From xen-users-bounces@lists.xenproject.org Mon Jun 01 16:39:36 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2020 16:39:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jfnRM-0002CL-R6; Mon, 01 Jun 2020 16:37:32 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=xY04=7O=gmail.com=m.l.hargreaves@srs-us1.protection.inumbo.net>)
 id 1jfhKz-0005nt-P5
 for xen-users@lists.xenproject.org; Mon, 01 Jun 2020 10:06:33 +0000
X-Inumbo-ID: 91a65732-a3ef-11ea-9dbe-bc764e2007e4
Received: from mail-wm1-x332.google.com (unknown [2a00:1450:4864:20::332])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 91a65732-a3ef-11ea-9dbe-bc764e2007e4;
 Mon, 01 Jun 2020 10:06:33 +0000 (UTC)
Received: by mail-wm1-x332.google.com with SMTP id u13so10133191wml.1
 for <xen-users@lists.xenproject.org>; Mon, 01 Jun 2020 03:06:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:to:subject:message-id:date:user-agent:mime-version
 :content-language:content-transfer-encoding;
 bh=IRbHnJMYmDvAdpFui5rW8ChlHbl97aLbSpC7WKPfe7w=;
 b=iwZwuRAAB7ky7mYDBpr1GaFZdm/KoMNLofTA3NrUYvPVTrdTwWa4K8SVsvFRohm+BS
 ziR7o5xjFOV07cZU6HbH++lMYB2iqIw7w+DsDoMEjr54YS8+VUH4QXtvC9bpkFkhKFNb
 /fMs74AXmH+g+nLU1txfyYQ5pcZ5ZMTdFN+8tfDg7nCa1qKWpp8HJyvuA7QomZWxg7BM
 4BHE/MVmm7hVmR3BvcKl64lASC9vn91GbRGNnXLApnQfuZfi1aSWr1P6kicmZGAD17Tx
 2pybJtAftbDvlKDo7SjKR8zrXnh0CneRGtqxVXfnV15pqgUQN6GkkZcbXTUkZw/ZXjDp
 5Tww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:to:subject:message-id:date:user-agent
 :mime-version:content-language:content-transfer-encoding;
 bh=IRbHnJMYmDvAdpFui5rW8ChlHbl97aLbSpC7WKPfe7w=;
 b=KCd6cKbZ1sazFa/EwMlUxFsKRAG4Xbzugl0TFzPCkuQCbapfDrBp8N0PKfzIGrV02K
 vFnjrWGMK8+1jOmLvDAq6+tpz8mKmku4y3dP2twykhOZuZtWE0MdgMGquhoArQI7U/gF
 oHnCm6ghjEr4ILqVa99Oo11hZHBzMvAkKZw+oKJSjrGJr5ehcVuRieSN5fetj7jxR5/r
 8+/wwTYpHJ3GJfgsgGEF+viDTSOU9ZGUbiisKXt/LyiFXdTaOqH62ZFGPN6241yET8Qv
 5+gilB4VevpnIcgY+lCeQjyuxyl+Uzs4gmPt1Pmor3L4BZ95N8l7fpAtfxdHh2/1tOd5
 fKlA==
X-Gm-Message-State: AOAM5313lEUVd/CEWxfl3idjqK/f7KGPsgIqeQqgwj6hu9EDlKFOM20S
 WEb6BtFbttNaQpNVNXpzvAGC2q22ynE=
X-Google-Smtp-Source: ABdhPJyj4DT+vf1A3iy4SLazUv3NfCe9X9Uv7JzuR2EqTFQhFFjG98C40o90QwiwJLlGJFZpPu7Y1A==
X-Received: by 2002:a05:600c:146:: with SMTP id
 w6mr20210464wmm.97.1591005990890; 
 Mon, 01 Jun 2020 03:06:30 -0700 (PDT)
Received: from [192.168.0.20]
 (cpc112441-pres20-2-0-cust437.18-3.cable.virginm.net. [86.17.33.182])
 by smtp.gmail.com with ESMTPSA id h74sm21484969wrh.76.2020.06.01.03.06.30
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 01 Jun 2020 03:06:30 -0700 (PDT)
From: Martin Hargreaves <m.l.hargreaves@gmail.com>
To: xen-users@lists.xenproject.org
Subject: Where best to start
Message-ID: <a2aaef98-59b3-e3dd-c257-587eb7f7e507@gmail.com>
Date: Mon, 1 Jun 2020 11:06:29 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Mailman-Approved-At: Mon, 01 Jun 2020 16:37:31 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


Dear Xen Community,

I’m new to the field of virtualization so please excuse this request if 
it is placed on the incorrect forum.

I am running Ubuntu 18.04 and following the instructions on...

https://help.ubuntu.com/community/Xen

and not getting anywhere fast. I found out that the above instructions 
are out of date for Ubuntu 18.04, because the networking has been 
implemented differently

https://askubuntu.com/questions/1171864/how-to-install-xen-project-on-ubuntu-server-18-04-3-lts

However, when I make this change my machine can no longer access the 
internet.

I have searched on https://xen.markmail.org/ but not really found a 
clear answer to my question:

Please can anyone let me know the best way to get Xen up and running on 
Ubuntu? Should I try to put Ubuntu 16.04 on my m/c and then follow the 
instructions given?

And for the best tutorial? I have seen that there is “The Definitive 
Guide to the Xen Hypervisor” by David Chisnall (2008)  and “Running Xen: 
A Hands-on Guide to the Art of Virtualization” by Jenna Matthews et. Al 
(2008) but will these help with installing and using the current version?

   Thank you for any insights that anyone may have.

     Martin...


From xen-users-bounces@lists.xenproject.org Mon Jun 01 21:37:33 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Jun 2020 21:37:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jfs6U-0004HI-EB; Mon, 01 Jun 2020 21:36:18 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GBWE=7O=telus.net=davehill@srs-us1.protection.inumbo.net>)
 id 1jfs6T-0004HD-2F
 for xen-users@lists.xenproject.org; Mon, 01 Jun 2020 21:36:17 +0000
X-Inumbo-ID: eb1cb5d0-a44f-11ea-ab5f-12813bfff9fa
Received: from cmta20.telus.net (unknown [209.171.16.93])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id eb1cb5d0-a44f-11ea-ab5f-12813bfff9fa;
 Mon, 01 Jun 2020 21:36:15 +0000 (UTC)
Received: from [192.168.2.13] ([173.181.74.129]) by cmsmtp with SMTP
 id fs6Oj6ERxdVYHfs6Pj7MJP; Mon, 01 Jun 2020 15:36:14 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telus.net; s=neo;
 t=1591047374; bh=gu9uQKOMkT+GIs4BGedcNBBVfKvWMNsG4HdF0FaiSwc=;
 h=Subject:To:References:From:Date:In-Reply-To;
 b=x4NDBxGNZJcVI6gAiLzIdPkXZIczQehbd9cWySW3Zqz8GmHspBzBvSWzFpgK7Ws8n
 H+c9QcNjN+v1YZ+G7Qj1vepZ6iciuusWXhm3L3au+2ceOhmn223I6YbVy3UBXH4I7b
 lPYRhzuAgJPM+wx5O4izgIUkrH/mUZR0rWyZ/MsGVbRAqKPBEJEiwPSsSo8QwmC+EM
 aF3bTF/gFsUdqMAKNPxbgSAq/BSqw624F8MpAioR5olUmjFo/0nB89XQ4g50/tno15
 7YvpiBZP383FFzD9UufnJJ7j4bw/3U2LMdx2B/XBWIe0SfEFLJPLWF3BWn/haDWH3I
 ggdMleK5ZbrdA==
X-Telus-Authed: ZGF2ZWhpbGxAdGVsdXMubmV0
X-Authority-Analysis: v=2.3 cv=Y5CGTSWN c=1 sm=1 tr=0
 a=dDDs8EMPbAqg94jd+XLA8Q==:117 a=dDDs8EMPbAqg94jd+XLA8Q==:17
 a=r77TgQKjGQsHNAKrUKIA:9 a=cWRNjhkoAAAA:8 a=fxJcL_dCAAAA:8 a=aVOpYb8tAAAA:8
 a=yON4etAAAAAA:8 a=086KAu0UQERNveK1OZkA:9 a=QEXdDO2ut3YA:10 a=pGLkceISAAAA:8
 a=U2Tqf_r_GwrfH8dYNpsA:9 a=ZUiXrzAbnJZjhJ-_:21 a=_W_S_7VecoQA:10
 a=sVa6W5Aao32NNC1mekxh:22 a=MsI-R6I7--vs3VLjpA_A:22
Subject: Re: Where best to start
To: xen-users@lists.xenproject.org
References: <a2aaef98-59b3-e3dd-c257-587eb7f7e507@gmail.com>
From: Dave Hill <davehill@telus.net>
Message-ID: <d49eb43e-6e99-6f6b-30d3-8913c0e99f89@telus.net>
Date: Mon, 1 Jun 2020 14:36:12 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <a2aaef98-59b3-e3dd-c257-587eb7f7e507@gmail.com>
Content-Type: multipart/alternative;
 boundary="------------280B4D3CA81D267FEFBF5165"
Content-Language: en-US
X-CMAE-Envelope: MS4wfCvlWHHASEK8foGRvlgtv37jr6E25u2HjFwi6ilq8P866j2R7r46YTGu9ezj7hcqqlCBGjTQYr7CoIBfnKx1ufDreqNPg3cUxg1m3ZgrfBZ+MQduTZ3V
 2WT4BBBacobC4kBxjqoXwbA74Thfmk7qGOeosfCWIc+xfmExqRq1WAlEA50ZyjY862jfcFsj4T3Dng==
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------280B4D3CA81D267FEFBF5165
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

I'm not a Ubuntu user so can't help there but the first thing I would do 
generically is check that the bridge is working:

brctl show

should yield something like this:

     bridge name bridge id               STP enabled     interfaces
     xenbr0          8000.4ccc6ad1847d       no enp2s0

As for a tutorial, I'd suggest at least having a look through the Xen 
Begginers Guide:

https://wiki.xenproject.org/wiki/Xen_Project_Beginners_Guide

It's dated (in particular, I wouldn't follow the advice there for 
building a PV Debian guest), but it contains the essentials to get Xen 
working generically.

Also, since your network stopped working, I'd go back and check that 
your netplan configuration matches the one in the link you sent. The key 
is that dhcp is not enabled on the ethernet card (eth0 or enps0 or 
whatever), but rather on the bridge.

David

On 2020-06-01 3:06 a.m., Martin Hargreaves wrote:
>
> Dear Xen Community,
>
> I’m new to the field of virtualization so please excuse this request 
> if it is placed on the incorrect forum.
>
> I am running Ubuntu 18.04 and following the instructions on...
>
> https://help.ubuntu.com/community/Xen
>
> and not getting anywhere fast. I found out that the above instructions 
> are out of date for Ubuntu 18.04, because the networking has been 
> implemented differently
>
> https://askubuntu.com/questions/1171864/how-to-install-xen-project-on-ubuntu-server-18-04-3-lts 
>
>
> However, when I make this change my machine can no longer access the 
> internet.
>
> I have searched on https://xen.markmail.org/ but not really found a 
> clear answer to my question:
>
> Please can anyone let me know the best way to get Xen up and running 
> on Ubuntu? Should I try to put Ubuntu 16.04 on my m/c and then follow 
> the instructions given?
>
> And for the best tutorial? I have seen that there is “The Definitive 
> Guide to the Xen Hypervisor” by David Chisnall (2008) and “Running 
> Xen: A Hands-on Guide to the Art of Virtualization” by Jenna Matthews 
> et. Al (2008) but will these help with installing and using the 
> current version?
>
>   Thank you for any insights that anyone may have.
>
>     Martin...
>

--------------280B4D3CA81D267FEFBF5165
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <p><font face="Helvetica, Arial, sans-serif">I'm not a Ubuntu user
        so can't help there but the first thing I would do generically
        is check that the bridge is working:</font></p>
    <p><font face="Helvetica, Arial, sans-serif">brctl show</font></p>
    <p><font face="Helvetica, Arial, sans-serif">should yield something
        like this:</font></p>
    <p><font face="Helvetica, Arial, sans-serif">    bridge name    
        bridge id               STP enabled     interfaces<br>
            xenbr0          8000.4ccc6ad1847d       no             
        enp2s0<br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">As for a tutorial, I'd
        suggest at least having a look through the Xen Begginers Guide:</font></p>
    <p><a class="moz-txt-link-freetext" href="https://wiki.xenproject.org/wiki/Xen_Project_Beginners_Guide">https://wiki.xenproject.org/wiki/Xen_Project_Beginners_Guide</a><br>
      <font face="Helvetica, Arial, sans-serif"> </font></p>
    <p><font face="Helvetica, Arial, sans-serif">It's dated (in
        particular, I wouldn't follow the advice there for building a PV
        Debian guest), but it contains the essentials to get Xen working
        generically. <br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">Also, since your
        network stopped working, I'd go back and check that your netplan
        configuration matches the one in the link you sent. The key is
        that dhcp is not enabled on the ethernet card (eth0 or enps0 or
        whatever), but rather on the bridge. <br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">David<br>
      </font></p>
    <div class="moz-cite-prefix">On 2020-06-01 3:06 a.m., Martin
      Hargreaves wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:a2aaef98-59b3-e3dd-c257-587eb7f7e507@gmail.com">
      <br>
      Dear Xen Community,
      <br>
      <br>
      I’m new to the field of virtualization so please excuse this
      request if it is placed on the incorrect forum.
      <br>
      <br>
      I am running Ubuntu 18.04 and following the instructions on...
      <br>
      <br>
      <a class="moz-txt-link-freetext" href="https://help.ubuntu.com/community/Xen">https://help.ubuntu.com/community/Xen</a>
      <br>
      <br>
      and not getting anywhere fast. I found out that the above
      instructions are out of date for Ubuntu 18.04, because the
      networking has been implemented differently
      <br>
      <br>
<a class="moz-txt-link-freetext" href="https://askubuntu.com/questions/1171864/how-to-install-xen-project-on-ubuntu-server-18-04-3-lts">https://askubuntu.com/questions/1171864/how-to-install-xen-project-on-ubuntu-server-18-04-3-lts</a>
      <br>
      <br>
      However, when I make this change my machine can no longer access
      the internet.
      <br>
      <br>
      I have searched on <a class="moz-txt-link-freetext" href="https://xen.markmail.org/">https://xen.markmail.org/</a> but not really found
      a clear answer to my question:
      <br>
      <br>
      Please can anyone let me know the best way to get Xen up and
      running on Ubuntu? Should I try to put Ubuntu 16.04 on my m/c and
      then follow the instructions given?
      <br>
      <br>
      And for the best tutorial? I have seen that there is “The
      Definitive Guide to the Xen Hypervisor” by David Chisnall (2008) 
      and “Running Xen: A Hands-on Guide to the Art of Virtualization”
      by Jenna Matthews et. Al (2008) but will these help with
      installing and using the current version?
      <br>
      <br>
        Thank you for any insights that anyone may have.
      <br>
      <br>
          Martin...
      <br>
      <br>
    </blockquote>
  </body>
</html>

--------------280B4D3CA81D267FEFBF5165--


From xen-users-bounces@lists.xenproject.org Tue Jun 02 10:57:18 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2020 10:57:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jg4aL-0005vJ-Ag; Tue, 02 Jun 2020 10:55:57 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=w2C6=7P=gmail.com=m.l.hargreaves@srs-us1.protection.inumbo.net>)
 id 1jg4aJ-0005un-OF
 for xen-users@lists.xenproject.org; Tue, 02 Jun 2020 10:55:55 +0000
X-Inumbo-ID: a16ddd5e-a4bf-11ea-81bc-bc764e2007e4
Received: from mail-wm1-x342.google.com (unknown [2a00:1450:4864:20::342])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id a16ddd5e-a4bf-11ea-81bc-bc764e2007e4;
 Tue, 02 Jun 2020 10:55:54 +0000 (UTC)
Received: by mail-wm1-x342.google.com with SMTP id r15so2626094wmh.5
 for <xen-users@lists.xenproject.org>; Tue, 02 Jun 2020 03:55:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=subject:to:references:from:message-id:date:user-agent:mime-version
 :in-reply-to:content-language:content-transfer-encoding;
 bh=qqeeZtpgi3fgRzDOmsu0IRZ++juqsvWYLrcLITdTohs=;
 b=e2sm7EjuF8SER9Y17NkZgtVkxGRha670e5Ei9EH1lbulxcTmLlNUcyfv0M625jJpB4
 X8Iic56cwVxCI2uNvL0ogeS6A5Q/y76YCm5sraj79dg4C22G+MVTVVb5ZLxOLG+yukrf
 cIbtE7XfH/y0jI3F373wbr90wZgTBU3tH5M00w2510WJ+nvJLZOEl2jxYit6x4MuP/nr
 VJQlY0O03ED67XdkdgjnajqC7k19X9OzBFEwHZ2scd/ivtqr3sWkBCNhng9pNFFxuja6
 QvSShQwDw1dA2wjoFlKeAAlSB25ghmtuSoWCkycEyqZNxrOG7xd+xtLV6CWWQ94i8F8m
 40wA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:subject:to:references:from:message-id:date
 :user-agent:mime-version:in-reply-to:content-language
 :content-transfer-encoding;
 bh=qqeeZtpgi3fgRzDOmsu0IRZ++juqsvWYLrcLITdTohs=;
 b=WmG6J9sGXuI0i+77cMOO/rE8U8AwI60Gk/vdGj5z1GZHAE10qgTImJbwHDQDVH/gg2
 HWcrvjQdTo75UekQ6btTuG4INg++DY1xEXXd0hiUwIC3JATC/n0PYPfM0wlJX635weyF
 P9NpaO0Xp+Znys7fl4gOxv87yYD4T2C3g2LAYCdGMdvvgbP0qm2b6Fpw+Hp0hrQ2rm/l
 I3h8d8UqvoGp4nwsjAiEc6Bql+iMYqaRZNJNDV1F9NAAUUwuBbKil+DhGvMUqVAMGhWP
 28WWqpyYz3Ps2BJzDms2TVcTh52HYvRuLWaIhC29MyqyRFiCDvTd42MXs0KeiBgcPm0w
 oPKw==
X-Gm-Message-State: AOAM533c8X8NoRh9OgECUN/pTwpERyPOPoeYcFmrG1AwPZGOxEYNpvs4
 mSl6L+afqpWiKeJK3UmCtI1HLEOb8fY=
X-Google-Smtp-Source: ABdhPJwHHUoN0SXH+Sk9l+M+Ij3C7WJ3sPwbHLhEYnnXtUEttVxZxL1rqprEnlunZT/yCIkFUyjZ6w==
X-Received: by 2002:a7b:c8d6:: with SMTP id f22mr3484603wml.108.1591095353561; 
 Tue, 02 Jun 2020 03:55:53 -0700 (PDT)
Received: from [192.168.0.20]
 (cpc112441-pres20-2-0-cust437.18-3.cable.virginm.net. [86.17.33.182])
 by smtp.gmail.com with ESMTPSA id p1sm3090081wrx.44.2020.06.02.03.55.52
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Tue, 02 Jun 2020 03:55:53 -0700 (PDT)
Subject: Re: Where best to start
To: xen-users@lists.xenproject.org
References: <a2aaef98-59b3-e3dd-c257-587eb7f7e507@gmail.com>
 <d49eb43e-6e99-6f6b-30d3-8913c0e99f89@telus.net>
From: Martin Hargreaves <m.l.hargreaves@gmail.com>
Message-ID: <2310050a-0e7c-028d-fb8a-01122eda88c5@gmail.com>
Date: Tue, 2 Jun 2020 11:55:51 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <d49eb43e-6e99-6f6b-30d3-8913c0e99f89@telus.net>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Thank you very much for this input, Dave. It has allowed me to progress 
to the next step.

By using 'ifconfig' and after re-booting my m/c a few times to make sure 
that I could still access the internet, the command you showed me 
produced...

brctl show
bridge name	bridge id		STP enabled	interfaces
docker0		8000.0242296ec6a6	no		
xenbr0		8000.861cdc1ac12c	no		enp0s25

I only issued the command that you gave me, so presumably the bridge was 
created by the config.yaml file on boot-up?

I don't know where 'docker0' appeared from but hopefully this will not 
interfere with the progress of the installation of a HVM.

   Thank you again,
            Martin...


On 01/06/2020 22:36, Dave Hill wrote:
> I'm not a Ubuntu user so can't help there but the first thing I would do 
> generically is check that the bridge is working:
> 
> brctl show
> 
> should yield something like this:
> 
>      bridge name bridge id               STP enabled     interfaces
>      xenbr0          8000.4ccc6ad1847d       no enp2s0
> 
> As for a tutorial, I'd suggest at least having a look through the Xen 
> Begginers Guide:
> 
> https://wiki.xenproject.org/wiki/Xen_Project_Beginners_Guide
> 
> It's dated (in particular, I wouldn't follow the advice there for 
> building a PV Debian guest), but it contains the essentials to get Xen 
> working generically.
> 
> Also, since your network stopped working, I'd go back and check that 
> your netplan configuration matches the one in the link you sent. The key 
> is that dhcp is not enabled on the ethernet card (eth0 or enps0 or 
> whatever), but rather on the bridge.
> 
> David
> 
> On 2020-06-01 3:06 a.m., Martin Hargreaves wrote:
>>
>> Dear Xen Community,
>>
>> I’m new to the field of virtualization so please excuse this request 
>> if it is placed on the incorrect forum.
>>
>> I am running Ubuntu 18.04 and following the instructions on...
>>
>> https://help.ubuntu.com/community/Xen
>>
>> and not getting anywhere fast. I found out that the above instructions 
>> are out of date for Ubuntu 18.04, because the networking has been 
>> implemented differently
>>
>> https://askubuntu.com/questions/1171864/how-to-install-xen-project-on-ubuntu-server-18-04-3-lts 
>>
>>
>> However, when I make this change my machine can no longer access the 
>> internet.
>>
>> I have searched on https://xen.markmail.org/ but not really found a 
>> clear answer to my question:
>>
>> Please can anyone let me know the best way to get Xen up and running 
>> on Ubuntu? Should I try to put Ubuntu 16.04 on my m/c and then follow 
>> the instructions given?
>>
>> And for the best tutorial? I have seen that there is “The Definitive 
>> Guide to the Xen Hypervisor” by David Chisnall (2008) and “Running 
>> Xen: A Hands-on Guide to the Art of Virtualization” by Jenna Matthews 
>> et. Al (2008) but will these help with installing and using the 
>> current version?
>>
>>   Thank you for any insights that anyone may have.
>>
>>     Martin...
>>


From xen-users-bounces@lists.xenproject.org Tue Jun 02 14:13:32 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2020 14:13:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jg7dy-0002dj-ID; Tue, 02 Jun 2020 14:11:54 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QAy3=7P=janzen.onl=volker@srs-us1.protection.inumbo.net>)
 id 1jg7dw-0002de-OV
 for xen-users@lists.xenproject.org; Tue, 02 Jun 2020 14:11:53 +0000
X-Inumbo-ID: 000c4d30-a4db-11ea-8993-bc764e2007e4
Received: from mx1.familie-janzen.de (unknown [2001:4178:2:1113::25])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 000c4d30-a4db-11ea-8993-bc764e2007e4;
 Tue, 02 Jun 2020 14:11:50 +0000 (UTC)
Content-Type: multipart/alternative;
 boundary=Apple-Mail-C7631EDE-C52D-466C-AF0E-8A8020D9226C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=janzen.onl; s=2018;
 t=1591107108;
 h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
 content-transfer-encoding:content-transfer-encoding:
 in-reply-to:in-reply-to:references:references;
 bh=2I1s0fySODQ3l6LyY4IG4d4ideiCheNnWD6bnP843io=;
 b=lVeb6ObQCZhnCu4tPzTPG4n/c7nCiwNIlNVOxNDlwuyTRkVwERQXkVpwcXZO8sLwVOH+fJ
 Dgo0w2rQNUWL4trk4j3KHQaHBjVB3E5Ed8MMKseTxL4m8SXq6a3iEa5Ysy4CaUuh/aOnKW
 g00pAa6qFrJ0NMdlJCRXdtQxODiBDOoNJoLg0vjPdu/ry1BJmZvD/npgtk3J2CtAaQp8sw
 6MV5KZVmGC0/QMMP+O/oAWm+DFXDEP5Ll6YnegPN0dmXKAiDg/bNrgccnudDq34dEDx9u+
 SUhB1uD7vTIzX7Smeq3jvWh+ZmcfLasE3vwU+JDsG3Fv8H6fk+aHnw/dAXOhwg==
Content-Transfer-Encoding: 7bit
From: Volker Janzen <volker@janzen.onl>
Mime-Version: 1.0 (1.0)
Subject: Re: Where best to start
Date: Tue, 2 Jun 2020 16:11:46 +0200
Message-Id: <2D5DA293-E502-4E12-9B00-0B03832C3991@janzen.onl>
References: <d49eb43e-6e99-6f6b-30d3-8913c0e99f89@telus.net>
In-Reply-To: <d49eb43e-6e99-6f6b-30d3-8913c0e99f89@telus.net>
To: Dave Hill <davehill@telus.net>
Authentication-Results: ORIGINATING;
 auth=pass smtp.auth=mailinglisten smtp.mailfrom=volker@janzen.onl
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--Apple-Mail-C7631EDE-C52D-466C-AF0E-8A8020D9226C
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Hi Dave,

> It's dated (in particular, I wouldn't follow the advice there for building=
 a PV Debian guest), but it contains the essentials to get Xen working gener=
ically.=20
>=20
how are you building your Xen guests?


Regards
     Volker


--Apple-Mail-C7631EDE-C52D-466C-AF0E-8A8020D9226C
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto">Hi Dave,<div><br><blockquote type="cite"><div dir="ltr"><p></p><p><font face="Helvetica, Arial, sans-serif">It's dated (in
        particular, I wouldn't follow the advice there for building a PV
        Debian guest), but it contains the essentials to get Xen working
        generically. <br></font></p></div></blockquote><div>how are you building your Xen guests?</div></div><div><br></div><div><br></div><div>Regards</div><div>&nbsp; &nbsp; &nbsp;Volker</div><div><br></div></body></html>
--Apple-Mail-C7631EDE-C52D-466C-AF0E-8A8020D9226C--


From xen-users-bounces@lists.xenproject.org Tue Jun 02 15:46:41 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2020 15:46:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jg96G-0002Zs-7x; Tue, 02 Jun 2020 15:45:12 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Fpv3=7P=gmail.com=nick.calvert@srs-us1.protection.inumbo.net>)
 id 1jg96F-0002Zn-4o
 for xen-users@lists.xenproject.org; Tue, 02 Jun 2020 15:45:11 +0000
X-Inumbo-ID: 0a8f47a0-a4e8-11ea-8993-bc764e2007e4
Received: from mail-io1-xd33.google.com (unknown [2607:f8b0:4864:20::d33])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 0a8f47a0-a4e8-11ea-8993-bc764e2007e4;
 Tue, 02 Jun 2020 15:45:10 +0000 (UTC)
Received: by mail-io1-xd33.google.com with SMTP id r2so11353621ioo.4
 for <xen-users@lists.xenproject.org>; Tue, 02 Jun 2020 08:45:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=D2oM7JFkur2z6sG4YB6nUJwtfMZVM8R9xEkO4bkmd7s=;
 b=ZVL/9PY4PRep0P6u+AjGg3QWzTXMkEbn3fl5c2OktOVHoZmaoDU3BSutcEvCRedO+6
 qdZtftGrDpKbberKueHaAxjqgEj6AUCTJAzaNFgUGNPuC2T2hLnqN383Qlo0Pe9kBfd0
 K2glVbHJ+moGCYgWChexf7I9eAvgW7+9jHaMnMRII4e9+hwWgJtg0UaPjq8njAXLb7oI
 WF+rxTLkYn4SFARLehzUAWOxZ0HARCG+YKlnNzFrG7qRra768ryoCCFeDHvINg9O4OlQ
 w89WgBSOF1sndPsIDyCiquT5/fjD8Vp5Vj6YAnT/ET2MiIrKtow4gXLQG5x8Dkm3PpNR
 VIMA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=D2oM7JFkur2z6sG4YB6nUJwtfMZVM8R9xEkO4bkmd7s=;
 b=bH31W7qfEvHVDpWHAud6y0rqoQ2aRbvpgWG8fSgqIvMzyZz/050coOasrtOKEqQYdp
 1RecWr5Gt0altmi1XZWExB/NJ3mUOVnxr2OhPHFvj1ojBjnmZTFTlku2W0DeQoWCYb1O
 o73iAPO230frUJEmReUmO2Y1tubRZiUwxz9kmvQz1e+fbHwOKe2k6n9uAA+mHkpLfiWR
 oJcvjDcyLd6N4HJwL+RRRwJo7i/NIciaD6unctg/LUd+sPesun3IJrDNywYJK/cnuQlB
 qjNs5dsJkTwT+JVFjLQ1lt0DVU2+rxdzGb1d+lNWJL/YxH96lvh3W1UR39a3BT9bV5en
 rraw==
X-Gm-Message-State: AOAM5323J8kS+3/KXqSeO1A+h0+wP+A+Ad6ybMrNPDStR9VpPjNPx3Lm
 x/+Pwa3CSZUjzAM4gyZlj0PbwjOU4zCOBRBqwKZLqveD4II=
X-Google-Smtp-Source: ABdhPJzdcWoWIWUBrXUmVa6+rgPWkbUptYdrn7u7QDnw2P9vi81TL6vKHhOC5hbtYpS1k0fUJNlxNdRD7hnxT8rp6ug=
X-Received: by 2002:a05:6638:cb2:: with SMTP id
 x18mr26849783jad.6.1591112709955; 
 Tue, 02 Jun 2020 08:45:09 -0700 (PDT)
MIME-Version: 1.0
From: Nick Calvert <nick.calvert@gmail.com>
Date: Tue, 2 Jun 2020 16:44:59 +0100
Message-ID: <CAH_TNPtkXWktOAyAKed0mRxuDea-3Pyrh4PKx8X_c2Jqmrchiw@mail.gmail.com>
Subject: Question regarding crashdumps
To: xen-users@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello everyone,

Apologies if this is not the correct place to ask this, but i have a
question about configuring crashdumps.

I am troubleshooting a longform stability issue under Xen Project 4.11
and 4.13 (Ubuntu) and wish to configure crash dumps. I've done some
reading but am only finding Xen Server specific docs with achieve this
via a serial connection.

Could anybody please point me in the right direction for this? I have
have a variety of hardware i can try this on, either Dell with iDRAC
or SuperMicro IPMI (if an emulated serial connection is feasible,
perhaps via the BMC).

All the best,

Nick


From xen-users-bounces@lists.xenproject.org Tue Jun 02 20:20:52 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2020 20:20:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgDNC-0002RQ-8Z; Tue, 02 Jun 2020 20:18:58 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=A8f0=7P=prgmr.com=srn@srs-us1.protection.inumbo.net>)
 id 1jgDNA-0002RL-C1
 for xen-users@lists.xenproject.org; Tue, 02 Jun 2020 20:18:56 +0000
X-Inumbo-ID: 48198808-a50e-11ea-9947-bc764e2007e4
Received: from mail.prgmr.com (unknown [2605:2700:0:5::4713:9506])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 48198808-a50e-11ea-9947-bc764e2007e4;
 Tue, 02 Jun 2020 20:18:55 +0000 (UTC)
Received: from [192.168.1.71] (unknown [99.0.85.144])
 (Authenticated sender: srn)
 by mail.prgmr.com (Postfix) with ESMTPSA id 0DA2172012B;
 Tue,  2 Jun 2020 16:18:54 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.prgmr.com 0DA2172012B
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prgmr.com;
 s=default; t=1591129134;
 bh=IUNEWRbvqAaTpurYZpkY9obW8/Y3ypiBWRnKcAXYQw8=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=PH7O09kvIpFY4jthD/JP3ZBpd1mrR52WqQL19lvadWKR37HrgByX8hpIR3wo36MKu
 H/Hkq2scRuwJp/Eiyvqc5wIW1SrZTA5LpCLSZqtXe8e0X8szhEeG9NCH/wly86XBrm
 auwxQcfeIJggNxwAHcIfBwKpGCdq077+iCd8ZujY=
Subject: Re: Question regarding crashdumps
To: Nick Calvert <nick.calvert@gmail.com>, xen-users@lists.xenproject.org
References: <CAH_TNPtkXWktOAyAKed0mRxuDea-3Pyrh4PKx8X_c2Jqmrchiw@mail.gmail.com>
From: Sarah Newman <srn@prgmr.com>
Message-ID: <49e60b98-6dd9-5b7d-e0ce-360dd8213620@prgmr.com>
Date: Tue, 2 Jun 2020 13:18:53 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <CAH_TNPtkXWktOAyAKed0mRxuDea-3Pyrh4PKx8X_c2Jqmrchiw@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 6/2/20 8:44 AM, Nick Calvert wrote:
> Hello everyone,
> 
> Apologies if this is not the correct place to ask this, but i have a
> question about configuring crashdumps.
> 
> I am troubleshooting a longform stability issue under Xen Project 4.11
> and 4.13 (Ubuntu) and wish to configure crash dumps. I've done some
> reading but am only finding Xen Server specific docs with achieve this
> via a serial connection.
> 
> Could anybody please point me in the right direction for this? I have
> have a variety of hardware i can try this on, either Dell with iDRAC
> or SuperMicro IPMI (if an emulated serial connection is feasible,
> perhaps via the BMC).

IPMI or iDRAC should work fine. The command you're looking for is "sol"

My understanding is those are real serial ports from the main CPUs perspective and the BMC separately provides the serial to ethernet functionality.

--Sarah


From xen-users-bounces@lists.xenproject.org Tue Jun 02 22:26:44 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Jun 2020 22:26:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgFLX-0005h3-Ez; Tue, 02 Jun 2020 22:25:23 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XXtb=7P=telus.net=davehill@srs-us1.protection.inumbo.net>)
 id 1jgFLW-0005gw-5j
 for xen-users@lists.xenproject.org; Tue, 02 Jun 2020 22:25:22 +0000
X-Inumbo-ID: f1e63712-a51f-11ea-ac8e-12813bfff9fa
Received: from cmta16.telus.net (unknown [209.171.16.89])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id f1e63712-a51f-11ea-ac8e-12813bfff9fa;
 Tue, 02 Jun 2020 22:25:21 +0000 (UTC)
Received: from [192.168.2.13] ([173.181.74.129]) by cmsmtp with SMTP
 id gFLRj5iFB2DNIgFLTjWsdP; Tue, 02 Jun 2020 16:25:20 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telus.net; s=neo;
 t=1591136720; bh=UZ0ht8OfhRuSBE95U0J590dpdKJu4N5XvXoF6AfcaVs=;
 h=Subject:To:Cc:References:From:Date:In-Reply-To;
 b=IDE5ETx3fcioH9N/VtzOuczhA79EupVO+cwGv0mjAuosG+Z4Ro96OQGnVSqqDjFyo
 DFOqcr0je3Ytb+511MZRRx9S+Am+QJwP4gyhJrFmk9WISWSE2jLTG5ZTL4yFA8M1+a
 RIrrFshsJNQUniGFrjtJuzPsnJWtndXuXYp48l2ReErNeI4hiwBI2ToJAJ6va0zStS
 no4xMjogskOEmq5U4YzDzIyz8ABacQhk3bUSu91YZFVjFgBWPcg6ShydxLtc5izF+o
 SDaRLvGq4+jOpnRXem23i2Fzl4UMNgYVcRhaHbEBPW4FqHj+Azu5y7RP09Y9PmIlOO
 iAxb7N7YnSVYQ==
X-Telus-Authed: ZGF2ZWhpbGxAdGVsdXMubmV0
X-Authority-Analysis: v=2.3 cv=H+qlPNQi c=1 sm=1 tr=0
 a=dDDs8EMPbAqg94jd+XLA8Q==:117 a=dDDs8EMPbAqg94jd+XLA8Q==:17
 a=r77TgQKjGQsHNAKrUKIA:9 a=mLnsDVdbAAAA:8 a=cWRNjhkoAAAA:8
 a=9L8lAXWv0OXybBOM8agA:9 a=QEXdDO2ut3YA:10 a=SHkPO7ViiU435vIVyeIA:9
 a=8nmFW8LDCI1v0Lw8:21 a=_W_S_7VecoQA:10 a=xnp1pY6zelCj5OLna2To:22
 a=sVa6W5Aao32NNC1mekxh:22
Subject: Re: Where best to start
To: Volker Janzen <volker@janzen.onl>
References: <d49eb43e-6e99-6f6b-30d3-8913c0e99f89@telus.net>
 <2D5DA293-E502-4E12-9B00-0B03832C3991@janzen.onl>
From: Dave Hill <davehill@telus.net>
Message-ID: <8236ff8f-f51a-88c8-1610-37b3cc6d8363@telus.net>
Date: Tue, 2 Jun 2020 15:25:17 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <2D5DA293-E502-4E12-9B00-0B03832C3991@janzen.onl>
Content-Type: multipart/alternative;
 boundary="------------B2FCF59126BC92DD2C91AA3E"
Content-Language: en-US
X-CMAE-Envelope: MS4wfBIMqSrLMyCZNlzGJA4bXDbOBtXPiGWDw/kFcBogn5QHa+brztB21708p4PRBBu1wQANyZQ/Puz6TIzzDSiwdwb/96xEcrLMI36Ps9P3468NnQbf5/po
 +cSF+f8m8A+T1WJq15Fplfj4Q+UtPb6rCAQIFOdFi1fY1Zl1OQzxHzuZbbaGf0EZxY7ex4uc2tL0InmFvtb42rLzsMMn2PA+QSw=
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------B2FCF59126BC92DD2C91AA3E
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Volker,

It's been a bit of a journey.  Lately I've been using pvhvm for my domUs.

The Guide is not wrong in any way. It's actually a bit of self-criticism 
to say it's dated, since I tried to update it not too long ago. I didn't 
edit this section mostly because it does work and I wasn't sure of 
current best practices.

Having said that, here are some of the concerns I have about it:

It uses pygrub. The script is super convenient but it's also opaque. The 
user can install Debian or Ubuntu or, at least according to apt show, 
older versions of CentOS. It is the most efficient approach for a 
beginner to get a PVM up and running. It means though that beginners 
don't acquire generic knowledge about installing distributions and 
writing/editing their own domU cfg files.

The Guide also says that pv-grub is not included in Debian, which is no 
longer the case and hasn't been for some time. I found the comments in 
the PvGrub2 page (https://wiki.xen.org/wiki/PvGrub2) about pygrub 
persuasive after I ran into one such a limitation.

Using pv-grub2 (or pvgrub2), is also a bit complicated though. The Guide 
refers the reader to a manual installation of Alpine Xen. The Alpine 
installation is a bit hard-core although it can be made to work. I also 
don't fully understand its boot process. Alpine's alpine.cfg file 
appears to rely on pv-grub2's former tolerance of GRUB1 menu.lst which I 
don't think works any longer.  I found myself dumped out to a GRUB 
prompt when I tried n fresh installation today. I previously learned to 
deal with that but it's not fun.

So, for a while I used pygrub, then I switched to pv-grub2. Then the PV 
drivers were added to the Linux kernel. The rationale for creating pv 
Linux guests was less clear. The Xen Project Best Practices page 
(https://wiki.xenproject.org/wiki/Xen_Project_Best_Practices) seems to 
recommend PVHVM.  So I switched my domU config files to:
     type=hvm
     xen_platform_pci=1

which I think accomplishes that. Installation of a domU is now almost 
identical to installing a distribution on hardware.

As may be apparent by this point, I consider myself to be a sort of 
permanent beginner at using Xen which is why I felt qualified to edit 
the Guide.

I'd really appreciate any comments you might have about any of this 
because I am just a beginner and may have it all or partially wrong.

In closing, let me say how fantastic I think Xen and its developers are! 
It's amazing to have such easy access to such a sophisticated system.

Dave

On 2020-06-02 7:11 a.m., Volker Janzen wrote:
> Hi Dave,
>
>> It's dated (in particular, I wouldn't follow the advice there for 
>> building a PV Debian guest), but it contains the essentials to get 
>> Xen working generically.
>>
> how are you building your Xen guests?
>
>
> Regards
>      Volker
>

--------------B2FCF59126BC92DD2C91AA3E
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <p>Hi Volker,</p>
    <p>It's been a bit of a journey.  Lately I've been using pvhvm for
      my domUs. <br>
    </p>
    <p>The Guide is not wrong in any way. It's actually a bit of
      self-criticism to say it's dated, since I tried to update it not
      too long ago. I didn't edit this section mostly because it does
      work and I wasn't sure of current best practices.<br>
    </p>
    <p>Having said that, here are some of the concerns I have about it:</p>
    <p>It uses pygrub. The script is super convenient but it's also
      opaque. The user can install Debian or Ubuntu or, at least
      according to apt show, older versions of CentOS. It is the most
      efficient approach for a beginner to get a PVM up and running. It
      means though that beginners don't acquire generic knowledge about
      installing distributions and writing/editing their own domU cfg
      files. <br>
    </p>
    <p>The Guide also says that pv-grub is not included in Debian, which
      is no longer the case and hasn't been for some time. I found the
      comments in the PvGrub2 page (<a class="moz-txt-link-freetext" href="https://wiki.xen.org/wiki/PvGrub2">https://wiki.xen.org/wiki/PvGrub2</a>)
      about pygrub persuasive after I ran into one such a limitation. <br>
    </p>
    <p>
      Using pv-grub2 (or pvgrub2), is also a bit complicated though. The
      Guide refers the reader to a manual installation of Alpine Xen.
      The Alpine installation is a bit hard-core although it can be made
      to work. I also don't fully understand its boot process. Alpine's
      alpine.cfg file appears to rely on pv-grub2's former tolerance of
      GRUB1 menu.lst which I don't think works any longer.  I found
      myself dumped out to a GRUB prompt when I tried n fresh
      installation today. I previously learned to deal with that but
      it's not fun. <br>
    </p>
    <p>So, for a while I used pygrub, then I switched to pv-grub2. Then
      the PV drivers were added to the Linux kernel. The rationale for
      creating pv Linux guests was less clear. The Xen Project Best
      Practices page
      (<a class="moz-txt-link-freetext" href="https://wiki.xenproject.org/wiki/Xen_Project_Best_Practices">https://wiki.xenproject.org/wiki/Xen_Project_Best_Practices</a>)
      seems to recommend PVHVM.  So I switched my domU config files to:<br>
          type=hvm<br>
          xen_platform_pci=1<br>
    </p>
    <p>which I think accomplishes that. Installation of a domU is now
      almost identical to installing a distribution on hardware. <br>
    </p>
    <p>As may be apparent by this point, I consider myself to be a sort
      of permanent beginner at using Xen which is why I felt qualified
      to edit the Guide.</p>
    <p>I'd really appreciate any comments you might have about any of
      this because I am just a beginner and may have it all or partially
      wrong. <br>
    </p>
    <p>In closing, let me say how fantastic I think Xen and its
      developers are! It's amazing to have such easy access to such a
      sophisticated system. <br>
    </p>
    <p>Dave<br>
    </p>
    <div class="moz-cite-prefix">On 2020-06-02 7:11 a.m., Volker Janzen
      wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:2D5DA293-E502-4E12-9B00-0B03832C3991@janzen.onl">
      <meta http-equiv="content-type" content="text/html; charset=UTF-8">
      Hi Dave,
      <div><br>
        <blockquote type="cite">
          <div dir="ltr">
            <p><font face="Helvetica, Arial, sans-serif">It's dated (in
                particular, I wouldn't follow the advice there for
                building a PV Debian guest), but it contains the
                essentials to get Xen working generically. <br>
              </font></p>
          </div>
        </blockquote>
        <div>how are you building your Xen guests?</div>
      </div>
      <div><br>
      </div>
      <div><br>
      </div>
      <div>Regards</div>
      <div>     Volker</div>
      <div><br>
      </div>
    </blockquote>
  </body>
</html>

--------------B2FCF59126BC92DD2C91AA3E--


From xen-users-bounces@lists.xenproject.org Wed Jun 03 02:45:21 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 02:45:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgJNh-0006zm-0W; Wed, 03 Jun 2020 02:43:53 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=azRW=7Q=gmail.com=hydrapolic@srs-us1.protection.inumbo.net>)
 id 1jgJNg-0006zY-1d
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 02:43:52 +0000
X-Inumbo-ID: 0bb5b0a4-a544-11ea-8993-bc764e2007e4
Received: from mail-qt1-x82d.google.com (unknown [2607:f8b0:4864:20::82d])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 0bb5b0a4-a544-11ea-8993-bc764e2007e4;
 Wed, 03 Jun 2020 02:43:46 +0000 (UTC)
Received: by mail-qt1-x82d.google.com with SMTP id w90so819927qtd.8;
 Tue, 02 Jun 2020 19:43:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=N6goEOlN4qAAs1j28VEI7Cco90TR2wupjCzPlDjwyLg=;
 b=jxnE/6HFKMC+fI8zc/aNqgCoenD1lUbYQhf4wDZvaS1LpMRtQfWdpD3sUq+u+OEekI
 kFhr8CMwc1UFKIjQ7b3PUKpbX8zKu0TMIxuFS9saT8DnoMYu7xavDuVSN2Pd1wLWD+p5
 YDYl1UboIfLlydCgx2gpxi+gkHIGSljEu+wSsdOZjHvpIKFmjGrcsimU9L2DDEhJ7JMJ
 lHpacabHmhIev8XU9Wh5PFHLZCLf2oRyMG6ROlh0VYVv8wqnlUQ9Fes0wsCWUnHDyz3k
 cpK75fB3YrovIzmo710eIVqldcXR1fIA5k/AHrLiHGx1APs/uIbm7WHHuqGf9aPl75x/
 2ACw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=N6goEOlN4qAAs1j28VEI7Cco90TR2wupjCzPlDjwyLg=;
 b=EHvdaDrthjwMIBMdx62vnX2ygNBARHe9Cuy/MHtAftIRrURdoI9qg53/9JFJVio5u4
 mMasK2DdMDF+BIWVztYdeeisVtmo8HODKjfhCxYLhaGE4iQ4SDP+RxUf2qtwj68wGjGk
 YpDzwlxF6NvstEpO+sRbUF6s8bBLHSgmVF/ePu5Kp3GJk4YNZs6xF6UDUELTMOyqoMur
 6Mu8yn/QErFzRhuUVjyqUg9lekjFgWryJYYEYLTrhD9x170hbSjQRn/13IoiU8QUy55f
 uJpHMD9TKNt7zdrjkiL+EjfSQMiVqtk2hVMEH4vc76INTePIWOe/FIALF4nKXWwNAEhO
 ZmBg==
X-Gm-Message-State: AOAM533cTTpqheW6nqBQ5gIrMgnLKo7eFdSE61Q51CD8p997qTWAPQDf
 QM9cmNQuVmhHN+iIwcYwybNrL0jOTSKcXHWNNh4=
X-Google-Smtp-Source: ABdhPJzNA3JJZVwAjiZDa6wCmDh/nFa8ofCf4SoppoFs1xgAJx5/q1QjgOIKaNU6JshSXpTtTe4abFWF3ULH9HFnPFI=
X-Received: by 2002:aed:2ca5:: with SMTP id g34mr15152669qtd.13.1591152225678; 
 Tue, 02 Jun 2020 19:43:45 -0700 (PDT)
MIME-Version: 1.0
References: <CAG6MAzRcvUifqf=m7EE98bz0w_s2+Z=0Nx7YT0SVv75ek0Mc2Q@mail.gmail.com>
 <CAG6MAzR_bU5qnCLKpuUAt-S_dfxjnxgh12gUjnXfsfC7Fw2qMw@mail.gmail.com>
 <CAG6MAzSS0Kw2KHWZpb6O9kfoDKK2spn_WHfy9gnZcZLvES0wnQ@mail.gmail.com>
 <CAG6MAzRZsSaVdO6Qv+Xi1dpaUsrdh+kT9F-_K=8s7fHyXRbFWQ@mail.gmail.com>
 <CAAVVsFmwoopngy6U8z1vUBH5j0gzuTLcMX+NcjQRjwshNr_LDw@mail.gmail.com>
 <CAG6MAzQ4QQjre7o5iLN5gX9=mRkJzy_pDM+aRgXi999yfp0srg@mail.gmail.com>
In-Reply-To: <CAG6MAzQ4QQjre7o5iLN5gX9=mRkJzy_pDM+aRgXi999yfp0srg@mail.gmail.com>
From: Tomas Mozes <hydrapolic@gmail.com>
Date: Wed, 3 Jun 2020 04:43:33 +0200
Message-ID: <CAG6MAzQfX13KuaWtmJb_3Srdt5FTV+nvKmnNVXq5j8QF44NhTw@mail.gmail.com>
Subject: Re: [Xen-users] xen domU stall on 4.12.1
To: Glen <glenbarney@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000031fb0805a724ff8c"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000031fb0805a724ff8c
Content-Type: text/plain; charset="UTF-8"

On Mon, Feb 24, 2020 at 6:02 PM Tomas Mozes <hydrapolic@gmail.com> wrote:

>
>
> On Mon, Feb 24, 2020 at 4:55 PM Glen <glenbarney@gmail.com> wrote:
>
>> On Sun, Feb 23, 2020 at 11:12 PM Tomas Mozes <hydrapolic@gmail.com>
>> wrote:
>> > As reported in
>> https://lists.xenproject.org/archives/html/xen-devel/2020-01/msg00361.html
>> and
>> https://lists.xenproject.org/archives/html/xen-users/2020-02/msg00042.html,
>> switching back to credit1 scheduler seems to make it working again. I've
>> migrated 6 machines to Xen 4.12 with sched=credit xen option and haven't
>> observed a hang for more than a week now.
>>
>> My experience is the same.  I have migrated all 16 of my physical
>> hosts back to OpenSuse 15.1 with Xen 4.12.1 with sched=credit .  All
>> guests are now running perfectly, without any issues at all.  Over
>> this past week I performed directed stress-testing against several of
>> my guests, and they all survived without any problems at all.  I've
>> now completely my migration to the new guests, and everyone is happy.
>>
>> I'm now going to bring one of the previously-live guests on its own
>> host back to credit2 so I can crash it and try to capture debugging
>> output for xen-devel as requested.  But sched=credit is definitely
>> what we needed to solve this problem!  Thank you all for helping us
>> get there!
>>
>> Glen
>>
>
> Thank you too for your report. Hope we'll find the reason why credit2
> misbehaves.
>
> Tomas
>

Just tested Xen 4.12.3, but a domU hanged again with credit2. It works rock
solid with credit1.

Tomas

--00000000000031fb0805a724ff8c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Mon, Feb 24, 2020 at 6:02 PM Tomas=
 Mozes &lt;<a href=3D"mailto:hydrapolic@gmail.com">hydrapolic@gmail.com</a>=
&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div=
 dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote"><div=
 dir=3D"ltr" class=3D"gmail_attr">On Mon, Feb 24, 2020 at 4:55 PM Glen &lt;=
<a href=3D"mailto:glenbarney@gmail.com" target=3D"_blank">glenbarney@gmail.=
com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"marg=
in:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1e=
x">On Sun, Feb 23, 2020 at 11:12 PM Tomas Mozes &lt;<a href=3D"mailto:hydra=
polic@gmail.com" target=3D"_blank">hydrapolic@gmail.com</a>&gt; wrote:<br>
&gt; As reported in <a href=3D"https://lists.xenproject.org/archives/html/x=
en-devel/2020-01/msg00361.html" rel=3D"noreferrer" target=3D"_blank">https:=
//lists.xenproject.org/archives/html/xen-devel/2020-01/msg00361.html</a> an=
d <a href=3D"https://lists.xenproject.org/archives/html/xen-users/2020-02/m=
sg00042.html" rel=3D"noreferrer" target=3D"_blank">https://lists.xenproject=
.org/archives/html/xen-users/2020-02/msg00042.html</a>, switching back to c=
redit1 scheduler seems to make it working again. I&#39;ve migrated 6 machin=
es to Xen 4.12 with sched=3Dcredit xen option and haven&#39;t observed a ha=
ng for more than a week now.<br>
<br>
My experience is the same.=C2=A0 I have migrated all 16 of my physical<br>
hosts back to OpenSuse 15.1 with Xen 4.12.1 with sched=3Dcredit .=C2=A0 All=
<br>
guests are now running perfectly, without any issues at all.=C2=A0 Over<br>
this past week I performed directed stress-testing against several of<br>
my guests, and they all survived without any problems at all.=C2=A0 I&#39;v=
e<br>
now completely my migration to the new guests, and everyone is happy.<br>
<br>
I&#39;m now going to bring one of the previously-live guests on its own<br>
host back to credit2 so I can crash it and try to capture debugging<br>
output for xen-devel as requested.=C2=A0 But sched=3Dcredit is definitely<b=
r>
what we needed to solve this problem!=C2=A0 Thank you all for helping us<br=
>
get there!<br>
<br>
Glen<br></blockquote><div><br></div><div>Thank you too for your report. Hop=
e we&#39;ll find the reason why credit2 misbehaves.<br></div><div><br></div=
><div>Tomas<br></div></div></div></blockquote><div><br></div><div>Just test=
ed Xen 4.12.3, but a domU hanged again with credit2. It works rock solid wi=
th credit1.<br></div><div><br></div><div>Tomas=C2=A0 <br></div></div></div>

--00000000000031fb0805a724ff8c--


From xen-users-bounces@lists.xenproject.org Wed Jun 03 12:17:25 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 12:17:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgSJJ-0005ch-6w; Wed, 03 Jun 2020 12:15:57 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IAYY=7Q=antarean.org=joost@srs-us1.protection.inumbo.net>)
 id 1jgSJH-0005bq-Nn
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 12:15:56 +0000
X-Inumbo-ID: f8962a08-a593-11ea-9dbe-bc764e2007e4
Received: from gw2.antarean.org (unknown [141.105.125.208])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id f8962a08-a593-11ea-9dbe-bc764e2007e4;
 Wed, 03 Jun 2020 12:15:54 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49cSYP52ftz8wRP
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 14:15:53 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from gw2.antarean.org ([127.0.0.1])
 by localhost (gw2.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id rm-W6FVs-YZg for <xen-users@lists.xenproject.org>;
 Wed,  3 Jun 2020 14:15:53 +0200 (CEST)
Received: from mailstore1.antarean.org (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49cSYP3MxYz8wFr
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 14:15:53 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49cSYN38yDz15
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 14:15:52 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from mailstore1.antarean.org ([127.0.0.1])
 by localhost (mailstore1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id JbDo4zu914No for <xen-users@lists.xenproject.org>;
 Wed,  3 Jun 2020 14:15:52 +0200 (CEST)
Received: from eve.localnet (eve.adm.antarean.org [10.55.16.44])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49cSYN1Wp4zj
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 14:15:52 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=antarean.org;
 s=default; t=1591186552;
 bh=Ko2AuZaSofxLfTPhvCt4fBbWJKf+d1xJkfHA/A4+OYE=;
 h=From:To:Subject:Date;
 b=CStBvfdQesr5S28NSKHby5fVO9GGkA3Gm5/NuKW+8T9AsanLeW1JzpJyiYTSyz6pz
 p5A5iszqLN5pdyLBK91s0JWGCFVMRWHNWabL5jQZPTAWB3UxCRrxyFTjnl/VPmO1yH
 yCdSwjK9yIE0v0ON1XtklXd3KjSPmU0+79E7DVWM=
From: "J. Roeleveld" <joost@antarean.org>
To: xen-users@lists.xenproject.org
Subject: Unable to start more than 14 domUs - libxl__xs_transaction_commit:
 could not commit xenstore transaction
Date: Wed, 03 Jun 2020 14:15:52 +0200
Message-ID: <2173167.ElGaqSPkdT@eve>
Organization: Antarean
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,

I upgraded to Xen 4.12.2 recently and since the upgrade, I am unable to start 
more than 14 domUs.

The error, when trying to start the 15th, is:
Parsing config from /etc/xen/boot/stage7/dbtest
libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not 
commit xenstore transaction: No space left on device
libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not 
commit xenstore transaction: No space left on device
libxl: error: libxl_create.c:1318:domcreate_launch_dm: Domain 20:unable to add 
disk devices
libxl: error: libxl_domain.c:1038:libxl__destroy_domid: Domain 20:Non-existant 
domain
libxl: error: libxl_domain.c:993:domain_destroy_callback: Domain 20:Unable to 
destroy guest
libxl: error: libxl_domain.c:920:domain_destroy_cb: Domain 20:Destruction of 
domain failed



The domUs showing the issue get the disks from a driver-domain.
All this was working correctly using older Xen versions and no config changes 
have been done.

Unfortunately, I am unable to find anything further in the logs and my google-
fu is not helping either as all I find is for much older versions.

If anyone has any further ideas on how to further analyse this?

If I stop 1 domU, I am able to start another one, so I am confident it has to 
do with amount of domUs running and not a specific domU.

Many thanks,

Joost




From xen-users-bounces@lists.xenproject.org Wed Jun 03 12:57:12 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 12:57:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgSwE-0001kv-TH; Wed, 03 Jun 2020 12:56:10 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=jsbp=7Q=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1jgSwD-0001kl-NS
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 12:56:09 +0000
X-Inumbo-ID: 97e564d4-a599-11ea-9947-bc764e2007e4
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 97e564d4-a599-11ea-9947-bc764e2007e4;
 Wed, 03 Jun 2020 12:56:09 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id 2C2C6AE92;
 Wed,  3 Jun 2020 12:56:11 +0000 (UTC)
Subject: Re: Unable to start more than 14 domUs -
 libxl__xs_transaction_commit: could not commit xenstore transaction
To: "J. Roeleveld" <joost@antarean.org>, xen-users@lists.xenproject.org
References: <2173167.ElGaqSPkdT@eve>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <9614dda8-7b6c-1e03-e78a-7fd8525bb9c4@suse.com>
Date: Wed, 3 Jun 2020 14:56:06 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <2173167.ElGaqSPkdT@eve>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 03.06.20 14:15, J. Roeleveld wrote:
> Hi all,
> 
> I upgraded to Xen 4.12.2 recently and since the upgrade, I am unable to start
> more than 14 domUs. >
> The error, when trying to start the 15th, is:
> Parsing config from /etc/xen/boot/stage7/dbtest
> libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not
> commit xenstore transaction: No space left on device
> libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not
> commit xenstore transaction: No space left on device
> libxl: error: libxl_create.c:1318:domcreate_launch_dm: Domain 20:unable to add
> disk devices
> libxl: error: libxl_domain.c:1038:libxl__destroy_domid: Domain 20:Non-existant
> domain
> libxl: error: libxl_domain.c:993:domain_destroy_callback: Domain 20:Unable to
> destroy guest
> libxl: error: libxl_domain.c:920:domain_destroy_cb: Domain 20:Destruction of
> domain failed
> 
> 
> 
> The domUs showing the issue get the disks from a driver-domain.

Ah, this might be related to hitting some Xenstore quota.

As you are seeing the problem in libxl__xs_transaction_commit I guess
you should increase the number of Xenstore entries per domain.

The default is 1000, you can set the value via the -E start parameter of
xenstored (e.g. "-E 5000" to set it to 5000), or if you are using
oxenstored by editing your /etc/xen/oxenstored.conf file (entry
"quota-maxentity").


Juergen


From xen-users-bounces@lists.xenproject.org Wed Jun 03 13:02:20 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 13:02:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgT1n-0002qf-N2; Wed, 03 Jun 2020 13:01:55 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IAYY=7Q=antarean.org=joost@srs-us1.protection.inumbo.net>)
 id 1jgT1l-0002qY-DY
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 13:01:53 +0000
X-Inumbo-ID: 646b75d4-a59a-11ea-81bc-bc764e2007e4
Received: from gw1.antarean.org (unknown [194.145.200.214])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 646b75d4-a59a-11ea-81bc-bc764e2007e4;
 Wed, 03 Jun 2020 13:01:51 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by gw1.antarean.org (Postfix) with ESMTP id 49cTM62CNBz16Kb
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 14:52:02 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from gw1.antarean.org ([127.0.0.1])
 by localhost (gw1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id oC0_FNtDLCdh for <xen-users@lists.xenproject.org>;
 Wed,  3 Jun 2020 14:52:02 +0200 (CEST)
Received: from mailstore1.antarean.org (localhost [127.0.0.1])
 by gw1.antarean.org (Postfix) with ESMTP id 49cTM60HvDz16KD
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 14:52:02 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49cTZQ4Z9Wz15
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 15:01:50 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from mailstore1.antarean.org ([127.0.0.1])
 by localhost (mailstore1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Anv8T29N3BwE for <xen-users@lists.xenproject.org>;
 Wed,  3 Jun 2020 15:01:50 +0200 (CEST)
Received: from eve.localnet (eve.adm.antarean.org [10.55.16.44])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49cTZQ31NWzj
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 15:01:50 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=antarean.org;
 s=default; t=1591189310;
 bh=M/VhmUXyem6yli48nMdLSjR1HVGnx9G69GzgfqxMZek=;
 h=From:To:Subject:Date:In-Reply-To:References;
 b=W7/UZTH5kee+OrKjeHMqPV9XI5uy0J1/bEfxkb3qD8fnL7oKrBqHFZ5KYEeVE9Jqb
 L8O37S6+mt3nQhFnKIodsYPmBXxH/33G1JHFUbG1AWlRSmZFwfost26WalKOZ3kIQa
 DodHC4Odp+6yIXLWJgBndEWiWAoDr72/iYZY4mn8=
From: "J. Roeleveld" <joost@antarean.org>
To: xen-users@lists.xenproject.org
Subject: Re: Unable to start more than 14 domUs -
 libxl__xs_transaction_commit: could not commit xenstore transaction
Date: Wed, 03 Jun 2020 15:01:50 +0200
Message-ID: <2041847.irdbgypaU6@eve>
Organization: Antarean
In-Reply-To: <9614dda8-7b6c-1e03-e78a-7fd8525bb9c4@suse.com>
References: <2173167.ElGaqSPkdT@eve>
 <9614dda8-7b6c-1e03-e78a-7fd8525bb9c4@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On Wednesday, June 3, 2020 2:56:06 PM CEST J=FCrgen Gro=DF wrote:
> On 03.06.20 14:15, J. Roeleveld wrote:
> > Hi all,
> >=20
> > I upgraded to Xen 4.12.2 recently and since the upgrade, I am unable to
> > start more than 14 domUs. >
> > The error, when trying to start the 15th, is:
> > Parsing config from /etc/xen/boot/stage7/dbtest
> > libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not
> > commit xenstore transaction: No space left on device
> > libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not
> > commit xenstore transaction: No space left on device
> > libxl: error: libxl_create.c:1318:domcreate_launch_dm: Domain 20:unable=
 to
> > add disk devices
> > libxl: error: libxl_domain.c:1038:libxl__destroy_domid: Domain
> > 20:Non-existant domain
> > libxl: error: libxl_domain.c:993:domain_destroy_callback: Domain 20:Una=
ble
> > to destroy guest
> > libxl: error: libxl_domain.c:920:domain_destroy_cb: Domain 20:Destructi=
on
> > of domain failed
> >=20
> >=20
> >=20
> > The domUs showing the issue get the disks from a driver-domain.
>=20
> Ah, this might be related to hitting some Xenstore quota.
>=20
> As you are seeing the problem in libxl__xs_transaction_commit I guess
> you should increase the number of Xenstore entries per domain.
>=20
> The default is 1000, you can set the value via the -E start parameter of
> xenstored (e.g. "-E 5000" to set it to 5000), or if you are using
> oxenstored by editing your /etc/xen/oxenstored.conf file (entry
> "quota-maxentity").

Has this default been changed/lowered?
Or has there been an increase in amount of values in xenstore?

As this will require a reboot of the server, I will not be able to test thi=
s=20
before the weekend. Is there any way to confirm this is actually the case=20
without a restart?

Many thanks,

Joost





From xen-users-bounces@lists.xenproject.org Wed Jun 03 13:26:56 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 13:26:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgTPS-0005C4-TQ; Wed, 03 Jun 2020 13:26:22 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=jsbp=7Q=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1jgTPS-0005Bz-1L
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 13:26:22 +0000
X-Inumbo-ID: d006c69c-a59d-11ea-9947-bc764e2007e4
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id d006c69c-a59d-11ea-9947-bc764e2007e4;
 Wed, 03 Jun 2020 13:26:21 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id 53F41AF5D;
 Wed,  3 Jun 2020 13:26:23 +0000 (UTC)
Subject: Re: Unable to start more than 14 domUs -
 libxl__xs_transaction_commit: could not commit xenstore transaction
To: "J. Roeleveld" <joost@antarean.org>, xen-users@lists.xenproject.org
References: <2173167.ElGaqSPkdT@eve>
 <9614dda8-7b6c-1e03-e78a-7fd8525bb9c4@suse.com> <2041847.irdbgypaU6@eve>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <f93453bd-44a1-2dae-d677-c9e87eea7674@suse.com>
Date: Wed, 3 Jun 2020 15:26:19 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <2041847.irdbgypaU6@eve>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 03.06.20 15:01, J. Roeleveld wrote:
> On Wednesday, June 3, 2020 2:56:06 PM CEST Jürgen Groß wrote:
>> On 03.06.20 14:15, J. Roeleveld wrote:
>>> Hi all,
>>>
>>> I upgraded to Xen 4.12.2 recently and since the upgrade, I am unable to
>>> start more than 14 domUs. >
>>> The error, when trying to start the 15th, is:
>>> Parsing config from /etc/xen/boot/stage7/dbtest
>>> libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not
>>> commit xenstore transaction: No space left on device
>>> libxl: error: libxl_xshelp.c:265:libxl__xs_transaction_commit: could not
>>> commit xenstore transaction: No space left on device
>>> libxl: error: libxl_create.c:1318:domcreate_launch_dm: Domain 20:unable to
>>> add disk devices
>>> libxl: error: libxl_domain.c:1038:libxl__destroy_domid: Domain
>>> 20:Non-existant domain
>>> libxl: error: libxl_domain.c:993:domain_destroy_callback: Domain 20:Unable
>>> to destroy guest
>>> libxl: error: libxl_domain.c:920:domain_destroy_cb: Domain 20:Destruction
>>> of domain failed
>>>
>>>
>>>
>>> The domUs showing the issue get the disks from a driver-domain.
>>
>> Ah, this might be related to hitting some Xenstore quota.
>>
>> As you are seeing the problem in libxl__xs_transaction_commit I guess
>> you should increase the number of Xenstore entries per domain.
>>
>> The default is 1000, you can set the value via the -E start parameter of
>> xenstored (e.g. "-E 5000" to set it to 5000), or if you are using
>> oxenstored by editing your /etc/xen/oxenstored.conf file (entry
>> "quota-maxentity").
> 
> Has this default been changed/lowered?
> Or has there been an increase in amount of values in xenstore?

Depends. Which Xen version did you use before, and which Xenstore
variant (xenstored, oxenstored, or xenstore-stubdom) are you using?
Did you change anything in the driver domain?

> As this will require a reboot of the server, I will not be able to test this
> before the weekend. Is there any way to confirm this is actually the case
> without a restart?

There are strong hints in the data you presented:

libxl__xs_transaction_commit() is only calling xs_transaction_end()
and the error you are seeing is ENOSPC. In transaction end handling
the only reason for ENOSPC is hitting the quota for the number of
Xenstore nodes per domain.

You can easily check this by calling

xenstore-ls -p

in dom0 and count the number of entries which are owned by the driver
domain, an entry looks like:

       console = "" . . . . . . . . . . . . . . . . . . . . .  (n0,n1)

where "(n0,n1)" are the permissions of the entry. The first permission
entry "n0" is the owner (drop the letter, and you get the domid of the
owner, in my example "0").


Juergen


From xen-users-bounces@lists.xenproject.org Wed Jun 03 15:31:45 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 15:31:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgVLi-000231-W8; Wed, 03 Jun 2020 15:30:38 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=KLBN=7Q=gmail.com=glenbarney@srs-us1.protection.inumbo.net>)
 id 1jgVLh-00022p-QH
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 15:30:37 +0000
X-Inumbo-ID: 2c72665a-a5af-11ea-9947-bc764e2007e4
Received: from mail-qt1-x843.google.com (unknown [2607:f8b0:4864:20::843])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2c72665a-a5af-11ea-9947-bc764e2007e4;
 Wed, 03 Jun 2020 15:30:37 +0000 (UTC)
Received: by mail-qt1-x843.google.com with SMTP id c12so2344091qtq.11;
 Wed, 03 Jun 2020 08:30:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=14Oc4IIbH5lfOi6aqd01Xj+O/vzK1lMBVdL+M+b9qEo=;
 b=AeP1muxBvJ8Ah5fjIx/lOzHsPS2dY52HDYR9P4MMr2BX3Y9MpXeDPxThi0V2HfxHwg
 8K00mTUYj/D4BsSNp8yNoRcfC9gEA8IZkBxCrb0Kwu9T27RRcL3n8bjm2WUbdnrpBes9
 NGhv5Ei8bEUZsdZAK92A9+hMgCl+emMyKa5pIRnIjKz2dFZLrI5jh63XuZyJbxFY+EJJ
 uu4KliNUkxLdUQU3W3+0yRDVdBNg0Q2ryDAnvA7BJlmuPkFvh0Ol3NavDhrIRF2WIWK7
 g+uwRKp0MXYOHW7zDqIKqTuhSWSSSokbZDx4/OzM+7QzqgCOCL25byJHIJKFCOBj0jsC
 6bVw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=14Oc4IIbH5lfOi6aqd01Xj+O/vzK1lMBVdL+M+b9qEo=;
 b=EYs2dR+GZbqhyPqUpMR19waCBLgjEfCK3ezPqJZJAIS0K68Y6WRhVojQKk0IqnkdwU
 4+emLGy8FVdrUoAgc1fBkn8YE0Y1KygSulMxuGmVTtqpjhu57RJRxonIA7ywwEGP9bBN
 JyGuGcYsYKSiFKfSF9udPHsMqsMfBMaqZcET4BLSWYAnf4yDSWzIPnF1gxF0X/32mu8Q
 Rec1LHRStfzoTjnisH80vwyIqr+7tqowiSV8mmByzQ016rsOC33zvxglFEASw+XvYusF
 YVxeJii1NPDO+fZQaDTHC9ew6F/aSa4I1Jgsr0BnXeslpP3ObhNaEMhbBNFi8LASCFP5
 WA1A==
X-Gm-Message-State: AOAM532Dc53nbRp1EIPUl/6YR29Iet1Hpzuzayh7I+7J5KwqleinYZ+B
 CRdvfOtY5VyuX+4ZocgdYSfCq8GuZbfAJaoV+hbKU1Py
X-Google-Smtp-Source: ABdhPJyNSWpPY64RY+qSK3E7xvi3A2r1Klf5W2PdU1VHfuLglYenpIkfs6+2+QK8vHkLyipsx224MnDjGRijQuxY5mo=
X-Received: by 2002:ac8:5148:: with SMTP id h8mr31684113qtn.316.1591198236813; 
 Wed, 03 Jun 2020 08:30:36 -0700 (PDT)
MIME-Version: 1.0
References: <CAG6MAzRcvUifqf=m7EE98bz0w_s2+Z=0Nx7YT0SVv75ek0Mc2Q@mail.gmail.com>
 <CAG6MAzR_bU5qnCLKpuUAt-S_dfxjnxgh12gUjnXfsfC7Fw2qMw@mail.gmail.com>
 <CAG6MAzSS0Kw2KHWZpb6O9kfoDKK2spn_WHfy9gnZcZLvES0wnQ@mail.gmail.com>
 <CAG6MAzRZsSaVdO6Qv+Xi1dpaUsrdh+kT9F-_K=8s7fHyXRbFWQ@mail.gmail.com>
 <CAAVVsFmwoopngy6U8z1vUBH5j0gzuTLcMX+NcjQRjwshNr_LDw@mail.gmail.com>
 <CAG6MAzQ4QQjre7o5iLN5gX9=mRkJzy_pDM+aRgXi999yfp0srg@mail.gmail.com>
 <CAG6MAzQfX13KuaWtmJb_3Srdt5FTV+nvKmnNVXq5j8QF44NhTw@mail.gmail.com>
In-Reply-To: <CAG6MAzQfX13KuaWtmJb_3Srdt5FTV+nvKmnNVXq5j8QF44NhTw@mail.gmail.com>
From: Glen <glenbarney@gmail.com>
Date: Wed, 3 Jun 2020 08:30:23 -0700
Message-ID: <CAAVVsFmExExdwkokB1i9=KwT8k=eHABQZruYiA9Yr2MJ7ibyWA@mail.gmail.com>
Subject: Re: [Xen-users] xen domU stall on 4.12.1
To: Tomas Mozes <hydrapolic@gmail.com>
Content-Type: text/plain; charset="UTF-8"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Tomas -

On Tue, Jun 2, 2020 at 7:43 PM Tomas Mozes <hydrapolic@gmail.com> wrote:
>> On Mon, Feb 24, 2020 at 4:55 PM Glen <glenbarney@gmail.com> wrote:
>>> I'm now going to bring one of the previously-live guests on its own
>>> host back to credit2 so I can crash it and try to capture debugging
>>> output for xen-devel as requested.  But sched=credit is definitely
>>> what we needed to solve this problem!  Thank you all for helping us
>>> get there!
> Just tested Xen 4.12.3, but a domU hanged again with credit2. It works rock solid with credit1.

I have several hosts back on credit2, no problems so far.  But the
bulk of my production hosts are still on credit1, and they do seem to
run "better" (subjectively, looking at responsiveness and load
averages) but of course by subjectively I mean that I have no real
data to back this feeling.

I was hoping one of my domU's on credit2 would crash so I could grab
debugging info for the development team - I hope you are/were able to
grab and submit data on that crash???

Glen


From xen-users-bounces@lists.xenproject.org Wed Jun 03 16:57:39 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 16:57:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgWgt-0003Ma-G3; Wed, 03 Jun 2020 16:56:35 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=azRW=7Q=gmail.com=hydrapolic@srs-us1.protection.inumbo.net>)
 id 1jgWgs-0003MV-Js
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 16:56:34 +0000
X-Inumbo-ID: 2dcbdb9c-a5bb-11ea-81bc-bc764e2007e4
Received: from mail-qk1-x736.google.com (unknown [2607:f8b0:4864:20::736])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2dcbdb9c-a5bb-11ea-81bc-bc764e2007e4;
 Wed, 03 Jun 2020 16:56:33 +0000 (UTC)
Received: by mail-qk1-x736.google.com with SMTP id w1so2864338qkw.5;
 Wed, 03 Jun 2020 09:56:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=lC+LcmDTqWh6iLD+2pjOV/lv74IVE5D+i7ERR9trLK8=;
 b=bddfWtgFvJwv9TfQtWQi1eI7fC8hIU20r42V3p/APxe332Yv8CABJZ5GPKsgH3Hyg9
 3GxnH7r4CZz4Fm5EgvwyFaQV5nqKIl/+lIxt0WHVHszSIlEUgsSGgrN2EKdO22WAv8KX
 kZx2e4ZkJO2CnX9R7hAd2ijZZ+3yGKJcy1P/XQlxlUtl3cLPkq5JcVHiFxuAX/NUEFGm
 GYlZUXS2eWnTRsA7c5AKLePKpv8Xdb/MIGbnXyoEIMUJ08vq3fsnWOi+j76nwmww3fSF
 WLwXPYeVR0Ce4B1bBziymocgrv+lOpdxAY63vqPgSP6OBhF5ps5CdmF3xGGzYXbLJXUh
 jCjA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=lC+LcmDTqWh6iLD+2pjOV/lv74IVE5D+i7ERR9trLK8=;
 b=qGeg2aUYtJO8iVY4VqsduobZIc5/tlh1C9yognLLM+3lw1adj9gGH/uNiBQU4ljYSd
 CvqyGkjNgkQ5obo4SBGSMrMrx5nS0e+SjTvZyNitOT51HEkYTkHYFN1bQX+GZCOoEMG8
 vB9rUjt1rSomxpZB700DIFMxjTnW8tWIz+qo4dMMNBSiqFyjoMCZgHzcHc/kgg6J7Qc1
 bHx0WXf7auG5oOL6TxWTHTfcy71Yepo7GO13kOMCEZoYJXYV+YrVb/Q4eCUVX4gNXVRF
 43p3Dk2p++mpwRIE4QdC6y2fS55ELPWKNiQKrgnt02JeHNZkLPcWIllfvcE2ilANOlG+
 QpYQ==
X-Gm-Message-State: AOAM531kNAcEV6tx0xi2g+/0AwHJeMDVLFCHijVtn7viCOraslCoLaz9
 hKqR1tybW5wb7DBRB2UqKtTCWJwKa9abX2tRtnk=
X-Google-Smtp-Source: ABdhPJxBMhu1IsrZsNhB0Ndr9iYzrI6ZmDyp1Dxt2IccgmEBTVIWdtgGHS+pkyh8YBCZ36HD62oiLGBokF9RGO4sK1o=
X-Received: by 2002:a05:620a:210e:: with SMTP id
 l14mr549263qkl.242.1591203392929; 
 Wed, 03 Jun 2020 09:56:32 -0700 (PDT)
MIME-Version: 1.0
References: <CAG6MAzRcvUifqf=m7EE98bz0w_s2+Z=0Nx7YT0SVv75ek0Mc2Q@mail.gmail.com>
 <CAG6MAzR_bU5qnCLKpuUAt-S_dfxjnxgh12gUjnXfsfC7Fw2qMw@mail.gmail.com>
 <CAG6MAzSS0Kw2KHWZpb6O9kfoDKK2spn_WHfy9gnZcZLvES0wnQ@mail.gmail.com>
 <CAG6MAzRZsSaVdO6Qv+Xi1dpaUsrdh+kT9F-_K=8s7fHyXRbFWQ@mail.gmail.com>
 <CAAVVsFmwoopngy6U8z1vUBH5j0gzuTLcMX+NcjQRjwshNr_LDw@mail.gmail.com>
 <CAG6MAzQ4QQjre7o5iLN5gX9=mRkJzy_pDM+aRgXi999yfp0srg@mail.gmail.com>
 <CAG6MAzQfX13KuaWtmJb_3Srdt5FTV+nvKmnNVXq5j8QF44NhTw@mail.gmail.com>
 <CAAVVsFmExExdwkokB1i9=KwT8k=eHABQZruYiA9Yr2MJ7ibyWA@mail.gmail.com>
In-Reply-To: <CAAVVsFmExExdwkokB1i9=KwT8k=eHABQZruYiA9Yr2MJ7ibyWA@mail.gmail.com>
From: Tomas Mozes <hydrapolic@gmail.com>
Date: Wed, 3 Jun 2020 18:56:21 +0200
Message-ID: <CAG6MAzRG-9r-nVr9W03UzzCN0kFoQ92AvG761xD1VByPvKtTNQ@mail.gmail.com>
Subject: Re: [Xen-users] xen domU stall on 4.12.1
To: Glen <glenbarney@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000000494a05a730e992"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000000494a05a730e992
Content-Type: text/plain; charset="UTF-8"

On Wed, Jun 3, 2020 at 5:30 PM Glen <glenbarney@gmail.com> wrote:

> Tomas -
>
> On Tue, Jun 2, 2020 at 7:43 PM Tomas Mozes <hydrapolic@gmail.com> wrote:
> >> On Mon, Feb 24, 2020 at 4:55 PM Glen <glenbarney@gmail.com> wrote:
> >>> I'm now going to bring one of the previously-live guests on its own
> >>> host back to credit2 so I can crash it and try to capture debugging
> >>> output for xen-devel as requested.  But sched=credit is definitely
> >>> what we needed to solve this problem!  Thank you all for helping us
> >>> get there!
> > Just tested Xen 4.12.3, but a domU hanged again with credit2. It works
> rock solid with credit1.
>
> I have several hosts back on credit2, no problems so far.  But the
> bulk of my production hosts are still on credit1, and they do seem to
> run "better" (subjectively, looking at responsiveness and load
> averages) but of course by subjectively I mean that I have no real
> data to back this feeling.
>
> I was hoping one of my domU's on credit2 would crash so I could grab
> debugging info for the development team - I hope you are/were able to
> grab and submit data on that crash???
>
> Glen
>

Unfortunately no, it was one of my production hosts so I wanted to get it
back working as quickly as possible.

Tomas

--00000000000000494a05a730e992
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jun 3, 2020 at 5:30 PM Glen &=
lt;<a href=3D"mailto:glenbarney@gmail.com">glenbarney@gmail.com</a>&gt; wro=
te:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Tomas -<br>
<br>
On Tue, Jun 2, 2020 at 7:43 PM Tomas Mozes &lt;<a href=3D"mailto:hydrapolic=
@gmail.com" target=3D"_blank">hydrapolic@gmail.com</a>&gt; wrote:<br>
&gt;&gt; On Mon, Feb 24, 2020 at 4:55 PM Glen &lt;<a href=3D"mailto:glenbar=
ney@gmail.com" target=3D"_blank">glenbarney@gmail.com</a>&gt; wrote:<br>
&gt;&gt;&gt; I&#39;m now going to bring one of the previously-live guests o=
n its own<br>
&gt;&gt;&gt; host back to credit2 so I can crash it and try to capture debu=
gging<br>
&gt;&gt;&gt; output for xen-devel as requested.=C2=A0 But sched=3Dcredit is=
 definitely<br>
&gt;&gt;&gt; what we needed to solve this problem!=C2=A0 Thank you all for =
helping us<br>
&gt;&gt;&gt; get there!<br>
&gt; Just tested Xen 4.12.3, but a domU hanged again with credit2. It works=
 rock solid with credit1.<br>
<br>
I have several hosts back on credit2, no problems so far.=C2=A0 But the<br>
bulk of my production hosts are still on credit1, and they do seem to<br>
run &quot;better&quot; (subjectively, looking at responsiveness and load<br=
>
averages) but of course by subjectively I mean that I have no real<br>
data to back this feeling.<br>
<br>
I was hoping one of my domU&#39;s on credit2 would crash so I could grab<br=
>
debugging info for the development team - I hope you are/were able to<br>
grab and submit data on that crash???<br>
<br>
Glen<br></blockquote><div><br></div><div>Unfortunately no, it was one of my=
 production hosts so I wanted to get it back working as quickly as possible=
.</div><div><br></div><div>Tomas</div><div><br></div></div></div>

--00000000000000494a05a730e992--


From xen-users-bounces@lists.xenproject.org Wed Jun 03 18:00:04 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 18:00:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgXeq-0001hw-86; Wed, 03 Jun 2020 17:58:32 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ILFW=7Q=teria.org=chris@srs-us1.protection.inumbo.net>)
 id 1jgXeo-0001hq-ME
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 17:58:31 +0000
X-Inumbo-ID: d30d8440-a5c3-11ea-8993-bc764e2007e4
Received: from thinkrosystem.com (unknown [178.33.42.209])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id d30d8440-a5c3-11ea-8993-bc764e2007e4;
 Wed, 03 Jun 2020 17:58:27 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by thinkrosystem.com (Postfix) with ESMTP id 5D39B4064D;
 Wed,  3 Jun 2020 19:58:29 +0200 (CEST)
X-Virus-Scanned: amavisd-new at thinkrosystem.com
Received: from thinkrosystem.com ([127.0.0.1])
 by localhost (mail.thinkrosystem.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id EnSg6oCF7dwC; Wed,  3 Jun 2020 19:58:21 +0200 (CEST)
Received: from station.paris.ld (82-65-28-41.subs.proxad.net [82.65.28.41])
 by thinkrosystem.com (Postfix) with ESMTPSA id 129144064C;
 Wed,  3 Jun 2020 19:58:21 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=teria.org;
 s=teria.org; t=1591207101;
 bh=cQdGAKCqQeWcTwlnmbne00u2C8D81VsbtAKcrbAG080=;
 h=Date:From:To:Subject:In-Reply-To:References:From;
 b=w6OjNE2V2cj2sKxiWT+moZLpH3AJsLwJJ9KAzkA4nxoRVUzsTdVTtwqNzRHe6CoIu
 X3qCr82G9Yyw9mOQYTFD3EMsZIWU6WAmRzXj5WlY3ggsDkv24j+BWpLDMCG6rVM+0v
 faq48HEYjpTNDCF4HraN67m3LYMpaqjKFe0yhFzJiCl8dmZTTvikf0w2mMoSWQK+LB
 EHQD7DmwKQYa9yLtMncIMZUHRlLTCzRfv2ibkivsK5Gc8qOOFeguYcvF4cJsAPeMuq
 IyOinV57Gg2aDTqlO7FPvqj4oFQnz0WWXOzFsVY9cEdTbVeQCs4YQZuAG+pP3RVpzt
 gIGPBUSJWW+qQ==
Date: Wed, 3 Jun 2020 19:58:15 +0200
From: Chris <chris@teria.org>
To: xen-users@lists.xenproject.org
Subject: Restartinf a PVHVM domU with pci-passthrough hangs on Xen 4.13.1
Message-ID: <20200603195815.5a7b0a4d@station.paris.ld>
In-Reply-To: <dd2f58bc-0b3c-537d-bd92-b786cf5c5278@helimail.de>
References: <ec1c83ae-67e5-6781-d01d-63d6f83a7b86@helimail.de>
 <000801d62bcb$a069c4d0$e13d4e70$@gmail.com>
 <20200518152925.7d3e7ee5@station.paris.ld>
 <dd2f58bc-0b3c-537d-bd92-b786cf5c5278@helimail.de>
Organization: Teria
X-Mailer: Claws Mail 3.17.5 (GTK+ 2.24.31; x86_64-slackware-linux-gnu)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,


I did several tests on different versions of Xen with these results concerning the reboot of a domU with pci-passthrough (hardware : Supermicro A2SDi-4C-HLN4F with one LSI 9211-4i dedicated to a PVHVM domU) :
* Xen 4.12.1 : OK with domU's reboot
* Xen 4.12.2 : OK with domU's reboot
* Xen 4.12.3 : Not tested
* Xen 4.13.0 : OK with domU's reboot
* Xen 4.13.1 : Not OK with domU's reboot (dom0 has to be rebooted ...)

The issue seems to have reappeared (cf thread on xen-users titled "PCI pass-through issue with Xen 4.11 under ubuntu 20.04") ... Annoying ...

By dichotomy, I tried with a custom compiled version of Qemu 4.1.1 (version used by Xen 4.13.1 instead of Qemu 4.1.0 with Xen 4.13.0) which allows to reboot a VM vith the HBA without issue on KVM (I compiled Qemu and the kernel - 5.4.42 so far - with the support of both KVM and Xen. So I can switch between them for tests). But with Xen 4.13.1, no luck, the domU waits forever during restart on the PCI device. However, nothing seems wrong with the logs on the dom0.

Relevant logs on the domU's console (Freenas 11.3) : 
"mps0 : Calling Reinit from mps_wait_command, timeout=60, elapsed=60
mps0 : Reinitializing controller,"
At this stage, destroying the domU raises this warning :
"libxl: warning: libxl_pci.c:2141:pci_remove_timeout: Domain 4:timed out waiting for DM to remove pci-pt-02_00.0"

If I try to dedicate a NVME device to the PVHVM domU, the first boot is OK, but, as I reboot the VM, this log appears on the domU's console (still Freenas 11.3) :
"nvme0: Missing interrupt"

I could make other tests if a dev or a Xen guru could guide me !


Regards,


Chris


From xen-users-bounces@lists.xenproject.org Wed Jun 03 18:02:39 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Jun 2020 18:02:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgXih-0002nr-TA; Wed, 03 Jun 2020 18:02:31 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IAYY=7Q=antarean.org=joost@srs-us1.protection.inumbo.net>)
 id 1jgXig-0002nk-92
 for xen-users@lists.xenproject.org; Wed, 03 Jun 2020 18:02:30 +0000
X-Inumbo-ID: 6371b66e-a5c4-11ea-9dbe-bc764e2007e4
Received: from gw2.antarean.org (unknown [141.105.125.208])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 6371b66e-a5c4-11ea-9dbe-bc764e2007e4;
 Wed, 03 Jun 2020 18:02:29 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49ccFK3HHgz8wRP
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 20:02:29 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from gw2.antarean.org ([127.0.0.1])
 by localhost (gw2.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Me5dg14rbHuG for <xen-users@lists.xenproject.org>;
 Wed,  3 Jun 2020 20:02:29 +0200 (CEST)
Received: from mailstore1.antarean.org (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49ccFK0hY2z8wGZ
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 20:02:29 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49ccFJ0PZ4z15
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 20:02:28 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from mailstore1.antarean.org ([127.0.0.1])
 by localhost (mailstore1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 38ki-NJAs8Eq for <xen-users@lists.xenproject.org>;
 Wed,  3 Jun 2020 20:02:27 +0200 (CEST)
Received: from lan102.nl.antarean.org (lan102.nl.antarean.org [10.20.13.202])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256)
 (No client certificate requested)
 by mailstore1.antarean.org (Postfix) with ESMTPSA id 49ccFH4qNdzj
 for <xen-users@lists.xenproject.org>; Wed,  3 Jun 2020 20:02:27 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=antarean.org;
 s=default; t=1591207347;
 bh=/67Bdj4Z3gZWRDY+DgNeZwVDqaSkk50I/KKFgeLNJl8=;
 h=Date:In-Reply-To:References:Subject:To:From;
 b=nY8wLbtddUNH2qCY8Eba96mAfrFXm8HPFai/n/+40zlBVtlI6LbfBQKjYdkhWuMPn
 zYErVvz9TyzZoZzZZNfz/fxGAP5tqZz2mWttmcsQOn2D7Pi4e6WX21+abRk+gcZTXF
 jFZiZ1XSh48UeJyG4yJW63MoTH/q9LTI+VGyUNVE=
Date: Wed, 03 Jun 2020 20:02:25 +0200
User-Agent: K-9 Mail for Android
In-Reply-To: <f93453bd-44a1-2dae-d677-c9e87eea7674@suse.com>
References: <2173167.ElGaqSPkdT@eve>
 <9614dda8-7b6c-1e03-e78a-7fd8525bb9c4@suse.com> <2041847.irdbgypaU6@eve>
 <f93453bd-44a1-2dae-d677-c9e87eea7674@suse.com>
MIME-Version: 1.0
Content-Type: text/plain;
 charset=utf-8
Content-Transfer-Encoding: quoted-printable
Subject: [Solved] Re: Unable to start more than 14 domUs -
 libxl__xs_transaction_commit: could not commit xenstore transaction
To: xen-users@lists.xenproject.org
From: "J. Roeleveld" <joost@antarean.org>
Message-ID: <CB68C708-375A-411B-8A43-FD45423C1C24@antarean.org>
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

TLDR version: Setting "-E 10000" for xenstored and rebooting solved the iss=
ue=2E


On 3 June 2020 15:26:19 CEST, "J=C3=BCrgen Gro=C3=9F" <jgross@suse=2Ecom> =
wrote:
>On 03=2E06=2E20 15:01, J=2E Roeleveld wrote:
>> On Wednesday, June 3, 2020 2:56:06 PM CEST J=C3=BCrgen Gro=C3=9F wrote:
>>> On 03=2E06=2E20 14:15, J=2E Roeleveld wrote:
>>>> Hi all,
>>>>
>>>> I upgraded to Xen 4=2E12=2E2 recently and since the upgrade, I am
>unable to
>>>> start more than 14 domUs=2E >
>>>> The error, when trying to start the 15th, is:
>>>> Parsing config from /etc/xen/boot/stage7/dbtest
>>>> libxl: error: libxl_xshelp=2Ec:265:libxl__xs_transaction_commit:
>could not
>>>> commit xenstore transaction: No space left on device
>>>> libxl: error: libxl_xshelp=2Ec:265:libxl__xs_transaction_commit:
>could not
>>>> commit xenstore transaction: No space left on device
>>>> libxl: error: libxl_create=2Ec:1318:domcreate_launch_dm: Domain
>20:unable to
>>>> add disk devices
>>>> libxl: error: libxl_domain=2Ec:1038:libxl__destroy_domid: Domain
>>>> 20:Non-existant domain
>>>> libxl: error: libxl_domain=2Ec:993:domain_destroy_callback: Domain
>20:Unable
>>>> to destroy guest
>>>> libxl: error: libxl_domain=2Ec:920:domain_destroy_cb: Domain
>20:Destruction
>>>> of domain failed
>>>>
>>>>
>>>>
>>>> The domUs showing the issue get the disks from a driver-domain=2E
>>>
>>> Ah, this might be related to hitting some Xenstore quota=2E
>>>
>>> As you are seeing the problem in libxl__xs_transaction_commit I
>guess
>>> you should increase the number of Xenstore entries per domain=2E
>>>
>>> The default is 1000, you can set the value via the -E start
>parameter of
>>> xenstored (e=2Eg=2E "-E 5000" to set it to 5000), or if you are using
>>> oxenstored by editing your /etc/xen/oxenstored=2Econf file (entry
>>> "quota-maxentity")=2E
>>=20
>> Has this default been changed/lowered?
>> Or has there been an increase in amount of values in xenstore?
>
>Depends=2E Which Xen version did you use before, and which Xenstore
>variant (xenstored, oxenstored, or xenstore-stubdom) are you using?
>Did you change anything in the driver domain?

I need to check the logs to see which version it was=2E I wasn't that far =
behind in version numbers=2E
I am running Gentoo as my OS and afaik, I only have 1 option: "xenstored" =
 not heard of the other options yet, will do some research=2E (If you have =
some bookmarks, I would appreciate it=2E Otherwise it'll be whatever I can =
find)

I already noticed the issue before updating the driver domain=2E Initially=
 I suspected a version mismatch and waited for a chance to update the drive=
r domain=2E As that also didn't solve it and I still couldn't find anything=
 usefull online, I asked for help here=2E

>> As this will require a reboot of the server, I will not be able to
>test this
>> before the weekend=2E Is there any way to confirm this is actually the
>case
>> without a restart?
>
>There are strong hints in the data you presented:
>
>libxl__xs_transaction_commit() is only calling xs_transaction_end()
>and the error you are seeing is ENOSPC=2E In transaction end handling
>the only reason for ENOSPC is hitting the quota for the number of
>Xenstore nodes per domain=2E
>
>You can easily check this by calling
>
>xenstore-ls -p
>
>in dom0 and count the number of entries which are owned by the driver
>domain, an entry looks like:
>
>       console =3D "" =2E =2E =2E =2E =2E =2E =2E =2E =2E =2E =2E =2E =2E=
 =2E =2E =2E =2E =2E =2E =2E =2E  (n0,n1)
>
>where "(n0,n1)" are the permissions of the entry=2E The first permission
>entry "n0" is the owner (drop the letter, and you get the domid of the
>owner, in my example "0")=2E

I will investigate the output later this week=2E Did see a strong hint at =
the "1000" value=2E The "ldb" file for xenstored was 1000kb in size=2E
I set the option to "-E 10000" to be certain I won't have this issue again=
 for a long time and managed to organize a slot to reboot the system=2E
And, thank you so very much, the issue has now been solved=2E

Many thanks,

Joost


--=20
Sent from my Android device with K-9 Mail=2E Please excuse my brevity=2E


From xen-users-bounces@lists.xenproject.org Thu Jun 04 12:01:53 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2020 12:01:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgoXp-00015D-6s; Thu, 04 Jun 2020 12:00:25 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mP7X=7R=antarean.org=joost@srs-us1.protection.inumbo.net>)
 id 1jgoXm-000150-L3
 for xen-users@lists.xenproject.org; Thu, 04 Jun 2020 12:00:23 +0000
X-Inumbo-ID: f731643a-a65a-11ea-9947-bc764e2007e4
Received: from gw2.antarean.org (unknown [141.105.125.208])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id f731643a-a65a-11ea-9947-bc764e2007e4;
 Thu, 04 Jun 2020 12:00:21 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49d4916Bd3z8wRT
 for <xen-users@lists.xenproject.org>; Thu,  4 Jun 2020 14:00:21 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from gw2.antarean.org ([127.0.0.1])
 by localhost (gw2.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id gImVWyaIKonk for <xen-users@lists.xenproject.org>;
 Thu,  4 Jun 2020 14:00:21 +0200 (CEST)
Received: from mailstore1.antarean.org (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49d491431Jz8wGZ
 for <xen-users@lists.xenproject.org>; Thu,  4 Jun 2020 14:00:21 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49d4902ykjz15
 for <xen-users@lists.xenproject.org>; Thu,  4 Jun 2020 14:00:20 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from mailstore1.antarean.org ([127.0.0.1])
 by localhost (mailstore1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id SdmIFcdbN53s for <xen-users@lists.xenproject.org>;
 Thu,  4 Jun 2020 14:00:20 +0200 (CEST)
Received: from eve.localnet (eve.adm.antarean.org [10.55.16.44])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49d4901VPmzj
 for <xen-users@lists.xenproject.org>; Thu,  4 Jun 2020 14:00:20 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=antarean.org;
 s=default; t=1591272020;
 bh=6DF9315ZqDz2KdYjzifXzK8SbD2EIA0ouhwyD49wkUY=;
 h=From:To:Subject:Date:In-Reply-To:References;
 b=I4F6B1ey5QZT5tKsOoq9wo9aEQk0P7qLk6K8vepgybGE8/Rh+WNPikxS0rhcGNMqC
 +WuxXqihXnEZc1rWxeABuvbgdm3NqK6jGaIk1Ph2m9KO3BtwMOOaYYrkB0/8skQlzw
 SoN0Umnd6ZhjVzL6ZmWIFFqfId07uzvt9O+ILkNc=
From: "J. Roeleveld" <joost@antarean.org>
To: xen-users@lists.xenproject.org
Subject: Re: Unable to start more than 14 domUs -
 libxl__xs_transaction_commit: could not commit xenstore transaction
Date: Thu, 04 Jun 2020 14:00:20 +0200
Message-ID: <5608689.lOV4Wx5bFT@eve>
Organization: Antarean
In-Reply-To: <f93453bd-44a1-2dae-d677-c9e87eea7674@suse.com>
References: <2173167.ElGaqSPkdT@eve> <2041847.irdbgypaU6@eve>
 <f93453bd-44a1-2dae-d677-c9e87eea7674@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On Wednesday, June 3, 2020 3:26:19 PM CEST J=FCrgen Gro=DF wrote:
> On 03.06.20 15:01, J. Roeleveld wrote:
> > On Wednesday, June 3, 2020 2:56:06 PM CEST J=FCrgen Gro=DF wrote:

> >> The default is 1000, you can set the value via the -E start parameter =
of
> >> xenstored (e.g. "-E 5000" to set it to 5000), or if you are using
> >> oxenstored by editing your /etc/xen/oxenstored.conf file (entry
> >> "quota-maxentity").
> >=20
> > Has this default been changed/lowered?
> > Or has there been an increase in amount of values in xenstore?
>=20
> Depends. Which Xen version did you use before, and which Xenstore
> variant (xenstored, oxenstored, or xenstore-stubdom) are you using?
> Did you change anything in the driver domain?

My previous version was 4.11.2.
Using xenstored.
No changes done to the driver domain.
=2D Issue occured initially when driver domain was still on 4.11.2
=2D Issue still occured when driver domain was upgraded to 4.12.2

In my opinion, putting a quota on the xenstored database at 1000kb is far t=
oo=20
low. I am not doing anything special and have had no issues running over 20=
=20
VMs simultaneously in the past.

Suddenly encountering this is unexpected and, if sane defaults are used,=20
unnecessary.

Do you happen to know if this limit was changed between 4.11 and 4.12 or if=
=20
the xenstored usage increased without realising?
I also can not find any list of "xenstored" commandline options to change=20
these settings on the xen-website or anywhere else. What do I need to put i=
nto=20
google to find this?

=2D-
Joost




From xen-users-bounces@lists.xenproject.org Thu Jun 04 13:10:22 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2020 13:10:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgpcF-00080a-M1; Thu, 04 Jun 2020 13:09:03 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=pUjb=7R=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1jgpcE-00080V-Ed
 for xen-users@lists.xenproject.org; Thu, 04 Jun 2020 13:09:02 +0000
X-Inumbo-ID: 8ec135ce-a664-11ea-9dbe-bc764e2007e4
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 8ec135ce-a664-11ea-9dbe-bc764e2007e4;
 Thu, 04 Jun 2020 13:09:01 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id 02529AD07;
 Thu,  4 Jun 2020 13:09:03 +0000 (UTC)
Subject: Re: Unable to start more than 14 domUs -
 libxl__xs_transaction_commit: could not commit xenstore transaction
To: "J. Roeleveld" <joost@antarean.org>, xen-users@lists.xenproject.org
References: <2173167.ElGaqSPkdT@eve> <2041847.irdbgypaU6@eve>
 <f93453bd-44a1-2dae-d677-c9e87eea7674@suse.com> <5608689.lOV4Wx5bFT@eve>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <b34c3667-bf9d-1551-e9b8-186f94ae0ccb@suse.com>
Date: Thu, 4 Jun 2020 15:09:00 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <5608689.lOV4Wx5bFT@eve>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 04.06.20 14:00, J. Roeleveld wrote:
> On Wednesday, June 3, 2020 3:26:19 PM CEST Jürgen Groß wrote:
>> On 03.06.20 15:01, J. Roeleveld wrote:
>>> On Wednesday, June 3, 2020 2:56:06 PM CEST Jürgen Groß wrote:
> 
>>>> The default is 1000, you can set the value via the -E start parameter of
>>>> xenstored (e.g. "-E 5000" to set it to 5000), or if you are using
>>>> oxenstored by editing your /etc/xen/oxenstored.conf file (entry
>>>> "quota-maxentity").
>>>
>>> Has this default been changed/lowered?
>>> Or has there been an increase in amount of values in xenstore?
>>
>> Depends. Which Xen version did you use before, and which Xenstore
>> variant (xenstored, oxenstored, or xenstore-stubdom) are you using?
>> Did you change anything in the driver domain?
> 
> My previous version was 4.11.2.
> Using xenstored.
> No changes done to the driver domain.
> - Issue occured initially when driver domain was still on 4.11.2
> - Issue still occured when driver domain was upgraded to 4.12.2
> 
> In my opinion, putting a quota on the xenstored database at 1000kb is far too
> low. I am not doing anything special and have had no issues running over 20
> VMs simultaneously in the past.

The quota is for number of Xenstore entries per domain.

> Suddenly encountering this is unexpected and, if sane defaults are used,
> unnecessary.
> 
> Do you happen to know if this limit was changed between 4.11 and 4.12 or if
> the xenstored usage increased without realising?

The default limits didn't change.

I could imagine that the number of Xenstore entries per device did
change. I'm not aware of any other changes which could explain the
different behavior.

> I also can not find any list of "xenstored" commandline options to change
> these settings on the xen-website or anywhere else. What do I need to put into
> google to find this?

xenstored --help

will list all options.

I should note that I have raised this issue in the community and we'll
discuss how to address it (e.g. by adding per-domain Xenstore quota via
the domain config).


Juergen


From xen-users-bounces@lists.xenproject.org Thu Jun 04 14:20:18 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2020 14:20:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgqhs-0006Oi-Eo; Thu, 04 Jun 2020 14:18:56 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zUWi=7R=gmail.com=siddhuvgowda.18695@srs-us1.protection.inumbo.net>)
 id 1jgqhr-0006Od-8S
 for xen-users@lists.xenproject.org; Thu, 04 Jun 2020 14:18:55 +0000
X-Inumbo-ID: 51e24026-a66e-11ea-9dbe-bc764e2007e4
Received: from mail-io1-xd2c.google.com (unknown [2607:f8b0:4864:20::d2c])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 51e24026-a66e-11ea-9dbe-bc764e2007e4;
 Thu, 04 Jun 2020 14:18:54 +0000 (UTC)
Received: by mail-io1-xd2c.google.com with SMTP id c8so6492550iob.6
 for <xen-users@lists.xenproject.org>; Thu, 04 Jun 2020 07:18:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=SNR0xm/roCPndzfQJPm1yuh6oDVWEzZQABxa8+OIUzs=;
 b=ZR+DC4hl7tAopv2/J+rebprXRQAZimaDQaP4Oo8vnlRU31A9cthws83dZxXio/BBXH
 NCFHoA11+tu8ZzW08VqiPwIOveldRGPbjiuiPj92ABIWgkKqXLsybgYYe1yPT6Rz8rit
 nbnxOomHU7mVPNLVqbI/E7xdlqiVdGGpAFP4umLr5Z53LP6NDZ8rRvLvmX5WkKOnAMe9
 O1skao1sl7kYrrAdGw3Iw7wt11apehGiQVfVN0zh5nOAWli1tN8owSca5eduUfC38FSm
 wkL3foBAsu5suC6f8+ClGFxx61GUphBf2jQwJ/KgzY/cWO4QuOyqXD5d1xXt66kHIiWD
 85cQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=SNR0xm/roCPndzfQJPm1yuh6oDVWEzZQABxa8+OIUzs=;
 b=ZsT2XBm7AWYTkbk7qt5TmG+KyM7Yj2x13iL9HwaDdR7566tTsRYUJUKnqXgGSP4utE
 5EnOeeudKso0PurD/6Yl9zKJhn6aDLvfCIaF9gtuXNAR0/mXsyMqpuiuU40jWYLTBSNb
 7oF9C1lLI7S+9fDt1o1LvGYFECO1XltE6IBuP27N4MxBO81x3yJB+vHRyMF8iyyhs7Uy
 Nc86iFUlnZy4HCjdsZPOK+uDsnL7Ng6t4kAw2541LQ4EgzbjMXP0nrkX8k074PmGbton
 yxFnC6kz7DeqfmfbiKWAmCHGt0OKZDoFmJGZrRuvxw/0Zklm5gS+IlXX6sbAQMpayxhH
 kcJg==
X-Gm-Message-State: AOAM533LIb+mD0424Z9DLd6uJ3cWb6/mJOHRN5I85djVo5BOr25KuqHF
 Y7jRDQS/CDWKfEAc8qlhMpRFaQE96NlxkW9O9OCMZIO4oAw=
X-Google-Smtp-Source: ABdhPJyYbdDudoK6QfViNPJFgtb1j1mWOsQ8cxfofgiLqtohEQRc1sp/qe6I+vb8xVcK2d8EMnazuOytvwlXvy4pLH0=
X-Received: by 2002:a02:5184:: with SMTP id s126mr4445991jaa.30.1591280332950; 
 Thu, 04 Jun 2020 07:18:52 -0700 (PDT)
MIME-Version: 1.0
From: siddhartha v <siddhuvgowda.18695@gmail.com>
Date: Thu, 4 Jun 2020 19:48:41 +0530
Message-ID: <CAEkELtB6P+AOuvm0n4JU9SMsSgOpB91B53_xDjYHO9QQ5a9QNQ@mail.gmail.com>
Subject: How to resolve the ERROR: xen-image-minimal-1.0-r0 do_rootfs:
 Function failed: do_rootfs. and ERROR: xen-image-minimal-1.0-r0 do_rootfs:
 Could not invoke dnf. ERROR: xen-image-minimal-1.0-r0 do_rootfs: Could not
 invoke dnf.
To: xen-users@lists.xenproject.org, xen-arm@lists.xensource.com, 
 cardoe@gentoo.org
Content-Type: multipart/mixed; boundary="000000000000fc5e6e05a742d273"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000fc5e6e05a742d273
Content-Type: multipart/alternative; boundary="000000000000fc5e6b05a742d271"

--000000000000fc5e6b05a742d271
Content-Type: text/plain; charset="UTF-8"

Hello dear xen team,

I am building the xen minimal image using yocto warrior ("bitbake
xen-image-minimal") by giving the target machine as "raspberrypi4". I have
already created a post (Failure to build xen-image-minimal. Yocto bitbake
failed @99% while building xen-minimal-image
<https://lists.yoctoproject.org/g/meta-virtualization/topic/failure_to_build/74495311?p=,,,20,0,0,0::recentpostdate%2Fsticky,,,20,2,0,74495311>).
>From past ten days I have been stuck here. I felt it might not be reaching
the purpose so I am creating again.I am not finding any info anywhere since
13 days. I am stuck in this issue.


My bblayer.conf file is as below:
# POKY_BBLAYERS_CONF_VERSION is increased each time build/conf/bblayers.conf
# changes incompatibly
POKY_BBLAYERS_CONF_VERSION = "2"
BBPATH = "${TOPDIR}"

BBFILES ?= ""
BBLAYERS ?= " \

  /home/siddhu/Documents/yocto/sources/poky/meta \
  /home/siddhu/Documents/yocto/sources/poky/meta-poky \
  /home/siddhu/Documents/yocto/sources/poky/meta-yocto-bsp \
  /home/siddhu/Documents/yocto/sources/meta-openembedded/meta-oe \
  /home/siddhu/Documents/yocto/sources/meta-openembedded/meta-multimedia \
  /home/siddhu/Documents/yocto/sources/meta-openembedded/meta-python \
  /home/siddhu/Documents/yocto/sources/meta-openembedded/meta-networking \
  /home/siddhu/Documents/yocto/sources/meta-openembedded/meta-filesystems \
  /home/siddhu/Documents/yocto/sources/meta-cloud-services \
  /home/siddhu/Documents/yocto/sources/meta-selinux \
  /home/siddhu/Documents/yocto/sources/meta-virtualization\
  /home/siddhu/Documents/yocto/sources/meta-raspberrypi \
  "

My local.conf file I have added the below details:
MACHINE ??= "raspberrypi4"
DISTRO_FEATURES += "virtualization xen"
PACKAGE_CLASSES ?= "package_rpm"
CONF_VERSION = "1"
IMAGE_FEATURES += "ssh-server-dropbear"
Actually I have manually enabled the "CONFIG_XEN=y" (which was not set
earlier) in .config file @ path :
/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/linux-raspberrypi/1_4.19.88+gitAUTOINC+988cc7beac-r0/linux-raspberrypi4-standard-build/
later I anable "CONFIG_NETXEN_NIC=y"(which was not set earlier)
But even then I am not able to build the final kernel image.

But I am getting a warning:
WARNING:
/home/siddhu/Documents/yocto/sources/meta-raspberrypi/recipes-kernel/linux/linux-raspberrypi_4.19.bb.do_compile
is tainted from a forced run
Initialising tasks: 100% |#######################################| Time:
0:00:04
Sstate summary: Wanted 27 Found 25 Missed 2 Current 840 (92% match, 99%
complete)

Will it impact on image anyway?

Below is the my error details:


NOTE: Executing SetScene Tasks
NOTE: Executing RunQueue Tasks
ERROR: xen-image-minimal-1.0-r0 do_rootfs: Could not invoke dnf. Command
'/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/recipe-sysroot-native/usr/bin/dnf
-v --rpmverbosity=info -y -c
/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/rootfs/etc/dnf/dnf.conf
--setopt=reposdir=/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/rootfs/etc/yum.repos.d
--installroot=/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/rootfs
--setopt=logdir=/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/temp
--repofrompath=oe-repo,/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/oe-rootfs-repo
--nogpgcheck install kernel-module-xen-blkback kernel-module-xen-gntalloc
kernel-module-xen-gntdev kernel-module-xen-netback kernel-module-xen-wdt
packagegroup-core-boot packagegroup-core-ssh-dropbear
packagegroup-core-ssh-openssh qemu run-postinsts xen-base locale-base-en-us
locale-base-en-gb' returned 1:
DNF version: 4.1.0
cachedir:
/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/rootfs/var/cache/dnf
Added oe-repo repo from
/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/oe-rootfs-repo
repo: using cache for: oe-repo
not found other for:
not found modules for:
not found deltainfo for:
not found updateinfo for:
oe-repo: using metadata from Thu 04 Jun 2020 11:38:41 AM UTC.
Last metadata expiration check: 0:00:01 ago on Thu 04 Jun 2020 11:38:42 AM
UTC.
No module defaults found
No match for argument: kernel-module-xen-blkback
No match for argument: kernel-module-xen-gntalloc
No match for argument: kernel-module-xen-gntdev
No match for argument: kernel-module-xen-netback
No match for argument: kernel-module-xen-wdt
Error: Unable to find a match

ERROR: xen-image-minimal-1.0-r0 do_rootfs:
ERROR: xen-image-minimal-1.0-r0 do_rootfs: Function failed: do_rootfs
ERROR: Logfile of failure stored in:
/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/temp/log.do_rootfs.31739
ERROR: Task
(/home/siddhu/Documents/yocto/sources/meta-virtualization/recipes-extended/images/xen-image-minimal.bb:do_rootfs)
failed with exit code '1'
NOTE: Tasks Summary: Attempted 2605 tasks of which 2604 didn't need to be
rerun and 1 failed.

Summary: 1 task failed:

/home/siddhu/Documents/yocto/sources/meta-virtualization/recipes-extended/images/xen-image-minimal.bb:
do_rootfs


I have tried the same for "cubieboard2" also even there I faced the same
issue.Eagerly waiting for the response.


I have attached the recent log too Please help me on this.







-- 
Thanks and Regards.
Siddhartha V.

--000000000000fc5e6b05a742d271
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><p style=3D"box-sizing:border-box;margin:0px 0px 10px;font=
-size:14px;color:rgb(36,41,46);font-family:-apple-system,BlinkMacSystemFont=
,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&quot;Apple Color Emoji&qu=
ot;,&quot;Segoe UI Emoji&quot;">Hello dear xen team,</p><p style=3D"box-siz=
ing:border-box;margin:0px 0px 10px;font-size:14px;color:rgb(36,41,46);font-=
family:-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Aria=
l,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">I am=
 building the xen minimal image using yocto warrior<span style=3D"box-sizin=
g:border-box;font-weight:bold">=C2=A0(&quot;bitbake xen-image-minimal&quot;=
)=C2=A0</span>by giving the target machine as=C2=A0<span style=3D"box-sizin=
g:border-box;font-weight:bold">&quot;raspberrypi4&quot;</span>.=C2=A0I have=
 already created a post (<a href=3D"https://lists.yoctoproject.org/g/meta-v=
irtualization/topic/failure_to_build/74495311?p=3D,,,20,0,0,0::recentpostda=
te%2Fsticky,,,20,2,0,74495311" rel=3D"nofollow noopener" target=3D"_blank" =
style=3D"box-sizing:border-box;background-color:transparent;color:rgb(51,12=
2,183);text-decoration-line:none">Failure to build xen-image-minimal. Yocto=
 bitbake failed @99% while building xen-minimal-image</a>). From past ten d=
ays I have been stuck here. I felt it might not be reaching the purpose so =
I am creating again.I am not finding any info anywhere since 13 days. I am =
stuck in this issue.</p><p style=3D"box-sizing:border-box;margin:0px 0px 10=
px;font-size:14px;color:rgb(36,41,46);font-family:-apple-system,BlinkMacSys=
temFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&quot;Apple Color E=
moji&quot;,&quot;Segoe UI Emoji&quot;"><br></p><p style=3D"box-sizing:borde=
r-box;margin:0px 0px 10px;font-size:14px;color:rgb(36,41,46);font-family:-a=
pple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-se=
rif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;"><span style=
=3D"box-sizing:border-box;font-weight:bold">My bblayer.conf file is as belo=
w:</span><br style=3D"box-sizing:border-box"><span style=3D"box-sizing:bord=
er-box"># POKY_BBLAYERS_CONF_VERSION is increased each time build/conf/bbla=
yers.conf<br style=3D"box-sizing:border-box"></span><span style=3D"box-sizi=
ng:border-box"># changes incompatibly<br style=3D"box-sizing:border-box"></=
span><span style=3D"box-sizing:border-box">POKY_BBLAYERS_CONF_VERSION =3D &=
quot;2&quot;<br style=3D"box-sizing:border-box"></span><span style=3D"box-s=
izing:border-box">BBPATH =3D &quot;${TOPDIR}&quot;<br style=3D"box-sizing:b=
order-box"><br style=3D"box-sizing:border-box"></span><span style=3D"box-si=
zing:border-box">BBFILES ?=3D &quot;&quot;<br style=3D"box-sizing:border-bo=
x"></span><span style=3D"box-sizing:border-box">BBLAYERS ?=3D &quot; \</spa=
n></p><p style=3D"box-sizing:border-box;margin:0px 0px 10px;color:rgb(51,51=
,51);font-family:&quot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif;font=
-size:14px"><span style=3D"box-sizing:border-box;color:rgb(36,41,46);font-f=
amily:-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial=
,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">=C2=
=A0 /home/siddhu/Documents/yocto/sources/poky/meta \<br style=3D"box-sizing=
:border-box"></span><span style=3D"box-sizing:border-box;color:rgb(36,41,46=
);font-family:-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helveti=
ca,Arial,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot=
;">=C2=A0 /home/siddhu/Documents/yocto/sources/poky/meta-poky \<br style=3D=
"box-sizing:border-box"></span><span style=3D"box-sizing:border-box;color:r=
gb(36,41,46);font-family:-apple-system,BlinkMacSystemFont,&quot;Segoe UI&qu=
ot;,Helvetica,Arial,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI=
 Emoji&quot;">=C2=A0 /home/siddhu/Documents/yocto/sources/poky/meta-yocto-b=
sp \<br style=3D"box-sizing:border-box"></span><span style=3D"box-sizing:bo=
rder-box;color:rgb(36,41,46);font-family:-apple-system,BlinkMacSystemFont,&=
quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&quot;Apple Color Emoji&quot=
;,&quot;Segoe UI Emoji&quot;">=C2=A0 /home/siddhu/Documents/yocto/sources/m=
eta-openembedded/meta-oe \<br style=3D"box-sizing:border-box"></span><span =
style=3D"box-sizing:border-box;color:rgb(36,41,46);font-family:-apple-syste=
m,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&quot;=
Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">=C2=A0 /home/siddhu/Doc=
uments/yocto/sources/meta-openembedded/meta-multimedia \<br style=3D"box-si=
zing:border-box"></span><span style=3D"box-sizing:border-box;color:rgb(36,4=
1,46);font-family:-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Hel=
vetica,Arial,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;">=C2=A0 /home/siddhu/Documents/yocto/sources/meta-openembedded/meta-p=
ython \<br style=3D"box-sizing:border-box"></span><span style=3D"box-sizing=
:border-box;color:rgb(36,41,46);font-family:-apple-system,BlinkMacSystemFon=
t,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&quot;Apple Color Emoji&q=
uot;,&quot;Segoe UI Emoji&quot;">=C2=A0 /home/siddhu/Documents/yocto/source=
s/meta-openembedded/meta-networking \<br style=3D"box-sizing:border-box"></=
span><span style=3D"box-sizing:border-box;color:rgb(36,41,46);font-family:-=
apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-s=
erif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">=C2=A0 /home=
/siddhu/Documents/yocto/sources/meta-openembedded/meta-filesystems \<br sty=
le=3D"box-sizing:border-box"></span><span style=3D"box-sizing:border-box;co=
lor:rgb(36,41,46);font-family:-apple-system,BlinkMacSystemFont,&quot;Segoe =
UI&quot;,Helvetica,Arial,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Seg=
oe UI Emoji&quot;">=C2=A0 /home/siddhu/Documents/yocto/sources/meta-cloud-s=
ervices \<br style=3D"box-sizing:border-box"></span><span style=3D"box-sizi=
ng:border-box;color:rgb(36,41,46);font-family:-apple-system,BlinkMacSystemF=
ont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&quot;Apple Color Emoji=
&quot;,&quot;Segoe UI Emoji&quot;">=C2=A0 /home/siddhu/Documents/yocto/sour=
ces/meta-selinux \<br style=3D"box-sizing:border-box"></span><span style=3D=
"box-sizing:border-box;color:rgb(36,41,46);font-family:-apple-system,BlinkM=
acSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&quot;Apple Co=
lor Emoji&quot;,&quot;Segoe UI Emoji&quot;">=C2=A0 /home/siddhu/Documents/y=
octo/sources/meta-virtualization\<br style=3D"box-sizing:border-box"></span=
><span style=3D"box-sizing:border-box;color:rgb(36,41,46);font-family:-appl=
e-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif=
,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">=C2=A0 /home/sid=
dhu/Documents/yocto/sources/meta-raspberrypi \<br style=3D"box-sizing:borde=
r-box"></span><span style=3D"box-sizing:border-box;color:rgb(36,41,46);font=
-family:-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Ari=
al,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">=C2=
=A0 &quot;<br style=3D"box-sizing:border-box"><br style=3D"box-sizing:borde=
r-box"><span style=3D"box-sizing:border-box;font-weight:bold">My local.conf=
 file I have added the below details:</span><br style=3D"box-sizing:border-=
box"></span><span style=3D"box-sizing:border-box;color:rgb(36,41,46);font-f=
amily:-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial=
,sans-serif,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">MACHI=
NE ??=3D &quot;raspberrypi4&quot;<br style=3D"box-sizing:border-box"></span=
><span style=3D"box-sizing:border-box;color:rgb(36,41,46);font-family:-appl=
e-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif=
,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">DISTRO_FEATURES =
+=3D &quot;virtualization xen&quot;<br style=3D"box-sizing:border-box"></sp=
an><span style=3D"box-sizing:border-box;color:rgb(36,41,46);font-family:-ap=
ple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-ser=
if,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;">PACKAGE_CLASSE=
S ?=3D &quot;package_rpm&quot;<br style=3D"box-sizing:border-box"></span>CO=
NF_VERSION =3D &quot;1&quot;<br style=3D"box-sizing:border-box">IMAGE_FEATU=
RES +=3D &quot;ssh-server-dropbear&quot;</p><div style=3D"box-sizing:border=
-box;color:rgb(51,51,51);font-family:&quot;Helvetica Neue&quot;,Helvetica,A=
rial,sans-serif;font-size:14px"><span style=3D"box-sizing:border-box;font-w=
eight:700">Actually I have manually enabled the &quot;CONFIG_XEN=3Dy&quot; =
(which was not set earlier) in .config file @ path :</span>=C2=A0<br style=
=3D"box-sizing:border-box"><div style=3D"box-sizing:border-box">/home/siddh=
u/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/linux-rasp=
berrypi/1_4.19.88+gitAUTOINC+988cc7beac-r0/linux-raspberrypi4-standard-buil=
d/</div><div style=3D"box-sizing:border-box"><span style=3D"box-sizing:bord=
er-box;font-weight:700">later I anable &quot;CONFIG_NETXEN_NIC=3Dy&quot;</s=
pan><span style=3D"box-sizing:border-box;font-weight:bold"><span style=3D"b=
ox-sizing:border-box">(</span>which was not set earlier)=C2=A0</span><br st=
yle=3D"box-sizing:border-box">But even then I am not able to build the fina=
l kernel image.<br style=3D"box-sizing:border-box"><br style=3D"box-sizing:=
border-box"><span style=3D"box-sizing:border-box;font-weight:700">But I am =
getting a warning:=C2=A0</span><br style=3D"box-sizing:border-box"><div sty=
le=3D"box-sizing:border-box">WARNING: /home/siddhu/Documents/yocto/sources/=
meta-raspberrypi/recipes-kernel/linux/linux-raspberrypi_4.19.bb.do_compile =
is tainted from a forced run</div><div style=3D"box-sizing:border-box">Init=
ialising tasks: 100% |#######################################| Time: 0:00:0=
4</div><div style=3D"box-sizing:border-box">Sstate summary: Wanted 27 Found=
 25 Missed 2 Current 840 (92% match, 99% complete)</div><div style=3D"box-s=
izing:border-box"><br style=3D"box-sizing:border-box">Will it impact on ima=
ge anyway?<br style=3D"box-sizing:border-box"><br style=3D"box-sizing:borde=
r-box"><span style=3D"box-sizing:border-box;font-weight:700">Below is the m=
y error details:</span><br style=3D"box-sizing:border-box"><br style=3D"box=
-sizing:border-box"><br style=3D"box-sizing:border-box"></div></div><blockq=
uote style=3D"box-sizing:border-box;padding:10px 20px;margin:0px 0px 20px;b=
order-left:5px solid rgb(238,238,238)"><div style=3D"box-sizing:border-box"=
>NOTE: Executing SetScene Tasks</div><div style=3D"box-sizing:border-box">N=
OTE: Executing RunQueue Tasks</div><div style=3D"box-sizing:border-box"><sp=
an style=3D"box-sizing:border-box;font-weight:700">ERROR: xen-image-minimal=
-1.0-r0 do_rootfs: Could not invoke dnf.</span>=C2=A0Command &#39;/home/sid=
dhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-imag=
e-minimal/1.0-r0/recipe-sysroot-native/usr/bin/dnf -v --rpmverbosity=3Dinfo=
 -y -c /home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-=
gnueabi/xen-image-minimal/1.0-r0/rootfs/etc/dnf/dnf.conf --setopt=3Dreposdi=
r=3D/home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnu=
eabi/xen-image-minimal/1.0-r0/rootfs/etc/yum.repos.d --installroot=3D/home/=
siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-i=
mage-minimal/1.0-r0/rootfs --setopt=3Dlogdir=3D/home/siddhu/Documents/yocto=
/build/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/te=
mp --repofrompath=3Doe-repo,/home/siddhu/Documents/yocto/build/tmp/work/ras=
pberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/oe-rootfs-repo --nogp=
gcheck install kernel-module-xen-blkback kernel-module-xen-gntalloc kernel-=
module-xen-gntdev kernel-module-xen-netback kernel-module-xen-wdt packagegr=
oup-core-boot packagegroup-core-ssh-dropbear packagegroup-core-ssh-openssh =
qemu run-postinsts xen-base locale-base-en-us locale-base-en-gb&#39; return=
ed 1:</div><div style=3D"box-sizing:border-box">DNF version: 4.1.0</div><di=
v style=3D"box-sizing:border-box">cachedir: /home/siddhu/Documents/yocto/bu=
ild/tmp/work/raspberrypi4-poky-linux-gnueabi/xen-image-minimal/1.0-r0/rootf=
s/var/cache/dnf</div><div style=3D"box-sizing:border-box">Added oe-repo rep=
o from /home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-=
gnueabi/xen-image-minimal/1.0-r0/oe-rootfs-repo</div><div style=3D"box-sizi=
ng:border-box">repo: using cache for: oe-repo</div><div style=3D"box-sizing=
:border-box">not found other for:=C2=A0</div><div style=3D"box-sizing:borde=
r-box">not found modules for:=C2=A0</div><div style=3D"box-sizing:border-bo=
x">not found deltainfo for:=C2=A0</div><div style=3D"box-sizing:border-box"=
>not found updateinfo for:=C2=A0</div><div style=3D"box-sizing:border-box">=
oe-repo: using metadata from Thu 04 Jun 2020 11:38:41 AM UTC.</div><div sty=
le=3D"box-sizing:border-box">Last metadata expiration check: 0:00:01 ago on=
 Thu 04 Jun 2020 11:38:42 AM UTC.</div><div style=3D"box-sizing:border-box"=
>No module defaults found</div><div style=3D"box-sizing:border-box">No matc=
h for argument: kernel-module-xen-blkback</div><div style=3D"box-sizing:bor=
der-box">No match for argument: kernel-module-xen-gntalloc</div><div style=
=3D"box-sizing:border-box">No match for argument: kernel-module-xen-gntdev<=
/div><div style=3D"box-sizing:border-box">No match for argument: kernel-mod=
ule-xen-netback</div><div style=3D"box-sizing:border-box">No match for argu=
ment: kernel-module-xen-wdt</div><div style=3D"box-sizing:border-box">Error=
: Unable to find a match</div><div style=3D"box-sizing:border-box">=C2=A0</=
div><div style=3D"box-sizing:border-box"><span style=3D"box-sizing:border-b=
ox;font-weight:700">ERROR: xen-image-minimal-1.0-r0 do_rootfs:=C2=A0</span>=
</div><div style=3D"box-sizing:border-box"><span style=3D"box-sizing:border=
-box;font-weight:700">ERROR: xen-image-minimal-1.0-r0 do_rootfs: Function f=
ailed: do_rootfs</span></div><div style=3D"box-sizing:border-box"><span sty=
le=3D"box-sizing:border-box;font-weight:700">ERROR: Logfile of failure stor=
ed in: /home/siddhu/Documents/yocto/build/tmp/work/raspberrypi4-poky-linux-=
gnueabi/xen-image-minimal/1.0-r0/temp/log.do_rootfs.31739</span></div><div =
style=3D"box-sizing:border-box"><span style=3D"box-sizing:border-box;font-w=
eight:700">ERROR: Task (/home/siddhu/Documents/yocto/sources/meta-virtualiz=
ation/recipes-extended/images/xen-image-minimal.bb:do_rootfs) failed with e=
xit code &#39;1&#39;</span></div><div style=3D"box-sizing:border-box">NOTE:=
 Tasks Summary: Attempted 2605 tasks of which 2604 didn&#39;t need to be re=
run and 1 failed.</div><div style=3D"box-sizing:border-box">=C2=A0</div><di=
v style=3D"box-sizing:border-box">Summary: 1 task failed:</div><div style=
=3D"box-sizing:border-box">=C2=A0 /home/siddhu/Documents/yocto/sources/meta=
-virtualization/recipes-extended/images/xen-image-minimal.bb:do_rootfs</div=
></blockquote><div style=3D"box-sizing:border-box">=C2=A0</div>I have tried=
 the same for &quot;cubieboard2&quot; also even there I faced the same issu=
e.Eagerly waiting for the response.</div><p style=3D"box-sizing:border-box;=
margin:0px 0px 10px;font-size:14px;color:rgb(36,41,46);font-family:-apple-s=
ystem,BlinkMacSystemFont,&quot;Segoe UI&quot;,Helvetica,Arial,sans-serif,&q=
uot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&quot;"><br style=3D"box-si=
zing:border-box">I have attached the recent log too Please help me on this.=
=C2=A0<br style=3D"box-sizing:border-box"></p><div><br></div><div><br></div=
><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div=
>-- <br><div dir=3D"ltr" class=3D"gmail_signature" data-smartmail=3D"gmail_=
signature"><div dir=3D"ltr"><div>Thanks and Regards.</div>Siddhartha V.<div=
>=C2=A0</div></div></div></div>

--000000000000fc5e6b05a742d271--

--000000000000fc5e6e05a742d273
Content-Type: application/octet-stream; name="log.do_rootfs.31739"
Content-Disposition: attachment; filename="log.do_rootfs.31739"
Content-Transfer-Encoding: base64
Content-ID: <f_kb0v35u20>
X-Attachment-Id: f_kb0v35u20
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=
--000000000000fc5e6e05a742d273--


From xen-users-bounces@lists.xenproject.org Thu Jun 04 19:34:41 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Jun 2020 19:34:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jgvcB-0004lJ-Je; Thu, 04 Jun 2020 19:33:23 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ccy5=7R=gmail.com=nick.calvert@srs-us1.protection.inumbo.net>)
 id 1jgvcA-0004kn-C3
 for xen-users@lists.xenproject.org; Thu, 04 Jun 2020 19:33:22 +0000
X-Inumbo-ID: 4001a69a-a69a-11ea-8993-bc764e2007e4
Received: from mail-io1-xd2d.google.com (unknown [2607:f8b0:4864:20::d2d])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 4001a69a-a69a-11ea-8993-bc764e2007e4;
 Thu, 04 Jun 2020 19:33:21 +0000 (UTC)
Received: by mail-io1-xd2d.google.com with SMTP id k18so7725327ion.0
 for <xen-users@lists.xenproject.org>; Thu, 04 Jun 2020 12:33:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=i5a857zNUua8/MPWoZrMiF3Wg0p7IZjNFiMUnPfvmvA=;
 b=MnLuhLj4XckVRv2Z4IVJjh9pYXslczg5uUnYHq5Jeraf5JcWtJYDT7eElQVqgjeEL3
 0LivZ5W7hy5tN7hcpSA9DrK6rSnFzPEkGJLdZxOHjM7a8PECvYY2GV6pxJWHuG3vfVR+
 HqG7oTl/PlA7o7PA4VuKRX5CnDs0Cnx/Oh7jBm7JOiLKefuExZrXXjwdCOph4ojCUB26
 6suv3hP0p3GcfV8odUn1lUG6ZGjyq3AWBlmzjDyNiBm/idOYm/PEG4DD0ardlXntPKZT
 tWOQU2C6EZG8kMh2z5s1sn/ppHTFJkzjURrNtTtJ4xeY7RAQzWBnSlC8lQd6veylKnzc
 Stxw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=i5a857zNUua8/MPWoZrMiF3Wg0p7IZjNFiMUnPfvmvA=;
 b=PWySjby6hDVbQf1p/ojFlYS0xs5Qx6rJbY1b7ciZr0G/esOq4zhKl41eEZDhsytGpm
 +OACWgvgBdPXUTPJhjPbXI14SS26zVzmlzxPFcyjlAWJFGc6e5Q0ZvqPM8RlFXEf5X+Z
 diceSNY29kUuha2x4TSeYa9sTMDjrf3klIsGIWeQNq1NvhiWFZBYZqNC1gio9OYgYEIr
 ZPXWJV7HjNtJYhOIga7+NakiL8cubw4yuf3z3tqWYUwLL7zHr9md8dbN/i1+rDOR6iOi
 Du5ihj19gxo4mZC3NdmC8MCJsJxHM8AH0kOnJnt1CK3bBjriPmLQxG9q4KkuBiPu9Uou
 LTmg==
X-Gm-Message-State: AOAM532MmY2qZ7XNbxJ9SsW+d7420FedA8+52L5bHwf36HcEkEF+XtrV
 e3oymcEAN2bzN42tJqnZeyIndikYdOOh5SsXnZZmJFDjZnU=
X-Google-Smtp-Source: ABdhPJwMCEzLn/tYodF9RmMBBl34ggQp1LyyJmAFA4EMgl4cxmy668C0/Yya5hBpV0v9wxVMZgQyy2V0Dc32PrUJbX4=
X-Received: by 2002:a6b:5f06:: with SMTP id t6mr5236578iob.88.1591299201119;
 Thu, 04 Jun 2020 12:33:21 -0700 (PDT)
MIME-Version: 1.0
From: Nick Calvert <nick.calvert@gmail.com>
Date: Thu, 4 Jun 2020 20:33:10 +0100
Message-ID: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
Subject: Vanilla Xen total CPU %
To: xen-users@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi everyone,

I am interested in calculating the approximate total CPU runtime % of
a vanilla Xen project host (without any of the bells and whistles of
XCP-ng or Xen Server). What I have at my disposal is Ubuntu, Xen and
the xl tool stack.

I have been experimenting with writing a parser for xentop output in
batch mode, this is a fairly easy task and I can see other attempts at
parsers across dead and dying github projects... my issue around this
is the precise meaning of the 'CPU/sec' metric given by xentop and how
I could use it to infer a total cpu time.

The docs for xentop say "CPU(sec) CPU time which the guest OS has
consumed(cumulated)".

My confusion is around how CPU 'seconds' actually relat to vCPUs, real
cores etc in this context. I can also see a couple of attempts at
figuring out total CPU %, but none look quite right.

If I were able to derive both the CPU seconds for each domu in an
interval, the aggregate CPU seconds in this interval and both total
vCPUs and physical cores what would be the correct formula for
approximating a total CPU runtime %?

Also if I am missing a trick and there is an easier way of calculating
this I would be extremely happy to hear it, as simple is nice :)

Thank you.


From xen-users-bounces@lists.xenproject.org Fri Jun 05 03:56:55 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jun 2020 03:56:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jh3S5-0002lx-1O; Fri, 05 Jun 2020 03:55:29 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=soem=7S=sendgrid.net=bounces+1794986-9697-xen-users=lists.xenproject.org@srs-us1.protection.inumbo.net>)
 id 1jh3S3-0002lo-MS
 for xen-users@lists.xenproject.org; Fri, 05 Jun 2020 03:55:27 +0000
X-Inumbo-ID: 62a0d1bc-a6e0-11ea-af66-12813bfff9fa
Received: from xtrwsqzp.outbound-mail.sendgrid.net (unknown [167.89.100.227])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 62a0d1bc-a6e0-11ea-af66-12813bfff9fa;
 Fri, 05 Jun 2020 03:55:25 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sendgrid.net;
 h=mime-version:content-type:content-transfer-encoding:from:subject:
 in-reply-to:references:to;
 s=smtpapi; bh=xE9kdU1y8riZq1/scPivPrrEkXonujXIAE7S4fjdXDY=;
 b=CrIN0O5D5rELh5oyFq3Cekrc0n7IFxEKl2i5T7egmRvlO7Sd7CGVsORJ7JfzJv4FYZMU
 /hWVSTBbJeJQ2XmtBIk+PI+XissJSGROLOu6pNAYUqQPgFTDYrP6qWtSPS+K5TKo1omRLo
 i+uDMmsBwDYW33UMMssjXQMcCuoIdJFRc=
Received: by filterdrecv-p3mdw1-6f5df8956d-25bh4 with SMTP id
 filterdrecv-p3mdw1-6f5df8956d-25bh4-19-5ED9C22C-12
 2020-06-05 03:55:24.195227293 +0000 UTC m=+114091.793499299
Received: from cloudmachine.kow.is (unknown)
 by ismtpd0052p1iad1.sendgrid.net (SG) with ESMTP id UPc9IivOS1-_QueCMettJA
 for <xen-users@lists.xenproject.org>;
 Fri, 05 Jun 2020 03:55:24.113 +0000 (UTC)
Received: from soulreaver.dark.kow.is (unknown [10.10.220.216])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "soulreaver.dark.kow.is", Issuer "dark.kow.is CA" (not verified))
 by cloudmachine.kow.is (Postfix) with ESMTPS id B1EB37EE40
 for <xen-users@lists.xenproject.org>; Thu,  4 Jun 2020 22:55:23 -0500 (CDT)
Received: from localhost (elzevir.shlrm.org [10.10.220.205])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by soulreaver.dark.kow.is (Postfix) with ESMTPSA id 5705080080
 for <xen-users@lists.xenproject.org>; Thu,  4 Jun 2020 22:55:23 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Date: Fri, 05 Jun 2020 03:55:24 +0000 (UTC)
From: David Kowis <david@kow.is>
Subject: Re: [Xen-users] Acquiring the latest pvUSB frontend patches?
In-Reply-To: <qtrsilufvkr2g1avsrvhlpo5.1566844058435@email.android.com>
References: <qtrsilufvkr2g1avsrvhlpo5.1566844058435@email.android.com>
User-Agent: Roundcube Webmail/1.4.0
Message-ID: <febfd4478ef02756c2266e583098a7de@kow.is>
X-Sender: david@kow.is
X-SG-EID: =?us-ascii?Q?+kMxBqj35EdRUKoy8diX1v=2FYwOtV0mBc163WH1fm2RNr7DE+LL3sO=2F0hN7QDBQ?=
 =?us-ascii?Q?f4P+wJswvQV9pZJ8WoujAK4MID=2FIFtTiw9Z1HGJ?=
 =?us-ascii?Q?nE=2Fg1HjjkQauTtqEj0qYjczAak9KmuiZ3lLRKu1?=
 =?us-ascii?Q?=2FuYKQFwyI2zJ1q83UqGIKeJPMnBAU+jHohBU8hU?=
 =?us-ascii?Q?6H3gOnpFyAEPTc+1tS8AEtwMLpy+9jnCUJ+oGki?=
 =?us-ascii?Q?Dkan7uLMr8XQgeFDeSBNouRUVZxiz7BDynGIMck?=
 =?us-ascii?Q?UbANCXe+EUA1f1cfJN2nA=3D=3D?=
To: xen-users@lists.xenproject.org
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 2019-08-26 13:27, david@kow.is wrote:
> Thanks a whole bunch! I'll give it a go soon.

Soon turned out to be a lot longer than I expected. I don't suppose 
there's updates to this at all?

Thanks!

> 
> Sent from Nine [1]
> 
> -------------------------
> 
> From: Juergen Gross <jgross@suse.com>
> Sent: Monday, August 26, 2019 13:05
> To: David Kowis; xen-users@lists.xenproject.org
> Subject: Re: [Xen-users] Acquiring the latest pvUSB frontend patches?
> 
> On 18.08.19 05:44, David Kowis wrote:
>> I found this email https://markmail.org/message/oi2l5n267lp7yoxv
> which
>> seems to be the latest patches for the pvUSB frontend drivers.
>> 
>> I couldn't find the source of the patches off the wiki page, and I
>> thought I'd email to find out if this is the latest version of the
>> patches, or how I could generate the patches myself to apply to an
>> upstream kernel for my Xen DomUs.
> 
> I have pushed an upstream version to:
> 
> https://github.com/jgross1/linux.git pvusb
> 
> Juergen
> 
> 
> Links:
> ------
> [1] http://www.9folders.com/
> _______________________________________________
> Xen-users mailing list
> Xen-users@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/xen-users


From xen-users-bounces@lists.xenproject.org Fri Jun 05 06:56:27 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Jun 2020 06:56:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jh6Fs-0003iz-Ux; Fri, 05 Jun 2020 06:55:04 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=KvRV=7S=gmail.com=alonsosara44@srs-us1.protection.inumbo.net>)
 id 1jh6Fr-0003iu-IL
 for xen-users@lists.xenproject.org; Fri, 05 Jun 2020 06:55:03 +0000
X-Inumbo-ID: 7aa6dc0c-a6f9-11ea-8993-bc764e2007e4
Received: from mail-ed1-x52e.google.com (unknown [2a00:1450:4864:20::52e])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 7aa6dc0c-a6f9-11ea-8993-bc764e2007e4;
 Fri, 05 Jun 2020 06:55:02 +0000 (UTC)
Received: by mail-ed1-x52e.google.com with SMTP id m32so1408672ede.8
 for <xen-users@lists.xenproject.org>; Thu, 04 Jun 2020 23:55:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=EGI5Tz/r2hagBcx+Od92g4QTMap+yX3UmUZiaiyAez0=;
 b=heXMUn/3hTHF/SrSvjh8ws5hyByjGMUuu+wyJlbEYXN7tfvda2zGba6h/cSUJGgJ7P
 TrgEXro3Ju3hDjS7FHw2eFMrygDteiQDogzmrgSvP3MmzwHsDtiAAcRiOfO4C/M/+ZUm
 ZvL0AHDi8tXJUvplY60SYqzDxxA4x9m+MXyD5NlwShcEpAuNdPUQw3x4DdwjFUWI5cbH
 EeJAvIr4TOQMPn9LL9clIvze63nJPSdUTfCDRFVENtK34/aFa7shMBOPUIhySFbko5wl
 kE+st9qaXCWtlv2At7+fDCTOnD7C1qm6J62K139TlZI1i2ZNbJ3jg7yfXFc84ZdFKlvS
 O0eg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=EGI5Tz/r2hagBcx+Od92g4QTMap+yX3UmUZiaiyAez0=;
 b=rOeioCM2aE/iM7RBYpI4NJ2uz7e5fcl6fAxB49PdCb+kAi/En2QVuJEmT+ffAJFt+q
 LqoGa8rWjd6KYCVZMU7/vuHd9BZwZ/cFE1SnZneei1EuVorM+DUODfl0q/fKL9FVaYHK
 RKwhGQULADwYMktnitF5eo36mKS9Uzq4W0thngwzuDKupothBjRmrzB5mpsl2EeNOaLK
 WCbDVsbEBEnJf1IEc4l0q1QO/2A7Kcel6PMa+40ItJaVsIM+4val7EkyAt9/RAaJD/yr
 Xka7pBHwq7vJ8LrRQVYISbIYno1JhboDr0VD1CECCAxRphRGxUSCIPPF7DrFxCDChM+a
 v+cw==
X-Gm-Message-State: AOAM533R6Jv4L/WRtv4MwgpMztdKrzn20wmW58sz2QZ8Z8J0nLtUkt7f
 XpFRYZWhoHSf/j2fRXm6JjSZL2B9a2scfKndmAzcAmfTc48=
X-Google-Smtp-Source: ABdhPJz/5h9Jb1cnEYJ54+641pWga5IWrjy7EWZ5eGRQfKZewLLXipBn9k2NIznOzNethnMJkNXp9MHb5+/IGSb25J8=
X-Received: by 2002:a50:f289:: with SMTP id f9mr7741810edm.188.1591340101786; 
 Thu, 04 Jun 2020 23:55:01 -0700 (PDT)
MIME-Version: 1.0
From: Sara Alonso <alonsosara44@gmail.com>
Date: Fri, 5 Jun 2020 08:54:51 +0200
Message-ID: <CACD6wFNUVcz_0Q=2Ci4FSzMRaVRY+1vd8ZqnktJga=NyRSZUXg@mail.gmail.com>
Subject: help
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="0000000000007bdf4e05a750bd91"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--0000000000007bdf4e05a750bd91
Content-Type: text/plain; charset="UTF-8"

Hi,

I am a student and I am using Xen for my master thesis. I am trying to boot
a standalone server TCP guest in Xen DomU on a ZCU102 board. First, I build
a petalinux project (in xen.dtsi I have added some lines for passthroughing
the uart1 and the gem3). Next, I create a standalone application in SDK,
selecting "Hypervisor Guest: Yes" and using lwIP TCP Perf Server template.
I selected uart1 for output in bsp settings. When I build the project
server.bin file is created. I also create a config file (attached). I copy
the files for booting Dom0, server.bin and dom1.cfg file in the FAT
partition of the SD card. Then I boot Dom0 without any problem. I create
dom1 with xl create dom1.cfg. The domain is created without any error. When
I do xl list, it says that dom1 is running, but anything appears in uart1
and I cannot connect the client, so I think the application is not running
correctly. I don't have this problem when I boot a hello world application
in domU, it appears the message in uart1.

I think I am missing some step. Could you help me to solve this
issue, please?

Thank you,

Sara

--0000000000007bdf4e05a750bd91
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I am a student and I am using Xen f=
or my master thesis.=C2=A0<span style=3D"color:rgb(51,51,51);font-family:&q=
uot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif">I am trying to boot a =
standalone server TCP guest in Xen DomU on a ZCU102 board. First, I build a=
 petalinux project (in xen.dtsi I have added some lines for passthroughing =
the uart1 and the gem3). Next, I create a standalone application in SDK, se=
lecting &quot;Hypervisor Guest: Yes&quot; and using lwIP TCP Perf Server te=
mplate. I selected uart1 for output in bsp settings. When I build the proje=
ct server.bin file is created. I also create a config file (attached). I co=
py the files for booting Dom0, server.bin and dom1.cfg file in the FAT part=
ition of the SD card. Then I boot Dom0 without any problem.=C2=A0</span><sp=
an style=3D"color:rgb(51,51,51);font-family:&quot;Helvetica Neue&quot;,Helv=
etica,Arial,sans-serif">I </span>create<span style=3D"color:rgb(51,51,51);f=
ont-family:&quot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif"> dom1 wit=
h xl </span>create<span style=3D"color:rgb(51,51,51);font-family:&quot;Helv=
etica Neue&quot;,Helvetica,Arial,sans-serif"> dom1.cfg. The domain is creat=
ed without any error. When I do xl list, it says that dom1 is running, but =
anything appears in uart1 and I cannot connect the client, so I think the a=
pplication is not running correctly. I don&#39;t have this problem when I b=
oot a hello world application in domU, it appears the message in uart1.</sp=
an></div><div><span style=3D"color:rgb(51,51,51);font-family:&quot;Helvetic=
a Neue&quot;,Helvetica,Arial,sans-serif"><br></span></div><p style=3D"box-s=
izing:border-box;margin:0px 0px 15px;color:rgb(51,51,51);font-family:&quot;=
Helvetica Neue&quot;,Helvetica,Arial,sans-serif">I think I am missing some =
step. Could you help me to solve this issue,=C2=A0please?</p><p style=3D"bo=
x-sizing:border-box;margin:0px 0px 15px;color:rgb(51,51,51);font-family:&qu=
ot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif">Thank you,=C2=A0</p><p =
style=3D"box-sizing:border-box;margin:0px 0px 15px;color:rgb(51,51,51);font=
-family:&quot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif">Sara</p></di=
v>

--0000000000007bdf4e05a750bd91--


From xen-users-bounces@lists.xenproject.org Sat Jun 06 14:49:29 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 06 Jun 2020 14:49:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jha6v-0002aJ-62; Sat, 06 Jun 2020 14:47:49 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5qQO=7T=xen.org=julien@srs-us1.protection.inumbo.net>)
 id 1jha6u-0002aE-2K
 for xen-users@lists.xenproject.org; Sat, 06 Jun 2020 14:47:48 +0000
X-Inumbo-ID: ae341d3a-a804-11ea-b0f4-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id ae341d3a-a804-11ea-b0f4-12813bfff9fa;
 Sat, 06 Jun 2020 14:47:44 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
 MIME-Version:Date:Message-ID:From:References:To:Subject:Sender:Reply-To:Cc:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=D2Gk88f4H5oQMxP7M6CtlleLWpmJTjbciEGlXVrMaLg=; b=MoYbMxva/EOBDEbfl4ScRSVHFF
 yENigxfU3T7QiFa/9kdTKu/jHn7YS19cxuC9JJ3UsLf/Sa0/IYuCiZ5SqYJHDHrmMStOnAXi/mbz0
 gLTfSNDlEmWKqsSa4xWGEaOIPBh7DqZB08oBNSuTDSnZWwevpMz28xER9l29mcqx/HjA=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1jha6q-0007bs-77; Sat, 06 Jun 2020 14:47:44 +0000
Received: from [54.239.6.185] (helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1jha6q-0002UZ-0c; Sat, 06 Jun 2020 14:47:44 +0000
Subject: Re: help
To: Sara Alonso <alonsosara44@gmail.com>, xen-users@lists.xenproject.org,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <CACD6wFNUVcz_0Q=2Ci4FSzMRaVRY+1vd8ZqnktJga=NyRSZUXg@mail.gmail.com>
From: Julien Grall <julien@xen.org>
Message-ID: <51afec92-8417-d932-411e-f1a83c9eec84@xen.org>
Date: Sat, 6 Jun 2020 15:47:44 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0)
 Gecko/20100101 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <CACD6wFNUVcz_0Q=2Ci4FSzMRaVRY+1vd8ZqnktJga=NyRSZUXg@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>



On 05/06/2020 07:54, Sara Alonso wrote:
> Hi,

Hello,

Adding Stefano as this looks like a Xilinx SDK issue rather than a Xen 
itself.

Cheers,

> I am a student and I am using Xen for my master thesis. I am trying to 
> boot a standalone server TCP guest in Xen DomU on a ZCU102 board. First, 
> I build a petalinux project (in xen.dtsi I have added some lines for 
> passthroughing the uart1 and the gem3). Next, I create a standalone 
> application in SDK, selecting "Hypervisor Guest: Yes" and using lwIP TCP 
> Perf Server template. I selected uart1 for output in bsp settings. When 
> I build the project server.bin file is created. I also create a config 
> file (attached). I copy the files for booting Dom0, server.bin and 
> dom1.cfg file in the FAT partition of the SD card. Then I boot Dom0 
> without any problem. I createdom1 with xl createdom1.cfg. The domain is 
> created without any error. When I do xl list, it says that dom1 is 
> running, but anything appears in uart1 and I cannot connect the client, 
> so I think the application is not running correctly. I don't have this 
> problem when I boot a hello world application in domU, it appears the 
> message in uart1.
> 
> I think I am missing some step. Could you help me to solve this 
> issue, please?
> 
> Thank you,
> 
> Sara
> 

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Mon Jun 08 11:00:40 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jun 2020 11:00:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiFUx-0006ub-5X; Mon, 08 Jun 2020 10:59:23 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=BI9Y=7V=gmail.com=dunlapg@srs-us1.protection.inumbo.net>)
 id 1jiFUw-0006uU-05
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 10:59:22 +0000
X-Inumbo-ID: 1ae6d5b2-a977-11ea-9b55-bc764e2007e4
Received: from mail-ed1-x535.google.com (unknown [2a00:1450:4864:20::535])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1ae6d5b2-a977-11ea-9b55-bc764e2007e4;
 Mon, 08 Jun 2020 10:59:21 +0000 (UTC)
Received: by mail-ed1-x535.google.com with SMTP id p18so13031577eds.7
 for <xen-users@lists.xenproject.org>; Mon, 08 Jun 2020 03:59:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=umich.edu; s=google-2016-06-03;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=na5xUbnt+rYb+jRO5+BI6s0j/OBQtIrmS93Xt+uqdV0=;
 b=qxeddeNakNA4pDNRG0G7wSKdkIXJCL5Pmh4WeMGPZ1yFPI781macaiuPD9R/zvGISN
 B20WOX/BXYnSleVIseFV99I1eFCr5Vv4dAFnWFJIdiZUz95KvsNv3A9PoQlh/xiQxymR
 zpu1Keta3PsA5FtMuUXDft3pqXhRFfEFWbNwNupDZbvJAsue8K5iLU3WTxT90icSuhqw
 0Vg0xs7SOIPU94MfTqYUTmzT576RlhNdaIIBY7SZpSMCCkCnrLnMLYAQFNhLoOdXSK0A
 L/19nohsvKYe8NgOF3EE2Qx0L1k1FBNG6dNGL4PAeWhXw3iYNx9K1oNGKruFhvs3ia9X
 D1wA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=na5xUbnt+rYb+jRO5+BI6s0j/OBQtIrmS93Xt+uqdV0=;
 b=aPILcxQr0VwX0tS5wCMD+x0poicQAuqApRaz+BVB1Tn/W994mkGBi2OyCzJB9lIH0o
 4qg2twoCPQGAco+r7f2XGe/1MSoWVL2lrkn2bN5bm5TYtCDsPQE6SBzsRi5GxYvuENcm
 xmoIJSDglLpoo9d2y/McrbJWV7SiNFYaxwHQiPhxGeUZouElA10t/MvF7YjH/XVKnvdz
 tbtoU33iHSUIqopHsRiCqxcz+gk+k7tN81uHgF2fq7OzbTXLgsCYUhIfPv1Ka5GzxXaV
 /zzEaDUvXEqHf0lvK38PqkPN8eNiDHB3/pVToA/4kVvDJKULLHWuW1C5wcZMjbCdhQB2
 1UzA==
X-Gm-Message-State: AOAM531LNLS0nei3PJN6/y07lvxK6bAkexjbSGvYG+WJT+SWIvZbaGUS
 TG++WTRWKd62t/ZFkcv9iElJoCaPDg9NBILnxjs=
X-Google-Smtp-Source: ABdhPJxKDzqYrALr74sCVvFnK2iuxKbNVr69GQjIeH8JCwG/4de0EfBZLjvqFQ/Oh/MOVma1+F5ZVXHVUXbPmK/f+zQ=
X-Received: by 2002:a50:b5a6:: with SMTP id a35mr22341226ede.197.1591613960255; 
 Mon, 08 Jun 2020 03:59:20 -0700 (PDT)
MIME-Version: 1.0
References: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
In-Reply-To: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
From: George Dunlap <dunlapg@umich.edu>
Date: Mon, 8 Jun 2020 11:59:08 +0100
Message-ID: <CAFLBxZaEkH_fQzFLFXyZT-EHjvYZG7RgCP7U+gxK_NygbC855w@mail.gmail.com>
Subject: Re: Vanilla Xen total CPU %
To: Nick Calvert <nick.calvert@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000b87e9005a790802d"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: George Dunlap <george.dunlap@citrix.com>,
 xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000b87e9005a790802d
Content-Type: text/plain; charset="UTF-8"

On Thu, Jun 4, 2020 at 8:34 PM Nick Calvert <nick.calvert@gmail.com> wrote:

> Hi everyone,
>
> I am interested in calculating the approximate total CPU runtime % of
> a vanilla Xen project host (without any of the bells and whistles of
> XCP-ng or Xen Server). What I have at my disposal is Ubuntu, Xen and
> the xl tool stack.
>

Just to be clear: What you mean, is you want to add up the time all VMs are
running?  (i.e., if you have one VM at 150%, another at 25%, and another at
25%, the total would be 200%?)


> I have been experimenting with writing a parser for xentop output in
> batch mode, this is a fairly easy task and I can see other attempts at
> parsers across dead and dying github projects... my issue around this
> is the precise meaning of the 'CPU/sec' metric given by xentop and how
> I could use it to infer a total cpu time.
>

If you don't mind me asking, what are you (and the projects you mention)
using this information for?

Xen is open-source project, so rather than having dozens of projects trying
to work around the fact that the core tools don't tell them what they want
to know, it seems like it would be better to either modify xentop to tell
you what you want to know, or add a new tool to do the same thing.


>
> The docs for xentop say "CPU(sec) CPU time which the guest OS has
> consumed(cumulated)".
>
> My confusion is around how CPU 'seconds' actually relat to vCPUs, real
> cores etc in this context. I can also see a couple of attempts at
> figuring out total CPU %, but none look quite right.
>
> If I were able to derive both the CPU seconds for each domu in an
> interval, the aggregate CPU seconds in this interval and both total
> vCPUs and physical cores what would be the correct formula for
> approximating a total CPU runtime %?
>
> Also if I am missing a trick and there is an easier way of calculating
> this I would be extremely happy to hear it, as simple is nice :)
>

I think if I were writing a program, I'd probably use libxl to get the raw
data, rather than trying to parse xentop.  libxl_list_domain() will return
a list of libxl_dominfo, which has a field "cpu_time", which is (I believe)
the number of nanoseconds of cpu time that domain has consumed ever in its
lifetime.

So what you'd do is take a timestamp (t1) call libxl_list_domain(), and go
through the resulting list, adding up `cpu_time` (c1).  Then at some point
later, take a timestamp (t2) and do another sum (c2).  Your total host
utilization between t1 and t2 would then be (c2 - c1) / (t2 - t1).

If you're using 4.13 at least, you could use the golang bindings instead,
if you didn't want to use C.

 -George

--000000000000b87e9005a790802d
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Jun 4, 2020 at 8:34 PM Nick C=
alvert &lt;<a href=3D"mailto:nick.calvert@gmail.com">nick.calvert@gmail.com=
</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:=
0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">=
Hi everyone,<br>
<br>
I am interested in calculating the approximate total CPU runtime % of<br>
a vanilla Xen project host (without any of the bells and whistles of<br>
XCP-ng or Xen Server). What I have at my disposal is Ubuntu, Xen and<br>
the xl tool stack.<br></blockquote><div><br></div><div>Just to be clear: Wh=
at you mean, is you want to add up the time all VMs are running?=C2=A0 (i.e=
., if you have one VM at 150%, another at 25%, and another at 25%, the tota=
l would be 200%?)</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pad=
ding-left:1ex">
I have been experimenting with writing a parser for xentop output in<br>
batch mode, this is a fairly easy task and I can see other attempts at<br>
parsers across dead and dying github projects... my issue around this<br>
is the precise meaning of the &#39;CPU/sec&#39; metric given by xentop and =
how<br>
I could use it to infer a total cpu time.<br></blockquote><div><br></div><d=
iv>If you don&#39;t mind me asking, what are you (and the projects you ment=
ion) using this information for?</div><div><br></div><div>Xen is open-sourc=
e project, so rather than having dozens of projects trying to work around t=
he fact that the core tools don&#39;t tell them what they want to know, it =
seems like it would be better to either modify xentop to tell you what you =
want to know, or add a new tool to do the same thing.<br></div><div>=C2=A0<=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
The docs for xentop say &quot;CPU(sec) CPU time which the guest OS has<br>
consumed(cumulated)&quot;.<br>
<br>
My confusion is around how CPU &#39;seconds&#39; actually relat to vCPUs, r=
eal<br>
cores etc in this context. I can also see a couple of attempts at<br>
figuring out total CPU %, but none look quite right.<br>
<br>
If I were able to derive both the CPU seconds for each domu in an<br>
interval, the aggregate CPU seconds in this interval and both total<br>
vCPUs and physical cores what would be the correct formula for<br>
approximating a total CPU runtime %?<br>
<br>
Also if I am missing a trick and there is an easier way of calculating<br>
this I would be extremely happy to hear it, as simple is nice :)<br></block=
quote></div><div class=3D"gmail_quote"><br></div><div class=3D"gmail_quote"=
>I think if I were writing a program, I&#39;d probably use libxl to get the=
 raw data, rather than trying to parse xentop.=C2=A0 libxl_list_domain() wi=
ll return a list of libxl_dominfo, which has a field &quot;cpu_time&quot;, =
which is (I believe) the number of nanoseconds of cpu time that domain has =
consumed ever in its lifetime.<br></div><div class=3D"gmail_quote"><br></di=
v><div class=3D"gmail_quote">So what you&#39;d do is take a timestamp (t1) =
call libxl_list_domain(), and go through the resulting list, adding up `cpu=
_time` (c1).=C2=A0 Then at some point later, take a timestamp (t2) and do a=
nother sum (c2).=C2=A0 Your total host utilization between t1 and t2 would =
then be (c2 - c1) / (t2 - t1).</div><div class=3D"gmail_quote"><br></div><d=
iv class=3D"gmail_quote">If you&#39;re using 4.13 at least, you could use t=
he golang bindings instead, if you didn&#39;t want to use C.=C2=A0 <br></di=
v><div class=3D"gmail_quote"><br></div><div class=3D"gmail_quote">=C2=A0-Ge=
orge<br></div><div class=3D"gmail_quote"><br></div><div class=3D"gmail_quot=
e"><br></div><div class=3D"gmail_quote"><br></div><div class=3D"gmail_quote=
"><br></div></div>

--000000000000b87e9005a790802d--


From xen-users-bounces@lists.xenproject.org Mon Jun 08 13:58:54 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jun 2020 13:58:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiIHI-0007X1-74; Mon, 08 Jun 2020 13:57:28 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=11Lh=7V=citrix.com=george.dunlap@srs-us1.protection.inumbo.net>)
 id 1jiIHH-0007Ww-Uk
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 13:57:27 +0000
X-Inumbo-ID: fc3c64ba-a98f-11ea-9ad7-bc764e2007e4
Received: from esa6.hc3370-68.iphmx.com (unknown [216.71.155.175])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id fc3c64ba-a98f-11ea-9ad7-bc764e2007e4;
 Mon, 08 Jun 2020 13:57:27 +0000 (UTC)
Authentication-Results: esa6.hc3370-68.iphmx.com;
 dkim=none (message not signed) header.i=none
IronPort-SDR: PLxpWU5WXxDhZ/UOMYPQ9TENm38ksXmAikCRmf8JvFzD85KDuZ9SkZf/Sidq46a6KUO6xWMpUA
 R7VGpK7wuVuNrqNBUDvLQa5e8pE3Xeimj9evWdCxVVWGUAFlKGHaDuwFU+yDdj8OSI0loR9OlT
 IkXSHfUDcZ7U3GdfAKbt85pqm5HFlQnEyT1AZZppeyBeYdTRlX4feTj7m91B319G32Q/OKw+bB
 TfTCXFbAsWdCJcPug1foKPMLnfimbeRPbHpheQdeOApnqP6LXrKVtvjCekarNDHBcAPHzuUcYw
 dRM=
X-SBRS: 2.7
X-MesageID: 19828265
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.158.21
X-Policy: $RELAYED
X-IronPort-AV: E=Sophos;i="5.73,487,1583211600"; d="scan'208";a="19828265"
From: George Dunlap <George.Dunlap@citrix.com>
To: Nick Calvert <nick.calvert@simplyhosting.cloud>
Subject: Re: Vanilla Xen total CPU %
Thread-Topic: Vanilla Xen total CPU %
Thread-Index: AQHWPYPfnKEJxSFR3EaSzb0yne1H1ajOe6uAgAAhPAA=
Date: Mon, 8 Jun 2020 13:57:22 +0000
Message-ID: <AE3AA5C6-9192-4A68-9605-6BD5D244AD0E@citrix.com>
References: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
 <CAFLBxZaEkH_fQzFLFXyZT-EHjvYZG7RgCP7U+gxK_NygbC855w@mail.gmail.com>
 <03d501d63d8c$1dc65020$5952f060$@simplyhosting.cloud>
In-Reply-To: <03d501d63d8c$1dc65020$5952f060$@simplyhosting.cloud>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3608.80.23.2.2)
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="utf-8"
Content-ID: <4C28EA53D1C36A41A22EC55A7BBE81CF@citrix.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: George Dunlap <dunlapg@umich.edu>, Nick Calvert <nick.calvert@gmail.com>,
 xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Mon Jun 08 15:09:52 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jun 2020 15:09:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiJOI-0005zq-2p; Mon, 08 Jun 2020 15:08:46 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjsc=7V=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1jiJOG-0005zh-MT
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 15:08:44 +0000
X-Inumbo-ID: f15a6808-a999-11ea-ba62-bc764e2007e4
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id f15a6808-a999-11ea-ba62-bc764e2007e4;
 Mon, 08 Jun 2020 15:08:43 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Transfer-Encoding:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date;
 bh=50flQvBQ33gyyTLNIbz/IsnsoccCLeZV1uli1C3oHhA=; 
 b=pznmVUF+ctfIBEvjq6lVRj0eJoniloxCEbhtSfdkTg1WPLAhYlWxxGGztMODy+pEso7glzr42zMUXiaZurbzXyuVoBcKMhHZVFxbVn1pOMurJVzHlKoPFxCp5o8UGb5TRdsWhhyEZO2m63z5k+a0+pBFxb+kipYoC19sX0xb0El2/5pYdNl7+75ZIljXcyGca026boJd3qpdnAUE6mIkOXkHGCYVVzQ678h6B9DZydNpW7Sdmo7FmgRuC8y9iJXnQxZ26GXLH6Kzs2hq3aDWF/ywo2FrzoaNXcgC+TRjHASazIv0N4tReRTnGxndOQgd1Dg9IC9iF25NV+SJXVURVg==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1jiJOF-000478-1p
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 15:08:43 +0000
Date: Mon, 8 Jun 2020 15:08:42 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Subject: Re: Vanilla Xen total CPU %
Message-ID: <20200608150842.GL18995@bitfolk.com>
References: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
 <CAFLBxZaEkH_fQzFLFXyZT-EHjvYZG7RgCP7U+gxK_NygbC855w@mail.gmail.com>
 <03d501d63d8c$1dc65020$5952f060$@simplyhosting.cloud>
 <AE3AA5C6-9192-4A68-9605-6BD5D244AD0E@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <AE3AA5C6-9192-4A68-9605-6BD5D244AD0E@citrix.com>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

> > On Jun 8, 2020, at 12:58 PM, Nick Calvert <nick.calvert@simplyhosting.cloud> wrote:
> > What I was trying to do was stream some of the xentop counters
> > into a time series database  (influxdb) so I could graph this.

I wanted to do this too, but for Prometheus.

I wrote a libxl C program that prints out the CPU time used by each
guest in Prometheus's exposition format¹. That would be just the
cumulative time in seconds because Prometheus likes things in its
base units, and you can derive percentages and rates from that.

I just trigger it by cron every 5 minutes and use it as a
node_exporter textfile collector², but I guess if I wanted it at a
shorter interval I'd make it into a proper exporter from a
standalone daemon.

If anyone would find it useful I can publish it, though my C is
terrible…

Cheers,
Andy

¹ https://github.com/prometheus/docs/blob/master/content/docs/instrumenting/exposition_formats.md

² https://github.com/prometheus-community/node-exporter-textfile-collector-scripts


From xen-users-bounces@lists.xenproject.org Mon Jun 08 16:49:52 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jun 2020 16:49:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiKwz-0002uq-7A; Mon, 08 Jun 2020 16:48:41 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=53kk=7V=xen.org=paul@srs-us1.protection.inumbo.net>)
 id 1jiKoM-000200-UI
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 16:39:46 +0000
X-Inumbo-ID: a3a310f8-a9a6-11ea-b298-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id a3a310f8-a9a6-11ea-b298-12813bfff9fa;
 Mon, 08 Jun 2020 16:39:36 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Reply-To:Message-Id:Date:Subject:To:From:Sender:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=6Kc+B0L0LNrarCLVqtqHFeGwaR1j4Y9ArTtJJdoAKvU=; b=6Zb5AwabTtDWFnPSJg18nGm64Q
 beT+tLAaEiXNzwioiF5qsVURGj8Pp+Dyl1xRJXhYocfYFkJb0cfns42u3vDMRGRCQiiAQYthFjh6C
 90sjAjiMCxCHBWaEsUSpdbwrwc61mMyZbq9vZP0Su65SSVfbvbWAVX3l/YpRQxlno5X4=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jiKoC-0003WP-7X; Mon, 08 Jun 2020 16:39:36 +0000
Received: from [54.239.6.186] (helo=CBG-R90WXYV0.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jiKoB-0004WR-UD; Mon, 08 Jun 2020 16:39:36 +0000
From: Paul Durrant <paul@xen.org>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org,
 xen-announce@lists.xenproject.org
Subject: Xen 4.14 RC1
Date: Mon,  8 Jun 2020 17:39:34 +0100
Message-Id: <20200608163934.313-1-paul@xen.org>
X-Mailer: git-send-email 2.17.1
X-Mailman-Approved-At: Mon, 08 Jun 2020 16:48:39 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-devel@lists.xenproject.org, paul@xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,

Xen 4.14 RC1 is tagged. You can check that out from xen.git:

git://xenbits.xen.org/xen.git 4.14.0-rc1

For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz

And the signature is at:
https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz.sig

Please send bug reports and test reports to xen-devel@lists.xenproject.org.
When sending bug reports, please CC relevant maintainers and me (paul@xen.org).

As a reminder, there will be a Xen Test Day. Please see the test day schedule at
https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.

  Paul Durrant



From xen-users-bounces@lists.xenproject.org Mon Jun 08 16:49:52 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jun 2020 16:49:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiKwy-0002uj-Ra; Mon, 08 Jun 2020 16:48:40 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jnUw=7V=simplyhosting.cloud=nick.calvert@srs-us1.protection.inumbo.net>)
 id 1jiGQ8-0004uN-8g
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 11:58:28 +0000
X-Inumbo-ID: 5c0c3174-a97f-11ea-96fb-bc764e2007e4
Received: from mx01.simplyhosting.cloud (unknown [91.186.2.150])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 5c0c3174-a97f-11ea-96fb-bc764e2007e4;
 Mon, 08 Jun 2020 11:58:26 +0000 (UTC)
Received: from NL60 (unknown [213.229.80.69])
 by mx01.simplyhosting.cloud (Postfix) with ESMTPSA id 59F1A433B6;
 Mon,  8 Jun 2020 12:58:25 +0100 (BST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=simplyhosting.cloud;
 s=mail; t=1591617505;
 bh=k5/o4ZmkVvL9hmtUdl5Cn+/H9suimL5mJA1K92t3mck=;
 h=From:To:Cc:References:In-Reply-To:Subject:Date:From;
 b=FhcCYZDjA4u0RfcUggzwQ2910Opxa8SwPr5+W6Z/Bm0dFSoFx49fJGnvqWQRdgcSW
 cm0begHkxQvjwMluToEG7jSGBnBElFAqz3HLP4lTS6B5e7MgEIi4dsWA+mvjyyl2yA
 RNwAtF97TsnGDHpdPWT9zaBhLzXxe0HTF8Pw3CXY=
From: "Nick Calvert" <nick.calvert@simplyhosting.cloud>
To: "'George Dunlap'" <dunlapg@umich.edu>,
 "'Nick Calvert'" <nick.calvert@gmail.com>
References: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
 <CAFLBxZaEkH_fQzFLFXyZT-EHjvYZG7RgCP7U+gxK_NygbC855w@mail.gmail.com>
In-Reply-To: <CAFLBxZaEkH_fQzFLFXyZT-EHjvYZG7RgCP7U+gxK_NygbC855w@mail.gmail.com>
Subject: RE: Vanilla Xen total CPU %
Date: Mon, 8 Jun 2020 12:58:25 +0100
Message-ID: <03d501d63d8c$1dc65020$5952f060$@simplyhosting.cloud>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="----=_NextPart_000_03D6_01D63D94.7F8BC990"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJBt8iIru0iyhf/JzF+ymSxQcM0ugGxFuFvp+oYjbA=
Content-Language: en-gb
X-Mailman-Approved-At: Mon, 08 Jun 2020 16:48:39 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: 'George Dunlap' <george.dunlap@citrix.com>,
 'xen-users' <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multipart message in MIME format.

------=_NextPart_000_03D6_01D63D94.7F8BC990
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Hi George,=20

=20

Thank you very much for taking the time to respond to me.=20

=20

What I have been trying to do (and I think it=E2=80=99s the same for the =
other abandoned projects I came across) is come up with an equivalent to =
something like the Hyper-V % Total Runtime counter, which gives a =
(probably not very precise) but useful account of the total CPU =
=E2=80=98load=E2=80=99 of a hypervisor.=20

=20

This is the sort of metric which can be useful for spotting overall =
trends, or when the sum of all virtual machine CPU usage passes an =
alerting trigger. I appreciate that at this point it would probably be =
necessary to look at other metrics to determine what was actually =
happening.=20

=20

What I was trying to do was stream some of the xentop counters into a =
time series database  (influxdb) so I could graph this. Other people =
have attempted the same, as an example there are projects doing this =
with graphite, some people were using old xm python bindings to =
basically do exactly as you describe in your mail and return their own =
usage % for graphing.=20

=20

Being able to do this with Go in 4.13 is very interesting and I did not =
know such bindings existed.  I have some experience with the language so =
will look at this now.  I am however straddled with some older versions =
of Xen and had got as far as building a parser and a.) pushing the cpu =
seconds value for each domU directly into a database and playing with =
them as if they were a network interface counters and b.) taking samples =
in a time interval and performing a calculation just as you describe and =
inserting these directly into a database with a timestamp.=20

=20

One thing I was unsure on - and I think this is my ignorance on how such =
things are calculated - is how the total CPU capacity of the hypervisor =
impacted this. For instance, if I have a 20 real core, hyperthreaded =
hypervisor and a 100 second interval, I guess as an oversimplification =
there are 4000 CPU seconds are available for execution in that interval? =
That is when I started to get confused about the how to determine a =
total % from the info in xentop.=20

=20

Many thanks.

=20

=20

From: Xen-users <xen-users-bounces@lists.xenproject.org> On Behalf Of =
George Dunlap
Sent: 08 June 2020 11:59
To: Nick Calvert <nick.calvert@gmail.com>
Cc: George Dunlap <george.dunlap@citrix.com>; xen-users =
<xen-users@lists.xenproject.org>
Subject: Re: Vanilla Xen total CPU %

=20

=20

=20

On Thu, Jun 4, 2020 at 8:34 PM Nick Calvert <nick.calvert@gmail.com =
<mailto:nick.calvert@gmail.com> > wrote:

Hi everyone,

I am interested in calculating the approximate total CPU runtime % of
a vanilla Xen project host (without any of the bells and whistles of
XCP-ng or Xen Server). What I have at my disposal is Ubuntu, Xen and
the xl tool stack.

=20

Just to be clear: What you mean, is you want to add up the time all VMs =
are running?  (i.e., if you have one VM at 150%, another at 25%, and =
another at 25%, the total would be 200%?)

=20

I have been experimenting with writing a parser for xentop output in
batch mode, this is a fairly easy task and I can see other attempts at
parsers across dead and dying github projects... my issue around this
is the precise meaning of the 'CPU/sec' metric given by xentop and how
I could use it to infer a total cpu time.

=20

If you don't mind me asking, what are you (and the projects you mention) =
using this information for?

=20

Xen is open-source project, so rather than having dozens of projects =
trying to work around the fact that the core tools don't tell them what =
they want to know, it seems like it would be better to either modify =
xentop to tell you what you want to know, or add a new tool to do the =
same thing.

=20


The docs for xentop say "CPU(sec) CPU time which the guest OS has
consumed(cumulated)".

My confusion is around how CPU 'seconds' actually relat to vCPUs, real
cores etc in this context. I can also see a couple of attempts at
figuring out total CPU %, but none look quite right.

If I were able to derive both the CPU seconds for each domu in an
interval, the aggregate CPU seconds in this interval and both total
vCPUs and physical cores what would be the correct formula for
approximating a total CPU runtime %?

Also if I am missing a trick and there is an easier way of calculating
this I would be extremely happy to hear it, as simple is nice :)

=20

I think if I were writing a program, I'd probably use libxl to get the =
raw data, rather than trying to parse xentop.  libxl_list_domain() will =
return a list of libxl_dominfo, which has a field "cpu_time", which is =
(I believe) the number of nanoseconds of cpu time that domain has =
consumed ever in its lifetime.

=20

So what you'd do is take a timestamp (t1) call libxl_list_domain(), and =
go through the resulting list, adding up `cpu_time` (c1).  Then at some =
point later, take a timestamp (t2) and do another sum (c2).  Your total =
host utilization between t1 and t2 would then be (c2 - c1) / (t2 - t1).

=20

If you're using 4.13 at least, you could use the golang bindings =
instead, if you didn't want to use C. =20

=20

 -George

=20

=20

=20

=20


------=_NextPart_000_03D6_01D63D94.7F8BC990
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'>Hi George, <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>Thank you =
very much for taking the time to respond to me. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>What I have =
been trying to do (and I think it=E2=80=99s the same for the other =
abandoned projects I came across) is come up with an equivalent to =
something like the Hyper-V % Total Runtime counter, which gives a =
(probably not very precise) but useful account of the total CPU =
=E2=80=98load=E2=80=99 of a hypervisor. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>This is the =
sort of metric which can be useful for spotting overall trends, or when =
the sum of all virtual machine CPU usage passes an alerting trigger. I =
appreciate that at this point it would probably be necessary to look at =
other metrics to determine what was actually happening. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>What I was =
trying to do was stream some of the xentop counters into a time series =
database =C2=A0(influxdb) so I could graph this. Other people have =
attempted the same, as an example there are projects doing this with =
graphite, some people were using old xm python bindings to basically do =
exactly as you describe in your mail and return their own usage % for =
graphing. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>Being able =
to do this with Go in 4.13 is very interesting and I did not know such =
bindings existed. =C2=A0I have some experience with the language so will =
look at this now. =C2=A0I am however straddled with some older versions =
of Xen and had got as far as building a parser and a.) pushing the cpu =
seconds value for each domU directly into a database and playing with =
them as if they were a network interface counters and b.) taking samples =
in a time interval and performing a calculation just as you describe and =
inserting these directly into a database with a timestamp. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>One thing I =
was unsure on - and I think this is my ignorance on how such things are =
calculated - is how the total CPU capacity of the hypervisor impacted =
this. For instance, if I have a 20 real core, hyperthreaded hypervisor =
and a 100 second interval, I guess as an oversimplification there are =
4000 CPU seconds are available for execution in that interval? That is =
when I started to get confused about the how to determine a total % from =
the info in xentop. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>Many =
thanks.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm'><p class=3DMsoNormal><b><span =
lang=3DEN-US>From:</span></b><span lang=3DEN-US> Xen-users =
&lt;xen-users-bounces@lists.xenproject.org&gt; <b>On Behalf Of =
</b>George Dunlap<br><b>Sent:</b> 08 June 2020 11:59<br><b>To:</b> Nick =
Calvert &lt;nick.calvert@gmail.com&gt;<br><b>Cc:</b> George Dunlap =
&lt;george.dunlap@citrix.com&gt;; xen-users =
&lt;xen-users@lists.xenproject.org&gt;<br><b>Subject:</b> Re: Vanilla =
Xen total CPU %<o:p></o:p></span></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Thu, Jun 4, 2020 at 8:34 PM Nick Calvert &lt;<a =
href=3D"mailto:nick.calvert@gmail.com">nick.calvert@gmail.com</a>&gt; =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><p class=3DMsoNormal>Hi =
everyone,<br><br>I am interested in calculating the approximate total =
CPU runtime % of<br>a vanilla Xen project host (without any of the bells =
and whistles of<br>XCP-ng or Xen Server). What I have at my disposal is =
Ubuntu, Xen and<br>the xl tool stack.<o:p></o:p></p></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Just to be clear: What you mean, is you want to add up =
the time all VMs are running?&nbsp; (i.e., if you have one VM at 150%, =
another at 25%, and another at 25%, the total would be =
200%?)<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><p class=3DMsoNormal>I have =
been experimenting with writing a parser for xentop output in<br>batch =
mode, this is a fairly easy task and I can see other attempts =
at<br>parsers across dead and dying github projects... my issue around =
this<br>is the precise meaning of the 'CPU/sec' metric given by xentop =
and how<br>I could use it to infer a total cpu =
time.<o:p></o:p></p></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>If you don't mind me asking, what are you (and the =
projects you mention) using this information =
for?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Xen is open-source project, so rather than having =
dozens of projects trying to work around the fact that the core tools =
don't tell them what they want to know, it seems like it would be better =
to either modify xentop to tell you what you want to know, or add a new =
tool to do the same thing.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><p class=3DMsoNormal><br>The =
docs for xentop say &quot;CPU(sec) CPU time which the guest OS =
has<br>consumed(cumulated)&quot;.<br><br>My confusion is around how CPU =
'seconds' actually relat to vCPUs, real<br>cores etc in this context. I =
can also see a couple of attempts at<br>figuring out total CPU %, but =
none look quite right.<br><br>If I were able to derive both the CPU =
seconds for each domu in an<br>interval, the aggregate CPU seconds in =
this interval and both total<br>vCPUs and physical cores what would be =
the correct formula for<br>approximating a total CPU runtime =
%?<br><br>Also if I am missing a trick and there is an easier way of =
calculating<br>this I would be extremely happy to hear it, as simple is =
nice :)<o:p></o:p></p></blockquote></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
think if I were writing a program, I'd probably use libxl to get the raw =
data, rather than trying to parse xentop.&nbsp; libxl_list_domain() will =
return a list of libxl_dominfo, which has a field &quot;cpu_time&quot;, =
which is (I believe) the number of nanoseconds of cpu time that domain =
has consumed ever in its lifetime.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>So what you'd do is take a timestamp (t1) call =
libxl_list_domain(), and go through the resulting list, adding up =
`cpu_time` (c1).&nbsp; Then at some point later, take a timestamp (t2) =
and do another sum (c2).&nbsp; Your total host utilization between t1 =
and t2 would then be (c2 - c1) / (t2 - t1).<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>If you're using 4.13 at least, you could use the =
golang bindings instead, if you didn't want to use C.&nbsp; =
<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;-George<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_03D6_01D63D94.7F8BC990--



From xen-users-bounces@lists.xenproject.org Mon Jun 08 17:24:44 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jun 2020 17:24:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiLUp-0006uC-1h; Mon, 08 Jun 2020 17:23:39 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yn46=7V=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1jiLUn-0006u7-KT
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 17:23:37 +0000
X-Inumbo-ID: c935b61d-a9ac-11ea-b29d-12813bfff9fa
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id c935b61d-a9ac-11ea-b29d-12813bfff9fa;
 Mon, 08 Jun 2020 17:23:36 +0000 (UTC)
Received: from localhost (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256
 bits)) (No client certificate requested)
 by mail.kernel.org (Postfix) with ESMTPSA id D744820885;
 Mon,  8 Jun 2020 17:23:35 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
 s=default; t=1591637016;
 bh=y/sR41nt+RGL/rQ8vd0GYiXAiJVbc2ZcgOR+7VJVFbg=;
 h=Date:From:To:cc:Subject:In-Reply-To:References:From;
 b=s+oAmh3owldUz/wwu735SoErQl/s2PVEV+UnjxhAd6fkjzk91z4nnFsCL8NRFKiTu
 CL4+VWs4AJE7QfeRcWEgsVPpk6shiaWtt4pSSMy0yEwg/+RRZqXsQLQ1l58LN6MHMB
 o9n7Ix0koek4QDiAORW7jr+eGz8uhSGgGc7p/iQY=
Date: Mon, 8 Jun 2020 10:23:35 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s
To: Julien Grall <julien@xen.org>
Subject: Re: help
In-Reply-To: <51afec92-8417-d932-411e-f1a83c9eec84@xen.org>
Message-ID: <alpine.DEB.2.21.2006081015560.2815@sstabellini-ThinkPad-T480s>
References: <CACD6wFNUVcz_0Q=2Ci4FSzMRaVRY+1vd8ZqnktJga=NyRSZUXg@mail.gmail.com>
 <51afec92-8417-d932-411e-f1a83c9eec84@xen.org>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: multipart/mixed; BOUNDARY="8323329-436652397-1591636585=:2815"
Content-ID: <alpine.DEB.2.21.2006081016590.2815@sstabellini-ThinkPad-T480s>
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Sara Alonso <alonsosara44@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-436652397-1591636585=:2815
Content-Type: text/plain; CHARSET=UTF-8
Content-Transfer-Encoding: 8BIT
Content-ID: <alpine.DEB.2.21.2006081016591.2815@sstabellini-ThinkPad-T480s>

On Sat, 6 Jun 2020, Julien Grall wrote:
> On 05/06/2020 07:54, Sara Alonso wrote:
> > Hi,
> 
> Hello,
> 
> Adding Stefano as this looks like a Xilinx SDK issue rather than a Xen itself.
> 
> Cheers,
> 
> > I am a student and I am using Xen for my master thesis. I am trying to boot
> > a standalone server TCP guest in Xen DomU on a ZCU102 board. First, I build
> > a petalinux project (in xen.dtsi I have added some lines for passthroughing
> > the uart1 and the gem3). Next, I create a standalone application in SDK,
> > selecting "Hypervisor Guest: Yes" and using lwIP TCP Perf Server template. I
> > selected uart1 for output in bsp settings. When I build the project
> > server.bin file is created. I also create a config file (attached). I copy
> > the files for booting Dom0, server.bin and dom1.cfg file in the FAT
> > partition of the SD card. Then I boot Dom0 without any problem. I createdom1
> > with xl createdom1.cfg. The domain is created without any error. When I do
> > xl list, it says that dom1 is running, but anything appears in uart1 and I
> > cannot connect the client, so I think the application is not running
> > correctly. I don't have this problem when I boot a hello world application
> > in domU, it appears the message in uart1.
> > 
> > I think I am missing some step. Could you help me to solve this
> > issue, please?

Hi Sara,

Let me ask you a bunch of questions to make sure I understand your setup
correctly.

Could you please send me the host device tree that you are using
(i.e. xen.dtb), the VM config file for the DomU (createdom1.cfg) and the
partial device tree for the Domu? (I can't access the files you attached
to your original email.)

Also, what version of Xilinx Xen are you using?


For your information, I know of a potential issue with the LWIP
baremetal app on Xen. It manifests with warning messages like the
following on the Xen console:

  No access to MMIO read ff5e005c, which is gem3's REF CTRL register address

Have you seen anything like it by any chance? If so, I know the solution
to the problem.
--8323329-436652397-1591636585=:2815--


From xen-users-bounces@lists.xenproject.org Mon Jun 08 19:04:53 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Jun 2020 19:04:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiN3J-0007Va-0x; Mon, 08 Jun 2020 19:03:21 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=fAej=7V=rah.ro=eugen@srs-us1.protection.inumbo.net>)
 id 1jiN3H-0007VV-Ii
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 19:03:19 +0000
X-Inumbo-ID: b541bc74-a9ba-11ea-b2aa-12813bfff9fa
Received: from smtp1.rdslink.ro (unknown [81.196.12.70])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id b541bc74-a9ba-11ea-b2aa-12813bfff9fa;
 Mon, 08 Jun 2020 19:03:16 +0000 (UTC)
Received: from 5-15-248-161.residential.rdsnet.ro ([5.15.248.161]:38926
 helo=rah.ro) by smtp1.rdslink.ro with esmtp (Exim 4.84_2)
 (envelope-from <eugen@rah.ro>) id 1jiN3B-0007kQ-4F
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 22:03:15 +0300
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=rah.ro;
 s=1024k1; 
 h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date;
 bh=IXk23bZCCKjT6lxwEblgoZBL5PGuFL94dJljllg7nPM=; 
 b=bKz7mUG8tyLBurHOYAU6Ft74hHsTKE6JtKrPJgc3ST/qsbrCM1gBQyHc0eL82EcHD5BoKlOuzsnZ/Uq900+PIi6viWVhoRpkm1I+KFzASPeDM3nvsMTXz3fCylnxJB7EDbsiLVJ6QG77RbOHtZE4kyO467rUZzecuKdpa/YqtiQ=;
Received: from eugen by rah.ro with local (Exim 4.84_2)
 (envelope-from <eugen@rah.ro>) id 1jiN3A-0007hI-IF
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 22:03:12 +0300
Date: Mon, 8 Jun 2020 22:03:12 +0300
From: eugen@rah.ro
To: xen-users@lists.xenproject.org
Subject: Xen 4.11 on MacPro (early2008) NOT booting, blank screen. Dom0 alone
 boots OK; Debian buster, LVM on Raid1, efi
Message-ID: <20200608190311.GC29385@rah.ro>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Spam_score: 0.4
X-Spam_score_int: 4
X-Spam_bar: /
X-Spam_report: Spam detection software,
 running on the system "spamassassin-smtp.rdsnet.ro", 
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 the administrator of that system for details.
 Content preview:  It's a fresh installation, using debian installer,
 then installing
 the xen-system packages. See hardware and versions details later below.
 Booting
 the Debian system, the dom0 alone, works great. Booting with Xen Hypervisor
 stops at a blank screen, as described below: All the Grub2 commands seems
 to be executed ok: the echo messages are displayed, I can see them fine (like
 'Loading initial ramdisk ...', including a last echo debug message I put
 there myself. Immediately after that, the screen goes blank and stays blank
 forever. My Samsung TV (hdmi) doesn't complain about signal lost or something.
 [...] Content analysis details:   (0.4 points, 6.0 required)
 pts rule name              description
 ---- ---------------------- --------------------------------------------------
 0.0 TVD_RCVD_IP            Message was received from an IP address
 -0.0 SPF_PASS               SPF: sender matches SPF record
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
 0.4 RDNS_DYNAMIC           Delivered to internal network by host with
 dynamic-looking rDNS
 0.0 T_DKIM_INVALID         DKIM-Signature header exists but is not valid
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

It's a fresh installation, using debian installer, then installing
the xen-system packages. See hardware and versions details later below.

Booting the Debian system, the dom0 alone, works great.
Booting with Xen Hypervisor stops at a blank screen, as described below:
All the Grub2 commands seems to be executed ok: the echo messages are
displayed, I can see them fine (like 'Loading initial ramdisk ...',
including a last echo debug message I put there myself. Immediately after
that, the screen goes blank and stays blank forever. My Samsung TV
(hdmi) doesn't complain about signal lost or something.

There are no log messages in /var/log or any indication that domO under
Xen was loading/starting. Also no network presence (like ping, ssh).

I've tried many command line options like vga=current,keep or vga=ask or
iommu=off or ... No one made any difference... everything was exactly as
before - for example I wasn't asked to choose the vga mode. (I edited
the commands at runtime, in the grub menu).

Any idea of what's going on? 

Any debug tips on how to find more about the problem? how to display
more debug messages? Maybe a serial console on USB? With console=dbgp?
not much info about that. I have a Raspberry PI that can do UART... I've
read https://wiki.xenproject.org/wiki/Xen_Serial_Console and it seems
that I don't have any physical serial port or a technology that provides
one.

I would appreciate any thought/guess on this...

Hardware:
MacPro (early 2008: Macpro3,1)
2x Intel Xeon 4562
ATI Radeon HD 2600 (2xDVI ports) with firmware from
firmware-amd-graphics package
connected to a Samsung TV (dvi-hdmi cable)

Software:
Debian buster (10.4) amd64 - using debian-installer
LVM on RAID1
Using EFI 64 bits
Grub 2.02
Linux kernel 4.19.0-9-amd64
Xen-system 4.11.3

Regards,
   Eugen


From xen-users-bounces@lists.xenproject.org Tue Jun 09 01:59:53 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2020 01:59:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiTXF-00026I-8s; Tue, 09 Jun 2020 01:58:41 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=xW5c=7W=sendgrid.net=bounces+1794986-9697-xen-users=lists.xenproject.org@srs-us1.protection.inumbo.net>)
 id 1jiTXD-00025Z-Da
 for xen-users@lists.xenproject.org; Tue, 09 Jun 2020 01:58:39 +0000
X-Inumbo-ID: bc229c36-a9f4-11ea-bca7-bc764e2007e4
Received: from xtrwsqzp.outbound-mail.sendgrid.net (unknown [167.89.100.227])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id bc229c36-a9f4-11ea-bca7-bc764e2007e4;
 Tue, 09 Jun 2020 01:58:38 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sendgrid.net;
 h=mime-version:content-type:content-transfer-encoding:from:subject:to;
 s=smtpapi; bh=W8k49Hjti9qQk4PaPi9aWpDF3cQBPLWJvent/yHw5LQ=;
 b=mH+IfIJxyO0ubLboKMSwUd4ertlfyGwRNTtjYpljUu3GU3frcXxxkGIMmXOJ01wIV/rT
 M6hhuTCbwuqeU0GRnXDAQ15cP6ifPsKofuYlYzFpj3ztKB2p1QZYfGPaoyfvhJE/PT2Ftx
 UwAzQN5NkgU5c2cpp3ryqtl9+7X/redjs=
Received: by filterdrecv-p3las1-74f77df65c-r9t4v with SMTP id
 filterdrecv-p3las1-74f77df65c-r9t4v-19-5EDEECCD-8
 2020-06-09 01:58:37.669262397 +0000 UTC m=+453248.263528438
Received: from cloudmachine.kow.is (unknown)
 by ismtpd0010p1iad2.sendgrid.net (SG) with ESMTP id EAlPd0XATA-H11fypdoErA
 for <xen-users@lists.xenproject.org>;
 Tue, 09 Jun 2020 01:58:37.353 +0000 (UTC)
Received: from soulreaver.dark.kow.is (unknown [10.10.220.216])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "soulreaver.dark.kow.is", Issuer "dark.kow.is CA" (not verified))
 by cloudmachine.kow.is (Postfix) with ESMTPS id DE6BA7EE31
 for <xen-users@lists.xenproject.org>; Mon,  8 Jun 2020 20:58:36 -0500 (CDT)
Received: from localhost (elzevir.shlrm.org [10.10.220.205])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by soulreaver.dark.kow.is (Postfix) with ESMTPSA id 834F080098
 for <xen-users@lists.xenproject.org>; Mon,  8 Jun 2020 20:58:36 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Date: Tue, 09 Jun 2020 01:58:37 +0000 (UTC)
From: David Kowis <david@kow.is>
Subject: Unable to puzzle through grub.xen_pvh
User-Agent: Roundcube Webmail/1.4.0
Message-ID: <344966d2b9ff0064ccc9e8b59158de4d@kow.is>
X-Sender: david@kow.is
X-SG-EID: =?us-ascii?Q?+kMxBqj35EdRUKoy8diX1v=2FYwOtV0mBc163WH1fm2RNr7DE+LL3sO=2F0hN7QDBQ?=
 =?us-ascii?Q?f4cfpo5QO3dFgZRdl3lfKMUTPE+6nqX75+msRuP?=
 =?us-ascii?Q?v9cfJXT7rw4rjP8X7zAjAX=2FuQ9FjHDEFfcNcrky?=
 =?us-ascii?Q?06jcKfEkw6u2gzIbDOGF2OBLqxWVKdEajeQlzSh?=
 =?us-ascii?Q?qjNVp0+g+bKbDYcekMVXD+2mds0a4J1NUpym8NC?=
 =?us-ascii?Q?nTS=2F05aKZDg5ZdJJa7C3RTdjFAJuhSMxNyFIYab?=
 =?us-ascii?Q?E2ggkBcaHYsXEwsOUAvIA=3D=3D?=
To: xen-users@lists.xenproject.org
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

I started here: 
https://wiki.xenproject.org/wiki/Xen_4.12_RC_test_instructions#PVH_domU_boot_via_grub2

I was able to build and copy over the resulting built component. I then 
proceeded to change an existing vm that booted PVH with the 
kernel="/path/to/grub.xen_pvh" instead of bootloader="pygrub"

It worked in that I got a grub command prompt, which usually happens 
when grub doesn't know what to do. I feel like I'm really close!

my cfg:
=============
name="hass"
type="pvh"
vcpus=4
memory=2048
maxmem=4096
#bootloader="pygrub"
kernel="/usr/local/bin/grub.xen_pvh"

# Enable pv on hvm drivers
xen_platform_pci=1

vif = [ 'mac=00:16:3E:DE:AD:78, bridge=xenbr0' ]

disk = [
   
'phy:/dev/disk/by-path/ip-10.255.255.2:3260-iscsi-iqn.2005-10.org.freenas.ctl:xen-lun-35,xvda,w'
        ]


# usb passthrough for the zwave stick
usbctrl=['type=auto,version=2,ports=4']
usbdev=['type=hostdev,hostbus=2,hostaddr=3']
=============

There is a grub.cfg in /boot/grub/grub.cfg on that disk. It's a standard 
ubuntu 18.04 vm, which I've built a kernel with the PVUSB drivers on it. 
Trying to get that kernel to boot easily, and a more real grub 
environment would help solve it.

Thanks!


From xen-users-bounces@lists.xenproject.org Tue Jun 09 02:40:07 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2020 02:40:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiUAn-0005vK-PL; Tue, 09 Jun 2020 02:39:33 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=xW5c=7W=sendgrid.net=bounces+1794986-9697-xen-users=lists.xenproject.org@srs-us1.protection.inumbo.net>)
 id 1jiUAm-0005vF-Ig
 for xen-users@lists.xenproject.org; Tue, 09 Jun 2020 02:39:32 +0000
X-Inumbo-ID: 728f2408-a9fa-11ea-8496-bc764e2007e4
Received: from xtrwptpb.outbound-mail.sendgrid.net (unknown [167.89.55.59])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 728f2408-a9fa-11ea-8496-bc764e2007e4;
 Tue, 09 Jun 2020 02:39:31 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sendgrid.net;
 h=mime-version:content-type:content-transfer-encoding:from:subject:
 in-reply-to:references:to;
 s=smtpapi; bh=+D6I+xau5jqvj7xVNn0A0rNzc1xnqakqmgeXK2UIkYI=;
 b=ETylnPYW70E+qtxIYvT6ERGxc8yaxwcrbPF812iWDcz7VCRpjlII7ISu1t7edGUXFIVF
 qTIzIEOidRRXNZjSmEMMLsWEnhdnEI/7wDpHtoRdVK/yLiI/AMdVj8ZEkgLT6j4nFjKR5W
 GFf//wpZMpRGJGM8+Lp80wWf6sjDQ7LVI=
Received: by filterdrecv-p3mdw1-6f5df8956d-4d2bg with SMTP id
 filterdrecv-p3mdw1-6f5df8956d-4d2bg-21-5EDEF663-1F
 2020-06-09 02:39:31.455695794 +0000 UTC m=+455140.305691335
Received: from cloudmachine.kow.is (unknown)
 by ismtpd0044p1mdw1.sendgrid.net (SG) with ESMTP id Bra11FeRRpGrxiuv9ARXLA
 for <xen-users@lists.xenproject.org>;
 Tue, 09 Jun 2020 02:39:31.431 +0000 (UTC)
Received: from soulreaver.dark.kow.is (unknown [10.10.220.216])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "soulreaver.dark.kow.is", Issuer "dark.kow.is CA" (not verified))
 by cloudmachine.kow.is (Postfix) with ESMTPS id 2DBA47EE3C
 for <xen-users@lists.xenproject.org>; Mon,  8 Jun 2020 21:39:31 -0500 (CDT)
Received: from localhost (elzevir.shlrm.org [10.10.220.205])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by soulreaver.dark.kow.is (Postfix) with ESMTPSA id CD28980098
 for <xen-users@lists.xenproject.org>; Mon,  8 Jun 2020 21:39:30 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Date: Tue, 09 Jun 2020 02:39:31 +0000 (UTC)
From: David Kowis <david@kow.is>
Subject: Re: Vanilla Xen total CPU %
In-Reply-To: <20200608150842.GL18995@bitfolk.com>
References: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
 <CAFLBxZaEkH_fQzFLFXyZT-EHjvYZG7RgCP7U+gxK_NygbC855w@mail.gmail.com>
 <03d501d63d8c$1dc65020$5952f060$@simplyhosting.cloud>
 <AE3AA5C6-9192-4A68-9605-6BD5D244AD0E@citrix.com>
 <20200608150842.GL18995@bitfolk.com>
User-Agent: Roundcube Webmail/1.4.0
Message-ID: <a511bef7b00677d0c52ddd63df2d89e2@kow.is>
X-Sender: david@kow.is
X-SG-EID: =?us-ascii?Q?+kMxBqj35EdRUKoy8diX1v=2FYwOtV0mBc163WH1fm2RNr7DE+LL3sO=2F0hN7QDBQ?=
 =?us-ascii?Q?f4gjIEkntOemBAfmYcxgXvM1=2FBsRi5Ph4s0eXpR?=
 =?us-ascii?Q?4pNU18ICN0aZ1uHIghx80qmkkd8zeel08O=2FbiHs?=
 =?us-ascii?Q?USNylx8NN6ogAyNZ8p0ZVQDKfLxIHmsjFc=2FwuiA?=
 =?us-ascii?Q?UFPJ91Z0hm9qpB8zsAdskLONFrEgVVKwxd6oBL=2F?=
 =?us-ascii?Q?xvYrJRdKh0WHFkBXN9peM+V9zj7nL5kZkLwYyGt?=
 =?us-ascii?Q?NpNHqIqsR0h1NMJDQ7h8A=3D=3D?=
To: xen-users@lists.xenproject.org
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 2020-06-08 10:08, Andy Smith wrote:
> Hi,
> 
>> > On Jun 8, 2020, at 12:58 PM, Nick Calvert <nick.calvert@simplyhosting.cloud> wrote:
>> > What I was trying to do was stream some of the xentop counters
>> > into a time series database  (influxdb) so I could graph this.
> 
> I wanted to do this too, but for Prometheus.
+1

I was going to approach it from a crystal point of view, binding to the 
libxl c library. Again real life, and time got to me. I would love to 
see a high quality Xen Prometheus exporter!

> 
> I wrote a libxl C program that prints out the CPU time used by each
> guest in Prometheus's exposition format¹. That would be just the
> cumulative time in seconds because Prometheus likes things in its
> base units, and you can derive percentages and rates from that.
> 
> I just trigger it by cron every 5 minutes and use it as a
> node_exporter textfile collector², but I guess if I wanted it at a
> shorter interval I'd make it into a proper exporter from a
> standalone daemon.
> 
> If anyone would find it useful I can publish it, though my C is
> terrible…

I'd find it useful to look at :) Throw it on a git repo somewhere, or 
something :)

-- David


From xen-users-bounces@lists.xenproject.org Tue Jun 09 06:29:23 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2020 06:29:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiXjm-0000w5-2X; Tue, 09 Jun 2020 06:27:54 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lf/j=7W=gmail.com=lambert.olivier@srs-us1.protection.inumbo.net>)
 id 1jiXjk-0000w0-VZ
 for xen-users@lists.xenproject.org; Tue, 09 Jun 2020 06:27:53 +0000
X-Inumbo-ID: 588d258a-aa1a-11ea-bb8b-bc764e2007e4
Received: from mail-ua1-x931.google.com (unknown [2607:f8b0:4864:20::931])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 588d258a-aa1a-11ea-bb8b-bc764e2007e4;
 Tue, 09 Jun 2020 06:27:52 +0000 (UTC)
Received: by mail-ua1-x931.google.com with SMTP id t26so1560546ual.13
 for <xen-users@lists.xenproject.org>; Mon, 08 Jun 2020 23:27:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=AaWsOyhFLQw/jJzNpdksTxpNtiyurGfkIMkPzxRZtpo=;
 b=gGlVikWXtT8R+L/VXa/68Z6OP9N4LYQjPNx17zpdGO605AJm16f+GENmADzhWMXEk6
 EUtFPEUQ1K+LbZe3jZEvvI/F/k68ClROzq0xuOksvQ0fKJlmPZ/r7th9znPPMe3ypWpN
 WCZkiH8n+F/m7IWhIFG4aF+aO0/aeCFJr3uVFbHRykSIArcTZytrvDFlU/2Y+cpnNS0p
 ZuXRYQp15g7c7kw7xNaE8IXqz/xLanQBt8GdJ0N4Yw3wQ7iJQn6UNa2ganlGWMLEydnW
 AOagIlmdz0pSOhBhXSoq7vhY+vCA8HtsXR+HKx2ULTwuzSO/QM67OQTL+qcz7dM4zNcN
 i3lA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=AaWsOyhFLQw/jJzNpdksTxpNtiyurGfkIMkPzxRZtpo=;
 b=O8Pihl4QTB9MkRb4Tky26nz5AEbYaKVNtdDumWM0oAb/7YVA4IZFqd6BXC85k089c/
 iKFkJGy1oGcXeXZLzvbvEQk3QYm04gr1n3QiNYUbCl0CuGfNNvG5UYZeXPcbDnHtcxPf
 YB+k12e1oWAYczIECwe/ENDqZIKa2GF/Ydr1miGjGo1UktY7vnK7tuyBmt/2x546REJq
 4Nvi3NpJZ73Y2UOnuq2sVRYpP5Aw8OKA6QlOk5Cy2iTb8LmxP/hQ2swhEoUN5GzXrSlt
 WufXThWhPkvuIumWBD355F6llqK0IIgOOkVM0y9/UQa74PoVl6bZZWcAliV0HPj7RlUt
 hMYw==
X-Gm-Message-State: AOAM531BPrngNjyfJMAiSuGKN4hTg9vCwndkZUAZjZcm/U1S2s5T4IsK
 TE3yIM468EAAEuBv4mFWaf/BFu2k1xtZ79+fiR6T0hyL
X-Google-Smtp-Source: ABdhPJzv4wnhjZ78N5pd2Sp1Dq4mE9K/3i1W6nCaWGP7sI9dyzv6+D+np8UbFWKEiGtkuSJ5iwlabpEBr6NhY+5dFbQ=
X-Received: by 2002:a9f:35e4:: with SMTP id u33mr1623378uad.115.1591684071581; 
 Mon, 08 Jun 2020 23:27:51 -0700 (PDT)
MIME-Version: 1.0
References: <CAH_TNPvz05QhODF13XmPh4f4eTT3tA+zfZRPihuABKehCru7cg@mail.gmail.com>
 <CAFLBxZaEkH_fQzFLFXyZT-EHjvYZG7RgCP7U+gxK_NygbC855w@mail.gmail.com>
 <03d501d63d8c$1dc65020$5952f060$@simplyhosting.cloud>
 <AE3AA5C6-9192-4A68-9605-6BD5D244AD0E@citrix.com>
 <20200608150842.GL18995@bitfolk.com> <a511bef7b00677d0c52ddd63df2d89e2@kow.is>
In-Reply-To: <a511bef7b00677d0c52ddd63df2d89e2@kow.is>
From: Olivier Lambert <lambert.olivier@gmail.com>
Date: Tue, 9 Jun 2020 08:27:40 +0200
Message-ID: <CACJ1ZNsx+T1LunAJ28maGRvnOATq=f+1MX85WNEodTaEWaFcYQ@mail.gmail.com>
Subject: Re: Vanilla Xen total CPU %
To: David Kowis <david@kow.is>
Content-Type: multipart/alternative; boundary="000000000000ae6b8705a7a0d3d5"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000ae6b8705a7a0d3d5
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi!

FYI, we managed to contribute to a Netdata plugin using Xen stats (see
https://learn.netdata.cloud/docs/agent/collectors/xenstat.plugin/ ). You
can use it to stream it to a master netdata, and this one can directly put
metrics in a Prometheus DB (I'm doing that for my own production).

Best,


Olivier.

Le mar. 9 juin 2020 =C3=A0 04:41, David Kowis <david@kow.is> a =C3=A9crit :

> On 2020-06-08 10:08, Andy Smith wrote:
> > Hi,
> >
> >> > On Jun 8, 2020, at 12:58 PM, Nick Calvert
> <nick.calvert@simplyhosting.cloud> wrote:
> >> > What I was trying to do was stream some of the xentop counters
> >> > into a time series database  (influxdb) so I could graph this.
> >
> > I wanted to do this too, but for Prometheus.
> +1
>
> I was going to approach it from a crystal point of view, binding to the
> libxl c library. Again real life, and time got to me. I would love to
> see a high quality Xen Prometheus exporter!
>
> >
> > I wrote a libxl C program that prints out the CPU time used by each
> > guest in Prometheus's exposition format=C2=B9. That would be just the
> > cumulative time in seconds because Prometheus likes things in its
> > base units, and you can derive percentages and rates from that.
> >
> > I just trigger it by cron every 5 minutes and use it as a
> > node_exporter textfile collector=C2=B2, but I guess if I wanted it at a
> > shorter interval I'd make it into a proper exporter from a
> > standalone daemon.
> >
> > If anyone would find it useful I can publish it, though my C is
> > terrible=E2=80=A6
>
> I'd find it useful to look at :) Throw it on a git repo somewhere, or
> something :)
>
> -- David
>
>

--000000000000ae6b8705a7a0d3d5
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi!</div><div><br></div><div>FYI, we managed to contr=
ibute to a Netdata plugin using Xen stats (see <a href=3D"https://learn.net=
data.cloud/docs/agent/collectors/xenstat.plugin/">https://learn.netdata.clo=
ud/docs/agent/collectors/xenstat.plugin/</a> ). You can use it to stream it=
 to a master netdata, and this one can directly put metrics in a Prometheus=
 DB (I&#39;m doing that for my own production).</div><div><br></div><div>Be=
st,</div><div><br></div><div><br></div><div>Olivier.<br></div></div><br><di=
v class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">Le=C2=A0mar. =
9 juin 2020 =C3=A0=C2=A004:41, David Kowis &lt;<a href=3D"mailto:david@kow.=
is">david@kow.is</a>&gt; a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"=
gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(20=
4,204,204);padding-left:1ex">On 2020-06-08 10:08, Andy Smith wrote:<br>
&gt; Hi,<br>
&gt; <br>
&gt;&gt; &gt; On Jun 8, 2020, at 12:58 PM, Nick Calvert &lt;nick.calvert@si=
mplyhosting.cloud&gt; wrote:<br>
&gt;&gt; &gt; What I was trying to do was stream some of the xentop counter=
s<br>
&gt;&gt; &gt; into a time series database=C2=A0 (influxdb) so I could graph=
 this.<br>
&gt; <br>
&gt; I wanted to do this too, but for Prometheus.<br>
+1<br>
<br>
I was going to approach it from a crystal point of view, binding to the <br=
>
libxl c library. Again real life, and time got to me. I would love to <br>
see a high quality Xen Prometheus exporter!<br>
<br>
&gt; <br>
&gt; I wrote a libxl C program that prints out the CPU time used by each<br=
>
&gt; guest in Prometheus&#39;s exposition format=C2=B9. That would be just =
the<br>
&gt; cumulative time in seconds because Prometheus likes things in its<br>
&gt; base units, and you can derive percentages and rates from that.<br>
&gt; <br>
&gt; I just trigger it by cron every 5 minutes and use it as a<br>
&gt; node_exporter textfile collector=C2=B2, but I guess if I wanted it at =
a<br>
&gt; shorter interval I&#39;d make it into a proper exporter from a<br>
&gt; standalone daemon.<br>
&gt; <br>
&gt; If anyone would find it useful I can publish it, though my C is<br>
&gt; terrible=E2=80=A6<br>
<br>
I&#39;d find it useful to look at :) Throw it on a git repo somewhere, or <=
br>
something :)<br>
<br>
-- David<br>
<br>
</blockquote></div>

--000000000000ae6b8705a7a0d3d5--


From xen-users-bounces@lists.xenproject.org Tue Jun 09 06:52:05 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2020 06:52:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiY6J-0003dH-DV; Tue, 09 Jun 2020 06:51:11 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=gCFS=7W=gmail.com=alonsosara44@srs-us1.protection.inumbo.net>)
 id 1jiY6I-0003dC-Fj
 for xen-users@lists.xenproject.org; Tue, 09 Jun 2020 06:51:10 +0000
X-Inumbo-ID: 988b9f38-aa1d-11ea-bb8b-bc764e2007e4
Received: from mail-ej1-x62c.google.com (unknown [2a00:1450:4864:20::62c])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 988b9f38-aa1d-11ea-bb8b-bc764e2007e4;
 Tue, 09 Jun 2020 06:51:08 +0000 (UTC)
Received: by mail-ej1-x62c.google.com with SMTP id q19so21079628eja.7
 for <xen-users@lists.xenproject.org>; Mon, 08 Jun 2020 23:51:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=lbW4+P47fkouOKgOCc+RiK2i0seif+JZIrevoMLprhA=;
 b=O8exBMineWFWdipsz9cvUWl78Ynyq7by1RbnWLj9AjDc4c95Mog2EwCir8Oh+N1yWa
 7DN/R4tg4zvnB2UfGQWgHBTe3V6PWt4aO29KilrYRfca6nh8HZwtl5z2nyR2E7hb7ckE
 8jAaC+Yesxe4FxddkNL2vm3eReuGlmqbBUvTQKIGwm94ee6bf6DX7vbG+WYGZWqdpfDD
 ksppV/tzwtYol+gckH2hr407rrvIKZ9fiQGM8xm52YI3NlvMItAs3wsFWuwnSxH+2DUH
 awLkLBTv06a4xNlV5JKJ+t2/XjUmL9aT9Orb45zz0gJ9Q/jtRrF2/iZbgmLJj3moUXKd
 aAoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=lbW4+P47fkouOKgOCc+RiK2i0seif+JZIrevoMLprhA=;
 b=L6JGBmMrVQk7WgKLynCXmxFlcsTkv7l1UkoT0WrBf4r8OEhmRwDyrub07kIshjtkpf
 rrqlfq0uA67whlko3hXJ/HGU6NWSZmuI502EObbf23CGvvWIcpN4dg8BDgWbqrtrwLad
 /MBaCF7ZVXwRkqKzXscmnqPSzHEe7VI2KIMI8AenDKamzIUxEqkq3QpeMZdxc+7gUogh
 lUHaaPVaeEU9dnacXyRF7ss+qXY+u4IFg7dEeX2IAFHXU2ZfLu69toFu18HTO9ayKpyb
 Z9X4kVzHEZpRZNQyEKceuZ+jjBblZegQB3VoTPXM5mRDznPc9CMIW+XoFLimMtu879Jg
 13/g==
X-Gm-Message-State: AOAM533Cbqk4uzmZISsZYwNybUjM8x281k9uhWvSufuJ4qTA/cYd0eeW
 tpv66NwhuJAdfJ8TwNJL1y9Ot1CkBjvUYeftmL8=
X-Google-Smtp-Source: ABdhPJw1Tygux6sHxECYmvMLpJ7yoOB8MkzvuUU+K/z1pWNwntppokaKwpvZ8X04U03B54EfaEB0PGHmY+vdXYTcSkE=
X-Received: by 2002:a17:906:7acf:: with SMTP id
 k15mr25054193ejo.410.1591685467010; 
 Mon, 08 Jun 2020 23:51:07 -0700 (PDT)
MIME-Version: 1.0
References: <CACD6wFNUVcz_0Q=2Ci4FSzMRaVRY+1vd8ZqnktJga=NyRSZUXg@mail.gmail.com>
 <51afec92-8417-d932-411e-f1a83c9eec84@xen.org>
 <alpine.DEB.2.21.2006081015560.2815@sstabellini-ThinkPad-T480s>
In-Reply-To: <alpine.DEB.2.21.2006081015560.2815@sstabellini-ThinkPad-T480s>
From: Sara Alonso <alonsosara44@gmail.com>
Date: Tue, 9 Jun 2020 08:50:56 +0200
Message-ID: <CACD6wFND8w9PHM9JUV5rgfDyh__A7Q2D0am9O8MBiuwxL0WTWg@mail.gmail.com>
Subject: Re: help
To: Stefano Stabellini <sstabellini@kernel.org>
Content-Type: multipart/alternative; boundary="000000000000daf9f005a7a126cc"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Julien Grall <julien@xen.org>, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000daf9f005a7a126cc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi,

I attach to this email all the files I use for booting xen and dom1, and
the xen.dtsi. The version of Xen I use is 4.11.1 and the version of SDK I
use is 2019.1. I don't get any warnings in Xen console.
But when I create the SDK lwip application I get two error messages:
"region 'psu_ddr_0_MEM_0' overflowed by 34623488 bytes" and "client.elf
section '.bss' will not fit in region 'psu_ddr_0_MEM_0'". I solve these
errors by resizing the 'psu_ddr_0_MEM_0' in lscript.ld to 35MB. I don't
know if this has something to do with my problem.
Then I don't get any message in Xen console when I boot domU.
Thank you,
Sara

 XEN.zip
<https://drive.google.com/file/d/1eio5wT4D_z9vfJGxFKPllHgGCG7nfqxM/view?usp=
=3Ddrive_web>

El lun., 8 jun. 2020 a las 19:23, Stefano Stabellini (<
sstabellini@kernel.org>) escribi=C3=B3:

> On Sat, 6 Jun 2020, Julien Grall wrote:
> > On 05/06/2020 07:54, Sara Alonso wrote:
> > > Hi,
> >
> > Hello,
> >
> > Adding Stefano as this looks like a Xilinx SDK issue rather than a Xen
> itself.
> >
> > Cheers,
> >
> > > I am a student and I am using Xen for my master thesis. I am trying t=
o
> boot
> > > a standalone server TCP guest in Xen DomU on a ZCU102 board. First, I
> build
> > > a petalinux project (in xen.dtsi I have added some lines for
> passthroughing
> > > the uart1 and the gem3). Next, I create a standalone application in
> SDK,
> > > selecting "Hypervisor Guest: Yes" and using lwIP TCP Perf Server
> template. I
> > > selected uart1 for output in bsp settings. When I build the project
> > > server.bin file is created. I also create a config file (attached). I
> copy
> > > the files for booting Dom0, server.bin and dom1.cfg file in the FAT
> > > partition of the SD card. Then I boot Dom0 without any problem. I
> createdom1
> > > with xl createdom1.cfg. The domain is created without any error. When
> I do
> > > xl list, it says that dom1 is running, but anything appears in uart1
> and I
> > > cannot connect the client, so I think the application is not running
> > > correctly. I don't have this problem when I boot a hello world
> application
> > > in domU, it appears the message in uart1.
> > >
> > > I think I am missing some step. Could you help me to solve this
> > > issue, please?
>
> Hi Sara,
>
> Let me ask you a bunch of questions to make sure I understand your setup
> correctly.
>
> Could you please send me the host device tree that you are using
> (i.e. xen.dtb), the VM config file for the DomU (createdom1.cfg) and the
> partial device tree for the Domu? (I can't access the files you attached
> to your original email.)
>
> Also, what version of Xilinx Xen are you using?
>
>
> For your information, I know of a potential issue with the LWIP
> baremetal app on Xen. It manifests with warning messages like the
> following on the Xen console:
>
>   No access to MMIO read ff5e005c, which is gem3's REF CTRL register
> address
>
> Have you seen anything like it by any chance? If so, I know the solution
> to the problem.

--000000000000daf9f005a7a126cc
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi,</div><div><br></div><div>I attach to this email a=
ll the files I use for booting xen and dom1, and the xen.dtsi. The version =
of Xen I use is 4.11.1 and the version of SDK I use is 2019.1. I don&#39;t =
get any warnings in Xen console. <br></div><div>But when I create the SDK l=
wip application I get two error messages: &quot;region &#39;psu_ddr_0_MEM_0=
&#39; overflowed by 34623488 bytes&quot; and &quot;client.elf section &#39;=
.bss&#39; will not fit in region &#39;psu_ddr_0_MEM_0&#39;&quot;. I solve t=
hese errors by resizing the &#39;psu_ddr_0_MEM_0&#39; in lscript.ld to 35MB=
. I don&#39;t know if this has something to do with my problem.</div><div>T=
hen I don&#39;t get any message in Xen console when I boot domU.</div><div>=
</div><div>Thank you,</div><div>Sara</div><div><br></div><div><div class=3D=
"gmail_chip gmail_drive_chip" style=3D"width:396px;height:18px;max-height:1=
8px;background-color:rgb(245,245,245);padding:5px;color:rgb(34,34,34);font-=
family:arial;font-style:normal;font-weight:bold;font-size:13px;border:1px s=
olid rgb(221,221,221);line-height:1"><a href=3D"https://drive.google.com/fi=
le/d/1eio5wT4D_z9vfJGxFKPllHgGCG7nfqxM/view?usp=3Ddrive_web" target=3D"_bla=
nk" style=3D"display:inline-block;max-width:366px;overflow:hidden;text-over=
flow:ellipsis;white-space:nowrap;text-decoration:none;padding:1px 0;border:=
none"><img style=3D"vertical-align: bottom; border: none;" src=3D"https://s=
sl.gstatic.com/docs/doclist/images/icon_10_generic_list.png">=C2=A0<span di=
r=3D"ltr" style=3D"color:rgb(17,85,204);text-decoration:none;vertical-align=
:bottom">XEN.zip</span></a><img src=3D"//ssl.gstatic.com/ui/v1/icons/common=
/x_8px.png" style=3D"opacity: 0.55; cursor: pointer; float: right; position=
: relative; top: -1px; display: none;"></div></div></div><br><div class=3D"=
gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">El lun., 8 jun. 2020 a l=
as 19:23, Stefano Stabellini (&lt;<a href=3D"mailto:sstabellini@kernel.org"=
>sstabellini@kernel.org</a>&gt;) escribi=C3=B3:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">On Sat, 6 Jun 2020, Julien Grall wrote:<br=
>
&gt; On 05/06/2020 07:54, Sara Alonso wrote:<br>
&gt; &gt; Hi,<br>
&gt; <br>
&gt; Hello,<br>
&gt; <br>
&gt; Adding Stefano as this looks like a Xilinx SDK issue rather than a Xen=
 itself.<br>
&gt; <br>
&gt; Cheers,<br>
&gt; <br>
&gt; &gt; I am a student and I am using Xen for my master thesis. I am tryi=
ng to boot<br>
&gt; &gt; a standalone server TCP guest in Xen DomU on a ZCU102 board. Firs=
t, I build<br>
&gt; &gt; a petalinux project (in xen.dtsi I have added some lines for pass=
throughing<br>
&gt; &gt; the uart1 and the gem3). Next, I create a standalone application =
in SDK,<br>
&gt; &gt; selecting &quot;Hypervisor Guest: Yes&quot; and using lwIP TCP Pe=
rf Server template. I<br>
&gt; &gt; selected uart1 for output in bsp settings. When I build the proje=
ct<br>
&gt; &gt; server.bin file is created. I also create a config file (attached=
). I copy<br>
&gt; &gt; the files for booting Dom0, server.bin and dom1.cfg file in the F=
AT<br>
&gt; &gt; partition of the SD card. Then I boot Dom0 without any problem. I=
 createdom1<br>
&gt; &gt; with xl createdom1.cfg. The domain is created without any error. =
When I do<br>
&gt; &gt; xl list, it says that dom1 is running, but anything appears in ua=
rt1 and I<br>
&gt; &gt; cannot connect the client, so I think the application is not runn=
ing<br>
&gt; &gt; correctly. I don&#39;t have this problem when I boot a hello worl=
d application<br>
&gt; &gt; in domU, it appears the message in uart1.<br>
&gt; &gt; <br>
&gt; &gt; I think I am missing some step. Could you help me to solve this<b=
r>
&gt; &gt; issue,=C2=A0please?<br>
<br>
Hi Sara,<br>
<br>
Let me ask you a bunch of questions to make sure I understand your setup<br=
>
correctly.<br>
<br>
Could you please send me the host device tree that you are using<br>
(i.e. xen.dtb), the VM config file for the DomU (createdom1.cfg) and the<br=
>
partial device tree for the Domu? (I can&#39;t access the files you attache=
d<br>
to your original email.)<br>
<br>
Also, what version of Xilinx Xen are you using?<br>
<br>
<br>
For your information, I know of a potential issue with the LWIP<br>
baremetal app on Xen. It manifests with warning messages like the<br>
following on the Xen console:<br>
<br>
=C2=A0 No access to MMIO read ff5e005c, which is gem3&#39;s REF CTRL regist=
er address<br>
<br>
Have you seen anything like it by any chance? If so, I know the solution<br=
>
to the problem.</blockquote></div>

--000000000000daf9f005a7a126cc--


From xen-users-bounces@lists.xenproject.org Tue Jun 09 08:13:15 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2020 08:13:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiZMb-0002jO-Gs; Tue, 09 Jun 2020 08:12:05 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lzqH=7W=citrix.com=roger.pau@srs-us1.protection.inumbo.net>)
 id 1jiZMZ-0002jJ-M6
 for xen-users@lists.xenproject.org; Tue, 09 Jun 2020 08:12:03 +0000
X-Inumbo-ID: e561be0e-aa28-11ea-8496-bc764e2007e4
Received: from esa6.hc3370-68.iphmx.com (unknown [216.71.155.175])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id e561be0e-aa28-11ea-8496-bc764e2007e4;
 Tue, 09 Jun 2020 08:12:01 +0000 (UTC)
Authentication-Results: esa6.hc3370-68.iphmx.com;
 dkim=none (message not signed) header.i=none
IronPort-SDR: 9o2m9yRlwNErWhobeR4vIO5XV2GkjnT1VHr/Gh0BSZdp8EAKXa9geF5i5Iz+mEMCDbLMd1pwyr
 eQOBc44qAZ9OviaCLVC5DI0vdu4aChs6dVt9/N1B1OgbcYpU7zhD2JMtVehhe7V/J7AsRQ9jod
 bhzRnFhhQMxk+TmVGSYxpQqLRG1CL3eR9doASGH62fj6TGN1eeq2GPW3FsrZz4mCGBLRNsslI1
 mhoM8O7t3zQjx9juSDtwq6YsnAB/yvsgTZSLC6Ory2FuKYEXsdeOAcH7zQIYfVluCMoM/lFxWi
 WQA=
X-SBRS: 2.7
X-MesageID: 19899490
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.158.21
X-Policy: $RELAYED
X-IronPort-AV: E=Sophos;i="5.73,491,1583211600"; d="scan'208";a="19899490"
Date: Tue, 9 Jun 2020 10:11:54 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Subject: Re: Xen 4.14 RC1
Message-ID: <20200609081039.GA1635@Air-de-Roger>
References: <20200608163934.313-1-paul@xen.org>
 <CABfawhn3HJCHonYKnMFPgUEN125SDBSXKcMFMWd2hG5SGKF8YQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <CABfawhn3HJCHonYKnMFPgUEN125SDBSXKcMFMWd2hG5SGKF8YQ@mail.gmail.com>
X-ClientProxiedBy: AMSPEX02CAS01.citrite.net (10.69.22.112) To
 AMSPEX02CL02.citrite.net (10.69.22.126)
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org, Xen-devel <xen-devel@lists.xenproject.org>,
 xen-announce@lists.xenproject.org, Paul Durrant <paul@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On Mon, Jun 08, 2020 at 02:02:31PM -0600, Tamas K Lengyel wrote:
> On Mon, Jun 8, 2020 at 10:41 AM Paul Durrant <paul@xen.org> wrote:
> >
> > Hi all,
> >
> > Xen 4.14 RC1 is tagged. You can check that out from xen.git:
> >
> > git://xenbits.xen.org/xen.git 4.14.0-rc1
> >
> > For your convenience there is also a tarball at:
> > https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz
> >
> > And the signature is at:
> > https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz.sig
> >
> > Please send bug reports and test reports to xen-devel@lists.xenproject.org.
> > When sending bug reports, please CC relevant maintainers and me (paul@xen.org).
> >
> > As a reminder, there will be a Xen Test Day. Please see the test day schedule at
> > https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
> > https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.
> 
> Hi Paul,
> I'm sad to see this RC1 still missing patch:
> 
> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00179.html
> 
> The following even have the release-ack and yet are also missing:
> 
> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00025.html

Ideally this one requires an Ack from the VMX maintainers, which
hasn't happened AFAICT. Might be worth trying to ping them on the patch
by putting them on the To field.

Alternatively we can consider pushing it without such Ack if the x86
maintainers agree.

Roger.


From xen-users-bounces@lists.xenproject.org Tue Jun 09 09:37:40 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2020 09:37:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiafo-0001gn-Qj; Tue, 09 Jun 2020 09:36:00 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=yKpO=7W=suse.com=jbeulich@srs-us1.protection.inumbo.net>)
 id 1jiafo-0001fT-5t
 for xen-users@lists.xenproject.org; Tue, 09 Jun 2020 09:36:00 +0000
X-Inumbo-ID: 99033a72-aa34-11ea-b2f8-12813bfff9fa
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 99033a72-aa34-11ea-b2f8-12813bfff9fa;
 Tue, 09 Jun 2020 09:35:47 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.220.254])
 by mx2.suse.de (Postfix) with ESMTP id 08C6AAD5D;
 Tue,  9 Jun 2020 09:35:49 +0000 (UTC)
Subject: Re: Xen 4.14 RC1
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Tamas K Lengyel <tamas.k.lengyel@gmail.com>
References: <20200608163934.313-1-paul@xen.org>
 <CABfawhn3HJCHonYKnMFPgUEN125SDBSXKcMFMWd2hG5SGKF8YQ@mail.gmail.com>
 <20200609081039.GA1635@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
Message-ID: <e8cfad05-3a03-5b9b-243f-030eba8de199@suse.com>
Date: Tue, 9 Jun 2020 11:35:46 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.1
MIME-Version: 1.0
In-Reply-To: <20200609081039.GA1635@Air-de-Roger>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Paul Durrant <paul@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>,
 xen-announce@lists.xenproject.org, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 09.06.2020 10:11, Roger Pau Monné wrote:
> On Mon, Jun 08, 2020 at 02:02:31PM -0600, Tamas K Lengyel wrote:
>> On Mon, Jun 8, 2020 at 10:41 AM Paul Durrant <paul@xen.org> wrote:
>>>
>>> Hi all,
>>>
>>> Xen 4.14 RC1 is tagged. You can check that out from xen.git:
>>>
>>> git://xenbits.xen.org/xen.git 4.14.0-rc1
>>>
>>> For your convenience there is also a tarball at:
>>> https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz
>>>
>>> And the signature is at:
>>> https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz.sig
>>>
>>> Please send bug reports and test reports to xen-devel@lists.xenproject.org.
>>> When sending bug reports, please CC relevant maintainers and me (paul@xen.org).
>>>
>>> As a reminder, there will be a Xen Test Day. Please see the test day schedule at
>>> https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
>>> https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.
>>
>> Hi Paul,
>> I'm sad to see this RC1 still missing patch:
>>
>> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00179.html
>>
>> The following even have the release-ack and yet are also missing:
>>
>> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00025.html
> 
> Ideally this one requires an Ack from the VMX maintainers, which
> hasn't happened AFAICT. Might be worth trying to ping them on the patch
> by putting them on the To field.
> 
> Alternatively we can consider pushing it without such Ack if the x86
> maintainers agree.

I would likely do so once the time we usually see Kevin reply has
expired, but we're not past that point yet.

Jan


From xen-users-bounces@lists.xenproject.org Tue Jun 09 17:01:58 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 09 Jun 2020 17:01:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jihc9-0005E1-RC; Tue, 09 Jun 2020 17:00:41 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IDuu=7W=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jihc8-0005Dl-Rd
 for xen-users@lists.xen.org; Tue, 09 Jun 2020 17:00:40 +0000
X-Inumbo-ID: bb47a184-aa72-11ea-b343-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id bb47a184-aa72-11ea-b343-12813bfff9fa;
 Tue, 09 Jun 2020 17:00:33 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=ibrw2dMw1jlbrjnlYVNU0hHtjOZsr2v2S82Tbvvu8G0=; b=V+zw+wubzFhbqVzyZJ2jWp1Li/
 ZrQwbJkmu+d1jHIKFtoYLHVi70YprffYUzZtZN91jf+34IBKELLxVsg91DY0kE8t1v46XyFg039IX
 ooaAICh83D2LsQ5q55X5GvIQxPmlJeNzsN82slx2RSJLOpSgOitP7PgVP8q1WTg4GZQw=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jihbt-0004Bc-3n; Tue, 09 Jun 2020 17:00:25 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jihbt-0000Ja-1n; Tue, 09 Jun 2020 17:00:25 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 320 v1 (CVE-2020-0543) - Special Register
 Buffer speculative side channel
Message-Id: <E1jihbt-0000Ja-1n@xenbits.xenproject.org>
Date: Tue, 09 Jun 2020 17:00:25 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-0543 / XSA-320

           Special Register Buffer speculative side channel

ISSUE DESCRIPTION
=================

This issue is related to the MDS and TAA vulnerabilities.  Please see
https://xenbits.xen.org/xsa/advisory-297.html (MDS) and
https://xenbits.xen.org/xsa/advisory-305.html (TAA) for details.

Certain processor operations microarchitecturally need to read data from
outside the physical core (e.g. to communicate with the random number
generator).  In some implementations, this operation is called a Special
Register Read.

In some implementations, data are staged in a single shared buffer, and
a full cache line at a time is returned to the core which made the
Special Register Read.  On parts vulnerable to MFBDS or TAA, an attacker
may be able to access stale data requested by other cores in the system.

For more details, see:
  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html

IMPACT
======

An attacker, which could include a malicious untrusted user process on a
trusted guest, or an untrusted guest, can sample the contents of
certain off-core accesses by other cores in the system.

This can include data whose use may depend on the secrecy of the value,
such as data from the Random Number Generator (e.g. RDRAND/RDSEED
instructions).

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

Only x86 processors are vulnerable.
ARM processors are not believed to be vulnerable.

Only Intel based processors are affected.  Processors from other
manufacturers (e.g. AMD) are not believed to be vulnerable.

Please consult the Intel Security Advisory for details on the affected
processors.

MITIGATION
==========

There is no mitigation available.

RESOLUTION
==========

New microcode is being released on affected parts to work around the
vulnerability.  It may be available via a firmware update (consult your
hardware vendor), or available for OS loading (consult your dom0 OS
vendor).

On Xen 4.13 and later, OS microcode can be loaded at runtime. See
https://xenbits.xen.org/docs/latest/admin-guide/microcode-loading.html#runtime-microcode-loading
for details on the xen-ucode utility.

Loading the microcode, either at boot or at runtime, suffices to
mitigate the issue, as protections are active by default.  The
mitigations do have an impact on latency of individual RDRAND/RDSEED
instructions.

The patches below are for Xen, and offer boot time information, defaults
selection, and opt-out controls.  They are recommended to take, but not
absolutely necessary for protection.

Note that patches for released versions are generally prepared to apply
to the stable branches, and may not apply cleanly to the most recent
release tarball.  Downstreams are encouraged to update to the tip of the
stable branch before applying these patches.

xsa320/xsa320-?.patch        xen-unstable
xsa320/xsa320-4.13-?.patch   Xen 4.13.x
xsa320/xsa320-4.12-?.patch   Xen 4.12.x
xsa320/xsa320-4.11-?.patch   Xen 4.11.x
xsa320/xsa320-4.10-?.patch   Xen 4.10.x
xsa320/xsa320-4.9-?.patch    Xen 4.9.x

$ sha256sum xsa320*/*
84e4f66492042b08e69b0894ea7feb20c17c89a696cf95f05a8826fba4f26355  xsa320/xsa320-1.patch
5a3a06c72d0281fa1191ba18e39b836d2748400d9bf6a59dd45447850530c88b  xsa320/xsa320-2.patch
759259ef88c980363d44e11d9c272f6a4a15918e5e6bcdfe971b1ce7ea160cd9  xsa320/xsa320-4.9-1.patch
ebac2c011841c55c3c1e99d9e8afc53e56e54268d379ec8b904f6bfe6a1a5045  xsa320/xsa320-4.9-2.patch
5c622c74358ab21cbd27484c649f26df0f08e89ec333c346415bc51e35ba26c1  xsa320/xsa320-4.10-1.patch
f112e34a6a4564a043926fc255a15c7e319001bd023a97ae2947228024e1c306  xsa320/xsa320-4.10-2.patch
f24b51292be0cb5de80c6eff0b26983629dd48cc39ae5a331e2e38e15a6cf712  xsa320/xsa320-4.11-1.patch
03579810eaf2e9eeb1a82de4b50ff5c4b01e60b30ccf7609c9e3378ef576d81e  xsa320/xsa320-4.11-2.patch
282537ffe2fd4332c0e061ddc537bea3e135a7bbd9253ec298becb49047323cf  xsa320/xsa320-4.12-1.patch
e4417429297354c233e8f5c261aff4888aae602f8c68897c09b16ea1aa44b1ca  xsa320/xsa320-4.12-2.patch
611f2ab1a1c67e04767188d9803b6afd7d304e81a5b4f1eb1744d3e8a68ced66  xsa320/xsa320-4.13-1.patch
cd1bc0071e72e2342ff4508ea3d937988694f4c03506b3afb3184f7d81aa1c86  xsa320/xsa320-4.13-2.patch
$

NOTE REGARDING LACK OF EMBARGO
==============================

Despite an attempt to organise predisclosure, the discoverers ultimately
did not authorise a predisclosure.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl7fufEMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZCNgIALz6dLCvvznL7n3HFzYgKcelmOySjoZ52hJhg6ki
N4C1AaPQmo1QPprycmuJ4uQIcLUP55Nh+h19V5PnRqSX1+7Qa8TXnv2TTpVK58fC
JBfWBZ3xiXYdmaQOWYlJtD1Nq3vywA0LII9TZ7JdCUxjmPxn2y5ZOv6lRG6P9CVJ
U+w3py0Zt32ZwYvVCbBPP49SdQmArH2BItEbGSQR5xeKnD/8Bx2/9odN0Mrnq5RQ
euJxRled3nCGw6tWZJj3uYOy+dWWfmFwPFoFvI++zhrcwWGprcgjFuSGFbsGttMD
ZB9+CZIJAHvgU4wu/B4SflHDgsmJS+iCmDR6e/NUlLohej0=
=w+E7
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.9-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.9-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.9-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.9-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.10-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.10-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.10-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.10-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.11-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.11-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.11-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.11-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.12-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.12-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.12-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.12-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.13-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.13-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.13-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.13-2.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L3NwZWMtY3RybDogTWl0aWdhdGUgdGhlIFNwZWNp
YWwgUmVnaXN0ZXIgQnVmZmVyIERhdGEgU2FtcGxpbmcgc2lkZWNoYW5uZWwK
ClNlZSBwYXRjaCBkb2N1bWVudGF0aW9uIGFuZCBjb21tZW50cy4KClRoaXMg
aXMgcGFydCBvZiBYU0EtMzIwIC8gQ1ZFLTIwMjAtMDU0MwoKU2lnbmVkLW9m
Zi1ieTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KUmV2aWV3ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNv
bT4KCmRpZmYgLS1naXQgYS9kb2NzL21pc2MveGVuLWNvbW1hbmQtbGluZS5w
YW5kb2MgYi9kb2NzL21pc2MveGVuLWNvbW1hbmQtbGluZS5wYW5kb2MKaW5k
ZXggOTI2ODQ1NDI5Ny4uYzc4MDMxMjUzMSAxMDA2NDQKLS0tIGEvZG9jcy9t
aXNjL3hlbi1jb21tYW5kLWxpbmUucGFuZG9jCisrKyBiL2RvY3MvbWlzYy94
ZW4tY29tbWFuZC1saW5lLnBhbmRvYwpAQCAtMTk5MSw3ICsxOTkxLDcgQEAg
QnkgZGVmYXVsdCBTU0JEIHdpbGwgYmUgbWl0aWdhdGVkIGF0IHJ1bnRpbWUg
KGkuZSBgc3NiZD1ydW50aW1lYCkuCiAjIyMgc3BlYy1jdHJsICh4ODYpCiA+
IGA9IExpc3Qgb2YgWyA8Ym9vbD4sIHhlbj08Ym9vbD4sIHtwdixodm0sbXNy
LXNjLHJzYixtZC1jbGVhcn09PGJvb2w+LAogPiAgICAgICAgICAgICAgYnRp
LXRodW5rPXJldHBvbGluZXxsZmVuY2V8am1wLCB7aWJycyxpYnBiLHNzYmQs
ZWFnZXItZnB1LAotPiAgICAgICAgICAgICAgbDFkLWZsdXNoLGJyYW5jaC1o
YXJkZW59PTxib29sPiBdYAorPiAgICAgICAgICAgICAgbDFkLWZsdXNoLGJy
YW5jaC1oYXJkZW4sc3JiLWxvY2t9PTxib29sPiBdYAogCiBDb250cm9scyBm
b3Igc3BlY3VsYXRpdmUgZXhlY3V0aW9uIHNpZGVjaGFubmVsIG1pdGlnYXRp
b25zLiAgQnkgZGVmYXVsdCwgWGVuCiB3aWxsIHBpY2sgdGhlIG1vc3QgYXBw
cm9wcmlhdGUgbWl0aWdhdGlvbnMgYmFzZWQgb24gY29tcGlsZWQgaW4gc3Vw
cG9ydCwKQEAgLTIwNjgsNiArMjA2OCwxMiBAQCBJZiBYZW4gaXMgY29tcGls
ZWQgd2l0aCBgQ09ORklHX1NQRUNVTEFUSVZFX0hBUkRFTl9CUkFOQ0hgLCB0
aGUKIHNwZWN1bGF0aW9uIGJhcnJpZXJzIHRvIHByb3RlY3Qgc2VsZWN0ZWQg
Y29uZGl0aW9uYWwgYnJhbmNoZXMuICBCeSBkZWZhdWx0LAogWGVuIHdpbGwg
ZW5hYmxlIHRoaXMgbWl0aWdhdGlvbi4KIAorT24gaGFyZHdhcmUgc3VwcG9y
dGluZyBTUkJEU19DVFJMLCB0aGUgYHNyYi1sb2NrPWAgb3B0aW9uIGNhbiBi
ZSB1c2VkIHRvIGZvcmNlCitvciBwcmV2ZW50IFhlbiBmcm9tIHByb3RlY3Qg
dGhlIFNwZWNpYWwgUmVnaXN0ZXIgQnVmZmVyIGZyb20gbGVha2luZyBzdGFs
ZQorZGF0YS4gQnkgZGVmYXVsdCwgWGVuIHdpbGwgZW5hYmxlIHRoaXMgbWl0
aWdhdGlvbiwgZXhjZXB0IG9uIHBhcnRzIHdoZXJlIE1EUworaXMgZml4ZWQg
YW5kIFRBQSBpcyBmaXhlZC9taXRpZ2F0ZWQgKGluIHdoaWNoIGNhc2UsIHRo
ZXJlIGlzIGJlbGlldmVkIHRvIGJlIG5vCit3YXkgZm9yIGFuIGF0dGFja2Vy
IHRvIG9idGFpbiB0aGUgc3RhbGUgZGF0YSkuCisKICMjIyBzeW5jX2NvbnNv
bGUKID4gYD0gPGJvb2xlYW4+YAogCmRpZmYgLS1naXQgYS94ZW4vYXJjaC94
ODYvYWNwaS9wb3dlci5jIGIveGVuL2FyY2gveDg2L2FjcGkvcG93ZXIuYwpp
bmRleCBmZWIwZjZjZTIwLi43NWM2ZTM0MTY0IDEwMDY0NAotLS0gYS94ZW4v
YXJjaC94ODYvYWNwaS9wb3dlci5jCisrKyBiL3hlbi9hcmNoL3g4Ni9hY3Bp
L3Bvd2VyLmMKQEAgLTI5NSw2ICsyOTUsOSBAQCBzdGF0aWMgaW50IGVudGVy
X3N0YXRlKHUzMiBzdGF0ZSkKICAgICBjaS0+c3BlY19jdHJsX2ZsYWdzIHw9
IChkZWZhdWx0X3NwZWNfY3RybF9mbGFncyAmIFNDRl9pc3Rfd3Jtc3IpOwog
ICAgIHNwZWNfY3RybF9leGl0X2lkbGUoY2kpOwogCisgICAgaWYgKCBib290
X2NwdV9oYXMoWDg2X0ZFQVRVUkVfU1JCRFNfQ1RSTCkgKQorICAgICAgICB3
cm1zcmwoTVNSX01DVV9PUFRfQ1RSTCwgZGVmYXVsdF94ZW5fbWN1X29wdF9j
dHJsKTsKKwogIGRvbmU6CiAgICAgc3Bpbl9kZWJ1Z19lbmFibGUoKTsKICAg
ICBsb2NhbF9pcnFfcmVzdG9yZShmbGFncyk7CmRpZmYgLS1naXQgYS94ZW4v
YXJjaC94ODYvc21wYm9vdC5jIGIveGVuL2FyY2gveDg2L3NtcGJvb3QuYwpp
bmRleCBkYzhmZGFjMWExLi5iMWU1MWIzYWZmIDEwMDY0NAotLS0gYS94ZW4v
YXJjaC94ODYvc21wYm9vdC5jCisrKyBiL3hlbi9hcmNoL3g4Ni9zbXBib290
LmMKQEAgLTM2MSwxMiArMzYxLDE0IEBAIHZvaWQgc3RhcnRfc2Vjb25kYXJ5
KHZvaWQgKnVudXNlZCkKICAgICBtaWNyb2NvZGVfdXBkYXRlX29uZShmYWxz
ZSk7CiAKICAgICAvKgotICAgICAqIElmIE1TUl9TUEVDX0NUUkwgaXMgYXZh
aWxhYmxlLCBhcHBseSBYZW4ncyBkZWZhdWx0IHNldHRpbmcgYW5kIGRpc2Nh
cmQKLSAgICAgKiBhbnkgZmlybXdhcmUgc2V0dGluZ3MuICBOb3RlOiBNU1Jf
U1BFQ19DVFJMIG1heSBvbmx5IGJlY29tZSBhdmFpbGFibGUKLSAgICAgKiBh
ZnRlciBsb2FkaW5nIG1pY3JvY29kZS4KKyAgICAgKiBJZiBhbnkgc3BlY3Vs
YXRpdmUgY29udHJvbCBNU1JzIGFyZSBhdmFpbGFibGUsIGFwcGx5IFhlbidz
IGRlZmF1bHQKKyAgICAgKiBzZXR0aW5ncy4gIE5vdGU6IFRoZXNlIE1TUnMg
bWF5IG9ubHkgYmVjb21lIGF2YWlsYWJsZSBhZnRlciBsb2FkaW5nCisgICAg
ICogbWljcm9jb2RlLgogICAgICAqLwogICAgIGlmICggYm9vdF9jcHVfaGFz
KFg4Nl9GRUFUVVJFX0lCUlNCKSApCiAgICAgICAgIHdybXNybChNU1JfU1BF
Q19DVFJMLCBkZWZhdWx0X3hlbl9zcGVjX2N0cmwpOworICAgIGlmICggYm9v
dF9jcHVfaGFzKFg4Nl9GRUFUVVJFX1NSQkRTX0NUUkwpICkKKyAgICAgICAg
d3Jtc3JsKE1TUl9NQ1VfT1BUX0NUUkwsIGRlZmF1bHRfeGVuX21jdV9vcHRf
Y3RybCk7CiAKICAgICB0c3hfaW5pdCgpOyAvKiBOZWVkcyBtaWNyb2NvZGUu
ICBNYXkgY2hhbmdlIEhMRS9SVE0gZmVhdHVyZSBiaXRzLiAqLwogCmRpZmYg
LS1naXQgYS94ZW4vYXJjaC94ODYvc3BlY19jdHJsLmMgYi94ZW4vYXJjaC94
ODYvc3BlY19jdHJsLmMKaW5kZXggNWZjMWM2ODI3ZS4uMzMzNDMwNjJhNyAx
MDA2NDQKLS0tIGEveGVuL2FyY2gveDg2L3NwZWNfY3RybC5jCisrKyBiL3hl
bi9hcmNoL3g4Ni9zcGVjX2N0cmwuYwpAQCAtNjUsNiArNjUsOSBAQCBzdGF0
aWMgdW5zaWduZWQgaW50IF9faW5pdGRhdGEgbDFkX21heHBoeXNhZGRyOwog
c3RhdGljIGJvb2wgX19pbml0ZGF0YSBjcHVfaGFzX2J1Z19tc2Jkc19vbmx5
OyAvKiA9PiBtaW5pbWFsIEhUIGltcGFjdC4gKi8KIHN0YXRpYyBib29sIF9f
aW5pdGRhdGEgY3B1X2hhc19idWdfbWRzOyAvKiBBbnkgb3RoZXIgTXtMUCxT
QixGQn1EUyBjb21iaW5hdGlvbi4gKi8KIAorc3RhdGljIGludDhfdCBfX2lu
aXRkYXRhIG9wdF9zcmJfbG9jayA9IC0xOwordWludDY0X3QgX19yZWFkX21v
c3RseSBkZWZhdWx0X3hlbl9tY3Vfb3B0X2N0cmw7CisKIHN0YXRpYyBpbnQg
X19pbml0IHBhcnNlX3NwZWNfY3RybChjb25zdCBjaGFyICpzKQogewogICAg
IGNvbnN0IGNoYXIgKnNzOwpAQCAtMTEyLDYgKzExNSw3IEBAIHN0YXRpYyBp
bnQgX19pbml0IHBhcnNlX3NwZWNfY3RybChjb25zdCBjaGFyICpzKQogICAg
ICAgICAgICAgb3B0X3NzYmQgPSBmYWxzZTsKICAgICAgICAgICAgIG9wdF9s
MWRfZmx1c2ggPSAwOwogICAgICAgICAgICAgb3B0X2JyYW5jaF9oYXJkZW4g
PSBmYWxzZTsKKyAgICAgICAgICAgIG9wdF9zcmJfbG9jayA9IDA7CiAgICAg
ICAgIH0KICAgICAgICAgZWxzZSBpZiAoIHZhbCA+IDAgKQogICAgICAgICAg
ICAgcmMgPSAtRUlOVkFMOwpAQCAtMTc4LDYgKzE4Miw4IEBAIHN0YXRpYyBp
bnQgX19pbml0IHBhcnNlX3NwZWNfY3RybChjb25zdCBjaGFyICpzKQogICAg
ICAgICAgICAgb3B0X2wxZF9mbHVzaCA9IHZhbDsKICAgICAgICAgZWxzZSBp
ZiAoICh2YWwgPSBwYXJzZV9ib29sZWFuKCJicmFuY2gtaGFyZGVuIiwgcywg
c3MpKSA+PSAwICkKICAgICAgICAgICAgIG9wdF9icmFuY2hfaGFyZGVuID0g
dmFsOworICAgICAgICBlbHNlIGlmICggKHZhbCA9IHBhcnNlX2Jvb2xlYW4o
InNyYi1sb2NrIiwgcywgc3MpKSA+PSAwICkKKyAgICAgICAgICAgIG9wdF9z
cmJfbG9jayA9IHZhbDsKICAgICAgICAgZWxzZQogICAgICAgICAgICAgcmMg
PSAtRUlOVkFMOwogCkBAIC0zNDEsNyArMzQ3LDcgQEAgc3RhdGljIHZvaWQg
X19pbml0IHByaW50X2RldGFpbHMoZW51bSBpbmRfdGh1bmsgdGh1bmssIHVp
bnQ2NF90IGNhcHMpCiAgICAgICAgICAgICAgICAiXG4iKTsKIAogICAgIC8q
IFNldHRpbmdzIGZvciBYZW4ncyBwcm90ZWN0aW9uLCBpcnJlc3BlY3RpdmUg
b2YgZ3Vlc3RzLiAqLwotICAgIHByaW50aygiICBYZW4gc2V0dGluZ3M6IEJU
SS1UaHVuayAlcywgU1BFQ19DVFJMOiAlcyVzJXMsIE90aGVyOiVzJXMlcyVz
XG4iLAorICAgIHByaW50aygiICBYZW4gc2V0dGluZ3M6IEJUSS1UaHVuayAl
cywgU1BFQ19DVFJMOiAlcyVzJXMsIE90aGVyOiVzJXMlcyVzJXNcbiIsCiAg
ICAgICAgICAgIHRodW5rID09IFRIVU5LX05PTkUgICAgICA/ICJOL0EiIDoK
ICAgICAgICAgICAgdGh1bmsgPT0gVEhVTktfUkVUUE9MSU5FID8gIlJFVFBP
TElORSIgOgogICAgICAgICAgICB0aHVuayA9PSBUSFVOS19MRkVOQ0UgICAg
PyAiTEZFTkNFIiA6CkBAIC0zNTIsNiArMzU4LDggQEAgc3RhdGljIHZvaWQg
X19pbml0IHByaW50X2RldGFpbHMoZW51bSBpbmRfdGh1bmsgdGh1bmssIHVp
bnQ2NF90IGNhcHMpCiAgICAgICAgICAgIChkZWZhdWx0X3hlbl9zcGVjX2N0
cmwgJiBTUEVDX0NUUkxfU1NCRCkgID8gIiBTU0JEKyIgOiAiIFNTQkQtIiwK
ICAgICAgICAgICAgIShjYXBzICYgQVJDSF9DQVBTX1RTWF9DVFJMKSAgICAg
ICAgICAgICAgPyAiIiA6CiAgICAgICAgICAgIChvcHRfdHN4ICYgMSkgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgID8gIiBUU1grIiA6ICIgVFNYLSIs
CisgICAgICAgICAgICFib290X2NwdV9oYXMoWDg2X0ZFQVRVUkVfU1JCRFNf
Q1RSTCkgICAgID8gIiIgOgorICAgICAgICAgICBvcHRfc3JiX2xvY2sgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICA/ICIgU1JCX0xPQ0srIiA6ICIg
U1JCX0xPQ0stIiwKICAgICAgICAgICAgb3B0X2licGIgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgPyAiIElCUEIiICA6ICIiLAogICAgICAg
ICAgICBvcHRfbDFkX2ZsdXNoICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICA/ICIgTDFEX0ZMVVNIIiA6ICIiLAogICAgICAgICAgICBvcHRfbWRfY2xl
YXJfcHYgfHwgb3B0X21kX2NsZWFyX2h2bSAgICAgICA/ICIgVkVSVyIgIDog
IiIsCkBAIC0xMTQ5LDYgKzExNTcsMzQgQEAgdm9pZCBfX2luaXQgaW5pdF9z
cGVjdWxhdGlvbl9taXRpZ2F0aW9ucyh2b2lkKQogICAgICAgICB0c3hfaW5p
dCgpOwogICAgIH0KIAorICAgIC8qIENhbGN1bGF0ZSBzdWl0YWJsZSBkZWZh
dWx0cyBmb3IgTVNSX01DVV9PUFRfQ1RSTCAqLworICAgIGlmICggYm9vdF9j
cHVfaGFzKFg4Nl9GRUFUVVJFX1NSQkRTX0NUUkwpICkKKyAgICB7CisgICAg
ICAgIHVpbnQ2NF90IHZhbDsKKworICAgICAgICByZG1zcmwoTVNSX01DVV9P
UFRfQ1RSTCwgdmFsKTsKKworICAgICAgICAvKgorICAgICAgICAgKiBPbiBz
b21lIFNSQkRTLWFmZmVjdGVkIGhhcmR3YXJlLCBpdCBtYXkgYmUgc2FmZSB0
byByZWxheCBzcmItbG9jaworICAgICAgICAgKiBieSBkZWZhdWx0LgorICAg
ICAgICAgKgorICAgICAgICAgKiBPbiBwYXJ0cyB3aGljaCBlbnVtZXJhdGUg
TURTX05PIGFuZCBub3QgVEFBX05PLCBUU1ggaXMgdGhlIG9ubHkgd2F5Cisg
ICAgICAgICAqIHRvIGFjY2VzcyB0aGUgRmlsbCBCdWZmZXIuICBJZiBUU1gg
aXNuJ3QgYXZhaWxhYmxlIChpbmMuIFNLVQorICAgICAgICAgKiByZWFzb25z
IG9uIHNvbWUgbW9kZWxzKSwgb3IgVFNYIGlzIGV4cGxpY2l0bHkgZGlzYWJs
ZWQsIHRoZW4gdGhlcmUKKyAgICAgICAgICogaXMgbm8gbmVlZCBmb3IgdGhl
IGV4dHJhIG92ZXJoZWFkIHRvIHByb3RlY3QgUkRSQU5EL1JEU0VFRC4KKyAg
ICAgICAgICovCisgICAgICAgIGlmICggb3B0X3NyYl9sb2NrID09IC0xICYm
CisgICAgICAgICAgICAgKGNhcHMgJiAoQVJDSF9DQVBTX01EU19OT3xBUkNI
X0NBUFNfVEFBX05PKSkgPT0gQVJDSF9DQVBTX01EU19OTyAmJgorICAgICAg
ICAgICAgICghY3B1X2hhc19obGUgfHwgKChjYXBzICYgQVJDSF9DQVBTX1RT
WF9DVFJMKSAmJiBvcHRfdHN4ID09IDApKSApCisgICAgICAgICAgICBvcHRf
c3JiX2xvY2sgPSAwOworCisgICAgICAgIHZhbCAmPSB+TUNVX09QVF9DVFJM
X1JOR0RTX01JVEdfRElTOworICAgICAgICBpZiAoICFvcHRfc3JiX2xvY2sg
KQorICAgICAgICAgICAgdmFsIHw9IE1DVV9PUFRfQ1RSTF9STkdEU19NSVRH
X0RJUzsKKworICAgICAgICBkZWZhdWx0X3hlbl9tY3Vfb3B0X2N0cmwgPSB2
YWw7CisgICAgfQorCiAgICAgcHJpbnRfZGV0YWlscyh0aHVuaywgY2Fwcyk7
CiAKICAgICAvKgpAQCAtMTE4MCw2ICsxMjE2LDkgQEAgdm9pZCBfX2luaXQg
aW5pdF9zcGVjdWxhdGlvbl9taXRpZ2F0aW9ucyh2b2lkKQogCiAgICAgICAg
IHdybXNybChNU1JfU1BFQ19DVFJMLCBic3BfZGVsYXlfc3BlY19jdHJsID8g
MCA6IGRlZmF1bHRfeGVuX3NwZWNfY3RybCk7CiAgICAgfQorCisgICAgaWYg
KCBib290X2NwdV9oYXMoWDg2X0ZFQVRVUkVfU1JCRFNfQ1RSTCkgKQorICAg
ICAgICB3cm1zcmwoTVNSX01DVV9PUFRfQ1RSTCwgZGVmYXVsdF94ZW5fbWN1
X29wdF9jdHJsKTsKIH0KIAogc3RhdGljIHZvaWQgX19pbml0IF9fbWF5YmVf
dW51c2VkIGJ1aWxkX2Fzc2VydGlvbnModm9pZCkKZGlmZiAtLWdpdCBhL3hl
bi9pbmNsdWRlL2FzbS14ODYvc3BlY19jdHJsLmggYi94ZW4vaW5jbHVkZS9h
c20teDg2L3NwZWNfY3RybC5oCmluZGV4IDljYWVjZGRmZWMuLmIyNTJiYjg2
MzEgMTAwNjQ0Ci0tLSBhL3hlbi9pbmNsdWRlL2FzbS14ODYvc3BlY19jdHJs
LmgKKysrIGIveGVuL2luY2x1ZGUvYXNtLXg4Ni9zcGVjX2N0cmwuaApAQCAt
NTQsNiArNTQsOCBAQCBleHRlcm4gaW50OF90IG9wdF9wdl9sMXRmX2h3ZG9t
LCBvcHRfcHZfbDF0Zl9kb211OwogICovCiBleHRlcm4gcGFkZHJfdCBsMXRm
X2FkZHJfbWFzaywgbDF0Zl9zYWZlX21hZGRyOwogCitleHRlcm4gdWludDY0
X3QgZGVmYXVsdF94ZW5fbWN1X29wdF9jdHJsOworCiBzdGF0aWMgaW5saW5l
IHZvaWQgaW5pdF9zaGFkb3dfc3BlY19jdHJsX3N0YXRlKHZvaWQpCiB7CiAg
ICAgc3RydWN0IGNwdV9pbmZvICppbmZvID0gZ2V0X2NwdV9pbmZvKCk7Cg==

--=separator--


From xen-users-bounces@lists.xenproject.org Wed Jun 10 01:02:51 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2020 01:02:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jip7b-000388-BI; Wed, 10 Jun 2020 01:01:39 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=0RvZ=7X=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1jip7a-0002lv-Hv
 for xen-users@lists.xenproject.org; Wed, 10 Jun 2020 01:01:38 +0000
X-Inumbo-ID: ef9ece6a-aab5-11ea-b39d-12813bfff9fa
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id ef9ece6a-aab5-11ea-b39d-12813bfff9fa;
 Wed, 10 Jun 2020 01:01:37 +0000 (UTC)
Received: from localhost (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256
 bits)) (No client certificate requested)
 by mail.kernel.org (Postfix) with ESMTPSA id BF5F8206C3;
 Wed, 10 Jun 2020 01:01:36 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
 s=default; t=1591750897;
 bh=Kynk97TfFyO5nK1WtjKxcXUCbKDUsrKpUx9gqnJdY4I=;
 h=Date:From:To:cc:Subject:In-Reply-To:References:From;
 b=ki18L2uCpD02D6A59ExGC94b+BzOMxhFyde84TFEdgopaqtgaJ1c1VcestXMGL6bA
 2PRZpuyOxlHVqejuO1AzxtOzAcRNYrLY1geM+qYUcPPgRMy84NkpRBxELWGpWmLwWg
 wZL84FwhgsAMmVD0k+RqZ/8stu1NTGVLiwYv5zrc=
Date: Tue, 9 Jun 2020 18:01:36 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s
To: Sara Alonso <alonsosara44@gmail.com>
Subject: Re: help
In-Reply-To: <CACD6wFND8w9PHM9JUV5rgfDyh__A7Q2D0am9O8MBiuwxL0WTWg@mail.gmail.com>
Message-ID: <alpine.DEB.2.21.2006091754290.2815@sstabellini-ThinkPad-T480s>
References: <CACD6wFNUVcz_0Q=2Ci4FSzMRaVRY+1vd8ZqnktJga=NyRSZUXg@mail.gmail.com>
 <51afec92-8417-d932-411e-f1a83c9eec84@xen.org>
 <alpine.DEB.2.21.2006081015560.2815@sstabellini-ThinkPad-T480s>
 <CACD6wFND8w9PHM9JUV5rgfDyh__A7Q2D0am9O8MBiuwxL0WTWg@mail.gmail.com>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="8323329-517906257-1591750896=:2815"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-517906257-1591750896=:2815
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8BIT

Looking at your DomU configuration (dom1.cfg), you are missing the
following line which is necessary for a correct SMMU setup:

dtdev = [ "/amba/ethernet@ff0e0000" ]

See the following docs with longer explanations:


https://xenbits.xenproject.org/docs/unstable/misc/arm/passthrough.txt

https://xilinx-wiki.atlassian.net/wiki/spaces/XWUC/pages/384663561/Building+Xen+Hypervisor+with+Petalinux+2020.1#BuildingXenHypervisorwithPetalinux2020.1-StartingLinuxguestswithPass-throughnetworking



On Tue, 9 Jun 2020, Sara Alonso wrote:
> Hi,
> 
> I attach to this email all the files I use for booting xen and dom1, and the xen.dtsi. The version of Xen I use is 4.11.1 and the version
> of SDK I use is 2019.1. I don't get any warnings in Xen console.
> But when I create the SDK lwip application I get two error messages: "region 'psu_ddr_0_MEM_0' overflowed by 34623488 bytes" and
> "client.elf section '.bss' will not fit in region 'psu_ddr_0_MEM_0'". I solve these errors by resizing the 'psu_ddr_0_MEM_0' in lscript.ld
> to 35MB. I don't know if this has something to do with my problem.
> Then I don't get any message in Xen console when I boot domU.
> Thank you,
> Sara
> 
> [icon_10_generic_list.png]  XEN.zip[x_8px.png]
> 
> El lun., 8 jun. 2020 a las 19:23, Stefano Stabellini (<sstabellini@kernel.org>) escribió:
>       On Sat, 6 Jun 2020, Julien Grall wrote:
>       > On 05/06/2020 07:54, Sara Alonso wrote:
>       > > Hi,
>       >
>       > Hello,
>       >
>       > Adding Stefano as this looks like a Xilinx SDK issue rather than a Xen itself.
>       >
>       > Cheers,
>       >
>       > > I am a student and I am using Xen for my master thesis. I am trying to boot
>       > > a standalone server TCP guest in Xen DomU on a ZCU102 board. First, I build
>       > > a petalinux project (in xen.dtsi I have added some lines for passthroughing
>       > > the uart1 and the gem3). Next, I create a standalone application in SDK,
>       > > selecting "Hypervisor Guest: Yes" and using lwIP TCP Perf Server template. I
>       > > selected uart1 for output in bsp settings. When I build the project
>       > > server.bin file is created. I also create a config file (attached). I copy
>       > > the files for booting Dom0, server.bin and dom1.cfg file in the FAT
>       > > partition of the SD card. Then I boot Dom0 without any problem. I createdom1
>       > > with xl createdom1.cfg. The domain is created without any error. When I do
>       > > xl list, it says that dom1 is running, but anything appears in uart1 and I
>       > > cannot connect the client, so I think the application is not running
>       > > correctly. I don't have this problem when I boot a hello world application
>       > > in domU, it appears the message in uart1.
>       > >
>       > > I think I am missing some step. Could you help me to solve this
>       > > issue, please?
> 
>       Hi Sara,
> 
>       Let me ask you a bunch of questions to make sure I understand your setup
>       correctly.
> 
>       Could you please send me the host device tree that you are using
>       (i.e. xen.dtb), the VM config file for the DomU (createdom1.cfg) and the
>       partial device tree for the Domu? (I can't access the files you attached
>       to your original email.)
> 
>       Also, what version of Xilinx Xen are you using?
> 
> 
>       For your information, I know of a potential issue with the LWIP
>       baremetal app on Xen. It manifests with warning messages like the
>       following on the Xen console:
> 
>         No access to MMIO read ff5e005c, which is gem3's REF CTRL register address
> 
>       Have you seen anything like it by any chance? If so, I know the solution
>       to the problem.
> 
> 
> 
--8323329-517906257-1591750896=:2815--


From xen-users-bounces@lists.xenproject.org Wed Jun 10 06:22:34 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2020 06:22:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jiu6T-000431-J9; Wed, 10 Jun 2020 06:20:49 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=azNj=7X=gmail.com=ashish.emailaddress@srs-us1.protection.inumbo.net>)
 id 1jiu6S-00042w-3g
 for xen-users@lists.xenproject.org; Wed, 10 Jun 2020 06:20:48 +0000
X-Inumbo-ID: 85e565ec-aae2-11ea-bb8b-bc764e2007e4
Received: from mail-qt1-x833.google.com (unknown [2607:f8b0:4864:20::833])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 85e565ec-aae2-11ea-bb8b-bc764e2007e4;
 Wed, 10 Jun 2020 06:20:47 +0000 (UTC)
Received: by mail-qt1-x833.google.com with SMTP id g62so909625qtd.5
 for <xen-users@lists.xenproject.org>; Tue, 09 Jun 2020 23:20:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=4M/nxAl6yOAtU3KDCWpq5Atrg1Io3kxD2wV/QIWXr4U=;
 b=rU804WirxRTweXb8YhswcP6/5DDS6FQMTg2pXWujc0so6dymZBk91h/1slzisDxj3f
 FfJPcxzd1dUkyqQSA7uQw9Un9PcAZfdIzu/4sEYsUmoMgawsDbfl78lzeg4LqHGyybCa
 VpY14FRzbLQxn43ZGTt43UYBqcTQRSiE6sLu5XF7wd0kyF5wj6xbr6k1pAxuNc6bWZAi
 4m6ocMVSJ/Jh05rxN6AncaWRSMAhRnljLo4mVj7LxPmlUkx2kPQ0dC5fF2frWeEWtNUl
 tr7KtNf8sJvMnrLSZt1rsxI9ffihUZUEVdmsYDOe/TafYK4Fj6hLzJVhhgI22SGR6qvH
 /YWA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=4M/nxAl6yOAtU3KDCWpq5Atrg1Io3kxD2wV/QIWXr4U=;
 b=hJc6bpq8CZdXS3IhOFmpfbcDiZ+nCZql9Hkr0XWouvALmN6QkP6NuN2H1X7kzWhP+d
 InAbUpbfVrAaQ9Rm0oOnHwoHh1CmsPhs5p0pHi1vlLwFPewUxJQeGlZ0JkxQVJbttROd
 sYEGQBucCQcF97qrQdztHr3dzJbnSiMAPTOf73K4rRn2soGjE2WOm3maVGBiOofCQjgI
 MojKc6ysPcUEnTxysqE2oJslYvO6iux873HxJbxJu6WE60I68P6qts72jOrT+CSmK2xC
 9b2rggPvonUwonyHNbSi9GaeTV+NU/29X/yfGgX4GY6Wd7AFuNuEFKY+ADQdEILIvwM9
 UyvA==
X-Gm-Message-State: AOAM532bI4/ywSu+dqH8e69V7mv+fRHg8rV8+okI7/rXELy9UHvjSwvz
 o3AHwGXioszmSBEerZPH1nEgWXKpr8cas6A60oK3OQ==
X-Google-Smtp-Source: ABdhPJw2edjpjo+0ZHz0fHKAozZ3jhaozP3661e3qloqrQ+jOrjT6Fmscc6mzV3/OtaIAirTatvCLyMwB3aDyXsC1H4=
X-Received: by 2002:ac8:4f46:: with SMTP id i6mr1562923qtw.317.1591770046867; 
 Tue, 09 Jun 2020 23:20:46 -0700 (PDT)
MIME-Version: 1.0
From: AshishKumar Mishra <ashish.emailaddress@gmail.com>
Date: Wed, 10 Jun 2020 11:50:35 +0530
Message-ID: <CAOe0dAWnpX92j-T68KfcdNtfUYKXuwT6r2oB1DegxoCgDpOLNA@mail.gmail.com>
Subject: Input to start porting OS to XEN
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000352e1605a7b4d812"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000352e1605a7b4d812
Content-Type: text/plain; charset="UTF-8"

Hi All ,

I am starting with virtualization / hypervisor for the for first time &
hence apologize if this is not the correct place to start .

1) Can team please provide any pointer for the steps
     to port / run an rtos (Zephyr ) on xen.


2) Or if team can point share feedback w.r.t complexity & rough time for
this ?
I am evaluating zephyr on XEN  (as i come from linux driver development
background , i thought zephyr will be better )


3) Currently based on my Little understanding i was evaluating HVM ( as it
can provide QEMU emulation for hardware   )


Thanks
Ashish.

--000000000000352e1605a7b4d812
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Hi All ,<div dir=3D"auto"><br></div><div dir=3D"auto">I a=
m starting with virtualization / hypervisor for the for first time &amp; he=
nce apologize if this is not the correct place to start=C2=A0.</div><div di=
r=3D"auto"><br></div><div dir=3D"auto">1) Can team please provide any point=
er for the steps=C2=A0</div><div dir=3D"auto">=C2=A0 =C2=A0 =C2=A0to port /=
 run an rtos (Zephyr ) on xen.</div><div dir=3D"auto"><br></div><div dir=3D=
"auto"><br></div><div dir=3D"auto">2) Or if team can point share feedback w=
.r.t complexity &amp; rough time for this ?</div><div dir=3D"auto">I am eva=
luating zephyr on XEN=C2=A0 (as i come from linux driver development backgr=
ound , i thought zephyr will be better )</div><div dir=3D"auto"><br></div><=
div dir=3D"auto"><br></div><div dir=3D"auto">3) Currently based on my Littl=
e understanding i was evaluating HVM ( as it can provide QEMU emulation for=
 hardware=C2=A0 =C2=A0)</div><div dir=3D"auto"><br></div><div dir=3D"auto">=
<br></div><div dir=3D"auto">Thanks=C2=A0</div><div dir=3D"auto">Ashish.</di=
v><div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><div dir=3D"auto"=
><br></div><div dir=3D"auto"><br></div></div>

--000000000000352e1605a7b4d812--


From xen-users-bounces@lists.xenproject.org Wed Jun 10 16:41:34 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2020 16:41:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jj3m8-0001eg-Ou; Wed, 10 Jun 2020 16:40:28 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=iFSh=7V=gmail.com=tamas.k.lengyel@srs-us1.protection.inumbo.net>)
 id 1jiNzB-0004QP-Ob
 for xen-users@lists.xenproject.org; Mon, 08 Jun 2020 20:03:09 +0000
X-Inumbo-ID: 1266dad0-a9c3-11ea-bb8b-bc764e2007e4
Received: from mail-wr1-x442.google.com (unknown [2a00:1450:4864:20::442])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1266dad0-a9c3-11ea-bb8b-bc764e2007e4;
 Mon, 08 Jun 2020 20:03:08 +0000 (UTC)
Received: by mail-wr1-x442.google.com with SMTP id l11so18838084wru.0;
 Mon, 08 Jun 2020 13:03:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=v5NHBLFIrvrnQIUGtRyTRxnMHCx8z8QMwiCN/AFz6Lk=;
 b=P0Dgxi+IsDRGO+Bk3lyRDQgRKlZp+Ci9Pk6gL3G5cwt53aEKy723gSSrVrEwCk/X2X
 FAKbF2EZKYpmI6KLabj8CLrpFraCuLEHxjsZiDiozTniNWHZSpV/IisJcPc5OBlGNbqZ
 YskelP4i5A5wJuI5tJBe+4ZtPfCB1+MPUwU9sR5XMD+LyoymmFHBqPlgN/59KfRhEtvm
 WOdPrOTgAzEcd/gmrl89wVBozhR6+T5k6yv/2z1SWq95nxq5LHHnR0fL/438q+O/O35s
 4bsmMc//JR1VioXooxoKgDNMnDCVa0eZcVBG1OV8jrfb8dIl1g674CT0wf9uQWgTvzQT
 oZrQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=v5NHBLFIrvrnQIUGtRyTRxnMHCx8z8QMwiCN/AFz6Lk=;
 b=e/Hy8QSV/A6z/cyo2cSDMNfTqun7oNG8q/Yk+R08E3l5Bug0A8XmfHLcUaQx3upX2J
 2dYdSpFoozSWpxg6xlldeojhoYSZTWuhhJlux50UW/d0xD0N5rzmowpLw4MvchuuEKy3
 WdNlbjfkEfXWklidETgGOWP8nmNruiqnalnmMhfWXb4Fwo0uPRC1a8IhNhu8u8JbTx+1
 rKjxAiVJXiGDM5YDt4/HVC+zT6EQb4EZfvmKVZkOi9A6SdlwFdrk85B7rEGX5HCd27YD
 zQ8eFD/kEBzoNc6MNm54QJk0E9DDA1KjFAoXuLvPpAuoSuaQKu+ZaSbNGvp2Cwu02zmh
 5FYA==
X-Gm-Message-State: AOAM531Ln2kwW/XFgmRZr3ShM0uI56BfGPSJkTgnp6fvZ8CGf3ur4g6I
 3kdgbXAXAfwJ0lsLRBnGvWsMHzgyHtV0uZhp+7b6LqIvDLk=
X-Google-Smtp-Source: ABdhPJz0bwLjqoGXcyBts+PvnSrh0xcHjW2k0+BL1aQesxbAtiVzH6jUXYxAXq5daPk6KAS3uFOizs4nSPd45UOx93U=
X-Received: by 2002:a5d:490f:: with SMTP id x15mr429300wrq.259.1591646587271; 
 Mon, 08 Jun 2020 13:03:07 -0700 (PDT)
MIME-Version: 1.0
References: <20200608163934.313-1-paul@xen.org>
In-Reply-To: <20200608163934.313-1-paul@xen.org>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Mon, 8 Jun 2020 14:02:31 -0600
Message-ID: <CABfawhn3HJCHonYKnMFPgUEN125SDBSXKcMFMWd2hG5SGKF8YQ@mail.gmail.com>
Subject: Re: Xen 4.14 RC1
To: Xen-devel <xen-devel@lists.xenproject.org>, Paul Durrant <paul@xen.org>
Content-Type: text/plain; charset="UTF-8"
X-Mailman-Approved-At: Wed, 10 Jun 2020 16:40:27 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-announce@lists.xenproject.org, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On Mon, Jun 8, 2020 at 10:41 AM Paul Durrant <paul@xen.org> wrote:
>
> Hi all,
>
> Xen 4.14 RC1 is tagged. You can check that out from xen.git:
>
> git://xenbits.xen.org/xen.git 4.14.0-rc1
>
> For your convenience there is also a tarball at:
> https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz
>
> And the signature is at:
> https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz.sig
>
> Please send bug reports and test reports to xen-devel@lists.xenproject.org.
> When sending bug reports, please CC relevant maintainers and me (paul@xen.org).
>
> As a reminder, there will be a Xen Test Day. Please see the test day schedule at
> https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
> https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.

Hi Paul,
I'm sad to see this RC1 still missing patch:

https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00179.html

The following even have the release-ack and yet are also missing:

https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00025.html
https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00028.html

Without these patches I won't be testing or upgrading to 4.14 at all.

Thanks,
Tamas


From xen-users-bounces@lists.xenproject.org Wed Jun 10 16:41:34 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2020 16:41:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jj3m9-0001en-4l; Wed, 10 Jun 2020 16:40:29 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kazQ=7W=gmail.com=xadimgnik@srs-us1.protection.inumbo.net>)
 id 1jiYUC-0005cD-Lc
 for xen-users@lists.xenproject.org; Tue, 09 Jun 2020 07:15:52 +0000
X-Inumbo-ID: 06aab8ac-aa21-11ea-b7bb-bc764e2007e4
Received: from mail-ej1-x630.google.com (unknown [2a00:1450:4864:20::630])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 06aab8ac-aa21-11ea-b7bb-bc764e2007e4;
 Tue, 09 Jun 2020 07:15:41 +0000 (UTC)
Received: by mail-ej1-x630.google.com with SMTP id l12so17354323ejn.10;
 Tue, 09 Jun 2020 00:15:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:reply-to:to:cc:references:in-reply-to:subject:date:message-id
 :mime-version:content-transfer-encoding:content-language
 :thread-index; bh=dR6VSL8FsoZcxWeIb/mhcOUcIF57a7JLajWczF+lmWw=;
 b=KMvNC5ljqgyLcJ02sqtJZ7QOYqZ2n8sq4ZgeeRqoPyhuQjlwgsVePgfB9/uipY43T+
 AXVDYcNzo5b97qrLh3SqWfRbJ7IHB14QAwe0CzJd6YI91anx2wRFuYHdZ7Jsp/lX88tv
 rdlLLLXNMWAgeCevmCZnX3ATfIYiNnHv+NYAg2C2aEaCKGmurSWlnxXIMQxInoIH3FpS
 yvAmG+8JFvk6fL0eF6agVtbmzHCbw7JpcGufXSqH8SJHzGdW2ZhP24pO4fidFUyVr7ei
 wmy9j1EQK9be4aott3bTzPzVkFriV/g7gx8ybVON4/HoZqSCSa8OQtV1zD24mySq084O
 +a3g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:reply-to:to:cc:references:in-reply-to
 :subject:date:message-id:mime-version:content-transfer-encoding
 :content-language:thread-index;
 bh=dR6VSL8FsoZcxWeIb/mhcOUcIF57a7JLajWczF+lmWw=;
 b=b+zODnwSxJLwrv4FokBBeplhszAohKT0ai3RWfc+NUqQeb2WJfTzuePJIb7UTa0uZP
 pOX2nrt752f4IOVZeBxRswRcdQ8DYPrkkWdo+G+1/D2v1B5Oh7VI7ByFjGx9w4/AcIu+
 K/e4ZXrPFaHCfqb/dgfzc5jUp/jwlRIS34sNsmIu59pBRdYMfFMB4VknwqX9Ytw+C/jz
 vWy5DfXb1j7Dii45A/7HuUIn33SBCQrXJxVwbDvWGo2oTAy29lZVxB9ZQ6YwmeHDq2J/
 TMNLeRwMtIECiyXgMnqn+5doJaJFUvA5xW1k73gflHAhsqbJTK3h6Q34FN3cWdqsVHDj
 FtKQ==
X-Gm-Message-State: AOAM533ilDIUAWn88ikdJJgHycIhw3AflWmZGkuXc+FwtFi8O/mAbaTt
 b2xzUtTBMn1eQ/0VKTTn1FE=
X-Google-Smtp-Source: ABdhPJyglyZxvkIgWGYuKDQy1P8CAG+ARnFH4enif1uGe/3Ry7+IqfI0dQW4Pl1cFB2H9MOn6Zr97Q==
X-Received: by 2002:a17:906:af4d:: with SMTP id
 ly13mr23127932ejb.250.1591686940667; 
 Tue, 09 Jun 2020 00:15:40 -0700 (PDT)
Received: from CBGR90WXYV0 ([54.239.6.185])
 by smtp.gmail.com with ESMTPSA id q14sm15043555edj.47.2020.06.09.00.15.39
 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);
 Tue, 09 Jun 2020 00:15:40 -0700 (PDT)
From: Paul Durrant <xadimgnik@gmail.com>
X-Google-Original-From: "Paul Durrant" <paul@xen.org>
To: "'Tamas K Lengyel'" <tamas.k.lengyel@gmail.com>,
 "'Xen-devel'" <xen-devel@lists.xenproject.org>
References: <20200608163934.313-1-paul@xen.org>
 <CABfawhn3HJCHonYKnMFPgUEN125SDBSXKcMFMWd2hG5SGKF8YQ@mail.gmail.com>
In-Reply-To: <CABfawhn3HJCHonYKnMFPgUEN125SDBSXKcMFMWd2hG5SGKF8YQ@mail.gmail.com>
Subject: RE: Xen 4.14 RC1
Date: Tue, 9 Jun 2020 08:15:38 +0100
Message-ID: <004d01d63e2d$c7de8db0$579ba910$@xen.org>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-gb
Thread-Index: AQHItTXpd8sx0l1jqMKHNeE0LXFGcwMGQZxRqNK9tZA=
X-Mailman-Approved-At: Wed, 10 Jun 2020 16:40:27 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: paul@xen.org
Cc: xen-announce@lists.xenproject.org, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

> -----Original Message-----
> From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
> Sent: 08 June 2020 21:03
> To: Xen-devel <xen-devel@lists.xenproject.org>; Paul Durrant <paul@xen.org>
> Cc: xen-users@lists.xenproject.org; xen-announce@lists.xenproject.org
> Subject: Re: Xen 4.14 RC1
> 
> On Mon, Jun 8, 2020 at 10:41 AM Paul Durrant <paul@xen.org> wrote:
> >
> > Hi all,
> >
> > Xen 4.14 RC1 is tagged. You can check that out from xen.git:
> >
> > git://xenbits.xen.org/xen.git 4.14.0-rc1
> >
> > For your convenience there is also a tarball at:
> > https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz
> >
> > And the signature is at:
> > https://downloads.xenproject.org/release/xen/4.14.0-rc1/xen-4.14.0-rc1.tar.gz.sig
> >
> > Please send bug reports and test reports to xen-devel@lists.xenproject.org.
> > When sending bug reports, please CC relevant maintainers and me (paul@xen.org).
> >
> > As a reminder, there will be a Xen Test Day. Please see the test day schedule at
> > https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
> > https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.
> 
> Hi Paul,
> I'm sad to see this RC1 still missing patch:
> 
> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00179.html

Hi Tamas,

  I don't see an ack for that one as yet. I'm happy to check and release-ack once the final patch is agreed.

> 
> The following even have the release-ack and yet are also missing:
> 
> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00025.html
> https://lists.xenproject.org/archives/html/xen-devel/2020-06/msg00028.html
> 

  These are indeed acked and release-acked and I trust they will make the next RC.

    Paul

> Without these patches I won't be testing or upgrading to 4.14 at all.
> 





From xen-users-bounces@lists.xenproject.org Wed Jun 10 17:35:22 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Jun 2020 17:35:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jj4ci-0006IP-Dp; Wed, 10 Jun 2020 17:34:48 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Pg3b=7X=xen.org=julien@srs-us1.protection.inumbo.net>)
 id 1jj4ch-0006IK-Nz
 for xen-users@lists.xenproject.org; Wed, 10 Jun 2020 17:34:47 +0000
X-Inumbo-ID: adf2f7bc-ab40-11ea-b482-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id adf2f7bc-ab40-11ea-b482-12813bfff9fa;
 Wed, 10 Jun 2020 17:34:47 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
 MIME-Version:Date:Message-ID:From:References:To:Subject:Sender:Reply-To:Cc:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=pnTlq8jbsz76RApb8x6cBevmNI3tqZPdlCbOOO6U04o=; b=vuw5E5rOOlryS/Ctoy22hwLBGE
 3u6QDEA4vnysseoCdQtBlj4EO0fiWQ663GkHX8A9cUca6GfoLLtjSAjJW0HDXzc0RV1jiXz9zGt+R
 l+nImGPOWH3smL6UtYxGFgCoT2d3nM75/qIC4UuYMp1B/Z+gy7fsK9XlvSHHWDBZ4610=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1jj4ch-0004Ux-6M; Wed, 10 Jun 2020 17:34:47 +0000
Received: from [54.239.6.185] (helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1jj4ch-0007RQ-0B; Wed, 10 Jun 2020 17:34:47 +0000
Subject: Re: Input to start porting OS to XEN
To: AshishKumar Mishra <ashish.emailaddress@gmail.com>,
 xen-users@lists.xenproject.org
References: <CAOe0dAWnpX92j-T68KfcdNtfUYKXuwT6r2oB1DegxoCgDpOLNA@mail.gmail.com>
From: Julien Grall <julien@xen.org>
Message-ID: <c2b04589-ff49-81ce-5078-6db489f5d041@xen.org>
Date: Wed, 10 Jun 2020 18:34:45 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0)
 Gecko/20100101 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <CAOe0dAWnpX92j-T68KfcdNtfUYKXuwT6r2oB1DegxoCgDpOLNA@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>



On 10/06/2020 07:20, AshishKumar Mishra wrote:
> Hi All ,

Hello,

> I am starting with virtualization / hypervisor for the for first time & 
> hence apologize if this is not the correct place to start .

Welcome! It will be nice to see zephyr running on Xen!

> 
> 1) Can team please provide any pointer for the steps
>       to port / run an rtos (Zephyr ) on xen.
> 
> 
> 2) Or if team can point share feedback w.r.t complexity & rough time for 
> this ?
> I am evaluating zephyr on XEN  (as i come from linux driver development 
> background , i thought zephyr will be better )

Porting an OS to Xen is a bit vast. The bare-minimum should not take 
long depending on what arch/guest you are targeting, but this can add up 
when porting PV drivers.

Below a few question to try to have a better picture:
    - What architecture are you targeting?
    - What type of guest (e.g PV, PVH, HVM)?
    - What para-virtualized devices do you expect to expose to your guest?

Cheers,

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Thu Jun 11 03:47:18 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2020 03:47:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jjE9r-0001RK-3F; Thu, 11 Jun 2020 03:45:39 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=r+ZX=7Y=gmail.com=ashish.emailaddress@srs-us1.protection.inumbo.net>)
 id 1jjE9p-0001RF-9m
 for xen-users@lists.xenproject.org; Thu, 11 Jun 2020 03:45:37 +0000
X-Inumbo-ID: 029d2e5e-ab96-11ea-bb8b-bc764e2007e4
Received: from mail-qt1-x834.google.com (unknown [2607:f8b0:4864:20::834])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 029d2e5e-ab96-11ea-bb8b-bc764e2007e4;
 Thu, 11 Jun 2020 03:45:36 +0000 (UTC)
Received: by mail-qt1-x834.google.com with SMTP id j32so3598245qte.10
 for <xen-users@lists.xenproject.org>; Wed, 10 Jun 2020 20:45:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=ziMPS2sS+MPYoGj7N6AFxVM/vbw0AWxYgod/V0A6+V0=;
 b=jOwcTkkRmTijm/DLQw6c7B7CRIwfBhgwnycg9/mpfJp4QMiFZH53JELTU6HvD2Fj0t
 E6ixY5vhmhrXp7X+ej0MOWa36vuxcltzqQ+GZEgBYrMkJySV32CBD3THk8tbI3G1utRC
 EHtowhre2bo8w+Jge+8eALzcQ9a2RWQf001NK7TWetDwe5IPfEa4qYyIGvIiFJCp4lXo
 H75vA5RvvlKV4nFMegWLN2RHP1LOeVjRB5h3aeh0mKxJVH3u9ZBiNQCAAVp18dI2d+k1
 JD+tlD8s8R2gqIysJZ38EhhC1CM5086Sr6rMivhei8QEfO6uJ3MFN0YG2wOLkQE8gexL
 Wc6w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=ziMPS2sS+MPYoGj7N6AFxVM/vbw0AWxYgod/V0A6+V0=;
 b=V3ELqlOffRFu+ahM8Apk1j162OYYxgcCSBq3AAhbMuijdXfmTgofawbAUAIXv/CR+i
 fUtE/vlchP81hbPsahW9Z/jZNzk+RFNy3kYA40cyYgfV3/fz+YL4d6RoitQnow3Hd58L
 mlg6GJYHqIKL86xvmxboytW/2g9ank3bCMFJYmytEZUmKZw9J98RUSKHBwcFE8u7tkXG
 nhsqJrDzvWOicTfw4p04jg9W0qXUStWJ0MmyOs9hKCZqSKCUeXddH98BmApd3FsfDoeh
 QX+QYOZGUBZcZihi6BwqKLB9emwU2WDIBs0hkIP4616XONLZ4hyUgalXy6J3YAefUrhf
 1CoQ==
X-Gm-Message-State: AOAM531Fm3959Feuuyk94h5/UNryawwtd1/EGbETyDvIh24G/xlOW7Wb
 08MXsfR4cs/ronyCPMBo7GOAVmGPwR4Hp93v3P+gIA==
X-Google-Smtp-Source: ABdhPJzMqyP8pBFMbqIlKRZ/rJgxhe9ZUoEKl2tshaXtSeeOo9N/jykedgHY/lB2nUiYAn3th/kYU7xXwWOqrLmk89w=
X-Received: by 2002:ac8:6bc1:: with SMTP id b1mr6682922qtt.65.1591847136183;
 Wed, 10 Jun 2020 20:45:36 -0700 (PDT)
MIME-Version: 1.0
References: <CAOe0dAWnpX92j-T68KfcdNtfUYKXuwT6r2oB1DegxoCgDpOLNA@mail.gmail.com>
 <c2b04589-ff49-81ce-5078-6db489f5d041@xen.org>
In-Reply-To: <c2b04589-ff49-81ce-5078-6db489f5d041@xen.org>
From: AshishKumar Mishra <ashish.emailaddress@gmail.com>
Date: Thu, 11 Jun 2020 09:15:20 +0530
Message-ID: <CAOe0dAUJt5vR11FW80aELSpDxjJu5+J12v5cgqXTS9nbToThog@mail.gmail.com>
Subject: Re: Input to start porting OS to XEN
To: Julien Grall <julien@xen.org>
Content-Type: multipart/alternative; boundary="00000000000016c9e505a7c6cb4f"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000016c9e505a7c6cb4f
Content-Type: text/plain; charset="UTF-8"

Hi Julien ,

Thanks for reverting back .

1) Currently i was planning on Raspberry pie-4
     ( As that was simpler w.r.t linux bsp & availability )


2) w.r.t PV vs PVH vs HVM
- I was evaluating HVM initially .
  as based on what I understand , PV will require changes
  to be done on Zephyr codebase initially.
- With HVM , based on my reading i can look at getting the binary of zephyr
   and and xen HVM config file will help me get started

But , request to please correct if i have mis-understood or mis-planned any
thing here.


3) Ethernet and CAN interface are what i was looking for on Zephr.

If team can share any other info / suggestions based on previous experience
it would be of  great help to me.

Thanks
Ashish



On Wed, Jun 10, 2020, 11:04 PM Julien Grall <julien@xen.org> wrote:

>
>
> On 10/06/2020 07:20, AshishKumar Mishra wrote:
> > Hi All ,
>
> Hello,
>
> > I am starting with virtualization / hypervisor for the for first time &
> > hence apologize if this is not the correct place to start .
>
> Welcome! It will be nice to see zephyr running on Xen!
>
> >
> > 1) Can team please provide any pointer for the steps
> >       to port / run an rtos (Zephyr ) on xen.
> >
> >
> > 2) Or if team can point share feedback w.r.t complexity & rough time for
> > this ?
> > I am evaluating zephyr on XEN  (as i come from linux driver development
> > background , i thought zephyr will be better )
>
> Porting an OS to Xen is a bit vast. The bare-minimum should not take
> long depending on what arch/guest you are targeting, but this can add up
> when porting PV drivers.
>
> Below a few question to try to have a better picture:
>     - What architecture are you targeting?
>     - What type of guest (e.g PV, PVH, HVM)?
>     - What para-virtualized devices do you expect to expose to your guest?
>
> Cheers,
>
> --
> Julien Grall
>

--00000000000016c9e505a7c6cb4f
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div>Hi=C2=A0Julien ,</div><div dir=3D"auto"><br></div><d=
iv dir=3D"auto">Thanks for reverting back .</div><div dir=3D"auto"><br></di=
v><div dir=3D"auto">1) Currently i was planning on Raspberry pie-4</div><di=
v dir=3D"auto">=C2=A0 =C2=A0 =C2=A0( As that was simpler w.r.t linux bsp &a=
mp; availability )</div><div dir=3D"auto"><br></div><div dir=3D"auto"><br><=
/div><div dir=3D"auto">2) w.r.t PV vs PVH vs HVM</div><div dir=3D"auto">- I=
 was evaluating HVM initially .</div><div dir=3D"auto">=C2=A0 as based on w=
hat I understand , PV will require changes=C2=A0</div><div dir=3D"auto">=C2=
=A0 to be done on Zephyr codebase initially.</div><div dir=3D"auto">- With =
HVM , based on my reading i can look at getting the binary of zephyr=C2=A0<=
/div><div dir=3D"auto">=C2=A0 =C2=A0and and xen HVM config file will help m=
e get started=C2=A0</div><div dir=3D"auto">=C2=A0 =C2=A0</div><div dir=3D"a=
uto">But , request to please correct if i have mis-understood or mis-planne=
d any thing here.</div><div dir=3D"auto"><br></div><div dir=3D"auto"><br></=
div><div dir=3D"auto">3) Ethernet and CAN interface are what i was=C2=A0loo=
king for on Zephr.</div><div dir=3D"auto">=C2=A0 =C2=A0=C2=A0</div><div dir=
=3D"auto">If team can share any other info / suggestions based on previous =
experience=C2=A0</div><div dir=3D"auto">it would=C2=A0be of=C2=A0 great hel=
p to me.</div><div dir=3D"auto"><br></div><div dir=3D"auto">Thanks=C2=A0</d=
iv><div dir=3D"auto">Ashish</div><div dir=3D"auto"><br></div><div dir=3D"au=
to"><br></div><div dir=3D"auto"><br><div class=3D"gmail_quote" dir=3D"auto"=
><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jun 10, 2020, 11:04 PM Julie=
n Grall &lt;<a href=3D"mailto:julien@xen.org">julien@xen.org</a>&gt; wrote:=
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex"><br>
<br>
On 10/06/2020 07:20, AshishKumar Mishra wrote:<br>
&gt; Hi All ,<br>
<br>
Hello,<br>
<br>
&gt; I am starting with virtualization / hypervisor for the for first time =
&amp; <br>
&gt; hence apologize if this is not the correct place to start=C2=A0.<br>
<br>
Welcome! It will be nice to see zephyr running on Xen!<br>
<br>
&gt; <br>
&gt; 1) Can team please provide any pointer for the steps<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0to port / run an rtos (Zephyr ) on xen.<br>
&gt; <br>
&gt; <br>
&gt; 2) Or if team can point share feedback w.r.t complexity &amp; rough ti=
me for <br>
&gt; this ?<br>
&gt; I am evaluating zephyr on XEN=C2=A0 (as i come from linux driver devel=
opment <br>
&gt; background , i thought zephyr will be better )<br>
<br>
Porting an OS to Xen is a bit vast. The bare-minimum should not take <br>
long depending on what arch/guest you are targeting, but this can add up <b=
r>
when porting PV drivers.<br>
<br>
Below a few question to try to have a better picture:<br>
=C2=A0 =C2=A0 - What architecture are you targeting?<br>
=C2=A0 =C2=A0 - What type of guest (e.g PV, PVH, HVM)?<br>
=C2=A0 =C2=A0 - What para-virtualized devices do you expect to expose to yo=
ur guest?<br>
<br>
Cheers,<br>
<br>
-- <br>
Julien Grall<br>
</blockquote></div></div></div>

--00000000000016c9e505a7c6cb4f--


From xen-users-bounces@lists.xenproject.org Thu Jun 11 13:11:48 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Jun 2020 13:11:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jjMyU-0007t2-5V; Thu, 11 Jun 2020 13:10:30 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SNYd=7Y=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jjMyT-0007rD-2E
 for xen-users@lists.xen.org; Thu, 11 Jun 2020 13:10:29 +0000
X-Inumbo-ID: e5c86fce-abe4-11ea-bb8b-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id e5c86fce-abe4-11ea-bb8b-bc764e2007e4;
 Thu, 11 Jun 2020 13:10:18 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=GegubXLG2U0OI3eFY7woUsGzjD01OabFpSKvvDGr0Vc=; b=LYFtHidVzd2CTp9PLHaYKZbTF4
 ft4C61994eJwJQG7BG0qlQ0326TKZ1VVapaI1qt1I46OhqTKBcargZKJDvnpW4QEdN2uZ7b9FfP5s
 nMtrIkja7MZfHASMC6E+awd/qcjLz5R81skQWIWvopV385w5n/hPwiUxgINWSJ1EN31g=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jjMyB-0004KW-4S; Thu, 11 Jun 2020 13:10:11 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jjMyB-0006OG-37; Thu, 11 Jun 2020 13:10:11 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 320 v2 (CVE-2020-0543) - Special Register
 Buffer speculative side channel
Message-Id: <E1jjMyB-0006OG-37@xenbits.xenproject.org>
Date: Thu, 11 Jun 2020 13:10:11 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-0543 / XSA-320
                              version 2

           Special Register Buffer speculative side channel

UPDATES IN VERSION 2
====================

Add a link to Intel's cross reference of affected hardware.

Provide a suggested workaround for Ivy Bridge hardware, which is not
receiving a microcode update.  This includes a 3rd patch for each
release.

ISSUE DESCRIPTION
=================

This issue is related to the MDS and TAA vulnerabilities.  Please see
https://xenbits.xen.org/xsa/advisory-297.html (MDS) and
https://xenbits.xen.org/xsa/advisory-305.html (TAA) for details.

Certain processor operations microarchitecturally need to read data from
outside the physical core (e.g. to communicate with the random number
generator).  In some implementations, this operation is called a Special
Register Read.

In some implementations, data are staged in a single shared buffer, and
a full cache line at a time is returned to the core which made the
Special Register Read.  On parts vulnerable to MFBDS or TAA, an attacker
may be able to access stale data requested by other cores in the system.

For more details, see:
  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html
  https://software.intel.com/security-software-guidance/processors-affected-transient-execution-attack-mitigation-product-cpu-model

IMPACT
======

An attacker, which could include a malicious untrusted user process on a
trusted guest, or an untrusted guest, can sample the contents of
certain off-core accesses by other cores in the system.

This can include data whose use may depend on the secrecy of the value,
such as data from the Random Number Generator (e.g. RDRAND/RDSEED
instructions).

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

Only x86 processors are vulnerable.
ARM processors are not believed to be vulnerable.

Only Intel based processors are affected.  Processors from other
manufacturers (e.g. AMD) are not believed to be vulnerable.

Please consult the Intel Security Advisory for details on the affected
processors.

MITIGATION
==========

Disabling RDRAND (and, where applicable, RDSEED) will avoid the
vulnerability.  It may have other adverse consequences, such as guests
generating keys with weak random numbers, or guests hanging during
boot waiting for entropy.

A domain (guest, dom0, or service domain) which is runs with RDRAND
disabled in CPUID, and whose software conforms to normal feature
detection as specified in the Intel/AMD manuals, will not be
vulnerable to snooping by other domains.  But such a domain *can*
still potentially snoop on any domains which are still using RDRAND.

This mitigation is recommended to be applied globally, due to the
practical complexity of auditing all software in a VM to confirm that
there are no vulnerable uses of the RDRAND/RDSEED instructions.

RDRAND and RDSEED can be disabled at the host level by booting Xen
with `cpuid=no-rdrand,no-rdseed`, which will hide the feature from all
domains including guests and dom0.  Xen 4.12 and earlier require the
appropriate patch 3 below for this mechanism to work.

RDRAND and RDSEED can be disabled for guests with the following
setting in the VM configuration file (xl.cfg):
  cpuid=["host:rdrand=0,rdseed=0]"
(NB it would have to be merged into any existing cpuid= setting). Xen
4.9 and earlier require the appropriate patch 3 below for this
mechanism to work.

RESOLUTION
==========

New microcode is being released on some affected parts to work around
the vulnerability.  It may be available via a firmware update (consult
your hardware vendor), or available for OS loading (consult your dom0 OS
vendor).

For Ivy Bridge hardware, which is not receiving a microcode update, see
MITIGATION, above.

On Xen 4.13 and later, OS microcode can be loaded at runtime. See
https://xenbits.xen.org/docs/latest/admin-guide/microcode-loading.html#runtime-microcode-loading
for details on the xen-ucode utility.

Loading the microcode, either at boot or at runtime, suffices to
mitigate the issue, as protections are active by default.  The
mitigations do have an impact on latency of individual RDRAND/RDSEED
instructions.

The patches below are for Xen, and offer boot time information,
defaults selection, opt-out controls, and uniform controls for hiding
the RDRAND/RDSEED instructions.

Note that patches for released versions are generally prepared to apply
to the stable branches, and may not apply cleanly to the most recent
release tarball.  Downstreams are encouraged to update to the tip of the
stable branch before applying these patches.

xsa320/xsa320-?.patch        xen-unstable
xsa320/xsa320-4.13-?.patch   Xen 4.13.x
xsa320/xsa320-4.12-?.patch   Xen 4.12.x
xsa320/xsa320-4.11-?.patch   Xen 4.11.x
xsa320/xsa320-4.10-?.patch   Xen 4.10.x
xsa320/xsa320-4.9-?.patch    Xen 4.9.x

$ sha256sum xsa320*/*
84e4f66492042b08e69b0894ea7feb20c17c89a696cf95f05a8826fba4f26355  xsa320/xsa320-1.patch
5a3a06c72d0281fa1191ba18e39b836d2748400d9bf6a59dd45447850530c88b  xsa320/xsa320-2.patch
fd15c8a5098ce70af85c6cf1f69f1e6b51eabfda0a0bb780b27f47a8ae44e3a2  xsa320/xsa320-3.patch
759259ef88c980363d44e11d9c272f6a4a15918e5e6bcdfe971b1ce7ea160cd9  xsa320/xsa320-4.9-1.patch
ebac2c011841c55c3c1e99d9e8afc53e56e54268d379ec8b904f6bfe6a1a5045  xsa320/xsa320-4.9-2.patch
3aeade2c9bb1fe77f6c076d531378d3971aa44cdb87996bda27565fa6e707bd2  xsa320/xsa320-4.9-3.patch
5c622c74358ab21cbd27484c649f26df0f08e89ec333c346415bc51e35ba26c1  xsa320/xsa320-4.10-1.patch
f112e34a6a4564a043926fc255a15c7e319001bd023a97ae2947228024e1c306  xsa320/xsa320-4.10-2.patch
1ff6f34840ddb23b7f9bad5e2a1a5cf5246a55219ce7f686f2d80b3dc55e2960  xsa320/xsa320-4.10-3.patch
f24b51292be0cb5de80c6eff0b26983629dd48cc39ae5a331e2e38e15a6cf712  xsa320/xsa320-4.11-1.patch
03579810eaf2e9eeb1a82de4b50ff5c4b01e60b30ccf7609c9e3378ef576d81e  xsa320/xsa320-4.11-2.patch
fa4bcb5422a43395bfe57b8e324b80e447b004eb24360b78343577de0f247067  xsa320/xsa320-4.11-3.patch
282537ffe2fd4332c0e061ddc537bea3e135a7bbd9253ec298becb49047323cf  xsa320/xsa320-4.12-1.patch
e4417429297354c233e8f5c261aff4888aae602f8c68897c09b16ea1aa44b1ca  xsa320/xsa320-4.12-2.patch
dd374e6c11c54c4077895132b8cc5771d3193df2febde643fcef94f973ee409e  xsa320/xsa320-4.12-3.patch
611f2ab1a1c67e04767188d9803b6afd7d304e81a5b4f1eb1744d3e8a68ced66  xsa320/xsa320-4.13-1.patch
cd1bc0071e72e2342ff4508ea3d937988694f4c03506b3afb3184f7d81aa1c86  xsa320/xsa320-4.13-2.patch
1fe0437059bac1fcc4be44ec3c9f9b53f4c5568c8f02c3f2aa2e452febe39cd1  xsa320/xsa320-4.13-3.patch
$

NOTE REGARDING LACK OF EMBARGO
==============================

Despite an attempt to organise predisclosure, the discoverers ultimately
did not authorise a predisclosure.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl7iLP8MHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZYSMIAISQRxbfSDYpTKAObAGn7Jhv4rGM4C0gYagFWKxb
eLuhvWZN49uPuyIfsO8WfZxAQJTP2hEDNd4ncFYwS7JbD/F/RCsYFgiasw/aqCUX
9vEkRtrvD7XvIe0DWAjHUrvaFvnjI/vl03D3kxQw15eDPXU8pQMPrfva6W1PrQfv
+b+aQHiawR6MPawCraK3kfCs1dTEnrkH+vL5h+nnEyB34ciTG+Z1g3Rhx7GMh6+7
tb9VLOPZMRvvCRii3pRBolcT0MmZAcakbBxCixMDo7bSEaw3G7Zro2RO9MvvsoFF
r1Pa8IC8kVTWQTi8CYS46E1TvQ7yr86ERejaFQs0fk6vxhI=
=N8eC
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-2.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L3NwZWMtY3RybDogTWl0aWdhdGUgdGhlIFNwZWNp
YWwgUmVnaXN0ZXIgQnVmZmVyIERhdGEgU2FtcGxpbmcgc2lkZWNoYW5uZWwK
ClNlZSBwYXRjaCBkb2N1bWVudGF0aW9uIGFuZCBjb21tZW50cy4KClRoaXMg
aXMgcGFydCBvZiBYU0EtMzIwIC8gQ1ZFLTIwMjAtMDU0MwoKU2lnbmVkLW9m
Zi1ieTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KUmV2aWV3ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNv
bT4KCmRpZmYgLS1naXQgYS9kb2NzL21pc2MveGVuLWNvbW1hbmQtbGluZS5w
YW5kb2MgYi9kb2NzL21pc2MveGVuLWNvbW1hbmQtbGluZS5wYW5kb2MKaW5k
ZXggYjdjMmI5OTI5OC4uMWE2OWM2MDEzOSAxMDA2NDQKLS0tIGEvZG9jcy9t
aXNjL3hlbi1jb21tYW5kLWxpbmUucGFuZG9jCisrKyBiL2RvY3MvbWlzYy94
ZW4tY29tbWFuZC1saW5lLnBhbmRvYwpAQCAtMjA0OCw3ICsyMDQ4LDcgQEAg
QnkgZGVmYXVsdCBTU0JEIHdpbGwgYmUgbWl0aWdhdGVkIGF0IHJ1bnRpbWUg
KGkuZSBgc3NiZD1ydW50aW1lYCkuCiAjIyMgc3BlYy1jdHJsICh4ODYpCiA+
IGA9IExpc3Qgb2YgWyA8Ym9vbD4sIHhlbj08Ym9vbD4sIHtwdixodm0sbXNy
LXNjLHJzYixtZC1jbGVhcn09PGJvb2w+LAogPiAgICAgICAgICAgICAgYnRp
LXRodW5rPXJldHBvbGluZXxsZmVuY2V8am1wLCB7aWJycyxpYnBiLHNzYmQs
ZWFnZXItZnB1LAotPiAgICAgICAgICAgICAgbDFkLWZsdXNoLGJyYW5jaC1o
YXJkZW59PTxib29sPiBdYAorPiAgICAgICAgICAgICAgbDFkLWZsdXNoLGJy
YW5jaC1oYXJkZW4sc3JiLWxvY2t9PTxib29sPiBdYAogCiBDb250cm9scyBm
b3Igc3BlY3VsYXRpdmUgZXhlY3V0aW9uIHNpZGVjaGFubmVsIG1pdGlnYXRp
b25zLiAgQnkgZGVmYXVsdCwgWGVuCiB3aWxsIHBpY2sgdGhlIG1vc3QgYXBw
cm9wcmlhdGUgbWl0aWdhdGlvbnMgYmFzZWQgb24gY29tcGlsZWQgaW4gc3Vw
cG9ydCwKQEAgLTIxMjUsNiArMjEyNSwxMiBAQCBJZiBYZW4gaXMgY29tcGls
ZWQgd2l0aCBgQ09ORklHX1NQRUNVTEFUSVZFX0hBUkRFTl9CUkFOQ0hgLCB0
aGUKIHNwZWN1bGF0aW9uIGJhcnJpZXJzIHRvIHByb3RlY3Qgc2VsZWN0ZWQg
Y29uZGl0aW9uYWwgYnJhbmNoZXMuICBCeSBkZWZhdWx0LAogWGVuIHdpbGwg
ZW5hYmxlIHRoaXMgbWl0aWdhdGlvbi4KIAorT24gaGFyZHdhcmUgc3VwcG9y
dGluZyBTUkJEU19DVFJMLCB0aGUgYHNyYi1sb2NrPWAgb3B0aW9uIGNhbiBi
ZSB1c2VkIHRvIGZvcmNlCitvciBwcmV2ZW50IFhlbiBmcm9tIHByb3RlY3Qg
dGhlIFNwZWNpYWwgUmVnaXN0ZXIgQnVmZmVyIGZyb20gbGVha2luZyBzdGFs
ZQorZGF0YS4gQnkgZGVmYXVsdCwgWGVuIHdpbGwgZW5hYmxlIHRoaXMgbWl0
aWdhdGlvbiwgZXhjZXB0IG9uIHBhcnRzIHdoZXJlIE1EUworaXMgZml4ZWQg
YW5kIFRBQSBpcyBmaXhlZC9taXRpZ2F0ZWQgKGluIHdoaWNoIGNhc2UsIHRo
ZXJlIGlzIGJlbGlldmVkIHRvIGJlIG5vCit3YXkgZm9yIGFuIGF0dGFja2Vy
IHRvIG9idGFpbiB0aGUgc3RhbGUgZGF0YSkuCisKICMjIyBzeW5jX2NvbnNv
bGUKID4gYD0gPGJvb2xlYW4+YAogCmRpZmYgLS1naXQgYS94ZW4vYXJjaC94
ODYvYWNwaS9wb3dlci5jIGIveGVuL2FyY2gveDg2L2FjcGkvcG93ZXIuYwpp
bmRleCAwY2RhMzYyMDQ1Li44ZjljZmU5ZjMyIDEwMDY0NAotLS0gYS94ZW4v
YXJjaC94ODYvYWNwaS9wb3dlci5jCisrKyBiL3hlbi9hcmNoL3g4Ni9hY3Bp
L3Bvd2VyLmMKQEAgLTI5Niw2ICsyOTYsOSBAQCBzdGF0aWMgaW50IGVudGVy
X3N0YXRlKHUzMiBzdGF0ZSkKICAgICBjaS0+c3BlY19jdHJsX2ZsYWdzIHw9
IChkZWZhdWx0X3NwZWNfY3RybF9mbGFncyAmIFNDRl9pc3Rfd3Jtc3IpOwog
ICAgIHNwZWNfY3RybF9leGl0X2lkbGUoY2kpOwogCisgICAgaWYgKCBib290
X2NwdV9oYXMoWDg2X0ZFQVRVUkVfU1JCRFNfQ1RSTCkgKQorICAgICAgICB3
cm1zcmwoTVNSX01DVV9PUFRfQ1RSTCwgZGVmYXVsdF94ZW5fbWN1X29wdF9j
dHJsKTsKKwogICAgIC8qIChyZSlpbml0aWFsaXNlIFNZU0NBTEwvU1lTRU5U
RVIgc3RhdGUsIGFtb25nc3Qgb3RoZXIgdGhpbmdzLiAqLwogICAgIHBlcmNw
dV90cmFwc19pbml0KCk7CiAKZGlmZiAtLWdpdCBhL3hlbi9hcmNoL3g4Ni9z
bXBib290LmMgYi94ZW4vYXJjaC94ODYvc21wYm9vdC5jCmluZGV4IDEzYjNk
YWRlOWMuLmJhOGJjOTRjZjUgMTAwNjQ0Ci0tLSBhL3hlbi9hcmNoL3g4Ni9z
bXBib290LmMKKysrIGIveGVuL2FyY2gveDg2L3NtcGJvb3QuYwpAQCAtMzcy
LDEyICszNzIsMTQgQEAgdm9pZCBzdGFydF9zZWNvbmRhcnkodm9pZCAqdW51
c2VkKQogICAgIG1pY3JvY29kZV91cGRhdGVfb25lKGZhbHNlKTsKIAogICAg
IC8qCi0gICAgICogSWYgTVNSX1NQRUNfQ1RSTCBpcyBhdmFpbGFibGUsIGFw
cGx5IFhlbidzIGRlZmF1bHQgc2V0dGluZyBhbmQgZGlzY2FyZAotICAgICAq
IGFueSBmaXJtd2FyZSBzZXR0aW5ncy4gIE5vdGU6IE1TUl9TUEVDX0NUUkwg
bWF5IG9ubHkgYmVjb21lIGF2YWlsYWJsZQotICAgICAqIGFmdGVyIGxvYWRp
bmcgbWljcm9jb2RlLgorICAgICAqIElmIGFueSBzcGVjdWxhdGl2ZSBjb250
cm9sIE1TUnMgYXJlIGF2YWlsYWJsZSwgYXBwbHkgWGVuJ3MgZGVmYXVsdAor
ICAgICAqIHNldHRpbmdzLiAgTm90ZTogVGhlc2UgTVNScyBtYXkgb25seSBi
ZWNvbWUgYXZhaWxhYmxlIGFmdGVyIGxvYWRpbmcKKyAgICAgKiBtaWNyb2Nv
ZGUuCiAgICAgICovCiAgICAgaWYgKCBib290X2NwdV9oYXMoWDg2X0ZFQVRV
UkVfSUJSU0IpICkKICAgICAgICAgd3Jtc3JsKE1TUl9TUEVDX0NUUkwsIGRl
ZmF1bHRfeGVuX3NwZWNfY3RybCk7CisgICAgaWYgKCBib290X2NwdV9oYXMo
WDg2X0ZFQVRVUkVfU1JCRFNfQ1RSTCkgKQorICAgICAgICB3cm1zcmwoTVNS
X01DVV9PUFRfQ1RSTCwgZGVmYXVsdF94ZW5fbWN1X29wdF9jdHJsKTsKIAog
ICAgIHRzeF9pbml0KCk7IC8qIE5lZWRzIG1pY3JvY29kZS4gIE1heSBjaGFu
Z2UgSExFL1JUTSBmZWF0dXJlIGJpdHMuICovCiAKZGlmZiAtLWdpdCBhL3hl
bi9hcmNoL3g4Ni9zcGVjX2N0cmwuYyBiL3hlbi9hcmNoL3g4Ni9zcGVjX2N0
cmwuYwppbmRleCBhNWRmZmY4MGM1Li5jOWY3OGVhZDYyIDEwMDY0NAotLS0g
YS94ZW4vYXJjaC94ODYvc3BlY19jdHJsLmMKKysrIGIveGVuL2FyY2gveDg2
L3NwZWNfY3RybC5jCkBAIC02NSw2ICs2NSw5IEBAIHN0YXRpYyB1bnNpZ25l
ZCBpbnQgX19pbml0ZGF0YSBsMWRfbWF4cGh5c2FkZHI7CiBzdGF0aWMgYm9v
bCBfX2luaXRkYXRhIGNwdV9oYXNfYnVnX21zYmRzX29ubHk7IC8qID0+IG1p
bmltYWwgSFQgaW1wYWN0LiAqLwogc3RhdGljIGJvb2wgX19pbml0ZGF0YSBj
cHVfaGFzX2J1Z19tZHM7IC8qIEFueSBvdGhlciBNe0xQLFNCLEZCfURTIGNv
bWJpbmF0aW9uLiAqLwogCitzdGF0aWMgaW50OF90IF9faW5pdGRhdGEgb3B0
X3NyYl9sb2NrID0gLTE7Cit1aW50NjRfdCBfX3JlYWRfbW9zdGx5IGRlZmF1
bHRfeGVuX21jdV9vcHRfY3RybDsKKwogc3RhdGljIGludCBfX2luaXQgcGFy
c2Vfc3BlY19jdHJsKGNvbnN0IGNoYXIgKnMpCiB7CiAgICAgY29uc3QgY2hh
ciAqc3M7CkBAIC0xMTIsNiArMTE1LDcgQEAgc3RhdGljIGludCBfX2luaXQg
cGFyc2Vfc3BlY19jdHJsKGNvbnN0IGNoYXIgKnMpCiAgICAgICAgICAgICBv
cHRfc3NiZCA9IGZhbHNlOwogICAgICAgICAgICAgb3B0X2wxZF9mbHVzaCA9
IDA7CiAgICAgICAgICAgICBvcHRfYnJhbmNoX2hhcmRlbiA9IGZhbHNlOwor
ICAgICAgICAgICAgb3B0X3NyYl9sb2NrID0gMDsKICAgICAgICAgfQogICAg
ICAgICBlbHNlIGlmICggdmFsID4gMCApCiAgICAgICAgICAgICByYyA9IC1F
SU5WQUw7CkBAIC0xNzgsNiArMTgyLDggQEAgc3RhdGljIGludCBfX2luaXQg
cGFyc2Vfc3BlY19jdHJsKGNvbnN0IGNoYXIgKnMpCiAgICAgICAgICAgICBv
cHRfbDFkX2ZsdXNoID0gdmFsOwogICAgICAgICBlbHNlIGlmICggKHZhbCA9
IHBhcnNlX2Jvb2xlYW4oImJyYW5jaC1oYXJkZW4iLCBzLCBzcykpID49IDAg
KQogICAgICAgICAgICAgb3B0X2JyYW5jaF9oYXJkZW4gPSB2YWw7CisgICAg
ICAgIGVsc2UgaWYgKCAodmFsID0gcGFyc2VfYm9vbGVhbigic3JiLWxvY2si
LCBzLCBzcykpID49IDAgKQorICAgICAgICAgICAgb3B0X3NyYl9sb2NrID0g
dmFsOwogICAgICAgICBlbHNlCiAgICAgICAgICAgICByYyA9IC1FSU5WQUw7
CiAKQEAgLTM0MSw3ICszNDcsNyBAQCBzdGF0aWMgdm9pZCBfX2luaXQgcHJp
bnRfZGV0YWlscyhlbnVtIGluZF90aHVuayB0aHVuaywgdWludDY0X3QgY2Fw
cykKICAgICAgICAgICAgICAgICJcbiIpOwogCiAgICAgLyogU2V0dGluZ3Mg
Zm9yIFhlbidzIHByb3RlY3Rpb24sIGlycmVzcGVjdGl2ZSBvZiBndWVzdHMu
ICovCi0gICAgcHJpbnRrKCIgIFhlbiBzZXR0aW5nczogQlRJLVRodW5rICVz
LCBTUEVDX0NUUkw6ICVzJXMlcywgT3RoZXI6JXMlcyVzJXNcbiIsCisgICAg
cHJpbnRrKCIgIFhlbiBzZXR0aW5nczogQlRJLVRodW5rICVzLCBTUEVDX0NU
Ukw6ICVzJXMlcywgT3RoZXI6JXMlcyVzJXMlc1xuIiwKICAgICAgICAgICAg
dGh1bmsgPT0gVEhVTktfTk9ORSAgICAgID8gIk4vQSIgOgogICAgICAgICAg
ICB0aHVuayA9PSBUSFVOS19SRVRQT0xJTkUgPyAiUkVUUE9MSU5FIiA6CiAg
ICAgICAgICAgIHRodW5rID09IFRIVU5LX0xGRU5DRSAgICA/ICJMRkVOQ0Ui
IDoKQEAgLTM1Miw2ICszNTgsOCBAQCBzdGF0aWMgdm9pZCBfX2luaXQgcHJp
bnRfZGV0YWlscyhlbnVtIGluZF90aHVuayB0aHVuaywgdWludDY0X3QgY2Fw
cykKICAgICAgICAgICAgKGRlZmF1bHRfeGVuX3NwZWNfY3RybCAmIFNQRUNf
Q1RSTF9TU0JEKSAgPyAiIFNTQkQrIiA6ICIgU1NCRC0iLAogICAgICAgICAg
ICAhKGNhcHMgJiBBUkNIX0NBUFNfVFNYX0NUUkwpICAgICAgICAgICAgICA/
ICIiIDoKICAgICAgICAgICAgKG9wdF90c3ggJiAxKSAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgPyAiIFRTWCsiIDogIiBUU1gtIiwKKyAgICAgICAg
ICAgIWJvb3RfY3B1X2hhcyhYODZfRkVBVFVSRV9TUkJEU19DVFJMKSAgICAg
PyAiIiA6CisgICAgICAgICAgIG9wdF9zcmJfbG9jayAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgID8gIiBTUkJfTE9DSysiIDogIiBTUkJfTE9DSy0i
LAogICAgICAgICAgICBvcHRfaWJwYiAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICA/ICIgSUJQQiIgIDogIiIsCiAgICAgICAgICAgIG9wdF9s
MWRfZmx1c2ggICAgICAgICAgICAgICAgICAgICAgICAgICAgID8gIiBMMURf
RkxVU0giIDogIiIsCiAgICAgICAgICAgIG9wdF9tZF9jbGVhcl9wdiB8fCBv
cHRfbWRfY2xlYXJfaHZtICAgICAgID8gIiBWRVJXIiAgOiAiIiwKQEAgLTEx
NTcsNiArMTE2NSwzNCBAQCB2b2lkIF9faW5pdCBpbml0X3NwZWN1bGF0aW9u
X21pdGlnYXRpb25zKHZvaWQpCiAgICAgICAgIHRzeF9pbml0KCk7CiAgICAg
fQogCisgICAgLyogQ2FsY3VsYXRlIHN1aXRhYmxlIGRlZmF1bHRzIGZvciBN
U1JfTUNVX09QVF9DVFJMICovCisgICAgaWYgKCBib290X2NwdV9oYXMoWDg2
X0ZFQVRVUkVfU1JCRFNfQ1RSTCkgKQorICAgIHsKKyAgICAgICAgdWludDY0
X3QgdmFsOworCisgICAgICAgIHJkbXNybChNU1JfTUNVX09QVF9DVFJMLCB2
YWwpOworCisgICAgICAgIC8qCisgICAgICAgICAqIE9uIHNvbWUgU1JCRFMt
YWZmZWN0ZWQgaGFyZHdhcmUsIGl0IG1heSBiZSBzYWZlIHRvIHJlbGF4IHNy
Yi1sb2NrCisgICAgICAgICAqIGJ5IGRlZmF1bHQuCisgICAgICAgICAqCisg
ICAgICAgICAqIE9uIHBhcnRzIHdoaWNoIGVudW1lcmF0ZSBNRFNfTk8gYW5k
IG5vdCBUQUFfTk8sIFRTWCBpcyB0aGUgb25seSB3YXkKKyAgICAgICAgICog
dG8gYWNjZXNzIHRoZSBGaWxsIEJ1ZmZlci4gIElmIFRTWCBpc24ndCBhdmFp
bGFibGUgKGluYy4gU0tVCisgICAgICAgICAqIHJlYXNvbnMgb24gc29tZSBt
b2RlbHMpLCBvciBUU1ggaXMgZXhwbGljaXRseSBkaXNhYmxlZCwgdGhlbiB0
aGVyZQorICAgICAgICAgKiBpcyBubyBuZWVkIGZvciB0aGUgZXh0cmEgb3Zl
cmhlYWQgdG8gcHJvdGVjdCBSRFJBTkQvUkRTRUVELgorICAgICAgICAgKi8K
KyAgICAgICAgaWYgKCBvcHRfc3JiX2xvY2sgPT0gLTEgJiYKKyAgICAgICAg
ICAgICAoY2FwcyAmIChBUkNIX0NBUFNfTURTX05PfEFSQ0hfQ0FQU19UQUFf
Tk8pKSA9PSBBUkNIX0NBUFNfTURTX05PICYmCisgICAgICAgICAgICAgKCFj
cHVfaGFzX2hsZSB8fCAoKGNhcHMgJiBBUkNIX0NBUFNfVFNYX0NUUkwpICYm
IG9wdF90c3ggPT0gMCkpICkKKyAgICAgICAgICAgIG9wdF9zcmJfbG9jayA9
IDA7CisKKyAgICAgICAgdmFsICY9IH5NQ1VfT1BUX0NUUkxfUk5HRFNfTUlU
R19ESVM7CisgICAgICAgIGlmICggIW9wdF9zcmJfbG9jayApCisgICAgICAg
ICAgICB2YWwgfD0gTUNVX09QVF9DVFJMX1JOR0RTX01JVEdfRElTOworCisg
ICAgICAgIGRlZmF1bHRfeGVuX21jdV9vcHRfY3RybCA9IHZhbDsKKyAgICB9
CisKICAgICBwcmludF9kZXRhaWxzKHRodW5rLCBjYXBzKTsKIAogICAgIC8q
CkBAIC0xMTg4LDYgKzEyMjQsOSBAQCB2b2lkIF9faW5pdCBpbml0X3NwZWN1
bGF0aW9uX21pdGlnYXRpb25zKHZvaWQpCiAKICAgICAgICAgd3Jtc3JsKE1T
Ul9TUEVDX0NUUkwsIGJzcF9kZWxheV9zcGVjX2N0cmwgPyAwIDogZGVmYXVs
dF94ZW5fc3BlY19jdHJsKTsKICAgICB9CisKKyAgICBpZiAoIGJvb3RfY3B1
X2hhcyhYODZfRkVBVFVSRV9TUkJEU19DVFJMKSApCisgICAgICAgIHdybXNy
bChNU1JfTUNVX09QVF9DVFJMLCBkZWZhdWx0X3hlbl9tY3Vfb3B0X2N0cmwp
OwogfQogCiBzdGF0aWMgdm9pZCBfX2luaXQgX19tYXliZV91bnVzZWQgYnVp
bGRfYXNzZXJ0aW9ucyh2b2lkKQpkaWZmIC0tZ2l0IGEveGVuL2luY2x1ZGUv
YXNtLXg4Ni9zcGVjX2N0cmwuaCBiL3hlbi9pbmNsdWRlL2FzbS14ODYvc3Bl
Y19jdHJsLmgKaW5kZXggOWNhZWNkZGZlYy4uYjI1MmJiODYzMSAxMDA2NDQK
LS0tIGEveGVuL2luY2x1ZGUvYXNtLXg4Ni9zcGVjX2N0cmwuaAorKysgYi94
ZW4vaW5jbHVkZS9hc20teDg2L3NwZWNfY3RybC5oCkBAIC01NCw2ICs1NCw4
IEBAIGV4dGVybiBpbnQ4X3Qgb3B0X3B2X2wxdGZfaHdkb20sIG9wdF9wdl9s
MXRmX2RvbXU7CiAgKi8KIGV4dGVybiBwYWRkcl90IGwxdGZfYWRkcl9tYXNr
LCBsMXRmX3NhZmVfbWFkZHI7CiAKK2V4dGVybiB1aW50NjRfdCBkZWZhdWx0
X3hlbl9tY3Vfb3B0X2N0cmw7CisKIHN0YXRpYyBpbmxpbmUgdm9pZCBpbml0
X3NoYWRvd19zcGVjX2N0cmxfc3RhdGUodm9pZCkKIHsKICAgICBzdHJ1Y3Qg
Y3B1X2luZm8gKmluZm8gPSBnZXRfY3B1X2luZm8oKTsK

--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-3.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.9-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.9-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.9-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.9-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.9-3.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.9-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.10-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.10-1.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L3NwZWMtY3RybDogQ1BVSUQvTVNSIGRlZmluaXRp
b25zIGZvciBTcGVjaWFsIFJlZ2lzdGVyIEJ1ZmZlciBEYXRhIFNhbXBsaW5n
CgpUaGlzIGlzIHBhcnQgb2YgWFNBLTMyMCAvIENWRS0yMDIwLTA1NDMKClNp
Z25lZC1vZmYtYnk6IEFuZHJldyBDb29wZXIgPGFuZHJldy5jb29wZXIzQGNp
dHJpeC5jb20+ClJldmlld2VkLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hA
c3VzZS5jb20+CkFja2VkLWJ5OiBXZWkgTGl1IDx3bEB4ZW4ub3JnPgoKZGlm
ZiAtLWdpdCBhL2RvY3MvbWlzYy94ZW4tY29tbWFuZC1saW5lLm1hcmtkb3du
IGIvZG9jcy9taXNjL3hlbi1jb21tYW5kLWxpbmUubWFya2Rvd24KaW5kZXgg
MWYwOGRkZTE4Ni4uYWIyNmEyNjM4MSAxMDA2NDQKLS0tIGEvZG9jcy9taXNj
L3hlbi1jb21tYW5kLWxpbmUubWFya2Rvd24KKysrIGIvZG9jcy9taXNjL3hl
bi1jb21tYW5kLWxpbmUubWFya2Rvd24KQEAgLTQ5NiwxMCArNDk2LDEwIEBA
IGFjY291bnRpbmcgZm9yIGhhcmR3YXJlIGNhcGFiaWxpdGllcyBhcyBlbnVt
ZXJhdGVkIHZpYSBDUFVJRC4KIAogQ3VycmVudGx5IGFjY2VwdGVkOgogCi1U
aGUgU3BlY3VsYXRpb24gQ29udHJvbCBoYXJkd2FyZSBmZWF0dXJlcyBgbWQt
Y2xlYXJgLCBgaWJyc2JgLCBgc3RpYnBgLCBgaWJwYmAsCi1gbDFkLWZsdXNo
YCBhbmQgYHNzYmRgIGFyZSB1c2VkIGJ5IGRlZmF1bHQgaWYgYXZhaWxhYmxl
IGFuZCBhcHBsaWNhYmxlLiAgVGhleSBjYW4KLWJlIGlnbm9yZWQsIGUuZy4g
YG5vLWlicnNiYCwgYXQgd2hpY2ggcG9pbnQgWGVuIHdvbid0IHVzZSB0aGVt
IGl0c2VsZiwgYW5kCi13b24ndCBvZmZlciB0aGVtIHRvIGd1ZXN0cy4KK1Ro
ZSBTcGVjdWxhdGlvbiBDb250cm9sIGhhcmR3YXJlIGZlYXR1cmVzIGBzcmJk
cy1jdHJsYCwgYG1kLWNsZWFyYCwgYGlicnNiYCwKK2BzdGlicGAsIGBpYnBi
YCwgYGwxZC1mbHVzaGAgYW5kIGBzc2JkYCBhcmUgdXNlZCBieSBkZWZhdWx0
IGlmIGF2YWlsYWJsZSBhbmQKK2FwcGxpY2FibGUuICBUaGV5IGNhbiBiZSBp
Z25vcmVkLCBlLmcuIGBuby1pYnJzYmAsIGF0IHdoaWNoIHBvaW50IFhlbiB3
b24ndAordXNlIHRoZW0gaXRzZWxmLCBhbmQgd29uJ3Qgb2ZmZXIgdGhlbSB0
byBndWVzdHMuCiAKICMjIyBjcHVpZFxfbWFza1xfY3B1IChBTUQgb25seSkK
ID4gYD0gZmFtXzBmX3Jldl9jIHwgZmFtXzBmX3Jldl9kIHwgZmFtXzBmX3Jl
dl9lIHwgZmFtXzBmX3Jldl9mIHwgZmFtXzBmX3Jldl9nIHwgZmFtXzEwX3Jl
dl9iIHwgZmFtXzEwX3Jldl9jIHwgZmFtXzExX3Jldl9iYApkaWZmIC0tZ2l0
IGEvdG9vbHMvbGlieGwvbGlieGxfY3B1aWQuYyBiL3Rvb2xzL2xpYnhsL2xp
YnhsX2NwdWlkLmMKaW5kZXggNWExNzAyZDcwMy4uMTIzNWM4YjkxZSAxMDA2
NDQKLS0tIGEvdG9vbHMvbGlieGwvbGlieGxfY3B1aWQuYworKysgYi90b29s
cy9saWJ4bC9saWJ4bF9jcHVpZC5jCkBAIC0yMDIsNiArMjAyLDcgQEAgaW50
IGxpYnhsX2NwdWlkX3BhcnNlX2NvbmZpZyhsaWJ4bF9jcHVpZF9wb2xpY3lf
bGlzdCAqY3B1aWQsIGNvbnN0IGNoYXIqIHN0cikKIAogICAgICAgICB7ImF2
eDUxMi00dm5uaXciLDB4MDAwMDAwMDcsICAwLCBDUFVJRF9SRUdfRURYLCAg
MiwgIDF9LAogICAgICAgICB7ImF2eDUxMi00Zm1hcHMiLDB4MDAwMDAwMDcs
ICAwLCBDUFVJRF9SRUdfRURYLCAgMywgIDF9LAorICAgICAgICB7InNyYmRz
LWN0cmwiLCAgIDB4MDAwMDAwMDcsICAwLCBDUFVJRF9SRUdfRURYLCAgOSwg
IDF9LAogICAgICAgICB7Im1kLWNsZWFyIiwgICAgIDB4MDAwMDAwMDcsICAw
LCBDUFVJRF9SRUdfRURYLCAxMCwgIDF9LAogICAgICAgICB7ImlicnNiIiwg
ICAgICAgIDB4MDAwMDAwMDcsICAwLCBDUFVJRF9SRUdfRURYLCAyNiwgIDF9
LAogICAgICAgICB7InN0aWJwIiwgICAgICAgIDB4MDAwMDAwMDcsICAwLCBD
UFVJRF9SRUdfRURYLCAyNywgIDF9LApkaWZmIC0tZ2l0IGEvdG9vbHMvbWlz
Yy94ZW4tY3B1aWQuYyBiL3Rvb2xzL21pc2MveGVuLWNwdWlkLmMKaW5kZXgg
ODlkNTBlMDQ4Yy4uN2Y5NjEyZjBhOSAxMDA2NDQKLS0tIGEvdG9vbHMvbWlz
Yy94ZW4tY3B1aWQuYworKysgYi90b29scy9taXNjL3hlbi1jcHVpZC5jCkBA
IC0xNjIsOCArMTYyLDkgQEAgc3RhdGljIGNvbnN0IGNoYXIgKnN0cl83ZDBb
MzJdID0KIAogICAgIFsgMl0gPSAiYXZ4NTEyXzR2bm5pdyIsIFsgM10gPSAi
YXZ4NTEyXzRmbWFwcyIsCiAKLSAgICBbNCAuLi4gOV0gPSAiUkVaIiwKKyAg
ICBbNCAuLi4gN10gPSAiUkVaIiwKIAorICAgIFsgOF0gPSAiUkVaIiwgICAg
ICAgICAgIFsgOV0gPSAic3JiZHMtY3RybCIsCiAgICAgWzEwXSA9ICJtZC1j
bGVhciIsICAgICAgWzExXSA9ICJSRVoiLAogICAgIFsxMl0gPSAiUkVaIiwg
ICAgICAgICAgIFsxM10gPSAidHN4LWZvcmNlLWFib3J0IiwKIApkaWZmIC0t
Z2l0IGEveGVuL2FyY2gveDg2L2NwdWlkLmMgYi94ZW4vYXJjaC94ODYvY3B1
aWQuYwppbmRleCBlOTQzZDcwYmNhLi42N2EyYTJlNmEwIDEwMDY0NAotLS0g
YS94ZW4vYXJjaC94ODYvY3B1aWQuYworKysgYi94ZW4vYXJjaC94ODYvY3B1
aWQuYwpAQCAtNTgsNiArNTgsMTEgQEAgc3RhdGljIGludCBfX2luaXQgcGFy
c2VfeGVuX2NwdWlkKGNvbnN0IGNoYXIgKnMpCiAgICAgICAgICAgICBpZiAo
ICF2YWwgKQogICAgICAgICAgICAgICAgIHNldHVwX2NsZWFyX2NwdV9jYXAo
WDg2X0ZFQVRVUkVfU1NCRCk7CiAgICAgICAgIH0KKyAgICAgICAgZWxzZSBp
ZiAoICh2YWwgPSBwYXJzZV9ib29sZWFuKCJzcmJkcy1jdHJsIiwgcywgc3Mp
KSA+PSAwICkKKyAgICAgICAgeworICAgICAgICAgICAgaWYgKCAhdmFsICkK
KyAgICAgICAgICAgICAgICBzZXR1cF9jbGVhcl9jcHVfY2FwKFg4Nl9GRUFU
VVJFX1NSQkRTX0NUUkwpOworICAgICAgICB9CiAgICAgICAgIGVsc2UKICAg
ICAgICAgICAgIHJjID0gLUVJTlZBTDsKIApkaWZmIC0tZ2l0IGEveGVuL2Fy
Y2gveDg2L21zci5jIGIveGVuL2FyY2gveDg2L21zci5jCmluZGV4IDZjZWVh
OTEzZmIuLjkwNTYxYTUzOTIgMTAwNjQ0Ci0tLSBhL3hlbi9hcmNoL3g4Ni9t
c3IuYworKysgYi94ZW4vYXJjaC94ODYvbXNyLmMKQEAgLTEzNSw2ICsxMzUs
NyBAQCBpbnQgZ3Vlc3RfcmRtc3IoY29uc3Qgc3RydWN0IHZjcHUgKnYsIHVp
bnQzMl90IG1zciwgdWludDY0X3QgKnZhbCkKICAgICAgICAgLyogV3JpdGUt
b25seSAqLwogICAgIGNhc2UgTVNSX1RTWF9GT1JDRV9BQk9SVDoKICAgICBj
YXNlIE1TUl9UU1hfQ1RSTDoKKyAgICBjYXNlIE1TUl9NQ1VfT1BUX0NUUkw6
CiAgICAgICAgIC8qIE5vdCBvZmZlcmVkIHRvIGd1ZXN0cy4gKi8KICAgICAg
ICAgZ290byBncF9mYXVsdDsKIApAQCAtMTk0LDYgKzE5NSw3IEBAIGludCBn
dWVzdF93cm1zcihzdHJ1Y3QgdmNwdSAqdiwgdWludDMyX3QgbXNyLCB1aW50
NjRfdCB2YWwpCiAgICAgICAgIC8qIFJlYWQtb25seSAqLwogICAgIGNhc2Ug
TVNSX1RTWF9GT1JDRV9BQk9SVDoKICAgICBjYXNlIE1TUl9UU1hfQ1RSTDoK
KyAgICBjYXNlIE1TUl9NQ1VfT1BUX0NUUkw6CiAgICAgICAgIC8qIE5vdCBv
ZmZlcmVkIHRvIGd1ZXN0cy4gKi8KICAgICAgICAgZ290byBncF9mYXVsdDsK
IApkaWZmIC0tZ2l0IGEveGVuL2FyY2gveDg2L3NwZWNfY3RybC5jIGIveGVu
L2FyY2gveDg2L3NwZWNfY3RybC5jCmluZGV4IDBmMzAzNjIxMTEuLmI3NzMz
YjM0ZjYgMTAwNjQ0Ci0tLSBhL3hlbi9hcmNoL3g4Ni9zcGVjX2N0cmwuYwor
KysgYi94ZW4vYXJjaC94ODYvc3BlY19jdHJsLmMKQEAgLTM0OSwxMiArMzQ5
LDEzIEBAIHN0YXRpYyB2b2lkIF9faW5pdCBwcmludF9kZXRhaWxzKGVudW0g
aW5kX3RodW5rIHRodW5rLCB1aW50NjRfdCBjYXBzKQogICAgIHByaW50aygi
U3BlY3VsYXRpdmUgbWl0aWdhdGlvbiBmYWNpbGl0aWVzOlxuIik7CiAKICAg
ICAvKiBIYXJkd2FyZSBmZWF0dXJlcyB3aGljaCBwZXJ0YWluIHRvIHNwZWN1
bGF0aXZlIG1pdGlnYXRpb25zLiAqLwotICAgIHByaW50aygiICBIYXJkd2Fy
ZSBmZWF0dXJlczolcyVzJXMlcyVzJXMlcyVzJXMlcyVzJXMlcyVzXG4iLAor
ICAgIHByaW50aygiICBIYXJkd2FyZSBmZWF0dXJlczolcyVzJXMlcyVzJXMl
cyVzJXMlcyVzJXMlcyVzJXNcbiIsCiAgICAgICAgICAgIChfN2QwICYgY3B1
ZmVhdF9tYXNrKFg4Nl9GRUFUVVJFX0lCUlNCKSkgPyAiIElCUlMvSUJQQiIg
OiAiIiwKICAgICAgICAgICAgKF83ZDAgJiBjcHVmZWF0X21hc2soWDg2X0ZF
QVRVUkVfU1RJQlApKSA/ICIgU1RJQlAiICAgICA6ICIiLAogICAgICAgICAg
ICAoXzdkMCAmIGNwdWZlYXRfbWFzayhYODZfRkVBVFVSRV9MMURfRkxVU0gp
KSA/ICIgTDFEX0ZMVVNIIiA6ICIiLAogICAgICAgICAgICAoXzdkMCAmIGNw
dWZlYXRfbWFzayhYODZfRkVBVFVSRV9TU0JEKSkgID8gIiBTU0JEIiAgICAg
IDogIiIsCiAgICAgICAgICAgIChfN2QwICYgY3B1ZmVhdF9tYXNrKFg4Nl9G
RUFUVVJFX01EX0NMRUFSKSkgPyAiIE1EX0NMRUFSIiA6ICIiLAorICAgICAg
ICAgICAoXzdkMCAmIGNwdWZlYXRfbWFzayhYODZfRkVBVFVSRV9TUkJEU19D
VFJMKSkgPyAiIFNSQkRTX0NUUkwiIDogIiIsCiAgICAgICAgICAgIChlOGIg
ICYgY3B1ZmVhdF9tYXNrKFg4Nl9GRUFUVVJFX0lCUEIpKSAgPyAiIElCUEIi
ICAgICAgOiAiIiwKICAgICAgICAgICAgKGNhcHMgJiBBUkNIX0NBUFNfSUJS
U19BTEwpICAgICAgICAgICAgICA/ICIgSUJSU19BTEwiICA6ICIiLAogICAg
ICAgICAgICAoY2FwcyAmIEFSQ0hfQ0FQU19SRENMX05PKSAgICAgICAgICAg
ICAgID8gIiBSRENMX05PIiAgIDogIiIsCmRpZmYgLS1naXQgYS94ZW4vaW5j
bHVkZS9hc20teDg2L21zci1pbmRleC5oIGIveGVuL2luY2x1ZGUvYXNtLXg4
Ni9tc3ItaW5kZXguaAppbmRleCA1ZWY4MDczNWIyLi5kMTQzNWRiNmEzIDEw
MDY0NAotLS0gYS94ZW4vaW5jbHVkZS9hc20teDg2L21zci1pbmRleC5oCisr
KyBiL3hlbi9pbmNsdWRlL2FzbS14ODYvbXNyLWluZGV4LmgKQEAgLTE3Nyw2
ICsxNzcsOSBAQAogI2RlZmluZSBNU1JfSUEzMl9WTVhfVFJVRV9FTlRSWV9D
VExTICAgICAgICAgICAgMHg0OTAKICNkZWZpbmUgTVNSX0lBMzJfVk1YX1ZN
RlVOQyAgICAgICAgICAgICAgICAgICAgIDB4NDkxCiAKKyNkZWZpbmUgTVNS
X01DVV9PUFRfQ1RSTCAgICAgICAgICAgICAgICAgICAgMHgwMDAwMDEyMwor
I2RlZmluZSAgTUNVX09QVF9DVFJMX1JOR0RTX01JVEdfRElTICAgICAgICAo
X0FDKDEsIFVMTCkgPDwgIDApCisKIC8qIEs3L0s4IE1TUnMuIE5vdCBjb21w
bGV0ZS4gU2VlIHRoZSBhcmNoaXRlY3R1cmUgbWFudWFsIGZvciBhIG1vcmUK
ICAgIGNvbXBsZXRlIGxpc3QuICovCiAjZGVmaW5lIE1TUl9LN19FVk5UU0VM
MAkJCTB4YzAwMTAwMDAKZGlmZiAtLWdpdCBhL3hlbi9pbmNsdWRlL3B1Ymxp
Yy9hcmNoLXg4Ni9jcHVmZWF0dXJlc2V0LmggYi94ZW4vaW5jbHVkZS9wdWJs
aWMvYXJjaC14ODYvY3B1ZmVhdHVyZXNldC5oCmluZGV4IGExNGQ4YTcwMTMu
LjlkMjEwZTc0YTAgMTAwNjQ0Ci0tLSBhL3hlbi9pbmNsdWRlL3B1YmxpYy9h
cmNoLXg4Ni9jcHVmZWF0dXJlc2V0LmgKKysrIGIveGVuL2luY2x1ZGUvcHVi
bGljL2FyY2gteDg2L2NwdWZlYXR1cmVzZXQuaApAQCAtMjQyLDYgKzI0Miw3
IEBAIFhFTl9DUFVGRUFUVVJFKElCUEIsICAgICAgICAgIDgqMzIrMTIpIC8q
QSAgSUJQQiBzdXBwb3J0IG9ubHkgKG5vIElCUlMsIHVzZWQgYnkKIC8qIElu
dGVsLWRlZmluZWQgQ1BVIGZlYXR1cmVzLCBDUFVJRCBsZXZlbCAweDAwMDAw
MDA3OjAuZWR4LCB3b3JkIDkgKi8KIFhFTl9DUFVGRUFUVVJFKEFWWDUxMl80
Vk5OSVcsIDkqMzIrIDIpIC8qQSAgQVZYNTEyIE5ldXJhbCBOZXR3b3JrIElu
c3RydWN0aW9ucyAqLwogWEVOX0NQVUZFQVRVUkUoQVZYNTEyXzRGTUFQUywg
OSozMisgMykgLypBICBBVlg1MTIgTXVsdGlwbHkgQWNjdW11bGF0aW9uIFNp
bmdsZSBQcmVjaXNpb24gKi8KK1hFTl9DUFVGRUFUVVJFKFNSQkRTX0NUUkws
ICAgIDkqMzIrIDkpIC8qICAgTVNSX01DVV9PUFRfQ1RSTCBhbmQgUk5HRFNf
TUlUR19ESVMuICovCiBYRU5fQ1BVRkVBVFVSRShNRF9DTEVBUiwgICAgICA5
KjMyKzEwKSAvKkEgIFZFUlcgY2xlYXJzIG1pY3JvYXJjaGl0ZWN0dXJhbCBi
dWZmZXJzICovCiBYRU5fQ1BVRkVBVFVSRShUU1hfRk9SQ0VfQUJPUlQsIDkq
MzIrMTMpIC8qIE1TUl9UU1hfRk9SQ0VfQUJPUlQuUlRNX0FCT1JUICovCiBY
RU5fQ1BVRkVBVFVSRShJQlJTQiwgICAgICAgICA5KjMyKzI2KSAvKkEgIElC
UlMgYW5kIElCUEIgc3VwcG9ydCAodXNlZCBieSBJbnRlbCkgKi8K

--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.10-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.10-2.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L3NwZWMtY3RybDogTWl0aWdhdGUgdGhlIFNwZWNp
YWwgUmVnaXN0ZXIgQnVmZmVyIERhdGEgU2FtcGxpbmcgc2lkZWNoYW5uZWwK
ClNlZSBwYXRjaCBkb2N1bWVudGF0aW9uIGFuZCBjb21tZW50cy4KClRoaXMg
aXMgcGFydCBvZiBYU0EtMzIwIC8gQ1ZFLTIwMjAtMDU0MwoKU2lnbmVkLW9m
Zi1ieTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KUmV2aWV3ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNv
bT4KCmRpZmYgLS1naXQgYS9kb2NzL21pc2MveGVuLWNvbW1hbmQtbGluZS5t
YXJrZG93biBiL2RvY3MvbWlzYy94ZW4tY29tbWFuZC1saW5lLm1hcmtkb3du
CmluZGV4IGFiMjZhMjYzODEuLmI5NmY5M2M5NWUgMTAwNjQ0Ci0tLSBhL2Rv
Y3MvbWlzYy94ZW4tY29tbWFuZC1saW5lLm1hcmtkb3duCisrKyBiL2RvY3Mv
bWlzYy94ZW4tY29tbWFuZC1saW5lLm1hcmtkb3duCkBAIC0xODA5LDcgKzE4
MDksNyBAQCBmYWxzZSBkaXNhYmxlIHRoZSBxdWlyayB3b3JrYXJvdW5kLCB3
aGljaCBpcyBhbHNvIHRoZSBkZWZhdWx0LgogIyMjIHNwZWMtY3RybCAoeDg2
KQogPiBgPSBMaXN0IG9mIFsgPGJvb2w+LCB4ZW49PGJvb2w+LCB7cHYsaHZt
LG1zci1zYyxyc2IsbWQtY2xlYXJ9PTxib29sPiwKID4gICAgICAgICAgICAg
IGJ0aS10aHVuaz1yZXRwb2xpbmV8bGZlbmNlfGptcCwge2licnMsaWJwYixz
c2JkLGVhZ2VyLWZwdSwKLT4gICAgICAgICAgICAgIGwxZC1mbHVzaH09PGJv
b2w+IF1gCis+ICAgICAgICAgICAgICBsMWQtZmx1c2gsc3JiLWxvY2t9PTxi
b29sPiBdYAogCiBDb250cm9scyBmb3Igc3BlY3VsYXRpdmUgZXhlY3V0aW9u
IHNpZGVjaGFubmVsIG1pdGlnYXRpb25zLiAgQnkgZGVmYXVsdCwgWGVuCiB3
aWxsIHBpY2sgdGhlIG1vc3QgYXBwcm9wcmlhdGUgbWl0aWdhdGlvbnMgYmFz
ZWQgb24gY29tcGlsZWQgaW4gc3VwcG9ydCwKQEAgLTE4ODEsNiArMTg4MSwx
MiBAQCBJcnJlc3BlY3RpdmUgb2YgWGVuJ3Mgc2V0dGluZywgdGhlIGZlYXR1
cmUgaXMgdmlydHVhbGlzZWQgZm9yIEhWTSBndWVzdHMgdG8KIHVzZS4gIEJ5
IGRlZmF1bHQsIFhlbiB3aWxsIGVuYWJsZSB0aGlzIG1pdGlnYXRpb24gb24g
aGFyZHdhcmUgYmVsaWV2ZWQgdG8gYmUKIHZ1bG5lcmFibGUgdG8gTDFURi4K
IAorT24gaGFyZHdhcmUgc3VwcG9ydGluZyBTUkJEU19DVFJMLCB0aGUgYHNy
Yi1sb2NrPWAgb3B0aW9uIGNhbiBiZSB1c2VkIHRvIGZvcmNlCitvciBwcmV2
ZW50IFhlbiBmcm9tIHByb3RlY3QgdGhlIFNwZWNpYWwgUmVnaXN0ZXIgQnVm
ZmVyIGZyb20gbGVha2luZyBzdGFsZQorZGF0YS4gQnkgZGVmYXVsdCwgWGVu
IHdpbGwgZW5hYmxlIHRoaXMgbWl0aWdhdGlvbiwgZXhjZXB0IG9uIHBhcnRz
IHdoZXJlIE1EUworaXMgZml4ZWQgYW5kIFRBQSBpcyBmaXhlZC9taXRpZ2F0
ZWQgKGluIHdoaWNoIGNhc2UsIHRoZXJlIGlzIGJlbGlldmVkIHRvIGJlIG5v
Cit3YXkgZm9yIGFuIGF0dGFja2VyIHRvIG9idGFpbiB0aGUgc3RhbGUgZGF0
YSkuCisKICMjIyBzeW5jXF9jb25zb2xlCiA+IGA9IDxib29sZWFuPmAKIApk
aWZmIC0tZ2l0IGEveGVuL2FyY2gveDg2L2FjcGkvcG93ZXIuYyBiL3hlbi9h
cmNoL3g4Ni9hY3BpL3Bvd2VyLmMKaW5kZXggZjM0ODBhYTgwMC4uNGQ3MmI2
Y2U5NyAxMDA2NDQKLS0tIGEveGVuL2FyY2gveDg2L2FjcGkvcG93ZXIuYwor
KysgYi94ZW4vYXJjaC94ODYvYWNwaS9wb3dlci5jCkBAIC0yNTksNiArMjU5
LDkgQEAgc3RhdGljIGludCBlbnRlcl9zdGF0ZSh1MzIgc3RhdGUpCiAgICAg
Y2ktPnNwZWNfY3RybF9mbGFncyB8PSAoZGVmYXVsdF9zcGVjX2N0cmxfZmxh
Z3MgJiBTQ0ZfaXN0X3dybXNyKTsKICAgICBzcGVjX2N0cmxfZXhpdF9pZGxl
KGNpKTsKIAorICAgIGlmICggYm9vdF9jcHVfaGFzKFg4Nl9GRUFUVVJFX1NS
QkRTX0NUUkwpICkKKyAgICAgICAgd3Jtc3JsKE1TUl9NQ1VfT1BUX0NUUkws
IGRlZmF1bHRfeGVuX21jdV9vcHRfY3RybCk7CisKICBkb25lOgogICAgIHNw
aW5fZGVidWdfZW5hYmxlKCk7CiAgICAgbG9jYWxfaXJxX3Jlc3RvcmUoZmxh
Z3MpOwpkaWZmIC0tZ2l0IGEveGVuL2FyY2gveDg2L3NtcGJvb3QuYyBiL3hl
bi9hcmNoL3g4Ni9zbXBib290LmMKaW5kZXggY2RmNTNhZmMxZS4uYjRhMDlm
MmRjMiAxMDA2NDQKLS0tIGEveGVuL2FyY2gveDg2L3NtcGJvb3QuYworKysg
Yi94ZW4vYXJjaC94ODYvc21wYm9vdC5jCkBAIC0zNjMsMTIgKzM2MywxNCBA
QCB2b2lkIHN0YXJ0X3NlY29uZGFyeSh2b2lkICp1bnVzZWQpCiAgICAgICAg
IG1pY3JvY29kZV9yZXN1bWVfY3B1KGNwdSk7CiAKICAgICAvKgotICAgICAq
IElmIE1TUl9TUEVDX0NUUkwgaXMgYXZhaWxhYmxlLCBhcHBseSBYZW4ncyBk
ZWZhdWx0IHNldHRpbmcgYW5kIGRpc2NhcmQKLSAgICAgKiBhbnkgZmlybXdh
cmUgc2V0dGluZ3MuICBOb3RlOiBNU1JfU1BFQ19DVFJMIG1heSBvbmx5IGJl
Y29tZSBhdmFpbGFibGUKLSAgICAgKiBhZnRlciBsb2FkaW5nIG1pY3JvY29k
ZS4KKyAgICAgKiBJZiBhbnkgc3BlY3VsYXRpdmUgY29udHJvbCBNU1JzIGFy
ZSBhdmFpbGFibGUsIGFwcGx5IFhlbidzIGRlZmF1bHQKKyAgICAgKiBzZXR0
aW5ncy4gIE5vdGU6IFRoZXNlIE1TUnMgbWF5IG9ubHkgYmVjb21lIGF2YWls
YWJsZSBhZnRlciBsb2FkaW5nCisgICAgICogbWljcm9jb2RlLgogICAgICAq
LwogICAgIGlmICggYm9vdF9jcHVfaGFzKFg4Nl9GRUFUVVJFX0lCUlNCKSAp
CiAgICAgICAgIHdybXNybChNU1JfU1BFQ19DVFJMLCBkZWZhdWx0X3hlbl9z
cGVjX2N0cmwpOworICAgIGlmICggYm9vdF9jcHVfaGFzKFg4Nl9GRUFUVVJF
X1NSQkRTX0NUUkwpICkKKyAgICAgICAgd3Jtc3JsKE1TUl9NQ1VfT1BUX0NU
UkwsIGRlZmF1bHRfeGVuX21jdV9vcHRfY3RybCk7CiAKICAgICB0c3hfaW5p
dCgpOyAvKiBOZWVkcyBtaWNyb2NvZGUuICBNYXkgY2hhbmdlIEhMRS9SVE0g
ZmVhdHVyZSBiaXRzLiAqLwogCmRpZmYgLS1naXQgYS94ZW4vYXJjaC94ODYv
c3BlY19jdHJsLmMgYi94ZW4vYXJjaC94ODYvc3BlY19jdHJsLmMKaW5kZXgg
Yjc3MzNiMzRmNi4uY2MwOTQ2Yjk2MyAxMDA2NDQKLS0tIGEveGVuL2FyY2gv
eDg2L3NwZWNfY3RybC5jCisrKyBiL3hlbi9hcmNoL3g4Ni9zcGVjX2N0cmwu
YwpAQCAtNjMsNiArNjMsOSBAQCBzdGF0aWMgdW5zaWduZWQgaW50IF9faW5p
dGRhdGEgbDFkX21heHBoeXNhZGRyOwogc3RhdGljIGJvb2wgX19pbml0ZGF0
YSBjcHVfaGFzX2J1Z19tc2Jkc19vbmx5OyAvKiA9PiBtaW5pbWFsIEhUIGlt
cGFjdC4gKi8KIHN0YXRpYyBib29sIF9faW5pdGRhdGEgY3B1X2hhc19idWdf
bWRzOyAvKiBBbnkgb3RoZXIgTXtMUCxTQixGQn1EUyBjb21iaW5hdGlvbi4g
Ki8KIAorc3RhdGljIGludDhfdCBfX2luaXRkYXRhIG9wdF9zcmJfbG9jayA9
IC0xOwordWludDY0X3QgX19yZWFkX21vc3RseSBkZWZhdWx0X3hlbl9tY3Vf
b3B0X2N0cmw7CisKIHN0YXRpYyBpbnQgX19pbml0IHBhcnNlX2J0aShjb25z
dCBjaGFyICpzKQogewogICAgIGNvbnN0IGNoYXIgKnNzOwpAQCAtMTUwLDYg
KzE1Myw3IEBAIHN0YXRpYyBpbnQgX19pbml0IHBhcnNlX3NwZWNfY3RybChj
b25zdCBjaGFyICpzKQogICAgICAgICAgICAgb3B0X2licGIgPSBmYWxzZTsK
ICAgICAgICAgICAgIG9wdF9zc2JkID0gZmFsc2U7CiAgICAgICAgICAgICBv
cHRfbDFkX2ZsdXNoID0gMDsKKyAgICAgICAgICAgIG9wdF9zcmJfbG9jayA9
IDA7CiAgICAgICAgIH0KICAgICAgICAgZWxzZSBpZiAoIHZhbCA+IDAgKQog
ICAgICAgICAgICAgcmMgPSAtRUlOVkFMOwpAQCAtMjE1LDYgKzIxOSw4IEBA
IHN0YXRpYyBpbnQgX19pbml0IHBhcnNlX3NwZWNfY3RybChjb25zdCBjaGFy
ICpzKQogICAgICAgICAgICAgb3B0X2VhZ2VyX2ZwdSA9IHZhbDsKICAgICAg
ICAgZWxzZSBpZiAoICh2YWwgPSBwYXJzZV9ib29sZWFuKCJsMWQtZmx1c2gi
LCBzLCBzcykpID49IDAgKQogICAgICAgICAgICAgb3B0X2wxZF9mbHVzaCA9
IHZhbDsKKyAgICAgICAgZWxzZSBpZiAoICh2YWwgPSBwYXJzZV9ib29sZWFu
KCJzcmItbG9jayIsIHMsIHNzKSkgPj0gMCApCisgICAgICAgICAgICBvcHRf
c3JiX2xvY2sgPSB2YWw7CiAgICAgICAgIGVsc2UKICAgICAgICAgICAgIHJj
ID0gLUVJTlZBTDsKIApAQCAtMzc4LDcgKzM4NCw3IEBAIHN0YXRpYyB2b2lk
IF9faW5pdCBwcmludF9kZXRhaWxzKGVudW0gaW5kX3RodW5rIHRodW5rLCB1
aW50NjRfdCBjYXBzKQogICAgICAgICAgICAgICAgIlxuIik7CiAKICAgICAv
KiBTZXR0aW5ncyBmb3IgWGVuJ3MgcHJvdGVjdGlvbiwgaXJyZXNwZWN0aXZl
IG9mIGd1ZXN0cy4gKi8KLSAgICBwcmludGsoIiAgWGVuIHNldHRpbmdzOiBC
VEktVGh1bmsgJXMsIFNQRUNfQ1RSTDogJXMlcyVzLCBPdGhlcjolcyVzJXNc
biIsCisgICAgcHJpbnRrKCIgIFhlbiBzZXR0aW5nczogQlRJLVRodW5rICVz
LCBTUEVDX0NUUkw6ICVzJXMlcywgT3RoZXI6JXMlcyVzJXNcbiIsCiAgICAg
ICAgICAgIHRodW5rID09IFRIVU5LX05PTkUgICAgICA/ICJOL0EiIDoKICAg
ICAgICAgICAgdGh1bmsgPT0gVEhVTktfUkVUUE9MSU5FID8gIlJFVFBPTElO
RSIgOgogICAgICAgICAgICB0aHVuayA9PSBUSFVOS19MRkVOQ0UgICAgPyAi
TEZFTkNFIiA6CkBAIC0zODksNiArMzk1LDggQEAgc3RhdGljIHZvaWQgX19p
bml0IHByaW50X2RldGFpbHMoZW51bSBpbmRfdGh1bmsgdGh1bmssIHVpbnQ2
NF90IGNhcHMpCiAgICAgICAgICAgIChkZWZhdWx0X3hlbl9zcGVjX2N0cmwg
JiBTUEVDX0NUUkxfU1NCRCkgID8gIiBTU0JEKyIgOiAiIFNTQkQtIiwKICAg
ICAgICAgICAgIShjYXBzICYgQVJDSF9DQVBTX1RTWF9DVFJMKSAgICAgICAg
ICAgICAgPyAiIiA6CiAgICAgICAgICAgIChvcHRfdHN4ICYgMSkgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgID8gIiBUU1grIiA6ICIgVFNYLSIsCisg
ICAgICAgICAgICFib290X2NwdV9oYXMoWDg2X0ZFQVRVUkVfU1JCRFNfQ1RS
TCkgICAgID8gIiIgOgorICAgICAgICAgICBvcHRfc3JiX2xvY2sgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICA/ICIgU1JCX0xPQ0srIiA6ICIgU1JC
X0xPQ0stIiwKICAgICAgICAgICAgb3B0X2licGIgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgPyAiIElCUEIiICA6ICIiLAogICAgICAgICAg
ICBvcHRfbDFkX2ZsdXNoICAgICAgICAgICAgICAgICAgICAgICAgICAgICA/
ICIgTDFEX0ZMVVNIIiA6ICIiLAogICAgICAgICAgICBvcHRfbWRfY2xlYXJf
cHYgfHwgb3B0X21kX2NsZWFyX2h2bSAgICAgICA/ICIgVkVSVyIgIDogIiIp
OwpAQCAtMTE3Niw2ICsxMTg0LDM0IEBAIHZvaWQgX19pbml0IGluaXRfc3Bl
Y3VsYXRpb25fbWl0aWdhdGlvbnModm9pZCkKICAgICAgICAgdHN4X2luaXQo
KTsKICAgICB9CiAKKyAgICAvKiBDYWxjdWxhdGUgc3VpdGFibGUgZGVmYXVs
dHMgZm9yIE1TUl9NQ1VfT1BUX0NUUkwgKi8KKyAgICBpZiAoIGJvb3RfY3B1
X2hhcyhYODZfRkVBVFVSRV9TUkJEU19DVFJMKSApCisgICAgeworICAgICAg
ICB1aW50NjRfdCB2YWw7CisKKyAgICAgICAgcmRtc3JsKE1TUl9NQ1VfT1BU
X0NUUkwsIHZhbCk7CisKKyAgICAgICAgLyoKKyAgICAgICAgICogT24gc29t
ZSBTUkJEUy1hZmZlY3RlZCBoYXJkd2FyZSwgaXQgbWF5IGJlIHNhZmUgdG8g
cmVsYXggc3JiLWxvY2sKKyAgICAgICAgICogYnkgZGVmYXVsdC4KKyAgICAg
ICAgICoKKyAgICAgICAgICogT24gcGFydHMgd2hpY2ggZW51bWVyYXRlIE1E
U19OTyBhbmQgbm90IFRBQV9OTywgVFNYIGlzIHRoZSBvbmx5IHdheQorICAg
ICAgICAgKiB0byBhY2Nlc3MgdGhlIEZpbGwgQnVmZmVyLiAgSWYgVFNYIGlz
bid0IGF2YWlsYWJsZSAoaW5jLiBTS1UKKyAgICAgICAgICogcmVhc29ucyBv
biBzb21lIG1vZGVscyksIG9yIFRTWCBpcyBleHBsaWNpdGx5IGRpc2FibGVk
LCB0aGVuIHRoZXJlCisgICAgICAgICAqIGlzIG5vIG5lZWQgZm9yIHRoZSBl
eHRyYSBvdmVyaGVhZCB0byBwcm90ZWN0IFJEUkFORC9SRFNFRUQuCisgICAg
ICAgICAqLworICAgICAgICBpZiAoIG9wdF9zcmJfbG9jayA9PSAtMSAmJgor
ICAgICAgICAgICAgIChjYXBzICYgKEFSQ0hfQ0FQU19NRFNfTk98QVJDSF9D
QVBTX1RBQV9OTykpID09IEFSQ0hfQ0FQU19NRFNfTk8gJiYKKyAgICAgICAg
ICAgICAoIWNwdV9oYXNfaGxlIHx8ICgoY2FwcyAmIEFSQ0hfQ0FQU19UU1hf
Q1RSTCkgJiYgb3B0X3RzeCA9PSAwKSkgKQorICAgICAgICAgICAgb3B0X3Ny
Yl9sb2NrID0gMDsKKworICAgICAgICB2YWwgJj0gfk1DVV9PUFRfQ1RSTF9S
TkdEU19NSVRHX0RJUzsKKyAgICAgICAgaWYgKCAhb3B0X3NyYl9sb2NrICkK
KyAgICAgICAgICAgIHZhbCB8PSBNQ1VfT1BUX0NUUkxfUk5HRFNfTUlUR19E
SVM7CisKKyAgICAgICAgZGVmYXVsdF94ZW5fbWN1X29wdF9jdHJsID0gdmFs
OworICAgIH0KKwogICAgIHByaW50X2RldGFpbHModGh1bmssIGNhcHMpOwog
CiAgICAgLyoKQEAgLTEyMDcsNiArMTI0Myw5IEBAIHZvaWQgX19pbml0IGlu
aXRfc3BlY3VsYXRpb25fbWl0aWdhdGlvbnModm9pZCkKIAogICAgICAgICB3
cm1zcmwoTVNSX1NQRUNfQ1RSTCwgYnNwX2RlbGF5X3NwZWNfY3RybCA/IDAg
OiBkZWZhdWx0X3hlbl9zcGVjX2N0cmwpOwogICAgIH0KKworICAgIGlmICgg
Ym9vdF9jcHVfaGFzKFg4Nl9GRUFUVVJFX1NSQkRTX0NUUkwpICkKKyAgICAg
ICAgd3Jtc3JsKE1TUl9NQ1VfT1BUX0NUUkwsIGRlZmF1bHRfeGVuX21jdV9v
cHRfY3RybCk7CiB9CiAKIHN0YXRpYyB2b2lkIF9faW5pdCBfX21heWJlX3Vu
dXNlZCBidWlsZF9hc3NlcnRpb25zKHZvaWQpCmRpZmYgLS1naXQgYS94ZW4v
aW5jbHVkZS9hc20teDg2L3NwZWNfY3RybC5oIGIveGVuL2luY2x1ZGUvYXNt
LXg4Ni9zcGVjX2N0cmwuaAppbmRleCA5OGEwYTUwNGY2Li5kZjg2MmVjNGQw
IDEwMDY0NAotLS0gYS94ZW4vaW5jbHVkZS9hc20teDg2L3NwZWNfY3RybC5o
CisrKyBiL3hlbi9pbmNsdWRlL2FzbS14ODYvc3BlY19jdHJsLmgKQEAgLTQ2
LDYgKzQ2LDggQEAgZXh0ZXJuIGludDhfdCBvcHRfcHZfbDF0Zl9od2RvbSwg
b3B0X3B2X2wxdGZfZG9tdTsKICAqLwogZXh0ZXJuIHBhZGRyX3QgbDF0Zl9h
ZGRyX21hc2ssIGwxdGZfc2FmZV9tYWRkcjsKIAorZXh0ZXJuIHVpbnQ2NF90
IGRlZmF1bHRfeGVuX21jdV9vcHRfY3RybDsKKwogc3RhdGljIGlubGluZSB2
b2lkIGluaXRfc2hhZG93X3NwZWNfY3RybF9zdGF0ZSh2b2lkKQogewogICAg
IHN0cnVjdCBjcHVfaW5mbyAqaW5mbyA9IGdldF9jcHVfaW5mbygpOwo=

--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.10-3.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.10-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.11-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.11-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.11-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.11-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.11-3.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.11-3.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L3NwZWMtY3RybDogQWxsb3cgdGhlIFJEUkFORC9S
RFNFRUQgZmVhdHVyZXMgdG8gYmUgaGlkZGVuCgpSRFJBTkQvUkRTRUVEIGNh
biBiZSBoaWRkZW4gdXNpbmcgY3B1aWQ9IHRvIG1pdGlnYXRlIFNSQkRTIGlm
IG1pY3JvY29kZQppc24ndCBhdmFpbGFibGUuCgpUaGlzIGlzIHBhcnQgb2Yg
WFNBLTMyMCAvIENWRS0yMDIwLTA1NDMuCgpTaWduZWQtb2ZmLWJ5OiBBbmRy
ZXcgQ29vcGVyIDxhbmRyZXcuY29vcGVyM0BjaXRyaXguY29tPgpBY2tlZC1i
eTogSnVsaWVuIEdyYWxsIDxqZ3JhbGxAYW1hem9uLmNvbT4KCmRpZmYgLS1n
aXQgYS9kb2NzL21pc2MveGVuLWNvbW1hbmQtbGluZS5tYXJrZG93biBiL2Rv
Y3MvbWlzYy94ZW4tY29tbWFuZC1saW5lLm1hcmtkb3duCmluZGV4IDMzNTZl
NTlmZWUuLmFjMzk3ZTdkZTAgMTAwNjQ0Ci0tLSBhL2RvY3MvbWlzYy94ZW4t
Y29tbWFuZC1saW5lLm1hcmtkb3duCisrKyBiL2RvY3MvbWlzYy94ZW4tY29t
bWFuZC1saW5lLm1hcmtkb3duCkBAIC00ODcsMTIgKzQ4NywxOCBAQCBjaG9p
Y2Ugb2YgYGRvbTAta2VybmVsYCBpcyBkZXByZWNhdGVkIGFuZCBub3Qgc3Vw
cG9ydGVkIGJ5IGFsbCBEb20wIGtlcm5lbHMuCiBUaGlzIG9wdGlvbiBhbGxv
d3MgZm9yIGZpbmUgdHVuaW5nIG9mIHRoZSBmYWNpbGl0aWVzIFhlbiB3aWxs
IHVzZSwgYWZ0ZXIKIGFjY291bnRpbmcgZm9yIGhhcmR3YXJlIGNhcGFiaWxp
dGllcyBhcyBlbnVtZXJhdGVkIHZpYSBDUFVJRC4KIAorVW5sZXNzIG90aGVy
d2lzZSBub3RlZCwgb3B0aW9ucyBvbmx5IGhhdmUgYW55IGVmZmVjdCBpbiB0
aGVpciBuZWdhdGl2ZSBmb3JtLAordG8gaGlkZSB0aGUgbmFtZWQgZmVhdHVy
ZShzKS4gIElnbm9yaW5nIGEgZmVhdHVyZSB1c2luZyB0aGlzIG1lY2hhbmlz
bSB3aWxsCitjYXVzZSBYZW4gbm90IHRvIHVzZSB0aGUgZmVhdHVyZSwgbm9y
IG9mZmVyIHRoZW0gYXMgdXNhYmxlIHRvIGd1ZXN0cy4KKwogQ3VycmVudGx5
IGFjY2VwdGVkOgogCiBUaGUgU3BlY3VsYXRpb24gQ29udHJvbCBoYXJkd2Fy
ZSBmZWF0dXJlcyBgc3JiZHMtY3RybGAsIGBtZC1jbGVhcmAsIGBpYnJzYmAs
CiBgc3RpYnBgLCBgaWJwYmAsIGBsMWQtZmx1c2hgIGFuZCBgc3NiZGAgYXJl
IHVzZWQgYnkgZGVmYXVsdCBpZiBhdmFpbGFibGUgYW5kCi1hcHBsaWNhYmxl
LiAgVGhleSBjYW4gYmUgaWdub3JlZCwgZS5nLiBgbm8taWJyc2JgLCBhdCB3
aGljaCBwb2ludCBYZW4gd29uJ3QKLXVzZSB0aGVtIGl0c2VsZiwgYW5kIHdv
bid0IG9mZmVyIHRoZW0gdG8gZ3Vlc3RzLgorYXBwbGljYWJsZS4gIFRoZXkg
Y2FuIGFsbCBiZSBpZ25vcmVkLgorCitgcmRyYW5kYCBhbmQgYHJkc2VlZGAg
Y2FuIGJlIGlnbm9yZWQsIGFzIGEgbWl0aWdhdGlvbiB0byBYU0EtMzIwIC8K
K0NWRS0yMDIwLTA1NDMuCiAKICMjIyBjcHVpZFxfbWFza1xfY3B1IChBTUQg
b25seSkKID4gYD0gZmFtXzBmX3Jldl9jIHwgZmFtXzBmX3Jldl9kIHwgZmFt
XzBmX3Jldl9lIHwgZmFtXzBmX3Jldl9mIHwgZmFtXzBmX3Jldl9nIHwgZmFt
XzEwX3Jldl9iIHwgZmFtXzEwX3Jldl9jIHwgZmFtXzExX3Jldl9iYApkaWZm
IC0tZ2l0IGEveGVuL2FyY2gveDg2L2NwdWlkLmMgYi94ZW4vYXJjaC94ODYv
Y3B1aWQuYwppbmRleCBiOGU1YjZmZTY3Li43OGQwOGRiYjMyIDEwMDY0NAot
LS0gYS94ZW4vYXJjaC94ODYvY3B1aWQuYworKysgYi94ZW4vYXJjaC94ODYv
Y3B1aWQuYwpAQCAtNjMsNiArNjMsMTYgQEAgc3RhdGljIGludCBfX2luaXQg
cGFyc2VfeGVuX2NwdWlkKGNvbnN0IGNoYXIgKnMpCiAgICAgICAgICAgICBp
ZiAoICF2YWwgKQogICAgICAgICAgICAgICAgIHNldHVwX2NsZWFyX2NwdV9j
YXAoWDg2X0ZFQVRVUkVfU1JCRFNfQ1RSTCk7CiAgICAgICAgIH0KKyAgICAg
ICAgZWxzZSBpZiAoICh2YWwgPSBwYXJzZV9ib29sZWFuKCJyZHJhbmQiLCBz
LCBzcykpID49IDAgKQorICAgICAgICB7CisgICAgICAgICAgICBpZiAoICF2
YWwgKQorICAgICAgICAgICAgICAgIHNldHVwX2NsZWFyX2NwdV9jYXAoWDg2
X0ZFQVRVUkVfUkRSQU5EKTsKKyAgICAgICAgfQorICAgICAgICBlbHNlIGlm
ICggKHZhbCA9IHBhcnNlX2Jvb2xlYW4oInJkc2VlZCIsIHMsIHNzKSkgPj0g
MCApCisgICAgICAgIHsKKyAgICAgICAgICAgIGlmICggIXZhbCApCisgICAg
ICAgICAgICAgICAgc2V0dXBfY2xlYXJfY3B1X2NhcChYODZfRkVBVFVSRV9S
RFNFRUQpOworICAgICAgICB9CiAgICAgICAgIGVsc2UKICAgICAgICAgICAg
IHJjID0gLUVJTlZBTDsKIAo=

--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.12-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.12-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.12-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.12-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.12-3.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.12-3.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L3NwZWMtY3RybDogQWxsb3cgdGhlIFJEUkFORC9S
RFNFRUQgZmVhdHVyZXMgdG8gYmUgaGlkZGVuCgpSRFJBTkQvUkRTRUVEIGNh
biBiZSBoaWRkZW4gdXNpbmcgY3B1aWQ9IHRvIG1pdGlnYXRlIFNSQkRTIGlm
IG1pY3JvY29kZQppc24ndCBhdmFpbGFibGUuCgpUaGlzIGlzIHBhcnQgb2Yg
WFNBLTMyMCAvIENWRS0yMDIwLTA1NDMuCgpTaWduZWQtb2ZmLWJ5OiBBbmRy
ZXcgQ29vcGVyIDxhbmRyZXcuY29vcGVyM0BjaXRyaXguY29tPgpBY2tlZC1i
eTogSnVsaWVuIEdyYWxsIDxqZ3JhbGxAYW1hem9uLmNvbT4KCmRpZmYgLS1n
aXQgYS9kb2NzL21pc2MveGVuLWNvbW1hbmQtbGluZS5wYW5kb2MgYi9kb2Nz
L21pc2MveGVuLWNvbW1hbmQtbGluZS5wYW5kb2MKaW5kZXggMzM3ZmJmMDQ5
Mi4uNzg5N2RhNTVjYSAxMDA2NDQKLS0tIGEvZG9jcy9taXNjL3hlbi1jb21t
YW5kLWxpbmUucGFuZG9jCisrKyBiL2RvY3MvbWlzYy94ZW4tY29tbWFuZC1s
aW5lLnBhbmRvYwpAQCAtNDgxLDEyICs0ODEsMTggQEAgY2hvaWNlIG9mIGBk
b20wLWtlcm5lbGAgaXMgZGVwcmVjYXRlZCBhbmQgbm90IHN1cHBvcnRlZCBi
eSBhbGwgRG9tMCBrZXJuZWxzLgogVGhpcyBvcHRpb24gYWxsb3dzIGZvciBm
aW5lIHR1bmluZyBvZiB0aGUgZmFjaWxpdGllcyBYZW4gd2lsbCB1c2UsIGFm
dGVyCiBhY2NvdW50aW5nIGZvciBoYXJkd2FyZSBjYXBhYmlsaXRpZXMgYXMg
ZW51bWVyYXRlZCB2aWEgQ1BVSUQuCiAKK1VubGVzcyBvdGhlcndpc2Ugbm90
ZWQsIG9wdGlvbnMgb25seSBoYXZlIGFueSBlZmZlY3QgaW4gdGhlaXIgbmVn
YXRpdmUgZm9ybSwKK3RvIGhpZGUgdGhlIG5hbWVkIGZlYXR1cmUocykuICBJ
Z25vcmluZyBhIGZlYXR1cmUgdXNpbmcgdGhpcyBtZWNoYW5pc20gd2lsbAor
Y2F1c2UgWGVuIG5vdCB0byB1c2UgdGhlIGZlYXR1cmUsIG5vciBvZmZlciB0
aGVtIGFzIHVzYWJsZSB0byBndWVzdHMuCisKIEN1cnJlbnRseSBhY2NlcHRl
ZDoKIAogVGhlIFNwZWN1bGF0aW9uIENvbnRyb2wgaGFyZHdhcmUgZmVhdHVy
ZXMgYHNyYmRzLWN0cmxgLCBgbWQtY2xlYXJgLCBgaWJyc2JgLAogYHN0aWJw
YCwgYGlicGJgLCBgbDFkLWZsdXNoYCBhbmQgYHNzYmRgIGFyZSB1c2VkIGJ5
IGRlZmF1bHQgaWYgYXZhaWxhYmxlIGFuZAotYXBwbGljYWJsZS4gIFRoZXkg
Y2FuIGJlIGlnbm9yZWQsIGUuZy4gYG5vLWlicnNiYCwgYXQgd2hpY2ggcG9p
bnQgWGVuIHdvbid0Ci11c2UgdGhlbSBpdHNlbGYsIGFuZCB3b24ndCBvZmZl
ciB0aGVtIHRvIGd1ZXN0cy4KK2FwcGxpY2FibGUuICBUaGV5IGNhbiBhbGwg
YmUgaWdub3JlZC4KKworYHJkcmFuZGAgYW5kIGByZHNlZWRgIGNhbiBiZSBp
Z25vcmVkLCBhcyBhIG1pdGlnYXRpb24gdG8gWFNBLTMyMCAvCitDVkUtMjAy
MC0wNTQzLgogCiAjIyMgY3B1aWRfbWFza19jcHUKID4gYD0gZmFtXzBmX3Jl
dl9bY2RlZmddIHwgZmFtXzEwX3Jldl9bYmNdIHwgZmFtXzExX3Jldl9iYApk
aWZmIC0tZ2l0IGEveGVuL2FyY2gveDg2L2NwdWlkLmMgYi94ZW4vYXJjaC94
ODYvY3B1aWQuYwppbmRleCAyMmQ4YzcxYTk1Li5kMDc1NjdjOTAxIDEwMDY0
NAotLS0gYS94ZW4vYXJjaC94ODYvY3B1aWQuYworKysgYi94ZW4vYXJjaC94
ODYvY3B1aWQuYwpAQCAtNjQsNiArNjQsMTYgQEAgc3RhdGljIGludCBfX2lu
aXQgcGFyc2VfeGVuX2NwdWlkKGNvbnN0IGNoYXIgKnMpCiAgICAgICAgICAg
ICBpZiAoICF2YWwgKQogICAgICAgICAgICAgICAgIHNldHVwX2NsZWFyX2Nw
dV9jYXAoWDg2X0ZFQVRVUkVfU1JCRFNfQ1RSTCk7CiAgICAgICAgIH0KKyAg
ICAgICAgZWxzZSBpZiAoICh2YWwgPSBwYXJzZV9ib29sZWFuKCJyZHJhbmQi
LCBzLCBzcykpID49IDAgKQorICAgICAgICB7CisgICAgICAgICAgICBpZiAo
ICF2YWwgKQorICAgICAgICAgICAgICAgIHNldHVwX2NsZWFyX2NwdV9jYXAo
WDg2X0ZFQVRVUkVfUkRSQU5EKTsKKyAgICAgICAgfQorICAgICAgICBlbHNl
IGlmICggKHZhbCA9IHBhcnNlX2Jvb2xlYW4oInJkc2VlZCIsIHMsIHNzKSkg
Pj0gMCApCisgICAgICAgIHsKKyAgICAgICAgICAgIGlmICggIXZhbCApCisg
ICAgICAgICAgICAgICAgc2V0dXBfY2xlYXJfY3B1X2NhcChYODZfRkVBVFVS
RV9SRFNFRUQpOworICAgICAgICB9CiAgICAgICAgIGVsc2UKICAgICAgICAg
ICAgIHJjID0gLUVJTlZBTDsKIAo=

--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.13-1.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.13-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.13-2.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.13-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa320/xsa320-4.13-3.patch"
Content-Disposition: attachment; filename="xsa320/xsa320-4.13-3.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Fri Jun 12 07:42:48 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Jun 2020 07:42:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jjeJe-0004Jb-Sn; Fri, 12 Jun 2020 07:41:30 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=0K+f=7Z=gmail.com=ashish.emailaddress@srs-us1.protection.inumbo.net>)
 id 1jjeJd-0004JW-GZ
 for xen-users@lists.xenproject.org; Fri, 12 Jun 2020 07:41:29 +0000
X-Inumbo-ID: 2081aae0-ac80-11ea-8496-bc764e2007e4
Received: from mail-qk1-x72a.google.com (unknown [2607:f8b0:4864:20::72a])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2081aae0-ac80-11ea-8496-bc764e2007e4;
 Fri, 12 Jun 2020 07:41:29 +0000 (UTC)
Received: by mail-qk1-x72a.google.com with SMTP id n141so8162348qke.2
 for <xen-users@lists.xenproject.org>; Fri, 12 Jun 2020 00:41:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=x5JDCN13spPLzby+HuDH4ZD6wFg2utMkvnpjuy56bDc=;
 b=O31Z1MFBL4lPWKD48a07BFB/6kBxzT2YwHExQdCxYUbGmojoJI/7fs86wu5p8To3wB
 cZCDPhYNVZf2zzsQReunGi6yfzCJGaW1JqQ5f2VAPvcEmj9pezQEsV75iEY6VDzsMb8O
 tLUMMDPG8pEwvaLJLlfzQF8Jn5n0IohYhxf0VxDi9oq4yEVAkMbwK6J3O9coJ6Wx3Pk4
 Okqc6xBsPYdD6z/EQzjduGvYVAx6cYhQoknRNhN3T8WptwTED/o7IHQTipsNwM1/MPUq
 Mii16Vkb225ud2rfXu7+kKi+OEKXQSJoDPjmgIcyr1znQ4JcTUS9pT8l+DnMaZdEgkBY
 mL7Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=x5JDCN13spPLzby+HuDH4ZD6wFg2utMkvnpjuy56bDc=;
 b=q7myPJvoiyZinQMxVySJJZYpT+sN4xooMnycSYGJfZmmSYRvAWZcGxZ7dSwjbpXj6/
 8IR1MbisH61lhlQS707xszq7VBRxRvnwsejfwpc+YBnhmhE2vMN1QZUfFX8tCYnN63mi
 U2dsI+vd76cv7l7w83sxNDDWw5ptZfkDDuMR9hH5Sd2KgJ7Xkeu2J1Hj8kPW2QLKxv1s
 KKSrLkT/E8INJxusxX7HIcqaIiqkx6kOBquOokLlwjc+gbsmgGSMWb/jOKS+JzvyEG1B
 J9ACyUwbhrKASWypRCTi1EyzCH9F08odzKDGbgRuUK+VjJKBft9oZ4c2HCgq2uSElTal
 CNJA==
X-Gm-Message-State: AOAM532vU6JT64D0MENJR19tzAFkSB28nLihvI+2V0SuzSVu8Y5BWx0e
 JAz6CrxxQ5Uv5461SzqOnljNi7wvYcl0EhupVde9nw==
X-Google-Smtp-Source: ABdhPJy+i44YGWGdkxT2xEtL/Eyw2ANabL5zU5FT3TjEDA3cLPQrHbOs8INjCUkydcVrSP2/NmkDRkKOVBAo1CLpQ7M=
X-Received: by 2002:a05:620a:68d:: with SMTP id
 f13mr1595681qkh.439.1591947688614; 
 Fri, 12 Jun 2020 00:41:28 -0700 (PDT)
MIME-Version: 1.0
References: <CAOe0dAWnpX92j-T68KfcdNtfUYKXuwT6r2oB1DegxoCgDpOLNA@mail.gmail.com>
 <c2b04589-ff49-81ce-5078-6db489f5d041@xen.org>
 <CAOe0dAUJt5vR11FW80aELSpDxjJu5+J12v5cgqXTS9nbToThog@mail.gmail.com>
In-Reply-To: <CAOe0dAUJt5vR11FW80aELSpDxjJu5+J12v5cgqXTS9nbToThog@mail.gmail.com>
From: AshishKumar Mishra <ashish.emailaddress@gmail.com>
Date: Fri, 12 Jun 2020 13:11:16 +0530
Message-ID: <CAOe0dAW2ppH1XxCjP0T3qcBT2kXohP3HXwJ44_t20wmAtnNUVw@mail.gmail.com>
Subject: Re: Input to start porting OS to XEN
To: Julien Grall <julien@xen.org>
Content-Type: multipart/alternative; boundary="0000000000007b1e0a05a7de3445"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--0000000000007b1e0a05a7de3445
Content-Type: text/plain; charset="UTF-8"

Looks like i might have missed an important point
that.
ZEPHYR is still ported for RASPBERRY ARM core.

Is there any way by which we can run OS like this ,
using some kind of QEMU .
Any pointers would be helpful or i am missing something.

Thanks
Ashish

--0000000000007b1e0a05a7de3445
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Looks like i might have missed an important point<div dir=
=3D"auto">that.=C2=A0</div><div dir=3D"auto">ZEPHYR is still ported for RAS=
PBERRY ARM core.</div><div dir=3D"auto"><br></div><div dir=3D"auto">Is ther=
e any way by which we can run OS like=C2=A0this ,</div><div dir=3D"auto">us=
ing some kind of QEMU .</div><div dir=3D"auto">Any pointers would be helpfu=
l or i am missing something.</div><div dir=3D"auto"><br></div><div dir=3D"a=
uto">Thanks=C2=A0</div><div dir=3D"auto">Ashish</div></div>

--0000000000007b1e0a05a7de3445--


From xen-users-bounces@lists.xenproject.org Mon Jun 15 07:18:43 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2020 07:18:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jkjMb-0004pQ-Nu; Mon, 15 Jun 2020 07:17:01 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RK0k=74=gmail.com=k.kahurani@srs-us1.protection.inumbo.net>)
 id 1jkjMa-0004pL-97
 for xen-users@lists.xenproject.org; Mon, 15 Jun 2020 07:17:00 +0000
X-Inumbo-ID: 339ffed8-aed8-11ea-bca7-bc764e2007e4
Received: from mail-pg1-x543.google.com (unknown [2607:f8b0:4864:20::543])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 339ffed8-aed8-11ea-bca7-bc764e2007e4;
 Mon, 15 Jun 2020 07:16:59 +0000 (UTC)
Received: by mail-pg1-x543.google.com with SMTP id e18so7221158pgn.7
 for <xen-users@lists.xenproject.org>; Mon, 15 Jun 2020 00:16:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=TDy+aQW4Uc/y8IP3OtZyYHpONrpw1TcFp0GECHkUbyQ=;
 b=Be6Vnn0rbI9LiRJulLNeprP8xMl/lnPD2gZw36nUAsrMBl18/yCx/AYoKLCnkys54h
 0FHPT1uGAAzKCZTKPtQvC5ArYYFOSccub7jbfDETYxAlASwap82nwGTDxWia/QJmmVcM
 OBlnMUH7+ZmZYegVRocR3UgNZLn/6YVcP5ebCfZ1PW7mHe7ZDfnLururVsHVA3plTA4B
 1a8jhCcxuEizvsmkaCD3vR8jC+eX8juWnz8Xn/SJtIJINQVv+XD4fHmIVOgyhrtN+ywS
 AjbXNqZzrFKzdVRK3BBZYEf4Y4ElahN2/n5N5RlD1s/ACba8jAtgtnwfE2qFvcRKqAMT
 EKXg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=TDy+aQW4Uc/y8IP3OtZyYHpONrpw1TcFp0GECHkUbyQ=;
 b=cBwWvW53Ld9LqH+Wf59xScMoz8ZYxHseOPiR+rgDcNEOkvf9xrJtnwVNE+EIuyGh6n
 cpsmUxSsMTDj3n5QWBKNqeyBMLcxakcauKiMXODpKOLHW72C3zsOduGQwxI2CsLh627l
 akWKAA/O737ckydatmr1PvOXSY9zMHMmu4sPkWJFP7obWiG365BwL9LvdGaO9Jtj7gaU
 7BxmTJU29HV1r1tqjEwnhFaeZS8hMVHpEGIV8HlkD+hWucIN8W0IwbVJYhfjDjuGWS8z
 I7M0ThCIH8BNomPQCXdk4dJeCdUDGmJ2Qfaow1cYVGcPRH3J+3WN6A62NF022lDFWFxs
 j01w==
X-Gm-Message-State: AOAM532nElE4+NMmhSQevY97wx31bJeHOl5wZrec9WAJHEqI8O3MOtJZ
 FKVWo8oQx2nOvR4b0JFSpRdy+WQ/EExUNYgyz8voOHy0
X-Google-Smtp-Source: ABdhPJxM9ydhJqaU3Z8vMmkYRQ9e4pdfsIBaLFESZpA1yRXlcbEAbtIId6p1MdvLI/ojr9rjUi8/eOBAs41/Djduy6Y=
X-Received: by 2002:a63:7844:: with SMTP id t65mr20618350pgc.382.1592205418661; 
 Mon, 15 Jun 2020 00:16:58 -0700 (PDT)
MIME-Version: 1.0
References: <344966d2b9ff0064ccc9e8b59158de4d@kow.is>
In-Reply-To: <344966d2b9ff0064ccc9e8b59158de4d@kow.is>
From: "K. Kahurani" <k.kahurani@gmail.com>
Date: Mon, 15 Jun 2020 10:16:46 +0300
Message-ID: <CAAZOf24tG7BcYQf33wWgWKGzRH4aKtBs1Ytz2Zd3PySuqKBzdw@mail.gmail.com>
Subject: Re: Unable to puzzle through grub.xen_pvh
To: David Kowis <david@kow.is>
Content-Type: multipart/alternative; boundary="00000000000063899c05a81a360b"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000063899c05a81a360b
Content-Type: text/plain; charset="UTF-8"

Normally, if you have a direct kernel boot, it becomes necessary to pass a
few other options.

My experience booting Xen directly with a kernel is not much but with Qemu
you need to pass a root. This usually is what will be mounted at '/'.

Coincidentally enough, there is such an option with Xen, too seen below

https://xenbits.xen.org/docs/unstable/man/xl.cfg.5.html#Direct-Kernel-Boot

On Tue, Jun 9, 2020 at 5:04 AM David Kowis <david@kow.is> wrote:

> I started here:
>
> https://wiki.xenproject.org/wiki/Xen_4.12_RC_test_instructions#PVH_domU_boot_via_grub2
>
> I was able to build and copy over the resulting built component. I then
> proceeded to change an existing vm that booted PVH with the
> kernel="/path/to/grub.xen_pvh" instead of bootloader="pygrub"
>
> It worked in that I got a grub command prompt, which usually happens
> when grub doesn't know what to do. I feel like I'm really close!
>
> my cfg:
> =============
> name="hass"
> type="pvh"
> vcpus=4
> memory=2048
> maxmem=4096
> #bootloader="pygrub"
> kernel="/usr/local/bin/grub.xen_pvh"
>
> # Enable pv on hvm drivers
> xen_platform_pci=1
>
> vif = [ 'mac=00:16:3E:DE:AD:78, bridge=xenbr0' ]
>
> disk = [
>
>
> 'phy:/dev/disk/by-path/ip-10.255.255.2:3260-iscsi-iqn.2005-10.org.freenas.ctl:xen-lun-35,xvda,w'
>         ]
>
>
> # usb passthrough for the zwave stick
> usbctrl=['type=auto,version=2,ports=4']
> usbdev=['type=hostdev,hostbus=2,hostaddr=3']
> =============
>
> There is a grub.cfg in /boot/grub/grub.cfg on that disk. It's a standard
> ubuntu 18.04 vm, which I've built a kernel with the PVUSB drivers on it.
> Trying to get that kernel to boot easily, and a more real grub
> environment would help solve it.
>
> Thanks!
>
>

--00000000000063899c05a81a360b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Normally, if you have a direct kernel boot, it become=
s necessary to pass a few other options.</div><div><br></div><div>My experi=
ence booting Xen directly with a kernel is not much but with Qemu you need =
to pass a root. This usually is what will be mounted at &#39;/&#39;.</div><=
div><br></div><div>Coincidentally enough, there is such an option with Xen,=
 too seen below<br></div><div><br></div><div><a href=3D"https://xenbits.xen=
.org/docs/unstable/man/xl.cfg.5.html#Direct-Kernel-Boot">https://xenbits.xe=
n.org/docs/unstable/man/xl.cfg.5.html#Direct-Kernel-Boot</a></div><br><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Jun 9, =
2020 at 5:04 AM David Kowis &lt;<a href=3D"mailto:david@kow.is">david@kow.i=
s</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin=
:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"=
>I started here: <br>
<a href=3D"https://wiki.xenproject.org/wiki/Xen_4.12_RC_test_instructions#P=
VH_domU_boot_via_grub2" rel=3D"noreferrer" target=3D"_blank">https://wiki.x=
enproject.org/wiki/Xen_4.12_RC_test_instructions#PVH_domU_boot_via_grub2</a=
><br>
<br>
I was able to build and copy over the resulting built component. I then <br=
>
proceeded to change an existing vm that booted PVH with the <br>
kernel=3D&quot;/path/to/grub.xen_pvh&quot; instead of bootloader=3D&quot;py=
grub&quot;<br>
<br>
It worked in that I got a grub command prompt, which usually happens <br>
when grub doesn&#39;t know what to do. I feel like I&#39;m really close!<br=
>
<br>
my cfg:<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
name=3D&quot;hass&quot;<br>
type=3D&quot;pvh&quot;<br>
vcpus=3D4<br>
memory=3D2048<br>
maxmem=3D4096<br>
#bootloader=3D&quot;pygrub&quot;<br>
kernel=3D&quot;/usr/local/bin/grub.xen_pvh&quot;<br>
<br>
# Enable pv on hvm drivers<br>
xen_platform_pci=3D1<br>
<br>
vif =3D [ &#39;mac=3D00:16:3E:DE:AD:78, bridge=3Dxenbr0&#39; ]<br>
<br>
disk =3D [<br>
<br>
&#39;phy:/dev/disk/by-path/ip-10.255.255.2:3260-iscsi-iqn.2005-10.org.freen=
as.ctl:xen-lun-35,xvda,w&#39;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 ]<br>
<br>
<br>
# usb passthrough for the zwave stick<br>
usbctrl=3D[&#39;type=3Dauto,version=3D2,ports=3D4&#39;]<br>
usbdev=3D[&#39;type=3Dhostdev,hostbus=3D2,hostaddr=3D3&#39;]<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
There is a grub.cfg in /boot/grub/grub.cfg on that disk. It&#39;s a standar=
d <br>
ubuntu 18.04 vm, which I&#39;ve built a kernel with the PVUSB drivers on it=
. <br>
Trying to get that kernel to boot easily, and a more real grub <br>
environment would help solve it.<br>
<br>
Thanks!<br>
<br>
</blockquote></div></div>

--00000000000063899c05a81a360b--


From xen-users-bounces@lists.xenproject.org Mon Jun 15 10:27:56 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2020 10:27:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jkmKJ-0004CI-6e; Mon, 15 Jun 2020 10:26:51 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=jTAp=74=xen.org=julien@srs-us1.protection.inumbo.net>)
 id 1jkmKH-0004CD-5g
 for xen-users@lists.xenproject.org; Mon, 15 Jun 2020 10:26:49 +0000
X-Inumbo-ID: b848effe-aef2-11ea-b7bb-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id b848effe-aef2-11ea-b7bb-bc764e2007e4;
 Mon, 15 Jun 2020 10:26:48 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
 MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender:Reply-To:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=H242Rh0eXL7R9olnMguuZB4KfzfahYMnxpRtvNkh4gg=; b=Oe9MT9p01PMaaPcVVkS+50t2Zr
 qAd3CDI5tJWidoTqNqkrudSvycQxDBOl38PkRZ8OPVDevz461qglG2aguM+JEwAwgYjFPjJ6X0Qza
 +XGiaejFhNpRc5y2Im9X4Wsr6rm69bNK5l6dhVuphv/BlAJdHqtjmPn2RF6xGA+l3eZQ=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1jkmKG-00060Y-Dx; Mon, 15 Jun 2020 10:26:48 +0000
Received: from [54.239.6.188] (helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1jkmKG-0001yg-81; Mon, 15 Jun 2020 10:26:48 +0000
Subject: Re: Input to start porting OS to XEN
To: AshishKumar Mishra <ashish.emailaddress@gmail.com>
References: <CAOe0dAWnpX92j-T68KfcdNtfUYKXuwT6r2oB1DegxoCgDpOLNA@mail.gmail.com>
 <c2b04589-ff49-81ce-5078-6db489f5d041@xen.org>
 <CAOe0dAUJt5vR11FW80aELSpDxjJu5+J12v5cgqXTS9nbToThog@mail.gmail.com>
From: Julien Grall <julien@xen.org>
Message-ID: <edbb0f80-43b8-aff2-66c1-5128b6f3f8ce@xen.org>
Date: Mon, 15 Jun 2020 11:26:46 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0)
 Gecko/20100101 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <CAOe0dAUJt5vR11FW80aELSpDxjJu5+J12v5cgqXTS9nbToThog@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>



On 11/06/2020 04:45, AshishKumar Mishra wrote:
> Hi Julien ,

Hi,

Apologies for the late answer.


> Thanks for reverting back .
> 
> 1) Currently i was planning on Raspberry pie-4
>       ( As that was simpler w.r.t linux bsp & availability )

I saw you next answer suggesting Zephys doesn't support RPI 4. Unless 
you plan to run Zephyr in Dom0, support for a given board is not necessary.

> 
> 
> 2) w.r.t PV vs PVH vs HVM
> - I was evaluating HVM initially .
>    as based on what I understand , PV will require changes
>    to be done on Zephyr codebase initially.
> - With HVM , based on my reading i can look at getting the binary of zephyr
>     and and xen HVM config file will help me get started

We don't support HVM guest on Arm, instead we support something close to 
PVH. By that, we are taking advantage of the HW virtualization and most 
of the devices are para-virtualized or passthrouhg-ed.

> But , request to please correct if i have mis-understood or mis-planned 
> any thing here.

There are a couple of talks about how to port a new OS to Xen on Arm 
(you can look at [1] for instance).

Most of the efforts would be to support para-virtualized devices. 
Thankfully, there are already multiple implementations existing for some 
of the PV devices.

> 
> 
> 3) Ethernet and CAN interface are what i was looking for on Zephr.

While network PV protocol already exist in Xen, I am not aware of CAN 
interface. You would need to write from scratch an interface.

Cheers,

[1] https://www.youtube.com/watch?v=NksLB29NSpQ

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Mon Jun 15 11:45:08 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2020 11:45:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jknWf-0002ij-Rc; Mon, 15 Jun 2020 11:43:41 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AJd2=74=gmail.com=ashish.emailaddress@srs-us1.protection.inumbo.net>)
 id 1jknWe-0002ie-BF
 for xen-users@lists.xenproject.org; Mon, 15 Jun 2020 11:43:40 +0000
X-Inumbo-ID: 74c44688-aefd-11ea-bb8b-bc764e2007e4
Received: from mail-qk1-x72f.google.com (unknown [2607:f8b0:4864:20::72f])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 74c44688-aefd-11ea-bb8b-bc764e2007e4;
 Mon, 15 Jun 2020 11:43:39 +0000 (UTC)
Received: by mail-qk1-x72f.google.com with SMTP id n141so15357597qke.2
 for <xen-users@lists.xenproject.org>; Mon, 15 Jun 2020 04:43:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=f/k8eGFZa2w8061Pycl5NshCe422KZ3ZoH0jD1fdSJM=;
 b=ptzHlgui4imDWMZHO02N4eCCKsymh1fj2VV5CJLTUuMqwsFVW9lEj92kq28G2qeq3z
 80T5yCrxzjQU6pxGv8f6HBqC733YB27FjugIWIYdA/03WfI0cFRuRIcoBZtRLaTRMwv/
 Bqns6HQJYoZFix+QJBCEeJQSy5gFpQvrCFR6YQmhlyLNTdbOZZx5Ms2lcJdVeyGcpCk2
 RDXZprhQ3GbwHioK0iytO7vr765YlS0NNwzufWuxvbJwCO7kl9v4S1FYFU0I8ntIvzgE
 b9j4BJXbKYqdKUMPC22o0hcj5Wah/DSwTzXIK/6KdskuMmULxJugK7u2lXrx1x2ki+am
 rZpQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=f/k8eGFZa2w8061Pycl5NshCe422KZ3ZoH0jD1fdSJM=;
 b=JL2RyjtRFJsExol0lRE9w4hMs+zAEeTqmlQIpVIa+X2PxnwT4I1ik/YNqWHMrjixFN
 yND5/DuXYfHZa7Sx6oI/hIKtBBiaehZqSekC9eQeQSE+lHs9+Rn+sXO72ABNk61xRw/0
 5uW20cYt1NUG6w8aViNTKkWLgJd7mXwid0oKT7NUfjr9DLe0uBDmOs/YU15XBENI1mF/
 m45eTkff559Pqzso870la6KTumBraTR4FX117Mi9t05UhvIdurj3vRL53WPmqeNNwNnA
 8XFszeyvtCRgPLzJ8Jy5pomSCRhkRYiOFonciwYl55s7rA+Smp5bUfnSOcJve64mS/n6
 kamQ==
X-Gm-Message-State: AOAM531ne24nSSh81gH1r+EBgLX9x9CFQsnXi15ZjBt+Ckpy7sypUxlp
 cKE5d/4u6YCwzfFk9ijswq2yV1m4jN6f4PNltOEdAQ==
X-Google-Smtp-Source: ABdhPJzPnb0pX5pAHN2HSp3N8YMKd9f+RKxci5ozW4VWcrAEQlp4Rz9yDTC8cDR1XiU2jQ3pTHjBiiodQPTga1Onbjw=
X-Received: by 2002:a37:555:: with SMTP id 82mr14680345qkf.279.1592221419294; 
 Mon, 15 Jun 2020 04:43:39 -0700 (PDT)
MIME-Version: 1.0
References: <CAOe0dAWnpX92j-T68KfcdNtfUYKXuwT6r2oB1DegxoCgDpOLNA@mail.gmail.com>
 <c2b04589-ff49-81ce-5078-6db489f5d041@xen.org>
 <CAOe0dAUJt5vR11FW80aELSpDxjJu5+J12v5cgqXTS9nbToThog@mail.gmail.com>
 <edbb0f80-43b8-aff2-66c1-5128b6f3f8ce@xen.org>
In-Reply-To: <edbb0f80-43b8-aff2-66c1-5128b6f3f8ce@xen.org>
From: AshishKumar Mishra <ashish.emailaddress@gmail.com>
Date: Mon, 15 Jun 2020 17:13:28 +0530
Message-ID: <CAOe0dAU_92S5uehRD+GbXs4V46WajDZ8qpL-qfpKUD4-YuKVeQ@mail.gmail.com>
Subject: Re: Input to start porting OS to XEN
To: Julien Grall <julien@xen.org>
Content-Type: multipart/alternative; boundary="00000000000019d1a905a81df057"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000019d1a905a81df057
Content-Type: text/plain; charset="UTF-8"

Hi Julien ,

Extremely thankful for your response & link.
Will go through it.

Thanks & Regards,
Ashish


On Mon, Jun 15, 2020, 3:56 PM Julien Grall <julien@xen.org> wrote:

>
>
> On 11/06/2020 04:45, AshishKumar Mishra wrote:
> > Hi Julien ,
>
> Hi,
>
> Apologies for the late answer.
>
>
> > Thanks for reverting back .
> >
> > 1) Currently i was planning on Raspberry pie-4
> >       ( As that was simpler w.r.t linux bsp & availability )
>
> I saw you next answer suggesting Zephys doesn't support RPI 4. Unless
> you plan to run Zephyr in Dom0, support for a given board is not necessary.
>
> >
> >
> > 2) w.r.t PV vs PVH vs HVM
> > - I was evaluating HVM initially .
> >    as based on what I understand , PV will require changes
> >    to be done on Zephyr codebase initially.
> > - With HVM , based on my reading i can look at getting the binary of
> zephyr
> >     and and xen HVM config file will help me get started
>
> We don't support HVM guest on Arm, instead we support something close to
> PVH. By that, we are taking advantage of the HW virtualization and most
> of the devices are para-virtualized or passthrouhg-ed.
>
> > But , request to please correct if i have mis-understood or mis-planned
> > any thing here.
>
> There are a couple of talks about how to port a new OS to Xen on Arm
> (you can look at [1] for instance).
>
> Most of the efforts would be to support para-virtualized devices.
> Thankfully, there are already multiple implementations existing for some
> of the PV devices.
>
> >
> >
> > 3) Ethernet and CAN interface are what i was looking for on Zephr.
>
> While network PV protocol already exist in Xen, I am not aware of CAN
> interface. You would need to write from scratch an interface.
>
> Cheers,
>
> [1] https://www.youtube.com/watch?v=NksLB29NSpQ
>
> --
> Julien Grall
>

--00000000000019d1a905a81df057
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div>Hi Julien ,<div dir=3D"auto"><br></div><div dir=3D"a=
uto">Extremely thankful=C2=A0for your response &amp; link.</div><div dir=3D=
"auto">Will go through it.</div><div dir=3D"auto"><br></div><div dir=3D"aut=
o">Thanks=C2=A0&amp; Regards,</div><div dir=3D"auto">Ashish</div><br><br><d=
iv class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Jun =
15, 2020, 3:56 PM Julien Grall &lt;<a href=3D"mailto:julien@xen.org">julien=
@xen.org</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
<br>
On 11/06/2020 04:45, AshishKumar Mishra wrote:<br>
&gt; Hi=C2=A0Julien ,<br>
<br>
Hi,<br>
<br>
Apologies for the late answer.<br>
<br>
<br>
&gt; Thanks for reverting back .<br>
&gt; <br>
&gt; 1) Currently i was planning on Raspberry pie-4<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0( As that was simpler w.r.t linux bsp &amp; =
availability )<br>
<br>
I saw you next answer suggesting Zephys doesn&#39;t support RPI 4. Unless <=
br>
you plan to run Zephyr in Dom0, support for a given board is not necessary.=
<br>
<br>
&gt; <br>
&gt; <br>
&gt; 2) w.r.t PV vs PVH vs HVM<br>
&gt; - I was evaluating HVM initially .<br>
&gt;=C2=A0 =C2=A0 as based on what I understand , PV will require changes<b=
r>
&gt;=C2=A0 =C2=A0 to be done on Zephyr codebase initially.<br>
&gt; - With HVM , based on my reading i can look at getting the binary of z=
ephyr<br>
&gt;=C2=A0 =C2=A0 =C2=A0and and xen HVM config file will help me get starte=
d<br>
<br>
We don&#39;t support HVM guest on Arm, instead we support something close t=
o <br>
PVH. By that, we are taking advantage of the HW virtualization and most <br=
>
of the devices are para-virtualized or passthrouhg-ed.<br>
<br>
&gt; But , request to please correct if i have mis-understood or mis-planne=
d <br>
&gt; any thing here.<br>
<br>
There are a couple of talks about how to port a new OS to Xen on Arm <br>
(you can look at [1] for instance).<br>
<br>
Most of the efforts would be to support para-virtualized devices. <br>
Thankfully, there are already multiple implementations existing for some <b=
r>
of the PV devices.<br>
<br>
&gt; <br>
&gt; <br>
&gt; 3) Ethernet and CAN interface are what i was=C2=A0looking for on Zephr=
.<br>
<br>
While network PV protocol already exist in Xen, I am not aware of CAN <br>
interface. You would need to write from scratch an interface.<br>
<br>
Cheers,<br>
<br>
[1] <a href=3D"https://www.youtube.com/watch?v=3DNksLB29NSpQ" rel=3D"norefe=
rrer noreferrer" target=3D"_blank">https://www.youtube.com/watch?v=3DNksLB2=
9NSpQ</a><br>
<br>
-- <br>
Julien Grall<br>
</blockquote></div></div></div>

--00000000000019d1a905a81df057--


From xen-users-bounces@lists.xenproject.org Mon Jun 15 14:57:48 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Jun 2020 14:57:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jkqXC-0004W1-TZ; Mon, 15 Jun 2020 14:56:26 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=zglu=74=xen.org=paul@srs-us1.protection.inumbo.net>)
 id 1jkqXB-0004Ud-Ia
 for xen-users@lists.xenproject.org; Mon, 15 Jun 2020 14:56:25 +0000
X-Inumbo-ID: 5ebfdee0-af18-11ea-b807-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 5ebfdee0-af18-11ea-b807-12813bfff9fa;
 Mon, 15 Jun 2020 14:56:20 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Reply-To:Message-Id:Date:Subject:To:From:Sender:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=dv/wHwxCaJTEGpCKu6iwv+PQf4ogcSKnHpLXGmCAhjk=; b=5pwfAO7U9E4Txh/zWFehuHw0PR
 Y6gX2AiQHmCmLS31Sk0jl84lD+fu12NxavaorDN0PetREYrcwt9fC2RPQJSpxhcnTrSGmAurHm4++
 o6VPpoGai85UXowRcjxP22ny4kwpvwtgmfHgr9ZD3nXGdey6HQ0cRScId2eA+X5g+204=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jkqX5-0002hE-49; Mon, 15 Jun 2020 14:56:19 +0000
Received: from 54-240-197-234.amazon.com ([54.240.197.234]
 helo=CBG-R90WXYV0.amazon.com) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jkqX4-00086Z-R4; Mon, 15 Jun 2020 14:56:19 +0000
From: Paul Durrant <paul@xen.org>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org,
 xen-announce@lists.xenproject.org
Subject: Xen 4.14 RC2
Date: Mon, 15 Jun 2020 15:56:17 +0100
Message-Id: <20200615145617.6761-1-paul@xen.org>
X-Mailer: git-send-email 2.17.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-devel@lists.xenproject.org, paul@xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,

Xen 4.14 RC2 is tagged. You can check that out from xen.git:

git://xenbits.xen.org/xen.git 4.14.0-rc2

For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.14.0-rc2/xen-4.14.0-rc2.tar.gz

And the signature is at:
https://downloads.xenproject.org/release/xen/4.14.0-rc2/xen-4.14.0-rc2.tar.gz.sig

Please send bug reports and test reports to xen-devel@lists.xenproject.org.
When sending bug reports, please CC relevant maintainers and me (paul@xen.org).

As a reminder, there will be a Xen Test Day. Please see the test day schedule at
https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.

  Paul Durrant



From xen-users-bounces@lists.xenproject.org Tue Jun 16 02:15:22 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Jun 2020 02:15:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jl16e-0006qe-DW; Tue, 16 Jun 2020 02:13:44 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Kh2j=75=yahoo.com=tlviewer@srs-us1.protection.inumbo.net>)
 id 1jl16c-0006qZ-Pa
 for xen-users@lists.xenproject.org; Tue, 16 Jun 2020 02:13:42 +0000
X-Inumbo-ID: ff9f0b0c-af76-11ea-bca7-bc764e2007e4
Received: from sonic315-21.consmr.mail.ne1.yahoo.com (unknown [66.163.190.147])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id ff9f0b0c-af76-11ea-bca7-bc764e2007e4;
 Tue, 16 Jun 2020 02:13:42 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1592273621; bh=nPBwr7ku8jJydZCwtzhkbW+dpKYazCLqs4QLTIXEEu4=;
 h=Date:From:To:Cc:In-Reply-To:References:Subject:From:Subject;
 b=BMRIC5e1s2TEU0svEs26qkRYG4jEdg6HPliNMWWhocHPqwzJrQ5MbatvZI30cJO9A6r1nVCnBPQWmJBo5b/wginbvROM6gozymVMZvaQ/5q3ZR5BEUercgbTyP7JfDljiEhC/JtA4cUg/fWQCHTY6n9IJ5x2liXtoMyzxTjzM8usDf7/gEMkkGS+eH9EkzsfgtPiPrif2Y0oqdRXE0EXNj6gP5PugEBTHWrSkgJwSxYwIxVYNOflzeAepTHMu3D8a3t8uzQ1TD3b7eOFMC6Eth+T3wBARu3lg8iSZ5i/6r5Bvl5sz11JPZF7t0qILB43YGY3k7OmTEWEzvJJsbDRIg==
X-YMail-OSG: iEbINT8VM1l7Blosihe7oSYetivlkjDrt.wC6e7zUte4JLmUoprh8VY6Nll6.0S
 xpAPSi.7QoYa8HfoMT9SZ1q6tIYZfQsYjOOTyCXWD9zYKmp1HOa_ICn7ogSgSu5Bpq0jb9RChGCT
 g9dQmuIWqKPFDYSV_RQvSfJzVJyUwGB1gNL9_JLGtAMcBaSE1WtrIUSDAkNX9TtE06HgSPFAl7m2
 AKHh4gK5OavNXGjKQFJ3jRKsPy5lDaC_7kxMB1L3Le5eWO3Bvl7F.Ly9fO3V1D_9HCU1Iehy0JKn
 iv3JzvOWrLIKlnZT0kOPAnQXBQCK9wkjZfWOB4JmbguvjAnThSsviAnD3Y.ArKiPmj0Lh8ehcEql
 rKC_OWH.xQ5dxJvwd4c_4BFO6p4VJRrN.XHjAHW6olJQJshfRUsLGsht.2KBXEl45daT06fd1N83
 7GWTsTpUsgiTT4.9BZ2gwLWRREIGbgXLMvDCwhTJcfH86eZ1mU8Mgc4W0uW24XWvKqTUmzd4SDBU
 LU8xdChV8p5DtYCCuIwcKwpgr6StV0VvY2hWhWGpVGJAEYxZcZMACmPxNdQWLSHwTnu3Ej_EPeAv
 cT1fDLgndSpqIQHSsiVH8MWjEC9fl8Iu8HY2oqGDeYtvM_LVh0mG.ZWn9W6JGq9CImSkNTgogsz2
 4VyYVFYMlYFAVvX5jbHY3oDCrj0V2leV7T84NoFukY7Y48qySwTSQ17r16f_4osLSDsRv8yvDnOE
 ph0zjSaH7ggfp76vz4SlBFmSs4IhpR0K8WOLGqIQQtPVQv9UFcCSFw1xLqkTvl7r5m_uCIDqZTN2
 pV6bIxgGb83iGNxB.B0fG6oE3G4rgFjLdN020q7txB14Hg155X1VYJk81l_92F0Xuxe8TfPv3MkE
 Xlub9t6WomgjfOF9xU.cqkZblEQOM7H971wqMYv_tJ9PEklEVe3XGjg6v7kwXnVQNVN1bj3X6H1u
 rmliJh0wM.h7Jr2mqYCVwLdwdGlbxTLtu5sL7CbFgMlc9wiQtBFPz9nmj6KpLku3S2DSpdNCY2xV
 YeHvwkkGLDL5iRQP7SWQBriMtjnctTNG9Fbjir4lLSnPnICp7S0amm9huAdMFQ0tBLmTl3jPfedP
 eUblttbNJ1uG3O_Ag4V8uIYxaGRpRUSN91ysqjO_Pd5VG90vOVJqEEo0OHIHJOkONYYumKwMgxXo
 5OWpcO2k_ndtCxlA4IOyM8axgZT3PsDVIIITn80hKYyCbBNI6VatRd10b84Bodgc7XKZOVYha4.F
 PXzn1a_eF7eABUuuJ_LFK2IKSNDLrkrlFryxOyNinMNJTH4kqsSqFS9ExzPu97iwzPTgzqHkU4BX
 jOO.aGSmYBvRhgEZrtfqyKiVv2m60O_18iYr1tphW1Cs_lhuYgeuh3fznY6VU
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic315.consmr.mail.ne1.yahoo.com with HTTP; Tue, 16 Jun 2020 02:13:41 +0000
Date: Tue, 16 Jun 2020 02:13:41 +0000 (UTC)
From: Mark Pryor <tlviewer@yahoo.com>
To: David Kowis <david@kow.is>
Message-ID: <1160320839.1413095.1592273621085@mail.yahoo.com>
In-Reply-To: <CAAZOf24tG7BcYQf33wWgWKGzRH4aKtBs1Ytz2Zd3PySuqKBzdw@mail.gmail.com>
References: <344966d2b9ff0064ccc9e8b59158de4d@kow.is>
 <CAAZOf24tG7BcYQf33wWgWKGzRH4aKtBs1Ytz2Zd3PySuqKBzdw@mail.gmail.com>
Subject: Re: Unable to puzzle through grub.xen_pvh
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_1413094_869866026.1592273621084"
X-Mailer: WebService/1.1.16119 YMailNorrin Mozilla/5.0 (X11; Linux x86_64;
 rv:68.0) Gecko/20100101 Firefox/68.0
Content-Length: 7698
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_1413094_869866026.1592273621084
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

 Hello,
this link below is the first good analysis I've seen of how to write a grub=
2 scriptwith xen support:

https://www.mendix.com/blog/using-pvgrub2-boot-xen-domus/
written by Hans V. K. now of the Debian-xen team.
cheers,
PryMar56




    On Monday, June 15, 2020, 12:19:29 AM PDT, K. Kahurani <k.kahurani@gmai=
l.com> wrote: =20
=20
 Normally, if you have a direct kernel boot, it becomes necessary to pass a=
 few other options.
My experience booting Xen directly with a kernel is not much but with Qemu =
you need to pass a root. This usually is what will be mounted at '/'.
Coincidentally enough, there is such an option with Xen, too seen below

https://xenbits.xen.org/docs/unstable/man/xl.cfg.5.html#Direct-Kernel-Boot
On Tue, Jun 9, 2020 at 5:04 AM David Kowis <david@kow.is> wrote:

I started here:=20
https://wiki.xenproject.org/wiki/Xen_4.12_RC_test_instructions#PVH_domU_boo=
t_via_grub2

I was able to build and copy over the resulting built component. I then=20
proceeded to change an existing vm that booted PVH with the=20
kernel=3D"/path/to/grub.xen_pvh" instead of bootloader=3D"pygrub"

It worked in that I got a grub command prompt, which usually happens=20
when grub doesn't know what to do. I feel like I'm really close!

my cfg:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
name=3D"hass"
type=3D"pvh"
vcpus=3D4
memory=3D2048
maxmem=3D4096
#bootloader=3D"pygrub"
kernel=3D"/usr/local/bin/grub.xen_pvh"

# Enable pv on hvm drivers
xen_platform_pci=3D1

vif =3D [ 'mac=3D00:16:3E:DE:AD:78, bridge=3Dxenbr0' ]

disk =3D [

'phy:/dev/disk/by-path/ip-10.255.255.2:3260-iscsi-iqn.2005-10.org.freenas.c=
tl:xen-lun-35,xvda,w'
=C2=A0 =C2=A0 =C2=A0 =C2=A0 ]


# usb passthrough for the zwave stick
usbctrl=3D['type=3Dauto,version=3D2,ports=3D4']
usbdev=3D['type=3Dhostdev,hostbus=3D2,hostaddr=3D3']
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

There is a grub.cfg in /boot/grub/grub.cfg on that disk. It's a standard=20
ubuntu 18.04 vm, which I've built a kernel with the PVUSB drivers on it.=20
Trying to get that kernel to boot easily, and a more real grub=20
environment would help solve it.

Thanks!


 =20
------=_Part_1413094_869866026.1592273621084
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<html><head></head><body><div class=3D"ydp1783b129yahoo-style-wrap" style=
=3D"font-family: Helvetica Neue, Helvetica, Arial, sans-serif; font-size: 1=
3px;"><div></div>
        <div dir=3D"ltr" data-setdir=3D"false">Hello,</div><div dir=3D"ltr"=
 data-setdir=3D"false"><br></div><div dir=3D"ltr" data-setdir=3D"false">thi=
s link below is the first good analysis I've seen of how to write a grub2 s=
cript</div><div dir=3D"ltr" data-setdir=3D"false">with xen support:<br></di=
v><div dir=3D"ltr" data-setdir=3D"false"><br></div><div dir=3D"ltr" data-se=
tdir=3D"false"><a href=3D"https://www.mendix.com/blog/using-pvgrub2-boot-xe=
n-domus/" rel=3D"nofollow" target=3D"_blank">https://www.mendix.com/blog/us=
ing-pvgrub2-boot-xen-domus/</a></div><div dir=3D"ltr" data-setdir=3D"false"=
><br></div><div dir=3D"ltr" data-setdir=3D"false">written by Hans V. K. now=
 of the Debian-xen team.<br></div><div dir=3D"ltr" data-setdir=3D"false">ch=
eers,</div><div dir=3D"ltr" data-setdir=3D"false"><br></div><div dir=3D"ltr=
" data-setdir=3D"false">PryMar56<br></div><div><br></div><div><br></div><di=
v><br></div><div><br></div>
       =20
        </div><div id=3D"yahoo_quoted_3128455652" class=3D"yahoo_quoted">
            <div style=3D"font-family:'Helvetica Neue', Helvetica, Arial, s=
ans-serif;font-size:13px;color:#26282a;">
               =20
                <div>
                    On Monday, June 15, 2020, 12:19:29 AM PDT, K. Kahurani =
&lt;k.kahurani@gmail.com&gt; wrote:
                </div>
                <div><br></div>
                <div><br></div>
                <div><div id=3D"yiv0138887487"><div><div dir=3D"ltr"><div>N=
ormally, if you have a direct kernel boot, it becomes necessary to pass a f=
ew other options.</div><div><br clear=3D"none"></div><div>My experience boo=
ting Xen directly with a kernel is not much but with Qemu you need to pass =
a root. This usually is what will be mounted at '/'.</div><div><br clear=3D=
"none"></div><div>Coincidentally enough, there is such an option with Xen, =
too seen below<br clear=3D"none"></div><div><br clear=3D"none"></div><div><=
a rel=3D"nofollow" shape=3D"rect" target=3D"_blank" href=3D"https://xenbits=
.xen.org/docs/unstable/man/xl.cfg.5.html#Direct-Kernel-Boot">https://xenbit=
s.xen.org/docs/unstable/man/xl.cfg.5.html#Direct-Kernel-Boot</a></div><br c=
lear=3D"none"><div class=3D"yiv0138887487yqt5048225787" id=3D"yiv0138887487=
yqt02104"><div class=3D"yiv0138887487gmail_quote"><div class=3D"yiv01388874=
87gmail_attr" dir=3D"ltr">On Tue, Jun 9, 2020 at 5:04 AM David Kowis &lt;<a=
 rel=3D"nofollow" shape=3D"rect" ymailto=3D"mailto:david@kow.is" target=3D"=
_blank" href=3D"mailto:david@kow.is">david@kow.is</a>&gt; wrote:<br clear=
=3D"none"></div><blockquote class=3D"yiv0138887487gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex;">I started here: <br clear=3D"none">
<a rel=3D"nofollow" shape=3D"rect" target=3D"_blank" href=3D"https://wiki.x=
enproject.org/wiki/Xen_4.12_RC_test_instructions#PVH_domU_boot_via_grub2">h=
ttps://wiki.xenproject.org/wiki/Xen_4.12_RC_test_instructions#PVH_domU_boot=
_via_grub2</a><br clear=3D"none">
<br clear=3D"none">
I was able to build and copy over the resulting built component. I then <br=
 clear=3D"none">
proceeded to change an existing vm that booted PVH with the <br clear=3D"no=
ne">
kernel=3D"/path/to/grub.xen_pvh" instead of bootloader=3D"pygrub"<br clear=
=3D"none">
<br clear=3D"none">
It worked in that I got a grub command prompt, which usually happens <br cl=
ear=3D"none">
when grub doesn't know what to do. I feel like I'm really close!<br clear=
=3D"none">
<br clear=3D"none">
my cfg:<br clear=3D"none">
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br clear=3D"none">
name=3D"hass"<br clear=3D"none">
type=3D"pvh"<br clear=3D"none">
vcpus=3D4<br clear=3D"none">
memory=3D2048<br clear=3D"none">
maxmem=3D4096<br clear=3D"none">
#bootloader=3D"pygrub"<br clear=3D"none">
kernel=3D"/usr/local/bin/grub.xen_pvh"<br clear=3D"none">
<br clear=3D"none">
# Enable pv on hvm drivers<br clear=3D"none">
xen_platform_pci=3D1<br clear=3D"none">
<br clear=3D"none">
vif =3D [ 'mac=3D00:16:3E:DE:AD:78, bridge=3Dxenbr0' ]<br clear=3D"none">
<br clear=3D"none">
disk =3D [<br clear=3D"none">
<br clear=3D"none">
'phy:/dev/disk/by-path/ip-10.255.255.2:3260-iscsi-iqn.2005-10.org.freenas.c=
tl:xen-lun-35,xvda,w'<br clear=3D"none">
&nbsp; &nbsp; &nbsp; &nbsp; ]<br clear=3D"none">
<br clear=3D"none">
<br clear=3D"none">
# usb passthrough for the zwave stick<br clear=3D"none">
usbctrl=3D['type=3Dauto,version=3D2,ports=3D4']<br clear=3D"none">
usbdev=3D['type=3Dhostdev,hostbus=3D2,hostaddr=3D3']<br clear=3D"none">
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br clear=3D"none">
<br clear=3D"none">
There is a grub.cfg in /boot/grub/grub.cfg on that disk. It's a standard <b=
r clear=3D"none">
ubuntu 18.04 vm, which I've built a kernel with the PVUSB drivers on it. <b=
r clear=3D"none">
Trying to get that kernel to boot easily, and a more real grub <br clear=3D=
"none">
environment would help solve it.<br clear=3D"none">
<br clear=3D"none">
Thanks!<br clear=3D"none">
<br clear=3D"none">
</blockquote></div></div></div></div></div></div>
            </div>
        </div></body></html>
------=_Part_1413094_869866026.1592273621084--


From xen-users-bounces@lists.xenproject.org Wed Jun 17 09:27:43 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 17 Jun 2020 09:27:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jlUKe-0007jM-EU; Wed, 17 Jun 2020 09:26:08 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=MFcl=76=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1jlUKc-0007jH-S8
 for xen-users@lists.xenproject.org; Wed, 17 Jun 2020 09:26:06 +0000
X-Inumbo-ID: 8fdc1e3e-b07c-11ea-b9b5-12813bfff9fa
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 8fdc1e3e-b07c-11ea-b9b5-12813bfff9fa;
 Wed, 17 Jun 2020 09:26:03 +0000 (UTC)
Received: from [IPv6:2a02:a213:2b80:f000::12] (unknown
 [IPv6:2a02:a213:2b80:f000::12])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 252D7609555C7;
 Wed, 17 Jun 2020 11:26:02 +0200 (CEST)
Subject: Re: Unable to puzzle through grub.xen_pvh
To: xen-users@lists.xenproject.org, David Kowis <david@kow.is>
References: <344966d2b9ff0064ccc9e8b59158de4d@kow.is>
From: Hans van Kranenburg <hans@knorrie.org>
Autocrypt: addr=hans@knorrie.org; keydata=
 mQINBFo2pooBEADwTBe/lrCa78zuhVkmpvuN+pXPWHkYs0LuAgJrOsOKhxLkYXn6Pn7e3xm+
 ySfxwtFmqLUMPWujQYF0r5C6DteypL7XvkPP+FPVlQnDIifyEoKq8JZRPsAFt1S87QThYPC3
 mjfluLUKVBP21H3ZFUGjcf+hnJSN9d9MuSQmAvtJiLbRTo5DTZZvO/SuQlmafaEQteaOswme
 DKRcIYj7+FokaW9n90P8agvPZJn50MCKy1D2QZwvw0g2ZMR8yUdtsX6fHTe7Ym+tHIYM3Tsg
 2KKgt17NTxIqyttcAIaVRs4+dnQ23J98iFmVHyT+X2Jou+KpHuULES8562QltmkchA7YxZpT
 mLMZ6TPit+sIocvxFE5dGiT1FMpjM5mOVCNOP+KOup/N7jobCG15haKWtu9k0kPz+trT3NOn
 gZXecYzBmasSJro60O4bwBayG9ILHNn+v/ZLg/jv33X2MV7oYXf+ustwjXnYUqVmjZkdI/pt
 30lcNUxCANvTF861OgvZUR4WoMNK4krXtodBoEImjmT385LATGFt9HnXd1rQ4QzqyMPBk84j
 roX5NpOzNZrNJiUxj+aUQZcINtbpmvskGpJX0RsfhOh2fxfQ39ZP/0a2C59gBQuVCH6C5qsY
 rc1qTIpGdPYT+J1S2rY88AvPpr2JHZbiVqeB3jIlwVSmkYeB/QARAQABtCZIYW5zIHZhbiBL
 cmFuZW5idXJnIDxoYW5zQGtub3JyaWUub3JnPokCTgQTAQoAOBYhBOJv1o/B6NS2GUVGTueB
 VzIYDCpVBQJaNq7KAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEOeBVzIYDCpVgDMQ
 ANSQMebh0Rr6RNhfA+g9CKiCDMGWZvHvvq3BNo9TqAo9BC4neAoVciSmeZXIlN8xVALf6rF8
 lKy8L1omocMcWw7TlvZHBr2gZHKlFYYC34R2NvxS0xO8Iw5rhEU6paYaKzlrvxuXuHMVXgjj
 bM3zBiN8W4b9VW1MoynP9nvm1WaGtFI9GIyK9j6mBCU+N5hpvFtt4DBmuWjzdDkd3sWUufYd
 nQhGimWHEg95GWhQUiFvr4HRvYJpbjRRRQG3O/5Fm0YyTYZkI5CDzQIm5lhqKNqmuf2ENstS
 8KcBImlbwlzEpK9Pa3Z5MUeLZ5Ywwv+d11fyhk53aT9bipdEipvcGa6DrA0DquO4WlQR+RKU
 ywoGTgntwFu8G0+tmD8J1UE6kIzFwE5kiFWjM0rxv1tAgV9ZWqmp3sbI7vzbZXn+KI/wosHV
 iDeW5rYg+PdmnOlYXQIJO+t0KmF5zJlSe7daylKZKTYtk7w1Fq/Oh1Rps9h1C4sXN8OAUO7h
 1SAnEtehHfv52nPxwZiI6eqbvqV0uEEyLFS5pCuuwmPpC8AmOrciY2T8T+4pmkJNO2Nd3jOP
 cnJgAQrxPvD7ACp/85LParnoz5c9/nPHJB1FgbAa7N5d8ubqJgi+k9Q2lAL9vBxK67aZlFZ0
 Kd7u1w1rUlY12KlFWzxpd4TuHZJ8rwi7PUceuQINBFo2sK8BEADSZP5cKnGl2d7CHXdpAzVF
 6K4Hxwn5eHyKC1D/YvsY+otq3PnfLJeMf1hzv2OSrGaEAkGJh/9yXPOkQ+J1OxJJs9CY0fqB
 MvHZ98iTyeFAq+4CwKcnZxLiBchQJQd0dFPujtcoMkWgzp3QdzONdkK4P7+9XfryPECyCSUF
 ib2aEkuU3Ic4LYfsBqGR5hezbJqOs96ExMnYUCEAS5aeejr3xNb8NqZLPqU38SQCTLrAmPAX
 glKVnYyEVxFUV8EXXY6AK31lRzpCqmPxLoyhPAPda9BXchRluy+QOyg+Yn4Q2DSwbgCYPrxo
 HTZKxH+E+JxCMfSW35ZE5ufvAbY3IrfHIhbNnHyxbTRgYMDbTQCDyN9F2Rvx3EButRMApj+v
 OuaMBJF/fWfxL3pSIosG9Q7uPc+qJvVMHMRNnS0Y1QQ5ZPLG0zI5TeHzMnGmSTbcvn/NOxDe
 6EhumcclFS0foHR78l1uOhUItya/48WCJE3FvOS3+KBhYvXCsG84KVsJeen+ieX/8lnSn0d2
 ZvUsj+6wo+d8tcOAP+KGwJ+ElOilqW29QfV4qvqmxnWjDYQWzxU9WGagU3z0diN97zMEO4D8
 SfUu72S5O0o9ATgid9lEzMKdagXP94x5CRvBydWu1E5CTgKZ3YZv+U3QclOG5p9/4+QNbhqH
 W4SaIIg90CFMiwARAQABiQRsBBgBCgAgFiEE4m/Wj8Ho1LYZRUZO54FXMhgMKlUFAlo2sK8C
 GwICQAkQ54FXMhgMKlXBdCAEGQEKAB0WIQRJbJ13A1ob3rfuShiywd9yY2FfbAUCWjawrwAK
 CRCywd9yY2FfbMKbEACIGLdFrD5j8rz/1fm8xWTJlOb3+o5A6fdJ2eyPwr5njJZSG9i5R28c
 dMmcwLtVisfedBUYLaMBmCEHnj7ylOgJi60HE74ZySX055hKECNfmA9Q7eidxta5WeXeTPSb
 PwTQkAgUZ576AO129MKKP4jkEiNENePMuYugCuW7XGR+FCEC2efYlVwDQy24ZfR9Q1dNK2ny
 0gH1c+313l0JcNTKjQ0e7M9KsQSKUr6Tk0VGTFZE2dp+dJF1sxtWhJ6Ci7N1yyj3buFFpD9c
 kj5YQFqBkEwt3OGtYNuLfdwR4d47CEGdQSm52n91n/AKdhRDG5xvvADG0qLGBXdWvbdQFllm
 v47TlJRDc9LmwpIqgtaUGTVjtkhw0SdiwJX+BjhtWTtrQPbseDe2pN3gWte/dPidJWnj8zzS
 ggZ5otY2reSvM+79w/odUlmtaFx+IyFITuFnBVcMF0uGmQBBxssew8rePQejYQHz0bZUDNbD
 VaZiXqP4njzBJu5+nzNxQKzQJ0VDF6ve5K49y0RpT4IjNOupZ+OtlZTQyM7moag+Y6bcJ7KK
 8+MRdRjGFFWP6H/RCSFAfoOGIKTlZHubjgetyQhMwKJQ5KnGDm+XUkeIWyevPfCVPNvqF2q3
 viQm0taFit8L+x7ATpolZuSCat5PSXtgx1liGjBpPKnERxyNLQ/erRNcEACwEJliFbQm+c2i
 6ccpx2cdtyAI1yzWuE0nr9DqpsEbIZzTCIVyry/VZgdJ27YijGJWesj/ie/8PtpDu0Cf1pty
 QOKSpC9WvRCFGJPGS8MmvzepmX2DYQ5MSKTO5tRJZ8EwCFfd9OxX2g280rdcDyCFkY3BYrf9
 ic2PTKQokx+9sLCHAC/+feSx/MA/vYpY1EJwkAr37mP7Q8KA9PCRShJziiljh5tKQeIG4sz1
 QjOrS8WryEwI160jKBBNc/M5n2kiIPCrapBGsL58MumrtbL53VimFOAJaPaRWNSdWCJSnVSv
 kCHMl/1fRgzXEMpEmOlBEY0Kdd1Ut3S2cuwejzI+WbrQLgeps2N70Ztq50PkfWkj0jeethhI
 FqIJzNlUqVkHl1zCWSFsghxiMyZmqULaGcSDItYQ+3c9fxIO/v0zDg7bLeG9Zbj4y8E47xqJ
 6brtAAEJ1RIM42gzF5GW71BqZrbFFoI0C6AzgHjaQP1xfj7nBRSBz4ObqnsuvRr7H6Jme5rl
 eg7COIbm8R7zsFjF4tC6k5HMc1tZ8xX+WoDsurqeQuBOg7rggmhJEpDK2f+g8DsvKtP14Vs0
 Sn7fVJi87b5HZojry1lZB2pXUH90+GWPF7DabimBki4QLzmyJ/ENH8GspFulVR3U7r3YYQ5K
 ctOSoRq9pGmMi231Q+xx9LkCDQRaOtArARAA50ylThKbq0ACHyomxjQ6nFNxa9ICp6byU9Lh
 hKOax0GB6l4WebMsQLhVGRQ8H7DT84E7QLRYsidEbneB1ciToZkL5YFFaVxY0Hj1wKxCFcVo
 CRNtOfoPnHQ5m/eDLaO4o0KKL/kaxZwTn2jnl6BQDGX1Aak0u4KiUlFtoWn/E/NIv5QbTGSw
 IYuzWqqYBIzFtDbiQRvGw0NuKxAGMhwXy8VP05mmNwRdyh/CC4rWQPBTvTeMwr3nl8/G+16/
 cn4RNGhDiGTTXcX03qzZ5jZ5N7GLY5JtE6pTpLG+EXn5pAnQ7MvuO19cCbp6Dj8fXRmI0SVX
 WKSo0A2C8xH6KLCRfUMzD7nvDRU+bAHQmbi5cZBODBZ5yp5CfIL1KUCSoiGOMpMin3FrarIl
 cxhNtoE+ya23A+JVtOwtM53ESra9cJL4WPkyk/E3OvNDmh8U6iZXn4ZaKQTHaxN9yvmAUhZQ
 iQi/sABwxCcQQ2ydRb86Vjcbx+FUr5OoEyQS46gc3KN5yax9D3H9wrptOzkNNMUhFj0oK0fX
 /MYDWOFeuNBTYk1uFRJDmHAOp01rrMHRogQAkMBuJDMrMHfolivZw8RKfdPzgiI500okLTzH
 C0wgSSAOyHKGZjYjbEwmxsl3sLJck9IPOKvqQi1DkvpOPFSUeX3LPBIav5UUlXt0wjbzInUA
 EQEAAYkCNgQYAQoAIBYhBOJv1o/B6NS2GUVGTueBVzIYDCpVBQJaOtArAhsMAAoJEOeBVzIY
 DCpV4kgP+wUh3BDRhuKaZyianKroStgr+LM8FIUwQs3Fc8qKrcDaa35vdT9cocDZjkaGHprp
 mlN0OuT2PB+Djt7am2noV6Kv1C8EnCPpyDBCwa7DntGdGcGMjH9w6aR4/ruNRUGS1aSMw8sR
 QgpTVWEyzHlnIH92D+k+IhdNG+eJ6o1fc7MeC0gUwMt27Im+TxVxc0JRfniNk8PUAg4kvJq7
 z7NLBUcJsIh3hM0WHQH9AYe/mZhQq5oyZTsz4jo/dWFRSlpY7zrDS2TZNYt4cCfZj1bIdpbf
 SpRi9M3W/yBF2WOkwYgbkqGnTUvr+3r0LMCH2H7nzENrYxNY2kFmDX9bBvOWsWpcMdOEo99/
 Iayz5/q2d1rVjYVFRm5U9hG+C7BYvtUOnUvSEBeE4tnJBMakbJPYxWe61yANDQubPsINB10i
 ngzsm553yqEjLTuWOjzdHLpE4lzD416ExCoZy7RLEHNhM1YQSI2RNs8umlDfZM9Lek1+1kgB
 vT3RH0/CpPJgveWV5xDOKuhD8j5l7FME+t2RWP+gyLid6dE0C7J03ir90PlTEkMEHEzyJMPt
 OhO05Phy+d51WPTo1VSKxhL4bsWddHLfQoXW8RQ388Q69JG4m+JhNH/XvWe3aQFpYP+GZuzO
 hkMez0lHCaVOOLBSKHkAHh9i0/pH+/3hfEa4NsoHCpyy
Message-ID: <ed5ebb2a-284b-e778-e6df-c3d0ebb9477b@knorrie.org>
Date: Wed, 17 Jun 2020 11:26:01 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.4.1
MIME-Version: 1.0
In-Reply-To: <344966d2b9ff0064ccc9e8b59158de4d@kow.is>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

On 6/9/20 3:58 AM, David Kowis wrote:
> I started here: 
> https://wiki.xenproject.org/wiki/Xen_4.12_RC_test_instructions#PVH_domU_boot_via_grub2
> 
> [...]
> 
> There is a grub.cfg in /boot/grub/grub.cfg on that disk. It's a standard 
> ubuntu 18.04 vm,

It looks like standad ubuntu 18.04 has a linux kernel based on v4.15.
The final patches to boot PVH with grub went into linux 4.20.

Hans


From xen-users-bounces@lists.xenproject.org Thu Jun 18 19:56:21 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2020 19:56:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jm0ch-0006nb-P4; Thu, 18 Jun 2020 19:54:55 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZZvs=77=gmail.com=m.l.hargreaves@srs-us1.protection.inumbo.net>)
 id 1jlxgr-0007cF-EB
 for xen-users@lists.xenproject.org; Thu, 18 Jun 2020 16:47:01 +0000
X-Inumbo-ID: 54312a8e-b183-11ea-b7bb-bc764e2007e4
Received: from mail-wr1-x433.google.com (unknown [2a00:1450:4864:20::433])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 54312a8e-b183-11ea-b7bb-bc764e2007e4;
 Thu, 18 Jun 2020 16:47:00 +0000 (UTC)
Received: by mail-wr1-x433.google.com with SMTP id c3so6746184wru.12
 for <xen-users@lists.xenproject.org>; Thu, 18 Jun 2020 09:47:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=to:from:subject:message-id:date:user-agent:mime-version
 :content-language:content-transfer-encoding;
 bh=xOhXuFNA3JWGHLUFAjzrIROrq9AxFxi5mPpMs+p6qik=;
 b=an65PvHfSLzXlRLusQlweWA38PoRMrnqVsHvNG+cvLHQJouX3Q1V8eRknRJCd53TGz
 jgt5rzs9sCuG9vk3BDyonXu/KYl62oAjUslenU5zyFRTRJEddYDWWHgbmMBXsHbKhsra
 kZFyhwcuit1S4SlPsTq4xvOhJBNWgs4Eqk2k/L2R5uhB8lvXDqiGbdZ4ezF+HmsGSBUY
 ruvMAK7TfBAP+fX+mcr7oVuLFXbM0WwCNptoJxwSQPsZn49HKekbjhWtrpnVmU/1IubU
 0d7vK0V0l2sw1c3b/LXfM7nMu7N6tYiHUTc6ESOWk57JmBzvl2hwKHhk1vPe7Sx1h8Qp
 yfZg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:to:from:subject:message-id:date:user-agent
 :mime-version:content-language:content-transfer-encoding;
 bh=xOhXuFNA3JWGHLUFAjzrIROrq9AxFxi5mPpMs+p6qik=;
 b=J0ezrtCRur+1wpdyi0VG3RWt8EG4PQVd/oBZvtHsRp1eLDdUcjtW/Gs1mH8i/g78DO
 LNlSSYFaIgfEFy9+oEAQr3LzMz0DmSaqpFeRaBrxKfx8Ax3cMbhK7pvTh5HT4ia6e5hT
 +gDN/AflXotf23LNJF1wWS9ke0Y+h9Mxj2nTip0dnmqtmLr4yHMBs0DSkof9aaD4oyyf
 LOPMlfSZ/dT44S+s0eqUxJMKXSgdbBjTSX7MRiUQz/VH/eCh/Zj9R7x0mwsTYcCXbr+c
 k3jb9wIxE0bum5HpPPzQJLsG58hoNQlvFNcUcfiHCo3WkGAj1y0gVU3W8RUfc0Gp5NWx
 3fpg==
X-Gm-Message-State: AOAM533oUo1RGlO/rpIzJWgskydbN8E42nBtNR5J1/bxcZMQWcZwGM4C
 hZ9bS/xpOncjOSowz6MYBAlLkn/ex+k=
X-Google-Smtp-Source: ABdhPJziY5Rv/JAZeIDgrV8UJMjzvyHShPMQ/qXba0gdQZC8VQl3t8Z09WQp7tEbKmYD5gGGLe7u4A==
X-Received: by 2002:adf:f889:: with SMTP id u9mr6050234wrp.149.1592498819385; 
 Thu, 18 Jun 2020 09:46:59 -0700 (PDT)
Received: from [192.168.0.20]
 (cpc112441-pres20-2-0-cust437.18-3.cable.virginm.net. [86.17.33.182])
 by smtp.gmail.com with ESMTPSA id j18sm4224406wrn.59.2020.06.18.09.46.58
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Thu, 18 Jun 2020 09:46:58 -0700 (PDT)
To: xen-users@lists.xenproject.org
From: Martin Hargreaves <m.l.hargreaves@gmail.com>
Subject: USB on DomU
Message-ID: <bf612b2d-313a-ecb8-acbd-3669f769953f@gmail.com>
Date: Thu, 18 Jun 2020 17:46:57 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Mailman-Approved-At: Thu, 18 Jun 2020 19:54:55 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Dear Xen Community,

I have recently created an Ubuntu 16.04 Guest DomU which seems to run 
okay but I’m struggling for it to see USBs.

On my host Dom0 system, a ‘lsusb’  shows my device as..
Bus 002 Device 005: ID 058f:6387 Alcor Micro Corp. Flash Drive

In my config file I use the settings…

usbctrl=[ 'type=auto,version=2' ]
usbdev=[ 'hostbus=2,hostaddr=5' ]

As I issue the xl create command, the USB mounted on Dom0 is unmounted 
(I don’t know if this is expected) and my DomU seems to start ok. 
However, when I do an ‘lsusb’ I can’t see it when in my DomU.
On Dom0 (ID=3), if I issue the following command,  it seems like it has 
worked.
root@Dell-e6400-2:~# xl usb-list 3
Devid  Type         BE  state usb-ver ports
0      qusb         0   1     2       8
   Port 1: Bus 002 Device 005
   Port 2:
   Port 3:
   Port 4:
   Port 5:
   Port 6:
   Port 7:
   Port 8:

Am I missing a further step to see the USB device in my DomU?

   Thank you for any insights that anyone may have.

     Martin...


From xen-users-bounces@lists.xenproject.org Thu Jun 18 19:56:21 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Jun 2020 19:56:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jm0ch-0006nU-D6; Thu, 18 Jun 2020 19:54:55 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=FT2U=76=protonmail.com=mathieu.tarral@srs-us1.protection.inumbo.net>)
 id 1jlXM7-0008M2-9m
 for xen-users@lists.xenproject.org; Wed, 17 Jun 2020 12:39:51 +0000
X-Inumbo-ID: a2162d7c-b097-11ea-b9da-12813bfff9fa
Received: from mail-40133.protonmail.ch (unknown [185.70.40.133])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id a2162d7c-b097-11ea-b9da-12813bfff9fa;
 Wed, 17 Jun 2020 12:39:50 +0000 (UTC)
Date: Wed, 17 Jun 2020 12:39:42 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1592397588;
 bh=YLDt64R3zJ+FB5w8QdX+WfZ5EOJXFqqtE6ENHfAfNtk=;
 h=Date:To:From:Reply-To:Subject:From;
 b=FELfJiUiffJf50rZHzzIOjAL7Gi45gvvNgRns/cp9yMTTTmjh0soK1tG1mLrWveSD
 O0L7wEAcf4ZDNF6DUU+8FOROKc1ziYrxk7XsPKN4bletsOF4xRPPPvF8qs5OU2DEyx
 qrulc616XtuE1ukq961UHER9uYLJ06R9hvJn9PuA=
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
From: Mathieu Tarral <mathieu.tarral@protonmail.com>
Subject: Xen 4.11 - Unable to start X server: Nvidia out of memory error
Message-ID: <tO2fs7IxOgI6cQAi964nAOcRoHTpZUzxJNprbIdG2QnfxzjjV7_88ojFwuknQF4r1ySuR0zju6ihW7OBbYO1LJT4SN3WdW1aqhFspvplvmY=@protonmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM shortcircuit=no
 autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Thu, 18 Jun 2020 19:54:55 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Mathieu Tarral <mathieu.tarral@protonmail.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

I have Ubuntu 20.04 installed, and I'm using the provided Xen package: xen-=
hypervisor-4.11-amd64

Xen boots as expected, but I can't get my Gnome desktop, since the X server=
 fails to start.

Looking at the journalctl logs, I can see the errors related the Gnome:
/usr/lib/gdm3/gdm-x-session[1962]: Unable to run X server

And a few lines before, an error related to Nvidia:
/usr/lib/gdm3/gdm-x-session[1966]: (WW) NVIDIA: Failed to bind sideband soc=
ket to
/usr/lib/gdm3/gdm-x-session[1966]: (WW) NVIDIA:     '/var/run/nvidia-xdrive=
r-66ed5ce3' Permission denied
/usr/lib/gdm3/gdm-x-session[1966]: (II) NVIDIA: Using 24576.00 MB of virtua=
l memory for indirect memory
/usr/lib/gdm3/gdm-x-session[1966]: (II) NVIDIA:     access.
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0): Failed to allocate softw=
are rendering cache surface: out of
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0):     memory.
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0):  *** Aborting ***
/usr/lib/gdm3/gdm-x-session[1966]: (EE)
/usr/lib/gdm3/gdm-x-session[1966]: Fatal server error:
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA: A GPU exception occurred du=
ring X server initialization

I can also see a GPU MMU fault in dmesg:
kernel: NVRM: Xid (PCI:0000:01:00): 31, pid=3D285, Ch 00000008, intr 000000=
00. MMU Fault: ENGINE GRAPHICS HUBCLIENT_FE faulted @ 0x0_00000000. Fault i=
s of type FAULT_PDE ACCESS_TYPE_VIRT_WRITE

In a normal boot I don't have these errors (with nouveau or nvidia driver),
so it's safe to assume that Xen is doing something that the drivers were no=
t prepared for.

I'm using the latest drivers available: nvidia-440

Have you already seen this error before ?
Any ideas how to fix this issue ?
Do you have contacts at Nvidia who could help ?

Best regards,
Mathieu Tarral




From xen-users-bounces@lists.xenproject.org Sat Jun 20 11:32:54 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 20 Jun 2020 11:32:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jmbiK-0001Lf-Qg; Sat, 20 Jun 2020 11:31:12 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=D+Kg=AB=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1jmbiI-0001La-Or
 for xen-users@lists.xenproject.org; Sat, 20 Jun 2020 11:31:11 +0000
X-Inumbo-ID: 897d6a2e-b2e9-11ea-bc7e-12813bfff9fa
Received: from sonic312-20.consmr.mail.bf2.yahoo.com (unknown [74.6.128.82])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 897d6a2e-b2e9-11ea-bc7e-12813bfff9fa;
 Sat, 20 Jun 2020 11:31:09 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1592652669; bh=Qg011Qwm9HUIapWOzAmeup3H2QsJnZwjJ90oxP5WXFw=;
 h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject;
 b=WhSu/FfV8EKKd5I7MqTfK3GEusg1JmLbRQBW2DuuxSRrs/dPizkLjNaA7zxtTT56UTNuYudboRoGk+gpaMsE6uEcJvGcTXVQzAfxVDWfhbVXmbfzf9I7j5aVesro1H+jvNfg6IqaFvezTIYScjTHZ0aOtP/P3EzXIc5NFkFufmnf/ISzsSf/rw3gEj06lFBAQ9rO5gDLO55xRFcAB8o/ZPdjTLQD0DxgegK94H3uKsjpo1BTZaYe0RC79Wc2a5uvR0Ei/w1ITDfLCXzIQKj3EOWFIUf8B3eCeiro6Oc4Qscd/3TD1VE2uDZ4qvzGHVhfepJaVBwGZEhr2k4PA1136Q==
X-YMail-OSG: cSpbB9MVM1kci5sO1TAV6.LtUjsZ2f9RBhXj1pmKoF9bme75qqURvgl4Lkq91oE
 AkemxgiVJneOiJ61TMWp42626BXf_8CdV7gJMzK7CsrpHUWUrPS5ExsP.26Zue6Dv4xGloUml2O9
 dHLz1E00xA2NA1PXD_WHmHoyQyiVBMqErcSgrS6hQCRwk3xpBdFpxuSr6YP2Svv1Bxh5S_1yKugt
 _8ckTSwfTd2A3rywYI.dYYCJFcPfW4bsVTqHbyLUbsYlk75dVeFjEYcXmdgm3mWdbkVToKnMSWNH
 syRtQkd0jxAKHtAWJL9oaLBK1mNM6c7RXvKCc4mFyZ0XBiiRJfQiSKDm6FGXtjFZmM.mIJJRqfQt
 MN83j8XdjkMeTuLub7w_OifJtquFRTu9DA5sgMkv.M9p6NJ4G3VXLPbOcUvmnH9nrlgCBFnk3HPa
 qngcyn62aR2QBIr4HH.v9HyRxvc9eFrOh75cO.1bfaoXW.cwqUDLSDHgrLr_CZdMLogyo4h9R.Pl
 _ji.g6dAcB5YnfgHUh3hnTFfuXYd6YcL2Ftx3C4LO9Zy3E02mbtgZ8HziRe2PhzLMpsQauSep_If
 5lwiSnv6mAz09mQUZQfLIJ1JwMGWPSH7Qo1vp4Cwmx.xnrCI1fJ1psqfUYFXfQI8cHeWtMseL5Tv
 OyixqeaebJl3o3ENqSXnN0zFaWspOVZaoZ3TQfpPfjn.T_omPxgTPP8H3PlOlSm3Qgj_1vaGPnx6
 MLl3ZK4LINx9FVSKw5qPaAol1KuHdx1q8gk7HG5hxBrpZh7GXLwe_TxUK9TVJGTbXjzguPMUZMYU
 0b2bT6uYWqrf1TeBPEooYpydDOx5uHTeQoXKa8renVKHG0HSL4z3jTaCurNS7PwUZ4KI.uuuzU74
 Y4MNi03bjH61yu.8IAdQP3BShztkN6gAobH_1zba5egvIfOjQdFOnbBn1fOGkrB.aQkeHuATmLYB
 6Wgbcgc43777TjRsF_openjjF6sFWWbGAN5piycZxtTo0KHpE39UcjtOPu8ul0.WuXEvW_K72AgD
 FYsQOQ5k_Q2UMWp0jc6Ixze.NqYBCALrRUUHgZqKhPFX1nbWnvAG_rKt7AzOUOj7kYS_5oJE.hCI
 0Df_A8Ly7zGPbLJoGo5jszh423IqDNzuwxiPkuRzN3T4EAykVRTTSvDptyjKCfmIbdgk0caMarVX
 eGlcxZo2IOi6FltBQT0Ratz5YY7OomRfLg41bopshDOUttPFnaPVyFYAh8HD2CmzdSGB7wWECwPU
 3vfyQQXFMh1tDNpBBrTHq5Sc608GFy8Kjg._LYaHkiMsNqwSXt_5jnIZaKhj2mvhRPvYpyY4MyVc
 iHnSOjA6chNJ46UH.5mbVpPv.XkxtsVem9UmEAAQ1zjp4y56XLO3KhGucu3CkAdbBFWV9cD.PGs7
 dRbnlOKHF2dYCBKoRx7oPQXK0__aBmomQWx0WLPz5KDbp
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic312.consmr.mail.bf2.yahoo.com with HTTP; Sat, 20 Jun 2020 11:31:09 +0000
Date: Sat, 20 Jun 2020 11:31:06 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: Mathieu Tarral <mathieu.tarral@protonmail.com>, 
 Xen-users <xen-users@lists.xenproject.org>
Message-ID: <1678948629.787368.1592652666377@mail.yahoo.com>
In-Reply-To: <tO2fs7IxOgI6cQAi964nAOcRoHTpZUzxJNprbIdG2QnfxzjjV7_88ojFwuknQF4r1ySuR0zju6ihW7OBbYO1LJT4SN3WdW1aqhFspvplvmY=@protonmail.com>
References: <tO2fs7IxOgI6cQAi964nAOcRoHTpZUzxJNprbIdG2QnfxzjjV7_88ojFwuknQF4r1ySuR0zju6ihW7OBbYO1LJT4SN3WdW1aqhFspvplvmY=@protonmail.com>
Subject: Re: Xen 4.11 - Unable to start X server: Nvidia out of memory error
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_787367_1545854516.1592652666373"
X-Mailer: WebService/1.1.16138 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.2; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 5953
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_787367_1545854516.1592652666373
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Is it a Xen problem or Nvidia?

Sent from Yahoo Mail on Android=20
=20
  On Fri, Jun 19, 2020 at 12:25 AM, Mathieu Tarral<mathieu.tarral@protonmai=
l.com> wrote:   Hi,

I have Ubuntu 20.04 installed, and I'm using the provided Xen package: xen-=
hypervisor-4.11-amd64

Xen boots as expected, but I can't get my Gnome desktop, since the X server=
 fails to start.

Looking at the journalctl logs, I can see the errors related the Gnome:
/usr/lib/gdm3/gdm-x-session[1962]: Unable to run X server

And a few lines before, an error related to Nvidia:
/usr/lib/gdm3/gdm-x-session[1966]: (WW) NVIDIA: Failed to bind sideband soc=
ket to
/usr/lib/gdm3/gdm-x-session[1966]: (WW) NVIDIA:=C2=A0 =C2=A0 '/var/run/nvid=
ia-xdriver-66ed5ce3' Permission denied
/usr/lib/gdm3/gdm-x-session[1966]: (II) NVIDIA: Using 24576.00 MB of virtua=
l memory for indirect memory
/usr/lib/gdm3/gdm-x-session[1966]: (II) NVIDIA:=C2=A0 =C2=A0 access.
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0): Failed to allocate softw=
are rendering cache surface: out of
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0):=C2=A0 =C2=A0 memory.
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0):=C2=A0 *** Aborting ***
/usr/lib/gdm3/gdm-x-session[1966]: (EE)
/usr/lib/gdm3/gdm-x-session[1966]: Fatal server error:
/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA: A GPU exception occurred du=
ring X server initialization

I can also see a GPU MMU fault in dmesg:
kernel: NVRM: Xid (PCI:0000:01:00): 31, pid=3D285, Ch 00000008, intr 000000=
00. MMU Fault: ENGINE GRAPHICS HUBCLIENT_FE faulted @ 0x0_00000000. Fault i=
s of type FAULT_PDE ACCESS_TYPE_VIRT_WRITE

In a normal boot I don't have these errors (with nouveau or nvidia driver),
so it's safe to assume that Xen is doing something that the drivers were no=
t prepared for.

I'm using the latest drivers available: nvidia-440

Have you already seen this error before ?
Any ideas how to fix this issue ?
Do you have contacts at Nvidia who could help ?

Best regards,
Mathieu Tarral


 =20

------=_Part_787367_1545854516.1592652666373
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Is it a Xen problem or Nvidia?<br id=3D"yMail_cursorElementTracker_15926526=
23294"><br><div id=3D"ymail_android_signature"><a id=3D"ymail_android_signa=
ture_link" href=3D"https://go.onelink.me/107872968?pid=3DInProduct&amp;c=3D=
Global_Internal_YGrowth_AndroidEmailSig__AndroidUsers&amp;af_wl=3Dym&amp;af=
_sub1=3DInternal&amp;af_sub2=3DGlobal_YGrowth&amp;af_sub3=3DEmailSignature"=
>Sent from Yahoo Mail on Android</a></div> <br> <blockquote style=3D"margin=
: 0 0 20px 0;"> <div style=3D"font-family:Roboto, sans-serif; color:#6D00F6=
;"> <div>On Fri, Jun 19, 2020 at 12:25 AM, Mathieu Tarral</div><div>&lt;mat=
hieu.tarral@protonmail.com&gt; wrote:</div> </div> <div style=3D"padding: 1=
0px 0 0 20px; margin: 10px 0 0 0; border-left: 1px solid #6D00F6;"> <div di=
r=3D"ltr">Hi,<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">I have U=
buntu 20.04 installed, and I'm using the provided Xen package: xen-hypervis=
or-4.11-amd64<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">Xen boot=
s as expected, but I can't get my Gnome desktop, since the X server fails t=
o start.<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">Looking at th=
e journalctl logs, I can see the errors related the Gnome:<br></div><div di=
r=3D"ltr">/usr/lib/gdm3/gdm-x-session[1962]: Unable to run X server<br></di=
v><div dir=3D"ltr"><br></div><div dir=3D"ltr">And a few lines before, an er=
ror related to Nvidia:<br></div><div dir=3D"ltr">/usr/lib/gdm3/gdm-x-sessio=
n[1966]: (WW) NVIDIA: Failed to bind sideband socket to<br></div><div dir=
=3D"ltr">/usr/lib/gdm3/gdm-x-session[1966]: (WW) NVIDIA:&nbsp; &nbsp;  '/va=
r/run/nvidia-xdriver-66ed5ce3' Permission denied<br></div><div dir=3D"ltr">=
/usr/lib/gdm3/gdm-x-session[1966]: (II) NVIDIA: Using 24576.00 MB of virtua=
l memory for indirect memory<br></div><div dir=3D"ltr">/usr/lib/gdm3/gdm-x-=
session[1966]: (II) NVIDIA:&nbsp; &nbsp;  access.<br></div><div dir=3D"ltr"=
>/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0): Failed to allocate soft=
ware rendering cache surface: out of<br></div><div dir=3D"ltr">/usr/lib/gdm=
3/gdm-x-session[1966]: (EE) NVIDIA(0):&nbsp; &nbsp;  memory.<br></div><div =
dir=3D"ltr">/usr/lib/gdm3/gdm-x-session[1966]: (EE) NVIDIA(0):&nbsp; *** Ab=
orting ***<br></div><div dir=3D"ltr">/usr/lib/gdm3/gdm-x-session[1966]: (EE=
)<br></div><div dir=3D"ltr">/usr/lib/gdm3/gdm-x-session[1966]: Fatal server=
 error:<br></div><div dir=3D"ltr">/usr/lib/gdm3/gdm-x-session[1966]: (EE) N=
VIDIA: A GPU exception occurred during X server initialization<br></div><di=
v dir=3D"ltr"><br></div><div dir=3D"ltr">I can also see a GPU MMU fault in =
dmesg:<br></div><div dir=3D"ltr">kernel: NVRM: Xid (PCI:0000:01:00): 31, pi=
d=3D285, Ch 00000008, intr 00000000. MMU Fault: ENGINE GRAPHICS HUBCLIENT_F=
E faulted @ 0x0_00000000. Fault is of type FAULT_PDE ACCESS_TYPE_VIRT_WRITE=
<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">In a normal boot I do=
n't have these errors (with nouveau or nvidia driver),<br></div><div dir=3D=
"ltr">so it's safe to assume that Xen is doing something that the drivers w=
ere not prepared for.<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">=
I'm using the latest drivers available: nvidia-440<br></div><div dir=3D"ltr=
"><br></div><div dir=3D"ltr">Have you already seen this error before ?<br><=
/div><div dir=3D"ltr">Any ideas how to fix this issue ?<br></div><div dir=
=3D"ltr">Do you have contacts at Nvidia who could help ?<br></div><div dir=
=3D"ltr"><br></div><div dir=3D"ltr">Best regards,<br></div><div dir=3D"ltr"=
>Mathieu Tarral<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr"><br></=
div> </div> </blockquote>
------=_Part_787367_1545854516.1592652666373--


From xen-users-bounces@lists.xenproject.org Sat Jun 20 15:11:29 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 20 Jun 2020 15:11:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jmf7p-0002mk-25; Sat, 20 Jun 2020 15:09:45 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z+is=AB=protonmail.com=mathieu.tarral@srs-us1.protection.inumbo.net>)
 id 1jmbvh-0002QP-KG
 for xen-users@lists.xenproject.org; Sat, 20 Jun 2020 11:45:01 +0000
X-Inumbo-ID: 78427b8a-b2eb-11ea-bc82-12813bfff9fa
Received: from mail-40136.protonmail.ch (unknown [185.70.40.136])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 78427b8a-b2eb-11ea-bc82-12813bfff9fa;
 Sat, 20 Jun 2020 11:44:59 +0000 (UTC)
Date: Sat, 20 Jun 2020 11:44:53 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1592653498;
 bh=Fzyjiv2QdvKbaGG0MhYI6R5ahGaJmuLPLbJ5KdM9LNI=;
 h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References:From;
 b=SjZ9vVODxbLTudNxY/tSSMyHKcbt5g1hhjdJmV6m2CK930VewwHJ8qDLPmv674V0K
 V88sBN2+v7+4lQyCbND4pMYL5uHF51xFYpJClSlKwQP5RDL04ccbJKDJ1kNzESUIaK
 1xwFXR6+VfycAuNKBilvgp7vYqqcrGVicDVTfm4U=
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
From: Mathieu Tarral <mathieu.tarral@protonmail.com>
Subject: Re : Re: Xen 4.11 - Unable to start X server: Nvidia out of memory
 error
Message-ID: <R9OuCBE51-YB79RDCtAmnJm6sC8kBLmgd19jz9pcUXiB9zZWpWSdKvkjfYjkP-yj5n0NXrzm06Ztd2Ukc6Bqp4ZH6X9TFl9w6M7Cul6t79g=@protonmail.com>
In-Reply-To: <1678948629.787368.1592652666377@mail.yahoo.com>
References: <tO2fs7IxOgI6cQAi964nAOcRoHTpZUzxJNprbIdG2QnfxzjjV7_88ojFwuknQF4r1ySuR0zju6ihW7OBbYO1LJT4SN3WdW1aqhFspvplvmY=@protonmail.com>
 <1678948629.787368.1592652666377@mail.yahoo.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_crbKDBq5Ex7MPh3nwH925WEEEMd10MN2K8MOHxXiLA"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Sat, 20 Jun 2020 15:09:43 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Mathieu Tarral <mathieu.tarral@protonmail.com>
Cc: Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_crbKDBq5Ex7MPh3nwH925WEEEMd10MN2K8MOHxXiLA
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64
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--b1_crbKDBq5Ex7MPh3nwH925WEEEMd10MN2K8MOHxXiLA
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64
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--b1_crbKDBq5Ex7MPh3nwH925WEEEMd10MN2K8MOHxXiLA--



From xen-users-bounces@lists.xenproject.org Sun Jun 21 15:54:30 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 21 Jun 2020 15:54:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jn2Gt-0007Ce-D3; Sun, 21 Jun 2020 15:52:39 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=fURE=AC=rah.ro=eugen@srs-us1.protection.inumbo.net>)
 id 1jn2Gs-0007CZ-Dy
 for xen-users@lists.xenproject.org; Sun, 21 Jun 2020 15:52:38 +0000
X-Inumbo-ID: 38314386-b3d7-11ea-bdb9-12813bfff9fa
Received: from smtp1.rdslink.ro (unknown [81.196.12.70])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 38314386-b3d7-11ea-bdb9-12813bfff9fa;
 Sun, 21 Jun 2020 15:52:33 +0000 (UTC)
Received: from 5-15-248-161.residential.rdsnet.ro ([5.15.248.161]:43650
 helo=rah.ro) by smtp1.rdslink.ro with esmtp (Exim 4.84_2)
 (envelope-from <eugen@rah.ro>) id 1jn2Gk-0005If-BN
 for xen-users@lists.xenproject.org; Sun, 21 Jun 2020 18:52:32 +0300
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=rah.ro;
 s=1024k1; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date;
 bh=nMLAU1spp1v+kMQWBa8PmEbUqpJrOUHueq0B1teDRHs=; 
 b=Hvo2o1C2D9hbG2Id2vTMbmTOxzm/66UucEJQplSEHRJ3dygEJmhMppDVgdP0l+2trn8f4bd6zS/pURZ0aHT/YuvO25V59qe2Xj6+dBGYeCTUcEOkDh8Z2Qy8skjPQIP8Q7//1+kKbs63NFs9TLJShCoEDkYoIQB0VT11ZxsgrVU=;
Received: from eugen by rah.ro with local (Exim 4.84_2)
 (envelope-from <eugen@rah.ro>) id 1jn2Gj-0002Ox-Oo
 for xen-users@lists.xenproject.org; Sun, 21 Jun 2020 18:52:29 +0300
Date: Sun, 21 Jun 2020 18:52:29 +0300
From: eugen@rah.ro
To: xen-users@lists.xenproject.org
Subject: Re: Xen 4.11 on MacPro (early2008) NOT booting, blank screen. Dom0
 alone boots OK; Debian buster, LVM on Raid1, efi
Message-ID: <20200621155229.GA9125@rah.ro>
Mail-Followup-To: xen-users@lists.xenproject.org
References: <20200608190311.GC29385@rah.ro>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20200608190311.GC29385@rah.ro>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Spam_score: 0.4
X-Spam_score_int: 4
X-Spam_bar: /
X-Spam_report: Spam detection software,
 running on the system "spamassassin-smtp.rdsnet.ro", 
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 the administrator of that system for details.
 Content preview:  Finally, I found a solution to my problem: > It's a fresh
 installation, using debian installer,
 then installing > the xen-system packages.
 See hardware and versions details later below. > > Booting the Debian system, 
 the dom0 alone, works great. > Booting with Xen Hypervisor stops at a blank
 screen, as described below: > All the Grub2 commands seems to be executed
 ok: the echo messages are > displayed, I can see them fine (like 'Loading
 initial ramdisk ...', > including a last echo debug message I put there myself.
 Immediately after > that, the screen goes blank and stays blank forever.
 My Samsung TV > (hdmi) doesn't complain about signal lost or something. >
 > There are no log messages in /var/log or any indication that domO under
 > Xen was loading/starting. Also no network presence (like ping, ssh). [...]
 Content analysis details:   (0.4 points, 6.0 required)
 pts rule name              description
 ---- ---------------------- --------------------------------------------------
 0.0 TVD_RCVD_IP            Message was received from an IP address
 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked.
 See
 http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
 for more information. [URIs: xenproject.org]
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
 -0.0 SPF_PASS               SPF: sender matches SPF record
 0.0 T_DKIM_INVALID         DKIM-Signature header exists but is not valid
 0.4 RDNS_DYNAMIC           Delivered to internal network by host with
 dynamic-looking rDNS
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


Finally, I found a solution to my problem:

> It's a fresh installation, using debian installer, then installing
> the xen-system packages. See hardware and versions details later below.
> 
> Booting the Debian system, the dom0 alone, works great.
> Booting with Xen Hypervisor stops at a blank screen, as described below:
> All the Grub2 commands seems to be executed ok: the echo messages are
> displayed, I can see them fine (like 'Loading initial ramdisk ...',
> including a last echo debug message I put there myself. Immediately after
> that, the screen goes blank and stays blank forever. My Samsung TV
> (hdmi) doesn't complain about signal lost or something.
> 
> There are no log messages in /var/log or any indication that domO under
> Xen was loading/starting. Also no network presence (like ping, ssh).

All I had to do for it to work was to disable the UEFI Runtime Services, by
providing this Xen command line option:

efi=no-rs

Some details about Xen and Runtime Services, I found here:
https://wiki.xenproject.org/wiki/Xen_EFI#Compatibility_of_UEFI_Host_Firmware.2C_Xen_and_UEFI_Runtime_Services


> 
> Hardware:
> MacPro (early 2008: Macpro3,1)
> 2x Intel Xeon 4562
> ATI Radeon HD 2600 (2xDVI ports) with firmware from
> firmware-amd-graphics package
> connected to a Samsung TV (dvi-hdmi cable)
> 
> Software:
> Debian buster (10.4) amd64 - using debian-installer
> LVM on RAID1
> Using EFI 64 bits
> Grub 2.02
> Linux kernel 4.19.0-9-amd64
> Xen-system 4.11.3
 
Regards,
   Eugen
 


From xen-users-bounces@lists.xenproject.org Mon Jun 22 00:54:43 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Jun 2020 00:54:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jnAi8-0004OR-Ah; Mon, 22 Jun 2020 00:53:20 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=x9fn=AB=dettenbach.de=niels@srs-us1.protection.inumbo.net>)
 id 1jmfTQ-0005Kp-EB
 for xen-users@lists.xenproject.org; Sat, 20 Jun 2020 15:32:04 +0000
X-Inumbo-ID: 2fb1d954-b30b-11ea-bb8b-bc764e2007e4
Received: from mail.syndicat.com (unknown [62.146.89.62])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2fb1d954-b30b-11ea-bb8b-bc764e2007e4;
 Sat, 20 Jun 2020 15:32:02 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=dettenbach.de; s=x; h=To:In-Reply-To:Cc:References:Message-Id:Date:Subject:
 Mime-Version:From:Content-Transfer-Encoding:Content-Type:Sender:Reply-To:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=Iz/FeHephFbvHGd1OueP+xEMff5b1X8YOgbA8yrDHmQ=; b=MD3vqEij8sOmrszoArN1Bf7iUF
 iVQdKTtvy0wXG+2UASSmtbttzEjOlT5OCzg5vFtclCeirbMLYJjnzKQ3U4R2wOU41EbnJs3O65YVQ
 cFQNMyhpSBgKBGC1K2oxUvO81SvGWEqQqEE445qdsUeCH5qvbIy9p76E/413Apqg8eRc=;
Received: from localhost ([127.0.0.1]:64855)
 by mail.syndicat.com with esmtp (Syndicat PostHamster 4.92.2)
 (envelope-from <niels@dettenbach.de>)
 id 1jmfTM-00042K-KR; Sat, 20 Jun 2020 17:32:00 +0200
X-Virus-Scanned: amavisd-new at syndicat.com
Received: from mail.syndicat.com ([127.0.0.1])
 by localhost (mail.syndicat.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id KQfbkkw5Ekbb; Sat, 20 Jun 2020 17:32:00 +0200 (CEST)
Received: from p579496bf.dip0.t-ipconnect.de ([87.148.150.191]:54783
 helo=[192.168.222.38])
 by mail.syndicat.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 (Syndicat PostHamster 4.92.2) (envelope-from <niels@dettenbach.de>)
 id 1jmfTM-0004ic-35; Sat, 20 Jun 2020 17:32:00 +0200
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
From: Niels Dettenbach <niels@dettenbach.de>
Mime-Version: 1.0 (1.0)
Subject: Re: Xen 4.11 - Unable to start X server: Nvidia out of memory error
Date: Sat, 20 Jun 2020 17:31:59 +0200
Message-Id: <FD5811FA-A05E-4B67-94D0-91CD2F3A7ECC@dettenbach.de>
References: <R9OuCBE51-YB79RDCtAmnJm6sC8kBLmgd19jz9pcUXiB9zZWpWSdKvkjfYjkP-yj5n0NXrzm06Ztd2Ukc6Bqp4ZH6X9TFl9w6M7Cul6t79g=@protonmail.com>
In-Reply-To: <R9OuCBE51-YB79RDCtAmnJm6sC8kBLmgd19jz9pcUXiB9zZWpWSdKvkjfYjkP-yj5n0NXrzm06Ztd2Ukc6Bqp4ZH6X9TFl9w6M7Cul6t79g=@protonmail.com>
To: Mathieu Tarral <mathieu.tarral@protonmail.com>
X-Mailer: iPhone Mail (17F80)
X-Report-Abuse-To: abuse@syndicat.com (see
 https://www.syndicat.com/kontakt/kontakte/)
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.syndicat.com
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Sender Address Domain - dettenbach.de
X-Mailman-Approved-At: Mon, 22 Jun 2020 00:53:19 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>,
 Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


> Am 20.06.2020 um 17:12 schrieb Mathieu Tarral <mathieu.tarral@protonmail.c=
om>:
>=20
> Considering that in a normal boot I don't have any issue with Nvidia,
> I would say it is related to Xen.

as a xen user i remember from years ago, NVidias proprietary graphic drivers=
 for linux made problems if runned under Xen too. If i remember correctly, t=
he reason was of some =E2=80=9Eimproper=E2=80=9C handling of memory / ressou=
rce access / management / driver implementation which only affected some kin=
d of virtualization stuff xen relys on. The open source nv driver variant (w=
ithout the =E2=80=9Ebinary blob=E2=80=9C for extended features like some 3D a=
ccel stuff etc.) worked.

At that time it was difficult to get it solved as there was no real effort f=
rom NVidia at that time...

But afaik it got solved sometimes monthes later by NVidia (not tested it aga=
in then, because had switched to another graphic if yet).

So reasons are less =E2=80=9Eclear=E2=80=9C on the xen side then first impre=
ssion might pictures...

And if i remember right, a workaround was to use a older nvidia driver versi=
on (but not matched my kernel minimum version there...).=20


regards,


niels.



=E2=80=94
Niels Dettenbach
https://www.syndicat.com
https://www.syndicat.com/pub_key.asc




From xen-users-bounces@lists.xenproject.org Mon Jun 22 13:59:01 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Jun 2020 13:59:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jnMx2-0001vZ-7J; Mon, 22 Jun 2020 13:57:32 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Qqpc=AD=protonmail.com=mathieu.tarral@srs-us1.protection.inumbo.net>)
 id 1jnKyU-0007Kn-Ul
 for xen-users@lists.xenproject.org; Mon, 22 Jun 2020 11:50:55 +0000
X-Inumbo-ID: 9e24e466-b47e-11ea-b7bb-bc764e2007e4
Received: from mail-40136.protonmail.ch (unknown [185.70.40.136])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 9e24e466-b47e-11ea-b7bb-bc764e2007e4;
 Mon, 22 Jun 2020 11:50:50 +0000 (UTC)
Date: Mon, 22 Jun 2020 11:50:47 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1592826649;
 bh=biwRNqLCp+FrWUWNGAmxce3X+qhLVM0ah1Jf+OQkvUI=;
 h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References:From;
 b=YEPO6On0XHTeKw9QZhCz8ck/8hF/yGtWhjQFL9PbQeSShHwjQo4H3a+Bn7dfVocr9
 lGY+mAWkGn+b3MpW2sXKfnvpWIJf1a3WybbunNs6BD3RF0n1gVzs3j/Tg0JxYCvvTM
 TLbc/hK316YBLUByWt/NOrzwyrX6+oRKsFfCKv80=
To: Niels Dettenbach <niels@dettenbach.de>
From: Mathieu Tarral <mathieu.tarral@protonmail.com>
Subject: Re : Re: Xen 4.11 - Unable to start X server: Nvidia out of memory
 error
Message-ID: <_ZfZVKU8Udeev4duE6w5ordFZDYZlDnouW4O-N3SvUo52Shfak_V0l2Ypv5fGMxmvlNwUouIYAI54bHehqRWhh1blnFDQQT9-FI0MrJ4esU=@protonmail.com>
In-Reply-To: <FD5811FA-A05E-4B67-94D0-91CD2F3A7ECC@dettenbach.de>
References: <R9OuCBE51-YB79RDCtAmnJm6sC8kBLmgd19jz9pcUXiB9zZWpWSdKvkjfYjkP-yj5n0NXrzm06Ztd2Ukc6Bqp4ZH6X9TFl9w6M7Cul6t79g=@protonmail.com>
 <FD5811FA-A05E-4B67-94D0-91CD2F3A7ECC@dettenbach.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM shortcircuit=no
 autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Mon, 22 Jun 2020 13:57:31 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Mathieu Tarral <mathieu.tarral@protonmail.com>
Cc: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>,
 Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


Le samedi 20 juin 2020 17:31, Niels Dettenbach <niels@dettenbach.de> a =
=C3=A9crit=C2=A0:

> > Am 20.06.2020 um 17:12 schrieb Mathieu Tarral mathieu.tarral@protonmail=
.com:
> > Considering that in a normal boot I don't have any issue with Nvidia,
> > I would say it is related to Xen.
>
> as a xen user i remember from years ago, NVidias proprietary graphic driv=
ers for linux made problems if runned under Xen too. If i remember correctl=
y, the reason was of some =E2=80=9Eimproper=E2=80=9C handling of memory / r=
essource access / management / driver implementation which only affected so=
me kind of virtualization stuff xen relys on. The open source nv driver var=
iant (without the =E2=80=9Ebinary blob=E2=80=9C for extended features like =
some 3D accel stuff etc.) worked.
>
> At that time it was difficult to get it solved as there was no real effor=
t from NVidia at that time...
Does Nvidia have a better relation with open-source nowadays ?
It seems that for consumer GPU, you are still on your own.

> But afaik it got solved sometimes monthes later by NVidia (not tested it =
again then, because had switched to another graphic if yet).
Do you have any link to share regarding this bug fix maybe ?

> So reasons are less =E2=80=9Eclear=E2=80=9C on the xen side then first im=
pression might pictures...
Meaning that for we are not sure where the responsabilities are regarding t=
his issue ?


> And if i remember right, a workaround was to use a older nvidia driver ve=
rsion (but not matched my kernel minimum version there...).
I will try both downgrading my nvidia driver and the nouveau driver.

Thanks !





From xen-users-bounces@lists.xenproject.org Mon Jun 22 15:13:10 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Jun 2020 15:13:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jnO7C-0001QA-NL; Mon, 22 Jun 2020 15:12:06 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=wtl3=AD=xen.org=paul@srs-us1.protection.inumbo.net>)
 id 1jnO7C-0001PG-8Q
 for xen-users@lists.xenproject.org; Mon, 22 Jun 2020 15:12:06 +0000
X-Inumbo-ID: b89b4b66-b49a-11ea-b7bb-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id b89b4b66-b49a-11ea-b7bb-bc764e2007e4;
 Mon, 22 Jun 2020 15:12:00 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Reply-To:Message-Id:Date:Subject:To:From:Sender:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=ZkYFftt9zY4NTku9bpwUBXznZU5RfaCO8ptYf1B1Tpg=; b=gpwPDSYlvgpIoB+ZDfRl7vSllG
 Cbtk42P7qaOswXRNn8Y7754AaBlBPcUcFni+Rs2ehsWamutetM+eJv2Ki+mzLYjXxfofB8zX/2w5g
 jmm9HAISGSlwc5PA6o3YySx0xFOR3WZ5maYGUxx6so7waJWbRt0hLWuSodx8poO9u6lk=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jnO76-0000z5-8V; Mon, 22 Jun 2020 15:12:00 +0000
Received: from 54-240-197-234.amazon.com ([54.240.197.234]
 helo=CBG-R90WXYV0.amazon.com) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jnO75-00075K-VK; Mon, 22 Jun 2020 15:12:00 +0000
From: Paul Durrant <paul@xen.org>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org,
 xen-announce@lists.xenproject.org
Subject: Xen 4.14 RC3
Date: Mon, 22 Jun 2020 16:11:58 +0100
Message-Id: <20200622151158.109-1-paul@xen.org>
X-Mailer: git-send-email 2.17.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-devel@lists.xenproject.org, paul@xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,

Xen 4.14 RC3 is tagged. You can check that out from xen.git:

git://xenbits.xen.org/xen.git 4.14.0-rc3

For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.14.0-rc3/xen-4.14.0-rc3.tar.gz

And the signature is at:
https://downloads.xenproject.org/release/xen/4.14.0-rc3/xen-4.14.0-rc3.tar.gz.sig

Please send bug reports and test reports to xen-devel@lists.xenproject.org.
When sending bug reports, please CC relevant maintainers and me (paul@xen.org).

As a reminder, there will be a Xen Test Day. Please see the test day schedule at
https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.

  Paul Durrant



From xen-users-bounces@lists.xenproject.org Wed Jun 24 05:14:47 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2020 05:14:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jnxii-0007XS-T4; Wed, 24 Jun 2020 05:13:12 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=oIs2=AF=mydatex.cz=marvin@srs-us1.protection.inumbo.net>)
 id 1jnxig-0007XN-RZ
 for xen-users@lists.xenproject.org; Wed, 24 Jun 2020 05:13:10 +0000
X-Inumbo-ID: 63b1be60-b5d9-11ea-b7bb-bc764e2007e4
Received: from kali.sitour.cz (unknown [77.48.244.2])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 63b1be60-b5d9-11ea-b7bb-bc764e2007e4;
 Wed, 24 Jun 2020 05:13:08 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by kali.sitour.cz (Postfix) with ESMTP id B599D4E0284
 for <xen-users@lists.xenproject.org>; Wed, 24 Jun 2020 07:13:06 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at sitour.cz
Received: from kali.sitour.cz ([127.0.0.1])
 by localhost (sitour.cz [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 4VorFF2vIb5A for <xen-users@lists.xenproject.org>;
 Wed, 24 Jun 2020 07:13:06 +0200 (CEST)
Received: from [192.168.3.13] (firma.mydatex.cz [84.242.99.244])
 by kali.sitour.cz (Postfix) with ESMTPSA id 8BDB84E0265
 for <xen-users@lists.xenproject.org>; Wed, 24 Jun 2020 07:13:06 +0200 (CEST)
From: Daniel Smolik <marvin@mydatex.cz>
Subject: xentop crash domU with Windows server 2019 evalution
To: Xen-users <xen-users@lists.xenproject.org>
Organization: Mydatex s.r.o.
Message-ID: <5219351c-5101-0645-c24a-3cf425661dc8@mydatex.cz>
Date: Wed, 24 Jun 2020 07:13:06 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

I have strange experience with %sub% and PV drivers 8.2.2 and 9. I 
have run Windows server 2019 on Xen 4.11 (debian Buster). Without PV 
drivers run well. After installing PV drivers

 I have some time strange crash o domU. I have xvncviewer connected to 
Windows desktop and it's disappear. After some time I recognize that 
after running xentop domU crash.

Linux or Win without PV divers are not affected. Have anybody the same 
experience ?

Regards

Dan






From xen-users-bounces@lists.xenproject.org Wed Jun 24 17:58:22 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2020 17:58:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jo9dl-00071o-FY; Wed, 24 Jun 2020 17:56:53 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TnPG=AF=sendgrid.net=bounces+1794986-9697-xen-users=lists.xenproject.org@srs-us1.protection.inumbo.net>)
 id 1jo9dk-00071j-A8
 for xen-users@lists.xenproject.org; Wed, 24 Jun 2020 17:56:52 +0000
X-Inumbo-ID: 1438b346-b644-11ea-8496-bc764e2007e4
Received: from xtrwsqzp.outbound-mail.sendgrid.net (unknown [167.89.100.227])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1438b346-b644-11ea-8496-bc764e2007e4;
 Wed, 24 Jun 2020 17:56:51 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sendgrid.net;
 h=mime-version:content-type:content-transfer-encoding:from:subject:
 in-reply-to:references:to;
 s=smtpapi; bh=PIJUJ5mU+tMXJHhJojuEYFx3yEGdfM9DOBZk3okJMGA=;
 b=dbFZQ4NFqYnPwSQUUJZO63hNoFH8PEDqxj3cUZCybgS8E2eRXtdbZwwRhbTzZJvlD5bj
 L/TnXMazh8UcFOXdMIgs49bUe68Eh5z99smsvpUkC/esiH+4qDPxVFc7v9GQ/NQoh1nsNg
 MakuEa9E0fj21mUZBClSWl1wurxIM3c8A=
Received: by filterdrecv-p3iad2-7657dd94f-bnqcb with SMTP id
 filterdrecv-p3iad2-7657dd94f-bnqcb-19-5EF393E1-5B
 2020-06-24 17:56:49.687975175 +0000 UTC m=+518065.016562551
Received: from cloudmachine.kow.is (unknown)
 by ismtpd0101p1mdw1.sendgrid.net (SG) with ESMTP id G-cb00XASjO_QhNeoG5YDQ
 for <xen-users@lists.xenproject.org>;
 Wed, 24 Jun 2020 17:56:49.542 +0000 (UTC)
Received: from soulreaver.dark.kow.is (unknown [10.10.220.216])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "soulreaver.dark.kow.is", Issuer "dark.kow.is CA" (not verified))
 by cloudmachine.kow.is (Postfix) with ESMTPS id 342EC7D157
 for <xen-users@lists.xenproject.org>; Wed, 24 Jun 2020 12:56:49 -0500 (CDT)
Received: from localhost (home.kow.is [10.10.220.205])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by soulreaver.dark.kow.is (Postfix) with ESMTPSA id CD32880040
 for <xen-users@lists.xenproject.org>; Wed, 24 Jun 2020 12:56:48 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Date: Wed, 24 Jun 2020 17:56:49 +0000 (UTC)
From: David Kowis <david@kow.is>
Subject: Re: [Xen-users] Acquiring the latest pvUSB frontend patches?
In-Reply-To: <febfd4478ef02756c2266e583098a7de@kow.is>
References: <qtrsilufvkr2g1avsrvhlpo5.1566844058435@email.android.com>
 <febfd4478ef02756c2266e583098a7de@kow.is>
User-Agent: Roundcube Webmail/1.4.0
Message-ID: <77b4dd3276604347ce113730a1248f58@kow.is>
X-Sender: david@kow.is
X-SG-EID: =?us-ascii?Q?+kMxBqj35EdRUKoy8diX1v=2FYwOtV0mBc163WH1fm2RNr7DE+LL3sO=2F0hN7QDBQ?=
 =?us-ascii?Q?f4MKKkCydGsRAGuW6cBEkJEo+J1Yrw=2FqQ0EJLNh?=
 =?us-ascii?Q?q0WZdprZ2lUZxrmIRizatUk9EJX6VIfTl6wv+yT?=
 =?us-ascii?Q?0EBTHteT60yJ966XykyCar0ShTlHEXrn1t5dSTp?=
 =?us-ascii?Q?QMF3auvO8wUX2dpKDMxB+3myjXsNmS21hQOq0fi?=
 =?us-ascii?Q?gYsT8pimvQhYEjUs5Du5S9m0PLEPzu70wd=2FEd8j?=
 =?us-ascii?Q?QdfEZBVazk0NNw2=2FhSIlQ=3D=3D?=
To: xen-users@lists.xenproject.org
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

I thought I'd share with the list that someone is legit trying to attack 
folks on here.

I got an email that was a firefox send file, an archive of some sorts, 
claiming to be an update to the PVUSB branch. Immediately suspect, 
because why wouldn't it just be an update to the git repo. And of course 
the email came from phishy sources.

Just thought I'd let ya'll know, so you can be extra diligent. Someone 
is doing intentional hax here, trying to take advantage of the folks 
that usually help people on the public list. Pay close attention to your 
email sources (like where it's delivered from,) and don't trust people 
that don't also reply to the list.

Original email content follows:
<<evil email>>
Return-Path: <support@vct.com.pa>
Delivered-To: david@kow.is
Received: from cloudmachine.kow.is (unknown [10.99.0.1])
	(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
	(Client CN "cloudmachine.kow.is", Issuer "Let's Encrypt Authority X3" 
(not verified))
	by soulreaver.dark.kow.is (Postfix) with ESMTPS id CC5828003F
	for <david@kow.is>; Wed, 24 Jun 2020 11:22:18 -0500 (CDT)
Received: from gateway32.websitewelcome.com 
(gateway32.websitewelcome.com [192.185.145.111])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client did not present a certificate)
	by cloudmachine.kow.is (Postfix) with ESMTPS id 2FEAE7D15B
	for <david@kow.is>; Wed, 24 Jun 2020 11:22:18 -0500 (CDT)
Received: from cm12.websitewelcome.com (cm12.websitewelcome.com 
[100.42.49.8])
	by gateway32.websitewelcome.com (Postfix) with ESMTP id 249FF443A91
	for <david@kow.is>; Wed, 24 Jun 2020 11:21:52 -0500 (CDT)
Received: from amigo.websitewelcome.com ([192.185.2.19])
	by cmsmtp with SMTP
	id o89njh2OkzOauo89njywzs; Wed, 24 Jun 2020 11:21:52 -0500
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; 
d=vct.com.pa;
	 s=default; h=Content-Transfer-Encoding:Content-Type:Message-ID:Date:
	References:In-Reply-To:Subject:To:From:MIME-Version:Sender:Reply-To:Cc:
	Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
	Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
	List-Subscribe:List-Post:List-Owner:List-Archive;
	bh=OgQ3R+mE0ISOt36IcbJkg+Zuq7pnVCJT4DgV2ylCfhE=; 
b=GpqiAEA4uICV1TS7kWWX8Lwkdy
	UNsWF/PbumR9zcJBvBFv2wjCjjxsilBYtHq54EyXoOwiWUQyPFNhLfxXdR/0+2rm/h5ATHWAEy+sd
	DodUuGtRpERoopTcYk59wqedFKL5Oi92jciBEJTm6ZH0Yyyc1BqZBiFHeqbVColwnP3/sdaDEa/7p
	VgMuh3vGhyHPOUGLSiuwZAQVScmZY5Z64wJyGDJsalKAHGicf0q/xC0bthnY2cwpjOvceRfdhM/55
	KcwusvSpwkHa4TQwpWrFog1+WJoFjpGI2lSu4PBe3PBfz3jjSHAupMmAB8InfUv1zRPvm2FzOgSBY
	9rErKNWQ==;
Received: from p5b2649dd.dip0.t-ipconnect.de ([91.38.73.221]:50179 
helo=[169.254.53.195])
	by amigo.websitewelcome.com with esmtpsa  (TLS1.2) tls 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
	(Exim 4.93)
	(envelope-from <support@vct.com.pa>)
	id 1jo89n-000xct-Kz
	for david@kow.is; Wed, 24 Jun 2020 11:21:51 -0500
MIME-Version: 1.0
X-Mailer: MailBee.NET 12.0.0.615
 From: "xen-users@lists.xenproject.org" <support@vct.com.pa>
To: david@kow.is
Subject: Re: Re: [Xen-users] Acquiring the latest pvUSB frontend 
patches?
In-Reply-To: <febfd4478ef02756c2266e583098a7de@kow.is>
References: <qtrsilufvkr2g1avsrvhlpo5.1566844058435@email.android.com>
  <febfd4478ef02756c2266e583098a7de@kow.is>
Date: Wed, 24 Jun 2020 09:21:50 -0700
Message-ID: <1.a8bc71b38b211c6bb643@WIN-DDV6UFOS797>
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-AntiAbuse: This header was added to track abuse, please include it 
with any abuse report
X-AntiAbuse: Primary Hostname - amigo.websitewelcome.com
X-AntiAbuse: Original Domain - kow.is
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - vct.com.pa
X-BWhitelist: no
X-Source-IP: 91.38.73.221
X-Source-L: No
X-Exim-ID: 1jo89n-000xct-Kz
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: p5b2649dd.dip0.t-ipconnect.de ([169.254.53.195]) 
[91.38.73.221]:50179
X-Source-Auth: support@vct.com.pa
X-Email-Count: 47
X-Source-Cap: dmN0Y29tO3ZpcnR1YWxjO2FtaWdvLndlYnNpdGV3ZWxjb21lLmNvbQ==
X-Local-Domain: yes


Here is an update of the project - please confirm the 
changes.=0Ahttps://se=
nd.firefox.com/download/<yeah not gonna put the actual thing in 
there>/#FvLRdBjJnjmvtRSCnDTnZw=0AArchive =
password: 7777=0A=0A
On 2019-08-26 13:27, david@kow.is wrote:
>> Thanks a whole bunch! I'll give it a go soon.

<<end of message source>>

On 2020-06-04 22:55, David Kowis wrote:
> On 2019-08-26 13:27, david@kow.is wrote:
>> Thanks a whole bunch! I'll give it a go soon.
> 
> Soon turned out to be a lot longer than I expected. I don't suppose
> there's updates to this at all?
> 
> Thanks!
> 
>> 
>> Sent from Nine [1]
>> 
>> -------------------------
>> 
>> From: Juergen Gross <jgross@suse.com>
>> Sent: Monday, August 26, 2019 13:05
>> To: David Kowis; xen-users@lists.xenproject.org
>> Subject: Re: [Xen-users] Acquiring the latest pvUSB frontend patches?
>> 
>> On 18.08.19 05:44, David Kowis wrote:
>>> I found this email https://markmail.org/message/oi2l5n267lp7yoxv
>> which
>>> seems to be the latest patches for the pvUSB frontend drivers.
>>> 
>>> I couldn't find the source of the patches off the wiki page, and I
>>> thought I'd email to find out if this is the latest version of the
>>> patches, or how I could generate the patches myself to apply to an
>>> upstream kernel for my Xen DomUs.
>> 
>> I have pushed an upstream version to:
>> 
>> https://github.com/jgross1/linux.git pvusb
>> 
>> Juergen
>> 
>> 
>> Links:
>> ------
>> [1] http://www.9folders.com/
>> _______________________________________________
>> Xen-users mailing list
>> Xen-users@lists.xenproject.org
>> https://lists.xenproject.org/mailman/listinfo/xen-users


From xen-users-bounces@lists.xenproject.org Wed Jun 24 18:38:24 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2020 18:38:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joAHS-0002dR-Cr; Wed, 24 Jun 2020 18:37:54 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=f3u1=AE=mydatex.cz=smolik@srs-us1.protection.inumbo.net>)
 id 1jnpo7-0001sX-86
 for xen-users@lists.xenproject.org; Tue, 23 Jun 2020 20:46:15 +0000
X-Inumbo-ID: 930e4d14-b592-11ea-bff4-12813bfff9fa
Received: from kali.sitour.cz (unknown [77.48.244.2])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 930e4d14-b592-11ea-bff4-12813bfff9fa;
 Tue, 23 Jun 2020 20:46:13 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by kali.sitour.cz (Postfix) with ESMTP id CC34C4E0263
 for <xen-users@lists.xenproject.org>; Tue, 23 Jun 2020 22:29:00 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at sitour.cz
Received: from kali.sitour.cz ([127.0.0.1])
 by localhost (sitour.cz [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id AKMZVRQYsDvq for <xen-users@lists.xenproject.org>;
 Tue, 23 Jun 2020 22:28:58 +0200 (CEST)
Received: from [192.168.3.13] (firma.mydatex.cz [84.242.99.244])
 by kali.sitour.cz (Postfix) with ESMTPSA id 5C2B74E0259
 for <xen-users@lists.xenproject.org>; Tue, 23 Jun 2020 22:28:58 +0200 (CEST)
To: Xen-users <xen-users@lists.xenproject.org>
From: Daniel Smolik <smolik@mydatex.cz>
Subject: xentop crash domU with Windows server 2019 evalution
Message-ID: <8e9b38b9-564f-5231-88ca-58152f6bab4f@mydatex.cz>
Date: Tue, 23 Jun 2020 22:28:57 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Mailman-Approved-At: Wed, 24 Jun 2020 18:37:53 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

I have strange experience with %sub% and PV drivers 8.2.2 and 9. I 
have run Windows server 2019 on Xen 4.11 (debian Buster). Without PV 
drivers run well. After installing PV drivers

 I have some time strange crash o domU. I have xvncviewer connected to 
Windows desktop and it's disappear. After some time I recognize that 
after running xentop domU crash.

Linux or Win without PV divers are not affected. Have anybody the same 
experience ?

Regards

Dan





From xen-users-bounces@lists.xenproject.org Wed Jun 24 22:00:35 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2020 22:00:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joDQG-0004ra-PR; Wed, 24 Jun 2020 21:59:12 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SipZ=AF=gmail.com=jan.bakuwel@srs-us1.protection.inumbo.net>)
 id 1joDQF-0004rV-FB
 for xen-users@lists.xenproject.org; Wed, 24 Jun 2020 21:59:11 +0000
X-Inumbo-ID: ef08212a-b665-11ea-b7bb-bc764e2007e4
Received: from mail-pl1-x633.google.com (unknown [2607:f8b0:4864:20::633])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id ef08212a-b665-11ea-b7bb-bc764e2007e4;
 Wed, 24 Jun 2020 21:59:11 +0000 (UTC)
Received: by mail-pl1-x633.google.com with SMTP id n2so1684128pld.13
 for <xen-users@lists.xenproject.org>; Wed, 24 Jun 2020 14:59:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=reply-to:subject:to:references:from:message-id:date:user-agent
 :mime-version:in-reply-to:content-transfer-encoding:content-language;
 bh=DXZ1m9ydHjcYW/ouG0h+QJdBsOf4epNRqj2c4KfoI0A=;
 b=rNbF7FqAfvZsHeIknvwt9gkILP6KM9PjW7sKpQ8teCO456IcXSWPBzwXDAP9T3OR7c
 Eri4nat/VzH/cZ3DhoykafoVwHUK/BwrZy+22aWs6RnBUs4uC3uf2jQjsgE7o2WvamyW
 H57jZynORGqttEePpsaEF/CAbILfe2j3xN3/kRvIriUXZXzhayoKvCah/q1deFzqBXId
 OluIgPiHpzDwYd9rcxrsmMmc9pM7FMmtdBPs0LFi8uGomktyuwKIDlZ+BNLuXBYR7mrH
 UTO0MT6guAb93L4708kSF4uNcVwYUIBWSDmVpXDMNAEPJ+fnvNqE1IzdB9xHK3a6P3pF
 yGXA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:reply-to:subject:to:references:from:message-id
 :date:user-agent:mime-version:in-reply-to:content-transfer-encoding
 :content-language;
 bh=DXZ1m9ydHjcYW/ouG0h+QJdBsOf4epNRqj2c4KfoI0A=;
 b=KDc9gCB6a7IYjHBmR+tbNovzJqZ0N9vHajLhqp7YHmZpZI2zqbcD1j4eDKZjrMcgUh
 JFH30TZWTa4y8XMuyvfKzVcWFdM1xcnsuvZDDfw2SSIx/p71H4NUDAh1kujPO/0LDT0c
 6mm5U8Y7DLwoZWhqxJbYWX5ZCr0uwmebONpss4m7PTyFTi+LAMz/a7DSFtdlcSoTSIj4
 /dDpCTBmMkXPU5YR5um3/SkB06kSVE/5sZ71BUOSSJJqU5OO7IoUCX9Mn6yEjyx1q16s
 uGypjmivAni3KapU6+UGmR/frRs8uWp7j1GkUy95upc4ZkgEmJhhLqsOFBS0GrPOIOob
 kzuw==
X-Gm-Message-State: AOAM532FttZ/OmmOdIPYAFUGCGUxaQzEedywDbvINfh3WtZPuPa3hK2c
 OQwbruDkzAdhdwfA68lUJ+2wBhkt
X-Google-Smtp-Source: ABdhPJxtRNxCzCHrO/0wlgKbfu1Kfh9Ylgcr2rIYknqFUP5IIHa4AkruBs0J3yMaC8D+wQcjuwL2jg==
X-Received: by 2002:a17:902:8488:: with SMTP id
 c8mr18687606plo.49.1593035949757; 
 Wed, 24 Jun 2020 14:59:09 -0700 (PDT)
Received: from [10.10.15.22] ([103.227.170.10])
 by smtp.gmail.com with ESMTPSA id a16sm16601050pgj.27.2020.06.24.14.59.07
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Wed, 24 Jun 2020 14:59:08 -0700 (PDT)
Subject: Re: xentop crash domU with Windows server 2019 evalution
To: xen-users@lists.xenproject.org
References: <5219351c-5101-0645-c24a-3cf425661dc8@mydatex.cz>
From: Jan Bakuwel <jan.bakuwel@gmail.com>
Message-ID: <d65dbe62-10ff-670a-f9bb-ed5ae6a3f3fd@gmail.com>
Date: Thu, 25 Jun 2020 09:59:04 +1200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <5219351c-5101-0645-c24a-3cf425661dc8@mydatex.cz>
Content-Type: text/plain; charset=iso-8859-2; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: jan.bakuwel@gmail.com
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi Daniel,

On 24/06/20 5:13 pm, Daniel Smolik wrote:
> Hi,
>
> I have strange experience with %sub% and PV drivers 8.2.2 and 9. I 
> have run Windows server 2019 on Xen 4.11 (debian Buster). Without PV 
> drivers run well. After installing PV drivers
>
> I have some time strange crash o domU. I have xvncviewer connected 
> to Windows desktop and it's disappear. After some time I recognize 
> that after running xentop domU crash.
>
> Linux or Win without PV divers are not affected. Have anybody the 
> same experience ?

There is a known bug in Windows Server 2019 (and presumably Windows 10 
too) that causes a BSOD.

More info here:

https://lists.xenproject.org/archives/html/win-pv-devel/2020-06/msg00000.html

Are you saying you can trigger it reliably by running xentop on dom0?

cheers,
Jan




From xen-users-bounces@lists.xenproject.org Wed Jun 24 22:45:54 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2020 22:45:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joE8P-00016c-3L; Wed, 24 Jun 2020 22:44:49 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=oIs2=AF=mydatex.cz=marvin@srs-us1.protection.inumbo.net>)
 id 1joE8O-00016X-Dl
 for xen-users@lists.xenproject.org; Wed, 24 Jun 2020 22:44:48 +0000
X-Inumbo-ID: 4d74de82-b66c-11ea-8154-12813bfff9fa
Received: from kali.sitour.cz (unknown [77.48.244.2])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 4d74de82-b66c-11ea-8154-12813bfff9fa;
 Wed, 24 Jun 2020 22:44:46 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by kali.sitour.cz (Postfix) with ESMTP id CE5134E028D
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 00:44:45 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at sitour.cz
Received: from kali.sitour.cz ([127.0.0.1])
 by localhost (sitour.cz [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id pTb79k9CEIRj for <xen-users@lists.xenproject.org>;
 Thu, 25 Jun 2020 00:44:45 +0200 (CEST)
Received: from [192.168.3.13] (firma.mydatex.cz [84.242.99.244])
 by kali.sitour.cz (Postfix) with ESMTPSA id A34874E026B
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 00:44:45 +0200 (CEST)
From: Daniel Smolik <marvin@mydatex.cz>
Subject: Re: xentop crash domU with Windows server 2019 evalution
To: xen-users@lists.xenproject.org
References: <5219351c-5101-0645-c24a-3cf425661dc8@mydatex.cz>
 <d65dbe62-10ff-670a-f9bb-ed5ae6a3f3fd@gmail.com>
Organization: Mydatex s.r.o.
Message-ID: <b45c16ca-8a94-d699-dfbb-1ad126c3896c@mydatex.cz>
Date: Thu, 25 Jun 2020 00:44:45 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <d65dbe62-10ff-670a-f9bb-ed5ae6a3f3fd@gmail.com>
Content-Type: text/plain; charset=iso-8859-2; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


Hi Jan,

absolutely. But when run xentop Win doesn't fully crash. Only xvncviewer 
ends and can't connect again. Rdesktop stops too. But win still running 
and I must destroy domU.

I try xl dmesg but there is nothing.

cheers

Dan

Dne 24. 06. 20 v 23:59 Jan Bakuwel napsal(a):
> Hi Daniel,
>
> On 24/06/20 5:13 pm, Daniel Smolik wrote:
>> Hi,
>>
>> I have strange experience with %sub% and PV drivers 8.2.2 and 9. I 
>> have run Windows server 2019 on Xen 4.11 (debian Buster). Without PV 
>> drivers run well. After installing PV drivers
>>
>> I have some time strange crash o domU. I have xvncviewer connected 
>> to Windows desktop and it's disappear. After some time I recognize 
>> that after running xentop domU crash.
>>
>> Linux or Win without PV divers are not affected. Have anybody the 
>> same experience ?
>
> There is a known bug in Windows Server 2019 (and presumably Windows 10 
> too) that causes a BSOD.
>
> More info here:
>
> https://lists.xenproject.org/archives/html/win-pv-devel/2020-06/msg00000.html 
>
>
> Are you saying you can trigger it reliably by running xentop on dom0?
>
> cheers,
> Jan
>
>
>


From xen-users-bounces@lists.xenproject.org Wed Jun 24 22:59:29 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 24 Jun 2020 22:59:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joEM7-0002Kp-GQ; Wed, 24 Jun 2020 22:58:59 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=oIs2=AF=mydatex.cz=marvin@srs-us1.protection.inumbo.net>)
 id 1joEM5-0002Kg-VT
 for xen-users@lists.xenproject.org; Wed, 24 Jun 2020 22:58:57 +0000
X-Inumbo-ID: 479976d8-b66e-11ea-8496-bc764e2007e4
Received: from kali.sitour.cz (unknown [77.48.244.2])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 479976d8-b66e-11ea-8496-bc764e2007e4;
 Wed, 24 Jun 2020 22:58:55 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by kali.sitour.cz (Postfix) with ESMTP id 899844E028D
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 00:58:54 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at sitour.cz
Received: from kali.sitour.cz ([127.0.0.1])
 by localhost (sitour.cz [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id UwdlO2eXAxRY for <xen-users@lists.xenproject.org>;
 Thu, 25 Jun 2020 00:58:54 +0200 (CEST)
Received: from [192.168.3.13] (firma.mydatex.cz [84.242.99.244])
 by kali.sitour.cz (Postfix) with ESMTPSA id 670884E026B
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 00:58:54 +0200 (CEST)
Subject: Re: xentop crash domU with Windows server 2019 evalution
To: xen-users@lists.xenproject.org
References: <5219351c-5101-0645-c24a-3cf425661dc8@mydatex.cz>
 <d65dbe62-10ff-670a-f9bb-ed5ae6a3f3fd@gmail.com>
 <b45c16ca-8a94-d699-dfbb-1ad126c3896c@mydatex.cz>
From: Daniel Smolik <marvin@mydatex.cz>
Organization: Mydatex s.r.o.
Message-ID: <ee85aed5-cd59-8229-5bcf-67935e2e652e@mydatex.cz>
Date: Thu, 25 Jun 2020 00:58:54 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <b45c16ca-8a94-d699-dfbb-1ad126c3896c@mydatex.cz>
Content-Type: text/plain; charset=iso-8859-2; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi Jan,

win server 2016 is not affected with this bug.

Dan


Dne 25. 06. 20 v 0:44 Daniel Smolik napsal(a):
>
> Hi Jan,
>
> absolutely. But when run xentop Win doesn't fully crash. Only 
> xvncviewer ends and can't connect again. Rdesktop stops too. But win 
> still running and I must destroy domU.
>
> I try xl dmesg but there is nothing.
>
> cheers
>
> Dan
>
> Dne 24. 06. 20 v 23:59 Jan Bakuwel napsal(a):
>> Hi Daniel,
>>
>> On 24/06/20 5:13 pm, Daniel Smolik wrote:
>>> Hi,
>>>
>>> I have strange experience with %sub% and PV drivers 8.2.2 and 9. I 
>>> have run Windows server 2019 on Xen 4.11 (debian Buster). Without PV 
>>> drivers run well. After installing PV drivers
>>>
>>> I have some time strange crash o domU. I have xvncviewer connected 
>>> to Windows desktop and it's disappear. After some time I recognize 
>>> that after running xentop domU crash.
>>>
>>> Linux or Win without PV divers are not affected. Have anybody the 
>>> same experience ?
>>
>> There is a known bug in Windows Server 2019 (and presumably Windows 
>> 10 too) that causes a BSOD.
>>
>> More info here:
>>
>> https://lists.xenproject.org/archives/html/win-pv-devel/2020-06/msg00000.html 
>>
>>
>> Are you saying you can trigger it reliably by running xentop on dom0?
>>
>> cheers,
>> Jan
>>
>>
>>
>


From xen-users-bounces@lists.xenproject.org Thu Jun 25 02:34:18 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jun 2020 02:34:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joHhT-0006JD-TW; Thu, 25 Jun 2020 02:33:15 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=xnyE=AF=mydatex.cz=smolik@srs-us1.protection.inumbo.net>)
 id 1joE7V-00015P-MY
 for xen-users@lists.xenproject.org; Wed, 24 Jun 2020 22:43:53 +0000
X-Inumbo-ID: 2bdba1ac-b66c-11ea-bb8b-bc764e2007e4
Received: from kali.sitour.cz (unknown [77.48.244.2])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2bdba1ac-b66c-11ea-bb8b-bc764e2007e4;
 Wed, 24 Jun 2020 22:43:50 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by kali.sitour.cz (Postfix) with ESMTP id 504774E028D
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 00:43:49 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at sitour.cz
Received: from kali.sitour.cz ([127.0.0.1])
 by localhost (sitour.cz [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Baq9bTdm8PiB for <xen-users@lists.xenproject.org>;
 Thu, 25 Jun 2020 00:43:46 +0200 (CEST)
Received: from [192.168.3.13] (firma.mydatex.cz [84.242.99.244])
 by kali.sitour.cz (Postfix) with ESMTPSA id 7B1D64E026B
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 00:43:46 +0200 (CEST)
Subject: Re: xentop crash domU with Windows server 2019 evalution
To: xen-users@lists.xenproject.org
References: <5219351c-5101-0645-c24a-3cf425661dc8@mydatex.cz>
 <d65dbe62-10ff-670a-f9bb-ed5ae6a3f3fd@gmail.com>
From: Daniel Smolik <smolik@mydatex.cz>
Message-ID: <d8e87e24-22f0-7db6-8b2e-acfd836a126f@mydatex.cz>
Date: Thu, 25 Jun 2020 00:43:46 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <d65dbe62-10ff-670a-f9bb-ed5ae6a3f3fd@gmail.com>
Content-Type: text/plain; charset=iso-8859-2; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Mailman-Approved-At: Thu, 25 Jun 2020 02:33:15 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


Hi Jan,

absolutely. But when run xentop Win doesn't fully crash. Only xvncviewer 
ends and can't connect again. Rdesktop stops too. But win still running 
and I must destroy domU.

I try xl dmesg but there is nothing.

cheers

Dan

Dne 24. 06. 20 v 23:59 Jan Bakuwel napsal(a):
> Hi Daniel,
>
> On 24/06/20 5:13 pm, Daniel Smolik wrote:
>> Hi,
>>
>> I have strange experience with %sub% and PV drivers 8.2.2 and 9. I 
>> have run Windows server 2019 on Xen 4.11 (debian Buster). Without PV 
>> drivers run well. After installing PV drivers
>>
>> I have some time strange crash o domU. I have xvncviewer connected 
>> to Windows desktop and it's disappear. After some time I recognize 
>> that after running xentop domU crash.
>>
>> Linux or Win without PV divers are not affected. Have anybody the 
>> same experience ?
>
> There is a known bug in Windows Server 2019 (and presumably Windows 10 
> too) that causes a BSOD.
>
> More info here:
>
> https://lists.xenproject.org/archives/html/win-pv-devel/2020-06/msg00000.html 
>
>
> Are you saying you can trigger it reliably by running xentop on dom0?
>
> cheers,
> Jan
>
>
>


From xen-users-bounces@lists.xenproject.org Thu Jun 25 14:10:02 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jun 2020 14:10:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joSYE-0006h5-MS; Thu, 25 Jun 2020 14:08:26 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IWe5=AG=gmail.com=sendmailtogoran@srs-us1.protection.inumbo.net>)
 id 1joSYD-0006gx-0n
 for xen-users@lists.xenproject.org; Thu, 25 Jun 2020 14:08:25 +0000
X-Inumbo-ID: 554b5cc2-b6ed-11ea-8496-bc764e2007e4
Received: from mail-io1-xd2d.google.com (unknown [2607:f8b0:4864:20::d2d])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 554b5cc2-b6ed-11ea-8496-bc764e2007e4;
 Thu, 25 Jun 2020 14:08:24 +0000 (UTC)
Received: by mail-io1-xd2d.google.com with SMTP id a12so6149476ion.13
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 07:08:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=NMdRSCeBTalKTKZ5lsn62Un87034e97KZORZrmfJ75g=;
 b=b2pxruJ532Pvjbu+9MKsTIHgJHcgsxeL/WfbPLv2q9v42XwDXpddB45IUoRf2Mthdg
 QTcspSDGd02ltJrv/uD74lAyH+mMygKCWHb7zDrGj+h4gVC5HppugR1BPX6hwcEoDNB3
 jP3suwZnyBZqGKbOe7JiocBRAdyMY3I/orJud17ZwW73LHEyjhmBzhY1ARHQW2qnDY49
 vbIi7R/QXugfsCPNLiPlvF6yye+btcbBdSOlZHaGMRYIymwIZUtGhtY3YRYMzMSXf2Qd
 jP+6MMK3qZJuTNo5JZxHurUMlpFztWoMqgmk/5pSfKZMc1s5bFJ5yGRHy5BYy9CPL0Qx
 fJtA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=NMdRSCeBTalKTKZ5lsn62Un87034e97KZORZrmfJ75g=;
 b=A5uleumfFBebhZhkFELQwns7tt6PQKW8AO+HzkzZSFJAGHEsiOK34SXPTAjZSPuiWL
 2xZV2xQs07ke9uCVXxgIndPGpHOkvH5G8vsIUCVMPpTxlchG+yT9969KY7Rhsj/Ey699
 shJPxVxQtGjMS1WEEGJaf4jH9VnYwKqmdClbRIaCSx2eXPtXKwTFZCDbXZCR2ISNci1T
 SIM0ZqWkaCCWcpO5nr9r3xozXO64f2lOdX0p9t9BjRfXyzbB6/5DOhdpvl2MrKDLnW7X
 7JRdBBvtfBrxt1SLH0W3nFNsTKIDXKSKNUiliEukVusV60mt+IyddgpChX2JHdhsTYLo
 sasQ==
X-Gm-Message-State: AOAM532VMB4RswpRtHKurJq7MHYg6+4SyE4epSpZcz8vqqV93ZuDrCGz
 TX+x4rZgAzCaQC35pKp3zX1SQi2DZhc8uu6+kWMGEbPt
X-Google-Smtp-Source: ABdhPJyJeIpjBWPmiUTNZTusATTCh5mSHtQM66Ni5O4b9A60X/XdfVy5l4iJ5oGnbVeGJeKem9gqzykBugm4w17ma7c=
X-Received: by 2002:a5d:8c8f:: with SMTP id g15mr13386699ion.206.1593094103587; 
 Thu, 25 Jun 2020 07:08:23 -0700 (PDT)
MIME-Version: 1.0
From: Goran <sendmailtogoran@gmail.com>
Date: Thu, 25 Jun 2020 16:08:12 +0200
Message-ID: <CABS5c+Hi=2LK2j1Kvxndk+Qx_2kksND7cPXyzcG5G75i6RVLBA@mail.gmail.com>
Subject: Niceness of HD-image-file
To: xen-users@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all, is it possible to prioritize the HD-image-access?

My problem is that all images are on the same partition (e.g. md0).

I would need something like the following example:

- 3 images, img0, img1, img2
- img[0-2] are competing for hd-time at same time
- img0 gets 70% of the time
- img1 gets 20%
- img2 gets 10%
- no matter what, as long as img0 is doing well I can access it, an
img1 which went crazy won't affect it much

Is this possible?

Regards
Goran


From xen-users-bounces@lists.xenproject.org Thu Jun 25 15:26:24 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jun 2020 15:26:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joTkZ-0005WL-Nj; Thu, 25 Jun 2020 15:25:15 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=xXCh=AG=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1joTkX-0005WG-Tc
 for xen-users@lists.xenproject.org; Thu, 25 Jun 2020 15:25:14 +0000
X-Inumbo-ID: 1069b7d8-b6f8-11ea-8496-bc764e2007e4
Received: from sonic317-26.consmr.mail.bf2.yahoo.com (unknown [74.6.129.81])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1069b7d8-b6f8-11ea-8496-bc764e2007e4;
 Thu, 25 Jun 2020 15:25:13 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1593098713; bh=DSn0CkOGk+2r7xxoaUNUfVBDa3i4aEOlflemQI4Ohj0=;
 h=Date:From:Reply-To:To:Subject:References:From:Subject;
 b=cL+kAwyl2+yYefOvG/0oitZcn/YoWo8/tzzQJKScgYUtZGbaRLLGWFGAfMQALxHOkf7Ad08ePNMY8Cn51BGmatEKTODryFyt/RC1JHGHdZiJlR/LxLGPtvUj7StBDO2tsa6ZqPNLGu3vhVxXt3/BDk6ca2/ANpt/0SFcq/+GhcmLs51U+TcQVyJZAsPvZEL8eGkp5rLnF6kM/bE97B9bFLbRSmbjedkDtd8WSlNCTS4byIH0RWdwaZfIEitfq9C+m1iFRlizVepMRSbCxK77qQG5sugo5d0kCN76N8cZPJW2t8l8IpuyeQw+oAlxzrXfG0m6G9ylAK8xNJ3JggO0uQ==
X-YMail-OSG: uefDr.wVM1lxPn.oNUov4akhlXKP7B6soaevARiry_F.e8be_UxyAX1pThd7xLe
 Nd6aHVPU.Zn8OCjoqPo4yaLKt_R8TcXGJ9oYA65wPiTQsSmBO_KnZFYpS708uv7qcwPBfTZctpCk
 .J6lN1g8QNG0Lpjj4GS6I2NVBz9KxlPrDd3OnMF.16gw7BMfVECubb92FIbHQSODZPpB0ruxQ7ps
 FvbWpR1J3qVqqV2V1GLtJMUZ2ymaqieDwdvLa6GfKZ.YpNyGkCvnsxzGAj4QPdX6_KH3i2Ht5lup
 ytxMxtXMLbbHu0YoFq8RZ8Tptrf9Zo9PmgYilZhWqHetfg97XL5fV3BD0RStfZQtCe8M4MX5O..e
 sSyTpFQKl99GPlZnRwUaQ0KdBGmgSE1A.vx8MgFYc8vTGIIcIQvg4RYrSlIN0MbIC03MKHY6NXFg
 Zb15B3WNrBQTLCmcX9QXZbEE6BkumYR5Kq0z6z09conOLSjoXsLV_9Rfk1rapsoBmg12K8fBlgvh
 XsfplfkrBtjaBTUKhFWvyrnUTtB.xk8gbRIcMx35PViD_gB.7THP.8PdkzjBq6aAdES_te8vbwKO
 uje8Pv5jMnOhgV6lSud7FOBlP7xwqgvQqG3QANefmJ9yMhQgJ_8QAvEN8PNJKOUwZvsjVkuLt3Zh
 dZZdZyJjxuoCj.wdY636fTcgI9tlvS8X7MUZdGHDi_MC4b.1pjBqQUOP0fL4zL3RNeI_yl1S3Jga
 Fatm1Rc0RWw8GQf6J.BxVEvfIlihIgTHRkia7bBhyIzm8fdYIiSlhcvCklZYp7ZaNgzQyWlKfbx0
 oiX0INFojpWO6AmGbcijGJRB2JzfAYiNyUMHBAsJacpxqTQwLEVqFtgS8qmnt3GNqfc9f1QGmgHX
 uBc2svVmACaop_rHRoWdFB6gvrb86hTgANhaIhitaF5PZi2WErKKyxHbd_v59tGcfNRsKzT7168b
 5hyI1srXlCy.TllkSTJ1m4ZQ0oP7I4AxxZZNN_wpj8fycsmpAQLaBvkxAr__bmCbJRFhFDI7LrJ3
 OqWcB3YPJEozpCGCXs72_2mN.h_3bVjJVypP7dBqT7cntuhHYVVg2n83aE3ZT.uIjg6E6mdLsPQz
 aRM72Qu8I.iVwdoj6Rsa.J_fS3SzeFCLJt1Wz07qn1bb.U1_vIv9zrCM_jmZpEuGyBEFvSuMoSf3
 WD7YK89qs4xBINCvksNpWrVMvnUQpTSUxyE0VnZCcE7hbW_frZeXFQID3IRW61Fv66H9GmS_gg2A
 SgsB2wUDYCdQi_xsGyM6PgZIJljzrvCQwv4D6vGngqLTv9vHfhJj6kYIH1foGQFukR9S8DRNiGOI
 okYyduOBrYcRatH7FF4aSGpW0sa5fLLBQRFOUxSjB4DYMqUTwvFDpJ9fkBw--
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic317.consmr.mail.bf2.yahoo.com with HTTP; Thu, 25 Jun 2020 15:25:13 +0000
Date: Thu, 25 Jun 2020 15:25:10 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: Xen-users <xen-users@lists.xenproject.org>
Message-ID: <1499385131.2548113.1593098710287@mail.yahoo.com>
Subject: Some terms in Xen.
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_2548112_1279117506.1593098710286"
References: <1499385131.2548113.1593098710287.ref@mail.yahoo.com>
X-Mailer: WebService/1.1.16138 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 1215
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_2548112_1279117506.1593098710286
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,Can anyone description these terms for me?- HVM with PV driver- PVHVM- PVH
Thank you.

Sent from Yahoo Mail on Android
------=_Part_2548112_1279117506.1593098710286
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,<div id="yMail_cursorElementTracker_1593098605707">Can anyone description these terms for me?</div><div id="yMail_cursorElementTracker_1593098651797">- HVM with PV driver</div><div id="yMail_cursorElementTracker_1593098629704">- PVHVM</div><div id="yMail_cursorElementTracker_1593098650286">- PVH</div><div id="yMail_cursorElementTracker_1593098677947"><br></div><div id="yMail_cursorElementTracker_1593098678404">Thank you.<br id="yMail_cursorElementTracker_1593098602528"><br><div id="ymail_android_signature"><a id="ymail_android_signature_link" href="https://go.onelink.me/107872968?pid=InProduct&amp;c=Global_Internal_YGrowth_AndroidEmailSig__AndroidUsers&amp;af_wl=ym&amp;af_sub1=Internal&amp;af_sub2=Global_YGrowth&amp;af_sub3=EmailSignature">Sent from Yahoo Mail on Android</a></div></div>
------=_Part_2548112_1279117506.1593098710286--


From xen-users-bounces@lists.xenproject.org Thu Jun 25 15:48:25 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jun 2020 15:48:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joU5X-0007OF-Qz; Thu, 25 Jun 2020 15:46:55 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=L+Wy=AG=gmail.com=webdawg@srs-us1.protection.inumbo.net>)
 id 1joU5W-0007O8-NC
 for xen-users@lists.xenproject.org; Thu, 25 Jun 2020 15:46:54 +0000
X-Inumbo-ID: 17eb8c2c-b6fb-11ea-bb8b-bc764e2007e4
Received: from mail-qt1-x82b.google.com (unknown [2607:f8b0:4864:20::82b])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 17eb8c2c-b6fb-11ea-bb8b-bc764e2007e4;
 Thu, 25 Jun 2020 15:46:54 +0000 (UTC)
Received: by mail-qt1-x82b.google.com with SMTP id g13so4947997qtv.8
 for <xen-users@lists.xenproject.org>; Thu, 25 Jun 2020 08:46:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=cczZFDIxIIE4em3kZDMA5NfHhkFZl2xe7JXptQ0L8TE=;
 b=uD2nGgNVso3ytbSxKSYvnF5ZM5BqPL4LlqzAWNzUQR6ncQhTWg7czEXNuQwqFpIBmI
 JMpFQf9F0w40qqQ29qPlxcNbNp3IKhZO1hCOXM9sS185oYHpiHky/DYiPV1mkKswyeVk
 7Oqz/ZweM0Y/t2+OHtjl/LLubfBahF7YcKL1mPjmxCwaiRSzRLxfvt+Q12UDWzqvWgCb
 ppM2NZP2vfRCBWlXeFXbb/QYn7I11UObO0UgS3xVGKU7hJY5E7kjTWLB+BWuIXb/R5Rf
 ZUHceAwxvNJcdfx3fZHB5t30NlPDCvAbH/tUrlVjGCsOybUB6Q7ITRSgd4kDh0N9LaNQ
 MU8Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=cczZFDIxIIE4em3kZDMA5NfHhkFZl2xe7JXptQ0L8TE=;
 b=ANfmrC+tT/KwEriTIcs7HYdyFibt7BR6Uld2Z2LsQRlwxK+BIIERvE2bEmX7moCZm2
 UPKGng5UQkzeDZs6MV0psjwuFnW39fVp1YHyDgJIDVjjeH//F0XbQK4BnSc9rLdCScG9
 Iy6tYGFxFpbuMnZnNJhZUHcEdnT8is6nSZ/fmBIeUOFyiHzHozDbWAciWAL3G0uWoFIC
 qCORKFQtNObYaHNZ5O6CyQgH/OLIsff/FqXyiypfuNxg2kW+v65WJCSCB98qOWUt0xE1
 8GK3gkKqzNcEkgxAqCMWiK4n4I5FWOz8Bm+E8Tquz0y1IJuK9/YMSTx+xr4YH4rcYsfz
 TyDA==
X-Gm-Message-State: AOAM531ojGMBab5Q7Wz9wnWjjjLBCrdWT7Jwbzr6FQYhIfBzQQyO20kW
 u2dflJbxswK/EuuvZu1ziRj1/4qYBBXFaXQ64Ic=
X-Google-Smtp-Source: ABdhPJx0Ggt0EzQXMN7IjJsSnI3O3iYk4kiikHg1i9JI0FviH3R7KAtsydfMopRmcOhQnOSxCun7uxwQW+c+lBlNNAc=
X-Received: by 2002:aed:3b62:: with SMTP id q31mr32762632qte.293.1593100014036; 
 Thu, 25 Jun 2020 08:46:54 -0700 (PDT)
MIME-Version: 1.0
References: <1499385131.2548113.1593098710287.ref@mail.yahoo.com>
 <1499385131.2548113.1593098710287@mail.yahoo.com>
In-Reply-To: <1499385131.2548113.1593098710287@mail.yahoo.com>
From: WebDawg <webdawg@gmail.com>
Date: Thu, 25 Jun 2020 11:46:42 -0400
Message-ID: <CAKdd5H9iAMJzYuGkiSOnOft59mn2YzTUmfjp-MNtRYH7R_DMtA@mail.gmail.com>
Subject: Re: Some terms in Xen.
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Content-Type: multipart/alternative; boundary="0000000000006dab5105a8ea8037"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--0000000000006dab5105a8ea8037
Content-Type: text/plain; charset="UTF-8"

On Thu, Jun 25, 2020 at 11:27 AM Jason Long <hack3rcon@yahoo.com> wrote:

> Hello,
> Can anyone description these terms for me?
> - HVM with PV driver
> - PVHVM
> - PVH
>
> Thank you.
>
>

https://wiki.xen.org/wiki/PV_on_HVM

Everything started as HVM...then PV kernels enabled fast things, and then
regular kernels with PV drivers made it so you did not have to have special
kernels.

I don't know the rest.

What is the current state?

--0000000000006dab5105a8ea8037
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Jun 25, 2020 at 11:27 AM Jaso=
n Long &lt;<a href=3D"mailto:hack3rcon@yahoo.com">hack3rcon@yahoo.com</a>&g=
t; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0p=
x 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hello,=
<div id=3D"gmail-m_-2301541285032365033yMail_cursorElementTracker_159309860=
5707">Can anyone description these terms for me?</div><div id=3D"gmail-m_-2=
301541285032365033yMail_cursorElementTracker_1593098651797">- HVM with PV d=
river</div><div id=3D"gmail-m_-2301541285032365033yMail_cursorElementTracke=
r_1593098629704">- PVHVM</div><div id=3D"gmail-m_-2301541285032365033yMail_=
cursorElementTracker_1593098650286">- PVH</div><div id=3D"gmail-m_-23015412=
85032365033yMail_cursorElementTracker_1593098677947"><br></div><div id=3D"g=
mail-m_-2301541285032365033yMail_cursorElementTracker_1593098678404">Thank =
you.<br id=3D"gmail-m_-2301541285032365033yMail_cursorElementTracker_159309=
8602528"><br></div></blockquote><div><br></div><div><br></div><div><a href=
=3D"https://wiki.xen.org/wiki/PV_on_HVM">https://wiki.xen.org/wiki/PV_on_HV=
M</a></div><div><br></div><div>Everything started as HVM...then PV kernels =
enabled fast things, and then regular kernels with PV drivers made it so yo=
u did not have to have special kernels.</div><div><br></div><div>I don&#39;=
t know the rest.</div><div><br></div><div>What is the current state?<br></d=
iv><div><br></div></div></div>

--0000000000006dab5105a8ea8037--


From xen-users-bounces@lists.xenproject.org Thu Jun 25 16:43:16 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Jun 2020 16:43:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1joUx3-0004wA-Kn; Thu, 25 Jun 2020 16:42:13 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=a8t4=AG=blueyonder.co.uk=martin.hargreaves@srs-us1.protection.inumbo.net>)
 id 1joUFf-00005X-DB
 for xen-users@lists.xenproject.org; Thu, 25 Jun 2020 15:57:24 +0000
X-Inumbo-ID: 8d10fb30-b6fc-11ea-bb8b-bc764e2007e4
Received: from smtpq1.tb.ukmail.iss.as9143.net (unknown [212.54.57.96])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 8d10fb30-b6fc-11ea-bb8b-bc764e2007e4;
 Thu, 25 Jun 2020 15:57:20 +0000 (UTC)
Received: from [212.54.57.80] (helo=smtp1.tb.ukmail.iss.as9143.net)
 by smtpq1.tb.ukmail.iss.as9143.net with esmtp (Exim 4.86_2)
 (envelope-from <martin.hargreaves@blueyonder.co.uk>)
 id 1joUFc-0004vJ-0E
 for xen-users@lists.xenproject.org; Thu, 25 Jun 2020 17:57:20 +0200
Received: from oxbe11.tb.ukmail.iss.as9143.net ([172.25.160.142])
 by smtp1.tb.ukmail.iss.as9143.net with ESMTP
 id oUEejb5JP2TdToUEejrfxY; Thu, 25 Jun 2020 17:56:20 +0200
X-Env-Mailfrom: martin.hargreaves@blueyonder.co.uk
X-Env-Rcptto: xen-users@lists.xenproject.org
X-SourceIP: 172.25.160.142
X-CNFS-Analysis: v=2.3 cv=T8IXs8CQ c=1 sm=1 tr=0
 a=SbParRoiaCP7T9pO5d2WBA==:117 a=630zi8LAIP8A:10 a=x7bEGLp0ZPQA:10
 a=StaoN_m-T5EA:10 a=q-pXWbC24xtIue6i4UUA:9 a=QEXdDO2ut3YA:10
 a=duUQpXjeHoc5JgeNCrcA:9 a=neXrgyvJkE23rwmg:21 a=_W_S_7VecoQA:10
X-Authenticated-Sender: martin.hargreaves@blueyonder.co.uk
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=blueyonder.co.uk;
 s=meg.feb2017; t=1593100580;
 bh=Fa8w0YL7IUG5R2Ix8nP9e/uo0kpcujxdPiLOJyqfxss=;
 h=Date:From:To:Subject;
 b=D/kEIVhSeJVOOqAYpmiUJLsiDMc9q+aRW9u4lyccX4xLfMrFI3ARGBcf+RYG6inhZ
 Rb8lpyFaZg54GxoSlcqj3XIq6OuFFfHphmiOMLIPnBwuJnpkUHazDNEIrrNEyuv3UG
 U+JOrPI9N7vnmklu5FGCnSbdh5PpDPPGbqj+v2W6DGENNhh39O5Od6IRpIeUsnwZ4N
 BkEoZtQgPH19azVQakyYJQ75xM7lSShaNFgq/w3+sbEHBCbdFEsUMUJg037UuW718f
 2YrjIgXXqrCSe3Us9LvdD4j7u2/zpTcwXPHFBNwGPRsSVMfwvE/wQCQykTtTNB6fAx
 K8EViwz68MsIQ==
Date: Thu, 25 Jun 2020 16:56:20 +0100 (BST)
From: hargreaves martin <martin.hargreaves@blueyonder.co.uk>
To: xen-users@lists.xenproject.org
Message-ID: <331267288.92651.1593100580336@mail2.virginmedia.com>
Subject: Can't access USBs from DomU
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_92650_899536532.1593100580335"
X-Priority: 3
Importance: Medium
X-Mailer: Open-Xchange Mailer v7.8.4-Rev70
X-Originating-IP: 86.17.33.182
X-Originating-Client: open-xchange-appsuite
X-CMAE-Envelope: MS4wfNvz3D8uVgyt6smYigVSqQZj1uHq1UY9Uy5krrulR0KWf5g1/PhUErbs7qqoS6NbtNdqVIvvBekHMI+n5u7/1DLFMOqClGLlz9Wvnpic/W3Y7+iH2ejz
 qHLwTgKsJdiSJdV4BqH2xDV2998+e4z/t5IayfLY7/rpD4JX7AtVTlJ/+zHM5v31ZkrXOX8ON3sxh67fA9ZJWOQ8knD6f+30r6yzuoZU9TxUGHGltzrWJCzk
X-Mailman-Approved-At: Thu, 25 Jun 2020 16:42:11 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_92650_899536532.1593100580335
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

A very quick question (hopefully).


On Dom0, I can attach my USBs.


$ sudo xl usbdev-attach ubud1 hostbus=3D2 hostaddr=3D36

$ sudo xl usb-list 5

Devid Type BE state usb-ver ports

0 qusb 0 1 2 8

Port 1: Bus 002 Device 025

Port 2: Bus 002 Device 024

Port 3:

=E2=80=A6


But I can=E2=80=99t see them in my DomU (Ubuntu). Any suggestions?


Any help would be very much appreciated.


Martin..
------=_Part_92650_899536532.1593100580335
MIME-Version: 1.0
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html>
<html><head>
    <meta charset=3D"UTF-8">
</head><body><p class=3D"western" style=3D"margin-bottom: 0cm; line-height:=
 100%;"><span style=3D"font-size: medium;" size=3D"3">A very quick question=
 (hopefully).</span></p><p class=3D"western" style=3D"margin-bottom: 0cm; l=
ine-height: 100%;"><br></p><p class=3D"western" style=3D"margin-bottom: 0cm=
; line-height: 100%;"><span style=3D"font-size: medium;" size=3D"3">On Dom0=
, I can attach my USBs.</span></p><p class=3D"western" style=3D"margin-bott=
om: 0cm; line-height: 100%;"><br></p><p class=3D"western" style=3D"margin-b=
ottom: 0cm; line-height: 100%;"><span style=3D"font-size: medium;" size=3D"=
3">$ sudo xl usbdev-attach ubud1 hostbus=3D2 hostaddr=3D36</span></p><p cla=
ss=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><span style=
=3D"font-size: medium;" size=3D"3">$ sudo xl usb-list 5</span></p><p class=
=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><span style=
=3D"font-size: medium;" size=3D"3">Devid Type BE state usb-ver ports</span>=
</p><p class=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><=
span style=3D"font-size: medium;" size=3D"3">0 qusb 0 1 2 8 </span></p><p c=
lass=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><span sty=
le=3D"font-size: medium;" size=3D"3">Port 1: Bus 002 Device 025</span></p><=
p class=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><span =
style=3D"font-size: medium;" size=3D"3">Port 2: Bus 002 Device 024</span></=
p><p class=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><sp=
an style=3D"font-size: medium;" size=3D"3">Port 3:</span></p><p class=3D"we=
stern" style=3D"margin-bottom: 0cm; line-height: 100%;">&#8230;</p><p class=
=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><br></p><p cl=
ass=3D"western" style=3D"margin-bottom: 0cm; line-height: 100%;"><span styl=
e=3D"font-size: medium;" size=3D"3">But I can&#8217;t see them in my DomU (=
Ubuntu). Any suggestions?</span></p><p class=3D"western" style=3D"margin-bo=
ttom: 0cm; line-height: 100%;"><br></p><p class=3D"western" style=3D"margin=
-bottom: 0cm; line-height: 100%;"><span style=3D"font-size: medium;" size=
=3D"3">Any help would be very much appreciated.</span></p><p class=3D"weste=
rn" style=3D"margin-bottom: 0cm; line-height: 100%;"><br></p><p class=3D"we=
stern" style=3D"margin-bottom: 0cm; line-height: 100%;"><span style=3D"font=
-size: medium;" size=3D"3">Martin..</span></p></body></html>
=20
------=_Part_92650_899536532.1593100580335--


From xen-users-bounces@lists.xenproject.org Fri Jun 26 08:03:23 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2020 08:03:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jojIy-0007cp-8V; Fri, 26 Jun 2020 08:01:48 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ldHa=AH=antarean.org=joost@srs-us1.protection.inumbo.net>)
 id 1jojIw-0007ck-Q0
 for xen-users@lists.xenproject.org; Fri, 26 Jun 2020 08:01:47 +0000
X-Inumbo-ID: 45cdfa66-b783-11ea-bca7-bc764e2007e4
Received: from gw2.antarean.org (unknown [141.105.125.208])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 45cdfa66-b783-11ea-bca7-bc764e2007e4;
 Fri, 26 Jun 2020 08:01:43 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49tTqT4m0Xz8wTh
 for <xen-users@lists.xenproject.org>; Fri, 26 Jun 2020 10:01:41 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from gw2.antarean.org ([127.0.0.1])
 by localhost (gw2.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 5eUgsEy_VFig for <xen-users@lists.xenproject.org>;
 Fri, 26 Jun 2020 10:01:40 +0200 (CEST)
Received: from mailstore1.antarean.org (localhost [127.0.0.1])
 by gw2.antarean.org (Postfix) with ESMTP id 49tTqS0S6Jz8vY8
 for <xen-users@lists.xenproject.org>; Fri, 26 Jun 2020 10:01:40 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49tTqS3kDXz15
 for <xen-users@lists.xenproject.org>; Fri, 26 Jun 2020 10:01:40 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from mailstore1.antarean.org ([127.0.0.1])
 by localhost (mailstore1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 3SPxCt9UVabG for <xen-users@lists.xenproject.org>;
 Fri, 26 Jun 2020 10:01:39 +0200 (CEST)
Received: from poseidon.localnet (unknown [10.55.16.113])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256)
 (No client certificate requested)
 by mailstore1.antarean.org (Postfix) with ESMTPSA id 49tTqQ72WLzj
 for <xen-users@lists.xenproject.org>; Fri, 26 Jun 2020 10:01:38 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=antarean.org;
 s=default; t=1593158498;
 bh=rXzRZGLMIWJxuMo19m3y7BnygkkK7t70GPTdlZO6EM8=;
 h=From:To:Subject:Date;
 b=Kx1+EcaltLNOHmMTZKF3VzFstigqGVHbVipZ13RHFafREqhil1sstuQGEUSqZRqCG
 JAG4MNVXNPHMTvV0BBF2vwsKuhTXA2U/wOjUZdYKCT+wM7dALErHjEGPvZwavA5qeP
 3WmRxXj8u83qC47Fz71ZMHdlmpp+CLgEuTHoaxUk=
From: "J. Roeleveld" <joost@antarean.org>
To: xen-users@lists.xenproject.org
Subject: Dom0 completely froze, need help
Date: Fri, 26 Jun 2020 10:01:38 +0200
Message-ID: <2161313.ElGaqSPkdT@poseidon>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="nextPart1754284.tdWV9SEqCh"
Content-Transfer-Encoding: 7Bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--nextPart1754284.tdWV9SEqCh
Content-Type: multipart/alternative; boundary="nextPart4544396.GXAFRqVoOG"
Content-Transfer-Encoding: 7Bit

This is a multi-part message in MIME format.

--nextPart4544396.GXAFRqVoOG
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"

Hi all,

My server completely froze just now, forcing a hard reboot.
This is the 2nd time it happened, previous time there was nothing to be found in the logs.

This time, I did find several kernel-panics in the syslog, which is why I feel I can ask for 
assistence.
I am unable to figure out what actually happened and caused this, googling some of the 
messages didn't give anything useful, so I really could use some assistance.

Attached is the part of the log showing the messages.

The first line after this is syslog starting after the reset.
The last line before this section is the usual messages I always get.

I run Gentoo-Linux. Fully updated as of 1 week ago.
Relevant (I think) versions:

Kernel: 5.4.38

ZoL: 0.8.4

If anyone has any ideas and/or requires further information, please let me know.

Many thanks,

Joost Roeleveld

--nextPart4544396.GXAFRqVoOG
Content-Transfer-Encoding: 7Bit
Content-Type: text/html; charset="us-ascii"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
<html><head><meta name="qrichtext" content="1" /><style type="text/css">
p, li { white-space: pre-wrap; }
</style></head><body style=" font-family:'Liberation Sans'; font-size:11pt; font-weight:400; font-style:normal;">
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">Hi all,</p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">My server completely froze just now, forcing a hard reboot.</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">This is the 2nd time it happened, previous time there was nothing to be found in the logs.</p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">This time, I did find several kernel-panics in the syslog, which is why I feel I can ask for assistence.</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">I am unable to figure out what actually happened and caused this, googling some of the messages didn't give anything useful, so I really could use some assistance.</p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">Attached is the part of the log showing the messages.</p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">The first line after this is syslog starting after the reset.</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">The last line before this section is the usual messages I always get.</p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">I run Gentoo-Linux. Fully updated as of 1 week ago.</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">Relevant (I think) versions:</p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;">Kernel: <span style=" font-family:'monospace'; color:#000000; background-color:#ffffff;">5.4.38</span><span style=" font-family:'monospace';"><br />Xen version 4.12.2</span></p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;"><span style=" font-family:'monospace';">ZoL: 0.8.4</span></p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;"><span style=" font-family:'monospace';">If anyone has any ideas and/or requires further information, please let me know.</span></p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;"><span style=" font-family:'monospace';">Many thanks,</span></p>
<p style="-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; ">&nbsp;</p>
<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;"><span style=" font-family:'monospace';">Joost Roeleveld</span></p></body></html>
--nextPart4544396.GXAFRqVoOG--

--nextPart1754284.tdWV9SEqCh
Content-Disposition: attachment; filename="dom0_messages_log.txt"
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="utf-8"; name="dom0_messages_log.txt"

Jun 26 09:06:12 apollo kernel: ------------[ cut here ]------------
Jun 26 09:06:12 apollo kernel: WARNING: CPU: 1 PID: 10954 at arch/x86/xen/multicalls.c:102 xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel: Modules linked in: vfat fat iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi br_netfilter xt_physdev xen_acpi_processor xen_pciback xen_netback xen_blkback xen_gntalloc xen_gntdev xen_evtchn xenfs xen_privcmd nfsd auth_rpcgss nfs_acl lockd grace sunrpc bridge 8021q garp mrp stp llc bonding intel_rapl_msr iTCO_wdt iTCO_vendor_support
Jun 26 09:06:12 apollo kernel: ------------[ cut here ]------------
Jun 26 09:06:12 apollo kernel:  intel_rapl_common sb_edac
Jun 26 09:06:12 apollo kernel: WARNING: CPU: 2 PID: 24779 at arch/x86/xen/multicalls.c:102 xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel:  intel_powerclamp
Jun 26 09:06:12 apollo kernel: Modules linked in:
Jun 26 09:06:12 apollo kernel:  crct10dif_pclmul
Jun 26 09:06:12 apollo kernel:  vfat fat iscsi_tcp libiscsi_tcp
Jun 26 09:06:12 apollo kernel:  crc32_pclmul
Jun 26 09:06:12 apollo kernel:  libiscsi scsi_transport_iscsi br_netfilter xt_physdev xen_acpi_processor xen_pciback xen_netback xen_blkback xen_gntalloc
Jun 26 09:06:12 apollo kernel:  crc32c_intel
Jun 26 09:06:12 apollo kernel:  xen_gntdev xen_evtchn xenfs xen_privcmd
Jun 26 09:06:12 apollo kernel:  ghash_clmulni_intel
Jun 26 09:06:12 apollo kernel:  nfsd auth_rpcgss
Jun 26 09:06:12 apollo kernel:  intel_rapl_perf
Jun 26 09:06:12 apollo kernel:  nfs_acl lockd
Jun 26 09:06:12 apollo kernel:  pcspkr
Jun 26 09:06:12 apollo kernel:  grace sunrpc bridge
Jun 26 09:06:12 apollo kernel:  ast
Jun 26 09:06:12 apollo kernel:  8021q garp
Jun 26 09:06:12 apollo kernel:  drm_vram_helper
Jun 26 09:06:12 apollo kernel:  mrp stp llc bonding
Jun 26 09:06:12 apollo kernel:  ttm
Jun 26 09:06:12 apollo kernel:  intel_rapl_msr iTCO_wdt iTCO_vendor_support intel_rapl_common
Jun 26 09:06:12 apollo kernel:  i2c_algo_bit
Jun 26 09:06:12 apollo kernel:  sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmul
Jun 26 09:06:12 apollo kernel:  drm_kms_helper
Jun 26 09:06:12 apollo kernel:  crc32c_intel ghash_clmulni_intel intel_rapl_perf
Jun 26 09:06:12 apollo kernel:  i2c_i801
Jun 26 09:06:12 apollo kernel:  pcspkr ast
Jun 26 09:06:12 apollo kernel:  drm
Jun 26 09:06:12 apollo kernel:  drm_vram_helper ttm i2c_algo_bit
Jun 26 09:06:12 apollo kernel:  mei_me
Jun 26 09:06:12 apollo kernel:  drm_kms_helper i2c_i801 drm mei_me mei
Jun 26 09:06:12 apollo kernel:  mei
Jun 26 09:06:12 apollo kernel:  lpc_ich ixgbe ipmi_ssif
Jun 26 09:06:12 apollo kernel:  lpc_ich
Jun 26 09:06:12 apollo kernel:  mdio ptp
Jun 26 09:06:12 apollo kernel:  ixgbe
Jun 26 09:06:12 apollo kernel:  pps_core ioatdma dca
Jun 26 09:06:12 apollo kernel:  ipmi_ssif
Jun 26 09:06:12 apollo kernel:  ipmi_si ipmi_devintf ipmi_msghandler
Jun 26 09:06:12 apollo kernel:  mdio
Jun 26 09:06:12 apollo kernel:  acpi_power_meter binfmt_misc
Jun 26 09:06:12 apollo kernel:  ptp
Jun 26 09:06:12 apollo kernel:  tun
Jun 26 09:06:12 apollo kernel:  pps_core
Jun 26 09:06:12 apollo kernel:  zfs(PO)
Jun 26 09:06:12 apollo kernel:  ioatdma
Jun 26 09:06:12 apollo kernel:  zunicode(PO) zavl(PO)
Jun 26 09:06:12 apollo kernel:  dca
Jun 26 09:06:12 apollo kernel:  icp(PO) zcommon(PO) znvpair(PO)
Jun 26 09:06:12 apollo kernel:  ipmi_si
Jun 26 09:06:12 apollo kernel:  spl(O) zlua(PO)
Jun 26 09:06:12 apollo kernel:  ipmi_devintf
Jun 26 09:06:12 apollo kernel:  ipmi_msghandler acpi_power_meter binfmt_misc
Jun 26 09:06:12 apollo kernel: CPU: 2 PID: 24779 Comm: kworker/2:0 Tainted: P        W  O      5.4.38-gentoo-host #1
Jun 26 09:06:12 apollo kernel:  tun zfs(PO)
Jun 26 09:06:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:06:12 apollo kernel:  zunicode(PO)
Jun 26 09:06:12 apollo kernel: Workqueue: events netstamp_clear
Jun 26 09:06:12 apollo kernel:  zavl(PO)
Jun 26 09:06:12 apollo kernel:  icp(PO) zcommon(PO)
Jun 26 09:06:12 apollo kernel: RIP: e030:xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel:  znvpair(PO) spl(O) zlua(PO)
Jun 26 09:06:12 apollo kernel: Code: 05 00 10 00 81 e8 ec 13 be 00 48 89 c1 48 89 45 18 48 c1 e9 3f 48 89 ce e9 03 ff ff ff 48 c7 45 18 ea ff ff ff be 01 00 00 00 <0f> 0b 8b 55 00 48 c7 c7 a0 8a fb 81 31 db 65 8b 0d e7 0a ff 7e e8
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc90008bcbd08 EFLAGS: 00010002
Jun 26 09:06:12 apollo kernel: RAX: ffffffffffffffea RBX: 00000005761e0000 RCX: 0000000000000001
Jun 26 09:06:12 apollo kernel: CPU: 1 PID: 10954 Comm: zfs_stats_cache Tainted: P        W  O      5.4.38-gentoo-host #1
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888686695b10
Jun 26 09:06:12 apollo kernel: RBP: ffff888686695300 R08: 0000000000000000 R09: ffff88867ec01590
Jun 26 09:06:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: ffffffff8224c7a8 R12: 0000000000000000
Jun 26 09:06:12 apollo kernel: R13: 0000000000000020 R14: ffff888623c94400 R15: 0000000000000001
Jun 26 09:06:12 apollo kernel: RIP: e030:xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel: Code: 05 00 10 00 81 e8 ec 13 be 00 48 89 c1 48 89 45 18 48 c1 e9 3f 48 89 ce e9 03 ff ff ff 48 c7 45 18 ea ff ff ff be 01 00 00 00 <0f> 0b 8b 55 00 48 c7 c7 a0 8a fb 81 31 db 65 8b 0d e7 0a ff 7e e8
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc9000b01fbe8 EFLAGS: 00010006
Jun 26 09:06:12 apollo kernel: RAX: ffff888686655818 RBX: 0000777f80000000 RCX: ffff888686655818
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000000 RSI: 000000000000000c RDI: ffff888686655310
Jun 26 09:06:12 apollo kernel: RBP: ffff888686655300 R08: ffff8886866557d0 R09: 0000000000000000
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: 0000000000004000 R12: 0000000000000000
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686680000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel: CS:  10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel: R13: ffff8885ed80b000 R14: 0000000000000201 R15: 0000000000000014
Jun 26 09:06:12 apollo kernel: CR2: 00005635f9667f64 CR3: 00000005761e0000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel: Call Trace:
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686640000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel:  xen_write_cr3+0xf0/0x160
Jun 26 09:06:12 apollo kernel: CS:  10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel:  load_new_mm_cr3+0x39/0xc0
Jun 26 09:06:12 apollo kernel: CR2: 00007f9c1bcd7180 CR3: 00000005639ae000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel:  switch_mm_irqs_off+0x199/0x4f0
Jun 26 09:06:12 apollo kernel:  ? __netif_receive_skb_core+0x39/0xc70
Jun 26 09:06:12 apollo kernel:  __text_poke+0x20e/0x4a0
Jun 26 09:06:12 apollo kernel: Call Trace:
Jun 26 09:06:12 apollo kernel:  text_poke_bp_batch+0xea/0x150
Jun 26 09:06:12 apollo kernel:  __xen_pgd_unpin+0xf8/0x210
Jun 26 09:06:12 apollo kernel:  xen_exit_mmap+0xdb/0xf0
Jun 26 09:06:12 apollo kernel:  arch_jump_label_transform_apply+0x2e/0x50
Jun 26 09:06:12 apollo kernel:  static_key_disable_cpuslocked+0x59/0x90
Jun 26 09:06:12 apollo kernel:  exit_mmap+0x66/0x1a0
Jun 26 09:06:12 apollo kernel:  ? xen_mc_flush+0xd7/0x1c0
Jun 26 09:06:12 apollo kernel:  static_key_disable+0x16/0x20
Jun 26 09:06:12 apollo kernel:  process_one_work+0x1e5/0x3a0
Jun 26 09:06:12 apollo kernel:  ? xen_write_cr3+0x9d/0x160
Jun 26 09:06:12 apollo kernel:  ? load_new_mm_cr3+0x39/0xc0
Jun 26 09:06:12 apollo kernel:  worker_thread+0x4d/0x3d0
Jun 26 09:06:12 apollo kernel:  mmput+0x52/0x110
Jun 26 09:06:12 apollo kernel:  kthread+0xfb/0x130
Jun 26 09:06:12 apollo kernel:  ? process_one_work+0x3a0/0x3a0
Jun 26 09:06:12 apollo kernel:  flush_old_exec+0x261/0x680
Jun 26 09:06:12 apollo kernel:  ? kthread_park+0x90/0x90
Jun 26 09:06:12 apollo kernel:  load_elf_binary+0x31f/0x16a0
Jun 26 09:06:12 apollo kernel:  ret_from_fork+0x35/0x40
Jun 26 09:06:12 apollo kernel:  ? get_user_pages_remote+0x142/0x230
Jun 26 09:06:12 apollo kernel:  ? _cond_resched+0x15/0x30
Jun 26 09:06:12 apollo kernel: ---[ end trace 243eccd2491897bf ]---
Jun 26 09:06:12 apollo kernel:  ? selinux_inode_permission+0x107/0x1d0
Jun 26 09:06:12 apollo kernel: 1 of 1 multicall(s) failed: cpu 2
Jun 26 09:06:12 apollo kernel:   call  1: op=26 arg=[ffff888686695b10] result=-22
Jun 26 09:06:12 apollo kernel:  ? load_misc_binary+0x4c/0x410 [binfmt_misc]
Jun 26 09:06:12 apollo kernel:  search_binary_handler+0x84/0x1b0
Jun 26 09:06:12 apollo kernel:  __do_execve_file.isra.0+0x502/0x870
Jun 26 09:06:12 apollo kernel:  __x64_sys_execve+0x35/0x40
Jun 26 09:06:12 apollo kernel:  do_syscall_64+0x5b/0x1a0
Jun 26 09:06:12 apollo kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
Jun 26 09:06:12 apollo kernel: RIP: 0033:0x7f9c1bde7f87
Jun 26 09:06:12 apollo kernel: ------------[ cut here ]------------
Jun 26 09:06:12 apollo kernel: Code: Bad RIP value.
Jun 26 09:06:12 apollo kernel: WARNING: CPU: 2 PID: 24779 at arch/x86/xen/multicalls.c:102 xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel: RSP: 002b:00007ffd1e9d39c8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
Jun 26 09:06:12 apollo kernel: Modules linked in:
Jun 26 09:06:12 apollo kernel: RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f9c1bde7f87
Jun 26 09:06:12 apollo kernel:  vfat fat iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi br_netfilter xt_physdev xen_acpi_processor xen_pciback xen_netback xen_blkback xen_gntalloc xen_gntdev xen_evtchn xenfs
Jun 26 09:06:12 apollo kernel: RDX: 00005635fa8a2ff0 RSI: 00005635fa8a36d0 RDI: 00005635fa8a2f50
Jun 26 09:06:12 apollo kernel:  xen_privcmd nfsd auth_rpcgss nfs_acl lockd grace sunrpc bridge 8021q garp
Jun 26 09:06:12 apollo kernel: RBP: 00005635fa8a2f50 R08: 00005635fa8a36d0 R09: 00005635fa8a42b0
Jun 26 09:06:12 apollo kernel:  mrp stp llc bonding intel_rapl_msr iTCO_wdt iTCO_vendor_support intel_rapl_common sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel intel_rapl_perf pcspkr ast drm_vram_helper ttm
Jun 26 09:06:12 apollo kernel: R10: 00007f9c1bf8f9b0 R11: 0000000000000202 R12: 00000000ffffffff
Jun 26 09:06:12 apollo kernel:  i2c_algo_bit drm_kms_helper i2c_i801
Jun 26 09:06:12 apollo kernel: R13: 00005635fa8a36d0 R14: 00005635fa8a2ff0 R15: 00005635fa8a2dd0
Jun 26 09:06:12 apollo kernel:  drm mei_me mei lpc_ich ixgbe ipmi_ssif mdio ptp pps_core ioatdma dca ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter binfmt_misc tun zfs(PO) zunicode(PO) zavl(PO) icp(PO)
Jun 26 09:06:12 apollo kernel: ---[ end trace 243eccd2491897c0 ]---
Jun 26 09:06:12 apollo kernel:  zcommon(PO) znvpair(PO) spl(O) zlua(PO)
Jun 26 09:06:12 apollo kernel: 12 of 20 multicall(s) failed: cpu 1
Jun 26 09:06:12 apollo kernel:   call  2: op=14 arg=[ffff88856d80b000] result=-16
Jun 26 09:06:12 apollo kernel: CPU: 2 PID: 24779 Comm: kworker/2:0 Tainted: P        W  O      5.4.38-gentoo-host #1
Jun 26 09:06:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:06:12 apollo kernel:   call  3: op=14 arg=[ffff88851def9000] result=-16
Jun 26 09:06:12 apollo kernel: Workqueue: events netstamp_clear
Jun 26 09:06:12 apollo kernel: RIP: e030:xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel:   call  4: op=14 arg=[ffff8884f3460000] result=-16
Jun 26 09:06:12 apollo kernel:   call  6: op=14 arg=[ffff8884c7e33000] result=-16
Jun 26 09:06:12 apollo kernel: Code: 05 00 10 00 81 e8 ec 13 be 00 48 89 c1 48 89 45 18 48 c1 e9 3f 48 89 ce e9 03 ff ff ff 48 c7 45 18 ea ff ff ff be 01 00 00 00 <0f> 0b 8b 55 00 48 c7 c7 a0 8a fb 81 31 db 65 8b 0d e7 0a ff 7e e8
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc90008bcbd08 EFLAGS: 00010002
Jun 26 09:06:12 apollo kernel:   call  8: op=14 arg=[ffff88855a2d4000] result=-16
Jun 26 09:06:12 apollo kernel:   call 10: op=14 arg=[ffff888583e26000] result=-16
Jun 26 09:06:12 apollo kernel: RAX: ffffffffffffffea RBX: 00000005761e0000 RCX: 0000000000000001
Jun 26 09:06:12 apollo kernel:   call 11: op=14 arg=[ffff8883af283000] result=-16
Jun 26 09:06:12 apollo kernel:   call 12: op=14 arg=[ffff888545d5f000] result=-16
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888686695b10
Jun 26 09:06:12 apollo kernel: RBP: ffff888686695300 R08: 0000000000000000 R09: 000000000000082b
Jun 26 09:06:12 apollo kernel:   call 14: op=14 arg=[ffff8884a2264000] result=-16
Jun 26 09:06:12 apollo kernel:   call 16: op=14 arg=[ffff88838e3e0000] result=-16
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: 0000000000000001 R12: 0000000000000000
Jun 26 09:06:12 apollo kernel:   call 17: op=14 arg=[ffff88851ed4e000] result=-16
Jun 26 09:06:12 apollo kernel: R13: 0000000000000020 R14: ffff888623c94400 R15: 0000000000000001
Jun 26 09:06:12 apollo kernel:   call 19: op=14 arg=[ffff888661b66000] result=-16
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686680000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel: CS:  10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel: CR2: 00005635f9667f64 CR3: 00000005761e0000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel: Call Trace:
Jun 26 09:06:12 apollo kernel:  xen_write_cr3+0xf0/0x160
Jun 26 09:06:12 apollo kernel:  load_new_mm_cr3+0x39/0xc0
Jun 26 09:06:12 apollo kernel:  switch_mm_irqs_off+0x199/0x4f0
Jun 26 09:06:12 apollo kernel:  ? netif_receive_skb_internal+0x1d/0xb0
Jun 26 09:06:12 apollo kernel:  __text_poke+0x20e/0x4a0
Jun 26 09:06:12 apollo kernel:  text_poke_bp_batch+0xea/0x150
Jun 26 09:06:12 apollo kernel:  arch_jump_label_transform_apply+0x2e/0x50
Jun 26 09:06:12 apollo kernel:  static_key_disable_cpuslocked+0x59/0x90
Jun 26 09:06:12 apollo kernel:  static_key_disable+0x16/0x20
Jun 26 09:06:12 apollo kernel:  process_one_work+0x1e5/0x3a0
Jun 26 09:06:12 apollo kernel:  worker_thread+0x4d/0x3d0
Jun 26 09:06:12 apollo kernel: BUG: unable to handle page fault for address: ffff8884c7e33c88
Jun 26 09:06:12 apollo kernel:  kthread+0xfb/0x130
Jun 26 09:06:12 apollo kernel: #PF: supervisor write access in kernel mode
Jun 26 09:06:12 apollo kernel:  ? process_one_work+0x3a0/0x3a0
Jun 26 09:06:12 apollo kernel: #PF: error_code(0x0003) - permissions violation
Jun 26 09:06:12 apollo kernel: PGD 220c067 P4D 220c067 PUD 5fdd45067 PMD 5fdd05067 PTE 80100004c7e33065
Jun 26 09:06:12 apollo kernel:  ? kthread_park+0x90/0x90
Jun 26 09:06:12 apollo kernel: Oops: 0003 [#1] SMP NOPTI
Jun 26 09:06:12 apollo kernel:  ret_from_fork+0x35/0x40
Jun 26 09:06:12 apollo kernel: CPU: 1 PID: 10954 Comm: zfs_stats_cache Tainted: P        W  O      5.4.38-gentoo-host #1
Jun 26 09:06:12 apollo kernel: ---[ end trace 243eccd2491897c1 ]---
Jun 26 09:06:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:06:12 apollo kernel: 1 of 1 multicall(s) failed: cpu 2
Jun 26 09:06:12 apollo kernel: RIP: e030:unmap_page_range+0x495/0xaa0
Jun 26 09:06:12 apollo kernel:   call  1: op=26 arg=[ffff888686695b10] result=-22
Jun 26 09:06:12 apollo kernel: ------------[ cut here ]------------
Jun 26 09:06:12 apollo kernel: Code: 89 ee e8 be f9 ff ff 48 83 7c 24 30 00 49 89 c7 74 09 48 85 c0 0f 85 2e 04 00 00 41 f6 44 24 20 01 0f 84 6b 03 00 00 4c 8b 2b <48> c7 03 00 00 00 00 49 39 6c 24 10 48 89 e8 49 0f 46 44 24 10 4d
Jun 26 09:06:12 apollo kernel: WARNING: CPU: 2 PID: 24779 at arch/x86/xen/multicalls.c:102 xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel: Modules linked in: vfat fat iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi br_netfilter xt_physdev xen_acpi_processor xen_pciback xen_netback xen_blkback xen_gntalloc xen_gntdev xen_evtchn xenfs xen_privcmd nfsd auth_rpcgss nfs_acl lockd grace sunrpc bridge 8021q garp mrp stp llc bonding intel_rapl_msr iTCO_wdt iTCO_vendor_support intel_rapl_common sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel intel_rapl_perf pcspkr ast drm_vram_helper ttm i2c_algo_bit drm_kms_helper i2c_i801 drm mei_me mei lpc_ich ixgbe ipmi_ssif mdio ptp pps_core ioatdma dca ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter binfmt_misc tun zfs(PO) zunicode(PO) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) zlua(PO)
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc9000b01fb58 EFLAGS: 00010202
Jun 26 09:06:12 apollo kernel: CPU: 2 PID: 24779 Comm: kworker/2:0 Tainted: P        W  O      5.4.38-gentoo-host #1
Jun 26 09:06:12 apollo kernel: RAX: ffffea0017870c00 RBX: ffff8884c7e33c88 RCX: 000fffffffe00000
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000000 RSI: 00005635f9591000 RDI: 80000024fa0b0125
Jun 26 09:06:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:06:12 apollo kernel: Workqueue: events netstamp_clear
Jun 26 09:06:12 apollo kernel: RBP: 00005635f9591000 R08: ffff8885bab5a898 R09: 0000000000000000
Jun 26 09:06:12 apollo kernel: RIP: e030:xen_mc_flush+0x194/0x1c0
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: 00000000000a67e9 R12: ffffc9000b01fc90
Jun 26 09:06:12 apollo kernel: Code: 05 00 10 00 81 e8 ec 13 be 00 48 89 c1 48 89 45 18 48 c1 e9 3f 48 89 ce e9 03 ff ff ff 48 c7 45 18 ea ff ff ff be 01 00 00 00 <0f> 0b 8b 55 00 48 c7 c7 a0 8a fb 81 31 db 65 8b 0d e7 0a ff 7e e8
Jun 26 09:06:12 apollo kernel: R13: 80000024fa0b0125 R14: 00005635f9592000 R15: ffffea0017870c00
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686640000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc90008bcbd08 EFLAGS: 00010002
Jun 26 09:06:12 apollo kernel: CS:  e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel: CR2: ffff8884c7e33c88 CR3: 00000005639ae000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel: RAX: ffffffffffffffea RBX: 00000005761e0000 RCX: 0000000000000001
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888686695b10
Jun 26 09:06:12 apollo kernel: Call Trace:
Jun 26 09:06:12 apollo kernel: RBP: ffff888686695300 R08: 0000000000000000 R09: ffffffff828b9af4
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: 0000000000015630 R12: 0000000000000000
Jun 26 09:06:12 apollo kernel:  unmap_vmas+0x7a/0xf0
Jun 26 09:06:12 apollo kernel: R13: 0000000000000020 R14: ffff888623c94400 R15: 0000000000000001
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686680000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel:  exit_mmap+0xad/0x1a0
Jun 26 09:06:12 apollo kernel: CS:  10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel: CR2: 00005635f9667f64 CR3: 00000005761e0000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel:  ? load_new_mm_cr3+0x39/0xc0
Jun 26 09:06:12 apollo kernel: Call Trace:
Jun 26 09:06:12 apollo kernel:  mmput+0x52/0x110
Jun 26 09:06:12 apollo kernel:  xen_write_cr3+0xf0/0x160
Jun 26 09:06:12 apollo kernel:  flush_old_exec+0x261/0x680
Jun 26 09:06:12 apollo kernel:  load_new_mm_cr3+0x39/0xc0
Jun 26 09:06:12 apollo kernel:  load_elf_binary+0x31f/0x16a0
Jun 26 09:06:12 apollo kernel:  switch_mm_irqs_off+0x199/0x4f0
Jun 26 09:06:12 apollo kernel:  ? get_user_pages_remote+0x142/0x230
Jun 26 09:06:12 apollo kernel:  ? netif_receive_skb_list_internal+0x48/0x2c0
Jun 26 09:06:12 apollo kernel:  ? _cond_resched+0x15/0x30
Jun 26 09:06:12 apollo kernel:  __text_poke+0x20e/0x4a0
Jun 26 09:06:12 apollo kernel:  ? selinux_inode_permission+0x107/0x1d0
Jun 26 09:06:12 apollo kernel:  text_poke_bp_batch+0xea/0x150
Jun 26 09:06:12 apollo kernel:  ? load_misc_binary+0x4c/0x410 [binfmt_misc]
Jun 26 09:06:12 apollo kernel:  arch_jump_label_transform_apply+0x2e/0x50
Jun 26 09:06:12 apollo kernel:  search_binary_handler+0x84/0x1b0
Jun 26 09:06:12 apollo kernel:  static_key_disable_cpuslocked+0x59/0x90
Jun 26 09:06:12 apollo kernel:  __do_execve_file.isra.0+0x502/0x870
Jun 26 09:06:12 apollo kernel:  static_key_disable+0x16/0x20
Jun 26 09:06:12 apollo kernel:  __x64_sys_execve+0x35/0x40
Jun 26 09:06:12 apollo kernel:  process_one_work+0x1e5/0x3a0
Jun 26 09:06:12 apollo kernel:  do_syscall_64+0x5b/0x1a0
Jun 26 09:06:12 apollo kernel:  worker_thread+0x4d/0x3d0
Jun 26 09:06:12 apollo kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
Jun 26 09:06:12 apollo kernel:  kthread+0xfb/0x130
Jun 26 09:06:12 apollo kernel: RIP: 0033:0x7f9c1bde7f87
Jun 26 09:06:12 apollo kernel:  ? process_one_work+0x3a0/0x3a0
Jun 26 09:06:12 apollo kernel: Code: Bad RIP value.
Jun 26 09:06:12 apollo kernel:  ? kthread_park+0x90/0x90
Jun 26 09:06:12 apollo kernel: RSP: 002b:00007ffd1e9d39c8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
Jun 26 09:06:12 apollo kernel:  ret_from_fork+0x35/0x40
Jun 26 09:06:12 apollo kernel: RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f9c1bde7f87
Jun 26 09:06:12 apollo kernel: ---[ end trace 243eccd2491897c2 ]---
Jun 26 09:06:12 apollo kernel: RDX: 00005635fa8a2ff0 RSI: 00005635fa8a36d0 RDI: 00005635fa8a2f50
Jun 26 09:06:12 apollo kernel: RBP: 00005635fa8a2f50 R08: 00005635fa8a36d0 R09: 00005635fa8a42b0
Jun 26 09:06:12 apollo kernel: 1 of 1 multicall(s) failed: cpu 2
Jun 26 09:06:12 apollo kernel: R10: 00007f9c1bf8f9b0 R11: 0000000000000202 R12: 00000000ffffffff
Jun 26 09:06:12 apollo kernel: R13: 00005635fa8a36d0 R14: 00005635fa8a2ff0 R15: 00005635fa8a2dd0
Jun 26 09:06:12 apollo kernel:   call  1: op=26 arg=[ffff888686695b10] result=-22
Jun 26 09:06:12 apollo kernel: Modules linked in: vfat fat iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi br_netfilter xt_physdev xen_acpi_processor xen_pciback xen_netback xen_blkback xen_gntalloc xen_gntdev xen_evtchn xenfs xen_privcmd nfsd auth_rpcgss nfs_acl lockd grace sunrpc bridge 8021q garp mrp stp llc bonding intel_rapl_msr iTCO_wdt iTCO_vendor_support intel_rapl_common sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel intel_rapl_perf pcspkr ast drm_vram_helper ttm i2c_algo_bit drm_kms_helper i2c_i801 drm mei_me mei lpc_ich ixgbe ipmi_ssif mdio ptp pps_core ioatdma dca ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter binfmt_misc tun zfs(PO) zunicode(PO) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) zlua(PO)
Jun 26 09:06:12 apollo kernel: CR2: ffff8884c7e33c88
Jun 26 09:06:12 apollo kernel: ---[ end trace 243eccd2491897c3 ]---
Jun 26 09:06:12 apollo kernel: RIP: e030:unmap_page_range+0x495/0xaa0
Jun 26 09:06:12 apollo kernel: Code: 89 ee e8 be f9 ff ff 48 83 7c 24 30 00 49 89 c7 74 09 48 85 c0 0f 85 2e 04 00 00 41 f6 44 24 20 01 0f 84 6b 03 00 00 4c 8b 2b <48> c7 03 00 00 00 00 49 39 6c 24 10 48 89 e8 49 0f 46 44 24 10 4d
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc9000b01fb58 EFLAGS: 00010202
Jun 26 09:06:12 apollo kernel: RAX: ffffea0017870c00 RBX: ffff8884c7e33c88 RCX: 000fffffffe00000
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000000 RSI: 00005635f9591000 RDI: 80000024fa0b0125
Jun 26 09:06:12 apollo kernel: RBP: 00005635f9591000 R08: ffff8885bab5a898 R09: 0000000000000000
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: 00000000000a67e9 R12: ffffc9000b01fc90
Jun 26 09:06:12 apollo kernel: R13: 80000024fa0b0125 R14: 00005635f9592000 R15: ffffea0017870c00
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686640000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel: CS:  e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel: CR2: 00007f9c1bde7f5d CR3: 00000005639ae000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel: ------------[ cut here ]------------
Jun 26 09:06:12 apollo kernel: kernel BUG at arch/x86/kernel/paravirt.c:216!
Jun 26 09:06:12 apollo kernel: invalid opcode: 0000 [#2] SMP NOPTI
Jun 26 09:06:12 apollo kernel: CPU: 1 PID: 10954 Comm: zfs_stats_cache Tainted: P      D W  O      5.4.38-gentoo-host #1
Jun 26 09:06:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:06:12 apollo kernel: RIP: e030:paravirt_enter_lazy_mmu+0x1c/0x20
Jun 26 09:06:12 apollo kernel: Code: 82 e9 c8 1d 07 00 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 65 8b 05 5c b7 fb 7e 85 c0 75 0c 65 c7 05 4d b7 fb 7e 01 00 00 00 c3 <0f> 0b 66 90 0f 1f 44 00 00 65 8b 05 3c b7 fb 7e 83 f8 01 75 0c 65
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc9000b01fcf8 EFLAGS: 00010202
Jun 26 09:06:12 apollo kernel: RAX: 0000000000000001 RBX: ffff88859b19eff0 RCX: 000fffffffe00000
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000001 RSI: ffffea00166c6780 RDI: ffff8886403a3740
Jun 26 09:06:12 apollo kernel: RBP: ffffffffffffffff R08: 0000000000000000 R09: 8080808080808080
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: 0000000000012437 R12: ffffc9000b01fe38
Jun 26 09:06:12 apollo kernel: R13: 00007fffffffe000 R14: 00007fffffffe000 R15: ffff888377617ff8
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686640000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel: CS:  e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel: CR2: 00007f9c1bde7f5d CR3: 000000000220a000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel: Call Trace:
Jun 26 09:06:12 apollo kernel:  unmap_page_range+0x44c/0xaa0
Jun 26 09:06:12 apollo kernel:  ? xen_pin_page+0x180/0x180
Jun 26 09:06:12 apollo kernel:  unmap_vmas+0x7a/0xf0
Jun 26 09:06:12 apollo kernel:  exit_mmap+0xad/0x1a0
Jun 26 09:06:12 apollo kernel:  mmput+0x52/0x110
Jun 26 09:06:12 apollo kernel:  do_exit+0x304/0xac0
Jun 26 09:06:12 apollo kernel:  ? __x64_sys_execve+0x35/0x40
Jun 26 09:06:12 apollo kernel:  rewind_stack_do_exit+0x17/0x20
Jun 26 09:06:12 apollo kernel: Modules linked in: vfat fat iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi br_netfilter xt_physdev xen_acpi_processor xen_pciback xen_netback xen_blkback xen_gntalloc xen_gntdev xen_evtchn xenfs xen_privcmd nfsd auth_rpcgss nfs_acl lockd grace sunrpc bridge 8021q garp mrp stp llc bonding intel_rapl_msr iTCO_wdt iTCO_vendor_support intel_rapl_common sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel intel_rapl_perf pcspkr ast drm_vram_helper ttm i2c_algo_bit drm_kms_helper i2c_i801 drm mei_me mei lpc_ich ixgbe ipmi_ssif mdio ptp pps_core ioatdma dca ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter binfmt_misc tun zfs(PO) zunicode(PO) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) zlua(PO)
Jun 26 09:06:12 apollo kernel: ---[ end trace 243eccd2491897c4 ]---
Jun 26 09:06:12 apollo kernel: RIP: e030:unmap_page_range+0x495/0xaa0
Jun 26 09:06:12 apollo kernel: Code: 89 ee e8 be f9 ff ff 48 83 7c 24 30 00 49 89 c7 74 09 48 85 c0 0f 85 2e 04 00 00 41 f6 44 24 20 01 0f 84 6b 03 00 00 4c 8b 2b <48> c7 03 00 00 00 00 49 39 6c 24 10 48 89 e8 49 0f 46 44 24 10 4d
Jun 26 09:06:12 apollo kernel: RSP: e02b:ffffc9000b01fb58 EFLAGS: 00010202
Jun 26 09:06:12 apollo kernel: RAX: ffffea0017870c00 RBX: ffff8884c7e33c88 RCX: 000fffffffe00000
Jun 26 09:06:12 apollo kernel: RDX: 0000000000000000 RSI: 00005635f9591000 RDI: 80000024fa0b0125
Jun 26 09:06:12 apollo kernel: RBP: 00005635f9591000 R08: ffff8885bab5a898 R09: 0000000000000000
Jun 26 09:06:12 apollo kernel: R10: 0000000000007ff0 R11: 00000000000a67e9 R12: ffffc9000b01fc90
Jun 26 09:06:12 apollo kernel: R13: 80000024fa0b0125 R14: 00005635f9592000 R15: ffffea0017870c00
Jun 26 09:06:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686640000(0000) knlGS:0000000000000000
Jun 26 09:06:12 apollo kernel: CS:  e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:06:12 apollo kernel: CR2: 00007f9c1bde7f5d CR3: 000000000220a000 CR4: 0000000000040660
Jun 26 09:06:12 apollo kernel: Fixing recursive fault but reboot is needed!
Jun 26 09:06:24 apollo nrpe[11158]: Error: Request packet had invalid CRC32.
Jun 26 09:06:24 apollo nrpe[11158]: Client request from 10.55.16.69 was invalid, bailing out...
Jun 26 09:06:24 apollo sudo[11164]:   nagios : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/lib64/nagios/plugins/antarean/zfs_test.py --capacity 75 85 --fragmentation 80 85 zhost
Jun 26 09:06:24 apollo sudo[11164]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 26 09:06:24 apollo sudo[11164]: pam_unix(sudo:session): session closed for user root
Jun 26 09:06:27 apollo nrpe[11179]: Error: Request packet had invalid CRC32.
Jun 26 09:06:27 apollo nrpe[11179]: Client request from 10.55.16.69 was invalid, bailing out...
Jun 26 09:07:12 apollo kernel: rcu: INFO: rcu_sched detected stalls on CPUs/tasks:
Jun 26 09:07:12 apollo kernel: rcu: \x092-...0: (30 ticks this GP) idle=1a2/1/0x4000000000000002 softirq=178803402/178803402 fqs=14761 
Jun 26 09:07:12 apollo kernel: \x09(detected by 1, t=60005 jiffies, g=324124349, q=3903)
Jun 26 09:07:12 apollo kernel: Sending NMI from CPU 1 to CPUs 2:
Jun 26 09:07:12 apollo kernel: NMI backtrace for cpu 2
Jun 26 09:07:12 apollo kernel: CPU: 2 PID: 24779 Comm: kworker/2:0 Tainted: P      D W  O      5.4.38-gentoo-host #1
Jun 26 09:07:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:07:12 apollo kernel: Workqueue: events netstamp_clear
Jun 26 09:07:12 apollo kernel: RIP: e030:handle_edge_irq+0x55/0x1b0
Jun 26 09:07:12 apollo kernel: Code: e7 00 00 00 48 8b 43 48 f7 00 00 00 01 00 0f 85 a4 00 00 00 48 83 bb 80 00 00 00 00 0f 84 96 00 00 00 48 8b 43 70 48 8d 7b 38 <65> ff 00 48 8b 43 50 83 83 98 00 00 00 01 65 48 ff 05 95 63 ef 7e
Jun 26 09:07:12 apollo kernel: RSP: e02b:ffffc9000363df58 EFLAGS: 00010086
Jun 26 09:07:12 apollo kernel: RAX: 0000607979006450 RBX: ffff88867225f800 RCX: 0000000000000000
Jun 26 09:07:12 apollo kernel: RDX: ffff88867225f800 RSI: 0000000000000089 RDI: ffff88867225f838
Jun 26 09:07:12 apollo kernel: RBP: 0000000000000002 R08: ffff88867d929918 R09: ffff88867d929988
Jun 26 09:07:12 apollo kernel: R10: 0000000000000000 R11: ffffffff8224c7a8 R12: 00000000000285e0
Jun 26 09:07:12 apollo kernel: R13: 0000000000000000 R14: 0000000000000000 R15: ffff8886866a85fc
Jun 26 09:07:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686680000(0000) knlGS:0000000000000000
Jun 26 09:07:12 apollo kernel: CS:  10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:07:12 apollo kernel: CR2: ffffe8ffff686450 CR3: 00000005761e0000 CR4: 0000000000040660
Jun 26 09:07:12 apollo kernel: Call Trace:
Jun 26 09:07:12 apollo kernel:  <IRQ>
Jun 26 09:07:12 apollo kernel:  generic_handle_irq+0x24/0x30
Jun 26 09:07:12 apollo kernel:  __evtchn_fifo_handle_events+0x147/0x190
Jun 26 09:07:12 apollo kernel:  __xen_evtchn_do_upcall+0x58/0x90
Jun 26 09:07:12 apollo kernel:  xen_evtchn_do_upcall+0x27/0x40
Jun 26 09:07:12 apollo kernel:  xen_do_hypervisor_callback+0x29/0x40
Jun 26 09:07:12 apollo kernel:  </IRQ>
Jun 26 09:07:12 apollo kernel: RIP: e030:smp_call_function_many+0x1fe/0x260
Jun 26 09:07:12 apollo kernel: Code: e8 57 93 7a 00 3b 05 d5 6c 1f 01 89 c7 0f 83 99 fe ff ff 48 63 c7 48 8b 0b 48 03 0c c5 20 d9 08 82 8b 41 18 a8 01 74 0a f3 90 <8b> 51 18 83 e2 01 75 f6 eb c9 48 c7 c2 a0 5f 34 82 4c 89 f6 89 df
Jun 26 09:07:12 apollo kernel: RSP: e02b:ffffc90008bcbda0 EFLAGS: 00000202
Jun 26 09:07:12 apollo kernel: RAX: 0000000000000003 RBX: ffff8886866ab100 RCX: ffff88868666fa00
Jun 26 09:07:12 apollo kernel: RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000001
Jun 26 09:07:12 apollo kernel: RBP: ffffffff8102da80 R08: ffff8886866ab108 R09: ffff88867ec01590
Jun 26 09:07:12 apollo kernel: R10: 0000000000000000 R11: ffffffff8224c7a8 R12: 0000000000000000
Jun 26 09:07:12 apollo kernel: R13: ffff8886866ab108 R14: 0000000000000080 R15: 0000000000000001
Jun 26 09:07:12 apollo kernel:  ? poke_int3_handler+0x70/0x70
Jun 26 09:07:12 apollo kernel:  ? poke_int3_handler+0x70/0x70
Jun 26 09:07:12 apollo kernel:  on_each_cpu+0x28/0x50
Jun 26 09:07:12 apollo kernel:  text_poke_bp_batch+0x102/0x150
Jun 26 09:07:12 apollo kernel:  arch_jump_label_transform_apply+0x2e/0x50
Jun 26 09:07:12 apollo kernel:  static_key_disable_cpuslocked+0x59/0x90
Jun 26 09:07:12 apollo kernel:  static_key_disable+0x16/0x20
Jun 26 09:07:12 apollo kernel:  process_one_work+0x1e5/0x3a0
Jun 26 09:07:12 apollo kernel:  worker_thread+0x4d/0x3d0
Jun 26 09:07:12 apollo kernel:  kthread+0xfb/0x130
Jun 26 09:07:12 apollo kernel:  ? process_one_work+0x3a0/0x3a0
Jun 26 09:07:12 apollo kernel:  ? kthread_park+0x90/0x90
Jun 26 09:07:12 apollo kernel:  ret_from_fork+0x35/0x40
Jun 26 09:07:33 apollo nrpe[13280]: Error: Request packet had invalid CRC32.
Jun 26 09:07:33 apollo nrpe[13280]: Client request from 10.55.16.69 was invalid, bailing out...
Jun 26 09:07:47 apollo nrpe[13523]: Error: Request packet had invalid CRC32.
Jun 26 09:07:47 apollo nrpe[13523]: Client request from 10.55.16.69 was invalid, bailing out...
Jun 26 09:09:12 apollo nrpe[14637]: Error: Request packet had invalid CRC32.
Jun 26 09:09:12 apollo nrpe[14637]: Client request from 10.55.16.69 was invalid, bailing out...
Jun 26 09:09:12 apollo sudo[14649]:   nagios : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/sbin/smartctl -H /dev/disk/by-id/ata-Xstra_SSD_144705001000
Jun 26 09:09:12 apollo sudo[14649]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jun 26 09:09:12 apollo sudo[14649]: pam_unix(sudo:session): session closed for user root
Jun 26 09:09:15 apollo nrpe[14652]: Error: Request packet had invalid CRC32.
Jun 26 09:09:15 apollo nrpe[14652]: Client request from 10.55.16.69 was invalid, bailing out...
Jun 26 09:10:12 apollo kernel: rcu: INFO: rcu_sched detected stalls on CPUs/tasks:
Jun 26 09:10:12 apollo kernel: rcu: \x092-...0: (30 ticks this GP) idle=1a2/1/0x4000000000000002 softirq=178803402/178803402 fqs=33465 
Jun 26 09:10:12 apollo kernel: \x09(detected by 0, t=240007 jiffies, g=324124349, q=65141)
Jun 26 09:10:12 apollo kernel: Sending NMI from CPU 0 to CPUs 2:
Jun 26 09:10:12 apollo kernel: NMI backtrace for cpu 2
Jun 26 09:10:12 apollo kernel: CPU: 2 PID: 24779 Comm: kworker/2:0 Tainted: P      D W  O      5.4.38-gentoo-host #1
Jun 26 09:10:12 apollo kernel: Hardware name: Supermicro Super Server/X10DRi-T4+, BIOS 3.1 06/08/2018
Jun 26 09:10:12 apollo kernel: Workqueue: events netstamp_clear
Jun 26 09:10:12 apollo kernel: RIP: e030:xen_page_fault+0x0/0x10
Jun 26 09:10:12 apollo kernel: Code: 9e 00 0f 1f 84 00 00 00 00 00 59 41 5b e9 08 13 9e 00 0f 1f 84 00 00 00 00 00 59 41 5b e9 98 13 9e 00 0f 1f 84 00 00 00 00 00 <59> 41 5b e9 c8 13 9e 00 0f 1f 84 00 00 00 00 00 59 41 5b e9 c8 0f
Jun 26 09:10:12 apollo kernel: RSP: e02b:ffffc9000363df10 EFLAGS: 00000086
Jun 26 09:10:12 apollo kernel: RAX: 0000607979006450 RBX: ffff88867225f800 RCX: 0000000000000000
Jun 26 09:10:12 apollo kernel: RDX: ffff88867225f800 RSI: 0000000000000089 RDI: ffff88867225f838
Jun 26 09:10:12 apollo kernel: RBP: 0000000000000002 R08: ffff88867d929918 R09: ffff88867d929988
Jun 26 09:10:12 apollo kernel: R10: 0000000000000000 R11: ffffffff8224c7a8 R12: 00000000000285e0
Jun 26 09:10:12 apollo kernel: R13: 0000000000000000 R14: 0000000000000000 R15: ffff8886866a85fc
Jun 26 09:10:12 apollo kernel: FS:  00007f9c1bce1b80(0000) GS:ffff888686680000(0000) knlGS:0000000000000000
Jun 26 09:10:12 apollo kernel: CS:  10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033
Jun 26 09:10:12 apollo kernel: CR2: ffffe8ffff686450 CR3: 00000005761e0000 CR4: 0000000000040660
Jun 26 09:10:12 apollo kernel: Call Trace:
Jun 26 09:10:12 apollo kernel:  <IRQ>
Jun 26 09:10:12 apollo kernel:  ? handle_edge_irq+0x55/0x1b0
Jun 26 09:10:12 apollo kernel:  ? handle_edge_irq+0x27/0x1b0
Jun 26 09:10:12 apollo kernel:  ? generic_handle_irq+0x24/0x30
Jun 26 09:10:12 apollo kernel:  ? __evtchn_fifo_handle_events+0x147/0x190
Jun 26 09:10:12 apollo kernel:  ? __xen_evtchn_do_upcall+0x58/0x90
Jun 26 09:10:12 apollo kernel:  ? xen_evtchn_do_upcall+0x27/0x40
Jun 26 09:10:12 apollo kernel:  ? xen_do_hypervisor_callback+0x29/0x40
Jun 26 09:10:12 apollo kernel:  </IRQ>
Jun 26 09:10:12 apollo kernel:  ? poke_int3_handler+0x70/0x70
Jun 26 09:10:12 apollo kernel:  ? smp_call_function_many+0x1fe/0x260
Jun 26 09:10:12 apollo kernel:  ? poke_int3_handler+0x70/0x70
Jun 26 09:10:12 apollo kernel:  ? on_each_cpu+0x28/0x50
Jun 26 09:10:12 apollo kernel:  ? text_poke_bp_batch+0x102/0x150
Jun 26 09:10:12 apollo kernel:  ? arch_jump_label_transform_apply+0x2e/0x50
Jun 26 09:10:12 apollo kernel:  ? static_key_disable_cpuslocked+0x59/0x90
Jun 26 09:10:12 apollo kernel:  ? static_key_disable+0x16/0x20
Jun 26 09:10:12 apollo kernel:  ? process_one_work+0x1e5/0x3a0
Jun 26 09:10:12 apollo kernel:  ? worker_thread+0x4d/0x3d0
Jun 26 09:10:12 apollo kernel:  ? kthread+0xfb/0x130
Jun 26 09:10:12 apollo kernel:  ? process_one_work+0x3a0/0x3a0
Jun 26 09:10:12 apollo kernel:  ? kthread_park+0x90/0x90
Jun 26 09:10:12 apollo kernel:  ? ret_from_fork+0x35/0x40
Jun 26 09:29:50 apollo syslog-ng[4628]: syslog-ng starting up; version='3.22.1'

--nextPart1754284.tdWV9SEqCh--







From xen-users-bounces@lists.xenproject.org Fri Jun 26 20:32:19 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Jun 2020 20:32:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jouzQ-0007GC-1k; Fri, 26 Jun 2020 20:30:24 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vtiJ=AH=telus.net=davehill@srs-us1.protection.inumbo.net>)
 id 1jouzO-0007G7-E5
 for xen-users@lists.xenproject.org; Fri, 26 Jun 2020 20:30:22 +0000
X-Inumbo-ID: db0a2920-b7eb-11ea-8313-12813bfff9fa
Received: from cmta18.telus.net (unknown [209.171.16.91])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id db0a2920-b7eb-11ea-8313-12813bfff9fa;
 Fri, 26 Jun 2020 20:30:21 +0000 (UTC)
Received: from [192.168.2.13] ([173.181.74.129]) by cmsmtp with SMTP
 id ouzKjO1f7VEJfouzMjLfZz; Fri, 26 Jun 2020 14:30:20 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telus.net; s=neo;
 t=1593203420; bh=3wl9dFfkxYLZ+7gaqyIoBhz5TqLpegY/A5J7fYLCPPA=;
 h=Subject:To:References:From:Date:In-Reply-To;
 b=mV9Hzk0pXiswaEJZOH2tmyskpUCCKNXDOQoIZcsbQFJqvEnnX55LB0Cv6B2ylswlG
 F5FfKeM5gvWbGwa1XYKPdvoak71b0tt7IPuiDrpp0Ez96stWpseI1V+31EsfX1MoeW
 CYNN6qAiDxtZfhsoHPi3yBV7S/2Acgsu5SnR7qdhngH6su7Cs+lvrLxlpuMTbw45UD
 nvp7wgkYy/iLrfT0VW1HY8QcA9Bz0Ipu/fCBL+vHQomgD54sXK06GeNGTl0BfhGotf
 R6LjKxkoRbmP8Q/UVZxjiK5i+e3WKroPJmn7wEZcVrM3Oh5/to5BkBShK0OO+E+6+P
 BhoIu/B7SxGFQ==
X-Telus-Authed: ZGF2ZWhpbGxAdGVsdXMubmV0
X-Authority-Analysis: v=2.3 cv=KIck82No c=1 sm=1 tr=0
 a=dDDs8EMPbAqg94jd+XLA8Q==:117 a=dDDs8EMPbAqg94jd+XLA8Q==:17
 a=r77TgQKjGQsHNAKrUKIA:9 a=cWRNjhkoAAAA:8 a=Q5G10F4OXSJv_KSfqGoA:9
 a=QEXdDO2ut3YA:10 a=NcN59idvAAAA:8 a=7sJMZTAu2f0tTHAv_DEA:9
 a=m8l2l1IKSJBdMFds:21 a=_W_S_7VecoQA:10 a=sVa6W5Aao32NNC1mekxh:22
Subject: Re: Can't access USBs from DomU
To: xen-users@lists.xenproject.org
References: <331267288.92651.1593100580336@mail2.virginmedia.com>
From: Dave Hill <davehill@telus.net>
Message-ID: <f4944c0f-58b1-d880-a313-1415610b795a@telus.net>
Date: Fri, 26 Jun 2020 13:30:18 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <331267288.92651.1593100580336@mail2.virginmedia.com>
Content-Type: multipart/alternative;
 boundary="------------B6D30F4486FCA846BD711882"
Content-Language: en-US
X-CMAE-Envelope: MS4wfMRFNbwAl4qp6k9vUmGbUaysfKI5GwzeLwZvSpsB3HxG7k2+hGMoRy3FFZyRXpvonJkX/N1dCPsNRRwzOG8955YTS9MXuUSz4ujGFsH/4zcIGFOBWXz0
 a48QLPcqYYCujN+q5Fl49knkQH2HGEn/3f4pzwYTKBFpCE9zyTOEMSnRhQZFofK55Fm6h5Jidp6ySA==
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------B6D30F4486FCA846BD711882
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

On 2020-06-25 8:56 a.m., hargreaves martin wrote:
>
> A very quick question (hopefully).
>
>
> On Dom0, I can attach my USBs.
>
>
> $ sudo xl usbdev-attach ubud1 hostbus=2 hostaddr=36
>
> $ sudo xl usb-list 5
>
> Devid Type BE state usb-ver ports
>
> 0 qusb 0 1 2 8
>
> Port 1: Bus 002 Device 025
>
> Port 2: Bus 002 Device 024
>
> Port 3:
>
> …
>
>
> But I can’t see them in my DomU (Ubuntu). Any suggestions?
>
>
> Any help would be very much appreciated.
>
>
> Martin..
>

I don't do it that way anymore (I use SPICE instead), but the Xen USB 
Passthrough page helped me when I was trying to figure out how to do it 
the way you are now:
https://wiki.xenproject.org/wiki/Xen_USB_Passthrough

Regards,

David


--------------B6D30F4486FCA846BD711882
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    On 2020-06-25 8:56 a.m., hargreaves martin wrote:<br>
    <blockquote type="cite"
      cite="mid:331267288.92651.1593100580336@mail2.virginmedia.com">
      <meta http-equiv="content-type" content="text/html; charset=UTF-8">
      <meta charset="UTF-8">
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">A very quick question
          (hopefully).</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><br>
      </p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">On Dom0, I can attach my
          USBs.</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><br>
      </p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">$ sudo xl usbdev-attach
          ubud1 hostbus=2 hostaddr=36</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">$ sudo xl usb-list 5</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">Devid Type BE state
          usb-ver ports</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">0 qusb 0 1 2 8 </span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">Port 1: Bus 002 Device 025</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">Port 2: Bus 002 Device 024</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">Port 3:</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;">…</p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><br>
      </p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">But I can’t see them in my
          DomU (Ubuntu). Any suggestions?</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><br>
      </p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">Any help would be very
          much appreciated.</span></p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><br>
      </p>
      <p class="western" style="margin-bottom: 0cm; line-height: 100%;"><span
          style="font-size: medium;" size="3">Martin..</span></p>
    </blockquote>
    <br>
    <p><font face="Helvetica, Arial, sans-serif">I don't do it that way
        anymore (I use SPICE instead), but the Xen USB Passthrough page
        helped me when I was trying to figure out how to do it the way
        you are now:<br>
        <a class="moz-txt-link-freetext" href="https://wiki.xenproject.org/wiki/Xen_USB_Passthrough">https://wiki.xenproject.org/wiki/Xen_USB_Passthrough</a></font></p>
    <p><font face="Helvetica, Arial, sans-serif">Regards,</font></p>
    <p><font face="Helvetica, Arial, sans-serif">David</font></p>
  </body>
</html>

--------------B6D30F4486FCA846BD711882--


From xen-users-bounces@lists.xenproject.org Sat Jun 27 03:16:44 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 27 Jun 2020 03:16:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jp1Ja-0007e2-4j; Sat, 27 Jun 2020 03:15:38 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RlCy=AI=sendgrid.net=bounces+1794986-9697-xen-users=lists.xenproject.org@srs-us1.protection.inumbo.net>)
 id 1jp1JZ-0007dx-9K
 for xen-users@lists.xenproject.org; Sat, 27 Jun 2020 03:15:37 +0000
X-Inumbo-ID: 77761bc4-b824-11ea-bca7-bc764e2007e4
Received: from xtrwsqzp.outbound-mail.sendgrid.net (unknown [167.89.100.227])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 77761bc4-b824-11ea-bca7-bc764e2007e4;
 Sat, 27 Jun 2020 03:15:36 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sendgrid.net;
 h=mime-version:content-type:content-transfer-encoding:from:subject:
 in-reply-to:references:to;
 s=smtpapi; bh=Bxv77Q2IxcnE9dzxvArMJMQsqCb6Mais5i9cndGhL+k=;
 b=txPHl3RoWEs1NkqHTVm9qoQFf0pLgaeStrxeUw0ZQ4F9WHlXkubc0wb7eaJ+Z79aEW+H
 WFxnTvp/qJ9JKp6tyPKlKGo77khLBxCDte8/uJZf5bDHdnDArvXBCqGAvEfY7zp/tM5+mq
 o/uBxg5dkvmyzgK8giKlQKv25RCKHwLiQ=
Received: by filterdrecv-p3mdw1-75c584b9c6-phwzs with SMTP id
 filterdrecv-p3mdw1-75c584b9c6-phwzs-21-5EF6B9D6-22
 2020-06-27 03:15:34.68004056 +0000 UTC m=+36359.277715249
Received: from cloudmachine.kow.is (unknown) by geopod-ismtpd-4-2 (SG)
 with ESMTP id 7V2Zflz2TAe4V6c_snz41A
 for <xen-users@lists.xenproject.org>;
 Sat, 27 Jun 2020 03:15:34.575 +0000 (UTC)
Received: from soulreaver.dark.kow.is (unknown [10.10.220.216])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "soulreaver.dark.kow.is", Issuer "dark.kow.is CA" (not verified))
 by cloudmachine.kow.is (Postfix) with ESMTPS id 1CB667ED76
 for <xen-users@lists.xenproject.org>; Fri, 26 Jun 2020 22:15:34 -0500 (CDT)
Received: from localhost (home.kow.is [10.10.220.205])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by soulreaver.dark.kow.is (Postfix) with ESMTPSA id B5446800B5
 for <xen-users@lists.xenproject.org>; Fri, 26 Jun 2020 22:15:33 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Date: Sat, 27 Jun 2020 03:15:34 +0000 (UTC)
From: David Kowis <david@kow.is>
Subject: Re: USB on DomU
In-Reply-To: <bf612b2d-313a-ecb8-acbd-3669f769953f@gmail.com>
References: <bf612b2d-313a-ecb8-acbd-3669f769953f@gmail.com>
User-Agent: Roundcube Webmail/1.4.0
Message-ID: <fadfbfb0c159d3a75d7b497e751bbe1d@kow.is>
X-Sender: david@kow.is
X-SG-EID: =?us-ascii?Q?+kMxBqj35EdRUKoy8diX1v=2FYwOtV0mBc163WH1fm2RNr7DE+LL3sO=2F0hN7QDBQ?=
 =?us-ascii?Q?f4xmJGLNgQ2RVic6PBw0yqVyF6Ht=2FZGMxjYwyJO?=
 =?us-ascii?Q?2rYJmKStq=2FSdSStsZu6Yb6sYYdsuAS+fIYIJN3G?=
 =?us-ascii?Q?xwKfl+jC1wD0PrVBv41RcmM=2Fy9w0rIrvunwGOww?=
 =?us-ascii?Q?Jl18xHsHkUG1id9xlDpi4cxtsOvcxot89ars6sL?=
 =?us-ascii?Q?oyrh=2F1hNf25YEt4XP=2FGIvVWC40kLlMZnepRw1Q9?=
 =?us-ascii?Q?4wm4Tc92=2FtXFKu+8RTCGw=3D=3D?=
To: xen-users@lists.xenproject.org
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 2020-06-18 11:46, Martin Hargreaves wrote:
> Dear Xen Community,
> 
> I have recently created an Ubuntu 16.04 Guest DomU which seems to run
> okay but I’m struggling for it to see USBs.

If your VM is not HVM, it needs the PVUSB drivers, which I only know of 
from here: https://github.com/jgross1/linux/tree/pvusb

I got it from here: 
https://lists.xenproject.org/archives/html/xen-users/2019-08/msg00013.html

I don't know if those drivers are updated more often. I haven't gotten 
around to using them yet, other things keep getting in the way.

An HVM VM should do USB passthrough natively, and not need any PV 
drivers.

> 
> On my host Dom0 system, a ‘lsusb’  shows my device as..
> Bus 002 Device 005: ID 058f:6387 Alcor Micro Corp. Flash Drive
> 
> In my config file I use the settings…
> 
> usbctrl=[ 'type=auto,version=2' ]
> usbdev=[ 'hostbus=2,hostaddr=5' ]
> 
> As I issue the xl create command, the USB mounted on Dom0 is unmounted
> (I don’t know if this is expected) and my DomU seems to start ok.
> However, when I do an ‘lsusb’ I can’t see it when in my DomU.
> On Dom0 (ID=3), if I issue the following command,  it seems like it has 
> worked.
> root@Dell-e6400-2:~# xl usb-list 3
> Devid  Type         BE  state usb-ver ports
> 0      qusb         0   1     2       8
>   Port 1: Bus 002 Device 005
>   Port 2:
>   Port 3:
>   Port 4:
>   Port 5:
>   Port 6:
>   Port 7:
>   Port 8:
> 
> Am I missing a further step to see the USB device in my DomU?
> 
>   Thank you for any insights that anyone may have.
> 
>     Martin...


From xen-users-bounces@lists.xenproject.org Sat Jun 27 17:57:28 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 27 Jun 2020 17:57:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jpF3D-0004gj-31; Sat, 27 Jun 2020 17:55:39 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=pdil=AI=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1jpF3A-0004ge-W7
 for xen-users@lists.xenproject.org; Sat, 27 Jun 2020 17:55:37 +0000
X-Inumbo-ID: 65ffaa9c-b89f-11ea-83dd-12813bfff9fa
Received: from sonic310-14.consmr.mail.bf2.yahoo.com (unknown [74.6.135.124])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 65ffaa9c-b89f-11ea-83dd-12813bfff9fa;
 Sat, 27 Jun 2020 17:55:34 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1593280533; bh=6Tc9Xd2dGQzhQMbj30t/AtxNxmpq5MFx8g/UtVK9LaM=;
 h=Date:From:Reply-To:To:Subject:References:From:Subject;
 b=Y9b+jgtcCPL4D2+d66PydRNYksYS8/LR/2ZWHKRyak7BjVcIFpw5lJFpL39XhsN+cAPw6OxH1th06+2LFUnvAbg+WkHRILYER1XP2Fu3vQzNtDP5DQyShR89O1ycQBEESBgLyZdllvt2vg+wWs5XAcFssVxaNc9R7IYoVvwUn4bDmMcXX/qLvG5YqQZJvNDf9C56O46tYczEKUn9cO0Zr2rqfo4i8KZCK75sY4diSq6Vh6JpvPbvjeMYRC82nrZ091rpbh/rfXefh+JG3vcLtomgKiZEnNgtlw+VlgVlt8iVmSFZ4zt/+fi199V2y+sKuVYUw0WyEV1gbyEfGIgdYA==
X-YMail-OSG: gO3MR.0VM1mpWAw1RGl0kfGxXxiu_gD1VSU7YfmFocsCrtpQA0S7_Wq6YH.CXnv
 NzcqqbIpLoTdmNaVyD_Un_hDEeIEwTpnpHQulqjr1BE_YiHdO.fCsSzCam_f55mhiaWzVdHvmG8.
 EgDQzExM4HJ42nrvwXtZ8kjDTkUwTGWLRHmN26KXK8lOg0ubdAkp4Jo5Rll3tXMxxoemdKP4oMvx
 HgK7UCirGFGn4mqEsQ7nDx1cbQL5llu10JmHSOpZKvsEoQvQGc.Kh_s6PP4urNLeTrFgH2SO6Us7
 CM_PpkJX1.qMu1qBk8NtRi5ZFJHoBg4vpToh6tkeXtParg6ncyG38M_lPtRLJ_lPdR06zs.rGC50
 NOrK80WSE6RhcMeAFwxlptmGU7oAYqO_TGEXT1SIWugxLtVnzEJOagChEXNcupMeDd.rQdK.Aga7
 cT1Q1MzUczwO9QY0bZ.Fe.RXuRwp.7BIZmBLVuBATASjS9iIwaDbqWmvfVG_O5PpshEHgan2eaXk
 7AXnQMIzGGcVksW9e3BVZq1vawXv7LjziEH76M8tDx5FQKbQoroEt7EXeGCA_S2I92.SeAzzUoWR
 ee4cxemXKr_NhD4njTGP2RXqcCa1S6KjXBmRCc4LoMZ1nN0VKxca7ejLSY0KycJVbPraCS9wBZMG
 FS9x527b7wFNbsjxkgvrXnh9EysnhmpKbRCVVFTTdWfZZAKCx3PzgJW8K41v_R8hUBDtfsVBEfv.
 aI1sy6PxjM4Mmf3VbC72WZGLFVsdOe7aFX1JAYPrFMrtGhDhB.RlDGsCprQ1Gtzwcpmf3ML4fR6_
 xSYEE7Da9R16EGqc58oaz361nD4dr57d8iR1NvhFRiZJJ5oLuneeX9fFLTcGWoU5l0nsQz8NmulP
 DNS6Qua6NCrwWXFw41vrRHcnrA8k9v10JYLEswj.1sv9lBDVk5q6jlOJp_mLabrTZyLvDePqQmtW
 kPtapOYMQvMm6kk3gd5J2ko3VQekf4ItrqcTc2p5ta81rc3PxMMncFtAOZ44m1rL0xFij3MGXc4j
 B3kkIbNRLYUEjIPA0H5x88yDa2MzofO5mqve8hqAcrhV4DRI2I0NMZ.tzQrxcAv0os0n.c8eWY2z
 STAuYURnKDos.ljkZdqWMbjX_WgKn5Xl3dM6WqPmvLgslUXFiEGz0.HZWkjhcWtkw9kpDlPr.ckl
 oKY8XCHC2ZaXlkoOqDuXvdJ6LwJy8JMcjFQv6ZAQgVnGqMApg8XrzTyiGK_qV0L9QCkazrgac9Sa
 3Pvspv.4IvkRFrUFAzyEd.yzI7RKVLjUZEoNNb78GM_DoAv5B3Z3vj74GWPucfFLEe3jGXG.OaTR
 .AgqPPxdTTijL6Hs8s1LeUqGSLKY_IVsbTzajZG9QxpSPeKCboIvLVyNC4tDt_LkdqDZFCDtcK9P
 qbJXy5.IMeH7NeGx5ULsrBOgpMP5U5sktgERzwveA7SynKVMhFmWevQTXIZoI6FZfLBVUg2vkvbC
 w4pujYrJ.Nprkkmil2KgjOebsJufDo_5W10ihNG_3GhPi.TJPetf_zNmYKYxGWjdXd7G14QildhK
 xw6NkKjHo741aFgQIN472QDJWj5_AARGR1UiYQQXIoe8jtWU-
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic310.consmr.mail.bf2.yahoo.com with HTTP; Sat, 27 Jun 2020 17:55:33 +0000
Date: Sat, 27 Jun 2020 17:55:29 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: Xen-users <xen-users@lists.xenproject.org>
Message-ID: <920197710.3271313.1593280529488@mail.yahoo.com>
Subject: "HVM with PV driver" and "PVHVM".
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_3271312_230658674.1593280529487"
References: <920197710.3271313.1593280529488.ref@mail.yahoo.com>
X-Mailer: WebService/1.1.16138 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 1049
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_3271312_230658674.1593280529487
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,What is the deference between "HVM with PV driver" and "PVHVM"? Both are same?
Thank you.

Sent from Yahoo Mail on Android
------=_Part_3271312_230658674.1593280529487
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,<div id="yMail_cursorElementTracker_1593280479082">What is the deference between "HVM with PV driver" and "PVHVM"? Both are same?</div><div id="yMail_cursorElementTracker_1593280508808"><br></div><div id="yMail_cursorElementTracker_1593280509041">Thank you.<br id="yMail_cursorElementTracker_1593280475601"><br><div id="ymail_android_signature"><a id="ymail_android_signature_link" href="https://go.onelink.me/107872968?pid=InProduct&amp;c=Global_Internal_YGrowth_AndroidEmailSig__AndroidUsers&amp;af_wl=ym&amp;af_sub1=Internal&amp;af_sub2=Global_YGrowth&amp;af_sub3=EmailSignature">Sent from Yahoo Mail on Android</a></div></div>
------=_Part_3271312_230658674.1593280529487--


From xen-users-bounces@lists.xenproject.org Mon Jun 29 14:34:34 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2020 14:34:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jpuqf-0003Sn-ES; Mon, 29 Jun 2020 14:33:29 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GTDU=AI=dettenbach.de=niels@srs-us1.protection.inumbo.net>)
 id 1jpIuN-0008Hb-PI
 for xen-users@lists.xenproject.org; Sat, 27 Jun 2020 22:02:48 +0000
X-Inumbo-ID: edd636c6-b8c1-11ea-bb8b-bc764e2007e4
Received: from mail.syndicat.com (unknown [62.146.89.62])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id edd636c6-b8c1-11ea-bb8b-bc764e2007e4;
 Sat, 27 Jun 2020 22:02:45 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=dettenbach.de; s=x; h=To:In-Reply-To:Cc:References:Message-Id:Date:Subject:
 Mime-Version:From:Content-Transfer-Encoding:Content-Type:Sender:Reply-To:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=1skvRvWJRCIPUucg4CV6ogkcz9WyMIl7C2NQXgmUtls=; b=0DXYD5htehgxk9N/RjEnEAdHot
 L7y9ei1yCf20Ev3tTkkvbAy/GVVy0b/ndp4NMkPM9GaRBsEV/Smymh/EKNqBXthTnZQ72ZCl3CvWL
 3EwxxhUeQFNa9Tr24siw2eLcdTUgwcMXamOEuXB+CrUCMqoGR+ViZWsJ53fCmj0PjaS8=;
Received: from localhost ([127.0.0.1]:57281)
 by mail.syndicat.com with esmtp (Syndicat PostHamster 4.92.2)
 (envelope-from <niels@dettenbach.de>)
 id 1jpIuJ-00071h-KW; Sun, 28 Jun 2020 00:02:43 +0200
X-Virus-Scanned: amavisd-new at syndicat.com
Received: from mail.syndicat.com ([127.0.0.1])
 by localhost (mail.syndicat.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id yjrTH0I2Bg5u; Sun, 28 Jun 2020 00:02:43 +0200 (CEST)
Received: from pd9ebbb0a.dip0.t-ipconnect.de ([217.235.187.10]:57952
 helo=[192.168.222.38])
 by mail.syndicat.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 (Syndicat PostHamster 4.92.2) (envelope-from <niels@dettenbach.de>)
 id 1jpIuJ-0003Qq-5l; Sun, 28 Jun 2020 00:02:43 +0200
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
From: Niels Dettenbach <niels@dettenbach.de>
Mime-Version: 1.0 (1.0)
Subject: Re: "HVM with PV driver" and "PVHVM".
Date: Sun, 28 Jun 2020 00:02:42 +0200
Message-Id: <D4AF919A-91ED-4928-A439-8D45B72159E4@dettenbach.de>
References: <920197710.3271313.1593280529488@mail.yahoo.com>
In-Reply-To: <920197710.3271313.1593280529488@mail.yahoo.com>
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
X-Mailer: iPhone Mail (17F80)
X-Report-Abuse-To: abuse@syndicat.com (see
 https://www.syndicat.com/kontakt/kontakte/)
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.syndicat.com
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Sender Address Domain - dettenbach.de
X-Mailman-Approved-At: Mon, 29 Jun 2020 14:33:28 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>



> Am 27.06.2020 um 19:57 schrieb Jason Long <hack3rcon@yahoo.com>:
>=20
> =EF=BB=BFHello,
> What is the deference between "HVM with PV driver" and "PVHVM"? Both are s=
ame?


Without going to deep into the details as xen history:

HVM with PV is not PVHVM.

PVHVM is nore Xen =E2=80=9EPV with HVM=E2=80=9C

Means, the core / primary =E2=80=9Earch=E2=80=9C is different (one is PV - t=
he other is HVM). =46rom what i understand, frontend as backend drivers coul=
d be the same but must =E2=80=9Esupport=E2=80=9C both modes.

pls correct me, if / where i=E2=80=98m wrong here...


niels.

=E2=80=94
Niels Dettenbach
https://www.syndicat.com
https://www.syndicat.com/pub_key.asc



From xen-users-bounces@lists.xenproject.org Mon Jun 29 14:34:35 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2020 14:34:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jpuqf-0003Su-QW; Mon, 29 Jun 2020 14:33:29 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=4f//=AI=gmail.com=pryorm09@srs-us1.protection.inumbo.net>)
 id 1jpKQc-0007iV-6y
 for xen-users@lists.xenproject.org; Sat, 27 Jun 2020 23:40:10 +0000
X-Inumbo-ID: 89bc64fe-b8cf-11ea-bca7-bc764e2007e4
Received: from mail-io1-xd29.google.com (unknown [2607:f8b0:4864:20::d29])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 89bc64fe-b8cf-11ea-bca7-bc764e2007e4;
 Sat, 27 Jun 2020 23:40:09 +0000 (UTC)
Received: by mail-io1-xd29.google.com with SMTP id v8so13444670iox.2
 for <xen-users@lists.xenproject.org>; Sat, 27 Jun 2020 16:40:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=D2djtFa3uo1WdgjJeqPy6E8RUnKnU1Bdef4ZLps9mtQ=;
 b=pTxvBgN926XDte0zm/VRbEYU2yNhmEGxRBIf8kv/Mx+1zzWEqMD6Dve0KDt9myur3A
 0UDjxttfI1jrcliR/KdPDxD2e/3GpFhXjDPFd6PAq1+X6xxB2kI1wQV2pNmINpNpsC0O
 n5yeU99QdCPQGlXpme7U6xpUbhclvgQAo2HnXCk9ady1toTxiYZGSKY1XFv7g6nVGORL
 wtTliQ6u290U09qHPEqhSFz9M09+3edNhjqMf8zf1WpdnsjSh0OZNVqYJdbAKUdzoFoW
 rn42oygnEMD2QFWFYozHn2YlQ9l8H9yxvTBGyLJIvHE8dPwo1AlDJeTTq5ZBC1OS67LJ
 NNXw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=D2djtFa3uo1WdgjJeqPy6E8RUnKnU1Bdef4ZLps9mtQ=;
 b=dx48+cPgERvOatY1nNX4O+pzR/UafQDUwHsa9DmTFManzLaR5uHBZZIDcQRwq1tRqy
 0b9pQJ1/b19fRJjtNOUcWBHOy304KNp1ZuAYDXsoHrRhxzZHOUxTsCdkMNFEMk92CzCI
 juDHk6euVGHuH+C0lIsTibvimDCBePKuHB51vUVVX/WKmPRmuVRDrZvDTpF9k+1SWmmS
 98IFTxkZ0HWh3u5v0r43WorIA5+5HntwQ130DJ+DzQPJ2/ch+X6IuC9LFJ+G6UXQRSmx
 TjBopXC8TNMgjA/FeYoc3MaBlDg9LPlzH4D+svF8d12jyU1/p8agBnSUGYxiL7RT++N2
 DS5w==
X-Gm-Message-State: AOAM5300o4eN3/A9gPhmgySp4rwhUYNk02IpzxDRyAcX460aNB7921yH
 XarjGrouZ8JYIRQHnHqJ4Komz2ZtvE7c3AlCLasWqg==
X-Google-Smtp-Source: ABdhPJyz/mTGaOVlhULVJFXLb8w3W2ea/JjQrkRUm1l8bQ20KG3DguEN+mhwQ/P5deWhiO+QYJ7oCJS6GGYb5B9Dasg=
X-Received: by 2002:a02:cf3b:: with SMTP id s27mr10503079jar.72.1593301209245; 
 Sat, 27 Jun 2020 16:40:09 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:710e:0:0:0:0:0 with HTTP; Sat, 27 Jun 2020 16:40:08
 -0700 (PDT)
From: Pry Mar <pryorm09@gmail.com>
Date: Sat, 27 Jun 2020 16:40:08 -0700
Message-ID: <CAHnBbQ-g1wjEiFDVqPC6M6sULgVdZc8cvbspJvvZW2PC65M2Fw@mail.gmail.com>
Subject: testday: xen-4.14~rc3 on focal 20.04
To: xen-users <xen-users@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"
X-Mailman-Approved-At: Mon, 29 Jun 2020 14:33:28 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello,

xen-4.14~rc3 in focal 20.04, legacy bios boot:
https://paste.debian.net/plain/1154177

took most of the day to setup the build and packaging, then install, and test.

cheers,
PryMar56
##xen-packaging on Freenode IRC


From xen-users-bounces@lists.xenproject.org Mon Jun 29 14:34:35 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2020 14:34:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jpuqg-0003T1-6P; Mon, 29 Jun 2020 14:33:30 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YJm0=AJ=dettenbach.de=niels@srs-us1.protection.inumbo.net>)
 id 1jpRdv-000580-NO
 for xen-users@lists.xenproject.org; Sun, 28 Jun 2020 07:22:23 +0000
X-Inumbo-ID: 176c31b9-b910-11ea-844a-12813bfff9fa
Received: from mail.syndicat.com (unknown [62.146.89.62])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 176c31b9-b910-11ea-844a-12813bfff9fa;
 Sun, 28 Jun 2020 07:22:16 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=dettenbach.de; s=x; h=To:Cc:Date:Message-Id:Subject:Mime-Version:From:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=BP67lvWAJdCFPZfAuGIY9OqZQqepvQxYFjSD1i8PC7k=; b=UK0PoiRkND6n4WH7HQF3/y2Zk+
 Fcn9UdS52Ux6Usmjk9J46VxmEjPSoFbl2HnKTKaNiYYXPeRmL/PrNPEpoaDxsYIIJUtKTG2Q/8EZB
 wzGSvvol+WBLqeZygh/mJ1ZaUSIwXgdzU6NdQHZcdf3MycGwezCGbgZwbGEsS3Vi4AnQ=;
Received: from localhost ([127.0.0.1]:64101)
 by mail.syndicat.com with esmtp (Syndicat PostHamster 4.92.2)
 (envelope-from <niels@dettenbach.de>)
 id 1jpRdn-0000nx-6m; Sun, 28 Jun 2020 09:22:15 +0200
X-Virus-Scanned: amavisd-new at syndicat.com
Received: from mail.syndicat.com ([127.0.0.1])
 by localhost (mail.syndicat.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id rXrScEFg5m4u; Sun, 28 Jun 2020 09:22:14 +0200 (CEST)
Received: from pd9ebbb0a.dip0.t-ipconnect.de ([217.235.187.10]:58865
 helo=[192.168.222.38])
 by mail.syndicat.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 (Syndicat PostHamster 4.92.2) (envelope-from <niels@dettenbach.de>)
 id 1jpRdm-0007Qo-IF; Sun, 28 Jun 2020 09:22:14 +0200
Content-Type: multipart/alternative;
 boundary=Apple-Mail-F441ADEF-75E1-4666-8EB4-BE62F03ED134
Content-Transfer-Encoding: 7bit
From: Niels Dettenbach <niels@dettenbach.de>
Mime-Version: 1.0 (1.0)
Subject: Re:  "HVM with PV driver" and "PVHVM".
Message-Id: <B3304F56-7A52-4448-AC75-A1CB9DC1BCD6@dettenbach.de>
Date: Sun, 28 Jun 2020 09:22:13 +0200
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
X-Mailer: iPhone Mail (17F80)
X-Report-Abuse-To: abuse@syndicat.com (see
 https://www.syndicat.com/kontakt/kontakte/)
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.syndicat.com
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Sender Address Domain - dettenbach.de
X-Mailman-Approved-At: Mon, 29 Jun 2020 14:33:28 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--Apple-Mail-F441ADEF-75E1-4666-8EB4-BE62F03ED134
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

=EF=BB=BF
>=20
>> Am 28.06.2020 um 06:46 schrieb Jason Long <hack3rcon@yahoo.com>:
> I can't understand.
> Why no good documention?

There is documentation (for users):

https://wiki.xen.org/wiki/PV_on_HVM

beside the fact, that PVHVM ist still very new...


niels.

=E2=80=94
Niels Dettenbach
https://www.syndicat.com
https://www.syndicat.com/pub_key.asc


--Apple-Mail-F441ADEF-75E1-4666-8EB4-BE62F03ED134
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div dir=3D"ltr">=EF=BB=BF<br><div dir=3D"l=
tr"><blockquote type=3D"cite"><br>Am 28.06.2020 um 06:46 schrieb Jason Long &=
lt;hack3rcon@yahoo.com&gt;:<br><br></blockquote></div><blockquote type=3D"ci=
te"><div dir=3D"ltr">I can't understand.<div id=3D"yMail_cursorElementTracke=
r_1593319539787">Why no good documention?</div></div></blockquote><div><br><=
/div>There is documentation (for users):<div><div><div><br></div><div><a hre=
f=3D"https://wiki.xen.org/wiki/PV_on_HVM">https://wiki.xen.org/wiki/PV_on_HV=
M</a></div><div><br></div><div>beside the fact, that PVHVM ist still very ne=
w...</div><div><br></div><div><br></div><div>niels.</div><div><br></div><div=
><span style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);">=E2=80=94</=
span><div style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);">Niels De=
ttenbach<br><div>https://www.syndicat.com</div></div><div style=3D"caret-col=
or: rgb(0, 0, 0); color: rgb(0, 0, 0);">https://www.syndicat.com/pub_key.asc=
</div><div><br></div></div></div></div></div></body></html>=

--Apple-Mail-F441ADEF-75E1-4666-8EB4-BE62F03ED134--


From xen-users-bounces@lists.xenproject.org Mon Jun 29 15:37:03 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Jun 2020 15:37:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jpvpA-00013t-6L; Mon, 29 Jun 2020 15:36:00 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ouDv=AK=yahoo.com=akm2tosher@srs-us1.protection.inumbo.net>)
 id 1jpvp8-00013n-7g
 for xen-users@lists.xenproject.org; Mon, 29 Jun 2020 15:35:58 +0000
X-Inumbo-ID: 39c4c57c-ba1e-11ea-8584-12813bfff9fa
Received: from sonic313-56.consmr.mail.ne1.yahoo.com (unknown [66.163.185.31])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 39c4c57c-ba1e-11ea-8584-12813bfff9fa;
 Mon, 29 Jun 2020 15:35:57 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1593444956; bh=wvJnPEUs8cfJZLSQiXdV3yZdMqX38in2ZsAsV92LhOM=;
 h=Date:From:To:In-Reply-To:References:Subject:From:Subject;
 b=C41q0rXuxMIoE0R/zZuV48Loj6kJr+caFwkGi7AqPqs8kmM1VTTiUvQiStSiwpFUVa913jaIby885MGlkQTZmBb8jvx4qVUxluO589hFizDVLnXIVtq46wWo+KTCyUcQ/x5NHoH14NUDtyZVWBaM7Nk3c/jgSOZYijDuFw8bl5E9OduCaLoCpXU0AXAEZmp7RMqUv6o4igpMO70xw3gsNUGJLol1Z9Ef5clKBZWNq/CehPgvZZJsD43s9bHT3Oz5MWKHlL3Hzf3zFQwyBSWHTMEjwgTt8Z5w6zwj1Qv66LuA2lJJCcNTThZJKVPS5Qv/3zveBeBVA9iP9L9eeEGRIw==
X-YMail-OSG: fMbg2osVM1kyZng5DJK60rnx_5euuEvCz0Jp2rkS7EdVot.FfWcHpoMVOquLyMX
 m_KoVQfC6VatbpHTP7MKCvwQ5UuJzopFCVNFBYVZJ890lQrRWZ8d7Mjwnr7mnsIUB1FfAGPw9cQ6
 7IUTPCScQKSYi3blJqFV6BJ0316ekKVN0uBZ36Mq8RivgiK2J_2IMDDPUV8JWDnHJqnC2Tznbqvu
 4VBexPsk7ACYJkMytWSApBK.EdeuZ5z2yx4l2ho57py7vN1_w0ke.aIwOKfveLAkA_SNwe8Ldynz
 9DKgOfQnL6WlLYlHWbKVq7.s2g18K_h_4mFd.L_JjKtpOnOTSpvodQPMVjdGKvBiP1NbWXnnKOLq
 sgYLOK9qypjR8hdd90QegIPHZXMQalbiT8qfU3zstrbBEy30vEeo47n9nfeQ_vqJ933FOYEzJtDs
 fTuxyX8ySVGtWIeZLMs.m_JxtRd_ARs5dMGTvPlgSVGpj5r.q7wlAcDcPHBCJ_GZh0hBsfjRSkzh
 HTsWC7EzILezx2uGLemWK4LJzssV4QUZqrDINMvkM_PjVenvwT666E4pc0qYSu9D7dsTSXAp9KHj
 hzpPW31Py1R7oyZPlZv2SPHiauyjvwLuy60CKrWtkYvW9vilAxJ_K.P1gRB4d24_IzjgzKe5Fxdz
 SgqGUIJOg.3CIKOfu3pZn49G2CRX98gDg8M190nMhlpIAprCVrzLdpMRJDNkkC6kzLMPBPWxXBC8
 xu.iYLiBe5Z0AIIBRkXuu2.aIXzhNfWd_kxRpN9QdAwfCLU7PpK9pOhpBlsOCAMutg8gtx2.cKwO
 iOdj.jpvqLHhznnaPoQj6WuR0gK9h2Zw4_1KzHtbAYaSpMvJRtgAsSLQDsthRbUGVSEN5b_s9YeQ
 z2_jyQ847AVoUy.g9EShXztSBwtD4ciNAuGMLnzb28pH_tnrJ1Q1VAg_wItt7uUkSl9NyVO_QJJG
 3MC21WwwU7llhzKpWvY9DNDRugtJs9lr.ACGprWRQFe6aG3yZQAC76IjmW5LvITIcPGAbMLCkVqW
 0VSjSC.CmHMsGMC6TKNf_VuwtfiQ0AVEej2keHg9d8R3Tb7vbkcdJC51BROUs.NpmMFKUHnyHrv1
 R_T.eHO5Uq422_b6hqPhlRCVtJgT6Ae9eAg10tSFNQddQb0Ap1FFE42qbDHKzMHpo8Y9rTTXL6Fa
 mTmcLpj.yXEA5NSA5emVoWrAqCENuDIkmy6B6pjgkdJ8o_KNvnnz57wV9H0U7qsB0dyn_eWgk6GC
 g59UlkLqjGqBMl87ItDeehv8uFiTV8eNkJaWgtC64OKNNWlDgXEy7IJ6xRomu5PhclMA8dTTB6Rh
 .WnOXzhSmMbs69yHGG6cQesetiw--
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic313.consmr.mail.ne1.yahoo.com with HTTP; Mon, 29 Jun 2020 15:35:56 +0000
Date: Mon, 29 Jun 2020 15:35:56 +0000 (UTC)
From: tosher 1 <akm2tosher@yahoo.com>
To: xen-users <xen-users@lists.xenproject.org>, Pry Mar <pryorm09@gmail.com>
Message-ID: <893434730.5321281.1593444956374@mail.yahoo.com>
In-Reply-To: <CAHnBbQ-g1wjEiFDVqPC6M6sULgVdZc8cvbspJvvZW2PC65M2Fw@mail.gmail.com>
References: <CAHnBbQ-g1wjEiFDVqPC6M6sULgVdZc8cvbspJvvZW2PC65M2Fw@mail.gmail.com>
Subject: Re: testday: xen-4.14~rc3 on focal 20.04
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.16138 YMailNorrin Mozilla/5.0 (Windows NT 10.0; Win64;
 x64; rv:77.0) Gecko/20100101 Firefox/77.0
Content-Length: 321
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

>>took most of the day to setup the build and packaging, then install, and test.


Congratulations!

Would you please share the configuration and other building instructions with us that was required? 
Did you face any difficulty booting the Xen? 
How different the steps would be if it was for UEFI?

Thanks,
Mehrab





From xen-users-bounces@lists.xenproject.org Tue Jun 30 07:48:39 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Jun 2020 07:48:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqAyu-0007nJ-Tk; Tue, 30 Jun 2020 07:47:04 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=JP6j=AL=xen.org=paul@srs-us1.protection.inumbo.net>)
 id 1jqAyt-0007nA-4r
 for xen-users@lists.xenproject.org; Tue, 30 Jun 2020 07:47:03 +0000
X-Inumbo-ID: df882274-baa5-11ea-8496-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id df882274-baa5-11ea-8496-bc764e2007e4;
 Tue, 30 Jun 2020 07:46:57 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Reply-To:Message-Id:Date:Subject:To:From:Sender:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=lJNTlZjxIYh1xD/yBA//CRnxEGYheSdh39GysEDIMuk=; b=2wF5GDm/oNQ6PsGEJgc3VHl4d8
 tqpk+UPTCbBwHBMEhUZ+pbQ3tkBS/3V4V1DkqsH/rjdFI90Ift3QBvaEnIhiN2iC8ceQ73L7s5aX4
 AhioMzlKWqy1WfCLRWmv36qLPXy2IoSW0z9449OEldqwN+1HsQ5ZHWX4EzbrmnIZPV4Q=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jqAyn-0002O4-0R; Tue, 30 Jun 2020 07:46:57 +0000
Received: from 54-240-197-238.amazon.com ([54.240.197.238]
 helo=CBG-R90WXYV0.amazon.com) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jqAym-0007Sl-Lz; Tue, 30 Jun 2020 07:46:56 +0000
From: Paul Durrant <paul@xen.org>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org,
 xen-announce@lists.xenproject.org
Subject: Xen 4.14 RC4
Date: Tue, 30 Jun 2020 08:46:55 +0100
Message-Id: <20200630074655.252-1-paul@xen.org>
X-Mailer: git-send-email 2.17.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-devel@lists.xenproject.org, paul@xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,

Xen 4.14 RC4 is tagged. You can check that out from xen.git:

git://xenbits.xen.org/xen.git 4.14.0-rc4

For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.14.0-rc4/xen-4.14.0-rc4.tar.gz

And the signature is at:
https://downloads.xenproject.org/release/xen/4.14.0-rc4/xen-4.14.0-rc4.tar.gz.sig

Please send bug reports and test reports to xen-devel@lists.xenproject.org.
When sending bug reports, please CC relevant maintainers and me (paul@xen.org).

As a reminder, there will be a Xen Test Day. Please see the test day schedule at
https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.

  Paul Durrant



