boundary="001a114032a6340d9a0561fc6f05"

--001a114032a6340d9a0561fc6f05
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hello everyone,

We=E2=80=99ve managed to encounter a situation where we can cause a Xen hyp=
ervisor
to reboot itself. We may be hitting a bug, or, there is something wrong we
are doing.

Summary: a windows 2012 x64 R2 VM can cause the hypervisor to reboot itself
during startup of VM.

Reproducible: yes, every time, across 6 hypervisors.

Hardware:

6 servers, Supermicro motherboard X9DRi-LN4+

Bios 3.2, also tested downgrading to 3.0

Each with Two intel X520-DA2, running firmware 4.4.9 and 4.4.13, also
downgraded to 2.3.x during testing

Dual Xeon E5-2620v2 or E5-2640 or E5-2697v2

256GBs of DDR3 ECC Reg RAM per hypervisor, all memtested

Dual power feeds to each server

Infrastructure:

Each server has a single 10g uplink to a network dedicated to Ceph

Each server has a single 10g uplink to a network that handles public
Internet access as well as private (using vxlan in a separate vlan)

VLANs are used to separate vxlan traffic and public traffic

Each network card has two ports, even though each has a single uplink right
now

Two ports for ceph network and public/private network are bonded as LACP;
again, only one uplink is connected per card though

We use openvswitch for networking of the VMs, but we have also tried
diagnosing this problem without openvswitch and just using Linux bridges

We=E2=80=99ve also tried networking without using LACP

Software:

Linux kernel 4.14 from EL repo, also tried centos-xen kernel 4.9.x

CentOS 7.4

Xen version 4.9, but we=E2=80=99ve also tried as low as 4.6

Disk storage provided by Ceph Luminous 12.2.2

Windows VM has xen drivers version 8.1 (newer version 8.2 for some reason
would not work properly with Windows 2016)

IOMMU enabled and also tested with it disabled





Reboot issue occurs when:

- during the start of a cloned, non sysprep version of Windows 2012 R2 x64

Issue does NOT occur:

- With sysprep Windows 2012 R2 x64

- With sysprep or cloned version of Windows 10 Pro x64 and Windows 2016
Standard x64

- With cloned of Windows 2012 R2 x64 with its networking disabled

What do I mean by cloned? A clone of an existing running VM, with its disk
being a clone made by Ceph, and we just change the IP numbers of the new
copy. Which means, it hasn=E2=80=99t gone through the sysprep process.

Assumption: issue is somehow related to the VM=E2=80=99s networking and non=
-sysprep
version of Windows 2012 R2 x64.

Note: the original template of Windows 2012 R2 x64, as well as Windows Pro
10 and Windows Standard 2016, were created in a hypervisor running on a
Xeon E3-1270v2 instead of a Xeon E5.

Purpose:

We've been working on creating a new hypervisor model, with a newer Xen,
newer openvswitch, new CentOS 7 and disk storage based on Ceph.

Previously, we were using local disk storage, centos-xen and CentOS 6.

The entire HV reboots itself (no log entries, no entries are sent to the
syslog server either) when we deploy a Windows 2012 VM cloned from another
one that has been previously created. Sometimes when deploying just one,
sometimes when deploying several of them at the same time.

If we boot a sysprepped Windows 2012 R2 x64, the hypervisors don't reboot
themselves, and Windows finishes its setup process fine and starts up fine.
Yes, we should always use sysprep versions, however, customers can clone
existing VMs, so it won't always be sysprep versions. Also, it is our
opinion that no matter what happens inside the virtual machine, sysprep or
not, Linux or Windows, nothing in a virtual machine should cause an entire
hypervisor to reboot itself. That would be a major stability and security
issue.

Again, the reboots do not occur if Xen is starting a virtual server booting
a sysprep version of Windows 2012 R2 x64, or, if we disable the network
interfaces to a VM that would otherwise cause the server to reboot itself.

We added GRUB_CMDLINE_XEN=3D"noreboot" so that the hypervisor would not
reboot itself. On the next time we provoke the issue, we see on the screen
simply:

BUG: unable to handle kernel paging request at ffff88088141d000

Nothing else.

This is happening to 6 test servers, not just one. We can reproduce it any
time.

Any theories? Ideas? Something related to networking causes the entire
machine to reboot itself. And only happens with Windows 2012. Not with
other Windows and certainly not with Linux. We will gladly provide access
to a test system.


Regards

James

--001a114032a6340d9a0561fc6f05
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><p dir=3D"ltr" style=3D"line-height:1.38;margin-=
top:0pt;margin-bottom:0pt" id=3D"gmail-docs-internal-guid-f23bf268-c3ac-bb2=
6-3cba-3cb93fb91efd"><span style=3D"font-size:11pt;font-family:Arial;color:=
rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;f=
ont-variant:normal;text-decoration:none;vertical-align:baseline;white-space=
:pre">Hello everyone,</span></p><br><p dir=3D"ltr" style=3D"line-height:1.3=
8;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-fami=
ly:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:400;font=
-style:normal;font-variant:normal;text-decoration:none;vertical-align:basel=
ine;white-space:pre">We=E2=80=99ve managed to encounter a situation where w=
e can cause a Xen hypervisor to reboot itself. We may be hitting a bug, or,=
 there is something wrong we are doing.</span></p><br><p dir=3D"ltr" style=
=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-=
size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;f=
ont-weight:400;font-style:normal;font-variant:normal;text-decoration:none;v=
ertical-align:baseline;white-space:pre">Summary: a windows 2012 x64 R2 VM c=
an cause the hypervisor to reboot itself during startup of VM.</span></p><p=
 dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><s=
pan style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-c=
olor:transparent;font-weight:400;font-style:normal;font-variant:normal;text=
-decoration:none;vertical-align:baseline;white-space:pre">Reproducible: yes=
, every time, across 6 hypervisors.</span></p><br><p dir=3D"ltr" style=3D"l=
ine-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:=
11pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-w=
eight:400;font-style:normal;font-variant:normal;text-decoration:none;vertic=
al-align:baseline;white-space:pre">Hardware:</span></p><br><p dir=3D"ltr" s=
tyle=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"f=
ont-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transpare=
nt;font-weight:400;font-style:normal;font-variant:normal;text-decoration:no=
ne;vertical-align:baseline;white-space:pre">6 servers, Supermicro motherboa=
rd X9DRi-LN4+</span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top=
:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:Arial;col=
or:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:norma=
l;font-variant:normal;text-decoration:none;vertical-align:baseline;white-sp=
ace:pre">Bios 3.2, also tested downgrading to 3.0</span></p><p dir=3D"ltr" =
style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"=
font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transpar=
ent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:n=
one;vertical-align:baseline;white-space:pre">Each with Two intel X520-DA2, =
running firmware 4.4.9 and 4.4.13, also downgraded to 2.3.x during testing<=
/span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bo=
ttom:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);=
background-color:transparent;font-weight:400;font-style:normal;font-variant=
:normal;text-decoration:none;vertical-align:baseline;white-space:pre">Dual =
Xeon E5-2620v2 or E5-2640 or E5-2697v2</span></p><p dir=3D"ltr" style=3D"li=
ne-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:1=
1pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-we=
ight:400;font-style:normal;font-variant:normal;text-decoration:none;vertica=
l-align:baseline;white-space:pre">256GBs of DDR3 ECC Reg RAM per hypervisor=
, all memtested</span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-t=
op:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:Arial;c=
olor:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:nor=
mal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-=
space:pre">Dual power feeds to each server</span></p><br><p dir=3D"ltr" sty=
le=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"fon=
t-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent=
;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none=
;vertical-align:baseline;white-space:pre">Infrastructure:</span></p><br><p =
dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><sp=
an style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-co=
lor:transparent;font-weight:400;font-style:normal;font-variant:normal;text-=
decoration:none;vertical-align:baseline;white-space:pre">Each server has a =
single 10g uplink to a network dedicated to Ceph</span></p><p dir=3D"ltr" s=
tyle=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"f=
ont-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transpare=
nt;font-weight:400;font-style:normal;font-variant:normal;text-decoration:no=
ne;vertical-align:baseline;white-space:pre">Each server has a single 10g up=
link to a network that handles public Internet access as well as private (u=
sing vxlan in a separate vlan)</span></p><p dir=3D"ltr" style=3D"line-heigh=
t:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font=
-family:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:400=
;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:=
baseline;white-space:pre">VLANs are used to separate vxlan traffic and publ=
ic traffic</span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0p=
t;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:=
rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;f=
ont-variant:normal;text-decoration:none;vertical-align:baseline;white-space=
:pre">Each network card has two ports, even though each has a single uplink=
 right now</span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0p=
t;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:=
rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;f=
ont-variant:normal;text-decoration:none;vertical-align:baseline;white-space=
:pre">Two ports for ceph network and public/private network are bonded as L=
ACP; again, only one uplink is connected per card though</span></p><p dir=
=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span =
style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color=
:transparent;font-weight:400;font-style:normal;font-variant:normal;text-dec=
oration:none;vertical-align:baseline;white-space:pre">We use openvswitch fo=
r networking of the VMs, but we have also tried diagnosing this problem wit=
hout openvswitch and just using Linux bridges</span></p><p dir=3D"ltr" styl=
e=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font=
-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;=
font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;=
vertical-align:baseline;white-space:pre">We=E2=80=99ve also tried networkin=
g without using LACP</span></p><br><p dir=3D"ltr" style=3D"line-height:1.38=
;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-famil=
y:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-=
style:normal;font-variant:normal;text-decoration:none;vertical-align:baseli=
ne;white-space:pre">Software:</span></p><br><p dir=3D"ltr" style=3D"line-he=
ight:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;f=
ont-family:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:=
400;font-style:normal;font-variant:normal;text-decoration:none;vertical-ali=
gn:baseline;white-space:pre">Linux kernel 4.14 from EL repo, also tried cen=
tos-xen kernel 4.9.x</span></p><p dir=3D"ltr" style=3D"line-height:1.38;mar=
gin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:Ar=
ial;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-styl=
e:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;w=
hite-space:pre">CentOS 7.4</span></p><p dir=3D"ltr" style=3D"line-height:1.=
38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-fam=
ily:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:400;fon=
t-style:normal;font-variant:normal;text-decoration:none;vertical-align:base=
line;white-space:pre">Xen version 4.9, but we=E2=80=99ve also tried as low =
as 4.6 </span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;m=
argin-bottom:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:rgb=
(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font=
-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pr=
e">Disk storage provided by Ceph Luminous 12.2.2</span></p><p dir=3D"ltr" s=
tyle=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"f=
ont-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transpare=
nt;font-weight:400;font-style:normal;font-variant:normal;text-decoration:no=
ne;vertical-align:baseline;white-space:pre">Windows VM has xen drivers vers=
ion 8.1 (newer version 8.2 for some reason would not work properly with Win=
dows 2016)</span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0p=
t;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:=
rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;f=
ont-variant:normal;text-decoration:none;vertical-align:baseline;white-space=
:pre">IOMMU enabled and also tested with it disabled</span></p><br><br><br>=
<br><br><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bott=
om:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);ba=
ckground-color:transparent;font-weight:400;font-style:normal;font-variant:n=
ormal;text-decoration:none;vertical-align:baseline;white-space:pre">Reboot =
issue occurs when:</span></p><br><p dir=3D"ltr" style=3D"line-height:1.38;m=
argin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:=
Arial;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-st=
yle:normal;font-variant:normal;text-decoration:none;vertical-align:baseline=
;white-space:pre">- during the start of a cloned, non sysprep version of Wi=
ndows 2012 R2 x64</span></p><br><p dir=3D"ltr" style=3D"line-height:1.38;ma=
rgin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-family:A=
rial;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-sty=
le:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;=
white-space:pre">Issue does NOT occur:</span></p><br><p dir=3D"ltr" style=
=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-=
size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;f=
ont-weight:400;font-style:normal;font-variant:normal;text-decoration:none;v=
ertical-align:baseline;white-space:pre">- With sysprep Windows 2012 R2 x64<=
/span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bo=
ttom:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);=
background-color:transparent;font-weight:400;font-style:normal;font-variant=
:normal;text-decoration:none;vertical-align:baseline;white-space:pre">- Wit=
h sysprep or cloned version of Windows 10 Pro x64 and Windows 2016 Standard=
 x64</span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;marg=
in-bottom:0pt"><span style=3D"font-size:11pt;font-family:Arial;color:rgb(0,=
0,0);background-color:transparent;font-weight:400;font-style:normal;font-va=
riant:normal;text-decoration:none;vertical-align:baseline;white-space:pre">=
- With cloned of Windows 2012 R2 x64 with its networking disabled</span></p=
><br><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:=
0pt"><span style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);backg=
round-color:transparent;font-weight:400;font-style:normal;font-variant:norm=
al;text-decoration:none;vertical-align:baseline;white-space:pre">What do I =
mean by cloned? A clone of an existing running VM, with its disk being a cl=
one made by Ceph, and we just change the IP numbers of the new copy. Which =
means, it hasn=E2=80=99t gone through the sysprep process.</span></p><br><p=
 dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><s=
pan style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-c=
olor:transparent;font-weight:400;font-style:normal;font-variant:normal;text=
-decoration:none;vertical-align:baseline;white-space:pre">Assumption: issue=
 is somehow related to the VM=E2=80=99s networking and non-sysprep version =
of Windows 2012 R2 x64.</span></p><br><p dir=3D"ltr" style=3D"line-height:1=
.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;font-fa=
mily:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:400;fo=
nt-style:normal;font-variant:normal;text-decoration:none;vertical-align:bas=
eline;white-space:pre">Note: the original template of Windows 2012 R2 x64, =
as well as Windows Pro 10 and Windows Standard 2016, were created in a hype=
rvisor running on a Xeon E3-1270v2 instead of a Xeon E5.</span></p><br><p d=
ir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><spa=
n style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-col=
or:transparent;font-weight:400;font-style:normal;font-variant:normal;text-d=
ecoration:none;vertical-align:baseline;white-space:pre">Purpose:</span></p>=
<br><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0=
pt"><span style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);backgr=
ound-color:transparent;font-weight:400;font-style:normal;font-variant:norma=
l;text-decoration:none;vertical-align:baseline;white-space:pre">We&#39;ve b=
een working on creating a new hypervisor model, with a newer Xen, newer ope=
nvswitch, new CentOS 7 and disk storage based on Ceph.</span></p><br><p dir=
=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span =
style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color=
:transparent;font-weight:400;font-style:normal;font-variant:normal;text-dec=
oration:none;vertical-align:baseline;white-space:pre">Previously, we were u=
sing local disk storage, centos-xen and CentOS 6.</span></p><br><p dir=3D"l=
tr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=
=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:tran=
sparent;font-weight:400;font-style:normal;font-variant:normal;text-decorati=
on:none;vertical-align:baseline;white-space:pre">The entire HV reboots itse=
lf (no log entries, no entries are sent to the syslog server either) when w=
e deploy a Windows 2012 VM cloned from another one that has been previously=
 created. Sometimes when deploying just one, sometimes when deploying sever=
al of them at the same time.</span></p><br><p dir=3D"ltr" style=3D"line-hei=
ght:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt;fo=
nt-family:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:4=
00;font-style:normal;font-variant:normal;text-decoration:none;vertical-alig=
n:baseline;white-space:pre">If we boot a sysprepped Windows 2012 R2 x64, th=
e hypervisors don&#39;t reboot themselves, and Windows finishes its setup p=
rocess fine and starts up fine. Yes, we should always use sysprep versions,=
 however, customers can clone existing VMs, so it won&#39;t always be syspr=
ep versions. Also, it is our opinion that no matter what happens inside the=
 virtual machine, sysprep or not, Linux or Windows, nothing in a virtual ma=
chine should cause an entire hypervisor to reboot itself. That would be a m=
ajor stability and security issue.</span></p><br><p dir=3D"ltr" style=3D"li=
ne-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:1=
1pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-we=
ight:400;font-style:normal;font-variant:normal;text-decoration:none;vertica=
l-align:baseline;white-space:pre">Again, the reboots do not occur if Xen is=
 starting a virtual server booting a sysprep version of Windows 2012 R2 x64=
, or, if we disable the network interfaces to a VM that would otherwise cau=
se the server to reboot itself.</span></p><br><p dir=3D"ltr" style=3D"line-=
height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11pt=
;font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-weigh=
t:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-a=
lign:baseline;white-space:pre">We added GRUB_CMDLINE_XEN=3D&quot;noreboot&q=
uot; so that the hypervisor would not reboot itself. On the next time we pr=
ovoke the issue, we see on the screen simply:</span></p><br><p dir=3D"ltr" =
style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"=
font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:transpar=
ent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:n=
one;vertical-align:baseline;white-space:pre">BUG: unable to handle kernel p=
aging request at ffff88088141d000</span></p><br><p dir=3D"ltr" style=3D"lin=
e-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-size:11=
pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-wei=
ght:400;font-style:normal;font-variant:normal;text-decoration:none;vertical=
-align:baseline;white-space:pre">Nothing else. </span></p><br><p dir=3D"ltr=
" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=
=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color:tran=
sparent;font-weight:400;font-style:normal;font-variant:normal;text-decorati=
on:none;vertical-align:baseline;white-space:pre">This is happening to 6 tes=
t servers, not just one. We can reproduce it any time.</span></p><br><p dir=
=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span =
style=3D"font-size:11pt;font-family:Arial;color:rgb(0,0,0);background-color=
:transparent;font-weight:400;font-style:normal;font-variant:normal;text-dec=
oration:none;vertical-align:baseline;white-space:pre">Any theories? Ideas? =
Something related to networking causes the entire machine to reboot itself.=
 And only happens with Windows 2012. Not with other Windows and certainly n=
ot with Linux. We will gladly provide access to a test system.</span></p><b=
r><br></div>Regards<br><br></div>James<br></div>

--001a114032a6340d9a0561fc6f05--


--===============5195720804402795535==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============5195720804402795535==--


From xen-users-bounces@lists.xenproject.org Fri Jan 05 09:12:15 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 09:12:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXO1u-0001Q4-8x; Fri, 05 Jan 2018 09:11:10 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=wrye=ea=gmail.com=michel.dhooge@srs-us1.protection.inumbo.net>)
 id 1eXO1s-0001Py-SC
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 09:11:08 +0000
X-Inumbo-ID: 32d39c8f-f1f8-11e7-b4a6-bc764e045a96
Received: from mail-it0-x233.google.com (unknown [2607:f8b0:4001:c0b::233])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 32d39c8f-f1f8-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 10:09:56 +0100 (CET)
Received: by mail-it0-x233.google.com with SMTP id r6so933092itr.3
 for <xen-users@lists.xenproject.org>; Fri, 05 Jan 2018 01:11:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=vhMaaEuvtVG5xLpKQjl2DqBAGeKUJogFS7hE2f0oDkI=;
 b=fXMRkc8RDBzSAOl0/fUXR5BpA9IS/CxMxm1oiq6C1cXlKkoV0ImIxdt9NjI39O05sg
 SufKCw8NURejNfGopnvFbDmpaQmYS+JGbb80+olsfRG1wH+N3qBTpUTljVSWB3xbfUZf
 gxPiNP+ffE0Y3eWRXJV7JX3Vkv2oqdnqbdV1DDisCKzyW1ck/tEK3cOd/o6+6zn79Lox
 rvSWXh4KIZW7CKtV70b7hiZ1aQGQ3IeLEDOPJbmiTCFAb/xmjooPQZ2PYqqnzU1DRiCt
 7EQvxymYoeqa1JTsGMxcHOYf0tr8pQ5PO15BTsmFJC6EGBFdo0bapN2X5e8e7gKly214
 z2bQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=vhMaaEuvtVG5xLpKQjl2DqBAGeKUJogFS7hE2f0oDkI=;
 b=H1GOlc3NdBbA3mCJW5z+VjWbjUcy1i0GbSQtMWLzbdIocfz6RRRQAl+DQbq85WazRh
 4P9KkaEOWThTswgwBovyovG0DtbbkC1ULP0DZTwAt1qOHcfTIV8wsrBHH0HdX/UcD8JT
 PrpXkuLPx88DneoMMOytwuJ4jBBYuTJccZvGq6eS4Uau/8SZwwV/LfhsbNgWEnyo2FL3
 A5nYNhiRoSdv4xVLn3Y0RqajlxA7AYVnlpgwxKRHVM8m1lCoTmjw6nXRzG94C06kwBG9
 EXutQRQ9SbBVwycneawv+6AA5pnExvXH4IBM2GZH4GUYmmkjxu8qMOvNuKKx2o8ZR+sL
 eaaQ==
X-Gm-Message-State: AKGB3mJriLo9sweKTH8oPJtDlVZ0fZ6c6zY6rBA7cijH1vZYQJa2uNv4
 JEPfP1cGNax3h/BHWiEQdKmf1jaF4BuA8tuJCFk=
X-Google-Smtp-Source: ACJfBovByDMipcMrRxFg5eZPQBhEJbkC9TM59A4ZkzPfV3riY7lG1Qg4O9JjRN9Eb2TFPq6ldelUis2hMLRne/Knwg0=
X-Received: by 10.36.13.76 with SMTP id 73mr2558227itx.114.1515143467110; Fri,
 05 Jan 2018 01:11:07 -0800 (PST)
MIME-Version: 1.0
Received: by 10.2.183.4 with HTTP; Fri, 5 Jan 2018 01:10:46 -0800 (PST)
In-Reply-To: <CAA=xqWqDJxKH9_tc+jb+-iMq0jnOC3_WSwc35+JYeurLVLXE8Q@mail.gmail.com>
References: <CAA=xqWqDJxKH9_tc+jb+-iMq0jnOC3_WSwc35+JYeurLVLXE8Q@mail.gmail.com>
From: "Michel D'HOOGE" <michel.dhooge@gmail.com>
Date: Fri, 5 Jan 2018 10:10:46 +0100
Message-ID: <CABvfmH5JybhwQWhsf2va4BS1jmxM4Ukw+=5BoGCaHa7udAdO1w@mail.gmail.com>
To: Jamshaid Faisal <j.faisal@gmail.com>
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] XEN+RBD(ceph)+qemu+Centos7 HV reboots during W2k12
 cloned DomU startup
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Fri Jan 05 11:36:13 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 11:36:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXQHI-0005I7-97; Fri, 05 Jan 2018 11:35:12 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=wlwn=ea=gmail.com=lars.kurth.xen@srs-us1.protection.inumbo.net>)
 id 1eXQHG-0005Hj-LG
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 11:35:10 +0000
X-Inumbo-ID: 50c71c19-f20c-11e7-b4a6-bc764e045a96
Received: from mail-wm0-x22d.google.com (unknown [2a00:1450:400c:c09::22d])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 50c71c19-f20c-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 12:33:57 +0100 (CET)
Received: by mail-wm0-x22d.google.com with SMTP id y82so5941379wmg.1;
 Fri, 05 Jan 2018 03:35:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:content-transfer-encoding:mime-version:subject:message-id:date
 :cc:to; bh=X7b7uENKeyy6LdTbAMpeK+B9dygXfUdsWGpQVRZC5Pk=;
 b=RoSNSnM6XfwihWDtGAZuoS1RqXUwGcddgxEa+lhuDrgsAeN8+yATTZDqJnt5RNQWkO
 5FC38jwbyVVTnUC8cY3CXKp9E1uFOy4Tx5W2hhTnNm8MOHVs9HCHPZEC1tVhqeTNcqoO
 oBobo63nMNVXOZpO0E09nteRmwev47ZZHiD0NSEpXt7/q29W9DglARmfVfvcey4yHgmt
 5sHuS6qRhqwmr4xGmemio0+WF8bIcL3hN3awram9kBehlnSue5ChD6VXYD8rWqKJobws
 9YC9A87bVKm9JDfOHjNs6cDl1tTogFo7X9kZN3UWYYTT5bNBIuIR+6t40sHdBhj7Znrk
 fDnQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:content-transfer-encoding:mime-version
 :subject:message-id:date:cc:to;
 bh=X7b7uENKeyy6LdTbAMpeK+B9dygXfUdsWGpQVRZC5Pk=;
 b=GHQ79XJxfEkczgUvfb7clNaPM7eax9FTtpBj8Xj6V4awXjxuPOXbNUKW1T2jOUtFuS
 OH6MShPS54Pj9/DnuEoURUfE+3Art4T09lbhxp+yNtAs7HJZj2Ytd5XVccTM4WApvrBU
 f9OLKXNbBhKggGYNNlGCWfkiei9U1MAG0hsmpx4yKwu9Wn48PbcpD2+NxUqAq5Iss0R4
 CGxKI9jlMmfIiGiPm+YG9Re11oeHPQ5D4K6yYp26rspO6UHkw7HYxP/z9g0N8IYiB6DG
 2JK+vKe8ARlRVOT3DJaKf7CUbPoTTwHqL1+qTRORFDmZ13W4yzx0btCJzVtdfASwDs2V
 TOSQ==
X-Gm-Message-State: AKGB3mIuSqi9NabI/1fPHziLN9FW+aHjlVQ/9JIGQ7bkmsP7qC9IPVA6
 utg/dcnHUQNtHkXsvIcIujqnl/rV
X-Google-Smtp-Source: ACJfBouNT87XLMlpr/tmMdrczzB3Cfu7WZsXXri8UzjsHeG/qIiDLO5aMNBW/7UKqqiNrxyrzMTzbg==
X-Received: by 10.28.247.24 with SMTP id v24mr2238157wmh.140.1515152106966;
 Fri, 05 Jan 2018 03:35:06 -0800 (PST)
Received: from ?IPv6:2a02:c7f:ac18:da00:8a4:c503:d7c3:c182?
 ([2a02:c7f:ac18:da00:8a4:c503:d7c3:c182])
 by smtp.gmail.com with ESMTPSA id t61sm15004378wrc.21.2018.01.05.03.35.05
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Fri, 05 Jan 2018 03:35:06 -0800 (PST)
From: Lars Kurth <lars.kurth.xen@gmail.com>
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Message-Id: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
Date: Fri, 5 Jan 2018 11:35:05 +0000
To: xen-devel <xen-devel@lists.xenproject.org>, xen-users@lists.xenproject.org
X-Mailer: Apple Mail (2.3273)
Cc: George Dunlap <george.dunlap@citrix.com>
Subject: [Xen-users] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

SGkgYWxsLCB0aGlzIGlzIGEgcmVwb3N0IG9mIGh0dHBzOi8vYmxvZy54ZW5wcm9qZWN0Lm9yZy8y
MDE4LzAxLzA0L3hlbi1wcm9qZWN0LXNwZWN0cmVtZWx0ZG93bi1mYXEvIGZvciB4ZW4tdXNlcnMv
eGVuLWRldmVsLiBJZiB5b3UgaGF2ZSBxdWVzdGlvbnMsIHBsZWFzZSByZXBseSB0byB0aGlzIHRo
cmVhZCBhbmQgd2Ugd2lsbCB0cnkgYW5kIGltcHJvdmUgdGhlIEZBUSBiYXNlZCBvbiBxdWVzdGlv
bnMuClJlZ2FyZHMKTGFycwoKCkdvb2dsZeKAmXMgUHJvamVjdCBaZXJvIGFubm91bmNlZCBzZXZl
cmFsIGluZm9ybWF0aW9uIGxlYWsgdnVsbmVyYWJpbGl0aWVzIGFmZmVjdGluZyBhbGwgbW9kZXJu
IHN1cGVyc2NhbGFyIHByb2Nlc3NvcnMuIERldGFpbHMgY2FuIGJlIGZvdW5kIG9uIHRoZWlyIGJs
b2csIGFuZCBpbiB0aGUgWGVuIFByb2plY3QgQWR2aXNvcnkgMjU0IFsxXS4gVG8gaGVscCBvdXIg
dXNlcnMgdW5kZXJzdGFuZCB0aGUgaW1wYWN0IGFuZCBvdXIgbmV4dCBzdGVwcyBmb3J3YXJkLCB3
ZSBwdXQgdG9nZXRoZXIgdGhlIGZvbGxvd2luZyBGQVEuCgpOb3RlIHRoYXQgd2Ugd2lsbCB1cGRh
dGUgdGhlIEZBUSBhcyBuZXcgaW5mb3JtYXRpb24gc3VyZmFjZXMuCgo9IElzIFhlbiBpbXBhY3Rl
ZCBieSBNZWx0ZG93biBhbmQgU3BlY3RyZT8gPQoKVGhlcmUgYXJlIHR3byBhbmdsZXMgdG8gY29u
c2lkZXIgZm9yIHRoaXMgcXVlc3Rpb246CgoqIENhbiBhbiB1bnRydXN0ZWQgZ3Vlc3QgYXR0YWNr
IHRoZSBoeXBlcnZpc29yIHVzaW5nIE1lbHRkb3duIG9yIFNwZWN0cmU/CiogQ2FuIGEgZ3Vlc3Qg
dXNlci1zcGFjZSBwcm9ncmFtIGF0dGFjayBhIGd1ZXN0IGtlcm5lbCB1c2luZyBNZWx0ZG93biBv
ciBTcGVjdHJlPwoKU3lzdGVtcyBydW5uaW5nIFhlbiwgbGlrZSBhbGwgb3BlcmF0aW5nIHN5c3Rl
bXMgYW5kIGh5cGVydmlzb3JzLCBhcmUgcG90ZW50aWFsbHkgYWZmZWN0ZWQgYnkgU3BlY3RyZSAo
cmVmZXJyZWQgdG8gYXMgU1AxIGFuZCBTUDIgaW4gQWR2aXNvcnkgMjU0IFsxXSkuIEZvciBBcm0g
UHJvY2Vzc29ycyBpbmZvcm1hdGlvbiwgeW91IGNhbiBmaW5kIHdoaWNoIHByb2Nlc3NvcnMgYXJl
IGltcGFjdGVkIGhlcmUgWzJdLiAgSW4gZ2VuZXJhbCwgYm90aCB0aGUgaHlwZXJ2aXNvciBhbmQg
YSBndWVzdCBrZXJuZWwgYXJlIHZ1bG5lcmFibGUgdG8gYXR0YWNrIHZpYSBTUDEgYW5kIFNQMi4K
Ck9ubHkgSW50ZWwgcHJvY2Vzc29ycyBhcmUgaW1wYWN0ZWQgYnkgTWVsdGRvd24gKHJlZmVycmVk
IHRvIGFzIFNQMyBpbiBBZHZpc29yeSAyNTQgWzFdKS4gT24gSW50ZWwgcHJvY2Vzc29ycywgb25s
eSA2NC1iaXQgUFYgbW9kZSBndWVzdHMgY2FuIGF0dGFjayBYZW4uIEd1ZXN0cyBydW5uaW5nIGlu
IDMyLWJpdCBQViBtb2RlLCBIVk0gbW9kZSwgYW5kIFBWSCBtb2RlIGNhbm5vdCBhdHRhY2sgdGhl
IGh5cGVydmlzb3IgdXNpbmcgU1AzLiBIb3dldmVyLCBpbiAzMi1iaXQgUFYgbW9kZSwgSFZNIG1v
ZGUsIGFuZCBQVkggbW9kZSwgZ3Vlc3QgdXNlcnNwYWNlcyBjYW4gYXR0YWNrIGd1ZXN0IGtlcm5l
bHMgdXNpbmcgU1AzOyBzbyB1cGRhdGluZyBndWVzdCBrZXJuZWxzIGlzIGFkdmlzYWJsZS4KCklu
dGVyZXN0aW5nbHksIGd1ZXN0IGtlcm5lbHMgcnVubmluZyBpbiA2NC1iaXQgUFYgbW9kZSBhcmUg
bm90IHZ1bG5lcmFibGUgdG8gYXR0YWNrIHVzaW5nIFNQMywgYmVjYXVzZSA2NC1iaXQgUFYgZ3Vl
c3RzIGFscmVhZHkgcnVuIGluIGEgS1BUSS1saWtlIG1vZGUuCgo9IElzIHRoZXJlIGFueSByaXNr
IG9mIHByaXZpbGVnZSBlc2NhbGF0aW9uPyA9CgpNZWx0ZG93biBhbmQgU3BlY3RyZSBhcmUsIGJ5
IHRoZW1zZWx2ZXMsIG9ubHkgaW5mb3JtYXRpb24gbGVha3MuIFRoZXJlIGlzIG5vIHN1Z2dlc3Rp
b24gdGhhdCBzcGVjdWxhdGl2ZSBleGVjdXRpb24gY2FuIGJlIHVzZWQgdG8gbW9kaWZ5IG1lbW9y
eSBvciBjYXVzZSBhIHN5c3RlbSB0byBkbyBhbnl0aGluZyBpdCBtaWdodCBub3QgaGF2ZSBkb25l
IGFscmVhZHkuCgo9IFdoZXJlIGNhbiBJIGZpbmQgbW9yZSBpbmZvcm1hdGlvbj8gPQoKV2Ugd2ls
bCB1cGRhdGUgdGhpcyBibG9nIHBvc3QgYW5kIEFkdmlzb3J5IDI1NCBbMV0gYXMgbmV3IGluZm9y
bWF0aW9uIGJlY29tZXMgYXZhaWxhYmxlLiBVcGRhdGVzIHdpbGwgYWxzbyBiZSBwdWJsaXNoZWQg
b24geGVuLWFubm91bmNlQC4KCldlIHdpbGwgYWxzbyBtYWludGFpbiBhIHRlY2huaWNhbCBGQVEg
b24gb3VyIHdpa2kgWzNdIGZvciBhbnN3ZXJzIHRvIG1vcmUgZGV0YWlsZWQgdGVjaG5pY2FsIHF1
ZXN0aW9ucyB0aGF0IGVtZXJnZSBvbiB4ZW4tZGV2ZWxAIGFuZCBvdGhlciBjb21tdW5pY2F0aW9u
IGNoYW5uZWxzLgoKPSBBcmUgdGhlcmUgYW55IHBhdGNoZXMgZm9yIHRoZSB2dWxuZXJhYmlsaXR5
PyA9CgpXZSBoYXZlIHByb3RvdHlwZSBwYXRjaGVzIGZvciBhIG1pdGlnYXRpb24gZm9yIE1lbHRk
b3duIG9uIEludGVsIENQVXMgYW5kIGEgTWl0aWdhdGlvbiBmb3IgU1AyL0NWRS0yMDE3LTU3MTUs
IHdoaWNoIGFyZSBmdW5jdGlvbmFsIGJ1dCBoYXZlIG5vdCB1bmRlcmdvbmUgcmlnb3JvdXMgcmV2
aWV3IGFuZCBoYXZlIG5vdCBiZWVuIGJhY2twb3J0ZWQgdG8gYWxsIHN1cHBvcnRlZCBYZW4gUHJv
amVjdCByZWxlYXNlcy4KCkFzIGluZm9ybWF0aW9uIHJlbGF0ZWQgdG8gTWVsdGRvd24gYW5kIFNw
ZWN0cmUgaXMgbm93IHB1YmxpYywgZGV2ZWxvcG1lbnQgd2lsbCBjb250aW51ZSBpbiBwdWJsaWMg
b24geGVuLWRldmVsQCBhbmQgcGF0Y2hlcyB3aWxsIGJlIHBvc3RlZCBhbmQgYXR0YWNoZWQgdG8g
QWR2aXNvcnkgMjU0IFsxXSBhcyB0aGV5IGJlY29tZSBhdmFpbGFibGUgaW4gdGhlIG5leHQgZmV3
IGRheXMuCgo9IENhbiBTUDEvU1AyIGJlIGZpeGVkIGF0IGFsbD8gV2hhdCBwbGFucyBhcmUgdGhl
cmUgdG8gbWl0aWdhdGUgdGhlbT8gPQoKU1AyIGNhbiBiZSBtaXRpZ2F0ZWQgaW4gdHdvIHdheXMs
IGJvdGggb2Ygd2hpY2ggZXNzZW50aWFsbHkgcHJldmVudCBzcGVjdWxhdGl2ZSBleGVjdXRpb24g
b2YgaW5kaXJlY3QgYnJhbmNoZXMuIFRoZSBmaXJzdCBpcyB0byBmbHVzaCB0aGUgYnJhbmNoIHBy
ZWRpY3Rpb24gbG9naWMgb24gZW50cnkgaW50byB0aGUgaHlwZXJ2aXNvci4gVGhpcyByZXF1aXJl
cyBtaWNyb2NvZGUgdXBkYXRlcywgd2hpY2ggSW50ZWwgYW5kIEFNRCBhcmUgaW4gdGhlIHByb2Nl
c3Mgb2YgcHJlcGFyaW5nLCBhcyB3ZWxsIGFzIHBhdGNoZXMgdG8gdGhlIGh5cGVydmlzb3Igd2hp
Y2ggYXJlIGFsc28gaW4gcHJvY2VzcyBhbmQgc2hvdWxkIGJlIGF2YWlsYWJsZSBzb29uLgoKVGhl
IHNlY29uZCBpcyB0byBkbyBpbmRpcmVjdCBqdW1wcyBpbiBhIHdheSB3aGljaCBpcyBub3Qgc3Vi
amVjdCB0byBzcGVjdWxhdGl2ZSBleGVjdXRpb24uIFRoaXMgcmVxdWlyZXMgdGhlIGh5cGVydmlz
b3IgdG8gYmUgcmVjb21waWxlZCB3aXRoIGEgY29tcGlsZXIgdGhhdCBjb250YWlucyBzcGVjaWFs
IG5ldyBmZWF0dXJlcy4gVGhlc2UgbmV3IGNvbXBpbGVyIGZlYXR1cmVzIGFyZSBhbHNvIGluIHRo
ZSBwcm9jZXNzIG9mIGJlaW5nIHByZXBhcmVkIGZvciBib3RoIGdjYyBhbmQgY2xhbmcsIGFuZCBz
aG91bGQgYmUgYXZhaWxhYmxlIHNvb24uCgpTUDEgaXMgbXVjaCBtb3JlIGRpZmZpY3VsdCB0byBt
aXRpZ2F0ZS4gV2UgaGF2ZSBzb21lIGlkZWFzIHdl4oCZcmUgZXhwbG9yaW5nLCBidXQgdGhleeKA
mXJlIHN0aWxsIGF0IHRoZSBkZXNpZ24gc3RhZ2UgYXQgdGhpcyBwb2ludC4KCj0gRG9lcyBYZW4g
aGF2ZSBhbnkgZXF1aXZhbGVudCB0byBMaW51eOKAmXMgS1BUSSBzZXJpZXM/ID0KCkxpbnV44oCZ
cyBLUFRJIHNlcmllcyBpcyBkZXNpZ25lZCB0byBhZGRyZXNzIFNQMyBvbmx5LiAgRm9yIFhlbiBn
dWVzdHMsIG9ubHkgNjQtYml0IFBWIGd1ZXN0cyBhcmUgYWZmZWN0ZWQgYnkgU1AzLiBBIEtQVEkt
bGlrZSBhcHByb2FjaCB3YXMgZXhwbG9yZWQgaW5pdGlhbGx5LCBidXQgcmVxdWlyZWQgc2lnbmlm
aWNhbnQgQUJJIGNoYW5nZXMuICBJbnN0ZWFkIHdl4oCZdmUgZGVjaWRlZCB0byBnbyB3aXRoIGFu
IGFsdGVybmF0ZSBhcHByb2FjaCwgd2hpY2ggaXMgbGVzcyBkaXNydXB0aXZlIGFuZCBsZXNzIGNv
bXBsZXggdG8gaW1wbGVtZW50LiBUaGUgY2hvc2VuIGFwcHJvYWNoIHJ1bnMgUFYgZ3Vlc3RzIGlu
IGEgUFZIIGNvbnRhaW5lciwgd2hpY2ggZW5zdXJlcyB0aGF0IFBWIGd1ZXN0cyBjb250aW51ZSB0
byBiZWhhdmUgYXMgYmVmb3JlLCB3aGlsZSBwcm92aWRpbmcgdGhlIGlzb2xhdGlvbiB0aGF0IHBy
b3RlY3RzIHRoZSBoeXBlcnZpc29yIGZyb20gU1AzLiBUaGlzIHdvcmtzIHdlbGwgZm9yIFhlbiA0
LjggdG8gWGVuIDQuMTAsIHdoaWNoIGlzIGN1cnJlbnRseSBvdXIgcHJpb3JpdHkuCgpGb3IgWGVu
IDQuNiBhbmQgNC43LCB3ZSBhcmUgZXZhbHVhdGluZyBzZXZlcmFsIG9wdGlvbnMsIGJ1dCB3ZSBo
YXZlIG5vdCB5ZXQgZmluYWxpemVkIHRoZSBiZXN0IHNvbHV0aW9uLgoKPSBEZXZpY2Vtb2RlbCBz
dHViIGRvbWFpbnMgcnVuIGluIFBWIG1vZGUsIHNvIGlzIGl0IHN0aWxsIG1vcmUgc2FmZSB0byBy
dW4gZGV2aWNlIG1vZGVscyBpbiBhIHN0dWIgZG9tYWluIHRoYW4gaW4gZG9tYWluIDA/ID0KClRo
ZSBzaG9ydCBhbnN3ZXIgaXMsIHllcywgaXQgaXMgc3RpbGwgc2FmZXIgdG8gcnVuIHN0dWIgZG9t
YWlucyB0aGFuIG90aGVyd2lzZS4KCklmIGFuIGF0dGFja2VyIGNhbiBnYWluIGNvbnRyb2wgb2Yg
dGhlIGRldmljZSBtb2RlbCBydW5uaW5nIGluIGEgc3R1YiBkb21haW4sIGl0IGNhbiBpbmRlZWQg
YXR0ZW1wdCB0byB1c2UgdGhlc2UgcHJvY2Vzc29yIHZ1bG5lcmFiaWxpdGllcyB0byByZWFkIGlu
Zm9ybWF0aW9uIGZyb20gWGVuLgoKSG93ZXZlciwgaWYgYW4gYXR0YWNrZXIgY2FuIGdhaW4gY29u
dHJvbCBvZiBhIGRldmljZSBtb2RlbCBydW5uaW5nIGluIGRvbWFpbiAwIHdpdGhvdXQgZGVwcml2
aWxlZ2luZywgdGhlIGF0dGFja2VyIGNhbiBnYWluIGNvbnRyb2wgb2YgdGhlIGVudGlyZSBzeXN0
ZW0uICBFdmVuIHdpdGggcWVtdSBkZXByaXZpbGVnaW5nLCB0aGUgcWVtdSBwcm9jZXNzIG1heSBi
ZSBhYmxlIHRvIGV4ZWN1dGUgc3BlY3VsYXRpdmUgZXhlY3V0aW9uIGF0dGFja3MgYWdhaW5zdCB0
aGUgaHlwZXJ2aXNvci4KClNvIGFsdGhvdWdoIFhTQS0yNTQgZG9lcyBhZmZlY3QgZGV2aWNlIG1v
ZGVsIHN0dWIgZG9tYWlucywgdGhleSBhcmUgc3RpbGwgc2FmZXIgdGhhbiBub3QgcnVubmluZyB3
aXRoIGEgc3R1YiBkb21haW4uCgo9IFdoYXQgaXMgdGhlIFhlbiBQcm9qZWN04oCZcyBwbGFuIGdv
aW5nIGZvcndhcmQ/ID0KClRoZSBYZW4gUHJvamVjdCBpcyB3b3JraW5nIG9uIGZpbmFsaXppbmcg
c29sdXRpb25zIGZvciBTUDMgYW5kIFNQMiBhbmQgZXZhbHVhdGluZyBvcHRpb25zIGZvciBTUDEu
IElmIHlvdSB3b3VsZCBsaWtlIHRvIHN0YXkgYWJyZWFzdCBvbiBvdXIgcHJvZ3Jlc3MsIHBsZWFz
ZSBzaWduIHVwIHRvIHhlbi1hbm5vdW5jZUAuIFdlIHdpbGwgdXBkYXRlIHRoaXMgRkFRIGFzIHNv
b24gYXMgd2UgaGF2ZSBtb3JlIG5ld3MgYW5kIHVwZGF0ZWQgaW5mb3JtYXRpb24uIEFuc3dlcnMg
dG8gbW9yZSBkZXRhaWxlZCB0ZWNobmljYWwgcXVlc3Rpb25zIHdpbGwgYmUgbWFpbnRhaW5lZCBp
biBhIHRlY2huaWNhbCBGQVEgb24gb3VyIHdpa2kgWzNdLiBUaGFuayB5b3UgZm9yIHlvdXIgcGF0
aWVuY2UuCgo9IEhvdyBjYW4gSSBhc2sgZnVydGhlciBxdWVzdGlvbnM/ID0KUGxlYXNlIHJlc3Bv
bmQgdG8gdGhpcyBlLW1haWwgdGhyZWFkIG9uIHhlbi1kZXZlbEAgb3IgeGVuLXVzZXJzQAoKUmVm
ZXJlbmNlcwpbMV0gaHR0cDovL3hlbmJpdHMueGVuLm9yZy94c2EvYWR2aXNvcnktMjU0Lmh0bWwK
WzJdIGh0dHBzOi8vZGV2ZWxvcGVyLmFybS5jb20vc3VwcG9ydC9zZWN1cml0eS11cGRhdGUKWzNd
IGh0dHBzOi8vd2lraS54ZW5wcm9qZWN0Lm9yZy93aWtpL1hlbl9Qcm9qZWN0X01lbHRkb3duX2Fu
ZF9TcGVjdHJlX1RlY2huaWNhbF9GQVEKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVu
cHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZv
L3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Fri Jan 05 11:53:53 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 11:53:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXQYT-00079g-86; Fri, 05 Jan 2018 11:52:57 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=hbya=ea=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1eXQYS-00079U-2F
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 11:52:56 +0000
X-Inumbo-ID: cbbc4897-f20e-11e7-b4a6-bc764e045a96
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id cbbc4897-f20e-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 12:51:42 +0100 (CET)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id B08C8ACFC;
 Fri,  5 Jan 2018 11:52:51 +0000 (UTC)
To: Lars Kurth <lars.kurth.xen@gmail.com>,
 xen-devel <xen-devel@lists.xenproject.org>, xen-users@lists.xenproject.org
References: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
From: Juergen Gross <jgross@suse.com>
Message-ID: <cacf75a7-8f10-a633-25b5-eb8990353b0c@suse.com>
Date: Fri, 5 Jan 2018 12:52:50 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
Content-Language: de-DE
Cc: George Dunlap <george.dunlap@citrix.com>
Subject: Re: [Xen-users] [Xen-devel] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Fri Jan 05 12:12:55 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 12:12:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXQqr-0000Zr-Np; Fri, 05 Jan 2018 12:11:57 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=ebnm=ea=citrix.com=prvs=536edc3c6=george.dunlap@srs-us1.protection.inumbo.net>)
 id 1eXQqq-0000ZV-BY
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 12:11:56 +0000
X-Inumbo-ID: 73cedac1-f211-11e7-b4a6-bc764e045a96
Received: from SMTP02.CITRIX.COM (unknown [66.165.176.63])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 73cedac1-f211-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 13:10:43 +0100 (CET)
X-IronPort-AV: E=Sophos;i="5.46,318,1511827200"; d="scan'208";a="464789423"
To: Lars Kurth <lars.kurth.xen@gmail.com>, xen-devel
 <xen-devel@lists.xenproject.org>, <xen-users@lists.xenproject.org>
References: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
From: George Dunlap <george.dunlap@citrix.com>
Message-ID: <07f2e716-85de-a4b7-b337-c1714052481e@citrix.com>
Date: Fri, 5 Jan 2018 12:11:52 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
Content-Language: en-US
Subject: Re: [Xen-users] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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==

From xen-users-bounces@lists.xenproject.org Fri Jan 05 14:41:52 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 14:41:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXTAx-0004jq-EH; Fri, 05 Jan 2018 14:40:51 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=w6rp=ea=linaro.org=julien.grall@srs-us1.protection.inumbo.net>)
 id 1eXTAw-0004jK-7R
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 14:40:50 +0000
X-Inumbo-ID: 40b2d9f3-f226-11e7-b4a6-bc764e045a96
Received: from mail-qk0-x22e.google.com (unknown [2607:f8b0:400d:c09::22e])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 40b2d9f3-f226-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 15:39:36 +0100 (CET)
Received: by mail-qk0-x22e.google.com with SMTP id l12so5789585qke.13
 for <xen-users@lists.xenproject.org>; Fri, 05 Jan 2018 06:40:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=lR8Zt5T6hIRlHWMRc5QHfDZ5Vx+++7yegVeyqj27sb8=;
 b=HuBgSCnoXsaU/VeuVxoldX5pp7F2dG9zGOIo9WGfTutjCOZ9PF5CFwEQcslXVG+HL6
 ozHhCtREQoVqHdiYXpPxM0NMAfp/JoRX3ayGOUdQ3xPRtZsYAXCe/dbKDN84+2bEuvnb
 ubkeg6dIJdxrUdrNizX7wBqLOpz2w1m6KvVsQ=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=lR8Zt5T6hIRlHWMRc5QHfDZ5Vx+++7yegVeyqj27sb8=;
 b=DVsc98tZccd8kE4RMwts8cAixxrHGIOWpArfTb5z0xBu/ADkeZOhIUuDclE5oKGnZN
 S32Xbib1AplQfeuvE5s4Jlxq/ehRv55rR7iRtlwHNgd5VwSc4HS2NZIHKpZ6NxXANn9E
 RmJQJ39vTTv/UFTpT8b9UR6HdFIzb20+Ytwxo+FcvhV5g1GvYZDhvhB8cPoFkC1wzwwz
 PYyUx7TnQ4QxBsSCcHkEJt7x9iMLmpHmt04XJAShqV6x+sXl0JRkttxwLnSMdZKoev8z
 XC57sc2CXn+1YOsrGfGFOpY+nps6T92X4A18uaX8g61X4M0YFaYyUnqb8Ee+TKNOoDcv
 GUYA==
X-Gm-Message-State: AKwxytehrYuYYxqj3sCjs7nlRYI9yRcWQYW9g8SaDgTMB7b7X9rXYJoH
 ECQrvQMzzmsm4T8rRK6sPnfkFQJx88gEUtgXTyQerA==
X-Google-Smtp-Source: ACJfBouu6coYOKOhBtZF5c5sRr1WF6QSDTIpQEI2j9nQsNwQZ6h5hiX0AppLSdv4u/jZF1rOyUU5p/FrLey4N+5nnS0=
X-Received: by 10.55.56.80 with SMTP id f77mr4705572qka.110.1515163247606;
 Fri, 05 Jan 2018 06:40:47 -0800 (PST)
MIME-Version: 1.0
Received: by 10.200.53.60 with HTTP; Fri, 5 Jan 2018 06:40:47 -0800 (PST)
Received: by 10.200.53.60 with HTTP; Fri, 5 Jan 2018 06:40:47 -0800 (PST)
In-Reply-To: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
References: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
From: Julien Grall <julien.grall@linaro.org>
Date: Fri, 5 Jan 2018 14:40:47 +0000
Message-ID: <CAEC2CxqA9DagoV=qibqW=ucuhPymRcRH61kb9r5M0PiG+1dmuA@mail.gmail.com>
To: Lars Kurth <lars.kurth.xen@gmail.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>,
 George Dunlap <george.dunlap@citrix.com>, xen-users@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7162608369654658109=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============7162608369654658109==
Content-Type: multipart/alternative; boundary="001a11465d902693910562086f3b"

--001a11465d902693910562086f3b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

(apologies for the formatting)

Hi Lars,

Thank you for putting together an FAQ.

Few comments below around Arm.


On 5 Jan 2018 13:37, "Lars Kurth" <lars.kurth.xen@gmail.com> wrote:

Hi all, this is a repost of https://blog.xenproject.org/
2018/01/04/xen-project-spectremeltdown-faq/ for xen-users/xen-devel. If you
have questions, please reply to this thread and we will try and improve the
FAQ based on questions.
Regards
Lars


Google=E2=80=99s Project Zero announced several information leak vulnerabil=
ities
affecting all modern superscalar processors. Details can be found on their
blog, and in the Xen Project Advisory 254 [1]. To help our users understand
the impact and our next steps forward, we put together the following FAQ.

Note that we will update the FAQ as new information surfaces.

=3D Is Xen impacted by Meltdown and Spectre? =3D

There are two angles to consider for this question:

* Can an untrusted guest attack the hypervisor using Meltdown or Spectre?
* Can a guest user-space program attack a guest kernel using Meltdown or
Spectre?

Systems running Xen, like all operating systems and hypervisors, are
potentially affected by Spectre (referred to as SP1 and SP2 in Advisory 254
[1]). For Arm Processors information, you can find which processors are
impacted here [2].  In general, both the hypervisor and a guest kernel are
vulnerable to attack via SP1 and SP2.


The website list processors designed by Arm (i.e Cortex family). It does
not include processors made by Arm licensees. I will leave the various
licensees speak for themselves here.

Regarding Arm-designed processors, most of them are not vulnerable to any
variant. Those affected will mostly be vulnerable to attack via SP1 and SP2=
.

But this does not rule out attack via SP3 on Arm. From the website, one
Cortex processor is affected.

While this will not affect Xen (the hypervisor is using a different set  of
page-tables). Guest kernel will be vulnerable to it.


Only Intel processors are impacted by Meltdown (referred to as SP3 in
Advisory 254 [1]). On Intel processors, only 64-bit PV mode guests can
attack Xen. Guests running in 32-bit PV mode, HVM mode, and PVH mode cannot
attack the hypervisor using SP3. However, in 32-bit PV mode, HVM mode, and
PVH mode, guest userspaces can attack guest kernels using SP3; so updating
guest kernels is advisable.


Interestingly, guest kernels running in 64-bit PV mode are not vulnerable
to attack using SP3, because 64-bit PV guests already run in a KPTI-like
mode.

=3D Is there any risk of privilege escalation? =3D

Meltdown and Spectre are, by themselves, only information leaks. There is
no suggestion that speculative execution can be used to modify memory or
cause a system to do anything it might not have done already.

=3D Where can I find more information? =3D

We will update this blog post and Advisory 254 [1] as new information
becomes available. Updates will also be published on xen-announce@.

We will also maintain a technical FAQ on our wiki [3] for answers to more
detailed technical questions that emerge on xen-devel@ and other
communication channels.

=3D Are there any patches for the vulnerability? =3D

We have prototype patches for a mitigation for Meltdown on Intel CPUs and a
Mitigation for SP2/CVE-2017-5715, which are functional but have not
undergone rigorous review and have not been backported to all supported Xen
Project releases.

As information related to Meltdown and Spectre is now public, development
will continue in public on xen-devel@ and patches will be posted and
attached to Advisory 254 [1] as they become available in the next few days.

=3D Can SP1/SP2 be fixed at all? What plans are there to mitigate them? =3D

SP2 can be mitigated in two ways, both of which essentially prevent
speculative execution of indirect branches. The first is to flush the
branch prediction logic on entry into the hypervisor. This requires
microcode updates, which Intel and AMD are in the process of preparing, as
well as patches to the hypervisor which are also in process and should be
available soon.

The second is to do indirect jumps in a way which is not subject to
speculative execution. This requires the hypervisor to be recompiled with a
compiler that contains special new features. These new compiler features
are also in the process of being prepared for both gcc and clang, and
should be available soon.

SP1 is much more difficult to mitigate. We have some ideas we=E2=80=99re ex=
ploring,
but they=E2=80=99re still at the design stage at this point.

=3D Does Xen have any equivalent to Linux=E2=80=99s KPTI series? =3D

Linux=E2=80=99s KPTI series is designed to address SP3 only.  For Xen guest=
s, only
64-bit PV guests are affected by SP3. A KPTI-like approach was explored
initially, but required significant ABI changes.  Instead we=E2=80=99ve dec=
ided to
go with an alternate approach, which is less disruptive and less complex to
implement. The chosen approach runs PV guests in a PVH container, which
ensures that PV guests continue to behave as before, while providing the
isolation that protects the hypervisor from SP3. This works well for Xen
4.8 to Xen 4.10, which is currently our priority.

For Xen 4.6 and 4.7, we are evaluating several options, but we have not yet
finalized the best solution.

=3D Devicemodel stub domains run in PV mode, so is it still more safe to ru=
n
device models in a stub domain than in domain 0? =3D

The short answer is, yes, it is still safer to run stub domains than
otherwise.

If an attacker can gain control of the device model running in a stub
domain, it can indeed attempt to use these processor vulnerabilities to
read information from Xen.

However, if an attacker can gain control of a device model running in
domain 0 without deprivileging, the attacker can gain control of the entire
system.  Even with qemu deprivileging, the qemu process may be able to
execute speculative execution attacks against the hypervisor.

So although XSA-254 does affect device model stub domains, they are still
safer than not running with a stub domain.

=3D What is the Xen Project=E2=80=99s plan going forward? =3D

The Xen Project is working on finalizing solutions for SP3 and SP2 and
evaluating options for SP1. If you would like to stay abreast on our
progress, please sign up to xen-announce@. We will update this FAQ as soon
as we have more news and updated information. Answers to more detailed
technical questions will be maintained in a technical FAQ on our wiki [3].
Thank you for your patience.

=3D How can I ask further questions? =3D
Please respond to this e-mail thread on xen-devel@ or xen-users@

References
[1] http://xenbits.xen.org/xsa/advisory-254.html
[2] https://developer.arm.com/support/security-update
[3] https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_
Spectre_Technical_FAQ
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

--001a11465d902693910562086f3b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div dir=3D"auto">(apologies for the formatting)</div><di=
v dir=3D"auto"><br></div><div>Hi Lars,</div><div dir=3D"auto"><div dir=3D"a=
uto"><br></div><div dir=3D"auto">Thank you for putting together an FAQ.</di=
v><div dir=3D"auto"><br></div><div dir=3D"auto">Few comments below around A=
rm.</div><br><div class=3D"gmail_extra" dir=3D"auto"><br><div class=3D"gmai=
l_quote">On 5 Jan 2018 13:37, &quot;Lars Kurth&quot; &lt;<a href=3D"mailto:=
lars.kurth.xen@gmail.com">lars.kurth.xen@gmail.com</a>&gt; wrote:<br type=
=3D"attribution"><blockquote class=3D"quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">Hi all, this is a repost of <a hr=
ef=3D"https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown-fa=
q/" rel=3D"noreferrer" target=3D"_blank">https://blog.xenproject.org/<wbr>2=
018/01/04/xen-project-<wbr>spectremeltdown-faq/</a> for xen-users/xen-devel=
. If you have questions, please reply to this thread and we will try and im=
prove the FAQ based on questions.<br>
Regards<br>
Lars<br>
<br>
<br>
Google=E2=80=99s Project Zero announced several information leak vulnerabil=
ities affecting all modern superscalar processors. Details can be found on =
their blog, and in the Xen Project Advisory 254 [1]. To help our users unde=
rstand the impact and our next steps forward, we put together the following=
 FAQ.<br>
<br>
Note that we will update the FAQ as new information surfaces.<br>
<br>
=3D Is Xen impacted by Meltdown and Spectre? =3D<br>
<br>
There are two angles to consider for this question:<br>
<br>
* Can an untrusted guest attack the hypervisor using Meltdown or Spectre?<b=
r>
* Can a guest user-space program attack a guest kernel using Meltdown or Sp=
ectre?<br>
<br>
Systems running Xen, like all operating systems and hypervisors, are potent=
ially affected by Spectre (referred to as SP1 and SP2 in Advisory 254 [1]).=
 For Arm Processors information, you can find which processors are impacted=
 here [2].=C2=A0 In general, both the hypervisor and a guest kernel are vul=
nerable to attack via SP1 and SP2.</blockquote></div></div></div><div dir=
=3D"auto"><br></div><div dir=3D"auto"></div><div dir=3D"auto">The website l=
ist processors designed by Arm (i.e Cortex family). It does not include pro=
cessors made by Arm licensees. I will leave the various licensees speak for=
 themselves here.</div><div dir=3D"auto"><br></div><div dir=3D"auto">Regard=
ing Arm-designed processors, most of them are not vulnerable to any variant=
. Those affected will mostly be vulnerable to attack via SP1 and SP2.</div>=
<div dir=3D"auto"><br></div><div dir=3D"auto">But this does not rule out at=
tack via SP3 on Arm. From the website, one Cortex processor is affected.</d=
iv><div dir=3D"auto"><br></div><div dir=3D"auto">While this will not affect=
 Xen (the hypervisor is using a different set=C2=A0 of page-tables). Guest =
kernel will be vulnerable to it.</div><div dir=3D"auto"><br></div><div dir=
=3D"auto"><div class=3D"gmail_extra"><div class=3D"gmail_quote"><blockquote=
 class=3D"quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<br>
Only Intel processors are impacted by Meltdown (referred to as SP3 in Advis=
ory 254 [1]). On Intel processors, only 64-bit PV mode guests can attack Xe=
n. Guests running in 32-bit PV mode, HVM mode, and PVH mode cannot attack t=
he hypervisor using SP3. However, in 32-bit PV mode, HVM mode, and PVH mode=
, guest userspaces can attack guest kernels using SP3; so updating guest ke=
rnels is advisable.</blockquote></div></div></div><div dir=3D"auto"><div cl=
ass=3D"gmail_extra"><div class=3D"gmail_quote"><blockquote class=3D"quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
Interestingly, guest kernels running in 64-bit PV mode are not vulnerable t=
o attack using SP3, because 64-bit PV guests already run in a KPTI-like mod=
e.<br>
<br>
=3D Is there any risk of privilege escalation? =3D<br>
<br>
Meltdown and Spectre are, by themselves, only information leaks. There is n=
o suggestion that speculative execution can be used to modify memory or cau=
se a system to do anything it might not have done already.<br>
<br>
=3D Where can I find more information? =3D<br>
<br>
We will update this blog post and Advisory 254 [1] as new information becom=
es available. Updates will also be published on xen-announce@.<br>
<br>
We will also maintain a technical FAQ on our wiki [3] for answers to more d=
etailed technical questions that emerge on xen-devel@ and other communicati=
on channels.<br>
<br>
=3D Are there any patches for the vulnerability? =3D<br>
<br>
We have prototype patches for a mitigation for Meltdown on Intel CPUs and a=
 Mitigation for SP2/CVE-2017-5715, which are functional but have not underg=
one rigorous review and have not been backported to all supported Xen Proje=
ct releases.<br>
<br>
As information related to Meltdown and Spectre is now public, development w=
ill continue in public on xen-devel@ and patches will be posted and attache=
d to Advisory 254 [1] as they become available in the next few days.<br>
<br>
=3D Can SP1/SP2 be fixed at all? What plans are there to mitigate them? =3D=
<br>
<br>
SP2 can be mitigated in two ways, both of which essentially prevent specula=
tive execution of indirect branches. The first is to flush the branch predi=
ction logic on entry into the hypervisor. This requires microcode updates, =
which Intel and AMD are in the process of preparing, as well as patches to =
the hypervisor which are also in process and should be available soon.<br>
<br>
The second is to do indirect jumps in a way which is not subject to specula=
tive execution. This requires the hypervisor to be recompiled with a compil=
er that contains special new features. These new compiler features are also=
 in the process of being prepared for both gcc and clang, and should be ava=
ilable soon.<br>
<br>
SP1 is much more difficult to mitigate. We have some ideas we=E2=80=99re ex=
ploring, but they=E2=80=99re still at the design stage at this point.<br>
<br>
=3D Does Xen have any equivalent to Linux=E2=80=99s KPTI series? =3D<br>
<br>
Linux=E2=80=99s KPTI series is designed to address SP3 only.=C2=A0 For Xen =
guests, only 64-bit PV guests are affected by SP3. A KPTI-like approach was=
 explored initially, but required significant ABI changes.=C2=A0 Instead we=
=E2=80=99ve decided to go with an alternate approach, which is less disrupt=
ive and less complex to implement. The chosen approach runs PV guests in a =
PVH container, which ensures that PV guests continue to behave as before, w=
hile providing the isolation that protects the hypervisor from SP3. This wo=
rks well for Xen 4.8 to Xen 4.10, which is currently our priority.<br>
<br>
For Xen 4.6 and 4.7, we are evaluating several options, but we have not yet=
 finalized the best solution.<br>
<br>
=3D Devicemodel stub domains run in PV mode, so is it still more safe to ru=
n device models in a stub domain than in domain 0? =3D<br>
<br>
The short answer is, yes, it is still safer to run stub domains than otherw=
ise.<br>
<br>
If an attacker can gain control of the device model running in a stub domai=
n, it can indeed attempt to use these processor vulnerabilities to read inf=
ormation from Xen.<br>
<br>
However, if an attacker can gain control of a device model running in domai=
n 0 without deprivileging, the attacker can gain control of the entire syst=
em.=C2=A0 Even with qemu deprivileging, the qemu process may be able to exe=
cute speculative execution attacks against the hypervisor.<br>
<br>
So although XSA-254 does affect device model stub domains, they are still s=
afer than not running with a stub domain.<br>
<br>
=3D What is the Xen Project=E2=80=99s plan going forward? =3D<br>
<br>
The Xen Project is working on finalizing solutions for SP3 and SP2 and eval=
uating options for SP1. If you would like to stay abreast on our progress, =
please sign up to xen-announce@. We will update this FAQ as soon as we have=
 more news and updated information. Answers to more detailed technical ques=
tions will be maintained in a technical FAQ on our wiki [3]. Thank you for =
your patience.<br>
<br>
=3D How can I ask further questions? =3D<br>
Please respond to this e-mail thread on xen-devel@ or xen-users@<br>
<br>
References<br>
[1] <a href=3D"http://xenbits.xen.org/xsa/advisory-254.html" rel=3D"norefer=
rer" target=3D"_blank">http://xenbits.xen.org/xsa/<wbr>advisory-254.html</a=
><br>
[2] <a href=3D"https://developer.arm.com/support/security-update" rel=3D"no=
referrer" target=3D"_blank">https://developer.arm.com/<wbr>support/security=
-update</a><br>
[3] <a href=3D"https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_Sp=
ectre_Technical_FAQ" rel=3D"noreferrer" target=3D"_blank">https://wiki.xenp=
roject.org/<wbr>wiki/Xen_Project_Meltdown_and_<wbr>Spectre_Technical_FAQ</a=
><br>
______________________________<wbr>_________________<br>
Xen-devel mailing list<br>
<a href=3D"mailto:Xen-devel@lists.xenproject.org">Xen-devel@lists.xenprojec=
t.org</a><br>
<a href=3D"https://lists.xenproject.org/mailman/listinfo/xen-devel" rel=3D"=
noreferrer" target=3D"_blank">https://lists.xenproject.org/<wbr>mailman/lis=
tinfo/xen-devel</a></blockquote></div><br></div></div></div>

--001a11465d902693910562086f3b--


--===============7162608369654658109==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============7162608369654658109==--


From xen-users-bounces@lists.xenproject.org Fri Jan 05 14:54:41 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 14:54:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXTOB-00067z-KK; Fri, 05 Jan 2018 14:54:31 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=wlwn=ea=gmail.com=lars.kurth.xen@srs-us1.protection.inumbo.net>)
 id 1eXTOA-00067d-CL
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 14:54:30 +0000
X-Inumbo-ID: 29cfa83f-f228-11e7-b4a6-bc764e045a96
Received: from mail-wr0-x233.google.com (unknown [2a00:1450:400c:c0c::233])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 29cfa83f-f228-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 15:53:18 +0100 (CET)
Received: by mail-wr0-x233.google.com with SMTP id p17so4560914wre.7;
 Fri, 05 Jan 2018 06:54:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:message-id:mime-version:subject:date:in-reply-to:cc:to
 :references; bh=eQLDcPB5A5ByXitORp2/tCjl6bpbgrt5U+zEAiQrNTU=;
 b=Aj0rkS72E9KP64/qSBrogSyo534fgLyuuQDzbnwwmPemmA+ZsE0UTfB/macivt/tF1
 vp1sHtEkJrvLehQjv3cNj5eROVAUz8RA2coB89edPQIYmwb9uyUEt8tDGaBITqoB93jt
 rikK+L4dQxRI/V9X0+dEy4Gp8r2ZwjCyxMf5aHrXGlW0iVSAwpr+Xt/t/L3s7gtDGXIH
 N17oNTEU9U3r9Uuz+vy6QELZ0Z9dyShw8M/GyoyJpdeUprEGTHs1WMlU9wyxneG5x3bc
 jP9fUvosryAXqizDrU5thLdGwccnCAh36BhKxQcda05eFhYeuriv8ZTa6IQRG2KZyUeW
 bFwg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:message-id:mime-version:subject:date
 :in-reply-to:cc:to:references;
 bh=eQLDcPB5A5ByXitORp2/tCjl6bpbgrt5U+zEAiQrNTU=;
 b=SynnLGHKK0eXafxKMU4zujRKCpzV67Xl6iQRvNllHwoEJTG+lRnKbT4jsvhTQOMtqw
 mN8UZfdy2nH03kxq1Dj57krn6mGTKEJIQKPq46v2TB/Way0wwgMwRl3JmI6GNk02Kf8g
 oJX43Pdcf4IAPBdNEU5IMtAuACSMU8gNPEqckPi0db6ZAdulVGPD6foPDGvDdYSPX4cJ
 Ho/63dCfGwLYiPW7L3lxGUxF+Dm2yyZSnFw6sPVhr7tzIClmf6K6MCn6kFoPRHFykH57
 VD/0ydckdHx2ib+nDuTOhEmPnHlRncm91x3dNAynQjI0jFN5bDhpDkvj4C3JLH6TjwEV
 YVVQ==
X-Gm-Message-State: AKGB3mKZEozUAxntpLpz1uIn2kiRaHuKMEWlj/2XCGW1U3tx7OeVYcqM
 yqkIuhIA1LxtP9SsmYW+WyQ=
X-Google-Smtp-Source: ACJfBouMH1Mbys1dhpjkRPWISQk5HtTfHWwG7Qr7yxpPRsBJQenNoXd/5d6NfTUrVAkeZ+tvzsPOAg==
X-Received: by 10.223.173.147 with SMTP id w19mr3147711wrc.214.1515164068137; 
 Fri, 05 Jan 2018 06:54:28 -0800 (PST)
Received: from ?IPv6:2a02:c7f:ac18:da00:a1f3:5581:5387:c936?
 ([2a02:c7f:ac18:da00:a1f3:5581:5387:c936])
 by smtp.gmail.com with ESMTPSA id j10sm5905867wrb.49.2018.01.05.06.54.27
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Fri, 05 Jan 2018 06:54:27 -0800 (PST)
From: Lars Kurth <lars.kurth.xen@gmail.com>
Message-Id: <7586D6AD-2EE4-413D-81CD-A333D7336123@gmail.com>
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Fri, 5 Jan 2018 14:54:25 +0000
In-Reply-To: <CAEC2CxqA9DagoV=qibqW=ucuhPymRcRH61kb9r5M0PiG+1dmuA@mail.gmail.com>
To: Julien Grall <julien.grall@linaro.org>
References: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
 <CAEC2CxqA9DagoV=qibqW=ucuhPymRcRH61kb9r5M0PiG+1dmuA@mail.gmail.com>
X-Mailer: Apple Mail (2.3273)
Cc: xen-devel <xen-devel@lists.xenproject.org>,
 George Dunlap <george.dunlap@citrix.com>, xen-users@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2095164537223652427=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--===============2095164537223652427==
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_25C038CA-E557-40CF-BA9C-B0DBD1A4F612"


--Apple-Mail=_25C038CA-E557-40CF-BA9C-B0DBD1A4F612
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Julien,

> On 5 Jan 2018, at 14:40, Julien Grall <julien.grall@linaro.org> wrote:
>=20
> (apologies for the formatting)
>=20
> Hi Lars,
>=20
> Thank you for putting together an FAQ.
>=20
> Few comments below around Arm.
>=20
> Systems running Xen, like all operating systems and hypervisors, are =
potentially affected by Spectre (referred to as SP1 and SP2 in Advisory =
254 [1]). For Arm Processors information, you can find which processors =
are impacted here [2].  In general, both the hypervisor and a guest =
kernel are vulnerable to attack via SP1 and SP2.
>=20
> The website list processors designed by Arm (i.e Cortex family). It =
does not include processors made by Arm licensees. I will leave the =
various licensees speak for themselves here.
>=20
> Regarding Arm-designed processors, most of them are not vulnerable to =
any variant. Those affected will mostly be vulnerable to attack via SP1 =
and SP2.
>=20
> But this does not rule out attack via SP3 on Arm. =46rom the website, =
one Cortex processor is affected.
>=20
> While this will not affect Xen (the hypervisor is using a different =
set  of page-tables). Guest kernel will be vulnerable to it.

I would be quite happy to have a specific question covering ARM/ARM =
eco-system where you can explain all this. Feel free to formulate a =
question + answer and I will add it
Lars=

--Apple-Mail=_25C038CA-E557-40CF-BA9C-B0DBD1A4F612
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Julien,<div class=3D""><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On 5 Jan 2018, at 14:40, Julien =
Grall &lt;<a href=3D"mailto:julien.grall@linaro.org" =
class=3D"">julien.grall@linaro.org</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div dir=3D"auto" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><div dir=3D"auto" class=3D"">(apologies for the =
formatting)</div><div dir=3D"auto" class=3D""><br class=3D""></div><div =
class=3D"">Hi Lars,</div><div dir=3D"auto" class=3D""><div dir=3D"auto" =
class=3D""><br class=3D""></div><div dir=3D"auto" class=3D"">Thank you =
for putting together an FAQ.</div><div dir=3D"auto" class=3D""><br =
class=3D""></div><div dir=3D"auto" class=3D"">Few comments below around =
Arm.</div><div class=3D"gmail_extra" dir=3D"auto"><br class=3D""><div =
class=3D"gmail_quote"><blockquote class=3D"quote" style=3D"margin: 0px =
0px 0px 0.8ex; border-left-width: 1px; border-left-style: solid; =
border-left-color: rgb(204, 204, 204); padding-left: 1ex;">Systems =
running Xen, like all operating systems and hypervisors, are potentially =
affected by Spectre (referred to as SP1 and SP2 in Advisory 254 [1]). =
For Arm Processors information, you can find which processors are =
impacted here [2].&nbsp; In general, both the hypervisor and a guest =
kernel are vulnerable to attack via SP1 and =
SP2.</blockquote></div></div></div><div dir=3D"auto" class=3D""><br =
class=3D""></div><div dir=3D"auto" class=3D""></div><div dir=3D"auto" =
class=3D"">The website list processors designed by Arm (i.e Cortex =
family). It does not include processors made by Arm licensees. I will =
leave the various licensees speak for themselves here.</div><div =
dir=3D"auto" class=3D""><br class=3D""></div><div dir=3D"auto" =
class=3D"">Regarding Arm-designed processors, most of them are not =
vulnerable to any variant. Those affected will mostly be vulnerable to =
attack via SP1 and SP2.</div><div dir=3D"auto" class=3D""><br =
class=3D""></div><div dir=3D"auto" class=3D"">But this does not rule out =
attack via SP3 on Arm. =46rom the website, one Cortex processor is =
affected.</div><div dir=3D"auto" class=3D""><br class=3D""></div><div =
dir=3D"auto" class=3D"">While this will not affect Xen (the hypervisor =
is using a different set&nbsp; of page-tables). Guest kernel will be =
vulnerable to it.</div></div></div></blockquote></div><br =
class=3D""></div><div class=3D"">I would be quite happy to have a =
specific question covering ARM/ARM eco-system where you can explain all =
this. Feel free to formulate a question + answer and I will add =
it</div><div class=3D"">Lars</div></body></html>=

--Apple-Mail=_25C038CA-E557-40CF-BA9C-B0DBD1A4F612--


--===============2095164537223652427==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============2095164537223652427==--


From xen-users-bounces@lists.xenproject.org Fri Jan 05 15:56:32 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 15:56:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXULY-0002ou-0D; Fri, 05 Jan 2018 15:55:52 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=q/q/=ea=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eXULW-0002oY-1P
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 15:55:50 +0000
X-Inumbo-ID: 25542a34-f231-11e7-b0d7-9f685aff125f
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 25542a34-f231-11e7-b0d7-9f685aff125f;
 Fri, 05 Jan 2018 15:57:35 +0000 (UTC)
Received: from [IPv6:2001:828:13c8:10b::c] (blackbox.bofh.hq.mendix.net
 [IPv6:2001:828:13c8:10b::c])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id A94CAAD6B5F3;
 Fri,  5 Jan 2018 16:55:41 +0100 (CET)
To: Lars Kurth <lars.kurth.xen@gmail.com>,
 xen-devel <xen-devel@lists.xenproject.org>, xen-users@lists.xenproject.org
References: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <903ef3c9-f5c6-a7e8-f9c0-3961d627413a@knorrie.org>
Date: Fri, 5 Jan 2018 16:55:41 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
Content-Language: en_US
Cc: George Dunlap <george.dunlap@citrix.com>
Subject: Re: [Xen-users] [Xen-devel] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Fri Jan 05 17:35:07 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 17:35:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXVt5-0002GV-Ox; Fri, 05 Jan 2018 17:34:35 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=wlwn=ea=gmail.com=lars.kurth.xen@srs-us1.protection.inumbo.net>)
 id 1eXVt4-0002G8-ER
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 17:34:34 +0000
X-Inumbo-ID: 8611c422-f23e-11e7-b4a6-bc764e045a96
Received: from mail-wm0-x22f.google.com (unknown [2a00:1450:400c:c09::22f])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 8611c422-f23e-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 18:33:21 +0100 (CET)
Received: by mail-wm0-x22f.google.com with SMTP id a79so3778341wma.0;
 Fri, 05 Jan 2018 09:34:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:message-id:mime-version:subject:date:in-reply-to:cc:to
 :references; bh=kS30aUM9sC/24EvGuKuwtfRzSfxq8+jwon3lkXeGO6c=;
 b=OFF7tOS18TLqqxZJqzDuOHJ6jct71Kbnr4iYtektKZK1ImdvsXhFenqEQVg5KRoJFn
 h9epPbyvgE6nhvwp00tyOi5o/xv5NVHKBwWWrAf0nP0NyxL7tFwcEKaOPsmfSPlrQA/S
 pG1KkrBOxGAHcaue+LW653O0UKnSXgwVBxyIiNGT39t/HHZg1kORC0Qsd7iKpWWPh6QN
 lbdL9CcOre3XLOEHjHBmitESuxnqzVWfSD0Rj1JLuSpBWQ7oyR1wvt9sN9Xjd5t40iox
 L+w1BGhdpjq+0CE4dLrU9e7KYFlhkN8ZwJ3qcfWgCeivIYMxJAYbgy5ARWd2TtwajiE1
 mj6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:message-id:mime-version:subject:date
 :in-reply-to:cc:to:references;
 bh=kS30aUM9sC/24EvGuKuwtfRzSfxq8+jwon3lkXeGO6c=;
 b=Co6oJpSTq6jzly8gk1T6WAkH6oRIXAptNb0NuU3cXNXepsnmU6Bk0zPDSe5q8sOoSa
 m5kenG0L7yve9SiS6GB1oN8ZgIZH+GwJMP7R0NBMIdj5oVWNKT3yn9pVQ4Xnoj4H/T0o
 ut0VW4YKD+c2vdVszDm58KmQTjRWsJOnSt2bNIJt0mNFTQC17Uo9vqcLr0o+qJXUtddC
 1a3eXiDhjcnXO4ErGoKoXCVHUT/j9E/tSQiO9da7IS8WI0vQ3W9H2qfgvwRt5Twq1tvw
 Nqgv91HSgaNzfw7Xhs+ytrxnerO8yG6ajGXFdTm3Bpp9K687G0qKPf7rtzI9zJajHju2
 CISQ==
X-Gm-Message-State: AKGB3mLuFgMbWuDMeApl0syEx+mjmXFjReVgVbm3fWKcbJ7tqeg8nJRu
 kOWBy7VFv32BKGbij9EHPkA=
X-Google-Smtp-Source: ACJfBotfT7RouGJtXSszZhaNTbrAJx0yAaD5fixJ09321m1lteIolQXX22ipS/fiVSLLzo8Vrxb+RA==
X-Received: by 10.28.125.210 with SMTP id y201mr3147610wmc.13.1515173671997;
 Fri, 05 Jan 2018 09:34:31 -0800 (PST)
Received: from ?IPv6:2a02:c7f:ac18:da00:a1f3:5581:5387:c936?
 ([2a02:c7f:ac18:da00:a1f3:5581:5387:c936])
 by smtp.gmail.com with ESMTPSA id y137sm7610408wme.0.2018.01.05.09.34.30
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Fri, 05 Jan 2018 09:34:30 -0800 (PST)
From: Lars Kurth <lars.kurth.xen@gmail.com>
Message-Id: <DB497EF9-BEC0-4BA5-BF62-AAE396DD4F11@gmail.com>
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Fri, 5 Jan 2018 17:34:29 +0000
In-Reply-To: <903ef3c9-f5c6-a7e8-f9c0-3961d627413a@knorrie.org>
To: Hans van Kranenburg <hans@knorrie.org>
References: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
 <903ef3c9-f5c6-a7e8-f9c0-3961d627413a@knorrie.org>
X-Mailer: Apple Mail (2.3273)
Cc: xen-devel <xen-devel@lists.xenproject.org>,
 George Dunlap <george.dunlap@citrix.com>, xen-users@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6970828024109167572=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--===============6970828024109167572==
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_616619D5-E831-4A6B-BAED-A169E234DF1D"


--Apple-Mail=_616619D5-E831-4A6B-BAED-A169E234DF1D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On 5 Jan 2018, at 15:55, Hans van Kranenburg <hans@knorrie.org> wrote:
>=20
> On 01/05/2018 12:35 PM, Lars Kurth wrote:
>> Hi all, this is a repost of
>> =
https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown-faq/ =
<https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown-faq/>
>> for xen-users/xen-devel. If you have questions, please reply to this
>> thread and we will try and improve the FAQ based on questions.=20
>> Regards Lars
>=20
> Thanks for the writeup.
>=20
> The main reason for the reader to get confused is the amount of
> different combinations of situations that are possible, which all =
again
> have their own set of vulnerabilities and also their own (maybe even
> different) set of possibilities to be used as environment for =
executing
> an attack.
>=20
> So let's help them by being more explicit.

That sounds reasonable

>> On Intel processors, only 64-bit PV mode guests can attack Xen.
>=20
> "On Intel processors an attack at Xen using SP3 can only be done by
> 64-bit PV mode guests."
>=20
> Even if it looks super-redundant, I think keeping explicit information
> in every sentence is preferable, so they cannot be misinterpreted or
> accidentally be taken out of context.

Alright: I think I prefer "On Intel processors, only 64-bit PV mode =
guests can attack Xen using SP3."

>=20
>> Guests running in 32-bit PV mode, HVM mode, and PVH
>> mode cannot attack the hypervisor using SP3. However, in 32-bit PV
>> mode, HVM mode, and PVH mode, guest userspaces can attack guest
>> kernels using SP3; so updating guest kernels is advisable.
>=20
>> Interestingly, guest kernels running in 64-bit PV mode are not
>> vulnerable to attack using SP3, because 64-bit PV guests already run
>> in a KPTI-like mode.
>=20
> Like Juergen already mentioned, additionally: "However, keep in mind
> that a succesful attack on the hypervisor can still be used to recover
> information about the same guest from physical memory."

Good suggestion.

>>=20
>> =3D Does Xen have any equivalent to Linux=E2=80=99s KPTI series? =3D
>>=20
>> Linux=E2=80=99s KPTI series is designed to address SP3 only.
>=20
> This one...
>=20
>> For Xen guests, only 64-bit PV guests are affected by SP3.
>=20
> ...should be more explicit. The words "affected" and "impacted" do not
> tell the reader if it's about being an attacker, or about being the
> victim and what is attacked or attacking.
>=20
> "For Xen guests, only 64-bit PV guests are able to execute a SP3 =
attack
> against the hypervisor."

Sounds fine

I will update the blog post sometimes tomorrow or Monday. There were a =
few further comments, which may be worth rolling into a change

Lars


--Apple-Mail=_616619D5-E831-4A6B-BAED-A169E234DF1D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><br class=3D""><div><blockquote type=3D"cite" class=3D""><div =
class=3D"">On 5 Jan 2018, at 15:55, Hans van Kranenburg &lt;<a =
href=3D"mailto:hans@knorrie.org" class=3D"">hans@knorrie.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">On 01/05/2018 12:35 =
PM, Lars Kurth wrote:</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Hi all, this is a repost =
of<br class=3D""><a =
href=3D"https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown=
-faq/" =
class=3D"">https://blog.xenproject.org/2018/01/04/xen-project-spectremeltd=
own-faq/</a><br class=3D"">for xen-users/xen-devel. If you have =
questions, please reply to this<br class=3D"">thread and we will try and =
improve the FAQ based on questions.<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">Regards =
Lars<br class=3D""></blockquote><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">Thanks for the =
writeup.</span><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">The main reason for =
the reader to get confused is the amount of</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">different combinations of situations that are =
possible, which all again</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">have their own set =
of vulnerabilities and also their own (maybe even</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">different) set of possibilities to be used as =
environment for executing</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">an =
attack.</span><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">So let's help them =
by being more explicit.</span><br class=3D""></div></blockquote><div><br =
class=3D""></div>That sounds reasonable</div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><blockquote type=3D"cite" style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">On Intel processors, only =
64-bit PV mode guests can attack Xen.<br class=3D""></blockquote><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">"On Intel processors an attack at Xen using SP3 =
can only be done by</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">64-bit PV mode =
guests."</span></div></blockquote><blockquote type=3D"cite" =
class=3D""><div class=3D""><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">Even if it looks =
super-redundant, I think keeping explicit information</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">in every sentence is preferable, so they cannot =
be misinterpreted or</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">accidentally be =
taken out of context.</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""></div></blockquote><div><br class=3D""></div>Alright: I think =
I prefer "On Intel processors, only 64-bit PV mode guests can attack Xen =
using SP3."</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Guests running in 32-bit PV =
mode, HVM mode, and PVH<br class=3D"">mode cannot attack the hypervisor =
using SP3. However, in 32-bit PV<br class=3D"">mode, HVM mode, and PVH =
mode, guest userspaces can attack guest<br class=3D"">kernels using SP3; =
so updating guest kernels is advisable.<br class=3D""></blockquote><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Interestingly, guest kernels =
running in 64-bit PV mode are not<br class=3D"">vulnerable to attack =
using SP3, because 64-bit PV guests already run<br class=3D"">in a =
KPTI-like mode.<br class=3D""></blockquote><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">Like Juergen =
already mentioned, additionally: "However, keep in mind</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">that a succesful attack on the hypervisor can =
still be used to recover</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">information about =
the same guest from physical memory."</span><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""></div></blockquote><div><br class=3D""></div>Good =
suggestion.</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><blockquote type=3D"cite" style=3D"font-family:=
 Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D""><br class=3D"">=3D Does Xen =
have any equivalent to Linux=E2=80=99s KPTI series? =3D<br class=3D""><br =
class=3D"">Linux=E2=80=99s KPTI series is designed to address SP3 =
only.<br class=3D""></blockquote><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">This =
one...</span><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">For Xen guests, only 64-bit =
PV guests are affected by SP3.<br class=3D""></blockquote><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">...should be more explicit. The words "affected" =
and "impacted" do not</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">tell the reader if =
it's about being an attacker, or about being the</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">victim and what is attacked or =
attacking.</span><br style=3D"font-family: Menlo-Regular; font-size: =
11px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">"For Xen guests, =
only 64-bit PV guests are able to execute a SP3 attack</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">against the hypervisor."</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""></div></blockquote><div><br class=3D""></div>Sounds =
fine</div><div><br class=3D""></div><div>I will update the blog post =
sometimes tomorrow or Monday. There were a few further comments, which =
may be worth rolling into a change</div><div><br =
class=3D""></div><div>Lars</div><div><br class=3D""></div></body></html>=

--Apple-Mail=_616619D5-E831-4A6B-BAED-A169E234DF1D--


--===============6970828024109167572==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============6970828024109167572==--


From xen-users-bounces@lists.xenproject.org Fri Jan 05 18:20:54 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 18:20:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXWbU-00066h-Rk; Fri, 05 Jan 2018 18:20:28 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=kpnz=ea=nup.de=pn@srs-us1.protection.inumbo.net>)
 id 1eXWbT-00066b-VG
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 18:20:28 +0000
X-Inumbo-ID: eeb45f3e-f244-11e7-b4a6-bc764e045a96
Received: from mo6-p00-ob.smtp.rzone.de (unknown [2a01:238:20a:202:5300::5])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id eeb45f3e-f244-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 19:19:14 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1515176424;
 s=domk; d=nup.de;
 h=Content-Type:Subject:Message-ID:To:Reply-To:From:Date:
 X-RZG-CLASS-ID:X-RZG-AUTH;
 bh=ty7oib06umOF1BUsTB36NSomILRvGTgTGeX/LqOlTYE=;
 b=exexR/Wtinj83s+lnazfjSVwOMldNx1JXeE6rvb+6cfhZjA2mofaV4Mb+IDmkU1EgQ
 1ZmQN+iYPYn9pn6lTH3b6YhKaYUbY/lsJbYlQkaLhL67kVBQSvlnSgP9ndYbLObMCtrQ
 kLhiSY9ArElno8fq+iBKuDcPDn1MgflJ1zANs=
X-RZG-AUTH: :PGIke1W4NfsJmKHc+tVd2Fh7cIAw1nQjgbNSocw/vahdZ0GFi3CPosk=
X-RZG-CLASS-ID: mo00
Received: from oxapp06-03.back.ox.d0m.de (com4.strato.de [81.169.145.237])
 by smtp-ox.front (RZmta 42.15 AUTH) with ESMTPSA id a088b7u05IKOmUZ
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (curve X9_62_prime256v1
 with 256 ECDH bits, eq. 3072 bits RSA))
 (Client did not present a certificate)
 for <xen-users@lists.xenproject.org>;
 Fri, 5 Jan 2018 19:20:24 +0100 (CET)
Date: Fri, 5 Jan 2018 19:20:24 +0100 (CET)
From: Patrick Noack <pn@nup.de>
To: xen-users@lists.xenproject.org
Message-ID: <724428374.591856.1515176424603@webmail.strato.com>
MIME-Version: 1.0
X-Priority: 3
Importance: Medium
X-Mailer: Open-Xchange Mailer v7.8.3-Rev41
X-Originating-Client: open-xchange-appsuite
Subject: [Xen-users] Hardening agains Meltdown and Spectre
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Patrick Noack <pn@nup.de>
Content-Type: multipart/mixed; boundary="===============1718799199796853907=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============1718799199796853907==
Content-Type: multipart/alternative; 
	boundary="----=_Part_591855_722730549.1515176424602"

------=_Part_591855_722730549.1515176424602
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi all,

I am still unsure, if its enough to patch all virtual-machines running on a Xenserver to harden agains Meltdown and Spectre Attacks. Does the system stay vulnerable, if the Xenserver itself isn't running a patched kernel, when all the VMs are uptodate?

Thanks in advance, Patrick
------=_Part_591855_722730549.1515176424602
MIME-Version: 1.0
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

<!DOCTYPE html>
<html><head>
    <meta charset="UTF-8">
</head><body><p>Hi all,<br></p><p>I am still unsure, if its enough to patch all virtual-machines running on a Xenserver to harden agains Meltdown and Spectre Attacks. Does the system stay vulnerable, if the Xenserver itself isn&#39;t running a patched kernel, when all the VMs are uptodate?<br><br>Thanks in advance, Patrick</p></body></html>
 
------=_Part_591855_722730549.1515176424602--


--===============1718799199796853907==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============1718799199796853907==--


From xen-users-bounces@lists.xenproject.org Fri Jan 05 18:38:24 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 18:38:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXWsI-00078o-Ew; Fri, 05 Jan 2018 18:37:50 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=vo8y=ea=cardoe.com=cardoe@srs-us1.protection.inumbo.net>)
 id 1eXVhR-0001OK-4O
 for xen-users@lists.xen.org; Fri, 05 Jan 2018 17:22:33 +0000
X-Inumbo-ID: d79c5099-f23c-11e7-b4a6-bc764e045a96
Received: from mail-yb0-x230.google.com (unknown [2607:f8b0:4002:c09::230])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id d79c5099-f23c-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 18:21:19 +0100 (CET)
Received: by mail-yb0-x230.google.com with SMTP id f201so2113619ybg.6
 for <xen-users@lists.xen.org>; Fri, 05 Jan 2018 09:22:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cardoe.com; s=google;
 h=subject:to:cc:references:from:message-id:date:user-agent
 :mime-version:in-reply-to;
 bh=ZGI0GD8Wh0Tm7LP1T4pUa7Ph9k8JBuQGpnGaHv9b2BM=;
 b=Eb2fl5HlcIuAKHPWrDd66SIb5WF0X7g0Jx2hNrUXXfeC44tPLglRGGfnkmoRh0ipmw
 bOL7r0RWCWxTSdvEFML/PMmuks7/KCd2WW5R898JfMIkm8t5TfOzeEMEZ7OiJ0bjrRub
 PTSVn6Tq+UER7XIs0y+9c0rxzZviOKRUKxYHE=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:subject:to:cc:references:from:message-id:date
 :user-agent:mime-version:in-reply-to;
 bh=ZGI0GD8Wh0Tm7LP1T4pUa7Ph9k8JBuQGpnGaHv9b2BM=;
 b=XUQ6Jec5G0NzC4Vo8Ok+McUv4vNNYSYupW4i+FoSyBuKcjUxyFUBl9dSQMYN2/IUoE
 ijezY2wDigxNis2yyDlEKwOJKhqQ8odGmgRl7PMW1x8JMxTAaTLIijB7UeKdnRpaITfQ
 3/mtC+Qt9Xxs5U3HiFKTNZihH8ADF/MqH18f6MO6cf2uVlyr2xEzjuOTEyeZHCGLyZsR
 ihljo7D6YnDcuGvAML76RS7T7u6JhrapH+2rrRzMG/aamT931fGhrY6gZ3f1o94c4bPL
 3QrmZPo+iWkcWv1byMeKr+mKbg8M/rq5E3jTk9W3fC36/BWrNOnI9S33A+aD1ZtFHRGa
 cC/A==
X-Gm-Message-State: AKGB3mJrcrmrdGTElFx1fn6fQpfwPNN+ROcMm6Db3LW1Z7x1CFVHcugn
 KzsTMdkjVSHoAKQV0iKVxz6tEA==
X-Google-Smtp-Source: ACJfBot8zeD3EseMiBNoHw+GodLv6YbOntJDtmAdvtQP/KLhqWndIhFTjE+NsmSEvd4JvNBVrYcQ5w==
X-Received: by 10.37.211.8 with SMTP id e8mr3530066ybf.23.1515172949989;
 Fri, 05 Jan 2018 09:22:29 -0800 (PST)
Received: from doug-macbook.localdomain
 (104-179-196-18.lightspeed.brhmal.sbcglobal.net. [104.179.196.18])
 by smtp.googlemail.com with ESMTPSA id v69sm2635500ywg.41.2018.01.05.09.22.29
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Fri, 05 Jan 2018 09:22:29 -0800 (PST)
To: "Xen.org security team" <security@xen.org>, xen-announce@lists.xen.org,
 xen-devel@lists.xen.org, xen-users@lists.xen.org,
 oss-security@lists.openwall.com
References: <E1eWrXs-0007D0-Bg@xenbits.xenproject.org>
From: Doug Goldstein <cardoe@cardoe.com>
Message-ID: <10684fe8-5aca-3ce0-c109-1c7cd1d952be@cardoe.com>
Date: Fri, 5 Jan 2018 11:22:25 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0)
 Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <E1eWrXs-0007D0-Bg@xenbits.xenproject.org>
X-Mailman-Approved-At: Fri, 05 Jan 2018 18:37:49 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: Re: [Xen-users] [Xen-devel] Xen Security Advisory 254 - Information
 leak via side effects of speculative execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7498875652371365921=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7498875652371365921==
Content-Type: multipart/signed; micalg=pgp-sha512;
 protocol="application/pgp-signature";
 boundary="8IQptyakRbnfMa8SSyuCeDWFRbyMuvG3R"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--8IQptyakRbnfMa8SSyuCeDWFRbyMuvG3R
Content-Type: multipart/mixed; boundary="43cm8qMKcf7xGHs54TlcvDEc9E1uMLr3o";
 protected-headers="v1"
From: Doug Goldstein <cardoe@cardoe.com>
To: "Xen.org security team" <security@xen.org>, xen-announce@lists.xen.org,
 xen-devel@lists.xen.org, xen-users@lists.xen.org,
 oss-security@lists.openwall.com
Cc: "Xen.org security team" <security-team-members@xen.org>
Message-ID: <10684fe8-5aca-3ce0-c109-1c7cd1d952be@cardoe.com>
Subject: Re: [Xen-devel] Xen Security Advisory 254 - Information leak via side
 effects of speculative execution
References: <E1eWrXs-0007D0-Bg@xenbits.xenproject.org>
In-Reply-To: <E1eWrXs-0007D0-Bg@xenbits.xenproject.org>

--43cm8qMKcf7xGHs54TlcvDEc9E1uMLr3o
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable

I'm just adding some comments below on some updates that might be
helpful to add to help clarify things for interested parties. These
comments are driven purely based on the questions that I've had to field
from others.

- Since this advisory talks about 3 CVEs and then breaks the issue into
3 items SP1, SP2 and SP3 it would be helpful to directly map them to
their CVEs.
- There has been some confusion around mitigation and resolution where
people misunderstand the terms and therefore there might be some value
in providing some updates to provide some more clarity.

>=20
> SP1, "Bounds-check bypass": Poison the branch predictor, such that
> operating system or hypervisor code is speculatively executed past
> boundary and security checks.  This would allow an attacker to, for
> instance, cause speculative code in the normal hypercall / emulation
> path to execute with wild array indexes.

please add CVE-2017-5753

>=20
> SP2, "Branch Target Injection": Poison the branch predictor.
> Well-abstracted code often involves calling function pointers via
> indirect branches; reading these function pointers may involve a
> (slow) memory access, so the CPU attempts to guess where indirect
> branches will lead.  Poisoning this enables an attacker to
> speculatively branch to any code that exists in the hypervisor.

please add CVE-2017-5715


>=20
> SP3, "Rogue Data Load": On some processors, certain pagetable
> permission checks only happen when the instruction is retired;
> effectively meaning that speculative execution is not subject to
> pagetable permission checks.  On such processors, an attacker can
> speculatively execute arbitrary code in userspace with, effectively,
> the highest privilege level.

please add CVE-2017-5754 and/or reference this is meltdown.

>=20
> MITIGATION
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>=20
> There is no mitigation for SP1 and SP2.
>=20
> SP3 can be mitigated by running guests in HVM or PVH mode.
>=20
> For guests with legacy PV kernels which cannot be run in HVM mode, we
> have developed a "shim" hypervisor that allows PV guests to run in PVH
> mode.  Unfortunately, due to the accelerated schedule, this is not yet
> ready to release.  We expect to have it ready for 4.10, as well as PVH
> backports to 4.9 and 4.8, available over the next few days.
>=20
> RESOLUTION
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>=20
> There is no available resolution for SP1 or SP3.

I believe there has been some confusion among some people about the
terms here. There are some people that understand "mitigation" as "what
can I do now to avoid this" and "resolution" as "what updates can I
apply". As a result they are misunderstanding here what the net result
is. Some clarifications could be that the PVH shim is the resolution for
the SP3 issue. However its not a fix for PV itself but instead changes
the very nature of how PV guests are started up.


--=20
Doug Goldstein


--43cm8qMKcf7xGHs54TlcvDEc9E1uMLr3o--

--8IQptyakRbnfMa8SSyuCeDWFRbyMuvG3R
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQKTBAEBCgB9FiEE9hYXBLEKE2oJfXLwyIzUxt8kNl0FAlpPtFFfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEY2
MTYxNzA0QjEwQTEzNkEwOTdENzJGMEM4OENENEM2REYyNDM2NUQACgkQyIzUxt8k
Nl3uIRAAgPDbI32pAZafdRYBbqYgytdFb26s5elMJIiP0GFbNxiA3YhbDU/BSxSH
58QTd3p+fjWBBKSnkWR3kwFuFdlQoPXaFXRh4aLthnuF2oSs3XV4S1vZt57QyZcV
f9OMpItxlrq/1W7XD8t5suY9ZZPll1RNYl3wGQUSa7SI8KxEcFmqUOfRlWw+bM0z
fZOsfilxhCGpMJUJipqcukKMk5Ok3EJQm1aonZAScLo5txDZD7kic4NF3xkC6dpY
HelCO2TDcXtFvLY0TMk2TWuqcz56ijbVPJG/4QkBf6iXpWFt8/Olw1deuUR0mX/A
aFtWbUHm7Uvgugq0Iu7LQOhVgNXGf8VrmHpijxtxDbd3E90VydZkg72aCvdrTxv6
xXHNblT+TIbswCNSxY13mnszgOtfOcd0+IUYVDf63abzn3x3IXWfsFHJRiuDlOm4
9W+UNvylh25FCdYsRDNRKsESq1eliX0gEeU2DSIRZfWeXJ99uQnFvPbPxTMfL8eJ
PtC2NZhQ25hEgNw2dn/tIqkvOkqYNM1zRytGZ9UaziyF5Mll49kQQY7pKeN7MD8W
j1JkFmmkz/smBB9fwXnjpFhnfotaZYRQVtI6/7QtB2z3AbaJC55+RVZZwr6U+DmP
CrgjjPet/hPdgDG969D6/nU4Kx5+M4h/2MBz07UpUvavbyiG6rE=
=oWc2
-----END PGP SIGNATURE-----

--8IQptyakRbnfMa8SSyuCeDWFRbyMuvG3R--


--===============7498875652371365921==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============7498875652371365921==--


From xen-users-bounces@lists.xenproject.org Fri Jan 05 18:45:43 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 18:45:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXWzf-0007wT-Q9; Fri, 05 Jan 2018 18:45:27 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=sec0=ea=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eXWzd-0007vX-Q1
 for xen-users@lists.xen.org; Fri, 05 Jan 2018 18:45:25 +0000
X-Inumbo-ID: d76b619d-f248-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id d76b619d-f248-11e7-b0d7-9f685aff125f;
 Fri, 05 Jan 2018 18:47:12 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eXWz6-0008II-1o; Fri, 05 Jan 2018 18:44:52 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1eXWz5-00070v-TN; Fri, 05 Jan 2018 18:44:51 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eXWz5-00070v-TN@xenbits.xenproject.org>
Date: Fri, 05 Jan 2018 18:44:51 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 3

        Information leak via side effects of speculative execution

UPDATES IN VERSION 3
====================

Add information about ARM vulnerability.

Correct description of SP2 difficulty.

Mention that resolutions for SP1 and SP3 may be available in the
future.

Move description of the PV-in-PVH shim from Mitigation to Resolution.
(When available and deployed, it will eliminate the SP3
vulnerability.)

Add colloquial names and CVEs to the relevant paragraphs in Issue
Description.

Add a URL.

Say explicitly in Vulnerable Systems that HVM guests cannot exploit
SP3.

Clarify that SP1 and SP2 can be exploited against other victims
besides operating systems and hypervisors.

Grammar fixes.

Remove erroneous detail about when Xen direct maps the whole of
physical memory.

State in Description that Xen ARM guests run in a separate address
space.

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by running guests in HVM or PVH mode.

RESOLUTION
==========

There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.

For guests with legacy PV kernels which cannot be run in HVM mode, we
have developed a "shim" hypervisor that allows PV guests to run in PVH
mode.  Unfortunately, due to the accelerated schedule, this is not yet
ready to release.  We expect to have it ready for 4.10, as well as PVH
backports to 4.9 and 4.8, available over the next few days.

When we have useful information we will send an update.

NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaT8eJAAoJEIP+FMlX6CvZpHsIAMd+oeUvMIDyGwMSDL93KAqJ
TPKV9Qi5FxTfW+dkfJ5GRR/IPHbxr9yHfbUpU33QfLYDmyMzL3oNokOR3R6jSpFE
dgqHIoS04EXsy7fSZ777YWwZoGBsAfbDZ5sJnFWxLTcLx6440N03LJC0wsLFyRET
6wPF7Ml9ZsWfkd3VvMDUc4PRhjbzGio1eP+ZUS4HfRk01DYmv/NTnUZIdY01sFFE
PVSTxO3iO0ptiTlqd+PPsjlqswNu0gmvW7jkc/MaLPLUhKcUG7tat0yDapxCf0Hv
xJZ6eNsjhTVJitINISyGYR5ZZESpfhXzig6znex6nr7r1/Ey4w6ud90pSV9j2/o=
=VIt1
-----END PGP SIGNATURE-----

--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Fri Jan 05 23:34:50 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jan 2018 23:34:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXbUf-0003Ax-28; Fri, 05 Jan 2018 23:33:45 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=mmdn=ea=gmail.com=raistlin.df@srs-us1.protection.inumbo.net>)
 id 1eXbUd-0003Ar-Q8
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 23:33:43 +0000
X-Inumbo-ID: b17a75f7-f270-11e7-b4a6-bc764e045a96
Received: from mail-wm0-x232.google.com (unknown [2a00:1450:400c:c09::232])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id b17a75f7-f270-11e7-b4a6-bc764e045a96;
 Sat, 06 Jan 2018 00:32:29 +0100 (CET)
Received: by mail-wm0-x232.google.com with SMTP id 64so5115241wme.3
 for <xen-users@lists.xenproject.org>; Fri, 05 Jan 2018 15:33:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=sender:message-id:subject:from:to:date:in-reply-to:references
 :mime-version; bh=48RSc0hSbj+AN5ktvSYyy/RQTMpeWBSvER3pdVXE3Zw=;
 b=KAttePQXyFY7fyoGOIhj4E2NUopt/zFxtY6KGlDPBAz6bNoh5VDp+xFk/hQvnCLc2J
 lP+zwUpxXdXlXXAjy7QOjZQCKE30DIq6N3qFBIoYELB5h1O0LejKoTavBOxQUipgoTG4
 UPX5aJSOQv9a1MkSGiN2n+554wxaMk4bIczWO3+YaD8CXNiQYE/Ml+n67wuCANON0pLm
 2z2UsOkpqkQp4PpSD9UCOiwVrhZFOZR/152QS5OJt746IZYk7/3v3AYu0Os3sMKX8Xrr
 5UnVAX+FrLKsOFiraFWsgp8IFIg5/NXM4djxdxLuuUzCTBJN8rodWouh4lYNcACB7jAD
 KNAg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:sender:message-id:subject:from:to:date
 :in-reply-to:references:mime-version;
 bh=48RSc0hSbj+AN5ktvSYyy/RQTMpeWBSvER3pdVXE3Zw=;
 b=ZiEQ5g6r1Ue+sf8XRNWJBmJHpIUkgbbQnFjvPcKuVquhpP/u7T5iJTQDvn5aAiRoMd
 aIt4r+uYWh8DLHU6u7SiBZitsSJvGOvMARye3UUnZ5yx3RdPZYv1mmXsJPhITeCbRfIn
 lHY7w6v7GcYa6meTSDtezTfkrrcYaDLM2QzWnrdXg/oXB2lr3jh60EElCdibgWN3vaoi
 6sk54vj36sCd0j58DHA3kXcpS8PVguVPgi0EfbvfgAB6NbqCccHNX5GPB26BErRof4U/
 ASIoG1a1x8ESKgcuIRhObdPI4MMSukeh4rB26Dem3noMRnGwvUv32VcYkAM3XBtUCHl1
 bxNw==
X-Gm-Message-State: AKGB3mJ4KBCYXbbIYz17XDFhHn+zO5V6S8a4EqG+USi8P630GwplXEYk
 jYmANSNHDYpzcfkORSdDX7LkBA==
X-Google-Smtp-Source: ACJfBoulzaUIePeET+dPOLWltwDLYaaFWoTmQRAJHkU5txQU0as3o8jzzssaUxuNsc/0PYVIss5ASQ==
X-Received: by 10.28.234.142 with SMTP id g14mr3232749wmi.31.1515195220097;
 Fri, 05 Jan 2018 15:33:40 -0800 (PST)
Received: from Palanthas.fritz.box ([80.66.223.37])
 by smtp.gmail.com with ESMTPSA id d71sm7042107wma.7.2018.01.05.15.33.38
 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256);
 Fri, 05 Jan 2018 15:33:39 -0800 (PST)
Message-ID: <1515195217.9419.83.camel@linux.it>
From: Dario Faggioli <raistlin@linux.it>
To: Patrick Noack <pn@nup.de>, xen-users@lists.xenproject.org
Date: Sat, 06 Jan 2018 00:33:37 +0100
In-Reply-To: <724428374.591856.1515176424603@webmail.strato.com>
References: <724428374.591856.1515176424603@webmail.strato.com>
X-Mailer: Evolution 3.26.3 (3.26.3-1.fc27) 
Mime-Version: 1.0
Subject: Re: [Xen-users] Hardening agains Meltdown and Spectre
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1128952991854299621=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--===============1128952991854299621==
Content-Type: multipart/signed; micalg="pgp-sha256";
	protocol="application/pgp-signature"; boundary="=-vdKFG8xiW7yH7JaCQvWH"


--=-vdKFG8xiW7yH7JaCQvWH
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Fri, 2018-01-05 at 19:20 +0100, Patrick Noack wrote:
> Hi all,
>
Hi,

> I am still unsure, if its enough to patch all virtual-machines
> running on a Xenserver to harden agains Meltdown and Spectre Attacks.
>
If you are talking about XenServer --the Citrix product-- you should
ask on their forums/support channels.

A quick google search brought up this for me:
https://support.citrix.com/article/CTX231390

If you're talking about Xen-Project, then it's fine to discuss this
here. A more than good starting point would be:
https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown-faq/

Dario
--=20
<<This happens because I choose it to happen!>> (Raistlin Majere)
-----------------------------------------------------------------
Dario Faggioli, Ph.D, http://about.me/dario.faggioli
--=-vdKFG8xiW7yH7JaCQvWH
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
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=YiCw
-----END PGP SIGNATURE-----

--=-vdKFG8xiW7yH7JaCQvWH--



--===============1128952991854299621==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============1128952991854299621==--



From xen-users-bounces@lists.xenproject.org Sat Jan 06 05:11:11 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 05:11:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXgjv-0004QD-Vg; Sat, 06 Jan 2018 05:09:51 +0000
Received: from mail6.bemta6.messagelabs.com ([193.109.254.103])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <admin@mmri.us>) id 1eXgju-0004Q7-Kk
 for xen-users@lists.xensource.com; Sat, 06 Jan 2018 05:09:50 +0000
Received: from [85.158.143.35] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-2.bemta-6.messagelabs.com id BA/5C-19716-D1A505A5;
 Sat, 06 Jan 2018 05:09:49 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrAKsWRWlGSWpSXmKPExsVyzKyuTFc2KiD
 K4OA6EYuty/6wOzB6bO/bxR7AGMWamZeUX5HAmjGp5RtjwWzuirvTl7A3MP7l6GLk5BASeMco
 MfswJ4jNKyAocXLmExYQm1nASqJ7404mCFteYvvbOcwgNouAqsS9ryfBbDYBYYmHd9+ygdgiA
 ooSWx43gtULC4hJbJ9+hhVipplE0607YPUSAuISzVc2sIPYogLKEl3PjrBDxNUkLp/rZYGwoy
 T+7r4KZVtIXHn5irGLkQPINpL4t8AXImwl8fvwGqgSHYnXsxuYIOxgiUeHehkhbHuJr1NeQq3
 lkjgwdR4bhM0vcXj2PagaPol9CzdAxbUltv15zDaBUXwWUkjMQgqJWUghsYCReRWjRnFqUVlq
 ka6hqV5SUWZ6RkluYmaOrqGBmV5uanFxYnpqTmJSsV5yfu4mRmAMMQDBDsZvywIOMUpyMCmJ8
 oo6B0QJ8SXlp1RmJBZnxBeV5qQWH2KU4eBQkuAVjgTKCRalpqdWpGXmAKMZJi3BwaMkwns1Ai
 jNW1yQmFucmQ6ROsVoyTFt3u0/TBzPZr5uYOZo+b+lhVmIJS8/L1VKnFcSZJ4ASENGaR7cOFj
 CucQoKyXMywh0oBBPQWpRbmYJqvwrRnEORiVhXieQKTyZeSVwW18BHcQEdNCqI74gB5UkIqSk
 GhjZLmgtztq8rbtvZ8+3eUH71GfsmMshFqlrefj4gfWVArd+Mep9WSa+7X5VBN9Z7+JosefJJ
 4Pkd3NfVdOeLLf2fnRC/4X00gnKzGeTjx96mfNbtCMiI+sNi/yjRx0XzU1fP7+q1bI1amW09c
 VFBxsShDULM/w38vvlVbQ4vjp1N0v9g8up/eeVWIozEg21mIuKEwHS61yBMwMAAA==
X-Env-Sender: admin@mmri.us
X-Msg-Ref: server-12.tower-21.messagelabs.com!1515215387!89062263!1
X-Originating-IP: [198.54.126.118]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 15278 invoked from network); 6 Jan 2018 05:09:49 -0000
Received: from server54-2.web-hosting.com (HELO server54-2.web-hosting.com)
 (198.54.126.118)
 by server-12.tower-21.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted
 SMTP; 6 Jan 2018 05:09:49 -0000
Received: from [::1] (port=58920 helo=server54.web-hosting.com)
 by server54.web-hosting.com with esmtpa (Exim 4.89)
 (envelope-from <admin@mmri.us>) id 1eXgjg-002t3L-Pm
 for xen-users@lists.xensource.com; Sat, 06 Jan 2018 00:09:37 -0500
MIME-Version: 1.0
Date: Sat, 06 Jan 2018 00:09:36 -0500
From: admin@mmri.us
To: xen-users@lists.xensource.com
Message-ID: <d93fdbcc86aafaf5d8fe790245b41ffd@mmri.us>
X-Sender: admin@mmri.us
User-Agent: Roundcube Webmail/1.2.7
X-OutGoing-Spam-Status: No, score=-0.2
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - server54.web-hosting.com
X-AntiAbuse: Original Domain - lists.xensource.com
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - mmri.us
X-Get-Message-Sender-Via: server54.web-hosting.com: authenticated_id:
 admin@mmri.us
X-Authenticated-Sender: server54.web-hosting.com: admin@mmri.us
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-From-Rewrite: unmodified, already matched
Subject: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Sat Jan 06 15:26:20 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 15:26:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXqLZ-00056l-PM; Sat, 06 Jan 2018 15:25:21 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=aipy=eb=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eXqLY-000569-9h
 for xen-users@lists.xen.org; Sat, 06 Jan 2018 15:25:20 +0000
X-Inumbo-ID: 0f4ad281-f2f6-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 0f4ad281-f2f6-11e7-b0d7-9f685aff125f;
 Sat, 06 Jan 2018 15:27:09 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eXqLJ-00074N-An; Sat, 06 Jan 2018 15:25:05 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1eXqLJ-0008JW-6M; Sat, 06 Jan 2018 15:25:05 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eXqLJ-0008JW-6M@xenbits.xenproject.org>
Date: Sat, 06 Jan 2018 15:25:05 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 253 (CVE-2018-5244) - x86: memory
 leak with MSR emulation
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2018-5244 / XSA-253
                              version 3

                  x86: memory leak with MSR emulation

UPDATES IN VERSION 3
====================

CVE assigned.

ISSUE DESCRIPTION
=================

In Xen 4.10, new infrastructure was introduced as part of an overhaul to
how MSR emulation happens for guests.  Unfortunately, one tracking
structure isn't freed when a vcpu is destroyed.

IMPACT
======

A memory allocation of 8 bytes is leaked each time a vcpu is destroyed.

A malicious guest may, by frequently rebooting over extended periods of
time, run the system out of memory, resulting in a Denial of Service
(DoS).

VULNERABLE SYSTEMS
==================

Xen versions 4.10 and later are affected.  Xen 4.9 and earlier are not
affected.

Only x86 systems are affected.  ARM systems are not.

All guest kinds can exploit this vulnerability.

MITIGATION
==========

Limiting the frequency with which a guest is able to reboot, will
limit the memory leak.

Rebooting each host (after migrating its guests) periodically will
reclaim the leaked space.

CREDITS
=======

This issue was discovered by Andrew Cooper of Citrix.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa253.patch           Xen 4.10, xen-unstable

$ sha256sum xsa253*
bba1abb5e4368421de29385e37f8477bf3534d3ba3ff7e2aae9c9d3da53f1393  xsa253.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaUOoXAAoJEIP+FMlX6CvZchUIAKlvxu5o9IcIyULARW0s2YEA
6ueK3tyaH2vlWH1IG9KORletdAGALJrfEODt8SBJb+0rKDZKGHSKNB7a911QRebK
njXdSpdb1WCdHmStI82csLKvdMGbrFq/6wWFJRt1eFtzr7Qt3rwKXtHv/OI4Kr1T
sZ+K6M2KCavkJ+yPSF/f9GTBuD6iiu2E7RI5HzbjdV+k9E7tJkURH2/BPAfhhhyo
zsColbPQAxm96RCHIEPaOI5qZXVcfL+5VNbUh5+6vOtUiZdpnOMHmSwDF0AZc1hO
0YQ93/8blRm7N914rn8gu0zY+nQHcgC2klWzHOcCFirzTI0aHXfQQJsX9Oe6g3w=
=CX95
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa253.patch"
Content-Disposition: attachment; filename="xsa253.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Sat Jan 06 16:16:55 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 16:16:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXr8h-0001EK-Fc; Sat, 06 Jan 2018 16:16:07 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=aipy=eb=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eXr8f-0001DT-KP
 for xen-users@lists.xen.org; Sat, 06 Jan 2018 16:16:05 +0000
X-Inumbo-ID: 273801db-f2fd-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 273801db-f2fd-11e7-b0d7-9f685aff125f;
 Sat, 06 Jan 2018 16:17:55 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eXr8R-0000SP-Da; Sat, 06 Jan 2018 16:15:51 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1eXr8R-0004f1-Ce; Sat, 06 Jan 2018 16:15:51 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eXr8R-0004f1-Ce@xenbits.xenproject.org>
Date: Sat, 06 Jan 2018 16:15:51 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 248 (CVE-2017-17566) - x86 PV
 guests may gain access to internally used pages
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2017-17566 / XSA-248
                              version 3

         x86 PV guests may gain access to internally used pages

UPDATES IN VERSION 3
====================

CVE assigned.

ISSUE DESCRIPTION
=================

Memory management for PV guests builds on page ownership and page
attributes.  A domain can always map, at least r/o, pages of which it
is the owner.  Certain fields in the control structure of a page are
used for different purposes in the main PV memory management code and
in code handling shadow paging.

When a guest is running in shadow mode (which for PV guests is necessary
e.g. for live migration), certain auxiliary pages used by Xen internally
had their owner set to the guest itself.  When the PV guest maps such a
page, shadow code and PV memory management code will disagree on the
meaning of said multi-purpose fields, generally leading to a crash of
the hypervisor.

IMPACT
======

A malicious or buggy PV guest may cause a hypervisor crash, resulting in
a Denial of Service (DoS) affecting the entire host, or cause hypervisor
memory corruption.  We cannot rule out a guest being able to escalate
its privilege.

VULNERABLE SYSTEMS
==================

All versions of Xen are vulnerable.

Only x86 systems are affected.  ARM systems are not vulnerable.

x86 HVM guests cannot exploit this vulnerability.

Only x86 PV guests can exploit this vulnerability, and only when being
run in shadow mode.  PV guests are typically run in shadow mode for live
migration, as well as for features like VM snapshot.

Note that save / restore does *not* use shadow mode, and so does not
expose this vulnerability.  Some downstreams also include a "non-live
migration" feature, which also does not use shadow mode (and thus does
not expose this vulnerability).

MITIGATION
==========

Running only HVM guests avoids the vulnerability.

Avoiding live migration of x86 PV guests also avoids the vulnerability.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa248.patch           xen-unstable, Xen 4.9.x
xsa248-4.8.patch       Xen 4.8.x, Xen 4.7.x, Xen 4.6.x
xsa248-4.5.patch       Xen 4.5.x

$ sha256sum xsa248*
f0ac5c5ff956118f52821e111c6e27416f788cea6e98cc54cb051c42b793357e  xsa248.meta
20bcfb1890d90bd74f52e45a1e8aa020a8991e3a0db37eecf53ce48b16e602bf  xsa248.patch
ec4227633df18f76fbd8cb12e367879470b63fb5236f10b2a971dccef9f83172  xsa248-4.5.patch
3bbd9fd92e5ffab1ddd7ff804bfbab09c1c654af3aa7f80f742f321da120b715  xsa248-4.8.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaUPXWAAoJEIP+FMlX6CvZ5R8H/Rn0CZ9fEExfAjcqm5kjTZFt
HgI+ZfUYwhEfMuYc4bv5rYYfzhFsCWe4afrcxBdh1qtMeJjZWfGtf8yOFNzox0PR
XeMZ/p7qwspg9TyNO/7dM+wd6nHRp88pTcy4QQcmfczcZrcUbm0wGCmhaIJdWlMA
CsgKsiekPapB9R+fqeVroc/gmMRx9iTFif/w96OpApGsMPO5SnuSzeFrL8RzMU9u
rjwCfu0Yz9MPHT8E+KvI9GeB7srov3XEfMsmaJ9NUDgnrDl9Xhe5wC7FnL3mvTYC
YZML85QbvghxFoQM6v2MyBwF8tLW3YEgZK/oR4ed1E6BrKfDQwyXIaT0GXtIFzk=
=ytqY
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa248.meta"
Content-Disposition: attachment; filename="xsa248.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa248.patch"
Content-Disposition: attachment; filename="xsa248.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa248-4.5.patch"
Content-Disposition: attachment; filename="xsa248-4.5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa248-4.8.patch"
Content-Disposition: attachment; filename="xsa248-4.8.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Sat Jan 06 16:16:55 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 16:16:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXr8o-0001IF-88; Sat, 06 Jan 2018 16:16:14 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=aipy=eb=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eXr8m-0001Ef-RP
 for xen-users@lists.xen.org; Sat, 06 Jan 2018 16:16:12 +0000
X-Inumbo-ID: 2b969930-f2fd-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 2b969930-f2fd-11e7-b0d7-9f685aff125f;
 Sat, 06 Jan 2018 16:18:03 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eXr8b-0000TL-2e; Sat, 06 Jan 2018 16:16:01 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1eXr8b-0004ji-1y; Sat, 06 Jan 2018 16:16:01 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eXr8b-0004ji-1y@xenbits.xenproject.org>
Date: Sat, 06 Jan 2018 16:16:01 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 251 (CVE-2017-17565) - improper
 bug check in x86 log-dirty handling
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2017-17565 / XSA-251
                              version 3

             improper bug check in x86 log-dirty handling

UPDATES IN VERSION 3
====================

CVE assigned.

ISSUE DESCRIPTION
=================

Memory sharing, available to x86 HVM guests only, uses a special value
in the global machine to physical address translation table (M2P).  PV
guests have full control over M2P entries corresponding to pages they
own.  A bug check (specifically, an assertion that an M2P entry is not
the special "shared" indicator) was insufficiently qualified, and as a
consequence is triggerable by PV guests in log-dirty mode
(e.g. because of being live migrated).

IMPACT
======

A malicious or buggy PV guest may cause a hypervisor crash, resulting in
a Denial of Service (DoS) affecting the entire host.

VULNERABLE SYSTEMS
==================

Xen versions 4.0 and later are affected.  Xen versions 3.4 and earlier
are not affected.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

x86 HVM guests cannot exploit this vulnerability.

Only x86 PV guests can exploit this vulnerability, and only when being
run in shadow mode.  PV guests are typically run in shadow mode for live
migration, as well as for features like VM snapshot.

Note that save / restore does *not* use shadow mode, and so does not
expose this vulnerability.  Some downstreams also  include a "non-live
migration" feature, which also does not use shadow mode (and thus does
not expose this vulnerability).

MITIGATION
==========

Running only HVM guests avoids the vulnerability.

Avoiding live migration of x86 PV guests also avoids the vulnerability.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa251.patch           xen-unstable, Xen 4.9.x
xsa251-4.8.patch       Xen 4.8.x, Xen 4.7.x, Xen 4.6.x
xsa251-4.5.patch       Xen 4.5.x

$ sha256sum xsa251*
152cf5c88c3e441af01cdf5749877cabb6ab961afee9f29ae3077e725b703aa2  xsa251.meta
0dfbcfe459f051abb571d3fbedbe9760a4c6cd540ab5d525627050e3eeb9234e  xsa251.patch
345a6e004e0d0d89c7fc8db55d48d68f53402a521bd1aa3cb4168043e1ae5673  xsa251-4.5.patch
f8cecf013a3628038e0a4566778852a560b25a1ce2f3872a989087ab2fc9a913  xsa251-4.8.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaUPXgAAoJEIP+FMlX6CvZd1wIALEfYx5UtaqCZrUpgc+TwN8u
Fg+huu3hE/YDVMY5IHueUsVU4WMk7/XJL/hXxf0+Dr01M5nVUbs1cJIB7Gqch37n
Vo6JMHM0XHUEQB/Ctxn/nRi1PfAjvz/nSrCcRacIeTZNHm6Wzc7qtlOyjDWgbVwJ
JvboCmK0ueGTVd3RIGvxM0jDzWqRuObf4KLaCWka3rqZvYzZJJOGAO9C8HdZn9Bc
pMIV79QuYySvJm9rdNUSno2s19DJNNCOki2/HpU1CHv/b8May82fE+qZH5XexsnZ
x2d1G8cvsK0L+auqQO/U3Rln9B2MWp9hn2cVGP2DbLq/AO2yir5b7d/CPzqhIag=
=O0vJ
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa251.meta"
Content-Disposition: attachment; filename="xsa251.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa251.patch"
Content-Disposition: attachment; filename="xsa251.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa251-4.5.patch"
Content-Disposition: attachment; filename="xsa251-4.5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa251-4.8.patch"
Content-Disposition: attachment; filename="xsa251-4.8.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Sat Jan 06 16:16:55 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 16:16:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXr8j-0001Fn-Co; Sat, 06 Jan 2018 16:16:09 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=aipy=eb=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eXr8h-0001Em-Tj
 for xen-users@lists.xen.org; Sat, 06 Jan 2018 16:16:07 +0000
X-Inumbo-ID: b9a314a1-f2fc-11e7-b4a6-bc764e045a96
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id b9a314a1-f2fc-11e7-b4a6-bc764e045a96;
 Sat, 06 Jan 2018 17:14:52 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eXr8Y-0000Sw-8V; Sat, 06 Jan 2018 16:15:58 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1eXr8Y-0004iB-7j; Sat, 06 Jan 2018 16:15:58 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eXr8Y-0004iB-7j@xenbits.xenproject.org>
Date: Sat, 06 Jan 2018 16:15:58 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 250 (CVE-2017-17564) - improper
 x86 shadow mode refcount error handling
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2017-17564 / XSA-250
                              version 3

           improper x86 shadow mode refcount error handling

UPDATES IN VERSION 3
====================

CVE assigned.

ISSUE DESCRIPTION
=================

Pages being used to run x86 guests in shadow mode are reference counted
to track their uses.  When another reference cannot be acquired, the
corresponding page table entry must not be inserted.  Due to incorrect
error handling, this constraint could be violated.

IMPACT
======

A malicious or buggy guest may cause a hypervisor crash, resulting in
a Denial of Service (DoS) affecting the entire host, or cause hypervisor
memory corruption.  We cannot rule out a guest being able to escalate
its privilege.

VULNERABLE SYSTEMS
==================

All Xen versions are affected.

x86 systems are vulnerable.  ARM systems are not vulnerable.

Only guests run in shadow mode can exploit the vulnerability.

PV guests typically only run in shadow mode during live migration, as
well as for features like VM snapshot.

Note that save / restore does *not* use shadow mode, and so does not
expose this vulnerability.  Some downstreams also  include a "non-live
migration" feature, which also does not use shadow mode (and thus does
not expose this vulnerability).

HVM guests run in shadow mode on hardware without HAP support, or when
HAP is disabled (globally or in the VM configuration file).  Live
migration does not affect an HVM guest's use of shadow mode.

MITIGATION
==========

For HVM guest explicitly configured to use shadow paging (e.g. via the
`hap=0' xl domain configuration file parameter), changing to HAP (e.g.
by setting `hap=1') will avoid exposing the vulnerability to those
guests.  HAP is the default (in upstream Xen), where the hardware
supports it; so this mitigation is only applicable if HAP has been
disabled by configuration.

For PV guests, avoiding their live migration avoids the vulnerability.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa250.patch           xen-unstable, Xen 4.9.x ... 4.6.x
xsa250-4.5.patch       Xen 4.5.x

$ sha256sum xsa250*
c15c1c3e64cfb7ab2e2c48970214aa8c3881deb7e11c498526554bb74535b601  xsa250.meta
adf4d8242dbddb4ec52fe1effc1f8b233d33d8d6a59c1bb677dcc6e2ed2bf711  xsa250.patch
d123a58308db606185c4e48dcf4a114ac29bb988ffc0eeb04ded213ec474e0f2  xsa250-4.5.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaUPXdAAoJEIP+FMlX6CvZeoMH/iS1gZ8zBPWnBCSPm4pUt9ZJ
cAJ9vX9E3wDZm0hEQRHOFvTlpqEY3w5TkkBZbErB8m1VD/Om45fZiHvvZRKPtCvK
Jks8OVH2Mx2466WladCK4x3km86N2o2547u03dZzZIDUCvn19S8acI1wV8r4TOrv
Op4VeDH+cxJ2EAmmrGWkCJc4lQxvJTqzsz+paZ+/dyOdaZGIKJJOhX6s7ZmkjhZz
HHr05i+U72kzttUIYqVO4CIp3hoPsOyAcHsd004XGGH6LmWUA7bG1+Fcm+7b2ajD
JX/l4xVstD8GWijRnyvOVo/ozRAGb+Nfve+xtVzbyozqVol5PTcP6Jwxerby8PA=
=tkcf
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa250.meta"
Content-Disposition: attachment; filename="xsa250.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa250.patch"
Content-Disposition: attachment; filename="xsa250.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa250-4.5.patch"
Content-Disposition: attachment; filename="xsa250-4.5.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiB4ODYvc2hhZG93OiBmaXggcmVmLWNvdW50aW5nIGVycm9yIGhhbmRsaW5n
CgpUaGUgb2xkLUxpbnV4IGhhbmRsaW5nIGluIHNoYWRvd19zZXRfbDRlKCkg
bWlzdGFrZW5seSBPUmVkIHRvZ2V0aGVyIHRoZQpyZXN1bHRzIG9mIHNoX2dl
dF9yZWYoKSBhbmQgc2hfcGluKCkuIEFzIHRoZSBsYXR0ZXIgZmFpbGluZyBp
cyBub3QgYQpjb3JyZWN0bmVzcyBwcm9ibGVtLCBzaW1wbHkgaWdub3JlIGl0
cyByZXR1cm4gdmFsdWUuCgpJbiBzaF9zZXRfdG9wbGV2ZWxfc2hhZG93KCkg
YSBmYWlsaW5nIHNoX2dldF9yZWYoKSBtdXN0IG5vdCBiZQphY2NvbXBhbmll
ZCBieSBpbnN0YWxsaW5nIHRoZSBlbnRyeSwgZGVzcGl0ZSB0aGUgZG9tYWlu
IGJlaW5nIGNyYXNoZWQuCgpUaGlzIGlzIFhTQS0yNTAuCgpTaWduZWQtb2Zm
LWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+ClJldmlld2Vk
LWJ5OiBUaW0gRGVlZ2FuIDx0aW1AeGVuLm9yZz4KCi0tLSBhL3hlbi9hcmNo
L3g4Ni9tbS9zaGFkb3cvbXVsdGkuYworKysgYi94ZW4vYXJjaC94ODYvbW0v
c2hhZG93L211bHRpLmMKQEAgLTg5Niw3ICs4OTYsNyBAQCBzdGF0aWMgaW50
IHNoYWRvd19zZXRfbDRlKHN0cnVjdCB2Y3B1ICp2CiAgICAgICAgICAgICAg
ICAgICAgICAgICAgIHNoYWRvd19sNGVfdCBuZXdfc2w0ZSwgCiAgICAgICAg
ICAgICAgICAgICAgICAgICAgIG1mbl90IHNsNG1mbikKIHsKLSAgICBpbnQg
ZmxhZ3MgPSAwLCBvazsKKyAgICBpbnQgZmxhZ3MgPSAwOwogICAgIHNoYWRv
d19sNGVfdCBvbGRfc2w0ZTsKICAgICBwYWRkcl90IHBhZGRyOwogICAgIEFT
U0VSVChzbDRlICE9IE5VTEwpOwpAQCAtOTExLDE1ICs5MTEsMTYgQEAgc3Rh
dGljIGludCBzaGFkb3dfc2V0X2w0ZShzdHJ1Y3QgdmNwdSAqdgogICAgIHsK
ICAgICAgICAgLyogQWJvdXQgdG8gaW5zdGFsbCBhIG5ldyByZWZlcmVuY2Ug
Ki8gICAgICAgIAogICAgICAgICBtZm5fdCBzbDNtZm4gPSBzaGFkb3dfbDRl
X2dldF9tZm4obmV3X3NsNGUpOwotICAgICAgICBvayA9IHNoX2dldF9yZWYo
diwgc2wzbWZuLCBwYWRkcik7Ci0gICAgICAgIC8qIEFyZSB3ZSBwaW5uaW5n
IGwzIHNoYWRvd3MgdG8gaGFuZGxlIHdpZXJkIGxpbnV4IGJlaGF2aW91cj8g
Ki8KLSAgICAgICAgaWYgKCBzaF90eXBlX2lzX3Bpbm5hYmxlKHYsIFNIX3R5
cGVfbDNfNjRfc2hhZG93KSApCi0gICAgICAgICAgICBvayB8PSBzaF9waW4o
diwgc2wzbWZuKTsKLSAgICAgICAgaWYgKCAhb2sgKQorCisgICAgICAgIGlm
ICggIXNoX2dldF9yZWYodiwgc2wzbWZuLCBwYWRkcikgKQogICAgICAgICB7
CiAgICAgICAgICAgICBkb21haW5fY3Jhc2godi0+ZG9tYWluKTsKICAgICAg
ICAgICAgIHJldHVybiBTSEFET1dfU0VUX0VSUk9SOwogICAgICAgICB9CisK
KyAgICAgICAgLyogQXJlIHdlIHBpbm5pbmcgbDMgc2hhZG93cyB0byBoYW5k
bGUgd2VpcmQgTGludXggYmVoYXZpb3VyPyAqLworICAgICAgICBpZiAoIHNo
X3R5cGVfaXNfcGlubmFibGUodiwgU0hfdHlwZV9sM182NF9zaGFkb3cpICkK
KyAgICAgICAgICAgIHNoX3Bpbih2LCBzbDNtZm4pOwogICAgIH0KIAogICAg
IC8qIFdyaXRlIHRoZSBuZXcgZW50cnkgKi8KQEAgLTM4ODEsMTQgKzM4ODIs
MTUgQEAgc2hfc2V0X3RvcGxldmVsX3NoYWRvdyhzdHJ1Y3QgdmNwdSAqdiwK
IAogICAgIC8qIFRha2UgYSByZWYgdG8gdGhpcyBwYWdlOiBpdCB3aWxsIGJl
IHJlbGVhc2VkIGluIHNoX2RldGFjaF9vbGRfdGFibGVzKCkKICAgICAgKiBv
ciB0aGUgbmV4dCBjYWxsIHRvIHNldF90b3BsZXZlbF9zaGFkb3coKSAqLwot
ICAgIGlmICggIXNoX2dldF9yZWYodiwgc21mbiwgMCkgKQorICAgIGlmICgg
c2hfZ2V0X3JlZih2LCBzbWZuLCAwKSApCisgICAgICAgIG5ld19lbnRyeSA9
IHBhZ2V0YWJsZV9mcm9tX21mbihzbWZuKTsKKyAgICBlbHNlCiAgICAgewog
ICAgICAgICBTSEFET1dfRVJST1IoImNhbid0IGluc3RhbGwgJSNseCBhcyB0
b3BsZXZlbCBzaGFkb3dcbiIsIG1mbl94KHNtZm4pKTsKICAgICAgICAgZG9t
YWluX2NyYXNoKHYtPmRvbWFpbik7CisgICAgICAgIG5ld19lbnRyeSA9IHBh
Z2V0YWJsZV9udWxsKCk7CiAgICAgfQogCi0gICAgbmV3X2VudHJ5ID0gcGFn
ZXRhYmxlX2Zyb21fbWZuKHNtZm4pOwotCiAgaW5zdGFsbF9uZXdfZW50cnk6
CiAgICAgLyogRG9uZS4gIEluc3RhbGwgaXQgKi8KICAgICBTSEFET1dfUFJJ
TlRLKCIldS8ldSBbJXVdIGdtZm4gJSMiUFJJX21mbiIgc21mbiAlIyJQUklf
bWZuIlxuIiwK

--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Sat Jan 06 16:19:55 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 16:19:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXrBb-0002Qu-5x; Sat, 06 Jan 2018 16:19:07 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=aipy=eb=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eXrBa-0002OO-6q
 for xen-users@lists.xen.org; Sat, 06 Jan 2018 16:19:06 +0000
X-Inumbo-ID: 290d6ab3-f2fd-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 290d6ab3-f2fd-11e7-b0d7-9f685aff125f;
 Sat, 06 Jan 2018 16:17:58 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eXr8V-0000Sf-Mn; Sat, 06 Jan 2018 16:15:55 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1eXr8V-0004gc-K0; Sat, 06 Jan 2018 16:15:55 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eXr8V-0004gc-K0@xenbits.xenproject.org>
Date: Sat, 06 Jan 2018 16:15:55 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 249 (CVE-2017-17563) - broken x86
 shadow mode refcount overflow check
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2017-17563 / XSA-249
                              version 3

            broken x86 shadow mode refcount overflow check

UPDATES IN VERSION 3
====================

CVE assigned.

ISSUE DESCRIPTION
=================

Pages being used to run x86 guests in shadow mode are reference counted
to track their uses.  Unfortunately the overflow check when trying to
obtain a new reference used a mask one bit wider than the reference
count actually is, rendering the entire check ineffective.

IMPACT
======

A malicious or buggy guest may cause a hypervisor crash, resulting in
a Denial of Service (DoS) affecting the entire host, or cause hypervisor
memory corruption.  We cannot rule out a guest being able to escalate
its privilege.

VULNERABLE SYSTEMS
==================

Xen versions 4.1 and later are affected.  Xen versions 4.0 and earlier
are not affected.

x86 systems are vulnerable.  ARM systems are not vulnerable.

Only guests run in shadow mode can exploit the vulnerability.

PV guests typically only run in shadow mode during live migration, as
well as for features like VM snapshot.

Note that save / restore does *not* use shadow mode, and so does not
expose this vulnerability.  Some downstreams also include a "non-live
migration" feature, which also does not use shadow mode (and thus does
not expose this vulnerability).

HVM guests run in shadow mode on hardware without HAP support, or when
HAP is disabled (globally or in the VM configuration file).  Live
migration does not affect an HVM guest's use of shadow mode.

MITIGATION
==========

For HVM guest explicitly configured to use shadow paging (e.g. via the
`hap=0' xl domain configuration file parameter), changing to HAP (e.g.
by setting `hap=1') will avoid exposing the vulnerability to those
guests.  HAP is the default (in upstream Xen), where the hardware
supports it; so this mitigation is only applicable if HAP has been
disabled by configuration.

For PV guests, avoiding their live migration avoids the vulnerability.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa249.patch           xen-unstable, Xen 4.9.x ... 4.5.x

$ sha256sum xsa249*
38a4b8033d634e22939ad42b882c35e46482782619e3e03b968a2f6489e459c9  xsa249.meta
e99066b0171d4757c6a66e1223aabe01e990de2d0dc50416936e064e6e750d00  xsa249.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaUPXbAAoJEIP+FMlX6CvZdqQH/2b6yXlcScNp9SWs2VIoDLcc
Hh3Wxmvx4oRBkdUOiE7/YNJK3yScnW2Jled+fLrBd7yuFNmztlA6Hue1thxgQmFN
N2qDReHVBhLDQSv4Xolyifqx/leMo/s7jYkL8zBEPvRrf4DMkj7+i9/JBn8gri8G
hiImDmIet9pKL9OP+jQDsgQia5p7ygPVLommMVS/2VZp4O4sBnpvfrAIHNvmmLPy
xbr3Jw8cska7gspfmsXU1PziBFmawxk21pvozef9XN1lxC/ZY56yODtph/6KoBvr
KGtGleF0QVtj/Nvt42yBr5nMagl9XsjdFz4Jero0K4hOE1Kw7IgO0Oigav8nap8=
=Z+E8
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa249.meta"
Content-Disposition: attachment; filename="xsa249.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa249.patch"
Content-Disposition: attachment; filename="xsa249.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Sat Jan 06 20:21:23 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 20:21:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXuxB-0003j7-Gb; Sat, 06 Jan 2018 20:20:29 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <liebrecht@grossmann-venter.com>) id 1eXgZg-0003T7-Es
 for xen-users@lists.xensource.com; Sat, 06 Jan 2018 04:59:16 +0000
Received: from [85.158.137.68] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-6.bemta-3.messagelabs.com id 1D/14-32407-3A7505A5;
 Sat, 06 Jan 2018 04:59:15 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprPKsWRWlGSWpSXmKPExsVyzKyuTHdReEC
 UweY7ahZbl/1hd2D02N63iz2AMYo1My8pvyKBNWP3i5dMBXO4K+5OX8LewPiXo4uRi0NI4D+j
 xPEtl9i6GDk5eAUEJU7OfMICYjMLWEl0b9zJBGHLS2x/O4cZxGYRUJV4NuMPK4jNJqAi8WTiW
 kYQW0RAUWLL40awemEBMYnt08+wQsx0lvh+fSvYfAkBDYmj11rA5ogKKEt0PTvCDhFXk3i0YR
 mUHSXxd/dVFgjbQuLKy1dA8zmAbCOJfwt8IcJWEr8Pr4EqsZR4/PY8E0RJisSXA0UQ4QCJsy/
 2MELYXBIHps6DuoBf4vDse1BxPol9CzdAxbUltv15zDaBUXwWUkDMQgqIWUgBsYCReRWjenFq
 UVlqka6JXlJRZnpGSW5iZo6uoYGxXm5qcXFiempOYlKxXnJ+7iZGYAQxAMEOxsYvTocYJTmYl
 ER5RZ0DooT4kvJTKjMSizPii0pzUosPMcpwcChJ8K4PA8oJFqWmp1akZeYAYxkmLcHBoyTCWw
 2S5i0uSMwtzkyHSJ1itOSYNu/2HyaOZzNfNzBztPzf0sIsxJKXn5cqJc5bB9IgANKQUZoHNw6
 Wbi4xykoJ8zICHSjEU5BalJtZgir/ilGcg1FJmHc1yBSezLwSuK2vgA5iAjpo1RFfkINKEhFS
 Ug2MM6NUrn/7d/+jqXxSQ4RPql7IyQcfEuevTc+eem+J5dGo+xnb5SfrP+Y5wPwhWlv+xHz3U
 5Ezw95O0rIt0fuefD6x7tyFNX/OMrtFaF6+tvfq5z8nahfYHFwYNlvnrqnP5Ziv3lrfbjR6yO
 SIKqY6Z6XXz7U62vz43qPjt281uQvdc32ZoWHJo8RSnJFoqMVcVJwIAHn8VQIyAwAA
X-Env-Sender: liebrecht@grossmann-venter.com
X-Msg-Ref: server-15.tower-31.messagelabs.com!1515214753!117724259!1
X-Originating-IP: [198.54.126.118]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13020 invoked from network); 6 Jan 2018 04:59:14 -0000
Received: from server54-2.web-hosting.com (HELO server54-2.web-hosting.com)
 (198.54.126.118)
 by server-15.tower-31.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted
 SMTP; 6 Jan 2018 04:59:14 -0000
Received: from [::1] (port=35718 helo=server54.web-hosting.com)
 by server54.web-hosting.com with esmtpa (Exim 4.89)
 (envelope-from <liebrecht@grossmann-venter.com>) id 1eXgZY-002lOC-U0
 for xen-users@lists.xensource.com; Fri, 05 Jan 2018 23:59:12 -0500
MIME-Version: 1.0
Date: Fri, 05 Jan 2018 23:59:08 -0500
From: liebrecht@grossmann-venter.com
To: xen-users@lists.xensource.com
Message-ID: <91eaad0893961c0ebfbc08120c134094@grossmann-venter.com>
X-Sender: liebrecht@grossmann-venter.com
User-Agent: Roundcube Webmail/1.2.7
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - server54.web-hosting.com
X-AntiAbuse: Original Domain - lists.xensource.com
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - grossmann-venter.com
X-Get-Message-Sender-Via: server54.web-hosting.com: authenticated_id:
 liebrecht@grossmann-venter.com
X-Authenticated-Sender: server54.web-hosting.com: liebrecht@grossmann-venter.com
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-From-Rewrite: unmodified, already matched
X-Mailman-Approved-At: Sat, 06 Jan 2018 20:20:27 +0000
Subject: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

U2VlIHNlY3Rpb25zIGxhYmVsZWQgUVVFU1RJT04uIFRoZSBvdGhlciB0ZXh0IGlzIHRvIHVuZGVy
c3RhbmQgdGhlIApxdWVzdGlvbnMgYW5kIGJhY2tncm91bmQuCgpJIG5ldmVyIGhhZCByZWFzb24g
dG8gY29uc2lkZXIgWGVuIGFzIEkgZHVhbCBib290IG9wZXJhdGluZyBzeXN0ZW1zIGFzIApuZWVk
ZWQuCk5vdyBJIGFtIHNlZW1pbmdseSBmb3JjZWQgdG8gdXNlIFhlbiBhbmQgSSB3YW50IHRvIGZp
bmQgb3V0IGlmIGl0IGNhbiBkbyAKd2hhdCBJIHdhbnQuClRoaXMgaXMgZm9yIHBlcnNvbmFsIHVz
ZSBhbmQgbm90IGNvbW1lcmNpYWwuCgpJIGhhdmUgYSAyNCBjb3JlIDY0R0IgbWVtLiByYWNrc2Vy
dmVyIHRoYXQgbmVlZHMgdG8gcnVuIHdpbmRvd3MgYW5kIApsaW51eC4KTGludXggZG9lcyBqdXN0
IGZpbmUgc2VlcywgYWxsIDI0IGNvcmVzIGFsbCBtZW1vcnkgKGV2ZW4gbXkgb2xkIEZDNyAKZGlz
dHJvKSBJIHVzZWQgZm9yIG51bWVyaWNhbCBwcm9ncmFtbWluZyBmb3Igc3R1ZGllcyBsb25nIGFn
bywKCldpbmRvd3MgaXMgYW5vdGhlciBjYW4gb2Ygd29ybXMuCkl0IHNlZW1zIHRoYXQgV2luZG93
cyA3JjEwIFByb2Zlc3Npb25hbCB3aWxsIGRvIHR3byBwcm9jZXNzb3JzIGVhY2ggb2YgCjEyIGNv
cmVzIGZyb20gdGhlIHNwZWNpZmljYXRpb25zLgpIb3dldmVyLCB0aGVyZSBpcyBOTyBXQVkgV2lu
ZG93cyA3IG9yIDEwIHdpbGwgaW5zdGFsbCBvbiB0aGlzIHNlcnZlci4KClFVRVNUSU9OOiBEb2Vz
IE1pY3Jvc29mdCBkZXRlY3QgaXQgaXMgYSByYWNrc2VydmVyIGFuZCB0aGVuIAppbnRlbnRpb25h
bGx5IHByZXZlbnQgdGhlIGluc3RhbGwgZm9yY2luZyB5b3UgdG8gYnV5IFdpbmRvd3Mgc2VydmVy
ID8KCkJvdGggNyBhbmQgMTAgZmFpbHMgYWZ0ZXIgdGhlIGZpcnN0IHJlYm9vdCBkdXJpbmcgaW5z
dGFsbC4KSSBkb250IHBhcnRpY3VsYXJseSB3YW50IHRvIHVzZSB3aW5kb3dzIHNlcnZlciBhcyBJ
IG5lZWQgdGhlIGJlbGxzIGFuZCAKd2hpc3RsZXMgb2YgV2luZG93cyA3IGFuZCAxMCB3aGljaCBz
ZXJ2ZXIgZG9lc250IGhhdmUuCgpJdCBzZWVtcyBhIGh5cGVydmlzb3IgbGlrZSBYRU4gaXMgdGhl
IG9ubHkgd2F5IGFyb3VuZCB0aGUgd2luZG93cyAKY29udW5kcnVtIGFzIEkgY2FuIGZvb2wgdCB0
byB0byBsb29rIGxpa2UgYSBub3JtYWwgcGMgcnVubmluZyBpdCAKdmlydHVhbGx5LgoKUVVFU1RJ
T046CkhvdyBkb2VzIEZpcmV3aXJlIGFuZCBVU0IgcGVyZm9ybSBpbiBYRU4gd2hlbiBob3N0aW5n
IFdpbmRvd3MgPyBJcyB0aGVyZSAKYW55IGxhY2sgb2YgVVNCL0ZpcmV3aXJlIHN1cHBvcnQgb3Ig
aXMgcGVyZm9ybWFuY2Ugc3ViIHBhci4gPwoKSXQgc2VlbXMgdGhhdCBYRU4gaXMgdGhlIG9ubHkg
b3B0aW9uIHRvIGdldCA3cHJvIGFuZC9vciAxMHBybyB0byBydW4gb24gCnRoaXMgbWFjaGluZS4K
CnRoYW5rcyAhCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcK
aHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Sat Jan 06 20:21:23 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jan 2018 20:21:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eXuxB-0003iu-7H; Sat, 06 Jan 2018 20:20:29 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=plld=ea=c-home.cz=martin@srs-us1.protection.inumbo.net>)
 id 1eXY3V-000529-1u
 for xen-users@lists.xenproject.org; Fri, 05 Jan 2018 19:53:29 +0000
X-Inumbo-ID: eba6b4ce-f251-11e7-b4a6-bc764e045a96
Received: from dmz.c-home.cz (unknown [89.24.150.100])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id eba6b4ce-f251-11e7-b4a6-bc764e045a96;
 Fri, 05 Jan 2018 20:52:13 +0100 (CET)
Received: from dmz.c-home.cz (localhost [127.0.0.1])
 by dmz.c-home.cz (8.14.4+Sun/8.14.4) with ESMTP id w05JrHnt014539
 for <xen-users@lists.xenproject.org>; Fri, 5 Jan 2018 20:53:22 +0100 (CET)
Received: from localhost (martin@localhost)
 by dmz.c-home.cz (8.14.4+Sun/8.14.4/Submit) with ESMTP id w05JrHAg014536
 for <xen-users@lists.xenproject.org>; Fri, 5 Jan 2018 20:53:17 +0100 (CET)
X-Authentication-Warning: dmz.c-home.cz: martin owned process doing -bs
Date: Fri, 5 Jan 2018 20:53:17 +0100 (CET)
From: Martin Cerveny <martin@c-home.cz>
To: xen-users@lists.xenproject.org
Message-ID: <alpine.GSO.2.00.1801052044100.10534@dmz.c-home.cz>
User-Agent: Alpine 2.00 (GSO 1167 2008-08-23)
MIME-Version: 1.0
X-Mailman-Approved-At: Sat, 06 Jan 2018 20:20:27 +0000
Subject: [Xen-users] unable to shutdown (page fault in
 mwait_idle()/do_dbs_timer()/__find_next_bit())
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Martin Cerveny <M.Cerveny@computer.org>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 08:57:04 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 08:57:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYTDf-0005sw-IN; Mon, 08 Jan 2018 08:55:47 +0000
Received: from mail6.bemta6.messagelabs.com ([193.109.254.103])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <chengkunck@gmail.com>) id 1eYTDd-0005sq-Hz
 for xen-users@lists.xensource.com; Mon, 08 Jan 2018 08:55:45 +0000
Received: from [193.109.254.147] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-7.bemta-6.messagelabs.com id 7D/18-24969-012335A5;
 Mon, 08 Jan 2018 08:55:44 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrEIsWRWlGSWpSXmKPExsVyMfS6pq6AUXC
 UwVcPi63L/rA7MHps79vFHsAYxZqZl5RfkcCa8fHuIcaCH3wV77oPsTUwzuTpYuTkEBKYzijx
 ZwFbFyMXB4tAA6vEolXbmEAcCYE5rBL9K0+zgVRJCFRJXDvynQXCLpLYsLuZEcIulJj1pwHM5
 hUQlDg58wkLxFQPifNnPrGC2JwCLhLr/p0GsjmA4s4S0/dbgoTZBNQkXi9dxgxiswioSNzefQ
 VqTIDEpcX7wNYKA9Xs/rOaCcQWEVCSmL+unR3EZhZQlLjy+gIThK0p0br9N/sERsFZSK6YhSS
 1gJFpFaN6cWpRWWqRrqleUlFmekZJbmJmjq6hgZlebmpxcWJ6ak5iUrFecn7uJkZgaDIAwQ7G
 6Zf9DzFKcjApifKKOgdECfEl5adUZiQWZ8QXleakFh9ilOHgUJLgvWcQHCUkWJSanlqRlpkDj
 BKYtAQHj5II73GQNG9xQWJucWY6ROoUoz3HhTuX/jBxHNt0GUge2HMLSD6b+bqBWYglLz8vVU
 qcdx1ImwBIW0ZpHtxQWFRfYpSVEuZlBDpTiKcgtSg3swRV/hWjOAejkjCvlCHQFJ7MvBK43a+
 AzmICOuvdvkCQs0oSEVJSDYzTZVIW8K1oVr8YPffjU9X7fvzR04JnXchw5bjcwyc4eeunn3Jv
 l2zb4dOh8DBA9YJu2ZqF9t4aU/6/LGNzPGt95a24nslOATFOsWmt625znBJaKC25devvcPmyF
 +EnO9bdXrjttjXnHlf7z6xn9ov1H1lV5xoimNt05LNjYPreC4lr9Cr3xJYqsRRnJBpqMRcVJw
 IALGBkBOUCAAA=
X-Env-Sender: chengkunck@gmail.com
X-Msg-Ref: server-9.tower-27.messagelabs.com!1515401743!123897740!1
X-Originating-IP: [209.85.215.41]
X-SpamReason: No, hits=0.3 required=7.0 tests=RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 56622 invoked from network); 8 Jan 2018 08:55:43 -0000
Received: from mail-lf0-f41.google.com (HELO mail-lf0-f41.google.com)
 (209.85.215.41)
 by server-9.tower-27.messagelabs.com with AES128-GCM-SHA256 encrypted SMTP;
 8 Jan 2018 08:55:43 -0000
Received: by mail-lf0-f41.google.com with SMTP id u84so11291544lff.7
 for <xen-users@lists.xensource.com>; Mon, 08 Jan 2018 00:55:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=Vij5oMrVw+oM2taF/a3/9txKhXx4al3sK3mT47+Nkbc=;
 b=W7xnOfWZjbVZ5BsMXF/UKU/TA8eH9t9RBgrMEwSnHNPSXuZ5jybIjaqYJbZexULYTu
 YR7u5x42uBE2zzdU2x1BDotu5swBtqZeBlPCGJzLKnsEE1HeFjmkuMWmUzsiR3U+TfF2
 2D1jgEoZnwIBRPrH+T6gQULX2Vs6SLfaeUUfOe/4jY91qWfj0yk1sAUcDlKmdCEhe8jj
 9hhOrjVTTsZrGjb2xIElDD3UsiAQHwJ5CDoHRq2bxkJwI6NESuywknltpZpfP9EMgnfL
 Itk7wXh8Gc6RYts6YgP05zzvPxATD69XHg/Uw8F5AhyiUGKdZdxhbX65Yr/5PwBWBhEU
 DOnA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=Vij5oMrVw+oM2taF/a3/9txKhXx4al3sK3mT47+Nkbc=;
 b=NExToNve84DFRm7dK61kUxM7lwY09o3Iwzr20Jf85UrK1VhBsdR8SgRTqK1H47YE/O
 4Y+Z6tElIYAzBkoRz/Ya9CL3DAXdzFThZxmFmRQqF0uzhFuoatJ2iOGG+uMZwsaL1cKb
 FpdguQgT2gbwnREZldn9zpt9ib7Wjz5QGPC2z0gAV+togosCoXpk8XR+p2tykiWIXt6D
 23NI7+puc/RWh+zYxIF2Qy6VcIr4euym0PCSXx8pjtMltwP923ui4RZvHnTMn8PwmAf9
 /LY/1rgw6+vR4CKl2gUOkWUmcnBmNtfmUj1tXKS3U+p79NTuQ62smMYKMUA/JIJ59Vgy
 x4oQ==
X-Gm-Message-State: AKGB3mKTExwAT4aTMopiuZeTMpPxNu1txuQuIh9nXM2TSl/liiKDYHmZ
 gVx+Ge9lV7SUhbHPmbEj8WrFIt4ialF3e81shhdtag==
X-Google-Smtp-Source: ACJfBotbEh6nKSO/sYjOds9NnsyAOJJLRCNuROB3eaupjuYY8q89aNhUCZm8DMeX0ZqQ7Cetf3pLlh4rIo4kvVlCSKg=
X-Received: by 10.46.43.211 with SMTP id r80mr5798858ljr.90.1515401743052;
 Mon, 08 Jan 2018 00:55:43 -0800 (PST)
MIME-Version: 1.0
Received: by 10.179.93.5 with HTTP; Mon, 8 Jan 2018 00:55:12 -0800 (PST)
In-Reply-To: <91eaad0893961c0ebfbc08120c134094@grossmann-venter.com>
References: <91eaad0893961c0ebfbc08120c134094@grossmann-venter.com>
From: Kun Cheng <chengkunck@gmail.com>
Date: Mon, 8 Jan 2018 16:55:12 +0800
Message-ID: <CAO3v1VQZH7By=nBQfU+OBMng0SoJqziT_pyP47fENNA_3NPSLQ@mail.gmail.com>
To: liebrecht@grossmann-venter.com
Cc: xen-users@lists.xensource.com
Subject: Re: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 09:02:17 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 09:02:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYTJm-0006ds-Co; Mon, 08 Jan 2018 09:02:06 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=7avi=ed=randomwebstuff.com=xen@srs-us1.protection.inumbo.net>)
 id 1eYTJl-0006db-AP
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 09:02:05 +0000
X-Inumbo-ID: dd9997fa-f452-11e7-b0d7-9f685aff125f
Received: from mail1.25mail.st (unknown [206.123.115.54])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id dd9997fa-f452-11e7-b0d7-9f685aff125f;
 Mon, 08 Jan 2018 09:04:00 +0000 (UTC)
Received: from mail1.25mail.st (localhost [127.0.0.1])
 by mail1.25mail.st (Postfix) with ESMTPA id 2CCCF60452
 for <xen-users@lists.xenproject.org>; Mon,  8 Jan 2018 09:01:54 +0000 (UTC)
MIME-Version: 1.0
Date: Mon, 08 Jan 2018 22:01:54 +1300
From: Peter <xen@randomwebstuff.com>
To: xen-users@lists.xenproject.org
Message-ID: <f7c199dc929ca3380a5ef341afcedd6c@randomwebstuff.com>
X-Sender: xen@randomwebstuff.com
User-Agent: Roundcube Webmail/1.1.5
Subject: [Xen-users] DomU not starting under pvhv2
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

SGkuCgpSdW5uaW5nIFhlbiA0LjEwLjAKCkEgVk0gaXMgbm90IHN0YXJ0aW5nIHdpdGggdHlwZSA9
ICdwdmgnLiAgVGhlIFZNIHN0YXJ0cywgYnV0IGV4aXRzIHByaW9yIAp0byBhbnkgZGF0YSBiZWlu
ZyByZWFkIG9mZiB0aGUgZG9tVSBkaXNrIGltYWdlLgoKVGhlIHNhbWUgVk1zIHdvcmtzIGlmIHRo
ZSB0eXBlIGlzIGNoYW5nZWQgdG8gJ3B2Jy4KCk90aGVyIFZNcyBvbiBvdGhlciBob3N0cyAod2l0
aCB0aGUgZXhhY3Qgc2FtZSBzZXR1cCkgd29yayB3aXRoIHB2aCBmaW5lLgoKVGhlIG1haW4gZGlm
ZmVyZW5jZSBiZXR3ZWVuIGhvc3RzIHdoZXJlIHR5cGU9cHZoIGRvZXMgbm90IHdvcmsgYW5kIG9u
ZXMgCndoZXJlIGl0IGRvZXMgaXMgdGhhdCB0aGUgcHZoIGRvZXMgbm90IHdvcmsgb24gb2xkZXIg
Q1BVczoKICBJbnRlbChSKSBDb3JlKFRNKTIgRHVvIENQVSAgICAgRTQ2MDAgIEAgMi40MEdIegog
IEludGVsKFIpIFhlb24oUikgQ1BVICAgICAgICAgICBFMzExMCAgQCAzLjAwR0h6CiAgSW50ZWwo
UikgWGVvbihSKSBDUFUgICAgICAgICAgIEU1MzEwICBAIDEuNjBHSHoKICBJbnRlbChSKSBYZW9u
KFIpIENQVSAgICAgICAgICAgRTUzMjAgIEAgMS44NkdIegogIEludGVsKFIpIFhlb24oUikgQ1BV
ICAgICAgICAgICBFNTQyMCAgQCAyLjUwR0h6CiAgSW50ZWwoUikgWGVvbihSKSBDUFUgICAgICAg
ICAgIFgzMjIwICBAIDIuNDBHSHoKCgpOZXdlciBDUFVzIHNlZW0gdG8gYmUgZmluZSAoc3RhcnQg
Vk1zIHdpdGggdHlwZSA9IHB2aCk6CiAgSW50ZWwoUikgWGVvbihSKSBDUFUgRTMxMjMwIEAgMy4y
MEdIegogIEludGVsKFIpIFhlb24oUikgQ1BVIEUzLTEyMzAgVjIgQCAzLjMwR0h6CiAgSW50ZWwo
UikgWGVvbihSKSBDUFUgRTMtMTIzMCB2MyBAIDMuMzBHSHoKICBJbnRlbChSKSBYZW9uKFIpIENQ
VSBFMy0xMjMxIHYzIEAgMy40MEdIegogIEludGVsKFIpIFhlb24oUikgQ1BVIEUzLTEyNDAgdjUg
QCAzLjUwR0h6CiAgSW50ZWwoUikgWGVvbihSKSBDUFUgRTUtMjYyMCAwIEAgMi4wMEdIegogIElu
dGVsKFIpIFhlb24oUikgQ1BVIEU1LTI2MjAgdjMgQCAyLjQwR0h6CiAgSW50ZWwoUikgWGVvbihS
KSBDUFUgRTUtMjYzMCAwIEAgMi4zMEdIegogIEludGVsKFIpIFhlb24oUikgQ1BVIEU1LTI2MzAg
djIgQCAyLjYwR0h6CiAgSW50ZWwoUikgWGVvbihSKSBDUFUgICAgICAgICAgIEU1NTA2ICBAIDIu
MTNHSHoKICBJbnRlbChSKSBYZW9uKFIpIENQVSAgICAgICAgICAgRTU1MjAgIEAgMi4yN0dIegog
IEludGVsKFIpIFhlb24oUikgQ1BVICAgICAgICAgICBFNTYyMCAgQCAyLjQwR0h6CiAgSW50ZWwo
UikgWGVvbihSKSBDUFUgICAgICAgICAgIEU1NjQ1ICBAIDIuNDBHSHoKICBJbnRlbChSKSBYZW9u
KFIpIENQVSAgICAgICAgICAgWDM0NDAgIEAgMi41M0dIegoKRG9tMCBjb21tYW5kIGxpbmUgaXM6
IGRvbTBfbWF4X3ZjcHVzPTIgZG9tMF92Y3B1c19waW4gbG9nbHZsPWluZm8gCnZjcHVfbWlncmF0
aW9uX2RlbGF5PTEwMDAKCkkgc2VlIChhbGw/KSB0aGUgb2xkZXIgQ1BVcyBkb24ndCBoYXZlIFZU
LWQuICBIb3dldmVyIHNvbWUgb2YgdGhlIENQVXMgCndoZXJlIHB2aCBpcyB3b3JraW5nIGRvIG5v
dCByZXBvcnQgaHZtX2RpcmVjdGlvIGluIHhsIGluZm8gdmlydF9jYXBzIAooZS5nLiB0aGUgRTU1
MDYgc2VydmVycykgdGhvdWdoIHRoZXkgZG8gaGF2ZSBWVC1kIGF2YWlsYWJsZSBwZXIgCmFyay5p
bnRlbC5jb20uCgpBbmQgaWRlYXMgb24gd2hhdCBtYXkgYmUgc3RvcHBpbmcgdHlwZT1wdmggVk1z
IHN0YXJ0aW5nIG9uIHRob3NlIGhvc3RzPyAgCkFuZCBob3cgd2UgY291bGQgZ2V0IGl0IHdvcmtp
bmc/CgpFbHNlIHdlJ2xsIGxpa2VseSBiZSBkdW1waW5nIHNvbWUgaGFyZHdhcmUuLi4uCgpJIGRp
ZCBhIGRpZmYgb2YgeGwgaW5mbzsgeGwgZG1lc2cgYW5kIHhsIGNyZWF0ZSBzdGFydHVwIG1lc3Nh
Z2VzLiAgCkJldHdlZW4gb25lIG9mIHRoZSBub24tcHZoLWFibGUgaG9zdHMgKHRoZSAtIGxpbmUp
IGFuZCBhIGhvc3Qgd2hlcmUgcHZoIAp3b3JrcyAodGhlICsgbGluZSk6CmRpZmYgaG9zdCBvZiB4
bCAtdiBjcmVhdGUgYW5kIHhsaW5mbzoKLWh3X2NhcHMgICAgICAgICAgICAgICAgOiAKYmZlYmZi
ZmY6MDAwNGUzYmQ6MjAxMDA4MDA6MDAwMDAwMDE6MDAwMDAwMDA6MDAwMDAwMDA6MDAwMDAwMDA6
MDAwMDAwMDAKLXZpcnRfY2FwcyAgICAgICAgICAgICAgOiBodm0KK2h3X2NhcHMgICAgICAgICAg
ICAgICAgOiAKYmZlYmZiZmY6MDA5ZWUzZmQ6MmMxMDA4MDA6MDAwMDAwMDE6MDAwMDAwMDA6MDAw
MDAwMDA6MDAwMDAwMDA6MDAwMDAxMDAKK3ZpcnRfY2FwcyAgICAgICAgICAgICAgOiBodm0gaHZt
X2RpcmVjdGlvCgorbGlieGw6IGRldGFpbDogbGlieGxfZG9tLmM6MjA0Om51bWFfcGxhY2VfZG9t
YWluOiBOVU1BIHBsYWNlbWVudCAKY2FuZGlkYXRlIHdpdGggMSBub2RlcywgOCBjcHVzIGFuZCAx
NjgxOSBLQiBmcmVlIHNlbGVjdGVkCgotIChYRU4pIEVuYWJsaW5nIEFQSUMgbW9kZTogIEZsYXQu
ICBVc2luZyAyIEkvTyBBUElDcworIChYRU4pIEVuYWJsaW5nIEFQSUMgbW9kZTogIFBoeXMuICBV
c2luZyAyIEkvTyBBUElDcwoKLSAoWEVOKSBJL08gdmlydHVhbGlzYXRpb24gZGlzYWJsZWQKKyAo
WEVOKSBJbnRlbCBWVC1kIFNub29wIENvbnRyb2wgZW5hYmxlZC4KKyAoWEVOKSBJbnRlbCBWVC1k
IERvbTAgRE1BIFBhc3N0aHJvdWdoIG5vdCBlbmFibGVkLgorIChYRU4pIEludGVsIFZULWQgUXVl
dWVkIEludmFsaWRhdGlvbiBlbmFibGVkLgorIChYRU4pIEludGVsIFZULWQgSW50ZXJydXB0IFJl
bWFwcGluZyBlbmFibGVkLgorIChYRU4pIEludGVsIFZULWQgUG9zdGVkIEludGVycnVwdCBub3Qg
ZW5hYmxlZC4KKyAoWEVOKSBJbnRlbCBWVC1kIFNoYXJlZCBFUFQgdGFibGVzIG5vdCBlbmFibGVk
LgorIChYRU4pIEkvTyB2aXJ0dWFsaXNhdGlvbiBlbmFibGVkCgotKFhFTikgIC0+IFVzaW5nIG5l
dyBBQ0sgbWV0aG9kCisoWEVOKSAgLT4gVXNpbmcgb2xkIEFDSyBtZXRob2QKCiAgIChYRU4pIFZN
WDogU3VwcG9ydGVkIGFkdmFuY2VkIGZlYXR1cmVzOgorIChYRU4pICAtIEFQSUMgTU1JTyBhY2Nl
c3MgdmlydHVhbGlzYXRpb24KKyAoWEVOKSAgLSBFeHRlbmRlZCBQYWdlIFRhYmxlcyAoRVBUKQor
IChYRU4pICAtIFZpcnR1YWwtUHJvY2Vzc29yIElkZW50aWZpZXJzIChWUElEKQorIChYRU4pICAt
IFZpcnR1YWwgTk1JCisgKFhFTikgIC0gVW5yZXN0cmljdGVkIEd1ZXN0CgoKLShYRU4pIEhWTTog
SGFyZHdhcmUgQXNzaXN0ZWQgUGFnaW5nIChIQVApIG5vdCBkZXRlY3RlZAorKFhFTikgSFZNOiBI
YXJkd2FyZSBBc3Npc3RlZCBQYWdpbmcgKEhBUCkgZGV0ZWN0ZWQKCisoWEVOKSBGb3VuZCBtYXNr
ZWQgVVIgc2lnbmFsaW5nIG9uIDAwMDA6MDA6MDAuMAorKFhFTikgTWFza2VkIFVSIHNpZ25hbGlu
ZyBvbiAwMDAwOjAwOjAxLjAKKyhYRU4pIE1hc2tlZCBVUiBzaWduYWxpbmcgb24gMDAwMDowMDow
My4wCisoWEVOKSBNYXNrZWQgVVIgc2lnbmFsaW5nIG9uIDAwMDA6MDA6MDUuMAorKFhFTikgTWFz
a2VkIFVSIHNpZ25hbGluZyBvbiAwMDAwOjAwOjA3LjAKKyhYRU4pIE1hc2tlZCBWVC1kIGVycm9y
IHNpZ25hbGluZyBvbiAwMDAwOjAwOjE0LjAKCgpSZWdhcmRzLCBQZXRlcgoKX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlz
dApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0
Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Mon Jan 08 10:12:58 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 10:12:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYUPO-00066U-1F; Mon, 08 Jan 2018 10:11:58 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=boe9=ed=gmail.com=lars.kurth.xen@srs-us1.protection.inumbo.net>)
 id 1eYUPM-00065d-94
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 10:11:56 +0000
X-Inumbo-ID: 2bdc96f9-f45c-11e7-b4a6-bc764e045a96
Received: from mail-wr0-x236.google.com (unknown [2a00:1450:400c:c0c::236])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 2bdc96f9-f45c-11e7-b4a6-bc764e045a96;
 Mon, 08 Jan 2018 11:10:37 +0100 (CET)
Received: by mail-wr0-x236.google.com with SMTP id p17so10131100wre.7;
 Mon, 08 Jan 2018 02:11:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:message-id:mime-version:subject:date:in-reply-to:cc:to
 :references; bh=VCEukhWeWEqnzUfpx5uHl6zd/Ad2BpvtCIjrPTZQTnc=;
 b=Oq2+MRHUjc1ze9AJ6eqNhYZLLCX5a+WZv3m3DxrUGQMTZNQsAvXP1M0XxfH+Wo6Rnj
 //AJistXROMm8rIWWYZ4qjFgh1WFCzGyEGTCJc9O9aBBW4GAuYCMTjfA1ecWeVpyy9Z8
 tG0+rzuH2nRgfUJimxHbXcQ2fV3fvIx5HxV4xov3zoWbKMb2PenJXy1D/yqxH5KZncTy
 5LWnWMkI50MFFxDPsZxweg5OEXiqpOpbOw7gRGriItKnksIX0bZFDacqi95qLJ82gb8s
 sOcScRLwi7tgLASRV1aagEzs5ByyOZ+NsrnaTTqYuhjX1o6zXK7KL12YQ3jc+mCZMTVQ
 9p/w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:message-id:mime-version:subject:date
 :in-reply-to:cc:to:references;
 bh=VCEukhWeWEqnzUfpx5uHl6zd/Ad2BpvtCIjrPTZQTnc=;
 b=JGKMAX+kxln3YoZwfOWGrNbYMtybEzig81B0d/QiMh08FMg0qfjPa/v7+trbV3AtMx
 mW5xu7GueY5q+qv6wprhS2zXj7WpXYCcimvG/eq4ptCv5mXsKS10qWzvkkhOjMF3DVSw
 KTcrGbU/WO/oq36yxXkBlwLAYf489D9A+7kSVFLFR3pire9g+uypnEZuxDW2sBPd5me7
 LGJ9YtG7sF4wrXas51FOz18X+vjPqN7ybPWxr74cNwCivOK6bLSZTaoMvr6mBG9SlML0
 CCBPgmwT5wePh/A26wrUNTjAKTwK82zDSIEg7jOZ+/fEJj/6aQ0UpEyO+gWdTKgXCXmh
 5KGQ==
X-Gm-Message-State: AKGB3mKLeBW660P6HPazjA2ygO3Drr9Ztpn643lWsrmlpQYz7WFh8Iym
 fleO3J0YwEOnK3R74fWmQMo=
X-Google-Smtp-Source: ACJfBou5cbL37wcnTsRxGOgKG/wU00Dx+xQLk/Hrs0baEjYEqF7WIYnmWFBC2njoWN+fi6RNeCEE6g==
X-Received: by 10.223.192.76 with SMTP id c12mr9263462wrf.260.1515406312321;
 Mon, 08 Jan 2018 02:11:52 -0800 (PST)
Received: from ?IPv6:2a02:c7f:ac18:da00:ddcc:e12c:8c83:d9b2?
 ([2a02:c7f:ac18:da00:ddcc:e12c:8c83:d9b2])
 by smtp.gmail.com with ESMTPSA id b15sm10686762wrh.5.2018.01.08.02.11.51
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Mon, 08 Jan 2018 02:11:51 -0800 (PST)
From: Lars Kurth <lars.kurth.xen@gmail.com>
Message-Id: <584F1369-C4C7-429D-815B-FC3167AE3F07@gmail.com>
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Mon, 8 Jan 2018 10:11:50 +0000
In-Reply-To: <903ef3c9-f5c6-a7e8-f9c0-3961d627413a@knorrie.org>
To: Hans van Kranenburg <hans@knorrie.org>
References: <B3F5B430-F55E-446C-A7C5-7830F2CEDFCD@gmail.com>
 <903ef3c9-f5c6-a7e8-f9c0-3961d627413a@knorrie.org>
X-Mailer: Apple Mail (2.3273)
Cc: xen-devel <xen-devel@lists.xenproject.org>,
 George Dunlap <george.dunlap@citrix.com>, xen-users@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Xen Project Spectre/Meltdown FAQ
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7773929758151714471=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--===============7773929758151714471==
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_D6EAD6D7-D39D-4455-A99B-D6244034ED49"


--Apple-Mail=_D6EAD6D7-D39D-4455-A99B-D6244034ED49
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hans,
I updated the FAQ on the blog. Thank you for your input.=20
Lars

> On 5 Jan 2018, at 15:55, Hans van Kranenburg <hans@knorrie.org> wrote:
>=20
> On 01/05/2018 12:35 PM, Lars Kurth wrote:
>> Hi all, this is a repost of
>> =
https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown-faq/ =
<https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown-faq/>
>> for xen-users/xen-devel. If you have questions, please reply to this
>> thread and we will try and improve the FAQ based on questions.=20
>> Regards Lars
>=20
> Thanks for the writeup.
>=20
> The main reason for the reader to get confused is the amount of
> different combinations of situations that are possible, which all =
again
> have their own set of vulnerabilities and also their own (maybe even
> different) set of possibilities to be used as environment for =
executing
> an attack.
>=20
> So let's help them by being more explicit.
>=20
>> Google=E2=80=99s Project Zero announced several information leak
>> vulnerabilities affecting all modern superscalar processors. Details
>> can be found on their blog, and in the Xen Project Advisory 254 [1].
>> To help our users understand the impact and our next steps forward,
>> we put together the following FAQ.
>>=20
>> Note that we will update the FAQ as new information surfaces.
>>=20
>> =3D Is Xen impacted by Meltdown and Spectre? =3D
>>=20
>> There are two angles to consider for this question:
>>=20
>> * Can an untrusted guest attack the hypervisor using Meltdown or
>> Spectre?
>> * Can a guest user-space program attack a guest kernel using
>> Meltdown or Spectre?
>=20
>> Systems running Xen, like all operating systems and hypervisors, are
>> potentially affected by Spectre (referred to as SP1 and SP2 in
>> Advisory 254 [1]). For Arm Processors information, you can find which
>> processors are impacted here [2].  In general, both the hypervisor
>> and a guest kernel are vulnerable to attack via SP1 and SP2.
>>=20
>> Only Intel processors are impacted by Meltdown (referred to as SP3 in
>> Advisory 254 [1]).
>=20
>> On Intel processors, only 64-bit PV mode guests can attack Xen.
>=20
> "On Intel processors an attack at Xen using SP3 can only be done by
> 64-bit PV mode guests."
>=20
> Even if it looks super-redundant, I think keeping explicit information
> in every sentence is preferable, so they cannot be misinterpreted or
> accidentally be taken out of context.
>=20
>> Guests running in 32-bit PV mode, HVM mode, and PVH
>> mode cannot attack the hypervisor using SP3. However, in 32-bit PV
>> mode, HVM mode, and PVH mode, guest userspaces can attack guest
>> kernels using SP3; so updating guest kernels is advisable.
>=20
>> Interestingly, guest kernels running in 64-bit PV mode are not
>> vulnerable to attack using SP3, because 64-bit PV guests already run
>> in a KPTI-like mode.
>=20
> Like Juergen already mentioned, additionally: "However, keep in mind
> that a succesful attack on the hypervisor can still be used to recover
> information about the same guest from physical memory."
>=20
>> =3D Is there any risk of privilege escalation? =3D
>>=20
>> Meltdown and Spectre are, by themselves, only information leaks.
>> There is no suggestion that speculative execution can be used to
>> modify memory or cause a system to do anything it might not have done
>> already.
>>=20
>> =3D Where can I find more information? =3D
>>=20
>> We will update this blog post and Advisory 254 [1] as new information
>> becomes available. Updates will also be published on xen-announce@.
>>=20
>> We will also maintain a technical FAQ on our wiki [3] for answers to
>> more detailed technical questions that emerge on xen-devel@ and other
>> communication channels.
>>=20
>> =3D Are there any patches for the vulnerability? =3D
>>=20
>> We have prototype patches for a mitigation for Meltdown on Intel CPUs
>> and a Mitigation for SP2/CVE-2017-5715, which are functional but have
>> not undergone rigorous review and have not been backported to all
>> supported Xen Project releases.
>>=20
>> As information related to Meltdown and Spectre is now public,
>> development will continue in public on xen-devel@ and patches will be
>> posted and attached to Advisory 254 [1] as they become available in
>> the next few days.
>>=20
>> =3D Can SP1/SP2 be fixed at all? What plans are there to mitigate =
them?
>> =3D
>>=20
>> SP2 can be mitigated in two ways, both of which essentially prevent
>> speculative execution of indirect branches. The first is to flush the
>> branch prediction logic on entry into the hypervisor. This requires
>> microcode updates, which Intel and AMD are in the process of
>> preparing, as well as patches to the hypervisor which are also in
>> process and should be available soon.
>>=20
>> The second is to do indirect jumps in a way which is not subject to
>> speculative execution. This requires the hypervisor to be recompiled
>> with a compiler that contains special new features. These new
>> compiler features are also in the process of being prepared for both
>> gcc and clang, and should be available soon.
>>=20
>> SP1 is much more difficult to mitigate. We have some ideas we=E2=80=99r=
e
>> exploring, but they=E2=80=99re still at the design stage at this =
point.
>>=20
>> =3D Does Xen have any equivalent to Linux=E2=80=99s KPTI series? =3D
>>=20
>> Linux=E2=80=99s KPTI series is designed to address SP3 only.
>=20
> This one...
>=20
>> For Xen guests, only 64-bit PV guests are affected by SP3.
>=20
> ...should be more explicit. The words "affected" and "impacted" do not
> tell the reader if it's about being an attacker, or about being the
> victim and what is attacked or attacking.
>=20
> "For Xen guests, only 64-bit PV guests are able to execute a SP3 =
attack
> against the hypervisor."
>=20
>> A KPTI-like approach was
>> explored initially, but required significant ABI changes.  Instead
>> we=E2=80=99ve decided to go with an alternate approach, which is less
>> disruptive and less complex to implement. The chosen approach runs PV
>> guests in a PVH container, which ensures that PV guests continue to
>> behave as before, while providing the isolation that protects the
>> hypervisor from SP3. This works well for Xen 4.8 to Xen 4.10, which
>> is currently our priority.
>>=20
>> For Xen 4.6 and 4.7, we are evaluating several options, but we have
>> not yet finalized the best solution.
>>=20
>> =3D Devicemodel stub domains run in PV mode, so is it still more safe
>> to run device models in a stub domain than in domain 0? =3D
>>=20
>> The short answer is, yes, it is still safer to run stub domains than
>> otherwise.
>>=20
>> If an attacker can gain control of the device model running in a stub
>> domain, it can indeed attempt to use these processor vulnerabilities
>> to read information from Xen.
>>=20
>> However, if an attacker can gain control of a device model running in
>> domain 0 without deprivileging, the attacker can gain control of the
>> entire system.  Even with qemu deprivileging, the qemu process may be
>> able to execute speculative execution attacks against the
>> hypervisor.
>>=20
>> So although XSA-254 does affect device model stub domains, they are
>> still safer than not running with a stub domain.
>>=20
>> =3D What is the Xen Project=E2=80=99s plan going forward? =3D
>>=20
>> The Xen Project is working on finalizing solutions for SP3 and SP2
>> and evaluating options for SP1. If you would like to stay abreast on
>> our progress, please sign up to xen-announce@. We will update this
>> FAQ as soon as we have more news and updated information. Answers to
>> more detailed technical questions will be maintained in a technical
>> FAQ on our wiki [3]. Thank you for your patience.
>>=20
>> =3D How can I ask further questions? =3D Please respond to this =
e-mail
>> thread on xen-devel@ or xen-users@
>>=20
>> References [1] http://xenbits.xen.org/xsa/advisory-254.html [2]
>> https://developer.arm.com/support/security-update [3]
>> =
https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_Spectre_Technica=
l_FAQ
>>=20
>>=20
> _______________________________________________
>> Xen-devel mailing list Xen-devel@lists.xenproject.org =
<mailto:Xen-devel@lists.xenproject.org>=20
>> https://lists.xenproject.org/mailman/listinfo/xen-devel =
<https://lists.xenproject.org/mailman/listinfo/xen-devel>

--Apple-Mail=_D6EAD6D7-D39D-4455-A99B-D6244034ED49
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Hans,<div class=3D"">I updated the FAQ on the blog. Thank you =
for your input.&nbsp;</div><div class=3D"">Lars</div><div class=3D""><br =
class=3D""><div><blockquote type=3D"cite" class=3D""><div class=3D"">On =
5 Jan 2018, at 15:55, Hans van Kranenburg &lt;<a =
href=3D"mailto:hans@knorrie.org" class=3D"">hans@knorrie.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">On 01/05/2018 12:35 =
PM, Lars Kurth wrote:</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Hi all, this is a repost =
of<br class=3D""><a =
href=3D"https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown=
-faq/" =
class=3D"">https://blog.xenproject.org/2018/01/04/xen-project-spectremeltd=
own-faq/</a><br class=3D"">for xen-users/xen-devel. If you have =
questions, please reply to this<br class=3D"">thread and we will try and =
improve the FAQ based on questions.<span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D"">Regards =
Lars<br class=3D""></blockquote><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">Thanks for the =
writeup.</span><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">The main reason for =
the reader to get confused is the amount of</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">different combinations of situations that are =
possible, which all again</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">have their own set =
of vulnerabilities and also their own (maybe even</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">different) set of possibilities to be used as =
environment for executing</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">an =
attack.</span><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">So let's help them =
by being more explicit.</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Google=E2=80=99s Project =
Zero announced several information leak<br class=3D"">vulnerabilities =
affecting all modern superscalar processors. Details<br class=3D"">can =
be found on their blog, and in the Xen Project Advisory 254 [1].<br =
class=3D"">To help our users understand the impact and our next steps =
forward,<br class=3D"">we put together the following FAQ.<br =
class=3D""><br class=3D"">Note that we will update the FAQ as new =
information surfaces.<br class=3D""><br class=3D"">=3D Is Xen impacted =
by Meltdown and Spectre? =3D<br class=3D""><br class=3D"">There are two =
angles to consider for this question:<br class=3D""><br class=3D"">* Can =
an untrusted guest attack the hypervisor using Meltdown or<br =
class=3D"">Spectre?<br class=3D"">* Can a guest user-space program =
attack a guest kernel using<br class=3D"">Meltdown or Spectre?<br =
class=3D""></blockquote><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Systems running Xen, like =
all operating systems and hypervisors, are<br class=3D"">potentially =
affected by Spectre (referred to as SP1 and SP2 in<br class=3D"">Advisory =
254 [1]). For Arm Processors information, you can find which<br =
class=3D"">processors are impacted here [2]. &nbsp;In general, both the =
hypervisor<br class=3D"">and a guest kernel are vulnerable to attack via =
SP1 and SP2.<br class=3D""><br class=3D"">Only Intel processors are =
impacted by Meltdown (referred to as SP3 in<br class=3D"">Advisory 254 =
[1]).<br class=3D""></blockquote><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">On Intel processors, only =
64-bit PV mode guests can attack Xen.<br class=3D""></blockquote><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">"On Intel processors an attack at Xen using SP3 =
can only be done by</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">64-bit PV mode =
guests."</span><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">Even if it looks =
super-redundant, I think keeping explicit information</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">in every sentence is preferable, so they cannot =
be misinterpreted or</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">accidentally be =
taken out of context.</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Guests running in 32-bit PV =
mode, HVM mode, and PVH<br class=3D"">mode cannot attack the hypervisor =
using SP3. However, in 32-bit PV<br class=3D"">mode, HVM mode, and PVH =
mode, guest userspaces can attack guest<br class=3D"">kernels using SP3; =
so updating guest kernels is advisable.<br class=3D""></blockquote><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Interestingly, guest kernels =
running in 64-bit PV mode are not<br class=3D"">vulnerable to attack =
using SP3, because 64-bit PV guests already run<br class=3D"">in a =
KPTI-like mode.<br class=3D""></blockquote><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">Like Juergen =
already mentioned, additionally: "However, keep in mind</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">that a succesful attack on the hypervisor can =
still be used to recover</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">information about =
the same guest from physical memory."</span><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">=3D Is there any risk of =
privilege escalation? =3D<br class=3D""><br class=3D"">Meltdown and =
Spectre are, by themselves, only information leaks.<br class=3D"">There =
is no suggestion that speculative execution can be used to<br =
class=3D"">modify memory or cause a system to do anything it might not =
have done<br class=3D"">already.<br class=3D""><br class=3D"">=3D Where =
can I find more information? =3D<br class=3D""><br class=3D"">We will =
update this blog post and Advisory 254 [1] as new information<br =
class=3D"">becomes available. Updates will also be published on =
xen-announce@.<br class=3D""><br class=3D"">We will also maintain a =
technical FAQ on our wiki [3] for answers to<br class=3D"">more detailed =
technical questions that emerge on xen-devel@ and other<br =
class=3D"">communication channels.<br class=3D""><br class=3D"">=3D Are =
there any patches for the vulnerability? =3D<br class=3D""><br =
class=3D"">We have prototype patches for a mitigation for Meltdown on =
Intel CPUs<br class=3D"">and a Mitigation for SP2/CVE-2017-5715, which =
are functional but have<br class=3D"">not undergone rigorous review and =
have not been backported to all<br class=3D"">supported Xen Project =
releases.<br class=3D""><br class=3D"">As information related to =
Meltdown and Spectre is now public,<br class=3D"">development will =
continue in public on xen-devel@ and patches will be<br class=3D"">posted =
and attached to Advisory 254 [1] as they become available in<br =
class=3D"">the next few days.<br class=3D""><br class=3D"">=3D Can =
SP1/SP2 be fixed at all? What plans are there to mitigate them?<br =
class=3D"">=3D<br class=3D""><br class=3D"">SP2 can be mitigated in two =
ways, both of which essentially prevent<br class=3D"">speculative =
execution of indirect branches. The first is to flush the<br =
class=3D"">branch prediction logic on entry into the hypervisor. This =
requires<br class=3D"">microcode updates, which Intel and AMD are in the =
process of<br class=3D"">preparing, as well as patches to the hypervisor =
which are also in<br class=3D"">process and should be available soon.<br =
class=3D""><br class=3D"">The second is to do indirect jumps in a way =
which is not subject to<br class=3D"">speculative execution. This =
requires the hypervisor to be recompiled<br class=3D"">with a compiler =
that contains special new features. These new<br class=3D"">compiler =
features are also in the process of being prepared for both<br =
class=3D"">gcc and clang, and should be available soon.<br class=3D""><br =
class=3D"">SP1 is much more difficult to mitigate. We have some ideas =
we=E2=80=99re<br class=3D"">exploring, but they=E2=80=99re still at the =
design stage at this point.<br class=3D""><br class=3D"">=3D Does Xen =
have any equivalent to Linux=E2=80=99s KPTI series? =3D<br class=3D""><br =
class=3D"">Linux=E2=80=99s KPTI series is designed to address SP3 =
only.<br class=3D""></blockquote><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">This =
one...</span><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><blockquote=
 type=3D"cite" style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">For Xen guests, only 64-bit =
PV guests are affected by SP3.<br class=3D""></blockquote><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">...should be more explicit. The words "affected" =
and "impacted" do not</span><br style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">tell the reader if =
it's about being an attacker, or about being the</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">victim and what is attacked or =
attacking.</span><br style=3D"font-family: Menlo-Regular; font-size: =
11px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><br style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
float: none; display: inline !important;" class=3D"">"For Xen guests, =
only 64-bit PV guests are able to execute a SP3 attack</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D"">against the hypervisor."</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><br style=3D"font-family: Menlo-Regular; font-size: 11px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><blockquote type=3D"cite" =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" =
class=3D"">A KPTI-like approach was<br class=3D"">explored initially, =
but required significant ABI changes. &nbsp;Instead<br class=3D"">we=E2=80=
=99ve decided to go with an alternate approach, which is less<br =
class=3D"">disruptive and less complex to implement. The chosen approach =
runs PV<br class=3D"">guests in a PVH container, which ensures that PV =
guests continue to<br class=3D"">behave as before, while providing the =
isolation that protects the<br class=3D"">hypervisor from SP3. This =
works well for Xen 4.8 to Xen 4.10, which<br class=3D"">is currently our =
priority.<br class=3D""><br class=3D"">For Xen 4.6 and 4.7, we are =
evaluating several options, but we have<br class=3D"">not yet finalized =
the best solution.<br class=3D""><br class=3D"">=3D Devicemodel stub =
domains run in PV mode, so is it still more safe<br class=3D"">to run =
device models in a stub domain than in domain 0? =3D<br class=3D""><br =
class=3D"">The short answer is, yes, it is still safer to run stub =
domains than<br class=3D"">otherwise.<br class=3D""><br class=3D"">If an =
attacker can gain control of the device model running in a stub<br =
class=3D"">domain, it can indeed attempt to use these processor =
vulnerabilities<br class=3D"">to read information from Xen.<br =
class=3D""><br class=3D"">However, if an attacker can gain control of a =
device model running in<br class=3D"">domain 0 without deprivileging, =
the attacker can gain control of the<br class=3D"">entire system. =
&nbsp;Even with qemu deprivileging, the qemu process may be<br =
class=3D"">able to execute speculative execution attacks against the<br =
class=3D"">hypervisor.<br class=3D""><br class=3D"">So although XSA-254 =
does affect device model stub domains, they are<br class=3D"">still =
safer than not running with a stub domain.<br class=3D""><br class=3D"">=3D=
 What is the Xen Project=E2=80=99s plan going forward? =3D<br =
class=3D""><br class=3D"">The Xen Project is working on finalizing =
solutions for SP3 and SP2<br class=3D"">and evaluating options for SP1. =
If you would like to stay abreast on<br class=3D"">our progress, please =
sign up to xen-announce@. We will update this<br class=3D"">FAQ as soon =
as we have more news and updated information. Answers to<br =
class=3D"">more detailed technical questions will be maintained in a =
technical<br class=3D"">FAQ on our wiki [3]. Thank you for your =
patience.<br class=3D""><br class=3D"">=3D How can I ask further =
questions? =3D Please respond to this e-mail<br class=3D"">thread on =
xen-devel@ or xen-users@<br class=3D""><br class=3D"">References [1] <a =
href=3D"http://xenbits.xen.org/xsa/advisory-254.html" =
class=3D"">http://xenbits.xen.org/xsa/advisory-254.html</a> [2]<br =
class=3D""><a href=3D"https://developer.arm.com/support/security-update" =
class=3D"">https://developer.arm.com/support/security-update</a> [3]<br =
class=3D""><a =
href=3D"https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_Spectre_=
Technical_FAQ" =
class=3D"">https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_Spect=
re_Technical_FAQ</a><br class=3D""><br class=3D""><br =
class=3D""></blockquote><span style=3D"font-family: Menlo-Regular; =
font-size: 11px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; display: =
inline !important;" =
class=3D"">_______________________________________________</span><br =
style=3D"font-family: Menlo-Regular; font-size: 11px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: =
Menlo-Regular; font-size: 11px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">Xen-devel mailing list<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:Xen-devel@lists.xenproject.org" =
class=3D"">Xen-devel@lists.xenproject.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span><br class=3D""><a =
href=3D"https://lists.xenproject.org/mailman/listinfo/xen-devel" =
class=3D"">https://lists.xenproject.org/mailman/listinfo/xen-devel</a></bl=
ockquote></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_D6EAD6D7-D39D-4455-A99B-D6244034ED49--


--===============7773929758151714471==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============7773929758151714471==--


From xen-users-bounces@lists.xenproject.org Mon Jan 08 12:22:27 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 12:22:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYWQi-0004GK-OI; Mon, 08 Jan 2018 12:21:28 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=7avi=ed=randomwebstuff.com=xen@srs-us1.protection.inumbo.net>)
 id 1eYPvP-0007Zs-AL
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 05:24:43 +0000
X-Inumbo-ID: 7f2219b8-f434-11e7-b0d7-9f685aff125f
Received: from mail1.25mail.st (unknown [206.123.115.54])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 7f2219b8-f434-11e7-b0d7-9f685aff125f;
 Mon, 08 Jan 2018 05:26:37 +0000 (UTC)
Received: from mail1.25mail.st (localhost [127.0.0.1])
 by mail1.25mail.st (Postfix) with ESMTPA id A77AE6036F
 for <xen-users@lists.xenproject.org>; Mon,  8 Jan 2018 05:24:31 +0000 (UTC)
MIME-Version: 1.0
Date: Mon, 08 Jan 2018 18:24:31 +1300
From: Peter <xen@randomwebstuff.com>
To: xen-users@lists.xenproject.org
Message-ID: <9b10eb2208a0b269853a8b35e91febb0@randomwebstuff.com>
X-Sender: xen@randomwebstuff.com
User-Agent: Roundcube Webmail/1.1.5
X-Mailman-Approved-At: Mon, 08 Jan 2018 12:21:28 +0000
Subject: [Xen-users] DomU not starting under pvhv2
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 15:38:59 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 15:38:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYZUu-0004Xh-5C; Mon, 08 Jan 2018 15:38:00 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=q3yw=ed=millikin.edu=cmyers@srs-us1.protection.inumbo.net>)
 id 1eYZUs-0004Xb-Fg
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 15:37:58 +0000
X-Inumbo-ID: b8b38bdb-f489-11e7-b4a6-bc764e045a96
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:fe40::726])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTP
 id b8b38bdb-f489-11e7-b4a6-bc764e045a96;
 Mon, 08 Jan 2018 16:36:40 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=millikinedu.onmicrosoft.com; s=selector1-millikin-edu;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;
 bh=DXAhgNSln9IeYj38S1t1DDBbMsoHKJp3VlyFK5yhsPE=;
 b=Zu10ljFBHVCdOaGlLGa18Oc+UfWVkZUdKqvDynskyXUxEdSrBAOlf42MNxwduaAlI+cxHC2dSQzEXFHljuK1r8rZReqIPWAtj0xy7ZnoS3cdw4xAr0MxJvxE8LzZ59PYLHgb7jbQPexHZoqE2mqPFwk+JaG14QB7nwvV99z1Lvs=
Received: from CY4PR03MB2888.namprd03.prod.outlook.com (10.175.116.14) by
 CY4PR03MB2885.namprd03.prod.outlook.com (10.175.116.11) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id
 15.20.386.5; Mon, 8 Jan 2018 15:37:54 +0000
Received: from CY4PR03MB2888.namprd03.prod.outlook.com ([10.175.116.14]) by
 CY4PR03MB2888.namprd03.prod.outlook.com ([10.175.116.14]) with mapi id
 15.20.0386.008; Mon, 8 Jan 2018 15:37:54 +0000
From: Christopher Myers <cmyers@millikin.edu>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Thread-Topic: [Xen-users] DomU not starting under pvhv2
Thread-Index: AQHTiF9zPeIpQAh2zk+KpWbPdkNAUaNqHIWA
Date: Mon, 8 Jan 2018 15:37:54 +0000
Message-ID: <1515425867.5459.40.camel@millikin.edu>
References: <f7c199dc929ca3380a5ef341afcedd6c@randomwebstuff.com>
In-Reply-To: <f7c199dc929ca3380a5ef341afcedd6c@randomwebstuff.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is )
 smtp.mailfrom=cmyers@millikin.edu; 
x-originating-ip: [216.125.123.187]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR03MB2885;
 6:jmIxjjyKsDOrnO9jByJAOaIObj/7QwiI357ywiNxDMcftvNFa4+xAK9e5m22fBXcb3VWVN+0WiLNx6qDPIfa5E9rhR47SEnZWf7zxt11NG4e1vCrwHMpxOojNIaI9gKM5n3Eu/UPX/NHUqgpMJRnnw2u6P4zYCAo7aPWsqdfwEftT37U1rePZW7xMGa3DaG9diEQQDVyieb8yMJYLI3MK92KYuCyBH8wLBnZxHpQKu5G1rI5UdyRrf+3qVnSiLHkOpJBEqyppbNbCsANT+B0L9qztF9YoSPXzst9+2RmLlH9QnIC3kV95uJoW0QHdV1knUhTS/frypofj9bIM6aFFqEadyh5s7+KoRi3ENHyP0ID2fUSGcFtMjKtXR/XKLbp;
 5:bgkJchcoEI5AjJ6vXgtv/a2puib2wfVnUzOdQHpL8wIBhO1lEYVpKtCwQVk54CgzXycWb/r9UH9k220ewoH1FmyXNwDjvIcNs/yTBF65Zkxnl3v+pvKzVrfw0stmFaDH3bFSW+gWGwPZGheDp7iy8PYA7q6kDcWiCzh8udDHAJY=;
 24:kcMq1RGApMMBtJZ4zngRD3jhC94nh5wrmcYMBE5CDT56UJeS+1bZc4YziUGUFOY8H21DZ5F73PIpZg1ZN39scIq8iVKLQAO6dHK9QMeC/dY=;
 7:rshPYA+uqHTbVot1TbuQh/0BMvk89F1pajPUXc4CN2kAvz/sFtttV5vPMVYVHkpy8t+PvTaMVFQquKi0VF80Q27oKtz0cmtpXxfDHpYYG/dmGy2Vn/snEPP1gjHn1jumZVIQ7ERHBQqhh3aM3aER+Rf9JLzsQv6GCrEMxzKQ8YHR1XDbGQ1PODD+M1NzvDpLVxKZOZR5XNGo2WU52NSB5jJ6j5Qe55Rl9O5i8C0hWWOuTPUozuNGTGd0UsvnYCAL
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: 2b4373da-1287-40cb-8537-08d556adc94e
x-microsoft-antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(4534020)(4602075)(4627115)(8989060)(201703031133081)(201702281549075)(8990040)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020);
 SRVR:CY4PR03MB2885; 
x-ms-traffictypediagnostic: CY4PR03MB2885:
x-microsoft-antispam-prvs: <CY4PR03MB2885BD1A6A0656A500885F8AB2130@CY4PR03MB2885.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
 RULEID:(6040470)(2401047)(8121501046)(5005006)(3231023)(944501075)(3002001)(10201501046)(93006095)(93001095)(6041268)(20161123558120)(20161123562045)(20161123560045)(20161123564045)(201703131423095)(201702281529075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011);
 SRVR:CY4PR03MB2885; BCL:0; PCL:0; RULEID:(100000803101)(100110400095);
 SRVR:CY4PR03MB2885; 
x-forefront-prvs: 054642504A
x-forefront-antispam-report: SFV:NSPM;
 SFS:(10019020)(39840400004)(39380400002)(366004)(376002)(346002)(396003)(377424004)(199004)(54524002)(189003)(24454002)(5640700003)(66066001)(316002)(3280700002)(6246003)(966005)(68736007)(575784001)(75432002)(478600001)(59450400001)(76176011)(8936002)(6512007)(6306002)(99286004)(6436002)(2950100002)(6916009)(3660700001)(86362001)(53936002)(2900100001)(786003)(103116003)(97736004)(77096006)(25786009)(229853002)(5660300001)(14454004)(81166006)(7736002)(81156014)(8676002)(6486002)(36756003)(6506007)(88552002)(2501003)(105586002)(3846002)(2351001)(106356001)(2906002)(305945005)(6116002)(102836004)(19627235001);
 DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR03MB2885;
 H:CY4PR03MB2888.namprd03.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords;
 A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: millikin.edu does not designate
 permitted sender hosts)
x-microsoft-antispam-message-info: tyzF7ad8k9jcoZebCTXQDVb5w8gLIrpPT9d/YYadaeEOKZ7KDJoXkEvTyKhC0P5FqxpQ1G7zdin1uHJ11pvxpg==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-ID: <B9B23314100F5F4CA44F14F945605BD9@namprd03.prod.outlook.com>
MIME-Version: 1.0
X-OriginatorOrg: millikin.edu
X-MS-Exchange-CrossTenant-Network-Message-Id: 2b4373da-1287-40cb-8537-08d556adc94e
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jan 2018 15:37:54.8552 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3f28404b-d933-44fd-a4f4-1bfd98db881f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2885
Subject: Re: [Xen-users] DomU not starting under pvhv2
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

LS0tLS1CRUdJTiBQR1AgU0lHTkVEIE1FU1NBR0UtLS0tLQ0KSGFzaDogU0hBNTEyDQoNCg0KDQpP
biBNb24sIDIwMTgtMDEtMDggYXQgMjI6MDEgKzEzMDAsIFBldGVyIHdyb3RlOg0KPiBIaS4NCj4g
DQo+IFJ1bm5pbmcgWGVuIDQuMTAuMA0KPiANCj4gQSBWTSBpcyBub3Qgc3RhcnRpbmcgd2l0aCB0
eXBlID0gJ3B2aCcuICBUaGUgVk0gc3RhcnRzLCBidXQgZXhpdHMgcHJpb3IgDQo+IHRvIGFueSBk
YXRhIGJlaW5nIHJlYWQgb2ZmIHRoZSBkb21VIGRpc2sgaW1hZ2UuDQo+IA0KPiBUaGUgc2FtZSBW
TXMgd29ya3MgaWYgdGhlIHR5cGUgaXMgY2hhbmdlZCB0byAncHYnLg0KPiANCj4gT3RoZXIgVk1z
IG9uIG90aGVyIGhvc3RzICh3aXRoIHRoZSBleGFjdCBzYW1lIHNldHVwKSB3b3JrIHdpdGggcHZo
IGZpbmUuDQo+IA0KPiBUaGUgbWFpbiBkaWZmZXJlbmNlIGJldHdlZW4gaG9zdHMgd2hlcmUgdHlw
ZT1wdmggZG9lcyBub3Qgd29yayBhbmQgb25lcyANCj4gd2hlcmUgaXQgZG9lcyBpcyB0aGF0IHRo
ZSBwdmggZG9lcyBub3Qgd29yayBvbiBvbGRlciBDUFVzOg0KPiAgIEludGVsKFIpIENvcmUoVE0p
MiBEdW8gQ1BVICAgICBFNDYwMCAgQCAyLjQwR0h6DQo+ICAgSW50ZWwoUikgWGVvbihSKSBDUFUg
ICAgICAgICAgIEUzMTEwICBAIDMuMDBHSHoNCj4gICBJbnRlbChSKSBYZW9uKFIpIENQVSAgICAg
ICAgICAgRTUzMTAgIEAgMS42MEdIeg0KPiAgIEludGVsKFIpIFhlb24oUikgQ1BVICAgICAgICAg
ICBFNTMyMCAgQCAxLjg2R0h6DQo+ICAgSW50ZWwoUikgWGVvbihSKSBDUFUgICAgICAgICAgIEU1
NDIwICBAIDIuNTBHSHoNCj4gICBJbnRlbChSKSBYZW9uKFIpIENQVSAgICAgICAgICAgWDMyMjAg
IEAgMi40MEdIeg0KPiANCj4gDQo+IE5ld2VyIENQVXMgc2VlbSB0byBiZSBmaW5lIChzdGFydCBW
TXMgd2l0aCB0eXBlID0gcHZoKToNCj4gICBJbnRlbChSKSBYZW9uKFIpIENQVSBFMzEyMzAgQCAz
LjIwR0h6DQo+ICAgSW50ZWwoUikgWGVvbihSKSBDUFUgRTMtMTIzMCBWMiBAIDMuMzBHSHoNCj4g
ICBJbnRlbChSKSBYZW9uKFIpIENQVSBFMy0xMjMwIHYzIEAgMy4zMEdIeg0KPiAgIEludGVsKFIp
IFhlb24oUikgQ1BVIEUzLTEyMzEgdjMgQCAzLjQwR0h6DQo+ICAgSW50ZWwoUikgWGVvbihSKSBD
UFUgRTMtMTI0MCB2NSBAIDMuNTBHSHoNCj4gICBJbnRlbChSKSBYZW9uKFIpIENQVSBFNS0yNjIw
IDAgQCAyLjAwR0h6DQo+ICAgSW50ZWwoUikgWGVvbihSKSBDUFUgRTUtMjYyMCB2MyBAIDIuNDBH
SHoNCj4gICBJbnRlbChSKSBYZW9uKFIpIENQVSBFNS0yNjMwIDAgQCAyLjMwR0h6DQo+ICAgSW50
ZWwoUikgWGVvbihSKSBDUFUgRTUtMjYzMCB2MiBAIDIuNjBHSHoNCj4gICBJbnRlbChSKSBYZW9u
KFIpIENQVSAgICAgICAgICAgRTU1MDYgIEAgMi4xM0dIeg0KPiAgIEludGVsKFIpIFhlb24oUikg
Q1BVICAgICAgICAgICBFNTUyMCAgQCAyLjI3R0h6DQo+ICAgSW50ZWwoUikgWGVvbihSKSBDUFUg
ICAgICAgICAgIEU1NjIwICBAIDIuNDBHSHoNCj4gICBJbnRlbChSKSBYZW9uKFIpIENQVSAgICAg
ICAgICAgRTU2NDUgIEAgMi40MEdIeg0KPiAgIEludGVsKFIpIFhlb24oUikgQ1BVICAgICAgICAg
ICBYMzQ0MCAgQCAyLjUzR0h6DQo+IA0KPiBEb20wIGNvbW1hbmQgbGluZSBpczogZG9tMF9tYXhf
dmNwdXM9MiBkb20wX3ZjcHVzX3BpbiBsb2dsdmw9aW5mbyANCj4gdmNwdV9taWdyYXRpb25fZGVs
YXk9MTAwMA0KPiANCj4gSSBzZWUgKGFsbD8pIHRoZSBvbGRlciBDUFVzIGRvbid0IGhhdmUgVlQt
ZC4gIEhvd2V2ZXIgc29tZSBvZiB0aGUgQ1BVcyANCj4gd2hlcmUgcHZoIGlzIHdvcmtpbmcgZG8g
bm90IHJlcG9ydCBodm1fZGlyZWN0aW8gaW4geGwgaW5mbyB2aXJ0X2NhcHMgDQo+IChlLmcuIHRo
ZSBFNTUwNiBzZXJ2ZXJzKSB0aG91Z2ggdGhleSBkbyBoYXZlIFZULWQgYXZhaWxhYmxlIHBlciAN
Cj4gYXJrLmludGVsLmNvbS4NCg0KDQpPdXQgb2YgY3VyaW9zaXR5LCBqdXN0IGJlY2F1c2UgdGhl
IENQVSBzdXBwb3J0cyBWVC1kIGRvZXNuJ3QgbWVhbiB0aGF0DQpldmVyeXRoaW5nIGVsc2UgaW4g
dGhlIHN5c3RlbSBkb2VzIG9yIHRoYXQgaXQncyBlbmFibGVkIGluIHRoZSBCSU9TLiBNeQ0Kd29y
ayBjb21wdXRlciwgZm9yIGV4YW1wbGUsIHN1cHBvcnRzIGl0LCBidXQgSSBoYWQgdG8gZXhwbGlj
aXRseSBlbmFibGUNCml0IGZpcnN0LiBTbyBqdXN0IHNvbWV0aGluZyB0byBkb3VibGUtY2hlY2su
DQoNCg0KPiANCkFuZCBpZGVhcyBvbiB3aGF0IG1heSBiZSBzdG9wcGluZyB0eXBlPXB2aCBWTXMg
c3RhcnRpbmcgb24gdGhvc2UgaG9zdHM/ICANCj4gQW5kIGhvdyB3ZSBjb3VsZCBnZXQgaXQgd29y
a2luZz8NCj4gDQo+IEVsc2Ugd2UnbGwgbGlrZWx5IGJlIGR1bXBpbmcgc29tZSBoYXJkd2FyZS4u
Li4NCj4gDQo+IEkgZGlkIGEgZGlmZiBvZiB4bCBpbmZvOyB4bCBkbWVzZyBhbmQgeGwgY3JlYXRl
IHN0YXJ0dXAgbWVzc2FnZXMuICANCj4gQmV0d2VlbiBvbmUgb2YgdGhlIG5vbi1wdmgtYWJsZSBo
b3N0cyAodGhlIC0gbGluZSkgYW5kIGEgaG9zdCB3aGVyZSBwdmggDQo+IHdvcmtzICh0aGUgKyBs
aW5lKToNCj4gZGlmZiBob3N0IG9mIHhsIC12IGNyZWF0ZSBhbmQgeGxpbmZvOg0KPiAtaHdfY2Fw
cyAgICAgICAgICAgICAgICA6IA0KPiBiZmViZmJmZjowMDA0ZTNiZDoyMDEwMDgwMDowMDAwMDAw
MTowMDAwMDAwMDowMDAwMDAwMDowMDAwMDAwMDowMDAwMDAwMA0KPiAtdmlydF9jYXBzICAgICAg
ICAgICAgICA6IGh2bQ0KPiAraHdfY2FwcyAgICAgICAgICAgICAgICA6IA0KPiBiZmViZmJmZjow
MDllZTNmZDoyYzEwMDgwMDowMDAwMDAwMTowMDAwMDAwMDowMDAwMDAwMDowMDAwMDAwMDowMDAw
MDEwMA0KPiArdmlydF9jYXBzICAgICAgICAgICAgICA6IGh2bSBodm1fZGlyZWN0aW8NCj4gDQo+
ICtsaWJ4bDogZGV0YWlsOiBsaWJ4bF9kb20uYzoyMDQ6bnVtYV9wbGFjZV9kb21haW46IE5VTUEg
cGxhY2VtZW50IA0KPiBjYW5kaWRhdGUgd2l0aCAxIG5vZGVzLCA4IGNwdXMgYW5kIDE2ODE5IEtC
IGZyZWUgc2VsZWN0ZWQNCj4gDQo+IC0gKFhFTikgRW5hYmxpbmcgQVBJQyBtb2RlOiAgRmxhdC4g
IFVzaW5nIDIgSS9PIEFQSUNzDQo+ICsgKFhFTikgRW5hYmxpbmcgQVBJQyBtb2RlOiAgUGh5cy4g
IFVzaW5nIDIgSS9PIEFQSUNzDQo+IA0KPiAtIChYRU4pIEkvTyB2aXJ0dWFsaXNhdGlvbiBkaXNh
YmxlZA0KPiArIChYRU4pIEludGVsIFZULWQgU25vb3AgQ29udHJvbCBlbmFibGVkLg0KPiArIChY
RU4pIEludGVsIFZULWQgRG9tMCBETUEgUGFzc3Rocm91Z2ggbm90IGVuYWJsZWQuDQo+ICsgKFhF
TikgSW50ZWwgVlQtZCBRdWV1ZWQgSW52YWxpZGF0aW9uIGVuYWJsZWQuDQo+ICsgKFhFTikgSW50
ZWwgVlQtZCBJbnRlcnJ1cHQgUmVtYXBwaW5nIGVuYWJsZWQuDQo+ICsgKFhFTikgSW50ZWwgVlQt
ZCBQb3N0ZWQgSW50ZXJydXB0IG5vdCBlbmFibGVkLg0KPiArIChYRU4pIEludGVsIFZULWQgU2hh
cmVkIEVQVCB0YWJsZXMgbm90IGVuYWJsZWQuDQo+ICsgKFhFTikgSS9PIHZpcnR1YWxpc2F0aW9u
IGVuYWJsZWQNCj4gDQo+IC0oWEVOKSAgLT4gVXNpbmcgbmV3IEFDSyBtZXRob2QNCj4gKyhYRU4p
ICAtPiBVc2luZyBvbGQgQUNLIG1ldGhvZA0KPiANCj4gICAgKFhFTikgVk1YOiBTdXBwb3J0ZWQg
YWR2YW5jZWQgZmVhdHVyZXM6DQo+ICsgKFhFTikgIC0gQVBJQyBNTUlPIGFjY2VzcyB2aXJ0dWFs
aXNhdGlvbg0KPiArIChYRU4pICAtIEV4dGVuZGVkIFBhZ2UgVGFibGVzIChFUFQpDQo+ICsgKFhF
TikgIC0gVmlydHVhbC1Qcm9jZXNzb3IgSWRlbnRpZmllcnMgKFZQSUQpDQo+ICsgKFhFTikgIC0g
VmlydHVhbCBOTUkNCj4gKyAoWEVOKSAgLSBVbnJlc3RyaWN0ZWQgR3Vlc3QNCj4gDQo+IA0KPiAt
KFhFTikgSFZNOiBIYXJkd2FyZSBBc3Npc3RlZCBQYWdpbmcgKEhBUCkgbm90IGRldGVjdGVkDQo+
ICsoWEVOKSBIVk06IEhhcmR3YXJlIEFzc2lzdGVkIFBhZ2luZyAoSEFQKSBkZXRlY3RlZA0KPiAN
Cj4gKyhYRU4pIEZvdW5kIG1hc2tlZCBVUiBzaWduYWxpbmcgb24gMDAwMDowMDowMC4wDQo+ICso
WEVOKSBNYXNrZWQgVVIgc2lnbmFsaW5nIG9uIDAwMDA6MDA6MDEuMA0KPiArKFhFTikgTWFza2Vk
IFVSIHNpZ25hbGluZyBvbiAwMDAwOjAwOjAzLjANCj4gKyhYRU4pIE1hc2tlZCBVUiBzaWduYWxp
bmcgb24gMDAwMDowMDowNS4wDQo+ICsoWEVOKSBNYXNrZWQgVVIgc2lnbmFsaW5nIG9uIDAwMDA6
MDA6MDcuMA0KPiArKFhFTikgTWFza2VkIFZULWQgZXJyb3Igc2lnbmFsaW5nIG9uIDAwMDA6MDA6
MTQuMA0KPiANCj4gDQo+IFJlZ2FyZHMsIFBldGVyDQo+IA0KPiBfX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiBYZW4tdXNlcnMgbWFpbGluZyBsaXN0DQo+
IFhlbi11c2Vyc0BsaXN0cy54ZW5wcm9qZWN0Lm9yZw0KPiANCg0KDQo+IGh0dHBzOi8vbGlzdHMu
eGVucHJvamVjdC5vcmcvbWFpbG1hbi9saXN0aW5mby94ZW4tdXNlcnMNCi0tLS0tQkVHSU4gUEdQ
IFNJR05BVFVSRS0tLS0tDQoNCmlRRXlCQUVCQ2dBZEZpRUU3R00vRHVsOFdTV243Mm9kUTFuRW80
REZDSVVGQWxwVGtFc0FDZ2tRUTFuRW80REYNCkNJV0hDUWY0bUIxVTFWK0owajFDMURyN1p6M1FH
N2RjMXJiOGlBS0VqRFFDVE1QNEk1dmtlOWpmN2ZEVU5GYUYNCkpJM0MzU0V6WTFYZWVkUnN5d2Vk
cWxrWktraytSSzBXNUIwclVrcEVHYmpvcEdqNFZ1SUI3RzhxbnRXVW5USFQNCjVrVW1QQXRRd2pS
SFB5cFpJSEZLN3VocUkvM1dnc25VeTg1ZHU3NnErM016WEU0TkZ4K2hRMHdNYmhDV3JjeUsNCnBV
b1doK2RGeWJzSlBSQUVHSHY0RlNVd1ZPZHpORG9jS2JxUERkMTF3TEcvTHczdHFndVJDYkhVaE93
eWNVbFANCnZJS0QyMUV0WjU5SXE1b3lxb0drSVpRTUlLQTdKUnJ0U012bXdIU1MyZ3A0cCs0dFlw
SzMyQTlVV0lKajFqWkQNCmllWDZsN2QxY3dueHA4OUQyTXd0SVlmN3BkbmoNCj1SdnhZDQotLS0t
LUVORCBQR1AgU0lHTkFUVVJFLS0tLS0NCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fClhlbi11c2VycyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJzQGxpc3RzLnhl
bnByb2plY3Qub3JnCmh0dHBzOi8vbGlzdHMueGVucHJvamVjdC5vcmcvbWFpbG1hbi9saXN0aW5m
by94ZW4tdXNlcnM=

From xen-users-bounces@lists.xenproject.org Mon Jan 08 17:42:04 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 17:42:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYbPz-0000U5-QR; Mon, 08 Jan 2018 17:41:03 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=7avi=ed=randomwebstuff.com=xen@srs-us1.protection.inumbo.net>)
 id 1eYbPy-0000Tx-Gk
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 17:41:02 +0000
X-Inumbo-ID: e96032f4-f49a-11e7-b4a6-bc764e045a96
Received: from mail1.25mail.st (unknown [206.123.115.54])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id e96032f4-f49a-11e7-b4a6-bc764e045a96;
 Mon, 08 Jan 2018 18:39:43 +0100 (CET)
Received: from mail1.25mail.st (localhost [127.0.0.1])
 by mail1.25mail.st (Postfix) with ESMTPA id EF76A604A2
 for <xen-users@lists.xenproject.org>; Mon,  8 Jan 2018 17:40:56 +0000 (UTC)
MIME-Version: 1.0
Date: Tue, 09 Jan 2018 06:40:56 +1300
From: Peter <xen@randomwebstuff.com>
To: xen-users@lists.xenproject.org
Message-ID: <bba7f67db1f18ff1d2f5ef09a1347cb6@randomwebstuff.com>
X-Sender: xen@randomwebstuff.com
User-Agent: Roundcube Webmail/1.1.5
Subject: Re: [Xen-users] DomU not starting under pvhv2
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 18:19:28 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 18:19:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYc0M-00040n-7A; Mon, 08 Jan 2018 18:18:38 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=9340=ed=gmail.com=dunlapg@srs-us1.protection.inumbo.net>)
 id 1eYbkH-0002iV-VH
 for xen-users@lists.xen.org; Mon, 08 Jan 2018 18:02:01 +0000
X-Inumbo-ID: d7852926-f49d-11e7-b4a6-bc764e045a96
Received: from mail-qk0-x236.google.com (unknown [2607:f8b0:400d:c09::236])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id d7852926-f49d-11e7-b4a6-bc764e045a96;
 Mon, 08 Jan 2018 19:00:42 +0100 (CET)
Received: by mail-qk0-x236.google.com with SMTP id r8so10938099qke.6
 for <xen-users@lists.xen.org>; Mon, 08 Jan 2018 10:01:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:sender:in-reply-to:references:from:date:message-id
 :subject:to:cc;
 bh=jZIs8vrLa7SDtW4ixvlRVN7sT0X0kPzCA+QOzQnpo3U=;
 b=D/GRvzoKpQJ+7eyRrO0gpmmXafDbwBEfCZytsTDAO1PdqTKQTdlX6bEi1Py4wmRGma
 2+Dxsh3UYhmarbtI2w66n3exsr+hFjkpUJlKjbIoaeVNXFBhJhxE4U/255Mbx31B+xWd
 FRDsXKdZbBncFXiGYh+V6sUMtgtL4fOfIDEq7p7JIhWqrMW3CUbVsAtUSs+pUkY4esOI
 dvIec29VK3kR6EiNebuiQdyFAH8A7piD3dlA+BFOr8y/SqolGyY3uChi1XRhxWvUd0mE
 4f4KRJqb2tYfMRgUWhTiN4+ntEWSLq7CnHLdp5wZSZ6ReavnjXxIo6JX+eCusAfyin5T
 JYBw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
 :date:message-id:subject:to:cc;
 bh=jZIs8vrLa7SDtW4ixvlRVN7sT0X0kPzCA+QOzQnpo3U=;
 b=W3AMhvmUT2nzpZsLCeIVjZnoB83w29n4bjjSMF2iD1KjkNLORexeyHLWAfcg/BN2Dx
 R3Q6MwqZROIrtDhiJtj++21hoHW1ZpkrMwFZrnb8cmnpwa5gOcjHlqGgkhgsy3GcyF4E
 Bd9GApKUvIZ26TW1Qb4omDri1RXefOyC5qWvRrId90GbnCC/eoZmiejgljZsNouM8oFA
 HVgYTsD15UBYPgDKPVb+RPVSyGSSFmKa6h4MzYpgPZFdz3F3CIDWRNL9DAc+tDj/L6PP
 Dp1hHQUrMd1Y5rR0t8pyQv4BWQtPESX3uCxHsxxpKS9lkh6DnRGm7YGw90CXZUta11Pr
 alXA==
X-Gm-Message-State: AKwxytefvq/1UkoO5SKJ4KXoq0Vz04shHE0mLlkgGamiDHZ4+seIRPti
 UnkFT/XRnGZLdvyTbxXK4WLNmd8GOgBn+5Wehls=
X-Google-Smtp-Source: ACJfBosKbYXfP+YJPYmmeEJ6LiWaLYaF99bM7/JCRZgFYQdovB3Ii8ggRbc00JHGcSh1H2g0HxrKwI6UCbGypzLWUuk=
X-Received: by 10.55.102.87 with SMTP id a84mr3459357qkc.75.1515434518272;
 Mon, 08 Jan 2018 10:01:58 -0800 (PST)
MIME-Version: 1.0
Received: by 10.55.81.87 with HTTP; Mon, 8 Jan 2018 10:01:57 -0800 (PST)
In-Reply-To: <9b10eb2208a0b269853a8b35e91febb0@randomwebstuff.com>
References: <9b10eb2208a0b269853a8b35e91febb0@randomwebstuff.com>
From: George Dunlap <dunlapg@umich.edu>
Date: Mon, 8 Jan 2018 18:01:57 +0000
X-Google-Sender-Auth: BXuKj1yDNQ1cUfZXVU6aB4vBFT0
Message-ID: <CAFLBxZard4U6D_xZ3YhRM0URKJzgQNscJhuw7x+7qN7+NFutYw@mail.gmail.com>
To: Peter <xen@randomwebstuff.com>
Bcc: xen-users@lists.xen.org
X-Mailman-Approved-At: Mon, 08 Jan 2018 18:18:37 +0000
Cc: xen-devel <xen-devel@lists.xenproject.org>,
 =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Subject: Re: [Xen-users] DomU not starting under pvhv2
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 18:19:28 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 18:19:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYc0M-000410-I2; Mon, 08 Jan 2018 18:18:38 +0000
Received: from mail6.bemta3.messagelabs.com ([195.245.230.39])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <admin@grossmann-venter.com>) id 1eYbr5-00030y-FA
 for xen-users@lists.xensource.com; Mon, 08 Jan 2018 18:09:03 +0000
Received: from [85.158.137.68] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-4.bemta-3.messagelabs.com id 3A/63-23666-DB3B35A5;
 Mon, 08 Jan 2018 18:09:01 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrBKsWRWlGSWpSXmKPExsVyzKyuTHfv5uA
 og70N4hZbl/1hd2D02N63iz2AMYo1My8pvyKBNWPCjJ9sBctEK1p7G9gbGKcIdjFycQgJ/GaU
 mLjpMmMXIycHr4CgxMmZT1hAbGYBK4nujTuZIGx5ie1v5zCD2CwCqhJb/u0As9kEFCT+zfgJ1
 isioCix5XEjWL2wgJrE7j+rmSBmOks8aZ7JCmJLCKhILHm4mR3EFhVQluh6doQdIq4m8WjDMi
 g7SuLv7qssELaFxJWXr4DmcwDZRhL/FvhChK0kfh9eA1ViKfH47XkmCDtBYsmCk1C2j8T2a+e
 gargkDkydxwZh80scnn2PEcLmk9i3cANUXFti25/HbBMYxWchhcQspJCYhRQSCxiZVzGqF6cW
 laUW6ZrpJRVlpmeU5CZm5ugaGhjr5aYWFyemp+YkJhXrJefnbmIExlA9AwPjDsYrbc6HGCU5m
 JREeUWdA6KE+JLyUyozEosz4otKc1KLDzHKcHAoSfDu2hQcJSRYlJqeWpGWmQOMZpi0BAePkg
 jvRZA0b3FBYm5xZjpE6hRjIMexTZf/MHFMm3cbSD66cRdIPpv5uoGZY97xb03MHC3/t7Qwcxz
 6faiVWYglLz8vVUqcdyLIIAGQQRmleXBrYAnqEqOslDAvIwMDgxBPQWpRbmYJqvwrRnEORiVh
 3mUgU3gy80rgrnkFdCgT0KHv9gWCHFqSiJCSamDUm719a0/lpc+/d/2YsHFehNnLn0eFui7qT
 zGun9xn7ygb11+fu04++13sadeOuEfh63SfJ37JjvqX8LeLa97asNUuxj5C25qF9Xcb5rvl2i
 gtaP96VU46t8d33c5ondikoEITBmXV68c7+v9uf9x7e6fkk5l/637z+OTLLIjOfBDg4b+tiU+
 JpTgj0VCLuag4EQCJEIwbSwMAAA==
X-Env-Sender: admin@grossmann-venter.com
X-Msg-Ref: server-4.tower-31.messagelabs.com!1515434939!63965695!1
X-Originating-IP: [198.54.126.118]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 44894 invoked from network); 8 Jan 2018 18:09:01 -0000
Received: from server54-2.web-hosting.com (HELO server54-2.web-hosting.com)
 (198.54.126.118)
 by server-4.tower-31.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted
 SMTP; 8 Jan 2018 18:09:01 -0000
Received: from [::1] (port=57106 helo=server54.web-hosting.com)
 by server54.web-hosting.com with esmtpa (Exim 4.89)
 (envelope-from <admin@grossmann-venter.com>) id 1eYbqu-0020yT-Dq
 for xen-users@lists.xensource.com; Mon, 08 Jan 2018 13:08:58 -0500
MIME-Version: 1.0
Date: Mon, 08 Jan 2018 13:08:52 -0500
From: admin@grossmann-venter.com
To: xen-users@lists.xensource.com
Message-ID: <26901a7fb7a0ac6d93231bd1376a75d8@grossmann-venter.com>
X-Sender: admin@grossmann-venter.com
User-Agent: Roundcube Webmail/1.2.7
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - server54.web-hosting.com
X-AntiAbuse: Original Domain - lists.xensource.com
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - grossmann-venter.com
X-Get-Message-Sender-Via: server54.web-hosting.com: authenticated_id:
 admin@grossmann-venter.com
X-Authenticated-Sender: server54.web-hosting.com: admin@grossmann-venter.com
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-From-Rewrite: unmodified, already matched
X-Mailman-Approved-At: Mon, 08 Jan 2018 18:18:37 +0000
Subject: Re: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 18:57:35 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 18:57:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYcbg-0007mN-5I; Mon, 08 Jan 2018 18:57:12 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=qncb=ed=syndicat.com=nd@srs-us1.protection.inumbo.net>)
 id 1eYcbe-0007mH-LK
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 18:57:10 +0000
X-Inumbo-ID: 8b8f8bbc-f4a5-11e7-b4a6-bc764e045a96
Received: from mail.syndicat.com (unknown [62.146.89.62])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 8b8f8bbc-f4a5-11e7-b4a6-bc764e045a96;
 Mon, 08 Jan 2018 19:55:51 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=syndicat.com; s=x; h=Message-ID:From:To:Subject:Content-Transfer-Encoding:
 Content-Type:MIME-Version:References:In-Reply-To:Date:Sender:Reply-To:Cc:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=dqljR3MyYiOJMhAQe/h/CKR76nqZeEMLZcEGCxrG6u8=; b=G+Wfoc8UHsncx7Et425p6TDGD/
 lk0Vw6laIGP7mNFFvNOjwH5iiPu7oiVGyLmEZo0Koxq5GuAJ03QPgolucwDoqzEtJpo9Rxw8dcdnB
 7LfdopVpBmv4BByjpEB+iV3GAz4yzEAUdHfZw7kbj8QbNzyO5n+UgRRRkFAzkdZuzBE4=;
Received: from localhost.syndicat.com ([127.0.0.1] helo=localhost)
 by mail.syndicat.com with esmtp (Syndicat.com PostHamster 14.5 4.89)
 (envelope-from <nd@syndicat.com>) id 1eYcba-00044j-Ez
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 19:57:06 +0100
X-Virus-Scanned: amavisd-new at syndicat.com
Received: from mail.syndicat.com ([127.0.0.1])
 by localhost (mail.syndicat.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id nZdJSAOkRM2m for <xen-users@lists.xenproject.org>;
 Mon,  8 Jan 2018 19:57:06 +0100 (CET)
Received: from pd9ebba1d.dip0.t-ipconnect.de ([217.235.186.29]
 helo=[192.168.222.19])
 by mail.syndicat.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128)
 (Syndicat.com PostHamster 14.5 4.89)
 (envelope-from <nd@syndicat.com>) id 1eYcbZ-0004QZ-V4
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 19:57:05 +0100
Date: Mon, 08 Jan 2018 19:57:04 +0100
User-Agent: K-9 Mail for Android
In-Reply-To: <26901a7fb7a0ac6d93231bd1376a75d8@grossmann-venter.com>
References: <26901a7fb7a0ac6d93231bd1376a75d8@grossmann-venter.com>
MIME-Version: 1.0
Autocrypt: addr=nd@syndicat.com; keydata=mQINBFQNjEQBEAC/a7f62hIud7FFCpriT9+
 YOVkZd3U4T4U5nkFdNubKr9hkWVnMsz78w98XDIDnmeH5mE9ldknVJF2WTk/MlZts6lGRmeBS5Ol
 K0FybdxzrXsP/e8B2e/jeuHq/Gze7Lr1IG4TmvNZd72NmpfGfi6yZNGHgrwG9hAdU8DIWGVlD+zQ
 TWm6n6Ili77/uWWyEpfddjcrY1RBiWmWMNfzUIlkLYtl3EMK2Lc7NHPP7hh770yc3ykHSzPhVfQm
 cbR6jos3q5EK6nSqhvffvyl3ZBvYBtpzFsBPbqyNs1NRvtPp3yPARWPnyJVSdoN9aLE2UDz1cn07
 f2mMBjPsLUgO9tgZQYZYZzWhxl5RoOGFPI1HGcWy2UvlRuATsXceNxe1YDbbYMmdsOJvnxU5HgFC
 DmLcbF1u8CsnTNFF764k2LBAo6RrUOj83SFeBZurA9yNL+sZyd1pRK/U/AbdWJQQFVFlXh81Fi/6
 Ix09I4zqDdi9wG7jjO1qdfDpze0TM/WG+ajIjwmLyFhSEqNpb/Z1iMMkPcOPEY5kT9X/kJTDarzq
 /o2lMfCWPBkH6OZWhtsoqIJ9qKw1f3CjJ25ql/UWbSJnN87K2pHBCJfVOR0bKKpYTujNX9v4Kvnl
 6IgJ6c3Ne7kmk9HUvVNXagFxhPT/tOx6xqG5RdH4kFsfM6lRcaYJHtQARAQABtDtOaWVscyBEZXR
 0ZW5iYWNoIChTeW5kaWNhdCBJVCAmIEludGVybmV0KSA8bmRAc3luZGljYXQuY29tPokCQQQTAQo
 AKwIbAwUJHDIEgAgLCgkIBwIEAwQVCAMCBBYDAgECHgECF4AFAlQNrJ0CGQEACgkQDbtaiEWSKkT
 FbhAAmU6OQOcIpKot2ifYiy7Hp4glt8MHjOYd7VkpN5kl7+r3q7EpT1u8ila9OFBo/Ekn6RRT1fj
 ZR4kPVyLVR8YkapbfdcEQdG+Xno17UWGQKmZIgrDqplPtSLLPVw22KWo3RPySJqpcXAjz+NKqzde
 0gE4x+xGeeX2BPTOW2yupH1R0lVZRu7BWW3AhGir9JuODjXfhq+DEpd+A05/NGKcCQgwypJS6ZQk
 72zObd4o54UnvvOZgC8Y+XmovCIa2aqfq7aBfX3qY79DuuFuWJZE571UBF1KCfPgIvakO1pX85fu
 kyxxSn/GoDWBxpJ88NDLe0G6RFLd2CRgSJIMtfd42qZPAFg6fiiXUqZknLgNfzg/BaqPOnhDbKhG
 gAtkfzuKefh6B0rr/LmuwbqGUmaT2idz5nT96ucJAlf1ZCLe+KqcbErnMp69mSEXsk97dNMYtHxH
 39WkuujfKBnrpq5+B8eUGI8pJDI4EGL4pWSbjhiFcIHODRRRIcI6+VQwJYsHPx7OQpVFCx3bb0SR
 u38JPRjX+I1TtqEj/XykXCr/c1Y9nSPapF+NX3+eHMqxihGqlzU8CHwv3fXZL8c7NrwGYK/KL00s
 bSvNBjDKex+0mT8RIRCADtI+OgVO0/TTDXOSIl4eL9qBsQm2rjCpNY8e0PddMPSFjy5ow3f20q3U
 OLOe5Ag0EVA2MRAEQAK3VkiGcfuCP8NpUw2zHKUD2Y/0IlTIpYNoBqq1XaQgjTLPyvnKi8keBLHY
 ahJlzq+4KqW6UfduxxGyksfMp9KveEU3OP436T2c8cVQQIgPVJwrHZBh2nFRsLJ2q1pKw5LDgQpN
 cyab/gDGqUYUzL22+XZRhT7C4NruOPwM66HPYoucbgYLilzyTN3/737HbZEGBhgfoTQg2axcNeC+
 Xa3d59dAIwVL7hZFIFWxJzvi1slJrBuPjCbxssGJx3q8BaOFM5XfDcmEUolEexgRaqgB5K2+wd0R
 JLE0ejQQYyVbBu2imBA/3c1Ioho0bGSDYKUKJoxjA6jxbghMjTjFMFqJmUo2PqDjHUMzB7UdMCHf
 avVWnkogjmtczDFG5qBKdjjNu3Ro3MFnkszJPAR5+Jr3Zhh2vibAsepKiP0iqnwUvj46IECkkFB1
 3gytsz26ai8I6fwQ+HjZSQARwa460QrICidM8VE68WXJaG+LTeUFGohjvjB4xWwg2iEe0DZLCsQ/
 1AozscFvRqa/2O2av0faffb5RQltl6Xj1RVgkxO5q+0/ooECNmUSEFnkLso7mrlf8ySqlngY34iB
 77jJx8eHK7zSyc+dBNkjCXEjeJV+808BYEQGyTvT82TdDa4aSuBHIRsB7yI6LrTrhcw3xFL9sQQD
 frGfIN6y7aufEX6ptABEBAAGJAiUEGAEKAA8FAlQNjEQCGwwFCRwyBIAACgkQDbtaiEWSKkQjoBA
 AqBeJWZu0u7MvHIc8mHBl4RGxuOtj/XHV8XA6zrHO39FxjZOnFcV4CxcUHVoG8XRSlOtjqXSD7MP
 b0SGPTa4p2lu3HU30vO8ymOIfkRhwEcNFFBxXu2dbNU6uvSIeRivNMsIBI/rNYay/6phSWv/AQTo
 x1tWUUGmrAHZf1XNHyV+mIunyeZAzKQ6cgceDaZWg41MZ70BeCuEX4pDKSfHZjPw94RJsb1OOfYY
 0A3lpSbkKmW0qQlmU/t1QdE7xDsYOWQz08/AyHqypLppNJNqUE209f8RE0TskZh7NlX/Ee/GTFMf
 +M73aO6+xzJ+FDDcOZd+ctpfHI4dxWgakX3eOxING09QwMiYDL8bqZoXFwyO/ITvhiVMkxpLN6wT
 lYZMe90wMpwUv1fbdlKeCVQyyFDeNeLMGdjkBt7yDNOxA3jre/mjBdoEqq7N3rRUbRsbvJnvQY8e
 rn8tj4blTP9O67ifOjRMtXCyvCoTTL7hHC5Ativ3OlqqyV+go+8UxpOHia8e4VnLzfABC7roTNZB
 GLoGPDJ1QT6NTFkc/qgp/3RYGGdrrDIOGhmXzvr7U1W1pJKuTRrEMqPNkpeZ0ljReuW+1+v24W5N
 T0/kgRdKNny+Mg1xDFC9B+q7FLviz7lZsArp8KHmzn6QQF9yLSBrYHBSBHVb6/xGwHNSoW9rCgVU
 =
To: xen-users@lists.xenproject.org
From: "Niels Dettenbach (Syndicat IT & Internet)" <nd@syndicat.com>
Message-ID: <4DF78732-F218-4531-94C2-EF4A33F2C9FA@syndicat.com>
X-Report-Abuse-To: abuse@syndicat.com (see
 https://www.syndicat.com/kontakt/kontakte/)
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.syndicat.com
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Sender Address Domain - syndicat.com
Subject: Re: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 19:28:56 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 19:28:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYd63-00023z-Sv; Mon, 08 Jan 2018 19:28:35 +0000
Received: from mail6.bemta6.messagelabs.com ([193.109.254.103])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <tasket@posteo.net>) id 1eYd62-00023q-Cs
 for xen-users@lists.xensource.com; Mon, 08 Jan 2018 19:28:34 +0000
Received: from [193.109.254.147] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-5.bemta-6.messagelabs.com id 26/3E-17593-166C35A5;
 Mon, 08 Jan 2018 19:28:33 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrOIsWRWlGSWpSXmKPExsWy01nFUTfhWHC
 UwaX/1hZbl/1hd2D02N63iz2AMYo1My8pvyKBNWPRxTaWgg9cFVMaprM2MD7m6GLk5BAS2MMo
 MeWbXBcjFweLwGQWid0d/awgjpDAJEaJaceWsYNUCQuoSez+s5oJxBYRsJVonXaCBaLbWeLGw
 RYwm01AXWLHuZNgNbxANT2fvzGD2CwCKhIvfl9gBbFFBcIlnt59yQhRIyhxcuYTsF5OAReJL+
 fPsIHYzAJmEvM2P2SGsMUlbj2ZzwRhy0tsfzuHeQIj/ywk7bOQtMxC0jILScsCRpZVjBrFqUV
 lqUW6hmZ6SUWZ6RkluYmZObqGBmZ6uanFxYnpqTmJScV6yfm5mxiBAcoABDsY728MOMQoycGk
 JMor6hwQJcSXlJ9SmZFYnBFfVJqTWnyIUYaDQ0mCV+5ocJSQYFFqempFWmYOMFZg0hIcPEoiv
 K+PAKV5iwsSc4sz0yFSpxgDOY5tuvyHiePEpBtActvXW0Dy0Y27QPLZzNcNzBzzjn9rYuY49P
 tQK7MQS15+XqqUOO82kEECIIMySvPg1sDi/xKjrJQwLyPQ4UI8BalFuZklqPKvGMU5GJWEec1
 AruXJzCuBu+YV0KFMQIe+2xcIcmhJIkJKqoHRvY3rwvGt/g9E9mzexCRmbLD42O5dMiwXbCZd
 c3U47ZR4pK9nZt3fe9G9eYwCRzXci/cX7u0O8DcvPyA4+2HG/xjbI6sP3+UKXWy54M8ZTuXqh
 SvXCZW/idnmOTWkTY5jp690b2cTa/W55jmB97nPLrhaojN78Rbx7WuTdx4T3W5/bdrfWzIxSi
 zFGYmGWsxFxYkAvS5NaPoCAAA=
X-Env-Sender: tasket@posteo.net
X-Msg-Ref: server-7.tower-27.messagelabs.com!1515439712!119297697!1
X-Originating-IP: [185.67.36.65]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 48436 invoked from network); 8 Jan 2018 19:28:32 -0000
Received: from mout01.posteo.de (HELO mout01.posteo.de) (185.67.36.65)
 by server-7.tower-27.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted
 SMTP; 8 Jan 2018 19:28:32 -0000
Received: from submission (posteo.de [89.146.220.130]) 
 by mout01.posteo.de (Postfix) with ESMTPS id 5AAC320E7B
 for <xen-users@lists.xensource.com>; Mon,  8 Jan 2018 20:28:31 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.net; s=2017;
 t=1515439712; bh=v9TxPmPj5TlpFxeFCOwedftTxJ7IpZypEErL1yRbzho=;
 h=Subject:To:From:Date:From;
 b=UDxrsauVxfGNxLS4RJh6fQ9nmW5DYDF2czXTl9UQ0+1quyQaAA2rO3f7uCGhveAp4
 UbVNcSXOpypcA4vzcpWstZv2BKYgJkvqmA0egbd96AU3PfqHujKXQ0czULopZf29ki
 f65HKZTIhNL85gA/BWLlsfdcUW/17uf0rrBLhPgJNn2UOizhtDpSekULchLECIJT/Q
 p5nvEcieCOLGaP/kYqYCLazIJ9hDcAsMzNmS80xkW2W4twQ9srZ7YiGnsxxAc16x0Z
 uZw04M3M78rNzxEjmurWFMOTGNoaR9wI7EuEvBxlpjBYIOpui5bItwP8gccNSZMFOS
 PF0fUNYuSceGA==
Received: from customer (localhost [127.0.0.1])
 by submission (posteo.de) with ESMTPSA id 3zFlgL4Dw3z9rxL;
 Mon,  8 Jan 2018 20:28:29 +0100 (CET)
To: admin@grossmann-venter.com, xen-users@lists.xensource.com
References: <26901a7fb7a0ac6d93231bd1376a75d8@grossmann-venter.com>
From: Chris Laprise <tasket@posteo.net>
Message-ID: <29c0738e-adf9-531f-8f94-086ee1017772@posteo.net>
Date: Mon, 8 Jan 2018 14:28:27 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <26901a7fb7a0ac6d93231bd1376a75d8@grossmann-venter.com>
Content-Language: en-US
Subject: Re: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 08 19:28:56 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 19:28:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYd5o-00023S-Hq; Mon, 08 Jan 2018 19:28:20 +0000
Received: from mail6.bemta6.messagelabs.com ([193.109.254.103])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <lmark.stone@reliablenetworks.com>)
 id 1eYcFb-00066V-FM
 for xen-users@lists.xensource.com; Mon, 08 Jan 2018 18:34:23 +0000
Received: from [85.158.143.35] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-6.bemta-6.messagelabs.com id 3F/C0-27001-EA9B35A5;
 Mon, 08 Jan 2018 18:34:22 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupik+JIrShJLcpLzFFi42K5cedvv+6ancF
 RBn8WCVtsXfaH3YHRY3vfLvYAxijWzLyk/IoE1owra34zFXx7wFhxYcpi9gbG/ZcYuxi5OIQE
 FjJKnH7wmwnC2cso8XFOAytcpudnO1sXIyeHhICuxO7ey2xwVVsevGQHSQgJrGeUOLyVCcRmE
 dCSeHblCZjNJmAh8fnbcTBbREBO4tv0ZWCDmAUUJa68vgAW5xUIlDi/bQHYHE4BF4kv58+wQc
 x0lrhxsIUFxBYWUJPY/Wc1VL2gxMmZT1gg5kRL7LoGMUdCwFvi9qIjrBC7pCV2dBxlh7D1JCb
 938s+gVF4FpL2WUjaIWx1iT/zLjFD2NoSyxa+hrIjJPZMPA5kcwDZahLLWpUwlZhI3JrXzgJR
 4iBxqLN2FtSTU7ofskPYthJT5rxiWcDIvYpRvTi1qCy1SNdSL6koMz2jJDcxM0fX0MBMLze1u
 DgxPTUnMalYLzk/dxMjMFYZgGAH491NAYcYJTmYlER5RZ0DooT4kvJTKjMSizPii0pzUosPMW
 pwcAh0/p70kVGKJS8/L1VJgld1R3CUkGBRanpqRVpmDjCZwJRKcPAoifD+2w6U5i0uSMwtzky
 HSJ1iTOaY0HT5DxPHsU0gcsHJ20Dy0Y27QHLDTRC5D0w+m/m6gZlj2tXWJmaOece/AclDvw+1
 MguBbZYS59UD2SwAMjqjNA9uMSyJXmKUlRLmZQR6S4inILUoN7MEVf4VozgHo5IwrwfIFJ7Mv
 BK4+14Bnc4EdPq7fYEgp5ckIqSkGhg1fIsvirIdPKU109T6dP6aKktPjjn/+eziJwtuPBVy3J
 zxVw8D11zRm6HTFYOXiXpG3XwmqFpm0fNbe8OVk2t/cgVyT5K6l8TJ+ufsxg+P8nzOvLnwZh6
 bzzz9DL/K3+tnbrt39pfAi4SoF063Ql6+a+Rkt9kw3TrnxdR1tyY43Hfc3VPz8+BpJZbijERD
 Leai4kQAl/afvp0DAAA=
X-Env-Sender: lmark.stone@reliablenetworks.com
X-Msg-Ref: server-3.tower-21.messagelabs.com!1515436459!85885543!1
X-Originating-IP: [216.220.253.143]
X-SpamReason: No, hits=0.1 required=7.0 tests=HTML_50_60,HTML_MESSAGE
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 13654 invoked from network); 8 Jan 2018 18:34:19 -0000
Received: from zmail.otelcotel.com (HELO zmail.otelcotel.com) (216.220.253.143)
 by server-3.tower-21.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted
 SMTP; 8 Jan 2018 18:34:19 -0000
Received: from localhost (localhost.localdomain [127.0.0.1])
 by zmail.otelcotel.com (Postfix) with ESMTP id D162E2EE0E67;
 Mon,  8 Jan 2018 13:34:17 -0500 (EST)
Received: from zmail.otelcotel.com ([127.0.0.1])
 by localhost (zmail.otelcotel.com [127.0.0.1]) (amavisd-new, port 10032)
 with ESMTP id zUgzhC-i3dNL; Mon,  8 Jan 2018 13:34:17 -0500 (EST)
Received: from localhost (localhost.localdomain [127.0.0.1])
 by zmail.otelcotel.com (Postfix) with ESMTP id A69582EE0EAD;
 Mon,  8 Jan 2018 13:34:17 -0500 (EST)
X-Virus-Scanned: amavisd-new at otelcotel.com
Received: from zmail.otelcotel.com ([127.0.0.1])
 by localhost (zmail.otelcotel.com [127.0.0.1]) (amavisd-new, port 10026)
 with ESMTP id C_aVtx8Ml6in; Mon,  8 Jan 2018 13:34:17 -0500 (EST)
Received: from zmail.otelcotel.com (zmail.otelcotel.com [192.168.175.160])
 by zmail.otelcotel.com (Postfix) with ESMTP id 686D32EE0E67;
 Mon,  8 Jan 2018 13:34:17 -0500 (EST)
Date: Mon, 8 Jan 2018 13:34:17 -0500 (EST)
From: "L. Mark Stone" <lmark.stone@reliablenetworks.com>
To: admin@grossmann-venter.com
Message-ID: <139076704.647493.1515436457301.JavaMail.zimbra@reliablenetworks.com>
In-Reply-To: <26901a7fb7a0ac6d93231bd1376a75d8@grossmann-venter.com>
References: <26901a7fb7a0ac6d93231bd1376a75d8@grossmann-venter.com>
MIME-Version: 1.0
X-Mailer: Zimbra 8.6.0_GA_1211 (ZimbraWebClient - GC63 (Mac)/8.6.0_GA_1211)
Thread-Topic: Xen Questions
Thread-Index: 5llntDxXXQimR/mnJbgId9G4R/bR7A==
X-Mailman-Approved-At: Mon, 08 Jan 2018 19:28:19 +0000
Cc: xen-users@lists.xensource.com
Subject: Re: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2799288631587674888=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============2799288631587674888==
Content-Type: multipart/alternative; 
	boundary="----=_Part_647491_323898600.1515436457297"

------=_Part_647491_323898600.1515436457297
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Xen Project (not Citrix) downloads are here: https://www.xenproject.org/dow=
nloads/xen-archives.html=20

Linux Distro Information is here: https://wiki.xen.org/wiki/Xen_Project_Sof=
tware_Overview#Host_and_Guest_Install=20

Hope that helps,=20
Mark=20
___________________________________________________________=20
A Message From... L. Mark Stone, General Manager=20

"Uptime. All the time." =C2=AE www.reliablenetworks.com=20

Sixteen Years In Business! 2003 - 2018!=20

92 Oak Street | Portland, ME 04101 | ( 207) 772-5678=20
Citrix XenApp/XenDesktop Hosting | SOC 2 Type II Audit=20
Zimbra Groupware | Mission-Critical Cl oud Hosting=20

This email may contain information that is privileged and confidential.=20
If you suspect that you were not intended to receive it, please delete=20
it and notify us as soon as possible. Thank you.=20

> From: admin@grossmann-venter.com
> To: xen-users@lists.xensource.com
> Sent: Monday, January 8, 2018 1:08:52 PM
> Subject: Re: [Xen-users] Xen Questions

> Thank you for the response.
> It seems like XEN might help me a lot due to your response.

> I started installing Xenserver and it chokes at "select video modes" and
> the Xen installer just hangs hard. No luck.

> Since I can install about every linux distro on this machine it is not
> an issue with the machine itself, this must be a Citrix issue, so I wont
> entertain you with Citrix issues here.

> Is there any linux distro with a built in XEN kernel from which I can
> install windows and maybe two other linux distros in order that I dont
> have to use Citrix's ISO ?.

> The online information is confusing and I always gets to Citrix's isos
> looking for the purely community Xen distribution.

> Thanks

> Kun Cheng wrote:
> > 2018-01-06 12:59 GMT+08:00 <liebrecht@grossmann-venter.com>:
> >> See sections labeled QUESTION. The other text is to understand the
> >> questions
> >> and background.

> >> I never had reason to consider Xen as I dual boot operating systems as
> >> needed.
> >> Now I am seemingly forced to use Xen and I want to find out if it can
> >> do
> >> what I want.
> >> This is for personal use and not commercial.

> >> I have a 24 core 64GB mem. rackserver that needs to run windows and
> >> linux.
> >> Linux does just fine sees, all 24 cores all memory (even my old FC7
> >> distro)
> >> I used for numerical programming for studies long ago,

> >> Windows is another can of worms.
> >> It seems that Windows 7&10 Professional will do two processors each of
> >> 12
> >> cores from the specifications.
> >> However, there is NO WAY Windows 7 or 10 will install on this server.

> >> QUESTION: Does Microsoft detect it is a rackserver and then
> >> intentionally
> >> prevent the install forcing you to buy Windows server ?
> > No, usually Windows installation should see it as a generic machine,
> > nothing related to 'rackserver' will be exposed.
> >> Both 7 and 10 fails after the first reboot during install.
> >> I dont particularly want to use windows server as I need the bells and
> >> whistles of Windows 7 and 10 which server doesnt have.

> >> It seems a hypervisor like XEN is the only way around the windows
> >> conundrum
> >> as I can fool t to to look like a normal pc running it virtually.

> >> QUESTION:
> >> How does Firewire and USB perform in XEN when hosting Windows ? Is
> >> there any
> >> lack of USB/Firewire support or is performance sub par. ?
> > Pretty good in my case, I haven't found any serious issues in my daily
> > use.
> >> It seems that XEN is the only option to get 7pro and/or 10pro to run
> >> on this
> >> machine.

> >> thanks !


> >> _______________________________________________
> >> Xen-users mailing list
> >> Xen-users@lists.xenproject.org
> >> https://lists.xenproject.org/mailman/listinfo/xen-users


> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users

------=_Part_647491_323898600.1515436457297
Content-Type: multipart/related; 
	boundary="----=_Part_647492_1166117304.1515436457297"

------=_Part_647492_1166117304.1515436457297
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"font-family: arial, helvetica, sans-serif; font-s=
ize: 12pt; color: #000000"><div>Xen Project (not Citrix) downloads are here=
:&nbsp;https://www.xenproject.org/downloads/xen-archives.html</div><div><br=
 data-mce-bogus=3D"1"></div><div>Linux Distro Information is here:&nbsp;htt=
ps://wiki.xen.org/wiki/Xen_Project_Software_Overview#Host_and_Guest_Install=
</div><div><br data-mce-bogus=3D"1"></div><div>Hope that helps,</div><div>M=
ark</div><div data-marker=3D"__SIG_PRE__"><div>____________________________=
_______________________________</div><div><strong>A Message From...&nbsp; L=
. Mark Stone, General Manager</strong></div><div><strong></strong><br></div=
><div><img src=3D"cid:63de3f5840ee2e8689fdc75d0ce2b9039b1f9408@zimbra" data=
-mce-src=3D"https://zmail.otelcotel.com/home/mark.stone@reliablenetworks.co=
m/Briefcase/RelNet_Logo_300x60.png" doc=3D"Briefcase/RelNet_Logo_300x60.png=
"></div><div><div><span size=3D"2" style=3D"font-size: small;" data-mce-sty=
le=3D"font-size: small;"><em>"Uptime. &nbsp;All the time." </em><span size=
=3D"3" style=3D"font-size: medium;" data-mce-style=3D"font-size: medium;">=
=C2=AE&nbsp;&nbsp;&nbsp; <span color=3D"#999999" size=3D"2" style=3D"color:=
 #999999; font-size: small;" data-mce-style=3D"color: #999999; font-size: s=
mall;"><a href=3D"http://www.reliablenetworks.com" data-mce-href=3D"http://=
www.reliablenetworks.com">www.reliablenetworks.com</a></span></span></span>=
</div><p style=3D"margin: 0px;" data-mce-style=3D"margin: 0px;"><i style=3D=
"color: rgb(255, 102, 0); background-color: rgb(255, 255, 255); font-size: =
small; text-decoration: underline;" data-mce-style=3D"color: #ff6600; backg=
round-color: #ffffff; font-size: small; text-decoration: underline;"></i><b=
r></p><p style=3D"margin: 0px;" data-mce-style=3D"margin: 0px;"><i style=3D=
"color: #ff6600; background-color: #ffffff; font-size: small; text-decorati=
on: underline;" data-mce-style=3D"color: #ff6600; background-color: #ffffff=
; font-size: small; text-decoration: underline;">Sixteen&nbsp;Years In Busi=
ness!&nbsp; 2003 - 2018!</i></p><p style=3D"margin: 0px;" data-mce-style=3D=
"margin: 0px;"><span size=3D"2" style=3D"font-size: small;" data-mce-style=
=3D"font-size: small;"><br></span><span size=3D"2" style=3D"color: #333333;=
 font-size: small;" data-mce-style=3D"color: #333333; font-size: small;">92=
 Oak Street&nbsp; &nbsp;| &nbsp; Portland, ME 04101 &nbsp; | &nbsp; (<a onc=
lick=3D"window.top.Com_Zimbra_Phone.unsetOnbeforeunload()" href=3D"callto:+=
1207%29%20772-5678" data-mce-href=3D"callto:+1207%29%20772-5678">207) 772-5=
678</a></span></p><div><span size=3D"2" style=3D"font-size: small;" data-mc=
e-style=3D"font-size: small;">&nbsp;</span></div><div><span size=3D"2" styl=
e=3D"font-size: small;" data-mce-style=3D"font-size: small;"><span size=3D"=
2" style=3D"font-size: small;" data-mce-style=3D"font-size: small;"><span c=
olor=3D"#ff6600" style=3D"color: #ff6600;" data-mce-style=3D"color: #ff6600=
;">Citrix XenApp/XenDesktop Hosting</span>&nbsp; |&nbsp; <span color=3D"#ff=
6600" style=3D"color: #ff6600;" data-mce-style=3D"color: #ff6600;">SOC 2 Ty=
pe II Audit </span><br><span color=3D"#ff6600" style=3D"color: #ff6600;" da=
ta-mce-style=3D"color: #ff6600;"><i>Zimbra</i></span><span color=3D"#ff6600=
" style=3D"color: #ff6600;" data-mce-style=3D"color: #ff6600;"> Groupware</=
span>&nbsp; |&nbsp; <span color=3D"#ff6600" style=3D"color: #ff6600;" data-=
mce-style=3D"color: #ff6600;">Mission-Critical Cl</span><span color=3D"#ff6=
600" style=3D"color: #ff6600;" data-mce-style=3D"color: #ff6600;">oud Hosti=
ng&nbsp; </span><br></span></span></div><div><br></div><div><span size=3D"2=
" style=3D"font-size: small;" data-mce-style=3D"font-size: small;">This ema=
il may contain information that is privileged and confidential.<br>If you s=
uspect that you were not intended to receive it, please delete<br>it and no=
tify us as soon as possible. Thank you.</span></div><div><span size=3D"2" s=
tyle=3D"font-size: small;" data-mce-style=3D"font-size: small;"><br data-mc=
e-bogus=3D"1"></span></div><div><span size=3D"2" style=3D"font-size: small;=
" data-mce-style=3D"font-size: small;"><br data-mce-bogus=3D"1"></span></di=
v></div></div><br><hr id=3D"zwchr" data-marker=3D"__DIVIDER__"><div data-ma=
rker=3D"__HEADERS__"><blockquote style=3D"border-left: 2px solid #1010FF; m=
argin-left: 5px; padding-left: 5px; color: #000; font-weight: normal; font-=
style: normal; text-decoration: none; font-family: Helvetica,Arial,sans-ser=
if; font-size: 12pt;" data-mce-style=3D"border-left: 2px solid #1010FF; mar=
gin-left: 5px; padding-left: 5px; color: #000; font-weight: normal; font-st=
yle: normal; text-decoration: none; font-family: Helvetica,Arial,sans-serif=
; font-size: 12pt;"><b>From: </b>admin@grossmann-venter.com<br><b>To: </b>x=
en-users@lists.xensource.com<br><b>Sent: </b>Monday, January 8, 2018 1:08:5=
2 PM<br><b>Subject: </b>Re: [Xen-users] Xen Questions<br></blockquote></div=
><div data-marker=3D"__QUOTED_TEXT__"><blockquote style=3D"border-left: 2px=
 solid #1010FF; margin-left: 5px; padding-left: 5px; color: #000; font-weig=
ht: normal; font-style: normal; text-decoration: none; font-family: Helveti=
ca,Arial,sans-serif; font-size: 12pt;" data-mce-style=3D"border-left: 2px s=
olid #1010FF; margin-left: 5px; padding-left: 5px; color: #000; font-weight=
: normal; font-style: normal; text-decoration: none; font-family: Helvetica=
,Arial,sans-serif; font-size: 12pt;">Thank you for the response.<br>It seem=
s like XEN might help me a lot due to your response.<br><br>I started insta=
lling Xenserver and it chokes at "select video modes" and <br>the Xen insta=
ller just hangs hard. No luck.<br><br>Since I can install about every linux=
 distro on this machine it is not <br>an issue with the machine itself, thi=
s must be a Citrix issue, so I wont <br>entertain you with Citrix issues he=
re.<br><br>Is there any linux distro with a built in XEN kernel from which =
I can <br>install windows and maybe two other linux distros in order that I=
 dont <br>have to use Citrix's ISO ?.<br><br>The online information is conf=
using and I always gets to Citrix's isos <br>looking for the purely communi=
ty Xen distribution.<br><br><br>Thanks<br><br><br><br>Kun Cheng wrote:<br>&=
gt; 2018-01-06 12:59 GMT+08:00 &nbsp;&lt;liebrecht@grossmann-venter.com&gt;=
:<br>&gt;&gt; See sections labeled QUESTION. The other text is to understan=
d the <br>&gt;&gt; questions<br>&gt;&gt; and background.<br>&gt;&gt; <br>&g=
t;&gt; I never had reason to consider Xen as I dual boot operating systems =
as<br>&gt;&gt; needed.<br>&gt;&gt; Now I am seemingly forced to use Xen and=
 I want to find out if it can <br>&gt;&gt; do<br>&gt;&gt; what I want.<br>&=
gt;&gt; This is for personal use and not commercial.<br>&gt;&gt; <br>&gt;&g=
t; I have a 24 core 64GB mem. rackserver that needs to run windows and <br>=
&gt;&gt; linux.<br>&gt;&gt; Linux does just fine sees, all 24 cores all mem=
ory (even my old FC7 <br>&gt;&gt; distro)<br>&gt;&gt; I used for numerical =
programming for studies long ago,<br>&gt;&gt; <br>&gt;&gt; Windows is anoth=
er can of worms.<br>&gt;&gt; It seems that Windows 7&amp;10 Professional wi=
ll do two processors each of <br>&gt;&gt; 12<br>&gt;&gt; cores from the spe=
cifications.<br>&gt;&gt; However, there is NO WAY Windows 7 or 10 will inst=
all on this server.<br>&gt;&gt; <br>&gt;&gt; QUESTION: Does Microsoft detec=
t it is a rackserver and then <br>&gt;&gt; intentionally<br>&gt;&gt; preven=
t the install forcing you to buy Windows server ?<br>&gt; No, usually Windo=
ws installation should see it as a generic machine,<br>&gt; nothing related=
 to 'rackserver' will be exposed.<br>&gt;&gt; Both 7 and 10 fails after the=
 first reboot during install.<br>&gt;&gt; I dont particularly want to use w=
indows server as I need the bells and<br>&gt;&gt; whistles of Windows 7 and=
 10 which server doesnt have.<br>&gt;&gt; <br>&gt;&gt; It seems a hyperviso=
r like XEN is the only way around the windows <br>&gt;&gt; conundrum<br>&gt=
;&gt; as I can fool t to to look like a normal pc running it virtually.<br>=
&gt;&gt; <br>&gt;&gt; QUESTION:<br>&gt;&gt; How does Firewire and USB perfo=
rm in XEN when hosting Windows ? Is <br>&gt;&gt; there any<br>&gt;&gt; lack=
 of USB/Firewire support or is performance sub par. ?<br>&gt; Pretty good i=
n my case, I haven't found any serious issues in my daily <br>&gt; use.<br>=
&gt;&gt; It seems that XEN is the only option to get 7pro and/or 10pro to r=
un <br>&gt;&gt; on this<br>&gt;&gt; machine.<br>&gt;&gt; <br>&gt;&gt; thank=
s !<br>&gt;&gt; <br>&gt;&gt; <br>&gt;&gt; _________________________________=
______________<br>&gt;&gt; Xen-users mailing list<br>&gt;&gt; Xen-users@lis=
ts.xenproject.org<br>&gt;&gt; https://lists.xenproject.org/mailman/listinfo=
/xen-users<br>&gt; <br><br><br>____________________________________________=
___<br>Xen-users mailing list<br>Xen-users@lists.xenproject.org<br>https://=
lists.xenproject.org/mailman/listinfo/xen-users<br></blockquote></div></div=
></body></html>
------=_Part_647492_1166117304.1515436457297
Content-Type: image/png; name=RelNet_Logo_300x60.png
Content-Disposition: attachment; filename=RelNet_Logo_300x60.png
Content-Transfer-Encoding: base64
Content-ID: <63de3f5840ee2e8689fdc75d0ce2b9039b1f9408@zimbra>
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------=_Part_647492_1166117304.1515436457297--

------=_Part_647491_323898600.1515436457297--


--===============2799288631587674888==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============2799288631587674888==--


From xen-users-bounces@lists.xenproject.org Mon Jan 08 20:22:37 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 20:22:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYdvq-0006jp-FN; Mon, 08 Jan 2018 20:22:06 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <doa379@gmail.com>) id 1eYdvp-0006jd-3F
 for xen-users@lists.xensource.com; Mon, 08 Jan 2018 20:22:05 +0000
Received: from [85.158.139.211] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-7.bemta-5.messagelabs.com id 2F/58-08891-BE2D35A5;
 Mon, 08 Jan 2018 20:22:03 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrEIsWRWlGSWpSXmKPExsXiVRukq/v6UnC
 UwZmdMhZbl/1hd2D02N63iz2AMYo1My8pvyKBNaN75wbGgtlMFQvOPWBrYHzG2MXIxSEkMI1R
 4uObZSxdjJwcLAJzWCV+3TABSUgI7GCVaD3wiBEkISGQJXHh3E/WLkYOIDtN4vBGfYhwtcTr+
 8vYQWwhAXmJ+4tfs0EMPcskcfd0E1iviICixJbHjUwgNhtQ0eFNC1hBbGEBfYmjrxrAZvIK2E
 icn6QHcYOKxNEd25lBbFGBcIlrba1gNq+AoMTJmU/A7mQWMJOYt/khM4QtLtH0ZSUrhC0vsf3
 tHOYJjEKzkLTMQtIyC0nLLCQtCxhZVjFqFKcWlaUW6Rob6CUVZaZnlOQmZuboGhqY6uWmFhcn
 pqfmJCYV6yXn525iBIZ5PQMD4w7GCav8DjFKcjApifKKOgdECfEl5adUZiQWZ8QXleakFh9il
 OHgUJLgZQbGjZBgUWp6akVaZg4w4mDSEhw8SiK8ty8CpXmLCxJzizPTIVKnGC05bjy8/oeJY9
 +eW0Dy2czXDcxCLHn5ealS4rw3QBoEQBoySvPgxsGSwiVGWSlhXkYGBgYhnoLUotzMElT5V4z
 iHIxKwryPQKbwZOaVwG19BXQQE9BB7/YFghxUkoiQkmpgDDjQf6rqyKbja89bTVe7WDvVub5H
 TetNwKR/3yaU7+5ebXPcQHRZ8d/ra54prq2N2Kq9R17z2nW/mmhWtwxGg/XBT3dzVJ7ICVFhO
 u/8jI+nfNbt14Ynv2XsEn97+ELslSUTZCICHF9tN57xwlkmy2qip8hDT26Fyu3Zz/eaakk5n/
 wX876dTYmlOCPRUIu5qDgRANZUJrwFAwAA
X-Env-Sender: doa379@gmail.com
X-Msg-Ref: server-14.tower-206.messagelabs.com!1515442923!75580564!1
X-Originating-IP: [74.125.82.45]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 52610 invoked from network); 8 Jan 2018 20:22:03 -0000
Received: from mail-wm0-f45.google.com (HELO mail-wm0-f45.google.com)
 (74.125.82.45)
 by server-14.tower-206.messagelabs.com with AES128-GCM-SHA256 encrypted SMTP;
 8 Jan 2018 20:22:03 -0000
Received: by mail-wm0-f45.google.com with SMTP id i186so167801wmi.4
 for <xen-users@lists.xensource.com>; Mon, 08 Jan 2018 12:22:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=to:from:subject:message-id:date:user-agent:mime-version
 :content-language:content-transfer-encoding;
 bh=ViiHIqpvX25eUWsVfRmdDuiXMV7PCbkllnpPNXODLuc=;
 b=avfv94HHW0+XLYmRURb3uOuBf94VyAspDzWGwXaWQwtu/YBV2Pbw6mUF/5O/pIqKy5
 MHjYXHLiYPkK+UdGgFhC+cHc2vfN6h+5qZqusOpTeD3zlMSGdK7hS672Tzy9JLyB+QAG
 plZvcDYfXhj6JuinaWPKsS7VXdA1qsXXWrxhL4fjaIvDaEUFBgS08QCXYlYdXljnnU01
 m7oLdaDRLaCc8TaGB0GrOE7L3tnnn8L2ArGfzQTCTZji/KVLd9tAPYtjyQ2bR60Yt3Aa
 JPjbtONbRlv02a30moPp9ull8X0DgIfVUIw5TVH0S14jYLK21QsEwjSETBL1vf4AKOZW
 xIqQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:to:from:subject:message-id:date:user-agent
 :mime-version:content-language:content-transfer-encoding;
 bh=ViiHIqpvX25eUWsVfRmdDuiXMV7PCbkllnpPNXODLuc=;
 b=iej9FgSUzurIYqKrfNkQALM4ttOw3/MN8NeZ7YzKYPIWShOIlDixvfaumAKnoN5d8a
 t+6cgGz/8rVbU+jDJcWmUBJnCR+VAQ+EYwtbBMvqANmOJiC2yyUqoMn/VT7GiZZNiPCD
 CvIFpFYD5tvXvoAmW9R7exU4iRwCVRQtTslyg2NdynL2Z2IwmEDI2Kiad5gP2APuv9AM
 EbEhvHPEnLuG97NHBpmEz2nNXvIeVcfWJdzaqqDve6leEv7f/PlTn0hadOcjX8ZK784B
 4IbIcmySmow5LkI6otOiK+IazCFDp5Prpy5Wir3m6V+vzNTYP5Op/uxp1RoWTQDajv6/
 VH8A==
X-Gm-Message-State: AKGB3mLEJdKdJADlxEUrJuO9heH1rPSJHff7f660ByqCZer2GkDdhi5u
 /6qc675MBPhH8qmhfCI3i61m9Q==
X-Google-Smtp-Source: ACJfBotFIcu8AzpFGnDYElJ8QIFxBcuyv6THjIxzCzDHnpaolCs30zdHmDLwijZguy4NrfjvR2jM4Q==
X-Received: by 10.28.135.133 with SMTP id j127mr10287402wmd.14.1515442922620; 
 Mon, 08 Jan 2018 12:22:02 -0800 (PST)
Received: from [192.168.0.12] (host-84-13-102-210.opaltelecom.net.
 [84.13.102.210])
 by smtp.googlemail.com with ESMTPSA id b15sm11931154wrh.5.2018.01.08.12.22.01
 for <xen-users@lists.xensource.com>
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Mon, 08 Jan 2018 12:22:02 -0800 (PST)
To: xen-users@lists.xensource.com
From: doa379 <doa379@gmail.com>
Message-ID: <39e539a6-0448-03e5-c86b-1737b8326df6@gmail.com>
Date: Mon, 8 Jan 2018 20:22:11 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
Content-Language: en-GB
Subject: [Xen-users] Xen built from source efi not produced
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

SSBidWlsdCBYZW4gYSBmZXcgdGltZXMgZnJvbSBzb3VyY2UuCkluIGFsbCBpbnN0YW5jZXMgdGhl
IGVmaSBmaWxlIHdhcyBuZXZlciBwcm9kdWNlZC4gSSBoYXZlIG92bWYgYW5kIAptdWx0aWxpYiBp
bnN0YWxsZWQgaW4gdGhlIFNsYWNrd2FyZSBkaXN0cmlidXRpb24uCgpEbyBJIG5lZWQgc3BlY2lh
bCBjb25maWcgbWFrZSBzZXR0aW5ncz8gVGhlIFdpa2kgc2VlbXMgdG8gc3VnZ2VzdCB0aGF0IAp0
aGlzIGRvbmUgYXV0b21hdGljYWxseS4gSSBoYXZlIGNsZWFybHkgbWlzc2VkIGEgc3RlcC4KCgpf
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpYZW4tdXNlcnMg
bWFpbGluZyBsaXN0Clhlbi11c2Vyc0BsaXN0cy54ZW5wcm9qZWN0Lm9yZwpodHRwczovL2xpc3Rz
LnhlbnByb2plY3Qub3JnL21haWxtYW4vbGlzdGluZm8veGVuLXVzZXJz

From xen-users-bounces@lists.xenproject.org Mon Jan 08 23:47:06 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jan 2018 23:47:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYh7I-0004Fl-5h; Mon, 08 Jan 2018 23:46:08 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=0fee=ed=slackware.hr=mario@srs-us1.protection.inumbo.net>)
 id 1eYh7G-0004Fe-2C
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 23:46:06 +0000
X-Inumbo-ID: e76c1cbe-f4cd-11e7-b4a6-bc764e045a96
Received: from mx.dnsblock.net (unknown [2a05:4f40:1::239])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id e76c1cbe-f4cd-11e7-b4a6-bc764e045a96;
 Tue, 09 Jan 2018 00:44:45 +0100 (CET)
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by mx.dnsblock.net (Postfix) with ESMTPSA id 806631A15B5
 for <xen-users@lists.xenproject.org>; Tue,  9 Jan 2018 00:39:46 +0100 (CET)
To: xen-users@lists.xenproject.org
References: <39e539a6-0448-03e5-c86b-1737b8326df6@gmail.com>
From: Mario <mario@slackware.hr>
Message-ID: <9de2a512-1503-57f3-5dbb-47311fc431cb@slackware.hr>
Date: Tue, 9 Jan 2018 00:39:46 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
Mime-Version: 1.0
In-Reply-To: <39e539a6-0448-03e5-c86b-1737b8326df6@gmail.com>
Content-Language: en-US
Subject: Re: [Xen-users] Xen built from source efi not produced
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============5124038476711647858=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--===============5124038476711647858==
Content-Type: multipart/alternative;
 boundary="------------F9DDF66DC933402891D35235"
Content-Language: en-US

This is a multi-part message in MIME format.
--------------F9DDF66DC933402891D35235
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

On 01/08/2018 09:22 PM, doa379 wrote:
> I built Xen a few times from source.
> In all instances the efi file was never produced. I have ovmf and 
> multilib installed in the Slackware distribution.
>
> Do I need special config make settings? The Wiki seems to suggest that 
> this done automatically. I have clearly missed a step.

Make sure binutils was built with x86_64-pep target, for example:

--enable-targets=x86_64-pep,...etc

Once you have working binutils, rebuild xen as well.
//

-- 
Mario


--------------F9DDF66DC933402891D35235
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <div class="moz-cite-prefix">On 01/08/2018 09:22 PM, doa379 wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:39e539a6-0448-03e5-c86b-1737b8326df6@gmail.com">I built
      Xen a few times from source.
      <br>
      In all instances the efi file was never produced. I have ovmf and
      multilib installed in the Slackware distribution.
      <br>
      <br>
      Do I need special config make settings? The Wiki seems to suggest
      that this done automatically. I have clearly missed a step.
      <br>
    </blockquote>
    <br>
    Make sure binutils was built with <span class="st">x86_64-pep
      target, for example:<br>
      <br>
      --enable-targets=x86_64-pep,...etc<br>
      <br>
      Once you have working binutils, rebuild xen as well.<br>
      <em></em></span><span class="st"></span>
    <pre class="moz-signature" cols="72">-- 
Mario</pre>
  </body>
</html>

--------------F9DDF66DC933402891D35235--


--===============5124038476711647858==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============5124038476711647858==--


From xen-users-bounces@lists.xenproject.org Tue Jan 09 01:54:51 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jan 2018 01:54:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYj7D-0008N4-DA; Tue, 09 Jan 2018 01:54:11 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=4htn=ee=gmail.com=manchonkuok@srs-us1.protection.inumbo.net>)
 id 1eYj7C-0008My-UM
 for xen-users@lists.xenproject.org; Tue, 09 Jan 2018 01:54:10 +0000
X-Inumbo-ID: cde8d56b-f4df-11e7-b4a6-bc764e045a96
Received: from mail-io0-x22a.google.com (unknown [2607:f8b0:4001:c06::22a])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id cde8d56b-f4df-11e7-b4a6-bc764e045a96;
 Tue, 09 Jan 2018 02:52:53 +0100 (CET)
Received: by mail-io0-x22a.google.com with SMTP id 87so16776192ior.5
 for <xen-users@lists.xenproject.org>; Mon, 08 Jan 2018 17:54:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to;
 bh=rBUMV3mYH41QPFzQDCUkMV31CslcVxcOTAhU8ytyeIs=;
 b=tZxegj9N2+pL7MmKSxARUZfya3efoDAoz60eGzjeerMSRffh+EyfnCH4MvbQo6AMGY
 cU9WW4ekp69dPbHFJscfJebQHBKFriddM+ctgU66BAf3FFghfBGlyy9/3/Vx8N0anNA3
 3vmtC0n0z8L0cTeRtAjoIgv6wN3nWytQlWmGynDJCzwKQOg5gd+FJSbD+TllWaKg1qGK
 SkGHCg7T3tLgi7j1kL6KAKGkRBeYfyPvqbmHV+9dg1ibJEiLCBR0vsvEBsCHBt1BxgiL
 2wGvkXm2HcipI/zh6WtkXSB+mrgRicXoSryiCBceN405BHoDY74L/oipkgFkLiVdQJII
 dVZg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to;
 bh=rBUMV3mYH41QPFzQDCUkMV31CslcVxcOTAhU8ytyeIs=;
 b=ah7qznqNvavHeROFXpvr2F9mauCHxRtfHKwjunBVm+w/1/pz9/PewAVZRytMNNome2
 aJ2SYCPXj0C0DSFEBP47ijPbmSQZDAbzGwWcBwRr8jpDiNPc2VmFxWdfegmL9FgflcCj
 WHfxdcJQz39Oa0bSzVsUW8myffkvluO39bnyH8jyvPf65TeT/UoVXqXOp/FC2kQgdKjk
 bsNGiTFbA2zl8pHUU7qDnxm7i4Tp2yEz6jj+5dj1l235UC7Rw6U7R7jr4unbjtn8A8HF
 KYSxMxCKY1aHRzfh1QfZfsz4q3Zd6XlA1xizmowY0LA/m5vzRRjvF87dRkzl6p5rzk3S
 FzOQ==
X-Gm-Message-State: AKwxytdkmpxsJxfKFHyXOJOcZMYnm7zyt1vSgKGzEzbFg00+nELGehUv
 M3vwAwB1PMihW1jt2nYhicS9VrgavcSHsJ25kew=
X-Google-Smtp-Source: ACJfBoskQIY7Dvn/bSHDgvlhZ/LDOz9Zs8nQ4pyfrBrIQPagoiONamuuWG5PHIMkz9c1bx1sXg5Ergqu5UYbVMPC7zc=
X-Received: by 10.107.26.79 with SMTP id a76mr13228792ioa.17.1515462849378;
 Mon, 08 Jan 2018 17:54:09 -0800 (PST)
MIME-Version: 1.0
Received: by 10.79.204.5 with HTTP; Mon, 8 Jan 2018 17:54:08 -0800 (PST)
In-Reply-To: <CAJnNCGO8jx-1zKdWUZLUQpeu5AvOGXjdnqrbJOVQSObM6bbkHQ@mail.gmail.com>
References: <CAJnNCGO8jx-1zKdWUZLUQpeu5AvOGXjdnqrbJOVQSObM6bbkHQ@mail.gmail.com>
From: Man Chon Kuok <manchonkuok@gmail.com>
Date: Mon, 8 Jan 2018 15:54:08 -1000
Message-ID: <CAJnNCGPNiDQzQ_adfdPGgHdoHjABUAD_VdoWTM-au4ZcE=-qHg@mail.gmail.com>
To: xen-users@lists.xenproject.org
Subject: [Xen-users] Fwd: xentrace returns error
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7692100663300100570=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============7692100663300100570==
Content-Type: multipart/alternative; boundary="001a113fd062cebe8b05624e3022"

--001a113fd062cebe8b05624e3022
Content-Type: text/plain; charset="UTF-8"

Hi,

I want to use xentrace to look at some debugging messages, but when I
called xentrace, I received the following message:

mkuok@mkuok-linux:~$ sudo xentrace trace
ERROR: Failed to map cpu buffer! (13 = Permission denied)

Any guidance on xentrace is appreciated.

--001a113fd062cebe8b05624e3022
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_quote"><div dir=3D"ltr"><div><div>Hi,<=
br><br></div>I want to use xentrace to look at some debugging messages, but=
 when I called xentrace, I received the following message:<br><br>mkuok@mku=
ok-linux:~$ sudo xentrace trace<br>ERROR: Failed to map cpu buffer! (13 =3D=
 Permission denied)<br><br></div>Any guidance on xentrace is appreciated. <=
br><div><br></div></div>
</div><br></div>

--001a113fd062cebe8b05624e3022--


--===============7692100663300100570==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============7692100663300100570==--


From xen-users-bounces@lists.xenproject.org Tue Jan 09 04:41:01 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jan 2018 04:41:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYlhY-0003Mj-FP; Tue, 09 Jan 2018 04:39:52 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=pxl6=ee=yahoo.com=tlviewer@srs-us1.protection.inumbo.net>)
 id 1eYlhX-0003MU-6F
 for xen-users@lists.xen.org; Tue, 09 Jan 2018 04:39:51 +0000
X-Inumbo-ID: 673befda-f4f7-11e7-b0d7-9f685aff125f
Received: from sonic307-12.consmr.mail.ne1.yahoo.com (unknown [66.163.190.35])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTP
 id 673befda-f4f7-11e7-b0d7-9f685aff125f;
 Tue, 09 Jan 2018 04:41:48 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1515472783; bh=iWJscBP2O/MohaB1eYGc4ZTIU77ObXNWSCmsUdKXnXc=;
 h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject;
 b=Gy2MA5sNAoeECTI7e1BpIuywrGB+LkfzWULM7twi/7yQH8Yr6ifimpLTL5SP+IrQQgZZZS8YhCQBkGVWLPjmrtkOipvd4+pb0/bHGXSkB0c4MH4lP4k1LulTHXTXI6OYOZc4rkbC92AkD9OwT3ayESuz3Ws4xt+/BtvUZKzsYbPMPN2hDZVOxEPu5zNFAGz+fnReOW3MEvMIhKXm1dTOF7CVns/jCnHvU6e7i9+OQ7o+m1ADOsTY8N8pa9hB0Gz7zaPjasck1G/yFJWP/cCU3dzMA4Xe/T/sNxTNLar8rY1YUgQsEwLbvUUf2hhIO8Rg/Dx2FVwVIRec5K2a85LQFw==
X-YMail-OSG: 9lysSP0VM1n0a4_o.ROLixSj.1ciGdcZH3MyL0EDuHAuwFPDBFTL.MToGTGC_Jk
 qMqvlkInY0K.rw8dY2xTHAdjEPI4CLIFi8B5Dygn8oGpcyzX3uEDlEcmsVbnuTJThjqWSj.vo_zQ
 m4TT1apDhgbKTbQzfxTCjuTd2Yz5s3bTBWSK_QfIBLj7PgxDbR_eZPsaBcGKUX68LRPxtPAMmozk
 gGIekGlYtPeSburlANcZXeOPugpOkoPPVxuo6w6er.EaDc6Wfv5dYt0QYkOE9hBhWLYnyNDuW_SL
 MgVB1v2sxPki_pgZUwMILe9hJVRyKwak0IXEIY4UOGk27Jyg.wCBy1vqflylhgn82PdB2UvUX0Xu
 s5maR3.mjjAVMaDFTSTLRa.OiOIZngeEULlh3JXKfmorYNwWhVMIHyCToP1amkGQcpf9Am_vg.V8
 Nxe9HuKfWmxosJ3kRD6kOmJ0pk9i8Bdnffrks6ItopZpk5yfQsHRLekZPH7Scv5NsyUmD_6GUvuY
 5LH6ISXeOIq0FsC7kTcd8YaLNJQ8Hz7v_cq2mlH.o14Vc8djya_0dIy5o
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic307.consmr.mail.ne1.yahoo.com with HTTP; Tue, 9 Jan 2018 04:39:43 +0000
Date: Tue, 9 Jan 2018 04:39:06 +0000 (UTC)
From: Mark Pryor <tlviewer@yahoo.com>
To: Xen-users <xen-users@lists.xen.org>
Message-ID: <1914947916.3106446.1515472746202@mail.yahoo.com>
In-Reply-To: <722436095.2205767.1513814353173@mail.yahoo.com>
References: <418579766.6457185.1509304400734.ref@mail.yahoo.com>
 <418579766.6457185.1509304400734@mail.yahoo.com>
 <722436095.2205767.1513814353173@mail.yahoo.com>
MIME-Version: 1.0
X-Mailer: WebService/1.1.11150 YahooMailNeo Mozilla/5.0 (X11; Linux x86_64;
 rv:52.0) Gecko/20100101 Firefox/52.0
Content-Length: 12071
Subject: Re: [Xen-users] looking ahead to Buster (deb10) at freeze,
 deciding Xen version paired to qemu
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Mark Pryor <tlviewer@yahoo.com>
Content-Type: multipart/mixed; boundary="===============1598247418898357024=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============1598247418898357024==
Content-Type: multipart/alternative; 
	boundary="----=_Part_3106445_2119694843.1515472746200"
Content-Length: 11493

------=_Part_3106445_2119694843.1515472746200
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

The next step isxen-4.10+qemu-2.10 Nmu with qemuu as a separate package:
http://prymar56.org/xen/debian/buster-nmu/4ax/
this is a polished source build with enhancements of the original Ubuntu sources.
PryMar56


 

    On Wednesday, December 20, 2017 3:59 PM, Mark Pryor <tlviewer@yahoo.com> wrote:
 

 Its so much trouble to coordinate a build of qemu (qemu-system-x86) with the Debian qemu team that I've found a way to split off a qemuu package from the upstream Xen sources, using the Nmu lib/tools configuration.
I kept the same xen_4.9.1.orig.tar.xz tarball, which is minus tools/qemu* & extras/, then I piggy backed in xen_4.9.1.orig-qemuu.tar.xz
The extra tarball was a snapshot from the qemu-xen.git , staging-4.10.Some new targets add a new binary (*.deb) for qemuu, and it depends on the libxen-4.9 set.
The Nmu design, coding, build, and test took 8 hours over 2 days. I hope this layout can be seriously considered as the future of Xen in Debian Buster (deb10). I think its much improved over what is there now.
http://prymar56.org/xen/debian/buster-nmu/49x/
any feedback is welcome,PryMar56
##xen-packaging on Freenode

 

    On Sunday, October 29, 2017 12:13 PM, Mark Pryor <tlviewer@yahoo.com> wrote:
 

 List,
Earlier this month I experimented with an NMU build of Xen-4.9 on Stretchhttps://lists.xenproject.org/archives/html/xen-users/2017-10/msg00016.html
Of course, its only a private build and I would never expect this to get accepted into current Stretch repo. The idea is to move the build from 4.8 to 4.9, with a few improvements, but keep the package partitions, time stamp, and build trees the same.
I've had good results with my NMU build and I use it daily. When I see the effort the Debian qemu team has made to keep qemu-2.8 current with Security fixes my confidence is raised too. I put a hold on the associated qemu-2.8 build (using libxen-4.9 headers) with `apt-mark hold xxyy`.

However, looking at how Buster packaged Xen with qemu makes me think that now and the next 6 months is a chance to change the direction for the better, moving Xen from 4.8.1 to 4.10.3 (eventually in June 2019) and build qemu with libxen-4.10 headers and libs.
Unfortunately, Buster has chosen xen-4.8.1 with qemu-2.10 for now, although I see no reason this choice can't change.

When xen-4.10 is released is when I will start with this project, unless Debian developers start first. There is no reason for me to build or test 4.10 in Buster now. I'm doing this in Ubuntu Artful.
If anyone is interested in any part of this, support or criticism, join us in 
##xen-packaging on Freenode
PryMar56



   

   
------=_Part_3106445_2119694843.1515472746200
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<html><head></head><body><div style=3D"color:#000; background-color:#fff; f=
ont-family:Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font=
-size:13px"><div id=3D"yui_3_16_0_ym19_1_1515472574671_3505">The next step =
is</div><div>xen-4.10+qemu-2.10 Nmu with qemuu as a separate package:</div>=
<div id=3D"yui_3_16_0_ym19_1_1515472574671_3720"><br></div><div id=3D"yui_3=
_16_0_ym19_1_1515472574671_3564"><a href=3D"http://prymar56.org/xen/debian/=
buster-nmu/4ax/" class=3D"" id=3D"yui_3_16_0_ym19_1_1515472574671_3563">htt=
p://prymar56.org/xen/debian/buster-nmu/4ax/</a></div><div id=3D"yui_3_16_0_=
ym19_1_1515472574671_3715"><br></div><div id=3D"yui_3_16_0_ym19_1_151547257=
4671_3645" dir=3D"ltr">this is a polished source build with enhancements of=
 the original Ubuntu sources.</div><div dir=3D"ltr" id=3D"yui_3_16_0_ym19_1=
_1515472574671_3714"><br></div><div dir=3D"ltr" id=3D"yui_3_16_0_ym19_1_151=
5472574671_3721">PryMar56<br></div><div id=3D"yui_3_16_0_ym19_1_15154725746=
71_3644"><br></div><div id=3D"yui_3_16_0_ym19_1_1515472574671_3655"><br></d=
iv><div id=3D"yui_3_16_0_ym19_1_1515472574671_2845"><span></span></div> <di=
v class=3D"qtdSeparateBR"><br><br></div><div class=3D"yahoo_quoted" style=
=3D"display: block;"> <div style=3D"font-family: Helvetica Neue, Helvetica,=
 Arial, Lucida Grande, sans-serif; font-size: 13px;"> <div style=3D"font-fa=
mily: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-=
serif; font-size: 16px;"> <div dir=3D"ltr"><font size=3D"2" face=3D"Arial">=
 On Wednesday, December 20, 2017 3:59 PM, Mark Pryor &lt;tlviewer@yahoo.com=
&gt; wrote:<br></font></div>  <br><br> <div class=3D"y_msg_container"><div =
id=3D"yiv7844714928"><div><div style=3D"color:#000;background-color:#fff;fo=
nt-family:Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-=
size:13px;"><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1513813895939_3041">I=
ts so much trouble to coordinate a build of qemu (qemu-system-x86) with the=
 Debian qemu team that I've found a way to split off a qemuu package from t=
he upstream Xen sources, using the Nmu lib/tools configuration.</div><div><=
br clear=3D"none"></div><div dir=3D"ltr">I kept the same xen_4.9.1.orig.tar=
.xz tarball, which is minus tools/qemu* &amp; extras/, then I piggy backed =
in xen_4.9.1.orig-qemuu.tar.xz</div><div dir=3D"ltr"><br clear=3D"none"></d=
iv><div dir=3D"ltr" id=3D"yiv7844714928yui_3_16_0_ym19_1_1513813895939_3398=
">The extra tarball was a snapshot from the qemu-xen.git , staging-4.10.</d=
iv><div dir=3D"ltr" id=3D"yiv7844714928yui_3_16_0_ym19_1_1513813895939_3506=
">Some new targets add a new binary (*.deb) for qemuu, and it depends on th=
e libxen-4.9 set.</div><div dir=3D"ltr" id=3D"yiv7844714928yui_3_16_0_ym19_=
1_1513813895939_3400"><br clear=3D"none"></div><div dir=3D"ltr" id=3D"yiv78=
44714928yui_3_16_0_ym19_1_1513813895939_3397">The Nmu design, coding, build=
, and test took 8 hours over 2 days. I hope this layout can be seriously co=
nsidered as the future of Xen in Debian Buster (deb10). I think its much im=
proved over what is there now.</div><div dir=3D"ltr" id=3D"yiv7844714928yui=
_3_16_0_ym19_1_1513813895939_3402"><br clear=3D"none"></div><div dir=3D"ltr=
" id=3D"yiv7844714928yui_3_16_0_ym19_1_1513813895939_3358"><a rel=3D"nofoll=
ow" shape=3D"rect" class=3D"yiv7844714928" id=3D"yiv7844714928yui_3_16_0_ym=
19_1_1513813895939_3357" target=3D"_blank" href=3D"http://prymar56.org/xen/=
debian/buster-nmu/49x/">http://prymar56.org/xen/debian/buster-nmu/49x/</a><=
/div><div dir=3D"ltr" id=3D"yiv7844714928yui_3_16_0_ym19_1_1513813895939_34=
37"><br clear=3D"none"></div><div dir=3D"ltr" id=3D"yiv7844714928yui_3_16_0=
_ym19_1_1513813895939_3438">any feedback is welcome,</div><div dir=3D"ltr" =
id=3D"yiv7844714928yui_3_16_0_ym19_1_1513813895939_3630">PryMar56</div><div=
 dir=3D"ltr"><br clear=3D"none"></div><div dir=3D"ltr">##xen-packaging on F=
reenode<br clear=3D"none"></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1=
513813895939_3371"><br clear=3D"none"></div><div id=3D"yiv7844714928yui_3_1=
6_0_ym19_1_1513813895939_2927"><span></span></div> <div class=3D"yiv7844714=
928qtdSeparateBR"><br clear=3D"none"><br clear=3D"none"></div><div class=3D=
"yiv7844714928yqt3259868927" id=3D"yiv7844714928yqt69694"><div class=3D"yiv=
7844714928yahoo_quoted" style=3D"display:block;"> <div style=3D"font-family=
:Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:13px=
;"> <div style=3D"font-family:HelveticaNeue, Helvetica Neue, Helvetica, Ari=
al, Lucida Grande, sans-serif;font-size:16px;"> <div dir=3D"ltr"><font size=
=3D"2" face=3D"Arial"> On Sunday, October 29, 2017 12:13 PM, Mark Pryor &lt=
;tlviewer@yahoo.com&gt; wrote:<br clear=3D"none"></font></div>  <br clear=
=3D"none"><br clear=3D"none"> <div class=3D"yiv7844714928y_msg_container"><=
div id=3D"yiv7844714928"><div><div style=3D"color:#000;background-color:#ff=
f;font-family:Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;f=
ont-size:13px;"><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_260=
2">List,</div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_2638"=
><br clear=3D"none"></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303=
364955_2672">Earlier this month I experimented with an NMU build of Xen-4.9=
 on Stretch</div><div dir=3D"ltr" id=3D"yiv7844714928yui_3_16_0_ym19_1_1509=
303364955_2631"><a rel=3D"nofollow" shape=3D"rect" class=3D"yiv7844714928" =
id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_2630" target=3D"_blank" =
href=3D"https://lists.xenproject.org/archives/html/xen-users/2017-10/msg000=
16.html">https://lists.xenproject.org/archives/html/xen-users/2017-10/msg00=
016.html</a></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_2=
791"><br clear=3D"none"></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_150=
9303364955_2768">Of course, its only a private build and I would never expe=
ct this to get accepted into current Stretch repo. The idea is to move the =
build from 4.8 to 4.9, with a few improvements, but keep the package partit=
ions, time stamp, and build trees the same.</div><div id=3D"yiv7844714928yu=
i_3_16_0_ym19_1_1509303364955_2939"><br clear=3D"none"></div><div dir=3D"lt=
r" id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_3008">I've had good r=
esults with my NMU build and I use it daily. When I see the effort the Debi=
an qemu team has made to keep qemu-2.8 current with Security fixes my confi=
dence is raised too. I put a hold on the associated qemu-2.8 build (using l=
ibxen-4.9 headers) with `apt-mark hold xxyy`.<br clear=3D"none"></div><div =
id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_2792"><br clear=3D"none"=
></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_2769">Howeve=
r, looking at how Buster packaged Xen with qemu makes me think that now and=
 the next 6 months is a chance to change the direction for the better, movi=
ng Xen from 4.8.1 to 4.10.3 (eventually in June 2019) and build qemu with l=
ibxen-4.10 headers and libs.</div><div id=3D"yiv7844714928yui_3_16_0_ym19_1=
_1509303364955_3009"><br clear=3D"none"></div><div id=3D"yiv7844714928yui_3=
_16_0_ym19_1_1509303364955_2936">Unfortunately, Buster has chosen xen-4.8.1=
 with qemu-2.10 for now, although I see no reason this choice can't change.=
<br clear=3D"none"></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_15093033=
64955_2938"><br clear=3D"none"></div><div id=3D"yiv7844714928yui_3_16_0_ym1=
9_1_1509303364955_2937">When xen-4.10 is released is when I will start with=
 this project, unless Debian developers start first. There is no reason for=
 me to build or test 4.10 in Buster now. I'm doing this in Ubuntu Artful.</=
div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_3029"><br clear=
=3D"none"></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_305=
4">If anyone is interested in any part of this, support or criticism, join =
us in <br clear=3D"none"></div><div id=3D"yiv7844714928yui_3_16_0_ym19_1_15=
09303364955_3055">##xen-packaging on Freenode</div><div id=3D"yiv7844714928=
yui_3_16_0_ym19_1_1509303364955_3056"><br clear=3D"none"></div><div id=3D"y=
iv7844714928yui_3_16_0_ym19_1_1509303364955_3057">PryMar56</div><div id=3D"=
yiv7844714928yui_3_16_0_ym19_1_1509303364955_3058"><br clear=3D"none"></div=
><div id=3D"yiv7844714928yui_3_16_0_ym19_1_1509303364955_3059"><br clear=3D=
"none"></div></div></div></div><br clear=3D"none"><br clear=3D"none"></div>=
  </div> </div>  </div></div></div></div></div><br><br></div>  </div> </div=
>  </div></div></body></html>
------=_Part_3106445_2119694843.1515472746200--


--===============1598247418898357024==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============1598247418898357024==--


From xen-users-bounces@lists.xenproject.org Tue Jan 09 14:20:09 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jan 2018 14:20:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYuk9-0007l5-7g; Tue, 09 Jan 2018 14:19:09 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=jstt=ee=dingwall.me.uk=james@srs-us1.protection.inumbo.net>)
 id 1eYuk8-0007kh-13
 for xen-users@lists.xen.org; Tue, 09 Jan 2018 14:19:08 +0000
X-Inumbo-ID: 53efbacd-f548-11e7-b0d7-9f685aff125f
Received: from know-smtprelay-omc-11.server.virginmedia.net (unknown
 [80.0.253.75]) by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 53efbacd-f548-11e7-b0d7-9f685aff125f;
 Tue, 09 Jan 2018 14:21:06 +0000 (UTC)
Received: from dingwall.me.uk ([82.47.84.47]) by cmsmtp with ESMTP
 id Yujye1sdc0Dt7YujyekNsl; Tue, 09 Jan 2018 14:18:58 +0000
X-Originating-IP: [82.47.84.47]
X-Authenticated-User: 
X-Spam: 0
X-Authority: v=2.3 cv=ctq1bWwi c=1 sm=1 tr=0 a=0bfgdX8EJi0Cr9X0x0jFDA==:117
 a=0bfgdX8EJi0Cr9X0x0jFDA==:17 a=kj9zAlcOel0A:10 a=MKtGQD3n3ToA:10
 a=RgaUWeydRksA:10 a=1UhrZpe2VIYA:10 a=ZZnuYtJkoWoA:10
 a=caGmpP2bXSRRnwKj_ksA:9 a=CjuIK1q_8ugA:10
Received: (qmail 22647 invoked from network); 9 Jan 2018 14:18:58 -0000
Received: from behemoth.dingwall.me.uk (192.168.1.5)
 by mail0.xen.dingwall.me.uk with SMTP; 9 Jan 2018 14:18:58 -0000
Received: by behemoth.dingwall.me.uk (Postfix, from userid 1000)
 id 23864D08C20; Tue,  9 Jan 2018 14:18:58 +0000 (GMT)
Date: Tue, 9 Jan 2018 14:18:57 +0000
From: James Dingwall <james-xen@dingwall.me.uk>
To: xen-users@lists.xen.org
Message-ID: <20180109141857.GA6762@dingwall.me.uk>
MIME-Version: 1.0
Content-Disposition: inline
User-Agent: Mutt/1.7.2 (2016-11-26)
X-CMAE-Envelope: MS4wfGu7OE/AEw+rU/4uZwiOlnb4+ZAM/xo4IvS9D8jFAdujv3QldwkGim9Ujb37i1x3j5Tvve8vL6zsaFuoWwVlGZ/Iv2Up4ZM8QzFFP/Uq2PdLfmDKm2ju
 5VddGXlXzRZQ0RoKYGooM5EAGXEF7Are+dAmZT+vn0LABhk2m/gUfmif
Subject: [Xen-users] xen 4.8.1: xenstore key leak with driver domains
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Tue Jan 09 14:57:17 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jan 2018 14:57:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eYvJw-0003qe-B2; Tue, 09 Jan 2018 14:56:08 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=zynd=ed=gmail.com=manchonkuok@srs-us1.protection.inumbo.net>)
 id 1eYglb-0002rI-SP
 for xen-users@lists.xenproject.org; Mon, 08 Jan 2018 23:23:43 +0000
X-Inumbo-ID: c933e333-f4ca-11e7-b4a6-bc764e045a96
Received: from mail-io0-x234.google.com (unknown [2607:f8b0:4001:c06::234])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id c933e333-f4ca-11e7-b4a6-bc764e045a96;
 Tue, 09 Jan 2018 00:22:25 +0100 (CET)
Received: by mail-io0-x234.google.com with SMTP id q188so16504085iod.1
 for <xen-users@lists.xenproject.org>; Mon, 08 Jan 2018 15:23:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=hmIorSy8pw4DXT+Ry/p5kj1IzroYbpreH+Z3sRycbr8=;
 b=RfMm1BKr90VI7oC3yj8gTN5g6ZbPYuvnrd52khPc5tqwFIpMa9CSFC/mOHFdvy3u6g
 F+aImuASzS/MlHTj0k3iZEClvTzoQUBlNnyLWwESYz8FPBHAzWe6MWBLqT8qGmZPvnnx
 SAUTA8dB3T94d/39hwa/gykpVE0n2G3OLiss12QN73Uu4L5mH6Bjg0FozW5bsusfOOKJ
 VgnWHU+uSGnfMErSenCUULI4EEE+8hUbN9Re7LBHWwafNzHRKLP3QD3C1uYDO9tewYVl
 rJ3Zykrq0AVESGHZJFzXPeTHbHcVsaUsgbBMyIzFzOme30+NmfwM1pFEeRgzc68uz5UP
 298Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=hmIorSy8pw4DXT+Ry/p5kj1IzroYbpreH+Z3sRycbr8=;
 b=LPSceHempuPpcPEucEyp/Pn+716TJ7XUX774rJlYlnkrct2VlrupGWFQs1byY6i9t2
 ENRNhQmdw0aiWSNVzjrfqmWPO5ZxiXEjTKrAju7kyJpztRzoNRpbCTjmZx55kvbeynv6
 mnl135jzbY1IrbbYdpI2bl01QZqEygbnCEBolal5UqNyJP6zdOfuRXkDBQKboqdYqsYK
 k+ViayhtNeDeJwAkVAk0tRL3W7k0XbIdqE6J+h/UZpTlR610JAHKoHyIf+1xkfb0UHb6
 Zf3LPjdCiNSERBwwgfo2PI3L6TiQmaRsKINAVS/r34I8v+oAEYd8WmHHvCrrcmZF2BWM
 YZzg==
X-Gm-Message-State: AKGB3mI2CdW/EUsdn/13zvhL6J/jjPu2wyCMWfC0tkCuHyOgGIzIXamr
 ikJ1gcXSOQzOriMG0GbaGuVJ4v6QfmbZoiljYrxRNA==
X-Google-Smtp-Source: ACJfBovZLFWFS8OX4hMn54FJVX/rXnuQzksJrk+GHPII3ZkirJ8nWP9kZtEt6CfZHt0m84WBfFPcdaO+gqrl5CaE4V8=
X-Received: by 10.107.88.10 with SMTP id m10mr13470745iob.71.1515453821798;
 Mon, 08 Jan 2018 15:23:41 -0800 (PST)
MIME-Version: 1.0
Received: by 10.79.204.5 with HTTP; Mon, 8 Jan 2018 15:23:41 -0800 (PST)
From: Man Chon Kuok <manchonkuok@gmail.com>
Date: Mon, 8 Jan 2018 13:23:41 -1000
Message-ID: <CAJnNCGO8jx-1zKdWUZLUQpeu5AvOGXjdnqrbJOVQSObM6bbkHQ@mail.gmail.com>
To: xen-users@lists.xenproject.org
X-Mailman-Approved-At: Tue, 09 Jan 2018 14:56:06 +0000
Subject: [Xen-users] xentrace returns error
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6026696043242352438=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============6026696043242352438==
Content-Type: multipart/alternative; boundary="f403043cc274b8d9c605624c1671"

--f403043cc274b8d9c605624c1671
Content-Type: text/plain; charset="UTF-8"

Hi,

I want to use xentrace to look at some debugging messages, but when I
called xentrace, I received the following message:

mkuok@mkuok-linux:~$ sudo xentrace trace
ERROR: Failed to map cpu buffer! (13 = Permission denied)

Any guidance on xentrace is appreciated.

--f403043cc274b8d9c605624c1671
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>Hi,<br><br></div>I want to use xentrace to look =
at some debugging messages, but when I called xentrace, I received the foll=
owing message:<br><br>mkuok@mkuok-linux:~$ sudo xentrace trace<br>ERROR: Fa=
iled to map cpu buffer! (13 =3D Permission denied)<br><br></div>Any guidanc=
e on xentrace is appreciated. <br><div><br></div></div>

--f403043cc274b8d9c605624c1671--


--===============6026696043242352438==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============6026696043242352438==--


From xen-users-bounces@lists.xenproject.org Wed Jan 10 06:27:50 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jan 2018 06:27:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZ9qN-0006q1-H7; Wed, 10 Jan 2018 06:26:35 +0000
Received: from mail6.bemta6.messagelabs.com ([193.109.254.103])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <webdawg@gmail.com>) id 1eZ9qM-0006pv-BY
 for xen-users@lists.xensource.com; Wed, 10 Jan 2018 06:26:34 +0000
Received: from [85.158.143.35] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-3.bemta-6.messagelabs.com id E2/93-04822-912B55A5;
 Wed, 10 Jan 2018 06:26:33 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrHIsWRWlGSWpSXmKPExsVyMfT+Rl2JTaF
 RBidnmVlsXfaH3YHRY3vfLvYAxijWzLyk/IoE1oxFfx+wFXTxVky8eomlgfEcVxcjF4eQwCxG
 iWeL7zCDOCwCDawSO5sXsoA4EgJzWCWeTXsH5HACOWUSe05fZoawiyTubnzCDmPvfrsGrIZXQ
 FDi5MwnYLaQgJfEiUd72EBsTgFzid3T9gHVcwDFzSQufU0DCbMJKEp0HL0BNpJFQFVi/ZUmRo
 gxARKPT60EGyMsoCax+89qJhBbBGj83e3rwdYyA/VeeX2BCcLWlGjd/pt9AqPgLCRXzEKSWsD
 ItIpRvTi1qCy1SNdSL6koMz2jJDcxM0fX0MBMLze1uDgxPTUnMalYLzk/dxMjMDwZgGAH491N
 AYcYJTmYlER5AzlDo4T4kvJTKjMSizPii0pzUosPMcpwcChJ8L7dAJQTLEpNT61Iy8wBRgpMW
 oKDR0mE9ytImre4IDG3ODMdInWK0ZLjwp1Lf5g4Duy5BSSfzXzdwCzEkpeflyolzvsTpEEApC
 GjNA9uHCyaLzHKSgnzMgIdKMRTkFqUm1mCKv+KUZyDUUmY9y/IFJ7MvBK4ra+ADmICOujdvkC
 Qg0oSEVJSDYx9TwqqgrtWbeCc/PzMt7l35hjoWlwPmTdfYodKXOOOg1LctzxsTz855qPiuOlY
 iJCNWcK/gwcr2K6f3Roy4fxB880MHMILTHcczJyy2LdsxbSoZUunMB/RubJa8OC6CW8KDn+4/
 6qqt51dvuLK7IPVX4x9y14pmT45WBiadqv6yews9suaCzs/KbEUZyQaajEXFScCAE9zjdrhAg
 AA
X-Env-Sender: webdawg@gmail.com
X-Msg-Ref: server-8.tower-21.messagelabs.com!1515565592!89454693!1
X-Originating-IP: [209.85.223.177]
X-SpamReason: No, hits=0.3 required=7.0 tests=RCVD_BY_IP
X-StarScan-Received: 
X-StarScan-Version: 9.4.45; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 39360 invoked from network); 10 Jan 2018 06:26:32 -0000
Received: from mail-io0-f177.google.com (HELO mail-io0-f177.google.com)
 (209.85.223.177)
 by server-8.tower-21.messagelabs.com with AES128-GCM-SHA256 encrypted SMTP;
 10 Jan 2018 06:26:32 -0000
Received: by mail-io0-f177.google.com with SMTP id w188so21194796iod.10
 for <xen-users@lists.xensource.com>; Tue, 09 Jan 2018 22:26:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=yIZf4Qovwrpw0MChLqWaeqaptFw1KGGwDvm59YiFjDU=;
 b=S4KjsV6KQgK5Yy4dhSUUL3d69UVbzbfkHwDKZfHhxVFrBfA71HGo3vKJhPeHx6Bbe5
 3/3KBnVBthAEHtMJRnA4uSAmKYDIH5lLE/oinuh1jRSBpf76VV+F5PV4w7wBSJyURZpe
 qrqnSq2zipm4Ev32YBL/eW0No5d8nxXHh4N5NfZY+TPOBDydjw0khBjzTc4pcuSe2/ut
 WjpdmHtt1vO18xDyydZ5sfEKtl36rbqDqOlnWJZsZluYLDmEqM5XmtkyQvNH46Fz+tMR
 4pW4f4EZsCxXKnnfHg7GQergai8H8P4HzfVSXXzeAnUFMxiShS3HVMhGY+F4Nki87BYB
 x9Nw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=yIZf4Qovwrpw0MChLqWaeqaptFw1KGGwDvm59YiFjDU=;
 b=MI/sxezCaeHHwGJKIEY77g8H8sH9+9DtgNNCybFepuSvI6I2S9FwW3Q+/QJshYy0g8
 YQW+c7KbE5OGETSgt5mBJU8JrEQQF+9m82XUx6h+IOHDRxQvitfaPqjP+DOElf5woZbW
 73pwpbL2E38YsC5iLA+uxbrV1yBYqHrZTG2C56ueTfMgabC85+Eh/7cZKm4gU6HyudMG
 waF7EapIox+jrvzKyAXp4lIgBwS7kJ1GGMUJqVE2QQPHfIWKZsJgZzeHQNLdRGlFte9a
 LmsfrQdEdEQWzFJZVHYrRSxSRp1LM/XNehFzAyn4Dw0yVDXAq6r/Rr5QkRp5NiqlTPuX
 KdlQ==
X-Gm-Message-State: AKwxyteOSa5gbv+eKyLayoA3nfS+v3+s+pySu7BgcpDYGRgxsZwcFC2l
 00vX7CVqYFuPTn+fPzteeirwAZx/UG2vDaaMH1g=
X-Google-Smtp-Source: ACJfBoud6xpIVJkgW42QVK/mW9wMNYAK9t7eGcHph/1OSxT4iDWIsK43EsGO+OXWndEOOc77mu/d4qFaLU1Oq7yYYz4=
X-Received: by 10.107.11.144 with SMTP id 16mr17057245iol.86.1515565591555;
 Tue, 09 Jan 2018 22:26:31 -0800 (PST)
MIME-Version: 1.0
Received: by 10.107.17.148 with HTTP; Tue, 9 Jan 2018 22:26:11 -0800 (PST)
In-Reply-To: <d93fdbcc86aafaf5d8fe790245b41ffd@mmri.us>
References: <d93fdbcc86aafaf5d8fe790245b41ffd@mmri.us>
From: WebDawg <webdawg@gmail.com>
Date: Wed, 10 Jan 2018 01:26:11 -0500
Message-ID: <CAKdd5H9uCmcPpUh9y=NfzyxPbtMd-yVfQC8px-_g6=uMy=FTgA@mail.gmail.com>
To: admin@mmri.us
Cc: xen-users@lists.xensource.com
Subject: Re: [Xen-users] Xen Questions
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 10 11:08:36 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jan 2018 11:08:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZEEG-00034W-KH; Wed, 10 Jan 2018 11:07:32 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=kr7f=ef=artfiles.de=jm@srs-us1.protection.inumbo.net>)
 id 1eZEEE-00034O-PP
 for xen-users@lists.xen.org; Wed, 10 Jan 2018 11:07:30 +0000
X-Inumbo-ID: bbbda710-f5f6-11e7-b0d7-9f685aff125f
Received: from mailout-afstr61.mailout.artfiles.de (unknown [212.72.187.61])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTP
 id bbbda710-f5f6-11e7-b0d7-9f685aff125f;
 Wed, 10 Jan 2018 11:09:32 +0000 (UTC)
Received: from [80.252.98.195] (helo=Jans-MacBook-Pro.local)
 auth=jm@artfiles.de
 by mailout.artfiles.de with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128)
 (Exim 4.80.1) id 1eZEE6-0004sc-5W
 for xen-users@lists.xen.org; Wed, 10 Jan 2018 12:07:22 +0100
To: xen-users@lists.xen.org
References: <a9a8e8a8-88ae-d50f-45d5-74fcfee1e9f1@artfiles.de>
From: Jan Marquardt <jm@artfiles.de>
Message-ID: <5087882a-19e6-f603-b8e6-af58039e0158@artfiles.de>
Date: Wed, 10 Jan 2018 12:07:20 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0)
 Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <a9a8e8a8-88ae-d50f-45d5-74fcfee1e9f1@artfiles.de>
Subject: Re: [Xen-users] Xen 4.6 Live Migration and Hotplugging Issues
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 10 14:26:01 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jan 2018 14:26:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZHJH-0003ah-KL; Wed, 10 Jan 2018 14:24:55 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=pqn7=ef=vangeuns.name=linus@srs-us1.protection.inumbo.net>)
 id 1eZHJG-0003ab-Be
 for xen-users@lists.xenproject.org; Wed, 10 Jan 2018 14:24:54 +0000
X-Inumbo-ID: d629757b-f611-11e7-b4a6-bc764e045a96
Received: from mail-qt0-x232.google.com (unknown [2607:f8b0:400d:c0d::232])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id d629757b-f611-11e7-b4a6-bc764e045a96;
 Wed, 10 Jan 2018 15:23:33 +0100 (CET)
Received: by mail-qt0-x232.google.com with SMTP id a16so22190664qtj.3
 for <xen-users@lists.xenproject.org>; Wed, 10 Jan 2018 06:24:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=vangeuns-name.20150623.gappssmtp.com; s=20150623;
 h=mime-version:from:date:message-id:subject:to;
 bh=dWBz4v11kG6gDfJpftxN37P7lhqESSQXMXHfxSnWvYg=;
 b=HMgTdAKbdwAu5rfbIt1h0Jut68+IZYCP4ukj74shc8BIjDIkJANWizgqsynVDIsPLJ
 1e8zvxQ9TDtHRV1qpMyBrp/GlJ6MCAzGq4WxDz5SQ7fx6YgW+z1L4cl4oGf79ejYBN4g
 z5drvwPtJVtnWBOBlu5hUZQ9A01M0ey/HIAjZhoLkfrg5t0+gJU62Wv6dDMKBxzUqBwt
 6kXjHd66cQObfrxBBTJtJhSW1vxwHoHsxarIGdvGCWyYeYuO+ibGZp8Bm6IJE78tOU+i
 tYFP5+ggEdTXPi7WAgNIdiym/KX9Tjk4mFPPkdlT/t9D+SsOtSUKD3I9Uc5yKynXkQPQ
 DcwQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=dWBz4v11kG6gDfJpftxN37P7lhqESSQXMXHfxSnWvYg=;
 b=R5UhM53Z/Bf+00VmwnaWw/CzLKhavwH0HaagCoqPHgW+XI8JgPSBRTN+l7RBdlv2wH
 anFaGtcGsNWt9bdZPsXsHcOhYD4FhCa1/v31PER0VtwM7lJr4rgKzKR7ckH9G6FMRaiy
 Nc4YwlRhUywKw8xhXVAFtrShVhmzFtgOZ8t5LswsBj6MXk4CcgKMjO7ysSj/3aVuZnvY
 tLQdyWZlJLaqQ9XXtYsE3cr5SoAD4IvU1ZU4eRdQ399oKR34qOgg4QaIy2A88zQfFehR
 RKL0JqduFSSpBHdZZ6jc9IOMO+1n4kCh3bPpca1q1sHxJy/iKrLmtKXsHzgvisrXbH0s
 FG6Q==
X-Gm-Message-State: AKwxytcFPIh4EPepBGYBkc4MYP6I4PZJrD1P13SiV4+3cOKf5/KK1eRq
 5NRpvvhnpQ61xaoQc+/0/lAXtSZ3PugOj7ojJWCwAh6X
X-Google-Smtp-Source: ACJfBou8JhA1wLjfgQfYxkmq+HwMn+rwaTNxLjbvWRsjdUJwTsWWgx48XqB4KijLwpHrTF7aRbHY1IDtMG2818WMnKo=
X-Received: by 10.237.43.229 with SMTP id e92mr28601611qtd.178.1515594291433; 
 Wed, 10 Jan 2018 06:24:51 -0800 (PST)
MIME-Version: 1.0
Received: by 10.140.29.130 with HTTP; Wed, 10 Jan 2018 06:24:50 -0800 (PST)
From: Linus van Geuns <linus@vangeuns.name>
Date: Wed, 10 Jan 2018 15:24:50 +0100
Message-ID: <CANGqLUQ+fNEkJ23b-dOwsodDTcpY-2XEjpDHmnkEctJzAHBWkw@mail.gmail.com>
To: Xen users <xen-users@lists.xenproject.org>
Subject: [Xen-users] Xen on Epyc?
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2012420146626738315=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============2012420146626738315==
Content-Type: multipart/alternative; boundary="001a114d62d25d7bd405626ccb4b"

--001a114d62d25d7bd405626ccb4b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi,

is there any documentation/articles related to Xen on AMD Epyc CPUs already=
?

Gru=C3=9F, Linus

--001a114d62d25d7bd405626ccb4b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>Hi,<br><br></div>is there any documentation/arti=
cles related to Xen on AMD Epyc CPUs already?<br><br></div>Gru=C3=9F, Linus=
<br clear=3D"all"><div><div><div><div><div><br></div></div></div></div></di=
v></div>

--001a114d62d25d7bd405626ccb4b--


--===============2012420146626738315==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============2012420146626738315==--


From xen-users-bounces@lists.xenproject.org Wed Jan 10 14:51:36 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jan 2018 14:51:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZHi7-0006Se-5S; Wed, 10 Jan 2018 14:50:35 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=h8dy=ee=godawa.de=nospam@srs-us1.protection.inumbo.net>)
 id 1eZ3Xd-0003nQ-JD
 for xen-users@lists.xenproject.org; Tue, 09 Jan 2018 23:42:49 +0000
X-Inumbo-ID: 9c0fa1b3-f596-11e7-b4a6-bc764e045a96
Received: from mo6-p00-ob.smtp.rzone.de (unknown [2a01:238:20a:202:5300::1])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 9c0fa1b3-f596-11e7-b4a6-bc764e045a96;
 Wed, 10 Jan 2018 00:41:28 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1515541365;
 s=domk; d=godawa.de;
 h=Content-Transfer-Encoding:Content-Type:Date:Message-ID:Subject:From:
 To:X-RZG-CLASS-ID:X-RZG-AUTH;
 bh=SYJtBWHgDkyDSZtFxmv6m0Vqq7I4sQM8Ja6HXvVArwk=;
 b=oE4x0l0l/cyu+TTY8CBKtnFse3/lh65lR5p773fLpditlmb6vImnR7MG26cXhsqqVV
 GDOLYt+qMBggVO/K4rg0IHnGCId0GUAgTUtGcNC2P37IPX5FgzyDzQmd6ztMA/Ef83jF
 Wd8hJTGCo89OcaDt/vz4/OxglwlcwKu6J4MOI=
X-RZG-AUTH: :OGQLZ0+kfd/4rJXWgdRWin6BcHqqexya6t+pc3ay3Fa8c4nrhPELTRDoet5P46OGXTVgTYk=
X-RZG-CLASS-ID: mo00
Received: from mactptg02.local (pD9F86B6E.dip0.t-ipconnect.de
 [217.248.107.110]) by smtp.strato.de (RZmta 42.15 DYNA|AUTH)
 with ESMTPSA id d0babau09Ngjimx
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (curve secp521r1 with
 521 ECDH bits, eq. 15360 bits RSA))
 (Client did not present a certificate)
 for <xen-users@lists.xenproject.org>;
 Wed, 10 Jan 2018 00:42:45 +0100 (CET)
To: xen-users@lists.xenproject.org
From: Thorolf Godawa <nospam@godawa.de>
Message-ID: <d516c72c-a115-325a-8bf1-681a88137697@godawa.de>
Date: Wed, 10 Jan 2018 00:42:44 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:52.0)
 Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
Content-Language: de-DE
X-Mailman-Approved-At: Wed, 10 Jan 2018 14:50:34 +0000
Subject: [Xen-users] Configure live migration on Xen 4.6
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 10 16:40:26 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jan 2018 16:40:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZJPQ-0007eb-QU; Wed, 10 Jan 2018 16:39:24 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=e1wq=ef=gmail.com=doa379@srs-us1.protection.inumbo.net>)
 id 1eZJPP-0007eC-43
 for xen-users@lists.xenproject.org; Wed, 10 Jan 2018 16:39:23 +0000
X-Inumbo-ID: 9f644586-f624-11e7-b4a6-bc764e045a96
Received: from mail-wm0-x22f.google.com (unknown [2a00:1450:400c:c09::22f])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 9f644586-f624-11e7-b4a6-bc764e045a96;
 Wed, 10 Jan 2018 17:38:01 +0100 (CET)
Received: by mail-wm0-x22f.google.com with SMTP id 141so174472wme.3
 for <xen-users@lists.xenproject.org>; Wed, 10 Jan 2018 08:39:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=to:from:subject:message-id:date:user-agent:mime-version
 :content-language:content-transfer-encoding;
 bh=gjh1o5hm20fw/t3d5gw8B/bJCpPWpqE2uIVpzwYoWmE=;
 b=Vh99NhKJxGpGkzYCuRXOO8IL1hXaByP9hjn5nf2HNLElUu7yG9wrCZCqfCukso/5ub
 yc7Q+GtZhsjt/2YlBYockbpZbrNNzCPCS64+8J/a38Y8ZGbezy8OJ7ZJ3JcxrIDNTCp/
 leb7cXWnUwDmEU72W77n/sKl7mBhTR6+gvblagJLmCyjtHcH+fOLGOFySGwQBBYk8oCn
 RwXvqOtjodTb/S05+fiqhKGkPsQt60SZZU69t+Upa+Ps4UodVyeW4dqb+t8itidLZA22
 vddGizGyZdE4CgQi2iSWiuxyjevx/IosTY6Sw51m7Z0MolyGrc1jEYLm1Pdag8DYsAJ/
 mvzA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:to:from:subject:message-id:date:user-agent
 :mime-version:content-language:content-transfer-encoding;
 bh=gjh1o5hm20fw/t3d5gw8B/bJCpPWpqE2uIVpzwYoWmE=;
 b=gT/hqd1suwPNmpl4muHV42l2zuVOudO2BGl6sU32eRcHo1COO4Z4XedbjpGSE5pYfG
 KiTGghcAjvU9Jp8F4oPfBus4nv53BiPmK7YAIxd1r4/u2DjZTHYohNw+4ifvZnhDygRO
 inX4FTeGHQKJb4tJd+ajk4zvNo/hZ0N3giyh9fP7Cd9EiPiwtPeszmizw76pQotk+Kwy
 5eIm75bR3pp5v+MiJd4jGU4wEUUUDEMNeGi7U7JBA5iCzaaEpKFmwUY17BgIWVUecFaw
 11D9DjrrBDfKejEnXqgMya+6lr2EKgAOoqz73dBjczI2WsNvAu4V5z6knWOFjN0JevXP
 hmDA==
X-Gm-Message-State: AKGB3mKCk52rNPrBx2UfRucze9Oka8T3tEhgEh5+xOvpqkKgwOxxzGUd
 sKz3Jr2rKDqU57zkRiMT3XGdPQ==
X-Google-Smtp-Source: ACJfBotP4vZ6DWV1w6cFayUVTjitFb6OV8871TFB/iSp/7i9EY87yFu5j8ETMg+ieEHcPMNhwMngFQ==
X-Received: by 10.80.142.66 with SMTP id 2mr26187691edx.141.1515602360388;
 Wed, 10 Jan 2018 08:39:20 -0800 (PST)
Received: from [192.168.0.12] (host-92-25-116-85.as13285.net. [92.25.116.85])
 by smtp.googlemail.com with ESMTPSA id
 t23sm10082903edb.70.2018.01.10.08.39.19
 for <xen-users@lists.xenproject.org>
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Wed, 10 Jan 2018 08:39:19 -0800 (PST)
To: xen-users@lists.xenproject.org
From: doa379 <doa379@gmail.com>
Message-ID: <c7e1778c-3ce1-69ac-06ad-de53d4c40e6f@gmail.com>
Date: Wed, 10 Jan 2018 16:39:28 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
Content-Language: en-GB
Subject: [Xen-users] Xen failing to boot dom0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

SSBidWlsdCBYZW4gNC4xMCBmcm9tIHNvdXJjZSBhbmQgaXQgYXBwZWFycyB0byBsb2FkIGNvcnJl
Y3RseS4gClVuZm9ydHVuYXRlbHkgYWZ0ZXIgYSBicmllZiBtZXNzYWdlIGxpa2UgInN0YXJ0aW5n
IGRvbTAiIHRoZSBkZXZpY2UgCmZyZWV6ZXMgY29tcGxldGVseSBhbmQgYmVjb21lcyB1bnJlc3Bv
bnNpdmUuIFRoZSBzY3JlZW4gaXMgYmxhbmsgYW5kIApkb20wIGhhc24ndCBsb2FkZWQgZWl0aGVy
LiBJIGRvbid0IGhhdmUgYSBzZXJpYWwgY29uc29sZSB0byBkZWJ1ZyAKdW5mb3J0dW5hdGVseS4K
CkknbSBzdXNwZWN0aW5nIGRvbTAgbmVlZHMgdG8gYmUgYnVpbHQgaW4gc29tZSBzcGVjaWFsIHdh
eS4gVW50aWwgdGhpcyAKdGltZSBJIGhhdmUgYmVlbiBkb2luZyB0aGlzOgoKJCBtYWtlIGxvY2Fs
bW9kY29uZmlnCiQgbWFrZSB4ZW5jb25maWcKJCBtYWtlICYmIG1ha2UgaW5zdGFsbAoKQnV0IGNs
ZWFybHkgdGhlIGtlcm5lbCBwcm9kdWNlZCB0aGlzIHdheSBpcyBub3QgbG9hZGluZyBhcyBkb20w
LgoKQ291bGQgc29tZW9uZSBwbGVhc2UgdGVsbCBtZSB3aGF0IGlzIHRoZSBzaWduaWZpY2FuY2Ug
b2YgdGhlIAp4ZW4tPHZlcj4uY29uZmlnIHdoaWNoIGlzIGRlcG9zaXRlZCBieSBYZW4gaW4gL2Jv
b3Q/CgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpYZW4t
dXNlcnMgbWFpbGluZyBsaXN0Clhlbi11c2Vyc0BsaXN0cy54ZW5wcm9qZWN0Lm9yZwpodHRwczov
L2xpc3RzLnhlbnByb2plY3Qub3JnL21haWxtYW4vbGlzdGluZm8veGVuLXVzZXJz

From xen-users-bounces@lists.xenproject.org Thu Jan 11 00:17:23 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 00:17:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZQXV-0000Er-Ue; Thu, 11 Jan 2018 00:16:13 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=1t6j=eg=randomwebstuff.com=xen@srs-us1.protection.inumbo.net>)
 id 1eZQXV-0000El-4A
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 00:16:13 +0000
X-Inumbo-ID: 70d31a0f-f664-11e7-b4a6-bc764e045a96
Received: from mail1.25mail.st (unknown [206.123.115.54])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 70d31a0f-f664-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 01:14:51 +0100 (CET)
Received: from mail1.25mail.st (localhost [127.0.0.1])
 by mail1.25mail.st (Postfix) with ESMTPA id 808D56031E
 for <xen-users@lists.xenproject.org>; Thu, 11 Jan 2018 00:16:08 +0000 (UTC)
MIME-Version: 1.0
Date: Thu, 11 Jan 2018 13:16:08 +1300
From: Peter <xen@randomwebstuff.com>
To: xen-users@lists.xenproject.org
Message-ID: <55b9c26172334f159661220da90e7861@randomwebstuff.com>
X-Sender: xen@randomwebstuff.com
User-Agent: Roundcube Webmail/1.1.5
Subject: [Xen-users] Xen 4.10 pvhv2 xl info total memory - free memory not
 equal to sum of VM memory on host.
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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=

From xen-users-bounces@lists.xenproject.org Thu Jan 11 09:49:23 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 09:49:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZZT8-0003Sw-9W; Thu, 11 Jan 2018 09:48:18 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=/6u+=eg=gmail.com=chengkunck@srs-us1.protection.inumbo.net>)
 id 1eZZT6-0003Sq-PK
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 09:48:16 +0000
X-Inumbo-ID: 5ab82d24-f6b4-11e7-b4a6-bc764e045a96
Received: from mail-lf0-x230.google.com (unknown [2a00:1450:4010:c07::230])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 5ab82d24-f6b4-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 10:46:54 +0100 (CET)
Received: by mail-lf0-x230.google.com with SMTP id f3so2038249lfe.4
 for <xen-users@lists.xenproject.org>; Thu, 11 Jan 2018 01:48:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=P4AJnAcXNrDluExS77AdYr/MlHJ6J/3P6HBePctjf5Y=;
 b=lK/5P18YQhksSMc7di5a0+UrvIWEQLWjm/APXL4AAxkZOqO97lCrbWxtZGR9qb/K+4
 4IZxh1M8l5fNi793YyaF2RAT0HMZBw5VCb3/jpciFtZ2rZ4tGXzGCDgEeAFpgMy59k7+
 U1hkOJAv5H0UL/rnokr1/iQqOslBl0Gjfbj+3Iq8jFy+UPou3WyicHHGjktHZeabZ+q5
 wPsIgattBp3dfEbYS+iSwF9G/e7PukMHmVYmXRAaePycCdOtdnspddsCk6nEpE+Unmks
 z7pFNGKaKFRxSD+TzIxAkhkU5k/I9dL+zwvcbPOyuRxi7aAbwVaGp0Z8bgduzbG5w6hV
 ZUWA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=P4AJnAcXNrDluExS77AdYr/MlHJ6J/3P6HBePctjf5Y=;
 b=JUhs6HdynGavwx+6znHDYE4+nd0N36I/EIPaOt2kQeeUtBEKhReBp04CR39/eR0OFb
 CwjenJxVe9SsA7Z44t62YEzihpFAj7AWK3WBjMALZGf6Dj0yeupj6NhQ7a8wfbrkvjop
 nF++fYpqFJmgKSfYstvJV0S1OQ+LM0oP+bXRaFxV/7WLuhr+7YubsWmrVfLEdWTtULhT
 9p5C1yCtwSFqAMOd4+UKcvuNpHiF961y5aPE2+BkmP036rkfP+YWr/h/LhNZKnJ+FlIQ
 rkvdf6duFf8vEiwrrxQmKLtKWVVLmcZAsm8pXUIbbsAWO7aGplnUbnCuWLjhlgFpFjjE
 A+4w==
X-Gm-Message-State: AKGB3mJpBVd6QiSTkt8qgKRXMviUdMnvI3VLsgpUc5gd9qoSjwvjudcx
 rsOpbTGKq7lbXbQAalsdsi3XiLhiNbzt/ICNYhA=
X-Google-Smtp-Source: ACJfBovn7Ml93UO5iroma0FNP8geExz1Ti02oTocH0nCzNSrdjHgxwDKUc4oDxXSo4PRnGrDJ/bpTE796fCvAQj5aPc=
X-Received: by 10.25.219.12 with SMTP id s12mr11398739lfg.125.1515664094001;
 Thu, 11 Jan 2018 01:48:14 -0800 (PST)
MIME-Version: 1.0
Received: by 10.179.93.5 with HTTP; Thu, 11 Jan 2018 01:47:43 -0800 (PST)
In-Reply-To: <c7e1778c-3ce1-69ac-06ad-de53d4c40e6f@gmail.com>
References: <c7e1778c-3ce1-69ac-06ad-de53d4c40e6f@gmail.com>
From: Kun Cheng <chengkunck@gmail.com>
Date: Thu, 11 Jan 2018 17:47:43 +0800
Message-ID: <CAO3v1VRUZ98a2oYEYp2hHwaLuqCcppChv9eBpGAv5JHdzMjE8w@mail.gmail.com>
To: doa379 <doa379@gmail.com>
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] Xen failing to boot dom0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8464356427276696902=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============8464356427276696902==
Content-Type: multipart/alternative; boundary="94eb2c06382cebffe805627d0ba8"

--94eb2c06382cebffe805627d0ba8
Content-Type: text/plain; charset="UTF-8"

Hi,

1. Can you provide more info about the host machine? Are you booting Xen on
a UEFI platform?

2. Can you confirm it's rightly built? I have no idea whether your built it
correctly. However I always follow INSTALL , simply:
./configure
make world
make install

On Thu, Jan 11, 2018 at 12:43 AM doa379 <doa379@gmail.com> wrote:

> I built Xen 4.10 from source and it appears to load correctly.
> Unfortunately after a brief message like "starting dom0" the device
> freezes completely and becomes unresponsive. The screen is blank and
> dom0 hasn't loaded either. I don't have a serial console to debug
> unfortunately.
>
> I'm suspecting dom0 needs to be built in some special way. Until this
> time I have been doing this:
>
> $ make localmodconfig
> $ make xenconfig
> $ make && make install
>
> But clearly the kernel produced this way is not loading as dom0.
>
> Could someone please tell me what is the significance of the
> xen-<ver>.config which is deposited by Xen in /boot?
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users

--94eb2c06382cebffe805627d0ba8
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi,</div><div><br></div>1. Can you provide more info =
about the host machine? Are you booting Xen on a UEFI platform?<div><br><di=
v>2. Can you confirm it&#39;s rightly built? I have no idea whether your bu=
ilt it correctly. However I always follow INSTALL , simply:</div><div>./con=
figure</div><div>make world</div><div>make install</div><div><br><div class=
=3D"gmail_quote"><div dir=3D"ltr">On Thu, Jan 11, 2018 at 12:43 AM doa379 &=
lt;<a href=3D"mailto:doa379@gmail.com" target=3D"_blank">doa379@gmail.com</=
a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I =
built Xen 4.10 from source and it appears to load correctly.<br>
Unfortunately after a brief message like &quot;starting dom0&quot; the devi=
ce<br>
freezes completely and becomes unresponsive. The screen is blank and<br>
dom0 hasn&#39;t loaded either. I don&#39;t have a serial console to debug<b=
r>
unfortunately.<br>
<br>
I&#39;m suspecting dom0 needs to be built in some special way. Until this<b=
r>
time I have been doing this:<br>
<br>
$ make localmodconfig<br>
$ make xenconfig<br>
$ make &amp;&amp; make install<br>
<br>
But clearly the kernel produced this way is not loading as dom0.<br>
<br>
Could someone please tell me what is the significance of the<br>
xen-&lt;ver&gt;.config which is deposited by Xen in /boot?<br>
<br>
______________________________<wbr>_________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xenproject.org" target=3D"_blank">Xen-use=
rs@lists.xenproject.org</a><br>
<a href=3D"https://lists.xenproject.org/mailman/listinfo/xen-users" rel=3D"=
noreferrer" target=3D"_blank">https://lists.xenproject.org/<wbr>mailman/lis=
tinfo/xen-users</a></blockquote></div></div></div></div>

--94eb2c06382cebffe805627d0ba8--


--===============8464356427276696902==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============8464356427276696902==--


From xen-users-bounces@lists.xenproject.org Thu Jan 11 10:42:09 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 10:42:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZaIh-0000BB-1f; Thu, 11 Jan 2018 10:41:35 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=/6u+=eg=gmail.com=chengkunck@srs-us1.protection.inumbo.net>)
 id 1eZaIf-0000B5-Bh
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 10:41:33 +0000
X-Inumbo-ID: cbaf56f8-f6bb-11e7-b4a6-bc764e045a96
Received: from mail-lf0-x22d.google.com (unknown [2a00:1450:4010:c07::22d])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id cbaf56f8-f6bb-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 11:40:10 +0100 (CET)
Received: by mail-lf0-x22d.google.com with SMTP id m8so2223005lfc.6
 for <xen-users@lists.xenproject.org>; Thu, 11 Jan 2018 02:41:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to;
 bh=K0O4LJ2yP8hdHUw6E/5ZctAbScORC5DE5r9ge645O8w=;
 b=sVJGT4xW1C4Pa/hqI4R0PNgckkoh8FUa7PNAsQ2XSKuD7HuY0ZUKSPmkwJPQ/GuEDl
 6Os9Gu4TD6UoEP8Lu72LeyLD6VeMyCgIV/jtU2xmJWxsPPnBqX8KHzcEbG407imGVtSo
 DjAfiMGUgLJcvU/f0BUDnMAhbkpwiBT3VXfn/WC9psdYpgwJhP4d0oJXTjf3hvJXwG9B
 4JeI5RIZJIV2btahYrdGP3wVcMuxdDAvAffzBVuc7REIkpV/0T8zrsZ3yBTQ6sLDUAyT
 NJt3L301lCdzIZCvQF3wK7fbYGUh3ocMp5T+ym3cpe8VfVbBb17MyH6GnviSfIQfOnGL
 NQ6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to;
 bh=K0O4LJ2yP8hdHUw6E/5ZctAbScORC5DE5r9ge645O8w=;
 b=masoG17J8Aiw/tuUlAYTdgHQm5FuqitRM/MXCsi5uMYkszrghJSjnyTNdnjr8nzgqy
 PYTbE+rpEkosjevgvFLp9ql8MzqrjD6/Wn0xTLtI7bzARSzH1NcDNc1z+Y2PGrQNU/Yx
 daYvFx0zf8etZyGy7OAJ8mVIyUCCRAO81urx0CH5VhSZuFnx1C9G/yjhxr5pfag5o5jb
 Y7FlvAJHYmUGFGoF5XxmuoMVk+Ewi9Xf0zIFvuQIfDlreWg7RXPFipBnMP/e90tdo2g9
 8rWuxE9vpjJqz+u6UIa9EhY3CHWwkrXm552tIy3w4evLxTw6dOzFKyVFkM5SF5WV+Y2U
 GpjQ==
X-Gm-Message-State: AKwxytfaEcT97Vbv8EQSk6UN0qGXP4qYBkH1lF7BaOzbE7phl9SoaDKR
 ZKHnJ0ZP1hJq5PXhALqL+Lc3UbpQnBx+ZlNGK78=
X-Google-Smtp-Source: ACJfBoub9x/aS6kAMKbrCtDp4sSewQB+DpbL2f2LSiJYxa4O9xfVIQrzg3xp5uWMJDIxinrtauDVtyQP1D8WN1NlcZA=
X-Received: by 10.25.165.65 with SMTP id o62mr10857910lfe.81.1515667289995;
 Thu, 11 Jan 2018 02:41:29 -0800 (PST)
MIME-Version: 1.0
Received: by 10.179.93.5 with HTTP; Thu, 11 Jan 2018 02:40:59 -0800 (PST)
In-Reply-To: <3695c9bd-c597-29c1-df0c-0d7af430ea95@gmail.com>
References: <c7e1778c-3ce1-69ac-06ad-de53d4c40e6f@gmail.com>
 <CAO3v1VRUZ98a2oYEYp2hHwaLuqCcppChv9eBpGAv5JHdzMjE8w@mail.gmail.com>
 <3695c9bd-c597-29c1-df0c-0d7af430ea95@gmail.com>
From: Kun Cheng <chengkunck@gmail.com>
Date: Thu, 11 Jan 2018 18:40:59 +0800
Message-ID: <CAO3v1VSWxNfyCDqYpE1B_S-R5gdABkWK4gwJoo1vV=aCw3Kzbg@mail.gmail.com>
To: doa379 <doa379@gmail.com>, xen-users@lists.xenproject.org
Subject: Re: [Xen-users] Xen failing to boot dom0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 11 17:36:12 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 17:36:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZgkv-0006Zh-Gs; Thu, 11 Jan 2018 17:35:09 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=zegz=eg=gmail.com=doa379@srs-us1.protection.inumbo.net>)
 id 1eZgku-0006Zb-FA
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 17:35:08 +0000
X-Inumbo-ID: 92fbba97-f6f5-11e7-b4a6-bc764e045a96
Received: from mail-wm0-x22d.google.com (unknown [2a00:1450:400c:c09::22d])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 92fbba97-f6f5-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 18:33:45 +0100 (CET)
Received: by mail-wm0-x22d.google.com with SMTP id f140so6910523wmd.2
 for <xen-users@lists.xenproject.org>; Thu, 11 Jan 2018 09:35:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=subject:to:references:from:message-id:date:user-agent:mime-version
 :in-reply-to:content-language:content-transfer-encoding;
 bh=4iCgnsf2p1yoDcXBBVQlfRmwBJV+3mB2IUdCUNGCIFI=;
 b=WrzCZ+ZYR2KYvr5Zfjv3IIt8wYvHCsoxKlkprXtdq51H33vhA2mj/BEJTtoZdjj8hC
 d6m2qw6HULQlyBw2vcwqGCpSH8Zo0+I0GtZa7oeugM44LRdr40Pux88VLreJQIL4gL+E
 8cySdyIzbrmKku96s0otrxWlRZ8T9rjYDdwu4calwCvARAouIoVmIIVkHOLf5lxI0o0L
 phTzHLvyQby0f+EfC2klN3Haot26/ZT7vC7tNA3YX0sXjz9Jzh8/RzL7C+QfXQfhds/A
 C08C8OOKzaJqztpa/on2+vITCnByfXYL18NgrYrS3IgQ2RaMZdtTvascGqGJYjNdt/bc
 RymQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:subject:to:references:from:message-id:date
 :user-agent:mime-version:in-reply-to:content-language
 :content-transfer-encoding;
 bh=4iCgnsf2p1yoDcXBBVQlfRmwBJV+3mB2IUdCUNGCIFI=;
 b=sJpcCy61L2DoXpN+UdXXNaZUU411w5a6OMAYDAtstp+YJ3tS9GVZlgmAC5OxKg35Q7
 f8+jSoxORvxDv/Ogy/QlzjIwwSqSYi1AkqZSTOHC8UIfO5ccFc67Q0RTzHZoRlwixJmM
 9LBNrX3vkbTUtb1UhGVQmwetUzcB9Rpfhs6BNT5LhSWuLvm3jG6+bVDF4kYxH3n7a3Re
 rBfU3yKGKZ77tUH/IOE36f0Z3rGB5k2EfDeqiwxqK2GCXWPmA4aaSn67uzs5I0LT1T8n
 +di03RHhl5Nbrnnb7SAcBI9pkAFBAE11S/kz88TowMj/GLMMRjjW8USFduhRgRZLJ0Mh
 ZUrA==
X-Gm-Message-State: AKwxytcDMVZ7LjeGJG5Tt91Dbrl0obu2JEtozf9alyovW2gbn8Z9RUjp
 5m0GHOSenT0E9yp46aD59uhvDQ==
X-Google-Smtp-Source: ACJfBotbJle5aov9woNducVH8rHkJYLHXZXN2jH5hA83LS7yOcHtUSE7W+4Og/SglrnJNCnd/C5ICQ==
X-Received: by 10.28.107.134 with SMTP id a6mr1862209wmi.136.1515692106187;
 Thu, 11 Jan 2018 09:35:06 -0800 (PST)
Received: from [192.168.0.12] (host-92-25-116-85.as13285.net. [92.25.116.85])
 by smtp.googlemail.com with ESMTPSA id
 a126sm727613wma.11.2018.01.11.09.35.05
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Thu, 11 Jan 2018 09:35:05 -0800 (PST)
To: Kun Cheng <chengkunck@gmail.com>, xen-users@lists.xenproject.org
References: <c7e1778c-3ce1-69ac-06ad-de53d4c40e6f@gmail.com>
 <CAO3v1VRUZ98a2oYEYp2hHwaLuqCcppChv9eBpGAv5JHdzMjE8w@mail.gmail.com>
 <3695c9bd-c597-29c1-df0c-0d7af430ea95@gmail.com>
 <CAO3v1VSWxNfyCDqYpE1B_S-R5gdABkWK4gwJoo1vV=aCw3Kzbg@mail.gmail.com>
From: doa379 <doa379@gmail.com>
Message-ID: <87970c21-ea1f-3d80-9c0f-faae60289d61@gmail.com>
Date: Thu, 11 Jan 2018 17:35:15 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <CAO3v1VSWxNfyCDqYpE1B_S-R5gdABkWK4gwJoo1vV=aCw3Kzbg@mail.gmail.com>
Content-Language: en-GB
Subject: Re: [Xen-users] Xen failing to boot dom0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

SWYgaXQncyBhbnkgaGVscCB0byBzb21lb25lIHRoZSBsYXN0IG1lc3NhZ2UgYnkgWGVuIGlzICJz
d2l0Y2hpbmcgdG8gVkdBIApjb25zb2xlIi4gVGhlIHNjcmVlbiB0aGVuIGdvZXMgYmxhbmsgYW5k
IHRoZSBkZXZpY2UgaXMgdW5yZXNwb25zaXZlLgoKX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlz
dHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xp
c3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Thu Jan 11 20:10:19 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 20:10:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZjAD-0004Iq-Fg; Thu, 11 Jan 2018 20:09:25 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=cumc=eg=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eZjAB-0004IO-AU
 for xen-users@lists.xen.org; Thu, 11 Jan 2018 20:09:23 +0000
X-Inumbo-ID: 1e4f4a54-f70b-11e7-b4a6-bc764e045a96
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 1e4f4a54-f70b-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 21:07:59 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eZj9z-00070P-UW; Thu, 11 Jan 2018 20:09:11 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1eZj9z-0007m9-Rz; Thu, 11 Jan 2018 20:09:11 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eZj9z-0007m9-Rz@xenbits.xenproject.org>
Date: Thu, 11 Jan 2018 20:09:11 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 4

        Information leak via side effects of speculative execution

UPDATES IN VERSION 4
====================

Added README for determining which shim to use, as well as
instructions for using "Vixen" (HVM shim) and the required
conversion script

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by running guests in HVM or PVH mode.

RESOLUTION
==========

There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.

For guests with legacy PV kernels which cannot be run in HVM or PVH
mode directly, we have developed two "shim" hypervisors that allow PV
guests to run in HVM mode or PVH mode.  The HVM shim (codenamed
"Vixen") is available now.  We expect to have the PVH shim (codenamed
"Comet") available within a few days.  Please read README.which-shim
to determine which shim is suitable for you.

$ sha256sum xsa254*/*
2df6b811ec7a377a9cc717f7a8ed497f3a90928c21cba81182eb4a802e32ecd7  xsa254/README.vixen
bc04385fd3ec899e1b8c1c001b6169587a8a8b20d5d0d584ff749b7ed67d7e70  xsa254/README.which-shim
36e825118fa8fca30158e50607580ddf64f6c62e5c5127d87d0042fbe2ff37b2  xsa254/pvshim-converter.pl
$


NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaV8ReAAoJEIP+FMlX6CvZWoUH/joZJ3sMPCs5EHlDcKMcoWXx
YMsZuypqVyotc9WbvBdh3QfdfCEOqouJatHUBkl3Me8bzkJY1IEzcE4BlG0Ku1Bv
s2DKEcUDbEtA7zuJuQukeuYdx4QaqfVr93fnW48P2Ax2X7kBl1cvr5isxjBaPqC2
dHVMqXgwPGPwOzPW7GZjmzDikyPAHgsNxdH/rXdAHSJ8hLVUeQv3zhMaoUmvQiNb
xq7+mSIoVAZr82fXKGKApX2XTxmwq7SgyzAVVfGySID9GGjnGGoSpirpMtkD+7io
rpe0W+KD/muukgzvRd5+eHbx+dIq5MN0VnQiFbc2WmM8HNoJF/R8k/kvLtQfiZ4=
=2xGF
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa254/README.vixen"
Content-Disposition: attachment; filename="xsa254/README.vixen"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.which-shim"
Content-Disposition: attachment; filename="xsa254/README.which-shim"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/pvshim-converter.pl"
Content-Disposition: attachment; filename="xsa254/pvshim-converter.pl"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Thu Jan 11 21:17:52 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 21:17:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZkDZ-0002h3-D5; Thu, 11 Jan 2018 21:16:57 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=f0m1=eg=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1eZkDY-0002gx-PX
 for xen-users@lists.xen.org; Thu, 11 Jan 2018 21:16:56 +0000
X-Inumbo-ID: 8e14bcd5-f714-11e7-b4a6-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 8e14bcd5-f714-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 22:15:32 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date;
 bh=IqgmtQtEq+3L5eKjYw7iY9BKe1AUHg+fRvG9LQTPUW0=; 
 b=1Od7l4jovx0iRkGwxu0Gx+0idV9uX4T7l2/Vw82pIyG7KBNG1mxJQUGVg6RsUko+E2VNAy85eVLwf/+4f9uOwXioHFqP/NMlEdV+bJxtvZMBqf+aXvRJmDQEdjfaZWJfjJ8kKwrYVHT2uCcO0f9ItIB3ssIBistZs5nA2dkcHxuXvDs5Dd2iz1TxQs8lsQEDhArfLvzrXjuQAFbIwoxk2TBWtw3aAEkMpT5V4Tv5fmOYqP6GA5si+EcMyLpdQLFN9wyb9n53gS/KIHmw3S399p1Aj+Pnbz0M5QXeXd1udTKhZePU7uzxQcD/1r1lYV43mpMlzYMoItiIAs9jUBCP3w==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1eZkDU-00037U-JZ
 for xen-users@lists.xen.org; Thu, 11 Jan 2018 21:16:52 +0000
Date: Thu, 11 Jan 2018 21:16:52 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xen.org
Message-ID: <20180111211652.GT3124@bitfolk.com>
MIME-Version: 1.0
Content-Disposition: inline
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Subject: [Xen-users] Trying out vixen: failure to start device model
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 11 22:00:00 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 22:00:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZksj-0006UE-Gc; Thu, 11 Jan 2018 21:59:29 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=f0m1=eg=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1eZksi-0006U8-0q
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 21:59:28 +0000
X-Inumbo-ID: 7f31bc5a-f71a-11e7-b4a6-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 7f31bc5a-f71a-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 22:58:04 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date;
 bh=gMJ1kpDcoXkCiYjujUM3VGv0SETBlpnpflmbK5j4z7c=; 
 b=PFAx+6cEq2SgNq4ix7iVGQteFYE4Yeo4o6FR853Ei+m1KpoaMiploJZuySGopx/zdjw9kEOkAoc/5UPtodfvYlFvigXjL32fGEfAiRBcUI4OVxJtaKiirPzPcSBM2GdKtlS5JtCVGWL7PCo2Dv/moSFmetGc9dyoB2pxdSuoSJVfYWXYP6+qCnL4iYPQ2LBvuaSDUn03IfVJvrV/L2G6L+fqNdLJXMM3sNL2DwUZZaJkUBAVtblCPTB26nh81EjeaCqAUnCoeP68Jn9uwv31INesg4/aWPCuCMbt3LWRvyGLEPmspRDiqtkuX5jgeefYfm9SfWia3BvdSbaAQ92rSQ==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1eZkse-0004eg-ME
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 21:59:24 +0000
Date: Thu, 11 Jan 2018 21:59:24 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Message-ID: <20180111215924.GV3124@bitfolk.com>
References: <20180111211652.GT3124@bitfolk.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <20180111211652.GT3124@bitfolk.com>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Subject: Re: [Xen-users] Trying out vixen: failure to start device model
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

T24gVGh1LCBKYW4gMTEsIDIwMTggYXQgMDk6MTY6NTJQTSArMDAwMCwgQW5keSBTbWl0aCB3cm90
ZToKPiBQYXJzaW5nIGNvbmZpZyBmcm9tIC9ldGMveGVuL2RlYnRlc3QxLXdpdGgtc2hpbS5jb25m
Cj4gbGlieGw6IGVycm9yOiBsaWJ4bF9kbS5jOjIxODk6ZGV2aWNlX21vZGVsX3NwYXduX291dGNv
bWU6IGRvbWFpbiA3IGRldmljZSBtb2RlbDogc3Bhd24gZmFpbGVkIChyYz0tMykKPiBsaWJ4bDog
ZXJyb3I6IGxpYnhsX2NyZWF0ZS5jOjE1MDQ6ZG9tY3JlYXRlX2Rldm1vZGVsX3N0YXJ0ZWQ6IGRl
dmljZSBtb2RlbCBkaWQgbm90IHN0YXJ0OiAtMwo+IGxpYnhsOiBlcnJvcjogbGlieGxfZG0uYzoy
MzAzOmtpbGxfZGV2aWNlX21vZGVsOiBEZXZpY2UgTW9kZWwgYWxyZWFkeSBleGl0ZWQKPiBsaWJ4
bDogZXJyb3I6IGxpYnhsLmM6MTU3NTpsaWJ4bF9fZGVzdHJveV9kb21pZDogbm9uLWV4aXN0YW50
IGRvbWFpbiA3Cj4gbGlieGw6IGVycm9yOiBsaWJ4bC5jOjE1MzQ6ZG9tYWluX2Rlc3Ryb3lfY2Fs
bGJhY2s6IHVuYWJsZSB0byBkZXN0cm95IGd1ZXN0IHdpdGggZG9taWQgNwo+IGxpYnhsOiBlcnJv
cjogbGlieGwuYzoxNDYzOmRvbWFpbl9kZXN0cm95X2NiOiBkZXN0cnVjdGlvbiBvZiBkb21haW4g
NyBmYWlsZWQKCnhsIC12dnZ2IG91dHB1dDoKClBhcnNpbmcgY29uZmlnIGZyb20gL2V0Yy94ZW4v
ZGVidGVzdDEtd2l0aC1zaGltLmNvbmYKbGlieGw6IGRlYnVnOiBsaWJ4bF9jcmVhdGUuYzoxNjE0
OmRvX2RvbWFpbl9jcmVhdGU6IGFvIDB4MWI0NWJjMDogY3JlYXRlOiBob3c9KG5pbCkgY2FsbGJh
Y2s9KG5pbCkgcG9sbGVyPTB4MWI0NWM1MApsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjM2
MTpsaWJ4bF9fZGV2aWNlX2Rpc2tfc2V0X2JhY2tlbmQ6IERpc2sgdmRldj14dmRhIHNwZWMuYmFj
a2VuZD11bmtub3duCmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6Mzk2OmxpYnhsX19kZXZp
Y2VfZGlza19zZXRfYmFja2VuZDogRGlzayB2ZGV2PXh2ZGEsIHVzaW5nIGJhY2tlbmQgcGh5Cmxp
YnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MzYxOmxpYnhsX19kZXZpY2VfZGlza19zZXRfYmFj
a2VuZDogRGlzayB2ZGV2PXh2ZGIgc3BlYy5iYWNrZW5kPXVua25vd24KbGlieGw6IGRlYnVnOiBs
aWJ4bF9kZXZpY2UuYzozOTY6bGlieGxfX2RldmljZV9kaXNrX3NldF9iYWNrZW5kOiBEaXNrIHZk
ZXY9eHZkYiwgdXNpbmcgYmFja2VuZCBwaHkKbGlieGw6IGRlYnVnOiBsaWJ4bF9jcmVhdGUuYzo5
NzA6aW5pdGlhdGVfZG9tYWluX2NyZWF0ZTogcnVubmluZyBib290bG9hZGVyCmxpYnhsOiBkZWJ1
ZzogbGlieGxfYm9vdGxvYWRlci5jOjMyNDpsaWJ4bF9fYm9vdGxvYWRlcl9ydW46IG5vdCBhIFBW
IGRvbWFpbiwgc2tpcHBpbmcgYm9vdGxvYWRlcgpsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6
Njg2OmxpYnhsX19ldl94c3dhdGNoX2RlcmVnaXN0ZXI6IHdhdGNoIHc9MHgxYjQ2NzYwOiBkZXJl
Z2lzdGVyIHVucmVnaXN0ZXJlZApkb21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2RvbV9hbGxvY2F0
ZTogY21kbGluZT0iKG51bGwpIiwgZmVhdHVyZXM9IihudWxsKSIKZG9tYWluYnVpbGRlcjogZGV0
YWlsOiB4Y19kb21fa2VybmVsX2ZpbGU6IGZpbGVuYW1lPSIvdXNyL2xpYi94ZW4tNC44L2Jvb3Qv
aHZtbG9hZGVyIgpkb21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2RvbV9tYWxsb2NfZmlsZW1hcCAg
ICA6IDE2OSBrQgpsaWJ4bDogZGVidWc6IGxpYnhsX2RvbS5jOjg4NDpsaWJ4bF9fbG9hZF9odm1f
ZmlybXdhcmVfbW9kdWxlOiBMb2FkaW5nIEJJT1M6IC91c3Ivc2hhcmUvc2VhYmlvcy9iaW9zLTI1
NmsuYmluCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogeGNfZG9tX2Jvb3RfeGVuX2luaXQ6IHZlciA0
LjgsIGNhcHMgeGVuLTMuMC14ODZfNjQgeGVuLTMuMC14ODZfMzJwIGh2bS0zLjAteDg2XzMyIGh2
bS0zLjAteDg2XzMycCBodm0tMy4wLXg4Nl82NApkb21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2Rv
bV9wYXJzZV9pbWFnZTogY2FsbGVkCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogeGNfZG9tX2ZpbmRf
bG9hZGVyOiB0cnlpbmcgbXVsdGlib290LWJpbmFyeSBsb2FkZXIgLi4uCmRvbWFpbmJ1aWxkZXI6
IGRldGFpbDogbG9hZGVyIHByb2JlIGZhaWxlZApkb21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2Rv
bV9maW5kX2xvYWRlcjogdHJ5aW5nIEhWTS1nZW5lcmljIGxvYWRlciAuLi4KZG9tYWluYnVpbGRl
cjogZGV0YWlsOiBsb2FkZXIgcHJvYmUgT0sKeGM6IGRldGFpbDogRUxGOiBwaGRyOiBwYWRkcj0w
eDEwMDAwMCBtZW1zej0weDMzZTg0CnhjOiBkZXRhaWw6IEVMRjogbWVtb3J5OiAweDEwMDAwMCAt
PiAweDEzM2U4NApkb21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2RvbV9tZW1faW5pdDogbWVtIDI1
NTIgTUIsIHBhZ2VzIDB4OWY4MDAgcGFnZXMsIDRrIGVhY2gKZG9tYWluYnVpbGRlcjogZGV0YWls
OiB4Y19kb21fbWVtX2luaXQ6IDB4OWY4MDAgcGFnZXMKZG9tYWluYnVpbGRlcjogZGV0YWlsOiB4
Y19kb21fYm9vdF9tZW1faW5pdDogY2FsbGVkCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogeGNfZG9t
X21hbGxvYyAgICAgICAgICAgIDogNTEwNCBrQgp4YzogZGV0YWlsOiBQSFlTSUNBTCBNRU1PUlkg
QUxMT0NBVElPTjoKeGM6IGRldGFpbDogICA0S0IgUEFHRVM6IDB4MDAwMDAwMDAwMDAwMDIwMAp4
YzogZGV0YWlsOiAgIDJNQiBQQUdFUzogMHgwMDAwMDAwMDAwMDAwMmZiCnhjOiBkZXRhaWw6ICAg
MUdCIFBBR0VTOiAweDAwMDAwMDAwMDAwMDAwMDEKZG9tYWluYnVpbGRlcjogZGV0YWlsOiB4Y19k
b21fYnVpbGRfaW1hZ2U6IGNhbGxlZApkb21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2RvbV9wZm5f
dG9fcHRyX3JldGNvdW50OiBkb21VIG1hcHBpbmc6IHBmbiAweDEwMCsweDM0IGF0IDB4N2Y1MWQ4
MjlkMDAwCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogeGNfZG9tX2FsbG9jX3NlZ21lbnQ6ICAga2Vy
bmVsICAgICAgIDogMHgxMDAwMDAgLT4gMHgxMzQwMDAgIChwZm4gMHgxMDAgKyAweDM0IHBhZ2Vz
KQp4YzogZGV0YWlsOiBFTEY6IHBoZHIgMCBhdCAweDdmNTFkODI2OTAwMCAtPiAweDdmNTFkODI5
MzQwMApkb21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2RvbV9wZm5fdG9fcHRyX3JldGNvdW50OiBk
b21VIG1hcHBpbmc6IHBmbiAweDEzNCsweDQwIGF0IDB4N2Y1MWQ4MjVkMDAwCmRvbWFpbmJ1aWxk
ZXI6IGRldGFpbDogeGNfZG9tX2FsbG9jX3NlZ21lbnQ6ICAgU3lzdGVtIEZpcm13YXJlIG1vZHVs
ZSA6IDB4MTM0MDAwIC0+IDB4MTc0MDAwICAocGZuIDB4MTM0ICsgMHg0MCBwYWdlcykKZG9tYWlu
YnVpbGRlcjogZGV0YWlsOiB4Y19kb21fcGZuX3RvX3B0cl9yZXRjb3VudDogZG9tVSBtYXBwaW5n
OiBwZm4gMHgxNzQrMHgxIGF0IDB4N2Y1MWQ4MzRmMDAwCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDog
eGNfZG9tX2FsbG9jX3NlZ21lbnQ6ICAgSFZNIHN0YXJ0IGluZm8gOiAweDE3NDAwMCAtPiAweDE3
NTAwMCAgKHBmbiAweDE3NCArIDB4MSBwYWdlcykKZG9tYWluYnVpbGRlcjogZGV0YWlsOiBhbGxv
Y19wZ3RhYmxlc19odm06IGRvaW5nIG5vdGhpbmcKZG9tYWluYnVpbGRlcjogZGV0YWlsOiB4Y19k
b21fYnVpbGRfaW1hZ2UgIDogdmlydF9hbGxvY19lbmQgOiAweDE3NTAwMApkb21haW5idWlsZGVy
OiBkZXRhaWw6IHhjX2RvbV9idWlsZF9pbWFnZSAgOiB2aXJ0X3BndGFiX2VuZCA6IDB4MApkb21h
aW5idWlsZGVyOiBkZXRhaWw6IHhjX2RvbV9ib290X2ltYWdlOiBjYWxsZWQKZG9tYWluYnVpbGRl
cjogZGV0YWlsOiBib290ZWFybHk6IGRvaW5nIG5vdGhpbmcKZG9tYWluYnVpbGRlcjogZGV0YWls
OiB4Y19kb21fY29tcGF0X2NoZWNrOiBzdXBwb3J0ZWQgZ3Vlc3QgdHlwZTogeGVuLTMuMC14ODZf
NjQKZG9tYWluYnVpbGRlcjogZGV0YWlsOiB4Y19kb21fY29tcGF0X2NoZWNrOiBzdXBwb3J0ZWQg
Z3Vlc3QgdHlwZTogeGVuLTMuMC14ODZfMzJwCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogeGNfZG9t
X2NvbXBhdF9jaGVjazogc3VwcG9ydGVkIGd1ZXN0IHR5cGU6IGh2bS0zLjAteDg2XzMyIDw9IG1h
dGNoZXMKZG9tYWluYnVpbGRlcjogZGV0YWlsOiB4Y19kb21fY29tcGF0X2NoZWNrOiBzdXBwb3J0
ZWQgZ3Vlc3QgdHlwZTogaHZtLTMuMC14ODZfMzJwCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogeGNf
ZG9tX2NvbXBhdF9jaGVjazogc3VwcG9ydGVkIGd1ZXN0IHR5cGU6IGh2bS0zLjAteDg2XzY0CmRv
bWFpbmJ1aWxkZXI6IGRldGFpbDogY2xlYXJfcGFnZTogcGZuIDB4ZmVmZmYsIG1mbiAweGZlZmZm
CmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogY2xlYXJfcGFnZTogcGZuIDB4ZmVmZmMsIG1mbiAweGZl
ZmZjCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogZG9tYWluIGJ1aWxkZXIgbWVtb3J5IGZvb3Rwcmlu
dApkb21haW5idWlsZGVyOiBkZXRhaWw6ICAgIGFsbG9jYXRlZApkb21haW5idWlsZGVyOiBkZXRh
aWw6ICAgICAgIG1hbGxvYyAgICAgICAgICAgICA6IDUxMDkga0IKZG9tYWluYnVpbGRlcjogZGV0
YWlsOiAgICAgICBhbm9uIG1tYXAgICAgICAgICAgOiAwIGJ5dGVzCmRvbWFpbmJ1aWxkZXI6IGRl
dGFpbDogICAgbWFwcGVkCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogICAgICAgZmlsZSBtbWFwICAg
ICAgICAgIDogMTY5IGtCCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogICAgICAgZG9tVSBtbWFwICAg
ICAgICAgIDogNDY4IGtCCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogdmNwdV9odm06IGNhbGxlZApk
b21haW5idWlsZGVyOiBkZXRhaWw6IHhjX2RvbV9nbnR0YWJfaHZtX3NlZWQ6IGNhbGxlZCwgcGZu
PTB4ZmYwMDAKZG9tYWluYnVpbGRlcjogZGV0YWlsOiB4Y19kb21fZ250dGFiX2h2bV9zZWVkOiBj
YWxsZWQsIHBmbj0weGZmMDAxCmRvbWFpbmJ1aWxkZXI6IGRldGFpbDogeGNfZG9tX3JlbGVhc2U6
IGNhbGxlZApsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjM2MTpsaWJ4bF9fZGV2aWNlX2Rp
c2tfc2V0X2JhY2tlbmQ6IERpc2sgdmRldj14dmRhIHNwZWMuYmFja2VuZD1waHkKbGlieGw6IGRl
YnVnOiBsaWJ4bF9ldmVudC5jOjYzNjpsaWJ4bF9fZXZfeHN3YXRjaF9yZWdpc3Rlcjogd2F0Y2gg
dz0weDFiNDg1ZjAgd3BhdGg9L2xvY2FsL2RvbWFpbi8wL2JhY2tlbmQvdmJkLzkvNTE3MTIvc3Rh
dGUgdG9rZW49My8wOiByZWdpc3RlciBzbG90bnVtPTMKbGlieGw6IGRlYnVnOiBsaWJ4bF9kZXZp
Y2UuYzozNjE6bGlieGxfX2RldmljZV9kaXNrX3NldF9iYWNrZW5kOiBEaXNrIHZkZXY9eHZkYiBz
cGVjLmJhY2tlbmQ9cGh5CmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MzYxOmxpYnhsX19k
ZXZpY2VfZGlza19zZXRfYmFja2VuZDogRGlzayB2ZGV2PXh2ZGIgc3BlYy5iYWNrZW5kPXBoeQps
aWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6NjM2OmxpYnhsX19ldl94c3dhdGNoX3JlZ2lzdGVy
OiB3YXRjaCB3PTB4MWI0OWMwMCB3cGF0aD0vbG9jYWwvZG9tYWluLzAvYmFja2VuZC92YmQvOS81
MTcyOC9zdGF0ZSB0b2tlbj0yLzE6IHJlZ2lzdGVyIHNsb3RudW09MgpsaWJ4bDogZGVidWc6IGxp
YnhsX2NyZWF0ZS5jOjE2NDA6ZG9fZG9tYWluX2NyZWF0ZTogYW8gMHgxYjQ1YmMwOiBpbnByb2dy
ZXNzOiBwb2xsZXI9MHgxYjQ1YzUwLCBmbGFncz1pCmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQu
Yzo1NzM6d2F0Y2hmZF9jYWxsYmFjazogd2F0Y2ggdz0weDFiNDg1ZjAgd3BhdGg9L2xvY2FsL2Rv
bWFpbi8wL2JhY2tlbmQvdmJkLzkvNTE3MTIvc3RhdGUgdG9rZW49My8wOiBldmVudCBlcGF0aD0v
bG9jYWwvZG9tYWluLzAvYmFja2VuZC92YmQvOS81MTcxMi9zdGF0ZQpsaWJ4bDogZGVidWc6IGxp
YnhsX2V2ZW50LmM6ODc0OmRldnN0YXRlX2NhbGxiYWNrOiBiYWNrZW5kIC9sb2NhbC9kb21haW4v
MC9iYWNrZW5kL3ZiZC85LzUxNzEyL3N0YXRlIHdhbnRlZCBzdGF0ZSAyIG9rCmxpYnhsOiBkZWJ1
ZzogbGlieGxfZXZlbnQuYzo2NzM6bGlieGxfX2V2X3hzd2F0Y2hfZGVyZWdpc3Rlcjogd2F0Y2gg
dz0weDFiNDg1ZjAgd3BhdGg9L2xvY2FsL2RvbWFpbi8wL2JhY2tlbmQvdmJkLzkvNTE3MTIvc3Rh
dGUgdG9rZW49My8wOiBkZXJlZ2lzdGVyIHNsb3RudW09MwpsaWJ4bDogZGVidWc6IGxpYnhsX2Rl
dmljZS5jOjEwNTk6ZGV2aWNlX2JhY2tlbmRfY2FsbGJhY2s6IGNhbGxpbmcgZGV2aWNlX2JhY2tl
bmRfY2xlYW51cApsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6Njg2OmxpYnhsX19ldl94c3dh
dGNoX2RlcmVnaXN0ZXI6IHdhdGNoIHc9MHgxYjQ4NWYwOiBkZXJlZ2lzdGVyIHVucmVnaXN0ZXJl
ZApsaWJ4bDogZGVidWc6IGxpYnhsX2xpbnV4LmM6MTgzOmxpYnhsX19ob3RwbHVnX2Rpc2s6IEFy
Z3MgYW5kIGVudmlyb25tZW50IHJlYWR5CmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE1
NzpkZXZpY2VfaG90cGx1ZzogY2FsbGluZyBob3RwbHVnIHNjcmlwdDogL2V0Yy94ZW4vc2NyaXB0
cy9ibG9jayBhZGQKbGlieGw6IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMTU4OmRldmljZV9ob3Rw
bHVnOiBleHRyYSBhcmdzOgpsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjExNjY6ZGV2aWNl
X2hvdHBsdWc6IGVudjoKbGlieGw6IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMTczOmRldmljZV9o
b3RwbHVnOiAgICAgICBzY3JpcHQ6IC9ldGMveGVuL3NjcmlwdHMvYmxvY2sKbGlieGw6IGRlYnVn
OiBsaWJ4bF9kZXZpY2UuYzoxMTczOmRldmljZV9ob3RwbHVnOiAgICAgICBYRU5CVVNfVFlQRTog
dmJkCmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE3MzpkZXZpY2VfaG90cGx1ZzogICAg
ICAgWEVOQlVTX1BBVEg6IGJhY2tlbmQvdmJkLzkvNTE3MTIKbGlieGw6IGRlYnVnOiBsaWJ4bF9k
ZXZpY2UuYzoxMTczOmRldmljZV9ob3RwbHVnOiAgICAgICBYRU5CVVNfQkFTRV9QQVRIOiBiYWNr
ZW5kCmxpYnhsOiBkZWJ1ZzogbGlieGxfYW91dGlscy5jOjU5MzpsaWJ4bF9fYXN5bmNfZXhlY19z
dGFydDogZm9ya2luZyB0byBleGVjdXRlOiAvZXRjL3hlbi9zY3JpcHRzL2Jsb2NrIGFkZApsaWJ4
bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6NTQyOndhdGNoZmRfY2FsbGJhY2s6IHdhdGNoIGVwYXRo
PS9sb2NhbC9kb21haW4vMC9iYWNrZW5kL3ZiZC85LzUxNzEyL3N0YXRlIHRva2VuPTMvMDogZW1w
dHkgc2xvdApsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6NTczOndhdGNoZmRfY2FsbGJhY2s6
IHdhdGNoIHc9MHgxYjQ5YzAwIHdwYXRoPS9sb2NhbC9kb21haW4vMC9iYWNrZW5kL3ZiZC85LzUx
NzI4L3N0YXRlIHRva2VuPTIvMTogZXZlbnQgZXBhdGg9L2xvY2FsL2RvbWFpbi8wL2JhY2tlbmQv
dmJkLzkvNTE3Mjgvc3RhdGUKbGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVudC5jOjg3NDpkZXZzdGF0
ZV9jYWxsYmFjazogYmFja2VuZCAvbG9jYWwvZG9tYWluLzAvYmFja2VuZC92YmQvOS81MTcyOC9z
dGF0ZSB3YW50ZWQgc3RhdGUgMiBvawpsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6NjczOmxp
YnhsX19ldl94c3dhdGNoX2RlcmVnaXN0ZXI6IHdhdGNoIHc9MHgxYjQ5YzAwIHdwYXRoPS9sb2Nh
bC9kb21haW4vMC9iYWNrZW5kL3ZiZC85LzUxNzI4L3N0YXRlIHRva2VuPTIvMTogZGVyZWdpc3Rl
ciBzbG90bnVtPTIKbGlieGw6IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMDU5OmRldmljZV9iYWNr
ZW5kX2NhbGxiYWNrOiBjYWxsaW5nIGRldmljZV9iYWNrZW5kX2NsZWFudXAKbGlieGw6IGRlYnVn
OiBsaWJ4bF9ldmVudC5jOjY4NjpsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyOiB3YXRjaCB3
PTB4MWI0OWMwMDogZGVyZWdpc3RlciB1bnJlZ2lzdGVyZWQKbGlieGw6IGRlYnVnOiBsaWJ4bF9s
aW51eC5jOjE4MzpsaWJ4bF9faG90cGx1Z19kaXNrOiBBcmdzIGFuZCBlbnZpcm9ubWVudCByZWFk
eQpsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjExNTc6ZGV2aWNlX2hvdHBsdWc6IGNhbGxp
bmcgaG90cGx1ZyBzY3JpcHQ6IC9ldGMveGVuL3NjcmlwdHMvYmxvY2sgYWRkCmxpYnhsOiBkZWJ1
ZzogbGlieGxfZGV2aWNlLmM6MTE1ODpkZXZpY2VfaG90cGx1ZzogZXh0cmEgYXJnczoKbGlieGw6
IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMTY2OmRldmljZV9ob3RwbHVnOiBlbnY6CmxpYnhsOiBk
ZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE3MzpkZXZpY2VfaG90cGx1ZzogICAgICAgc2NyaXB0OiAv
ZXRjL3hlbi9zY3JpcHRzL2Jsb2NrCmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE3Mzpk
ZXZpY2VfaG90cGx1ZzogICAgICAgWEVOQlVTX1RZUEU6IHZiZApsaWJ4bDogZGVidWc6IGxpYnhs
X2RldmljZS5jOjExNzM6ZGV2aWNlX2hvdHBsdWc6ICAgICAgIFhFTkJVU19QQVRIOiBiYWNrZW5k
L3ZiZC85LzUxNzI4CmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE3MzpkZXZpY2VfaG90
cGx1ZzogICAgICAgWEVOQlVTX0JBU0VfUEFUSDogYmFja2VuZApsaWJ4bDogZGVidWc6IGxpYnhs
X2FvdXRpbHMuYzo1OTM6bGlieGxfX2FzeW5jX2V4ZWNfc3RhcnQ6IGZvcmtpbmcgdG8gZXhlY3V0
ZTogL2V0Yy94ZW4vc2NyaXB0cy9ibG9jayBhZGQKbGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVudC5j
OjU0Mjp3YXRjaGZkX2NhbGxiYWNrOiB3YXRjaCBlcGF0aD0vbG9jYWwvZG9tYWluLzAvYmFja2Vu
ZC92YmQvOS81MTcyOC9zdGF0ZSB0b2tlbj0yLzE6IGVtcHR5IHNsb3QKbGlieGw6IGRlYnVnOiBs
aWJ4bF9ldmVudC5jOjY4NjpsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyOiB3YXRjaCB3PTB4
MWI0ODZmMDogZGVyZWdpc3RlciB1bnJlZ2lzdGVyZWQKbGlieGw6IGRlYnVnOiBsaWJ4bF9saW51
eC5jOjIwMDpsaWJ4bF9fZ2V0X2hvdHBsdWdfc2NyaXB0X2luZm86IG51bV9leGVjIDEsIG5vdCBy
dW5uaW5nIGhvdHBsdWcgc2NyaXB0cwpsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjExNDM6
ZGV2aWNlX2hvdHBsdWc6IE5vIGhvdHBsdWcgc2NyaXB0IHRvIGV4ZWN1dGUKbGlieGw6IGRlYnVn
OiBsaWJ4bF9ldmVudC5jOjY4NjpsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyOiB3YXRjaCB3
PTB4MWI0ODZmMDogZGVyZWdpc3RlciB1bnJlZ2lzdGVyZWQKbGlieGw6IGRlYnVnOiBsaWJ4bF9l
dmVudC5jOjY4NjpsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyOiB3YXRjaCB3PTB4MWI0OWQw
MDogZGVyZWdpc3RlciB1bnJlZ2lzdGVyZWQKbGlieGw6IGRlYnVnOiBsaWJ4bF9saW51eC5jOjIw
MDpsaWJ4bF9fZ2V0X2hvdHBsdWdfc2NyaXB0X2luZm86IG51bV9leGVjIDEsIG5vdCBydW5uaW5n
IGhvdHBsdWcgc2NyaXB0cwpsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjExNDM6ZGV2aWNl
X2hvdHBsdWc6IE5vIGhvdHBsdWcgc2NyaXB0IHRvIGV4ZWN1dGUKbGlieGw6IGRlYnVnOiBsaWJ4
bF9ldmVudC5jOjY4NjpsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyOiB3YXRjaCB3PTB4MWI0
OWQwMDogZGVyZWdpc3RlciB1bnJlZ2lzdGVyZWQKbGlieGw6IGRlYnVnOiBsaWJ4bC5jOjI4ODk6
bGlieGxfX2RldmljZV9kaXNrX2ZpbmRfbG9jYWxfcGF0aDogRGlyZWN0bHkgYWNjZXNzaW5nIGxv
Y2FsIFJBVyBkaXNrIC9kZXYvc3NkdmcvZG9tdV9kZWJ0ZXN0MV94dmRhCmxpYnhsOiBkZWJ1Zzog
bGlieGwuYzoyODg5OmxpYnhsX19kZXZpY2VfZGlza19maW5kX2xvY2FsX3BhdGg6IERpcmVjdGx5
IGFjY2Vzc2luZyBsb2NhbCBSQVcgZGlzayAvZGV2L3NzZHZnL2RvbXVfZGVidGVzdDFfeHZkYgps
aWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MTUwMDpsaWJ4bF9fYnVpbGRfZGV2aWNlX21vZGVsX2Fy
Z3NfbmV3OiBDb3VsZCBub3QgZmluZCB1c2VyIHhlbi1xZW11dXNlci1zaGFyZWQsIHN0YXJ0aW5n
IFFFTVUgYXMgcm9vdApsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NDpsaWJ4bF9fc3Bhd25f
bG9jYWxfZG06IFNwYXduaW5nIGRldmljZS1tb2RlbCAvdmFyL2xpYi94ZW4vcHZzaGltLXNpZGVj
YXJzL2RlYnRlc3QxLmRtIHdpdGggYXJndW1lbnRzOgpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6
MjA5NjpsaWJ4bF9fc3Bhd25fbG9jYWxfZG06ICAgL3Zhci9saWIveGVuL3B2c2hpbS1zaWRlY2Fy
cy9kZWJ0ZXN0MS5kbQpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bhd25f
bG9jYWxfZG06ICAgLXhlbi1kb21pZApsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4
bF9fc3Bhd25fbG9jYWxfZG06ICAgOQpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4
bF9fc3Bhd25fbG9jYWxfZG06ICAgLWNoYXJkZXYKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIw
OTY6bGlieGxfX3NwYXduX2xvY2FsX2RtOiAgIHNvY2tldCxpZD1saWJ4bC1jbWQscGF0aD0vdmFy
L3J1bi94ZW4vcW1wLWxpYnhsLTksc2VydmVyLG5vd2FpdApsaWJ4bDogZGVidWc6IGxpYnhsX2Rt
LmM6MjA5NjpsaWJ4bF9fc3Bhd25fbG9jYWxfZG06ICAgLW5vLXNodXRkb3duCmxpYnhsOiBkZWJ1
ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICAtbW9uCmxpYnhsOiBk
ZWJ1ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICBjaGFyZGV2PWxp
YnhsLWNtZCxtb2RlPWNvbnRyb2wKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxf
X3NwYXduX2xvY2FsX2RtOiAgIC1jaGFyZGV2CmxpYnhsOiBkZWJ1ZzogbGlieGxfZG0uYzoyMDk2
OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICBzb2NrZXQsaWQ9bGlieGVuc3RhdC1jbWQscGF0aD0v
dmFyL3J1bi94ZW4vcW1wLWxpYnhlbnN0YXQtOSxzZXJ2ZXIsbm93YWl0CmxpYnhsOiBkZWJ1Zzog
bGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICAtbW9uCmxpYnhsOiBkZWJ1
ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICBjaGFyZGV2PWxpYnhl
bnN0YXQtY21kLG1vZGU9Y29udHJvbApsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4
bF9fc3Bhd25fbG9jYWxfZG06ICAgLW5vZGVmYXVsdHMKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5j
OjIwOTY6bGlieGxfX3NwYXduX2xvY2FsX2RtOiAgIC1uby11c2VyLWNvbmZpZwpsaWJ4bDogZGVi
dWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bhd25fbG9jYWxfZG06ICAgLW5hbWUKbGlieGw6
IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3NwYXduX2xvY2FsX2RtOiAgIGRlYnRlc3Qx
CmxpYnhsOiBkZWJ1ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICAt
dm5jCmxpYnhsOiBkZWJ1ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTog
ICAxMjcuMC4wLjE6MCx0bz05OQpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9f
c3Bhd25fbG9jYWxfZG06ICAgLWRpc3BsYXkKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6
bGlieGxfX3NwYXduX2xvY2FsX2RtOiAgIG5vbmUKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIw
OTY6bGlieGxfX3NwYXduX2xvY2FsX2RtOiAgIC1rZXJuZWwKbGlieGw6IGRlYnVnOiBsaWJ4bF9k
bS5jOjIwOTY6bGlieGxfX3NwYXduX2xvY2FsX2RtOiAgIC9vcHQvZ3J1Yi9saWIvZ3J1Yi14ODZf
NjQteGVuLmJpbgpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bhd25fbG9j
YWxfZG06ICAgLXNlcmlhbApsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bh
d25fbG9jYWxfZG06ICAgcHR5CmxpYnhsOiBkZWJ1ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19z
cGF3bl9sb2NhbF9kbTogICAtZGV2aWNlCmxpYnhsOiBkZWJ1ZzogbGlieGxfZG0uYzoyMDk2Omxp
YnhsX19zcGF3bl9sb2NhbF9kbTogICBjaXJydXMtdmdhLHZnYW1lbV9tYj04CmxpYnhsOiBkZWJ1
ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICAtYm9vdApsaWJ4bDog
ZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bhd25fbG9jYWxfZG06ICAgb3JkZXI9Ywps
aWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bhd25fbG9jYWxfZG06ICAgLXNt
cApsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bhd25fbG9jYWxfZG06ICAg
MixtYXhjcHVzPTIKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3NwYXduX2xv
Y2FsX2RtOiAgIC1kZXZpY2UKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3Nw
YXduX2xvY2FsX2RtOiAgIHJ0bDgxMzksaWQ9bmljMCxuZXRkZXY9bmV0MCxtYWM9MDA6MTY6NWU6
MDA6MDI6MzkKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3NwYXduX2xvY2Fs
X2RtOiAgIC1uZXRkZXYKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3NwYXdu
X2xvY2FsX2RtOiAgIHR5cGU9dGFwLGlkPW5ldDAsaWZuYW1lPXZpZjkuMC1lbXUsc2NyaXB0PW5v
LGRvd25zY3JpcHQ9bm8KbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3NwYXdu
X2xvY2FsX2RtOiAgIC1tYWNoaW5lCmxpYnhsOiBkZWJ1ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhs
X19zcGF3bl9sb2NhbF9kbTogICB4ZW5mdgpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5Njps
aWJ4bF9fc3Bhd25fbG9jYWxfZG06ICAgLWNkcm9tCmxpYnhsOiBkZWJ1ZzogbGlieGxfZG0uYzoy
MDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICAvdmFyL2xpYi94ZW4vcHZzaGltLXNpZGVjYXJz
L2RlYnRlc3QxLmlzbwpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4bF9fc3Bhd25f
bG9jYWxfZG06ICAgLW0KbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3NwYXdu
X2xvY2FsX2RtOiAgIDI1NTIKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3Nw
YXduX2xvY2FsX2RtOiAgIC1kcml2ZQpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5NjpsaWJ4
bF9fc3Bhd25fbG9jYWxfZG06ICAgZmlsZT0vZGV2L3NzZHZnL2RvbXVfZGVidGVzdDFfeHZkYSxp
Zj1pZGUsaW5kZXg9MCxtZWRpYT1kaXNrLGZvcm1hdD1yYXcsY2FjaGU9d3JpdGViYWNrCmxpYnhs
OiBkZWJ1ZzogbGlieGxfZG0uYzoyMDk2OmxpYnhsX19zcGF3bl9sb2NhbF9kbTogICAtZHJpdmUK
bGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIwOTY6bGlieGxfX3NwYXduX2xvY2FsX2RtOiAgIGZp
bGU9L2Rldi9zc2R2Zy9kb211X2RlYnRlc3QxX3h2ZGIsaWY9aWRlLGluZGV4PTEsbWVkaWE9ZGlz
ayxmb3JtYXQ9cmF3LGNhY2hlPXdyaXRlYmFjawpsaWJ4bDogZGVidWc6IGxpYnhsX2RtLmM6MjA5
ODpsaWJ4bF9fc3Bhd25fbG9jYWxfZG06IFNwYXduaW5nIGRldmljZS1tb2RlbCAvdmFyL2xpYi94
ZW4vcHZzaGltLXNpZGVjYXJzL2RlYnRlc3QxLmRtIHdpdGggYWRkaXRpb25hbCBlbnZpcm9ubWVu
dDoKbGlieGw6IGRlYnVnOiBsaWJ4bF9kbS5jOjIxMDA6bGlieGxfX3NwYXduX2xvY2FsX2RtOiAg
IFhFTl9RRU1VX0NPTlNPTEVfTElNSVQ9MTA0ODU3NgpsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50
LmM6NjM2OmxpYnhsX19ldl94c3dhdGNoX3JlZ2lzdGVyOiB3YXRjaCB3PTB4MWI0NmE1OCB3cGF0
aD0vbG9jYWwvZG9tYWluLzAvZGV2aWNlLW1vZGVsLzkvc3RhdGUgdG9rZW49Mi8yOiByZWdpc3Rl
ciBzbG90bnVtPTIKbGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVudC5jOjU3Mzp3YXRjaGZkX2NhbGxi
YWNrOiB3YXRjaCB3PTB4MWI0NmE1OCB3cGF0aD0vbG9jYWwvZG9tYWluLzAvZGV2aWNlLW1vZGVs
Lzkvc3RhdGUgdG9rZW49Mi8yOiBldmVudCBlcGF0aD0vbG9jYWwvZG9tYWluLzAvZGV2aWNlLW1v
ZGVsLzkvc3RhdGUKbGlieGw6IGRlYnVnOiBsaWJ4bF9leGVjLmM6Mzk4OnNwYXduX3dhdGNoX2V2
ZW50OiBkb21haW4gOSBkZXZpY2UgbW9kZWw6IHNwYXduIHdhdGNoIHA9KG51bGwpCmxpYnhsOiBk
ZWJ1ZzogbGlieGxfZXZlbnQuYzo2NzM6bGlieGxfX2V2X3hzd2F0Y2hfZGVyZWdpc3Rlcjogd2F0
Y2ggdz0weDFiNDZhNTggd3BhdGg9L2xvY2FsL2RvbWFpbi8wL2RldmljZS1tb2RlbC85L3N0YXRl
IHRva2VuPTIvMjogZGVyZWdpc3RlciBzbG90bnVtPTIKbGlieGw6IGVycm9yOiBsaWJ4bF9kbS5j
OjIxODk6ZGV2aWNlX21vZGVsX3NwYXduX291dGNvbWU6IGRvbWFpbiA5IGRldmljZSBtb2RlbDog
c3Bhd24gZmFpbGVkIChyYz0tMykKbGlieGw6IGVycm9yOiBsaWJ4bF9jcmVhdGUuYzoxNTA0OmRv
bWNyZWF0ZV9kZXZtb2RlbF9zdGFydGVkOiBkZXZpY2UgbW9kZWwgZGlkIG5vdCBzdGFydDogLTMK
bGlieGw6IGVycm9yOiBsaWJ4bF9kbS5jOjIzMDM6a2lsbF9kZXZpY2VfbW9kZWw6IERldmljZSBN
b2RlbCBhbHJlYWR5IGV4aXRlZApsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6NjM2OmxpYnhs
X19ldl94c3dhdGNoX3JlZ2lzdGVyOiB3YXRjaCB3PTB4MWI0ZjgzMCB3cGF0aD0vbG9jYWwvZG9t
YWluLzAvYmFja2VuZC92YmQvOS81MTcxMi9zdGF0ZSB0b2tlbj0yLzM6IHJlZ2lzdGVyIHNsb3Ru
dW09MgpsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6NjM2OmxpYnhsX19ldl94c3dhdGNoX3Jl
Z2lzdGVyOiB3YXRjaCB3PTB4MWI0ZmIyMCB3cGF0aD0vbG9jYWwvZG9tYWluLzAvYmFja2VuZC92
YmQvOS81MTcyOC9zdGF0ZSB0b2tlbj0zLzQ6IHJlZ2lzdGVyIHNsb3RudW09MwpsaWJ4bDogZGVi
dWc6IGxpYnhsX2V2ZW50LmM6NTczOndhdGNoZmRfY2FsbGJhY2s6IHdhdGNoIHc9MHgxYjRmODMw
IHdwYXRoPS9sb2NhbC9kb21haW4vMC9iYWNrZW5kL3ZiZC85LzUxNzEyL3N0YXRlIHRva2VuPTIv
MzogZXZlbnQgZXBhdGg9L2xvY2FsL2RvbWFpbi8wL2JhY2tlbmQvdmJkLzkvNTE3MTIvc3RhdGUK
bGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVudC5jOjg3NDpkZXZzdGF0ZV9jYWxsYmFjazogYmFja2Vu
ZCAvbG9jYWwvZG9tYWluLzAvYmFja2VuZC92YmQvOS81MTcxMi9zdGF0ZSB3YW50ZWQgc3RhdGUg
NiBvawpsaWJ4bDogZGVidWc6IGxpYnhsX2V2ZW50LmM6NjczOmxpYnhsX19ldl94c3dhdGNoX2Rl
cmVnaXN0ZXI6IHdhdGNoIHc9MHgxYjRmODMwIHdwYXRoPS9sb2NhbC9kb21haW4vMC9iYWNrZW5k
L3ZiZC85LzUxNzEyL3N0YXRlIHRva2VuPTIvMzogZGVyZWdpc3RlciBzbG90bnVtPTIKbGlieGw6
IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMDU5OmRldmljZV9iYWNrZW5kX2NhbGxiYWNrOiBjYWxs
aW5nIGRldmljZV9iYWNrZW5kX2NsZWFudXAKbGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVudC5jOjY4
NjpsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyOiB3YXRjaCB3PTB4MWI0ZjgzMDogZGVyZWdp
c3RlciB1bnJlZ2lzdGVyZWQKbGlieGw6IGRlYnVnOiBsaWJ4bF9saW51eC5jOjE4MzpsaWJ4bF9f
aG90cGx1Z19kaXNrOiBBcmdzIGFuZCBlbnZpcm9ubWVudCByZWFkeQpsaWJ4bDogZGVidWc6IGxp
YnhsX2RldmljZS5jOjExNTc6ZGV2aWNlX2hvdHBsdWc6IGNhbGxpbmcgaG90cGx1ZyBzY3JpcHQ6
IC9ldGMveGVuL3NjcmlwdHMvYmxvY2sgcmVtb3ZlCmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNl
LmM6MTE1ODpkZXZpY2VfaG90cGx1ZzogZXh0cmEgYXJnczoKbGlieGw6IGRlYnVnOiBsaWJ4bF9k
ZXZpY2UuYzoxMTY2OmRldmljZV9ob3RwbHVnOiBlbnY6CmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2
aWNlLmM6MTE3MzpkZXZpY2VfaG90cGx1ZzogICAgICAgc2NyaXB0OiAvZXRjL3hlbi9zY3JpcHRz
L2Jsb2NrCmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE3MzpkZXZpY2VfaG90cGx1Zzog
ICAgICAgWEVOQlVTX1RZUEU6IHZiZApsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjExNzM6
ZGV2aWNlX2hvdHBsdWc6ICAgICAgIFhFTkJVU19QQVRIOiBiYWNrZW5kL3ZiZC85LzUxNzEyCmxp
YnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE3MzpkZXZpY2VfaG90cGx1ZzogICAgICAgWEVO
QlVTX0JBU0VfUEFUSDogYmFja2VuZApsaWJ4bDogZGVidWc6IGxpYnhsX2FvdXRpbHMuYzo1OTM6
bGlieGxfX2FzeW5jX2V4ZWNfc3RhcnQ6IGZvcmtpbmcgdG8gZXhlY3V0ZTogL2V0Yy94ZW4vc2Ny
aXB0cy9ibG9jayByZW1vdmUKbGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVudC5jOjU0Mjp3YXRjaGZk
X2NhbGxiYWNrOiB3YXRjaCBlcGF0aD0vbG9jYWwvZG9tYWluLzAvYmFja2VuZC92YmQvOS81MTcx
Mi9zdGF0ZSB0b2tlbj0yLzM6IGVtcHR5IHNsb3QKbGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVudC5j
OjU3Mzp3YXRjaGZkX2NhbGxiYWNrOiB3YXRjaCB3PTB4MWI0ZmIyMCB3cGF0aD0vbG9jYWwvZG9t
YWluLzAvYmFja2VuZC92YmQvOS81MTcyOC9zdGF0ZSB0b2tlbj0zLzQ6IGV2ZW50IGVwYXRoPS9s
b2NhbC9kb21haW4vMC9iYWNrZW5kL3ZiZC85LzUxNzI4L3N0YXRlCmxpYnhsOiBkZWJ1ZzogbGli
eGxfZXZlbnQuYzo4NzQ6ZGV2c3RhdGVfY2FsbGJhY2s6IGJhY2tlbmQgL2xvY2FsL2RvbWFpbi8w
L2JhY2tlbmQvdmJkLzkvNTE3Mjgvc3RhdGUgd2FudGVkIHN0YXRlIDYgb2sKbGlieGw6IGRlYnVn
OiBsaWJ4bF9ldmVudC5jOjY3MzpsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyOiB3YXRjaCB3
PTB4MWI0ZmIyMCB3cGF0aD0vbG9jYWwvZG9tYWluLzAvYmFja2VuZC92YmQvOS81MTcyOC9zdGF0
ZSB0b2tlbj0zLzQ6IGRlcmVnaXN0ZXIgc2xvdG51bT0zCmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2
aWNlLmM6MTA1OTpkZXZpY2VfYmFja2VuZF9jYWxsYmFjazogY2FsbGluZyBkZXZpY2VfYmFja2Vu
ZF9jbGVhbnVwCmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzo2ODY6bGlieGxfX2V2X3hzd2F0
Y2hfZGVyZWdpc3Rlcjogd2F0Y2ggdz0weDFiNGZiMjA6IGRlcmVnaXN0ZXIgdW5yZWdpc3RlcmVk
CmxpYnhsOiBkZWJ1ZzogbGlieGxfbGludXguYzoxODM6bGlieGxfX2hvdHBsdWdfZGlzazogQXJn
cyBhbmQgZW52aXJvbm1lbnQgcmVhZHkKbGlieGw6IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMTU3
OmRldmljZV9ob3RwbHVnOiBjYWxsaW5nIGhvdHBsdWcgc2NyaXB0OiAvZXRjL3hlbi9zY3JpcHRz
L2Jsb2NrIHJlbW92ZQpsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjExNTg6ZGV2aWNlX2hv
dHBsdWc6IGV4dHJhIGFyZ3M6CmxpYnhsOiBkZWJ1ZzogbGlieGxfZGV2aWNlLmM6MTE2NjpkZXZp
Y2VfaG90cGx1ZzogZW52OgpsaWJ4bDogZGVidWc6IGxpYnhsX2RldmljZS5jOjExNzM6ZGV2aWNl
X2hvdHBsdWc6ICAgICAgIHNjcmlwdDogL2V0Yy94ZW4vc2NyaXB0cy9ibG9jawpsaWJ4bDogZGVi
dWc6IGxpYnhsX2RldmljZS5jOjExNzM6ZGV2aWNlX2hvdHBsdWc6ICAgICAgIFhFTkJVU19UWVBF
OiB2YmQKbGlieGw6IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMTczOmRldmljZV9ob3RwbHVnOiAg
ICAgICBYRU5CVVNfUEFUSDogYmFja2VuZC92YmQvOS81MTcyOApsaWJ4bDogZGVidWc6IGxpYnhs
X2RldmljZS5jOjExNzM6ZGV2aWNlX2hvdHBsdWc6ICAgICAgIFhFTkJVU19CQVNFX1BBVEg6IGJh
Y2tlbmQKbGlieGw6IGRlYnVnOiBsaWJ4bF9hb3V0aWxzLmM6NTkzOmxpYnhsX19hc3luY19leGVj
X3N0YXJ0OiBmb3JraW5nIHRvIGV4ZWN1dGU6IC9ldGMveGVuL3NjcmlwdHMvYmxvY2sgcmVtb3Zl
CmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzo1NDI6d2F0Y2hmZF9jYWxsYmFjazogd2F0Y2gg
ZXBhdGg9L2xvY2FsL2RvbWFpbi8wL2JhY2tlbmQvdmJkLzkvNTE3Mjgvc3RhdGUgdG9rZW49My80
OiBlbXB0eSBzbG90CmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzo2ODY6bGlieGxfX2V2X3hz
d2F0Y2hfZGVyZWdpc3Rlcjogd2F0Y2ggdz0weDFiNGY5MzA6IGRlcmVnaXN0ZXIgdW5yZWdpc3Rl
cmVkCmxpYnhsOiBkZWJ1ZzogbGlieGxfbGludXguYzoyMDA6bGlieGxfX2dldF9ob3RwbHVnX3Nj
cmlwdF9pbmZvOiBudW1fZXhlYyAxLCBub3QgcnVubmluZyBob3RwbHVnIHNjcmlwdHMKbGlieGw6
IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMTQzOmRldmljZV9ob3RwbHVnOiBObyBob3RwbHVnIHNj
cmlwdCB0byBleGVjdXRlCmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzo2ODY6bGlieGxfX2V2
X3hzd2F0Y2hfZGVyZWdpc3Rlcjogd2F0Y2ggdz0weDFiNGY5MzA6IGRlcmVnaXN0ZXIgdW5yZWdp
c3RlcmVkCmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzo2ODY6bGlieGxfX2V2X3hzd2F0Y2hf
ZGVyZWdpc3Rlcjogd2F0Y2ggdz0weDFiNGZjMjA6IGRlcmVnaXN0ZXIgdW5yZWdpc3RlcmVkCmxp
YnhsOiBkZWJ1ZzogbGlieGxfbGludXguYzoyMDA6bGlieGxfX2dldF9ob3RwbHVnX3NjcmlwdF9p
bmZvOiBudW1fZXhlYyAxLCBub3QgcnVubmluZyBob3RwbHVnIHNjcmlwdHMKbGlieGw6IGRlYnVn
OiBsaWJ4bF9kZXZpY2UuYzoxMTQzOmRldmljZV9ob3RwbHVnOiBObyBob3RwbHVnIHNjcmlwdCB0
byBleGVjdXRlCmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzo2ODY6bGlieGxfX2V2X3hzd2F0
Y2hfZGVyZWdpc3Rlcjogd2F0Y2ggdz0weDFiNGZjMjA6IGRlcmVnaXN0ZXIgdW5yZWdpc3RlcmVk
CmxpYnhsOiBkZWJ1ZzogbGlieGxfbGludXguYzoyMjE6bGlieGxfX2dldF9ob3RwbHVnX3Njcmlw
dF9pbmZvOiBiYWNrZW5kX2tpbmQgNiwgbm8gbmVlZCB0byBleGVjdXRlIHNjcmlwdHMKbGlieGw6
IGRlYnVnOiBsaWJ4bF9kZXZpY2UuYzoxMTQzOmRldmljZV9ob3RwbHVnOiBObyBob3RwbHVnIHNj
cmlwdCB0byBleGVjdXRlCmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzo2ODY6bGlieGxfX2V2
X3hzd2F0Y2hfZGVyZWdpc3Rlcjogd2F0Y2ggdz0weDFiNTAxYzA6IGRlcmVnaXN0ZXIgdW5yZWdp
c3RlcmVkCmxpYnhsOiBkZWJ1ZzogbGlieGwuYzoxNzEyOmRldmljZXNfZGVzdHJveV9jYjogZm9y
a2VkIHBpZCAyNTk2OCBmb3IgZGVzdHJveSBvZiBkb21haW4gOQpsaWJ4bDogZGVidWc6IGxpYnhs
X2V2ZW50LmM6MTg2OTpsaWJ4bF9fYW9fY29tcGxldGU6IGFvIDB4MWI0NWJjMDogY29tcGxldGUs
IHJjPS0zCmxpYnhsOiBkZWJ1ZzogbGlieGxfZXZlbnQuYzoxODM4OmxpYnhsX19hb19fZGVzdHJv
eTogYW8gMHgxYjQ1YmMwOiBkZXN0cm95CmxpYnhsOiBkZWJ1ZzogbGlieGwuYzoxNDQ1OmxpYnhs
X2RvbWFpbl9kZXN0cm95OiBhbyAweDFiNDc3ZTA6IGNyZWF0ZTogaG93PShuaWwpIGNhbGxiYWNr
PShuaWwpIHBvbGxlcj0weDFiNDVjNTAKbGlieGw6IGVycm9yOiBsaWJ4bC5jOjE1NzU6bGlieGxf
X2Rlc3Ryb3lfZG9taWQ6IG5vbi1leGlzdGFudCBkb21haW4gOQpsaWJ4bDogZXJyb3I6IGxpYnhs
LmM6MTUzNDpkb21haW5fZGVzdHJveV9jYWxsYmFjazogdW5hYmxlIHRvIGRlc3Ryb3kgZ3Vlc3Qg
d2l0aCBkb21pZCA5CmxpYnhsOiBlcnJvcjogbGlieGwuYzoxNDYzOmRvbWFpbl9kZXN0cm95X2Ni
OiBkZXN0cnVjdGlvbiBvZiBkb21haW4gOSBmYWlsZWQKbGlieGw6IGRlYnVnOiBsaWJ4bF9ldmVu
dC5jOjE4Njk6bGlieGxfX2FvX2NvbXBsZXRlOiBhbyAweDFiNDc3ZTA6IGNvbXBsZXRlLCByYz0t
MjEKbGlieGw6IGRlYnVnOiBsaWJ4bC5jOjE0NTQ6bGlieGxfZG9tYWluX2Rlc3Ryb3k6IGFvIDB4
MWI0NzdlMDogaW5wcm9ncmVzczogcG9sbGVyPTB4MWI0NWM1MCwgZmxhZ3M9aWMKbGlieGw6IGRl
YnVnOiBsaWJ4bF9ldmVudC5jOjE4Mzg6bGlieGxfX2FvX19kZXN0cm95OiBhbyAweDFiNDc3ZTA6
IGRlc3Ryb3kKeGVuY2FsbDpidWZmZXI6IGRlYnVnOiB0b3RhbCBhbGxvY2F0aW9uczo1NTIgdG90
YWwgcmVsZWFzZXM6NTUyCnhlbmNhbGw6YnVmZmVyOiBkZWJ1ZzogY3VycmVudCBhbGxvY2F0aW9u
czowIG1heGltdW0gYWxsb2NhdGlvbnM6Mwp4ZW5jYWxsOmJ1ZmZlcjogZGVidWc6IGNhY2hlIGN1
cnJlbnQgc2l6ZTozCnhlbmNhbGw6YnVmZmVyOiBkZWJ1ZzogY2FjaGUgaGl0czo1MzQgbWlzc2Vz
OjMgdG9vYmlnOjE1CiQKCkNoZWVycywKQW5keQoKX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlz
dHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xp
c3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Thu Jan 11 22:25:18 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 22:25:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZlH5-0000uO-Kh; Thu, 11 Jan 2018 22:24:39 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=kgr0=eg=gmail.com=dunlapg@srs-us1.protection.inumbo.net>)
 id 1eZlH4-0000uI-7i
 for xen-users@lists.xen.org; Thu, 11 Jan 2018 22:24:38 +0000
X-Inumbo-ID: 0373f5b9-f71e-11e7-b4a6-bc764e045a96
Received: from mail-qk0-x234.google.com (unknown [2607:f8b0:400d:c09::234])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 0373f5b9-f71e-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 23:23:14 +0100 (CET)
Received: by mail-qk0-x234.google.com with SMTP id q1so6369312qkb.9
 for <xen-users@lists.xen.org>; Thu, 11 Jan 2018 14:24:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:sender:in-reply-to:references:from:date:message-id
 :subject:to:cc;
 bh=IVVL7CcihERtcGYVWlcsOKBYePz7JDniQwBSjlyjsF4=;
 b=WuDDFRU8eOiSn2grxjqS4KrdH9zyYLuVGEISScdDx4TUaiuxObrT5YJNFJg9gtynkL
 chpLI7OYq2iO4NQTVje3Sx6X3eHhAzUoFERHZETJf3Y+YtQFl9fFbSFYyvLYkq5xN5OB
 e2JGiizkZWj95W6LXjj4ILSprGWB/fqcmTMKKaOWaOfdrffoLKegFjX8aSbgbg7CRg9F
 BjKYRZH328StEcA7I6b6NCZzKqAXKZm76njj6IFOmclrAzVrAIzOqRNNHymSO/EC43y8
 wfDcjSssrzEkq1JgKAAH0Cthv7Bs2gycfhJBTarxTWeZGQwJ1Kl65uCjoeZBb3NFlrql
 eV6w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
 :date:message-id:subject:to:cc;
 bh=IVVL7CcihERtcGYVWlcsOKBYePz7JDniQwBSjlyjsF4=;
 b=HsgTj8Q+AhHJbREEfGwq2gogAkWfhOWXfY/RGJkW2rQpUTnpHgGgu9UKQ9H4FnaLWp
 uTDV36Jva8vrEZOpMyXdlippWKhoe+crDZAdXOZvA/vGgUswNmwEtsuPdyNyIZLhHUXx
 so7GxSRBvbKO9I+lmdzJ23DicPOkgPhs7wPn28SNrsuqu2imJ/5YuQF2n8Ha/jReC5/Q
 nALUh7UwpmCg9En9nvmETZYNVNY1Xz/I2r/z8PcFFQ9CXgOoSs8icHRr5khJABk296gC
 F4j+ijGbsvqokjFWWBNefaWiJKvrDjDlh7ESMXCA/ufBSaIofnb5a3u+sIjqmRlq3I7y
 FvGA==
X-Gm-Message-State: AKwxytd/sNBd/hSb/lCvjbD7dK5R4vcjDTyyPihJzltqySxf7PHZ0mHx
 LIgYHf+geHM3kcbPJaMKXfUItB0mMiWP+naG3gk=
X-Google-Smtp-Source: ACJfBot3ux9XyiSW2t7Ho1scEJbMxp0xBMjd9ipG5Jgru8Q7/bzh32H3/07YLVD4tbYIvObiDvs9J+qIHoayqSTaDbs=
X-Received: by 10.55.160.14 with SMTP id j14mr15739873qke.305.1515709475274;
 Thu, 11 Jan 2018 14:24:35 -0800 (PST)
MIME-Version: 1.0
Received: by 10.55.81.87 with HTTP; Thu, 11 Jan 2018 14:24:34 -0800 (PST)
In-Reply-To: <20180111211652.GT3124@bitfolk.com>
References: <20180111211652.GT3124@bitfolk.com>
From: George Dunlap <dunlapg@umich.edu>
Date: Thu, 11 Jan 2018 22:24:34 +0000
X-Google-Sender-Auth: v5mS1J1OI4yx53bLSBoTVxMJbkc
Message-ID: <CAFLBxZZVMvknaurR=JsnerthaeWzLoBWNMGSByzgNiMGiXM3FQ@mail.gmail.com>
To: Andy Smith <andy@strugglers.net>
Cc: xen-users@lists.xen.org, Ian Jackson <ian.jackson@eu.citrix.com>
Subject: Re: [Xen-users] Trying out vixen: failure to start device model
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 11 22:26:44 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 22:26:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZlJ2-00012Z-Ab; Thu, 11 Jan 2018 22:26:40 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=f0m1=eg=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1eZlJ1-00012A-94
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 22:26:39 +0000
X-Inumbo-ID: 4be2e4a4-f71e-11e7-b4a6-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 4be2e4a4-f71e-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 23:25:15 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:Cc:To:From:Date;
 bh=0ArrMiA8iiV72nHaYk66NViosPbutK94bSNFPskl2Pw=; 
 b=O/9j3nflTxnzPvi+NBOMXYMtS2/Z8B+TSLJdWDTb4sl7yYHjf+yQNsEz+Mf0qknCOMbMS/+7jxY2Za+d7CNM8bvvJIj0AizkZx2TP7el8qdg8BIsCnelgbjP/h9Lhqnygg/dRO49ao9QdgNWrmAeJsZXRFZDqTq1P/lCFWEh6BPy22MwQgEpfmWGtQvnjm1reSlyFpenYjUclotFuRI+cLTlmB2nVwFgfjqRoHa70wxW23BxmX89C3wxPCR6AcR5cHdQHsusgK+qmrwuCqCaxFlTId1lGdxRnyeOh+CeOqCAkq84Gt4TqHRUvcleHGrhr6/SVhZE8hO1RcBM0dAmsQ==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>)
 id 1eZlIy-0005p9-U9; Thu, 11 Jan 2018 22:26:36 +0000
Date: Thu, 11 Jan 2018 22:26:36 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Message-ID: <20180111222636.GW3124@bitfolk.com>
References: <20180111211652.GT3124@bitfolk.com>
 <20180111215924.GV3124@bitfolk.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <20180111215924.GV3124@bitfolk.com>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Cc: xen-devel@lists.xenproject.org
Subject: Re: [Xen-users] Trying out vixen: failure to start device model
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 11 22:28:14 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 22:28:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZlKT-0001FS-OI; Thu, 11 Jan 2018 22:28:09 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=f0m1=eg=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1eZlKS-0001FG-F7
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 22:28:08 +0000
X-Inumbo-ID: 80fe1c50-f71e-11e7-b4a6-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 80fe1c50-f71e-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 23:26:45 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date;
 bh=ZQLgnmhg8CSLHHKzP/F7KQwPjUTuh4AOFDhrTeOhryY=; 
 b=gVIm6qLUNYn9JmIcW1nuU2UEeSd5DHmZLNl4SZA+nBUMSi4YYCW7QP63843lbPjL00D6Y+t1APmgqFEcC9w4v8Hi80vZN/oNd82QM3UZms0dqQOxmmi5yh5+WE/DeOlXJZayYnf/rdyzyt/Kb1Z5cwwdj8VvbAfvySK1mxSVvrftya6XoedPbNNylBTvWeegcCKgn6y717JvoDKZoYEgLdcsM9tyZasHMpSO3GvVMN0F4hyIbTbYCil+QOg1+S9IX9rHWflOgLl9w6rPs54zsbne7DuwvxhM+d35BTJrdHkJZ3wT5Yfr2LLnsjw6t3IZzbStT/6k/GaYpmiXbhk83Q==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1eZlKQ-0005sH-1K
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 22:28:06 +0000
Date: Thu, 11 Jan 2018 22:28:06 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Message-ID: <20180111222806.GX3124@bitfolk.com>
References: <20180111211652.GT3124@bitfolk.com>
 <CAFLBxZZVMvknaurR=JsnerthaeWzLoBWNMGSByzgNiMGiXM3FQ@mail.gmail.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <CAFLBxZZVMvknaurR=JsnerthaeWzLoBWNMGSByzgNiMGiXM3FQ@mail.gmail.com>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Subject: Re: [Xen-users] Trying out vixen: failure to start device model
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 11 23:37:07 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jan 2018 23:37:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZmOf-00083p-1j; Thu, 11 Jan 2018 23:36:33 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=f0m1=eg=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1eZmOd-00083d-2M
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 23:36:31 +0000
X-Inumbo-ID: 0e214772-f728-11e7-b4a6-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 0e214772-f728-11e7-b4a6-bc764e045a96;
 Fri, 12 Jan 2018 00:35:07 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:Cc:To:From:Date;
 bh=Lmt4gpXzxC9DauM2HFIxk6FU2HF8h3w8kI6fA/ATpxI=; 
 b=tQvOcn2u/RoFoq9SW2/lg+XJwOt1iebjYnC2INQEYSFhECS9dSqngiUaicdxe5oRsd3PXW6Cynm5ld+z6/kcFFRifRAZh3SqCs+WnrcliOM4H4xv7hJwEGgNVx8Uqa/1UI6sBJNvFvYL5Wuq90Q/8f51cKwJgVJIKr85xhX0yhXxgzyVKasjxB+KljUrcF1s30nGfOb+rkq5ui4gb0pX3m0l7HuACUiSZhw6Md09DuUZ9L3j+CpGRjw+m6wo57V4JWae5SIKZRVUSZBYI4467N7b9DqjIM/ZhIz68/CR7DWS+0ZIjggZPbGH9lDSZSc3f8sdz9RGaRuQ38lKk2Wc3g==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>)
 id 1eZmOa-0008Da-5b; Thu, 11 Jan 2018 23:36:28 +0000
Date: Thu, 11 Jan 2018 23:36:28 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Message-ID: <20180111233628.GY3124@bitfolk.com>
References: <20180111211652.GT3124@bitfolk.com>
 <20180111215924.GV3124@bitfolk.com>
 <20180111222636.GW3124@bitfolk.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <20180111222636.GW3124@bitfolk.com>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Cc: xen-devel@lists.xenproject.org
Subject: [Xen-users] Trying out vixen: vif-route issue
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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=

From xen-users-bounces@lists.xenproject.org Fri Jan 12 02:06:50 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 02:06:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZojK-000465-Fd; Fri, 12 Jan 2018 02:06:02 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=okkk=eh=gmail.com=doa379@srs-us1.protection.inumbo.net>)
 id 1eZojJ-00045y-7V
 for xen-users@lists.xenproject.org; Fri, 12 Jan 2018 02:06:01 +0000
X-Inumbo-ID: f0ba75d9-f73c-11e7-b4a6-bc764e045a96
Received: from mail-wm0-x22a.google.com (unknown [2a00:1450:400c:c09::22a])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id f0ba75d9-f73c-11e7-b4a6-bc764e045a96;
 Fri, 12 Jan 2018 03:04:37 +0100 (CET)
Received: by mail-wm0-x22a.google.com with SMTP id t8so9116659wmc.3
 for <xen-users@lists.xenproject.org>; Thu, 11 Jan 2018 18:05:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=subject:to:references:cc:from:message-id:date:user-agent
 :mime-version:in-reply-to:content-language:content-transfer-encoding;
 bh=4d4xwCWDCWWOoXA8JiTsG16mJciOcbdHH8xFj/Orjoo=;
 b=CvAmZEVBTRLamsC5CD8gJ7a5ik/0/IUYSKjpMr9DYXs/OVXf4hQHRnoAKzwPYJjYnq
 XPtPg7PhJvT/UISTXqF1289vjXjDvTljhykPVBOidAhS8l+0kZmEsxYZpwOwRWHINS8l
 LYQYWKA4T7sxDfJQyjtsH1899LAb8KOt9+oK/7aVZk5gtUE91nLbfoit2bugWHC4n0GJ
 TDchMrGWeZg/KhKFnOO5dviVKrwZKd6xdX/6Fnr/dnuB2c4b7EMOzvdRN0DbOF+PZj6F
 cT0y4tVdNYTguouXO/SHOm9BPFJzrdX5fOAUijDG+SJTGu7tyqVdBo7dvojY8xab56GP
 M7Ow==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:subject:to:references:cc:from:message-id:date
 :user-agent:mime-version:in-reply-to:content-language
 :content-transfer-encoding;
 bh=4d4xwCWDCWWOoXA8JiTsG16mJciOcbdHH8xFj/Orjoo=;
 b=IZzKT/q5Et0NL9KQWjpEHM7F4KZJc8nBpFKkx0cxilqE7h4iYQB3klXPQxER8VJYqv
 tSFnysftP7Z0L/gHmYitdtJLIF9N3sDey1rSMZcQbNJS0ayM/JrxdIN7wdShrybDIG/O
 bXZX/jkXLEy20bLp07AX23/gxGTxpMfXx0RyMA66EJA5Lza9Yg0pfGbp1Z90Za/rSK42
 YR9Y5KmOf1V7Eh05nOkWEux/63X2pT/Bs4SHA/EhwQKbiIlyFi68lgUhSSI+n+rtJGUY
 73WA/SkiLElvkAqeGsyJ60pyQkV8sjrM5bQbMGbSVIPnYwysTv9dPYnb91XzXdKxbNFq
 I/qQ==
X-Gm-Message-State: AKwxytdQMNNV44qReZF57XhkAANClHLMmVWfKxxxxNXyyKKiEUmuDpcP
 7QeEmr+gCH5Jbf56BC9sqX3V3w==
X-Google-Smtp-Source: ACJfBoutY0eYkPQ8s7zEo/nHf7/evoWKXlYl70bm/zH7lOyBTfnT+KbcPPexAGvA0XhjCtaZ+U322w==
X-Received: by 10.28.134.143 with SMTP id i137mr2968549wmd.2.1515722758235;
 Thu, 11 Jan 2018 18:05:58 -0800 (PST)
Received: from [192.168.0.4] (host-92-25-116-85.as13285.net. [92.25.116.85])
 by smtp.googlemail.com with ESMTPSA id h76sm1874967wmd.2.2018.01.11.18.05.57
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Thu, 11 Jan 2018 18:05:57 -0800 (PST)
To: Kun Cheng <chengkunck@gmail.com>
References: <c7e1778c-3ce1-69ac-06ad-de53d4c40e6f@gmail.com>
 <CAO3v1VRUZ98a2oYEYp2hHwaLuqCcppChv9eBpGAv5JHdzMjE8w@mail.gmail.com>
 <3695c9bd-c597-29c1-df0c-0d7af430ea95@gmail.com>
 <CAO3v1VSWxNfyCDqYpE1B_S-R5gdABkWK4gwJoo1vV=aCw3Kzbg@mail.gmail.com>
 <68433d9c-1971-5101-bcaf-cbe83635f4f8@gmail.com>
 <CAO3v1VRxbGDDdrGa5PwHyH_J2N4+zCgH6YS1dtfqGp-swURSAw@mail.gmail.com>
 <3c5a91f7-0335-18c6-f5e0-9eac7bd1d65b@gmail.com>
 <CAO3v1VTKWUn3dVf5TNYYkDXb=ymd4AwThBuepNsYjrhSSmSMEg@mail.gmail.com>
From: doa379 <doa379@gmail.com>
Message-ID: <004ae7d3-ff02-e657-7553-315b0b77472f@gmail.com>
Date: Fri, 12 Jan 2018 02:04:23 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <CAO3v1VTKWUn3dVf5TNYYkDXb=ymd4AwThBuepNsYjrhSSmSMEg@mail.gmail.com>
Content-Language: en-GB
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] Xen failing to boot dom0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Fri Jan 12 12:17:17 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 12:17:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZyFv-00034J-Fp; Fri, 12 Jan 2018 12:16:19 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=dgpl=eh=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1eZyFu-000341-2z
 for xen-users@lists.xen.org; Fri, 12 Jan 2018 12:16:18 +0000
X-Inumbo-ID: b0441b43-f792-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id b0441b43-f792-11e7-b0d7-9f685aff125f;
 Fri, 12 Jan 2018 12:18:25 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1eZyFb-0003rU-Ua; Fri, 12 Jan 2018 12:15:59 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1eZyFb-0003RY-Ry; Fri, 12 Jan 2018 12:15:59 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1eZyFb-0003RY-Ry@xenbits.xenproject.org>
Date: Fri, 12 Jan 2018 12:15:59 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 5

        Information leak via side effects of speculative execution

UPDATES IN VERSION 5
====================

PV-in-PVH/HVM shim approach leaves *guest* vulnerable to Meltdown
attacks from its unprivileged users, even if the guest has KPTI
patches.  That is, guest userspace can use Meltdown to read all memory
in the same guest.

In Vixen shim sidecar creator script, look for qemu in some more
places, and provide a command line option to specify the
qemu-system-i386 to use in case the default doesn't find it.

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by running guests in HVM or PVH mode.
(Within-guest attacks are still possible unless the guest OS has also
been updated with an SP3 mitigation series such as KPTI/Kaiser.)

For guests with legacy PV kernels which cannot be run in HVM or PVH
mode directly, we have developed two "shim" hypervisors that allow PV
guests to run in HVM mode or PVH mode.  This prevents attacks on the
host, but it leaves the guest vulnerable to Meltdown attacks by its
own unprivileged processes, even if the guest OS has KPTI or similar
Meltdown mitigation.

The HVM shim (codenamed "Vixen") is available now.  We expect to have
the PVH shim (codenamed "Comet") available within a few days.  Please
read README.which-shim to determine which shim is suitable for you.

$ sha256sum xsa254*/*
2df6b811ec7a377a9cc717f7a8ed497f3a90928c21cba81182eb4a802e32ecd7  xsa254/README.vixen
4c30295513ad82debe04845248b5baac0b3d0c151b80fdca32f2df8b9aa0b541  xsa254/README.which-shim
6210615c1384e13da953452e6f47066f8837e2b2c7f671280902e32e96763b54  xsa254/pvshim-converter.pl
$

RESOLUTION
==========

There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.


NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaWKbzAAoJEIP+FMlX6CvZtl4H/RKmXpS1fL51efZbrhYaDBTF
nLSHxfPdmi+MLaJ8Y7hS9w061ovK7OYTcvi9xlAhE6yC0b4lX5NToc1CPkX6pjGV
atOh0q4QyxDQm9JGW1aL9pZa3ZSF/Y7ad/zv5OlU97ZmDEwuEVvOTSsGj+jMFB08
gJ+VfQ0F2R+sjdh9BIScbUedLEz+M5so2wGaOJObr/ybRfLyAobxwiIc+yPniBoi
c4eNLSdzBjmg0YrRGeMToVziNH6YXmHD+VLSj23SbVYOjgSS/vnbpRtw7DbcwGXy
jhwK8WheInGUsCe+Nz0VU54MXtRhkV+JtsB/g2h4flr49mUm8kt2VY3P0NO7dcE=
=jGQH
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa254/README.vixen"
Content-Disposition: attachment; filename="xsa254/README.vixen"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.which-shim"
Content-Disposition: attachment; filename="xsa254/README.which-shim"
Content-Transfer-Encoding: base64

CQkgICBIb3cgdG8gZGVjaWRlIHdoaWNoIHNoaW0gdG8gdXNlCgkJICAgPT09
PT09PT09PT09PT09PT09PT09PT09PT09PT09PQoKQSB3b3JrLWFyb3VuZCB0
byBNZWx0ZG93biAoYWthICJTUDMiIG9yICJWYXJpYW50IDMiKSBvbiBJbnRl
bApwcm9jZXNzb3JzIGlzIHRvIHJ1biBndWVzdHMgaW4gSFZNIG9yIFBWSCBt
b2RlLgoKTkIgdGhhdCB0aGVzZSBhcHByb2FjaGVzIGxlYXZlIHRoZSBndWVz
dCB2dWxuZXJhYmxlIHRvIHdpdGhpbi1ndWVzdAppbmZvcm1hdGlvbiBsZWFr
cyBiYXNlZCBvbiBNZWx0ZG93biwgKmV2ZW4gaWYgdGhlIGd1ZXN0IE9TIGhh
cwpLUFRJL0thaXNlciBvciBhIHNpbWlsYXIgTWVsdGRvd24gbWlnaXRhdGlv
biouCgpTb21lIGd1ZXN0cyBhcmUgZGlmZmljdWx0IHRvIGNvbnZlcnQgdG8g
cnVubmluZyBpbiBIVk0gb3IgUFZIIG1vZGUsCmVpdGhlciBkdWUgdG8gbGFj
ayBvZiBwYXJ0aXRpb25pbmcgLyBNQlIsIG9yIGR1ZSB0byBrZXJuZWwKY29t
cGF0aWJpbGl0aWVzLiAgQXMgYW4gZW1lcmdlbmN5IGJhY2tzdG9wLCB0aGVy
ZSBhcmUgdHdvIGFwcHJvYWNoZXMsCndoaWNoIHdlJ3ZlIGNvZGVuYW1lZCAi
Vml4ZW4iIGFuZCAiQ29tZXQiLiAgQm90aCBpbnZvbHZlIHJ1bm5pbmcgYW4K
ZW1iZWRkZWQgY29weSBvZiBYZW4gKGNhbGxlZCBhICJzaGltIikgd2l0aGlu
IHRoZSBIVk0gb3IgUFZIIGd1ZXN0IHRvCnByb3ZpZGUgdGhlIG5hdGl2ZSBQ
ViBpbnRlcmZhY2UuCgpCZWxvdyBkZXNjcmliZXMgdGhlIHByb3BlcnRpZXMs
IGFuZCB3aG8gbWlnaHQgd2FudCB0byB1c2UgZWFjaCBvbmUuCgpOT1RFOiBC
b3RoIHNoaW1zIHJlcXVpcmUgaG9zdCBwYXRjaGVzIHRvIGJvb3Qgb24gQU1E
IGhvc3RzLiAgVGhpcwpzaG91bGRuJ3QgYmUgYW4gaXNzdWUsIGFzIFNQMyBk
b2VzIG5vdCBhZmZlY3Qgc3lzdGVtcyBydW5uaW5nIG9uIEFNRC4KClZpeGVu
Ci0tLS0tCgpWaXhlbiBoYXMgdGhlIGZvbGxvd2luZyBwcm9wZXJ0aWVzOgog
KiBSdW5zIHRoZSBzaGltIGluIGFuIEhWTSBndWVzdC4KICogSXQgcmVxdWly
ZXMgbm8gaHlwZXJ2aXNvciBvciB0b29sc3RhY2sgY2hhbmdlcywgbm9yIGRv
ZXMgaXQgcmVxdWlyZQogICBhIGhvc3QgcmVib290LgogKiBJdCBoYXMgYmVl
biBleHRlbnNpdmVseSB0ZXN0ZWQgaW4gQW1hem9uJ3MgZGVwbG95bWVudCBm
b3IgdmVyc2lvbnMKICAgb2YgWGVuIGdvaW5nIGJhY2sgdG8gMy40CiAqIEd1
ZXN0IHJlYm9vdHMgYXJlIHJlcXVpcmVkCiAqIEd1ZXN0IGNvbmZpZ3MgbXVz
dCBiZSBmZWQgdGhyb3VnaCBhIGNvbnZlcnRlciBwcm9ncmFtCiAqIFRoZSBj
b252ZXJ0ZXIgcHJvZ3JhbSBzcGl0cyBvdXQgYSBzbWFsbCBndWVzdC1zcGVj
aWZpYyAuaXNvCiAgIGltYWdlICh3ZSBjYWxsIHRoaXMgYSAic2lkZWNhciIp
IHVzZWQgZm9yIGJvb3RpbmcKICogQmVjYXVzZSB0aGUgcmVzdWx0IGlzIGFu
IEhWTSBndWVzdCwgdGhpcyBhcHByb2FjaCBpbnZvbHZlcwogICBydW5uaW5n
IHFlbXUgYXMgYSBQQyBlbXVsYXRvciAodGhpcyBpcyBkb25lIGF1dG9tYXRp
Y2FsbHkpCiAqIFNvbWUgY29tbW9uIGZlYXR1cmVzIGFyZSBub3Qgc3VwcG9y
dGVkOgogIC0gQmFsbG9vbmluZwogIC0gTWlncmF0aW9uCiAgLSB2Y3B1IGhv
dHBsdWcKICAtIGJpZGlyZWN0aW9uYWwgY29uc29sZSBzdXBwb3J0IChjb25z
b2xlIGlzIHdyaXRlLW9ubHkpCiAqIERpcmVjdC1ib290IGtlcm5lbHMgYW5k
IHB2Z3J1YiAoYm90aCBwdmdydWIxIGFuZCBwdmdydWIyKSBhcmUKICAgc3Vw
cG9ydGVkIGJ5IHRoZSBjb252ZXJzaW9uIHByb2dyYW0uICAncHlncnViJyBp
cyBub3Qgc3VwcG9ydGVkLgogKiB4bCBhbmQgeG0gZG9tYWluIGNvbmZpZ3Mg
Y2FuIGJlIGNvbnZlcnRlZDsgbGlidmlydCBkb21haW4KICAgY29uZmlndXJh
dGlvbiBhcnJhbmdlbWVudHMgYXJlIG5vdCBzdXBwb3J0ZWQuCiAqIEd1ZXN0
IHVzZXJzcGFjZSBjYW4gcmVhZCBhbGwgb2YgZ3Vlc3QgbWVtb3J5LCB3aXRo
aW4gZWFjaCBndWVzdCwKICAgYW5kIGEgZ3Vlc3QgbWlnaXRhdGlvbiBmb3Ig
dGhpcyBpcyBub3QgcG9zc2libGUuCgpZb3UgbWlnaHQgY29uc2lkZXIgdGhp
cyBhcHByb2FjaCBpZjoKLSBZb3Ugd2FudCB0byBkZXBsb3kgYSBmaXggaW1t
ZWRpYXRlbHkKLSBZb3UgY2FuIHRvbGVyYXRlIHRoZSBsb3NzIG9mIHdpdGhp
bi1ndWVzdCBzZWN1cml0eQotIFlvdSBjYW4ndCwgb3Igd291bGQgbGlrZSB0
byBhdm9pZCwgdXBkYXRpbmcgdG8gWGVuIDQuOCBvciBuZXdlcgotIFlvdSdk
IGxpa2UgdG8gYXZvaWQgcGF0Y2hpbmcgYW5kIHJlYm9vdGluZyB5b3VyIGhv
c3QKLSBZb3UgYXJlIGFibGUgdG86CiAtIFJ1biBhIHNjcmlwdCB0byBtb2Rp
ZnkgZWFjaCBkb21haW4gY29uZmlnCiAtIEFmZm9yZCBhbiBleHRyYSA4ME1p
QiBwZXIgZ3Vlc3QKIC0gVG9sZXJhdGUgaGF2aW5nIGFuIGV4dHJhIFFFTVUg
YXJvdW5kCi0gWW91IGRvbid0IG5lZWQgbWlncmF0aW9uLCBtZW1vcnkgYmFs
bG9vbmluZywgdmNwdSBob3RwbHVnLAogIG9yIGEgYmktZGlyZWN0aW9uYWwg
Y29uc29sZQoKVG8gdXNlIHRoaXMgc29sdXRpb24sIHNlZSBSRUFETUUudml4
ZW4uCgpCaS1kaXJlY3Rpb25hbCBjb25zb2xlIGlzIGF2YWlsYWJsZSBhcyBh
biBleHRyYSBwYXRjaCwgYnV0IGhhc24ndCBiZWVuCndpZGVseSB0ZXN0ZWQ6
CgptYXJjLmluZm8vP2k9PDE1MTU2MDQ1NTItOTIwNS0xLWdpdC1zZW5kLWVt
YWlsLXNybkBwcmdtci5jb20+CgpDb21ldAotLS0tLQoKQ29tZXQgaGFzIHRo
ZSBmb2xsb3dpbmcgcHJvcGVydGllczoKICogUnVucyB0aGUgc2hpbSBpbiBh
IFBWSCBndWVzdC4KICogUFZIIG1vZGUgaXMgYXZhaWxhYmxlIGluIFhlbiA0
LjEwLCBhbmQgd2lsbCBiZSBiYWNrcG9ydGVkIHRvIFhlbgogICA0LjkgYW5k
IDQuOCBidXQgbm8gZmFydGhlcgogKiBSZXF1aXJlcyBob3N0IGh5cGVydmlz
b3IgYW5kIHRvb2xzdGFjayBwYXRjaGVzIChhbmQgaG9zdCByZWJvb3QpLAog
ICBldmVuIGZvciBYZW4gNC4xMAogKiBSZXF1aXJlcyBtaW5pbWFsIGd1ZXN0
IGNvbmZpZyBjaGFuZ2VzLCBhbmQgbm8gInNpZGVjYXIiCiAqIEJvb3Rsb2Fk
aW5nIGlzIGlkZW50aWNhbCB0byBuYXRpdmUgUFYgZ3Vlc3RzOyBkaXJlY3Qt
Ym9vdCwgcHZncnViLAogICBhbmQgcHlncnViIGFsbCB3b3JrIGVxdWFsbHkg
d2VsbAogKiBCZWNhdXNlIHRoZSByZXN1bHQgaXMgYSBQVkggZ3Vlc3QsIHRo
aXMgYXBwcm9hY2ggaW52b2x2ZXMgbm8gUEMgZW11bGF0b3IuCiAqIFRoZSBm
b2xsb3dpbmcgZmVhdHVyZXMgbm90IGF2YWlsYWJsZSBpbiBWaXhlbiBhcmUg
c3VwcG9ydGVkOgogIC0gTWVtb3J5IGJhbGxvb25pbmcKICAtIEd1ZXN0IG1p
Z3JhdGlvbgogIC0gdmNwdSBob3RwbHVnCiAgLSBiaWRpcmVjdGlvbmFsIGNv
bnNvbGUgc3VwcG9ydAogKiBHdWVzdCB1c2Vyc3BhY2UgY2FuIHJlYWQgYWxs
IG9mIGd1ZXN0IG1lbW9yeSwgd2l0aGluIGVhY2ggZ3Vlc3QsCiAgIGFuZCBh
IGd1ZXN0IG1pZ2l0YXRpb24gZm9yIHRoaXMgaXMgbm90IHBvc3NpYmxlLgoK
WW91IG1pZ2h0IGNvbnNpZGVyIHRoaXMgYXBwcm9hY2ggaWY6Ci0gWW91J3Jl
IG9uIDQuOCBvciBsYXRlciBhbHJlYWR5Ci0gWW91IGNhbiB0b2xlcmF0ZSB0
aGUgbG9zcyBvZiB3aXRoaW4tZ3Vlc3Qgc2VjdXJpdHkKLSBZb3UgY2FuIHBh
dGNoIGFuZCByZWJvb3QgeW91ciBob3N0Ci0gWW91IGRvbid0IHdhbnQgYW4g
ZXh0cmEgUUVNVSBhcm91bmQKLSBZb3UgbmVlZCBtaWdyYXRpb24sIG1lbW9y
eSBiYWxsb29uaW5nLCBvciB2Y3B1IGhvdHBsdWcsIG9yIGEKICBiaWRpcmVj
dGlvbmFsIGNvbnNvbGUKLSBZb3UgbmVlZCBweWdydWIKLSBZb3UgbmVlZCB0
byB1c2UgbGlidmlydAoKVW5mb3J0dW5hdGVseSB0aGlzIHNvbHV0aW9uIGlz
IG5vdCB5ZXQgYXZhaWxhYmxlLiAgV2UgZXhwZWN0IHRvIGhhdmUKaXQgYXZh
aWxhYmxlIHdpdGhpbiBhIGZldyB3b3JraW5nIGRheXMuCg==

--=separator
Content-Type: application/octet-stream; name="xsa254/pvshim-converter.pl"
Content-Disposition: attachment; filename="xsa254/pvshim-converter.pl"
Content-Transfer-Encoding: base64

IyEvdXNyL2Jpbi9wZXJsIC13CiMKIyB1c2FnZToKIyAgIHB2c2hpbS1jb252
ZXJ0ZXIgW09QVElPTlNdIE9MRC1DT05GSUcgTkVXLUNPTkZJRwojCiMgb3B0
aW9uczoKIyAgIC0tcWVtdSBQQVRILVRPLVFFTVUgICAgICAgIGZpbGVuYW1l
IG9mIHFlbXUtc3lzdGVtLWkzODYKIyAgIC0tc2lkZWNhcnMtZGlyZWN0b3J5
IERJUiAgIGRlZmF1bHQgaXMgL3Zhci9saWIveGVuL3B2c2hpbS1zaWRlY2Fy
cwojICAgLS1zaGltIFNISU0gICAgICAgICAgICAgICAgb3ZlcnJpZGVzIGRv
bWFpbiBjb25maWcgZmlsZQojICAgLS1kZWJ1ZyAgICAgICAgICAgICAgICAg
ICAgdmVyYm9zZSwgYW5kIGxlYXZlcyBzaWRlY2FyIHByZXAgZGlyIGFyb3Vu
ZAojCiMgV2hhdCB3ZSBkbwojCiMgIHJlYWQgZXhpc3RpbmcgY29uZmlnIGZp
bGUgdXNpbmcgcHl0aG9uCiMgIGRldGVybWluZSBrZXJuZWwsIHJhbWRpc2sg
YW5kIGNtZGxpbmUKIyAgdXNlIHRoZW0gdG8gcHJvZHVjZSBzaWRlY2FyIGFu
ZCBzYXZlIGl0IHVuZGVyIGRvbWFpbiBuYW1lCiMgIG1lc3Mgd2l0aCB0aGUg
dGhpbmdzIHRoYXQgbmVlZCB0byBiZSBtZXNzZWQgd2l0aAojICBzcGl0IG91
dCBuZXcgY29uZmlnIGZpbGUKCnVzZSBzdHJpY3Q7Cgp1c2UgR2V0b3B0OjpM
b25nOwp1c2UgSlNPTjsKdXNlIElPOjpIYW5kbGU7CnVzZSBQT1NJWDsKdXNl
IEZjbnRsIHF3KDpmbG9jayk7CgpvdXIgJGRlYnVnOwoKc3ViIHJ1bmNtZCB7
CiAgICBwcmludCBTVERFUlIgIisgQF9cbiIgaWYgJGRlYnVnOwogICAgJCE9
MDsgJD89MDsgc3lzdGVtIEBfIGFuZCBkaWUgIiRfWzBdOiAkISAkPyI7Cn0K
Cm91ciAkcWVtdTsKb3VyICRzaGltOwpvdXIgJHNpZGVjYXJzX2RpciA9ICcv
dmFyL2xpYi94ZW4vcHZzaGltLXNpZGVjYXJzJzsKCkdldE9wdGlvbnMoJ3Fl
bXU9cycgPT4gXCRxZW11LAogICAgICAgICAgICdzaWRlY2Fycy1kaXJlY3Rv
cnk9cycgPT4gXCRzaWRlY2Fyc19kaXIsCiAgICAgICAgICAgJ3NoaW09cycg
PT4gXCRzaGltLAogICAgICAgICAgICdkZWJ1ZycgPT4gXCRkZWJ1ZykKICAg
IG9yIGRpZSAicHZzaGltLWNvbnZlcnRlcjogYmFkIG9wdGlvbnNcbiI7CgpA
QVJHVj09MiBvciBkaWUgInB2c2hpbS1jb252ZXJ0ZXI6IG5lZWQgb2xkIGFu
ZCBuZXcgY29uZmlnIGZpbGVuYW1lcyI7CgpvdXIgKCRpbiwkb3V0KSA9IEBB
UkdWOwoKb3VyICRpbmRhdGE7CgppZiAoJGluIG5lICctJykgewogICAgb3Bl
biBJLCAnPCcsICIkaW4iIG9yIGRpZSAib3BlbiBpbnB1dCBjb25maWcgZmls
ZTogJCFcbiI7Cn0gZWxzZSB7CiAgICBvcGVuIEksICc8JlNURElOJyBvciBk
aWUgJCE7Cn0KewogICAgbG9jYWwgJC87CiAgICAkaW5kYXRhID0gPEk+Owp9
CkktPmVycm9yIGFuZCBkaWUgJCE7CmNsb3NlIEk7CgpvcGVuIFAsICItfCIs
IHF3KHB5dGhvbjIgLWMpLCA8PEVORCwgJGluZGF0YSBvciBkaWUgJCE7Cmlt
cG9ydCBzeXMKaW1wb3J0IGpzb24KbCA9IHt9CmV4ZWMgc3lzLmFyZ3ZbMV0g
aW4gbApmb3IgayBpbiBsLmtleXMoKToKCWlmIGsuc3RhcnRzd2l0aCgiXyIp
OgoJCWRlbCBsW2tdCnByaW50IGpzb24uZHVtcHMobCkKRU5ECgpvdXIgJGM7
Cgp7CiAgICBsb2NhbCAkLzsKICAgICRfID0gPFA+OwogICAgJCE9MDsgJD89
MDsgY2xvc2UgUCBvciBkaWUgIiQhICQ/IjsKICAgICRjID0gZGVjb2RlX2pz
b24gJF87Cn0KCmRpZSAibm8gZG9tYWluIG5hbWUgPyIgdW5sZXNzIGV4aXN0
cyAkYy0+e25hbWV9OwpkaWUgImJvb3Rsb2FkZXIgbm90IHlldCBzdXBwb3J0
ZWQiIGlmICRjLT57Ym9vdGxvYWRlcn07CmRpZSAibm8ga2VybmVsIiB1bmxl
c3MgJGMtPntrZXJuZWx9OwoKb3VyICRzaWRlY2FyID0gJGMtPntwdnNoaW1f
c2lkZWNhcl9wYXRofSB8fCAiJHNpZGVjYXJzX2Rpci8kYy0+e25hbWV9Lmlz
byI7Cm91ciAkZG13cmFwID0gJGMtPntwdnNoaW1fc2lkZWNhcl9wYXRofSB8
fCAiJHNpZGVjYXJzX2Rpci8kYy0+e25hbWV9LmRtIjsKCiRzaGltIHx8PSAk
Yy0+e3B2c2hpbV9wYXRofTsKJHNoaW0gfHw9ICcvdXNyL2xvY2FsL2xpYi94
ZW4vYm9vdC94ZW4tc2hpbSc7CgpvdXIgJHNoaW1fY21kbGluZSA9ICRjLT57
cHZzaGltX2NtZGxpbmV9IHx8ICdjb25zb2xlPWNvbTEgY29tMT0xMTUyMDBu
MSc7CiRzaGltX2NtZGxpbmUgLj0gJyAnLiRjLT57cHZzaGltX2V4dHJhfSBp
ZiAkYy0+e3B2c2hpbV9leHRyYX07CgpvdXIgJGtlcm5lbF9jbWRsaW5lID0g
JGMtPntjbWRsaW5lfSB8fCAnJzsKJGtlcm5lbF9jbWRsaW5lIC49ICcgcm9v
dD0nLiRjLT57cm9vdH0gaWYgJGMtPntyb290fTsKJGtlcm5lbF9jbWRsaW5l
IC49ICcgJy4kYy0+e2V4dHJhfSBpZiAkYy0+e2V4dHJhfTsKCnByaW50ICJw
dnNoaW0tY29udmVydGVyOiBjcmVhdGluZyBzaWRlY2FyIGluICRzaWRlY2Fy
XG4iOwoKcnVuY21kIHF3KG1rZGlyIC1tNzAwIC1wIC0tKSwgJHNpZGVjYXJz
X2RpcjsKCm9wZW4gTCwgIj4iLCAiJHNpZGVjYXIubG9jayIgb3IgZGllICIk
c2lkZWNhci5sb2NrOiBvcGVuICQhIjsKZmxvY2sgTCwgTE9DS19FWCBvciBk
aWUgIiRzaWRlY2FyLmxvY2s6IGxvY2s6ICQhIjsKCm15ICRzZCA9ICIkc2lk
ZWNhci5kaXIiOwoKc3lzdGVtIHF3KHJtIC1yZiAtLSksICRzZDsKbWtkaXIg
JHNkLCAwNzAwOwoKcnVuY21kIHF3KGNwIC0tKSwgJHNoaW0sICIkc2Qvc2hp
bSI7CnJ1bmNtZCBxdyhjcCAtLSksICRjLT57a2VybmVsfSwgIiRzZC9rZXJu
ZWwiOwpydW5jbWQgcXcoY3AgLS0pLCAkYy0+e3JhbWRpc2t9LCAiJHNkL3Jh
bWRpc2siIGlmICRjLT57cmFtZGlza307CgpteSAkZ3J1YmNmZyA9IDw8RU5E
OwpzZXJpYWwgLS11bml0PTAgLS1zcGVlZD05NjAwIC0td29yZD04IC0tcGFy
aXR5PW5vIC0tc3RvcD0xCnRlcm1pbmFsX2lucHV0IHNlcmlhbAp0ZXJtaW5h
bF9vdXRwdXQgc2VyaWFsCgpzZXQgdGltZW91dD0wCgptZW51ZW50cnkgJ1hl
biBzaGltJyB7CglpbnNtb2QgZ3ppbwoJaW5zbW9kIHh6aW8KICAgICAgICBt
dWx0aWJvb3QgKGNkKS9zaGltIHBsYWNlaG9sZGVyICRzaGltX2NtZGxpbmUK
ICAgICAgICBtb2R1bGUgKGNkKS9rZXJuZWwgcGxhY2Vob2xkZXIgJGtlcm5l
bF9jbWRsaW5lCiAgICAgICAgbW9kdWxlIChjZCkvcmFtZGlzawp9CkVORAoK
cnVuY21kIHF3KG1rZGlyIC1wIC0tKSwgIiRzZC9ib290L2dydWIiOwpvcGVu
IEcsICI+IiwgIiRzZC9ib290L2dydWIvZ3J1Yi5jZmciIG9yIGRpZSAiJHNk
LCBncnViLmNmZzogJCEiOwpwcmludCBHICRncnViY2ZnIG9yIGRpZSAkITsK
Y2xvc2UgRyBvciBkaWUgJCE7Cgp1bmxpbmsgIiRzaWRlY2FyLm5ldyIgb3Ig
JCE9PUVOT0VOVCBvciBkaWUgIiRzaWRlY2FyLm5ldzogcm06ICQhIjsKcnVu
Y21kIHF3KGdydWItbWtyZXNjdWUgLW8pLCAiJHNpZGVjYXIubmV3IiwgIiRz
aWRlY2FyLmRpciI7CmlmICghc3RhdCAiJHNpZGVjYXIubmV3IikgewogICAg
JCE9PUVOT0VOVCBvciBkaWUgIiRzaWRlY2FyLm5ldzogc3RhdDogJCEiOwoK
ICAgIHByaW50IFNUREVSUiA8PEVORDsKcHZzaGltLWNvbnZlcnRlcjogZ3J1
Yi1ta3Jlc2N1ZSBleGl0ZWQgd2l0aCBzdGF0dXMgemVybyBidXQgZmFpbGVk
IHRvIG1ha2UgaXNvLgpOQiB0aGF0IGdydWItbWtyZXNjdWUgaGFzIGEgdGVu
ZGVuY3kgdG8gbGllIGluIGl0cyBlcnJvciBtZXNzYWdlcy4KRU5ECiAgICBt
eSAkbWlzc2luZzsKICAgIGZvcmVhY2ggbXkgJGNoZWNrIChxdyh4b3JyaXNv
IG1mb3JtYXQpKSB7CiAgICAgICAgJG1pc3NpbmcgfD0gc3lzdGVtIHF3KHNo
IC1jKSwgInR5cGUgJGNoZWNrIjsKICAgIH0KCiAgICBpZiAoJG1pc3Npbmcp
IHsKICAgICAgICBwcmludCBTVERFUlIgPDxFTkQ7CllvdSBzZWVtIHRvIGhh
dmUgc29tZSBwcm9ncmFtKHMpIG1pc3Npbmcgd2hpY2ggZ3J1Yi1ta3Jlc2N1
ZSBkZXBlbmRzIG9uLApzZWUgYWJvdmUuICAoIm1mb3JtYXQiIGlzIG5vcm1h
bGx5IGluIHRoZSBwYWNrYWdlICJtdG9vbHMiLikKSW5zdGFsbGluZyB0aG9z
ZSBwcm9ncmFtcyB3aWxsIHByb2JhYmx5IGhlbHAuCkVORAogICAgfSBlbHNl
IHsKICAgICAgICBwcmludCBTVERFUlIgPDxFTkQ7CkFuZCBvbGRlciBncnVi
LW1rcmVzY3VlIGhhcyBhIHRlbmRlbmN5IG5vdCB0byBub3RpY2UgY2VydGFp
biBwcm9ibGVtcy4KTWF5YmUgc3RyYWNlIHdpbGwgdGVsbCB5b3Ugd2hhdCBp
cyB3cm9uZy4gIDotLwpFTkQKICAgIH0KICAgIGRpZSAicHZzaGltLWNvbnZl
cnRlcjogZ3J1Yi1ta3Jlc2N1ZSBkaWQgbm90IG1ha2UgaXNvXG4iOwp9Cgpy
dW5jbWQgcXcocm0gLXJmIC0tKSwgIiRzaWRlY2FyLmRpciIgdW5sZXNzICRk
ZWJ1ZzsKCm9wZW4gUSwgIj4iLCAiJGRtd3JhcC5uZXciIG9yIGRpZSAiJGRt
d3JhcDogJCEiOwpwcmludCBRIDw8J0VORF9ETVdSQVAnIG9yIGRpZSAkITsK
IyEvYmluL2Jhc2gKCnNldCAteAo6ICIkQCIKc2V0ICt4CgpuZXdhcmdzPSgp
CgpuZXdhcmcgKCkgewogICAgbmV3YXJncys9KCIkMSIpCn0KCndoaWxlIFsg
JCMgLWd0IDEgXTsgZG8KICAgIGNhc2UgIiQxIiBpbgoJLW5vLXNodXRkb3du
fC1ub2RlZmF1bHRzfC1uby11c2VyLWNvbmZpZykKCSAgICBuZXdhcmcgIiQx
Ijsgc2hpZnQKCSAgICA7OwoJLXhlbi1kb21pZHwtY2hhcmRldnwtbW9ufC1k
aXNwbGF5fC1ib290fC1tfC1tYWNoaW5lKQoJICAgIG5ld2FyZyAiJDEiOyBz
aGlmdAoJICAgIG5ld2FyZyAiJDEiOyBzaGlmdAoJICAgIDs7CiAgICAgICAg
LW5hbWUpCiAgICAgICAgICAgIG5ld2FyZyAiJDEiOyBzaGlmdAogICAgICAg
ICAgICBuYW1lPSIkMSI7IHNoaWZ0CiAgICAgICAgICAgIG5ld2FyZyAiJG5h
bWUiCiAgICAgICAgICAgIDs7CgktbmV0ZGV2fC1jZHJvbSkKCSAgICA6IGZp
eG1lCgkgICAgbmV3YXJnICIkMSI7IHNoaWZ0CgkgICAgbmV3YXJnICIkMSI7
IHNoaWZ0CgkgICAgOzsKCS1kcml2ZXwta2VybmVsfC1pbml0cmR8LWFwcGVu
ZHwtdm5jKQoJICAgIHNoaWZ0OyBzaGlmdAoJICAgIDs7CgktZGV2aWNlKQoJ
ICAgIHNoaWZ0CgkgICAgY2FzZSAiJDEiIGluCgkJWFhYcnRsODEzOSopCgkJ
ICAgIG5ld2FyZyAiLWRldmljZSIKCQkgICAgbmV3YXJnICIkMSI7IHNoaWZ0
CgkJICAgIDs7CgkJKikKCQkgICAgc2hpZnQKCQkgICAgOzsKCSAgICBlc2Fj
CgkgICAgOzsKCSopCgkgICAgZWNobyA+JjIgIndhcm5pbmc6IHVuZXhwZWN0
ZWQgYXJndW1lbnQgJDEgYmVpbmcgcGFzc2VkIHRocm91Z2giCgkgICAgbmV3
YXJnICIkMSI7IHNoaWZ0CgkgICAgOzsKICAgIGVzYWMKZG9uZQoKI2lmIFsg
IngkbmFtZSIgIT0geCBdOyB0aGVuCiMgICAgbG9nZGlyPS92YXIvbG9nL3hl
bgojICAgIGxvZ2ZpbGU9IiRsb2dkaXIvc2hpbS0kbmFtZS5sb2ciCiMgICAg
c2F2ZWxvZyAiJGxvZ2ZpbGUiIHx8OgojICAgIG5ld2FyZyAtc2VyaWFsCiMg
ICAgbmV3YXJnICJmaWxlOiRsb2dmaWxlIgojZmkKRU5EX0RNV1JBUAoKaWYg
KCRxZW11KSB7CiAgICBwcmludGYgUSA8PCdFTkRfRE1XUkFQJywgJHFlbXUg
b3IgZGllICQhOwogICAgJyVzJyAiJHtuZXdhcmdzW0BdfSIKRU5EX0RNV1JB
UAp9IGVsc2UgewogICAgcHJpbnQgUSA8PCdFTkRfRE1XUkFQJyBvciBkaWUg
JCE7CnNldCAteApmb3IgcGF0aCBpbiAvdXNyL2xvY2FsL2xpYi94ZW4vYmlu
IC91c3IvbGliL3hlbi9iaW4gL3Vzci9sb2NhbC9iaW4gL3Vzci9iaW47IGRv
CiAgICAkcGF0aC9xZW11LXN5c3RlbS1pMzg2ICIke25ld2FyZ3NbQF19IiB8
fDoKZG9uZQplY2hvID4mMiAnY291bGQgbm90IGV4ZWMgcWVtdScKZXhpdCAx
MjcKRU5EX0RNV1JBUAp9CgpjaG1vZCAwNzU1LCAiJGRtd3JhcC5uZXciIG9y
IGRpZSAiJGRtd3JhcDogY2htb2Q6ICQhIjsKCmNsb3NlIFEgb3IgZGllICQh
OwoKcmVuYW1lICIkc2lkZWNhci5uZXciLCAkc2lkZWNhciBvciBkaWUgIiRz
aWRlY2FyOiBpbnN0YWxsOiAkISI7CnJlbmFtZSAiJGRtd3JhcC5uZXciLCAg
JGRtd3JhcCAgb3IgZGllICIkZG13cmFwOiBpbnN0YWxsOiAkISI7Cgpwcmlu
dCBTVERFUlIgPDxFTkQ7CnB2c2hpbS1jb252ZXJ0ZXI6IHdyb3RlIHFlbXUg
d3JhcHBlciB0byAkZG13cmFwCnB2c2hpbS1jb252ZXJ0ZXI6IHdyb3RlIHNp
ZGVjYXIgdG8gJHNpZGVjYXIKRU5ECgpteSAkYXBwZW5kID0gPDxFTkQ7CmJ1
aWxkZXI9J2h2bScKdHlwZT0naHZtJwpkZXZpY2VfbW9kZWxfdmVyc2lvbj0n
cWVtdS14ZW4nCmRldmljZV9tb2RlbF9vdmVycmlkZT0nJGRtd3JhcCcKZGV2
aWNlX21vZGVsX2FyZ3NfaHZtPVsnLWNkcm9tJywnJHNpZGVjYXInXQpib290
PSdjJwpzZXJpYWw9J3B0eScKRU5ECgppZiAoJG91dCBuZSAnLScpIHsKICAg
IG9wZW4gTywgIj4iLCAiJG91dC50bXAiIG9yIGRpZSAib3BlbiBvdXRwdXQg
Y29uZmlnIHRlbXA6ICRvdXQudG1wOiAkIVxuIjsKfSBlbHNlIHsKICAgIG9w
ZW4gTywgIj4mU1RET1VUIiBvciBkaWUgJCE7Cn0KCnByaW50IE8gJGluZGF0
YSwgIlxuIiwgJGFwcGVuZCBvciBkaWUgIndyaXRlIG91dHB1dDogJCEiOwpj
bG9zZSBPIG9yIGRpZSAiY2xvc2Ugb3V0cHV0OiAkISI7CgppZiAoJG91dCBu
ZSAnLScpIHsKICAgIHJlbmFtZSAiJG91dC50bXAiLCAkb3V0IG9yIGRpZSAi
aW5zdGFsbCBvdXRwdXQ6ICQhIjsKICAgIHByaW50IFNUREVSUiAicHZzaGlt
LWNvbnZlcnRlcjogd3JvdGUgbmV3IGd1ZXN0IGNvbmZpZyB0byAkb3V0XG4i
Owp9IGVsc2UgewogICAgcHJpbnQgU1RERVJSICJwdnNoaW0tY29udmVydGVy
OiB3cm90ZSBuZXcgZ3Vlc3QgY29uZmlnIHRvIHN0ZG91dFxuIjsKfQo=

--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Fri Jan 12 13:56:16 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 13:56:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eZznd-0007EN-HO; Fri, 12 Jan 2018 13:55:13 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=jpew=eg=gmail.com=mabarkdoll@srs-us1.protection.inumbo.net>)
 id 1eZh3H-0000NJ-OR
 for xen-users@lists.xenproject.org; Thu, 11 Jan 2018 17:54:07 +0000
X-Inumbo-ID: 39513f7e-f6f8-11e7-b4a6-bc764e045a96
Received: from mail-qk0-x22e.google.com (unknown [2607:f8b0:400d:c09::22e])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 39513f7e-f6f8-11e7-b4a6-bc764e045a96;
 Thu, 11 Jan 2018 18:52:43 +0100 (CET)
Received: by mail-qk0-x22e.google.com with SMTP id z12so5293636qkf.12
 for <xen-users@lists.xenproject.org>; Thu, 11 Jan 2018 09:54:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=X9YmFCGAm5X0NZGLX+tsWJuYWP3ccYbB2QSUyLqKVd4=;
 b=FJCSUUuebZ/w4o4h5jVcsuaE3v0i27cQcD0ywNlaCh9PuJDEJaMNZ7JwBB6c+Mg8Lu
 jvjIYf1UmU+eWaxDnsGX0bXAja3e3CzKEviVzhmNooeEnWdtx0n6edde72u4NSn+/sOm
 2L7eNustMtzu7S5W4Goy9TG4IXoJpBehIpdJ8vae8T0xqnaHRKRin5IfFnbXUw7FSgvv
 KaK3fpQwINrtGw+BOCQTJbTxKEeuxIBTltr3HWiiM/PxV8J4/5IyTwTpmWTKlmrB1SZ+
 aAjM6xka2YzKOrpA7Fcu48e4jXQ9ygh60Fb8lFB46o2gVOX22jHNLj/NGl3xbaT+/OKE
 dpeA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=X9YmFCGAm5X0NZGLX+tsWJuYWP3ccYbB2QSUyLqKVd4=;
 b=VSHYmtOtP9ASB34Sd7FzxOAJn+RgZL/seNAedQWva3n6Wid2HZcuGyxCqYdK9RhDku
 oMqWe7hCtUwBaHb8ZC7IZMFHij77mALPdU2GbUI6UBsrg4OJjrIFA75olGYOMWU8Pnvs
 GfaYFU01dzImpBeL7RXISWbn5VInAA92Nfhf2G4f7UrfIK83DZu0nMs+l8R5LA6Jfc0H
 /HE4Uri8ot9oWPm/q8i3Md9YE5VEi4OSnMxurlN7YKORmpucOvKLh9rGPSxPl037ALZo
 +LYMZ5wsHXu6O1gcXxcv0NYEZjYv/pl8q5lZEjs5DFb80HnOiiEKPvvvH/7SdSwzs7y2
 h9vQ==
X-Gm-Message-State: AKGB3mLDsPXAwlI5dt7tBz3oVqnkzqn7m22PrjUixe3OioTmf3aI/fJG
 b87wDgO6WtzX0yigZCjOGjncLPIv5cCyjUFYNmMAwf2C
X-Google-Smtp-Source: ACJfBovv+9IR5e4FQlGkWDoiGRYdDr6tRytBnF0y5QeNdJJw3VOls47n7ETMgXviiQNvjONprHupUqMxCGlXT79hjiU=
X-Received: by 10.55.92.65 with SMTP id q62mr33813163qkb.71.1515693244103;
 Thu, 11 Jan 2018 09:54:04 -0800 (PST)
MIME-Version: 1.0
Received: by 10.12.139.153 with HTTP; Thu, 11 Jan 2018 09:53:23 -0800 (PST)
From: Michael Barkdoll <mabarkdoll@gmail.com>
Date: Thu, 11 Jan 2018 11:53:23 -0600
Message-ID: <CAC7iewEiKm2UV-GaSakUhVMusezHnXg3-5UiNGSk4tfyCcwZPQ@mail.gmail.com>
To: xen-users@lists.xenproject.org
X-Mailman-Approved-At: Fri, 12 Jan 2018 13:55:12 +0000
Subject: [Xen-users] Xen PV Guest won't boot latest kernel- OSError: [Errno
 28] No space left on device
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4906702281438274045=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============4906702281438274045==
Content-Type: multipart/alternative; boundary="001a114e5f4a674383056283d540"

--001a114e5f4a674383056283d540
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hello, I have an Ubuntu 14.04 running Xen and a VM running Ubuntu 16.04 LTS
that I'm having issues with it booting after upgrading the kernel for
meltdown and spectre vulnerability.

````
sudo apt-get update
sudo apt-get upgrade
sudo apt-get dist-upgrade
````

Ubuntu 14.04 xen host reboot failure log:
````
$ tailf /var/log/xen/servername.log
Domain 24 needs to be cleaned up: destroying the domain
Done. Rebooting now
libxl: error: libxl_bootloader.c:628:bootloader_finished: bootloader failed
- consult logfile /var/log/xen/bootloader.27.log
libxl: error: libxl_exec.c:118:libxl_report_child_exitstatus: bootloader
[-1] exited with error status 1
libxl: error: libxl_create.c:1024:domcreate_rebuild_done: cannot (re-)build
domain: -3
````


````
cat /var/log/xen/bootloader.27.log
Using <class 'grub.GrubConf.Grub2ConfigFile'> to parse /grub/grub.cfg
pyGRUB  version 0.6
 =E2=94=8C=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=90
 =E2=94=82 Ubuntu                                                          =
       =E2=94=82
 =E2=94=82 Ubuntu, with Linux 4.4.0-109-generic                            =
       =E2=94=82
 =E2=94=82 Ubuntu, with Linux 4.4.0-109-generic (recovery mode)            =
       =E2=94=82
 =E2=94=82 Ubuntu, with Linux 4.4.0-108-generic                            =
       =E2=94=82
 =E2=94=82 Ubuntu, with Linux 4.4.0-108-generic (recovery mode)            =
       =E2=94=82
 =E2=94=82 Ubuntu, with Linux 4.4.0-104-generic                            =
       =E2=94=82
 =E2=94=82 Ubuntu, with Linux 4.4.0-104-generic (recovery mode)            =
       =E2=94=82
 =E2=94=82 Ubuntu, with Linux 4.4.0-15-generic                             =
       =E2=94=82
 =E2=94=94=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=98
Use the ^ and =E2=94=B4 keys to select which entry is highlighted.
Press enter to boot the selected OS, 'e' to edit the
commands before booting, 'a' to modify the kernel arguments
before booting, or 'c' for a command line.

Traceback (most recent call last):
  File "/usr/lib/xen-4.4/bin/pygrub", line 905, in <module>
    os.write(fd, ostring)
OSError: [Errno 28] No space left on device
````

I was able to get the vm to boot only by rapidly attempt to access the menu
options and boot the old kernel (4.4.0-15-generic). Disk space and inodes
seems fine on the host Ubuntu 14.04LTS and Ubuntu 16.04LTS Guest.

Ubuntu 14.04 Host:
````
root@host:/var/log/xen# df -hFilesystem      Size  Used Avail Use% Mounted
on
udev            197M   12K  197M   1% /dev
tmpfs            42M  1.1M   41M   3% /run
/dev/dm-0       104G   49G   50G  50% /
none            4.0K     0  4.0K   0% /sys/fs/cgroup
none            5.0M     0  5.0M   0% /run/lock
none            208M     0  208M   0% /run/shm
none            100M     0  100M   0% /run/user
/dev/sda1       236M   40M  184M  18% /boot
root@host:/var/log/xen# df -hi
Filesystem     Inodes IUsed IFree IUse% Mounted on
udev              50K   721   49K    2% /dev
tmpfs             52K   849   52K    2% /run
/dev/dm-0        6.6M   86K  6.5M    2% /
none              52K     2   52K    1% /sys/fs/cgroup
none              52K     5   52K    1% /run/lock
none              52K     1   52K    1% /run/shm
none              52K     2   52K    1% /run/user
/dev/sda1         61K   298   61K    1% /boot
root@host:/var/log/xen#
````

Ubuntu 16.04 PV Guest:
````
root@guest:~# df -hFilesystem                            Size  Used Avail
Use% Mounted on
udev                                  950M     0  950M   0% /dev
tmpfs                                 200M  3.1M  197M   2% /run
/dev/mapper/guest--vg-root              47G  4.3G   40G  10% /
tmpfs                                 997M     0  997M   0% /dev/shm
tmpfs                                 5.0M     0  5.0M   0% /run/lock
tmpfs                                 997M     0  997M   0% /sys/fs/cgroup
/dev/xvda1                            472M  192M  256M  43% /boot
tmpfs                                 200M     0  200M   0% /run/user/1000
root@www2:~# df -hi
Filesystem                           Inodes IUsed IFree IUse% Mounted on
udev                                   238K   406  237K    1% /dev
tmpfs                                  250K   491  249K    1% /run
/dev/mapper/guest--vg-root              3.0M  177K  2.8M    6% /
tmpfs                                  250K     1  250K    1% /dev/shm
tmpfs                                  250K     7  250K    1% /run/lock
tmpfs                                  250K    16  250K    1% /sys/fs/cgrou=
p
/dev/xvda1                             122K   315  122K    1% /boot
tmpfs                                  250K     4  250K    1% /run/user/100=
0
root@guest:~#
````

Here is the guest Ubuntu 16.04 OS kernels:
````
root@guest:~# dpkg -l | grep linux-image-
ii  linux-image-4.4.0-104-generic       4.4.0-104.127
        amd64        Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii  linux-image-4.4.0-108-generic       4.4.0-108.131
        amd64        Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii  linux-image-4.4.0-109-generic       4.4.0-109.132
        amd64        Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii  linux-image-4.4.0-15-generic        4.4.0-15.31
        amd64        Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii  linux-image-extra-4.4.0-104-generic 4.4.0-104.127
        amd64        Linux kernel extra modules for version 4.4.0 on 64 bit
x86 SMP
ii  linux-image-extra-4.4.0-108-generic 4.4.0-108.131
        amd64        Linux kernel extra modules for version 4.4.0 on 64 bit
x86 SMP
ii  linux-image-extra-4.4.0-109-generic 4.4.0-109.132
        amd64        Linux kernel extra modules for version 4.4.0 on 64 bit
x86 SMP
ii  linux-image-extra-4.4.0-15-generic  4.4.0-15.31
        amd64        Linux kernel extra modules for version 4.4.0 on 64 bit
x86 SMP
ii  linux-image-generic                 4.4.0.109.114
        amd64        Generic Linux kernel image
root@guest:~#
````

I'm currently able to boot to 4.4.0-15.31

Here is my xen config file that I use to start the vm:
````
# cat /etc/xen/guest.cfg
# /var/lib/xen/images/ubuntu-netboot/xenial16LTS


name =3D "guest"


#kernel =3D "/var/lib/xen/images/ubuntu-netboot/xenial16LTS/vmlinuz"
#ramdisk =3D "/var/lib/xen/images/ubuntu-netboot/xenial16LTS/initrd.gz"
bootloader =3D "/usr/lib/xen-4.4/bin/pygrub"


memory =3D 2048
vcpus =3D 1




disk =3D [ '/dev/host-disk2-vg/guest-disk,raw,xvda,rw' ]




#
#  Networking
#
vif         =3D [ 'ip=3Dxxx.xxx.xxx.xxx ,mac=3DAA:BB:CC:DD:EE:FF' ]


#
#  Behaviour
#
on_poweroff =3D 'destroy'
on_reboot   =3D 'restart'
on_crash    =3D 'restart'
````

I also tried launching the vm with strace output of
````
strace xl create -c file.cfg
````
is here: https://pastebin.com/8ctS3TQh

I'm a bit lost as to the cause of this... I was hoping to just upgrade the
kernel for meltdown and spetre, but this issue I've never faced before. I
think it might be related to pygrub and the new kernel? I don't know for
sure though anything I can check to figure this out better? Thanks.

--001a114e5f4a674383056283d540
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: base64
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--001a114e5f4a674383056283d540--


--===============4906702281438274045==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============4906702281438274045==--


From xen-users-bounces@lists.xenproject.org Fri Jan 12 15:29:52 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 15:29:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ea1GE-0001RD-1H; Fri, 12 Jan 2018 15:28:50 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=xurt=eh=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1ea1GD-0001R7-8m
 for xen-users@lists.xenproject.org; Fri, 12 Jan 2018 15:28:49 +0000
X-Inumbo-ID: 16d0f0ba-f7ad-11e7-b4a6-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 16d0f0ba-f7ad-11e7-b4a6-bc764e045a96;
 Fri, 12 Jan 2018 16:27:24 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date;
 bh=r0KBrJJSUg9w0TFX/PWEarWAmtMO1WGrBTzvFGIMG3w=; 
 b=hB33QtAAZOo2pjo4C91mNp7UMaX+l8btF3PtOZXYPxClfJu2TfizTpU+f/FkcLvLS4nxrnVGtYJRpq0Ol/LjQwhk7C0uh2IBQfvmF0VpeNFzxHNktb3ODff9fQ/96Rwn6i+C2apdq7PBNFSRdB9WdFukr6zzu9+Cje4zQAU3cc3tsJPQVL2gTDr8NzyrUcGbxpUk8jh7jUriGSXpgP1bF/iY5/BlozDgUVov1b3113nxt0P5BhMJ6NReq5hVoxAkkadalAJ/fC0s7flZbsaNr/X0nsNf00unbyidsf+JHffDFOZ8zv4IyHIuqZVDH4aVh7fSAv/VCdGTACIZpXNkBg==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1ea1GB-00081F-2y
 for xen-users@lists.xenproject.org; Fri, 12 Jan 2018 15:28:47 +0000
Date: Fri, 12 Jan 2018 15:28:47 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Message-ID: <20180112152847.GZ3124@bitfolk.com>
References: <CAC7iewEiKm2UV-GaSakUhVMusezHnXg3-5UiNGSk4tfyCcwZPQ@mail.gmail.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <CAC7iewEiKm2UV-GaSakUhVMusezHnXg3-5UiNGSk4tfyCcwZPQ@mail.gmail.com>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Subject: Re: [Xen-users] Xen PV Guest won't boot latest kernel- OSError:
 [Errno 28] No space left on device
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Fri Jan 12 17:37:49 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 17:37:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ea3G9-0000IB-N6; Fri, 12 Jan 2018 17:36:53 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=dgpl=eh=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1ea3G8-0000HX-VX
 for xen-users@lists.xen.org; Fri, 12 Jan 2018 17:36:53 +0000
X-Inumbo-ID: f9c836d6-f7be-11e7-b4a6-bc764e045a96
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id f9c836d6-f7be-11e7-b4a6-bc764e045a96;
 Fri, 12 Jan 2018 18:35:26 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1ea3Fo-0004gu-BD; Fri, 12 Jan 2018 17:36:32 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1ea3Fo-0000JJ-8f; Fri, 12 Jan 2018 17:36:32 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1ea3Fo-0000JJ-8f@xenbits.xenproject.org>
Date: Fri, 12 Jan 2018 17:36:32 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 6

        Information leak via side effects of speculative execution

UPDATES IN VERSION 6
====================

PVH shim ("Comet") for 4.10 is available.

Mention within-guest attack in README.vixen as well as
README.which-shim.

Vixen shim converter script "exec"s qemu, avoiding stale qemu
processes (and, therefore, avoiding stale domains).

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by running guests in HVM or PVH mode.
(Within-guest attacks are still possible unless the guest OS has also
been updated with an SP3 mitigation series such as KPTI/Kaiser.)

For guests with legacy PV kernels which cannot be run in HVM or PVH
mode directly, we have developed two "shim" hypervisors that allow PV
guests to run in HVM mode or PVH mode.  This prevents attacks on the
host, but it leaves the guest vulnerable to Meltdown attacks by its
own unprivileged processes, even if the guest OS has KPTI or similar
Meltdown mitigation.

The HVM shim (codenamed "Vixen") is available now, as is the PVH shim
(codenamed "Comet") for Xen 4.10.  We expect to have Comet for 4.8 and
4.9 within a few days.  Please read README.which-shim to determine
which shim is suitable for you.

$ sha256sum xsa254*/*
f81c4624f8b188a2c33efa8687d3442bbd17c476e1a10761ef70c0aa99f6c659  xsa254/README.comet
1c594822dbd95998951203f6094bc77586d5720788de15897784d20bacb2ef08  xsa254/README.vixen
7e816160c1c1d1cd93ec3c3dd9753c8f3957fefe86b7aa967e9e77833828f849  xsa254/README.which-shim
1d2098ad3890a5be49444560406f8f271c716e9f80e7dfe11ff5c818277f33f8  xsa254/pvshim-converter.pl
$

RESOLUTION
==========

There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.


NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaWPIbAAoJEIP+FMlX6CvZQuoH/0A21scnQhrQPmFjtBO0b0Ai
/xQ7VCf2t3iKeZYJJGzj2atE1Hj91H6sZe6t6tLFbfPeYv2Gbfpl/09EE8ONSpSj
ae69fgwQN/EvpkCVec+QWQ0pWj7tLYgkT4IwQJSW+6VrTWjEV8PzQgkfjgclJEOk
J7EhaauI0qZVPEC2QZoMGJlgwfoS4xJalpCUGflrvgtmPhYbGGYDP8bP7WbVtqYS
I9nIoqndBdeWeyyu1O+cnMquV5BX2Nq7BDOTB3SMwNBHsnKudRQQRc3yNdmvQa2C
jvUMs/U7rqfK5pgOfimvLSDLR0TSnzNC8ahuI9Tv6TSwIl+AVt4xg0DZzhMjiqQ=
=aOVG
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa254/README.comet"
Content-Disposition: attachment; filename="xsa254/README.comet"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.vixen"
Content-Disposition: attachment; filename="xsa254/README.vixen"
Content-Transfer-Encoding: base64

ICAgICAgICAgICAgICAgIFBWLWluLUhWTSBzaGltIHdpdGggInNpZGVjYXIi
IElTTwogICAgICAgICAgICAgICAgPT09PT09PT09PT09PT09PT09PT09PT09
PT09PT09PT09CgpTdW1tYXJ5Ci0tLS0tLS0KClRoaXMgUkVBRE1FIGRlc2Ny
aWJlcyBvbmUgb2YgdHdvIG1pdGlnYXRpb24gc3RyYXRlZ2llcyBmb3IgTWVs
dGRvd24uCgpUaGUgYmFzaWMgcHJpbmNpcGxlIGlzIHRvIHJ1biBQViBndWVz
dHMgKHdoaWNoIGNhbiByZWFkIGFsbCBvZiBob3N0Cm1lbW9yeSBkdWUgdG8g
dGhlIGhhcmR3YXJlIGJ1Z3MpIGFzIEhWTSBndWVzdHMgKHdoaWNoIGNhbm5v
dCwgYXQgbGVhc3QKbm90IGR1ZSB0byBNZWx0ZG93bikuICBUaGUgUFYgZW52
aXJvbm1lbnQgaXMgc3RpbGwgcHJvdmlkZWQgdG8gdGhlCmd1ZXN0IGJ5IGFu
IGVtYmVkZGVkIGNvcHkgb2YgWGVuLCB0aGUgInNoaW0iLiAgVGhpcyB2ZXJz
aW9uIG9mIHRoZQpzaGltIGlzIGNvZGVuYW1lZCAiVml4ZW4iLgoKSW4gb3Jk
ZXIgdG8gYm9vdCB0aGUgc2hpbSB3aXRoIGFuIHVubW9kaWZpZWQgdG9vbHN0
YWNrLCB5b3UgYWxzbwpwcm92aWRlIGEgc3BlY2lhbCBkaXNrIGNvbnRhaW5p
bmcgdGhlIHNoaW0gYW5kIHRoZSBndWVzdCBrZXJuZWwgKG9yCnB2Z3J1Yik7
IHRoaXMgaXMgY2FsbGVkIHRoZSAic2lkZWNhciIuCgpOb3RlIHRoYXQgYm90
aCBvZiB0aGVzZSBzaGltLWJhc2VkIGFwcHJvYWNoZXMgcHJldmVudCBhdHRh
Y2tzIG9uIHRoZQpob3N0LCBidXQgbGVhdmUgdGhlIGd1ZXN0IHZ1bG5lcmFi
bGUgdG8gTWVsdGRvd24gYXR0YWNrcyBieSBpdHMgb3duCnVucHJpdmlsZWdl
ZCBwcm9jZXNzZXM7IHRoaXMgaXMgdHJ1ZSBldmVuIGlmIHRoZSBndWVzdCBP
UyBoYXMgS1BUSSBvcgpzaW1pbGFyIE1lbHRkb3duIG1pdGlnYXRpb24uCgpX
aGF0IHlvdSB3aWxsIG5lZWQKLS0tLS0tLS0tLS0tLS0tLS0tCgogKiBZb3Vy
IGhvc3QgbXVzdCBiZSBhYmxlIHRvIHJ1biBncnViLW1rcmVzY3VlIHRvIGdl
bmVyYXRlIGEgLmlzbwogKiBZb3Ugd2lsbCB0aGVyZWZvcmUgbmVlZCB4b3Jy
aXNvIGFuZCBtdG9vbHMKICogWW91IG11c3QgYmUgdXNpbmcgeGwgYW5kIGFi
bGUgdG8gdXNlIGFuIGFsdGVybmF0aXZlIHlvdXIgZ3Vlc3QgY29uZmlnCgog
KiBZb3Ugd2lsbCBuZWVkIHRoZSBzY3JpcHQgInB2c2hpbS1jb252ZXJ0ZXIu
cGwiCiAgLSBUaGlzIHJlbGllcyBvbiBwZXJsLWpzb24KICogWW91IHdpbGwg
bmVlZCB0aGUgeGVuLmdpdCB0YWcgNC45LjEtc2hpbS12aXhlbi0xCgoKSW5z
dHJ1Y3Rpb25zCi0tLS0tLS0tLS0tLQoKMS4gT24gYSBzdWl0YWJsZSBzeXN0
ZW0gKHBlcmhhcHMgYSBkaWZmZXJlbnQgaG9zdCkKICAgIGdpdCBjbG9uZSBn
aXQ6Ly94ZW5iaXRzLnhlbnByb2plY3Qub3JnL3hlbi5naXQgeGVuLmdpdAog
ICAgY2QgeGVuLmdpdAogICAgZ2l0IGNoZWNrb3V0IDQuOS4xLXNoaW0tdml4
ZW4tMQoKSWYgeW91IG5lZWQgYmktZGlyZWN0aW9uYWwgY29uc29sZSBhbmQg
ZG9uJ3QgbWluZCBhIGxlc3MtdGVzdGVkIHBhdGNoLAp5b3UgY2FuIGFwcGx5
IHRoZSBwYXRjaCBmb3VuZCBpbiB0aGlzIGVtYWlsOgoKICAgIG1hcmMuaW5m
by8/aT08MTUxNTYwNDU1Mi05MjA1LTEtZ2l0LXNlbmQtZW1haWwtc3JuQHBy
Z21yLmNvbT4KCmJ1aWxkIGEgeGVuIGh5cGVydmlzb3IgYmluYXJ5IGFzIHVz
dWFsOgoKICAgIG1ha2UgeGVuCgpJZiB5b3VyIGRlZmF1bHQgdmVyc2lvbiBv
ZiBweXRob24gaXMgcHl0aG9uIDMsIHlvdSBtYXkgbmVlZCB0byBhZGQgdGhl
IGZvbGxvd2luZzoKCiAgICBtYWtlIFBZVEhPTj1weXRob24yIHhlbgoKVGhp
cyB3aWxsIGJ1aWxkIGEgZmlsZQogICAgeGVuL3hlbi5negoKMi4gQ29weSB0
aGF0IGZpbGUgdG8geW91ciBkb20wLgoKSWRlYWxseSBzb21lcGxhY2UgbGlr
ZSAvdXNyL2xpYi94ZW4vYm9vdC94ZW4tdml4ZW4uZ3oKCjMuIENvcHkgdGhl
IHNjcmlwdCBwdnNoaW0tY29udmVydGVyIHRvIHlvdXIgZG9tMCBhbmQgbWFr
ZQogICBpdCBleGVjdXRhYmxlOgogICAgICBjaG1vZCAreCBwdnNoaW0tY29u
dmVydGVyLnBsCgo0LiBGb3IgZWFjaCBndWVzdAoKICAoaSkgaWYgdGhlIGd1
ZXN0IGlzIGN1cnJlbnRseSBib290ZWQgd2l0aCBweWdydWIgeW91IG11c3Qg
Zmlyc3QKICAgc3dpdGNoIHRvIGRpcmVjdCBrZXJuZWwgYm9vdCAoYnkgbWFu
dWFsbHkgY29weWluZyB0aGUga2VybmVsIGFuZAogICBpbml0cmFtZnMgb3V0
IG9mIHRoZSBndWVzdCwgYW5kIGNvbmZpZ3VyaW5nIHRoZSBjb21tYW5kIGxp
bmUgaW4gdGhlCiAgIGRvbWFpbiBjb25maWd1cmF0aW9uIGZpbGUpLCBvciBw
dmdydWIuCgogIChpaSkgcnVuCiAgICAgIC4vcHZzaGltLWNvbnZlcnRlci5w
bCAtLXNoaW09L3Vzci9saWIveGVuL2Jvb3QveGVuLXZpeGVuLmd6IC9ldGMv
eGVuL0dVRVNULmNmZyAvZXRjL3hlbi9HVUVTVC53aXRoLXNoaW0tY2ZnCgog
IChpaWkpIHNodXQgdGhlIGd1ZXN0IGRvd24gY2xlYW5seQoKICAoaXYpIGNy
ZWF0ZSB0aGUgZ3Vlc3Qgd2l0aCB0aGUgbmV3IGNvbmZpZwogICAgICB4bCBj
cmVhdGUgL2V0Yy94ZW4vR1VFU1Qud2l0aC1zaGltLWNmZwoKICAodikgQ2hl
Y2sgdGhhdCBpdCBib290cyBwcm9wZXJseS4gIHhsIGNvbnNvbGUgc2hvdWxk
IHdvcmsuCgogICh2aSkgTWFrZSBhcnJhbmdlbWVudHMgc28gdGhhdCBhdXRv
c3RhcnRpbmcgb2YgdGhlIGd1ZXN0IHdpbGwgdXNlCiAgICAgdGhlIG5ldyBj
b25maWcgZmlsZSByYXRoZXIgdGhhbiB0aGUgb2xkIG9uZQoK

--=separator
Content-Type: application/octet-stream; name="xsa254/README.which-shim"
Content-Disposition: attachment; filename="xsa254/README.which-shim"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/pvshim-converter.pl"
Content-Disposition: attachment; filename="xsa254/pvshim-converter.pl"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Fri Jan 12 17:46:06 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 17:46:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ea3OE-00024G-6G; Fri, 12 Jan 2018 17:45:14 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=tumo=eh=gmail.com=fernando.berretta@srs-us1.protection.inumbo.net>)
 id 1ea3OD-00023x-66
 for xen-users@lists.xen.org; Fri, 12 Jan 2018 17:45:13 +0000
X-Inumbo-ID: 2412d7c9-f7c0-11e7-b4a6-bc764e045a96
Received: from mail-ua0-x243.google.com (unknown [2607:f8b0:400c:c08::243])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 2412d7c9-f7c0-11e7-b4a6-bc764e045a96;
 Fri, 12 Jan 2018 18:43:47 +0100 (CET)
Received: by mail-ua0-x243.google.com with SMTP id x10so4555498ual.8;
 Fri, 12 Jan 2018 09:45:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=csAWspKin3jZeBevAA3rYwHnuZO5350jnfMCqa5EeUU=;
 b=bjHdLWH/QqsZXZuQARHc7/86i5qmomqf06Au+70rPCTYr5G33/+ZL1aTXxdemA1lIv
 RfdxN6T/uRQsgducfQS14VkaRahWZkyCBpDGFqOgEthZdcBB9WTXl2ccjSa1QWY4QjU+
 7ca8jCTbmvSoSaNzyymDBYo9sXjsNj4NFOogel70lTJ6wvg2yxMU4w6wBqV0A60atGqr
 LQK55b3ObsmKfgwrYMZ34DchlYhCWULsgu3X7D/rvjXp87QR4BeYfS41FYD33DKFKx90
 Aq96pBD/J4WytcZdQUc+FaKRNwLGUvPUpQla8aCNXOIWJ/pvY29T5rwLsZHp0FM02xBr
 /gGw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=csAWspKin3jZeBevAA3rYwHnuZO5350jnfMCqa5EeUU=;
 b=dk7Is3k3hl3EirJTZlBvYUXVFJHLsvluoVanLj2zhVo9xuY49Gvmwl4Kdw/OVHQf9h
 vh+2DT9suA+eDlpomojaEkoQkggIo/Ac+QsnFfMP06SYRqRk3F8Lp3ALQPsTR+J5hmAq
 BrxEuR3tRHQWMkdHUqOyyBSdVh5F+Guyju+inE1k9UMG7lL6BX8xFoKZ/65UMEIRIqL4
 gHxoBXhgKwSCX81d1TwC/VSxgQOmzS2l6EnuFNiVydNMaEFNzbwBLGvl69Px13FZ5U4D
 XWiAsLNHGBHXgbO8eMj+86eznShe2DreW+9Q1phhaSvbvw+7Yx0VnQ0gmeI4b9h+CJ9O
 9uxA==
X-Gm-Message-State: AKwxytcEAFd3HYJah1QPSKGgXzJNic7dT7efd6LKRaNiKQ6odBgk0kru
 iIMdKMZUKfmVrgd8WH5JIFbKM8Z6689SdDHYtdc=
X-Google-Smtp-Source: ACJfBotsmfzW1g0+bvXpuWRQIwGds+BjbZJmjsmFWs0QGsrHf5M15/TU04WWadVpOi2AMe4JzqUJpXgoOCKyeHOBhi4=
X-Received: by 10.176.112.164 with SMTP id q4mr17679287ual.105.1515779109750; 
 Fri, 12 Jan 2018 09:45:09 -0800 (PST)
MIME-Version: 1.0
Received: by 10.103.115.1 with HTTP; Fri, 12 Jan 2018 09:45:09 -0800 (PST)
In-Reply-To: <E1ea3Fo-0000JJ-8f@xenbits.xenproject.org>
References: <E1ea3Fo-0000JJ-8f@xenbits.xenproject.org>
From: Fernando Berretta <fernando.berretta@gmail.com>
Date: Fri, 12 Jan 2018 14:45:09 -0300
Message-ID: <CAG_31GAOR4K9_KFYuhf5YH47=nm9XQd0-Qcq4asThrfji07Ogg@mail.gmail.com>
To: "Xen.org security team" <security@xen.org>
Cc: xen-users@lists.xen.org,
 "Xen.org security team" <security-team-members@xen.org>,
 xen-announce@lists.xen.org, oss-security@lists.openwall.com,
 xen-devel@lists.xen.org
Subject: Re: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753,
 CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3418418885724403021=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============3418418885724403021==
Content-Type: multipart/alternative; boundary="089e0832e138650c47056297d3c6"

--089e0832e138650c47056297d3c6
Content-Type: text/plain; charset="UTF-8"

unsuscribe

On Fri, Jan 12, 2018 at 2:36 PM, Xen.org security team <security@xen.org>
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
>  Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
>                                  version 6
>
>         Information leak via side effects of speculative execution
>
> UPDATES IN VERSION 6
> ====================
>
> PVH shim ("Comet") for 4.10 is available.
>
> Mention within-guest attack in README.vixen as well as
> README.which-shim.
>
> Vixen shim converter script "exec"s qemu, avoiding stale qemu
> processes (and, therefore, avoiding stale domains).
>
> ISSUE DESCRIPTION
> =================
>
> Processors give the illusion of a sequence of instructions executed
> one-by-one.  However, in order to most efficiently use cpu resources,
> modern superscalar processors actually begin executing many
> instructions in parallel.  In cases where instructions depend on the
> result of previous instructions or checks which have not yet
> completed, execution happens based on guesses about what the outcome
> will be.  If the guess is correct, execution has been sped up.  If the
> guess is incorrect, partially-executed instructions are cancelled and
> architectural state changes (to registers, memory, and so on)
> reverted; but the whole process is no slower than if no guess had been
> made at all.  This is sometimes called "speculative execution".
>
> Unfortunately, although architectural state is rolled back, there are
> other side effects, such as changes to TLB or cache state, which are
> not rolled back.  These side effects can subsequently be detected by
> an attacker to determine information about what happened during the
> speculative execution phase.  If an attacker can cause speculative
> execution to access sensitive memory areas, they may be able to infer
> what that sensitive memory contained.
>
> Furthermore, these guesses can often be 'poisoned', such that attacker
> can cause logic to reliably 'guess' the way the attacker chooses.
> This advisory discusses three ways to cause speculative execution to
> access sensitive memory areas (named here according to the
> discoverer's naming scheme):
>
> "Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
> Poison the branch predictor, such that victim code is speculatively
> executed past boundary and security checks.  This would allow an
> attacker to, for instance, cause speculative code in the normal
> hypercall / emulation path to execute with wild array indexes.
>
> "Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
> Poison the branch predictor.  Well-abstracted code often involves
> calling function pointers via indirect branches; reading these
> function pointers may involve a (slow) memory access, so the CPU
> attempts to guess where indirect branches will lead.  Poisoning this
> enables an attacker to speculatively branch to any code that is
> executable by the victim (eg, anywhere in the hypervisor).
>
> "Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
> On some processors, certain pagetable permission checks only happen
> when the instruction is retired; effectively meaning that speculative
> execution is not subject to pagetable permission checks.  On such
> processors, an attacker can speculatively execute arbitrary code in
> userspace with, effectively, the highest privilege level.
>
> More information is available here:
>   https://meltdownattack.com/
>   https://spectreattack.com/
>   https://googleprojectzero.blogspot.co.uk/2018/01/
> reading-privileged-memory-with-side.html
>
> Additional Xen-specific background:
>
> Xen hypervisors on most systems map all of physical RAM, so code
> speculatively executed in a hypervisor context can read all of system
> RAM.
>
> When running PV guests, the guest and the hypervisor share the address
> space; guest kernels run in a lower privilege level, and Xen runs in
> the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
> run in a separate address space to the hypervisor.)  However, only
> 64-bit PV guests can generate addresses large enough to point to
> hypervisor memory.
>
> IMPACT
> ======
>
> Xen guests may be able to infer the contents of arbitrary host memory,
> including memory assigned to other guests.
>
> An attacker's choice of code to speculatively execute (and thus the
> ease of extracting useful information) goes up with the numbers.  For
> SP1, an attacker is limited to windows of code after bound checks of
> user-supplied indexes.  For SP2, the attacker will in many cases will
> be limited to executing arbitrary pre-existing code inside of Xen.
> For SP3 (and other cases for SP2), an attacker can write arbitrary
> code to speculatively execute.
>
> Additionally, in general, attacks within a guest (from guest user to
> guest kernel) will be the same as on real hardware.  Consult your
> operating system provider for more information.
>
> NOTE ON TIMING
> ==============
>
> This vulnerability was originally scheduled to be made public on 9
> January.  It was accelerated at the request of the discloser due to
> one of the issues being made public.
>
> VULNERABLE SYSTEMS
> ==================
>
> Systems running all versions of Xen are affected.
>
> For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
> ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
> has information on affected models on the following website:
>    https://developer.arm.com/support/security-update
>
> For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
> be attacked using SP3 on any ARM processors, even those that are
> listed as affected by SP3.)
>
> Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
> HVM, and 32-bit PV guests cannot exploit SP3.
>
> MITIGATION
> ==========
>
> There is no mitigation for SP1 and SP2.
>
> SP3 can be mitigated by running guests in HVM or PVH mode.
> (Within-guest attacks are still possible unless the guest OS has also
> been updated with an SP3 mitigation series such as KPTI/Kaiser.)
>
> For guests with legacy PV kernels which cannot be run in HVM or PVH
> mode directly, we have developed two "shim" hypervisors that allow PV
> guests to run in HVM mode or PVH mode.  This prevents attacks on the
> host, but it leaves the guest vulnerable to Meltdown attacks by its
> own unprivileged processes, even if the guest OS has KPTI or similar
> Meltdown mitigation.
>
> The HVM shim (codenamed "Vixen") is available now, as is the PVH shim
> (codenamed "Comet") for Xen 4.10.  We expect to have Comet for 4.8 and
> 4.9 within a few days.  Please read README.which-shim to determine
> which shim is suitable for you.
>
> $ sha256sum xsa254*/*
> f81c4624f8b188a2c33efa8687d3442bbd17c476e1a10761ef70c0aa99f6c659
> xsa254/README.comet
> 1c594822dbd95998951203f6094bc77586d5720788de15897784d20bacb2ef08
> xsa254/README.vixen
> 7e816160c1c1d1cd93ec3c3dd9753c8f3957fefe86b7aa967e9e77833828f849
> xsa254/README.which-shim
> 1d2098ad3890a5be49444560406f8f271c716e9f80e7dfe11ff5c818277f33f8  xsa254/
> pvshim-converter.pl
> $
>
> RESOLUTION
> ==========
>
> There is no available resolution for SP1.  A solution may be available
> in the future.
>
> We are working on patches which mitigate SP2 but these are not
> currently available.  Given that the vulnerabilities are now public,
> these will be developed and published in public, initially via
> xen-devel.
>
>
> NOTE ON LACK OF EMBARGO
> =======================
>
> The timetable and process were set by the discloser.
>
> After the intensive initial response period for these vulnerabilities
> is over, we will prepare and publish a full timeline, as we have done
> in a handful of other cases of significant public interest where we
> saw opportunities for process improvement.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iQEcBAEBCAAGBQJaWPIbAAoJEIP+FMlX6CvZQuoH/0A21scnQhrQPmFjtBO0b0Ai
> /xQ7VCf2t3iKeZYJJGzj2atE1Hj91H6sZe6t6tLFbfPeYv2Gbfpl/09EE8ONSpSj
> ae69fgwQN/EvpkCVec+QWQ0pWj7tLYgkT4IwQJSW+6VrTWjEV8PzQgkfjgclJEOk
> J7EhaauI0qZVPEC2QZoMGJlgwfoS4xJalpCUGflrvgtmPhYbGGYDP8bP7WbVtqYS
> I9nIoqndBdeWeyyu1O+cnMquV5BX2Nq7BDOTB3SMwNBHsnKudRQQRc3yNdmvQa2C
> jvUMs/U7rqfK5pgOfimvLSDLR0TSnzNC8ahuI9Tv6TSwIl+AVt4xg0DZzhMjiqQ=
> =aOVG
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users
>

--089e0832e138650c47056297d3c6
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">unsuscribe<br><div class=3D"gmail_extra"><br><div class=3D=
"gmail_quote">On Fri, Jan 12, 2018 at 2:36 PM, Xen.org security team <span =
dir=3D"ltr">&lt;<a href=3D"mailto:security@xen.org" target=3D"_blank">secur=
ity@xen.org</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span c=
lass=3D"">-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA256<br>
<br>
=C2=A0Xen Security Advisory CVE-2017-5753,CVE-2017-5715,<wbr>CVE-2017-5754 =
/ XSA-254<br>
</span>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0version 6<br>
<span class=3D""><br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Information leak via side effects of speculativ=
e execution<br>
<br>
</span>UPDATES IN VERSION 6<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
PVH shim (&quot;Comet&quot;) for 4.10 is available.<br>
<br>
Mention within-guest attack in README.vixen as well as<br>
README.which-shim.<br>
<br>
Vixen shim converter script &quot;exec&quot;s qemu, avoiding stale qemu<br>
processes (and, therefore, avoiding stale domains).<br>
<div><div class=3D"h5"><br>
ISSUE DESCRIPTION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
Processors give the illusion of a sequence of instructions executed<br>
one-by-one.=C2=A0 However, in order to most efficiently use cpu resources,<=
br>
modern superscalar processors actually begin executing many<br>
instructions in parallel.=C2=A0 In cases where instructions depend on the<b=
r>
result of previous instructions or checks which have not yet<br>
completed, execution happens based on guesses about what the outcome<br>
will be.=C2=A0 If the guess is correct, execution has been sped up.=C2=A0 I=
f the<br>
guess is incorrect, partially-executed instructions are cancelled and<br>
architectural state changes (to registers, memory, and so on)<br>
reverted; but the whole process is no slower than if no guess had been<br>
made at all.=C2=A0 This is sometimes called &quot;speculative execution&quo=
t;.<br>
<br>
Unfortunately, although architectural state is rolled back, there are<br>
other side effects, such as changes to TLB or cache state, which are<br>
not rolled back.=C2=A0 These side effects can subsequently be detected by<b=
r>
an attacker to determine information about what happened during the<br>
speculative execution phase.=C2=A0 If an attacker can cause speculative<br>
execution to access sensitive memory areas, they may be able to infer<br>
what that sensitive memory contained.<br>
<br>
Furthermore, these guesses can often be &#39;poisoned&#39;, such that attac=
ker<br>
can cause logic to reliably &#39;guess&#39; the way the attacker chooses.<b=
r>
This advisory discusses three ways to cause speculative execution to<br>
access sensitive memory areas (named here according to the<br>
discoverer&#39;s naming scheme):<br>
<br>
&quot;Bounds-check bypass&quot; (aka SP1, &quot;Variant 1&quot;, Spectre CV=
E-2017-5753):<br>
Poison the branch predictor, such that victim code is speculatively<br>
executed past boundary and security checks.=C2=A0 This would allow an<br>
attacker to, for instance, cause speculative code in the normal<br>
hypercall / emulation path to execute with wild array indexes.<br>
<br>
&quot;Branch Target Injection&quot; (aka SP2, &quot;Variant 2&quot;, Spectr=
e CVE-2017-5715):<br>
Poison the branch predictor.=C2=A0 Well-abstracted code often involves<br>
calling function pointers via indirect branches; reading these<br>
function pointers may involve a (slow) memory access, so the CPU<br>
attempts to guess where indirect branches will lead.=C2=A0 Poisoning this<b=
r>
enables an attacker to speculatively branch to any code that is<br>
executable by the victim (eg, anywhere in the hypervisor).<br>
<br>
&quot;Rogue Data Load&quot; (aka SP3, &quot;Variant 3&quot;, Meltdown, CVE-=
2017-5754):<br>
On some processors, certain pagetable permission checks only happen<br>
when the instruction is retired; effectively meaning that speculative<br>
execution is not subject to pagetable permission checks.=C2=A0 On such<br>
processors, an attacker can speculatively execute arbitrary code in<br>
userspace with, effectively, the highest privilege level.<br>
<br>
More information is available here:<br>
=C2=A0 <a href=3D"https://meltdownattack.com/" rel=3D"noreferrer" target=3D=
"_blank">https://meltdownattack.com/</a><br>
=C2=A0 <a href=3D"https://spectreattack.com/" rel=3D"noreferrer" target=3D"=
_blank">https://spectreattack.com/</a><br>
=C2=A0 <a href=3D"https://googleprojectzero.blogspot.co.uk/2018/01/reading-=
privileged-memory-with-side.html" rel=3D"noreferrer" target=3D"_blank">http=
s://googleprojectzero.<wbr>blogspot.co.uk/2018/01/<wbr>reading-privileged-m=
emory-<wbr>with-side.html</a><br>
<br>
Additional Xen-specific background:<br>
<br>
Xen hypervisors on most systems map all of physical RAM, so code<br>
speculatively executed in a hypervisor context can read all of system<br>
RAM.<br>
<br>
When running PV guests, the guest and the hypervisor share the address<br>
space; guest kernels run in a lower privilege level, and Xen runs in<br>
the highest privilege level.=C2=A0 (x86 HVM and PVH guests, and ARM guests,=
<br>
run in a separate address space to the hypervisor.)=C2=A0 However, only<br>
64-bit PV guests can generate addresses large enough to point to<br>
hypervisor memory.<br>
<br>
IMPACT<br>
=3D=3D=3D=3D=3D=3D<br>
<br>
Xen guests may be able to infer the contents of arbitrary host memory,<br>
including memory assigned to other guests.<br>
<br>
An attacker&#39;s choice of code to speculatively execute (and thus the<br>
ease of extracting useful information) goes up with the numbers.=C2=A0 For<=
br>
SP1, an attacker is limited to windows of code after bound checks of<br>
user-supplied indexes.=C2=A0 For SP2, the attacker will in many cases will<=
br>
be limited to executing arbitrary pre-existing code inside of Xen.<br>
For SP3 (and other cases for SP2), an attacker can write arbitrary<br>
code to speculatively execute.<br>
<br>
Additionally, in general, attacks within a guest (from guest user to<br>
guest kernel) will be the same as on real hardware.=C2=A0 Consult your<br>
operating system provider for more information.<br>
<br>
NOTE ON TIMING<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
This vulnerability was originally scheduled to be made public on 9<br>
January.=C2=A0 It was accelerated at the request of the discloser due to<br=
>
one of the issues being made public.<br>
<br>
VULNERABLE SYSTEMS<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
Systems running all versions of Xen are affected.<br>
<br>
For SP1 and SP2, both Intel and AMD are vulnerable.=C2=A0 Vulnerability of<=
br>
ARM processors to SP1 and SP2 varies by model and manufacturer.=C2=A0 ARM<b=
r>
has information on affected models on the following website:<br>
=C2=A0 =C2=A0<a href=3D"https://developer.arm.com/support/security-update" =
rel=3D"noreferrer" target=3D"_blank">https://developer.arm.com/<wbr>support=
/security-update</a><br>
<br>
For SP3, only Intel processors are vulnerable.=C2=A0 (The hypervisor cannot=
<br>
be attacked using SP3 on any ARM processors, even those that are<br>
listed as affected by SP3.)<br>
<br>
Furthermore, only 64-bit PV guests can exploit SP3 against Xen.=C2=A0 PVH,<=
br>
HVM, and 32-bit PV guests cannot exploit SP3.<br>
<br>
MITIGATION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
There is no mitigation for SP1 and SP2.<br>
<br>
SP3 can be mitigated by running guests in HVM or PVH mode.<br>
(Within-guest attacks are still possible unless the guest OS has also<br>
been updated with an SP3 mitigation series such as KPTI/Kaiser.)<br>
<br>
For guests with legacy PV kernels which cannot be run in HVM or PVH<br>
mode directly, we have developed two &quot;shim&quot; hypervisors that allo=
w PV<br>
guests to run in HVM mode or PVH mode.=C2=A0 This prevents attacks on the<b=
r>
host, but it leaves the guest vulnerable to Meltdown attacks by its<br>
own unprivileged processes, even if the guest OS has KPTI or similar<br>
Meltdown mitigation.<br>
<br>
</div></div>The HVM shim (codenamed &quot;Vixen&quot;) is available now, as=
 is the PVH shim<br>
(codenamed &quot;Comet&quot;) for Xen 4.10.=C2=A0 We expect to have Comet f=
or 4.8 and<br>
4.9 within a few days.=C2=A0 Please read README.which-shim to determine<br>
<span class=3D"">which shim is suitable for you.<br>
<br>
$ sha256sum xsa254*/*<br>
</span>f81c4624f8b188a2c33efa8687d344<wbr>2bbd17c476e1a10761ef70c0aa99f6<wb=
r>c659=C2=A0 xsa254/README.comet<br>
1c594822dbd95998951203f6094bc7<wbr>7586d5720788de15897784d20bacb2<wbr>ef08=
=C2=A0 xsa254/README.vixen<br>
7e816160c1c1d1cd93ec3c3dd9753c<wbr>8f3957fefe86b7aa967e9e77833828<wbr>f849=
=C2=A0 xsa254/README.which-shim<br>
1d2098ad3890a5be49444560406f8f<wbr>271c716e9f80e7dfe11ff5c818277f<wbr>33f8=
=C2=A0 xsa254/<a href=3D"http://pvshim-converter.pl" rel=3D"noreferrer" tar=
get=3D"_blank">pvshim-converter.pl</a><br>
<span class=3D"">$<br>
<br>
RESOLUTION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
There is no available resolution for SP1.=C2=A0 A solution may be available=
<br>
in the future.<br>
<br>
We are working on patches which mitigate SP2 but these are not<br>
currently available.=C2=A0 Given that the vulnerabilities are now public,<b=
r>
these will be developed and published in public, initially via<br>
xen-devel.<br>
<br>
<br>
NOTE ON LACK OF EMBARGO<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
The timetable and process were set by the discloser.<br>
<br>
After the intensive initial response period for these vulnerabilities<br>
is over, we will prepare and publish a full timeline, as we have done<br>
in a handful of other cases of significant public interest where we<br>
saw opportunities for process improvement.<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v1<br>
<br>
</span>iQEcBAEBCAAGBQJaWPIbAAoJEIP+<wbr>FMlX6CvZQuoH/<wbr>0A21scnQhrQPmFjtB=
O0b0Ai<br>
/<wbr>xQ7VCf2t3iKeZYJJGzj2atE1Hj91H6<wbr>sZe6t6tLFbfPeYv2Gbfpl/<wbr>09EE8ON=
SpSj<br>
ae69fgwQN/EvpkCVec+<wbr>QWQ0pWj7tLYgkT4IwQJSW+<wbr>6VrTWjEV8PzQgkfjgclJEOk<=
br>
J7EhaauI0qZVPEC2QZoMGJlgwfoS4x<wbr>JalpCUGflrvgtmPhYbGGYDP8bP7WbV<wbr>tqYS<=
br>
I9nIoqndBdeWeyyu1O+<wbr>cnMquV5BX2Nq7BDOTB3SMwNBHsnKud<wbr>RQQRc3yNdmvQa2C<=
br>
jvUMs/<wbr>U7rqfK5pgOfimvLSDLR0TSnzNC8ahu<wbr>I9Tv6TSwIl+AVt4xg0DZzhMjiqQ=
=3D<br>
=3DaOVG<br>
-----END PGP SIGNATURE-----<br>
<br>______________________________<wbr>_________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xenproject.org">Xen-users@lists.xenprojec=
t.org</a><br>
<a href=3D"https://lists.xenproject.org/mailman/listinfo/xen-users" rel=3D"=
noreferrer" target=3D"_blank">https://lists.xenproject.org/<wbr>mailman/lis=
tinfo/xen-users</a><br></blockquote></div><br></div></div>

--089e0832e138650c47056297d3c6--


--===============3418418885724403021==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============3418418885724403021==--


From xen-users-bounces@lists.xenproject.org Fri Jan 12 17:47:14 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 17:47:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ea3Q6-0002Fe-TS; Fri, 12 Jan 2018 17:47:10 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=dgpl=eh=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1ea3Q5-0002F2-3d
 for xen-users@lists.xen.org; Fri, 12 Jan 2018 17:47:09 +0000
X-Inumbo-ID: e98cf734-f7c0-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id e98cf734-f7c0-11e7-b0d7-9f685aff125f;
 Fri, 12 Jan 2018 17:49:18 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1ea3Pq-00052n-To; Fri, 12 Jan 2018 17:46:54 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1ea3Pq-0002Nf-RK; Fri, 12 Jan 2018 17:46:54 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1ea3Pq-0002Nf-RK@xenbits.xenproject.org>
Date: Fri, 12 Jan 2018 17:46:54 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 7

        Information leak via side effects of speculative execution

UPDATES IN VERSION 7
====================

PVH shim ("Comet") for 4.10 tag correction: please use tag
4.10.0-shim-comet-1.1.

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by running guests in HVM or PVH mode.
(Within-guest attacks are still possible unless the guest OS has also
been updated with an SP3 mitigation series such as KPTI/Kaiser.)

For guests with legacy PV kernels which cannot be run in HVM or PVH
mode directly, we have developed two "shim" hypervisors that allow PV
guests to run in HVM mode or PVH mode.  This prevents attacks on the
host, but it leaves the guest vulnerable to Meltdown attacks by its
own unprivileged processes, even if the guest OS has KPTI or similar
Meltdown mitigation.

The HVM shim (codenamed "Vixen") is available now, as is the PVH shim
(codenamed "Comet") for Xen 4.10.  We expect to have Comet for 4.8 and
4.9 within a few days.  Please read README.which-shim to determine
which shim is suitable for you.

$ sha256sum xsa254*/*
34749c1169c5c8a1c0f7457184998e17ae54d5b262984150286db74ac1a82d22  xsa254/README.comet
1c594822dbd95998951203f6094bc77586d5720788de15897784d20bacb2ef08  xsa254/README.vixen
7e816160c1c1d1cd93ec3c3dd9753c8f3957fefe86b7aa967e9e77833828f849  xsa254/README.which-shim
1d2098ad3890a5be49444560406f8f271c716e9f80e7dfe11ff5c818277f33f8  xsa254/pvshim-converter.pl
$

RESOLUTION
==========

There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.


NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaWPSKAAoJEIP+FMlX6CvZkicH/2H/Nn8eN90XeK6cXXTnz4Nx
OhDM1Rr9K0Sdnw84T5azKbtpEjPhiM762oRMRgO6uAYHs4cbCHemDLvruqS65Se5
0+Gs6V0b7nqXPremlulqe81A2rTBlmqtFTCQf2VWg2uLLHXwMVtbqCtCCdzmMA+w
XyiVQUO/MfgEOjbgM2XJSfmA0TcZfTClDW3FCvb9LhYLgdOGioxpGQ+SGsSNiZOL
0acn2eocI+Lihr0o/bX6tkhePTzThVOniah/AfIOcKD6WqEeN0NXdHZQUOOXCMMq
Js8tlwCu1ixrg8IFngUxFAKrD3Ge0pEmtCw90yWdhY/vsS6eE80Ixj+ZqaKUATE=
=FHIM
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa254/README.comet"
Content-Disposition: attachment; filename="xsa254/README.comet"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.vixen"
Content-Disposition: attachment; filename="xsa254/README.vixen"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.which-shim"
Content-Disposition: attachment; filename="xsa254/README.which-shim"
Content-Transfer-Encoding: base64

CQkgICBIb3cgdG8gZGVjaWRlIHdoaWNoIHNoaW0gdG8gdXNlCgkJICAgPT09
PT09PT09PT09PT09PT09PT09PT09PT09PT09PQoKQSB3b3JrLWFyb3VuZCB0
byBNZWx0ZG93biAoYWthICJTUDMiIG9yICJWYXJpYW50IDMiKSBvbiBJbnRl
bApwcm9jZXNzb3JzIGlzIHRvIHJ1biBndWVzdHMgaW4gSFZNIG9yIFBWSCBt
b2RlLgoKTm90ZSB0aGlzIHNoaW0tYmFzZWQgYXBwcm9hY2ggcHJldmVudHMg
YXR0YWNrcyBvbiB0aGUgaG9zdCwgYnV0IGxlYXZlcwp0aGUgZ3Vlc3QgdnVs
bmVyYWJsZSB0byBNZWx0ZG93biBhdHRhY2tzIGJ5IGl0cyBvd24gdW5wcml2
aWxlZ2VkCnByb2Nlc3NlczsgdGhpcyBpcyB0cnVlIGV2ZW4gaWYgdGhlIGd1
ZXN0IE9TIGhhcyBLUFRJIG9yIHNpbWlsYXIKTWVsdGRvd24gbWl0aWdhdGlv
bi4KClNvbWUgZ3Vlc3RzIGFyZSBkaWZmaWN1bHQgdG8gY29udmVydCB0byBy
dW5uaW5nIGluIEhWTSBvciBQVkggbW9kZSwKZWl0aGVyIGR1ZSB0byBsYWNr
IG9mIHBhcnRpdGlvbmluZyAvIE1CUiwgb3IgZHVlIHRvIGtlcm5lbApjb21w
YXRpYmlsaXRpZXMuICBBcyBhbiBlbWVyZ2VuY3kgYmFja3N0b3AsIHRoZXJl
IGFyZSB0d28gYXBwcm9hY2hlcywKd2hpY2ggd2UndmUgY29kZW5hbWVkICJW
aXhlbiIgYW5kICJDb21ldCIuICBCb3RoIGludm9sdmUgcnVubmluZyBhbgpl
bWJlZGRlZCBjb3B5IG9mIFhlbiAoY2FsbGVkIGEgInNoaW0iKSB3aXRoaW4g
dGhlIEhWTSBvciBQVkggZ3Vlc3QgdG8KcHJvdmlkZSB0aGUgbmF0aXZlIFBW
IGludGVyZmFjZS4KCkJlbG93IGRlc2NyaWJlcyB0aGUgcHJvcGVydGllcywg
YW5kIHdobyBtaWdodCB3YW50IHRvIHVzZSBlYWNoIG9uZS4KCk5PVEU6IEJv
dGggc2hpbXMgcmVxdWlyZSBob3N0IHBhdGNoZXMgdG8gYm9vdCBvbiBBTUQg
aG9zdHMuICBUaGlzCnNob3VsZG4ndCBiZSBhbiBpc3N1ZSwgYXMgU1AzIGRv
ZXMgbm90IGFmZmVjdCBzeXN0ZW1zIHJ1bm5pbmcgb24gQU1ELgoKVml4ZW4K
LS0tLS0KClZpeGVuIGhhcyB0aGUgZm9sbG93aW5nIHByb3BlcnRpZXM6CiAq
IFJ1bnMgdGhlIHNoaW0gaW4gYW4gSFZNIGd1ZXN0LgogKiBJdCByZXF1aXJl
cyBubyBoeXBlcnZpc29yIG9yIHRvb2xzdGFjayBjaGFuZ2VzLCBub3IgZG9l
cyBpdCByZXF1aXJlCiAgIGEgaG9zdCByZWJvb3QuCiAqIEl0IGhhcyBiZWVu
IGV4dGVuc2l2ZWx5IHRlc3RlZCBpbiBBbWF6b24ncyBkZXBsb3ltZW50IGZv
ciB2ZXJzaW9ucwogICBvZiBYZW4gZ29pbmcgYmFjayB0byAzLjQKICogR3Vl
c3QgcmVib290cyBhcmUgcmVxdWlyZWQKICogR3Vlc3QgY29uZmlncyBtdXN0
IGJlIGZlZCB0aHJvdWdoIGEgY29udmVydGVyIHByb2dyYW0KICogVGhlIGNv
bnZlcnRlciBwcm9ncmFtIHNwaXRzIG91dCBhIHNtYWxsIGd1ZXN0LXNwZWNp
ZmljIC5pc28KICAgaW1hZ2UgKHdlIGNhbGwgdGhpcyBhICJzaWRlY2FyIikg
dXNlZCBmb3IgYm9vdGluZwogKiBCZWNhdXNlIHRoZSByZXN1bHQgaXMgYW4g
SFZNIGd1ZXN0LCB0aGlzIGFwcHJvYWNoIGludm9sdmVzCiAgIHJ1bm5pbmcg
cWVtdSBhcyBhIFBDIGVtdWxhdG9yICh0aGlzIGlzIGRvbmUgYXV0b21hdGlj
YWxseSkKICogU29tZSBjb21tb24gZmVhdHVyZXMgYXJlIG5vdCBzdXBwb3J0
ZWQ6CiAgLSBCYWxsb29uaW5nCiAgLSBNaWdyYXRpb24KICAtIHZjcHUgaG90
cGx1ZwogIC0gYmlkaXJlY3Rpb25hbCBjb25zb2xlIHN1cHBvcnQgKGNvbnNv
bGUgaXMgd3JpdGUtb25seSkKICogRGlyZWN0LWJvb3Qga2VybmVscyBhbmQg
cHZncnViIChib3RoIHB2Z3J1YjEgYW5kIHB2Z3J1YjIpIGFyZQogICBzdXBw
b3J0ZWQgYnkgdGhlIGNvbnZlcnNpb24gcHJvZ3JhbS4gICdweWdydWInIGlz
IG5vdCBzdXBwb3J0ZWQuCiAqIHhsIGFuZCB4bSBkb21haW4gY29uZmlncyBj
YW4gYmUgY29udmVydGVkOyBsaWJ2aXJ0IGRvbWFpbgogICBjb25maWd1cmF0
aW9uIGFycmFuZ2VtZW50cyBhcmUgbm90IHN1cHBvcnRlZC4KICogR3Vlc3Qg
dXNlcnNwYWNlIGNhbiByZWFkIGFsbCBvZiBndWVzdCBtZW1vcnksIHdpdGhp
biBlYWNoIGd1ZXN0LAogICBhbmQgYSBndWVzdCBtaWdpdGF0aW9uIGZvciB0
aGlzIGlzIG5vdCBwb3NzaWJsZS4KCllvdSBtaWdodCBjb25zaWRlciB0aGlz
IGFwcHJvYWNoIGlmOgotIFlvdSB3YW50IHRvIGRlcGxveSBhIGZpeCBpbW1l
ZGlhdGVseQotIFlvdSBjYW4gdG9sZXJhdGUgdGhlIGxvc3Mgb2Ygd2l0aGlu
LWd1ZXN0IHNlY3VyaXR5Ci0gWW91IGNhbid0LCBvciB3b3VsZCBsaWtlIHRv
IGF2b2lkLCB1cGRhdGluZyB0byBYZW4gNC44IG9yIG5ld2VyCi0gWW91J2Qg
bGlrZSB0byBhdm9pZCBwYXRjaGluZyBhbmQgcmVib290aW5nIHlvdXIgaG9z
dAotIFlvdSBhcmUgYWJsZSB0bzoKIC0gUnVuIGEgc2NyaXB0IHRvIG1vZGlm
eSBlYWNoIGRvbWFpbiBjb25maWcKIC0gQWZmb3JkIGFuIGV4dHJhIDgwTWlC
IHBlciBndWVzdAogLSBUb2xlcmF0ZSBoYXZpbmcgYW4gZXh0cmEgUUVNVSBh
cm91bmQKLSBZb3UgZG9uJ3QgbmVlZCBtaWdyYXRpb24sIG1lbW9yeSBiYWxs
b29uaW5nLCB2Y3B1IGhvdHBsdWcsCiAgb3IgYSBiaS1kaXJlY3Rpb25hbCBj
b25zb2xlCgpUbyB1c2UgdGhpcyBzb2x1dGlvbiwgc2VlIFJFQURNRS52aXhl
bi4KCkJpLWRpcmVjdGlvbmFsIGNvbnNvbGUgaXMgYXZhaWxhYmxlIGFzIGFu
IGV4dHJhIHBhdGNoLCBidXQgaGFzbid0IGJlZW4Kd2lkZWx5IHRlc3RlZDoK
Cm1hcmMuaW5mby8/aT08MTUxNTYwNDU1Mi05MjA1LTEtZ2l0LXNlbmQtZW1h
aWwtc3JuQHByZ21yLmNvbT4KCkNvbWV0Ci0tLS0tCgpDb21ldCBoYXMgdGhl
IGZvbGxvd2luZyBwcm9wZXJ0aWVzOgogKiBSdW5zIHRoZSBzaGltIGluIGEg
UFZIIGd1ZXN0LgogKiBQVkggbW9kZSBpcyBhdmFpbGFibGUgaW4gWGVuIDQu
MTAsIGFuZCB3aWxsIGJlIGJhY2twb3J0ZWQgdG8gWGVuCiAgIDQuOSBhbmQg
NC44IGJ1dCBubyBmYXJ0aGVyCiAqIFJlcXVpcmVzIGhvc3QgaHlwZXJ2aXNv
ciBhbmQgdG9vbHN0YWNrIHBhdGNoZXMgKGFuZCBob3N0IHJlYm9vdCksCiAg
IGV2ZW4gZm9yIFhlbiA0LjEwCiAqIFJlcXVpcmVzIG1pbmltYWwgZ3Vlc3Qg
Y29uZmlnIGNoYW5nZXMsIGFuZCBubyAic2lkZWNhciIKICogQm9vdGxvYWRp
bmcgaXMgaWRlbnRpY2FsIHRvIG5hdGl2ZSBQViBndWVzdHM7IGRpcmVjdC1i
b290LCBwdmdydWIsCiAgIGFuZCBweWdydWIgYWxsIHdvcmsgZXF1YWxseSB3
ZWxsCiAqIEJlY2F1c2UgdGhlIHJlc3VsdCBpcyBhIFBWSCBndWVzdCwgdGhp
cyBhcHByb2FjaCBpbnZvbHZlcyBubyBQQyBlbXVsYXRvci4KICogVGhlIGZv
bGxvd2luZyBmZWF0dXJlcyBub3QgYXZhaWxhYmxlIGluIFZpeGVuIGFyZSBz
dXBwb3J0ZWQ6CiAgLSBNZW1vcnkgYmFsbG9vbmluZwogIC0gR3Vlc3QgbWln
cmF0aW9uCiAgLSB2Y3B1IGhvdHBsdWcKICAtIGJpZGlyZWN0aW9uYWwgY29u
c29sZSBzdXBwb3J0CiAqIEd1ZXN0IHVzZXJzcGFjZSBjYW4gcmVhZCBhbGwg
b2YgZ3Vlc3QgbWVtb3J5LCB3aXRoaW4gZWFjaCBndWVzdCwKICAgYW5kIGEg
Z3Vlc3QgbWlnaXRhdGlvbiBmb3IgdGhpcyBpcyBub3QgcG9zc2libGUuCgpZ
b3UgbWlnaHQgY29uc2lkZXIgdGhpcyBhcHByb2FjaCBpZjoKLSBZb3UncmUg
b24gNC44IG9yIGxhdGVyIGFscmVhZHkKLSBZb3UgY2FuIHRvbGVyYXRlIHRo
ZSBsb3NzIG9mIHdpdGhpbi1ndWVzdCBzZWN1cml0eQotIFlvdSBjYW4gcGF0
Y2ggYW5kIHJlYm9vdCB5b3VyIGhvc3QKLSBZb3UgZG9uJ3Qgd2FudCBhbiBl
eHRyYSBRRU1VIGFyb3VuZAotIFlvdSBuZWVkIG1pZ3JhdGlvbiwgbWVtb3J5
IGJhbGxvb25pbmcsIG9yIHZjcHUgaG90cGx1Zywgb3IgYQogIGJpZGlyZWN0
aW9uYWwgY29uc29sZQotIFlvdSBuZWVkIHB5Z3J1YgotIFlvdSBuZWVkIHRv
IHVzZSBsaWJ2aXJ0CgpBdCB0aGUgbW9tZW50LCBDb21ldCBpcyBhdmFpbGFi
bGUgZm9yIDQuMTAuICAgV2UgZXhwZWN0IHRvIGhhdmUKYmFja3BvcnRzIHRv
IDQuOCBhbmQgNC44IGF2YWlsYWJsZSB3aXRoaW4gYSBmZXcgd29ya2luZyBk
YXlzLgo=

--=separator
Content-Type: application/octet-stream; name="xsa254/pvshim-converter.pl"
Content-Disposition: attachment; filename="xsa254/pvshim-converter.pl"
Content-Transfer-Encoding: base64

IyEvdXNyL2Jpbi9wZXJsIC13CiMKIyB1c2FnZToKIyAgIHB2c2hpbS1jb252
ZXJ0ZXIgW09QVElPTlNdIE9MRC1DT05GSUcgTkVXLUNPTkZJRwojCiMgb3B0
aW9uczoKIyAgIC0tcWVtdSBQQVRILVRPLVFFTVUgICAgICAgIGZpbGVuYW1l
IG9mIHFlbXUtc3lzdGVtLWkzODYKIyAgIC0tc2lkZWNhcnMtZGlyZWN0b3J5
IERJUiAgIGRlZmF1bHQgaXMgL3Zhci9saWIveGVuL3B2c2hpbS1zaWRlY2Fy
cwojICAgLS1zaGltIFNISU0gICAgICAgICAgICAgICAgb3ZlcnJpZGVzIGRv
bWFpbiBjb25maWcgZmlsZQojICAgLS1kZWJ1ZyAgICAgICAgICAgICAgICAg
ICAgdmVyYm9zZSwgYW5kIGxlYXZlcyBzaWRlY2FyIHByZXAgZGlyIGFyb3Vu
ZAojCiMgV2hhdCB3ZSBkbwojCiMgIHJlYWQgZXhpc3RpbmcgY29uZmlnIGZp
bGUgdXNpbmcgcHl0aG9uCiMgIGRldGVybWluZSBrZXJuZWwsIHJhbWRpc2sg
YW5kIGNtZGxpbmUKIyAgdXNlIHRoZW0gdG8gcHJvZHVjZSBzaWRlY2FyIGFu
ZCBzYXZlIGl0IHVuZGVyIGRvbWFpbiBuYW1lCiMgIG1lc3Mgd2l0aCB0aGUg
dGhpbmdzIHRoYXQgbmVlZCB0byBiZSBtZXNzZWQgd2l0aAojICBzcGl0IG91
dCBuZXcgY29uZmlnIGZpbGUKCnVzZSBzdHJpY3Q7Cgp1c2UgR2V0b3B0OjpM
b25nOwp1c2UgSlNPTjsKdXNlIElPOjpIYW5kbGU7CnVzZSBQT1NJWDsKdXNl
IEZjbnRsIHF3KDpmbG9jayk7CgpvdXIgJGRlYnVnOwoKc3ViIHJ1bmNtZCB7
CiAgICBwcmludCBTVERFUlIgIisgQF9cbiIgaWYgJGRlYnVnOwogICAgJCE9
MDsgJD89MDsgc3lzdGVtIEBfIGFuZCBkaWUgIiRfWzBdOiAkISAkPyI7Cn0K
Cm91ciAkcWVtdTsKb3VyICRzaGltOwpvdXIgJHNpZGVjYXJzX2RpciA9ICcv
dmFyL2xpYi94ZW4vcHZzaGltLXNpZGVjYXJzJzsKCkdldE9wdGlvbnMoJ3Fl
bXU9cycgPT4gXCRxZW11LAogICAgICAgICAgICdzaWRlY2Fycy1kaXJlY3Rv
cnk9cycgPT4gXCRzaWRlY2Fyc19kaXIsCiAgICAgICAgICAgJ3NoaW09cycg
PT4gXCRzaGltLAogICAgICAgICAgICdkZWJ1ZycgPT4gXCRkZWJ1ZykKICAg
IG9yIGRpZSAicHZzaGltLWNvbnZlcnRlcjogYmFkIG9wdGlvbnNcbiI7CgpA
QVJHVj09MiBvciBkaWUgInB2c2hpbS1jb252ZXJ0ZXI6IG5lZWQgb2xkIGFu
ZCBuZXcgY29uZmlnIGZpbGVuYW1lcyI7CgpvdXIgKCRpbiwkb3V0KSA9IEBB
UkdWOwoKb3VyICRpbmRhdGE7CgppZiAoJGluIG5lICctJykgewogICAgb3Bl
biBJLCAnPCcsICIkaW4iIG9yIGRpZSAib3BlbiBpbnB1dCBjb25maWcgZmls
ZTogJCFcbiI7Cn0gZWxzZSB7CiAgICBvcGVuIEksICc8JlNURElOJyBvciBk
aWUgJCE7Cn0KewogICAgbG9jYWwgJC87CiAgICAkaW5kYXRhID0gPEk+Owp9
CkktPmVycm9yIGFuZCBkaWUgJCE7CmNsb3NlIEk7CgpvcGVuIFAsICItfCIs
IHF3KHB5dGhvbjIgLWMpLCA8PEVORCwgJGluZGF0YSBvciBkaWUgJCE7Cmlt
cG9ydCBzeXMKaW1wb3J0IGpzb24KbCA9IHt9CmV4ZWMgc3lzLmFyZ3ZbMV0g
aW4gbApmb3IgayBpbiBsLmtleXMoKToKCWlmIGsuc3RhcnRzd2l0aCgiXyIp
OgoJCWRlbCBsW2tdCnByaW50IGpzb24uZHVtcHMobCkKRU5ECgpvdXIgJGM7
Cgp7CiAgICBsb2NhbCAkLzsKICAgICRfID0gPFA+OwogICAgJCE9MDsgJD89
MDsgY2xvc2UgUCBvciBkaWUgIiQhICQ/IjsKICAgICRjID0gZGVjb2RlX2pz
b24gJF87Cn0KCmRpZSAibm8gZG9tYWluIG5hbWUgPyIgdW5sZXNzIGV4aXN0
cyAkYy0+e25hbWV9OwpkaWUgImJvb3Rsb2FkZXIgbm90IHlldCBzdXBwb3J0
ZWQiIGlmICRjLT57Ym9vdGxvYWRlcn07CmRpZSAibm8ga2VybmVsIiB1bmxl
c3MgJGMtPntrZXJuZWx9OwoKb3VyICRzaWRlY2FyID0gJGMtPntwdnNoaW1f
c2lkZWNhcl9wYXRofSB8fCAiJHNpZGVjYXJzX2Rpci8kYy0+e25hbWV9Lmlz
byI7Cm91ciAkZG13cmFwID0gJGMtPntwdnNoaW1fc2lkZWNhcl9wYXRofSB8
fCAiJHNpZGVjYXJzX2Rpci8kYy0+e25hbWV9LmRtIjsKCiRzaGltIHx8PSAk
Yy0+e3B2c2hpbV9wYXRofTsKJHNoaW0gfHw9ICcvdXNyL2xvY2FsL2xpYi94
ZW4vYm9vdC94ZW4tc2hpbSc7CgpvdXIgJHNoaW1fY21kbGluZSA9ICRjLT57
cHZzaGltX2NtZGxpbmV9IHx8ICdjb25zb2xlPWNvbTEgY29tMT0xMTUyMDBu
MSc7CiRzaGltX2NtZGxpbmUgLj0gJyAnLiRjLT57cHZzaGltX2V4dHJhfSBp
ZiAkYy0+e3B2c2hpbV9leHRyYX07CgpvdXIgJGtlcm5lbF9jbWRsaW5lID0g
JGMtPntjbWRsaW5lfSB8fCAnJzsKJGtlcm5lbF9jbWRsaW5lIC49ICcgcm9v
dD0nLiRjLT57cm9vdH0gaWYgJGMtPntyb290fTsKJGtlcm5lbF9jbWRsaW5l
IC49ICcgJy4kYy0+e2V4dHJhfSBpZiAkYy0+e2V4dHJhfTsKCnByaW50ICJw
dnNoaW0tY29udmVydGVyOiBjcmVhdGluZyBzaWRlY2FyIGluICRzaWRlY2Fy
XG4iOwoKcnVuY21kIHF3KG1rZGlyIC1tNzAwIC1wIC0tKSwgJHNpZGVjYXJz
X2RpcjsKCm9wZW4gTCwgIj4iLCAiJHNpZGVjYXIubG9jayIgb3IgZGllICIk
c2lkZWNhci5sb2NrOiBvcGVuICQhIjsKZmxvY2sgTCwgTE9DS19FWCBvciBk
aWUgIiRzaWRlY2FyLmxvY2s6IGxvY2s6ICQhIjsKCm15ICRzZCA9ICIkc2lk
ZWNhci5kaXIiOwoKc3lzdGVtIHF3KHJtIC1yZiAtLSksICRzZDsKbWtkaXIg
JHNkLCAwNzAwOwoKcnVuY21kIHF3KGNwIC0tKSwgJHNoaW0sICIkc2Qvc2hp
bSI7CnJ1bmNtZCBxdyhjcCAtLSksICRjLT57a2VybmVsfSwgIiRzZC9rZXJu
ZWwiOwpydW5jbWQgcXcoY3AgLS0pLCAkYy0+e3JhbWRpc2t9LCAiJHNkL3Jh
bWRpc2siIGlmICRjLT57cmFtZGlza307CgpteSAkZ3J1YmNmZyA9IDw8RU5E
OwpzZXJpYWwgLS11bml0PTAgLS1zcGVlZD05NjAwIC0td29yZD04IC0tcGFy
aXR5PW5vIC0tc3RvcD0xCnRlcm1pbmFsX2lucHV0IHNlcmlhbAp0ZXJtaW5h
bF9vdXRwdXQgc2VyaWFsCgpzZXQgdGltZW91dD0wCgptZW51ZW50cnkgJ1hl
biBzaGltJyB7CglpbnNtb2QgZ3ppbwoJaW5zbW9kIHh6aW8KICAgICAgICBt
dWx0aWJvb3QgKGNkKS9zaGltIHBsYWNlaG9sZGVyICRzaGltX2NtZGxpbmUK
ICAgICAgICBtb2R1bGUgKGNkKS9rZXJuZWwgcGxhY2Vob2xkZXIgJGtlcm5l
bF9jbWRsaW5lCiAgICAgICAgbW9kdWxlIChjZCkvcmFtZGlzawp9CkVORAoK
cnVuY21kIHF3KG1rZGlyIC1wIC0tKSwgIiRzZC9ib290L2dydWIiOwpvcGVu
IEcsICI+IiwgIiRzZC9ib290L2dydWIvZ3J1Yi5jZmciIG9yIGRpZSAiJHNk
LCBncnViLmNmZzogJCEiOwpwcmludCBHICRncnViY2ZnIG9yIGRpZSAkITsK
Y2xvc2UgRyBvciBkaWUgJCE7Cgp1bmxpbmsgIiRzaWRlY2FyLm5ldyIgb3Ig
JCE9PUVOT0VOVCBvciBkaWUgIiRzaWRlY2FyLm5ldzogcm06ICQhIjsKcnVu
Y21kIHF3KGdydWItbWtyZXNjdWUgLW8pLCAiJHNpZGVjYXIubmV3IiwgIiRz
aWRlY2FyLmRpciI7CmlmICghc3RhdCAiJHNpZGVjYXIubmV3IikgewogICAg
JCE9PUVOT0VOVCBvciBkaWUgIiRzaWRlY2FyLm5ldzogc3RhdDogJCEiOwoK
ICAgIHByaW50IFNUREVSUiA8PEVORDsKcHZzaGltLWNvbnZlcnRlcjogZ3J1
Yi1ta3Jlc2N1ZSBleGl0ZWQgd2l0aCBzdGF0dXMgemVybyBidXQgZmFpbGVk
IHRvIG1ha2UgaXNvLgpOQiB0aGF0IGdydWItbWtyZXNjdWUgaGFzIGEgdGVu
ZGVuY3kgdG8gbGllIGluIGl0cyBlcnJvciBtZXNzYWdlcy4KRU5ECiAgICBt
eSAkbWlzc2luZzsKICAgIGZvcmVhY2ggbXkgJGNoZWNrIChxdyh4b3JyaXNv
IG1mb3JtYXQpKSB7CiAgICAgICAgJG1pc3NpbmcgfD0gc3lzdGVtIHF3KHNo
IC1jKSwgInR5cGUgJGNoZWNrIjsKICAgIH0KCiAgICBpZiAoJG1pc3Npbmcp
IHsKICAgICAgICBwcmludCBTVERFUlIgPDxFTkQ7CllvdSBzZWVtIHRvIGhh
dmUgc29tZSBwcm9ncmFtKHMpIG1pc3Npbmcgd2hpY2ggZ3J1Yi1ta3Jlc2N1
ZSBkZXBlbmRzIG9uLApzZWUgYWJvdmUuICAoIm1mb3JtYXQiIGlzIG5vcm1h
bGx5IGluIHRoZSBwYWNrYWdlICJtdG9vbHMiLikKSW5zdGFsbGluZyB0aG9z
ZSBwcm9ncmFtcyB3aWxsIHByb2JhYmx5IGhlbHAuCkVORAogICAgfSBlbHNl
IHsKICAgICAgICBwcmludCBTVERFUlIgPDxFTkQ7CkFuZCBvbGRlciBncnVi
LW1rcmVzY3VlIGhhcyBhIHRlbmRlbmN5IG5vdCB0byBub3RpY2UgY2VydGFp
biBwcm9ibGVtcy4KTWF5YmUgc3RyYWNlIHdpbGwgdGVsbCB5b3Ugd2hhdCBp
cyB3cm9uZy4gIDotLwpFTkQKICAgIH0KICAgIGRpZSAicHZzaGltLWNvbnZl
cnRlcjogZ3J1Yi1ta3Jlc2N1ZSBkaWQgbm90IG1ha2UgaXNvXG4iOwp9Cgpy
dW5jbWQgcXcocm0gLXJmIC0tKSwgIiRzaWRlY2FyLmRpciIgdW5sZXNzICRk
ZWJ1ZzsKCm9wZW4gUSwgIj4iLCAiJGRtd3JhcC5uZXciIG9yIGRpZSAiJGRt
d3JhcDogJCEiOwpwcmludCBRIDw8J0VORF9ETVdSQVAnIG9yIGRpZSAkITsK
IyEvYmluL2Jhc2gKCnNldCAteAo6ICIkQCIKc2V0ICt4CgpuZXdhcmdzPSgp
CgpuZXdhcmcgKCkgewogICAgbmV3YXJncys9KCIkMSIpCn0KCndoaWxlIFsg
JCMgLWd0IDEgXTsgZG8KICAgIGNhc2UgIiQxIiBpbgoJLW5vLXNodXRkb3du
fC1ub2RlZmF1bHRzfC1uby11c2VyLWNvbmZpZykKCSAgICBuZXdhcmcgIiQx
Ijsgc2hpZnQKCSAgICA7OwoJLXhlbi1kb21pZHwtY2hhcmRldnwtbW9ufC1k
aXNwbGF5fC1ib290fC1tfC1tYWNoaW5lKQoJICAgIG5ld2FyZyAiJDEiOyBz
aGlmdAoJICAgIG5ld2FyZyAiJDEiOyBzaGlmdAoJICAgIDs7CiAgICAgICAg
LW5hbWUpCiAgICAgICAgICAgIG5ld2FyZyAiJDEiOyBzaGlmdAogICAgICAg
ICAgICBuYW1lPSIkMSI7IHNoaWZ0CiAgICAgICAgICAgIG5ld2FyZyAiJG5h
bWUiCiAgICAgICAgICAgIDs7CgktbmV0ZGV2fC1jZHJvbSkKCSAgICA6IGZp
eG1lCgkgICAgbmV3YXJnICIkMSI7IHNoaWZ0CgkgICAgbmV3YXJnICIkMSI7
IHNoaWZ0CgkgICAgOzsKCS1kcml2ZXwta2VybmVsfC1pbml0cmR8LWFwcGVu
ZHwtdm5jKQoJICAgIHNoaWZ0OyBzaGlmdAoJICAgIDs7CgktZGV2aWNlKQoJ
ICAgIHNoaWZ0CgkgICAgY2FzZSAiJDEiIGluCgkJWFhYcnRsODEzOSopCgkJ
ICAgIG5ld2FyZyAiLWRldmljZSIKCQkgICAgbmV3YXJnICIkMSI7IHNoaWZ0
CgkJICAgIDs7CgkJKikKCQkgICAgc2hpZnQKCQkgICAgOzsKCSAgICBlc2Fj
CgkgICAgOzsKCSopCgkgICAgZWNobyA+JjIgIndhcm5pbmc6IHVuZXhwZWN0
ZWQgYXJndW1lbnQgJDEgYmVpbmcgcGFzc2VkIHRocm91Z2giCgkgICAgbmV3
YXJnICIkMSI7IHNoaWZ0CgkgICAgOzsKICAgIGVzYWMKZG9uZQoKI2lmIFsg
IngkbmFtZSIgIT0geCBdOyB0aGVuCiMgICAgbG9nZGlyPS92YXIvbG9nL3hl
bgojICAgIGxvZ2ZpbGU9IiRsb2dkaXIvc2hpbS0kbmFtZS5sb2ciCiMgICAg
c2F2ZWxvZyAiJGxvZ2ZpbGUiIHx8OgojICAgIG5ld2FyZyAtc2VyaWFsCiMg
ICAgbmV3YXJnICJmaWxlOiRsb2dmaWxlIgojZmkKRU5EX0RNV1JBUAoKaWYg
KCRxZW11KSB7CiAgICBwcmludGYgUSA8PCdFTkRfRE1XUkFQJywgJHFlbXUg
b3IgZGllICQhOwogICAgZXhlYyAnJXMnICIke25ld2FyZ3NbQF19IgpFTkRf
RE1XUkFQCn0gZWxzZSB7CiAgICBwcmludCBRIDw8J0VORF9ETVdSQVAnIG9y
IGRpZSAkITsKc2V0IC14CmZvciBwYXRoIGluIC91c3IvbG9jYWwvbGliL3hl
bi9iaW4gL3Vzci9saWIveGVuL2JpbiAvdXNyL2xvY2FsL2JpbiAvdXNyL2Jp
bjsgZG8KICAgIGlmIHRlc3QgLWUgJHBhdGgvcWVtdS1zeXN0ZW0taTM4Njsg
dGhlbgogICAgICAgIGV4ZWMgJHBhdGgvcWVtdS1zeXN0ZW0taTM4NiAiJHtu
ZXdhcmdzW0BdfSIKICAgIGZpCmRvbmUKZWNobyA+JjIgJ2NvdWxkIG5vdCBl
eGVjIHFlbXUnCmV4aXQgMTI3CkVORF9ETVdSQVAKfQoKY2htb2QgMDc1NSwg
IiRkbXdyYXAubmV3IiBvciBkaWUgIiRkbXdyYXA6IGNobW9kOiAkISI7Cgpj
bG9zZSBRIG9yIGRpZSAkITsKCnJlbmFtZSAiJHNpZGVjYXIubmV3IiwgJHNp
ZGVjYXIgb3IgZGllICIkc2lkZWNhcjogaW5zdGFsbDogJCEiOwpyZW5hbWUg
IiRkbXdyYXAubmV3IiwgICRkbXdyYXAgIG9yIGRpZSAiJGRtd3JhcDogaW5z
dGFsbDogJCEiOwoKcHJpbnQgU1RERVJSIDw8RU5EOwpwdnNoaW0tY29udmVy
dGVyOiB3cm90ZSBxZW11IHdyYXBwZXIgdG8gJGRtd3JhcApwdnNoaW0tY29u
dmVydGVyOiB3cm90ZSBzaWRlY2FyIHRvICRzaWRlY2FyCkVORAoKbXkgJGFw
cGVuZCA9IDw8RU5EOwpidWlsZGVyPSdodm0nCnR5cGU9J2h2bScKZGV2aWNl
X21vZGVsX3ZlcnNpb249J3FlbXUteGVuJwpkZXZpY2VfbW9kZWxfb3ZlcnJp
ZGU9JyRkbXdyYXAnCmRldmljZV9tb2RlbF9hcmdzX2h2bT1bJy1jZHJvbScs
JyRzaWRlY2FyJ10KYm9vdD0nYycKc2VyaWFsPSdwdHknCkVORAoKaWYgKCRv
dXQgbmUgJy0nKSB7CiAgICBvcGVuIE8sICI+IiwgIiRvdXQudG1wIiBvciBk
aWUgIm9wZW4gb3V0cHV0IGNvbmZpZyB0ZW1wOiAkb3V0LnRtcDogJCFcbiI7
Cn0gZWxzZSB7CiAgICBvcGVuIE8sICI+JlNURE9VVCIgb3IgZGllICQhOwp9
CgpwcmludCBPICRpbmRhdGEsICJcbiIsICRhcHBlbmQgb3IgZGllICJ3cml0
ZSBvdXRwdXQ6ICQhIjsKY2xvc2UgTyBvciBkaWUgImNsb3NlIG91dHB1dDog
JCEiOwoKaWYgKCRvdXQgbmUgJy0nKSB7CiAgICByZW5hbWUgIiRvdXQudG1w
IiwgJG91dCBvciBkaWUgImluc3RhbGwgb3V0cHV0OiAkISI7CiAgICBwcmlu
dCBTVERFUlIgInB2c2hpbS1jb252ZXJ0ZXI6IHdyb3RlIG5ldyBndWVzdCBj
b25maWcgdG8gJG91dFxuIjsKfSBlbHNlIHsKICAgIHByaW50IFNUREVSUiAi
cHZzaGltLWNvbnZlcnRlcjogd3JvdGUgbmV3IGd1ZXN0IGNvbmZpZyB0byBz
dGRvdXRcbiI7Cn0K

--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Fri Jan 12 17:53:05 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 17:53:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ea3Um-0003vq-Fm; Fri, 12 Jan 2018 17:52:00 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=wte3=eh=gmail.com=mabarkdoll@srs-us1.protection.inumbo.net>)
 id 1ea3Ul-0003vP-3U
 for xen-users@lists.xenproject.org; Fri, 12 Jan 2018 17:51:59 +0000
X-Inumbo-ID: 9684f177-f7c1-11e7-b0d7-9f685aff125f
Received: from mail-qk0-f175.google.com (unknown [209.85.220.175])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 9684f177-f7c1-11e7-b0d7-9f685aff125f;
 Fri, 12 Jan 2018 17:54:08 +0000 (UTC)
Received: by mail-qk0-f175.google.com with SMTP id a5so6822995qkg.10
 for <xen-users@lists.xenproject.org>; Fri, 12 Jan 2018 09:51:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to;
 bh=KJAguBUKY8yxkIFA56aF2Kv56SLkkpopLAMp6p+wSIU=;
 b=lD2JcuPIJ8hYtTvF1Q0MZeuMq4mX8+aDOB8BEuv/gKFwwKSVRlUf2O+UXf8TfBmxiT
 mFdDOfjC4ru1DR1nx4yGamIuB4nI7nkDhxwtLsAdMNQfFml3cBbyIJIHcQ3qRdRyROCm
 UAP7rNBGVVZKPSsvqMF/LPzQeKlOx1ZBjher5Wf0qoHa8dnpT2uB/iU7Vmu3Zf1q18Dt
 4gyv8jOAO4i0zcS5F48gBMhtG/Z/bGMaFqxVlxx8k27y/PiaEyfUasE+6cj/c13kreBA
 XnnErE91G71lI8csmBpQubqd5fvyqDYzWd47sWdBiIxgQY0it1xdxK1SawwaHUrg67Ds
 qQVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to;
 bh=KJAguBUKY8yxkIFA56aF2Kv56SLkkpopLAMp6p+wSIU=;
 b=aLm0GV7gL7JCRz14faglD2gxKJalSw6M69TaSOc4m7TxVh3AoTbl3Y1v3lsScarURb
 rMMQl6qQIPKnnwohyp5II9Xs9W+SV0Pt4i2g+J7GPMca9tC5TfHbU9wbDiMrzcpAmDl2
 LtmgiJfqReuZmO2ijra9FE4h5lBzZndR+jYjG2bW9IOkLGURe8TA8rSbhq8XMgaEoh4m
 t5sRK7dbaqLtCIwjRXowGlhqg7UXrROOUoonsTHR+FP6kFkDagUtKQP7zTzKWqYYVek0
 /IMqXx6LQ4Ktn9uLNu0kuw1DaQyj2bmwcHFzRivfDvBq2e1u8v+ZhUdeXjwvrkReg2gm
 Z9HA==
X-Gm-Message-State: AKwxytdGvlqvFA2rqOU21CslndGf3AIwSiZrCk56UwDgBcJOW9iy7L4y
 A7wamZ9C1kWESC17/rYw7iaM1fCWUcn/MXdR4Dt2wQ==
X-Google-Smtp-Source: ACJfBovN2ILn+qqF2ir9Ix8xspditmog2gTUNbk426XDRsRufH3BGfp1JSrOHnyPaB8DqU9h8N5Z+lDJbv+bSLgDqP8=
X-Received: by 10.55.103.137 with SMTP id b131mr40575816qkc.56.1515779451979; 
 Fri, 12 Jan 2018 09:50:51 -0800 (PST)
MIME-Version: 1.0
Received: by 10.12.139.153 with HTTP; Fri, 12 Jan 2018 09:50:11 -0800 (PST)
In-Reply-To: <CAC7iewEiKm2UV-GaSakUhVMusezHnXg3-5UiNGSk4tfyCcwZPQ@mail.gmail.com>
References: <CAC7iewEiKm2UV-GaSakUhVMusezHnXg3-5UiNGSk4tfyCcwZPQ@mail.gmail.com>
From: Michael Barkdoll <mabarkdoll@gmail.com>
Date: Fri, 12 Jan 2018 11:50:11 -0600
Message-ID: <CAC7iewECc3s3ZDD48AXpOxufsDWbyOCw424VWwQU8juuOmKmgQ@mail.gmail.com>
To: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] Xen PV Guest won't boot latest kernel- OSError:
 [Errno 28] No space left on device
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0621201247944014167=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============0621201247944014167==
Content-Type: multipart/alternative; boundary="94eb2c057296cb2bbe056297e7e7"

--94eb2c057296cb2bbe056297e7e7
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks for the reply Andy.  I tried as you suggested here is the output of
the command.

> I don't know what the problem is, but this suggests it lies within
> pygrub. Try running pygrub separately to see what happens, i.e.:

> # /usr/lib/xen-4.4/bin/pygrub /dev/host-disk2-vg/guest-disk


````
$ /usr/lib/xen-4.4/bin/pygrub /dev/vps03-disk2-vg/www2-disk
Using <class 'grub.GrubConf.Grub2ConfigFile'> to parse /grub/grub.cfg
WARNING:root:grub2's saved_entry/next_entry not supported
WARNING:root:Unknown directive else
WARNING:root:...

Traceback (most recent call last):
  File "/usr/lib/xen-4.4/bin/pygrub", line 873, in <module>
    output_directory, not_really)
  File "/usr/lib/xen-4.4/bin/pygrub", line 718, in copy_from_image
    dir=3Doutput_directory)
  File "/usr/lib/python2.7/tempfile.py", line 308, in mkstemp
    return _mkstemp_inner(dir, prefix, suffix, flags)
  File "/usr/lib/python2.7/tempfile.py", line 239, in _mkstemp_inner
    fd =3D _os.open(file, flags, 0600)
OSError: [Errno 2] No such file or directory: '/var/run/xend/boot/boot_
kernel.jedvP5'
````

Directory /var/run/xend/boot/ don't exist in the host Xen Ubuntu14.04 of
the Guest Ubuntu 16.04.  Guest VM still fails to reboot after a kernel
upgrade, unless I manually select the old kernel.


On Thu, Jan 11, 2018 at 11:53 AM, Michael Barkdoll <mabarkdoll@gmail.com>
wrote:

> Hello, I have an Ubuntu 14.04 running Xen and a VM running Ubuntu 16.04
> LTS that I'm having issues with it booting after upgrading the kernel for
> meltdown and spectre vulnerability.
>
> ````
> sudo apt-get update
> sudo apt-get upgrade
> sudo apt-get dist-upgrade
> ````
>
> Ubuntu 14.04 xen host reboot failure log:
> ````
> $ tailf /var/log/xen/servername.log
> Domain 24 needs to be cleaned up: destroying the domain
> Done. Rebooting now
> libxl: error: libxl_bootloader.c:628:bootloader_finished: bootloader
> failed - consult logfile /var/log/xen/bootloader.27.log
> libxl: error: libxl_exec.c:118:libxl_report_child_exitstatus: bootloader
> [-1] exited with error status 1
> libxl: error: libxl_create.c:1024:domcreate_rebuild_done: cannot
> (re-)build domain: -3
> ````
>
>
> ````
> cat /var/log/xen/bootloader.27.log
> Using <class 'grub.GrubConf.Grub2ConfigFile'> to parse /grub/grub.cfg
> pyGRUB  version 0.6
>  =E2=94=8C=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80
> =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=90
>  =E2=94=82 Ubuntu                                                        =
         =E2=94=82
>  =E2=94=82 Ubuntu, with Linux 4.4.0-109-generic                          =
         =E2=94=82
>  =E2=94=82 Ubuntu, with Linux 4.4.0-109-generic (recovery mode)          =
         =E2=94=82
>  =E2=94=82 Ubuntu, with Linux 4.4.0-108-generic                          =
         =E2=94=82
>  =E2=94=82 Ubuntu, with Linux 4.4.0-108-generic (recovery mode)          =
         =E2=94=82
>  =E2=94=82 Ubuntu, with Linux 4.4.0-104-generic                          =
         =E2=94=82
>  =E2=94=82 Ubuntu, with Linux 4.4.0-104-generic (recovery mode)          =
         =E2=94=82
>  =E2=94=82 Ubuntu, with Linux 4.4.0-15-generic                           =
         =E2=94=82
>  =E2=94=94=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=
=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=
=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80
> =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=
=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=98
> Use the ^ and =E2=94=B4 keys to select which entry is highlighted.
> Press enter to boot the selected OS, 'e' to edit the
> commands before booting, 'a' to modify the kernel arguments
> before booting, or 'c' for a command line.
>
> Traceback (most recent call last):
>   File "/usr/lib/xen-4.4/bin/pygrub", line 905, in <module>
>     os.write(fd, ostring)
> OSError: [Errno 28] No space left on device
> ````
>
> I was able to get the vm to boot only by rapidly attempt to access the
> menu options and boot the old kernel (4.4.0-15-generic). Disk space and
> inodes seems fine on the host Ubuntu 14.04LTS and Ubuntu 16.04LTS Guest.
>
> Ubuntu 14.04 Host:
> ````
> root@host:/var/log/xen# df -hFilesystem      Size  Used Avail Use%
> Mounted on
> udev            197M   12K  197M   1% /dev
> tmpfs            42M  1.1M   41M   3% /run
> /dev/dm-0       104G   49G   50G  50% /
> none            4.0K     0  4.0K   0% /sys/fs/cgroup
> none            5.0M     0  5.0M   0% /run/lock
> none            208M     0  208M   0% /run/shm
> none            100M     0  100M   0% /run/user
> /dev/sda1       236M   40M  184M  18% /boot
> root@host:/var/log/xen# df -hi
> Filesystem     Inodes IUsed IFree IUse% Mounted on
> udev              50K   721   49K    2% /dev
> tmpfs             52K   849   52K    2% /run
> /dev/dm-0        6.6M   86K  6.5M    2% /
> none              52K     2   52K    1% /sys/fs/cgroup
> none              52K     5   52K    1% /run/lock
> none              52K     1   52K    1% /run/shm
> none              52K     2   52K    1% /run/user
> /dev/sda1         61K   298   61K    1% /boot
> root@host:/var/log/xen#
> ````
>
> Ubuntu 16.04 PV Guest:
> ````
> root@guest:~# df -hFilesystem                            Size  Used Avail
> Use% Mounted on
> udev                                  950M     0  950M   0% /dev
> tmpfs                                 200M  3.1M  197M   2% /run
> /dev/mapper/guest--vg-root              47G  4.3G   40G  10% /
> tmpfs                                 997M     0  997M   0% /dev/shm
> tmpfs                                 5.0M     0  5.0M   0% /run/lock
> tmpfs                                 997M     0  997M   0% /sys/fs/cgrou=
p
> /dev/xvda1                            472M  192M  256M  43% /boot
> tmpfs                                 200M     0  200M   0% /run/user/100=
0
> root@www2:~# df -hi
> Filesystem                           Inodes IUsed IFree IUse% Mounted on
> udev                                   238K   406  237K    1% /dev
> tmpfs                                  250K   491  249K    1% /run
> /dev/mapper/guest--vg-root              3.0M  177K  2.8M    6% /
> tmpfs                                  250K     1  250K    1% /dev/shm
> tmpfs                                  250K     7  250K    1% /run/lock
> tmpfs                                  250K    16  250K    1%
> /sys/fs/cgroup
> /dev/xvda1                             122K   315  122K    1% /boot
> tmpfs                                  250K     4  250K    1%
> /run/user/1000
> root@guest:~#
> ````
>
> Here is the guest Ubuntu 16.04 OS kernels:
> ````
> root@guest:~# dpkg -l | grep linux-image-
> ii  linux-image-4.4.0-104-generic       4.4.0-104.127
>         amd64        Linux kernel image for version 4.4.0 on 64 bit x86 S=
MP
> ii  linux-image-4.4.0-108-generic       4.4.0-108.131
>         amd64        Linux kernel image for version 4.4.0 on 64 bit x86 S=
MP
> ii  linux-image-4.4.0-109-generic       4.4.0-109.132
>         amd64        Linux kernel image for version 4.4.0 on 64 bit x86 S=
MP
> ii  linux-image-4.4.0-15-generic        4.4.0-15.31
>         amd64        Linux kernel image for version 4.4.0 on 64 bit x86 S=
MP
> ii  linux-image-extra-4.4.0-104-generic 4.4.0-104.127
>           amd64        Linux kernel extra modules for version 4.4.0 on 64
> bit x86 SMP
> ii  linux-image-extra-4.4.0-108-generic 4.4.0-108.131
>           amd64        Linux kernel extra modules for version 4.4.0 on 64
> bit x86 SMP
> ii  linux-image-extra-4.4.0-109-generic 4.4.0-109.132
>           amd64        Linux kernel extra modules for version 4.4.0 on 64
> bit x86 SMP
> ii  linux-image-extra-4.4.0-15-generic  4.4.0-15.31
>           amd64        Linux kernel extra modules for version 4.4.0 on 64
> bit x86 SMP
> ii  linux-image-generic                 4.4.0.109.114
>         amd64        Generic Linux kernel image
> root@guest:~#
> ````
>
> I'm currently able to boot to 4.4.0-15.31
>
> Here is my xen config file that I use to start the vm:
> ````
> # cat /etc/xen/guest.cfg
> # /var/lib/xen/images/ubuntu-netboot/xenial16LTS
>
>
> name =3D "guest"
>
>
> #kernel =3D "/var/lib/xen/images/ubuntu-netboot/xenial16LTS/vmlinuz"
> #ramdisk =3D "/var/lib/xen/images/ubuntu-netboot/xenial16LTS/initrd.gz"
> bootloader =3D "/usr/lib/xen-4.4/bin/pygrub"
>
>
> memory =3D 2048
> vcpus =3D 1
>
>
>
>
> disk =3D [ '/dev/host-disk2-vg/guest-disk,raw,xvda,rw' ]
>
>
>
>
> #
> #  Networking
> #
> vif         =3D [ 'ip=3Dxxx.xxx.xxx.xxx ,mac=3DAA:BB:CC:DD:EE:FF' ]
>
>
> #
> #  Behaviour
> #
> on_poweroff =3D 'destroy'
> on_reboot   =3D 'restart'
> on_crash    =3D 'restart'
> ````
>
> I also tried launching the vm with strace output of
> ````
> strace xl create -c file.cfg
> ````
> is here: https://pastebin.com/8ctS3TQh
>
> I'm a bit lost as to the cause of this... I was hoping to just upgrade th=
e
> kernel for meltdown and spetre, but this issue I've never faced before. I
> think it might be related to pygrub and the new kernel? I don't know for
> sure though anything I can check to figure this out better? Thanks.
>
>

--94eb2c057296cb2bbe056297e7e7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: base64

PGRpdiBkaXI9Imx0ciI+PGRpdj5UaGFua3MgZm9yIHRoZSByZXBseSBBbmR5LsKgIEkgdHJpZWQg
YXMgeW91IHN1Z2dlc3RlZCBoZXJlIGlzIHRoZSBvdXRwdXQgb2YgdGhlIGNvbW1hbmQuwqDCoDwv
ZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+PHByZSBzdHlsZT0iYm9yZGVyOjFweCBzb2xpZCByZ2Io
MjIxLDIyMSwyMjEpO2JhY2tncm91bmQ6cmdiKDI1MCwyNTAsMjUwKTtjb2xvcjpyZ2IoNTEsNTEs
NTEpO2ZvbnQtc2l6ZToxMnB4Ij4mZ3Q7IEkgZG9uJiMzOTt0IGtub3cgd2hhdCB0aGUgcHJvYmxl
bSBpcywgYnV0IHRoaXMgc3VnZ2VzdHMgaXQgbGllcyB3aXRoaW4NCiZndDsgcHlncnViLiBUcnkg
cnVubmluZyBweWdydWIgc2VwYXJhdGVseSB0byBzZWUgd2hhdCBoYXBwZW5zLCBpLmUuOg0KDQom
Z3Q7ICMgL3Vzci9saWIveGVuLTQuNC9iaW4vcHlncnViIC9kZXYvaG9zdC1kaXNrMi12Zy9ndWVz
dC1kaXNrPC9wcmU+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5gYGBgPC9kaXY+PGRpdj4kIC91
c3IvbGliL3hlbi00LjQvYmluL3B5Z3J1YiAvZGV2L3ZwczAzLWRpc2syLXZnL3d3dzItZGlzazwv
ZGl2PjxkaXY+VXNpbmcgJmx0O2NsYXNzICYjMzk7Z3J1Yi5HcnViQ29uZi48d2JyPkdydWIyQ29u
ZmlnRmlsZSYjMzk7Jmd0OyB0byBwYXJzZSAvZ3J1Yi9ncnViLmNmZzwvZGl2PjxkaXY+V0FSTklO
Rzpyb290OmdydWIyJiMzOTtzIHNhdmVkX2VudHJ5L25leHRfZW50cnkgbm90IHN1cHBvcnRlZDwv
ZGl2PjxkaXY+V0FSTklORzpyb290OlVua25vd24gZGlyZWN0aXZlIGVsc2U8L2Rpdj48ZGl2PldB
Uk5JTkc6cm9vdDouLi48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PlRyYWNlYmFjayAobW9zdCBy
ZWNlbnQgY2FsbCBsYXN0KTo8L2Rpdj48ZGl2PsKgIEZpbGUgJnF1b3Q7L3Vzci9saWIveGVuLTQu
NC9iaW4vcHlncnViJnF1b3Q7LCBsaW5lIDg3MywgaW4gJmx0O21vZHVsZSZndDs8L2Rpdj48ZGl2
PsKgIMKgIG91dHB1dF9kaXJlY3RvcnksIG5vdF9yZWFsbHkpPC9kaXY+PGRpdj7CoCBGaWxlICZx
dW90Oy91c3IvbGliL3hlbi00LjQvYmluL3B5Z3J1YiZxdW90OywgbGluZSA3MTgsIGluIGNvcHlf
ZnJvbV9pbWFnZTwvZGl2PjxkaXY+wqAgwqAgZGlyPW91dHB1dF9kaXJlY3RvcnkpPC9kaXY+PGRp
dj7CoCBGaWxlICZxdW90Oy91c3IvbGliL3B5dGhvbjIuNy90ZW1wZmlsZS48d2JyPnB5JnF1b3Q7
LCBsaW5lIDMwOCwgaW4gbWtzdGVtcDwvZGl2PjxkaXY+wqAgwqAgcmV0dXJuIF9ta3N0ZW1wX2lu
bmVyKGRpciwgcHJlZml4LCBzdWZmaXgsIGZsYWdzKTwvZGl2PjxkaXY+wqAgRmlsZSAmcXVvdDsv
dXNyL2xpYi9weXRob24yLjcvdGVtcGZpbGUuPHdicj5weSZxdW90OywgbGluZSAyMzksIGluIF9t
a3N0ZW1wX2lubmVyPC9kaXY+PGRpdj7CoCDCoCBmZCA9IF9vcy5vcGVuKGZpbGUsIGZsYWdzLCAw
NjAwKTwvZGl2PjxkaXY+T1NFcnJvcjogW0Vycm5vIDJdIE5vIHN1Y2ggZmlsZSBvciBkaXJlY3Rv
cnk6ICYjMzk7L3Zhci9ydW4veGVuZC9ib290L2Jvb3RfPHdicj5rZXJuZWwuamVkdlA1JiMzOTs8
L2Rpdj48ZGl2PmBgYGA8YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5EaXJlY3RvcnkgL3Zh
ci9ydW4veGVuZC9ib290LyBkb24mIzM5O3QgZXhpc3QgaW4gdGhlIGhvc3QgWGVuIFVidW50dTE0
LjA0IG9mIHRoZSBHdWVzdCBVYnVudHUgMTYuMDQuwqAgR3Vlc3QgVk0gc3RpbGwgZmFpbHMgdG8g
cmVib290IGFmdGVyIGEga2VybmVsIHVwZ3JhZGUsIHVubGVzcyBJIG1hbnVhbGx5IHNlbGVjdCB0
aGUgb2xkIGtlcm5lbC48L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9leHRyYSI+PGRpdj48ZGl2IGNs
YXNzPSJtXzMzMDUzMjQyNjYwNjE3MDY5MzJnbWFpbF9zaWduYXR1cmUiIGRhdGEtc21hcnRtYWls
PSJnbWFpbF9zaWduYXR1cmUiPjxkaXYgZGlyPSJsdHIiPjxicj48L2Rpdj48L2Rpdj48L2Rpdj4N
Cjxicj48ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+T24gVGh1LCBKYW4gMTEsIDIwMTggYXQgMTE6
NTMgQU0sIE1pY2hhZWwgQmFya2RvbGwgPHNwYW4gZGlyPSJsdHIiPiZsdDs8YSBocmVmPSJtYWls
dG86bWFiYXJrZG9sbEBnbWFpbC5jb20iIHRhcmdldD0iX2JsYW5rIj5tYWJhcmtkb2xsQGdtYWls
LmNvbTwvYT4mZ3Q7PC9zcGFuPiB3cm90ZTo8YnI+PGJsb2NrcXVvdGUgY2xhc3M9ImdtYWlsX3F1
b3RlIiBzdHlsZT0ibWFyZ2luOjAgMCAwIC44ZXg7Ym9yZGVyLWxlZnQ6MXB4ICNjY2Mgc29saWQ7
cGFkZGluZy1sZWZ0OjFleCI+PGRpdiBkaXI9Imx0ciI+PGRpdj5IZWxsbywgSSBoYXZlIGFuIFVi
dW50dSAxNC4wNCBydW5uaW5nIFhlbiBhbmQgYSBWTSBydW5uaW5nIFVidW50dSAxNi4wNCBMVFMg
dGhhdCBJJiMzOTttIGhhdmluZyBpc3N1ZXMgd2l0aCBpdCBib290aW5nIGFmdGVyIHVwZ3JhZGlu
ZyB0aGUga2VybmVsIGZvciBtZWx0ZG93biBhbmQgc3BlY3RyZSB2dWxuZXJhYmlsaXR5LjwvZGl2
PjxkaXY+PGJyPjwvZGl2PjxkaXY+YGBgYDwvZGl2PjxkaXY+c3VkbyBhcHQtZ2V0IHVwZGF0ZTwv
ZGl2PjxkaXY+c3VkbyBhcHQtZ2V0IHVwZ3JhZGU8L2Rpdj48ZGl2PnN1ZG8gYXB0LWdldCBkaXN0
LXVwZ3JhZGU8L2Rpdj48ZGl2PmBgYGA8L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PlVidW50dSAx
NC4wNCB4ZW4gaG9zdCByZWJvb3QgZmFpbHVyZSBsb2c6PC9kaXY+PGRpdj5gYGBgPC9kaXY+PGRp
dj4kIHRhaWxmIC92YXIvbG9nL3hlbi9zZXJ2ZXJuYW1lLmxvZzwvZGl2PjxkaXY+RG9tYWluIDI0
IG5lZWRzIHRvIGJlIGNsZWFuZWQgdXA6IGRlc3Ryb3lpbmcgdGhlIGRvbWFpbjwvZGl2PjxkaXY+
RG9uZS4gUmVib290aW5nIG5vdzwvZGl2PjxkaXY+bGlieGw6IGVycm9yOiBsaWJ4bF9ib290bG9h
ZGVyLmM6NjI4OmJvb3Rsb2E8d2JyPmRlcl9maW5pc2hlZDogYm9vdGxvYWRlciBmYWlsZWQgLSBj
b25zdWx0IGxvZ2ZpbGUgL3Zhci9sb2cveGVuL2Jvb3Rsb2FkZXIuMjcubG9nPC9kaXY+PGRpdj5s
aWJ4bDogZXJyb3I6IGxpYnhsX2V4ZWMuYzoxMTg6bGlieGxfcmVwb3J0Xzx3YnI+Y2hpbGRfZXhp
dHN0YXR1czogYm9vdGxvYWRlciBbLTFdIGV4aXRlZCB3aXRoIGVycm9yIHN0YXR1cyAxPC9kaXY+
PGRpdj5saWJ4bDogZXJyb3I6IGxpYnhsX2NyZWF0ZS5jOjEwMjQ6ZG9tY3JlYXRlXzx3YnI+cmVi
dWlsZF9kb25lOiBjYW5ub3QgKHJlLSlidWlsZCBkb21haW46IC0zPC9kaXY+PGRpdj5gYGBgPC9k
aXY+PGRpdj48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5gYGBgPC9kaXY+PGRpdj5jYXQg
L3Zhci9sb2cveGVuL2Jvb3Rsb2FkZXIuMjcubG9nPC9kaXY+PGRpdj5Vc2luZyAmbHQ7Y2xhc3Mg
JiMzOTtncnViLkdydWJDb25mLkdydWIyQ29uZmlnRmlsZTx3YnI+JiMzOTsmZ3Q7IHRvIHBhcnNl
IC9ncnViL2dydWIuY2ZnwqAgwqAgcHlHUlVCwqAgdmVyc2lvbiAwLjY8L2Rpdj48ZGl2PsKg4pSM
4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA
4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSAPHdicj7ilIDilIDilIDilIDilIDilIDilIDilIDi
lIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDilIDi
lIDilIDilIA8d2JyPuKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKU
kDwvZGl2PjxkaXY+wqDilIIgVWJ1bnR1wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqDilII8L2Rpdj48ZGl2PsKg4pSCIFVidW50dSwgd2l0aCBMaW51eCA0LjQuMC0xMDkt
Z2VuZXJpY8KgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg
IMKg4pSCPC9kaXY+PGRpdj7CoOKUgiBVYnVudHUsIHdpdGggTGludXggNC40LjAtMTA5LWdlbmVy
aWMgKHJlY292ZXJ5IG1vZGUpwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqDilII8L2Rpdj48
ZGl2PsKg4pSCIFVidW50dSwgd2l0aCBMaW51eCA0LjQuMC0xMDgtZ2VuZXJpY8KgIMKgIMKgIMKg
IMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg4pSCPC9kaXY+PGRpdj7C
oOKUgiBVYnVudHUsIHdpdGggTGludXggNC40LjAtMTA4LWdlbmVyaWMgKHJlY292ZXJ5IG1vZGUp
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqDilII8L2Rpdj48ZGl2PsKg4pSCIFVidW50dSwg
d2l0aCBMaW51eCA0LjQuMC0xMDQtZ2VuZXJpY8KgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg
IMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg4pSCPC9kaXY+PGRpdj7CoOKUgiBVYnVudHUsIHdpdGgg
TGludXggNC40LjAtMTA0LWdlbmVyaWMgKHJlY292ZXJ5IG1vZGUpwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqDilII8L2Rpdj48ZGl2PsKg4pSCIFVidW50dSwgd2l0aCBMaW51eCA0LjQuMC0x
NS1nZW5lcmljwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAg4pSCPC9kaXY+PGRpdj7CoOKUlOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKU
gOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgOKUgDx3YnI+
4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA
4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSA4pSAPHdicj7ilIDilIDilIDilIDilIDilIDi
lIDilIDilIDilIDilIDilIDilIDilIDilJg8L2Rpdj48ZGl2PlVzZSB0aGUgXiBhbmQg4pS0IGtl
eXMgdG8gc2VsZWN0IHdoaWNoIGVudHJ5IGlzIGhpZ2hsaWdodGVkLjwvZGl2PjxkaXY+UHJlc3Mg
ZW50ZXIgdG8gYm9vdCB0aGUgc2VsZWN0ZWQgT1MsICYjMzk7ZSYjMzk7IHRvIGVkaXQgdGhlPC9k
aXY+PGRpdj5jb21tYW5kcyBiZWZvcmUgYm9vdGluZywgJiMzOTthJiMzOTsgdG8gbW9kaWZ5IHRo
ZSBrZXJuZWwgYXJndW1lbnRzPC9kaXY+PGRpdj5iZWZvcmUgYm9vdGluZywgb3IgJiMzOTtjJiMz
OTsgZm9yIGEgY29tbWFuZCBsaW5lLjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+VHJhY2ViYWNr
IChtb3N0IHJlY2VudCBjYWxsIGxhc3QpOjwvZGl2PjxkaXY+wqAgRmlsZSAmcXVvdDsvdXNyL2xp
Yi94ZW4tNC40L2Jpbi9weWdydWImcXVvdDssIGxpbmUgOTA1LCBpbiAmbHQ7bW9kdWxlJmd0Ozwv
ZGl2PjxkaXY+wqAgwqAgb3Mud3JpdGUoZmQsIG9zdHJpbmcpPC9kaXY+PGRpdj5PU0Vycm9yOiBb
RXJybm8gMjhdIE5vIHNwYWNlIGxlZnQgb24gZGV2aWNlPC9kaXY+PGRpdj5gYGBgPC9kaXY+PGRp
dj48YnI+PC9kaXY+PGRpdj5JIHdhcyBhYmxlIHRvIGdldCB0aGUgdm0gdG8gYm9vdCBvbmx5IGJ5
IHJhcGlkbHkgYXR0ZW1wdCB0byBhY2Nlc3MgdGhlIG1lbnUgb3B0aW9ucyBhbmQgYm9vdCB0aGUg
b2xkIGtlcm5lbCAoNC40LjAtMTUtZ2VuZXJpYykuIERpc2sgc3BhY2UgYW5kIGlub2RlcyBzZWVt
cyBmaW5lIG9uIHRoZSBob3N0IFVidW50dSAxNC4wNExUUyBhbmQgVWJ1bnR1IDE2LjA0TFRTIEd1
ZXN0LjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+VWJ1bnR1IDE0LjA0IEhvc3Q6PC9kaXY+PGRp
dj5gYGBgPC9kaXY+PGRpdj5yb290QGhvc3Q6L3Zhci9sb2cveGVuIyBkZiAtaEZpbGVzeXN0ZW3C
oCDCoCDCoCBTaXplwqAgVXNlZCBBdmFpbCBVc2UlIE1vdW50ZWQgb248L2Rpdj48ZGl2PnVkZXbC
oCDCoCDCoCDCoCDCoCDCoCAxOTdNwqAgwqAxMkvCoCAxOTdNwqAgwqAxJSAvZGV2PC9kaXY+PGRp
dj50bXBmc8KgIMKgIMKgIMKgIMKgIMKgIDQyTcKgIDEuMU3CoCDCoDQxTcKgIMKgMyUgL3J1bjwv
ZGl2PjxkaXY+L2Rldi9kbS0wwqAgwqAgwqAgwqAxMDRHwqAgwqA0OUfCoCDCoDUwR8KgIDUwJSAv
PC9kaXY+PGRpdj5ub25lwqAgwqAgwqAgwqAgwqAgwqAgNC4wS8KgIMKgIMKgMMKgIDQuMEvCoCDC
oDAlIC9zeXMvZnMvY2dyb3VwPC9kaXY+PGRpdj5ub25lwqAgwqAgwqAgwqAgwqAgwqAgNS4wTcKg
IMKgIMKgMMKgIDUuME3CoCDCoDAlIC9ydW4vbG9jazwvZGl2PjxkaXY+bm9uZcKgIMKgIMKgIMKg
IMKgIMKgIDIwOE3CoCDCoCDCoDDCoCAyMDhNwqAgwqAwJSAvcnVuL3NobTwvZGl2PjxkaXY+bm9u
ZcKgIMKgIMKgIMKgIMKgIMKgIDEwME3CoCDCoCDCoDDCoCAxMDBNwqAgwqAwJSAvcnVuL3VzZXI8
L2Rpdj48ZGl2Pi9kZXYvc2RhMcKgIMKgIMKgIMKgMjM2TcKgIMKgNDBNwqAgMTg0TcKgIDE4JSAv
Ym9vdDwvZGl2PjxkaXY+cm9vdEBob3N0Oi92YXIvbG9nL3hlbiMgZGYgLWhpPC9kaXY+PGRpdj5G
aWxlc3lzdGVtwqAgwqAgwqBJbm9kZXMgSVVzZWQgSUZyZWUgSVVzZSUgTW91bnRlZCBvbjwvZGl2
PjxkaXY+dWRldsKgIMKgIMKgIMKgIMKgIMKgIMKgIDUwS8KgIMKgNzIxwqAgwqA0OUvCoCDCoCAy
JSAvZGV2PC9kaXY+PGRpdj50bXBmc8KgIMKgIMKgIMKgIMKgIMKgIMKgNTJLwqAgwqA4NDnCoCDC
oDUyS8KgIMKgIDIlIC9ydW48L2Rpdj48ZGl2Pi9kZXYvZG0tMMKgIMKgIMKgIMKgIDYuNk3CoCDC
oDg2S8KgIDYuNU3CoCDCoCAyJSAvPC9kaXY+PGRpdj5ub25lwqAgwqAgwqAgwqAgwqAgwqAgwqAg
NTJLwqAgwqAgwqAywqAgwqA1MkvCoCDCoCAxJSAvc3lzL2ZzL2Nncm91cDwvZGl2PjxkaXY+bm9u
ZcKgIMKgIMKgIMKgIMKgIMKgIMKgIDUyS8KgIMKgIMKgNcKgIMKgNTJLwqAgwqAgMSUgL3J1bi9s
b2NrPC9kaXY+PGRpdj5ub25lwqAgwqAgwqAgwqAgwqAgwqAgwqAgNTJLwqAgwqAgwqAxwqAgwqA1
MkvCoCDCoCAxJSAvcnVuL3NobTwvZGl2PjxkaXY+bm9uZcKgIMKgIMKgIMKgIMKgIMKgIMKgIDUy
S8KgIMKgIMKgMsKgIMKgNTJLwqAgwqAgMSUgL3J1bi91c2VyPC9kaXY+PGRpdj4vZGV2L3NkYTHC
oCDCoCDCoCDCoCDCoDYxS8KgIMKgMjk4wqAgwqA2MUvCoCDCoCAxJSAvYm9vdDwvZGl2PjxkaXY+
cm9vdEBob3N0Oi92YXIvbG9nL3hlbiM8L2Rpdj48ZGl2PmBgYGA8L2Rpdj48ZGl2Pjxicj48L2Rp
dj48ZGl2PlVidW50dSAxNi4wNCBQViBHdWVzdDo8L2Rpdj48ZGl2PmBgYGA8L2Rpdj48ZGl2PnJv
b3RAZ3Vlc3Q6fiMgZGYgLWhGaWxlc3lzdGVtwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgU2l6ZcKgIFVzZWQgQXZhaWwgVXNlJSBNb3VudGVkIG9uPC9kaXY+PGRpdj51
ZGV2wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgOTUw
TcKgIMKgIMKgMMKgIDk1ME3CoCDCoDAlIC9kZXY8L2Rpdj48ZGl2PnRtcGZzwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAyMDBNwqAgMy4xTcKgIDE5N03C
oCDCoDIlIC9ydW48L2Rpdj48ZGl2Pi9kZXYvbWFwcGVyL2d1ZXN0LS12Zy1yb290wqAgwqAgwqAg
wqAgwqAgwqAgwqAgNDdHwqAgNC4zR8KgIMKgNDBHwqAgMTAlIC88L2Rpdj48ZGl2PnRtcGZzwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqA5OTdNwqAgwqAg
wqAwwqAgOTk3TcKgIMKgMCUgL2Rldi9zaG08L2Rpdj48ZGl2PnRtcGZzwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqA1LjBNwqAgwqAgwqAwwqAgNS4wTcKg
IMKgMCUgL3J1bi9sb2NrPC9kaXY+PGRpdj50bXBmc8KgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg
IMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgOTk3TcKgIMKgIMKgMMKgIDk5N03CoCDCoDAlIC9zeXMv
ZnMvY2dyb3VwPC9kaXY+PGRpdj4vZGV2L3h2ZGExwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgwqAgNDcyTcKgIDE5Mk3CoCAyNTZNwqAgNDMlIC9ib290PC9kaXY+PGRpdj50
bXBmc8KgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgMjAw
TcKgIMKgIMKgMMKgIDIwME3CoCDCoDAlIC9ydW4vdXNlci8xMDAwPC9kaXY+PGRpdj5yb290QHd3
dzI6fiMgZGYgLWhpPC9kaXY+PGRpdj5GaWxlc3lzdGVtwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgwqAgwqBJbm9kZXMgSVVzZWQgSUZyZWUgSVVzZSUgTW91bnRlZCBvbjwvZGl2
PjxkaXY+dWRldsKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg
IMKgIMKgMjM4S8KgIMKgNDA2wqAgMjM3S8KgIMKgIDElIC9kZXY8L2Rpdj48ZGl2PnRtcGZzwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgMjUwS8KgIMKg
NDkxwqAgMjQ5S8KgIMKgIDElIC9ydW48L2Rpdj48ZGl2Pi9kZXYvbWFwcGVyL2d1ZXN0LS12Zy1y
b290wqAgwqAgwqAgwqAgwqAgwqAgwqAgMy4wTcKgIDE3N0vCoCAyLjhNwqAgwqAgNiUgLzwvZGl2
PjxkaXY+dG1wZnPCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDC
oCDCoCAyNTBLwqAgwqAgwqAxwqAgMjUwS8KgIMKgIDElIC9kZXYvc2htPC9kaXY+PGRpdj50bXBm
c8KgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIDI1MEvC
oCDCoCDCoDfCoCAyNTBLwqAgwqAgMSUgL3J1bi9sb2NrPC9kaXY+PGRpdj50bXBmc8KgIMKgIMKg
IMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIDI1MEvCoCDCoCAxNsKg
IDI1MEvCoCDCoCAxJSAvc3lzL2ZzL2Nncm91cDwvZGl2PjxkaXY+L2Rldi94dmRhMcKgIMKgIMKg
IMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgMTIyS8KgIMKgMzE1wqAgMTIyS8Kg
IMKgIDElIC9ib290PC9kaXY+PGRpdj50bXBmc8KgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg
IMKgIMKgIMKgIMKgIMKgIMKgIMKgIDI1MEvCoCDCoCDCoDTCoCAyNTBLwqAgwqAgMSUgL3J1bi91
c2VyLzEwMDA8L2Rpdj48ZGl2PnJvb3RAZ3Vlc3Q6fiM8L2Rpdj48ZGl2PmBgYGA8L2Rpdj48ZGl2
Pjxicj48L2Rpdj48ZGl2PkhlcmUgaXMgdGhlIGd1ZXN0IFVidW50dSAxNi4wNCBPUyBrZXJuZWxz
OjwvZGl2PjxkaXY+YGBgYDwvZGl2PjxkaXY+cm9vdEBndWVzdDp+IyBkcGtnIC1sIHwgZ3JlcCBs
aW51eC1pbWFnZS08L2Rpdj48ZGl2PmlpwqAgbGludXgtaW1hZ2UtNC40LjAtMTA0LWdlbmVyaWPC
oCDCoCDCoCDCoDQuNC4wLTEwNC4xMjfCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDC
oCDCoCDCoCDCoCBhbWQ2NMKgIMKgIMKgIMKgIExpbnV4IGtlcm5lbCBpbWFnZSBmb3IgdmVyc2lv
biA0LjQuMCBvbiA2NCBiaXQgeDg2IFNNUDwvZGl2PjxkaXY+aWnCoCBsaW51eC1pbWFnZS00LjQu
MC0xMDgtZ2VuZXJpY8KgIMKgIMKgIMKgNC40LjAtMTA4LjEzMcKgIMKgIMKgIMKgIMKgIMKgIMKg
IMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIGFtZDY0wqAgwqAgwqAgwqAgTGludXgga2VybmVsIGlt
YWdlIGZvciB2ZXJzaW9uIDQuNC4wIG9uIDY0IGJpdCB4ODYgU01QPC9kaXY+PGRpdj5pacKgIGxp
bnV4LWltYWdlLTQuNC4wLTEwOS1nZW5lcmljwqAgwqAgwqAgwqA0LjQuMC0xMDkuMTMywqAgwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgYW1kNjTCoCDCoCDCoCDCoCBM
aW51eCBrZXJuZWwgaW1hZ2UgZm9yIHZlcnNpb24gNC40LjAgb24gNjQgYml0IHg4NiBTTVA8L2Rp
dj48ZGl2PmlpwqAgbGludXgtaW1hZ2UtNC40LjAtMTUtZ2VuZXJpY8KgIMKgIMKgIMKgIDQuNC4w
LTE1LjMxwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgYW1k
NjTCoCDCoCDCoCDCoCBMaW51eCBrZXJuZWwgaW1hZ2UgZm9yIHZlcnNpb24gNC40LjAgb24gNjQg
Yml0IHg4NiBTTVA8L2Rpdj48ZGl2PmlpwqAgbGludXgtaW1hZ2UtZXh0cmEtNC40LjAtMTA0LWdl
PHdicj5uZXJpYyA0LjQuMC0xMDQuMTI3wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgYW1kNjTCoCDCoCDCoCDCoCBMaW51eCBrZXJuZWwgZXh0cmEgbW9kdWxlcyBm
b3IgdmVyc2lvbiA0LjQuMCBvbiA2NCBiaXQgeDg2IFNNUDwvZGl2PjxkaXY+aWnCoCBsaW51eC1p
bWFnZS1leHRyYS00LjQuMC0xMDgtZ2U8d2JyPm5lcmljIDQuNC4wLTEwOC4xMzHCoCDCoCDCoCDC
oCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCBhbWQ2NMKgIMKgIMKgIMKgIExpbnV4
IGtlcm5lbCBleHRyYSBtb2R1bGVzIGZvciB2ZXJzaW9uIDQuNC4wIG9uIDY0IGJpdCB4ODYgU01Q
PC9kaXY+PGRpdj5pacKgIGxpbnV4LWltYWdlLWV4dHJhLTQuNC4wLTEwOS1nZTx3YnI+bmVyaWMg
NC40LjAtMTA5LjEzMsKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKgIMKg
IGFtZDY0wqAgwqAgwqAgwqAgTGludXgga2VybmVsIGV4dHJhIG1vZHVsZXMgZm9yIHZlcnNpb24g
NC40LjAgb24gNjQgYml0IHg4NiBTTVA8L2Rpdj48ZGl2PmlpwqAgbGludXgtaW1hZ2UtZXh0cmEt
NC40LjAtMTUtZ2VuPHdicj5lcmljwqAgNC40LjAtMTUuMzHCoCDCoCDCoCDCoCDCoCDCoCDCoCDC
oCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCBhbWQ2NMKgIMKgIMKgIMKgIExpbnV4IGtlcm5lbCBl
eHRyYSBtb2R1bGVzIGZvciB2ZXJzaW9uIDQuNC4wIG9uIDY0IGJpdCB4ODYgU01QPC9kaXY+PGRp
dj5pacKgIGxpbnV4LWltYWdlLWdlbmVyaWPCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoDQuNC4w
LjEwOS4xMTTCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCDCoCBhbWQ2
NMKgIMKgIMKgIMKgIEdlbmVyaWMgTGludXgga2VybmVsIGltYWdlPC9kaXY+PGRpdj5yb290QGd1
ZXN0On4jPC9kaXY+PGRpdj5gYGBgPC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5JJiMzOTttIGN1
cnJlbnRseSBhYmxlIHRvIGJvb3QgdG8gNC40LjAtMTUuMzE8L2Rpdj48ZGl2Pjxicj48L2Rpdj48
ZGl2PkhlcmUgaXMgbXkgeGVuIGNvbmZpZyBmaWxlIHRoYXQgSSB1c2UgdG8gc3RhcnQgdGhlIHZt
OjwvZGl2PjxkaXY+YGBgYDwvZGl2PjxkaXY+IyBjYXQgL2V0Yy94ZW4vZ3Vlc3QuY2ZnPC9kaXY+
PGRpdj4jIC92YXIvbGliL3hlbi9pbWFnZXMvdWJ1bnR1LW5ldDx3YnI+Ym9vdC94ZW5pYWwxNkxU
UzwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+bmFtZSA9ICZxdW90O2d1
ZXN0JnF1b3Q7PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj4ja2VybmVs
ID0gJnF1b3Q7L3Zhci9saWIveGVuL2ltYWdlcy91YnVudHUtbmU8d2JyPnRib290L3hlbmlhbDE2
TFRTL3ZtbGludXomcXVvdDs8L2Rpdj48ZGl2PiNyYW1kaXNrID0gJnF1b3Q7L3Zhci9saWIveGVu
L2ltYWdlcy91YnVudHUtbmU8d2JyPnRib290L3hlbmlhbDE2TFRTL2luaXRyZC5neiZxdW90Ozwv
ZGl2PjxkaXY+Ym9vdGxvYWRlciA9ICZxdW90Oy91c3IvbGliL3hlbi00LjQvYmluL3B5Z3J1YiZx
dW90OzwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+bWVtb3J5ID0gMjA0
ODwvZGl2PjxkaXY+dmNwdXMgPSAxPC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+
PGRpdj48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5kaXNrID0gWyAmIzM5Oy9kZXYvaG9z
dC1kaXNrMi12Zy9ndWVzdC1kaXNrPHdicj4scmF3LHh2ZGEscncmIzM5OyBdPC9kaXY+PGRpdj48
YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRp
dj4jPC9kaXY+PGRpdj4jwqAgTmV0d29ya2luZzwvZGl2PjxkaXY+IzwvZGl2PjxkaXY+dmlmwqAg
wqAgwqAgwqAgwqA9IFsgJiMzOTtpcD14eHgueHh4Lnh4eC54eHggLG1hYz1BQTpCQjpDQzpERDpF
RTpGRiYjMzk7IF08L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PiM8L2Rp
dj48ZGl2PiPCoCBCZWhhdmlvdXI8L2Rpdj48ZGl2PiM8L2Rpdj48ZGl2Pm9uX3Bvd2Vyb2ZmID0g
JiMzOTtkZXN0cm95JiMzOTs8L2Rpdj48ZGl2Pm9uX3JlYm9vdMKgIMKgPSAmIzM5O3Jlc3RhcnQm
IzM5OzwvZGl2PjxkaXY+b25fY3Jhc2jCoCDCoCA9ICYjMzk7cmVzdGFydCYjMzk7PC9kaXY+PGRp
dj5gYGBgPC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5JIGFsc28gdHJpZWQgbGF1bmNoaW5nIHRo
ZSB2bSB3aXRoIHN0cmFjZSBvdXRwdXQgb2Y8L2Rpdj48ZGl2PmBgYGA8L2Rpdj48ZGl2PnN0cmFj
ZSB4bCBjcmVhdGUgLWMgZmlsZS5jZmfCoDwvZGl2PjxkaXY+YGBgYDwvZGl2PjxkaXY+aXMgaGVy
ZTogPGEgaHJlZj0iaHR0cHM6Ly9wYXN0ZWJpbi5jb20vOGN0UzNUUWgiIHRhcmdldD0iX2JsYW5r
Ij5odHRwczovL3Bhc3RlYmluLmNvbS84Y3RTM1RRaDwvYT48L2Rpdj48ZGl2Pjxicj48L2Rpdj48
ZGl2PkkmIzM5O20gYSBiaXQgbG9zdCBhcyB0byB0aGUgY2F1c2Ugb2YgdGhpcy4uLiBJIHdhcyBo
b3BpbmcgdG8ganVzdCB1cGdyYWRlIHRoZSBrZXJuZWwgZm9yIG1lbHRkb3duIGFuZCBzcGV0cmUs
IGJ1dCB0aGlzIGlzc3VlIEkmIzM5O3ZlIG5ldmVyIGZhY2VkIGJlZm9yZS4gSSB0aGluayBpdCBt
aWdodCBiZSByZWxhdGVkIHRvIHB5Z3J1YiBhbmQgdGhlIG5ldyBrZXJuZWw/IEkgZG9uJiMzOTt0
IGtub3cgZm9yIHN1cmUgdGhvdWdoIGFueXRoaW5nIEkgY2FuIGNoZWNrIHRvIGZpZ3VyZSB0aGlz
IG91dCBiZXR0ZXI/IFRoYW5rcy48L2Rpdj48ZGl2Pjxicj48L2Rpdj4NCjwvZGl2Pg0KPC9ibG9j
a3F1b3RlPjwvZGl2Pjxicj48L2Rpdj48L2Rpdj4NCg==
--94eb2c057296cb2bbe056297e7e7--


--===============0621201247944014167==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============0621201247944014167==--


From xen-users-bounces@lists.xenproject.org Fri Jan 12 19:27:24 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 19:27:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ea4y0-0000lg-6z; Fri, 12 Jan 2018 19:26:16 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=7yvv=eh=posteo.no=who.are.you@srs-us1.protection.inumbo.net>)
 id 1ea4xx-0000la-UP
 for xen-users@lists.xenproject.org; Fri, 12 Jan 2018 19:26:14 +0000
X-Inumbo-ID: 3f35b7ef-f7ce-11e7-b4a6-bc764e045a96
Received: from mout01.posteo.de (unknown [185.67.36.65])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 3f35b7ef-f7ce-11e7-b4a6-bc764e045a96;
 Fri, 12 Jan 2018 20:24:46 +0100 (CET)
Received: from submission (posteo.de [89.146.220.130]) 
 by mout01.posteo.de (Postfix) with ESMTPS id 1D9B220F1C
 for <xen-users@lists.xenproject.org>; Fri, 12 Jan 2018 20:26:08 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.no; s=2017;
 t=1515785168; bh=IMaB4MEvKVDrYoBT/mG3sAFYHnNMqpUvvjmNLHTKSs0=;
 h=Date:From:To:Subject:From;
 b=Xky+tqMvCiJtQaJKaUKVt8WPdhsGHVotF8AclLfX5OZfImbcp+X5smJY28ut7TCT4
 Pr2pQ+0gJmo5U4Q6bX4UVn676VZE08SWQiSaDcjJyx2/mYdH+E9pLKNBWYghPorNjM
 dKBrqRbCdKqcC7CqdHSPAydIReRbOSBv+I3XpCYBIbpeQka5t+aS7TCo4kl+R6q0Kd
 9PpCVeHGfiM1NDKoWVuffgL2j+TtGTk/fYZAIEiXrWtTXWfPznu3MU0sI30/pzd69r
 23FSIB1/wDRw94daURPp0YdBqLz5mgefBsPbzKbtm6uQ591Z6kXP1zuzWOnEm8eRx6
 mU6B7Ngp2wQVw==
Received: from customer (localhost [127.0.0.1])
 by submission (posteo.de) with ESMTPSA id 3zJCQl50qdz9rxM
 for <xen-users@lists.xenproject.org>; Fri, 12 Jan 2018 20:26:07 +0100 (CET)
Date: Fri, 12 Jan 2018 19:30:40 +0000
From: who.are.you@posteo.no
To: xen-users@lists.xenproject.org
Message-ID: <20180112193040.32bcwup3tktrygz4@email>
References: <mailman.447.1515779113.1149.xen-users@lists.xenproject.org>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <mailman.447.1515779113.1149.xen-users@lists.xenproject.org>
Subject: [Xen-users] Clarification on security advisory
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Fri Jan 12 23:38:40 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jan 2018 23:38:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ea8tB-0005Ks-52; Fri, 12 Jan 2018 23:37:33 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=dyuv=eh=gmail.com=dunlapg@srs-us1.protection.inumbo.net>)
 id 1ea8tA-0005Km-2K
 for xen-users@lists.xenproject.org; Fri, 12 Jan 2018 23:37:32 +0000
X-Inumbo-ID: 5c66dd37-f7f1-11e7-b4a6-bc764e045a96
Received: from mail-qt0-x241.google.com (unknown [2607:f8b0:400d:c0d::241])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 5c66dd37-f7f1-11e7-b4a6-bc764e045a96;
 Sat, 13 Jan 2018 00:36:07 +0100 (CET)
Received: by mail-qt0-x241.google.com with SMTP id a16so8028995qtj.3
 for <xen-users@lists.xenproject.org>; Fri, 12 Jan 2018 15:37:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:sender:in-reply-to:references:from:date:message-id
 :subject:to:cc;
 bh=ok/CX5G85DETpiUntxDspF1++yeAqJxZgPcqjMP62Js=;
 b=f1xzwvVlL4McsR07yqX1vnaVynYJteAY8pNqbe1Wt8usXXmxs+Em2L8DWDwsBcv28c
 kjLajFJJ7X1MIqHcW66CmhL5abkfIB9EEfBJsRrrk94x3J+H8oWi9wtAMviVaT4n6MMf
 ITgaKBdw3zPWb9zYpnF/rX6QLx2oGdkUSQ1Lw1/cDfT9KPfLD4r7M2jZZUiYcfAFeXbh
 s4L3Xon0ksPYTZNiCrBVRAj4D2Fv2k4erdPQ06Yj78BOKI/hY63lwv3SzoXtyd1v7E+Z
 IEKb308PF3xZDi4Ir5MtnnfCpGVKQdTELseu40bHtKDqNLuSGPV9v6W3hsDFkQsQj62u
 0vpg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
 :date:message-id:subject:to:cc;
 bh=ok/CX5G85DETpiUntxDspF1++yeAqJxZgPcqjMP62Js=;
 b=CwpoewdBLmLg0SgoMwZ1l01VYH4a7SroQUwg0TqdrIa9GNGQ68NEU7Opc/aEERaku1
 l35YteYwsVCEhnlW6k2X6zkcIzLRUbbMiZ42WM9wNpvyij8UZSPtaVMtmUlaJ5mjuMSx
 lMeOiUtcb4mYVk3fX6s+2W+igh7C3lH0BAgcDGpKk1uX0MrlEtZoSHNDF17ZAjXJymC1
 r2h132EqGpom2+JwzuBDyhGObRHAj/U9v9QTqEB3IDTqJA730OlqEnhqpRcD7Hjl/mec
 lqLxKxjyAwiKP3p00jtb5U8qTVlHaYcTHkhKJv9+JHD1dw5PA6xPkg0QOX6wyFVB/Xq2
 StKA==
X-Gm-Message-State: AKwxytdVxbDc4uZZu6sx9hfFr/JO+9sv+FG+s+APqZVS963ksaOJxt7u
 bglqxy6IzHlXTe0tH4AcA9SFwgnU1vGL5KGQp7Obhw==
X-Google-Smtp-Source: ACJfBos7dbhSKSmeDKF1fO6JzEZHaacNHnfFc2YwW7uOOKCon0TPXFFiLAit4FJ0iYaPIsv669QSBAJuinAtJD8i+8k=
X-Received: by 10.200.47.130 with SMTP id l2mr9146609qta.277.1515800250063;
 Fri, 12 Jan 2018 15:37:30 -0800 (PST)
MIME-Version: 1.0
Received: by 10.55.81.87 with HTTP; Fri, 12 Jan 2018 15:37:29 -0800 (PST)
In-Reply-To: <20180112193040.32bcwup3tktrygz4@email>
References: <mailman.447.1515779113.1149.xen-users@lists.xenproject.org>
 <20180112193040.32bcwup3tktrygz4@email>
From: George Dunlap <dunlapg@umich.edu>
Date: Fri, 12 Jan 2018 23:37:29 +0000
X-Google-Sender-Auth: CJB7tgNISnmRe1zJ7TtwHu_D5fA
Message-ID: <CAFLBxZb7W=o1H7zx6WiUSD0Pf=oZ0GgOf01fFbjA0GWk2Jb-0g@mail.gmail.com>
To: who.are.you@posteo.no
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] Clarification on security advisory
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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=

From xen-users-bounces@lists.xenproject.org Mon Jan 15 14:14:42 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jan 2018 14:14:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eb5W9-0003b5-Fw; Mon, 15 Jan 2018 14:13:41 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=0ehj=ek=gmail.com=ingy.sf.11@srs-us1.protection.inumbo.net>)
 id 1eb4NP-0006wa-5T
 for xen-users@lists.xenproject.org; Mon, 15 Jan 2018 13:00:35 +0000
X-Inumbo-ID: dcce04d1-f9f3-11e7-b4a6-bc764e045a96
Received: from mail-wr0-x241.google.com (unknown [2a00:1450:400c:c0c::241])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id dcce04d1-f9f3-11e7-b4a6-bc764e045a96;
 Mon, 15 Jan 2018 13:59:04 +0100 (CET)
Received: by mail-wr0-x241.google.com with SMTP id e41so11239619wre.9
 for <xen-users@lists.xenproject.org>; Mon, 15 Jan 2018 05:00:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=08Qf4uKHAhlDG8reDlTwLhWrjjWbPCMK57RCIM8PF0Y=;
 b=tvPk8wB1shxGIZCuw97FD22bJis3b1BNSj2I1b1uqvrUv3os2GbKxAtGaVHtLe/OPz
 m++9fVQUVPSaXHQWF68p0+ZoR+jAs1zSzz7TNFcizTKswGaDzw1ftm1ALoMvZeXZi/vZ
 0LlBvfluNUEXPTN2bu0k5mDSiPAhtkboywWWg2zdiom46Z7AgGhP+EOayd9kXtOlmVr7
 C645p022xH74s+/nHyrQsFdqNWB2Yc5cQnygPVTa4+yohlCrA6/Qau9QuaIR1IpMpXPb
 HQaDN5FcB24PPfkZrBkeet1XeIZ/WZCtkLAQVOOt0urIfJM5z/1eofC+T7nCnpIY1opy
 pT6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=08Qf4uKHAhlDG8reDlTwLhWrjjWbPCMK57RCIM8PF0Y=;
 b=bGnXvq1pZqXwNmPg+WD3HaxoxWTcv4mAEXHOvCTCN/1HaCZ1JiHZMpx7epvDJx0f/i
 bf7SFpkTO4PIT1tLKhAofnhl2yOW/f+tbAhbgBche3My4kxNL/sW1yQYecMdE/MMXAXt
 tqKFVVGEnG6z5gjOnzGw4h9cxVX3WlunjDwkwxCQoCXxUIkJmrxpG/igTqv3aZeqqbq4
 SbGKscJGM2xC00SeQHs91maGsmfip6N6i5OJ/e8KhIMHDAztYZpv5dHC3o6A1olhVhFq
 2I2WkbR6nnssgFXWPlGrkGcuWnAR88Z3z8Do5v1aZomBXnCbb63mDfgXPfP6f6yqPOAO
 I80Q==
X-Gm-Message-State: AKGB3mIhcijeoySOeMJwpiUJq6XCzH7gXkb7os7Dw6bDxp3TVTwD8Gap
 XTNn2Xp00HYz643k1MCL4wHT6oOH8+YI9sjQy1CtHA==
X-Google-Smtp-Source: ACJfBota4R8OOydo+t8Q4rq/+mbeLw2R0+7+buGvXlLrsj8AaaUTb1/EeBp649q+B1wv0+VxNI7eX/CZoWRUBhdn808=
X-Received: by 10.223.142.15 with SMTP id n15mr21006227wrb.97.1516021230201;
 Mon, 15 Jan 2018 05:00:30 -0800 (PST)
MIME-Version: 1.0
Received: by 10.28.210.132 with HTTP; Mon, 15 Jan 2018 05:00:29 -0800 (PST)
From: IngY Sf <ingy.sf.11@gmail.com>
Date: Mon, 15 Jan 2018 14:00:29 +0100
Message-ID: <CAJPvS85vXVgLrt8NV1LdZdm_JH6dO4-ZxYfupxU5EN2XHRtT2A@mail.gmail.com>
To: xen-users@lists.xenproject.org
X-Mailman-Approved-At: Mon, 15 Jan 2018 14:13:39 +0000
Subject: [Xen-users] HVM guest crash - QEMU 2.10.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1827769544602534884=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============1827769544602534884==
Content-Type: multipart/alternative; boundary="f403045d5816e5eecd0562d032b9"

--f403045d5816e5eecd0562d032b9
Content-Type: text/plain; charset="UTF-8"

Dear all,

I am facing a problem when creating a HVM guest.
Any idea?

root@intel-corei7-64:/opt/hvm# xl -vvvv create -c hvm.cfg
Parsing config from hvm.cfg
libxl: debug: libxl_create.c:1609:do_domain_create: Domain 0:ao 0x1855c10:
creat
e: how=(nil) callback=(nil) poller=0x1855ca0
libxl: debug: libxl_create.c:965:initiate_domain_create: Domain 3:running
bootlo
ader
libxl: debug: libxl_bootloader.c:328:libxl__bootloader_run: Domain 3:not a
PV do
main, skipping bootloader
libxl: debug: libxl_event.c:686:libxl__ev_xswatch_deregister: watch
w=0x1858560:
 deregister unregistered
domainbuilder: detail: xc_dom_allocate: cmdline="(null)", features="(null)"
domainbuilder: detail: xc_dom_kernel_file:
filename="/usr/lib/xen/boot/hvmloader
"
domainbuilder: detail: xc_dom_malloc_filemap    : 179 kB
libxl: debug: libxl_dom.c:901:libxl__load_hvm_firmware_module: Loading
BIOS: /op
t/hvm/bios.bin
domainbuilder: detail: xc_dom_boot_xen_init: ver 4.9, caps xen-3.0-x86_64
xen-3.
0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64
domainbuilder: detail: xc_dom_parse_image: called
domainbuilder: detail: xc_dom_find_loader: trying multiboot-binary loader
...
domainbuilder: detail: loader probe failed
domainbuilder: detail: xc_dom_find_loader: trying HVM-generic loader ...
domainbuilder: detail: loader probe OK
xc: detail: ELF: phdr: paddr=0x100000 memsz=0x352c4
xc: detail: ELF: memory: 0x100000 -> 0x1352c4
domainbuilder: detail: xc_dom_mem_init: mem 120 MB, pages 0x7800 pages, 4k
each
domainbuilder: detail: xc_dom_mem_init: 0x7800 pages
domainbuilder: detail: xc_dom_boot_mem_init: called
domainbuilder: detail: xc_dom_malloc            : 240 kB
xc: detail: PHYSICAL MEMORY ALLOCATION:
xc: detail:   4KB PAGES: 0x0000000000000200
xc: detail:   2MB PAGES: 0x000000000000003b
xc: detail:   1GB PAGES: 0x0000000000000000
domainbuilder: detail: xc_dom_build_image: called
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x100+0x36
at 0x7efecc9cd000
domainbuilder: detail: xc_dom_alloc_segment:   kernel       : 0x100000 ->
0x1360
00  (pfn 0x100 + 0x36 pages)
xc: detail: ELF: phdr 0 at 0x7efecc997000 -> 0x7efecc9c2840
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x136+0x40
at 0x7efecc98d000
domainbuilder: detail: xc_dom_alloc_segment:   System Firmware module :
0x136000
 -> 0x176000  (pfn 0x136 + 0x40 pages)
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x176+0x1 a
t 0x7efecc98c000
domainbuilder: detail: xc_dom_alloc_segment:   HVM start info : 0x176000 ->
0x17
7000  (pfn 0x176 + 0x1 pages)
domainbuilder: detail: alloc_pgtables_hvm: doing nothing
domainbuilder: detail: xc_dom_build_image  : virt_alloc_end : 0x177000
domainbuilder: detail: xc_dom_build_image  : virt_pgtab_end : 0x0
domainbuilder: detail: xc_dom_boot_image: called
domainbuilder: detail: xc_dom_compat_check: supported guest type:
xen-3.0-x86_64

domainbuilder: detail: xc_dom_compat_check: supported guest type:
xen-3.0-x86_32
p
domainbuilder: detail: xc_dom_compat_check: supported guest type:
hvm-3.0-x86_32
 <= matches
domainbuilder: detail: xc_dom_compat_check: supported guest type:
hvm-3.0-x86_32
p
domainbuilder: detail: xc_dom_compat_check: supported guest type:
hvm-3.0-x86_64

domainbuilder: detail: clear_page: pfn 0xfefff, mfn 0xfefff
domainbuilder: detail: clear_page: pfn 0xfeffc, mfn 0xfeffc
domainbuilder: detail: domain builder memory footprint
domainbuilder: detail:    allocated
domainbuilder: detail:       malloc             : 245 kB
domainbuilder: detail:       anon mmap          : 0 bytes
domainbuilder: detail:    mapped
domainbuilder: detail:       file mmap          : 179 kB
domainbuilder: detail:       domU mmap          : 476 kB
domainbuilder: detail: vcpu_hvm: called
(XEN) HVM3 save: CPU
(XEN) HVM3 save: PIC
(XEN) HVM3 save: IOAPIC
(XEN) HVM3 save: LAPIC
(XEN) HVM3 save: LAPIC_REGS
(XEN) HVM3 save: PCI_IRQ
(XEN) HVM3 save: ISA_IRQ
(XEN) HVM3 save: PCI_LINK
(XEN) HVM3 save: PIT
(XEN) HVM3 save: RTC
(XEN) HVM3 save: HPET
(XEN) HVM3 save: PMTIMER
(XEN) HVM3 save: MTRR
(XEN) HVM3 save: VIRIDIAN_DOMAIN
(XEN) HVM3 save: CPU_XSAVE
(XEN) HVM3 save: VIRIDIAN_VCPU
(XEN) HVM3 save: VMCE_VCPU
(XEN) HVM3 save: TSC_ADJUST
(XEN) HVM3 restore: CPU 0
domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=0xff000
domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=0xff001
domainbuilder: detail: xc_dom_release: called
libxl: debug: libxl_dm.c:1646:libxl__build_device_model_args_new: Domain
3:Could
 not find user xen-qemuuser-shared, starting QEMU as root
libxl: debug: libxl_dm.c:2243:libxl__spawn_local_dm: Domain 3:Spawning
device-mo
del /usr/bin/qemu-system-i386 with arguments:
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
/usr/bin/qemu-sy
stem-i386
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -xen-domid
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  3
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -chardev
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
socket,id=libxl-
cmd,path=/var/run/xen/qmp-libxl-3,server,nowait
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -no-shutdown
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -mon
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
chardev=libxl-cm
d,mode=control
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -chardev
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
socket,id=libxen
stat-cmd,path=/var/run/xen/qmp-libxenstat-3,server,nowait
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -mon
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
chardev=libxenst
at-cmd,mode=control
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -nodefaults
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
-no-user-config
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -name
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  hvm
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -vnc
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  127.0.0.1:0
,to=9
9
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -display
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  none
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -kernel
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
/opt/hvm/vmlinuz
-4.4.1
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -initrd
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
/opt/hvm/ramdisk
_x86.8.img.gz
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -device
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
cirrus-vga,vgame
m_mb=8
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -boot
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  order=cda
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -smp
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  2,maxcpus=2
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -net
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  none
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -machine
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  xenfv
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -m
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  120
libxl: debug: libxl_dm.c:2247:libxl__spawn_local_dm: Domain 3:Spawning
device-mo
del /usr/bin/qemu-system-i386 with additional environment:
libxl: debug: libxl_dm.c:2249:libxl__spawn_local_dm: Domain 3:
XEN_QEMU_CONSOLE
_LIMIT=1048576
libxl: debug: libxl_event.c:636:libxl__ev_xswatch_register: watch
w=0x1858858 wp
ath=/local/domain/0/device-model/3/state token=3/0: register slotnum=3
libxl: debug: libxl_create.c:1646:do_domain_create: Domain 0:ao 0x1855c10:
inpro
gress: poller=0x1855ca0, flags=i
libxl: debug: libxl_event.c:573:watchfd_callback: watch w=0x1858858
wpath=/local
/domain/0/device-model/3/state token=3/0: event
epath=/local/domain/0/device-mod
el/3/state
libxl: debug: libxl_exec.c:398:spawn_watch_event: domain 3 device model:
spawn w
atch p=(null)
libxl: debug: libxl_event.c:573:watchfd_callback: watch w=0x1858858
wpath=/local
/domain/0/device-model/3/state token=3/0: event
epath=/local/domain/0/device-mod
el/3/state
libxl: debug: libxl_exec.c:398:spawn_watch_event: domain 3 device model:
spawn w
atch p=running
libxl: debug: libxl_event.c:673:libxl__ev_xswatch_deregister: watch
w=0x1858858
wpath=/local/domain/0/device-model/3/state token=3/0: deregister slotnum=3
libxl: debug: libxl_exec.c:129:libxl_report_child_exitstatus: domain 3
device mo
del (dying as expected) [1812] died due to fatal signal Killed
libxl: debug: libxl_event.c:686:libxl__ev_xswatch_deregister: watch
w=0x1858858:
 deregister unregistered
libxl: debug: libxl_qmp.c:707:libxl__qmp_initialize: Domain 3:connected to
/var/
run/xen/qmp-libxl-3
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
qmp
libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "qmp_capabilities",
    "id": 1
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "query-chardev",
    "id": 2
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "query-vnc",
    "id": 3
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_event.c:2194:libxl__ao_progress_report: ao 0x1855c10:
progre
ss report: callback queued aop=0x18577f0
libxl: debug: libxl_event.c:1869:libxl__ao_complete: ao 0x1855c10:
complete, rc=
0
libxl: debug: libxl_event.c:1404:egc_run_callbacks: ao 0x1855c10: progress
repor
t: callback aop=0x18577f0
libxl: debug: libxl_event.c:1838:libxl__ao__destroy: ao 0x1855c10: destroy
libxl: debug: libxl_qmp.c:707:libxl__qmp_initialize: Domain 3:connected to
/var/
run/xen/qmp-libxl-3
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
qmp
libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "qmp_capabilities",
    "id": 1
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "cont",
    "id": 2
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

(d3) HVM Loader
(d3) Detected Xen v4.9-unstable
(d3) Xenbus rings @0xfeffc000, event channel 1
(d3) System requested SeaBIOS
(d3) CPU speed is 1333 MHz
(d3) Relocating guest memory for lowmem MMIO space disabled
(XEN) irq.c:275: Dom3 PCI link 0 changed 0 -> 5
(d3) PCI-ISA link 0 routed to IRQ5
(XEN) irq.c:275: Dom3 PCI link 1 changed 0 -> 10
(d3) PCI-ISA link 1 routed to IRQ10
(XEN) irq.c:275: Dom3 PCI link 2 changed 0 -> 11
(d3) PCI-ISA link 2 routed to IRQ11
(XEN) irq.c:275: Dom3 PCI link 3 changed 0 -> 5
(d3) PCI-ISA link 3 routed to IRQ5
(d3) pci dev 01:3 INTA->IRQ10
(d3) pci dev 02:0 INTA->IRQ11
(XEN) d3v0 Triple fault - invoking HVM shutdown action 1
(XEN) *** Dumping Dom3 vcpu#0 state: ***
(XEN) ----[ Xen-4.9-unstable  x86_64  debug=y   Not tainted ]----
(XEN) CPU:    1
(XEN) RIP:    0018:[<0000000000105153>]
(XEN) RFLAGS: 0000000000010046   CONTEXT: hvm guest (d3v0)
(XEN) rax: 0000000000000000   rbx: 0000000000007800   rcx: 0000000000000000
(XEN) rdx: 0000000000000000   rsi: 000000000c000000   rdi: 000000000009f800
(XEN) rbp: 000000000000ffff   rsp: 000000000012f700   r8:  0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
(XEN) r15: 0000000000000000   cr0: 0000000000000011   cr4: 0000000000000000
(XEN) cr3: 0000000000000000   cr2: 0000000000000000
(XEN) ds: 0020   es: 0020   fs: 0020   gs: 0020   ss: 0020   cs: 0018
xencall:buffer: debug: total allocations:183 total releases:183
xencall:buffer: debug: current allocations:0 maximum allocations:3
xencall:buffer: debug: cache current size:3
xencall:buffer: debug: cache hits:167 misses:3 toobig:13
xencall:buffer: debug: total allocations:0 total releases:0
xencall:buffer: debug: current allocations:0 maximum allocations:0
xencall:buffer: debug: cache current size:0
xencall:buffer: debug: cache hits:0 misses:0 toobig:0

Best Regards,

--f403045d5816e5eecd0562d032b9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Dear all,</div><div><br></div><div>I am facing a prob=
lem when creating a HVM guest.</div><div>Any idea?</div><div><br></div><div=
>root@intel-corei7-64:/opt/hvm# xl -vvvv create -c hvm.cfg</div><div>Parsin=
g config from hvm.cfg</div><div>libxl: debug: libxl_create.c:1609:do_domain=
_create: Domain 0:ao 0x1855c10: creat</div><div>e: how=3D(nil) callback=3D(=
nil) poller=3D0x1855ca0</div><div>libxl: debug: libxl_create.c:965:initiate=
_domain_create: Domain 3:running bootlo</div><div>ader</div><div>libxl: deb=
ug: libxl_bootloader.c:328:libxl__bootloader_run: Domain 3:not a PV do</div=
><div>main, skipping bootloader</div><div>libxl: debug: libxl_event.c:686:l=
ibxl__ev_xswatch_deregister: watch w=3D0x1858560:</div><div>=C2=A0deregiste=
r unregistered</div><div>domainbuilder: detail: xc_dom_allocate: cmdline=3D=
&quot;(null)&quot;, features=3D&quot;(null)&quot;</div><div>domainbuilder: =
detail: xc_dom_kernel_file: filename=3D&quot;/usr/lib/xen/boot/hvmloader</d=
iv><div>&quot;</div><div>domainbuilder: detail: xc_dom_malloc_filemap=C2=A0=
 =C2=A0 : 179 kB</div><div>libxl: debug: libxl_dom.c:901:libxl__load_hvm_fi=
rmware_module: Loading BIOS: /op</div><div>t/hvm/bios.bin</div><div>domainb=
uilder: detail: xc_dom_boot_xen_init: ver 4.9, caps xen-3.0-x86_64 xen-3.</=
div><div>0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64</div><div>=
domainbuilder: detail: xc_dom_parse_image: called</div><div>domainbuilder: =
detail: xc_dom_find_loader: trying multiboot-binary loader ...</div><div>do=
mainbuilder: detail: loader probe failed</div><div>domainbuilder: detail: x=
c_dom_find_loader: trying HVM-generic loader ...</div><div>domainbuilder: d=
etail: loader probe OK</div><div>xc: detail: ELF: phdr: paddr=3D0x100000 me=
msz=3D0x352c4</div><div>xc: detail: ELF: memory: 0x100000 -&gt; 0x1352c4</d=
iv><div>domainbuilder: detail: xc_dom_mem_init: mem 120 MB, pages 0x7800 pa=
ges, 4k each</div><div>domainbuilder: detail: xc_dom_mem_init: 0x7800 pages=
</div><div>domainbuilder: detail: xc_dom_boot_mem_init: called</div><div>do=
mainbuilder: detail: xc_dom_malloc=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 : 240 kB</div><div>xc: detail: PHYSICAL MEMORY ALLOCATION:</div><div>xc: d=
etail:=C2=A0 =C2=A04KB PAGES: 0x0000000000000200</div><div>xc: detail:=C2=
=A0 =C2=A02MB PAGES: 0x000000000000003b</div><div>xc: detail:=C2=A0 =C2=A01=
GB PAGES: 0x0000000000000000</div><div>domainbuilder: detail: xc_dom_build_=
image: called</div><div>domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: =
domU mapping: pfn 0x100+0x36</div><div>at 0x7efecc9cd000</div><div>domainbu=
ilder: detail: xc_dom_alloc_segment:=C2=A0 =C2=A0kernel=C2=A0 =C2=A0 =C2=A0=
 =C2=A0: 0x100000 -&gt; 0x1360</div><div>00=C2=A0 (pfn 0x100 + 0x36 pages)<=
/div><div>xc: detail: ELF: phdr 0 at 0x7efecc997000 -&gt; 0x7efecc9c2840</d=
iv><div>domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pf=
n 0x136+0x40</div><div>at 0x7efecc98d000</div><div>domainbuilder: detail: x=
c_dom_alloc_segment:=C2=A0 =C2=A0System Firmware module : 0x136000</div><di=
v>=C2=A0-&gt; 0x176000=C2=A0 (pfn 0x136 + 0x40 pages)</div><div>domainbuild=
er: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn 0x176+0x1 a</div>=
<div>t 0x7efecc98c000</div><div>domainbuilder: detail: xc_dom_alloc_segment=
:=C2=A0 =C2=A0HVM start info : 0x176000 -&gt; 0x17</div><div>7000=C2=A0 (pf=
n 0x176 + 0x1 pages)</div><div>domainbuilder: detail: alloc_pgtables_hvm: d=
oing nothing</div><div>domainbuilder: detail: xc_dom_build_image=C2=A0 : vi=
rt_alloc_end : 0x177000</div><div>domainbuilder: detail: xc_dom_build_image=
=C2=A0 : virt_pgtab_end : 0x0</div><div>domainbuilder: detail: xc_dom_boot_=
image: called</div><div>domainbuilder: detail: xc_dom_compat_check: support=
ed guest type: xen-3.0-x86_64</div><div><br></div><div>domainbuilder: detai=
l: xc_dom_compat_check: supported guest type: xen-3.0-x86_32</div><div>p</d=
iv><div>domainbuilder: detail: xc_dom_compat_check: supported guest type: h=
vm-3.0-x86_32</div><div>=C2=A0&lt;=3D matches</div><div>domainbuilder: deta=
il: xc_dom_compat_check: supported guest type: hvm-3.0-x86_32</div><div>p</=
div><div>domainbuilder: detail: xc_dom_compat_check: supported guest type: =
hvm-3.0-x86_64</div><div><br></div><div>domainbuilder: detail: clear_page: =
pfn 0xfefff, mfn 0xfefff</div><div>domainbuilder: detail: clear_page: pfn 0=
xfeffc, mfn 0xfeffc</div><div>domainbuilder: detail: domain builder memory =
footprint</div><div>domainbuilder: detail:=C2=A0 =C2=A0 allocated</div><div=
>domainbuilder: detail:=C2=A0 =C2=A0 =C2=A0 =C2=A0malloc=C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 245 kB</div><div>domainbuilder: detail:=C2=
=A0 =C2=A0 =C2=A0 =C2=A0anon mmap=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 0 byt=
es</div><div>domainbuilder: detail:=C2=A0 =C2=A0 mapped</div><div>domainbui=
lder: detail:=C2=A0 =C2=A0 =C2=A0 =C2=A0file mmap=C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 : 179 kB</div><div>domainbuilder: detail:=C2=A0 =C2=A0 =C2=A0 =
=C2=A0domU mmap=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 476 kB</div><div>domain=
builder: detail: vcpu_hvm: called</div><div>(XEN) HVM3 save: CPU</div><div>=
(XEN) HVM3 save: PIC</div><div>(XEN) HVM3 save: IOAPIC</div><div>(XEN) HVM3=
 save: LAPIC</div><div>(XEN) HVM3 save: LAPIC_REGS</div><div>(XEN) HVM3 sav=
e: PCI_IRQ</div><div>(XEN) HVM3 save: ISA_IRQ</div><div>(XEN) HVM3 save: PC=
I_LINK</div><div>(XEN) HVM3 save: PIT</div><div>(XEN) HVM3 save: RTC</div><=
div>(XEN) HVM3 save: HPET</div><div>(XEN) HVM3 save: PMTIMER</div><div>(XEN=
) HVM3 save: MTRR</div><div>(XEN) HVM3 save: VIRIDIAN_DOMAIN</div><div>(XEN=
) HVM3 save: CPU_XSAVE</div><div>(XEN) HVM3 save: VIRIDIAN_VCPU</div><div>(=
XEN) HVM3 save: VMCE_VCPU</div><div>(XEN) HVM3 save: TSC_ADJUST</div><div>(=
XEN) HVM3 restore: CPU 0</div><div>domainbuilder: detail: xc_dom_gnttab_hvm=
_seed: called, pfn=3D0xff000</div><div>domainbuilder: detail: xc_dom_gnttab=
_hvm_seed: called, pfn=3D0xff001</div><div>domainbuilder: detail: xc_dom_re=
lease: called</div><div>libxl: debug: libxl_dm.c:1646:libxl__build_device_m=
odel_args_new: Domain 3:Could</div><div>=C2=A0not find user xen-qemuuser-sh=
ared, starting QEMU as root</div><div>libxl: debug: libxl_dm.c:2243:libxl__=
spawn_local_dm: Domain 3:Spawning device-mo</div><div>del /usr/bin/qemu-sys=
tem-i386 with arguments:</div><div>libxl: debug: libxl_dm.c:2245:libxl__spa=
wn_local_dm: Domain 3:=C2=A0 /usr/bin/qemu-sy</div><div>stem-i386</div><div=
>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -xen-=
domid</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain=
 3:=C2=A0 3</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: =
Domain 3:=C2=A0 -chardev</div><div>libxl: debug: libxl_dm.c:2245:libxl__spa=
wn_local_dm: Domain 3:=C2=A0 socket,id=3Dlibxl-</div><div>cmd,path=3D/var/r=
un/xen/qmp-libxl-3,server,nowait</div><div>libxl: debug: libxl_dm.c:2245:li=
bxl__spawn_local_dm: Domain 3:=C2=A0 -no-shutdown</div><div>libxl: debug: l=
ibxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -mon</div><div>libxl:=
 debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 chardev=3Dli=
bxl-cm</div><div>d,mode=3Dcontrol</div><div>libxl: debug: libxl_dm.c:2245:l=
ibxl__spawn_local_dm: Domain 3:=C2=A0 -chardev</div><div>libxl: debug: libx=
l_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 socket,id=3Dlibxen</div>=
<div>stat-cmd,path=3D/var/run/xen/qmp-libxenstat-3,server,nowait</div><div>=
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -mon</=
div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=
=A0 chardev=3Dlibxenst</div><div>at-cmd,mode=3Dcontrol</div><div>libxl: deb=
ug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -nodefaults</div=
><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 =
-no-user-config</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_=
dm: Domain 3:=C2=A0 -name</div><div>libxl: debug: libxl_dm.c:2245:libxl__sp=
awn_local_dm: Domain 3:=C2=A0 hvm</div><div>libxl: debug: libxl_dm.c:2245:l=
ibxl__spawn_local_dm: Domain 3:=C2=A0 -vnc</div><div>libxl: debug: libxl_dm=
.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 <a href=3D"http://127.0.0.1:=
0">127.0.0.1:0</a>,to=3D9</div><div>9</div><div>libxl: debug: libxl_dm.c:22=
45:libxl__spawn_local_dm: Domain 3:=C2=A0 -display</div><div>libxl: debug: =
libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 none</div><div>libxl=
: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -kernel</di=
v><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0=
 /opt/hvm/vmlinuz</div><div>-4.4.1</div><div>libxl: debug: libxl_dm.c:2245:=
libxl__spawn_local_dm: Domain 3:=C2=A0 -initrd</div><div>libxl: debug: libx=
l_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 /opt/hvm/ramdisk</div><d=
iv>_x86.8.img.gz</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local=
_dm: Domain 3:=C2=A0 -device</div><div>libxl: debug: libxl_dm.c:2245:libxl_=
_spawn_local_dm: Domain 3:=C2=A0 cirrus-vga,vgame</div><div>m_mb=3D8</div><=
div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -b=
oot</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3=
:=C2=A0 order=3Dcda</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_lo=
cal_dm: Domain 3:=C2=A0 -smp</div><div>libxl: debug: libxl_dm.c:2245:libxl_=
_spawn_local_dm: Domain 3:=C2=A0 2,maxcpus=3D2</div><div>libxl: debug: libx=
l_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -net</div><div>libxl: de=
bug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 none</div><div>=
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=C2=A0 -machi=
ne</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:=
=C2=A0 xenfv</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm:=
 Domain 3:=C2=A0 -m</div><div>libxl: debug: libxl_dm.c:2245:libxl__spawn_lo=
cal_dm: Domain 3:=C2=A0 120</div><div>libxl: debug: libxl_dm.c:2247:libxl__=
spawn_local_dm: Domain 3:Spawning device-mo</div><div>del /usr/bin/qemu-sys=
tem-i386 with additional environment:</div><div>libxl: debug: libxl_dm.c:22=
49:libxl__spawn_local_dm: Domain 3:=C2=A0 XEN_QEMU_CONSOLE</div><div>_LIMIT=
=3D1048576</div><div>libxl: debug: libxl_event.c:636:libxl__ev_xswatch_regi=
ster: watch w=3D0x1858858 wp</div><div>ath=3D/local/domain/0/device-model/3=
/state token=3D3/0: register slotnum=3D3</div><div>libxl: debug: libxl_crea=
te.c:1646:do_domain_create: Domain 0:ao 0x1855c10: inpro</div><div>gress: p=
oller=3D0x1855ca0, flags=3Di</div><div>libxl: debug: libxl_event.c:573:watc=
hfd_callback: watch w=3D0x1858858 wpath=3D/local</div><div>/domain/0/device=
-model/3/state token=3D3/0: event epath=3D/local/domain/0/device-mod</div><=
div>el/3/state</div><div>libxl: debug: libxl_exec.c:398:spawn_watch_event: =
domain 3 device model: spawn w</div><div>atch p=3D(null)</div><div>libxl: d=
ebug: libxl_event.c:573:watchfd_callback: watch w=3D0x1858858 wpath=3D/loca=
l</div><div>/domain/0/device-model/3/state token=3D3/0: event epath=3D/loca=
l/domain/0/device-mod</div><div>el/3/state</div><div>libxl: debug: libxl_ex=
ec.c:398:spawn_watch_event: domain 3 device model: spawn w</div><div>atch p=
=3Drunning</div><div>libxl: debug: libxl_event.c:673:libxl__ev_xswatch_dere=
gister: watch w=3D0x1858858</div><div>wpath=3D/local/domain/0/device-model/=
3/state token=3D3/0: deregister slotnum=3D3</div><div>libxl: debug: libxl_e=
xec.c:129:libxl_report_child_exitstatus: domain 3 device mo</div><div>del (=
dying as expected) [1812] died due to fatal signal Killed</div><div>libxl: =
debug: libxl_event.c:686:libxl__ev_xswatch_deregister: watch w=3D0x1858858:=
</div><div>=C2=A0deregister unregistered</div><div>libxl: debug: libxl_qmp.=
c:707:libxl__qmp_initialize: Domain 3:connected to /var/</div><div>run/xen/=
qmp-libxl-3</div><div>libxl: debug: libxl_qmp.c:296:qmp_handle_response: Do=
main 3:message type: qmp</div><div>libxl: debug: libxl_qmp.c:556:qmp_send_p=
repare: Domain 3:next qmp command: &#39;{</div><div>=C2=A0 =C2=A0 &quot;exe=
cute&quot;: &quot;qmp_capabilities&quot;,</div><div>=C2=A0 =C2=A0 &quot;id&=
quot;: 1</div><div>}</div><div>&#39;</div><div>libxl: debug: libxl_qmp.c:29=
6:qmp_handle_response: Domain 3:message type: return</div><div><br></div><d=
iv>libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp comman=
d: &#39;{</div><div>=C2=A0 =C2=A0 &quot;execute&quot;: &quot;query-chardev&=
quot;,</div><div>=C2=A0 =C2=A0 &quot;id&quot;: 2</div><div>}</div><div>&#39=
;</div><div>libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:mes=
sage type: return</div><div><br></div><div>libxl: debug: libxl_qmp.c:556:qm=
p_send_prepare: Domain 3:next qmp command: &#39;{</div><div>=C2=A0 =C2=A0 &=
quot;execute&quot;: &quot;query-vnc&quot;,</div><div>=C2=A0 =C2=A0 &quot;id=
&quot;: 3</div><div>}</div><div>&#39;</div><div>libxl: debug: libxl_qmp.c:2=
96:qmp_handle_response: Domain 3:message type: return</div><div><br></div><=
div>libxl: debug: libxl_event.c:2194:libxl__ao_progress_report: ao 0x1855c1=
0: progre</div><div>ss report: callback queued aop=3D0x18577f0</div><div>li=
bxl: debug: libxl_event.c:1869:libxl__ao_complete: ao 0x1855c10: complete, =
rc=3D</div><div>0</div><div>libxl: debug: libxl_event.c:1404:egc_run_callba=
cks: ao 0x1855c10: progress repor</div><div>t: callback aop=3D0x18577f0</di=
v><div>libxl: debug: libxl_event.c:1838:libxl__ao__destroy: ao 0x1855c10: d=
estroy</div><div>libxl: debug: libxl_qmp.c:707:libxl__qmp_initialize: Domai=
n 3:connected to /var/</div><div>run/xen/qmp-libxl-3</div><div>libxl: debug=
: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type: qmp</div><div=
>libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:=
 &#39;{</div><div>=C2=A0 =C2=A0 &quot;execute&quot;: &quot;qmp_capabilities=
&quot;,</div><div>=C2=A0 =C2=A0 &quot;id&quot;: 1</div><div>}</div><div>&#3=
9;</div><div>libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:me=
ssage type: return</div><div><br></div><div>libxl: debug: libxl_qmp.c:556:q=
mp_send_prepare: Domain 3:next qmp command: &#39;{</div><div>=C2=A0 =C2=A0 =
&quot;execute&quot;: &quot;cont&quot;,</div><div>=C2=A0 =C2=A0 &quot;id&quo=
t;: 2</div><div>}</div><div>&#39;</div><div>libxl: debug: libxl_qmp.c:296:q=
mp_handle_response: Domain 3:message type: return</div><div><br></div><div>=
(d3) HVM Loader</div><div>(d3) Detected Xen v4.9-unstable</div><div>(d3) Xe=
nbus rings @0xfeffc000, event channel 1</div><div>(d3) System requested Sea=
BIOS</div><div>(d3) CPU speed is 1333 MHz</div><div>(d3) Relocating guest m=
emory for lowmem MMIO space disabled</div><div>(XEN) irq.c:275: Dom3 PCI li=
nk 0 changed 0 -&gt; 5</div><div>(d3) PCI-ISA link 0 routed to IRQ5</div><d=
iv>(XEN) irq.c:275: Dom3 PCI link 1 changed 0 -&gt; 10</div><div>(d3) PCI-I=
SA link 1 routed to IRQ10</div><div>(XEN) irq.c:275: Dom3 PCI link 2 change=
d 0 -&gt; 11</div><div>(d3) PCI-ISA link 2 routed to IRQ11</div><div>(XEN) =
irq.c:275: Dom3 PCI link 3 changed 0 -&gt; 5</div><div>(d3) PCI-ISA link 3 =
routed to IRQ5</div><div>(d3) pci dev 01:3 INTA-&gt;IRQ10</div><div>(d3) pc=
i dev 02:0 INTA-&gt;IRQ11</div><div>(XEN) d3v0 Triple fault - invoking HVM =
shutdown action 1</div><div>(XEN) *** Dumping Dom3 vcpu#0 state: ***</div><=
div>(XEN) ----[ Xen-4.9-unstable=C2=A0 x86_64=C2=A0 debug=3Dy=C2=A0 =C2=A0N=
ot tainted ]----</div><div>(XEN) CPU:=C2=A0 =C2=A0 1</div><div>(XEN) RIP:=
=C2=A0 =C2=A0 0018:[&lt;0000000000105153&gt;]</div><div>(XEN) RFLAGS: 00000=
00000010046=C2=A0 =C2=A0CONTEXT: hvm guest (d3v0)</div><div>(XEN) rax: 0000=
000000000000=C2=A0 =C2=A0rbx: 0000000000007800=C2=A0 =C2=A0rcx: 00000000000=
00000</div><div>(XEN) rdx: 0000000000000000=C2=A0 =C2=A0rsi: 000000000c0000=
00=C2=A0 =C2=A0rdi: 000000000009f800</div><div>(XEN) rbp: 000000000000ffff=
=C2=A0 =C2=A0rsp: 000000000012f700=C2=A0 =C2=A0r8:=C2=A0 0000000000000000</=
div><div>(XEN) r9:=C2=A0 0000000000000000=C2=A0 =C2=A0r10: 0000000000000000=
=C2=A0 =C2=A0r11: 0000000000000000</div><div>(XEN) r12: 0000000000000000=C2=
=A0 =C2=A0r13: 0000000000000000=C2=A0 =C2=A0r14: 0000000000000000</div><div=
>(XEN) r15: 0000000000000000=C2=A0 =C2=A0cr0: 0000000000000011=C2=A0 =C2=A0=
cr4: 0000000000000000</div><div>(XEN) cr3: 0000000000000000=C2=A0 =C2=A0cr2=
: 0000000000000000</div><div>(XEN) ds: 0020=C2=A0 =C2=A0es: 0020=C2=A0 =C2=
=A0fs: 0020=C2=A0 =C2=A0gs: 0020=C2=A0 =C2=A0ss: 0020=C2=A0 =C2=A0cs: 0018<=
/div><div>xencall:buffer: debug: total allocations:183 total releases:183</=
div><div>xencall:buffer: debug: current allocations:0 maximum allocations:3=
</div><div>xencall:buffer: debug: cache current size:3</div><div>xencall:bu=
ffer: debug: cache hits:167 misses:3 toobig:13</div><div>xencall:buffer: de=
bug: total allocations:0 total releases:0</div><div>xencall:buffer: debug: =
current allocations:0 maximum allocations:0</div><div>xencall:buffer: debug=
: cache current size:0</div><div>xencall:buffer: debug: cache hits:0 misses=
:0 toobig:0</div><div><br></div><div>Best Regards,</div><div><br></div></di=
v>

--f403045d5816e5eecd0562d032b9--


--===============1827769544602534884==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============1827769544602534884==--


From xen-users-bounces@lists.xenproject.org Mon Jan 15 14:14:42 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jan 2018 14:14:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eb5W9-0003as-5g; Mon, 15 Jan 2018 14:13:41 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=kxi5=ek=gmail.com=lukmanabrahim@srs-us1.protection.inumbo.net>)
 id 1eayKr-0004I4-AO
 for xen-users@lists.xenproject.org; Mon, 15 Jan 2018 06:33:33 +0000
X-Inumbo-ID: cc889166-f9bd-11e7-b4a6-bc764e045a96
Received: from mail-qk0-x22a.google.com (unknown [2607:f8b0:400d:c09::22a])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id cc889166-f9bd-11e7-b4a6-bc764e045a96;
 Mon, 15 Jan 2018 07:32:03 +0100 (CET)
Received: by mail-qk0-x22a.google.com with SMTP id d21so15660837qkj.3
 for <xen-users@lists.xenproject.org>; Sun, 14 Jan 2018 22:33:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=6KJ7z2gKkVaS3iTnUCcoTj5yKgWGhlEgw6w/047Wgaw=;
 b=JMaK/W8+bI14WuU+U/3eQX+KuDvp9KLmEaFIGTbfF1Ghvvpi3s+nJsO4oEpFw+t6fp
 ghJw8uTOvP52HQ24BeZVxSwctVaQ2rI+eWDCkA9ClOxIqSWgMw/3JclWJPA2Tt/oRFPE
 ooAJWNVzM4VaiE836hvNxj3FeF+2WD7Dt1jyF4avY38Q7kxaG9Svd+sXR5SrjF7xWY6E
 sEtABHkCZPPpAB2KiaGk0Gp2AHJvvJoDbBygrsPLCPhXvstbUvTioUfSfecoNb7ZIkUf
 9UxgxFmhgeaDmYLeA6gUtWaMtNnLGeUSBTfMAXFb41wHkC97nwRaFS6PVSxpEot+Frgx
 UMGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=6KJ7z2gKkVaS3iTnUCcoTj5yKgWGhlEgw6w/047Wgaw=;
 b=IHccVuuu2WvkWkPtqe53Vv2QYeAnRIRM70osy2HggSFllJcpDoAnh7BBPXuG53ZOz7
 A9ZhXGYUR+fNO97MTz4iy1JHoHqf29q6t0kxYRsD8gP8Rg8QIa+ZpqEuRHi/PHr0eNGO
 StVs8WWtKWk09LQBTsGn7LWCEXSnuYYEatUuWFrW92TqoxBXL7Oo+AWvHCQJo1mk7h1z
 ODz2Xht802cvQkSpglCki2zJ2l/KgYDqh3auxH6QIz+I9e80N5OaI9q4aXPrWtVxXA2W
 8gL7QSIYn0jLxUlQiG0nDxpaLMhPMqdN9XGAuA/ib4gdg87Z5aJ8DzqAO3sB0f/l2kuJ
 Pl0g==
X-Gm-Message-State: AKGB3mJmnQU5u4FPGDnuaTZdBgLYluKKIKG6sqM29B6jx9Rwy1iUvefF
 7Cyjchmj+TzyMstS2Oj9vGsQblIPx37Ir1Zb50k=
X-Google-Smtp-Source: ACJfBosiX3pIhMiJx0+qD0gENmKB9Sy4BvP5mSzh4uIxs3DC52HghhOzLVL6rTxSDE8kU/f9eQN0vs/65GkhhDTQz3Y=
X-Received: by 10.55.138.68 with SMTP id m65mr35676035qkd.166.1515998010103;
 Sun, 14 Jan 2018 22:33:30 -0800 (PST)
MIME-Version: 1.0
Received: by 10.12.156.75 with HTTP; Sun, 14 Jan 2018 22:33:29 -0800 (PST)
From: Lukman ab rahim <lukmanabrahim@gmail.com>
Date: Mon, 15 Jan 2018 14:33:29 +0800
Message-ID: <CAPOvpTJ+QtY5DjZ6J2O7M=Z+br7F3zasx6p6UTKTW3vLP+3wfA@mail.gmail.com>
To: xen-users@lists.xenproject.org
X-Mailman-Approved-At: Mon, 15 Jan 2018 14:13:39 +0000
Subject: [Xen-users] Installing RT-Xen in XenServer
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3423664469604863271=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============3423664469604863271==
Content-Type: multipart/alternative; boundary="94eb2c0761d2df5e410562cacadf"

--94eb2c0761d2df5e410562cacadf
Content-Type: text/plain; charset="UTF-8"

Hi.

I have a workstation that is running Citrix XenServer 7. I am installing
XenServer as a baremetal hypervisor. I hope you can answer these questions:

Will I make the XenServer real-time by installing the RT-Xen into XenServer?
How do I install RT-Xen in a workstation with XenServer?

Thank you.

Best regards,

-- 
Lukman

--94eb2c0761d2df5e410562cacadf
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi.<div><br></div><div>I have a workstation that is runnin=
g Citrix XenServer 7. I am installing XenServer as a baremetal hypervisor. =
I hope you can answer these questions:</div><div><br></div><div>Will I make=
 the XenServer real-time by installing the RT-Xen into XenServer?</div><div=
>How do I install RT-Xen in a workstation with XenServer?</div><div><br></d=
iv><div>Thank you.</div><div><br></div><div>Best regards,<br clear=3D"all">=
<div><br></div>-- <br><div class=3D"gmail_signature" data-smartmail=3D"gmai=
l_signature">Lukman</div>
</div></div>

--94eb2c0761d2df5e410562cacadf--


--===============3423664469604863271==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============3423664469604863271==--


From xen-users-bounces@lists.xenproject.org Mon Jan 15 22:03:19 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jan 2018 22:03:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebCpI-0004Pu-F9; Mon, 15 Jan 2018 22:01:56 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=lw5w=ek=free.fr=s.peron@srs-us1.protection.inumbo.net>)
 id 1ebCpH-0004Po-RO
 for xen-users@lists.xenproject.org; Mon, 15 Jan 2018 22:01:55 +0000
X-Inumbo-ID: 06914b2f-fa40-11e7-b0d7-9f685aff125f
Received: from mo17.mail-out.ovh.net (unknown [178.32.228.17])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 06914b2f-fa40-11e7-b0d7-9f685aff125f;
 Mon, 15 Jan 2018 22:04:15 +0000 (UTC)
Received: from [192.168.1.67] (172-58-190-109.dsl.ovh.fr [109.190.58.172])
 by mo17.mail-out.ovh.net (Postfix) with ESMTP id E3A65147B23
 for <xen-users@lists.xenproject.org>; Mon, 15 Jan 2018 23:01:48 +0100 (CET)
To: xen-users@lists.xenproject.org
From: =?UTF-8?Q?St=c3=a9phane_PERON?= <s.peron@free.fr>
Message-ID: <54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr>
Date: Mon, 15 Jan 2018 23:01:48 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
Content-Language: fr
X-Ovh-Tracer-Id: 2651775758673399103
X-VR-SPAMSTATE: OK
X-VR-SPAMSCORE: 0
X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedtuddrleekgdduheekucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuqfggjfdpvefjgfevmfevgfenuceurghilhhouhhtmecufedttdenuc
Subject: [Xen-users] can't access to qemu console
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Tue Jan 16 08:35:17 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jan 2018 08:35:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebMh6-00074e-4y; Tue, 16 Jan 2018 08:34:08 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=pcne=el=free.fr=s.peron@srs-us1.protection.inumbo.net>)
 id 1ebMh4-00074W-WD
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 08:34:07 +0000
X-Inumbo-ID: cd8f4259-fa97-11e7-b4a6-bc764e045a96
Received: from mo18.mail-out.ovh.net (unknown [178.32.228.18])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id cd8f4259-fa97-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 09:32:36 +0100 (CET)
Received: from [192.168.1.67] (172-58-190-109.dsl.ovh.fr [109.190.58.172])
 by mo18.mail-out.ovh.net (Postfix) with ESMTP id 724181D60A5
 for <xen-users@lists.xenproject.org>; Tue, 16 Jan 2018 09:34:03 +0100 (CET)
To: xen-users@lists.xenproject.org
References: <54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr>
From: =?UTF-8?Q?St=c3=a9phane_PERON?= <s.peron@free.fr>
Message-ID: <8472a9ae-b7ef-f9ac-02da-e14f32abca8d@free.fr>
Date: Tue, 16 Jan 2018 09:33:59 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr>
Content-Language: fr
X-Ovh-Tracer-Id: 13329247524072213823
X-VR-SPAMSTATE: OK
X-VR-SPAMSCORE: 0
X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedtuddrleelgdduvdduucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuqfggjfdpvefjgfevmfevgfenuceurghilhhouhhtmecufedttdenuc
Subject: Re: [Xen-users] can't access to qemu console
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============5395422386271724883=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--===============5395422386271724883==
Content-Type: multipart/alternative;
 boundary="------------0063C78FFBA8BB13F56E66C9"
Content-Language: fr

This is a multi-part message in MIME format.
--------------0063C78FFBA8BB13F56E66C9
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

As I understand, xl console seems to be a way to connect the console of 
the OS hosted by the VM

But it is the qemu administration console that I try to use... In order 
to use "usb_add" command for example...

Could someone explain to me how doing that ?

Because, when I start my vm with an "xl create", it creates a qemu 
session *detached* from my console. So I have no mean to do "ctrl + Alt 
+ 2" as it is written on several web pages.

Thanks

Stéphane

Le 15/01/2018 à 23:01, Stéphane PERON a écrit :
> Hi all,
>
> I'm an happy user of xen for several years ... :-)
>
> Today, I would like to use to qemu console.
>
> So, I tried the command :
>
> xl console my_launched_vm
>
> And then, nothing ...
>
> I tried : Alt + Ctrl + 2
>
> Alt + 2 ... nothing .. I can't write any word
>
> The only command I can do is : Ctrl + Alt + ]    to leave the console.
>
> So my question is : How can I write a command in qemu console ??
>
> Thanks a lot for your help
>
> Stéphane
>
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users


--------------0063C78FFBA8BB13F56E66C9
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>As I understand, xl console seems to be a way to connect the
      console of the OS hosted by the VM <br>
    </p>
    <p>But it is the qemu administration console that I try to use... In
      order to use "usb_add" command for example... <br>
    </p>
    <p>Could someone explain to me how doing that ?</p>
    <p>Because, when I start my vm with an "xl create", it creates a
      qemu session <b>detached</b> from my console. So I have no mean
      to do "ctrl + Alt + 2" as it is written on several web pages.<br>
    </p>
    Thanks<br>
    <br>
    Stéphane<br>
    <br>
    <div class="moz-cite-prefix">Le 15/01/2018 à 23:01, Stéphane PERON a
      écrit :<br>
    </div>
    <blockquote type="cite"
      cite="mid:54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr">Hi all,
      <br>
      <br>
      I'm an happy user of xen for several years ... :-)
      <br>
      <br>
      Today, I would like to use to qemu console.
      <br>
      <br>
      So, I tried the command :
      <br>
      <br>
      xl console my_launched_vm
      <br>
      <br>
      And then, nothing ...
      <br>
      <br>
      I tried : Alt + Ctrl + 2
      <br>
      <br>
      Alt + 2 ... nothing .. I can't write any word
      <br>
      <br>
      The only command I can do is : Ctrl + Alt + ]    to leave the
      console.
      <br>
      <br>
      So my question is : How can I write a command in qemu console ??
      <br>
      <br>
      Thanks a lot for your help
      <br>
      <br>
      Stéphane
      <br>
      <br>
      <br>
      _______________________________________________
      <br>
      Xen-users mailing list
      <br>
      <a class="moz-txt-link-abbreviated" href="mailto:Xen-users@lists.xenproject.org">Xen-users@lists.xenproject.org</a>
      <br>
      <a class="moz-txt-link-freetext" href="https://lists.xenproject.org/mailman/listinfo/xen-users">https://lists.xenproject.org/mailman/listinfo/xen-users</a><br>
    </blockquote>
    <br>
  </body>
</html>

--------------0063C78FFBA8BB13F56E66C9--


--===============5395422386271724883==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============5395422386271724883==--


From xen-users-bounces@lists.xenproject.org Tue Jan 16 13:34:51 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jan 2018 13:34:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebRN0-0005cT-2Q; Tue, 16 Jan 2018 13:33:42 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=9zp6=el=kota.moe=nospam@srs-us1.protection.inumbo.net>)
 id 1ebRMz-0005cJ-EY
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 13:33:41 +0000
X-Inumbo-ID: a5c424ec-fac1-11e7-b4a6-bc764e045a96
Received: from mail-qk0-x234.google.com (unknown [2607:f8b0:400d:c09::234])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id a5c424ec-fac1-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 14:32:07 +0100 (CET)
Received: by mail-qk0-x234.google.com with SMTP id l64so20742271qke.13
 for <xen-users@lists.xenproject.org>; Tue, 16 Jan 2018 05:33:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kota.moe; s=google;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=TlSY9pttvlMUercYVpQCcGv599RnNI538ou4ulWwSes=;
 b=ZRje7AFYc/b5OfUhvo7lgNgpfd47I5yQWKTc0gmEYCMGQjWXBF6xs+w9CQcHe6Op3h
 OVX0zM3+g1E7eXB5oasJIKCSHnaCvznycBHrKZMMzcLO+QZrp/h5ZgxYBGGAfJEoSi+F
 OBGstOJKSMO5yKMYEZ8icw83BxdLrMR5/ipNk=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=TlSY9pttvlMUercYVpQCcGv599RnNI538ou4ulWwSes=;
 b=jEdeTJqMNT9hY1FUV7XN5NOrsVl2+TVb7i/27G7jEjEq8uSQrBgwyEjkPhf/7Z/7Z7
 vCDh6/g7ERYnJ8CJ6foejS4qfOAriJIXH5NZeoeG2l7o/h+Obb6nkywF9xpZz+yMA/mn
 5dNMkkZR6fww/RtQbs1ZNiRoKTMfznH7isvPBKSWBxjbIc/nx18BvQRI4MU46LlBsLlH
 9EG69ZddHfAmLSgzxWjRQpjQCI0dvXb8hrR4L3ruxkbvZybwwpDjIrMmWHEykjlj52CF
 nv3P90LRJD/QPce5LJRqpG3mq5knAAUXCIKipxpTXZbaTUO+3k0SdRNLfGE8ObKi4NtB
 JNdw==
X-Gm-Message-State: AKwxyteFRyRUZKuq4Jdmbi/vyttKALSNOTmWD1PZTevw/OxYHdW80EDh
 W78TAe2nV/jwMmSbL5r6BK5sapdumzqxgL3GfnS9cw==
X-Google-Smtp-Source: ACJfBosnfWq8CnrR9vhyfYPserjXGdklM76WDnX4y6hpCwlbxjqNwcarfydY6oNubgKRScKLsD6tRPg9bJKnul8555Q=
X-Received: by 10.55.212.129 with SMTP id s1mr55670865qks.44.1516109616653;
 Tue, 16 Jan 2018 05:33:36 -0800 (PST)
MIME-Version: 1.0
Received: by 10.200.37.40 with HTTP; Tue, 16 Jan 2018 05:32:56 -0800 (PST)
In-Reply-To: <8472a9ae-b7ef-f9ac-02da-e14f32abca8d@free.fr>
References: <54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr>
 <8472a9ae-b7ef-f9ac-02da-e14f32abca8d@free.fr>
From: =?UTF-8?B?4oCN5bCP5aSq?= <nospam@kota.moe>
Date: Wed, 17 Jan 2018 00:32:56 +1100
Message-ID: <CACsxjPZgNRxiWvdvgtTUn7JTkEdSgTSWPLBsBUPvZSjZBUnB1g@mail.gmail.com>
To: =?UTF-8?Q?St=C3=A9phane_PERON?= <s.peron@free.fr>
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] can't access to qemu console
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2085170217073983115=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============2085170217073983115==
Content-Type: multipart/alternative; boundary="001a1149e23a243ea70562e4c72b"

--001a1149e23a243ea70562e4c72b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

xl qemu-monitor-command <guest name> <qemu console command>

will let you run arbitrary qemu console commands.
I don't know how to open an interactive qemu console though.

On 16 January 2018 at 19:33, St=C3=A9phane PERON <s.peron@free.fr> wrote:

> As I understand, xl console seems to be a way to connect the console of
> the OS hosted by the VM
>
> But it is the qemu administration console that I try to use... In order t=
o
> use "usb_add" command for example...
>
> Could someone explain to me how doing that ?
>
> Because, when I start my vm with an "xl create", it creates a qemu sessio=
n
> *detached* from my console. So I have no mean to do "ctrl + Alt + 2" as
> it is written on several web pages.
> Thanks
>
> St=C3=A9phane
>
> Le 15/01/2018 =C3=A0 23:01, St=C3=A9phane PERON a =C3=A9crit :
>
> Hi all,
>
> I'm an happy user of xen for several years ... :-)
>
> Today, I would like to use to qemu console.
>
> So, I tried the command :
>
> xl console my_launched_vm
>
> And then, nothing ...
>
> I tried : Alt + Ctrl + 2
>
> Alt + 2 ... nothing .. I can't write any word
>
> The only command I can do is : Ctrl + Alt + ]    to leave the console.
>
> So my question is : How can I write a command in qemu console ??
>
> Thanks a lot for your help
>
> St=C3=A9phane
>
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users
>
>
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users
>

--001a1149e23a243ea70562e4c72b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>xl qemu-monitor-command &lt;guest name&gt; &lt;q=
emu console command&gt;<br><br></div>will let you run arbitrary qemu consol=
e commands.<br></div>I don&#39;t know how to open an interactive qemu conso=
le though.<br></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quot=
e">On 16 January 2018 at 19:33, St=C3=A9phane PERON <span dir=3D"ltr">&lt;<=
a href=3D"mailto:s.peron@free.fr" target=3D"_blank">s.peron@free.fr</a>&gt;=
</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div text=3D"#000000" bgcolor=3D"#FFFFFF">
    <p>As I understand, xl console seems to be a way to connect the
      console of the OS hosted by the VM <br>
    </p>
    <p>But it is the qemu administration console that I try to use... In
      order to use &quot;usb_add&quot; command for example... <br>
    </p>
    <p>Could someone explain to me how doing that ?</p>
    <p>Because, when I start my vm with an &quot;xl create&quot;, it create=
s a
      qemu session <b>detached</b> from my console. So I have no mean
      to do &quot;ctrl + Alt + 2&quot; as it is written on several web page=
s.<br>
    </p>
    Thanks<br>
    <br>
    St=C3=A9phane<br>
    <br>
    <div class=3D"m_1387209969888051763moz-cite-prefix">Le 15/01/2018 =C3=
=A0 23:01, St=C3=A9phane PERON a
      =C3=A9crit=C2=A0:<br>
    </div>
    <blockquote type=3D"cite">Hi all,
      <br>
      <br>
      I&#39;m an happy user of xen for several years ... :-)
      <br>
      <br>
      Today, I would like to use to qemu console.
      <br>
      <br>
      So, I tried the command :
      <br>
      <br>
      xl console my_launched_vm
      <br>
      <br>
      And then, nothing ...
      <br>
      <br>
      I tried : Alt + Ctrl + 2
      <br>
      <br>
      Alt + 2 ... nothing .. I can&#39;t write any word
      <br>
      <br>
      The only command I can do is : Ctrl + Alt + ]=C2=A0=C2=A0=C2=A0 to le=
ave the
      console.
      <br>
      <br>
      So my question is : How can I write a command in qemu console ??
      <br>
      <br>
      Thanks a lot for your help
      <br>
      <br>
      St=C3=A9phane
      <br>
      <br>
      <br>
      ______________________________<wbr>_________________
      <br>
      Xen-users mailing list
      <br>
      <a class=3D"m_1387209969888051763moz-txt-link-abbreviated" href=3D"ma=
ilto:Xen-users@lists.xenproject.org" target=3D"_blank">Xen-users@lists.xenp=
roject.org</a>
      <br>
      <a class=3D"m_1387209969888051763moz-txt-link-freetext" href=3D"https=
://lists.xenproject.org/mailman/listinfo/xen-users" target=3D"_blank">https=
://lists.xenproject.org/<wbr>mailman/listinfo/xen-users</a><br>
    </blockquote>
    <br>
  </div>

<br>______________________________<wbr>_________________<br>
Xen-users mailing list<br>
<a href=3D"mailto:Xen-users@lists.xenproject.org">Xen-users@lists.xenprojec=
t.org</a><br>
<a href=3D"https://lists.xenproject.org/mailman/listinfo/xen-users" rel=3D"=
noreferrer" target=3D"_blank">https://lists.xenproject.org/<wbr>mailman/lis=
tinfo/xen-users</a><br></blockquote></div><br></div>

--001a1149e23a243ea70562e4c72b--


--===============2085170217073983115==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============2085170217073983115==--


From xen-users-bounces@lists.xenproject.org Tue Jan 16 13:50:07 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jan 2018 13:50:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebRcc-0006pn-3M; Tue, 16 Jan 2018 13:49:50 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=pcne=el=free.fr=s.peron@srs-us1.protection.inumbo.net>)
 id 1ebRca-0006pg-15
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 13:49:48 +0000
X-Inumbo-ID: e6b98ae9-fac3-11e7-b4a6-bc764e045a96
Received: from mo18.mail-out.ovh.net (unknown [178.32.228.18])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id e6b98ae9-fac3-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 14:48:16 +0100 (CET)
Received: from [192.168.1.65] (172-58-190-109.dsl.ovh.fr [109.190.58.172])
 by mo18.mail-out.ovh.net (Postfix) with ESMTP id 40FBE1D650F
 for <xen-users@lists.xenproject.org>; Tue, 16 Jan 2018 14:49:44 +0100 (CET)
To: xen-users@lists.xenproject.org
References: <54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr>
 <8472a9ae-b7ef-f9ac-02da-e14f32abca8d@free.fr>
 <CACsxjPZgNRxiWvdvgtTUn7JTkEdSgTSWPLBsBUPvZSjZBUnB1g@mail.gmail.com>
From: =?UTF-8?Q?St=c3=a9phane_PERON?= <s.peron@free.fr>
Message-ID: <32c94ff4-9b31-6c71-ab44-18c996174b38@free.fr>
Date: Tue, 16 Jan 2018 14:49:43 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <CACsxjPZgNRxiWvdvgtTUn7JTkEdSgTSWPLBsBUPvZSjZBUnB1g@mail.gmail.com>
Content-Language: fr
X-Ovh-Tracer-Id: 213920984786619711
X-VR-SPAMSTATE: OK
X-VR-SPAMSCORE: 0
X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedtvddrtddtgdefkecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucfqggfjpdevjffgvefmvefgnecuuegrihhlohhuthemuceftddtnecu
Subject: Re: [Xen-users] can't access to qemu console
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8269390499897618918=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--===============8269390499897618918==
Content-Type: multipart/alternative;
 boundary="------------99283B35A01888EB1E6C2634"
Content-Language: fr

This is a multi-part message in MIME format.
--------------99283B35A01888EB1E6C2634
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Thanks not !! But not implemented in xen 4.6



Le 16/01/2018 à 14:32, ‍小太 a écrit :
> xl qemu-monitor-command <guest name> <qemu console command>
>
> will let you run arbitrary qemu console commands.
> I don't know how to open an interactive qemu console though.
>
> On 16 January 2018 at 19:33, Stéphane PERON <s.peron@free.fr 
> <mailto:s.peron@free.fr>> wrote:
>
>     As I understand, xl console seems to be a way to connect the
>     console of the OS hosted by the VM
>
>     But it is the qemu administration console that I try to use... In
>     order to use "usb_add" command for example...
>
>     Could someone explain to me how doing that ?
>
>     Because, when I start my vm with an "xl create", it creates a qemu
>     session *detached* from my console. So I have no mean to do "ctrl
>     + Alt + 2" as it is written on several web pages.
>
>     Thanks
>
>     Stéphane
>
>     Le 15/01/2018 à 23:01, Stéphane PERON a écrit :
>>     Hi all,
>>
>>     I'm an happy user of xen for several years ... :-)
>>
>>     Today, I would like to use to qemu console.
>>
>>     So, I tried the command :
>>
>>     xl console my_launched_vm
>>
>>     And then, nothing ...
>>
>>     I tried : Alt + Ctrl + 2
>>
>>     Alt + 2 ... nothing .. I can't write any word
>>
>>     The only command I can do is : Ctrl + Alt + ]    to leave the
>>     console.
>>
>>     So my question is : How can I write a command in qemu console ??
>>
>>     Thanks a lot for your help
>>
>>     Stéphane
>>
>>
>>     _______________________________________________
>>     Xen-users mailing list
>>     Xen-users@lists.xenproject.org
>>     <mailto:Xen-users@lists.xenproject.org>
>>     https://lists.xenproject.org/mailman/listinfo/xen-users
>>     <https://lists.xenproject.org/mailman/listinfo/xen-users>
>
>
>     _______________________________________________
>     Xen-users mailing list
>     Xen-users@lists.xenproject.org <mailto:Xen-users@lists.xenproject.org>
>     https://lists.xenproject.org/mailman/listinfo/xen-users
>     <https://lists.xenproject.org/mailman/listinfo/xen-users>
>
>


--------------99283B35A01888EB1E6C2634
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Thanks not !! But not implemented in xen 4.6</p>
    <p><br>
    </p>
    <br>
    <div class="moz-cite-prefix">Le 16/01/2018 à 14:32, ‍小太 a écrit :<br>
    </div>
    <blockquote type="cite"
cite="mid:CACsxjPZgNRxiWvdvgtTUn7JTkEdSgTSWPLBsBUPvZSjZBUnB1g@mail.gmail.com">
      <div dir="ltr">
        <div>
          <div>xl qemu-monitor-command &lt;guest name&gt; &lt;qemu
            console command&gt;<br>
            <br>
          </div>
          will let you run arbitrary qemu console commands.<br>
        </div>
        I don't know how to open an interactive qemu console though.<br>
      </div>
      <div class="gmail_extra"><br>
        <div class="gmail_quote">On 16 January 2018 at 19:33, Stéphane
          PERON <span dir="ltr">&lt;<a href="mailto:s.peron@free.fr"
              target="_blank" moz-do-not-send="true">s.peron@free.fr</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div text="#000000" bgcolor="#FFFFFF">
              <p>As I understand, xl console seems to be a way to
                connect the console of the OS hosted by the VM <br>
              </p>
              <p>But it is the qemu administration console that I try to
                use... In order to use "usb_add" command for example...
                <br>
              </p>
              <p>Could someone explain to me how doing that ?</p>
              <p>Because, when I start my vm with an "xl create", it
                creates a qemu session <b>detached</b> from my console.
                So I have no mean to do "ctrl + Alt + 2" as it is
                written on several web pages.<br>
              </p>
              Thanks<br>
              <br>
              Stéphane<br>
              <br>
              <div class="m_1387209969888051763moz-cite-prefix">Le
                15/01/2018 à 23:01, Stéphane PERON a écrit :<br>
              </div>
              <blockquote type="cite">Hi all, <br>
                <br>
                I'm an happy user of xen for several years ... :-) <br>
                <br>
                Today, I would like to use to qemu console. <br>
                <br>
                So, I tried the command : <br>
                <br>
                xl console my_launched_vm <br>
                <br>
                And then, nothing ... <br>
                <br>
                I tried : Alt + Ctrl + 2 <br>
                <br>
                Alt + 2 ... nothing .. I can't write any word <br>
                <br>
                The only command I can do is : Ctrl + Alt + ]    to
                leave the console. <br>
                <br>
                So my question is : How can I write a command in qemu
                console ?? <br>
                <br>
                Thanks a lot for your help <br>
                <br>
                Stéphane <br>
                <br>
                <br>
                ______________________________<wbr>_________________ <br>
                Xen-users mailing list <br>
                <a class="m_1387209969888051763moz-txt-link-abbreviated"
                  href="mailto:Xen-users@lists.xenproject.org"
                  target="_blank" moz-do-not-send="true">Xen-users@lists.xenproject.org</a>
                <br>
                <a class="m_1387209969888051763moz-txt-link-freetext"
                  href="https://lists.xenproject.org/mailman/listinfo/xen-users"
                  target="_blank" moz-do-not-send="true">https://lists.xenproject.org/<wbr>mailman/listinfo/xen-users</a><br>
              </blockquote>
              <br>
            </div>
            <br>
            ______________________________<wbr>_________________<br>
            Xen-users mailing list<br>
            <a href="mailto:Xen-users@lists.xenproject.org"
              moz-do-not-send="true">Xen-users@lists.xenproject.org</a><br>
            <a
              href="https://lists.xenproject.org/mailman/listinfo/xen-users"
              rel="noreferrer" target="_blank" moz-do-not-send="true">https://lists.xenproject.org/<wbr>mailman/listinfo/xen-users</a><br>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------99283B35A01888EB1E6C2634--


--===============8269390499897618918==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============8269390499897618918==--


From xen-users-bounces@lists.xenproject.org Tue Jan 16 14:05:22 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jan 2018 14:05:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebRrE-0000Qj-DQ; Tue, 16 Jan 2018 14:04:56 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=pcne=el=free.fr=s.peron@srs-us1.protection.inumbo.net>)
 id 1ebRrE-0000Qd-4i
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 14:04:56 +0000
X-Inumbo-ID: 0451d0c8-fac6-11e7-b4a6-bc764e045a96
Received: from mo18.mail-out.ovh.net (unknown [178.32.228.18])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 0451d0c8-fac6-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 15:03:24 +0100 (CET)
Received: from [192.168.1.65] (172-58-190-109.dsl.ovh.fr [109.190.58.172])
 by mo18.mail-out.ovh.net (Postfix) with ESMTP id 0C29C1D6010
 for <xen-users@lists.xenproject.org>; Tue, 16 Jan 2018 15:04:52 +0100 (CET)
To: xen-users@lists.xenproject.org
References: <54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr>
 <8472a9ae-b7ef-f9ac-02da-e14f32abca8d@free.fr>
 <CACsxjPZgNRxiWvdvgtTUn7JTkEdSgTSWPLBsBUPvZSjZBUnB1g@mail.gmail.com>
 <32c94ff4-9b31-6c71-ab44-18c996174b38@free.fr>
From: =?UTF-8?Q?St=c3=a9phane_PERON?= <s.peron@free.fr>
Message-ID: <4b16c8c3-39b9-f854-90fa-a73169e7e376@free.fr>
Date: Tue, 16 Jan 2018 15:04:52 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <32c94ff4-9b31-6c71-ab44-18c996174b38@free.fr>
Content-Language: fr
X-Ovh-Tracer-Id: 469781737934114111
X-VR-SPAMSTATE: OK
X-VR-SPAMSCORE: 0
X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedtvddrtddtgdegvdcutefuodetggdotefrodftvfcurfhrohhfihhlvgemucfqggfjpdevjffgvefmvefgnecuuegrihhlohhuthemuceftddtnecu
Subject: Re: [Xen-users] can't access to qemu console
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============5852359924659070586=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--===============5852359924659070586==
Content-Type: multipart/alternative;
 boundary="------------4C8998B0BF94969F2CEA24A3"
Content-Language: fr

This is a multi-part message in MIME format.
--------------4C8998B0BF94969F2CEA24A3
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Sorry ... I wanted to say  .. thanks a lot ;-)


Le 16/01/2018 à 14:49, Stéphane PERON a écrit :
>
> Thanks not !! But not implemented in xen 4.6
>
>
>
> Le 16/01/2018 à 14:32, ‍小太 a écrit :
>> xl qemu-monitor-command <guest name> <qemu console command>
>>
>> will let you run arbitrary qemu console commands.
>> I don't know how to open an interactive qemu console though.
>>
>> On 16 January 2018 at 19:33, Stéphane PERON <s.peron@free.fr 
>> <mailto:s.peron@free.fr>> wrote:
>>
>>     As I understand, xl console seems to be a way to connect the
>>     console of the OS hosted by the VM
>>
>>     But it is the qemu administration console that I try to use... In
>>     order to use "usb_add" command for example...
>>
>>     Could someone explain to me how doing that ?
>>
>>     Because, when I start my vm with an "xl create", it creates a
>>     qemu session *detached* from my console. So I have no mean to do
>>     "ctrl + Alt + 2" as it is written on several web pages.
>>
>>     Thanks
>>
>>     Stéphane
>>
>>     Le 15/01/2018 à 23:01, Stéphane PERON a écrit :
>>>     Hi all,
>>>
>>>     I'm an happy user of xen for several years ... :-)
>>>
>>>     Today, I would like to use to qemu console.
>>>
>>>     So, I tried the command :
>>>
>>>     xl console my_launched_vm
>>>
>>>     And then, nothing ...
>>>
>>>     I tried : Alt + Ctrl + 2
>>>
>>>     Alt + 2 ... nothing .. I can't write any word
>>>
>>>     The only command I can do is : Ctrl + Alt + ]    to leave the
>>>     console.
>>>
>>>     So my question is : How can I write a command in qemu console ??
>>>
>>>     Thanks a lot for your help
>>>
>>>     Stéphane
>>>
>>>
>>>     _______________________________________________
>>>     Xen-users mailing list
>>>     Xen-users@lists.xenproject.org
>>>     <mailto:Xen-users@lists.xenproject.org>
>>>     https://lists.xenproject.org/mailman/listinfo/xen-users
>>>     <https://lists.xenproject.org/mailman/listinfo/xen-users>
>>
>>
>>     _______________________________________________
>>     Xen-users mailing list
>>     Xen-users@lists.xenproject.org
>>     <mailto:Xen-users@lists.xenproject.org>
>>     https://lists.xenproject.org/mailman/listinfo/xen-users
>>     <https://lists.xenproject.org/mailman/listinfo/xen-users>
>>
>>
>
>
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users


--------------4C8998B0BF94969F2CEA24A3
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Sorry ... I wanted to say  .. thanks a lot ;-)<br>
    </p>
    <br>
    <div class="moz-cite-prefix">Le 16/01/2018 à 14:49, Stéphane PERON a
      écrit :<br>
    </div>
    <blockquote type="cite"
      cite="mid:32c94ff4-9b31-6c71-ab44-18c996174b38@free.fr">
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
      <p>Thanks not !! But not implemented in xen 4.6</p>
      <p><br>
      </p>
      <br>
      <div class="moz-cite-prefix">Le 16/01/2018 à 14:32, ‍小太 a écrit :<br>
      </div>
      <blockquote type="cite"
cite="mid:CACsxjPZgNRxiWvdvgtTUn7JTkEdSgTSWPLBsBUPvZSjZBUnB1g@mail.gmail.com">
        <div dir="ltr">
          <div>
            <div>xl qemu-monitor-command &lt;guest name&gt; &lt;qemu
              console command&gt;<br>
              <br>
            </div>
            will let you run arbitrary qemu console commands.<br>
          </div>
          I don't know how to open an interactive qemu console though.<br>
        </div>
        <div class="gmail_extra"><br>
          <div class="gmail_quote">On 16 January 2018 at 19:33, Stéphane
            PERON <span dir="ltr">&lt;<a href="mailto:s.peron@free.fr"
                target="_blank" moz-do-not-send="true">s.peron@free.fr</a>&gt;</span>
            wrote:<br>
            <blockquote class="gmail_quote" style="margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div text="#000000" bgcolor="#FFFFFF">
                <p>As I understand, xl console seems to be a way to
                  connect the console of the OS hosted by the VM <br>
                </p>
                <p>But it is the qemu administration console that I try
                  to use... In order to use "usb_add" command for
                  example... <br>
                </p>
                <p>Could someone explain to me how doing that ?</p>
                <p>Because, when I start my vm with an "xl create", it
                  creates a qemu session <b>detached</b> from my
                  console. So I have no mean to do "ctrl + Alt + 2" as
                  it is written on several web pages.<br>
                </p>
                Thanks<br>
                <br>
                Stéphane<br>
                <br>
                <div class="m_1387209969888051763moz-cite-prefix">Le
                  15/01/2018 à 23:01, Stéphane PERON a écrit :<br>
                </div>
                <blockquote type="cite">Hi all, <br>
                  <br>
                  I'm an happy user of xen for several years ... :-) <br>
                  <br>
                  Today, I would like to use to qemu console. <br>
                  <br>
                  So, I tried the command : <br>
                  <br>
                  xl console my_launched_vm <br>
                  <br>
                  And then, nothing ... <br>
                  <br>
                  I tried : Alt + Ctrl + 2 <br>
                  <br>
                  Alt + 2 ... nothing .. I can't write any word <br>
                  <br>
                  The only command I can do is : Ctrl + Alt + ]    to
                  leave the console. <br>
                  <br>
                  So my question is : How can I write a command in qemu
                  console ?? <br>
                  <br>
                  Thanks a lot for your help <br>
                  <br>
                  Stéphane <br>
                  <br>
                  <br>
                  ______________________________<wbr>_________________ <br>
                  Xen-users mailing list <br>
                  <a
                    class="m_1387209969888051763moz-txt-link-abbreviated"
                    href="mailto:Xen-users@lists.xenproject.org"
                    target="_blank" moz-do-not-send="true">Xen-users@lists.xenproject.org</a>
                  <br>
                  <a class="m_1387209969888051763moz-txt-link-freetext"
href="https://lists.xenproject.org/mailman/listinfo/xen-users"
                    target="_blank" moz-do-not-send="true">https://lists.xenproject.org/<wbr>mailman/listinfo/xen-users</a><br>
                </blockquote>
                <br>
              </div>
              <br>
              ______________________________<wbr>_________________<br>
              Xen-users mailing list<br>
              <a href="mailto:Xen-users@lists.xenproject.org"
                moz-do-not-send="true">Xen-users@lists.xenproject.org</a><br>
              <a
                href="https://lists.xenproject.org/mailman/listinfo/xen-users"
                rel="noreferrer" target="_blank" moz-do-not-send="true">https://lists.xenproject.org/<wbr>mailman/listinfo/xen-users</a><br>
            </blockquote>
          </div>
          <br>
        </div>
      </blockquote>
      <br>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
Xen-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Xen-users@lists.xenproject.org">Xen-users@lists.xenproject.org</a>
<a class="moz-txt-link-freetext" href="https://lists.xenproject.org/mailman/listinfo/xen-users">https://lists.xenproject.org/mailman/listinfo/xen-users</a></pre>
    </blockquote>
    <br>
  </body>
</html>

--------------4C8998B0BF94969F2CEA24A3--


--===============5852359924659070586==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============5852359924659070586==--


From xen-users-bounces@lists.xenproject.org Tue Jan 16 14:46:58 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jan 2018 14:46:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebSVN-0004WV-AI; Tue, 16 Jan 2018 14:46:25 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=s5io=el=gmail.com=lars.kurth.xen@srs-us1.protection.inumbo.net>)
 id 1ebSVM-0004W5-Dd
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 14:46:24 +0000
X-Inumbo-ID: cf86ee17-facb-11e7-b4a6-bc764e045a96
Received: from mail-wr0-x22a.google.com (unknown [2a00:1450:400c:c0c::22a])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id cf86ee17-facb-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 15:44:53 +0100 (CET)
Received: by mail-wr0-x22a.google.com with SMTP id d9so15444371wre.3;
 Tue, 16 Jan 2018 06:46:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:message-id:mime-version:subject:date:in-reply-to:cc:to
 :references; bh=Qp1Sza2v4cUcaymcgVT06tftjXl5kIHRvJEe4R98cJ8=;
 b=MDW+4iMTnYKbail2p9ENCXVg0vmUMYCiMYB+sJrIhzh67uK8Ltsxtdtj3qyKmhbpTG
 24oboajDZ7OlJxytKalTU55da/WvreOqLESRJXO6IZ5v9WdljG7wbMl+gXVCNWKmAyVF
 z4C3rsdMxueTBBexQDy5pxIcA1IdDw8uNeXWiamiBfQm/YJSV6ok7TsShd+6jFrB6/ZH
 fpWNSNfg/zQefwBu+sH9x1oCToc9k8a2S4zYCQItWCJ2CHPW8knIlYux+mAKOVsJ/QQi
 ZsHM2WHvwTen8tApes5CdLxWhgqB3SkmMdxcxGfyIVSncCyvcA4vBf5cSmcM+2p8VSgv
 X9RA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:message-id:mime-version:subject:date
 :in-reply-to:cc:to:references;
 bh=Qp1Sza2v4cUcaymcgVT06tftjXl5kIHRvJEe4R98cJ8=;
 b=oYZfrcPH6e8mFNOP+PMtLHdaM2vyim5F6u2e8HZ8wdrxSmoAdK3MdGpP0ppvtwfFXc
 97v4cpyUkEGqOa6tFtUm62CSD+JPI+joL/qAdNsifA8K4CJPiPRZASZWo/If4BOE6BI9
 LrUDbU277oRPeQbc/M0DmqQm6q9G692zTy6wGAK9JtdS7H0iEqtlqzC0lBJfj2DoOF5Z
 t25mQazjdtySzMzbuV4IjoEpkgIecT5aXaeS+8MtjQG2d9c8N55cXZZISBkXVjb8fb/X
 g2gl+QZDX1bQMr1JFTDi+n7bLjx26ob0w3GAOhjydn4z8yla5GRqAllvPmYb37uiusfZ
 aoWQ==
X-Gm-Message-State: AKwxytfNWliUz0W4WLQpzBpg286u1UCelHmQy2794JBUpVWCTFFxy9a+
 QzwE26YiEYoxVw9aEoSAW8U=
X-Google-Smtp-Source: ACJfBotT8Pjy5Y9UDF+i97E5MLrF2YaH3jg6HDM8uQk0O9R6UCB7HNTZuqcrN37GzcIgD15GYa0ufw==
X-Received: by 10.223.200.140 with SMTP id k12mr25654793wrh.211.1516113981554; 
 Tue, 16 Jan 2018 06:46:21 -0800 (PST)
Received: from ?IPv6:2a02:c7f:ac18:da00:3d7c:a105:2ca9:a75c?
 ([2a02:c7f:ac18:da00:3d7c:a105:2ca9:a75c])
 by smtp.gmail.com with ESMTPSA id 11sm2125710wmd.33.2018.01.16.06.46.20
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Tue, 16 Jan 2018 06:46:20 -0800 (PST)
From: Lars Kurth <lars.kurth.xen@gmail.com>
Message-Id: <A278B0A4-A1E3-43C9-8BC7-DCD08F7E4FC8@gmail.com>
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Tue, 16 Jan 2018 14:46:19 +0000
In-Reply-To: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
To: Saumya Rajesh <saumyarajesh93@gmail.com>
References: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.5.20)
Cc: xen-devel <xen-devel@lists.xenproject.org>,
 embedded-pv-devel@lists.xenproject.org, xen-users@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Access I2C bus from guest/DomU on ARM
	board
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============5448272188458661884=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--===============5448272188458661884==
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_3379ACE9-6F36-4F83-93F9-99801B2EC6F2"


--Apple-Mail=_3379ACE9-6F36-4F83-93F9-99801B2EC6F2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Added embedded-pv-devel@lists.xenproject.org

> On 16 Jan 2018, at 13:39, Saumya Rajesh <saumyarajesh93@gmail.com> =
wrote:
>=20
> Hi Xen community
>=20
> I have built and brought up Xen 4.8 on Renesas RCar H3. For a specific =
requirement, I need to use the I2C bus of the board from Domain U. Is =
there a way to use the I2C bus from the guest?
> I have looked into para-virtualization and passthrough [1][2] but =
there isn't enough support or resources related to I2C bus sharing on =
ARM. Any possible idea would be appreciated.
>=20
> Regards
> Saumya
>=20
> [1] =
https://lists.xenproject.org/archives/html/xen-users/2017-10/msg00019.html=
 =
<https://lists.xenproject.org/archives/html/xen-users/2017-10/msg00019.htm=
l>
> [2] https://wiki.xenproject.org/wiki/File:DriverDomainonARM01.pdf =
<https://wiki.xenproject.org/wiki/File:DriverDomainonARM01.pdf>
>=20
>=20
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-devel


--Apple-Mail=_3379ACE9-6F36-4F83-93F9-99801B2EC6F2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">Added&nbsp;<a =
href=3D"mailto:embedded-pv-devel@lists.xenproject.org" =
class=3D"">embedded-pv-devel@lists.xenproject.org</a><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On 16 Jan 2018, at 13:39, Saumya Rajesh &lt;<a =
href=3D"mailto:saumyarajesh93@gmail.com" =
class=3D"">saumyarajesh93@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div dir=3D"ltr" =
class=3D""><div style=3D"margin-top: 0px; margin-bottom: 0px; =
font-family: Calibri, Helvetica, sans-serif, EmojiFont, &quot;Apple =
Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, NotoColorEmoji, =
&quot;Segoe UI Symbol&quot;, &quot;Android Emoji&quot;, EmojiSymbols; =
font-size: 14.6667px;" class=3D""><span style=3D"font-size:11pt" =
class=3D"">Hi Xen community</span><br class=3D""></div><p =
style=3D"margin-top: 0px; margin-bottom: 0px; font-family: Calibri, =
Helvetica, sans-serif, EmojiFont, &quot;Apple Color Emoji&quot;, =
&quot;Segoe UI Emoji&quot;, NotoColorEmoji, &quot;Segoe UI Symbol&quot;, =
&quot;Android Emoji&quot;, EmojiSymbols; font-size: 14.6667px;" =
class=3D""></p><div style=3D"font-family: Calibri, Helvetica, =
sans-serif, EmojiFont, &quot;Apple Color Emoji&quot;, &quot;Segoe UI =
Emoji&quot;, NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android =
Emoji&quot;, EmojiSymbols; font-size: 14.6667px;" class=3D""><br =
class=3D""></div><div style=3D"font-family: Calibri, Helvetica, =
sans-serif, EmojiFont, &quot;Apple Color Emoji&quot;, &quot;Segoe UI =
Emoji&quot;, NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android =
Emoji&quot;, EmojiSymbols; font-size: 14.6667px;" class=3D"">I have =
built and brought up Xen 4.8 on Renesas RCar H3. For a specific =
requirement, I need to use the I2C bus of the board from Domain U. Is =
there a way to use the I2C bus from the guest?</div><div =
style=3D"font-family: Calibri, Helvetica, sans-serif, EmojiFont, =
&quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, =
NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android Emoji&quot;, =
EmojiSymbols; font-size: 14.6667px;" class=3D"">I have looked into =
para-virtualization and passthrough&nbsp;[1][2] but there =
isn't&nbsp;enough support or resources related to I2C bus sharing on =
ARM.&nbsp;<span style=3D"font-size:11pt" class=3D"">Any =
possible&nbsp;idea would be appreciated.</span></div><div =
style=3D"font-family: Calibri, Helvetica, sans-serif, EmojiFont, =
&quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, =
NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android Emoji&quot;, =
EmojiSymbols; font-size: 14.6667px;" class=3D""><br class=3D""></div><div =
style=3D"font-family: Calibri, Helvetica, sans-serif, EmojiFont, =
&quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, =
NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android Emoji&quot;, =
EmojiSymbols; font-size: 14.6667px;" class=3D"">Regards</div><div =
style=3D"font-family: Calibri, Helvetica, sans-serif, EmojiFont, =
&quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, =
NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android Emoji&quot;, =
EmojiSymbols; font-size: 14.6667px;" class=3D"">Saumya</div><div =
style=3D"font-family: Calibri, Helvetica, sans-serif, EmojiFont, =
&quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, =
NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android Emoji&quot;, =
EmojiSymbols; font-size: 14.6667px;" class=3D""><br class=3D""></div><div =
style=3D"font-family: Calibri, Helvetica, sans-serif, EmojiFont, =
&quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, =
NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android Emoji&quot;, =
EmojiSymbols; font-size: 14.6667px;" class=3D"">[1]&nbsp;<a =
href=3D"https://lists.xenproject.org/archives/html/xen-users/2017-10/msg00=
019.html" =
class=3D"gmail-OWAAutoLink">https://lists.xenproject.org/archives/html/xen=
-users/2017-10/msg00019.html</a></div><div style=3D"font-family: =
Calibri, Helvetica, sans-serif, EmojiFont, &quot;Apple Color =
Emoji&quot;, &quot;Segoe UI Emoji&quot;, NotoColorEmoji, &quot;Segoe UI =
Symbol&quot;, &quot;Android Emoji&quot;, EmojiSymbols; font-size: =
14.6667px;" class=3D"">[2]&nbsp;<a =
href=3D"https://wiki.xenproject.org/wiki/File:DriverDomainonARM01.pdf" =
class=3D"gmail-OWAAutoLink">https://wiki.xenproject.org/wiki/File:DriverDo=
mainonARM01.pdf</a></div><div style=3D"font-family: Calibri, Helvetica, =
sans-serif, EmojiFont, &quot;Apple Color Emoji&quot;, &quot;Segoe UI =
Emoji&quot;, NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android =
Emoji&quot;, EmojiSymbols; font-size: 14.6667px;" class=3D""><br =
class=3D""></div><div style=3D"font-family: Calibri, Helvetica, =
sans-serif, EmojiFont, &quot;Apple Color Emoji&quot;, &quot;Segoe UI =
Emoji&quot;, NotoColorEmoji, &quot;Segoe UI Symbol&quot;, &quot;Android =
Emoji&quot;, EmojiSymbols; font-size: 14.6667px;" class=3D""><br =
class=3D""></div></div>
_______________________________________________<br class=3D"">Xen-devel =
mailing list<br class=3D""><a =
href=3D"mailto:Xen-devel@lists.xenproject.org" =
class=3D"">Xen-devel@lists.xenproject.org</a><br =
class=3D"">https://lists.xenproject.org/mailman/listinfo/xen-devel</div></=
blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_3379ACE9-6F36-4F83-93F9-99801B2EC6F2--


--===============5448272188458661884==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============5448272188458661884==--


From xen-users-bounces@lists.xenproject.org Tue Jan 16 17:44:48 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jan 2018 17:44:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebVH5-0003WS-Lr; Tue, 16 Jan 2018 17:43:51 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=fwfk=el=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1ebVH4-0003Vz-GB
 for xen-users@lists.xen.org; Tue, 16 Jan 2018 17:43:50 +0000
X-Inumbo-ID: 248f1630-fae5-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 248f1630-fae5-11e7-b0d7-9f685aff125f;
 Tue, 16 Jan 2018 17:46:12 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1ebVGp-0005ww-0y; Tue, 16 Jan 2018 17:43:35 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1ebVGo-0005UP-WF; Tue, 16 Jan 2018 17:43:35 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1ebVGo-0005UP-WF@xenbits.xenproject.org>
Date: Tue, 16 Jan 2018 17:43:34 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 8

        Information leak via side effects of speculative execution

UPDATES IN VERSION 8
====================

PVH shim ("Comet") is now available for Xen 4.8.

Fixes for two bugs in PVH shim "Comet": one relating to shim
initialisation, which can cause hangs during guest boot shortly after
host boot(!), and one to make qemu PV backends work in PVH mode.
Thanks to the respective contributors.

We are longer inclined to port the "Comet" patches to Xen 4.9.  If
this causes you a problem please let us know by contacting us:
 To: security@xenproject.org; CC: xen-devel@lists.xenproject.org

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by running guests in HVM or PVH mode.
(Within-guest attacks are still possible unless the guest OS has also
been updated with an SP3 mitigation series such as KPTI/Kaiser.)

For guests with legacy PV kernels which cannot be run in HVM or PVH
mode directly, we have developed two "shim" hypervisors that allow PV
guests to run in HVM mode or PVH mode.  This prevents attacks on the
host, but it leaves the guest vulnerable to Meltdown attacks by its
own unprivileged processes, even if the guest OS has KPTI or similar
Meltdown mitigation.

The HVM shim (codenamed "Vixen") is available now, as is the PVH shim
(codenamed "Comet") for Xen 4.10 and Xen 4.8.   Please read
README.which-shim to determine which shim is suitable for you.

$ sha256sum xsa254*/*
2f830fede5d58d3d90fe942ec2d8c4ef65cd14c4d565f9a1b9817847662ebba1  xsa254/README.comet
1c594822dbd95998951203f6094bc77586d5720788de15897784d20bacb2ef08  xsa254/README.vixen
7e816160c1c1d1cd93ec3c3dd9753c8f3957fefe86b7aa967e9e77833828f849  xsa254/README.which-shim
1d2098ad3890a5be49444560406f8f271c716e9f80e7dfe11ff5c818277f33f8  xsa254/pvshim-converter.pl
$

RESOLUTION
==========

There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.


NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaXjm9AAoJEIP+FMlX6CvZ5VwH/1KQOIRXgsfYILMkdYIR4mG4
VGFcPT7l6egTndGOxPUUDcjxchP1guyyAucSMX+OzoK+SNJReqlSM/mjIN9Vvka4
BQiTr2Xh0y6GcyB+ldd29YTYAv45FYaIiMzrWUfATdkswezraW/uv3AKFkIrmwt3
LRNMGws0fyXLYfLAISdUJtlLN5pfuQ6jKNGXQTnAbmJ+PbGuOBJcOrJZjf+estGK
ptIp3jLwjBPuKwO8IR8jSYEAP7vOTRwOES1+TNeMyU9vPqWIa6D0L1wyjt4uTrjz
OPeAgD52v/Xh4nekFDaAZYaezqhLuzQqpIJKAtGbAUMxJkzFhevgCcBzOu/1/vM=
=F+76
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa254/README.comet"
Content-Disposition: attachment; filename="xsa254/README.comet"
Content-Transfer-Encoding: base64

CQkJICAgIFBWLWluLVBWSCBzaGltCiAgICAgICAgICAgICAgICAgICAgICAg
ICAgICA9PT09PT09PT09PT09PQoKU3VtbWFyeQotLS0tLS0tCgpUaGlzIFJF
QURNRSBkZXNjcmliZXMgb25lIG9mIHR3byBtaXRpZ2F0aW9uIHN0cmF0ZWdp
ZXMgZm9yIE1lbHRkb3duLgoKVGhlIGJhc2ljIHByaW5jaXBsZSBpcyB0byBy
dW4gUFYgZ3Vlc3RzICh3aGljaCBjYW4gcmVhZCBhbGwgb2YgaG9zdAptZW1v
cnkgZHVlIHRvIHRoZSBoYXJkd2FyZSBidWdzKSBhcyBQVkggZ3Vlc3RzICh3
aGljaCBjYW5ub3QsIGF0IGxlYXN0Cm5vdCBkdWUgdG8gTWVsdGRvd24pLiAg
VGhlIFBWIGVudmlyb25tZW50IGlzIHN0aWxsIHByb3ZpZGVkIHRvIHRoZQpn
dWVzdCBieSBhbiBlbWJlZGRlZCBjb3B5IG9mIFhlbiwgdGhlICJzaGltIi4g
IFRoaXMgdmVyc2lvbiBvZiB0aGUKc2hpbSBpcyBjb2RlbmFtZWQgIkNvbWV0
Ii4KClVubGlrZSBWaXhlbiwgQ29tZXQgcmVxdWlyZXMgbW9kaWZpY2F0aW9u
cyB0byB0aGUgdG9vbHN0YWNrIGFuZCBob3N0Cmh5cGVydmlzb3IuCgpOb3Rl
IHRoYXQgYm90aCBvZiB0aGVzZSBzaGltLWJhc2VkIGFwcHJvYWNoZXMgcHJl
dmVudCBhdHRhY2tzIG9uIHRoZQpob3N0LCBidXQgbGVhdmUgdGhlIGd1ZXN0
IHZ1bG5lcmFibGUgdG8gTWVsdGRvd24gYXR0YWNrcyBieSBpdHMgb3duCnVu
cHJpdmlsZWdlZCBwcm9jZXNzZXM7IHRoaXMgaXMgdHJ1ZSBldmVuIGlmIHRo
ZSBndWVzdCBPUyBoYXMgS1BUSSBvcgpzaW1pbGFyIE1lbHRkb3duIG1pdGln
YXRpb24uCgpWZXJzaW9ucyBmb3IgWGVuIDQuOCBhbmQgNC4xMCBhcmUgYXZh
aWxhYmxlLgoKV2hhdCB5b3Ugd2lsbCBuZWVkCi0tLS0tLS0tLS0tLS0tLS0t
LQoKICogWW91IHdpbGwgbmVlZCB0aGUgeGVuLmdpdCB3aXRoIHRoZSBmb2xs
b3dpbmcgdGFnczoKICAtIEZvciA0LjEwOiA0LjEwLjAtc2hpbS1jb21ldC0y
CiAgLSBGb3IgNC44OiAgNC44LjNwcmUtc2hpbS1jb21ldC0yICAgYW5kICA0
LjEwLjAtc2hpbS1jb21ldC0yCgpCdWlsZCBpbnN0cnVjdGlvbnM6IDQuMTAK
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCgoxLiBCdWlsZCBhIDQuMTArIHN5
c3RlbQogICAgZ2l0IGNsb25lIGdpdDovL3hlbmJpdHMueGVucHJvamVjdC5v
cmcveGVuLmdpdCB4ZW4uZ2l0CiAgICBjZCB4ZW4uZ2l0CiAgICBnaXQgY2hl
Y2tvdXQgNC4xMC4wLXNoaW0tY29tZXQtMgoKRG8gYSBidWlsZCBhbmQgaW5z
dGFsbCBhcyBub3JtYWwuICBUaGUgc2hpbSB3aWxsIGJlIGJ1aWx0IGFzIHBh
cnQgb2YgdGhlCm5vcm1hbCBidWlsZCBwcm9jZXNzLCBhbmQgcGxhY2VkIHdp
dGggb3RoZXIgJ3N5c3RlbScgYmluYXJpZXMgd2hlcmUgdGhlCnRvb3N0YWNr
IGtub3dzIGhvdyB0byBmaW5kIGl0LgoKQnVpbGQgaW5zdHJ1Y3Rpb25zOiA0
LjgKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KClRoZSBjb2RlIGZvciBzaGlt
IGl0c2VsZiBpcyBub3QgYmFja3BvcnRlZCB0byA0LjguICA0LjggdXNlcnMg
c2hvdWxkCnVzZSBhIHNoaW0gYnVpbHQgZnJvbSA0LjEwLWJhc2VkIHNvdXJj
ZSBjb2RlOyB0aGlzIGNhbiBiZSBzaW1wbHkKZHJvcHBlZCBpbnRvIGEgWGVu
IDQuOCBpbnN0YWxsYXRpb24uCgoxLiBCdWlsZCBhIDQuOCsgc3lzdGVtIHdp
dGggc3VwcG9ydCBmb3IgcnVubmluZyBQVkgsIGFuZCBmb3IgcHZzaGltOgoK
ICAgIGdpdCBjbG9uZSBnaXQ6Ly94ZW5iaXRzLnhlbnByb2plY3Qub3JnL3hl
bi5naXQgeGVuLmdpdAogICAgY2QgeGVuLmdpdAogICAgZ2l0IGNoZWNrb3V0
IDQuOC4zcHJlLXNoaW0tY29tZXQtMgoKICBEbyBhIGJ1aWxkIGFuZCBpbnN0
YWxsIGFzIG5vcm1hbC4KCjIuIEJ1aWxkIGEgNC4xMCsgc3lzdGVtIHRvIGJl
IHRoZSBzaGltOgoKICAgIGdpdCBjbG9uZSBnaXQ6Ly94ZW5iaXRzLnhlbnBy
b2plY3Qub3JnL3hlbi5naXQgeGVuLmdpdAogICAgY2QgeGVuLmdpdAogICAg
Z2l0IGNoZWNrb3V0IDQuMTAuMC1zaGltLWNvbWV0LTIKICAgIC4vY29uZmln
dXJlCiAgICBtYWtlIC1DIHRvb2xzL2Zpcm13YXJlL3hlbi1kaXIKCiAgQW5k
IHRoZW4gaW5zdGFsbCB0aGUgc2hpbSBleGVjdXRhYmxlIHdoZXJlCiAgdGhl
IDQuOCBwdiBzaGltIG1vZGUgdG9vbHMgZXhwZWN0IHRvIGZpbmQgaXQKCiAg
ICBjcCB0b29scy9maXJtd2FyZS94ZW4tZGlyL3hlbi1zaGltIC91c3IvbGli
L3hlbi9ib290L3hlbi1zaGltCiAgICBjcCB0b29scy9maXJtd2FyZS94ZW4t
ZGlyL3hlbi1zaGltIC91c3IvbG9jYWwvbGliL3hlbi9ib290L3hlbi1zaGlt
CgogIFRoaXMgc3RlcCBpcyBvbmx5IG5lZWRlZCB0byBib290IGd1ZXN0cyBp
biAiUFZIIHdpdGggUFYgc2hpbSIKICBtb2RlOyBpdCBpcyBub3QgbmVlZGVk
IHdoZW4gYm9vdGluZyBQVkgtc3VwcG9ydGluZyBndWVzdHMgYXMgUFZILgoK
ClVzYWdlIGluc3RydWN0aW9ucwotLS0tLS0tLS0tLS0tLS0tLS0KCiogQ29u
dmVydGluZyBhIFBWIGNvbmZpZyB0byBhIFBWSCBzaGltIGNvbmZpZwoKLSBS
ZW1vdmUgYW55IHJlZmVyZW5jZSB0byAnYnVpbGRlcicgKGUuZy4sIGBidWls
ZGVyPSJnZW5lcmljImApCi0gQWRkIHRoZSBmb2xsb3dpbmcgdHdvIGxpbmVz
OgogIHR5cGU9InB2aCIKICBwdnNoaW09MQoKKiBDb252ZXJ0aW5nIGEgUFYg
Y29uZmlnIHRvIGEgUFZIIGNvbmZpZwoKSWYgeW91IGhhdmUgYSBrZXJuZWwg
Y2FwYWJsZSBvZiBib290aW5nIFBWSCwgdGhlbiBQVkggbW9kZSBpcyBib3Ro
CmZhc3RlciBhbmQgbW9yZSBzZWN1cmUgdGhhbiBQViBvciBQVkgtc2hpbSBt
b2RlLgoKLSBSZW1vdmUgYW55IHJlZmVyZW5jZSB0byAnYnVpbGRlcicgKGUu
Zy4sIGBidWlsZGVyPSJnZW5lcmljImApCi0gQWRkIHRoZSBmb2xsb3dpbmcg
bGluZToKICB0eXBlPSJwdmgiCg==

--=separator
Content-Type: application/octet-stream; name="xsa254/README.vixen"
Content-Disposition: attachment; filename="xsa254/README.vixen"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.which-shim"
Content-Disposition: attachment; filename="xsa254/README.which-shim"
Content-Transfer-Encoding: base64

CQkgICBIb3cgdG8gZGVjaWRlIHdoaWNoIHNoaW0gdG8gdXNlCgkJICAgPT09
PT09PT09PT09PT09PT09PT09PT09PT09PT09PQoKQSB3b3JrLWFyb3VuZCB0
byBNZWx0ZG93biAoYWthICJTUDMiIG9yICJWYXJpYW50IDMiKSBvbiBJbnRl
bApwcm9jZXNzb3JzIGlzIHRvIHJ1biBndWVzdHMgaW4gSFZNIG9yIFBWSCBt
b2RlLgoKTm90ZSB0aGlzIHNoaW0tYmFzZWQgYXBwcm9hY2ggcHJldmVudHMg
YXR0YWNrcyBvbiB0aGUgaG9zdCwgYnV0IGxlYXZlcwp0aGUgZ3Vlc3QgdnVs
bmVyYWJsZSB0byBNZWx0ZG93biBhdHRhY2tzIGJ5IGl0cyBvd24gdW5wcml2
aWxlZ2VkCnByb2Nlc3NlczsgdGhpcyBpcyB0cnVlIGV2ZW4gaWYgdGhlIGd1
ZXN0IE9TIGhhcyBLUFRJIG9yIHNpbWlsYXIKTWVsdGRvd24gbWl0aWdhdGlv
bi4KClNvbWUgZ3Vlc3RzIGFyZSBkaWZmaWN1bHQgdG8gY29udmVydCB0byBy
dW5uaW5nIGluIEhWTSBvciBQVkggbW9kZSwKZWl0aGVyIGR1ZSB0byBsYWNr
IG9mIHBhcnRpdGlvbmluZyAvIE1CUiwgb3IgZHVlIHRvIGtlcm5lbApjb21w
YXRpYmlsaXRpZXMuICBBcyBhbiBlbWVyZ2VuY3kgYmFja3N0b3AsIHRoZXJl
IGFyZSB0d28gYXBwcm9hY2hlcywKd2hpY2ggd2UndmUgY29kZW5hbWVkICJW
aXhlbiIgYW5kICJDb21ldCIuICBCb3RoIGludm9sdmUgcnVubmluZyBhbgpl
bWJlZGRlZCBjb3B5IG9mIFhlbiAoY2FsbGVkIGEgInNoaW0iKSB3aXRoaW4g
dGhlIEhWTSBvciBQVkggZ3Vlc3QgdG8KcHJvdmlkZSB0aGUgbmF0aXZlIFBW
IGludGVyZmFjZS4KCkJlbG93IGRlc2NyaWJlcyB0aGUgcHJvcGVydGllcywg
YW5kIHdobyBtaWdodCB3YW50IHRvIHVzZSBlYWNoIG9uZS4KCk5PVEU6IEJv
dGggc2hpbXMgcmVxdWlyZSBob3N0IHBhdGNoZXMgdG8gYm9vdCBvbiBBTUQg
aG9zdHMuICBUaGlzCnNob3VsZG4ndCBiZSBhbiBpc3N1ZSwgYXMgU1AzIGRv
ZXMgbm90IGFmZmVjdCBzeXN0ZW1zIHJ1bm5pbmcgb24gQU1ELgoKVml4ZW4K
LS0tLS0KClZpeGVuIGhhcyB0aGUgZm9sbG93aW5nIHByb3BlcnRpZXM6CiAq
IFJ1bnMgdGhlIHNoaW0gaW4gYW4gSFZNIGd1ZXN0LgogKiBJdCByZXF1aXJl
cyBubyBoeXBlcnZpc29yIG9yIHRvb2xzdGFjayBjaGFuZ2VzLCBub3IgZG9l
cyBpdCByZXF1aXJlCiAgIGEgaG9zdCByZWJvb3QuCiAqIEl0IGhhcyBiZWVu
IGV4dGVuc2l2ZWx5IHRlc3RlZCBpbiBBbWF6b24ncyBkZXBsb3ltZW50IGZv
ciB2ZXJzaW9ucwogICBvZiBYZW4gZ29pbmcgYmFjayB0byAzLjQKICogR3Vl
c3QgcmVib290cyBhcmUgcmVxdWlyZWQKICogR3Vlc3QgY29uZmlncyBtdXN0
IGJlIGZlZCB0aHJvdWdoIGEgY29udmVydGVyIHByb2dyYW0KICogVGhlIGNv
bnZlcnRlciBwcm9ncmFtIHNwaXRzIG91dCBhIHNtYWxsIGd1ZXN0LXNwZWNp
ZmljIC5pc28KICAgaW1hZ2UgKHdlIGNhbGwgdGhpcyBhICJzaWRlY2FyIikg
dXNlZCBmb3IgYm9vdGluZwogKiBCZWNhdXNlIHRoZSByZXN1bHQgaXMgYW4g
SFZNIGd1ZXN0LCB0aGlzIGFwcHJvYWNoIGludm9sdmVzCiAgIHJ1bm5pbmcg
cWVtdSBhcyBhIFBDIGVtdWxhdG9yICh0aGlzIGlzIGRvbmUgYXV0b21hdGlj
YWxseSkKICogU29tZSBjb21tb24gZmVhdHVyZXMgYXJlIG5vdCBzdXBwb3J0
ZWQ6CiAgLSBCYWxsb29uaW5nCiAgLSBNaWdyYXRpb24KICAtIHZjcHUgaG90
cGx1ZwogIC0gYmlkaXJlY3Rpb25hbCBjb25zb2xlIHN1cHBvcnQgKGNvbnNv
bGUgaXMgd3JpdGUtb25seSkKICogRGlyZWN0LWJvb3Qga2VybmVscyBhbmQg
cHZncnViIChib3RoIHB2Z3J1YjEgYW5kIHB2Z3J1YjIpIGFyZQogICBzdXBw
b3J0ZWQgYnkgdGhlIGNvbnZlcnNpb24gcHJvZ3JhbS4gICdweWdydWInIGlz
IG5vdCBzdXBwb3J0ZWQuCiAqIHhsIGFuZCB4bSBkb21haW4gY29uZmlncyBj
YW4gYmUgY29udmVydGVkOyBsaWJ2aXJ0IGRvbWFpbgogICBjb25maWd1cmF0
aW9uIGFycmFuZ2VtZW50cyBhcmUgbm90IHN1cHBvcnRlZC4KICogR3Vlc3Qg
dXNlcnNwYWNlIGNhbiByZWFkIGFsbCBvZiBndWVzdCBtZW1vcnksIHdpdGhp
biBlYWNoIGd1ZXN0LAogICBhbmQgYSBndWVzdCBtaWdpdGF0aW9uIGZvciB0
aGlzIGlzIG5vdCBwb3NzaWJsZS4KCllvdSBtaWdodCBjb25zaWRlciB0aGlz
IGFwcHJvYWNoIGlmOgotIFlvdSB3YW50IHRvIGRlcGxveSBhIGZpeCBpbW1l
ZGlhdGVseQotIFlvdSBjYW4gdG9sZXJhdGUgdGhlIGxvc3Mgb2Ygd2l0aGlu
LWd1ZXN0IHNlY3VyaXR5Ci0gWW91IGNhbid0LCBvciB3b3VsZCBsaWtlIHRv
IGF2b2lkLCB1cGRhdGluZyB0byBYZW4gNC44IG9yIG5ld2VyCi0gWW91J2Qg
bGlrZSB0byBhdm9pZCBwYXRjaGluZyBhbmQgcmVib290aW5nIHlvdXIgaG9z
dAotIFlvdSBhcmUgYWJsZSB0bzoKIC0gUnVuIGEgc2NyaXB0IHRvIG1vZGlm
eSBlYWNoIGRvbWFpbiBjb25maWcKIC0gQWZmb3JkIGFuIGV4dHJhIDgwTWlC
IHBlciBndWVzdAogLSBUb2xlcmF0ZSBoYXZpbmcgYW4gZXh0cmEgUUVNVSBh
cm91bmQKLSBZb3UgZG9uJ3QgbmVlZCBtaWdyYXRpb24sIG1lbW9yeSBiYWxs
b29uaW5nLCB2Y3B1IGhvdHBsdWcsCiAgb3IgYSBiaS1kaXJlY3Rpb25hbCBj
b25zb2xlCgpUbyB1c2UgdGhpcyBzb2x1dGlvbiwgc2VlIFJFQURNRS52aXhl
bi4KCkJpLWRpcmVjdGlvbmFsIGNvbnNvbGUgaXMgYXZhaWxhYmxlIGFzIGFu
IGV4dHJhIHBhdGNoLCBidXQgaGFzbid0IGJlZW4Kd2lkZWx5IHRlc3RlZDoK
Cm1hcmMuaW5mby8/aT08MTUxNTYwNDU1Mi05MjA1LTEtZ2l0LXNlbmQtZW1h
aWwtc3JuQHByZ21yLmNvbT4KCkNvbWV0Ci0tLS0tCgpDb21ldCBoYXMgdGhl
IGZvbGxvd2luZyBwcm9wZXJ0aWVzOgogKiBSdW5zIHRoZSBzaGltIGluIGEg
UFZIIGd1ZXN0LgogKiBQVkggbW9kZSBpcyBhdmFpbGFibGUgaW4gWGVuIDQu
MTAsIGFuZCB3aWxsIGJlIGJhY2twb3J0ZWQgdG8gWGVuCiAgIDQuOSBhbmQg
NC44IGJ1dCBubyBmYXJ0aGVyCiAqIFJlcXVpcmVzIGhvc3QgaHlwZXJ2aXNv
ciBhbmQgdG9vbHN0YWNrIHBhdGNoZXMgKGFuZCBob3N0IHJlYm9vdCksCiAg
IGV2ZW4gZm9yIFhlbiA0LjEwCiAqIFJlcXVpcmVzIG1pbmltYWwgZ3Vlc3Qg
Y29uZmlnIGNoYW5nZXMsIGFuZCBubyAic2lkZWNhciIKICogQm9vdGxvYWRp
bmcgaXMgaWRlbnRpY2FsIHRvIG5hdGl2ZSBQViBndWVzdHM7IGRpcmVjdC1i
b290LCBwdmdydWIsCiAgIGFuZCBweWdydWIgYWxsIHdvcmsgZXF1YWxseSB3
ZWxsCiAqIEJlY2F1c2UgdGhlIHJlc3VsdCBpcyBhIFBWSCBndWVzdCwgdGhp
cyBhcHByb2FjaCBpbnZvbHZlcyBubyBQQyBlbXVsYXRvci4KICogVGhlIGZv
bGxvd2luZyBmZWF0dXJlcyBub3QgYXZhaWxhYmxlIGluIFZpeGVuIGFyZSBz
dXBwb3J0ZWQ6CiAgLSBNZW1vcnkgYmFsbG9vbmluZwogIC0gR3Vlc3QgbWln
cmF0aW9uCiAgLSB2Y3B1IGhvdHBsdWcKICAtIGJpZGlyZWN0aW9uYWwgY29u
c29sZSBzdXBwb3J0CiAqIEd1ZXN0IHVzZXJzcGFjZSBjYW4gcmVhZCBhbGwg
b2YgZ3Vlc3QgbWVtb3J5LCB3aXRoaW4gZWFjaCBndWVzdCwKICAgYW5kIGEg
Z3Vlc3QgbWlnaXRhdGlvbiBmb3IgdGhpcyBpcyBub3QgcG9zc2libGUuCgpZ
b3UgbWlnaHQgY29uc2lkZXIgdGhpcyBhcHByb2FjaCBpZjoKLSBZb3UncmUg
b24gNC44IG9yIGxhdGVyIGFscmVhZHkKLSBZb3UgY2FuIHRvbGVyYXRlIHRo
ZSBsb3NzIG9mIHdpdGhpbi1ndWVzdCBzZWN1cml0eQotIFlvdSBjYW4gcGF0
Y2ggYW5kIHJlYm9vdCB5b3VyIGhvc3QKLSBZb3UgZG9uJ3Qgd2FudCBhbiBl
eHRyYSBRRU1VIGFyb3VuZAotIFlvdSBuZWVkIG1pZ3JhdGlvbiwgbWVtb3J5
IGJhbGxvb25pbmcsIG9yIHZjcHUgaG90cGx1Zywgb3IgYQogIGJpZGlyZWN0
aW9uYWwgY29uc29sZQotIFlvdSBuZWVkIHB5Z3J1YgotIFlvdSBuZWVkIHRv
IHVzZSBsaWJ2aXJ0CgpBdCB0aGUgbW9tZW50LCBDb21ldCBpcyBhdmFpbGFi
bGUgZm9yIDQuMTAuICAgV2UgZXhwZWN0IHRvIGhhdmUKYmFja3BvcnRzIHRv
IDQuOCBhbmQgNC44IGF2YWlsYWJsZSB3aXRoaW4gYSBmZXcgd29ya2luZyBk
YXlzLgo=

--=separator
Content-Type: application/octet-stream; name="xsa254/pvshim-converter.pl"
Content-Disposition: attachment; filename="xsa254/pvshim-converter.pl"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Tue Jan 16 19:23:08 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jan 2018 19:23:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebWo4-0004wV-1v; Tue, 16 Jan 2018 19:22:00 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=gssn=el=posteo.no=who.are.you@srs-us1.protection.inumbo.net>)
 id 1ebWo2-0004wP-4j
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 19:21:58 +0000
X-Inumbo-ID: 4c666a99-faf2-11e7-b4a6-bc764e045a96
Received: from mout01.posteo.de (unknown [185.67.36.65])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 4c666a99-faf2-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 20:20:23 +0100 (CET)
Received: from submission (posteo.de [89.146.220.130]) 
 by mout01.posteo.de (Postfix) with ESMTPS id 18F7620F26
 for <xen-users@lists.xenproject.org>; Tue, 16 Jan 2018 20:21:51 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.no; s=2017;
 t=1516130512; bh=QZzlpk/ffQ6q/IKQfnVDpl6TsC4cUmzrQrCDrGNlmNI=;
 h=Date:From:To:Subject:From;
 b=sIzeJWhYaWAybHkG/r/e9dGFW+Kc+guU83lORX0qEUHwBztxX022N+e5Tff66hQIL
 xAH6BpDzLDZzVkNqK0Q5OB8AX10XOJTzx/6pDeK0J8mWo7S01YL33i31Qwxvl0l+SC
 lu+FM63UcAvFNUZ7LStFeZJPbkiyLl4pnIZnym+SHHLssj3wYt1OepQuBOd6a+cEKn
 /1BOQb4W+/Cdi1NYBU7nuu+eh8gNd5QdHAFwOKQnZHG6Z30/1B2lciGebO930X2YpV
 RuDU54cMYI31Ar6QmQ5bEw6KOqqaTlPQQ56CSAtiah8obpk7dEFsY2b3+ldOg+PKK2
 sE1kfGy9N5TqQ==
Received: from customer (localhost [127.0.0.1])
 by submission (posteo.de) with ESMTPSA id 3zLg7z2NVKz9rxG
 for <xen-users@lists.xenproject.org>; Tue, 16 Jan 2018 20:21:51 +0100 (CET)
Date: Tue, 16 Jan 2018 19:26:29 +0000
From: who.are.you@posteo.no
To: xen-users@lists.xenproject.org
Message-ID: <20180116192615.c3cqtrr6wvebwpfq@email>
References: <mailman.5.1516104001.20885.xen-users@lists.xenproject.org>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <mailman.5.1516104001.20885.xen-users@lists.xenproject.org>
Subject: [Xen-users] How to create PVHv2 DomU?
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 17 12:26:14 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jan 2018 12:26:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebmmM-0004PC-BC; Wed, 17 Jan 2018 12:25:18 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=gtqw=el=gmail.com=saumyarajesh93@srs-us1.protection.inumbo.net>)
 id 1ebRSM-0005qp-6e
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 13:39:14 +0000
X-Inumbo-ID: 6d7e6476-fac2-11e7-b4a6-bc764e045a96
Received: from mail-ua0-x236.google.com (unknown [2607:f8b0:400c:c08::236])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 6d7e6476-fac2-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 14:37:42 +0100 (CET)
Received: by mail-ua0-x236.google.com with SMTP id x10so10771201ual.8;
 Tue, 16 Jan 2018 05:39:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=v+xdCLHD3qTpwo1mpcevQGhWUv8QTor3lNY9uxvsVzM=;
 b=uukK86N1KlSraENjoe8kDVXSH98eGxtM90tAQVTRkx7uYvZu7yzYTMRXNYV0HtAQtq
 R8j6TzUtMaVW9mcxh4NZuyIgzac8HLLODqpqJgQJsy84XGb3f/pw/MhJGss32qEEUcH/
 4xBO2xF2JgxaA0QMkFmXSHlsDBYNLguQnEiLs5TrQeeG5VnKK9nVvi7Yi2HwZ1bbVgLX
 4dFrkPPlnLvgNuCQlEjw9EMgvI4NHF7R3LonugyPbRVbJ2lIsdhIQBWO9lOLsN3tKiku
 1wTxChoZZ1By3D9XBH7geXR0SQXWAniAg8bk7OtdR7jSZ7Fc5oUXcXdBpjYGxmDBj5Ra
 284Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=v+xdCLHD3qTpwo1mpcevQGhWUv8QTor3lNY9uxvsVzM=;
 b=b5KtFvmzn1jK8U/bBGY+yhPfN4usL9mAKF4bUAx3SxfnxBGShT3GSY+B6/jnRyksTY
 e95hG8AQyTMfq4qH19KyhkAk/ZHQakdoAcQoXTOCvuBlRFaL/MND7T4eNn8CEgtRU3oY
 wEg4l7zufoY29GVryhav/aqgeNHXMWK8m6BygcmXQdJ2TU173IyIesyapYUOkeRtBtGC
 wbLWJabLhhV4YkarKJYTUOFp2Y05YayHwlVLaJUeoyn4N0ltKxe+iIkp7CqeInXuyf38
 zabRMgGp5UlMd+DDwl/lFEO8p2Jm9/WFXlcCJq4cLWo/Pc7Pk42J4+jks8Xov5Mqm7xs
 ii+w==
X-Gm-Message-State: AKwxytfakas0Qbpd6+v8NDZ6Vr6h5sSmq+4yJ522pZTbZOWXHnwuNYib
 qa6Qn3mpmuQ/ovoGfTGEwURZdmzKAm2ueO1zCJ5EGNdmQJU=
X-Google-Smtp-Source: ACJfBovDkchLv9PhJlgoWTsH7H+y86tQguY+ZGyrYT8IFPoo597WShSQmGDo4w2if3Mvp3oSSZ2Q20c5zxY5TsgPwfM=
X-Received: by 10.159.53.168 with SMTP id t37mr7345220uad.133.1516109951651;
 Tue, 16 Jan 2018 05:39:11 -0800 (PST)
MIME-Version: 1.0
Received: by 10.103.87.129 with HTTP; Tue, 16 Jan 2018 05:39:11 -0800 (PST)
From: Saumya Rajesh <saumyarajesh93@gmail.com>
Date: Tue, 16 Jan 2018 19:09:11 +0530
Message-ID: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org
X-Mailman-Approved-At: Wed, 17 Jan 2018 12:25:16 +0000
Subject: [Xen-users] Access I2C bus from guest/DomU on ARM board
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6503732251262483970=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============6503732251262483970==
Content-Type: multipart/alternative; boundary="001a11456d1a1bd3ed0562e4dbe7"

--001a11456d1a1bd3ed0562e4dbe7
Content-Type: text/plain; charset="UTF-8"

Hi Xen community


I have built and brought up Xen 4.8 on Renesas RCar H3. For a specific
requirement, I need to use the I2C bus of the board from Domain U. Is there
a way to use the I2C bus from the guest?
I have looked into para-virtualization and passthrough [1][2] but there
isn't enough support or resources related to I2C bus sharing on ARM. Any
possible idea would be appreciated.

Regards
Saumya

[1]
https://lists.xenproject.org/archives/html/xen-users/2017-10/msg00019.html
[2] https://wiki.xenproject.org/wiki/File:DriverDomainonARM01.pdf

--001a11456d1a1bd3ed0562e4dbe7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><p style=3D"margin-top:0px;margin-bottom:0px;color:rgb(0,0=
,0);font-family:Calibri,Helvetica,sans-serif,EmojiFont,&quot;Apple Color Em=
oji&quot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&q=
uot;,&quot;Android Emoji&quot;,EmojiSymbols;font-size:14.6667px"><span styl=
e=3D"font-size:11pt">Hi Xen community</span><br></p><p style=3D"margin-top:=
0px;margin-bottom:0px;color:rgb(0,0,0);font-family:Calibri,Helvetica,sans-s=
erif,EmojiFont,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;,Not=
oColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,EmojiSymb=
ols;font-size:14.6667px"></p><div style=3D"color:rgb(0,0,0);font-family:Cal=
ibri,Helvetica,sans-serif,EmojiFont,&quot;Apple Color Emoji&quot;,&quot;Seg=
oe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android =
Emoji&quot;,EmojiSymbols;font-size:14.6667px"><br></div><div style=3D"color=
:rgb(0,0,0);font-family:Calibri,Helvetica,sans-serif,EmojiFont,&quot;Apple =
Color Emoji&quot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI =
Symbol&quot;,&quot;Android Emoji&quot;,EmojiSymbols;font-size:14.6667px">I =
have built and brought up Xen 4.8 on Renesas RCar H3. For a specific requir=
ement, I need to use the I2C bus of the board from Domain U. Is there a way=
 to use the I2C bus from the guest?</div><div style=3D"color:rgb(0,0,0);fon=
t-family:Calibri,Helvetica,sans-serif,EmojiFont,&quot;Apple Color Emoji&quo=
t;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&q=
uot;Android Emoji&quot;,EmojiSymbols;font-size:14.6667px">I have looked int=
o para-virtualization and passthrough=C2=A0[1][2] but there isn&#39;t=C2=A0=
enough support or resources related to I2C bus sharing on ARM.=C2=A0<span s=
tyle=3D"font-size:11pt">Any possible=C2=A0idea would be appreciated.</span>=
</div><div style=3D"color:rgb(0,0,0);font-family:Calibri,Helvetica,sans-ser=
if,EmojiFont,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;,NotoC=
olorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,EmojiSymbol=
s;font-size:14.6667px"><br></div><div style=3D"color:rgb(0,0,0);font-family=
:Calibri,Helvetica,sans-serif,EmojiFont,&quot;Apple Color Emoji&quot;,&quot=
;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Andr=
oid Emoji&quot;,EmojiSymbols;font-size:14.6667px">Regards</div><div style=
=3D"color:rgb(0,0,0);font-family:Calibri,Helvetica,sans-serif,EmojiFont,&qu=
ot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;=
Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,EmojiSymbols;font-size:14.6=
667px">Saumya</div><div style=3D"color:rgb(0,0,0);font-family:Calibri,Helve=
tica,sans-serif,EmojiFont,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoj=
i&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot=
;,EmojiSymbols;font-size:14.6667px"><br></div><div style=3D"color:rgb(0,0,0=
);font-family:Calibri,Helvetica,sans-serif,EmojiFont,&quot;Apple Color Emoj=
i&quot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quo=
t;,&quot;Android Emoji&quot;,EmojiSymbols;font-size:14.6667px">[1]=C2=A0<a =
href=3D"https://lists.xenproject.org/archives/html/xen-users/2017-10/msg000=
19.html" class=3D"gmail-OWAAutoLink">https://lists.xenproject.org/archives/=
html/xen-users/2017-10/msg00019.html</a></div><div style=3D"color:rgb(0,0,0=
);font-family:Calibri,Helvetica,sans-serif,EmojiFont,&quot;Apple Color Emoj=
i&quot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quo=
t;,&quot;Android Emoji&quot;,EmojiSymbols;font-size:14.6667px">[2]=C2=A0<a =
href=3D"https://wiki.xenproject.org/wiki/File:DriverDomainonARM01.pdf" clas=
s=3D"gmail-OWAAutoLink">https://wiki.xenproject.org/wiki/File:DriverDomaino=
nARM01.pdf</a></div><div style=3D"color:rgb(0,0,0);font-family:Calibri,Helv=
etica,sans-serif,EmojiFont,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emo=
ji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quo=
t;,EmojiSymbols;font-size:14.6667px"><br></div><div style=3D"color:rgb(0,0,=
0);font-family:Calibri,Helvetica,sans-serif,EmojiFont,&quot;Apple Color Emo=
ji&quot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&qu=
ot;,&quot;Android Emoji&quot;,EmojiSymbols;font-size:14.6667px"><br></div><=
/div>

--001a11456d1a1bd3ed0562e4dbe7--


--===============6503732251262483970==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============6503732251262483970==--


From xen-users-bounces@lists.xenproject.org Wed Jan 17 12:26:14 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jan 2018 12:26:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebmmM-0004PP-Ku; Wed, 17 Jan 2018 12:25:18 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=umwe=el=epam.com=andrii_anisov@srs-us1.protection.inumbo.net>)
 id 1ebTXR-0002lQ-9l
 for xen-users@lists.xenproject.org; Tue, 16 Jan 2018 15:52:37 +0000
X-Inumbo-ID: 0f5f0a16-fad5-11e7-b4a6-bc764e045a96
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:fe1e::61d])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTP
 id 0f5f0a16-fad5-11e7-b4a6-bc764e045a96;
 Tue, 16 Jan 2018 16:51:05 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; 
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;
 bh=xp9FnAWBesOO61vFX20ThhfAB3S0ScY3arFA5p1kRpw=;
 b=bDZhLKztdhXvl+UQ451EWYRqB1M3qiXF6VKfflFeZmxVWsvuOEvOz/2pzt3sJkffc510gdMKCFOsVIprIpKZyoUH7ARCbVUpldqlV7zHuA5OTgoVnStFh2f36gCIhsp9WZC0y2uI4QNHkZI55Qo0YkfkrhbeNLRWO+DtJY+oaOk=
Authentication-Results: spf=none (sender IP is )
 smtp.mailfrom=Andrii_Anisov@epam.com; 
Received: from [10.17.180.109] (85.223.209.56) by
 AM5PR0301MB2401.eurprd03.prod.outlook.com (2603:10a6:203:7::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.407.7; Tue, 16
 Jan 2018 15:52:27 +0000
To: Saumya Rajesh <saumyarajesh93@gmail.com>, xen-devel@lists.xenproject.org, 
 xen-users@lists.xenproject.org
References: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
From: Andrii Anisov <andrii_anisov@epam.com>
Message-ID: <37217807-7f20-bdbf-f852-033fcae1bd01@epam.com>
Date: Tue, 16 Jan 2018 17:52:19 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
Content-Language: en-US
X-Originating-IP: [85.223.209.56]
X-ClientProxiedBy: DB6PR07CA0001.eurprd07.prod.outlook.com
 (2603:10a6:6:2d::11) To AM5PR0301MB2401.eurprd03.prod.outlook.com
 (2603:10a6:203:7::10)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 57b55e1d-67b9-46c0-6ead-08d55cf9252f
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(7020095)(4652020)(5600026)(4604075)(2017052603307)(7153060)(7193020);
 SRVR:AM5PR0301MB2401; 
X-Microsoft-Exchange-Diagnostics: 1; AM5PR0301MB2401;
 3:pyxu3RKGid7V64z6NCYLiFqhOFQWqzmpd/cy2qMrwGQ3BLsdLt34Bc/+3yYGhPH3kqA50eeGqS5gnetEcQsgq8ed5gG3wln6LxV1lY0fkE/E5EvdwpanOXXXe6S+tmV5z4lC93B4cVGpV5/BnUIB79aUpu7PPSHUQFuK/Bt2xBLPvQlNUXiknZEPABEticaElTvMjYCxPGCGRBVgA6wtOUi9jJI3fifSdwUzHgRWqFzMzC9IFzbslrsCqi4S8ViW;
 25:ToYzNYjURBk0yqAzUZFg4aowPj0lz8jhgo41TrJwStXh2748bVK4gTrmpzVwnOxNjvc3636qqgCQvZkXcqjDNQ1ze9ijx6w35aAptamAMUBx9Pl4U3rZly9SAjUxu3Vw4ozg2gcJS1BoLsYA2dLyEdnZh9HQwjT5hnNK3JoNEkvElHRwBZs+6FKvf/kiUX/M2Db8Psku35KUc5CEFwmQY4exfzdwKoVl3wS7EwJxYKrwjrBXmaWJgFjey5RyLnBboJjYq1g5RU4kE5b9OqlkZF8+Eh1Yk283shL/Ty2ICRelCQtF2nQdKMfxMf0DvO9MfKcqegImh/sVxw/ehlSvcQ==;
 31:TVBJbQEeqAJyN51j7rIKfJ7TbB65+NIrTPGD4SOKZb6lr+Lo6oTINSS52OWp9rGskxVIZ26KiCRM3H/kUyTX/T7LbqoJkomO+eL/bWxOX8wuW8u9o5uIdiPNQY810ghw/3YaIt1qy/6FkbRS39eh7ankB4MMP2O4qb4WTXRx55aLIfNA7BKR1YUmkw42JaYwI7vSM0JE+/VhMtE0Tv0DzSwJUvCEnfa8oSRqdOnl1FE=
X-MS-TrafficTypeDiagnostic: AM5PR0301MB2401:
X-Microsoft-Exchange-Diagnostics: 1; AM5PR0301MB2401;
 20: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;
 4:ijEHTKShOw1vVrJNOBYfyYQwLQzounIbIRhzAJreesQQHKgshGGB4nOyfMowUn7csdhz+Qd5nfgVR0MYf8oIqxyIOHloNxwhGtwT+ScL7rUIc10AyJbhVb7FvareV16cQhn7Li88v8gCEx9eP0rIWIvZrLbVGA6tjCAsuh0D2Nvf0/8UuhS75gQzPL4Q9v2I5pyR7vobgUKh4zgBNoYtFW37DpcQUe9xV0ZrB7sbZ++ufkZbmom/pipdDv5lnBBs2nWQp652kIOM9IXTfOqvuA==
X-Microsoft-Antispam-PRVS: <AM5PR0301MB240149791CBEECA30CEE29B5E6EA0@AM5PR0301MB2401.eurprd03.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:;
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0;
 RULEID:(6040470)(2401047)(8121501046)(5005006)(10201501046)(93006095)(93001095)(3002001)(3231023)(944501161)(6041268)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(6072148)(201708071742011);
 SRVR:AM5PR0301MB2401; BCL:0; PCL:0; RULEID:(100000803101)(100110400095);
 SRVR:AM5PR0301MB2401; 
X-Forefront-PRVS: 0554B1F54F
X-Forefront-Antispam-Report: SFV:NSPM;
 SFS:(10009020)(6049001)(346002)(39380400002)(396003)(366004)(39860400002)(376002)(199004)(189003)(105586002)(6666003)(2950100002)(106356001)(39060400002)(31696002)(83506002)(6246003)(36756003)(7736002)(305945005)(230700001)(966005)(478600001)(53936002)(65956001)(413944005)(80792005)(72206003)(229853002)(6486002)(77096006)(97736004)(6306002)(66066001)(65806001)(47776003)(65826007)(5660300001)(2486003)(52146003)(23676004)(64126003)(31686004)(16526018)(316002)(67846002)(81156014)(8936002)(3846002)(8676002)(81166006)(386003)(6116002)(2906002)(58126008)(68736007)(76176011)(86362001)(52116002)(25786009)(26005)(50466002)(16576012);
 DIR:OUT; SFP:1101; SCL:1; SRVR:AM5PR0301MB2401; H:[10.17.180.109]; FPR:;
 SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
Received-SPF: None (protection.outlook.com: epam.com does not designate
 permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtBTTVQUjAzMDFNQjI0MDE7MjM6Qng0L0RZSFVjYVRJV2l0WEtMdWl6RzJj?=
 =?utf-8?B?UGZaRG5FbTJzemtYeTFsY3liUlFEbEduWnZFWDBTNUJiZ1dQTjFRbEdQWFVV?=
 =?utf-8?B?UlNYWHZFLzVHWHVxQ3p2ZGQ5QkFWNUlPeXlTaS8vUUQwQ0VLd2ozcmtRMC8r?=
 =?utf-8?B?N2dDTFJwTTYrUzNyV1FVczR5OTA2OXRZT1VZNmhEY2F0S0Qrb3B0UHlyNU41?=
 =?utf-8?B?TFJhZ0grT0hYNFVRT2grWHRJODBJLzZBSkNOV3owMnVrclhSUnhuL3V2dlBt?=
 =?utf-8?B?VXZOcEdIMm5hekpSeXZWUkJqSUQ5eW1HT3ZpQlRPRmZVTXpvQW00bkZUamJw?=
 =?utf-8?B?R0xVMnZzUHpnTzZwREtGdXlBOEhkKy9YZjNPU0VsTDdVRWRSQkwzUllEMmdl?=
 =?utf-8?B?cklaQUJ1dW51ZVk3VzhnN21wb21QZ3JsclBzNk16dkFkNGtheldQOTRpTXNu?=
 =?utf-8?B?VWxyNXRwOUVKSFhhUGRQeEttQUpIK3IyRHFqRlBZd2twVm5aTGgvTWFOWWFN?=
 =?utf-8?B?VFFLby9BZXRDbHRZUkJPbTFwL3BsaFBYUGVaamVQODhOdVpUeDdJb29PNnVR?=
 =?utf-8?B?MTN1SncxRHBNaGY5Ymt3Z2JYTkFFVksvVHIyQ0ZmVlp1c1hnejEvVzJPNU0z?=
 =?utf-8?B?UFpPTEo0b0ZuSzcyQ00vQ2FlM3NBVmp4M1FqenRrY1JrT2xib3NkNWxBWXhF?=
 =?utf-8?B?TU5lTTVnVnB6RlZ5b3ZyMU84OEpyOFVsRTJpNE9iUFNyeUlDd0N5ZkFORDZt?=
 =?utf-8?B?cWliNkh2K3g2bGJGVjVmZzVIdUo3VUtJc2Z2d1pqdEV4OVJkWmNlRDhWWnp3?=
 =?utf-8?B?QTBweXljWmFTQ3orVTRucFp2QzQ0TGNGeXB6d0Z3ZDJiaHZRYzczK2Z0WjBE?=
 =?utf-8?B?MVpteDdDTFc4UE5EclhVWnBhb2J4ZEZ3VmpRaE1jOXJ2VXBCL3hvZDJXNW9q?=
 =?utf-8?B?TmRyanptSmZWRmRvbWh5S1JzNUpPMnV0b1VQaVJQblVVUDVqa2lwR1ZKY0VT?=
 =?utf-8?B?UThBSnpQK1Qxcyt0VXZvRjN5L29seE5Ub0xGMy9TUXczSFFSTWp6dXd0S3Rj?=
 =?utf-8?B?MnFsMnB2dkdtSTlDeis5SzN0U3BBWjdEc1p4WlRmNXRsamZzTWZOaWlWeGxC?=
 =?utf-8?B?KzdqZ0c3NFprdU1iQ3RZanFrdVV2YWRLTUxJanJnVDFVZVVvNDdVMWUrbkUv?=
 =?utf-8?B?Zld4UTQrYWV2bURFRXlwSzNMNEZyQXkvTXhHVWhJMFJ2cERBL0JDNy9sWFNG?=
 =?utf-8?B?UzFnTVNQeHBoSzRBaGxqSkw4eWpLRm11NEkweGNHRnFZSUxlYWpTSzdKcFN5?=
 =?utf-8?B?SWxzT3J4c3l4TFZmZWF2dHJneHdScXZYYUoxRFJ5SXhZVENZZmoxY3Q4OGtI?=
 =?utf-8?B?T1A1akJUZEF2TTRVWkFRdjNEdnozOCtkanBuLzFWMWZGMWx5VUFhNDA0emYv?=
 =?utf-8?B?L3NYSmNYZmlFOFlLK0gzTU5GWGk4TnBtWEJuSUlSK2J2VTJwMHFkN1VYZ2kr?=
 =?utf-8?B?L0paWThzbDZUanB2aWpRdnh4ekFzSkpZTjIyVG9sRVJnUVJKMjd1OEhwbUM1?=
 =?utf-8?B?eEcxQ1B1eENsVlhOMnBwRUpycmppTXhpcGZqT3owb1p5VEJMd3BvVGxjZDVj?=
 =?utf-8?B?VElkTEM4dzk2UnltSVAvOHFtS0hydHFIbFhPR1AxeURuZndyVE9lbkdqbGRp?=
 =?utf-8?B?N1dvVEpyejVFTXpYSXNGQUNsYXZ4US9RQ0I0RjlJWXUxWERTRmE0dUYycU1E?=
 =?utf-8?B?cFJKeGdZS1FCdmVFaWNZSEoxcklaT09aTmFTREp3ZjU3Y0l2d0R2M0R1bUMr?=
 =?utf-8?B?Vzd1Yll3ZjhpOTlRNmFYcVJrVzcvMC8zcytHVUxoNkRLcnNJdCtacjA0Nm9O?=
 =?utf-8?B?MExEbE5ScHdVdENTSUQxNG9rMzJkdWxDUmZmMEtNRjRXelhsUnhDZWRtMDA1?=
 =?utf-8?B?TzRqTWtuTFdKSHc9PQ==?=
X-Microsoft-Exchange-Diagnostics: 1; AM5PR0301MB2401;
 6:Rw076UIAb8Zx6hBoQ/Ut1f9O6nZRd8h8Cwklu61UXBn4owBQgq7QY2+f3SrpIqnvDVbwfhxh7mTxvFk+iOEqhvB1T4WG/gbsUNt5bBqOTwrFwxvWc3uCGdA3ywsOxG0mRZVVpZnTKeHZuglstjioJeJDY4dpqmuM9Nh7KvKW62U/F/Px/+hgURpAJGF5nnDvgXIJRZEDveaLzt/+/JD3BcwREjAuE0yGa92GDQ27OQfsRdViyp/btQLGoQtWoTecEI/3gstiJvHOtklVnSIH/VQkB9zE0P5lFq2pLXF1Y7fVj4ierkX3XxMRUXrPB/pGxcANuXGsJ3UitR9DyBFqwhcdKuYlPLUnROOs25VbiAU=;
 5:dW4qaxEdxR5FeT6md/alfzQW2XEs3yDPdMdugNQa3LZeGg6/o5cABzOw19El2USK2nTCxAJYGEvrq1BXemnQJbojQn2VQDFiXWy8OBXDiFlGTs5+wjLXrwtqCjPQWgxe91nbvAJUE0XgVKUqCMoAkLUGfAJlG1jeFt3vuV63C7E=;
 24:xXegv4/0r3fSZ/QIaSjD+hXR1ALMA69r7ukZatuluZ/JDujSx23NHWrBwzuxfs/GN2nWHUYZkTfEPR6pt//1gJki0Ss1X23U1iW2Fa+W7WU=;
 7:Hnvncy6uwRWkyF/jIwXLAheLB+qSxkcQeDAHgd1PbKzt+8TnzRsxfUEKMXKKUODQ0ohf1RGKlVkQnVQPGBC9Sguon37bXOfKECKIMELc9I2rt1w1HSsUAGVf/zbXrxuBdEIdrjltlTu2OBmgwyo6uelundt+tq5r7gvAesR0hLkpNqXsExpMLHV4WuyOPAOHJmLyi78/f1nuNwhNMyyL+JqgB+VuihXdcEdDBOuRBryDCeHfxBM5YkEy3LmjA8NP
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: epam.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jan 2018 15:52:27.9208 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 57b55e1d-67b9-46c0-6ead-08d55cf9252f
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: b41b72d0-4e9f-4c26-8a69-f949f367c91d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0301MB2401
X-Mailman-Approved-At: Wed, 17 Jan 2018 12:25:16 +0000
Subject: Re: [Xen-users] [Xen-devel] Access I2C bus from guest/DomU on ARM
	board
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

RGVhciBSYWplc2gsCgoKWW91IGNhbiB0cnkgdG8gZ2V0IGFuIEkyQyBidXMgY29udHJvbGxlciBp
biBEb21VIGluIFBJTyBtb2RlIGZvbGxvd2luZyAKWzFdLCBrZWVwaW5nIGluIG1pbmQgWzJdLgoK
SWYgeW91IHdhbnQgaXQgRE1BIGNhcGFibGUgeW91IG5lZWQgUmVuZXNhcyBJUE1NVSBzdXBwb3J0
IGluIFhFTiBbM10sIApbNF0gdG8gYmUgaW5jb3Jwb3JhdGVkLgoKClsxXSAtIGh0dHBzOi8veGVu
Yml0cy54ZW4ub3JnL2RvY3MvdW5zdGFibGUvbWlzYy9hcm0vcGFzc3Rocm91Z2gudHh0CgpbMl0g
LSAKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9hcmNoaXZlcy9odG1sL3hlbi11c2Vycy8y
MDE3LTEwL21zZzAwMDMxLmh0bWwKClszXSAtIApodHRwczovL2xpc3RzLnhlbnByb2plY3Qub3Jn
L2FyY2hpdmVzL2h0bWwveGVuLWRldmVsLzIwMTctMDcvbXNnMDI1NDUuaHRtbAoKWzRdIC0gCmh0
dHBzOi8vbGlzdHMueGVucHJvamVjdC5vcmcvYXJjaGl2ZXMvaHRtbC94ZW4tZGV2ZWwvMjAxNy0w
Ny9tc2cwMjY3OS5odG1sCgoKLS0gCgoqQW5kcmlpIEFuaXNvdioKCgoKX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlzdApY
ZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9y
Zy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Wed Jan 17 13:39:27 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jan 2018 13:39:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebnv2-0002bP-GA; Wed, 17 Jan 2018 13:38:20 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=x9l3=em=kota.moe=nospam@srs-us1.protection.inumbo.net>)
 id 1ebnv1-0002bJ-Cr
 for xen-users@lists.xenproject.org; Wed, 17 Jan 2018 13:38:19 +0000
X-Inumbo-ID: 755c421b-fb8b-11e7-b4a6-bc764e045a96
Received: from mail-qk0-x242.google.com (unknown [2607:f8b0:400d:c09::242])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 755c421b-fb8b-11e7-b4a6-bc764e045a96;
 Wed, 17 Jan 2018 14:36:45 +0100 (CET)
Received: by mail-qk0-x242.google.com with SMTP id k201so10205448qke.9
 for <xen-users@lists.xenproject.org>; Wed, 17 Jan 2018 05:38:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kota.moe; s=google;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=3ODQMFxi+/nc6IM9IgKhllg5e7Z0sEfATowjSbBJ7aw=;
 b=NAgVL913NM7BAO4//ZrsrBCHnUYU4WjQemCCH4EVrPFvf1pFEtMqsAxtdb4Q55ZKgZ
 ZdJ8zmI0WIA6t/srWUN7AVBQdn+x6V/m3HOwka8Zp8Je4EZQq4nXN+wNBKpAUMi0mMsT
 H8/H2MxDBJLdBSAH7VpoClgNpm+fbHVKrTKW0=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=3ODQMFxi+/nc6IM9IgKhllg5e7Z0sEfATowjSbBJ7aw=;
 b=FNcCwOo8CuAxDQgmGPMkT6v6eu7hP332t4pcjujIxEkKKyMVALsc+2JdIm9UpyE1Os
 ayeZi4bkDcX3UAj5Fo8lYCXYwzBR52fV388UEW3LCys8eHsHYCaubHDwj5pBtnDHy34Z
 eKBkfGmRPfer7tFjjYk89tIidJZkd3VYOEiKaFTvQe/1OklVx00hUIxJ3eXJ6S6kZVhH
 SfXluvpnQnjgweqvZZVclG7W/OawOx/5UeQ2eH44v7gfYfX/M55HS6tGfqxsjvZM8C3r
 tjJJTyfYopaHacHGqBVJq/OqcdnSPvaGacU6k1e48tFpFcsHzeeTbuw+zITJOld92QuO
 mctg==
X-Gm-Message-State: AKGB3mJpWt4TzO7o0gDcpq8VNBU9zuXXyZKSJUl2re/gCZtjYm3vNpNd
 KBr1GfYr01JZ3n7eLn3uxiBAG3NjvFN/Jk5hJnCEtw==
X-Google-Smtp-Source: ACJfBosrB5bfzAy5pylUISAKIfqiv9ZqB0ahO8IocgqyeZEDhVjaUMSXi3rUojvOqbOMGdd0D+AomyMfEWJPPYfyP18=
X-Received: by 10.55.138.68 with SMTP id m65mr46404952qkd.166.1516196295308;
 Wed, 17 Jan 2018 05:38:15 -0800 (PST)
MIME-Version: 1.0
Received: by 10.200.37.40 with HTTP; Wed, 17 Jan 2018 05:37:34 -0800 (PST)
In-Reply-To: <32c94ff4-9b31-6c71-ab44-18c996174b38@free.fr>
References: <54ec6ab3-0d0d-7930-a653-ea5222bbe578@free.fr>
 <8472a9ae-b7ef-f9ac-02da-e14f32abca8d@free.fr>
 <CACsxjPZgNRxiWvdvgtTUn7JTkEdSgTSWPLBsBUPvZSjZBUnB1g@mail.gmail.com>
 <32c94ff4-9b31-6c71-ab44-18c996174b38@free.fr>
From: =?UTF-8?B?4oCN5bCP5aSq?= <nospam@kota.moe>
Date: Thu, 18 Jan 2018 00:37:34 +1100
Message-ID: <CACsxjPbaC3L9s4FhKx1mp22f9pN5x7QDsBuwoWopK9WJHhYiJw@mail.gmail.com>
To: =?UTF-8?Q?St=C3=A9phane_PERON?= <s.peron@free.fr>
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] can't access to qemu console
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1251732599104381384=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============1251732599104381384==
Content-Type: multipart/alternative; boundary="94eb2c0761d2978b4a0562f8f5a8"

--94eb2c0761d2978b4a0562f8f5a8
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On 17 January 2018 at 00:49, St=C3=A9phane PERON <s.peron@free.fr> wrote:

> Thanks not !! But not implemented in xen 4.6
>
Yea, you'll need 4.9 (or maybe 4.8).
Alternatively, if you must use 4.6 but willing to compile from source, it's
probably not that hard to backport the patch:
https://patchwork.kernel.org/patch/9316367/

--94eb2c0761d2978b4a0562f8f5a8
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On 1=
7 January 2018 at 00:49, St=C3=A9phane PERON <span dir=3D"ltr">&lt;<a href=
=3D"mailto:s.peron@free.fr" target=3D"_blank">s.peron@free.fr</a>&gt;</span=
> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF">
    <p>Thanks not !! But not implemented in xen 4.6<br></p></div></blockquo=
te></div>Yea, you&#39;ll need 4.9 (or maybe 4.8).<br></div><div class=3D"gm=
ail_extra">Alternatively, if you must use 4.6 but willing to compile from s=
ource, it&#39;s probably not that hard to backport the patch: <a href=3D"ht=
tps://patchwork.kernel.org/patch/9316367/">https://patchwork.kernel.org/pat=
ch/9316367/</a><br></div></div>

--94eb2c0761d2978b4a0562f8f5a8--


--===============1251732599104381384==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============1251732599104381384==--


From xen-users-bounces@lists.xenproject.org Wed Jan 17 14:03:56 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jan 2018 14:03:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eboJW-0004rM-Rh; Wed, 17 Jan 2018 14:03:38 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=q8xv=em=gmail.com=saumyarajesh93@srs-us1.protection.inumbo.net>)
 id 1eboJU-0004qp-Jx
 for xen-users@lists.xenproject.org; Wed, 17 Jan 2018 14:03:36 +0000
X-Inumbo-ID: fe70ea88-fb8e-11e7-b4a6-bc764e045a96
Received: from mail-vk0-x22a.google.com (unknown [2607:f8b0:400c:c05::22a])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id fe70ea88-fb8e-11e7-b4a6-bc764e045a96;
 Wed, 17 Jan 2018 15:02:03 +0100 (CET)
Received: by mail-vk0-x22a.google.com with SMTP id v70so11552516vkd.8;
 Wed, 17 Jan 2018 06:03:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=L8OMZI4CJOtVPIL9qwQHjKWZO2QX6XoKetXO9AYHH4s=;
 b=guce/Xt8SrwU69nmiavxiJHb2cgJikytlvGnU3fnWODn2Wi+27DrJpIZM/Es01XCvE
 u6pAo3+OwO5bXtxx1hzIj4TEOhD/ua7DoPTMEIJf718DApbxoQZO+BtYMzuAoSKHjcTu
 qHx39Rs558WQcUCZywhTQrh/aQHsQtpMBagTpGI39CQdJ0AEybuccLIUaecJrbVCtmIj
 FUc6XTwYHx3INCCoDTN4/zRlTXzv5+sRHA+naXHBdFfQLURikoI5L50e7z8OPOWFVVed
 Gr/f3awEXzTPfIPlxSAw3pQuCpj7m3sq2Cutya2vs5zrw6MSvE7JNpx+9bhoNpEauZy1
 PtoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=L8OMZI4CJOtVPIL9qwQHjKWZO2QX6XoKetXO9AYHH4s=;
 b=ng1quSq5pI58C5YA6oy9yqJ/OQ+OAGukl66aR+BIgoYVrolGGZG+BHWjZ0H6iadvAQ
 6kg6YD6pVbNaegsWg8EOPsft/S/WnglWgZJFyBDwbNYGqucbUEpIckIUYJa4ZCmZg6tw
 3E4RiHoYfGOpZKE2AE5lt2kZqsUPRDo2AjlXrPnHHo7H27fV6a0gwyTYhKupXuTBTX18
 +OJpdQldvN4/UgCXxLzPx1qi0cd5lINDWYPsyjRc5KdULfVqDCoAzIkTG8QtIHFUjxCG
 SOczH7XWfrVQDHCyHy8VP06kTa18FmzEieWhfUthbwXcQ41vUcqgs/cZ4GmiMAUk2jvH
 K+AA==
X-Gm-Message-State: AKwxytcvYPDEoSSyeL8CErFcU+WU9LoP+LG7r0lowYQUelo+XeBwcvoS
 bIMJigmGCH42/Jot4myzmIKjd09A5oJAqtaN69Y=
X-Google-Smtp-Source: ACJfBot3jLCpStAxu81XzA5O3engJSAqfM/962TMoxKCflzQDo5woANSyQnlTc9iZggMBoQ7yBjvL9MaCMFUvuEQ1Rc=
X-Received: by 10.31.212.135 with SMTP id l129mr2060099vkg.31.1516197813863;
 Wed, 17 Jan 2018 06:03:33 -0800 (PST)
MIME-Version: 1.0
Received: by 10.103.87.129 with HTTP; Wed, 17 Jan 2018 06:03:33 -0800 (PST)
In-Reply-To: <37217807-7f20-bdbf-f852-033fcae1bd01@epam.com>
References: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
 <37217807-7f20-bdbf-f852-033fcae1bd01@epam.com>
From: Saumya Rajesh <saumyarajesh93@gmail.com>
Date: Wed, 17 Jan 2018 19:33:33 +0530
Message-ID: <CAONE6OCM9wEd6zJCH5147vTMWyt4CGH9uXbBX0y29di9cC3QaQ@mail.gmail.com>
To: Andrii Anisov <andrii_anisov@epam.com>
Cc: xen-devel@lists.xenproject.org, embedded-pv-devel@lists.xenproject.org,
 xen-users@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Access I2C bus from guest/DomU on ARM
	board
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3584346737619061837=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============3584346737619061837==
Content-Type: multipart/alternative; boundary="001a114eb4601ac9820562f95016"

--001a114eb4601ac9820562f95016
Content-Type: text/plain; charset="UTF-8"

On Tue, Jan 16, 2018 at 9:22 PM, Andrii Anisov <andrii_anisov@epam.com>
wrote:

> Dear Rajesh,
>
>
> You can try to get an I2C bus controller in DomU in PIO mode following
> [1], keeping in mind [2].
>
> If you want it DMA capable you need Renesas IPMMU support in XEN [3], [4]
> to be incorporated.
>
>
> [1] - https://xenbits.xen.org/docs/unstable/misc/arm/passthrough.txt
>
> [2] - https://lists.xenproject.org/archives/html/xen-users/2017-10
> /msg00031.html
>
> [3] - https://lists.xenproject.org/archives/html/xen-devel/2017-07
> /msg02545.html
>
> [4] - https://lists.xenproject.org/archives/html/xen-devel/2017-07
> /msg02679.html
>
>
> --
>
> *Andrii Anisov*
>
>
>
Thank you Andrii for replying. I will try the device passthrough way of
using I2C bus from guest and post the updates.

Just out of curiosity, is it possible to split the Driver for the Renesas
RCar I2C unit [1] into frontend and backend to use the i2c bus from guest?
Or to do something similar to PCI passthrough? Please forgive me if I sound
illogical. I'm just curious.

Regards
Saumya

[1]
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/tree/drivers/i2c/busses/i2c-rcar.c?h=v4.14.13

--001a114eb4601ac9820562f95016
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On T=
ue, Jan 16, 2018 at 9:22 PM, Andrii Anisov <span dir=3D"ltr">&lt;<a href=3D=
"mailto:andrii_anisov@epam.com" target=3D"_blank">andrii_anisov@epam.com</a=
>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">De=
ar Rajesh,<br>
<br>
<br>
You can try to get an I2C bus controller in DomU in PIO mode following [1],=
 keeping in mind [2].<br>
<br>
If you want it DMA capable you need Renesas IPMMU support in XEN [3], [4] t=
o be incorporated.<br>
<br>
<br>
[1] - <a href=3D"https://xenbits.xen.org/docs/unstable/misc/arm/passthrough=
.txt" rel=3D"noreferrer" target=3D"_blank">https://xenbits.xen.org/docs/u<w=
br>nstable/misc/arm/passthrough.t<wbr>xt</a><br>
<br>
[2] - <a href=3D"https://lists.xenproject.org/archives/html/xen-users/2017-=
10/msg00031.html" rel=3D"noreferrer" target=3D"_blank">https://lists.xenpro=
ject.org/a<wbr>rchives/html/xen-users/2017-10<wbr>/msg00031.html</a><br>
<br>
[3] - <a href=3D"https://lists.xenproject.org/archives/html/xen-devel/2017-=
07/msg02545.html" rel=3D"noreferrer" target=3D"_blank">https://lists.xenpro=
ject.org/a<wbr>rchives/html/xen-devel/2017-07<wbr>/msg02545.html</a><br>
<br>
[4] - <a href=3D"https://lists.xenproject.org/archives/html/xen-devel/2017-=
07/msg02679.html" rel=3D"noreferrer" target=3D"_blank">https://lists.xenpro=
ject.org/a<wbr>rchives/html/xen-devel/2017-07<wbr>/msg02679.html</a><span c=
lass=3D"gmail-HOEnZb"><font color=3D"#888888"><br>
<br>
<br>
-- <br>
<br>
*Andrii Anisov*<br>
<br>
<br>
</font></span></blockquote></div><br></div><div class=3D"gmail_extra"><div =
class=3D"gmail_extra"><font face=3D"tahoma, sans-serif">Thank you Andrii fo=
r replying. I will try the device passthrough way of using I2C bus from gue=
st and post the updates.=C2=A0</font></div><div class=3D"gmail_extra"><font=
 face=3D"tahoma, sans-serif"><br></font></div><div class=3D"gmail_extra"><f=
ont face=3D"tahoma, sans-serif">Just out of curiosity, is it possible to sp=
lit the Driver for the Renesas RCar I2C unit [1] into frontend and backend =
to use the i2c bus from guest? Or to do something similar to PCI passthroug=
h? Please forgive me if I sound illogical. I&#39;m just curious.</font></di=
v><div class=3D"gmail_extra"><font face=3D"tahoma, sans-serif"><br></font><=
/div><div class=3D"gmail_extra"><font face=3D"tahoma, sans-serif">Regards</=
font></div><div class=3D"gmail_extra"><font face=3D"tahoma, sans-serif">Sau=
mya</font></div><div class=3D"gmail_extra"><font face=3D"tahoma, sans-serif=
"><br></font></div><div class=3D"gmail_extra"><font face=3D"tahoma, sans-se=
rif">[1] <a href=3D"https://git.kernel.org/pub/scm/linux/kernel/git/stable/=
linux-stable.git/tree/drivers/i2c/busses/i2c-rcar.c?h=3Dv4.14.13">https://g=
it.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/tree/drivers=
/i2c/busses/i2c-rcar.c?h=3Dv4.14.13</a></font></div></div></div>

--001a114eb4601ac9820562f95016--


--===============3584346737619061837==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============3584346737619061837==--


From xen-users-bounces@lists.xenproject.org Wed Jan 17 17:14:29 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jan 2018 17:14:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ebrHB-0003hu-Ax; Wed, 17 Jan 2018 17:13:25 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=ixl7=em=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1ebrHA-0003h9-5s
 for xen-users@lists.xen.org; Wed, 17 Jan 2018 17:13:24 +0000
X-Inumbo-ID: 102a629c-fbaa-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 102a629c-fbaa-11e7-b0d7-9f685aff125f;
 Wed, 17 Jan 2018 17:15:49 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1ebrGm-0007Li-9H; Wed, 17 Jan 2018 17:13:00 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1ebrGm-0003TG-2n; Wed, 17 Jan 2018 17:13:00 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1ebrGm-0003TG-2n@xenbits.xenproject.org>
Date: Wed, 17 Jan 2018 17:13:00 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 9

        Information leak via side effects of speculative execution

UPDATES IN VERSION 9
====================

"Stage 1" pagetable isolation (PTI) Meltdown fixes for Xen are
available.

"Comet" updates to shim code (4.10 branch):
 * Include >32vcpu workaround in shim branch so that all shim
   guests can boot without hypervisor changes.
 * Fix shim build on systems whose find(1) lacks -printf
 * Place shim trampoline at page 0x1 to avoid having 0 mapped
(4.8 "Comet" users are using the 4.10 shim and may want to update.)

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by page-table isolation ("PTI").
See Resolution below.

SP3 can be mitigated by running guests in HVM or PVH mode.
(Within-guest attacks are still possible unless the guest OS has also
been updated with an SP3 mitigation series such as KPTI/Kaiser.)

For guests with legacy PV kernels which cannot be run in HVM or PVH
mode directly, we have developed two "shim" hypervisors that allow PV
guests to run in HVM mode or PVH mode.  This prevents attacks on the
host, but it leaves the guest vulnerable to Meltdown attacks by its
own unprivileged processes, even if the guest OS has KPTI or similar
Meltdown mitigation.

The HVM shim (codenamed "Vixen") is available now, as is the PVH shim
(codenamed "Comet") for Xen 4.10 and Xen 4.8.   Please read
README.which-shim to determine which shim is suitable for you.


$ sha256sum xsa254*/*
1cba14ff83844d001d6c8a74afc3f764f49182cc7a06bb4463548450ac96cc2f  xsa254/README.comet
cddd78cd7a00df9fa254156993f0309cea825d600f5ad8b36243148cf686bc9b  xsa254/README.pti
3ef42381879befc84aa78b67d3a9b7b0cd862a2ffa445810466e90be6c6a5e86  xsa254/README.vixen
7e816160c1c1d1cd93ec3c3dd9753c8f3957fefe86b7aa967e9e77833828f849  xsa254/README.which-shim
1d2098ad3890a5be49444560406f8f271c716e9f80e7dfe11ff5c818277f33f8  xsa254/pvshim-converter.pl
$

RESOLUTION
==========

These are hardware bugs, so technically speaking they cannot be
properly fixed in software.  However, it is possible in many cases to
provide patches to software to work around the problems.


There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.


SP3 can be mitigated by page-table isolation ("PTI").

We have a "stage 1" implementation.  It allows 64-bit PV guests to be
run natively while restricting what can be accessed via SP3 to the Xen
stack of the current pcpu (which may contain remnants of information
from other guests, but should be much more difficult to attack
reliably).

Unfortunately these "stage 1" patches incur a non-negligible
performance overhead; about equivalent to the "PV shim" approaches
above.  Moving to plain HVM or PVH guests is recommended where
possible.  For more information on that, see below.

Patches for the "stage-1" PTI implementation are available in the Xen
staging-NN branches for each Xen revision.  See README.pti for
specific revisons.


NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaX4QSAAoJEIP+FMlX6CvZubQH/iuxfjnW24mzMX+hVughCH5Q
PKoZiNDnKMoWCzztrRjMNNcXRFcLAo+IU/+jWdjytJr5ISvNtICPtU6mzRTduqRe
KwfvOxrX8bfkoxJWdM7g4ux6sGTNKGS27+HaJYHNBypPexmwQwb/GBJnp+Yj+TRJ
0p+OGvN/F+gVBrOm17rD2/NE2jwDLa3WAX/oS12WaTJtwvnnFjTKmNAKj4XU3FRs
PMZdmE6Iimix5rA6YlYLmmsVrS+kD9B7SSU2CRX0wqOQcFpLn1ZM1QXQ7ux7p9+I
bAE7EMrA28ZJ+TS8H+1AYYL8e8xvo2/KIXPjEKsEAEr1nXIEOciSuVjHByvTGbQ=
=2SAx
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa254/README.comet"
Content-Disposition: attachment; filename="xsa254/README.comet"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.pti"
Content-Disposition: attachment; filename="xsa254/README.pti"
Content-Transfer-Encoding: base64

ICAgICAgICAgICAgICAgICAgICAgIFhlbiBwYWdlLXRhYmxlIGlzb2xhdGlv
biAoWFBUSSkKICAgICAgICAgICAgICAgICAgICAgID09PT09PT09PT09PT09
PT09PT09PT09PT09PT09PT0KClN1bW1hcnkKLS0tLS0tLQoKVGhpcyBSRUFE
TUUgZ2l2ZXMgcmVmZXJlbmNlcyBmb3Igb25lIG9mIHRocmVlIG1pdGlnYXRp
b24gc3RyYXRlZ2llcwpmb3IgTWVsdGRvd24uCgpUaGlzIHNlcmllcyBpcyBh
IGZpcnN0LWNsYXNzIG1pZ2l0YXRpb24gcGFnZXRhYmxlIGlzb2xhdGlvbiBz
ZXJpZXMgZm9yClhlbi4gIEl0IGlzIGF2YWlsYWJsZSBmb3IgWGVuIDQuNiB0
byBYZW4gNC4xMCBhbmQgbGF0ZXIuCgpQcmVjaXNlIGdpdCBjb21taXRzIGFy
ZSBhcyBmb2xsb3dzOgoKNC4xMDoKCjdjY2NkNmY3NDhlYzcyNGNmOTQwOGNl
YzZiM2VjOGU1NGE4YTJjMWYgeDg2OiBhbGxvdyBNZWx0ZG93biBiYW5kLWFp
ZCB0byBiZSBkaXNhYmxlZAoyMzRmNDgxMzM3ZWExYTkzZGI5NjhkNjE0NjQ5
YTZiZGZkYzg0MThhIHg4NjogTWVsdGRvd24gYmFuZC1haWQgYWdhaW5zdCBt
YWxpY2lvdXMgNjQtYml0IFBWIGd1ZXN0cwo1N2RjMTk3Y2YwZDM2YzU2YmEx
ZDlkMzJjNmExNDU0YmI1MjYwNWJiIHg4Ni9tbTogQWx3YXlzIHNldCBfUEFH
RV9BQ0NFU1NFRCBvbiBMNGUgdXBkYXRlcwo5MTBkZDAwNWRhMjBmMjdmMzQx
NWI3ZWNjZGY0MzY4NzQ5ODk1MDZiIHg4Ni9lbnRyeTogUmVtb3ZlIHN1cHBv
cnQgZm9yIHBhcnRpYWwgY3B1X3VzZXJfcmVncyBmcmFtZXMKCjQuOToKCmRj
N2Q0NjU4MGQ5YzYzM2E1OWJlMWMzNzc2Zjc5YzAxZGQwY2I5OGIgeDg2OiBh
bGxvdyBNZWx0ZG93biBiYW5kLWFpZCB0byBiZSBkaXNhYmxlZAoxZTA5NzQ2
MzhkNjVkOWI4YWNmOWFjNzUxMWQ3NDcxODhmMzhiY2MzIHg4NjogTWVsdGRv
d24gYmFuZC1haWQgYWdhaW5zdCBtYWxpY2lvdXMgNjQtYml0IFBWIGd1ZXN0
cwo4N2VhNzgxNjI0NzA5MGU4ZTViYzU2NTNiMTZjNDEyOTQzYTA1OGI1IHg4
Ni9tbTogQWx3YXlzIHNldCBfUEFHRV9BQ0NFU1NFRCBvbiBMNGUgdXBkYXRl
cwoyMjEzZmZlMWEyZDgyYzNjOWM0YTE1NGVhNmVlMjUyMzk1YWE4NjkzIHg4
Ni9lbnRyeTogUmVtb3ZlIHN1cHBvcnQgZm9yIHBhcnRpYWwgY3B1X3VzZXJf
cmVncyBmcmFtZXMKCjQuODoKCjMxZDM4ZDYzM2EzMDZiMmIwNjc2N2I1YTVm
NWE4YTAwMjY5ZjNjOTIgeDg2OiBhbGxvdyBNZWx0ZG93biBiYW5kLWFpZCB0
byBiZSBkaXNhYmxlZAoxYmE0NzdiZGU3MzdiZjliMjhjYzQ1NWJlZjFlOWE2
YmM3NmQ2NmZjIHg4NjogTWVsdGRvd24gYmFuZC1haWQgYWdhaW5zdCBtYWxp
Y2lvdXMgNjQtYml0IFBWIGd1ZXN0cwowNDllMmY0NWJmYTQ4ODk2NzQ5NDQ2
NmVjNjUwNmMzZWNhZTVmZTBlIHg4Ni9tbTogQWx3YXlzIHNldCBfUEFHRV9B
Q0NFU1NFRCBvbiBMNGUgdXBkYXRlcwphN2NmMGEzYjgxODM3N2E4YTQ5YmFl
ZDM2MDZiZmEyZjIxNGNkNjQ1IHg4Ni9lbnRyeTogUmVtb3ZlIHN1cHBvcnQg
Zm9yIHBhcnRpYWwgY3B1X3VzZXJfcmVncyBmcmFtZXMKCjQuNzoKCmUxOWQw
YWY0ZWUyYWU5ZTQyYTg1ZGI2MzlmZDY4NDhlNzJmNTY1OGIgeDg2OiBhbGxv
dyBNZWx0ZG93biBiYW5kLWFpZCB0byBiZSBkaXNhYmxlZAplMTk1MTdhMzM1
NWFjYWFhMmZmODMwMThiYzQxZTdmZDA0NDE2MWU1IHg4NjogTWVsdGRvd24g
YmFuZC1haWQgYWdhaW5zdCBtYWxpY2lvdXMgNjQtYml0IFBWIGd1ZXN0cwo5
Yjc2OTA4ZTZlMDc0ZDdlZmJlYWZlNmJhZDA2NmVjYzVmM2MzYzQzIHg4Ni9t
bTogQWx3YXlzIHNldCBfUEFHRV9BQ0NFU1NFRCBvbiBMNGUgdXBkYXRlcwow
ZTZjNmZjNDQ5MDAwZDk3ZjlmYTg3ZWQxZmJlMjNmMGNmMjE0MDZiIHg4Ni9l
bnRyeTogUmVtb3ZlIHN1cHBvcnQgZm9yIHBhcnRpYWwgY3B1X3VzZXJfcmVn
cyBmcmFtZXMKCjQuNjoKCjQ0YWQ3ZjY4OTVkYTk4NjEwNDJkN2E0MWU2MzVk
NDJkODNjYjI2NjAgeDg2OiBhbGxvdyBNZWx0ZG93biBiYW5kLWFpZCB0byBi
ZSBkaXNhYmxlZAo5MWRjOTAyZmRmNDE2NTljMjEwMzI5ZDZmNjU3OGY4MTMy
ZWU0NzcwIHg4NjogTWVsdGRvd24gYmFuZC1haWQgYWdhaW5zdCBtYWxpY2lv
dXMgNjQtYml0IFBWIGd1ZXN0cwphMDY1ODQxYjNhZTlmMGVmNDliOTgyM2Nk
MjA1Yzc5ZWUwYzIyYjljIHg4Ni9tbTogQWx3YXlzIHNldCBfUEFHRV9BQ0NF
U1NFRCBvbiBMNGUgdXBkYXRlcwpjNmU5ZTYwOTU2NjliM2M2M2I5MmQyMWZk
ZGIzMjY0NDFjNzM3MTJjIHg4Ni9lbnRyeTogUmVtb3ZlIHN1cHBvcnQgZm9y
IHBhcnRpYWwgY3B1X3VzZXJfcmVncyBmcmFtZXMK

--=separator
Content-Type: application/octet-stream; name="xsa254/README.vixen"
Content-Disposition: attachment; filename="xsa254/README.vixen"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.which-shim"
Content-Disposition: attachment; filename="xsa254/README.which-shim"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/pvshim-converter.pl"
Content-Disposition: attachment; filename="xsa254/pvshim-converter.pl"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Thu Jan 18 07:51:08 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jan 2018 07:51:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ec4xd-0004Fo-G1; Thu, 18 Jan 2018 07:50:09 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=czxr=en=gmail.com=saumyarajesh93@srs-us1.protection.inumbo.net>)
 id 1ec4xb-0004FG-GC
 for xen-users@lists.xenproject.org; Thu, 18 Jan 2018 07:50:07 +0000
X-Inumbo-ID: fbaaeff0-fc23-11e7-b4a6-bc764e045a96
Received: from mail-yw0-x236.google.com (unknown [2607:f8b0:4002:c05::236])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id fbaaeff0-fc23-11e7-b4a6-bc764e045a96;
 Thu, 18 Jan 2018 08:48:33 +0100 (CET)
Received: by mail-yw0-x236.google.com with SMTP id m84so10516801ywd.5;
 Wed, 17 Jan 2018 23:50:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=1BX+WKD0bD5+ezeU4KJDLYOCCZ2IQm3S4TE46rAONDA=;
 b=i9tUwVDPxU8s8bj69rnXZJY5vWPvmq30N93bWBC7SLytuAOJno1X25GXu7yME/C0sp
 vJ9mw2oesCyGfyrqpaBuoOMfqP9AGkE+CWPTKAoWaJGSUa3UFuuFPfYvNtUvdFfhicuY
 kM0GAJ8hwa5nmqIkQzOchriedoK3wQTxIBp6zPetYdE28qg95dK4rfRfkQT6ihmFO7rD
 Tq3hkmXsTIUGUdzB328vyQE6HcvhSiYXwIMzHROVOmB8ZwCQJSMaEacKRrH8f3OcoZpL
 i1//IAFbLwEG/bMz1UvfIIT4ft7+qw8JLHcGudGrX8DOZ4pGrGfQbpulC3aXNcs1eH7I
 d/7w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=1BX+WKD0bD5+ezeU4KJDLYOCCZ2IQm3S4TE46rAONDA=;
 b=AwvBQuiZr6ZFJtaiiRkigHwzjgznRdX7oe1m0zl6UhXt0y/rpucgUp239gdnNQjub6
 sJ4RSXL2AHVh80IlY5OTf9QVixE+pFQpljsXCB9MspYfWZhD6dibQouz83/oGiI4UUl1
 BBX1UwCFll/1Dvn0qE2GI3gUz4aeuFZJ/97JnX0ICS4h597Bg4HEIrYdzJQkI+bZxVEy
 HZYhNtQDlhLz4SOD2bL9Sw0iFD4GxF9fGXZb0qQTTvcoTF3JcNjTpau27D7zKIOP6AKq
 qgG+6r9v7sxbgerXOQRjSdWBpp8Pyfb6b22M4GfahXSQFGnVik269qmW+jqwNyQdl4sI
 7agw==
X-Gm-Message-State: AKwxyte9y0m9/C5oyDCd5X+Te4C1ck9HCOpyXUp0m+A3eDR8LgWnyuO7
 ilY9uitVX0DfMR7B70IsVIqSgCX/n4O03fSRVAGr5mHxtN0=
X-Google-Smtp-Source: ACJfBotD6HIIaFpbiqcYhprSzoMA/gXdt8KK82jwIxewd0Q/f+ne410pIgZzi0bSPvB/7+r4hFLN0pkstisvgoOuvng=
X-Received: by 10.37.17.200 with SMTP id 191mr12983346ybr.331.1516261805480;
 Wed, 17 Jan 2018 23:50:05 -0800 (PST)
MIME-Version: 1.0
Received: by 10.13.211.65 with HTTP; Wed, 17 Jan 2018 23:50:05 -0800 (PST)
In-Reply-To: <bc345300-7e46-367f-4e16-db1ffa4e56d0@epam.com>
References: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
 <37217807-7f20-bdbf-f852-033fcae1bd01@epam.com>
 <CAONE6OCM9wEd6zJCH5147vTMWyt4CGH9uXbBX0y29di9cC3QaQ@mail.gmail.com>
 <bc345300-7e46-367f-4e16-db1ffa4e56d0@epam.com>
From: Saumya Rajesh <saumyarajesh93@gmail.com>
Date: Thu, 18 Jan 2018 13:20:05 +0530
Message-ID: <CAONE6OAUJ+SjvYkiAaT-0Y_8av4T0dX60R8o2OZum6g8Ucg+1w@mail.gmail.com>
To: Andrii Anisov <andrii_anisov@epam.com>, xen-users@lists.xenproject.org
Cc: xen-devel@lists.xenproject.org, embedded-pv-devel@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Access I2C bus from guest/DomU on ARM
	board
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8044326525485830730=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============8044326525485830730==
Content-Type: multipart/alternative; boundary="001a113e410c4d6053056308368b"

--001a113e410c4d6053056308368b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Wed, Jan 17, 2018 at 9:06 PM, Andrii Anisov <andrii_anisov@epam.com>
wrote:

> Rajesh,
>
> On 17.01.18 16:03, Saumya Rajesh wrote:
>
>> Just out of curiosity, is it possible to split the Driver for the Renesa=
s
>> RCar I2C unit [1] into frontend and backend to use the i2c bus from gues=
t?
>> Or to do something similar to PCI passthrough? Please forgive me if I so=
und
>> illogical. I'm just curious.
>>
> I guess you could implement PV I2C using FE/BE scheme. With enormous
> efforts and unpredictable results.
> But I'm sure it is not what you really need.
>
> --
>
> *Andrii Anisov*
>
>
>
=E2=80=8BHi Andrii

Actually I am planning to set up Android as guest in Xen. In order to
enable sound in the Android guest, I need to passthrough the audio codec
device which communicates through the I2C bus. For BE/FE scheme, I think
sharing the internal DMA and clock would pose problems. So I'm going to go
ahead with the device passthrough way.

Any thoughts or inputs you can possibly give regarding this use case will
be very helpful and valuable.

Regards
Saumya=E2=80=8B

--001a113e410c4d6053056308368b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:tahoma,s=
ans-serif"><span style=3D"font-family:arial,sans-serif">On Wed, Jan 17, 201=
8 at 9:06 PM, Andrii Anisov </span><span dir=3D"ltr" style=3D"font-family:a=
rial,sans-serif">&lt;<a href=3D"mailto:andrii_anisov@epam.com" target=3D"_b=
lank">andrii_anisov@epam.com</a>&gt;</span><span style=3D"font-family:arial=
,sans-serif"> wrote:</span><br></div><div class=3D"gmail_extra"><div class=
=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px =
0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Rajesh,<=
span class=3D"gmail-"><br>
<br>
On 17.01.18 16:03, Saumya Rajesh wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">
Just out of curiosity, is it possible to split the Driver for the Renesas R=
Car I2C unit [1] into frontend and backend to use the i2c bus from guest? O=
r to do something similar to PCI passthrough? Please forgive me if I sound =
illogical. I&#39;m just curious.<br>
</blockquote></span>
I guess you could implement PV I2C using FE/BE scheme. With enormous effort=
s and unpredictable results.<br>
But I&#39;m sure it is not what you really need.<span class=3D"gmail-HOEnZb=
"><font color=3D"#888888"><br>
<br>
-- <br>
<br>
*Andrii Anisov*<br>
<br>
<br>
</font></span></blockquote></div><br></div><div class=3D"gmail_extra"><div =
class=3D"gmail_default"><span style=3D"font-family:tahoma,sans-serif">=E2=
=80=8B</span><font face=3D"tahoma, sans-serif">Hi Andrii</font></div><div c=
lass=3D"gmail_default"><font face=3D"tahoma, sans-serif"><br></font></div><=
div class=3D"gmail_default"><font face=3D"tahoma, sans-serif">Actually I am=
 planning to set up Android as guest in Xen. In order to enable sound in th=
e Android guest, I need to passthrough the audio codec device which communi=
cates through the I2C bus. For BE/FE scheme, I think sharing the internal D=
MA and clock would pose problems. So I&#39;m going to go ahead with the dev=
ice passthrough way.=C2=A0</font></div><div class=3D"gmail_default"><font f=
ace=3D"tahoma, sans-serif"><br></font></div><div class=3D"gmail_default"><f=
ont face=3D"tahoma, sans-serif">Any thoughts or inputs you can possibly giv=
e regarding this use case will be very helpful and valuable.</font></div><d=
iv class=3D"gmail_default"><font face=3D"tahoma, sans-serif"><br></font></d=
iv><div class=3D"gmail_default"><font face=3D"tahoma, sans-serif">Regards</=
font></div><div class=3D"gmail_default"><font face=3D"tahoma, sans-serif">S=
aumya</font><span style=3D"font-family:tahoma,sans-serif">=E2=80=8B</span><=
/div><br></div></div>

--001a113e410c4d6053056308368b--


--===============8044326525485830730==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============8044326525485830730==--


From xen-users-bounces@lists.xenproject.org Thu Jan 18 11:07:32 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jan 2018 11:07:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ec81c-0006Q1-74; Thu, 18 Jan 2018 11:06:28 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=ghce=en=gmail.com=dunlapg@srs-us1.protection.inumbo.net>)
 id 1ec81a-0006PY-Lw
 for xen-users@lists.xenproject.org; Thu, 18 Jan 2018 11:06:26 +0000
X-Inumbo-ID: 68765f14-fc3f-11e7-b4a6-bc764e045a96
Received: from mail-qt0-x241.google.com (unknown [2607:f8b0:400d:c0d::241])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 68765f14-fc3f-11e7-b4a6-bc764e045a96;
 Thu, 18 Jan 2018 12:04:52 +0100 (CET)
Received: by mail-qt0-x241.google.com with SMTP id m59so29180570qte.11
 for <xen-users@lists.xenproject.org>; Thu, 18 Jan 2018 03:06:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:sender:in-reply-to:references:from:date:message-id
 :subject:to:cc;
 bh=xo45ScWfQWr+wRtIak8QTR6EiVlTThx2a011TM2Bf1M=;
 b=paZIIyighNpHkJZhKSA4Fvag4Nx+tnbUK2YbIXmXO0QO06Hto3TuVEK5XBEOehY8Cw
 5CI8QSXWjnpHX80H70e504dDSzw8Vr+K3s4SOErm+2m5eJCSfSGRTry+pvtTIMkpMo4T
 2BMij8BFMVWmmboWXsi6fG81wmBPwKEgrMV5IJsVeJDaW/dsBuictXwM9/NzLf1oHTW1
 Wr5WYwMGZYVXwhxC7wzpvuoIW5EDKKu3iwvxeq505TV4rzg2bvgN97ppTysc/0vVEpnf
 H79zIDZV4AJvxX2v7xH0glCeyYfrcjMWoinqJAMyLrkdn4/lS/uY83yvpH4S/xsAH50C
 zQ9Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
 :date:message-id:subject:to:cc;
 bh=xo45ScWfQWr+wRtIak8QTR6EiVlTThx2a011TM2Bf1M=;
 b=N1kZcYKGT3j+QOXcttcCwiW/2bH42XVN8htfR8iBtL3N+LMtlSDtiyZJEpHTyZr8JI
 +VieZqWklhDaybd38g+IES6zeHUCGD6Pm8Nnp1Qexn5EmfoD7dF4jQO8QwcG8Wwij6zw
 JVmIMCbfRTS9vVFxiLbiQEmxtwg63y/B2BEvFsoNVNrpPwIGvxoCBqrrzpoSdxcE/XPK
 Uv68mD7LUy/EMLQkrdAZndg5o3pjTg5TDi1IBBknXnFOFQvLRSlWH4IAjF/X1V0SYdMy
 dxteGz7B0+d6Mg63KHUkhe7w6XomCYQe9FkNEx7Wyxympzw7EKyr9i8j6LmU9EcqT82v
 nCEA==
X-Gm-Message-State: AKwxyteOGVYfgrP/AW3uFrwWNCnTooWUMCwJ34jhqjM2QSZDF4NVTXso
 0dKi5O+ryTQwQm299kiTAsDcTp8wj/qhcbDsyTCYBA==
X-Google-Smtp-Source: ACJfBousAH3IrsUtHNGG0qiAsxRRNTBNXCpoWUI7ZJBoGHy13p6GPCCVTDy/AqvZIVjQoROtEs+hQUH8uJ1KhukiH6s=
X-Received: by 10.55.112.132 with SMTP id l126mr16221521qkc.63.1516273584488; 
 Thu, 18 Jan 2018 03:06:24 -0800 (PST)
MIME-Version: 1.0
Received: by 10.55.24.5 with HTTP; Thu, 18 Jan 2018 03:06:24 -0800 (PST)
In-Reply-To: <20180116192615.c3cqtrr6wvebwpfq@email>
References: <mailman.5.1516104001.20885.xen-users@lists.xenproject.org>
 <20180116192615.c3cqtrr6wvebwpfq@email>
From: George Dunlap <dunlapg@umich.edu>
Date: Thu, 18 Jan 2018 11:06:24 +0000
X-Google-Sender-Auth: Xi9ZKLeqjCMEdcCJW1T7t3x7AC4
Message-ID: <CAFLBxZZ+NLEjMyo-7v5h3GUnsRDsLAj+1bsGS4gi7oBnCchW_Q@mail.gmail.com>
To: who.are.you@posteo.no
Cc: Ian Jackson <ian.jackson@eu.citrix.com>, xen-users@lists.xenproject.org
Subject: Re: [Xen-users] How to create PVHv2 DomU?
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

T24gVHVlLCBKYW4gMTYsIDIwMTggYXQgNzoyNiBQTSwgIDx3aG8uYXJlLnlvdUBwb3N0ZW8ubm8+
IHdyb3RlOgo+Cj4gSSdtIG5vdCB0aGUgZmlyc3QgdG8gbm90aWNlLCBidXQgdG8gc3VtbWFyaXNl
OiBhZnRlciB0aGUgNC45LjAtNSBrZXJuZWwgdXBkYXRlLCBgcHZoPTFgIGluIGEgWGVuIGNvbmZp
Z3VyYXRpb24gZmlsZSBub3cgY2F1c2VzIERlYmlhbiA5IERvbVVzIHRvIGZhaWwgdG8gYm9vdC4K
Pgo+IEFjY29yZGluZyB0byB0aGUgeGVuLWRldmVsIGxpc3QsIHRoaXMgaXMgaW50ZW50aW9uYWw6
Cj4gaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0Lm9yZy9hcmNoaXZlcy9odG1sL3hlbi1kZXZlbC8y
MDE4LTAxL21zZzAwNTQwLmh0bWwKPgo+IFRoZSBhYm92ZSBsaW5rIHN0YXRlcyBpdCdzIGJlY2F1
c2UgYHB2aD0xYCB3YXMgYmFzZWQgb24gdGhlICd0ZWNoIHByZXZpZXcnIG9mIFBWSCwgdmVyc2lv
biAxLgo+IEFsbGVnZWRseSB0aGVyZSBpcyBzb21lIGtpbmQgb2YgUFZIIHZlcnNpb24gMiB0aGF0
IGlzIGNvbWluZyBpbnRvIGVmZmVjdC4KPgo+IEkgY2FuJ3QgZmluZCBhbnkgaW5mb3JtYXRpb24g
b24gaG93IHRvIGFjdHVhbGx5IHVzZSBQVkggdmVyc2lvbiAyLgo+Cj4gRG9lcyBhbnlvbmUga25v
dyBob3cgdG8gYnVpbGQgYW4gaW1hZ2UsIGNvbnZlcnQgYW4gaW1hZ2UsIG9yIHdoYXRldmVyLCB0
byBhY3R1YWxseSB1c2UgUFZIIHZlcnNpb24gMj8KPiBJdCBzZWVtcyBxdWl0ZSBjcml0aWNhbCBn
aXZlbiB0aGUgbGF0ZXN0IHZ1bG5lcmFiaWxpdGllcywgYnV0IGl0IHNlZW1zIHVuY2xlYXIgYXMg
dG8gaG93IHRvIGFjdHVhbGx5IHVzZSBpdC4KCkZvciBQVkggdmVyc2lvbiAyIHlvdSBuZWVkIExp
bnV4IHN1cHBvcnQgYW5kIGh5cGVydmlzb3Igc3VwcG9ydC4gIEkKYmVsaWV2ZSB0aGUgZWFybGll
c3QgdmVyc2lvbiBvZiBMaW51eCB0aGF0IGhhZCBQVkh2MiBzdXBwb3J0IHdhcyA0LjExLgpUaGUg
ZWFybGllc3QgdmVyc2lvbiBvZiBYZW4gdGhhdCBoYWQgc29tZXdoYXQgdXNlYWJsZSAidGVjaCBw
cmV2aWV3IgpQVkh2MiBzdXBwb3J0IHdhcyBwcm9iYWJseSA0LjguICBUaGUgZmlyc3QgdmVyc2lv
biBvZiBYZW4gdGhhdApvZmZpY2lhbGx5IHN1cHBvcnRlZCBQVkh2MiB3YXMgNC4xMDsgdGhlIFhl
blByb2plY3QgU2VjdXJpdHkgVGVhbSBoYXZlCmJhY2twb3J0ZWQgZnVsbCBQVkggc3VwcG9ydCB0
byBYZW4gNC44IHZpYSB0aGUgIkNvbWV0IiBicmFuY2guCgogLUdlb3JnZQoKX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJzIG1haWxpbmcgbGlz
dApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0cy54ZW5wcm9qZWN0
Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

From xen-users-bounces@lists.xenproject.org Thu Jan 18 18:40:00 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jan 2018 18:40:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ecF5d-0007xP-SG; Thu, 18 Jan 2018 18:39:05 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=lfdo=en=xenproject.org=aliasfile-bounces@srs-us1.protection.inumbo.net>)
 id 1ecF5c-0007wm-EY
 for xen-users@lists.xen.org; Thu, 18 Jan 2018 18:39:04 +0000
X-Inumbo-ID: 34cf0fdd-fc7f-11e7-b0d7-9f685aff125f
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 34cf0fdd-fc7f-11e7-b0d7-9f685aff125f;
 Thu, 18 Jan 2018 18:41:33 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <aliasfile-bounces@xenproject.org>)
 id 1ecF5F-0002Qa-AN; Thu, 18 Jan 2018 18:38:41 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.84_2)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1ecF5F-00031D-7Y; Thu, 18 Jan 2018 18:38:41 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Message-Id: <E1ecF5F-00031D-7Y@xenbits.xenproject.org>
Date: Thu, 18 Jan 2018 18:38:41 +0000
Cc: "Xen.org security team" <security-team-members@xen.org>
Subject: [Xen-users] Xen Security Advisory 254 (CVE-2017-5753, CVE-2017-5715,
 CVE-2017-5754) - Information leak via side effects of speculative
 execution
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
                                 version 10

        Information leak via side effects of speculative execution

UPDATES IN VERSION 10
=====================

Provided summary table for the varous Meltdown options.

Note that in XSA-254 v9's Updates section we said
  * Include >32vcpu workaround in shim branch ...
but this workaround is for guests with 32 or *fewer* vcpus; guests
with more will still need the L0 hypervisor patched and rebooted.

ISSUE DESCRIPTION
=================

Processors give the illusion of a sequence of instructions executed
one-by-one.  However, in order to most efficiently use cpu resources,
modern superscalar processors actually begin executing many
instructions in parallel.  In cases where instructions depend on the
result of previous instructions or checks which have not yet
completed, execution happens based on guesses about what the outcome
will be.  If the guess is correct, execution has been sped up.  If the
guess is incorrect, partially-executed instructions are cancelled and
architectural state changes (to registers, memory, and so on)
reverted; but the whole process is no slower than if no guess had been
made at all.  This is sometimes called "speculative execution".

Unfortunately, although architectural state is rolled back, there are
other side effects, such as changes to TLB or cache state, which are
not rolled back.  These side effects can subsequently be detected by
an attacker to determine information about what happened during the
speculative execution phase.  If an attacker can cause speculative
execution to access sensitive memory areas, they may be able to infer
what that sensitive memory contained.

Furthermore, these guesses can often be 'poisoned', such that attacker
can cause logic to reliably 'guess' the way the attacker chooses.
This advisory discusses three ways to cause speculative execution to
access sensitive memory areas (named here according to the
discoverer's naming scheme):

"Bounds-check bypass" (aka SP1, "Variant 1", Spectre CVE-2017-5753):
Poison the branch predictor, such that victim code is speculatively
executed past boundary and security checks.  This would allow an
attacker to, for instance, cause speculative code in the normal
hypercall / emulation path to execute with wild array indexes.

"Branch Target Injection" (aka SP2, "Variant 2", Spectre CVE-2017-5715):
Poison the branch predictor.  Well-abstracted code often involves
calling function pointers via indirect branches; reading these
function pointers may involve a (slow) memory access, so the CPU
attempts to guess where indirect branches will lead.  Poisoning this
enables an attacker to speculatively branch to any code that is
executable by the victim (eg, anywhere in the hypervisor).

"Rogue Data Load" (aka SP3, "Variant 3", Meltdown, CVE-2017-5754):
On some processors, certain pagetable permission checks only happen
when the instruction is retired; effectively meaning that speculative
execution is not subject to pagetable permission checks.  On such
processors, an attacker can speculatively execute arbitrary code in
userspace with, effectively, the highest privilege level.

More information is available here:
  https://meltdownattack.com/
  https://spectreattack.com/
  https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

Additional Xen-specific background:

Xen hypervisors on most systems map all of physical RAM, so code
speculatively executed in a hypervisor context can read all of system
RAM.

When running PV guests, the guest and the hypervisor share the address
space; guest kernels run in a lower privilege level, and Xen runs in
the highest privilege level.  (x86 HVM and PVH guests, and ARM guests,
run in a separate address space to the hypervisor.)  However, only
64-bit PV guests can generate addresses large enough to point to
hypervisor memory.

IMPACT
======

Xen guests may be able to infer the contents of arbitrary host memory,
including memory assigned to other guests.

An attacker's choice of code to speculatively execute (and thus the
ease of extracting useful information) goes up with the numbers.  For
SP1, an attacker is limited to windows of code after bound checks of
user-supplied indexes.  For SP2, the attacker will in many cases will
be limited to executing arbitrary pre-existing code inside of Xen.
For SP3 (and other cases for SP2), an attacker can write arbitrary
code to speculatively execute.

Additionally, in general, attacks within a guest (from guest user to
guest kernel) will be the same as on real hardware.  Consult your
operating system provider for more information.

NOTE ON TIMING
==============

This vulnerability was originally scheduled to be made public on 9
January.  It was accelerated at the request of the discloser due to
one of the issues being made public.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

For SP1 and SP2, both Intel and AMD are vulnerable.  Vulnerability of
ARM processors to SP1 and SP2 varies by model and manufacturer.  ARM
has information on affected models on the following website:
   https://developer.arm.com/support/security-update

For SP3, only Intel processors are vulnerable.  (The hypervisor cannot
be attacked using SP3 on any ARM processors, even those that are
listed as affected by SP3.)

Furthermore, only 64-bit PV guests can exploit SP3 against Xen.  PVH,
HVM, and 32-bit PV guests cannot exploit SP3.

MITIGATION
==========

There is no mitigation for SP1 and SP2.

SP3 can be mitigated by page-table isolation ("PTI").
See Resolution below.

SP3 can, alternatively, be mitigated by running guests in HVM or PVH
mode.  (Within-guest attacks are still possible unless the guest OS
has also been updated with an SP3 mitigation series such as
KPTI/Kaiser.)

For guests with legacy PV kernels which cannot be run in HVM or PVH
mode directly, we have developed two "shim" hypervisors that allow PV
guests to run in HVM mode or PVH mode.  This prevents attacks on the
host, but it leaves the guest vulnerable to Meltdown attacks by its
own unprivileged processes, even if the guest OS has KPTI or similar
Meltdown mitigation.

The HVM shim (codenamed "Vixen") is available now, as is the PVH shim
(codenamed "Comet") for Xen 4.10 and Xen 4.8.   Please read
README.which-shim to determine which shim is suitable for you.


RESOLUTION
==========

These are hardware bugs, so technically speaking they cannot be
properly fixed in software.  However, it is possible in many cases to
provide patches to software to work around the problems.


There is no available resolution for SP1.  A solution may be available
in the future.

We are working on patches which mitigate SP2 but these are not
currently available.  Given that the vulnerabilities are now public,
these will be developed and published in public, initially via
xen-devel.


SP3 can be mitigated by page-table isolation ("PTI").

We have a "stage 1" implementation.  It allows 64-bit PV guests to be
run natively while restricting what can be accessed via SP3 to the Xen
stack of the current pcpu (which may contain remnants of information
from other guests, but should be much more difficult to attack
reliably).

Unfortunately these "stage 1" patches incur a non-negligible
performance overhead; about equivalent to the "PV shim" approaches
above.  Moving to plain HVM or PVH guests is recommended where
possible.  For more information on that, see below.

Patches for the "stage-1" PTI implementation are available in the Xen
staging-NN branches for each Xen revision.  See README.pti for
specific revisons.


SP3 MITIGATION OPTIONS SUMMARY TABLE FOR 64-bit X86 PV GUESTS
=============================================================

Everything in this section applies to 64-bit PV x86 guests only.

             Xen PTI      Use PVH      Use HVM     PVH shim     HVM shim
             "stage 1"                             "Comet"      "Vixen"

How to use   README.pti  type="pvh"  type="hvm"  README.comet  README.vixen

Guest          All        Linux 4.11+  Most[4]     All         All
support                ?unikernels?[3]

Xen            4.6+      4.10+         All         4.10, 4.8   All
 versions                4.8-comet[1]

Testing       Limited    4.10: Good    Very good   Moderate    Very good
 status       Very new   4.8: Moderate

Performance    Fair        Excellent   Varies[4]   Fair        Fair

Hypervisor     Needed      No need     No need     No need     No need
  changes

SP3 guest   Substantially  Protected   Protected   Protected   Protected
 to host      protected

SP3 within    Protected    Guest       Guest       Vulnerable  Vulnerable
 guest                     patches     patches      [5]         [5]

SP3 from      Protected    n/a; vuln.  n/a; vuln.  n/a; vuln.  n/a; vuln.
 dom0 user                  [9]         [9]         [9]         [9]

Device model   No dm       No dm       Qemu        No dm       Qemu

Config change  None      type="pvh"  type="hvm"/  type="pvh"   Tool to rewrite
                                    builder="hvm"  pvshim=1    Needs "sidecar"

Within-guest   None       Should be    Disks+net   None        None
 changes?                  none        may change

Extra RAM use  V. slight   None       ~9Mb/guest >=~20Mb/guest >=~29Mb/guest

Migration      OK          OK          OK[4]       OK          Unsupported[2]
Guest mem adj  OK          OK          OK          Broken[2]   Unsupported[2]
vcpu hotplug   OK          OK          OK          OK          Unsupported[2]

Solution      Indefinite  Indefinite  Indefinite  Indefinite  Limited
 lifetime                                           [7]        [6]

[1] PVH is supported in Xen 4.8 only with the 4.8 "Comet" security
release branch.

[2] Some features in PVH/HVM shim guests are not inherently broken,
but buggy in the currently available versions.  These may be fixed in
future proper releases of the same feature.

[3] Most unikernels have Xen support based on a version of mini-os.
mini-os master can boot PVH.  But this is very recent.

[4] Some guests which have support for Xen PV fail to boot properly in
Xen HVM.  Some such guests can made to boot HVM by disabling the
PV-on-HVM support entirely in the guest or in Xen; in that case the
guest may work but IO performance will be poor.  Some PV-supporting
guests can boot as HVM, with PV drivers, but fail when migrated.

[5] The Comet and Vixen shim hypervisors direct-map all of their
"physical" memory, and that direct-map can be accessed using Meltdown
by unprivileged processes in the guest.  So the guest is vulnerable to
within-guest Meltdown attacks and the guest operating system cannot
protect itself.

[6] "Vixen" HVM shim is not expected to be incorporated in future Xen
stable releases.  At some point, support for it will be withdrawn.
However, HVM shim functionality may be available in a future Xen 4.10
stable point release and would then probably be useable with the
existing conversion script provided in this advisory.

[7] The lifetime of the special Comet branches is limited, but we will
not desupport them until some time after the same functionality is in
appropriate Xen stable point releases.

[8] The 64-bit x86 PV guest ABI precludes a guest from mapping its
kernel and userspace in the same address space.  So these guests are
inherently immune to within-guest Meltdown attacks, without
within-guest patching.  (This applies to 64-bit x86 PV guests only.)

[9] It is not possible to run dom0 as HVM.  dom0 PVH is a planned
enhancement which is not yet available even in preview form.


ATTACHMENTS
===========

$ sha256sum xsa254*/*
1cba14ff83844d001d6c8a74afc3f764f49182cc7a06bb4463548450ac96cc2f  xsa254/README.comet
cddd78cd7a00df9fa254156993f0309cea825d600f5ad8b36243148cf686bc9b  xsa254/README.pti
3ef42381879befc84aa78b67d3a9b7b0cd862a2ffa445810466e90be6c6a5e86  xsa254/README.vixen
7e816160c1c1d1cd93ec3c3dd9753c8f3957fefe86b7aa967e9e77833828f849  xsa254/README.which-shim
1d2098ad3890a5be49444560406f8f271c716e9f80e7dfe11ff5c818277f33f8  xsa254/pvshim-converter.pl
$


NOTE ON LACK OF EMBARGO
=======================

The timetable and process were set by the discloser.

After the intensive initial response period for these vulnerabilities
is over, we will prepare and publish a full timeline, as we have done
in a handful of other cases of significant public interest where we
saw opportunities for process improvement.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJaYOmqAAoJEIP+FMlX6CvZ9yQH/RrybJAcL4F48T8OoNIsPjz7
YCdKxAWLSugLM0oQ1AcWvF6oSoKrqzJndInmRlpK2WFxu3xsRSZepgwpLQ8uyr5J
BGfyqdT5JbswvaO9xCnl679Hi6iPnKsVEOtOQWHHT5h8B6A1kP5B80bW0u2Y6VP4
EiTF4UbGy/jrpfLLiNG4p5fmQxC5QCuUEUm4jKRzMq9DzAZTMQVnSzMyPruwGYeP
3UjgIQ1crMRdeBsUts6AF8FW355w53I1vwXnXZqVq+V65jlwurXaC6n5CJRKiItu
PYWVSdOBKCrUbvBf6hOPMBrz5259IXVBcukzsuobEP2S/yK9AyVG+bjXU3fdZLY=
=FFWp
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa254/README.comet"
Content-Disposition: attachment; filename="xsa254/README.comet"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.pti"
Content-Disposition: attachment; filename="xsa254/README.pti"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.vixen"
Content-Disposition: attachment; filename="xsa254/README.vixen"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/README.which-shim"
Content-Disposition: attachment; filename="xsa254/README.which-shim"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa254/pvshim-converter.pl"
Content-Disposition: attachment; filename="xsa254/pvshim-converter.pl"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--=separator--


From xen-users-bounces@lists.xenproject.org Sat Jan 20 11:38:39 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 20 Jan 2018 11:38:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ecrSm-0002OO-Gm; Sat, 20 Jan 2018 11:37:32 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=tzio=ep=126.com=lcy985a@srs-us1.protection.inumbo.net>)
 id 1ecrSl-0002OF-A1
 for xen-users@lists.xenproject.org; Sat, 20 Jan 2018 11:37:31 +0000
X-Inumbo-ID: a736e926-fdd6-11e7-b0d7-9f685aff125f
Received: from m15-26.126.com (unknown [220.181.15.26])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTP
 id a736e926-fdd6-11e7-b0d7-9f685aff125f;
 Sat, 20 Jan 2018 11:40:04 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=126.com;
 s=s110527; h=Date:From:Subject:MIME-Version:Message-ID; bh=cPBNM
 uY3Ypl97ReUGRlhZC8alSH89KDLUNrLHWmtlPI=; b=NruSx2TVt+s5zhl7fTdsb
 Sgai8JwZPqJTSS65qdP+1WSCxwl+LL9+2xSdtjz7A9M3MlvY2asAgGfeOvi7/MyC
 rD6w/crZbFISrhozFhf1esm/iheZ3EAzJZunARglBL0++68MpHNk65Tw/5pilLA7
 pQDljCe2nZwekT6CFpAMuE=
Received: from lcy985a$126.com ( [58.248.30.219] ) by ajax-webmail-wmsvr26
 (Coremail) ; Sat, 20 Jan 2018 19:35:19 +0800 (CST)
X-Originating-IP: [58.248.30.219]
Date: Sat, 20 Jan 2018 19:35:19 +0800 (CST)
From: lcy985a <lcy985a@126.com>
To: xen-users <xen-users@lists.xenproject.org>
X-Priority: 3
X-Mailer: Coremail Webmail Server Version SP_ntes V3.5 build
 20160729(86883.8884) Copyright (c) 2002-2018 www.mailtech.cn 126com
X-CM-CTRLDATA: PNYOJmZvb3Rlcl9odG09OTU4OjU2
MIME-Version: 1.0
Message-ID: <6969ca07.3254.1611359f8e4.Coremail.lcy985a@126.com>
X-Coremail-Locale: zh_CN
X-CM-TRANSID: GsqowACnrpJ4KWNavpqIAA--.33588W
X-CM-SenderInfo: pof1mmkvd6ij2wof0z/1tbikxjTiFpD4rtTzQAAsO
X-Coremail-Antispam: 1U5529EdanIXcx71UUUUU7vcSsGvfC2KfnxnUU==
Subject: [Xen-users]  suspend&resume without balloon hvm virtual machines
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3240218977397894662=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============3240218977397894662==
Content-Type: multipart/alternative; 
	boundary="----=_Part_47072_815738912.1516448119012"

------=_Part_47072_815738912.1516448119012
Content-Type: text/plain; charset=GBK
Content-Transfer-Encoding: base64
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------=_Part_47072_815738912.1516448119012
Content-Type: text/html; charset=GBK
Content-Transfer-Encoding: base64
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------=_Part_47072_815738912.1516448119012--



--===============3240218977397894662==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============3240218977397894662==--



From xen-users-bounces@lists.xenproject.org Tue Jan 23 04:47:53 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Jan 2018 04:47:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1edqTn-000430-GT; Tue, 23 Jan 2018 04:46:39 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=4ptq=es=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1edqTm-00042u-36
 for xen-users@lists.xenproject.org; Tue, 23 Jan 2018 04:46:38 +0000
X-Inumbo-ID: 634a8cd5-fff8-11e7-ba59-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 634a8cd5-fff8-11e7-ba59-bc764e045a96;
 Tue, 23 Jan 2018 05:46:34 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Subject:To:From:Date;
 bh=XSunL/vDHIEI5ui9jdQ1rcBfV3QljouJ9qToW6AOJbA=; 
 b=o14susEa2+DVn+oQsXfC3l5ALFCHhJoSDJ2RGoh0PSdte5tBp2Osyc4y4zPLCso7Z+j1k636UU1rbV/Ov/LvpL6mfm0fNhw+JOH8X0dwntuUDxLC0CIS65d078eJnhnKzGQ2l6MET6PQDT5EYJHWrirJsjcwE12RBnxtNHOkTcKjjK4jNTGHP0u/50VkUYB7jzGeCjz5yjujs7v0d5NDNUidBenKRsVlS8XOUBz+fCXIz9dn6o3PvYBvzye14DoAT9iIyLO9HGQGNdIkF9dPZKoNbrQnR37ga4PZRN+IvfW8wKDipU/2UAUNmTRWBleoHCWO79zxx11CZUdUAWeJQQ==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1edqTj-0002R5-1R
 for xen-users@lists.xenproject.org; Tue, 23 Jan 2018 04:46:35 +0000
Date: Tue, 23 Jan 2018 04:46:35 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Message-ID: <20180123044635.GB3124@bitfolk.com>
MIME-Version: 1.0
Content-Disposition: inline
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Subject: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Tue Jan 23 05:42:52 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Jan 2018 05:42:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1edrLD-0008Tj-DF; Tue, 23 Jan 2018 05:41:51 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=bxvh=es=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1edrLC-0008Td-6F
 for xen-users@lists.xenproject.org; Tue, 23 Jan 2018 05:41:50 +0000
X-Inumbo-ID: 18b1e5ec-0000-11e8-b9b1-635ca7ef6cff
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 18b1e5ec-0000-11e8-b9b1-635ca7ef6cff;
 Tue, 23 Jan 2018 05:41:45 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id CD7DEAE01;
 Tue, 23 Jan 2018 05:41:41 +0000 (UTC)
To: Andy Smith <andy@strugglers.net>, xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
From: Juergen Gross <jgross@suse.com>
Message-ID: <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
Date: Tue, 23 Jan 2018 06:41:41 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <20180123044635.GB3124@bitfolk.com>
Content-Language: de-DE
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 24 10:46:54 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jan 2018 10:46:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeIYy-0003jX-Hv; Wed, 24 Jan 2018 10:45:52 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=fm/7=et=godaddy.com=volker.schwicking@srs-us1.protection.inumbo.net>)
 id 1eeIYx-0003jQ-6E
 for xen-users@lists.xenproject.org; Wed, 24 Jan 2018 10:45:51 +0000
X-Inumbo-ID: baf6711d-00f3-11e8-ba59-bc764e045a96
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:fe41::722])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTP
 id baf6711d-00f3-11e8-ba59-bc764e045a96;
 Wed, 24 Jan 2018 11:45:45 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=secureservernet.onmicrosoft.com; s=selector1-godaddy-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;
 bh=/PbhclKrZghcrhvk3HRy9NE/aWMWijvRRaRRzyXwh6w=;
 b=V4arsxRNmhUG5QzgvNpYssfvEmNfqJfL/geZpojTrbcAsEu4ALRuQLbdMo4T7Ud3fWwsamw0uE1qC4+7vDkCnXD6uaYP/ZF1eN96FliWSMxr9RLKJ3IQyCSq6PzW+VAMfZW6LNwSocQAKhHvcCMqvSD/H/dOGuovEVr92mp/vqE=
Received: from CY4PR02MB3335.namprd02.prod.outlook.com (10.165.89.142) by
 CY4PR02MB2229.namprd02.prod.outlook.com (10.169.180.147) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id
 15.20.444.14; Wed, 24 Jan 2018 10:45:45 +0000
Received: from CY4PR02MB3335.namprd02.prod.outlook.com ([10.165.89.142]) by
 CY4PR02MB3335.namprd02.prod.outlook.com ([10.165.89.142]) with mapi id
 15.20.0428.023; Wed, 24 Jan 2018 10:45:45 +0000
From: Volker Schwicking <volker.schwicking@godaddy.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Thread-Topic: Domus missing assigned cores/cpus with 4.10 and pvh
Thread-Index: AQHTlQB9GdHXCZzwH0eI3T+NsjmydQ==
Date: Wed, 24 Jan 2018 10:45:45 +0000
Message-ID: <99B4123C-E3A7-474E-A746-564DCDDC0D2D@godaddy.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is )
 smtp.mailfrom=volker.schwicking@godaddy.com; 
x-originating-ip: [178.6.7.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR02MB2229;
 7:xc9kHmke0WrMpcuiTvYZ3BuZhJUufa/n5V/dTuhShWOWTTFHsDv7YsFx9IZP0saC6aLmV4am6fzc3MAjRa+t6dqamcwmh3Y+8/1AZlpvScU4fGgLTC6Po9377oFUvb3Fc9hQ9m8G5Y76q+NOTxvzZdnQwCREkyfYvmd89J3YUWg7XkAnFevSeRor3LsAdW2E91hY+kIaKlBISqBhjuZRKO2oejAecHBdd2iZpvFEKrQgmTcFB58uJ42S9HAEHN/e
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 98e8c460-d422-47e8-bb05-08d563179f9f
x-microsoft-antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(7020095)(4652020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(3008032)(2017052603307)(7153060)(49563074)(7193020);
 SRVR:CY4PR02MB2229; 
x-ms-traffictypediagnostic: CY4PR02MB2229:
x-microsoft-antispam-prvs: <CY4PR02MB22293E7986E26BF7DDADC0EBE8E20@CY4PR02MB2229.namprd02.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
 RULEID:(102415395)(6040501)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3231023)(2400081)(944501161)(3002001)(6055026)(6041288)(20161123562045)(20161123558120)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011);
 SRVR:CY4PR02MB2229; BCL:0; PCL:0; RULEID:; SRVR:CY4PR02MB2229; 
x-forefront-prvs: 056297E276
x-forefront-antispam-report: SFV:NSPM;
 SFS:(10019020)(39380400002)(39860400002)(376002)(366004)(346002)(396003)(189003)(199004)(99286004)(25786009)(83716003)(36756003)(33656002)(3660700001)(3280700002)(82746002)(14454004)(102836004)(6116002)(97736004)(3846002)(99936001)(6506007)(2906002)(316002)(86362001)(478600001)(66066001)(26005)(77096007)(7736002)(2900100001)(2351001)(6512007)(5640700003)(6436002)(6486002)(68736007)(8676002)(81166006)(81156014)(8936002)(6916009)(106356001)(54896002)(105586002)(53936002)(5890100001)(2501003)(5660300001);
 DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR02MB2229;
 H:CY4PR02MB3335.namprd02.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords;
 MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: godaddy.com does not designate
 permitted sender hosts)
x-microsoft-antispam-message-info: H72D8Gnak2yUTRz4/nmtQL11px1vj0ByZs17KxHwFOXByaMCbHdQthaL0IuwVGWLJsjawX9F5EBFqiFseDArIA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/mixed;
 boundary="_004_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_"
MIME-Version: 1.0
X-OriginatorOrg: godaddy.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 98e8c460-d422-47e8-bb05-08d563179f9f
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jan 2018 10:45:45.4995 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d5f1622b-14a3-45a6-b069-003f8dc4851f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR02MB2229
Subject: [Xen-users] Domus missing assigned cores/cpus with 4.10 and pvh
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--_004_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_
Content-Type: multipart/alternative;
	boundary="_000_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_"

--_000_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi,

I updated my Xen from 4.4.7 with pv to 4.10 (official release) with pvh and=
 now im missing assigned vcpus/cores in my domus.

My domus (between 20 and 60 per host) usually have 2-4 vcpus assigned:

###
$ xl vcpu-list server000
Name                                ID  VCPU   CPU State   Time(s) Affinity=
 (Hard / Soft)
server000                             53     0    7   -b-      30.1  2-11 /=
 all
server000                             53     1    -   --p       0.0  2-11 /=
 all
server000                             53     2    -   --p       0.0  2-11 /=
 all
server000                             53     3    -   --p       0.0  2-11 /=
 all
###

Note that vcpu 1-3 are not assigned to a thread/core and the domu only show=
s a single cpu in /proc/cpuinfo.

###
$ grep processor /proc/cpuinfo
processor       : 0
###

Is there a specific option or requirement i have to enable / fulfill to get=
 more vcpus assigned correctly with pvh?

I am running a custom built 4.14.14 kernel and xen-4.10. I have not changed=
 anything in the xen-sources.

xl info, xen kernel options, sample domu config and xen command line option=
s are attached in the txt file.

Any hint would be highly appreciated.

-Volker




--_000_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <44A55D9EA6DBFA4889761C25C769900C@namprd02.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body>
<div class=3D"BodyFragment"><font size=3D"2"><span style=3D"font-size:11pt;=
">
<div class=3D"PlainText">Hi,<br>
<br>
I updated my Xen from 4.4.7 with pv to 4.10 (official release) with pvh and=
 now im missing assigned vcpus/cores in my domus.<br>
<br>
My domus (between 20 and 60 per host) usually have 2-4 vcpus assigned:<br>
<br>
###<br>
$ xl vcpu-list server000<br>
Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ID&nbsp; VCPU&nbsp;&nbsp; CPU Stat=
e&nbsp;&nbsp; Time(s) Affinity (Hard / Soft)<br>
server000&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; 53&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp;&nbsp; =
7&nbsp;&nbsp; -b-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 30.1&nbsp; 2-11 / all<br>
server000&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; 53&nbsp;&nbsp;&nbsp;&nbsp; 1&nbsp;&nbsp;&nbsp; =
-&nbsp;&nbsp; --p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0.0&nbsp; 2-11 / all<=
br>
server000&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; 53&nbsp;&nbsp;&nbsp;&nbsp; 2&nbsp;&nbsp;&nbsp; =
-&nbsp;&nbsp; --p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0.0&nbsp; 2-11 / all<=
br>
server000&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; 53&nbsp;&nbsp;&nbsp;&nbsp; 3&nbsp;&nbsp;&nbsp; =
-&nbsp;&nbsp; --p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0.0&nbsp; 2-11 / all<=
br>
###<br>
<br>
Note that vcpu 1-3 are not assigned to a thread/core and the domu only show=
s a single cpu in /proc/cpuinfo.<br>
<br>
###<br>
$ grep processor /proc/cpuinfo<br>
processor&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 0<br>
###<br>
<br>
Is there a specific option or requirement i have to enable / fulfill to get=
 more vcpus assigned correctly with pvh?<br>
<br>
I am running a custom built 4.14.14 kernel and xen-4.10. I have not changed=
 anything in the xen-sources.<br>
<br>
xl info, xen kernel options, sample domu config and xen command line option=
s are attached in the txt file.<br>
<br>
Any hint would be highly appreciated.<br>
<br>
-Volker</div>
</span></font></div>
<div class=3D"BodyFragment"><font size=3D"2"><span style=3D"font-size:11pt;=
">
<div class=3D"PlainText"><br>
<br>
<br>
</div>
</span></font></div>
</body>
</html>

--_000_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_--

--_004_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_
Content-Type: text/plain; name="gistfile1.txt"
Content-Description: gistfile1.txt
Content-Disposition: attachment; filename="gistfile1.txt"; size=3530;
	creation-date="Wed, 24 Jan 2018 10:45:45 GMT";
	modification-date="Wed, 24 Jan 2018 10:45:45 GMT"
Content-ID: <DEB4EDDEA773A842A77BE6FF0683184B@namprd02.prod.outlook.com>
Content-Transfer-Encoding: base64

WEVOLUtlcm5lbCBvcHRpb25zDQojIyMNCiAkIHpjYXQgL3Byb2MvY29uZmlnLmd6ICB8IGdyZXAg
WEVODQpDT05GSUdfWEVOPXkNCkNPTkZJR19YRU5fUFY9eQ0KQ09ORklHX1hFTl9QVl9TTVA9eQ0K
Q09ORklHX1hFTl9ET00wPXkNCkNPTkZJR19YRU5fUFZIVk09eQ0KQ09ORklHX1hFTl9QVkhWTV9T
TVA9eQ0KQ09ORklHX1hFTl81MTJHQj15DQpDT05GSUdfWEVOX1NBVkVfUkVTVE9SRT15DQpDT05G
SUdfWEVOX1BWSD15DQpDT05GSUdfUENJX1hFTj15DQpDT05GSUdfWEVOX1BDSURFVl9GUk9OVEVO
RD1tDQpDT05GSUdfWEVOX0JMS0RFVl9GUk9OVEVORD1tDQpDT05GSUdfWEVOX0JMS0RFVl9CQUNL
RU5EPW0NCkNPTkZJR19YRU5fU0NTSV9GUk9OVEVORD1tDQpDT05GSUdfWEVOX05FVERFVl9GUk9O
VEVORD15DQpDT05GSUdfWEVOX05FVERFVl9CQUNLRU5EPXkNCkNPTkZJR19JTlBVVF9YRU5fS0JE
REVWX0ZST05URU5EPW0NCkNPTkZJR19IVkNfWEVOPXkNCkNPTkZJR19IVkNfWEVOX0ZST05URU5E
PXkNCkNPTkZJR19YRU5fV0RUPW0NCkNPTkZJR19YRU5fRkJERVZfRlJPTlRFTkQ9bQ0KQ09ORklH
X1hFTl9CQUxMT09OPXkNCiMgQ09ORklHX1hFTl9TRUxGQkFMTE9PTklORyBpcyBub3Qgc2V0DQoj
IENPTkZJR19YRU5fQkFMTE9PTl9NRU1PUllfSE9UUExVRyBpcyBub3Qgc2V0DQpDT05GSUdfWEVO
X1NDUlVCX1BBR0VTPXkNCkNPTkZJR19YRU5fREVWX0VWVENITj15DQpDT05GSUdfWEVOX0JBQ0tF
TkQ9eQ0KQ09ORklHX1hFTkZTPXkNCkNPTkZJR19YRU5fQ09NUEFUX1hFTkZTPXkNCkNPTkZJR19Y
RU5fU1lTX0hZUEVSVklTT1I9eQ0KQ09ORklHX1hFTl9YRU5CVVNfRlJPTlRFTkQ9eQ0KQ09ORklH
X1hFTl9HTlRERVY9eQ0KQ09ORklHX1hFTl9HUkFOVF9ERVZfQUxMT0M9eQ0KQ09ORklHX1NXSU9U
TEJfWEVOPXkNCkNPTkZJR19YRU5fVE1FTT1tDQpDT05GSUdfWEVOX1BDSURFVl9CQUNLRU5EPXkN
CiMgQ09ORklHX1hFTl9QVkNBTExTX0JBQ0tFTkQgaXMgbm90IHNldA0KQ09ORklHX1hFTl9TQ1NJ
X0JBQ0tFTkQ9eQ0KQ09ORklHX1hFTl9QUklWQ01EPXkNCkNPTkZJR19YRU5fQUNQSV9QUk9DRVNT
T1I9eQ0KQ09ORklHX1hFTl9NQ0VfTE9HPXkNCkNPTkZJR19YRU5fSEFWRV9QVk1NVT15DQpDT05G
SUdfWEVOX0FVVE9fWExBVEU9eQ0KQ09ORklHX1hFTl9BQ1BJPXkNCkNPTkZJR19YRU5fU1lNUz15
DQpDT05GSUdfWEVOX0hBVkVfVlBNVT15DQojIyMNCg0KRG9tMCBjb21tYW5kbGluZSBvcHRpb25z
Og0KIyMjDQpjb25zb2xlPXZnYSB4ZW5oZWFwX21lZ2FieXRlcz02NCBjcHVpZGxlPTAgY3B1ZnJl
cT1ub25lIG5vLXhzYXZlIGRvbTBfbWVtPTQwOTZNIGRvbTBfbWF4X3ZjcHVzPTIgZG9tMF8gICAg
dmNwdXNfcGluPXRydWUNCiMjIw0KDQpBIHNhbXBsZSBkb211LWNvbmZpZyBmaWxlDQojIyMNCmtl
cm5lbCA9ICIvYm9vdC92bWxpbnV6LXhlblUiDQp0eXBlPSdwdmgnDQptZW1vcnkgPSAxMDI0DQpu
YW1lID0gInNlcnZlcjAwMCINCmNwdXM9ICIyLTYzIg0KdmNwdXMgPSAiNCINCmNwdV93ZWlnaHQg
PSAiNTEyIg0KY3B1X2NhcCA9ICIwIg0KdmlmID0gWyAnbWFjPWRlOmFkOmIwOjFjOjI2OmNkLGlw
PTE3Ni4yOC4zOC4yMDUgMmEwMTo0ODg6NDI6MTAwMDpiMDFjOjI2Y2Q6Oi85NiAnLA0KICAgICAg
ICAnbWFjPWJhOmNjOjBhOjZlOjMyOmNkLGJyaWRnZT1iYWNrdXBicjAsc2NyaXB0PXZpZi1icmlk
Z2UnXQ0KZGlzayA9IFsgICAgICAgICdwaHk6L2Rldi92Z19zeXN0ZW0vc2VydmVyMDAwX3RtcF92
YXJfc3lzdGVtX2xvZ3MseHZkYTEsdycsDQogICAgICAgICdwaHk6L2Rldi92Z19jb250ZW50X21h
aWwvc2VydmVyMDAwX21haWxfY29udGVudCx4dmRhNyx3J10NCnJvb3QgPSAiL2Rldi94dmRhMSBy
byINCmV4dHJhID0gImVsZXZhdG9yPW5vb3AgeGVuY29ucz1odmMgY29uc29sZT1odmMwIGNsb2Nr
c291cmNlPXhlbiBocGV0PWRpc2FibGUgY3B1ZnJlcT1ub25lIGFjcGk9b2ZmIDIiDQpvbl9wb3dl
cm9mZiA9ICdkZXN0cm95Jw0Kb25fcmVib290ICAgPSAncmVzdGFydCcNCm9uX2NyYXNoICAgID0g
J3ByZXNlcnZlJw0KIyMjDQoNCg0KeGwgaW5mbw0KIyMjDQokIHhsIGluZm8NCmhvc3QgICAgICAg
ICAgICAgICAgICAgOiB2aDYwMA0KcmVsZWFzZSAgICAgICAgICAgICAgICA6IDQuMTQuMTQtMi14
ZW4wLWhlKw0KdmVyc2lvbiAgICAgICAgICAgICAgICA6ICM4IFNNUCBXZWQgSmFuIDI0IDA5OjI0
OjEzIENFVCAyMDE4DQptYWNoaW5lICAgICAgICAgICAgICAgIDogeDg2XzY0DQpucl9jcHVzICAg
ICAgICAgICAgICAgIDogMTINCm1heF9jcHVfaWQgICAgICAgICAgICAgOiA2Mw0KbnJfbm9kZXMg
ICAgICAgICAgICAgICA6IDINCmNvcmVzX3Blcl9zb2NrZXQgICAgICAgOiAzDQp0aHJlYWRzX3Bl
cl9jb3JlICAgICAgIDogMg0KY3B1X21oeiAgICAgICAgICAgICAgICA6IDMxMDANCmh3X2NhcHMg
ICAgICAgICAgICAgICAgOiAxNzhiZjNmZjo4Mjk4MjIwYjoyZTUwMDgwMDowMDQ4MzdmZjowMDAw
MDAwMDowMDAwMDAwMDowMDAwMDAwMDowMDAwMDEwMA0KdmlydF9jYXBzICAgICAgICAgICAgICA6
IGh2bQ0KdG90YWxfbWVtb3J5ICAgICAgICAgICA6IDk4Mjc4DQpmcmVlX21lbW9yeSAgICAgICAg
ICAgIDogMzkyMzINCnNoYXJpbmdfZnJlZWRfbWVtb3J5ICAgOiAwDQpzaGFyaW5nX3VzZWRfbWVt
b3J5ICAgIDogMA0Kb3V0c3RhbmRpbmdfY2xhaW1zICAgICA6IDANCmZyZWVfY3B1cyAgICAgICAg
ICAgICAgOiAwDQp4ZW5fbWFqb3IgICAgICAgICAgICAgIDogNA0KeGVuX21pbm9yICAgICAgICAg
ICAgICA6IDEwDQp4ZW5fZXh0cmEgICAgICAgICAgICAgIDogLjANCnhlbl92ZXJzaW9uICAgICAg
ICAgICAgOiA0LjEwLjANCnhlbl9jYXBzICAgICAgICAgICAgICAgOiB4ZW4tMy4wLXg4Nl82NCB4
ZW4tMy4wLXg4Nl8zMnAgaHZtLTMuMC14ODZfMzIgaHZtLTMuMC14ODZfMzJwIGh2bS0zLjAteDg2
XzY0DQp4ZW5fc2NoZWR1bGVyICAgICAgICAgIDogY3JlZGl0DQp4ZW5fcGFnZXNpemUgICAgICAg
ICAgIDogNDA5Ng0KcGxhdGZvcm1fcGFyYW1zICAgICAgICA6IHZpcnRfc3RhcnQ9MHhmZmZmODAw
MDAwMDAwMDAwDQp4ZW5fY2hhbmdlc2V0ICAgICAgICAgIDoNCnhlbl9jb21tYW5kbGluZSAgICAg
ICAgOiBjb25zb2xlPXZnYSB4ZW5oZWFwX21lZ2FieXRlcz02NCBjcHVpZGxlPTAgY3B1ZnJlcT1u
b25lIG5vLXhzYXZlIGRvbTBfbWVtPTQwOTZNIGRvbTBfbWF4X3ZjcHVzPTIgZG9tMF92Y3B1c19w
aW49dHJ1ZQ0KY2NfY29tcGlsZXIgICAgICAgICAgICA6IGdjYy00LjkucmVhbCAoRGViaWFuIDQu
OS4yLTEwKSA0LjkuMg0KY2NfY29tcGlsZV9ieSAgICAgICAgICA6DQpjY19jb21waWxlX2RvbWFp
biAgICAgIDogeHh4DQpjY19jb21waWxlX2RhdGUgICAgICAgIDogTW9uIEphbiAyMiAxNjowNToz
OCBDRVQgMjAxOA0KYnVpbGRfaWQgICAgICAgICAgICAgICA6IDI1ZTExMjIxNGMwZjNkNWFmYWJl
ZjhjMzg5NGQ1YWYwYmIwZGY3NWUNCnhlbmRfY29uZmlnX2Zvcm1hdCAgICAgOiA0DQojIyM=

--_004_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--_004_99B4123CE3A7474EA746564DCDDC0D2Dgodaddycom_--


From xen-users-bounces@lists.xenproject.org Wed Jan 24 11:52:51 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jan 2018 11:52:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeJao-0002Wa-Mq; Wed, 24 Jan 2018 11:51:50 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=fm/7=et=godaddy.com=volker.schwicking@srs-us1.protection.inumbo.net>)
 id 1eeJan-0002WS-4o
 for xen-users@lists.xenproject.org; Wed, 24 Jan 2018 11:51:49 +0000
X-Inumbo-ID: f2453f5a-00fc-11e8-ba59-bc764e045a96
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:fe40::722])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTP
 id f2453f5a-00fc-11e8-ba59-bc764e045a96;
 Wed, 24 Jan 2018 12:51:43 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=secureservernet.onmicrosoft.com; s=selector1-godaddy-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version;
 bh=2SZMozYmLywW827X9IH1sYpz20ob0SYs1XdvO6dpIeI=;
 b=8siTce1ZgwN5ABqQzl1UG/eF8R/5Ox2O0CTDnng9C/ko4va07j2JVDauW4WaBhaxkYQsfjgoe0TUbBBGKjFSRJNihIt1pYhR32QSIfTphoLX9HxVnmyPRsideli0L/Zel5xsLiSrmKdivFBsGli735w305VbelV8N7UDX3hSg8s=
Received: from CY4PR02MB3335.namprd02.prod.outlook.com (10.165.89.142) by
 CY4PR02MB2373.namprd02.prod.outlook.com (10.169.182.11) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id
 15.20.444.14; Wed, 24 Jan 2018 11:51:43 +0000
Received: from CY4PR02MB3335.namprd02.prod.outlook.com ([10.165.89.142]) by
 CY4PR02MB3335.namprd02.prod.outlook.com ([10.165.89.142]) with mapi id
 15.20.0428.023; Wed, 24 Jan 2018 11:51:43 +0000
From: Volker Schwicking <volker.schwicking@godaddy.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Thread-Topic: [Xen-users] Domus missing assigned cores/cpus with 4.10 and pvh
Thread-Index: AQHTlQB9/wKZ6aVYUU6pBYz8XJlVaqOC6WUA
Date: Wed, 24 Jan 2018 11:51:43 +0000
Message-ID: <90A9DF58-4023-4F74-9943-88BE4DCB4348@godaddy.com>
References: <99B4123C-E3A7-474E-A746-564DCDDC0D2D@godaddy.com>
In-Reply-To: <99B4123C-E3A7-474E-A746-564DCDDC0D2D@godaddy.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is )
 smtp.mailfrom=volker.schwicking@godaddy.com; 
x-originating-ip: [178.6.7.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR02MB2373;
 7:LBzL7XvSRLmJekxKhs36k2EJEz39SKE4OZS4YS9AUS2kJlPQwDMaouTM5AMiUYgKHdPNpnUjSdgWVEICQr+OQQUKUYU+lJOg4aCDFXFvJFt9PP/JQhd1tDC/NX32RRYzXLNF75uQwXsCDXryKPBe6vyN/9RaF8fKjD5WfaAKAdWS+vDfjAGu5wZfcio3SiIlxfq+XvDxiznQe3EY4PtYvXKWcCTijgCaSUUa/1kVp0SjLtA3omrANIroP67Si8Mq
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: b3b34787-577a-4bd8-5502-08d56320d6c2
x-microsoft-antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(48565401081)(5600026)(4604075)(3008032)(2017052603307)(7153060)(49563074)(7193020);
 SRVR:CY4PR02MB2373; 
x-ms-traffictypediagnostic: CY4PR02MB2373:
x-microsoft-antispam-prvs: <CY4PR02MB2373A00BDAF54B7B62EF8955E8E20@CY4PR02MB2373.namprd02.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(246761809553906);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
 RULEID:(102415395)(6040501)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3231023)(2400081)(944501161)(3002001)(6055026)(6041288)(20161123564045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(6072148)(201708071742011);
 SRVR:CY4PR02MB2373; BCL:0; PCL:0; RULEID:; SRVR:CY4PR02MB2373; 
x-forefront-prvs: 056297E276
x-forefront-antispam-report: SFV:NSPM;
 SFS:(10019020)(39380400002)(376002)(346002)(39860400002)(396003)(366004)(199004)(189003)(102836004)(229853002)(99936001)(2351001)(26005)(6116002)(76176011)(77096007)(2906002)(966005)(6506007)(305945005)(3280700002)(3846002)(316002)(3660700001)(106356001)(2900100001)(478600001)(7736002)(66066001)(2501003)(105586002)(5890100001)(6436002)(33656002)(14454004)(36756003)(68736007)(97736004)(82746002)(8676002)(6306002)(6512007)(53936002)(2950100002)(8936002)(5660300001)(6916009)(6246003)(6486002)(5640700003)(25786009)(83716003)(81156014)(81166006)(86362001)(99286004);
 DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR02MB2373;
 H:CY4PR02MB3335.namprd02.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords;
 A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: godaddy.com does not designate
 permitted sender hosts)
x-microsoft-antispam-message-info: AbuU+7aY574QUts9hULha/RO7rPsjRBvobMtfAG4YYuNBA2Vk17XOBdcnj/hImVF4cT82D3M4uguurH6Xc5gxQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
MIME-Version: 1.0
X-OriginatorOrg: godaddy.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b3b34787-577a-4bd8-5502-08d56320d6c2
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jan 2018 11:51:43.4365 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d5f1622b-14a3-45a6-b069-003f8dc4851f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR02MB2373
Subject: Re: [Xen-users] Domus missing assigned cores/cpus with 4.10 and pvh
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3444906309347655616=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============3444906309347655616==
Content-Language: en-US
Content-Type: multipart/signed;
	boundary="Apple-Mail=_26C130E7-0D83-4F91-AC68-07B8B771F449";
	protocol="application/pgp-signature"; micalg=pgp-sha256

--Apple-Mail=_26C130E7-0D83-4F91-AC68-07B8B771F449
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hey again,

I just figured it out myself. I was passing acpi=3Doff to my domus in =
the domu-config as a kernel command line option. While that worked with =
older Xen version, it does not with 4.10 and more than 1 vcpu.

Im guessing that it was in their because of clock/time problems we had a =
while back, but i don=E2=80=99t no for sure.

- volker

> On 24. Jan 2018, at 11:45, Volker Schwicking =
<volker.schwicking@godaddy.com> wrote:
>=20
> Dieser Absender hat unsere Tests zur Betrugserkennung nicht bestanden =
und ist m=C3=B6glicherweise nicht der, der er zu sein scheint. Weitere =
Informationen =C3=BCber Spoofing
> Feedback
> Hi,
>=20
> I updated my Xen from 4.4.7 with pv to 4.10 (official release) with =
pvh and now im missing assigned vcpus/cores in my domus.
>=20
> My domus (between 20 and 60 per host) usually have 2-4 vcpus assigned:
>=20
> ###
> $ xl vcpu-list server000
> Name                                ID  VCPU   CPU State   Time(s) =
Affinity (Hard / Soft)
> server000                             53     0    7   -b-      30.1  =
2-11 / all
> server000                             53     1    -   --p       0.0  =
2-11 / all
> server000                             53     2    -   --p       0.0  =
2-11 / all
> server000                             53     3    -   --p       0.0  =
2-11 / all
> ###
>=20
> Note that vcpu 1-3 are not assigned to a thread/core and the domu only =
shows a single cpu in /proc/cpuinfo.
>=20
> ###
> $ grep processor /proc/cpuinfo
> processor       : 0
> ###
>=20
> Is there a specific option or requirement i have to enable / fulfill =
to get more vcpus assigned correctly with pvh?
>=20
> I am running a custom built 4.14.14 kernel and xen-4.10. I have not =
changed anything in the xen-sources.
>=20
> xl info, xen kernel options, sample domu config and xen command line =
options are attached in the txt file.
>=20
> Any hint would be highly appreciated.
>=20
> -Volker
>=20
>=20
>=20
> <gistfile1.txt>_______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users


--Apple-Mail=_26C130E7-0D83-4F91-AC68-07B8B771F449
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQEzBAEBCAAdFiEED4v1oTxoHKBAjvOZY7ZjDQitje8FAlpoc04ACgkQY7ZjDQit
je9uVgf+Oyk4hBvxnIX7lANGzbDNTNOYyDcXHuYH2FK1foNC6vi4UNRRK67nweoZ
HXc7ul4Ms2Its+f+WZjT5iWoRjhkK7q9pd6Jz0DUSAJHF+I0G1Iy8SxYff/5cFFq
Su82mYd9eV17HDXYPDnfagfGCM0bJu+ACGOH4+J14xEydQ+pW+0ihqJCsEdxUnJ+
4/yRRH+kS5sGu84qyPHXdfzvg0G9RFdkm6JEfuJevqMe4Lo2zcdHu864gf3JXqov
e0GD4xTs6Q+ogU92Iq3n2M/IJBnqvAeOi9F8QAoo47f6zLaWU73/egr8edryRLLi
2cJZKrC3NSKwfkvP6dtZ3+eLO4GWFg==
=03a+
-----END PGP SIGNATURE-----

--Apple-Mail=_26C130E7-0D83-4F91-AC68-07B8B771F449--


--===============3444906309347655616==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============3444906309347655616==--


From xen-users-bounces@lists.xenproject.org Wed Jan 24 15:14:02 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jan 2018 15:14:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeMjR-0005K8-Im; Wed, 24 Jan 2018 15:12:57 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=ey8t=et=sardone.org=registrations@srs-us1.protection.inumbo.net>)
 id 1eeMiA-0005Hu-Qo
 for xen-users@lists.xenproject.org; Wed, 24 Jan 2018 15:11:38 +0000
X-Inumbo-ID: db584229-0118-11e8-ba59-bc764e045a96
Received: from relaygw2-18.mclink.it (unknown [77.43.14.238])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTP
 id db584229-0118-11e8-ba59-bc764e045a96;
 Wed, 24 Jan 2018 16:11:31 +0100 (CET)
Received: from smtpoutgw2.mclink.it ([172.24.30.42] verified)
 by relaygw2-18.mclink.it (CommuniGate Pro SMTP 6.0.4)
 with ESMTP id 123344464 for xen-users@lists.xenproject.org;
 Wed, 24 Jan 2018 16:11:33 +0100
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A2CaAgA5oWha//zIaFANURwBAQEEAQEKA?=
 =?us-ascii?q?QGEKIEbAZ5Cl3yCAi2FFQGFWxQBAQEBAQEBAQKGdw2MSLEjgxWDQIcZAQEBJIR?=
 =?us-ascii?q?OhX0MgkkBg1MLBYE2ImKCfII0BYpXh2CBdY9aggSGEJBPkSKNWYEOhSWFBzaBc?=
 =?us-ascii?q?n1vAYIACDaCFRyBaHiOIwEBAQ?=
Received: from host252-200-dynamic.104-80-r.retail.telecomitalia.it (HELO
 [127.0.0.1]) ([80.104.200.252])
 by smtpoutgw2.mclink.it with ESMTP; 24 Jan 2018 16:11:32 +0100
From: Software Registrations <registrations@sardone.org>
Message-Id: <26283592-172D-40C6-99B8-E22EE5A1674B@sardone.org>
Date: Wed, 24 Jan 2018 16:11:31 +0100
To: xen-users@lists.xenproject.org
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
X-Mailer: Apple Mail (2.3124)
X-Mailman-Approved-At: Wed, 24 Jan 2018 15:12:55 +0000
Subject: [Xen-users] Failure to spawn the device model
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Wed Jan 24 16:38:08 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jan 2018 16:38:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeO33-0005JP-02; Wed, 24 Jan 2018 16:37:17 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=yvxo=et=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eeO32-0005JE-0p
 for xen-users@lists.xenproject.org; Wed, 24 Jan 2018 16:37:16 +0000
X-Inumbo-ID: d1545c22-0124-11e8-ba59-bc764e045a96
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id d1545c22-0124-11e8-ba59-bc764e045a96;
 Wed, 24 Jan 2018 17:37:08 +0100 (CET)
Received: from [IPv6:2001:828:13c8:10b::c] (blackbox.bofh.hq.mendix.net
 [IPv6:2001:828:13c8:10b::c])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 18D12CA43C1F;
 Wed, 24 Jan 2018 17:37:11 +0100 (CET)
To: Juergen Gross <jgross@suse.com>, Andy Smith <andy@strugglers.net>,
 xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
Date: Wed, 24 Jan 2018 17:37:10 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
Content-Type: multipart/mixed; boundary="------------6DB19E7F4B67C93FEAAA8BF0"
Content-Language: en_US
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------6DB19E7F4B67C93FEAAA8BF0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit

On 01/23/2018 06:41 AM, Juergen Gross wrote:
> On 23/01/18 05:46, Andy Smith wrote:
>> Hi,
>>
>> What are the current options for booting PVHv2 guests in Xen 4.10.0?
>>
>> As far as I can see there is only direct kernel booting, i.e.
>> supplying "kernel = /path/to/vmlinux".
>>
>> In PV land there is pvgrub which is very convenient for being able
>> to use kernel and initramfs, but I am not seeing support for that in
>> upstream grub2. I see that Juergen Gross post a patch series that
>> claims to add this feature:
>>
>>     <https://lists.gnu.org/archive/html/grub-devel/2017-11/msg00054.html>
>>
>> …but this doesn't seem to have been applied yet. Is it an ongoing
>> idea or has that method been abandoned?
> 
> Still waiting for review.

Since I wanted to try to test this, I scraped the patches off the
grub-devel list and did the following:

1. clone https://git.savannah.gnu.org/git/grub.git
2. apply patches on top of master, plus an extra one with a puzzle piece
to make it actually compile (see attachment)

3. build:
./autogen.sh
./configure --target=i386 --with-platform=xenpvh
make

4. use mkstandalone to create a grub image to boot
./grub-mkstandalone -d grub-core --locale-directory=/ -o
~/grub-i386-xenpvh-fire-ze-missile -O i386-xenpvh
~/build/pvgrub2/pvgrub2/xvda-fire-ze-missile.cfg

contents of the config file that I want to have inserted into it (same
file I use for booting PV now):

root='(xen/xvda)'
insmod xzio
insmod gzio
insmod btrfs
insmod ext2
echo 'Loading Linux ...'
linux /vmlinuz root=/dev/xvda ro elevator=noop
echo 'Loading initial ramdisk ...'
initrd /initrd.img
boot

5. Try to use it already, to see what happens. (Xen 4.10.0)

-# cat yolo-pvgrub2

type="pvh"
kernel = "/yolo/grub-i386-xenpvh-fire-ze-missile"
name = "yolo-pvgrub2"
memory = 1024
vcpus = 10
vif = [
    "mac=02:00:0a:8c:d9:0d,bridge=ovs0.217",
]
disk = [
    '/dev/test/yolo,raw,xvda,rw',
]

-# xen create -c yolo-pvgrub2
Parsing config from yolo-pvgrub2
libxl: info: libxl_create.c:109:libxl__domain_build_info_setdefault:
qemu-xen is unavailable, using qemu-xen-traditional instead: No such
file or directory
S3 disabled
S4 disabled
CONV disabled

                     GNU GRUB  version 2.03

   Minimal BASH-like line editing is supported. For the first word, TAB
   lists possible command completions. Anywhere else TAB lists possible
   device or file completions.


grub>

Ok, so for some reason it seems to ignore the config? But I can type
things manually:

grub> insmod xzio
grub> insmod gzio
grub> insmod btrfs
grub> insmod ext2
grub> search.file /vmlinuz
 xen/xvda

Ok, so it can see the disk and fine the symlink to the kernel image. Now
let's try the rest of it:

grub> root='(xen/xvda)'
grub> linux /vmlinuz root=/dev/xvda ro elevator=noop
grub> initrd /initrd.img
grub> boot

And now it just hangs, no output any more.

6. Apply linux patches to the domU kernel and Xen

domU Linux kernel:
- Branch off from linux 4.14.14
- add https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git as
remote and cherry-pick the 4 patches mentioned in
  https://lists.gnu.org/archive/html/grub-devel/2017-12/msg00017.html

Xen: pick this one on top of 4.10.0:
 https://lists.xen.org/archives/html/xen-devel/2017-11/msg01807.html
 4a5733771e6f33918eba07b584cccce564a67ac1

7. Test again after dom0 reboot into the new xen and put the new domU
kernel on it.
 -> same result: grub command prompt, and no activity after 'boot'.

Extra things:

8. Start domU after copying kernel/initrd to the dom0:

type="pvh"
kernel = "/yolo/vmlinuz-4.14.14-yolo"
ramdisk = "/yolo/initrd.img-4.14.14-yolo"
root = "/dev/xvda ro elevator=noop console=hvc0"

This boots, dmesg: http://paste.debian.net/plainh/7120cef2

9. Just for fun, start domU with previous kernel/initrd without the patches:

type="pvh"
kernel = "/yolo/vmlinuz-4.14.0-3-amd64"
ramdisk = "/yolo/initrd.img-4.14.0-3-amd64"
root = "/dev/xvda ro elevator=noop console=hvc0"

This boots and has 1 vcpu and no ACPI lines in dmesg, which is expected
breakage, I believe, reading xen-devel.

So, what am I missing?

Hans

--------------6DB19E7F4B67C93FEAAA8BF0
Content-Type: application/x-gtar-compressed;
 name="grub-pvh.tgz"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="grub-pvh.tgz"
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--------------6DB19E7F4B67C93FEAAA8BF0
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--------------6DB19E7F4B67C93FEAAA8BF0--


From xen-users-bounces@lists.xenproject.org Wed Jan 24 22:00:43 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jan 2018 22:00:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeT4r-0006xJ-Fm; Wed, 24 Jan 2018 21:59:29 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=j0y8=et=alstadheim.priv.no=hakon@srs-us1.protection.inumbo.net>)
 id 1eeT4q-0006xD-75
 for xen-users@lists.xen.org; Wed, 24 Jan 2018 21:59:28 +0000
X-Inumbo-ID: d78a3fb6-0151-11e8-b9b1-635ca7ef6cff
Received: from asav21.altibox.net (unknown [109.247.116.8])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id d78a3fb6-0151-11e8-b9b1-635ca7ef6cff;
 Wed, 24 Jan 2018 21:59:26 +0000 (UTC)
Received: from postfix-relay.alstadheim.priv.no
 (148-252-124.122.3p.ntebredband.no [148.252.124.122])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 (Authenticated sender: hakon.alstadheim@ntebb.no)
 by asav21.altibox.net (Postfix) with ESMTPSA id 24C9580053
 for <xen-users@lists.xen.org>; Wed, 24 Jan 2018 22:59:16 +0100 (CET)
X-Finnesikke-B-A-I-T: finnesikke@alstadheim.priv.no
Received: from smtps.alstadheim.priv.no (localhost [127.0.0.1])
 by postfix-relay.alstadheim.priv.no (Postfix) with ESMTP id 53EB7C000094
 for <xen-users@lists.xen.org>; Wed, 24 Jan 2018 22:59:17 +0100 (CET)
Received: from [192.168.2.201] (unknown [192.168.2.201])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested) (Authenticated sender: hakon)
 by smtps.alstadheim.priv.no (Postfix) with ESMTPSA id 3023F14ABA0
 for <xen-users@lists.xen.org>; Wed, 24 Jan 2018 22:59:17 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alstadheim.priv.no;
 s=smtp; t=1516831157;
 bh=n+cGZ1hKjSmKXzrvS7QMnaI477Gt8Op5FBq54GR9yyQ=;
 h=To:From:Subject:Date:From;
 b=HyRjq9SM/D02GEr/liyctQgIt3zu/Pehg/l2yKxE/7TpXUCloMRWTY/b04tVW1h+K
 CsiU+Al7uf8eGT7p5yXhPm7G9Zwl0BIzud/uWK8GsjhIVIMNJvYsLqfhiGBsCu5VX7
 wT5CPL5J327Ym+iTQdZlfnqKMq3qwobviri26ATs=
To: xen-users@lists.xen.org
From: =?UTF-8?Q?H=c3=a5kon_Alstadheim?= <hakon@alstadheim.priv.no>
Message-ID: <e448ae30-b6fc-1871-a168-89e804113b19@alstadheim.priv.no>
Date: Wed, 24 Jan 2018 22:59:15 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
Content-Language: en-US
X-CMAE-Score: 0
X-CMAE-Analysis: v=2.2 cv=ANFV9ctm c=1 sm=1 tr=0
 a=F9oVK6qnXDsgXOhIrcsnOQ==:117 a=F9oVK6qnXDsgXOhIrcsnOQ==:17
 a=IkcTkHD0fZMA:10 a=RgaUWeydRksA:10 a=Lbwp00P31RpLJnmRC18A:9
 a=VAczxeJth01uqymv:21 a=GBtyf56sYX7WijLB:21 a=QEXdDO2ut3YA:10
Subject: [Xen-users] xen_pt_region_update: Error: create new mem mapping
	failed! (err: 22)
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 06:02:39 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 06:02:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeabC-0005qE-33; Thu, 25 Jan 2018 06:01:22 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=5epa=eu=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1eeabA-0005q8-DO
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 06:01:20 +0000
X-Inumbo-ID: 254372b2-0195-11e8-ba59-bc764e045a96
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 254372b2-0195-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 07:01:12 +0100 (CET)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id C1A2CABD9;
 Thu, 25 Jan 2018 06:01:14 +0000 (UTC)
To: Hans van Kranenburg <hans@knorrie.org>, Andy Smith <andy@strugglers.net>, 
 xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
From: Juergen Gross <jgross@suse.com>
Message-ID: <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
Date: Thu, 25 Jan 2018 07:01:12 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
Content-Type: multipart/mixed; boundary="------------21C0B2A16B5D7F3B305B4090"
Content-Language: de-DE
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------21C0B2A16B5D7F3B305B4090
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit

On 24/01/18 17:37, Hans van Kranenburg wrote:
> On 01/23/2018 06:41 AM, Juergen Gross wrote:
>> On 23/01/18 05:46, Andy Smith wrote:
>>> Hi,
>>>
>>> What are the current options for booting PVHv2 guests in Xen 4.10.0?
>>>
>>> As far as I can see there is only direct kernel booting, i.e.
>>> supplying "kernel = /path/to/vmlinux".
>>>
>>> In PV land there is pvgrub which is very convenient for being able
>>> to use kernel and initramfs, but I am not seeing support for that in
>>> upstream grub2. I see that Juergen Gross post a patch series that
>>> claims to add this feature:
>>>
>>>     <https://lists.gnu.org/archive/html/grub-devel/2017-11/msg00054.html>
>>>
>>> …but this doesn't seem to have been applied yet. Is it an ongoing
>>> idea or has that method been abandoned?
>>
>> Still waiting for review.
> 
> Since I wanted to try to test this, I scraped the patches off the
> grub-devel list and did the following:
> 
> 1. clone https://git.savannah.gnu.org/git/grub.git
> 2. apply patches on top of master, plus an extra one with a puzzle piece
> to make it actually compile (see attachment)
> 
> 3. build:
> ./autogen.sh
> ./configure --target=i386 --with-platform=xenpvh
> make
> 
> 4. use mkstandalone to create a grub image to boot
> ./grub-mkstandalone -d grub-core --locale-directory=/ -o
> ~/grub-i386-xenpvh-fire-ze-missile -O i386-xenpvh
> ~/build/pvgrub2/pvgrub2/xvda-fire-ze-missile.cfg
> 
> contents of the config file that I want to have inserted into it (same
> file I use for booting PV now):
> 
> root='(xen/xvda)'
> insmod xzio
> insmod gzio
> insmod btrfs
> insmod ext2
> echo 'Loading Linux ...'
> linux /vmlinuz root=/dev/xvda ro elevator=noop
> echo 'Loading initial ramdisk ...'
> initrd /initrd.img
> boot
> 
> 5. Try to use it already, to see what happens. (Xen 4.10.0)
> 
> -# cat yolo-pvgrub2
> 
> type="pvh"
> kernel = "/yolo/grub-i386-xenpvh-fire-ze-missile"
> name = "yolo-pvgrub2"
> memory = 1024
> vcpus = 10
> vif = [
>     "mac=02:00:0a:8c:d9:0d,bridge=ovs0.217",
> ]
> disk = [
>     '/dev/test/yolo,raw,xvda,rw',
> ]
> 
> -# xen create -c yolo-pvgrub2
> Parsing config from yolo-pvgrub2
> libxl: info: libxl_create.c:109:libxl__domain_build_info_setdefault:
> qemu-xen is unavailable, using qemu-xen-traditional instead: No such
> file or directory
> S3 disabled
> S4 disabled
> CONV disabled
> 
>                      GNU GRUB  version 2.03
> 
>    Minimal BASH-like line editing is supported. For the first word, TAB
>    lists possible command completions. Anywhere else TAB lists possible
>    device or file completions.
> 
> 
> grub>
> 
> Ok, so for some reason it seems to ignore the config? But I can type
> things manually:
> 
> grub> insmod xzio
> grub> insmod gzio
> grub> insmod btrfs
> grub> insmod ext2
> grub> search.file /vmlinuz
>  xen/xvda
> 
> Ok, so it can see the disk and fine the symlink to the kernel image. Now
> let's try the rest of it:
> 
> grub> root='(xen/xvda)'
> grub> linux /vmlinuz root=/dev/xvda ro elevator=noop
> grub> initrd /initrd.img
> grub> boot
> 
> And now it just hangs, no output any more.
> 
> 6. Apply linux patches to the domU kernel and Xen
> 
> domU Linux kernel:
> - Branch off from linux 4.14.14
> - add https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git as
> remote and cherry-pick the 4 patches mentioned in
>   https://lists.gnu.org/archive/html/grub-devel/2017-12/msg00017.html
> 
> Xen: pick this one on top of 4.10.0:
>  https://lists.xen.org/archives/html/xen-devel/2017-11/msg01807.html
>  4a5733771e6f33918eba07b584cccce564a67ac1
> 
> 7. Test again after dom0 reboot into the new xen and put the new domU
> kernel on it.
>  -> same result: grub command prompt, and no activity after 'boot'.
> 
> Extra things:
> 
> 8. Start domU after copying kernel/initrd to the dom0:
> 
> type="pvh"
> kernel = "/yolo/vmlinuz-4.14.14-yolo"
> ramdisk = "/yolo/initrd.img-4.14.14-yolo"
> root = "/dev/xvda ro elevator=noop console=hvc0"
> 
> This boots, dmesg: http://paste.debian.net/plainh/7120cef2
> 
> 9. Just for fun, start domU with previous kernel/initrd without the patches:
> 
> type="pvh"
> kernel = "/yolo/vmlinuz-4.14.0-3-amd64"
> ramdisk = "/yolo/initrd.img-4.14.0-3-amd64"
> root = "/dev/xvda ro elevator=noop console=hvc0"
> 
> This boots and has 1 vcpu and no ACPI lines in dmesg, which is expected
> breakage, I believe, reading xen-devel.
> 
> So, what am I missing?

I used the attached script to build it (derived from the pvgrub build
script used in SUSE's grub-xen RPM).


Juergen


--------------21C0B2A16B5D7F3B305B4090
Content-Type: text/plain; charset=UTF-8;
 name="mk"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="mk"
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--------------21C0B2A16B5D7F3B305B4090
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--------------21C0B2A16B5D7F3B305B4090--


From xen-users-bounces@lists.xenproject.org Thu Jan 25 11:41:06 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 11:41:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eefsw-0002KV-VP; Thu, 25 Jan 2018 11:40:02 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=2vme=eu=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eefsv-0002Bg-Mn
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 11:40:01 +0000
X-Inumbo-ID: 74c5783e-01c4-11e8-ba59-bc764e045a96
Received: from syrinx.knorrie.org (unknown [2001:888:2177::4d])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 74c5783e-01c4-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 12:39:52 +0100 (CET)
Received: from [IPv6:2001:828:13c8:10b::c] (blackbox.bofh.hq.mendix.net
 [IPv6:2001:828:13c8:10b::c])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 8A068CB77E85
 for <xen-users@lists.xenproject.org>; Thu, 25 Jan 2018 12:39:56 +0100 (CET)
To: xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
Date: Thu, 25 Jan 2018 12:39:56 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
Content-Language: en_US
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 12:02:50 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 12:02:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eegDw-00055v-DN; Thu, 25 Jan 2018 12:01:44 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=5epa=eu=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1eegDv-00055k-9S
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 12:01:43 +0000
X-Inumbo-ID: 7d884a68-01c7-11e8-ba59-bc764e045a96
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 7d884a68-01c7-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 13:01:35 +0100 (CET)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id 9A334ADDD;
 Thu, 25 Jan 2018 12:01:39 +0000 (UTC)
To: Hans van Kranenburg <hans@knorrie.org>, xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
From: Juergen Gross <jgross@suse.com>
Message-ID: <17fb2d4f-7759-bbc1-6172-48bc0cb875d2@suse.com>
Date: Thu, 25 Jan 2018 13:01:38 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
Content-Language: de-DE
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

T24gMjUvMDEvMTggMTI6MzksIEhhbnMgdmFuIEtyYW5lbmJ1cmcgd3JvdGU6Cj4gT24gMDEvMjUv
MjAxOCAwNzowMSBBTSwgSnVlcmdlbiBHcm9zcyB3cm90ZToKPj4gT24gMjQvMDEvMTggMTc6Mzcs
IEhhbnMgdmFuIEtyYW5lbmJ1cmcgd3JvdGU6Cj4+PiBPbiAwMS8yMy8yMDE4IDA2OjQxIEFNLCBK
dWVyZ2VuIEdyb3NzIHdyb3RlOgo+Pj4+IE9uIDIzLzAxLzE4IDA1OjQ2LCBBbmR5IFNtaXRoIHdy
b3RlOgo+Pj4+PiBIaSwKPj4+Pj4KPj4+Pj4gV2hhdCBhcmUgdGhlIGN1cnJlbnQgb3B0aW9ucyBm
b3IgYm9vdGluZyBQVkh2MiBndWVzdHMgaW4gWGVuIDQuMTAuMD8KPj4+Pj4KPj4+Pj4gQXMgZmFy
IGFzIEkgY2FuIHNlZSB0aGVyZSBpcyBvbmx5IGRpcmVjdCBrZXJuZWwgYm9vdGluZywgaS5lLgo+
Pj4+PiBzdXBwbHlpbmcgImtlcm5lbCA9IC9wYXRoL3RvL3ZtbGludXgiLgo+Pj4+Pgo+Pj4+PiBJ
biBQViBsYW5kIHRoZXJlIGlzIHB2Z3J1YiB3aGljaCBpcyB2ZXJ5IGNvbnZlbmllbnQgZm9yIGJl
aW5nIGFibGUKPj4+Pj4gdG8gdXNlIGtlcm5lbCBhbmQgaW5pdHJhbWZzLCBidXQgSSBhbSBub3Qg
c2VlaW5nIHN1cHBvcnQgZm9yIHRoYXQgaW4KPj4+Pj4gdXBzdHJlYW0gZ3J1YjIuIEkgc2VlIHRo
YXQgSnVlcmdlbiBHcm9zcyBwb3N0IGEgcGF0Y2ggc2VyaWVzIHRoYXQKPj4+Pj4gY2xhaW1zIHRv
IGFkZCB0aGlzIGZlYXR1cmU6Cj4+Pj4+Cj4+Pj4+ICAgICA8aHR0cHM6Ly9saXN0cy5nbnUub3Jn
L2FyY2hpdmUvaHRtbC9ncnViLWRldmVsLzIwMTctMTEvbXNnMDAwNTQuaHRtbD4KPj4+Pj4KPj4+
Pj4g4oCmYnV0IHRoaXMgZG9lc24ndCBzZWVtIHRvIGhhdmUgYmVlbiBhcHBsaWVkIHlldC4gSXMg
aXQgYW4gb25nb2luZwo+Pj4+PiBpZGVhIG9yIGhhcyB0aGF0IG1ldGhvZCBiZWVuIGFiYW5kb25l
ZD8KPj4+Pgo+Pj4+IFN0aWxsIHdhaXRpbmcgZm9yIHJldmlldy4KPj4+Cj4+PiBTaW5jZSBJIHdh
bnRlZCB0byB0cnkgdG8gdGVzdCB0aGlzLCBJIHNjcmFwZWQgdGhlIHBhdGNoZXMgb2ZmIHRoZQo+
Pj4gZ3J1Yi1kZXZlbCBsaXN0IGFuZCBkaWQgdGhlIGZvbGxvd2luZzoKPj4+Cj4+PiAxLiBjbG9u
ZSBodHRwczovL2dpdC5zYXZhbm5haC5nbnUub3JnL2dpdC9ncnViLmdpdAo+Pj4gMi4gYXBwbHkg
cGF0Y2hlcyBvbiB0b3Agb2YgbWFzdGVyLCBwbHVzIGFuIGV4dHJhIG9uZSB3aXRoIGEgcHV6emxl
IHBpZWNlCj4+PiB0byBtYWtlIGl0IGFjdHVhbGx5IGNvbXBpbGUgKHNlZSBhdHRhY2htZW50KQo+
Pj4KPj4+IDMuIGJ1aWxkOgo+Pj4gLi9hdXRvZ2VuLnNoCj4+PiAuL2NvbmZpZ3VyZSAtLXRhcmdl
dD1pMzg2IC0td2l0aC1wbGF0Zm9ybT14ZW5wdmgKPj4+IG1ha2UKPj4+Cj4+PiA0LiB1c2UgbWtz
dGFuZGFsb25lIHRvIGNyZWF0ZSBhIGdydWIgaW1hZ2UgdG8gYm9vdAo+Pj4gLi9ncnViLW1rc3Rh
bmRhbG9uZSAtZCBncnViLWNvcmUgLS1sb2NhbGUtZGlyZWN0b3J5PS8gLW8KPj4+IH4vZ3J1Yi1p
Mzg2LXhlbnB2aC1maXJlLXplLW1pc3NpbGUgLU8gaTM4Ni14ZW5wdmgKPj4+IH4vYnVpbGQvcHZn
cnViMi9wdmdydWIyL3h2ZGEtZmlyZS16ZS1taXNzaWxlLmNmZwo+Pj4KPj4+IGNvbnRlbnRzIG9m
IHRoZSBjb25maWcgZmlsZSB0aGF0IEkgd2FudCB0byBoYXZlIGluc2VydGVkIGludG8gaXQgKHNh
bWUKPj4+IGZpbGUgSSB1c2UgZm9yIGJvb3RpbmcgUFYgbm93KToKPj4+Cj4+PiByb290PScoeGVu
L3h2ZGEpJwo+Pj4gaW5zbW9kIHh6aW8KPj4+IGluc21vZCBnemlvCj4+PiBpbnNtb2QgYnRyZnMK
Pj4+IGluc21vZCBleHQyCj4+PiBlY2hvICdMb2FkaW5nIExpbnV4IC4uLicKPj4+IGxpbnV4IC92
bWxpbnV6IHJvb3Q9L2Rldi94dmRhIHJvIGVsZXZhdG9yPW5vb3AKPj4+IGVjaG8gJ0xvYWRpbmcg
aW5pdGlhbCByYW1kaXNrIC4uLicKPj4+IGluaXRyZCAvaW5pdHJkLmltZwo+Pj4gYm9vdAo+Pj4K
Pj4+IDUuIFRyeSB0byB1c2UgaXQgYWxyZWFkeSwgdG8gc2VlIHdoYXQgaGFwcGVucy4gKFhlbiA0
LjEwLjApCj4+Pgo+Pj4gLSMgY2F0IHlvbG8tcHZncnViMgo+Pj4KPj4+IHR5cGU9InB2aCIKPj4+
IGtlcm5lbCA9ICIveW9sby9ncnViLWkzODYteGVucHZoLWZpcmUtemUtbWlzc2lsZSIKPj4+IG5h
bWUgPSAieW9sby1wdmdydWIyIgo+Pj4gbWVtb3J5ID0gMTAyNAo+Pj4gdmNwdXMgPSAxMAo+Pj4g
dmlmID0gWwo+Pj4gICAgICJtYWM9MDI6MDA6MGE6OGM6ZDk6MGQsYnJpZGdlPW92czAuMjE3IiwK
Pj4+IF0KPj4+IGRpc2sgPSBbCj4+PiAgICAgJy9kZXYvdGVzdC95b2xvLHJhdyx4dmRhLHJ3JywK
Pj4+IF0KPj4+Cj4+PiAtIyB4ZW4gY3JlYXRlIC1jIHlvbG8tcHZncnViMgo+Pj4gUGFyc2luZyBj
b25maWcgZnJvbSB5b2xvLXB2Z3J1YjIKPj4+IGxpYnhsOiBpbmZvOiBsaWJ4bF9jcmVhdGUuYzox
MDk6bGlieGxfX2RvbWFpbl9idWlsZF9pbmZvX3NldGRlZmF1bHQ6Cj4+PiBxZW11LXhlbiBpcyB1
bmF2YWlsYWJsZSwgdXNpbmcgcWVtdS14ZW4tdHJhZGl0aW9uYWwgaW5zdGVhZDogTm8gc3VjaAo+
Pj4gZmlsZSBvciBkaXJlY3RvcnkKPj4+IFMzIGRpc2FibGVkCj4+PiBTNCBkaXNhYmxlZAo+Pj4g
Q09OViBkaXNhYmxlZAo+Pj4KPj4+ICAgICAgICAgICAgICAgICAgICAgIEdOVSBHUlVCICB2ZXJz
aW9uIDIuMDMKPj4+Cj4+PiAgICBNaW5pbWFsIEJBU0gtbGlrZSBsaW5lIGVkaXRpbmcgaXMgc3Vw
cG9ydGVkLiBGb3IgdGhlIGZpcnN0IHdvcmQsIFRBQgo+Pj4gICAgbGlzdHMgcG9zc2libGUgY29t
bWFuZCBjb21wbGV0aW9ucy4gQW55d2hlcmUgZWxzZSBUQUIgbGlzdHMgcG9zc2libGUKPj4+ICAg
IGRldmljZSBvciBmaWxlIGNvbXBsZXRpb25zLgo+Pj4KPj4+Cj4+PiBncnViPgo+Pj4KPj4+IE9r
LCBzbyBmb3Igc29tZSByZWFzb24gaXQgc2VlbXMgdG8gaWdub3JlIHRoZSBjb25maWc/IEJ1dCBJ
IGNhbiB0eXBlCj4+PiB0aGluZ3MgbWFudWFsbHk6Cj4+Pgo+Pj4gZ3J1Yj4gaW5zbW9kIHh6aW8K
Pj4+IGdydWI+IGluc21vZCBnemlvCj4+PiBncnViPiBpbnNtb2QgYnRyZnMKPj4+IGdydWI+IGlu
c21vZCBleHQyCj4+PiBncnViPiBzZWFyY2guZmlsZSAvdm1saW51ego+Pj4gIHhlbi94dmRhCj4+
Pgo+Pj4gT2ssIHNvIGl0IGNhbiBzZWUgdGhlIGRpc2sgYW5kIGZpbmUgdGhlIHN5bWxpbmsgdG8g
dGhlIGtlcm5lbCBpbWFnZS4gTm93Cj4+PiBsZXQncyB0cnkgdGhlIHJlc3Qgb2YgaXQ6Cj4+Pgo+
Pj4gZ3J1Yj4gcm9vdD0nKHhlbi94dmRhKScKPj4+IGdydWI+IGxpbnV4IC92bWxpbnV6IHJvb3Q9
L2Rldi94dmRhIHJvIGVsZXZhdG9yPW5vb3AKPj4+IGdydWI+IGluaXRyZCAvaW5pdHJkLmltZwo+
Pj4gZ3J1Yj4gYm9vdAo+Pj4KPj4+IEFuZCBub3cgaXQganVzdCBoYW5ncywgbm8gb3V0cHV0IGFu
eSBtb3JlLgo+Pj4KPj4+IDYuIEFwcGx5IGxpbnV4IHBhdGNoZXMgdG8gdGhlIGRvbVUga2VybmVs
IGFuZCBYZW4KPj4+Cj4+PiBkb21VIExpbnV4IGtlcm5lbDoKPj4+IC0gQnJhbmNoIG9mZiBmcm9t
IGxpbnV4IDQuMTQuMTQKPj4+IC0gYWRkIGh0dHBzOi8vZ2l0Lmtlcm5lbC5vcmcvcHViL3NjbS9s
aW51eC9rZXJuZWwvZ2l0L3RpcC90aXAuZ2l0IGFzCj4+PiByZW1vdGUgYW5kIGNoZXJyeS1waWNr
IHRoZSA0IHBhdGNoZXMgbWVudGlvbmVkIGluCj4+PiAgIGh0dHBzOi8vbGlzdHMuZ251Lm9yZy9h
cmNoaXZlL2h0bWwvZ3J1Yi1kZXZlbC8yMDE3LTEyL21zZzAwMDE3Lmh0bWwKPj4+Cj4+PiBYZW46
IHBpY2sgdGhpcyBvbmUgb24gdG9wIG9mIDQuMTAuMDoKPj4+ICBodHRwczovL2xpc3RzLnhlbi5v
cmcvYXJjaGl2ZXMvaHRtbC94ZW4tZGV2ZWwvMjAxNy0xMS9tc2cwMTgwNy5odG1sCj4+PiAgNGE1
NzMzNzcxZTZmMzM5MThlYmEwN2I1ODRjY2NjZTU2NGE2N2FjMQo+Pj4KPj4+IDcuIFRlc3QgYWdh
aW4gYWZ0ZXIgZG9tMCByZWJvb3QgaW50byB0aGUgbmV3IHhlbiBhbmQgcHV0IHRoZSBuZXcgZG9t
VQo+Pj4ga2VybmVsIG9uIGl0Lgo+Pj4gIC0+IHNhbWUgcmVzdWx0OiBncnViIGNvbW1hbmQgcHJv
bXB0LCBhbmQgbm8gYWN0aXZpdHkgYWZ0ZXIgJ2Jvb3QnLgo+Pj4KPj4+IEV4dHJhIHRoaW5nczoK
Pj4+Cj4+PiA4LiBTdGFydCBkb21VIGFmdGVyIGNvcHlpbmcga2VybmVsL2luaXRyZCB0byB0aGUg
ZG9tMDoKPj4+Cj4+PiB0eXBlPSJwdmgiCj4+PiBrZXJuZWwgPSAiL3lvbG8vdm1saW51ei00LjE0
LjE0LXlvbG8iCj4+PiByYW1kaXNrID0gIi95b2xvL2luaXRyZC5pbWctNC4xNC4xNC15b2xvIgo+
Pj4gcm9vdCA9ICIvZGV2L3h2ZGEgcm8gZWxldmF0b3I9bm9vcCBjb25zb2xlPWh2YzAiCj4+Pgo+
Pj4gVGhpcyBib290cywgZG1lc2c6IGh0dHA6Ly9wYXN0ZS5kZWJpYW4ubmV0L3BsYWluaC83MTIw
Y2VmMgo+Pj4KPj4+IDkuIEp1c3QgZm9yIGZ1biwgc3RhcnQgZG9tVSB3aXRoIHByZXZpb3VzIGtl
cm5lbC9pbml0cmQgd2l0aG91dCB0aGUgcGF0Y2hlczoKPj4+Cj4+PiB0eXBlPSJwdmgiCj4+PiBr
ZXJuZWwgPSAiL3lvbG8vdm1saW51ei00LjE0LjAtMy1hbWQ2NCIKPj4+IHJhbWRpc2sgPSAiL3lv
bG8vaW5pdHJkLmltZy00LjE0LjAtMy1hbWQ2NCIKPj4+IHJvb3QgPSAiL2Rldi94dmRhIHJvIGVs
ZXZhdG9yPW5vb3AgY29uc29sZT1odmMwIgo+Pj4KPj4+IFRoaXMgYm9vdHMgYW5kIGhhcyAxIHZj
cHUgYW5kIG5vIEFDUEkgbGluZXMgaW4gZG1lc2csIHdoaWNoIGlzIGV4cGVjdGVkCj4+PiBicmVh
a2FnZSwgSSBiZWxpZXZlLCByZWFkaW5nIHhlbi1kZXZlbC4KPj4+Cj4+PiBTbywgd2hhdCBhbSBJ
IG1pc3Npbmc/Cj4+Cj4+IEkgdXNlZCB0aGUgYXR0YWNoZWQgc2NyaXB0IHRvIGJ1aWxkIGl0IChk
ZXJpdmVkIGZyb20gdGhlIHB2Z3J1YiBidWlsZAo+PiBzY3JpcHQgdXNlZCBpbiBTVVNFJ3MgZ3J1
Yi14ZW4gUlBNKS4KPiAKPiBUaGFua3MuIFRoaXMgZ2V0cyBtZSBhIHN0ZXAgZnVydGhlci4KPiAK
PiBVc2luZyB0aGUgImdyYWZ0IHBvaW50IHN5bnRheCIgdGhpbmdpZQo+ICgiL2Jvb3QvZ3J1Yi9n
cnViLmNmZz0uL2dydWIuY2ZnIikgaGVscGVkIGdldHRpbmcgdGhlIGNvbmZpZyBhY3R1YWxseQo+
IGV4ZWN1dGVkIGluc3RlYWQgb2YgZ2V0dGluZyB0aGUgcHJvbXB0Lgo+IAo+IE5leHQgSSBnb3Q6
Cj4gCj4gV2VsY29tZSB0byBHUlVCIQo+IAo+IExvYWRpbmcgTGludXggLi4uCj4gTG9hZGluZyBp
bml0aWFsIHJhbWRpc2sgLi4uCj4gCj4gLi4uYW5kIHRoZW4gaXQgc3RvcHMuCj4gCj4gU28gSSBt
b2RpZmllZCBteSBncnViIGNvbmZpZyBhIGJpdCBmcm9tIHRoZSBvbmUgc2hvd24gYWJvdmUsIGFk
ZGluZwo+IGV4cGxpY2l0IGNvbnNvbGU9aHZjMDoKPiAKPiByb290PScoeGVuL3h2ZGEpJwo+IGlu
c21vZCB4emlvCj4gaW5zbW9kIGd6aW8KPiBpbnNtb2QgYnRyZnMKPiBpbnNtb2QgZXh0Mgo+IGVj
aG8gJ0xvYWRpbmcgTGludXggLi4uJwo+IGxpbnV4IC92bWxpbnV6IHJvb3Q9L2Rldi94dmRhIHJv
IGVsZXZhdG9yPW5vb3AgY29uc29sZT1odmMwCj4gZWNobyAnTG9hZGluZyBpbml0aWFsIHJhbWRp
c2sgLi4uJwo+IGluaXRyZCAvaW5pdHJkLmltZwo+IGVjaG8gJ1RoZXJlIHdlIGdvISAuLi4nCj4g
Ym9vdAo+IAo+IEFuZCBub3cgSSBnZXQgY29uc29sZSBvdXRwdXQgYW5kIHRoaW5ncyBoYXBwZW4u
IE9ubHkgaXQgY2FuJ3QgZmluZCB0aGUgZGlzay4KPiAKPiBbLi4uXQo+IEJlZ2luOiBSdW5uaW5n
IC9zY3JpcHRzL2xvY2FsLWJsb2NrIC4uLiBkb25lLgo+IEJlZ2luOiBSdW5uaW5nIC9zY3JpcHRz
L2xvY2FsLWJsb2NrIC4uLiBkb25lLgo+IGRvbmUuCj4gR2F2ZSB1cCB3YWl0aW5nIGZvciByb290
IGZpbGUgc3lzdGVtIGRldmljZS4gIENvbW1vbiBwcm9ibGVtczoKPiAgLSBCb290IGFyZ3MgKGNh
dCAvcHJvYy9jbWRsaW5lKQo+ICAgIC0gQ2hlY2sgcm9vdGRlbGF5PSAoZGlkIHRoZSBzeXN0ZW0g
d2FpdCBsb25nIGVub3VnaD8pCj4gIC0gTWlzc2luZyBtb2R1bGVzIChjYXQgL3Byb2MvbW9kdWxl
czsgbHMgL2RldikKPiBBTEVSVCEgIC9kZXYveHZkYSBkb2VzIG5vdCBleGlzdC4gIERyb3BwaW5n
IHRvIGEgc2hlbGwhCj4gKGluaXRyYW1mcykKPiAKPiBGdWxsIGxvZyBhdCBodHRwOi8vcGFzdGUu
ZGViaWFuLm5ldC9wbGFpbmgvNDI2YmVkNjAKPiAKPiBOb3cgSSBoYXZlIHRvIGZpbmQgb3V0IHdo
eSdzIHRoYXQuIEJ1dCBmaXJzdCB0aW1lIGZvciBsdW5jaC4gOykKCk1pc3NpbmcgeGVuLWJsa2Zy
b250IGRyaXZlciBpbiBpbml0cmQ/CgoKSnVlcmdlbgoKCl9fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fClhlbi11c2VycyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJz
QGxpc3RzLnhlbnByb2plY3Qub3JnCmh0dHBzOi8vbGlzdHMueGVucHJvamVjdC5vcmcvbWFpbG1h
bi9saXN0aW5mby94ZW4tdXNlcnM=

From xen-users-bounces@lists.xenproject.org Thu Jan 25 12:21:00 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 12:21:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eegVU-0006bt-Lv; Thu, 25 Jan 2018 12:19:52 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=j/+c=eu=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1eegVU-0006bf-Af
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 12:19:52 +0000
X-Inumbo-ID: 06e5ae92-01ca-11e8-ba59-bc764e045a96
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 06e5ae92-01ca-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 13:19:45 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:Cc:To:From:Date;
 bh=abiy3SZZL/se7vSiD8Q28tirW76hYRm/8pNRp1J9Row=; 
 b=akZ6Qk8l1Mec4uaFi7UK8T466gwrDO5ukb+Sj3joM4WWrRHHz6u7WZAguE/wnOQ3TBJRflqsI17cNLY2CBGYmrlrKGe16MaCSZewAKamcJshDh7YDpX1PzIIQejsoaSpgoQ0quUZSJuiSfQQpPNhqw3NBtP3QtXo42QTe0TlkE9V4jc0Jpyd2hWuvj9kE8O8e9ssZPzB2Ngrj3Aht+mtgIsGWHbUA7/5YVA+MSRY0S1KyAENzLmtmC+N2kyzZs6P2X45u/5GaxwD5iZi1Q8GWZIHZDPQ4dfsxJeeILRqMgoDR/0MlgpkMZ7XkjgluBmPvVxhRxyufFMCuIOs+wxytg==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>)
 id 1eegVR-0007Ry-6J; Thu, 25 Jan 2018 12:19:49 +0000
Date: Thu, 25 Jan 2018 12:19:49 +0000
From: Andy Smith <andy@strugglers.net>
To: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <20180125121949.GG3124@bitfolk.com>
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 12:29:24 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 12:29:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eegeV-0007xI-1U; Thu, 25 Jan 2018 12:29:11 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=5epa=eu=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1eegeT-0007vx-GV
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 12:29:09 +0000
X-Inumbo-ID: 5926dccf-01cb-11e8-b9b1-635ca7ef6cff
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 5926dccf-01cb-11e8-b9b1-635ca7ef6cff;
 Thu, 25 Jan 2018 12:29:12 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id F178DADC8;
 Thu, 25 Jan 2018 12:29:01 +0000 (UTC)
To: Andy Smith <andy@strugglers.net>, Hans van Kranenburg <hans@knorrie.org>
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
 <20180125121949.GG3124@bitfolk.com>
From: Juergen Gross <jgross@suse.com>
Message-ID: <27e5b28d-ef12-23a9-59d9-8570f5e10995@suse.com>
Date: Thu, 25 Jan 2018 13:29:01 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <20180125121949.GG3124@bitfolk.com>
Content-Language: de-DE
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 13:43:54 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 13:43:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eehoB-0006Sv-Ex; Thu, 25 Jan 2018 13:43:15 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=2vme=eu=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eehoA-0006S6-8r
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 13:43:14 +0000
X-Inumbo-ID: b2298701-01d5-11e8-b9b1-635ca7ef6cff
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id b2298701-01d5-11e8-b9b1-635ca7ef6cff;
 Thu, 25 Jan 2018 13:43:16 +0000 (UTC)
Received: from dhcp-81.bofh.hq.mendix.net (unknown
 [IPv6:2001:828:13c8:10b:189:b8bc:99c6:d5])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id E889DCBB5F79;
 Thu, 25 Jan 2018 14:43:05 +0100 (CET)
To: Juergen Gross <jgross@suse.com>, xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
 <17fb2d4f-7759-bbc1-6172-48bc0cb875d2@suse.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <5A69DEE9.5030003@knorrie.org>
Date: Thu, 25 Jan 2018 14:43:05 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:38.0)
 Gecko/20100101 Thunderbird/38.7.0
MIME-Version: 1.0
In-Reply-To: <17fb2d4f-7759-bbc1-6172-48bc0cb875d2@suse.com>
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

T24gMjUvMDEvMjAxOCAxMzowMSwgSnVlcmdlbiBHcm9zcyB3cm90ZToKPiBPbiAyNS8wMS8xOCAx
MjozOSwgSGFucyB2YW4gS3JhbmVuYnVyZyB3cm90ZToKPj4gT24gMDEvMjUvMjAxOCAwNzowMSBB
TSwgSnVlcmdlbiBHcm9zcyB3cm90ZToKPj4+IE9uIDI0LzAxLzE4IDE3OjM3LCBIYW5zIHZhbiBL
cmFuZW5idXJnIHdyb3RlOgo+Pj4+IE9uIDAxLzIzLzIwMTggMDY6NDEgQU0sIEp1ZXJnZW4gR3Jv
c3Mgd3JvdGU6Cj4+Pj4+IE9uIDIzLzAxLzE4IDA1OjQ2LCBBbmR5IFNtaXRoIHdyb3RlOgo+Pj4+
Pj4gSGksCj4+Pj4+Pgo+Pj4+Pj4gV2hhdCBhcmUgdGhlIGN1cnJlbnQgb3B0aW9ucyBmb3IgYm9v
dGluZyBQVkh2MiBndWVzdHMgaW4gWGVuIDQuMTAuMD8KPj4+Pj4+Cj4+Pj4+PiBBcyBmYXIgYXMg
SSBjYW4gc2VlIHRoZXJlIGlzIG9ubHkgZGlyZWN0IGtlcm5lbCBib290aW5nLCBpLmUuCj4+Pj4+
PiBzdXBwbHlpbmcgImtlcm5lbCA9IC9wYXRoL3RvL3ZtbGludXgiLgo+Pj4+Pj4KPj4+Pj4+IElu
IFBWIGxhbmQgdGhlcmUgaXMgcHZncnViIHdoaWNoIGlzIHZlcnkgY29udmVuaWVudCBmb3IgYmVp
bmcgYWJsZQo+Pj4+Pj4gdG8gdXNlIGtlcm5lbCBhbmQgaW5pdHJhbWZzLCBidXQgSSBhbSBub3Qg
c2VlaW5nIHN1cHBvcnQgZm9yIHRoYXQgaW4KPj4+Pj4+IHVwc3RyZWFtIGdydWIyLiBJIHNlZSB0
aGF0IEp1ZXJnZW4gR3Jvc3MgcG9zdCBhIHBhdGNoIHNlcmllcyB0aGF0Cj4+Pj4+PiBjbGFpbXMg
dG8gYWRkIHRoaXMgZmVhdHVyZToKPj4+Pj4+Cj4+Pj4+PiAgICAgPGh0dHBzOi8vbGlzdHMuZ251
Lm9yZy9hcmNoaXZlL2h0bWwvZ3J1Yi1kZXZlbC8yMDE3LTExL21zZzAwMDU0Lmh0bWw+Cj4+Pj4+
Pgo+Pj4+Pj4g4oCmYnV0IHRoaXMgZG9lc24ndCBzZWVtIHRvIGhhdmUgYmVlbiBhcHBsaWVkIHll
dC4gSXMgaXQgYW4gb25nb2luZwo+Pj4+Pj4gaWRlYSBvciBoYXMgdGhhdCBtZXRob2QgYmVlbiBh
YmFuZG9uZWQ/Cj4+Pj4+Cj4+Pj4+IFN0aWxsIHdhaXRpbmcgZm9yIHJldmlldy4KPj4+Pgo+Pj4+
IFNpbmNlIEkgd2FudGVkIHRvIHRyeSB0byB0ZXN0IHRoaXMsIEkgc2NyYXBlZCB0aGUgcGF0Y2hl
cyBvZmYgdGhlCj4+Pj4gZ3J1Yi1kZXZlbCBsaXN0IGFuZCBkaWQgdGhlIGZvbGxvd2luZzoKPj4+
Pgo+Pj4+IDEuIGNsb25lIGh0dHBzOi8vZ2l0LnNhdmFubmFoLmdudS5vcmcvZ2l0L2dydWIuZ2l0
Cj4+Pj4gMi4gYXBwbHkgcGF0Y2hlcyBvbiB0b3Agb2YgbWFzdGVyLCBwbHVzIGFuIGV4dHJhIG9u
ZSB3aXRoIGEgcHV6emxlIHBpZWNlCj4+Pj4gdG8gbWFrZSBpdCBhY3R1YWxseSBjb21waWxlIChz
ZWUgYXR0YWNobWVudCkKPj4+Pgo+Pj4+IDMuIGJ1aWxkOgo+Pj4+IC4vYXV0b2dlbi5zaAo+Pj4+
IC4vY29uZmlndXJlIC0tdGFyZ2V0PWkzODYgLS13aXRoLXBsYXRmb3JtPXhlbnB2aAo+Pj4+IG1h
a2UKPj4+Pgo+Pj4+IDQuIHVzZSBta3N0YW5kYWxvbmUgdG8gY3JlYXRlIGEgZ3J1YiBpbWFnZSB0
byBib290Cj4+Pj4gLi9ncnViLW1rc3RhbmRhbG9uZSAtZCBncnViLWNvcmUgLS1sb2NhbGUtZGly
ZWN0b3J5PS8gLW8KPj4+PiB+L2dydWItaTM4Ni14ZW5wdmgtZmlyZS16ZS1taXNzaWxlIC1PIGkz
ODYteGVucHZoCj4+Pj4gfi9idWlsZC9wdmdydWIyL3B2Z3J1YjIveHZkYS1maXJlLXplLW1pc3Np
bGUuY2ZnCj4+Pj4KPj4+PiBjb250ZW50cyBvZiB0aGUgY29uZmlnIGZpbGUgdGhhdCBJIHdhbnQg
dG8gaGF2ZSBpbnNlcnRlZCBpbnRvIGl0IChzYW1lCj4+Pj4gZmlsZSBJIHVzZSBmb3IgYm9vdGlu
ZyBQViBub3cpOgo+Pj4+Cj4+Pj4gcm9vdD0nKHhlbi94dmRhKScKPj4+PiBpbnNtb2QgeHppbwo+
Pj4+IGluc21vZCBnemlvCj4+Pj4gaW5zbW9kIGJ0cmZzCj4+Pj4gaW5zbW9kIGV4dDIKPj4+PiBl
Y2hvICdMb2FkaW5nIExpbnV4IC4uLicKPj4+PiBsaW51eCAvdm1saW51eiByb290PS9kZXYveHZk
YSBybyBlbGV2YXRvcj1ub29wCj4+Pj4gZWNobyAnTG9hZGluZyBpbml0aWFsIHJhbWRpc2sgLi4u
Jwo+Pj4+IGluaXRyZCAvaW5pdHJkLmltZwo+Pj4+IGJvb3QKPj4+Pgo+Pj4+IDUuIFRyeSB0byB1
c2UgaXQgYWxyZWFkeSwgdG8gc2VlIHdoYXQgaGFwcGVucy4gKFhlbiA0LjEwLjApCj4+Pj4KPj4+
PiAtIyBjYXQgeW9sby1wdmdydWIyCj4+Pj4KPj4+PiB0eXBlPSJwdmgiCj4+Pj4ga2VybmVsID0g
Ii95b2xvL2dydWItaTM4Ni14ZW5wdmgtZmlyZS16ZS1taXNzaWxlIgo+Pj4+IG5hbWUgPSAieW9s
by1wdmdydWIyIgo+Pj4+IG1lbW9yeSA9IDEwMjQKPj4+PiB2Y3B1cyA9IDEwCj4+Pj4gdmlmID0g
Wwo+Pj4+ICAgICAibWFjPTAyOjAwOjBhOjhjOmQ5OjBkLGJyaWRnZT1vdnMwLjIxNyIsCj4+Pj4g
XQo+Pj4+IGRpc2sgPSBbCj4+Pj4gICAgICcvZGV2L3Rlc3QveW9sbyxyYXcseHZkYSxydycsCj4+
Pj4gXQo+Pj4+Cj4+Pj4gLSMgeGVuIGNyZWF0ZSAtYyB5b2xvLXB2Z3J1YjIKPj4+PiBQYXJzaW5n
IGNvbmZpZyBmcm9tIHlvbG8tcHZncnViMgo+Pj4+IGxpYnhsOiBpbmZvOiBsaWJ4bF9jcmVhdGUu
YzoxMDk6bGlieGxfX2RvbWFpbl9idWlsZF9pbmZvX3NldGRlZmF1bHQ6Cj4+Pj4gcWVtdS14ZW4g
aXMgdW5hdmFpbGFibGUsIHVzaW5nIHFlbXUteGVuLXRyYWRpdGlvbmFsIGluc3RlYWQ6IE5vIHN1
Y2gKPj4+PiBmaWxlIG9yIGRpcmVjdG9yeQo+Pj4+IFMzIGRpc2FibGVkCj4+Pj4gUzQgZGlzYWJs
ZWQKPj4+PiBDT05WIGRpc2FibGVkCj4+Pj4KPj4+PiAgICAgICAgICAgICAgICAgICAgICBHTlUg
R1JVQiAgdmVyc2lvbiAyLjAzCj4+Pj4KPj4+PiAgICBNaW5pbWFsIEJBU0gtbGlrZSBsaW5lIGVk
aXRpbmcgaXMgc3VwcG9ydGVkLiBGb3IgdGhlIGZpcnN0IHdvcmQsIFRBQgo+Pj4+ICAgIGxpc3Rz
IHBvc3NpYmxlIGNvbW1hbmQgY29tcGxldGlvbnMuIEFueXdoZXJlIGVsc2UgVEFCIGxpc3RzIHBv
c3NpYmxlCj4+Pj4gICAgZGV2aWNlIG9yIGZpbGUgY29tcGxldGlvbnMuCj4+Pj4KPj4+Pgo+Pj4+
IGdydWI+Cj4+Pj4KPj4+PiBPaywgc28gZm9yIHNvbWUgcmVhc29uIGl0IHNlZW1zIHRvIGlnbm9y
ZSB0aGUgY29uZmlnPyBCdXQgSSBjYW4gdHlwZQo+Pj4+IHRoaW5ncyBtYW51YWxseToKPj4+Pgo+
Pj4+IGdydWI+IGluc21vZCB4emlvCj4+Pj4gZ3J1Yj4gaW5zbW9kIGd6aW8KPj4+PiBncnViPiBp
bnNtb2QgYnRyZnMKPj4+PiBncnViPiBpbnNtb2QgZXh0Mgo+Pj4+IGdydWI+IHNlYXJjaC5maWxl
IC92bWxpbnV6Cj4+Pj4gIHhlbi94dmRhCj4+Pj4KPj4+PiBPaywgc28gaXQgY2FuIHNlZSB0aGUg
ZGlzayBhbmQgZmluZSB0aGUgc3ltbGluayB0byB0aGUga2VybmVsIGltYWdlLiBOb3cKPj4+PiBs
ZXQncyB0cnkgdGhlIHJlc3Qgb2YgaXQ6Cj4+Pj4KPj4+PiBncnViPiByb290PScoeGVuL3h2ZGEp
Jwo+Pj4+IGdydWI+IGxpbnV4IC92bWxpbnV6IHJvb3Q9L2Rldi94dmRhIHJvIGVsZXZhdG9yPW5v
b3AKPj4+PiBncnViPiBpbml0cmQgL2luaXRyZC5pbWcKPj4+PiBncnViPiBib290Cj4+Pj4KPj4+
PiBBbmQgbm93IGl0IGp1c3QgaGFuZ3MsIG5vIG91dHB1dCBhbnkgbW9yZS4KPj4+Pgo+Pj4+IDYu
IEFwcGx5IGxpbnV4IHBhdGNoZXMgdG8gdGhlIGRvbVUga2VybmVsIGFuZCBYZW4KPj4+Pgo+Pj4+
IGRvbVUgTGludXgga2VybmVsOgo+Pj4+IC0gQnJhbmNoIG9mZiBmcm9tIGxpbnV4IDQuMTQuMTQK
Pj4+PiAtIGFkZCBodHRwczovL2dpdC5rZXJuZWwub3JnL3B1Yi9zY20vbGludXgva2VybmVsL2dp
dC90aXAvdGlwLmdpdCBhcwo+Pj4+IHJlbW90ZSBhbmQgY2hlcnJ5LXBpY2sgdGhlIDQgcGF0Y2hl
cyBtZW50aW9uZWQgaW4KPj4+PiAgIGh0dHBzOi8vbGlzdHMuZ251Lm9yZy9hcmNoaXZlL2h0bWwv
Z3J1Yi1kZXZlbC8yMDE3LTEyL21zZzAwMDE3Lmh0bWwKPj4+Pgo+Pj4+IFhlbjogcGljayB0aGlz
IG9uZSBvbiB0b3Agb2YgNC4xMC4wOgo+Pj4+ICBodHRwczovL2xpc3RzLnhlbi5vcmcvYXJjaGl2
ZXMvaHRtbC94ZW4tZGV2ZWwvMjAxNy0xMS9tc2cwMTgwNy5odG1sCj4+Pj4gIDRhNTczMzc3MWU2
ZjMzOTE4ZWJhMDdiNTg0Y2NjY2U1NjRhNjdhYzEKPj4+Pgo+Pj4+IDcuIFRlc3QgYWdhaW4gYWZ0
ZXIgZG9tMCByZWJvb3QgaW50byB0aGUgbmV3IHhlbiBhbmQgcHV0IHRoZSBuZXcgZG9tVQo+Pj4+
IGtlcm5lbCBvbiBpdC4KPj4+PiAgLT4gc2FtZSByZXN1bHQ6IGdydWIgY29tbWFuZCBwcm9tcHQs
IGFuZCBubyBhY3Rpdml0eSBhZnRlciAnYm9vdCcuCj4+Pj4KPj4+PiBFeHRyYSB0aGluZ3M6Cj4+
Pj4KPj4+PiA4LiBTdGFydCBkb21VIGFmdGVyIGNvcHlpbmcga2VybmVsL2luaXRyZCB0byB0aGUg
ZG9tMDoKPj4+Pgo+Pj4+IHR5cGU9InB2aCIKPj4+PiBrZXJuZWwgPSAiL3lvbG8vdm1saW51ei00
LjE0LjE0LXlvbG8iCj4+Pj4gcmFtZGlzayA9ICIveW9sby9pbml0cmQuaW1nLTQuMTQuMTQteW9s
byIKPj4+PiByb290ID0gIi9kZXYveHZkYSBybyBlbGV2YXRvcj1ub29wIGNvbnNvbGU9aHZjMCIK
Pj4+Pgo+Pj4+IFRoaXMgYm9vdHMsIGRtZXNnOiBodHRwOi8vcGFzdGUuZGViaWFuLm5ldC9wbGFp
bmgvNzEyMGNlZjIKPj4+Pgo+Pj4+IDkuIEp1c3QgZm9yIGZ1biwgc3RhcnQgZG9tVSB3aXRoIHBy
ZXZpb3VzIGtlcm5lbC9pbml0cmQgd2l0aG91dCB0aGUgcGF0Y2hlczoKPj4+Pgo+Pj4+IHR5cGU9
InB2aCIKPj4+PiBrZXJuZWwgPSAiL3lvbG8vdm1saW51ei00LjE0LjAtMy1hbWQ2NCIKPj4+PiBy
YW1kaXNrID0gIi95b2xvL2luaXRyZC5pbWctNC4xNC4wLTMtYW1kNjQiCj4+Pj4gcm9vdCA9ICIv
ZGV2L3h2ZGEgcm8gZWxldmF0b3I9bm9vcCBjb25zb2xlPWh2YzAiCj4+Pj4KPj4+PiBUaGlzIGJv
b3RzIGFuZCBoYXMgMSB2Y3B1IGFuZCBubyBBQ1BJIGxpbmVzIGluIGRtZXNnLCB3aGljaCBpcyBl
eHBlY3RlZAo+Pj4+IGJyZWFrYWdlLCBJIGJlbGlldmUsIHJlYWRpbmcgeGVuLWRldmVsLgo+Pj4+
Cj4+Pj4gU28sIHdoYXQgYW0gSSBtaXNzaW5nPwo+Pj4KPj4+IEkgdXNlZCB0aGUgYXR0YWNoZWQg
c2NyaXB0IHRvIGJ1aWxkIGl0IChkZXJpdmVkIGZyb20gdGhlIHB2Z3J1YiBidWlsZAo+Pj4gc2Ny
aXB0IHVzZWQgaW4gU1VTRSdzIGdydWIteGVuIFJQTSkuCj4+Cj4+IFRoYW5rcy4gVGhpcyBnZXRz
IG1lIGEgc3RlcCBmdXJ0aGVyLgo+Pgo+PiBVc2luZyB0aGUgImdyYWZ0IHBvaW50IHN5bnRheCIg
dGhpbmdpZQo+PiAoIi9ib290L2dydWIvZ3J1Yi5jZmc9Li9ncnViLmNmZyIpIGhlbHBlZCBnZXR0
aW5nIHRoZSBjb25maWcgYWN0dWFsbHkKPj4gZXhlY3V0ZWQgaW5zdGVhZCBvZiBnZXR0aW5nIHRo
ZSBwcm9tcHQuCj4+Cj4+IE5leHQgSSBnb3Q6Cj4+Cj4+IFdlbGNvbWUgdG8gR1JVQiEKPj4KPj4g
TG9hZGluZyBMaW51eCAuLi4KPj4gTG9hZGluZyBpbml0aWFsIHJhbWRpc2sgLi4uCj4+Cj4+IC4u
LmFuZCB0aGVuIGl0IHN0b3BzLgo+Pgo+PiBTbyBJIG1vZGlmaWVkIG15IGdydWIgY29uZmlnIGEg
Yml0IGZyb20gdGhlIG9uZSBzaG93biBhYm92ZSwgYWRkaW5nCj4+IGV4cGxpY2l0IGNvbnNvbGU9
aHZjMDoKPj4KPj4gcm9vdD0nKHhlbi94dmRhKScKPj4gaW5zbW9kIHh6aW8KPj4gaW5zbW9kIGd6
aW8KPj4gaW5zbW9kIGJ0cmZzCj4+IGluc21vZCBleHQyCj4+IGVjaG8gJ0xvYWRpbmcgTGludXgg
Li4uJwo+PiBsaW51eCAvdm1saW51eiByb290PS9kZXYveHZkYSBybyBlbGV2YXRvcj1ub29wIGNv
bnNvbGU9aHZjMAo+PiBlY2hvICdMb2FkaW5nIGluaXRpYWwgcmFtZGlzayAuLi4nCj4+IGluaXRy
ZCAvaW5pdHJkLmltZwo+PiBlY2hvICdUaGVyZSB3ZSBnbyEgLi4uJwo+PiBib290Cj4+Cj4+IEFu
ZCBub3cgSSBnZXQgY29uc29sZSBvdXRwdXQgYW5kIHRoaW5ncyBoYXBwZW4uIE9ubHkgaXQgY2Fu
J3QgZmluZCB0aGUgZGlzay4KPj4KPj4gWy4uLl0KPj4gQmVnaW46IFJ1bm5pbmcgL3NjcmlwdHMv
bG9jYWwtYmxvY2sgLi4uIGRvbmUuCj4+IEJlZ2luOiBSdW5uaW5nIC9zY3JpcHRzL2xvY2FsLWJs
b2NrIC4uLiBkb25lLgo+PiBkb25lLgo+PiBHYXZlIHVwIHdhaXRpbmcgZm9yIHJvb3QgZmlsZSBz
eXN0ZW0gZGV2aWNlLiAgQ29tbW9uIHByb2JsZW1zOgo+PiAgLSBCb290IGFyZ3MgKGNhdCAvcHJv
Yy9jbWRsaW5lKQo+PiAgICAtIENoZWNrIHJvb3RkZWxheT0gKGRpZCB0aGUgc3lzdGVtIHdhaXQg
bG9uZyBlbm91Z2g/KQo+PiAgLSBNaXNzaW5nIG1vZHVsZXMgKGNhdCAvcHJvYy9tb2R1bGVzOyBs
cyAvZGV2KQo+PiBBTEVSVCEgIC9kZXYveHZkYSBkb2VzIG5vdCBleGlzdC4gIERyb3BwaW5nIHRv
IGEgc2hlbGwhCj4+IChpbml0cmFtZnMpCj4+Cj4+IEZ1bGwgbG9nIGF0IGh0dHA6Ly9wYXN0ZS5k
ZWJpYW4ubmV0L3BsYWluaC80MjZiZWQ2MAo+Pgo+PiBOb3cgSSBoYXZlIHRvIGZpbmQgb3V0IHdo
eSdzIHRoYXQuIEJ1dCBmaXJzdCB0aW1lIGZvciBsdW5jaC4gOykKPiAKPiBNaXNzaW5nIHhlbi1i
bGtmcm9udCBkcml2ZXIgaW4gaW5pdHJkPwoKRXhhY3RseSB0aGUgc2FtZSBrZXJuZWwvaW5pdHJk
IGJvb3RzIHN1Y2Nlc3NmdWxseSB3aGVuIGRpcmVjdGx5IGxvYWRpbmcKdGhlbSBmcm9tIGRvbTAg
d2l0aG91dCBncnViIGluIGJldHdlZW4sIHNlZSBib290IG91dHB1dCBJIHBhc3RlYmlubmVkCmVh
cmxpZXIuCgpLCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
XwpYZW4tdXNlcnMgbWFpbGluZyBsaXN0Clhlbi11c2Vyc0BsaXN0cy54ZW5wcm9qZWN0Lm9yZwpo
dHRwczovL2xpc3RzLnhlbnByb2plY3Qub3JnL21haWxtYW4vbGlzdGluZm8veGVuLXVzZXJz

From xen-users-bounces@lists.xenproject.org Thu Jan 25 13:46:41 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 13:46:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eehrP-0006kn-Ci; Thu, 25 Jan 2018 13:46:35 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=2vme=eu=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eehrO-0006kF-Do
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 13:46:34 +0000
X-Inumbo-ID: 2a437cd4-01d6-11e8-b9b1-635ca7ef6cff
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 2a437cd4-01d6-11e8-b9b1-635ca7ef6cff;
 Thu, 25 Jan 2018 13:46:38 +0000 (UTC)
Received: from dhcp-81.bofh.hq.mendix.net (unknown
 [IPv6:2001:828:13c8:10b:189:b8bc:99c6:d5])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 9935BCBB764F;
 Thu, 25 Jan 2018 14:46:27 +0100 (CET)
To: Juergen Gross <jgross@suse.com>, Andy Smith <andy@strugglers.net>
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
 <20180125121949.GG3124@bitfolk.com>
 <27e5b28d-ef12-23a9-59d9-8570f5e10995@suse.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <5A69DFB3.7040906@knorrie.org>
Date: Thu, 25 Jan 2018 14:46:27 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:38.0)
 Gecko/20100101 Thunderbird/38.7.0
MIME-Version: 1.0
In-Reply-To: <27e5b28d-ef12-23a9-59d9-8570f5e10995@suse.com>
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

T24gMjUvMDEvMjAxOCAxMzoyOSwgSnVlcmdlbiBHcm9zcyB3cm90ZToKPiBPbiAyNS8wMS8xOCAx
MzoxOSwgQW5keSBTbWl0aCB3cm90ZToKPj4gSGkgSGFucywKPj4KPj4gT24gVGh1LCBKYW4gMjUs
IDIwMTggYXQgMTI6Mzk6NTZQTSArMDEwMCwgSGFucyB2YW4gS3JhbmVuYnVyZyB3cm90ZToKPj4+
IEFuZCBub3cgSSBnZXQgY29uc29sZSBvdXRwdXQgYW5kIHRoaW5ncyBoYXBwZW4uIE9ubHkgaXQg
Y2FuJ3QgZmluZCB0aGUgZGlzay4KPj4KPj4gSSB3YXMgdHJ5aW5nIHNpbWlsYXIgdGhpbmcgKDQu
MTAgYW5kIFBWSCkgYW5kIGFsc28gZW5kZWQgdXAgd2l0aCBhCj4+IGd1ZXN0IHdpdGggbm8gYmxv
Y2sgZGV2aWNlcy4gSSByZXBvcnRlZCB0aGlzIG9uIGdydWItZGV2ZWw6Cj4+Cj4+ICAgICA8aHR0
cDovL2xpc3RzLmdudS5vcmcvYXJjaGl2ZS9odG1sL2dydWItZGV2ZWwvMjAxOC0wMS9tc2cwMDAx
OC5odG1sPgo+Pgo+PiBhcyBJIHdhcyB0aGlua2luZyB0aGlzIHdhcyBub3QgYSBYZW4gcHJvYmxl
bSBzaW5jZSBzYW1lIHRoaW5nIGJvb3RzCj4+IG9rYXkgb3V0c2lkZSBncnViIHdpdGggZGlyZWN0
IGtlcm5lbCBib290Lgo+Pgo+PiBKdWVyZ2VuIGRpZCByZXBseSBhbmQgc2FpZCBJIG5lZWRlZCB0
aGlzIGtlcm5lbCBwYXRjaCBpbiB0aGUgZ3Vlc3Q6Cj4+Cj4+ICAgICA8aHR0cHM6Ly9saXN0cy54
ZW4ub3JnL2FyY2hpdmVzL2h0bWwveGVuLWRldmVsLzIwMTctMTEvbXNnMDE2ODEuaHRtbD4KPj4K
Pj4gQnV0IEkgdGhpbmsgeW91IGhhdmUgdGhpcyBkb24ndCB5b3U/CgpZZXMsIHNlZSBteSBlYXJs
aWVyIG1haWwgd2l0aCBhbGwgdGhlIHN0ZXBzIHRoYXQgSSBkaWQsIHN0ZXAgNi4KCj4gQXMgdGhl
IEFDUEkgdGFibGVzIGFyZSBmb3VuZCwgSSdkIHNheSB5ZXMuIDotKQoKZG1lc2cgb3V0cHV0IGlz
IHByZXR0eSBkaWZmZXJlbnQgd2hlbiBJIGJvb3QgZGlyZWN0bHkgd2l0aCB0aGUga2VybmVsCmFu
ZCBpbml0cmQgY29waWVkIG9uIHRoZSBkb20wLgoKUmVtZW1iZXIsIGl0J3MgdGhlIHNhbWUga2Vy
bmVsL2luaXRyZCwgYW5kIHdpdGhvdXQgZ3J1YiBpbiBiZXR3ZWVuIGl0CmJvb3RzIHdpdGggYWxs
IHZjcHVzIG5ldHdvcmsgYW5kIGRpc2suCgpXaXRoIGdydWIgaW4gYmV0d2VlbiwgdGhpcyBhdCBs
ZWFzdCBkb2VzIGxvb2sgc3VzcGljaW91czoKClsgICAgMC4wMzIxMTBdIFBDSTogU3lzdGVtIGRv
ZXMgbm90IHN1cHBvcnQgUENJCgpBbmQgeWVzLCB0aGVyZSBhcmUgYWxzbyBubyBzdWNjZXNzZnVs
IG5ldGZyb250IGxpbmVzLgoKV2l0aG91dCBncnViOiBodHRwOi8vcGFzdGUuZGViaWFuLm5ldC9w
bGFpbmgvNzEyMGNlZjIKV2l0aCBncnViOiBodHRwOi8vcGFzdGUuZGViaWFuLm5ldC9wbGFpbmgv
NDI2YmVkNjAKCksKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fClhlbi11c2VycyBtYWlsaW5nIGxpc3QKWGVuLXVzZXJzQGxpc3RzLnhlbnByb2plY3Qub3Jn
Cmh0dHBzOi8vbGlzdHMueGVucHJvamVjdC5vcmcvbWFpbG1hbi9saXN0aW5mby94ZW4tdXNlcnM=

From xen-users-bounces@lists.xenproject.org Thu Jan 25 14:13:10 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 14:13:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeiGp-0001W7-Bb; Thu, 25 Jan 2018 14:12:51 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=2vme=eu=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eeiGp-0001W1-1n
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 14:12:51 +0000
X-Inumbo-ID: d5df6e9a-01d9-11e8-b9b1-635ca7ef6cff
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id d5df6e9a-01d9-11e8-b9b1-635ca7ef6cff;
 Thu, 25 Jan 2018 14:12:54 +0000 (UTC)
Received: from [IPv6:2001:828:13c8:10b::c] (blackbox.bofh.hq.mendix.net
 [IPv6:2001:828:13c8:10b::c])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 15462CBC8FDC;
 Thu, 25 Jan 2018 15:12:44 +0100 (CET)
From: Hans van Kranenburg <hans@knorrie.org>
To: Juergen Gross <jgross@suse.com>, Andy Smith <andy@strugglers.net>
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
 <20180125121949.GG3124@bitfolk.com>
 <27e5b28d-ef12-23a9-59d9-8570f5e10995@suse.com>
 <5A69DFB3.7040906@knorrie.org>
Message-ID: <75b57959-333a-59f5-c5b9-d71a39717c86@knorrie.org>
Date: Thu, 25 Jan 2018 15:12:43 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <5A69DFB3.7040906@knorrie.org>
Content-Language: en_US
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 14:31:45 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 14:31:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeiYn-0003ja-1P; Thu, 25 Jan 2018 14:31:25 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=5epa=eu=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1eeiYm-0003jC-En
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 14:31:24 +0000
X-Inumbo-ID: 6d64567f-01dc-11e8-b9b1-635ca7ef6cff
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 6d64567f-01dc-11e8-b9b1-635ca7ef6cff;
 Thu, 25 Jan 2018 14:31:27 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id EA9A0AE48;
 Thu, 25 Jan 2018 14:31:15 +0000 (UTC)
To: Hans van Kranenburg <hans@knorrie.org>, Andy Smith <andy@strugglers.net>
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
 <20180125121949.GG3124@bitfolk.com>
 <27e5b28d-ef12-23a9-59d9-8570f5e10995@suse.com>
 <5A69DFB3.7040906@knorrie.org>
 <75b57959-333a-59f5-c5b9-d71a39717c86@knorrie.org>
From: Juergen Gross <jgross@suse.com>
Message-ID: <8b110405-38f2-f3bd-52af-7e662e930641@suse.com>
Date: Thu, 25 Jan 2018 15:31:15 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <75b57959-333a-59f5-c5b9-d71a39717c86@knorrie.org>
Content-Language: de-DE
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 14:40:12 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 14:40:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeih8-0004fG-A7; Thu, 25 Jan 2018 14:40:02 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=2vme=eu=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eeih6-0004aJ-KJ
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 14:40:00 +0000
X-Inumbo-ID: a0e106c9-01dd-11e8-b9b1-635ca7ef6cff
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id a0e106c9-01dd-11e8-b9b1-635ca7ef6cff;
 Thu, 25 Jan 2018 14:40:03 +0000 (UTC)
Received: from [IPv6:2001:828:13c8:10b::c] (blackbox.bofh.hq.mendix.net
 [IPv6:2001:828:13c8:10b::c])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 21672CBDBB71;
 Thu, 25 Jan 2018 15:39:53 +0100 (CET)
To: Juergen Gross <jgross@suse.com>, Andy Smith <andy@strugglers.net>
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
 <20180125121949.GG3124@bitfolk.com>
 <27e5b28d-ef12-23a9-59d9-8570f5e10995@suse.com>
 <5A69DFB3.7040906@knorrie.org>
 <75b57959-333a-59f5-c5b9-d71a39717c86@knorrie.org>
 <8b110405-38f2-f3bd-52af-7e662e930641@suse.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <3f99b271-c0ae-9b08-ee5c-4ce2715a4680@knorrie.org>
Date: Thu, 25 Jan 2018 15:39:52 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <8b110405-38f2-f3bd-52af-7e662e930641@suse.com>
Content-Language: en_US
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 14:46:21 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 14:46:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeimn-0005cz-MI; Thu, 25 Jan 2018 14:45:53 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=2vme=eu=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eeiml-0005c5-Ul
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 14:45:51 +0000
X-Inumbo-ID: 6bae0cac-01de-11e8-ba59-bc764e045a96
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 6bae0cac-01de-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 15:45:44 +0100 (CET)
Received: from [IPv6:2001:828:13c8:10b::c] (blackbox.bofh.hq.mendix.net
 [IPv6:2001:828:13c8:10b::c])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 70FB9CBE0653;
 Thu, 25 Jan 2018 15:45:48 +0100 (CET)
To: Juergen Gross <jgross@suse.com>, xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <79132caf-18db-d141-c912-56f5eb1b8b7f@knorrie.org>
Date: Thu, 25 Jan 2018 15:45:48 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
Content-Language: en_US
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 14:46:49 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 14:46:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeind-0005jY-5Q; Thu, 25 Jan 2018 14:46:45 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=5epa=eu=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1eeinc-0005jO-8r
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 14:46:44 +0000
X-Inumbo-ID: 8b06f78c-01de-11e8-ba59-bc764e045a96
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 8b06f78c-01de-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 15:46:36 +0100 (CET)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id 7D46BAE6C;
 Thu, 25 Jan 2018 14:46:40 +0000 (UTC)
To: Hans van Kranenburg <hans@knorrie.org>, Andy Smith <andy@strugglers.net>
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <b4df5a27-b179-b5e8-3044-c9dc45cfa9c4@knorrie.org>
 <20180125121949.GG3124@bitfolk.com>
 <27e5b28d-ef12-23a9-59d9-8570f5e10995@suse.com>
 <5A69DFB3.7040906@knorrie.org>
 <75b57959-333a-59f5-c5b9-d71a39717c86@knorrie.org>
 <8b110405-38f2-f3bd-52af-7e662e930641@suse.com>
 <3f99b271-c0ae-9b08-ee5c-4ce2715a4680@knorrie.org>
From: Juergen Gross <jgross@suse.com>
Message-ID: <0da18d0b-25fd-16e3-ab2c-7360838015d0@suse.com>
Date: Thu, 25 Jan 2018 15:46:40 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <3f99b271-c0ae-9b08-ee5c-4ce2715a4680@knorrie.org>
Content-Language: de-DE
Cc: xen-users@lists.xenproject.org
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 14:54:27 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 14:54:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eeiur-0007GY-Ci; Thu, 25 Jan 2018 14:54:13 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=5epa=eu=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1eeiuq-0007GS-7P
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 14:54:12 +0000
X-Inumbo-ID: 961074e6-01df-11e8-ba59-bc764e045a96
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 961074e6-01df-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 15:54:04 +0100 (CET)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id A8D91AD51;
 Thu, 25 Jan 2018 14:54:08 +0000 (UTC)
To: Hans van Kranenburg <hans@knorrie.org>, xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <79132caf-18db-d141-c912-56f5eb1b8b7f@knorrie.org>
From: Juergen Gross <jgross@suse.com>
Message-ID: <4c254a66-8c7c-1154-4963-91406a9b2c9f@suse.com>
Date: Thu, 25 Jan 2018 15:53:50 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <79132caf-18db-d141-c912-56f5eb1b8b7f@knorrie.org>
Content-Language: de-DE
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 15:10:20 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 15:10:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eejAA-0000mE-0z; Thu, 25 Jan 2018 15:10:02 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=2vme=eu=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1eejA7-0000lC-Uv
 for xen-users@lists.xenproject.org; Thu, 25 Jan 2018 15:09:59 +0000
X-Inumbo-ID: ca916150-01e1-11e8-ba59-bc764e045a96
Received: from syrinx.knorrie.org (unknown [2001:888:2177::4d])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id ca916150-01e1-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 16:09:52 +0100 (CET)
Received: from [IPv6:2001:828:13c8:10b::c] (blackbox.bofh.hq.mendix.net
 [IPv6:2001:828:13c8:10b::c])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 216ABCBF10B3;
 Thu, 25 Jan 2018 16:09:56 +0100 (CET)
To: Juergen Gross <jgross@suse.com>, xen-users@lists.xenproject.org
References: <20180123044635.GB3124@bitfolk.com>
 <a705ecf5-2428-49fd-8a9b-9c1cf24f4397@suse.com>
 <989436f9-c44e-30d1-aded-1d2e702ed419@knorrie.org>
 <674fdb54-0fb0-ba85-e919-c3f6ebe55ad2@suse.com>
 <79132caf-18db-d141-c912-56f5eb1b8b7f@knorrie.org>
 <4c254a66-8c7c-1154-4963-91406a9b2c9f@suse.com>
From: Hans van Kranenburg <hans@knorrie.org>
Message-ID: <a44e1269-ce0d-4baf-a2c1-e4904a45b60d@knorrie.org>
Date: Thu, 25 Jan 2018 16:09:55 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <4c254a66-8c7c-1154-4963-91406a9b2c9f@suse.com>
Content-Language: en_US
Subject: Re: [Xen-users] pvgrub2(-like?) booting methods for PVHv2 guests
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jan 25 15:23:15 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jan 2018 15:23:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eejMd-0002ev-MU; Thu, 25 Jan 2018 15:22:55 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=s+h0=eu=gmail.com=dunlapg@srs-us1.protection.inumbo.net>)
 id 1eeelW-0002ss-OS
 for xen-users@lists.xen.org; Thu, 25 Jan 2018 10:28:18 +0000
X-Inumbo-ID: 71685595-01ba-11e8-ba59-bc764e045a96
Received: from mail-qt0-x233.google.com (unknown [2607:f8b0:400d:c0d::233])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 71685595-01ba-11e8-ba59-bc764e045a96;
 Thu, 25 Jan 2018 11:28:11 +0100 (CET)
Received: by mail-qt0-x233.google.com with SMTP id z10so17923329qti.5
 for <xen-users@lists.xen.org>; Thu, 25 Jan 2018 02:28:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:sender:in-reply-to:references:from:date:message-id
 :subject:to:cc:content-transfer-encoding;
 bh=EUP6xWf9sjemvsDV8lHQ+RTv5BzUun2NGYRa3mCIdns=;
 b=YNQ6ZzwHpIE/CxFiwX+jYOOxQNLGPKA/LvecOqllwHnhhpR48o2DdJpbEtAD39dMxX
 Qdwq9OwuDTrYT1JBXU9kSSZBWv+CrZKqGxwP9ak+O07XLqzAVMz38Ws7XrjQR163KTR3
 RPR9XNlsu7KN0o+ksE71uaR1YAwcLp7bl/oyX0PPFtJ0lA8x6SPCRSPFedCsCtQ2vLeD
 65QMjhv20DUR4ZbLs3MupH1d+vXfx1MtUnwKyy2z6Fur5zZ9Kvc7KJ2lSjmpw/M6FM+b
 6ZGOrO7jyw0qRfINPBumOeRlgjjE3b8bigt4cgcSSKyL6zFUjmGlhKKBiaRRq57bpbQL
 URLA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
 :date:message-id:subject:to:cc:content-transfer-encoding;
 bh=EUP6xWf9sjemvsDV8lHQ+RTv5BzUun2NGYRa3mCIdns=;
 b=VdA4hhlbJxVE2Xqhzx5djHi1mRDdgqUPRpQnNno2EBqaKKdvRZA7Dg2ja+eJy5riZF
 Kfu/6vgIkMuYOcceZ6o9YFRLq42WrAaojkcFSj62eEFqEF8vbfP2qW0TJAziBJ4V68I2
 39zX2Tg1YgdS9DJNy85QFGe3ga0488TmhD6R3R6ovF2AYAAHfL4RzhXT0bwMR9cgZV+Y
 C5TQ3xw+svfIPg4IcmzwSp/iUGSp52rVyP0u1a7XiGI0pOM115OETCqExEQmzRy3JYLk
 nDxIcc+VGyLbx0kAe5dczcXpvYjtmzcDPQHJqoWWTY8k0dzWMi+t/63+o5NTTrC69LdU
 72Tw==
X-Gm-Message-State: AKwxytc001bConVnQmecepzzn/DLqttHke6gecbyIYQ5J5VJlqULGY8E
 dN+WpveHPQZAneRlObKmOBt/xRgUQawK7exU8Kw=
X-Google-Smtp-Source: AH8x227ZGjzFFdWY7XvN/unV8j0MM3ks6ulFLekiccJxecRqHJrV3wWEMycCVi3Xo3KZ8PT7yBCkyzMysNlRHFkLzQg=
X-Received: by 10.55.110.194 with SMTP id j185mr13598417qkc.327.1516876095473; 
 Thu, 25 Jan 2018 02:28:15 -0800 (PST)
MIME-Version: 1.0
Received: by 10.55.169.149 with HTTP; Thu, 25 Jan 2018 02:28:14 -0800 (PST)
In-Reply-To: <e448ae30-b6fc-1871-a168-89e804113b19@alstadheim.priv.no>
References: <e448ae30-b6fc-1871-a168-89e804113b19@alstadheim.priv.no>
From: George Dunlap <dunlapg@umich.edu>
Date: Thu, 25 Jan 2018 10:28:14 +0000
X-Google-Sender-Auth: 6GHpIA12gOoUvCKy3MWAEdEjcq8
Message-ID: <CAFLBxZb4feAU79Y1xyryfZcmpsidJ9sbn4yfro+2kdVwt0fCcQ@mail.gmail.com>
To: =?UTF-8?Q?H=C3=A5kon_Alstadheim?= <hakon@alstadheim.priv.no>
Bcc: xen-users@lists.xen.org
X-Mailman-Approved-At: Thu, 25 Jan 2018 15:22:54 +0000
Cc: Anthony Perard <anthony.perard@citrix.com>,
 xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [Xen-users] xen_pt_region_update: Error: create new mem mapping
 failed! (err: 22)
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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==

From xen-users-bounces@lists.xenproject.org Mon Jan 29 13:34:23 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jan 2018 13:34:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1eg9Ym-0008Tk-LY; Mon, 29 Jan 2018 13:33:20 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=nglb=ey=gmail.com=saumyarajesh93@srs-us1.protection.inumbo.net>)
 id 1eg9Yk-0008T9-IY
 for xen-users@lists.xenproject.org; Mon, 29 Jan 2018 13:33:18 +0000
X-Inumbo-ID: eef8f192-04f8-11e8-ba59-bc764e045a96
Received: from mail-yw0-x232.google.com (unknown [2607:f8b0:4002:c05::232])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id eef8f192-04f8-11e8-ba59-bc764e045a96;
 Mon, 29 Jan 2018 14:33:05 +0100 (CET)
Received: by mail-yw0-x232.google.com with SMTP id b129so2658037ywa.8;
 Mon, 29 Jan 2018 05:33:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to;
 bh=Sw9h0pNgFud96Bv2vPlhsqyqhKVfHiy8+kxmeeo83yI=;
 b=MIvgfiuK3xzsR+888L0o19RjSSX+8e/P7wDRm8j8L7D1yMyjcctKMqH9wayk8E0chJ
 4yo+HdZRI110Mde1uIo7J8uwjMqYVP8JokINh2j+/lRIjZqqcgEKRJb721pc0OYzO8H9
 MHBUBSTC/SQLv+1j15hQL0iamfTVaAnvdOJLIcFOUV6FrApaqFzNJxmCgBL0N/BLgsLp
 fKAwbJ9hPZ/MwFuAAw8/exnMdTwt1Gj7OtizmucoOxphjOuZIqWUqfXkcFc5pJw3YYRk
 lh+M/w3RcBThe72/7635DGMcSmyYxjePPa2oOcqqgZUVMWuDP92cikyKjGV9piVMn1OZ
 XdWw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to;
 bh=Sw9h0pNgFud96Bv2vPlhsqyqhKVfHiy8+kxmeeo83yI=;
 b=GElU3DDWiXt4JLubLdqFrlYZY5rW34KPJLa+wP+PyaaeWVU+ydyhC3HwI7qLxXX9F3
 cmZdUkMn0uGEWzf2JNDkGCfK0hm2Ys+9nra+O29fo3uhNfWy4KrAhtr+zGoTluqyD2Fe
 YC6/8rxvoYg1xzGq41OZS60znIdNnYnXBHW8nKlyfjhffPFXJyWavrL7R3Pr2uWaGkGH
 4O8KwFwWIPlC4NEQ3IYIM0On+I3pcTA9fPmazAT6zX5kNE1ovN59qj1Po3flWJN7gohV
 13xsnwbDeWc2IubFTvS2WcHhxFPiV132mKSSWYcLVT7qxYYRhz+ZtO02GdbnAKK/HY68
 VK8A==
X-Gm-Message-State: AKwxytezj9YPuhoMokFIOP8IsYY6ZSQJQmoyBmbQgTIBHJubVWFRybc7
 IsziwAYevKJLKMfdj8E4O6jbdh++83FuSUNt/wDE22320Jg=
X-Google-Smtp-Source: AH8x226EBeRzRfBGcYCxRr37mqxJl0UtcuLNfY8zP6x+btVSwe/oPl6l5npr/lvjUZ0A2Sm4a6gac3g1tP8PZ7VfhvI=
X-Received: by 10.129.163.23 with SMTP id a23mr16032312ywh.389.1517232794704; 
 Mon, 29 Jan 2018 05:33:14 -0800 (PST)
MIME-Version: 1.0
Received: by 10.13.217.204 with HTTP; Mon, 29 Jan 2018 05:33:14 -0800 (PST)
In-Reply-To: <CAONE6OAUJ+SjvYkiAaT-0Y_8av4T0dX60R8o2OZum6g8Ucg+1w@mail.gmail.com>
References: <CAONE6OA9h6omWptvGQE6EdD+s0geCbUcGUwX1NKPj16PF7_TNA@mail.gmail.com>
 <37217807-7f20-bdbf-f852-033fcae1bd01@epam.com>
 <CAONE6OCM9wEd6zJCH5147vTMWyt4CGH9uXbBX0y29di9cC3QaQ@mail.gmail.com>
 <bc345300-7e46-367f-4e16-db1ffa4e56d0@epam.com>
 <CAONE6OAUJ+SjvYkiAaT-0Y_8av4T0dX60R8o2OZum6g8Ucg+1w@mail.gmail.com>
From: Saumya Rajesh <saumyarajesh93@gmail.com>
Date: Mon, 29 Jan 2018 19:03:14 +0530
Message-ID: <CAONE6OCvyAaVGTAxCnNwLF9NJg0DAN7Wb+WdJmKT82_rVNCcew@mail.gmail.com>
To: xen-users@lists.xenproject.org, xen-devel@lists.xenproject.org, 
 embedded-pv-devel@lists.xenproject.org
Subject: Re: [Xen-users] [Xen-devel] Access I2C bus from guest/DomU on ARM
	board
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jan 29 15:07:11 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jan 2018 15:07:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1egB0J-00074W-2f; Mon, 29 Jan 2018 15:05:51 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2)
 (envelope-from <srs0=72uy=ey=swampthing.dk=tsj@srs-us1.protection.inumbo.net>)
 id 1egB0H-00074Q-T1
 for xen-users@lists.xenproject.org; Mon, 29 Jan 2018 15:05:49 +0000
X-Inumbo-ID: dbbd0040-0505-11e8-ba59-bc764e045a96
Received: from srv.swampthing.dk (unknown [90.185.255.25])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id dbbd0040-0505-11e8-ba59-bc764e045a96;
 Mon, 29 Jan 2018 16:05:36 +0100 (CET)
Received: from localhost ([127.0.0.1] helo=swampthing.dk)
 by srv.swampthing.dk with esmtp (Exim 4.89)
 (envelope-from <tsj@swampthing.dk>) id 1egB0D-0000Mq-S7
 for xen-users@lists.xenproject.org; Mon, 29 Jan 2018 16:05:45 +0100
Received: from 193.161.31.161 (SquirrelMail authenticated user tsj)
 by swampthing.dk with HTTP; Mon, 29 Jan 2018 16:05:45 +0100
Message-ID: <f50129ef8830a6c83367a97f485ed7bd.squirrel@swampthing.dk>
Date: Mon, 29 Jan 2018 16:05:45 +0100
From: "Torben Schou Jensen" <tsj@swampthing.dk>
To: xen-users@lists.xenproject.org
User-Agent: SquirrelMail/1.4.23 [SVN]
MIME-Version: 1.0
X-Priority: 3 (Normal)
Importance: Normal
Subject: [Xen-users] Debian stable or testing as dom0 kernel?
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: tsj@swampthing.dk
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Tue Jan 30 13:20:01 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jan 2018 13:20:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1egVo8-0001fV-Al; Tue, 30 Jan 2018 13:18:40 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=9nzt=ey=lip6.fr=manuel.bouyer@srs-us1.protection.inumbo.net>)
 id 1eg8Al-0000wO-LI
 for xen-users@lists.xenproject.org; Mon, 29 Jan 2018 12:04:27 +0000
X-Inumbo-ID: 96fd62a8-04ec-11e8-b9b1-635ca7ef6cff
Received: from isis.lip6.fr (unknown [132.227.60.2])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 96fd62a8-04ec-11e8-b9b1-635ca7ef6cff;
 Mon, 29 Jan 2018 12:04:43 +0000 (UTC)
Received: from asim.lip6.fr (asim.lip6.fr [132.227.86.2])
 by isis.lip6.fr (8.15.2/lip6) with ESMTP id w0TC4JdL001506
 for <xen-users@lists.xenproject.org>; Mon, 29 Jan 2018 13:04:19 +0100 (CET)
X-pt: isis.lip6.fr
Received: from armandeche.soc.lip6.fr (armandeche [132.227.63.133])
 by asim.lip6.fr (8.15.2/8.14.4) with ESMTP id w0TC4Jlc011130
 for <xen-users@lists.xenproject.org>; Mon, 29 Jan 2018 13:04:19 +0100 (MET)
Received: by armandeche.soc.lip6.fr (Postfix, from userid 20331)
 id CBF85A8FC; Mon, 29 Jan 2018 13:04:18 +0100 (MET)
Date: Mon, 29 Jan 2018 13:04:18 +0100
From: Manuel Bouyer <bouyer@antioche.eu.org>
To: xen-users@lists.xenproject.org
Message-ID: <20180129120418.GA8604@mail.soc.lip6.fr>
MIME-Version: 1.0
Content-Disposition: inline
User-Agent: Mutt/1.9.2 (2017-12-15)
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3
 (isis.lip6.fr [132.227.60.2]); Mon, 29 Jan 2018 13:04:19 +0100 (CET)
X-Scanned-By: MIMEDefang 2.78 on 132.227.60.2
X-Mailman-Approved-At: Tue, 30 Jan 2018 13:18:38 +0000
Subject: [Xen-users] [BUG] Xen 4.8.3: Assertion 'oc > 0' failed at mm.c:766
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Tue Jan 30 13:47:14 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jan 2018 13:47:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1egWEs-00041h-Ov; Tue, 30 Jan 2018 13:46:18 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=d+d3=ez=gmail.com=saumyarajesh93@srs-us1.protection.inumbo.net>)
 id 1egWEr-00040y-2U
 for xen-users@lists.xenproject.org; Tue, 30 Jan 2018 13:46:17 +0000
X-Inumbo-ID: e63b0374-05c3-11e8-ba59-bc764e045a96
Received: from mail-yw0-x241.google.com (unknown [2607:f8b0:4002:c05::241])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id e63b0374-05c3-11e8-ba59-bc764e045a96;
 Tue, 30 Jan 2018 14:45:58 +0100 (CET)
Received: by mail-yw0-x241.google.com with SMTP id u17so4720241ywg.9;
 Tue, 30 Jan 2018 05:46:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=gFTI7EAyCCSiYyOmr73hant3jgH4TLZc7nIrG2/eiD4=;
 b=Tk+DQ03QokwmXOsExSYzRpmkux8UVh0kfXYSFZYzEKi38mc3bZoszvAu4/E3hc3UhQ
 z4g4yiMqREIvQ2JhSpHuCkOmJaDEmeehlK3Chov2QtLvMLMMqSgOxGBZ5dqcucg3Fb9a
 SrLVCIZ0CEAAzF+npRxpVGkcBxMdEIFB/S4HA6nuUj1PpI5ZYAszyBI5RJrvi0wGmJH0
 ddyS1hbC4Y9Gaokxys4CngZVMDAaae6O3oKt3dvQBCOv+8cssSK4H7MKEvVgqZhsZWTv
 pdGIIcU1CkFeGF9kWqbZwz6ZfEeabjN+aIPXdPHYODbTeUj1NBKAT/KjgOvvI8NKUeFE
 cO3w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=gFTI7EAyCCSiYyOmr73hant3jgH4TLZc7nIrG2/eiD4=;
 b=hIsh67icZflRjzUtf+BF1fAHWNhxnQIJbrPOz+sepYz2YFQne1JSvct9QUHY88HWRF
 8rAIl0BbZ7mYDKitSHxvWerifijn2X5yfBeAMq+5XDGXwUXr1r7Sl2oGnJjJ7yf026F3
 +tuYc6oQAuwXdlFLs1bLPpvHcia9RNiBLTZD3pV+epJLiYHTGoHJ0oHaranvIk2c4SY/
 h6ElU7p/qeHdRj+BBNJjLM0Q8MuSfo5jI/6x3b2VCoEyed0x0Jh7vJBXWHJTO/ZBuXpz
 xmQpZ1ABljb4vCVm7EedP0KsY+GyyqF7LzKsIKhK7fY2JxhfpjI3DODTYqhjybe+EdVj
 EO5Q==
X-Gm-Message-State: AKwxytdt/eGjGRsc4FdME/iOBcn/JhFLmRWy38AG3eS/Pmynu0ajDzYT
 e57c4EUGuXM8wOobnMUY/Nimd6MOMiv84oJvshFp2AdVMQs=
X-Google-Smtp-Source: AH8x225aXwzDi0qSXWnuHR05RUUgTnyK3Zr0UTAO5hwZjGwJF7GSYacwD/+deioq8WU3RcZIEsit2A7KlPgZBCqiaGQ=
X-Received: by 10.13.213.144 with SMTP id x138mr19310714ywd.157.1517319969503; 
 Tue, 30 Jan 2018 05:46:09 -0800 (PST)
MIME-Version: 1.0
Received: by 10.13.217.204 with HTTP; Tue, 30 Jan 2018 05:46:08 -0800 (PST)
From: Saumya Rajesh <saumyarajesh93@gmail.com>
Date: Tue, 30 Jan 2018 19:16:08 +0530
Message-ID: <CAONE6ODa=1m17MR8aYvXm=QSYHYd0QytxNb5Qiwd9=1txB48CQ@mail.gmail.com>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org, 
 embedded-pv-devel@lists.xenproject.org
Content-Type: multipart/mixed; boundary="001a114fccaecb45610563fe9519"
Subject: [Xen-users] Issue with booting with xen,passthrough DTB
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--001a114fccaecb45610563fe9519
Content-Type: text/plain; charset="UTF-8"

Hi

I am trying to passthrough the I2C bus[channel 2 group A] to DomU in
Xen. I am implementing this on R-Car H3.

I added xen,passthrough = "1" to the i2c2 node in r8a7795.dtsi and
rebuilt the dtb for Domain 0. The dtb works when I boot into Dom0, but
the kernel crashes when I try to boot again using the same dtb.
Assuming that the integrated device using i2c2 somehow gets corrupted
for the second run, I tried to passthrough the entire rcar sound
system, which is associated with i2c2. But I get the same result i.e.
Kernel boots for the first run but fails when I reboot using the same
dtb.

Following is the modification in Dom 0 dtb :

i2c2: i2c@e6510000 {
#address-cells = <1>;
#size-cells = <0>;
compatible = "renesas,i2c-r8a7795";
reg = <0 0xe6510000 0 0x40>;
interrupts = <GIC_SPI 286 IRQ_TYPE_LEVEL_HIGH>;
clocks = <&cpg CPG_MOD 929>;
power-domains = <&sysc R8A7795_PD_ALWAYS_ON>;
dmas = <&dmac1 0x95>, <&dmac1 0x94>;
dma-names = "tx", "rx";
i2c-scl-internal-delay-ns = <6>;
status = "disabled";
xen,passthrough = "1";
};

***
rcar_sound: sound@ec500000 {
***
power-domains = <&sysc R8A7795_PD_ALWAYS_ON>;
status = "disabled";
xen,passthrough = "1";
***
Please see the attachment for the kernel log.

Any support or suggestion regarding the cause of this issue will be
much appreciated.

I have also posted another issue regarding passthrough [1]. Please
have a look into it also.

Regards
Saumya

[1] https://lists.xenproject.org/archives/html/xen-devel/2018-01/msg02618.html

--001a114fccaecb45610563fe9519
Content-Type: text/plain; charset="US-ASCII"; name="log_boot_xen_30012018.txt"
Content-Disposition: attachment; filename="log_boot_xen_30012018.txt"
Content-Transfer-Encoding: base64
X-Attachment-Id: f_jd1p4dq80
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--001a114fccaecb45610563fe9519
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--001a114fccaecb45610563fe9519--


From xen-users-bounces@lists.xenproject.org Tue Jan 30 17:14:03 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jan 2018 17:14:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1egZSu-00050W-C6; Tue, 30 Jan 2018 17:13:00 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=byls=ez=gmail.com=ingy.sf.11@srs-us1.protection.inumbo.net>)
 id 1egZQh-0004wE-Np
 for xen-users@lists.xenproject.org; Tue, 30 Jan 2018 17:10:44 +0000
X-Inumbo-ID: 77e49553-05e0-11e8-ba59-bc764e045a96
Received: from mail-wm0-x241.google.com (unknown [2a00:1450:400c:c09::241])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 77e49553-05e0-11e8-ba59-bc764e045a96;
 Tue, 30 Jan 2018 18:10:28 +0100 (CET)
Received: by mail-wm0-x241.google.com with SMTP id 141so2599605wme.3
 for <xen-users@lists.xenproject.org>; Tue, 30 Jan 2018 09:10:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=3Q8H8pH/ZiZeQiKGkVFA3fRwVbkd92sPorrjxb0NLfo=;
 b=W3+AcU3AjeeqS/7NGgtXxcWjdSlVfmxsxUUMoTxmB4105zGbXYXA3uAwalhARjZ+kV
 aibCv9cOo9A/TsSWWxvUEPeXNn+bBkOZjT+IaTi4LnXJ5Ps4WHgYj64X0oCgG9D8n1kP
 q7Xn4W7A7cQ1e+YlbzohRYX7UhGgIJzawIOLrRqXL7luDmsedrgKckR2yR1K7gJ3mrt/
 niRWxUIjbPZFCtRQ/lRrZN3rvBMYG9PrhAO0k5TVYDqxrWkbs5UpWYcDgndvtBZ1J0ZC
 im9H3xqclh+MR3rVm3l+9ducATjgJTprFc0+ckaDc0fqyAz3q+p4ZvdhJJbTyrZ8Yhyc
 69Ew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=3Q8H8pH/ZiZeQiKGkVFA3fRwVbkd92sPorrjxb0NLfo=;
 b=bOAHLRKfaTMUquTNJ7KsezFAcExBWtHhd/RkfKn4xt+QMYMrOX1e5IEuGjieceHie2
 h/LLjyLN8CMmmrR4RxO/8AK6qRO9W7dO3Jkqy+cTwOwxUJ8kS32O4GY7fqZZ49DOSR/H
 eosegQ9tvfNxcPFTnaxocpH+LFNxfhQoo0o7FAwgRhLKHEKUu2LTHZG4mYlc7aM0tEWs
 1LG8GkzTgtpegD0vlBN6U5DeCelghmBz+CNhFhkPb0ZoxStCZzrYw8cWlH7jrHSnRwLE
 QoiQj065UeiYISNNRsIGG/ewA96dE4j2pq5zKyhIIzhPRbrBK7nkM/kvpuRdfmlFGlhn
 vpjg==
X-Gm-Message-State: AKwxytd9WsfOIq///2ulCZQGw91traWyuIaJRvKajo5yKl90tffiYyhi
 uAbTUTd5RP6dvy/W2qZUQb9RWULuWE+VdUt9rc8NKA==
X-Google-Smtp-Source: AH8x227b5y17MubXkp4L2wk2nbJT0g9GEdDd0FfI2iueseGC1032QjtfLwLA0GsE9RZI4wV25GSi7V7eI2Y2+2ZvkdQ=
X-Received: by 10.28.48.10 with SMTP id w10mr22522286wmw.93.1517332239452;
 Tue, 30 Jan 2018 09:10:39 -0800 (PST)
MIME-Version: 1.0
Received: by 10.28.247.5 with HTTP; Tue, 30 Jan 2018 09:10:38 -0800 (PST)
From: IngY Sf <ingy.sf.11@gmail.com>
Date: Tue, 30 Jan 2018 18:10:38 +0100
Message-ID: <CAJPvS86s2Bm=T6OgKd9XcnTyatc-Cxub7NOxKiohuMKf5YaQ8A@mail.gmail.com>
To: xen-users@lists.xenproject.org
X-Mailman-Approved-At: Tue, 30 Jan 2018 17:12:59 +0000
Subject: [Xen-users] HVM guest crash - /usr/bin/qemu-system-i386 / QEMU
	2.10.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1788108040691828457=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============1788108040691828457==
Content-Type: multipart/alternative; boundary="001a11422fa823930b0564017155"

--001a11422fa823930b0564017155
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

 Hello,

I am facing a problem when creating a HVM guest.
Any idea?

root@intel-corei7-64:/opt/hvm# xl -vvvv create -c hvm.cfg
Parsing config from hvm.cfg
libxl: debug: libxl_create.c:1609:do_domain_create: Domain 0:ao 0x1855c10:
creat
e: how=3D(nil) callback=3D(nil) poller=3D0x1855ca0
libxl: debug: libxl_create.c:965:initiate_domain_create: Domain 3:running
bootlo
ader
libxl: debug: libxl_bootloader.c:328:libxl__bootloader_run: Domain 3:not a
PV do
main, skipping bootloader
libxl: debug: libxl_event.c:686:libxl__ev_xswatch_deregister: watch
w=3D0x1858560:
 deregister unregistered
domainbuilder: detail: xc_dom_allocate: cmdline=3D"(null)", features=3D"(nu=
ll)"
domainbuilder: detail: xc_dom_kernel_file: filename=3D"/usr/lib/xen/boot/
hvmloader
"
domainbuilder: detail: xc_dom_malloc_filemap    : 179 kB
libxl: debug: libxl_dom.c:901:libxl__load_hvm_firmware_module: Loading
BIOS: /op
t/hvm/bios.bin
domainbuilder: detail: xc_dom_boot_xen_init: ver 4.9, caps xen-3.0-x86_64
xen-3.
0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64
domainbuilder: detail: xc_dom_parse_image: called
domainbuilder: detail: xc_dom_find_loader: trying multiboot-binary loader
...
domainbuilder: detail: loader probe failed
domainbuilder: detail: xc_dom_find_loader: trying HVM-generic loader ...
domainbuilder: detail: loader probe OK
xc: detail: ELF: phdr: paddr=3D0x100000 memsz=3D0x352c4
xc: detail: ELF: memory: 0x100000 -> 0x1352c4
domainbuilder: detail: xc_dom_mem_init: mem 120 MB, pages 0x7800 pages, 4k
each
domainbuilder: detail: xc_dom_mem_init: 0x7800 pages
domainbuilder: detail: xc_dom_boot_mem_init: called
domainbuilder: detail: xc_dom_malloc            : 240 kB
xc: detail: PHYSICAL MEMORY ALLOCATION:
xc: detail:   4KB PAGES: 0x0000000000000200
xc: detail:   2MB PAGES: 0x000000000000003b
xc: detail:   1GB PAGES: 0x0000000000000000
domainbuilder: detail: xc_dom_build_image: called
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x100+0x36
at 0x7efecc9cd000
domainbuilder: detail: xc_dom_alloc_segment:   kernel       : 0x100000 ->
0x1360
00  (pfn 0x100 + 0x36 pages)
xc: detail: ELF: phdr 0 at 0x7efecc997000 -> 0x7efecc9c2840
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x136+0x40
at 0x7efecc98d000
domainbuilder: detail: xc_dom_alloc_segment:   System Firmware module :
0x136000
 -> 0x176000  (pfn 0x136 + 0x40 pages)
domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn
0x176+0x1 a
t 0x7efecc98c000
domainbuilder: detail: xc_dom_alloc_segment:   HVM start info : 0x176000 ->
0x17
7000  (pfn 0x176 + 0x1 pages)
domainbuilder: detail: alloc_pgtables_hvm: doing nothing
domainbuilder: detail: xc_dom_build_image  : virt_alloc_end : 0x177000
domainbuilder: detail: xc_dom_build_image  : virt_pgtab_end : 0x0
domainbuilder: detail: xc_dom_boot_image: called
domainbuilder: detail: xc_dom_compat_check: supported guest type:
xen-3.0-x86_64

domainbuilder: detail: xc_dom_compat_check: supported guest type:
xen-3.0-x86_32
p
domainbuilder: detail: xc_dom_compat_check: supported guest type:
hvm-3.0-x86_32
 <=3D matches
domainbuilder: detail: xc_dom_compat_check: supported guest type:
hvm-3.0-x86_32
p
domainbuilder: detail: xc_dom_compat_check: supported guest type:
hvm-3.0-x86_64

domainbuilder: detail: clear_page: pfn 0xfefff, mfn 0xfefff
domainbuilder: detail: clear_page: pfn 0xfeffc, mfn 0xfeffc
domainbuilder: detail: domain builder memory footprint
domainbuilder: detail:    allocated
domainbuilder: detail:       malloc             : 245 kB
domainbuilder: detail:       anon mmap          : 0 bytes
domainbuilder: detail:    mapped
domainbuilder: detail:       file mmap          : 179 kB
domainbuilder: detail:       domU mmap          : 476 kB
domainbuilder: detail: vcpu_hvm: called
(XEN) HVM3 save: CPU
(XEN) HVM3 save: PIC
(XEN) HVM3 save: IOAPIC
(XEN) HVM3 save: LAPIC
(XEN) HVM3 save: LAPIC_REGS
(XEN) HVM3 save: PCI_IRQ
(XEN) HVM3 save: ISA_IRQ
(XEN) HVM3 save: PCI_LINK
(XEN) HVM3 save: PIT
(XEN) HVM3 save: RTC
(XEN) HVM3 save: HPET
(XEN) HVM3 save: PMTIMER
(XEN) HVM3 save: MTRR
(XEN) HVM3 save: VIRIDIAN_DOMAIN
(XEN) HVM3 save: CPU_XSAVE
(XEN) HVM3 save: VIRIDIAN_VCPU
(XEN) HVM3 save: VMCE_VCPU
(XEN) HVM3 save: TSC_ADJUST
(XEN) HVM3 restore: CPU 0
domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=3D0xff000
domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=3D0xff001
domainbuilder: detail: xc_dom_release: called
libxl: debug: libxl_dm.c:1646:libxl__build_device_model_args_new: Domain
3:Could
 not find user xen-qemuuser-shared, starting QEMU as root
libxl: debug: libxl_dm.c:2243:libxl__spawn_local_dm: Domain 3:Spawning
device-mo
del /usr/bin/qemu-system-i386 with arguments:
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
/usr/bin/qemu-sy
stem-i386
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -xen-domid
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  3
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -chardev
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
socket,id=3Dlibxl-
cmd,path=3D/var/run/xen/qmp-libxl-3,server,nowait
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -no-shutdow=
n
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -mon
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
chardev=3Dlibxl-cm
d,mode=3Dcontrol
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -chardev
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
socket,id=3Dlibxen
stat-cmd,path=3D/var/run/xen/qmp-libxenstat-3,server,nowait
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -mon
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
chardev=3Dlibxenst
at-cmd,mode=3Dcontrol
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -nodefaults
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
-no-user-config
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -name
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  hvm
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -vnc
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  127.0.0.1:0
,to=3D9
9
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -display
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  none
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -kernel
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
/opt/hvm/vmlinuz
-4.4.1
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -initrd
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
/opt/hvm/ramdisk
_x86.8.img.gz
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -device
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:
cirrus-vga,vgame
m_mb=3D8
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -boot
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  order=3Dcda
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -smp
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  2,maxcpus=
=3D2
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -net
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  none
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -machine
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  xenfv
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  -m
libxl: debug: libxl_dm.c:2245:libxl__spawn_local_dm: Domain 3:  120
libxl: debug: libxl_dm.c:2247:libxl__spawn_local_dm: Domain 3:Spawning
device-mo
del /usr/bin/qemu-system-i386 with additional environment:
libxl: debug: libxl_dm.c:2249:libxl__spawn_local_dm: Domain 3:
XEN_QEMU_CONSOLE
_LIMIT=3D1048576
libxl: debug: libxl_event.c:636:libxl__ev_xswatch_register: watch
w=3D0x1858858 wp
ath=3D/local/domain/0/device-model/3/state token=3D3/0: register slotnum=3D=
3
libxl: debug: libxl_create.c:1646:do_domain_create: Domain 0:ao 0x1855c10:
inpro
gress: poller=3D0x1855ca0, flags=3Di
libxl: debug: libxl_event.c:573:watchfd_callback: watch w=3D0x1858858
wpath=3D/local
/domain/0/device-model/3/state token=3D3/0: event
epath=3D/local/domain/0/device-mod
el/3/state
libxl: debug: libxl_exec.c:398:spawn_watch_event: domain 3 device model:
spawn w
atch p=3D(null)
libxl: debug: libxl_event.c:573:watchfd_callback: watch w=3D0x1858858
wpath=3D/local
/domain/0/device-model/3/state token=3D3/0: event
epath=3D/local/domain/0/device-mod
el/3/state
libxl: debug: libxl_exec.c:398:spawn_watch_event: domain 3 device model:
spawn w
atch p=3Drunning
libxl: debug: libxl_event.c:673:libxl__ev_xswatch_deregister: watch
w=3D0x1858858
wpath=3D/local/domain/0/device-model/3/state token=3D3/0: deregister slotnu=
m=3D3
libxl: debug: libxl_exec.c:129:libxl_report_child_exitstatus: domain 3
device mo
del (dying as expected) [1812] died due to fatal signal Killed
libxl: debug: libxl_event.c:686:libxl__ev_xswatch_deregister: watch
w=3D0x1858858:
 deregister unregistered
libxl: debug: libxl_qmp.c:707:libxl__qmp_initialize: Domain 3:connected to
/var/
run/xen/qmp-libxl-3
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
qmp
libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "qmp_capabilities",
    "id": 1
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "query-chardev",
    "id": 2
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "query-vnc",
    "id": 3
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_event.c:2194:libxl__ao_progress_report: ao 0x1855c10:
progre
ss report: callback queued aop=3D0x18577f0
libxl: debug: libxl_event.c:1869:libxl__ao_complete: ao 0x1855c10:
complete, rc=3D
0
libxl: debug: libxl_event.c:1404:egc_run_callbacks: ao 0x1855c10: progress
repor
t: callback aop=3D0x18577f0
libxl: debug: libxl_event.c:1838:libxl__ao__destroy: ao 0x1855c10: destroy
libxl: debug: libxl_qmp.c:707:libxl__qmp_initialize: Domain 3:connected to
/var/
run/xen/qmp-libxl-3
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
qmp
libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "qmp_capabilities",
    "id": 1
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

libxl: debug: libxl_qmp.c:556:qmp_send_prepare: Domain 3:next qmp command:
'{
    "execute": "cont",
    "id": 2
}
'
libxl: debug: libxl_qmp.c:296:qmp_handle_response: Domain 3:message type:
return

(d3) HVM Loader
(d3) Detected Xen v4.9-unstable
(d3) Xenbus rings @0xfeffc000, event channel 1
(d3) System requested SeaBIOS
(d3) CPU speed is 1333 MHz
(d3) Relocating guest memory for lowmem MMIO space disabled
(XEN) irq.c:275: Dom3 PCI link 0 changed 0 -> 5
(d3) PCI-ISA link 0 routed to IRQ5
(XEN) irq.c:275: Dom3 PCI link 1 changed 0 -> 10
(d3) PCI-ISA link 1 routed to IRQ10
(XEN) irq.c:275: Dom3 PCI link 2 changed 0 -> 11
(d3) PCI-ISA link 2 routed to IRQ11
(XEN) irq.c:275: Dom3 PCI link 3 changed 0 -> 5
(d3) PCI-ISA link 3 routed to IRQ5
(d3) pci dev 01:3 INTA->IRQ10
(d3) pci dev 02:0 INTA->IRQ11
(XEN) d3v0 Triple fault - invoking HVM shutdown action 1
(XEN) *** Dumping Dom3 vcpu#0 state: ***
(XEN) ----[ Xen-4.9-unstable  x86_64  debug=3Dy   Not tainted ]----
(XEN) CPU:    1
(XEN) RIP:    0018:[<0000000000105153>]
(XEN) RFLAGS: 0000000000010046   CONTEXT: hvm guest (d3v0)
(XEN) rax: 0000000000000000   rbx: 0000000000007800   rcx: 0000000000000000
(XEN) rdx: 0000000000000000   rsi: 000000000c000000   rdi: 000000000009f800
(XEN) rbp: 000000000000ffff   rsp: 000000000012f700   r8:  0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
(XEN) r15: 0000000000000000   cr0: 0000000000000011   cr4: 0000000000000000
(XEN) cr3: 0000000000000000   cr2: 0000000000000000
(XEN) ds: 0020   es: 0020   fs: 0020   gs: 0020   ss: 0020   cs: 0018
xencall:buffer: debug: total allocations:183 total releases:183
xencall:buffer: debug: current allocations:0 maximum allocations:3
xencall:buffer: debug: cache current size:3
xencall:buffer: debug: cache hits:167 misses:3 toobig:13
xencall:buffer: debug: total allocations:0 total releases:0
xencall:buffer: debug: current allocations:0 maximum allocations:0
xencall:buffer: debug: cache current size:0
xencall:buffer: debug: cache hits:0 misses:0 toobig:0

=E1=90=A7

--001a11422fa823930b0564017155
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">

<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
Hello,</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;=
font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-varia=
nt-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-=
indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgrou=
nd-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-col=
or:initial"><br></div><div style=3D"color:rgb(34,34,34);font-family:arial,s=
ans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;=
font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x;background-color:rgb(255,255,255);text-decoration-style:initial;text-deco=
ration-color:initial">I am facing a problem when creating a HVM guest.</div=
><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
2.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:nor=
mal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;=
text-transform:none;white-space:normal;word-spacing:0px;background-color:rg=
b(255,255,255);text-decoration-style:initial;text-decoration-color:initial"=
>Any idea?</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-se=
rif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-v=
ariant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;t=
ext-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;back=
ground-color:rgb(255,255,255);text-decoration-style:initial;text-decoration=
-color:initial"><br></div><div style=3D"color:rgb(34,34,34);font-family:ari=
al,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:nor=
mal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-ali=
gn:start;text-indent:0px;text-transform:none;white-space:normal;word-spacin=
g:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-=
decoration-color:initial">root@intel-corei7-64:/opt/hvm# xl -vvvv create -c=
 hvm.cfg</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-seri=
f;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-var=
iant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;tex=
t-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgr=
ound-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-c=
olor:initial">Parsing config from hvm.cfg</div><div style=3D"color:rgb(34,3=
4,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-=
variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-sp=
acing:normal;text-align:start;text-indent:0px;text-transform:none;white-spa=
ce:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoratio=
n-style:initial;text-decoration-color:initial">libxl: debug: libxl_create.c=
:1609:do_domain_<wbr>create: Domain 0:ao 0x1855c10: creat</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">e: how=3D(=
nil) callback=3D(nil) poller=3D0x1855ca0</div><div style=3D"color:rgb(34,34=
,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-v=
ariant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spa=
cing:normal;text-align:start;text-indent:0px;text-transform:none;white-spac=
e:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration=
-style:initial;text-decoration-color:initial">libxl: debug: libxl_create.c:=
965:initiate_<wbr>domain_create: Domain 3:running bootlo</div><div style=3D=
"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-sty=
le:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weigh=
t:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform=
:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255)=
;text-decoration-style:initial;text-decoration-color:initial">ader</div><di=
v style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8p=
x;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;=
font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text=
-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(25=
5,255,255);text-decoration-style:initial;text-decoration-color:initial">lib=
xl: debug: libxl_bootloader.c:328:libxl__<wbr>bootloader_run: Domain 3:not =
a PV do</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif=
;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-vari=
ant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text=
-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgro=
und-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-co=
lor:initial">main, skipping bootloader</div><div style=3D"color:rgb(34,34,3=
4);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-var=
iant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-s=
tyle:initial;text-decoration-color:initial">libxl: debug: libxl_event.c:686=
:libxl__ev_<wbr>xswatch_deregister: watch w=3D0x1858560:</div><div style=3D=
"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-sty=
le:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weigh=
t:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform=
:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255)=
;text-decoration-style:initial;text-decoration-color:initial">=C2=A0deregis=
ter unregistered</div><div style=3D"color:rgb(34,34,34);font-family:arial,s=
ans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;=
font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x;background-color:rgb(255,255,255);text-decoration-style:initial;text-deco=
ration-color:initial">domainbuilder: detail: xc_dom_allocate: cmdline=3D&qu=
ot;(null)&quot;, features=3D&quot;(null)&quot;</div><div style=3D"color:rgb=
(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;=
font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;lett=
er-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whit=
e-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-deco=
ration-style:initial;text-decoration-color:initial">domainbuilder: detail: =
xc_dom_kernel_file: filename=3D&quot;/usr/lib/xen/boot/<wbr>hvmloader</div>=
<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
&quot;</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;=
font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-varia=
nt-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-=
indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgrou=
nd-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-col=
or:initial">domainbuilder: detail: xc_dom_malloc_filemap=C2=A0 =C2=A0 : 179=
 kB</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fon=
t-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-=
caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-ind=
ent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-=
color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:=
initial">libxl: debug: libxl_dom.c:901:libxl__load_<wbr>hvm_firmware_module=
: Loading BIOS: /op</div><div style=3D"color:rgb(34,34,34);font-family:aria=
l,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norm=
al;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-alig=
n:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing=
:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-d=
ecoration-color:initial">t/hvm/bios.bin</div><div style=3D"color:rgb(34,34,=
34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-va=
riant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spac=
ing:normal;text-align:start;text-indent:0px;text-transform:none;white-space=
:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-=
style:initial;text-decoration-color:initial">domainbuilder: detail: xc_dom_=
boot_xen_init: ver 4.9, caps xen-3.0-x86_64 xen-3.</div><div style=3D"color=
:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:nor=
mal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;=
letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;=
white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-=
decoration-style:initial;text-decoration-color:initial">0-x86_32p hvm-3.0-x=
86_32 hvm-3.0-x86_32p hvm-3.0-x86_64</div><div style=3D"color:rgb(34,34,34)=
;font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-varia=
nt-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing=
:normal;text-align:start;text-indent:0px;text-transform:none;white-space:no=
rmal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-sty=
le:initial;text-decoration-color:initial">domainbuilder: detail: xc_dom_par=
se_image: called</div><div style=3D"color:rgb(34,34,34);font-family:arial,s=
ans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;=
font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x;background-color:rgb(255,255,255);text-decoration-style:initial;text-deco=
ration-color:initial">domainbuilder: detail: xc_dom_find_loader: trying mul=
tiboot-binary loader ...</div><div style=3D"color:rgb(34,34,34);font-family=
:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures=
:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text=
-align:start;text-indent:0px;text-transform:none;white-space:normal;word-sp=
acing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;t=
ext-decoration-color:initial">domainbuilder: detail: loader probe failed</d=
iv><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size=
:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:n=
ormal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0p=
x;text-transform:none;white-space:normal;word-spacing:0px;background-color:=
rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initia=
l">domainbuilder: detail: xc_dom_find_loader: trying HVM-generic loader ...=
</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-cap=
s:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent=
:0px;text-transform:none;white-space:normal;word-spacing:0px;background-col=
or:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:ini=
tial">domainbuilder: detail: loader probe OK</div><div style=3D"color:rgb(3=
4,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;fo=
nt-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter=
-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-=
space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decora=
tion-style:initial;text-decoration-color:initial">xc: detail: ELF: phdr: pa=
ddr=3D0x100000 memsz=3D0x352c4</div><div style=3D"color:rgb(34,34,34);font-=
family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-lig=
atures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:ini=
tial;text-decoration-color:initial">xc: detail: ELF: memory: 0x100000 -&gt;=
 0x1352c4</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-ser=
if;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-va=
riant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;te=
xt-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backg=
round-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-=
color:initial">domainbuilder: detail: xc_dom_mem_init: mem 120 MB, pages 0x=
7800 pages, 4k each</div><div style=3D"color:rgb(34,34,34);font-family:aria=
l,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norm=
al;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-alig=
n:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing=
:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-d=
ecoration-color:initial">domainbuilder: detail: xc_dom_mem_init: 0x7800 pag=
es</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font=
-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-c=
aps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-inde=
nt:0px;text-transform:none;white-space:normal;word-spacing:0px;background-c=
olor:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:i=
nitial">domainbuilder: detail: xc_dom_boot_mem_init: called</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">domainbuil=
der: detail: xc_dom_malloc=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 240 k=
B</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-=
size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-ca=
ps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-inden=
t:0px;text-transform:none;white-space:normal;word-spacing:0px;background-co=
lor:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:in=
itial">xc: detail: PHYSICAL MEMORY ALLOCATION:</div><div style=3D"color:rgb=
(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;=
font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;lett=
er-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whit=
e-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-deco=
ration-style:initial;text-decoration-color:initial">xc: detail:=C2=A0 =C2=
=A04KB PAGES: 0x0000000000000200</div><div style=3D"color:rgb(34,34,34);fon=
t-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-l=
igatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:nor=
mal;text-align:start;text-indent:0px;text-transform:none;white-space:normal=
;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:i=
nitial;text-decoration-color:initial">xc: detail:=C2=A0 =C2=A02MB PAGES: 0x=
000000000000003b</div><div style=3D"color:rgb(34,34,34);font-family:arial,s=
ans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;=
font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x;background-color:rgb(255,255,255);text-decoration-style:initial;text-deco=
ration-color:initial">xc: detail:=C2=A0 =C2=A01GB PAGES: 0x0000000000000000=
</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-cap=
s:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent=
:0px;text-transform:none;white-space:normal;word-spacing:0px;background-col=
or:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:ini=
tial">domainbuilder: detail: xc_dom_build_image: called</div><div style=3D"=
color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-styl=
e:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight=
:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:=
none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);=
text-decoration-style:initial;text-decoration-color:initial">domainbuilder:=
 detail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn 0x100+0x36</div><div=
 style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px=
;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;f=
ont-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-=
transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255=
,255,255);text-decoration-style:initial;text-decoration-color:initial">at 0=
x7efecc9cd000</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans=
-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;fon=
t-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:star=
t;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;b=
ackground-color:rgb(255,255,255);text-decoration-style:initial;text-decorat=
ion-color:initial">domainbuilder: detail: xc_dom_alloc_segment:=C2=A0 =C2=
=A0kernel=C2=A0 =C2=A0 =C2=A0 =C2=A0: 0x100000 -&gt; 0x1360</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">00=C2=A0 (=
pfn 0x100 + 0x36 pages)</div><div style=3D"color:rgb(34,34,34);font-family:=
arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:=
normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-=
align:start;text-indent:0px;text-transform:none;white-space:normal;word-spa=
cing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;te=
xt-decoration-color:initial">xc: detail: ELF: phdr 0 at 0x7efecc997000 -&gt=
; 0x7efecc9c2840</div><div style=3D"color:rgb(34,34,34);font-family:arial,s=
ans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;=
font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x;background-color:rgb(255,255,255);text-decoration-style:initial;text-deco=
ration-color:initial">domainbuilder: detail: xc_dom_pfn_to_ptr_retcount: do=
mU mapping: pfn 0x136+0x40</div><div style=3D"color:rgb(34,34,34);font-fami=
ly:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatur=
es:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial=
;text-decoration-color:initial">at 0x7efecc98d000</div><div style=3D"color:=
rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:norm=
al;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;l=
etter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;w=
hite-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-d=
ecoration-style:initial;text-decoration-color:initial">domainbuilder: detai=
l: xc_dom_alloc_segment:=C2=A0 =C2=A0System Firmware module : 0x136000</div=
><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
2.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:nor=
mal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;=
text-transform:none;white-space:normal;word-spacing:0px;background-color:rg=
b(255,255,255);text-decoration-style:initial;text-decoration-color:initial"=
>=C2=A0-&gt; 0x176000=C2=A0 (pfn 0x136 + 0x40 pages)</div><div style=3D"col=
or:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:n=
ormal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:40=
0;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:non=
e;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);tex=
t-decoration-style:initial;text-decoration-color:initial">domainbuilder: de=
tail: xc_dom_pfn_to_ptr_retcount: domU mapping: pfn 0x176+0x1 a</div><div s=
tyle=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;f=
ont-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fon=
t-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tr=
ansform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,2=
55,255);text-decoration-style:initial;text-decoration-color:initial">t 0x7e=
fecc98c000</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-se=
rif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-v=
ariant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;t=
ext-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;back=
ground-color:rgb(255,255,255);text-decoration-style:initial;text-decoration=
-color:initial">domainbuilder: detail: xc_dom_alloc_segment:=C2=A0 =C2=A0HV=
M start info : 0x176000 -&gt; 0x17</div><div style=3D"color:rgb(34,34,34);f=
ont-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant=
-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:n=
ormal;text-align:start;text-indent:0px;text-transform:none;white-space:norm=
al;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style=
:initial;text-decoration-color:initial">7000=C2=A0 (pfn 0x176 + 0x1 pages)<=
/div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-si=
ze:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps=
:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:=
0px;text-transform:none;white-space:normal;word-spacing:0px;background-colo=
r:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:init=
ial">domainbuilder: detail: alloc_pgtables_hvm: doing nothing</div><div sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;fon=
t-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-=
weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255=
,255);text-decoration-style:initial;text-decoration-color:initial">domainbu=
ilder: detail: xc_dom_build_image=C2=A0 : virt_alloc_end : 0x177000</div><d=
iv style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8=
px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal=
;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;tex=
t-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(2=
55,255,255);text-decoration-style:initial;text-decoration-color:initial">do=
mainbuilder: detail: xc_dom_build_image=C2=A0 : virt_pgtab_end : 0x0</div><=
div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.=
8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norma=
l;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;te=
xt-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(=
255,255,255);text-decoration-style:initial;text-decoration-color:initial">d=
omainbuilder: detail: xc_dom_boot_image: called</div><div style=3D"color:rg=
b(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal=
;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;let=
ter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whi=
te-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-dec=
oration-style:initial;text-decoration-color:initial">domainbuilder: detail:=
 xc_dom_compat_check: supported guest type: xen-3.0-x86_64</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial"><br></div>=
<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
domainbuilder: detail: xc_dom_compat_check: supported guest type: xen-3.0-x=
86_32</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;f=
ont-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-varian=
t-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-i=
ndent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgroun=
d-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-colo=
r:initial">p</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-=
serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font=
-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start=
;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;ba=
ckground-color:rgb(255,255,255);text-decoration-style:initial;text-decorati=
on-color:initial">domainbuilder: detail: xc_dom_compat_check: supported gue=
st type: hvm-3.0-x86_32</div><div style=3D"color:rgb(34,34,34);font-family:=
arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:=
normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-=
align:start;text-indent:0px;text-transform:none;white-space:normal;word-spa=
cing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;te=
xt-decoration-color:initial">=C2=A0&lt;=3D matches</div><div style=3D"color=
:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:nor=
mal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;=
letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;=
white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-=
decoration-style:initial;text-decoration-color:initial">domainbuilder: deta=
il: xc_dom_compat_check: supported guest type: hvm-3.0-x86_32</div><div sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;fon=
t-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-=
weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255=
,255);text-decoration-style:initial;text-decoration-color:initial">p</div><=
div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.=
8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norma=
l;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;te=
xt-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(=
255,255,255);text-decoration-style:initial;text-decoration-color:initial">d=
omainbuilder: detail: xc_dom_compat_check: supported guest type: hvm-3.0-x8=
6_64</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fo=
nt-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant=
-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-in=
dent:0px;text-transform:none;white-space:normal;word-spacing:0px;background=
-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color=
:initial"><br></div><div style=3D"color:rgb(34,34,34);font-family:arial,san=
s-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;fo=
nt-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:sta=
rt;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;=
background-color:rgb(255,255,255);text-decoration-style:initial;text-decora=
tion-color:initial">domainbuilder: detail: clear_page: pfn 0xfefff, mfn 0xf=
efff</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fo=
nt-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant=
-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-in=
dent:0px;text-transform:none;white-space:normal;word-spacing:0px;background=
-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color=
:initial">domainbuilder: detail: clear_page: pfn 0xfeffc, mfn 0xfeffc</div>=
<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
domainbuilder: detail: domain builder memory footprint</div><div style=3D"c=
olor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style=
:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:=
400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:n=
one;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);t=
ext-decoration-style:initial;text-decoration-color:initial">domainbuilder: =
detail:=C2=A0 =C2=A0 allocated</div><div style=3D"color:rgb(34,34,34);font-=
family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-lig=
atures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:ini=
tial;text-decoration-color:initial">domainbuilder: detail:=C2=A0 =C2=A0 =C2=
=A0 =C2=A0malloc=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 245 kB</d=
iv><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size=
:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:n=
ormal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0p=
x;text-transform:none;white-space:normal;word-spacing:0px;background-color:=
rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initia=
l">domainbuilder: detail:=C2=A0 =C2=A0 =C2=A0 =C2=A0anon mmap=C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 : 0 bytes</div><div style=3D"color:rgb(34,34,34);font-=
family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-lig=
atures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:ini=
tial;text-decoration-color:initial">domainbuilder: detail:=C2=A0 =C2=A0 map=
ped</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fon=
t-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-=
caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-ind=
ent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-=
color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:=
initial">domainbuilder: detail:=C2=A0 =C2=A0 =C2=A0 =C2=A0file mmap=C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 : 179 kB</div><div style=3D"color:rgb(34,34,34)=
;font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-varia=
nt-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing=
:normal;text-align:start;text-indent:0px;text-transform:none;white-space:no=
rmal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-sty=
le:initial;text-decoration-color:initial">domainbuilder: detail:=C2=A0 =C2=
=A0 =C2=A0 =C2=A0domU mmap=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 476 kB</div>=
<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
domainbuilder: detail: vcpu_hvm: called</div><div style=3D"color:rgb(34,34,=
34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-va=
riant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spac=
ing:normal;text-align:start;text-indent:0px;text-transform:none;white-space=
:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-=
style:initial;text-decoration-color:initial">(XEN) HVM3 save: CPU</div><div=
 style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px=
;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;f=
ont-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-=
transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255=
,255,255);text-decoration-style:initial;text-decoration-color:initial">(XEN=
) HVM3 save: PIC</div><div style=3D"color:rgb(34,34,34);font-family:arial,s=
ans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;=
font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x;background-color:rgb(255,255,255);text-decoration-style:initial;text-deco=
ration-color:initial">(XEN) HVM3 save: IOAPIC</div><div style=3D"color:rgb(=
34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;f=
ont-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;lette=
r-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white=
-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decor=
ation-style:initial;text-decoration-color:initial">(XEN) HVM3 save: LAPIC</=
div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-siz=
e:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:=
normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0=
px;text-transform:none;white-space:normal;word-spacing:0px;background-color=
:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initi=
al">(XEN) HVM3 save: LAPIC_REGS</div><div style=3D"color:rgb(34,34,34);font=
-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-li=
gatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norm=
al;text-align:start;text-indent:0px;text-transform:none;white-space:normal;=
word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:in=
itial;text-decoration-color:initial">(XEN) HVM3 save: PCI_IRQ</div><div sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;fon=
t-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-=
weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255=
,255);text-decoration-style:initial;text-decoration-color:initial">(XEN) HV=
M3 save: ISA_IRQ</div><div style=3D"color:rgb(34,34,34);font-family:arial,s=
ans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;=
font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:s=
tart;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0p=
x;background-color:rgb(255,255,255);text-decoration-style:initial;text-deco=
ration-color:initial">(XEN) HVM3 save: PCI_LINK</div><div style=3D"color:rg=
b(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal=
;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;let=
ter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whi=
te-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-dec=
oration-style:initial;text-decoration-color:initial">(XEN) HVM3 save: PIT</=
div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-siz=
e:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:=
normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0=
px;text-transform:none;white-space:normal;word-spacing:0px;background-color=
:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initi=
al">(XEN) HVM3 save: RTC</div><div style=3D"color:rgb(34,34,34);font-family=
:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures=
:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text=
-align:start;text-indent:0px;text-transform:none;white-space:normal;word-sp=
acing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;t=
ext-decoration-color:initial">(XEN) HVM3 save: HPET</div><div style=3D"colo=
r:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:no=
rmal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400=
;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none=
;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text=
-decoration-style:initial;text-decoration-color:initial">(XEN) HVM3 save: P=
MTIMER</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;=
font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-varia=
nt-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-=
indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgrou=
nd-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-col=
or:initial">(XEN) HVM3 save: MTRR</div><div style=3D"color:rgb(34,34,34);fo=
nt-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-=
ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:no=
rmal;text-align:start;text-indent:0px;text-transform:none;white-space:norma=
l;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:=
initial;text-decoration-color:initial">(XEN) HVM3 save: VIRIDIAN_DOMAIN</di=
v><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:=
12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:no=
rmal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px=
;text-transform:none;white-space:normal;word-spacing:0px;background-color:r=
gb(255,255,255);text-decoration-style:initial;text-decoration-color:initial=
">(XEN) HVM3 save: CPU_XSAVE</div><div style=3D"color:rgb(34,34,34);font-fa=
mily:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligat=
ures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;=
text-align:start;text-indent:0px;text-transform:none;white-space:normal;wor=
d-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initi=
al;text-decoration-color:initial">(XEN) HVM3 save: VIRIDIAN_VCPU</div><div =
style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;=
font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fo=
nt-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,=
255,255);text-decoration-style:initial;text-decoration-color:initial">(XEN)=
 HVM3 save: VMCE_VCPU</div><div style=3D"color:rgb(34,34,34);font-family:ar=
ial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:no=
rmal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-al=
ign:start;text-indent:0px;text-transform:none;white-space:normal;word-spaci=
ng:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text=
-decoration-color:initial">(XEN) HVM3 save: TSC_ADJUST</div><div style=3D"c=
olor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style=
:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:=
400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:n=
one;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);t=
ext-decoration-style:initial;text-decoration-color:initial">(XEN) HVM3 rest=
ore: CPU 0</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-se=
rif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-v=
ariant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;t=
ext-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;back=
ground-color:rgb(255,255,255);text-decoration-style:initial;text-decoration=
-color:initial">domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=
=3D0xff000</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-se=
rif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-v=
ariant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;t=
ext-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;back=
ground-color:rgb(255,255,255);text-decoration-style:initial;text-decoration=
-color:initial">domainbuilder: detail: xc_dom_gnttab_hvm_seed: called, pfn=
=3D0xff001</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-se=
rif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-v=
ariant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;t=
ext-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;back=
ground-color:rgb(255,255,255);text-decoration-style:initial;text-decoration=
-color:initial">domainbuilder: detail: xc_dom_release: called</div><div sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;fon=
t-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-=
weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255=
,255);text-decoration-style:initial;text-decoration-color:initial">libxl: d=
ebug: libxl_dm.c:1646:libxl__build_<wbr>device_model_args_new: Domain 3:Cou=
ld</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font=
-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-c=
aps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-inde=
nt:0px;text-transform:none;white-space:normal;word-spacing:0px;background-c=
olor:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:i=
nitial">=C2=A0not find user xen-qemuuser-shared, starting QEMU as root</div=
><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
2.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:nor=
mal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;=
text-transform:none;white-space:normal;word-spacing:0px;background-color:rg=
b(255,255,255);text-decoration-style:initial;text-decoration-color:initial"=
>libxl: debug: libxl_dm.c:2243:libxl__spawn_<wbr>local_dm: Domain 3:Spawnin=
g device-mo</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial">del /usr/bin/qemu-system-i386 with arguments:</div><div st=
yle=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;fo=
nt-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font=
-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tra=
nsform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,25=
5,255);text-decoration-style:initial;text-decoration-color:initial">libxl: =
debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 /usr/bin=
/qemu-sy</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-seri=
f;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-var=
iant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;tex=
t-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgr=
ound-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-c=
olor:initial">stem-i386</div><div style=3D"color:rgb(34,34,34);font-family:=
arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:=
normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-=
align:start;text-indent:0px;text-transform:none;white-space:normal;word-spa=
cing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;te=
xt-decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wb=
r>local_dm: Domain 3:=C2=A0 -xen-domid</div><div style=3D"color:rgb(34,34,3=
4);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-var=
iant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-s=
tyle:initial;text-decoration-color:initial">libxl: debug: libxl_dm.c:2245:l=
ibxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 3</div><div style=3D"color:rgb(3=
4,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;fo=
nt-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter=
-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-=
space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decora=
tion-style:initial;text-decoration-color:initial">libxl: debug: libxl_dm.c:=
2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -chardev</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">libxl: deb=
ug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 socket,id=
=3Dlibxl-</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-ser=
if;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-va=
riant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;te=
xt-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backg=
round-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-=
color:initial">cmd,path=3D/var/run/xen/qmp-<wbr>libxl-3,server,nowait</div>=
<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -=
no-shutdown</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: =
Domain 3:=C2=A0 -mon</div><div style=3D"color:rgb(34,34,34);font-family:ari=
al,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:nor=
mal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-ali=
gn:start;text-indent:0px;text-transform:none;white-space:normal;word-spacin=
g:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-=
decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>l=
ocal_dm: Domain 3:=C2=A0 chardev=3Dlibxl-cm</div><div style=3D"color:rgb(34=
,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;fon=
t-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-=
spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-s=
pace:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decorat=
ion-style:initial;text-decoration-color:initial">d,mode=3Dcontrol</div><div=
 style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px=
;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;f=
ont-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-=
transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255=
,255,255);text-decoration-style:initial;text-decoration-color:initial">libx=
l: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -char=
dev</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fon=
t-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-=
caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-ind=
ent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-=
color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:=
initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3=
:=C2=A0 socket,id=3Dlibxen</div><div style=3D"color:rgb(34,34,34);font-fami=
ly:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatur=
es:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial=
;text-decoration-color:initial">stat-cmd,path=3D/var/run/xen/<wbr>qmp-libxe=
nstat-3,server,nowait</div><div style=3D"color:rgb(34,34,34);font-family:ar=
ial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:no=
rmal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-al=
ign:start;text-indent:0px;text-transform:none;white-space:normal;word-spaci=
ng:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text=
-decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>=
local_dm: Domain 3:=C2=A0 -mon</div><div style=3D"color:rgb(34,34,34);font-=
family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-lig=
atures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:ini=
tial;text-decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__sp=
awn_<wbr>local_dm: Domain 3:=C2=A0 chardev=3Dlibxenst</div><div style=3D"co=
lor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:=
normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:4=
00;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);te=
xt-decoration-style:initial;text-decoration-color:initial">at-cmd,mode=3Dco=
ntrol</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;f=
ont-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-varian=
t-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-i=
ndent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgroun=
d-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-colo=
r:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain=
 3:=C2=A0 -nodefaults</div><div style=3D"color:rgb(34,34,34);font-family:ar=
ial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:no=
rmal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-al=
ign:start;text-indent:0px;text-transform:none;white-space:normal;word-spaci=
ng:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text=
-decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>=
local_dm: Domain 3:=C2=A0 -no-user-config</div><div style=3D"color:rgb(34,3=
4,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-=
variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-sp=
acing:normal;text-align:start;text-indent:0px;text-transform:none;white-spa=
ce:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoratio=
n-style:initial;text-decoration-color:initial">libxl: debug: libxl_dm.c:224=
5:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -name</div><div style=3D"colo=
r:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:no=
rmal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400=
;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none=
;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text=
-decoration-style:initial;text-decoration-color:initial">libxl: debug: libx=
l_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 hvm</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">libxl: deb=
ug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -vnc</div><=
div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.=
8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norma=
l;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;te=
xt-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(=
255,255,255);text-decoration-style:initial;text-decoration-color:initial">l=
ibxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0<sp=
an>=C2=A0</span><a href=3D"http://127.0.0.1:0/" target=3D"_blank" style=3D"=
color:rgb(17,85,204)">127.0.0.1:0</a>,to=3D9</div><div style=3D"color:rgb(3=
4,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;fo=
nt-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter=
-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-=
space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decora=
tion-style:initial;text-decoration-color:initial">9</div><div style=3D"colo=
r:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:no=
rmal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400=
;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none=
;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text=
-decoration-style:initial;text-decoration-color:initial">libxl: debug: libx=
l_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -display</div><div =
style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;=
font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fo=
nt-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,=
255,255);text-decoration-style:initial;text-decoration-color:initial">libxl=
: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 none</=
div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-siz=
e:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:=
normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0=
px;text-transform:none;white-space:normal;word-spacing:0px;background-color=
:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initi=
al">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=
=A0 -kernel</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: =
Domain 3:=C2=A0 /opt/hvm/vmlinuz</div><div style=3D"color:rgb(34,34,34);fon=
t-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-l=
igatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:nor=
mal;text-align:start;text-indent:0px;text-transform:none;white-space:normal=
;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:i=
nitial;text-decoration-color:initial">-4.4.1</div><div style=3D"color:rgb(3=
4,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;fo=
nt-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter=
-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-=
space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decora=
tion-style:initial;text-decoration-color:initial">libxl: debug: libxl_dm.c:=
2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -initrd</div><div style=3D=
"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-sty=
le:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weigh=
t:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform=
:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255)=
;text-decoration-style:initial;text-decoration-color:initial">libxl: debug:=
 libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 /opt/hvm/ramdi=
sk</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font=
-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-c=
aps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-inde=
nt:0px;text-transform:none;white-space:normal;word-spacing:0px;background-c=
olor:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:i=
nitial">_x86.8.img.gz</div><div style=3D"color:rgb(34,34,34);font-family:ar=
ial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:no=
rmal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-al=
ign:start;text-indent:0px;text-transform:none;white-space:normal;word-spaci=
ng:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text=
-decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>=
local_dm: Domain 3:=C2=A0 -device</div><div style=3D"color:rgb(34,34,34);fo=
nt-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-=
ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:no=
rmal;text-align:start;text-indent:0px;text-transform:none;white-space:norma=
l;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:=
initial;text-decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl_=
_spawn_<wbr>local_dm: Domain 3:=C2=A0 cirrus-vga,vgame</div><div style=3D"c=
olor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style=
:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:=
400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:n=
one;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);t=
ext-decoration-style:initial;text-decoration-color:initial">m_mb=3D8</div><=
div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.=
8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norma=
l;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;te=
xt-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(=
255,255,255);text-decoration-style:initial;text-decoration-color:initial">l=
ibxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -b=
oot</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fon=
t-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-=
caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-ind=
ent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-=
color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:=
initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3=
:=C2=A0 order=3Dcda</div><div style=3D"color:rgb(34,34,34);font-family:aria=
l,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norm=
al;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-alig=
n:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing=
:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-d=
ecoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>lo=
cal_dm: Domain 3:=C2=A0 -smp</div><div style=3D"color:rgb(34,34,34);font-fa=
mily:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligat=
ures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;=
text-align:start;text-indent:0px;text-transform:none;white-space:normal;wor=
d-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initi=
al;text-decoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spaw=
n_<wbr>local_dm: Domain 3:=C2=A0 2,maxcpus=3D2</div><div style=3D"color:rgb=
(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;=
font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;lett=
er-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whit=
e-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-deco=
ration-style:initial;text-decoration-color:initial">libxl: debug: libxl_dm.=
c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -net</div><div style=3D"=
color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-styl=
e:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight=
:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:=
none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);=
text-decoration-style:initial;text-decoration-color:initial">libxl: debug: =
libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 none</div><div =
style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;=
font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fo=
nt-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-t=
ransform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,=
255,255);text-decoration-style:initial;text-decoration-color:initial">libxl=
: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=C2=A0 -machi=
ne</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font=
-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-c=
aps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-inde=
nt:0px;text-transform:none;white-space:normal;word-spacing:0px;background-c=
olor:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:i=
nitial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm: Domain 3:=
=C2=A0 xenfv</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-=
serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font=
-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start=
;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;ba=
ckground-color:rgb(255,255,255);text-decoration-style:initial;text-decorati=
on-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>local_dm:=
 Domain 3:=C2=A0 -m</div><div style=3D"color:rgb(34,34,34);font-family:aria=
l,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norm=
al;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-alig=
n:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing=
:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-d=
ecoration-color:initial">libxl: debug: libxl_dm.c:2245:libxl__spawn_<wbr>lo=
cal_dm: Domain 3:=C2=A0 120</div><div style=3D"color:rgb(34,34,34);font-fam=
ily:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatu=
res:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;t=
ext-align:start;text-indent:0px;text-transform:none;white-space:normal;word=
-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initia=
l;text-decoration-color:initial">libxl: debug: libxl_dm.c:2247:libxl__spawn=
_<wbr>local_dm: Domain 3:Spawning device-mo</div><div style=3D"color:rgb(34=
,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;fon=
t-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-=
spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-s=
pace:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decorat=
ion-style:initial;text-decoration-color:initial">del /usr/bin/qemu-system-i=
386 with additional environment:</div><div style=3D"color:rgb(34,34,34);fon=
t-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-l=
igatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:nor=
mal;text-align:start;text-indent:0px;text-transform:none;white-space:normal=
;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:i=
nitial;text-decoration-color:initial">libxl: debug: libxl_dm.c:2249:libxl__=
spawn_<wbr>local_dm: Domain 3:=C2=A0 XEN_QEMU_CONSOLE</div><div style=3D"co=
lor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:=
normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:4=
00;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);te=
xt-decoration-style:initial;text-decoration-color:initial">_LIMIT=3D1048576=
</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-cap=
s:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent=
:0px;text-transform:none;white-space:normal;word-spacing:0px;background-col=
or:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:ini=
tial">libxl: debug: libxl_event.c:636:libxl__ev_<wbr>xswatch_register: watc=
h w=3D0x1858858 wp</div><div style=3D"color:rgb(34,34,34);font-family:arial=
,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norma=
l;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align=
:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:=
0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-de=
coration-color:initial">ath=3D/local/domain/0/device-<wbr>model/3/state tok=
en=3D3/0: register slotnum=3D3</div><div style=3D"color:rgb(34,34,34);font-=
family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-lig=
atures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:ini=
tial;text-decoration-color:initial">libxl: debug: libxl_create.c:1646:do_do=
main_<wbr>create: Domain 0:ao 0x1855c10: inpro</div><div style=3D"color:rgb=
(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;=
font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;lett=
er-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whit=
e-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-deco=
ration-style:initial;text-decoration-color:initial">gress: poller=3D0x1855c=
a0, flags=3Di</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans=
-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;fon=
t-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:star=
t;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;b=
ackground-color:rgb(255,255,255);text-decoration-style:initial;text-decorat=
ion-color:initial">libxl: debug: libxl_event.c:573:watchfd_<wbr>callback: w=
atch w=3D0x1858858 wpath=3D/local</div><div style=3D"color:rgb(34,34,34);fo=
nt-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-=
ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:no=
rmal;text-align:start;text-indent:0px;text-transform:none;white-space:norma=
l;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:=
initial;text-decoration-color:initial">/domain/0/device-model/3/state token=
=3D3/0: event epath=3D/local/domain/0/device-<wbr>mod</div><div style=3D"co=
lor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:=
normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:4=
00;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);te=
xt-decoration-style:initial;text-decoration-color:initial">el/3/state</div>=
<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
libxl: debug: libxl_exec.c:398:spawn_watch_<wbr>event: domain 3 device mode=
l: spawn w</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-se=
rif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-v=
ariant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;t=
ext-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;back=
ground-color:rgb(255,255,255);text-decoration-style:initial;text-decoration=
-color:initial">atch p=3D(null)</div><div style=3D"color:rgb(34,34,34);font=
-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-li=
gatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norm=
al;text-align:start;text-indent:0px;text-transform:none;white-space:normal;=
word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:in=
itial;text-decoration-color:initial">libxl: debug: libxl_event.c:573:watchf=
d_<wbr>callback: watch w=3D0x1858858 wpath=3D/local</div><div style=3D"colo=
r:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:no=
rmal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400=
;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none=
;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text=
-decoration-style:initial;text-decoration-color:initial">/domain/0/device-m=
odel/3/state token=3D3/0: event epath=3D/local/domain/0/device-<wbr>mod</di=
v><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:=
12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:no=
rmal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px=
;text-transform:none;white-space:normal;word-spacing:0px;background-color:r=
gb(255,255,255);text-decoration-style:initial;text-decoration-color:initial=
">el/3/state</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-=
serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font=
-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start=
;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;ba=
ckground-color:rgb(255,255,255);text-decoration-style:initial;text-decorati=
on-color:initial">libxl: debug: libxl_exec.c:398:spawn_watch_<wbr>event: do=
main 3 device model: spawn w</div><div style=3D"color:rgb(34,34,34);font-fa=
mily:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligat=
ures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;=
text-align:start;text-indent:0px;text-transform:none;white-space:normal;wor=
d-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initi=
al;text-decoration-color:initial">atch p=3Drunning</div><div style=3D"color=
:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:nor=
mal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;=
letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;=
white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-=
decoration-style:initial;text-decoration-color:initial">libxl: debug: libxl=
_event.c:673:libxl__ev_<wbr>xswatch_deregister: watch w=3D0x1858858</div><d=
iv style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8=
px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal=
;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;tex=
t-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(2=
55,255,255);text-decoration-style:initial;text-decoration-color:initial">wp=
ath=3D/local/domain/0/device-<wbr>model/3/state token=3D3/0: deregister slo=
tnum=3D3</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-seri=
f;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-var=
iant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;tex=
t-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;backgr=
ound-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-c=
olor:initial">libxl: debug: libxl_exec.c:129:libxl_report_<wbr>child_exitst=
atus: domain 3 device mo</div><div style=3D"color:rgb(34,34,34);font-family=
:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures=
:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text=
-align:start;text-indent:0px;text-transform:none;white-space:normal;word-sp=
acing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;t=
ext-decoration-color:initial">del (dying as expected) [1812] died due to fa=
tal signal Killed</div><div style=3D"color:rgb(34,34,34);font-family:arial,=
sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal=
;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:=
start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0=
px;background-color:rgb(255,255,255);text-decoration-style:initial;text-dec=
oration-color:initial">libxl: debug: libxl_event.c:686:libxl__ev_<wbr>xswat=
ch_deregister: watch w=3D0x1858858:</div><div style=3D"color:rgb(34,34,34);=
font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-varian=
t-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:=
normal;text-align:start;text-indent:0px;text-transform:none;white-space:nor=
mal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-styl=
e:initial;text-decoration-color:initial">=C2=A0deregister unregistered</div=
><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
2.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:nor=
mal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;=
text-transform:none;white-space:normal;word-spacing:0px;background-color:rg=
b(255,255,255);text-decoration-style:initial;text-decoration-color:initial"=
>libxl: debug: libxl_qmp.c:707:libxl__qmp_<wbr>initialize: Domain 3:connect=
ed to /var/</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial">run/xen/qmp-libxl-3</div><div style=3D"color:rgb(34,34,34)=
;font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-varia=
nt-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing=
:normal;text-align:start;text-indent:0px;text-transform:none;white-space:no=
rmal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-sty=
le:initial;text-decoration-color:initial">libxl: debug: libxl_qmp.c:296:qmp=
_handle_<wbr>response: Domain 3:message type: qmp</div><div style=3D"color:=
rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:norm=
al;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;l=
etter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;w=
hite-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-d=
ecoration-style:initial;text-decoration-color:initial">libxl: debug: libxl_=
qmp.c:556:qmp_send_<wbr>prepare: Domain 3:next qmp command: &#39;{</div><di=
v style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8p=
x;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;=
font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text=
-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(25=
5,255,255);text-decoration-style:initial;text-decoration-color:initial">=C2=
=A0 =C2=A0 &quot;execute&quot;: &quot;qmp_capabilities&quot;,</div><div sty=
le=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;fon=
t-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-=
weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tran=
sform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255=
,255);text-decoration-style:initial;text-decoration-color:initial">=C2=A0 =
=C2=A0 &quot;id&quot;: 1</div><div style=3D"color:rgb(34,34,34);font-family=
:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures=
:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text=
-align:start;text-indent:0px;text-transform:none;white-space:normal;word-sp=
acing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;t=
ext-decoration-color:initial">}</div><div style=3D"color:rgb(34,34,34);font=
-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-li=
gatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norm=
al;text-align:start;text-indent:0px;text-transform:none;white-space:normal;=
word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:in=
itial;text-decoration-color:initial">&#39;</div><div style=3D"color:rgb(34,=
34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font=
-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-s=
pacing:normal;text-align:start;text-indent:0px;text-transform:none;white-sp=
ace:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decorati=
on-style:initial;text-decoration-color:initial">libxl: debug: libxl_qmp.c:2=
96:qmp_handle_<wbr>response: Domain 3:message type: return</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial"><br></div>=
<div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12=
.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:norm=
al;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;t=
ext-transform:none;white-space:normal;word-spacing:0px;background-color:rgb=
(255,255,255);text-decoration-style:initial;text-decoration-color:initial">=
libxl: debug: libxl_qmp.c:556:qmp_send_<wbr>prepare: Domain 3:next qmp comm=
and: &#39;{</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial">=C2=A0 =C2=A0 &quot;execute&quot;: &quot;query-chardev&quo=
t;,</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fon=
t-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-=
caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-ind=
ent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-=
color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:=
initial">=C2=A0 =C2=A0 &quot;id&quot;: 2</div><div style=3D"color:rgb(34,34=
,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-v=
ariant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spa=
cing:normal;text-align:start;text-indent:0px;text-transform:none;white-spac=
e:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration=
-style:initial;text-decoration-color:initial">}</div><div style=3D"color:rg=
b(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal=
;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;let=
ter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whi=
te-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-dec=
oration-style:initial;text-decoration-color:initial">&#39;</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">libxl: deb=
ug: libxl_qmp.c:296:qmp_handle_<wbr>response: Domain 3:message type: return=
</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-s=
ize:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-cap=
s:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent=
:0px;text-transform:none;white-space:normal;word-spacing:0px;background-col=
or:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:ini=
tial"><br></div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-se=
rif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-v=
ariant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;t=
ext-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;back=
ground-color:rgb(255,255,255);text-decoration-style:initial;text-decoration=
-color:initial">libxl: debug: libxl_qmp.c:556:qmp_send_<wbr>prepare: Domain=
 3:next qmp command: &#39;{</div><div style=3D"color:rgb(34,34,34);font-fam=
ily:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatu=
res:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;t=
ext-align:start;text-indent:0px;text-transform:none;white-space:normal;word=
-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initia=
l;text-decoration-color:initial">=C2=A0 =C2=A0 &quot;execute&quot;: &quot;q=
uery-vnc&quot;,</div><div style=3D"color:rgb(34,34,34);font-family:arial,sa=
ns-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;f=
ont-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:st=
art;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px=
;background-color:rgb(255,255,255);text-decoration-style:initial;text-decor=
ation-color:initial">=C2=A0 =C2=A0 &quot;id&quot;: 3</div><div style=3D"col=
or:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:n=
ormal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:40=
0;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:non=
e;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);tex=
t-decoration-style:initial;text-decoration-color:initial">}</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">&#39;</div=
><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
2.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:nor=
mal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;=
text-transform:none;white-space:normal;word-spacing:0px;background-color:rg=
b(255,255,255);text-decoration-style:initial;text-decoration-color:initial"=
>libxl: debug: libxl_qmp.c:296:qmp_handle_<wbr>response: Domain 3:message t=
ype: return</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial"><br></div><div style=3D"color:rgb(34,34,34);font-family:ar=
ial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:no=
rmal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-al=
ign:start;text-indent:0px;text-transform:none;white-space:normal;word-spaci=
ng:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text=
-decoration-color:initial">libxl: debug: libxl_event.c:2194:libxl__ao_<wbr>=
progress_report: ao 0x1855c10: progre</div><div style=3D"color:rgb(34,34,34=
);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-vari=
ant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacin=
g:normal;text-align:start;text-indent:0px;text-transform:none;white-space:n=
ormal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-st=
yle:initial;text-decoration-color:initial">ss report: callback queued aop=
=3D0x18577f0</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-=
serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font=
-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start=
;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;ba=
ckground-color:rgb(255,255,255);text-decoration-style:initial;text-decorati=
on-color:initial">libxl: debug: libxl_event.c:1869:libxl__ao_<wbr>complete:=
 ao 0x1855c10: complete, rc=3D</div><div style=3D"color:rgb(34,34,34);font-=
family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-lig=
atures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:ini=
tial;text-decoration-color:initial">0</div><div style=3D"color:rgb(34,34,34=
);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-vari=
ant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacin=
g:normal;text-align:start;text-indent:0px;text-transform:none;white-space:n=
ormal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-st=
yle:initial;text-decoration-color:initial">libxl: debug: libxl_event.c:1404=
:egc_run_<wbr>callbacks: ao 0x1855c10: progress repor</div><div style=3D"co=
lor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:=
normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:4=
00;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);te=
xt-decoration-style:initial;text-decoration-color:initial">t: callback aop=
=3D0x18577f0</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-=
serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font=
-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start=
;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;ba=
ckground-color:rgb(255,255,255);text-decoration-style:initial;text-decorati=
on-color:initial">libxl: debug: libxl_event.c:1838:libxl__ao__<wbr>destroy:=
 ao 0x1855c10: destroy</div><div style=3D"color:rgb(34,34,34);font-family:a=
rial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:n=
ormal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-a=
lign:start;text-indent:0px;text-transform:none;white-space:normal;word-spac=
ing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;tex=
t-decoration-color:initial">libxl: debug: libxl_qmp.c:707:libxl__qmp_<wbr>i=
nitialize: Domain 3:connected to /var/</div><div style=3D"color:rgb(34,34,3=
4);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-var=
iant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-s=
tyle:initial;text-decoration-color:initial">run/xen/qmp-libxl-3</div><div s=
tyle=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;f=
ont-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fon=
t-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tr=
ansform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,2=
55,255);text-decoration-style:initial;text-decoration-color:initial">libxl:=
 debug: libxl_qmp.c:296:qmp_handle_<wbr>response: Domain 3:message type: qm=
p</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-=
size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-ca=
ps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-inden=
t:0px;text-transform:none;white-space:normal;word-spacing:0px;background-co=
lor:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:in=
itial">libxl: debug: libxl_qmp.c:556:qmp_send_<wbr>prepare: Domain 3:next q=
mp command: &#39;{</div><div style=3D"color:rgb(34,34,34);font-family:arial=
,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norma=
l;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align=
:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:=
0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-de=
coration-color:initial">=C2=A0 =C2=A0 &quot;execute&quot;: &quot;qmp_capabi=
lities&quot;,</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans=
-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;fon=
t-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:star=
t;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;b=
ackground-color:rgb(255,255,255);text-decoration-style:initial;text-decorat=
ion-color:initial">=C2=A0 =C2=A0 &quot;id&quot;: 1</div><div style=3D"color=
:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:nor=
mal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;=
letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;=
white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-=
decoration-style:initial;text-decoration-color:initial">}</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">&#39;</div=
><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
2.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:nor=
mal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;=
text-transform:none;white-space:normal;word-spacing:0px;background-color:rg=
b(255,255,255);text-decoration-style:initial;text-decoration-color:initial"=
>libxl: debug: libxl_qmp.c:296:qmp_handle_<wbr>response: Domain 3:message t=
ype: return</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial"><br></div><div style=3D"color:rgb(34,34,34);font-family:ar=
ial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:no=
rmal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-al=
ign:start;text-indent:0px;text-transform:none;white-space:normal;word-spaci=
ng:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text=
-decoration-color:initial">libxl: debug: libxl_qmp.c:556:qmp_send_<wbr>prep=
are: Domain 3:next qmp command: &#39;{</div><div style=3D"color:rgb(34,34,3=
4);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-var=
iant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spaci=
ng:normal;text-align:start;text-indent:0px;text-transform:none;white-space:=
normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-s=
tyle:initial;text-decoration-color:initial">=C2=A0 =C2=A0 &quot;execute&quo=
t;: &quot;cont&quot;,</div><div style=3D"color:rgb(34,34,34);font-family:ar=
ial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:no=
rmal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-al=
ign:start;text-indent:0px;text-transform:none;white-space:normal;word-spaci=
ng:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text=
-decoration-color:initial">=C2=A0 =C2=A0 &quot;id&quot;: 2</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">}</div><di=
v style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8p=
x;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;=
font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text=
-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(25=
5,255,255);text-decoration-style:initial;text-decoration-color:initial">&#3=
9;</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font=
-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-c=
aps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-inde=
nt:0px;text-transform:none;white-space:normal;word-spacing:0px;background-c=
olor:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:i=
nitial">libxl: debug: libxl_qmp.c:296:qmp_handle_<wbr>response: Domain 3:me=
ssage type: return</div><div style=3D"color:rgb(34,34,34);font-family:arial=
,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norma=
l;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align=
:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:=
0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-de=
coration-color:initial"><br></div><div style=3D"color:rgb(34,34,34);font-fa=
mily:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligat=
ures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;=
text-align:start;text-indent:0px;text-transform:none;white-space:normal;wor=
d-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initi=
al;text-decoration-color:initial">(d3) HVM Loader</div><div style=3D"color:=
rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:norm=
al;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;l=
etter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;w=
hite-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-d=
ecoration-style:initial;text-decoration-color:initial">(d3) Detected Xen v4=
.9-unstable</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-s=
erif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-=
variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;=
text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;bac=
kground-color:rgb(255,255,255);text-decoration-style:initial;text-decoratio=
n-color:initial">(d3) Xenbus rings @0xfeffc000, event channel 1</div><div s=
tyle=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;f=
ont-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fon=
t-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tr=
ansform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,2=
55,255);text-decoration-style:initial;text-decoration-color:initial">(d3) S=
ystem requested SeaBIOS</div><div style=3D"color:rgb(34,34,34);font-family:=
arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:=
normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-=
align:start;text-indent:0px;text-transform:none;white-space:normal;word-spa=
cing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;te=
xt-decoration-color:initial">(d3) CPU speed is 1333 MHz</div><div style=3D"=
color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-styl=
e:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight=
:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:=
none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);=
text-decoration-style:initial;text-decoration-color:initial">(d3) Relocatin=
g guest memory for lowmem MMIO space disabled</div><div style=3D"color:rgb(=
34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;f=
ont-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;lette=
r-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white=
-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decor=
ation-style:initial;text-decoration-color:initial">(XEN) irq.c:275: Dom3 PC=
I link 0 changed 0 -&gt; 5</div><div style=3D"color:rgb(34,34,34);font-fami=
ly:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatur=
es:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;te=
xt-align:start;text-indent:0px;text-transform:none;white-space:normal;word-=
spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial=
;text-decoration-color:initial">(d3) PCI-ISA link 0 routed to IRQ5</div><di=
v style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8p=
x;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;=
font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text=
-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(25=
5,255,255);text-decoration-style:initial;text-decoration-color:initial">(XE=
N) irq.c:275: Dom3 PCI link 1 changed 0 -&gt; 10</div><div style=3D"color:r=
gb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:norma=
l;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;le=
tter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;wh=
ite-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-de=
coration-style:initial;text-decoration-color:initial">(d3) PCI-ISA link 1 r=
outed to IRQ10</div><div style=3D"color:rgb(34,34,34);font-family:arial,san=
s-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;fo=
nt-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:sta=
rt;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;=
background-color:rgb(255,255,255);text-decoration-style:initial;text-decora=
tion-color:initial">(XEN) irq.c:275: Dom3 PCI link 2 changed 0 -&gt; 11</di=
v><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:=
12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:no=
rmal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px=
;text-transform:none;white-space:normal;word-spacing:0px;background-color:r=
gb(255,255,255);text-decoration-style:initial;text-decoration-color:initial=
">(d3) PCI-ISA link 2 routed to IRQ11</div><div style=3D"color:rgb(34,34,34=
);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-vari=
ant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacin=
g:normal;text-align:start;text-indent:0px;text-transform:none;white-space:n=
ormal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-st=
yle:initial;text-decoration-color:initial">(XEN) irq.c:275: Dom3 PCI link 3=
 changed 0 -&gt; 5</div><div style=3D"color:rgb(34,34,34);font-family:arial=
,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norma=
l;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align=
:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:=
0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-de=
coration-color:initial">(d3) PCI-ISA link 3 routed to IRQ5</div><div style=
=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-=
style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-we=
ight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transf=
orm:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,2=
55);text-decoration-style:initial;text-decoration-color:initial">(d3) pci d=
ev 01:3 INTA-&gt;IRQ10</div><div style=3D"color:rgb(34,34,34);font-family:a=
rial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:n=
ormal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-a=
lign:start;text-indent:0px;text-transform:none;white-space:normal;word-spac=
ing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;tex=
t-decoration-color:initial">(d3) pci dev 02:0 INTA-&gt;IRQ11</div><div styl=
e=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font=
-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-w=
eight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-trans=
form:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,=
255);text-decoration-style:initial;text-decoration-color:initial">(XEN) d3v=
0 Triple fault - invoking HVM shutdown action 1</div><div style=3D"color:rg=
b(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal=
;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;let=
ter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;whi=
te-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-dec=
oration-style:initial;text-decoration-color:initial">(XEN) *** Dumping Dom3=
 vcpu#0 state: ***</div><div style=3D"color:rgb(34,34,34);font-family:arial=
,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norma=
l;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align=
:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:=
0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-de=
coration-color:initial">(XEN) ----[ Xen-4.9-unstable=C2=A0 x86_64=C2=A0 deb=
ug=3Dy=C2=A0 =C2=A0Not tainted ]----</div><div style=3D"color:rgb(34,34,34)=
;font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-varia=
nt-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing=
:normal;text-align:start;text-indent:0px;text-transform:none;white-space:no=
rmal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-sty=
le:initial;text-decoration-color:initial">(XEN) CPU:=C2=A0 =C2=A0 1</div><d=
iv style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8=
px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal=
;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;tex=
t-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(2=
55,255,255);text-decoration-style:initial;text-decoration-color:initial">(X=
EN) RIP:=C2=A0 =C2=A0 0018:[&lt;0000000000105153&gt;]</div><div style=3D"co=
lor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:=
normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:4=
00;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);te=
xt-decoration-style:initial;text-decoration-color:initial">(XEN) RFLAGS: 00=
00000000010046=C2=A0 =C2=A0CONTEXT: hvm guest (d3v0)</div><div style=3D"col=
or:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:n=
ormal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:40=
0;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:non=
e;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);tex=
t-decoration-style:initial;text-decoration-color:initial">(XEN) rax: 000000=
0000000000=C2=A0 =C2=A0rbx: 0000000000007800=C2=A0 =C2=A0rcx: 0000000000000=
000</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fon=
t-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-=
caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-ind=
ent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-=
color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:=
initial">(XEN) rdx: 0000000000000000=C2=A0 =C2=A0rsi: 000000000c000000=C2=
=A0 =C2=A0rdi: 000000000009f800</div><div style=3D"color:rgb(34,34,34);font=
-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-li=
gatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norm=
al;text-align:start;text-indent:0px;text-transform:none;white-space:normal;=
word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:in=
itial;text-decoration-color:initial">(XEN) rbp: 000000000000ffff=C2=A0 =C2=
=A0rsp: 000000000012f700=C2=A0 =C2=A0r8:=C2=A0 0000000000000000</div><div s=
tyle=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;f=
ont-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fon=
t-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tr=
ansform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,2=
55,255);text-decoration-style:initial;text-decoration-color:initial">(XEN) =
r9:=C2=A0 0000000000000000=C2=A0 =C2=A0r10: 0000000000000000=C2=A0 =C2=A0r1=
1: 0000000000000000</div><div style=3D"color:rgb(34,34,34);font-family:aria=
l,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:norm=
al;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-alig=
n:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing=
:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-d=
ecoration-color:initial">(XEN) r12: 0000000000000000=C2=A0 =C2=A0r13: 00000=
00000000000=C2=A0 =C2=A0r14: 0000000000000000</div><div style=3D"color:rgb(=
34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;f=
ont-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;lette=
r-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white=
-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decor=
ation-style:initial;text-decoration-color:initial">(XEN) r15: 0000000000000=
000=C2=A0 =C2=A0cr0: 0000000000000011=C2=A0 =C2=A0cr4: 0000000000000000</di=
v><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:=
12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:no=
rmal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px=
;text-transform:none;white-space:normal;word-spacing:0px;background-color:r=
gb(255,255,255);text-decoration-style:initial;text-decoration-color:initial=
">(XEN) cr3: 0000000000000000=C2=A0 =C2=A0cr2: 0000000000000000</div><div s=
tyle=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;f=
ont-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;fon=
t-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-tr=
ansform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,2=
55,255);text-decoration-style:initial;text-decoration-color:initial">(XEN) =
ds: 0020=C2=A0 =C2=A0es: 0020=C2=A0 =C2=A0fs: 0020=C2=A0 =C2=A0gs: 0020=C2=
=A0 =C2=A0ss: 0020=C2=A0 =C2=A0cs: 0018</div><div style=3D"color:rgb(34,34,=
34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-va=
riant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spac=
ing:normal;text-align:start;text-indent:0px;text-transform:none;white-space=
:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-=
style:initial;text-decoration-color:initial">xencall:buffer: debug: total a=
llocations:183 total releases:183</div><div style=3D"color:rgb(34,34,34);fo=
nt-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-=
ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:no=
rmal;text-align:start;text-indent:0px;text-transform:none;white-space:norma=
l;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:=
initial;text-decoration-color:initial">xencall:buffer: debug: current alloc=
ations:0 maximum allocations:3</div><div style=3D"color:rgb(34,34,34);font-=
family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-lig=
atures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:norma=
l;text-align:start;text-indent:0px;text-transform:none;white-space:normal;w=
ord-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:ini=
tial;text-decoration-color:initial">xencall:buffer: debug: cache current si=
ze:3</div><div style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;fo=
nt-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant=
-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-in=
dent:0px;text-transform:none;white-space:normal;word-spacing:0px;background=
-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color=
:initial">xencall:buffer: debug: cache hits:167 misses:3 toobig:13</div><di=
v style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8p=
x;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;=
font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text=
-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(25=
5,255,255);text-decoration-style:initial;text-decoration-color:initial">xen=
call:buffer: debug: total allocations:0 total releases:0</div><div style=3D=
"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-sty=
le:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weigh=
t:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform=
:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255)=
;text-decoration-style:initial;text-decoration-color:initial">xencall:buffe=
r: debug: current allocations:0 maximum allocations:0</div><div style=3D"co=
lor:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:=
normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:4=
00;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:no=
ne;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);te=
xt-decoration-style:initial;text-decoration-color:initial">xencall:buffer: =
debug: cache current size:0</div><div style=3D"color:rgb(34,34,34);font-fam=
ily:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatu=
res:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;t=
ext-align:start;text-indent:0px;text-transform:none;white-space:normal;word=
-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initia=
l;text-decoration-color:initial">xencall:buffer: debug: cache hits:0 misses=
:0 toobig:0</div>

<br></div><div hspace=3D"streak-pt-mark" style=3D"max-height:1px"><img alt=
=3D"" style=3D"width:0px;max-height:0px;overflow:hidden" src=3D"https://mai=
lfoogae.appspot.com/t?sender=3DaaW5neS5zZi4xMUBnbWFpbC5jb20%3D&amp;type=3Dz=
erocontent&amp;guid=3Dab3e90f7-2f75-49db-ad94-b436f90c0206"><font color=3D"=
#ffffff" size=3D"1">=E1=90=A7</font></div>

--001a11422fa823930b0564017155--


--===============1788108040691828457==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============1788108040691828457==--


From xen-users-bounces@lists.xenproject.org Wed Jan 31 12:32:10 2018
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 31 Jan 2018 12:32:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.84_2)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1egrXQ-00088n-Kt; Wed, 31 Jan 2018 12:30:52 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from
 <srs0=qunm=e2=gmail.com=drhunter95@srs-us1.protection.inumbo.net>)
 id 1egrXQ-00088h-5R
 for xen-users@lists.xenproject.org; Wed, 31 Jan 2018 12:30:52 +0000
X-Inumbo-ID: 89bb4b77-0682-11e8-ba59-bc764e045a96
Received: from mail-wr0-x22f.google.com (unknown [2a00:1450:400c:c0c::22f])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 89bb4b77-0682-11e8-ba59-bc764e045a96;
 Wed, 31 Jan 2018 13:30:36 +0100 (CET)
Received: by mail-wr0-x22f.google.com with SMTP id s5so14796680wra.0
 for <xen-users@lists.xenproject.org>; Wed, 31 Jan 2018 04:30:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=message-id:mime-version:to:from:subject:date:importance;
 bh=69ZBYUTto0keB7OSJT//RgWO90NTwLrk2LuETF8SKxE=;
 b=LURZNW3q/8YphfsdggIqo6YMNDlwgck8jzn2j1sgS1RXOQ/BSboMrQD9840qu9H1S6
 9jHSxJxdQ2x5zgypTO9EEKzqz3daG/VVyQSP1rHlbGQhYIS2f4Yzkwf5HUfb3QRJWC9w
 skH0B0mY3nl43EEx1GzTcmwPkq9VgF7cFqXa5fTJo+X0q66mkv5hxwZ68BDQcZyngNb5
 uhzLq7YiKBIhAF4w8XsTASnUbMcxnnEs0JjTifXxCi4GJ5c96fu4nUIgR+/kksQ17K6j
 zTk8bKom0hQ6A+2J1RoyqvVbGxPEyRNaCtrWOy1x4y5fO2kI1qs7gyIKnXzoyCN6QtG5
 8sQw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:message-id:mime-version:to:from:subject:date
 :importance;
 bh=69ZBYUTto0keB7OSJT//RgWO90NTwLrk2LuETF8SKxE=;
 b=biAyROMmPIfwn2gZ8gTogRKYpbRC7TCEcKJBBTshP8rZjx3SY2R4dRglvBhvxcOWhB
 f86CoEtkjA2FChOD72MBkZ5P2/+mh2jDXQ4jQF6Zx7hIZI6GcPP4Taz6+rm45uXhyTC9
 K4nYyC4yq/sd85o01i4sW/SNJP9iw2cWmR+kNnPxqSu8kIO8d9DQKJuebxsqH6Taxm84
 qHUx5ufw6OAL5103947+sS6a3IMF2k/LOK3cuG4ASMzYjRRTOWXYZkqBbinYDuuc4OqS
 IdnO+jEt0ITIzyISCF/zHNEEqR7N2PdcmvLBUjMbr2blPcmruGb7gCjPZsK3xQkTakRy
 J3QA==
X-Gm-Message-State: AKwxytc0Pv8EBUTRP3Qgt1OK9aA+cGQtsr5JlkAgotKYntnxEQFLI6wr
 qrt63WRYOq/Tx7q1Hj80KetaCeiN
X-Google-Smtp-Source: AH8x2254AQtok1YzDjvZhwZMEt5BoQiNXQJKZtLqi85/zsrt2N2xmR5MsXubwLjb/YERZ9+3x/Ulaw==
X-Received: by 10.223.176.211 with SMTP id j19mr17640270wra.60.1517401849478; 
 Wed, 31 Jan 2018 04:30:49 -0800 (PST)
Received: from ?IPv6:::ffff:192.168.1.86?
 (host109-150-226-133.range109-150.btcentralplus.com. [109.150.226.133])
 by smtp.gmail.com with ESMTPSA id 44sm28241574wrv.0.2018.01.31.04.30.47
 for <xen-users@lists.xenproject.org>
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Wed, 31 Jan 2018 04:30:48 -0800 (PST)
Message-ID: <5a71b6f8.2f86df0a.1320a.3c62@mx.google.com>
MIME-Version: 1.0
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
From: Iain Hunter <drhunter95@gmail.com>
Date: Wed, 31 Jan 2018 12:30:51 +0000
Importance: normal
X-Priority: 3
Subject: [Xen-users] Xen 4.8.3 running on BeagleBoard X-15 - problem with
	paging
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6419419939524720826=="
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--===============6419419939524720826==
Content-Type: multipart/alternative;
	boundary="_FE181DD9-C926-400F-8993-FB2BF075B4E6_"

--_FE181DD9-C926-400F-8993-FB2BF075B4E6_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

Hi,
I am trying to run xen 4.8.3 on BeagleBoard X-15. When switching the pc to =
a virtual address (label paging: in head.s) I get an abort. This is seen si=
ngle stepping.

- Xen is build with CONFIG_EARLY_PRINTK=3Domap5432 ( as it uses same uart a=
s omap5432 and different to dra7xx)
- Uboot is built as standard from https://eewiki.net/display/linuxonarm/Bea=
gleBoard-X15#BeagleBoard-X15-Bootloader:U-Boot. This brings up A15 in hyper=
visor mode
- Device tree is built with addition of
+        chosen {
+                xen,dom0-bootargs =3D "console=3Dhvc0,115200n8", "earlypri=
ntk=3Dxen", "debug", "loglevel=3Ddebug", "root=3D/dev/nfs", "nfsroot=3D192.=
168.1.231:/home/iain/Desktop/work/bosch/x15-xen/fs/debian-9.3-minimal-armhf=
-2017-12-09/rootfs,nolock", "rootwait", "fixrtc";
+                xen,xen-bootargs =3D "sync_console", "console=3Ddtuart", "=
dtuart=3D/ocp/serial@48020000";
+                stdout-path =3D "/ocp/serial@48020000";
+                modules {
+                        #size-cells =3D <0x00000001>;
+                        #address-cells =3D <0x00000001>;
+                        module@0 {
+                                reg =3D <0xa0000000 0x00a00000>;
+                                compatible =3D "xen,linux-zimage", "xen,mu=
ltiboot-module";
+                        };
+                };
+        };
=20

Has anyone build xen for x-15?
Any tips to debug the virtual addressing?

Thanks, Iain

Sent from Mail for Windows 10


--_FE181DD9-C926-400F-8993-FB2BF075B4E6_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta ht=
tp-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta name=
=3DGenerator content=3D"Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:546725315;
	mso-list-type:hybrid;
	mso-list-template-ids:-1452225148 -1 134807555 134807557 134807553 1348075=
55 134807557 134807553 134807555 134807557;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style></head><body lang=3DEN-GB link=3Dblue vlink=3D"#954F72"><div cla=
ss=3DWordSection1><p class=3DMsoNormal>Hi,</p><p class=3DMsoNormal>I am try=
ing to run xen 4.8.3 on BeagleBoard X-15. When switching the pc to a virtua=
l address (label paging: in head.s) I get an abort. This is seen single ste=
pping.</p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><ul style=3D'margin-top=
:0cm' type=3Ddisc><li class=3DMsoListParagraph style=3D'margin-left:0cm;mso=
-list:l0 level1 lfo1'>Xen is build with CONFIG_EARLY_PRINTK=3Domap5432 ( as=
 it uses same uart as omap5432 and different to dra7xx)</li><li class=3DMso=
ListParagraph style=3D'margin-left:0cm;mso-list:l0 level1 lfo1'>Uboot is bu=
ilt as standard from <a href=3D"https://eewiki.net/display/linuxonarm/Beagl=
eBoard-X15#BeagleBoard-X15-Bootloader:U-Boot">https://eewiki.net/display/li=
nuxonarm/BeagleBoard-X15#BeagleBoard-X15-Bootloader:U-Boot</a>. This brings=
 up A15 in hypervisor mode</li><li class=3DMsoListParagraph style=3D'margin=
-left:0cm;mso-list:l0 level1 lfo1'>Device tree is built with addition of</l=
i></ul><p class=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 chosen {</p><p class=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 xen,dom0-boota=
rgs =3D &quot;console=3Dhvc0,115200n8&quot;, &quot;earlyprintk=3Dxen&quot;,=
 &quot;debug&quot;, &quot;loglevel=3Ddebug&quot;, &quot;root=3D/dev/nfs&quo=
t;, &quot;nfsroot=3D192.168.1.231:/home/iain/Desktop/work/bosch/x15-xen/fs/=
debian-9.3-minimal-armhf-2017-12-09/rootfs,nolock&quot;, &quot;rootwait&quo=
t;, &quot;fixrtc&quot;;</p><p class=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 xe=
n,xen-bootargs =3D &quot;sync_console&quot;, &quot;console=3Ddtuart&quot;, =
&quot;dtuart=3D/ocp/serial@48020000&quot;;</p><p class=3DMsoListParagraph>+=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 stdout-path =3D &quot;/ocp/serial@48020000&quot;;</p><p cla=
ss=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 modules {</p><p class=3DMsoListPara=
graph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #s=
ize-cells =3D &lt;0x00000001&gt;;</p><p class=3DMsoListParagraph>+=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 #address-cells =3D &=
lt;0x00000001&gt;;</p><p class=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 module@0 {</p><p class=3DMsoListPar=
agraph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 reg =3D &lt;0xa0000000 0x00a0=
0000&gt;;</p><p class=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 compatible =3D &quot;xen,linux-zimage&quot;, &quot;xen,multiboot-module=
&quot;;</p><p class=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0};</p><p class=3DMsoListParagraph>+=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 };</p><p class=3DMsoListParagraph>+=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 };</p><p class=3DMsoNormal> </p><p class=3DMsoNormal><o:p>&nbs=
p;</o:p></p><p class=3DMsoNormal>Has anyone build xen for x-15?</p><p class=
=3DMsoNormal>Any tips to debug the virtual addressing?</p><p class=3DMsoNor=
mal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Thanks, Iain</p><p class=3DMs=
oNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Sent from <a href=3D"http=
s://go.microsoft.com/fwlink/?LinkId=3D550986">Mail</a> for Windows 10</p><p=
 class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>=

--_FE181DD9-C926-400F-8993-FB2BF075B4E6_--



--===============6419419939524720826==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLXVzZXJz
IG1haWxpbmcgbGlzdApYZW4tdXNlcnNAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0
cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi11c2Vycw==

--===============6419419939524720826==--



