From xen-users-bounces@lists.xenproject.org Wed Jul 01 08:34:38 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 08:34:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqYAm-0000Db-2x; Wed, 01 Jul 2020 08:32:52 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5vo/=AM=gmail.com=m.l.hargreaves@srs-us1.protection.inumbo.net>)
 id 1jqYAk-0000DV-Ow
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 08:32:50 +0000
X-Inumbo-ID: 7276abb2-bb75-11ea-bca7-bc764e2007e4
Received: from mail-wr1-x441.google.com (unknown [2a00:1450:4864:20::441])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 7276abb2-bb75-11ea-bca7-bc764e2007e4;
 Wed, 01 Jul 2020 08:32:50 +0000 (UTC)
Received: by mail-wr1-x441.google.com with SMTP id k6so22903160wrn.3
 for <xen-users@lists.xenproject.org>; Wed, 01 Jul 2020 01:32:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=to:from:subject:message-id:date:user-agent:mime-version
 :content-language;
 bh=AcO7XxYwAZCDU0zj9fLshxNX9/2KBJQOrk7751045U0=;
 b=ptCmrYutWPW4lmvyc3bX2fPu6fmlAFnDVJUPUHOwY0Tl6pLWR+LaAPjQMMBB2Eo5NY
 YDpIGEB+0M/Asy4cFZ3M1ICDiEGKH5rxk+6MQK98l0mcAbh9tAXhSUsavdr3jXWI9wVL
 1wmp7EewNB2zamGZN1fy7HXa+w95f3lqSmox98cTKHRSXWZTfMGABa93B5SIZdNKAOdO
 gh0MVK7Cjm6S7XKTXLo1YF5fIsfKq1/i0cARMUAxxAUT4366003F5Of77i4D2iqisoZ6
 TJkzKIWfaSV8EnIjsQa4Z2ILMNGG+bIgZIpKtV7Le7COlv5NnRyJUALbxPA+ExBJ6x92
 x7LQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:to:from:subject:message-id:date:user-agent
 :mime-version:content-language;
 bh=AcO7XxYwAZCDU0zj9fLshxNX9/2KBJQOrk7751045U0=;
 b=qwIJm0HswQD6e7TnFMZjZ+R0GkF5+11z0qnJBVAg3noVOxvcgalbsXave1WklgQg6e
 UUBWVXcdVx2egFm+N7V9VAOtrl4HG8LBl3auht+VELntY5b27kt97DNvYN4C+XH2jIYF
 07zVAwbgudWO6OvFZR3a8zljJ7MwDmdlTTleN5djGucLTuONHkIxAVu7Tfqs8XUOLjPR
 fPJRcg2LoquWh9SR6ACtM2s4uzN6wx9HLOeOOsaKRO41TZ5gjvZk2/STlZBPfHFe23jY
 fWWWF53R3KXoukWTZkxpUc3de4ISYS8VkHmH2RDQLI+KYRDjmsyGwP/gibzHmlalUY1H
 JAVw==
X-Gm-Message-State: AOAM533YFKgoYuNjP4+/X5DQA/IrgNw0ZL/VooaGK9Irj0255T9SL9RI
 GLJoRxGW8J6gWEZ/7W2nsabWFvJJ
X-Google-Smtp-Source: ABdhPJx9OutbNcG5s+a94LXUZ+m4FLOyTv0egW2hRR7MQUMd0duFl7AnBr1rA1fozDeMRvPIyE+AZg==
X-Received: by 2002:adf:f20a:: with SMTP id p10mr27184767wro.41.1593592368831; 
 Wed, 01 Jul 2020 01:32:48 -0700 (PDT)
Received: from [192.168.0.33]
 (cpc112441-pres20-2-0-cust437.18-3.cable.virginm.net. [86.17.33.182])
 by smtp.gmail.com with ESMTPSA id z8sm4119674wmg.39.2020.07.01.01.32.48
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Wed, 01 Jul 2020 01:32:48 -0700 (PDT)
To: xen-users@lists.xenproject.org
From: Martin Hargreaves <m.l.hargreaves@gmail.com>
Subject: Re: Can't access USBs from DomU
Message-ID: <67b8e221-0f0f-cf1a-9f78-29fd8368529d@gmail.com>
Date: Wed, 1 Jul 2020 09:32:47 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="------------605D66472775BE70B57B8C10"
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------605D66472775BE70B57B8C10
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Thank you for responding, David.

Yes, I have been using the link you recommended in order to gain access 
to the USBs. It appears on Dom0 to have worked okay but I simply can't 
'see' the USB on my para-virtualization VM. Thank you for the  
www.spice-space.org link; I'll look into that.

    Martin..


On 2020-06-25 8:56 a.m., hargreaves martin wrote:

A very quick question (hopefully).

On Dom0, I can attach my USBs.

$ sudo xl usbdev-attach ubud1 hostbus=2 hostaddr=36

$ sudo xl usb-list 5

Devid Type BE state usb-ver ports

0 qusb 0 1 2 8

Port 1: Bus 002 Device 025

Port 2: Bus 002 Device 024

Port 3:

…

But I can’t see them in my DomU (Ubuntu). Any suggestions?

Any help would be very much appreciated.

Martin..

I don't do it that way anymore (I use SPICE instead), but the Xen USB 
Passthrough page helped me when I was trying to figure out how to do it 
the way you are now: https://wiki.xenproject.org/wiki/Xen_USB_Passthrough

Regards,

David


--------------605D66472775BE70B57B8C10
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div id="body" class="messagebody">
      <div class="pws">
        <p>Thank you for responding, David.</p>
        <p>Yes, I have been using the link you recommended in order to
          gain access to the USBs. It appears on Dom0 to have worked
          okay but I simply can't 'see' the USB on my
          para-virtualization VM. Thank you for the  <a class="moz-txt-link-abbreviated" href="http://www.spice-space.org">www.spice-space.org</a>
          link; I'll look into that.</p>
        <p>   Martin..<br>
        </p>
        <p><br>
        </p>
        <p>On 2020-06-25 8:56 a.m., hargreaves martin wrote:
        </p>
        <div class="quote quote-1">
          <p>
            A very quick question (hopefully).
          </p>
          <p>On Dom0, I can attach my USBs.
          </p>
          <p>$ sudo xl usbdev-attach ubud1 hostbus=2 hostaddr=36
          </p>
          <p>$ sudo xl usb-list 5
          </p>
          <p>Devid Type BE state usb-ver ports
          </p>
          <p>0 qusb 0 1 2 8
          </p>
          <p>Port 1: Bus 002 Device 025
          </p>
          <p>Port 2: Bus 002 Device 024
          </p>
          <p>Port 3:
          </p>
          <p>…
          </p>
          <p>But I can’t see them in my DomU (Ubuntu). Any suggestions?
          </p>
          <p>Any help would be very much appreciated.
          </p>
          <p>Martin..
          </p>
        </div>
        <p>I don't do it that way anymore (I use SPICE instead), but the
          Xen USB Passthrough page helped me when I was trying to figure
          out how to do it the way you are now:
          <a class="exlink mklink"
            href="https://wiki.xenproject.org/wiki/Xen_USB_Passthrough"
            rel="nofollow">https://wiki.xenproject.org/wiki/Xen_USB_Passthrough</a>
        </p>
        <p>Regards,
        </p>
        <p>David
        </p>
      </div>
    </div>
  </body>
</html>

--------------605D66472775BE70B57B8C10--


From xen-users-bounces@lists.xenproject.org Wed Jul 01 09:00:17 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 09:00:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqYas-00026x-Ci; Wed, 01 Jul 2020 08:59:50 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=2o4O=AM=gmx.de=mangel@srs-us1.protection.inumbo.net>)
 id 1jqYaq-00026s-2b
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 08:59:48 +0000
X-Inumbo-ID: 35abe040-bb79-11ea-bb8b-bc764e2007e4
Received: from mout.gmx.net (unknown [212.227.17.21])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 35abe040-bb79-11ea-bb8b-bc764e2007e4;
 Wed, 01 Jul 2020 08:59:46 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net;
 s=badeba3b8450; t=1593593985;
 bh=y03ECmGFLdtkOKQq15Vzx95s6iYl4mQmbS9ndBvApmY=;
 h=X-UI-Sender-Class:Date:From:To:Subject;
 b=hwcbuQusE0Juh3383eODnY+6KQGlqAnmdkIGhYy52gQUKbrC/xUhZaxUntCbUYOMN
 Xrux02rZ90Vic7wsWMiX7bSzpkJgZUv6gpLX/3MAbwisNTa2VYRhNoF29VlbVHSG0N
 15Gkl1oL0ls+NI+qVLMldf2NOLWUC2JCWMzuZEo0=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from satan.chao5.int ([91.64.144.166]) by mail.gmx.com (mrgmx105
 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MHGCu-1jdNK43fF2-00DEAP for
 <xen-users@lists.xenproject.org>; Wed, 01 Jul 2020 10:59:44 +0200
Received: from webmail.chao5.int (leviathan.chao5.int [192.168.50.60])
 by satan.chao5.int (Postfix) with ESMTP id D3FF3200EAC3
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 10:59:41 +0200 (CEST)
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.102.3 at satan.chao5.int
MIME-Version: 1.0
Date: Wed, 01 Jul 2020 10:59:41 +0200
From: Christoph <mangel@gmx.de>
To: xen-users@lists.xenproject.org
Subject: Crypted devices... where open them?
User-Agent: Roundcube Webmail/1.4.6
Message-ID: <4707cf083006ac283a6a5fa9997f427e@gmx.de>
X-Sender: mangel@gmx.de
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: quoted-printable
X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,FREEMAIL_FROM
 autolearn=ham autolearn_force=no version=3.4.0
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on satan.chao5.int
X-Provags-ID: V03:K1:dUQc6T/p7Kx6LubCT0qfB6ePq3e9T9zObTWudiEy/7GHVJBYVQn
 ifWPCy6jBDorHICbrtl5R3JJKnJr6LyjBMfIoHc225r5Db0BltVg+zN59LKHw6G6QopkA2z
 Kto5ilNqTdONvRkUIVa0e5n+pBGOGLy1w+9AgF1CPNyuj+gZ7biPcF3LFCluWi1eT6MWWF/
 HJONDOjQyZ2l3L6lln3nQ==
X-Spam-Flag: NO
X-UI-Out-Filterresults: notjunk:1;V03:K0:BjV9PHIZ0IM=:MXyYXQsWAkKbyPb7lfzepE
 IpCKC+1ct9j+nqzlEvAtqNKjeaZb8Zddcbqu5Fh/Fcpjvm9SO77hvUmUkMjTPYOsqacs4LOth
 lCTD9G0vAg7FyAUisa18nbSn4oKXYJY+4qsp1Q8jc0rQ123bam6qnrD6rWB4hlxXSAZU6mJ9J
 YYC0W1vqIHy2mhZ0Rkf9tqoCKlMnH4TxJQmMgLekiXbbmo3+7OsUgpli1Mx4MbzmJvXN6FjDZ
 O045DO2x0J09NOKd8xVE7Ql66b8CoLONrGwIOQmEm7xohBRvco737gdykEOvVp3vzpBezZPxd
 rYH9DQV3sIXMXMu9t9bDKUawoQCSuHa/9lMHaJ5CtNrgcjuKcQaipO3RA7vf7OrKa7uq3cLx1
 7ojiVF1fvKdvxs99GeYNirazxaYBQcio69A2317OEgFzW/lizgqggzXt3aVrqjL2wYEjiCJQl
 lkyUDpw3PsoDifs8LLSSoR7f8+XWf7ykv7Hx7knbrgzxG4fMBO8vWzQs5SinMzmUlcrh7qpCU
 pLVxz2wBzonCVNOyDxxD9DR0s9Bg4Bio934hjBOiwCNrteK6vjqvvlWqxIogYOro7o8Dnm6S/
 LlCXXaOmTQ9mxj8Z+1TVoMuXzwrs1Y4G0WzGzzNSpErl5r6hpCVZbr5HCIgVxkL7ivp+H9ID8
 UYiUr+UVFcRy226QaxDcMVZxrdg6kRPRckcbCCaE+wMrAXDamLw0jq3Xi1cCteOgsCT3q8kt1
 8BugfDYE8IPKgL6IEiosGLBjzL5UA4v78oCCgUCztyERGa/cl1PdSE1/6lXI4hwb6YMZd4i0Q
 FdxKhqZwop1djZ7NS5bQknxnAl2tmOmBpb+X8Hy3uGaQezxwJED6/EKOnm2RBuMkH9m94/o8c
 Ngz9oPWroxAs3R41+0a/Lv3KuU+KU8W8P4dJLJgjSpXEVV4Gw6vJ7B2pqPQCl7rvGdZrK1y5t
 XSkQsuMH8j6g1iM4jcmp/JfcZPLk1c2L7UDty1h8lFbWr1+ZrvIYB+PZGX2dx6hFvyuzUUmPe
 PhTgbpz63vaLXwJWQnCudibBkXsS7p8+AhUfIgg5/we5Ogg5anrsPhoMYJ1m45yHCTp3eOFVP
 lCr23ghunOzhMJz0HoGlRJBfIHSDZF7is1vsVIV5wsfjxmlIWvpp3dwDYHsqWSEVJxXQWdvkt
 mWCbB2nDrZjBT2xUlsxr8vI1Scd7dPnKj/Kcpr6C+j68B7w2Be6BargsF+5gUJPHNAv4A=
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi

I have some crypted (LUKS) devices which I use in some domU's.
It is better to passthrough a crypted devices and open it in domU or
passthrough an already opened plain device to a domU?

=2D-
=2D-----
Greetz


From xen-users-bounces@lists.xenproject.org Wed Jul 01 10:37:39 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 10:37:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqa6X-0003BT-9Z; Wed, 01 Jul 2020 10:36:37 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LzbO=AM=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1jqa6V-0003BO-V2
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 10:36:36 +0000
X-Inumbo-ID: bc1f08de-bb86-11ea-8496-bc764e2007e4
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id bc1f08de-bb86-11ea-8496-bc764e2007e4;
 Wed, 01 Jul 2020 10:36:34 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com;
 s=alpha; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date;
 bh=/+fpeIoo6CRRQ9q9lw0cofcA/049gGf/RQ55qF1Ovkc=; 
 b=DyVZoWDPOpMEgL/hh7fsvrMnD0aBAefBUibLwqtViKYVf3UhnOEB60TE1ofwkypzfWcRORP8Hm/6FcJuONieGj/Sj+af2nELWw/Q+1LcFcOZwcsxaBqfVu/z1t9QQHcKByMAHsih9VfV3tqLlKPkO0gID7HcZCAzA3dSUNYUIqxxXnFfeZvC1Bug3b1UuKYM4wer/2yBIihqHFjC8FU3oORIULM4Uc5nOJfwqH/bBco6wyV3ZicwU1MkVJhT3DRhQqQA6PsdWe9z2ZgC8m757ogSKuAUrXbG+BAHxhGr8KXIXu1MYxIwz7EpsFSklggYsNVaxsbN3SZx/jMkwrGAbA==;
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1jqa6U-0007ZN-7p
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 10:36:34 +0000
Date: Wed, 1 Jul 2020 10:36:34 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Subject: Re: Crypted devices... where open them?
Message-ID: <20200701103634.GO18995@bitfolk.com>
References: <4707cf083006ac283a6a5fa9997f427e@gmx.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4707cf083006ac283a6a5fa9997f427e@gmx.de>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello,

On Wed, Jul 01, 2020 at 10:59:41AM +0200, Christoph wrote:
> I have some crypted (LUKS) devices which I use in some domU's.
> It is better to passthrough a crypted devices and open it in domU or
> passthrough an already opened plain device to a domU?

I open them inside the domU because not all domUs require encrypted
storage. Also some of them are managed by the guest administrators and I
don't know the key material - it's not stored in the dom0 storage at all.

I would have thought that opening it in dom0 would be slightly less
secure as anyone who is root in dom0 can read the block device as if
it was not encrypted. Obviously anyone with root in a privileged
domain can read the memory of a guest and get the key material out
of that anyway, but that would require a bit of motivation at least.

Cheers,
Andy


From xen-users-bounces@lists.xenproject.org Wed Jul 01 10:58:07 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 10:58:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqaQ1-0005Rj-J9; Wed, 01 Jul 2020 10:56:45 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=2o4O=AM=gmx.de=mangel@srs-us1.protection.inumbo.net>)
 id 1jqaPz-0005Re-Uz
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 10:56:44 +0000
X-Inumbo-ID: 8a1c4a24-bb89-11ea-86ee-12813bfff9fa
Received: from mout.gmx.net (unknown [212.227.17.20])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 8a1c4a24-bb89-11ea-86ee-12813bfff9fa;
 Wed, 01 Jul 2020 10:56:39 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net;
 s=badeba3b8450; t=1593600936;
 bh=RrU0j2rh7ZkEuw92lJurbRSw6vZTuqm5ukb0YDiFiNk=;
 h=X-UI-Sender-Class:Date:From:To:Cc:Subject:In-Reply-To:References;
 b=O2GucJWgnquOZjHzw1pNXIoJrN6E+b+r8OmTZkGAvKIVsBiCd62zTUCfKu9tbDF13
 trMIvixDSKbLvxux5lXJi4ZkGw/DO7uxwfmclBdrZPukPUf8ixWuHkyTbtYnPl2s77
 T4g6bBdaX65dB7iPk3vbF+N/8fq9621TYGo47xWA=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from satan.chao5.int ([91.64.144.166]) by mail.gmx.com (mrgmx104
 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MAfUe-1jfXlo00LI-00B6QV; Wed, 01
 Jul 2020 12:55:36 +0200
Received: from webmail.chao5.int (leviathan.chao5.int [192.168.50.60])
 by satan.chao5.int (Postfix) with ESMTP id 15441200EAC3;
 Wed,  1 Jul 2020 12:55:33 +0200 (CEST)
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.102.3 at satan.chao5.int
MIME-Version: 1.0
Date: Wed, 01 Jul 2020 12:55:33 +0200
From: Christoph <mangel@gmx.de>
To: Andy Smith <andy@strugglers.net>
Subject: Re: Crypted devices... where open them?
In-Reply-To: <20200701103634.GO18995@bitfolk.com>
References: <4707cf083006ac283a6a5fa9997f427e@gmx.de>
 <20200701103634.GO18995@bitfolk.com>
User-Agent: Roundcube Webmail/1.4.6
Message-ID: <8bad7d32dac053fbd566ec773e86d4b4@gmx.de>
X-Sender: mangel@gmx.de
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: quoted-printable
X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,FREEMAIL_FROM
 autolearn=ham autolearn_force=no version=3.4.0
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on satan.chao5.int
X-Provags-ID: V03:K1:YKGJHYYrNh1O9rrGMClRQdLh6uO+v2xEUNTX00/qfUE7TJdaSvb
 q8T/GizfjgetQHl9yWXSXaDPwSnDW5/huuu69/t5OIyjKx/m6OfXqSsDAZ+hQoFzPtnjfEL
 cjcDYNvOgeDq0Kayf6MA/I5pQ25yOomhlG4VkfU1qDwGwT3D6mUWJ9e0phXkh7voglCsZ1C
 i44MjewVXtzQj8LTSDE9A==
X-Spam-Flag: NO
X-UI-Out-Filterresults: notjunk:1;V03:K0:Z8Ofq9AxCKY=:3zwuyICndhx/0Mpsil1GIy
 PcLfPoBg2NmdUg5sZeMCgvYyBLEI16rhwU14UUYuwCk7rEuKHSDOWymxuTJScxMf/m0Npar0q
 eg01YxypqmUhm3Ji5qBrk2x+kSJr+Mq1kBtnPcEJAsgKONrcIVUlL5A9s5eUj7DPjuSRaYCT0
 Wa14pKfgxWdyAqXr31O/orkH3Dh+UA1SzEbpjNP1vex7j/PpNsb9ZCEeiTMYNGuykMNVoRhsi
 UYkvm2DJ2oDnDEUFUb7KYSMdxBvcIQ0iU2iJyqCdXTDE07h1dxfswG9xXDZGZGhGb12pR8qk7
 14fc+gDhYu6yz1D/M8Q0hf4wni2a2WQGhRhc2ck3vNW0Zi0KrkyR8bar1wi+nPRvPXtvvVfz4
 nAy2K6gaD6a4W+4c7mk+NMrA3DihnWElGrK03ljNLrFke9TfrDuIVcs5J0KEy6cxyL0CJ3bou
 XW2m0pVk9vAOVkmh9rUp6puySifdWqLMDaH7F0n8f77hANGaZ0snD+lMY5hZ9xhs6gPfCea4/
 ou5EZ3RY1aU0yztzC/pt5zzv40BQaFxCWEFNX0MA7wuJBWucOKRpLGSNnkO1CZdOIZPQlzY1u
 GNdRS6ioCb4us0J2rAso5L8d6Sa/GY2PU4rCJoLsVceWJmhlQafZfITncEAfsMTVa+jN1s1GE
 4Yx9Ujp8Q2P3A+RajftVaqVyoHkQBBxHbitWd5d1SkIOeG5I/rHEBpR4sacclovv8r7z4Mt1b
 Kjn4cCmBahkAmRNmF5HmAh8KrQ9xnk/y5mlrFkx9jANRRKEkr+W6YXZtunI7vICFeC3R1v9hO
 zoIfl0Rmq1Li21lRcKfKuwKyrSkJtcq0nuP2QmM+NIdWxu332+G9Ep2NFoM6Ma1RN4IOZLtOI
 Wmn/pA/UzjcHxZRmy1lf+sBde9R1a7UxPGnMiBkmniEY2g7es2HwrbQ99KMD9p/liDuKWQjMr
 Spqm8baFLiGSXg99HJpl7ZxLHybdSV9XNqRaaBXBD+6SBSl+y6xwWev4ZkdWvE1zyd0AP/wYH
 msRPl9rJHbgixxqDLplKvbyY6oUoufK1lej2RNuNPmX423lIDA9r1ALdj0yhA3FeedaPwuuHC
 MsDkxsgGQAAra6pDu9QXhycH6DgR9EfiHXRLqmSrvAx/2YBVobma1hyyJtpf7SiUMS2XDZ02X
 lduJSAY9bsQIe3DleTxhEBmvNj9oMOe6Qqw1XHwDc9tBgBYbS2N13ncorThE5NBBsgmW6CIcp
 w7fMK1kG8110KneGV
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

what about the rw performance? I think it should be a little bit
performant if I open it in dom0 already? cryptsetup/LUKS uses AFAIK the
AES extensions of cpu... does it use it in a domU to?

=2D--
=2D-----
Greetz

Am 01.07.2020 12:36, schrieb Andy Smith:
> Hello,
>
> On Wed, Jul 01, 2020 at 10:59:41AM +0200, Christoph wrote:
>> I have some crypted (LUKS) devices which I use in some domU's.
>> It is better to passthrough a crypted devices and open it in domU or
>> passthrough an already opened plain device to a domU?
>
> I open them inside the domU because not all domUs require encrypted
> storage. Also some of them are managed by the guest administrators and
> I
> don't know the key material - it's not stored in the dom0 storage at
> all.
>
> I would have thought that opening it in dom0 would be slightly less
> secure as anyone who is root in dom0 can read the block device as if
> it was not encrypted. Obviously anyone with root in a privileged
> domain can read the memory of a guest and get the key material out
> of that anyway, but that would require a bit of motivation at least.
>
> Cheers,
> Andy


From xen-users-bounces@lists.xenproject.org Wed Jul 01 11:02:34 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 11:02:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqaVR-0006UN-TD; Wed, 01 Jul 2020 11:02:21 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p+z/=AM=mindef.nl=j.witvliet@srs-us1.protection.inumbo.net>)
 id 1jqaVP-0006U9-PF
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 11:02:20 +0000
X-Inumbo-ID: 53eaf62a-bb8a-11ea-86ee-12813bfff9fa
Received: from mx.mindef.nl (unknown [217.169.235.200])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 53eaf62a-bb8a-11ea-86ee-12813bfff9fa;
 Wed, 01 Jul 2020 11:02:18 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mindef.nl;
 h=from : to : subject :
 date : references : in-reply-to : content-type : mime-version :
 message-id; s=key01; bh=+JGxiKP0962ejKXviofsMgih7Qg+mXwKiGsxmxWCCWg=;
 b=ANnGZIy57eshnsEHFfO10nxgCkayjNY05K3nBLa15stX/fzYrsDZpQL1VSAj2CUU47df
 CnjKT7keLLH9GqYvY4nUBwCe6TmiUEITPwl8Eu+pj5XQnUiXcH6dmCZY2Gqgt/PCkQEF
 E8EX8n74wwS8oTyHbZp2ct97gL/ouikJT1Aro7oPM9lXXvLNuoYo3n9OT0IXC90lX41Q
 HKEssTKvGI4osEtK8UtPE6fCy7FCX54DECMNxfHQUSfjUk0JwoIWNE5o7eKw5pzn0dsK
 m2izR2518DtYOrTYtsQnzHVdhw8o1oTh3yENFiO5S/k4i0ffP1Ad1qbFglnWDxeL/jWA 0w== 
Received: by someone from somewhere
Message-Id: <31wt6g0rk3-1@0151ims402.msg.iegi.nl>
Received: from somewhere by someone
Received: from somewhere by someone
Received: from somewhere by someone
From: <J.Witvliet@mindef.nl>
To: <andy@strugglers.net>, <xen-users@lists.xenproject.org>
Subject: Re: Crypted devices... where open them?
Date: Wed, 1 Jul 2020 11:02:16 +0000
References: <4707cf083006ac283a6a5fa9997f427e@gmx.de>,
 <567e87ec2ba94b4da97a5ecd1979d04d@SAD4331.mod.nl>
In-Reply-To: <567e87ec2ba94b4da97a5ecd1979d04d@SAD4331.mod.nl>
Accept-Language: en-US, nl-NL
Content-Language: en-US
Content-Type: multipart/alternative;
 boundary="_000_mk26l4qmg5h0oilq9p2lmbqm1593601336273emailplusmobileiro_"
MIME-Version: 1.0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--_000_mk26l4qmg5h0oilq9p2lmbqm1593601336273emailplusmobileiro_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

The root user of dom0 might / should be different from the root user of the=
 domU.



From: "Andy Smith" <andy@strugglers.net<mailto:andy@strugglers.net>>
Date: Wednesday, 1 July 2020 at 12:46:32
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org<mailto=
:xen-users@lists.xenproject.org>>
Subject: Re: Crypted devices... where open them?

Hello,

On Wed, Jul 01, 2020 at 10:59:41AM +0200, Christoph wrote:
> I have some crypted (LUKS) devices which I use in some domU's.
> It is better to passthrough a crypted devices and open it in domU or
> passthrough an already opened plain device to a domU?

I open them inside the domU because not all domUs require encrypted
storage. Also some of them are managed by the guest administrators and I
don't know the key material - it's not stored in the dom0 storage at all.

I would have thought that opening it in dom0 would be slightly less
secure as anyone who is root in dom0 can read the block device as if
it was not encrypted. Obviously anyone with root in a privileged
domain can read the memory of a guest and get the key material out
of that anyway, but that would require a bit of motivation at least.

Cheers,
Andy


Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u ni=
et de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, =
wordt u verzocht dat aan de afzender te melden en het bericht te verwijdere=
n. De Staat aanvaardt geen aansprakelijkheid voor schade, van welke aard oo=
k, die verband houdt met risico's verbonden aan het elektronisch verzenden =
van berichten.

This message may contain information that is not intended for you. If you a=
re not the addressee or if this message was sent to you by mistake, you are=
 requested to inform the sender and delete the message. The State accepts n=
o liability for damage of any kind resulting from the risks inherent in the=
 electronic transmission of messages.

--_000_mk26l4qmg5h0oilq9p2lmbqm1593601336273emailplusmobileiro_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from text --><style><!-- .EmailQuote { margin-left: 1pt; pad=
ding-left: 4pt; border-left: #800000 2px solid; } --></style>
</head>
<body>
<div>
<div>The root user of dom0 might / should be different from the root user o=
f the domU.</div>
<div><br>
</div>
<div><br>
</div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0 =
0 0">
<div><br>
<b>From: </b>&quot;Andy Smith&quot; &lt;<a href=3D"mailto:andy@strugglers.n=
et">andy@strugglers.net</a>&gt;<br>
<b>Date:</b> Wednesday, 1 July 2020 at 12:46:32<br>
<b>To: </b>&quot;xen-users@lists.xenproject.org&quot; &lt;<a href=3D"mailto=
:xen-users@lists.xenproject.org">xen-users@lists.xenproject.org</a>&gt;<br>
<b>Subject:</b> Re: Crypted devices... where open them?</div>
</div>
<br>
</div>
<font size=3D"2"><span style=3D"font-size:10pt;">
<div class=3D"PlainText">Hello,<br>
<br>
On Wed, Jul 01, 2020 at 10:59:41AM &#43;0200, Christoph wrote:<br>
&gt; I have some crypted (LUKS) devices which I use in some domU's.<br>
&gt; It is better to passthrough a crypted devices and open it in domU or<b=
r>
&gt; passthrough an already opened plain device to a domU?<br>
<br>
I open them inside the domU because not all domUs require encrypted<br>
storage. Also some of them are managed by the guest administrators and I<br=
>
don't know the key material - it's not stored in the dom0 storage at all.<b=
r>
<br>
I would have thought that opening it in dom0 would be slightly less<br>
secure as anyone who is root in dom0 can read the block device as if<br>
it was not encrypted. Obviously anyone with root in a privileged<br>
domain can read the memory of a guest and get the key material out<br>
of that anyway, but that would require a bit of motivation at least.<br>
<br>
Cheers,<br>
Andy<br>
<br>
</div>
</span></font><br>
Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u ni=
et de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, =
wordt u verzocht dat aan de afzender te melden en het bericht te verwijdere=
n. De Staat aanvaardt geen aansprakelijkheid
 voor schade, van welke aard ook, die verband houdt met risico's verbonden =
aan het elektronisch verzenden van berichten.
<br>
<br>
This message may contain information that is not intended for you. If you a=
re not the addressee or if this message was sent to you by mistake, you are=
 requested to inform the sender and delete the message. The State accepts n=
o liability for damage of any kind
 resulting from the risks inherent in the electronic transmission of messag=
es.
</body>
</html>

--_000_mk26l4qmg5h0oilq9p2lmbqm1593601336273emailplusmobileiro_--


From xen-users-bounces@lists.xenproject.org Wed Jul 01 11:33:23 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 11:33:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqaz1-0001EB-D5; Wed, 01 Jul 2020 11:32:55 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JuUg=AM=antarean.org=joost@srs-us1.protection.inumbo.net>)
 id 1jqayy-0001E6-U2
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 11:32:53 +0000
X-Inumbo-ID: 9921c6a2-bb8e-11ea-86f4-12813bfff9fa
Received: from gw1.antarean.org (unknown [194.145.200.214])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTP
 id 9921c6a2-bb8e-11ea-86f4-12813bfff9fa;
 Wed, 01 Jul 2020 11:32:51 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by gw1.antarean.org (Postfix) with ESMTP id 49xf6R2VLtzyhD
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 13:25:35 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from gw1.antarean.org ([127.0.0.1])
 by localhost (gw1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id QOkewyayzisR for <xen-users@lists.xenproject.org>;
 Wed,  1 Jul 2020 13:25:34 +0200 (CEST)
Received: from mailstore1.antarean.org (localhost [127.0.0.1])
 by gw1.antarean.org (Postfix) with ESMTP id 49xf6Q67Pzzydj
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 13:25:34 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49xfGp0pSCz15
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 13:32:50 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from mailstore1.antarean.org ([127.0.0.1])
 by localhost (mailstore1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id TviWo-29I4hX for <xen-users@lists.xenproject.org>;
 Wed,  1 Jul 2020 13:32:49 +0200 (CEST)
Received: from eve.localnet (eve.adm.antarean.org [10.55.16.44])
 by mailstore1.antarean.org (Postfix) with ESMTPA id 49xfGn66gTzj
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 13:32:49 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=antarean.org;
 s=default; t=1593603169;
 bh=XQzkbxBYHx6YU/iTBETq3ZEJqB949IMaAfa5DCZJAH8=;
 h=From:To:Subject:Date:In-Reply-To:References;
 b=Z2Qd6m2LgMJtEPn5/nzJfpaXm/QwbXIHfNSspwPZeMG51JfXdaqpYYW3QAmqfjARg
 x+1UwZaJHVhtDzq7izVbpSbFG9qEBS7R36+zV+MWA74NSQ2t0IqFYHibPcxN0RhnNC
 0/j5+AyOekaARADSbp0IKTaQeTK/677fgVlzJPgg=
From: "J. Roeleveld" <joost@antarean.org>
To: xen-users@lists.xenproject.org
Subject: Re: Crypted devices... where open them?
Date: Wed, 01 Jul 2020 13:32:49 +0200
Message-ID: <5371594.DvuYhMxLoT@eve>
Organization: Antarean
In-Reply-To: <4707cf083006ac283a6a5fa9997f427e@gmx.de>
References: <4707cf083006ac283a6a5fa9997f427e@gmx.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On Wednesday, July 1, 2020 10:59:41 AM CEST Christoph wrote:
> Hi
> 
> I have some crypted (LUKS) devices which I use in some domU's.
> It is better to passthrough a crypted devices and open it in domU or
> passthrough an already opened plain device to a domU?
> 
> --
> ------
> Greetz

I would suggest it depends on who "owns" the domUs.

If the domU is not owned by the same person as who owns dom0, then the 
decryption should be handled in the domU as dom0 should not have access to the 
decription keys.

If you own both dom0 and domU, you can decide where to use the decryption 
keys.
In this case, I would decrypt it on the dom0. The reason being:

1) the dom0 should have less exposure, which means it will be more difficult 
to break into and grab the keys

2) the data will be accessible anyway as long as the drive is "decrypted", 
which means as long as the machine is powered, the keys are not really needed.

--
Joost




From xen-users-bounces@lists.xenproject.org Wed Jul 01 12:07:52 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 12:07:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqbUx-00043z-V3; Wed, 01 Jul 2020 12:05:55 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cBpW=AM=syndicat.com=nd@srs-us1.protection.inumbo.net>)
 id 1jqbUv-00043u-Nj
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 12:05:54 +0000
X-Inumbo-ID: 35b984ec-bb93-11ea-86fa-12813bfff9fa
Received: from mail.syndicat.com (unknown [62.146.89.62])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 35b984ec-bb93-11ea-86fa-12813bfff9fa;
 Wed, 01 Jul 2020 12:05:52 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=syndicat.com; s=x; h=Content-Type:Content-Transfer-Encoding:MIME-Version:
 References:In-Reply-To:Message-ID:Date:Subject:To:From:Sender:Reply-To:Cc:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=clQejMCTAG84BqAlTYO93iNAoPuKj8xbp2xIzAH7Jnc=; b=ZfhgSfmKys+50mDXR90vaRgcBA
 jVn2RjMAJDwU2UlExq35tKXjyxZtf6HI6iKkSZW8/skcGY49tzDXOBNBhpa92srT3jhVpdAk1bAja
 jzvRaceY6pGb+3//T0eYw3PMcYh02D1u57I0SftGQ7/baCWVqWVqlA9jkZF07E/zxphM=;
Received: from localhost ([127.0.0.1]:53234)
 by mail.syndicat.com with esmtp (Syndicat PostHamster 4.92.2)
 (envelope-from <nd@syndicat.com>) id 1jqbUt-00007Q-RX
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 14:05:51 +0200
X-Virus-Scanned: amavisd-new at syndicat.com
Received: from mail.syndicat.com ([127.0.0.1])
 by localhost (mail.syndicat.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id tOLMj6tv9s3d for <xen-users@lists.xenproject.org>;
 Wed,  1 Jul 2020 14:05:51 +0200 (CEST)
Received: from p57949245.dip0.t-ipconnect.de ([87.148.146.69]:39670
 helo=gongo.localnet)
 by mail.syndicat.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 (Syndicat PostHamster 4.92.2) (envelope-from <nd@syndicat.com>)
 id 1jqbUt-0000cK-FI
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 14:05:51 +0200
From: Niels Dettenbach <nd@syndicat.com>
To: xen-users@lists.xenproject.org
Subject: Re: Crypted devices... where open them?
Date: Wed, 01 Jul 2020 14:05:50 +0200
Message-ID: <4017780.mogB4TqSGs@gongo>
Organization: Syndicat IT&Internet
In-Reply-To: <5371594.DvuYhMxLoT@eve>
References: <4707cf083006ac283a6a5fa9997f427e@gmx.de> <5371594.DvuYhMxLoT@eve>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"
X-Report-Abuse-To: abuse@syndicat.com (see
 https://www.syndicat.com/kontakt/kontakte/)
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.syndicat.com
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Sender Address Domain - syndicat.com
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Am Mittwoch, 1. Juli 2020, 13:32:49 CEST schrieb J. Roeleveld:
> If the domU is not owned by the same person as who owns dom0, then the
> decryption should be handled in the domU as dom0 should not have access to
> the decription keys.
This is the design of Xen arch.

DomUs superuser by priciple is logically different from Dom0.

> If you own both dom0 and domU, you can decide where to use the decryption
> keys.
> In this case, I would decrypt it on the dom0. The reason being:
So if you "own" DomUs and Dom0, you may own the hardware too, so why not=20
doing it in the "storage hardware" (where lot of solutions exist too?)... =
=DF)=20
#bitjoke

> 1) the dom0 should have less exposure, which means it will be more
> difficult to break into and grab the keys
On the other hand, such a solution "within xen" would require significant m=
ore=20
complexity of Xen which itself would offers more exposure to attackers onto=
=20
the whole system (even the ones who did not use that "feature")...

The elegantness of xen is his simplicity.

i would say: keep it simple and/or "fit your design"...

Or use some crypto solutions integrated in the block device solution you=20
decide for to use for DomUs at "device level" and unlock it byself before=20
starting any DomUs - transparent to Xen itself. Xen allows scripting of suc=
h=20
stuff. See /etc/xen/scripts/block-* scripts for instance.

> 2) the data will be accessible anyway as long as the drive is "decrypted",
you probably mean "unlocked"...

> which means as long as the machine is powered, the keys are not really
> needed.
But same "applies" to DomU


just my 0.2$


niels.




=2D-=20
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
=20








From xen-users-bounces@lists.xenproject.org Wed Jul 01 12:36:56 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 12:36:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqbxd-0007D3-9N; Wed, 01 Jul 2020 12:35:33 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JuUg=AM=antarean.org=joost@srs-us1.protection.inumbo.net>)
 id 1jqbxa-0007Cs-NJ
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 12:35:31 +0000
X-Inumbo-ID: 58b48a74-bb97-11ea-bb8b-bc764e2007e4
Received: from gw1.antarean.org (unknown [194.145.200.214])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 58b48a74-bb97-11ea-bb8b-bc764e2007e4;
 Wed, 01 Jul 2020 12:35:29 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by gw1.antarean.org (Postfix) with ESMTP id 49xgVj11VWzyhD
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 14:28:13 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from gw1.antarean.org ([127.0.0.1])
 by localhost (gw1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Qkf3XZRk2eFw for <xen-users@lists.xenproject.org>;
 Wed,  1 Jul 2020 14:28:12 +0200 (CEST)
Received: from mailstore1.antarean.org (localhost [127.0.0.1])
 by gw1.antarean.org (Postfix) with ESMTP id 49xgVh5mKFzydj
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 14:28:12 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mailstore1.antarean.org (Postfix) with ESMTP id 49xgg40bYfz15
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 14:35:28 +0200 (CEST)
X-Virus-Scanned: amavisd-new at antarean.org
Received: from mailstore1.antarean.org ([127.0.0.1])
 by localhost (mailstore1.antarean.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id o8tIpZCyP4Fo for <xen-users@lists.xenproject.org>;
 Wed,  1 Jul 2020 14:35:26 +0200 (CEST)
Received: from eve.localnet (eve.adm.antarean.org [10.55.16.44])
 by mailstore1.antarean.org (Postfix) with ESMTPA id 49xgg24bn7zj
 for <xen-users@lists.xenproject.org>; Wed,  1 Jul 2020 14:35:26 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=antarean.org;
 s=default; t=1593606926;
 bh=1pixyVJZpOcGsDwbuaORDZarJn47rNjxbgoM4YLKpK8=;
 h=From:To:Subject:Date:In-Reply-To:References;
 b=MB7wSCYGadztYLqfpZ5is/prTSPzKkxVWhup4btp3ORkZnOkv79VQiZ5elP3YF1Bu
 1mB2FThLwvIDAhctF4/SJuEOwbS09MldMUzdRVNAu743R12gEqVXOED3qCVVVTUICB
 5g0sck3WqbJ24g+CpIS+jneNEk4Nn6FpEfqT68uY=
From: "J. Roeleveld" <joost@antarean.org>
To: xen-users@lists.xenproject.org
Subject: Re: Crypted devices... where open them?
Date: Wed, 01 Jul 2020 14:35:26 +0200
Message-ID: <12554013.uLZWGnKmhe@eve>
Organization: Antarean
In-Reply-To: <4017780.mogB4TqSGs@gongo>
References: <4707cf083006ac283a6a5fa9997f427e@gmx.de> <5371594.DvuYhMxLoT@eve>
 <4017780.mogB4TqSGs@gongo>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On Wednesday, July 1, 2020 2:05:50 PM CEST Niels Dettenbach wrote:
> Am Mittwoch, 1. Juli 2020, 13:32:49 CEST schrieb J. Roeleveld:
> > If the domU is not owned by the same person as who owns dom0, then the
> > decryption should be handled in the domU as dom0 should not have access=
 to
> > the decription keys.
>=20
> This is the design of Xen arch.
>=20
> DomUs superuser by priciple is logically different from Dom0.

In principle, yes. But I meant, are they all managed by the same entity, or=
 is=20
this a hosting environment where VMs are provided to customers.

> > If you own both dom0 and domU, you can decide where to use the decrypti=
on
> > keys.
>=20
> > In this case, I would decrypt it on the dom0. The reason being:
> So if you "own" DomUs and Dom0, you may own the hardware too, so why not
> doing it in the "storage hardware" (where lot of solutions exist too?)...=
 =DF)
> #bitjoke

Hardware solutions are, for me, on the same level as the dom0.

> > 1) the dom0 should have less exposure, which means it will be more
> > difficult to break into and grab the keys
>=20
> On the other hand, such a solution "within xen" would require significant
> more complexity of Xen which itself would offers more exposure to attacke=
rs
> onto the whole system (even the ones who did not use that "feature")...

How would this require additional complexity?
The block-device is unlocked on the dom0 and the unlocked block device is=20
passed on to the domU.

> The elegantness of xen is his simplicity.
>=20
> i would say: keep it simple and/or "fit your design"...

Agree

> Or use some crypto solutions integrated in the block device solution you
> decide for to use for DomUs at "device level" and unlock it byself before
> starting any DomUs - transparent to Xen itself. Xen allows scripting of s=
uch
> stuff. See /etc/xen/scripts/block-* scripts for instance.
>=20
> > 2) the data will be accessible anyway as long as the drive is "decrypte=
d",
>=20
> you probably mean "unlocked"...

Yes, I quickly typed my reply and got the terminology wrong.

> > which means as long as the machine is powered, the keys are not really
> > needed.
>=20
> But same "applies" to DomU

True, in my case, domUs are generally running for the same period as the ho=
st=20
itself. Only time they are not running is when the host is off or the domU =
is=20
being restarted.

=2D-
Joost




From xen-users-bounces@lists.xenproject.org Wed Jul 01 12:47:10 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 01 Jul 2020 12:47:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqc8Q-0008IH-P1; Wed, 01 Jul 2020 12:46:42 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cBpW=AM=syndicat.com=nd@srs-us1.protection.inumbo.net>)
 id 1jqc8P-0008IC-6J
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 12:46:41 +0000
X-Inumbo-ID: e83828e5-bb98-11ea-870d-12813bfff9fa
Received: from mail.syndicat.com (unknown [62.146.89.62])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id e83828e5-bb98-11ea-870d-12813bfff9fa;
 Wed, 01 Jul 2020 12:46:40 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=syndicat.com; s=x; h=Content-Type:Content-Transfer-Encoding:MIME-Version:
 References:In-Reply-To:Message-ID:Date:Subject:To:From:Sender:Reply-To:Cc:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=wBLB4VTKao0Cvybgd2TUqhc6ONDgZPoc9Flt9ZdhoWE=; b=YE5KDSnAR55fj57pOlcY/Evl8t
 Yx3xchC0Cs7iAumJUf+RVZfdjwm8HJf+7cSkM+IE8T6GLVyAv7Lye//dqXNKPrnueTcDAd/3T+1EG
 4XVxrwf3/bPZCj3oKzG2XTPxWFeBZncL9Z1H2EulAUW9j5rJGC9siFiYd5lj3mM8jSjI=;
Received: from localhost ([127.0.0.1]:51840)
 by mail.syndicat.com with esmtp (Syndicat PostHamster 4.92.2)
 (envelope-from <nd@syndicat.com>) id 1jqc8N-0007V4-CQ
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 14:46:39 +0200
X-Virus-Scanned: amavisd-new at syndicat.com
Received: from mail.syndicat.com ([127.0.0.1])
 by localhost (mail.syndicat.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id PbSdvmhZh0th for <xen-users@lists.xenproject.org>;
 Wed,  1 Jul 2020 14:46:39 +0200 (CEST)
Received: from p57949245.dip0.t-ipconnect.de ([87.148.146.69]:40466
 helo=gongo.localnet)
 by mail.syndicat.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 (Syndicat PostHamster 4.92.2) (envelope-from <nd@syndicat.com>)
 id 1jqc8N-0003sW-2W
 for xen-users@lists.xenproject.org; Wed, 01 Jul 2020 14:46:39 +0200
From: Niels Dettenbach <nd@syndicat.com>
To: xen-users@lists.xenproject.org
Subject: Re: Crypted devices... where open them?
Date: Wed, 01 Jul 2020 14:46:38 +0200
Message-ID: <2069492.C4sosBPzcN@gongo>
Organization: Syndicat IT&Internet
In-Reply-To: <12554013.uLZWGnKmhe@eve>
References: <4707cf083006ac283a6a5fa9997f427e@gmx.de>
 <4017780.mogB4TqSGs@gongo> <12554013.uLZWGnKmhe@eve>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
X-Report-Abuse-To: abuse@syndicat.com (see
 https://www.syndicat.com/kontakt/kontakte/)
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.syndicat.com
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Sender Address Domain - syndicat.com
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Am Mittwoch, 1. Juli 2020, 14:35:26 CEST schrieb J. Roeleveld:
> The block-device is unlocked on the dom0 and the unlocked block device is
> passed on to the domU.
As i wrote, if you want to do some kind of such special solution (which depend in detail from the storage as crypto solution you decide for), you can srcipt that by xen scripting interface:

see:
   /etc/xen/scripts/block*

for examples / default scripts which you may adapt for your needs.

This then get passsed i.e. by "script" parameter in your DomU storage configs.

see i.e.:
https://doc.opensuse.org/documentation/leap/virtualization/html/book.virt/cha-xen-vbd.html
https://xenbits.xen.org/docs/4.7-testing/misc/block-scripts.txt

ther's no need to modify xen itself.


hth,


niels.




-- 
 ---
 Niels Dettenbach
 Syndicat IT & Internet
 http://www.syndicat.com
 PGP: https://syndicat.com/pub_key.asc
 ---
 








From xen-users-bounces@lists.xenproject.org Thu Jul 02 05:56:14 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 05:56:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqsB4-0006df-Dt; Thu, 02 Jul 2020 05:54:30 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8b7I=AN=nxp.com=anda-alexandra.dorneanu@srs-us1.protection.inumbo.net>)
 id 1jqsB2-0006dZ-8R
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 05:54:28 +0000
X-Inumbo-ID: 7c3e72a2-bc28-11ea-bb8b-bc764e2007e4
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (unknown
 [40.107.3.68]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 7c3e72a2-bc28-11ea-bb8b-bc764e2007e4;
 Thu, 02 Jul 2020 05:54:26 +0000 (UTC)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PyFRlO7YFXd8ZzdYs+uiHuw4Mn6rfmfi+8it8SNKs4fP1079zOs8R5pvEfPtS7RWwogkd8RQSaJcQKpgfkHmgr4aFm26lla9iCvZ0GYo9HefIKTi+SKTQGb1IxtsHlzO3+1didOoICu8Y8RsGdY/n+1aF47PlOlGUnseNCA0gGJfwcdpajgt6tvOYWNAMkQjkClppYfNH1FY4ed19NW0dEBn4ATto66VOwPLVB0JwfgnNbMuiduPb6fd5J3L0L8rn/QV4O3XYx2m4mAVmsD6st4CnAWt05g9h4kWC+o2XEW0wX0JAX9CbuFEMPC9VTUG80W9qcBw+jLS4xE+hRAikA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; 
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=um4r7/FwmKY8bOOGyA8uxl1RDbRxUUZC6mxHqwKkg7A=;
 b=gSTbcrqJSHuthIiHYUU+JBOsKIzdOkwSrHlrjQqgTrWyYFSk2xwaDo3Kp5QWmsEpMK2MUW5CFvxqUaZubT8D8h7XnVVBdkJ/5CBNoKm2/hkHMrJnc3xBbjOYUh9OJ/cmfPqZNMl0P9CIYglp34BWdVbpcJkgQm8Bk5Lboa1xgU6/H4ATg8Jds42KapSDBcN+qrxpxk4BmsS1QltdmhS5tguPaxL1MHnH+1r4hh88BWBjcq1LjDLNerhVKThiwDC6Z0CpnxHmVc/Nh8YvAkhA2zlVPFn6OPpmEXqePVQEg2dOVnJerRQ4KHs4BtnuiPSYNGkRU26F7SV86tqsiLBzUA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass
 header.d=nxp.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; 
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=um4r7/FwmKY8bOOGyA8uxl1RDbRxUUZC6mxHqwKkg7A=;
 b=nrNKTnNyIW21ZPBgdy0a5bC6iba7w2CIM9OElknokrWiOj41oEwxWxBJ53OOfnH73lFpC4F9VN8co2VdOQpDYq9zyBOYThvQFc+A0JsnlG2Qj1QyZCbW0TV9OkphtNUFl2pyu4FowKdB3fvex3e7X3/k3xNzuTrCmbz0OhY4zfQ=
Received: from VE1PR04MB6429.eurprd04.prod.outlook.com (2603:10a6:803:11a::29)
 by VI1PR0402MB3486.eurprd04.prod.outlook.com (2603:10a6:803:8::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3131.23; Thu, 2 Jul
 2020 05:54:24 +0000
Received: from VE1PR04MB6429.eurprd04.prod.outlook.com
 ([fe80::f9c1:7a1b:3543:f3fd]) by VE1PR04MB6429.eurprd04.prod.outlook.com
 ([fe80::f9c1:7a1b:3543:f3fd%3]) with mapi id 15.20.3153.023; Thu, 2 Jul 2020
 05:54:24 +0000
From: Anda-alexandra Dorneanu <anda-alexandra.dorneanu@nxp.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: Xen SMMU support
Thread-Topic: Xen SMMU support
Thread-Index: AdZQNO3LzOcPU+zARcWmSmBtyblpDg==
Date: Thu, 2 Jul 2020 05:54:24 +0000
Message-ID: <VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0@VE1PR04MB6429.eurprd04.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: lists.xenproject.org; dkim=none (message not signed)
 header.d=none;lists.xenproject.org; dmarc=none action=none
 header.from=nxp.com;
x-originating-ip: [188.25.144.26]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 9340f29e-9728-4133-9413-08d81e4c5fbb
x-ms-traffictypediagnostic: VI1PR0402MB3486:
x-microsoft-antispam-prvs: <VI1PR0402MB34865F22E6F3050F1A2D0E1DBA6D0@VI1PR0402MB3486.eurprd04.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:2582;
x-forefront-prvs: 0452022BE1
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: r46ykyltKW57r/KphxDxEAZIfpLG1AySYAAdP21d+ZL/Y6twhRK4JXzeZL+QGzHelLHsLukgh2NZwioMqRtABv10I+mPPOxfxFu5U5eKI1YxT5bCNkLNTKhPgst/fUK05lduyl0xCsvy9YpG8BbQTIis7SUEaDKdXRg+2DSXRvUu+CkJ/F3avFHgOhiAyndRykq90g0F73oPOwvBC3IJFbQW2xzZDSW1e3FQA8zK/xzFON+KeA8nAztU5nw7PswLsQddI8EvGSv9wMFYTu4dOCaqgfC9EkQeESeYyAgGAffUMih/cOt0AXun+fBKh5c95hmQ3+jSG0YCzOedSwcQ3w==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
 IPV:NLI; SFV:NSPM; H:VE1PR04MB6429.eurprd04.prod.outlook.com; PTR:; CAT:NONE;
 SFTY:;
 SFS:(4636009)(39860400002)(376002)(136003)(346002)(396003)(366004)(7116003)(6916009)(8676002)(7696005)(186003)(33656002)(71200400001)(26005)(8936002)(2906002)(9326002)(6506007)(86362001)(66446008)(3480700007)(66946007)(478600001)(4744005)(76116006)(55016002)(64756008)(9686003)(52536014)(66556008)(66476007)(5660300002)(316002);
 DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata: Ehf0rFuMyQRR0sHdRTHbTb8Is+OY/HQ6P3A/IVVmaOKqhd6peI4n8whCR2AeXhSboZdraP4Q8i1RHzlS4KOVJfWFf1dTPHODd25/ClF9Z4kUrIiBjBJXEMQ36AD6SDxMyqQhVHjCnUN+uOt2EXxOZfNYwbavw5rzG+582zmlY3tfmrLYfrC8PR0hMq7cHEGHzEZwBcYnYfGbDxBUhjlk9Tf0/WbX+AE6JqOvjQZJ3puKxkXNvY0L4hVn/FuYN0P5qIzUyykwxSriCmrTt0RnZfiL+l5aF9t05SRF7QieN3j8EtdzM5lXxr2mN1rcozgRRMQC0gk0ZPfIWHmu7/DBO8cK59nJZ5pgUaNlmSqti7M7R+0WP+keeg5vGVT6O+T9QPyumlGuCgZxV1kOoSdrzoPLoIEgl+im7mcsfF0PypBl5zaT84jjoAY3GFfq2cv60xL6+uv7X8C/F5pk57S9rExe5/aKO9kynrNU3gMp+mc=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative;
 boundary="_000_VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0VE1PR04MB6429eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nxp.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: VE1PR04MB6429.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9340f29e-9728-4133-9413-08d81e4c5fbb
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jul 2020 05:54:24.4042 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ucQBxYn9Ey+8oegh5konkCSR6+V55UMOz4XR93vJKq8pXcvW+amQyh/F9eKitLJZRBMXbaVoZu098HmMEmSt3fKAi3F1ktiwMwqXpfmXg64=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0402MB3486
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--_000_VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0VE1PR04MB6429eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi,

I am currently running Xen with SMMU enabled on an ARM64 platform with 4 Co=
rtex-A72 cores, GICv2 and SMMUv2. There are SMMU faults when booting Dom0, =
such as:

                [    3.972767] mmc0: sdhci: Resp(XEN) smmu: /soc/iommu@9000=
000: Unhandled context fault: fsr=3D0x402, iova=3D0xea060200, fsynr=3D0x180=
000, cb=3D0

Has someone encountered such problems and can provide some guidelines for S=
MMU support on Dom0?

Regards,
Anda



--_000_VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0VE1PR04MB6429eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I am currently running Xen with SMMU enabled on an A=
RM64 platform with 4 Cortex-A72 cores, GICv2 and SMMUv2. There are SMMU fau=
lts when booting Dom0, such as:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <i><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Segoe UI&quot;,sans-serif;color:black">[&nbsp;&nbsp;&nbsp;=
 3.972767] mmc0: sdhci: Resp(XEN) smmu: /soc/iommu@9000000: Unhandled conte=
xt fault: fsr=3D0x402, iova=3D0xea060200, fsynr=3D0x180000, cb=3D0
</span>&nbsp;<o:p></o:p></i></p>
<p class=3D"MsoNormal"><i><o:p>&nbsp;</o:p></i></p>
<p class=3D"MsoNormal">Has someone encountered such problems and can provid=
e some guidelines for SMMU support on Dom0?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
<p class=3D"MsoNormal">Anda<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0VE1PR04MB6429eurp_--


From xen-users-bounces@lists.xenproject.org Thu Jul 02 05:59:55 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 05:59:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqsG7-0006or-5x; Thu, 02 Jul 2020 05:59:43 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=EXBJ=AN=nxp.com=peng.fan@srs-us1.protection.inumbo.net>)
 id 1jqsG6-0006oi-6b
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 05:59:42 +0000
X-Inumbo-ID: 37943e74-bc29-11ea-bb8b-bc764e2007e4
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (unknown
 [40.107.21.76]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 37943e74-bc29-11ea-bb8b-bc764e2007e4;
 Thu, 02 Jul 2020 05:59:40 +0000 (UTC)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gjikC6RJg8nHX3CSMUJaKTUuQaZgwK3sB49hO3zE5pjbLPTqEvmicffduL7KK6hm0Hc0RenzUACCVg//l+eCQG+gZ2fwaJsFUJe4Yz17f2URoReg/WfEJ6M4hi6otmteppgBWi8sefr2xRZlz+Io8MWhBfwsPo0ZSsFa2qT/xL6FvseRIBw8q2eICrkilA1WQ+j9Wb4cUX2y8rXzYIWib96OwnNsKzrpTnoqi8lpP4xFYZYqXqkZ2IEMxM18YD8f+mgKcdJCoSWSLywPtU8W3l6FuRcqoZaI5nmOmZYc1Hex0CaTOyhfwoX22fWYViqDYI9PAwTgiLv8jxVtIZZSXQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; 
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YbH9hH1q3eEyJfqcSovGUk3uUqzZRsxT0Xhq9ScFB8A=;
 b=NR1ARSZOYQhRIE5q4y9k6W4ih/Dpo1mUUDm1lFqdh37iMHIgDJgUCI6tPGnccrdAlWb8ZzuskjHhr5XaNbdvZqGTXbD03mlU1Oie3Va1L0A5YdLIUqq1vy9m7CtU2QQAclCLxbSHBn75Jvseo5QiwxKjev2YGH3zeUYjcUw34kDCYRLHumFtABsnQ8US86qce0MpcoDMpILj0Ej9x/U2M96m1tRkdAd5ooajKyLXi/1W7j+cIW/aFyXQHqcnsrr2ij07S6rlnsHccqQ04kG+in+kxhtEUBVEwAVGOlxCjDij3QdZB+QuvGingNuNQjYClG2TpEmSkY/3klL0K0tWwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass
 header.d=nxp.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; 
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YbH9hH1q3eEyJfqcSovGUk3uUqzZRsxT0Xhq9ScFB8A=;
 b=VHeoX+LehYcp6e8Waen80MFftkFmhonzroY3/r9Uk6aEbDIJe+gLuOFNwolrJLT6YyN3DjspsLcsKMXWvHo1+Rt6OmT2atd+yoescO4SikLI+0ecNpOWi7+QsewL0ib7t7zl7qLp0hZ7x3PMoBLa5gg4G94vCeqggybSl/7iLfc=
Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com (2603:10a6:4:a1::14)
 by DB7PR04MB5467.eurprd04.prod.outlook.com (2603:10a6:10:80::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.20; Thu, 2 Jul
 2020 05:59:39 +0000
Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com
 ([fe80::2d36:b569:17c:7701]) by DB6PR0402MB2760.eurprd04.prod.outlook.com
 ([fe80::2d36:b569:17c:7701%4]) with mapi id 15.20.3131.034; Thu, 2 Jul 2020
 05:59:39 +0000
From: Peng Fan <peng.fan@nxp.com>
To: Anda-alexandra Dorneanu <anda-alexandra.dorneanu@nxp.com>,
 "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: RE: Xen SMMU support
Thread-Topic: Xen SMMU support
Thread-Index: AdZQNO3LzOcPU+zARcWmSmBtyblpDgAAKSwA
Date: Thu, 2 Jul 2020 05:59:38 +0000
Message-ID: <DB6PR0402MB27605E90051B322E7952892B886D0@DB6PR0402MB2760.eurprd04.prod.outlook.com>
References: <VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0@VE1PR04MB6429.eurprd04.prod.outlook.com>
In-Reply-To: <VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0@VE1PR04MB6429.eurprd04.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: nxp.com; dkim=none (message not signed)
 header.d=none;nxp.com; dmarc=none action=none header.from=nxp.com;
x-originating-ip: [119.31.174.71]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 74831ddc-7a19-4617-ab2b-08d81e4d1b2f
x-ms-traffictypediagnostic: DB7PR04MB5467:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB7PR04MB546715F240AB21AA7E7353AC886D0@DB7PR04MB5467.eurprd04.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:473;
x-forefront-prvs: 0452022BE1
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: TdFAWvFUjgsSRmOOjXKF3e8sxtX/vhPFVD/FBePNSxEpJYUm/YBpjkcnR1MbzgPpElc8aLOa8zARmF6Diwiz4XFsCj4PDfdkyIbGjPwUEmSmmMdS2jPph0s6AhYL9BZO+SxN1zeVE23sMgHQr1E1ubF4ojrT02ye5mv/lEaWQpUUzoHt+bfjYFRvuGfQDv/0IXYHpud0TMfXi3gIXd0sgHkPnK2Q3q3hqx6dPYHSXGSloO7j6BpoF4cnVu86um4IcgiYRahXllV1U7++3hSuOdLhneBjcp2TdW1Slq5CIgtRM127E/7b2QlxyyV71BgPjTHYPO9BtPqazXZUaN7lFw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
 IPV:NLI; SFV:NSPM; H:DB6PR0402MB2760.eurprd04.prod.outlook.com; PTR:; CAT:NONE;
 SFTY:;
 SFS:(4636009)(376002)(366004)(136003)(346002)(39860400002)(396003)(55016002)(7696005)(52536014)(33656002)(5660300002)(26005)(86362001)(6506007)(2906002)(8936002)(71200400001)(316002)(8676002)(9686003)(186003)(110136005)(7116003)(64756008)(66446008)(76116006)(66946007)(66556008)(66476007)(478600001)(3480700007)(44832011)(4744005);
 DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata: FZdnZq4Ttb7yJeuM9suA9gGS+dd1Ux3YhbJ6Rrd6jWbxCOOBA2xvxECvrvS0XgWqc/pf40yDNmlR1J+5+WQFSFHwRmc7lEMSo3bdGIBOCRsCixDpKq5NcGxla9PhUinAriNyHEDmpJE22wq2UB3AzXr06khg4J+iwg77yBev2/rPRnQ1q5VO8cHcOfRdps07Kq6Zf/x1CWTULrfFi3+leWSsdE/4+ULbPjqT/5r1DBk8y+8x6Pp1i3xoZL+PoxQK0TqUoI9laee1IVL/FWKimHoD4VGc/f51ILLAJt6aUZEFbJthc1LANVmYnt+IC5kI5WTRtMkUCwCbAIS/QbG5Bb+0UJlVWfBn25SWCHmly5D6eAWlNJ8EhmD36W/udf6S7SKZLCSs/FPQAwSjaw0qUSc5PpGS4bM89U8AJohP+sL172nDVpfhWDNCbGrbpF9hkfPJMVqZQIa0CrtO1iuv6TWpNddDofih3Cy40xuu07q3Bt1PmxSMOHEsw65Sa3Cj
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nxp.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB6PR0402MB2760.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 74831ddc-7a19-4617-ab2b-08d81e4d1b2f
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jul 2020 05:59:38.8829 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YA4NWoHF+FsPvWOqyO5PEpmCezlNetTV90VLqoTLIxkWQ2X8tS7U8DMOOchdiGsN43DLPoSVtGsI+jAvIDsOoA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5467
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Subject: Xen SMMU support

Hi,

I am currently running Xen with SMMU enabled on an ARM64 platform with 4 Co=
rtex-A72 cores, GICv2 and SMMUv2. There are SMMU faults when booting Dom0, =
such as:

=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 [=A0=A0=A0 3.972767] mmc0: sd=
hci: Resp(XEN) smmu: /soc/iommu@9000000: Unhandled context fault: fsr=3D0x4=
02, iova=3D0xea060200, fsynr=3D0x180000, cb=3D0 =A0

Has someone encountered such problems and can provide some guidelines for S=
MMU support on Dom0?


[Peng]: You enabled SMMU for Dom0? Which master issues 0xea060200? Did you =
let smmu cb0 sharing same mmu table as dom0 mmu stage2?

Regards,
Peng.

Regards,
Anda




From xen-users-bounces@lists.xenproject.org Thu Jul 02 09:56:45 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 09:56:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqvwL-0002v5-S4; Thu, 02 Jul 2020 09:55:33 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=r8oy=AN=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1jqvwK-0002v0-NO
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 09:55:32 +0000
X-Inumbo-ID: 29f71630-bc4a-11ea-bca7-bc764e2007e4
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (unknown
 [40.107.0.88]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 29f71630-bc4a-11ea-bca7-bc764e2007e4;
 Thu, 02 Jul 2020 09:55:31 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; 
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mZT6FTPvPXzesJ3aMFCRJOZ4/2FvPq5B5HCXZElmbKg=;
 b=fXI7NSrbjIfTR8Ivl7GHKrU94OquEzttvTqGom8rfNyPXNHauFv2t6vgXHeMGDBX6r3/eSpAelNbN/e5DeHFaSVyK9kxcNQ48LhCKxRaulfxrNJtyCwBStiekxg82zu1lsV+box6PHeqdPr+uS38GqWLmh+vgGZzxsssOC2YzH0=
Received: from AM6PR10CA0059.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:80::36)
 by VE1PR08MB4992.eurprd08.prod.outlook.com (2603:10a6:803:10f::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.20; Thu, 2 Jul
 2020 09:55:27 +0000
Received: from VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:80:cafe::ef) by AM6PR10CA0059.outlook.office365.com
 (2603:10a6:209:80::36) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.22 via Frontend
 Transport; Thu, 2 Jul 2020 09:55:27 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org;
 dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT045.mail.protection.outlook.com (10.152.19.51) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3153.24 via Frontend Transport; Thu, 2 Jul 2020 09:55:26 +0000
Received: ("Tessian outbound 114f46c34313:v62");
 Thu, 02 Jul 2020 09:55:26 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 1295c614db43f552
X-CR-MTA-TID: 64aa7808
Received: from de87be9bb723.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 1C819126-1B6B-4D48-8022-22E4FD1787F3.1; 
 Thu, 02 Jul 2020 09:55:20 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id de87be9bb723.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 02 Jul 2020 09:55:20 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VVa4Kn3fK6F/PfqBIEt4wEQacjvCJt5/H1rQF6u7u/ZmfUFAkR4NIxG+1/QiIX+owDBgP9QFIAS62MkNJX1iDs/U6LNJP+bYD3y6fb2ZNFtpoFhNzFOc5M5hUo0eNXDpKBfikoJizRaEzIjhwmwYQAyRdOqu/oz2h8ESQmEZQ54tWUHdzyrrFD+vMusSiXIDzrwudaPtRhCHPa7Hw4dvUvxhZGzUEYZX3AO4i2Nm0zinx0w9rpim5F7zp+AHODXMFfePiFyBDrVMMvoLWx+UElNguN1CEtVX1Y6RCKR3GcH9j1i+pULuSzaS2qOxjQcr1JSoEb4LJ9wa5badyXu9VA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; 
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mZT6FTPvPXzesJ3aMFCRJOZ4/2FvPq5B5HCXZElmbKg=;
 b=bnNx3POXsAwAQbhencXkAOjvmbmwZsQcE9wY2K8k+IXJdZEVHij4JYK5pGkHEyHhakc/RSZ44CHBb9rE7PLywgzo8Ctfx1OKpyglaswzmcTyuTKcIT4wHIPm8IGCTqSqf020PTgNkqEtwGbBo2ziqvxUVHcdRh29bVqzJCjXklVPRfOx3ZRia90nAu0csUPbgEvbgHdkQwH3etzU9ZDTv3Z6KnPt6T93T6CVPe7+VhTgVtsPyUvgmuo3GNjB8+0Fh9vHt4S8bGf/iDtHEKeY0TugmA0MlJ5yAhO/WaFr4jHO+NZZiS5ypFArXavN6LtTPLRXLARyX5uT4ukm1jpPOA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; 
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mZT6FTPvPXzesJ3aMFCRJOZ4/2FvPq5B5HCXZElmbKg=;
 b=fXI7NSrbjIfTR8Ivl7GHKrU94OquEzttvTqGom8rfNyPXNHauFv2t6vgXHeMGDBX6r3/eSpAelNbN/e5DeHFaSVyK9kxcNQ48LhCKxRaulfxrNJtyCwBStiekxg82zu1lsV+box6PHeqdPr+uS38GqWLmh+vgGZzxsssOC2YzH0=
Received: from DB7PR08MB3689.eurprd08.prod.outlook.com (2603:10a6:10:79::16)
 by DB8PR08MB3993.eurprd08.prod.outlook.com (2603:10a6:10:ad::26) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3131.21; Thu, 2 Jul
 2020 09:55:09 +0000
Received: from DB7PR08MB3689.eurprd08.prod.outlook.com
 ([fe80::4001:43ad:d113:46a8]) by DB7PR08MB3689.eurprd08.prod.outlook.com
 ([fe80::4001:43ad:d113:46a8%5]) with mapi id 15.20.3153.024; Thu, 2 Jul 2020
 09:55:09 +0000
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Anda-alexandra Dorneanu <anda-alexandra.dorneanu@nxp.com>
Subject: Re: Xen SMMU support
Thread-Topic: Xen SMMU support
Thread-Index: AdZQNO3LzOcPU+zARcWmSmBtyblpDgAIfBwA
Date: Thu, 2 Jul 2020 09:55:08 +0000
Message-ID: <4C068CC6-D64C-4F99-BE32-F1DEE78862A5@arm.com>
References: <VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0@VE1PR04MB6429.eurprd04.prod.outlook.com>
In-Reply-To: <VE1PR04MB6429AFDAB445C6F2B5B55B70BA6D0@VE1PR04MB6429.eurprd04.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Authentication-Results-Original: nxp.com; dkim=none (message not signed)
 header.d=none;nxp.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [82.24.250.194]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: bd18002d-7a5e-4818-dcd4-08d81e6e0c0a
x-ms-traffictypediagnostic: DB8PR08MB3993:|VE1PR08MB4992:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <VE1PR08MB499223D3697407ED08FB84089D6D0@VE1PR08MB4992.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8882;OLM:8882;
x-forefront-prvs: 0452022BE1
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: b4bAetk5uYf9A9hQ64BFgxXkoFkDgSJC5ONWjA0Nye8XkkttDKHe3BNSRGvvuBkl3ZwDneeo6SvZBBYaEDgAgcMZeA64+RLa//Mo9sBdRGB4UIi9VqSqQ7JXkTM9f83yCw0A40jXLx16omt0ZjoT8FXqLa56P9p+AcC/KAaCH3Qnh1r+pA8HS6l9l41RRffTvuQT+r/HHI05UQ4+J6lLDTgqCLwX9mcKipsgsf/TUn9lJCdikLAO96eS4m477DALV04oOOfuf+cWlQ+2pHbt/j+2tMUFjsK+yUINMoes3ZCKW2SqlkIiasyh/h3RbTdbcEhNTSJpKXKVWT8AofYixQ==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en;
 SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR08MB3689.eurprd08.prod.outlook.com;
 PTR:; CAT:NONE; SFTY:;
 SFS:(4636009)(39860400002)(366004)(346002)(396003)(136003)(376002)(91956017)(33656002)(76116006)(6512007)(6486002)(478600001)(26005)(54906003)(5660300002)(86362001)(66946007)(53546011)(4326008)(6506007)(66476007)(66446008)(66556008)(64756008)(36756003)(7116003)(71200400001)(2906002)(8676002)(316002)(2616005)(83380400001)(3480700007)(8936002)(6916009)(186003);
 DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="us-ascii"
Content-ID: <5AD287D6EB96E74AACA87367B1C4D7B4@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB3993
Original-Authentication-Results: nxp.com; dkim=none (message not signed)
 header.d=none;nxp.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:;
 IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com;
 PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:;
 SFS:(4636009)(376002)(346002)(396003)(39860400002)(136003)(46966005)(82310400002)(316002)(6486002)(82740400003)(47076004)(356005)(70586007)(81166007)(54906003)(36906005)(478600001)(2906002)(2616005)(5660300002)(83380400001)(33656002)(8936002)(6862004)(6512007)(7116003)(3480700007)(336012)(70206006)(186003)(6506007)(53546011)(86362001)(36756003)(4326008)(8676002)(26005);
 DIR:OUT; SFP:1101; 
X-MS-Office365-Filtering-Correlation-Id-Prvs: 0620a433-d8f4-4f4c-4460-08d81e6e015d
X-Forefront-PRVS: 0452022BE1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: iTJOFe5rY8ezKKe1i+WWUBBVSiRZ1oog8wR9ZbQWdSM46jAS4qanvGKurKvLq+jSJ6yBYYDxnIyrtt4Uao5D9sul6HcnwrIu0MoXtcN0IjWtPl7dOjulZixITbHhTWCh9yfYmmud//BDHp7zakghwWf5e4qprs6lYSD2aSNzOd6sHBr92xnCAjBVLFDhqSU0H+9T3MMVg4pNytPGR3Q+cYU1+uMyCdYOlJVfo6rBDnQetL/shjojqP+vlE8MK7XDTfgFIIOmrXshTWLe4Uil7/4HMKfIUhx49SYGtaXRUnrNDDPVsKAY5vVQt6BSuk+LZDDdNQK2CjZZhsXTpuFimqmr6JLE+GLsKphl47A4RVVmxaiV+1l+urjyuROhsWVJzqGZmAWmuF/OTg/q7FR+pw==
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Jul 2020 09:55:26.9090 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bd18002d-7a5e-4818-dcd4-08d81e6e0c0a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123];
 Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB4992
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: nd <nd@arm.com>, Rahul Singh <Rahul.Singh@arm.com>,
 "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi Anda

> On 2 Jul 2020, at 06:54, Anda-alexandra Dorneanu <anda-alexandra.dorneanu=
@nxp.com> wrote:
>=20
> Hi,
> =20
> I am currently running Xen with SMMU enabled on an ARM64 platform with 4 =
Cortex-A72 cores, GICv2 and SMMUv2. There are SMMU faults when booting Dom0=
, such as:
> =20
>                 [    3.972767] mmc0: sdhci: Resp(XEN) smmu: /soc/iommu@90=
00000: Unhandled context fault: fsr=3D0x402, iova=3D0xea060200, fsynr=3D0x1=
80000, cb=3D0 =20
> =20
> Has someone encountered such problems and can provide some guidelines for=
 SMMU support on Dom0?

This means that the access to 0xea060200 was forbidden by the SMMU.
It also tells you that the DMA master ID of your device is handled by the S=
MMU context bank 0

So first thing to check is if 0xea060200 is a valid guest physical address =
in your Dom0.
Normally Xen should use the same page tables for the SMMU and the dom0 so i=
f something is accessible by the guest it is accessible for the devices ass=
ign to it.
Here the device seem to properly be assigned to dom0 so maybe the driver is=
 trying to hit somewhere invalid ?

Regards
Bertrand

> =20
> Regards,
> Anda



From xen-users-bounces@lists.xenproject.org Thu Jul 02 10:50:07 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 10:50:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqwli-0007Oi-IW; Thu, 02 Jul 2020 10:48:38 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ByM1=AN=gmail.com=siddhuvgowda.18695@srs-us1.protection.inumbo.net>)
 id 1jqwlh-0007Od-Fq
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 10:48:37 +0000
X-Inumbo-ID: 950b1d5c-bc51-11ea-b7bb-bc764e2007e4
Received: from mail-io1-xd33.google.com (unknown [2607:f8b0:4864:20::d33])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 950b1d5c-bc51-11ea-b7bb-bc764e2007e4;
 Thu, 02 Jul 2020 10:48:36 +0000 (UTC)
Received: by mail-io1-xd33.google.com with SMTP id k23so28312291iom.10
 for <xen-users@lists.xenproject.org>; Thu, 02 Jul 2020 03:48:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=6Q62Li9tT0CBJB6GkguNd8wtP3ODIY/r1Nm0jokGEgI=;
 b=c4f622FXqWDTh+ph9kPIiB5Nqg6kyH82HDdI1Nb2gzgullnVBjvMeQgxbTOGnTyWuf
 nMD5hUQSstfGAZVzEN+cFsenVXw+BMqyu6csg6iZrtA6Nu1upSmqJGWG84CvNRqRwgS2
 Ft2UT+oWNhSYQ9yoqX8OkeB47vzomM6TQ52OSMwBNMihLiW146MuKw2Cn2i9xTTwDOf5
 ona1Ih5gz33s1DS0b/s1XG1g2Bk8FYQBfIEjBUmxKa0i7BHRYL1ote8+qd4ugUZz5ZX8
 WO3g3UlQq0beYp+TeCf5GjZz4UHRhL5TlMvDF9e4EMyBOzSdTM9wdcB7MvWL3WJonHR1
 0f9Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=6Q62Li9tT0CBJB6GkguNd8wtP3ODIY/r1Nm0jokGEgI=;
 b=ml6tB6yl2y3pR7vWPQct1LffCVGJAcnLkd5t+D8KgU9jPXFfF56UIpqNaIAwv50KxE
 shA+EXHWS06Wil7v11TnpxLKTK7VvPdaaslGjgF55vGRCLvAr8nRHvLYfs+MXde33c+j
 Tdr0hm+pntmirsVuglVJK/6c++qepLiCtv+QLyciuSHG/lqCexK1SwgQo4bIsAOd/DTL
 PD1xMhmka0XPWueO0EwAe8jcnxRotlygxENIyc5dRi1mj7JVj3LheG4kmgyVf9LexVEg
 aAaVVS4hRORJWwGhg5oSgKAjhKLOAo1Iy/6uFYNSkF7OedhchR6f48f9TRcNEfKYkhTj
 E4tA==
X-Gm-Message-State: AOAM531pvJpo9+D3kmOP+IKsEvvJbH3AJKTJ2fYbtOzbpkhtGu02k1ev
 Y45KT1uOfeo+T2rjU4yQEbmlCvpYwsWI3+0iz/TM6ACFn6o=
X-Google-Smtp-Source: ABdhPJzK77aUbcPBEU2D95v52+/pGcRCmRI7oKDIHZPCAUbUXreaQrD+w/mTZkv/Vk13bjuCmVrjodkgDm8r8PlYOZs=
X-Received: by 2002:a02:a19c:: with SMTP id n28mr33267480jah.13.1593686914886; 
 Thu, 02 Jul 2020 03:48:34 -0700 (PDT)
MIME-Version: 1.0
From: siddhartha v <siddhuvgowda.18695@gmail.com>
Date: Thu, 2 Jul 2020 16:18:22 +0530
Message-ID: <CAEkELtBujnxa_59-F-djJ=HO0=08rZDcmrTtcohePg2+iT191Q@mail.gmail.com>
Subject: Query regarding running Xen on Raspberry-Pi4
To: xen-users@lists.xenproject.org, xen-arm@lists.xensource.com, 
 cardoe@gentoo.org, Bertrand Marquis <Bertrand.Marquis@arm.com>
Content-Type: multipart/alternative; boundary="00000000000071f12005a97326a3"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000071f12005a97326a3
Content-Type: text/plain; charset="UTF-8"

Hello,

    I am trying to run the Xen hypervisor on Raspberry-pi4. I have built
the xen image using yocto without any error.

Below is the log that I got after completing the "bitbake -k
xen-image-minimal" command,

*NOTE: Setscene tasks completedNOTE: Tasks Summary: Attempted 4087 tasks of
which 4087 didn't need to be rerun and all succeeded.*

   But due to COVI-19 I am not having access to RPI4 board (but in next few
days I will be getting the board). So is there any way that I can test the
image?
or
  Can I create the guest domain and test both Dom-0 and Dom-U1
simultaneously later on board?

How can I create the guest domain? Please guide me on this kind request.

--
Thanks and Regards.
Siddhartha V.

--00000000000071f12005a97326a3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello,<div><br></div><div>=C2=A0 =C2=A0 I am trying to run=
 the Xen hypervisor on Raspberry-pi4. I have built the xen image using yoct=
o without any error.</div><div><br></div><div>Below is the log that I got a=
fter completing the &quot;bitbake -k xen-image-minimal&quot; command,</div>=
<div><b>NOTE: Setscene tasks completed<br>NOTE: Tasks Summary: Attempted 40=
87 tasks of which 4087 didn&#39;t need to be rerun and all succeeded.</b><b=
r></div><div><br></div><div>=C2=A0 =C2=A0But due to COVI-19 I am not having=
 access to RPI4 board (but in next few days I will be getting the board). S=
o is there any way that I can test the image?=C2=A0</div><div>or</div><div>=
=C2=A0 Can I create the guest domain and test both Dom-0 and Dom-U1 simulta=
neously later on board?</div><div><br></div><div>How can I create the guest=
 domain? Please guide me on this kind request.</div><div><br></div><div><di=
v><div dir=3D"ltr" class=3D"gmail_signature" data-smartmail=3D"gmail_signat=
ure"><div dir=3D"ltr"><div>--</div><div>Thanks and Regards.</div>Siddhartha=
 V.<div>=C2=A0</div></div></div></div></div></div>

--00000000000071f12005a97326a3--


From xen-users-bounces@lists.xenproject.org Thu Jul 02 11:36:21 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 11:36:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqxVE-00035M-GJ; Thu, 02 Jul 2020 11:35:40 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8fsS=AN=gmail.com=bifferos@srs-us1.protection.inumbo.net>)
 id 1jqxVC-00035H-IG
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 11:35:38 +0000
X-Inumbo-ID: 269a9b84-bc58-11ea-8496-bc764e2007e4
Received: from mail-vk1-xa29.google.com (unknown [2607:f8b0:4864:20::a29])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 269a9b84-bc58-11ea-8496-bc764e2007e4;
 Thu, 02 Jul 2020 11:35:37 +0000 (UTC)
Received: by mail-vk1-xa29.google.com with SMTP id r7so6223878vkf.0
 for <xen-users@lists.xenproject.org>; Thu, 02 Jul 2020 04:35:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=oaRjCiDRwgtT7WMY+8g7CwJ9r9+VRknpumrPAQn5SYQ=;
 b=bSSCmHxrGr4fOTPibZ/4sEBkCAIQZgqRVVh84X6/lNJ7BMXWpi4pmd/Ly3rfp+0N3W
 ipCtv0L9NoGkh7Xan4VfXG4YZthe++KLfdUYVzLHQ2WzufeO/vutnxaJSdtEey76stef
 j8N6doOqYY8a+W0srXavnRFjEe0F5IS/LsaQ1+po8YJudDX1iipDMZO0GYX0BAyEmkPB
 8Goz5cbIwYD4PNIseYSCD3Git+JL2HYBIMf75PdATv8y3geSK8xwP7Mw5XOiWP72Lw8S
 L/e8j0+PdFVRMMtiX9U0I16korRXsuBkxsTTuecqcil9tJ3wva+J3+7qrHcDL2fig1tf
 vghA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=oaRjCiDRwgtT7WMY+8g7CwJ9r9+VRknpumrPAQn5SYQ=;
 b=JEmo9aZ+7+L6fo8Gt6R+eI2AAsnW5eBMHQqUCzDcnjfF9WX3HU1/IKtd0X7sc4BRj4
 H9IGI4F8xfCIRjNCMg+sNrYUk2ilW7G88Ir468tgXzHKsUCMxfL6HWsucj83FKPdqaB+
 0x2rsnpGSC+13ouvcYe2xDCy/Yv9MUIiy5jjqnODcikfjYkNjwlImDmDXkOQkUD2GofQ
 +gLhYsXoGNEK2cj1pi2DbnWzMFQTtzeWNNQeoyEfEVFKQdvOCyBHzpokAx8cjAvv0YIG
 IPSDbdqKEJ9aE6SEe34ofMa67nS9L62pyukKXs1WCkj8oI3g8xDTXgq3o/hr2BPcWdA/
 8DaA==
X-Gm-Message-State: AOAM532+JsUXVYBm6LPen2hnbw5UhBPDLsz4LLqu3Iddq92kavIRZNnE
 peelixPxcu3i/+KQo1gZ1dK8dK2/C676W2tlSlXavg==
X-Google-Smtp-Source: ABdhPJx/J0aIE3w+jqkgRZEbjg3L+XURAGe8Pue7HM87k08SPONI1/XdRBzGNkDjjE5cs4krQnlRj4D8XOHT0oIj35M=
X-Received: by 2002:a1f:8c55:: with SMTP id o82mr4935254vkd.18.1593689737455; 
 Thu, 02 Jul 2020 04:35:37 -0700 (PDT)
MIME-Version: 1.0
From: Biff Eros <bifferos@gmail.com>
Date: Thu, 2 Jul 2020 12:00:25 +0000
Message-ID: <CAOcM_b=d7Fo+hH65OFi64_tK1bjDph04BMcu0z4c7aeF1t5Q8w@mail.gmail.com>
Subject: Still struggling to understand Xen
To: xen-users@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Xen seems to be different to most other forms of virtualisation in the
way it presents hardware to the guest.  For so-called HVM guests I
understand everything:

Hypervisor in conjunction with dom0 provides disk and network devices
on PCI busses that can be viewed, enumerated with standard
off-the-shelf Linux drivers and tools.  This is all good.  My
confusion kicks in when the subject of PV drivers comes up.

>From what I understand (not clearly documented anywhere that I could
find) the hypervisor/dom0 combination somehow switches mode in
response to something the DomU guest does.  What exactly?  Don't know.
But by the time you've booted using the HVM hardware it seems the door
is shut, and any attempt to load front-end drivers will then result in
'device not found' messages or whatever.  That is, assuming my kernel
is configured correctly.

So this is presumably why most guests 'connect' to the PV back-end in
the initrd.  I couldn't really understand if it's the loading of the
conventional SCSI driver, or the detection of a SCSI device, or the
opening of a conventional SCSI device to mount as root that shuts the
above 'door'.  Unfortunately there isn't much documentation about
kernel configurations for Xen and what documentation I found seemed to
be out of date.

It's also unclear to me if the back-end drivers in a typical dom0 that
you might get from for example XCP-ng, or XenServer, or even AWS can
somehow be incompatible with the latest and greatest domU Linux
kernels.  Is there some kind of interface versioning or are all
versions forward and backward compatible?

I've been through pretty much all drivers related to Xen, compiled
them into my kernel and selected /dev/xvda1 device on boot, but it's
still not working for me, the Xen 'hardware' is not being detected, so
would appreciate any guidance you can offer.

Regards,
Mark.


From xen-users-bounces@lists.xenproject.org Thu Jul 02 12:18:48 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 12:18:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqy9U-0006Zn-8m; Thu, 02 Jul 2020 12:17:16 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=DrmV=AN=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1jqy9S-0006Zi-Qy
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 12:17:14 +0000
X-Inumbo-ID: f40c08f0-bc5d-11ea-8818-12813bfff9fa
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id f40c08f0-bc5d-11ea-8818-12813bfff9fa;
 Thu, 02 Jul 2020 12:17:10 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.221.27])
 by mx2.suse.de (Postfix) with ESMTP id C5DEBB3327;
 Thu,  2 Jul 2020 12:17:09 +0000 (UTC)
Subject: Re: Still struggling to understand Xen
To: Biff Eros <bifferos@gmail.com>, xen-users@lists.xenproject.org
References: <CAOcM_b=d7Fo+hH65OFi64_tK1bjDph04BMcu0z4c7aeF1t5Q8w@mail.gmail.com>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <844657c3-da3b-3f60-4792-ffc4824241e1@suse.com>
Date: Thu, 2 Jul 2020 14:11:09 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <CAOcM_b=d7Fo+hH65OFi64_tK1bjDph04BMcu0z4c7aeF1t5Q8w@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 02.07.20 14:00, Biff Eros wrote:
> Xen seems to be different to most other forms of virtualisation in the
> way it presents hardware to the guest.  For so-called HVM guests I
> understand everything:
> 
> Hypervisor in conjunction with dom0 provides disk and network devices
> on PCI busses that can be viewed, enumerated with standard
> off-the-shelf Linux drivers and tools.  This is all good.  My
> confusion kicks in when the subject of PV drivers comes up.
> 
>  From what I understand (not clearly documented anywhere that I could
> find) the hypervisor/dom0 combination somehow switches mode in
> response to something the DomU guest does.  What exactly?  Don't know.
> But by the time you've booted using the HVM hardware it seems the door
> is shut, and any attempt to load front-end drivers will then result in
> 'device not found' messages or whatever.  That is, assuming my kernel
> is configured correctly.
> 
> So this is presumably why most guests 'connect' to the PV back-end in
> the initrd.  I couldn't really understand if it's the loading of the
> conventional SCSI driver, or the detection of a SCSI device, or the
> opening of a conventional SCSI device to mount as root that shuts the
> above 'door'.  Unfortunately there isn't much documentation about
> kernel configurations for Xen and what documentation I found seemed to
> be out of date.

A typical HVM domain is booted with emulated devices being active (e.g.
hda, hdb, ...). The switch to pv devices is normally done before
mounting root in order to mount root on the pv device (for performance
reasons).

In case pv-devices are active the guest kernel will write to a special
IO-port emulated by qemu in order to deactivate the emulated devices.
This makes sure there are no ambiguous devices (otherwise each device
with a pv-driver would show up twice, once via the original driver and
once via the pv-driver). Disconnecting the emulated devices can be
avoided via the guest kernel boot parameter "xen_emul_unplug".

New pv-devices can be added at runtime, but they need to be assigned to
the guest from dom0 before. New devices and their parameters are
advertised via Xenstore (you need the xenbus driver for that purpose in
the guest).

> It's also unclear to me if the back-end drivers in a typical dom0 that
> you might get from for example XCP-ng, or XenServer, or even AWS can
> somehow be incompatible with the latest and greatest domU Linux
> kernels.  Is there some kind of interface versioning or are all
> versions forward and backward compatible?

The basic protocol is compatible, some features are advertised by the
backend in Xenstore, the frontend knows that way which features are
allowed. The frontend will then set feature values in Xenstore to tell
the backend how it wants to operate the device.

> I've been through pretty much all drivers related to Xen, compiled
> them into my kernel and selected /dev/xvda1 device on boot, but it's
> still not working for me, the Xen 'hardware' is not being detected, so
> would appreciate any guidance you can offer.

Are you using Linux or another OS?

In Linux you need to use the xen pci device (see the source
drivers/xen/platform-pci.c in the kernel tree). platform_pci_probe()
contains all function calls to initialize the basic environment for
pv-drivers.


Juergen


From xen-users-bounces@lists.xenproject.org Thu Jul 02 12:20:12 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 12:20:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jqyC4-0006iQ-SU; Thu, 02 Jul 2020 12:19:56 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=EGka=AN=syndicat.com=nd@srs-us1.protection.inumbo.net>)
 id 1jqyC2-0006iJ-Vh
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 12:19:55 +0000
X-Inumbo-ID: 55330cdc-bc5e-11ea-8818-12813bfff9fa
Received: from mail.syndicat.com (unknown [62.146.89.62])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 55330cdc-bc5e-11ea-8818-12813bfff9fa;
 Thu, 02 Jul 2020 12:19:53 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=syndicat.com; s=x; h=Content-Type:Content-Transfer-Encoding:MIME-Version:
 References:In-Reply-To:Message-ID:Date:Subject:To:From:Sender:Reply-To:Cc:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=qOmsrn0S3nJjvTxgdlW7Zy5kBmQ/+ku9Fo2d9fShxbU=; b=vJW3Zze0r6l7r4l1i4YN36++Zt
 4xM08IiX1VRyNyP2HeVeVTRYICgl69z3MuBHpTk0PJID0TLi7kx7Ako/XkKh1XNNLHfqfgZR02LBx
 DbXfTDTW72xxKHU2p0TnDsM8FESRzAoy8yOyLSjRYZ2QM4GCPguSQZYf9aGhtKjchl5g=;
Received: from localhost ([127.0.0.1]:63322)
 by mail.syndicat.com with esmtp (Syndicat PostHamster 4.92.2)
 (envelope-from <nd@syndicat.com>) id 1jqyC0-0004j8-Rl
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 14:19:52 +0200
X-Virus-Scanned: amavisd-new at syndicat.com
Received: from mail.syndicat.com ([127.0.0.1])
 by localhost (mail.syndicat.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id QerGlonTf2Rg for <xen-users@lists.xenproject.org>;
 Thu,  2 Jul 2020 14:19:52 +0200 (CEST)
Received: from p57949245.dip0.t-ipconnect.de ([87.148.146.69]:49034
 helo=gongo.localnet)
 by mail.syndicat.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 (Syndicat PostHamster 4.92.2) (envelope-from <nd@syndicat.com>)
 id 1jqyC0-00018F-HT
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 14:19:52 +0200
From: Niels Dettenbach <nd@syndicat.com>
To: xen-users@lists.xenproject.org
Subject: Re: Still struggling to understand Xen
Date: Thu, 02 Jul 2020 14:19:53 +0200
Message-ID: <1686870.3VsfAaAtOV@gongo>
Organization: Syndicat IT&Internet
In-Reply-To: <CAOcM_b=d7Fo+hH65OFi64_tK1bjDph04BMcu0z4c7aeF1t5Q8w@mail.gmail.com>
References: <CAOcM_b=d7Fo+hH65OFi64_tK1bjDph04BMcu0z4c7aeF1t5Q8w@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="iso-8859-1"
X-Report-Abuse-To: abuse@syndicat.com (see
 https://www.syndicat.com/kontakt/kontakte/)
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.syndicat.com
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Sender Address Domain - syndicat.com
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Thu Jul 02 18:19:52 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 02 Jul 2020 18:19:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jr3mx-0004M2-V2; Thu, 02 Jul 2020 18:18:23 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=n3as=AN=telus.net=davehill@srs-us1.protection.inumbo.net>)
 id 1jr3mw-0004Lx-7Y
 for xen-users@lists.xenproject.org; Thu, 02 Jul 2020 18:18:22 +0000
X-Inumbo-ID: 6885ee08-bc90-11ea-bca7-bc764e2007e4
Received: from cmta18.telus.net (unknown [209.171.16.91])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 6885ee08-bc90-11ea-bca7-bc764e2007e4;
 Thu, 02 Jul 2020 18:18:20 +0000 (UTC)
Received: from [192.168.2.13] ([173.181.74.129]) by cmsmtp with SMTP
 id r3mrjoBw2MrGrr3mtjkZM5; Thu, 02 Jul 2020 12:18:19 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telus.net; s=neo;
 t=1593713900; bh=nXJf1RXmwkJoLTCjwWY5z2Mp3H5vliDd4JVFHvEh22g=;
 h=Subject:To:References:From:Date:In-Reply-To;
 b=5DNLJ0nMKW1VlrgtoQithB9MMuUxpJzZBdwGvBgTIlvXb/29mP+0aePzX+MtYO1Xp
 I8gUzmmbOKgMMBdJ87g1vvErRYpbwIA3WrPOE8HcPyXo1pjGAXK8YYOm4Dj+OXwPu0
 tN4Db+DoKbEsGWy6VhppKzJaKx4aLcBIOZhVXAG/Ish+Abp/S1wr3z0JOdtHXMVwSW
 EdqS40jkkkGrjj4dGtm1zSe0Zn4Fil1Gp4lT4xsgiHwYSE+9SsmgK2JNZHENRRzCW0
 1kfZJfjrJdQ2jyUGwAAvouTzhYbaMbPYRHtXjg9XcClslU/52jh7XIpcoKMO7gK0J5
 IKoEK3DU3YUPg==
X-Telus-Authed: ZGF2ZWhpbGxAdGVsdXMubmV0
X-Authority-Analysis: v=2.3 cv=A+ASwJeG c=1 sm=1 tr=0
 a=dDDs8EMPbAqg94jd+XLA8Q==:117 a=dDDs8EMPbAqg94jd+XLA8Q==:17
 a=r77TgQKjGQsHNAKrUKIA:9 a=uiP1uUyZAAAA:8 a=cWRNjhkoAAAA:8
 a=eZe3g8FOgScVyalsP_0A:9 a=4v4fbyY-7Gmq0vBg:21 a=9e4vS4bwSH0atilX:21
 a=QEXdDO2ut3YA:10 a=DQ3f93sLa-MA:10 a=0ihBN3TAs8QA:10 a=pGLkceISAAAA:8
 a=mhtuEIae01XRyA9h7sQA:9 a=XV9xvRuRI1Rgz_-9:21 a=42CBV_Om2s9ozjbO:21
 a=gyW6YcEII6kvtcOS:21 a=_W_S_7VecoQA:10 a=I89kBbIT3Nu-9ELGRO8V:22
 a=sVa6W5Aao32NNC1mekxh:22
Subject: Re: Can't access USBs from DomU
To: xen-users@lists.xenproject.org
References: <67b8e221-0f0f-cf1a-9f78-29fd8368529d@gmail.com>
From: Dave Hill <davehill@telus.net>
Message-ID: <62090b71-2a7d-8265-bffa-94e9c9601db3@telus.net>
Date: Thu, 2 Jul 2020 11:18:17 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <67b8e221-0f0f-cf1a-9f78-29fd8368529d@gmail.com>
Content-Type: multipart/alternative;
 boundary="------------F4F4E45BC0932B87A8B159A9"
Content-Language: en-US
X-CMAE-Envelope: MS4wfP/YE/XiVoW7L762j476ZeLsw4mGTOuSpMJ6ocKJcTc3/I852jDlwcjZiUQB+ZJE+3Rbslkf0tldm3IKFGVIb7GIl1fqergYWdtb10HtQKEz/4ZrnxvR
 I8BrcqRvWX+Y6NO3cHcasEXs3pBdTQrqmgKn4xer3Aa7uCNdNVF+gv0N4Aewr4UZ1kwKsNFm+RX0Hw==
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------F4F4E45BC0932B87A8B159A9
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit


On 2020-07-01 1:32 a.m., Martin Hargreaves wrote:
>
> Thank you for responding, David.
>
> Yes, I have been using the link you recommended in order to gain 
> access to the USBs. It appears on Dom0 to have worked okay but I 
> simply can't 'see' the USB on my para-virtualization VM. Thank you for 
> the www.spice-space.org link; I'll look into that.
>
>    Martin..
>
>
> On 2020-06-25 8:56 a.m., hargreaves martin wrote:
>
> A very quick question (hopefully).
>
> On Dom0, I can attach my USBs.
>
> $ sudo xl usbdev-attach ubud1 hostbus=2 hostaddr=36
>
> $ sudo xl usb-list 5
>
> Devid Type BE state usb-ver ports
>
> 0 qusb 0 1 2 8
>
> Port 1: Bus 002 Device 025
>
> Port 2: Bus 002 Device 024
>
> Port 3:
>
> …
>
> But I can’t see them in my DomU (Ubuntu). Any suggestions?
>
> Any help would be very much appreciated.
>
> Martin..
>
> I don't do it that way anymore (I use SPICE instead), but the Xen USB 
> Passthrough page helped me when I was trying to figure out how to do 
> it the way you are now: 
> https://wiki.xenproject.org/wiki/Xen_USB_Passthrough
>
> Regards,
>
> David
>
Hi Martin,

Sorry - I should have mentioned that, AFAIK, SPICE is only for use with 
hvm domUs, which all of mine are.

I found the Spice documentation a bit hard to dig through (Spice for 
Newbies felt like a Masters-level course :-).

In case it might save you some time and effort, FWIW, here is my 
understanding of Spice basics .

Spice has three pieces - a Spice server, one or more guest domUs running 
the spice agent software, and one or more sessions of a Spice 
viewer/client. They interact using the Spice protocol.

SERVER
Recent releases of major Linux distributions already have the server 
component, libspice, available. I  run my dom0 on Debian 10 and run the 
Spice server there. I didn't have to do anything special to get the 
Spice server running. (It could be I installed one or more of the 
libspice-server packages using the package manager). What I mean is that 
I didn't have to build an upstream version of qemu as I thought I might 
after reading the (very helpful) Xen page about Spice:
https://wiki.xenproject.org/wiki/SPICE_support_in_Xen

GUESTS
Linux
I add
pci=nomsi
to the kernel boot line as recommended on the Xen page.

When first creating a Linux domU, I connect via vnc to check for the 
spice agent software, vdagent, and install it if it's not already in.

I use the Spice section of sample xl configuration file from the Xen 
page as well - it works fine for me.  Some of the other configuration 
choices there don't work for me so I modify other parts of the sample file.

I believe it's still true that qxl doesn't work for Linux-based domUs, 
so in the domU .cfg files I have:
#VIDEO
videoram                = 128
vga                     = 'stdvga'

Windows
For a Windows domU, the vdagent software is available from the Windows 
binaries subsection of the Guest section on the spice-space download page:
https://www.spice-space.org/download.html

The page says:
This installer contains some optional drivers and services that can be 
installed in Windows guest to improve SPICE performance and integration. 
This includes the qxl video driver and the SPICE guest agent (for copy 
and paste, automatic resolution switching, ...)

I'm not sure how the options are accessed or configured - there doesn't 
seem to be a Spice-tools executable. I don't have the qxl component 
working at this point - just haven't had the motivation to look for it 
as I use the Windows domU infrequently - so I have
vga                     = 'stdvga'
in the Windows .cfg file as well.

I use a modified version of the sample xl.cfg lines from the Xen page 
for Windows too.  I note that I had to change viridian= from 1 to 0. 
With viridian=1, my Windows 10 machine wouldn't boot.

VIEWER/CLIENT
Finally, the viewer software (the actual magic in all of this) is 
available from the Spice downloads page as well, and (at least on 
Debian) from the distribution package manager. As you may already have 
seen, there are several options here. I use virt-viewer because it suits 
my needs - haven't tried the others. I find it a little unstable - the 
viewer has some problem with mouse clicks that seems to cause it to shut 
down from time to time.

One handy feature of virt-viewer is that it will also connect via vnc 
protocol, by replacing:
spice://192,168.x.x:6000 (or whathaveyou)
with:
vnc://192,168.x.x:6000

Once I have all of the above, it's simple to redirect a USB device to a 
domU through the File menu of virt-viewer, so long as there is some 
number of ports set out for redirect in the xl.cfg file, like:
spiceusbredirection=4


I hope you haven't independently discovered all of this already, but, if 
you have, I'd appreciate hearing of any errors in the above, as it's 
been a while since I actually went through it.

Regards,

David


--------------F4F4E45BC0932B87A8B159A9
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <br>
    <div class="moz-cite-prefix">On 2020-07-01 1:32 a.m., Martin
      Hargreaves wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:67b8e221-0f0f-cf1a-9f78-29fd8368529d@gmail.com">
      <meta http-equiv="content-type" content="text/html; charset=UTF-8">
      <div id="body" class="messagebody">
        <div class="pws">
          <p>Thank you for responding, David.</p>
          <p>Yes, I have been using the link you recommended in order to
            gain access to the USBs. It appears on Dom0 to have worked
            okay but I simply can't 'see' the USB on my
            para-virtualization VM. Thank you for the  <a
              class="moz-txt-link-abbreviated"
              href="http://www.spice-space.org" moz-do-not-send="true">www.spice-space.org</a>
            link; I'll look into that.</p>
          <p>   Martin..<br>
          </p>
          <p><br>
          </p>
          <p>On 2020-06-25 8:56 a.m., hargreaves martin wrote: </p>
          <div class="quote quote-1">
            <p> A very quick question (hopefully). </p>
            <p>On Dom0, I can attach my USBs. </p>
            <p>$ sudo xl usbdev-attach ubud1 hostbus=2 hostaddr=36 </p>
            <p>$ sudo xl usb-list 5 </p>
            <p>Devid Type BE state usb-ver ports </p>
            <p>0 qusb 0 1 2 8 </p>
            <p>Port 1: Bus 002 Device 025 </p>
            <p>Port 2: Bus 002 Device 024 </p>
            <p>Port 3: </p>
            <p>… </p>
            <p>But I can’t see them in my DomU (Ubuntu). Any
              suggestions? </p>
            <p>Any help would be very much appreciated. </p>
            <p>Martin.. </p>
          </div>
          <p>I don't do it that way anymore (I use SPICE instead), but
            the Xen USB Passthrough page helped me when I was trying to
            figure out how to do it the way you are now: <a
              class="exlink mklink"
              href="https://wiki.xenproject.org/wiki/Xen_USB_Passthrough"
              rel="nofollow" moz-do-not-send="true">https://wiki.xenproject.org/wiki/Xen_USB_Passthrough</a>
          </p>
          <p>Regards, </p>
          <p>David </p>
        </div>
      </div>
    </blockquote>
    <p><font face="Helvetica, Arial, sans-serif">Hi Martin,</font></p>
    <p><font face="Helvetica, Arial, sans-serif">Sorry - I should have
        mentioned that, AFAIK, SPICE is only for use with hvm domUs,
        which all of mine are.  <br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">I found the Spice
        documentation a bit hard to dig through (Spice for Newbies felt
        like a Masters-level course :-). <br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">In case it might save
        you some time and effort, FWIW, here is my understanding of
        Spice basics . <br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">Spice has three pieces
        - a Spice server, one or more guest domUs running the spice
        agent software,
        and one or more sessions of a Spice viewer/client. They interact
        using the Spice protocol.</font></p>
    <p><font face="Helvetica, Arial, sans-serif">SERVER<br>
        Recent releases of major Linux distributions already have the
        server component, libspice, available. I  run my dom0 on Debian
        10 and run the Spice server there. I didn't have to do anything
        special to get the Spice server running. (It could be I
        installed one or more of the libspice-server packages using the
        package manager). What I mean is that I didn't have to build an
        upstream version of qemu as I thought I might after reading the
        (very helpful) Xen page about Spice:<br>
        <a class="moz-txt-link-freetext" href="https://wiki.xenproject.org/wiki/SPICE_support_in_Xen">https://wiki.xenproject.org/wiki/SPICE_support_in_Xen</a></font></p>
    <p><font face="Helvetica, Arial, sans-serif">GUESTS<br>
        Linux<br>
        I add<br>
        pci=nomsi<br>
        to the kernel boot line as recommended on the Xen page.<br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">When first creating a
        Linux domU, I connect via vnc to check for the spice agent
        software, vdagent, and install it if it's not already in. <br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">I use the Spice section
        of sample xl configuration file from the Xen page as well - it
        works fine for me.  Some of the other configuration choices
        there don't work for me so I modify other parts of the sample
        file.<br>
      </font></p>
    <p><font face="Helvetica, Arial, sans-serif">I believe it's still
        true that qxl doesn't work for Linux-based domUs, so in the domU
        .cfg files I have:<br>
        #VIDEO<br>
        videoram                = 128<br>
        vga                     = 'stdvga'</font></p>
    <p><font face="Helvetica, Arial, sans-serif"><font face="Helvetica,
          Arial, sans-serif">Windows<br>
          For a Windows domU, the vdagent software is available from the
          Windows binaries subsection of the Guest section on the
          spice-space download page:<br>
          <a class="moz-txt-link-freetext" href="https://www.spice-space.org/download.html">https://www.spice-space.org/download.html</a></font></font></p>
    <p><font face="Helvetica, Arial, sans-serif"><font face="Helvetica,
          Arial, sans-serif">The page says:<br>
        </font></font><font face="Helvetica, Arial, sans-serif"><font
          face="Helvetica, Arial, sans-serif">This installer contains
          some optional drivers and services that can be installed in
          Windows guest to improve SPICE performance and integration.
          This includes the qxl video driver and the SPICE guest agent
          (for copy and paste, automatic resolution switching, ...)</font></font></p>
    <p><font face="Helvetica, Arial, sans-serif"><font face="Helvetica,
          Arial, sans-serif">I'm not sure how the options are accessed
          or configured - there doesn't seem to be a Spice-tools
          executable. I don't have the qxl component working at this
          point - just haven't had the motivation to look for it as I
          use the Windows domU infrequently - so I have </font><br>
        vga                     = 'stdvga'<br>
        in the Windows .cfg file as well.</font></p>
    <p><font face="Helvetica, Arial, sans-serif">I use a modified
        version of the sample xl.cfg lines from the Xen page for Windows
        too.  I note that I had to change viridian= from 1 to 0. With
        viridian=1, my Windows 10 machine wouldn't boot. <br>
      </font></p>
    <p>VIEWER/CLIENT<br>
      Finally, the viewer software (the actual magic in all of this) is
      available from the Spice downloads page as well, and (at least on
      Debian) from the distribution package manager. As you may already
      have seen, there are several options here. I use virt-viewer
      because it suits my needs - haven't tried the others. I find it a
      little unstable - the viewer has some problem with mouse clicks
      that seems to cause it to shut down from time to time. <br>
    </p>
    <p>One handy feature of virt-viewer is that it will also connect via
      vnc protocol, by replacing:<br>
      spice://192,168.x.x:6000 (or whathaveyou) <br>
      with:<br>
      vnc://192,168.x.x:6000</p>
    <p>Once I have all of the above, it's simple to redirect a USB
      device to a domU through the File menu of virt-viewer, so long as
      there is some number of ports set out for redirect in the xl.cfg
      file, like:<br>
      spiceusbredirection=4</p>
    <p><br>
      I hope you haven't independently discovered all of this already,
      but, if you have, I'd appreciate hearing of any errors in the
      above, as it's been a while since I actually went through it.</p>
    <p>Regards,</p>
    <p>David</p>
  </body>
</html>

--------------F4F4E45BC0932B87A8B159A9--


From xen-users-bounces@lists.xenproject.org Sat Jul 04 19:32:31 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 04 Jul 2020 19:32:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jrnsJ-00060L-GA; Sat, 04 Jul 2020 19:30:59 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jLyC=AP=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1jrnsH-00060G-HZ
 for xen-users@lists.xenproject.org; Sat, 04 Jul 2020 19:30:57 +0000
X-Inumbo-ID: e1fe534a-be2c-11ea-8496-bc764e2007e4
Received: from sonic312-21.consmr.mail.bf2.yahoo.com (unknown [74.6.128.83])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id e1fe534a-be2c-11ea-8496-bc764e2007e4;
 Sat, 04 Jul 2020 19:30:57 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1593891056; bh=EusAEj1gr5pxro3tVbYkgJ/lEELGPgQgPqY64+vDhZg=;
 h=Date:From:Reply-To:To:Subject:References:From:Subject;
 b=HfWozHxorPnDcWIYj5SvBrrDuJSm2kPjlpTk3yDJLjnCeMRr75HqXnqL47+ww+9SnMEz5Lz02syPRxOE8OqrRyi9M+eRMYL34vu3tYEikE7PwIF9QtY4ablTug9ptUQrxRkFZh69sgq1Tj3i6T+LNeBF5gjYb9S/UZUfwULk/UqTOQaQYyb25a5nK2RUrEa3rrNl3OhsX/U7s4a3BG7WurLYAIDiADz7/yyJPYLhpxmFBlkSfEwe9CeKe+GP27RpAG0ajGix8pwtPKgbfkHwj7etGMSnTXFeIG78Pk6ePu4ORhKh0e4Vkj55K3/zdWY9OHis3T2174y78W70hTKfZg==
X-YMail-OSG: Upx73rAVM1mvfBm7ZR6i7BHSdhx_6pwNEDB3Tx04ZqgE4IvDttGinhaXhkt.9KC
 fAtvxOqqBAqkwdUgkdewYoVADlCLIlxyRmQ5WbpfQKvcS5fNkj6_wQ9E5ouY6sS1zUsJZxknLqpS
 A4r7Yz7ASSvRifc5H5jvUgQjIISsh346p5vX3tE7nKyRK48TlAh.8C9l06hBrZk5Gt_iCOMEgmYP
 vxheCvOJF.pY6i8GgTPWwfDBZnUV2AL8k9ztOQSUkbl4k5d7c69Rniv0AsleU1RRkJbVRwUUpM3b
 2uKUgZSb9ArYtwl6vXEw29EiwDlXoa.9FB9o0nSNP8WuH1xUbgInd.ZRntstb4d1cu3RHjhohuhQ
 EBrtiD20CBHqpzDL9kNix9CV3WiMDmHgWATbFMl9UMC5bvJCDJzFMvktC8x_XQN24mepZtKbtnBP
 cdlBh4ChhqqXT4QLJZVdF85YYaE_17S6COD0dA_GVL8PvR_zA7jSV5sXfQId4og81a57vy92jrjz
 cFeWHT5aZgFw0iN4CYXA52GQ_7MSqeIv2J4w2mVBdrxAVtS5q0tdp8X6eg7cbdgj_pEKvGeg7e8k
 dAD8gzF1IA.QtLsQSE_nZAL1NcF9bxjrwL6nSy2Y6IKxpiNkMKqgKYNML_SieRnHBGk_NZsm8vrY
 puqYGYh_x.qeLrPE3cXjtqFEaMj50zbLAVY3dU9s64quB4JzsdhhXVYp0N9IU2Nos1wIf4KLUhbw
 B3hzJnlitCwbGQr3ZlCDOe3_xgTYaZnTlbyiHHB0cSa3cYoPw7wVyr.hfFLuEC4Ll1OTd4P8wGVa
 FT9Az6KCITYqpq0vGuKL6UdCFCLBwohB8vZeBDhNvAFNR3wSC0W5A2_5h1ZFXq8sEiTZTK..Jdq2
 bDpVX.6_hx2uv_kBBb3PiWZVsI46jPxi.0ikK67uE7EhobxhZ_MVM9IAYZd4lEhBu9Tp7uJps6tI
 6Cvsp_sVJBwOsyQUbBiNmnOdAk5le9rk4Xq5aMAzxqJtm3uaAUQuBTEnT82_C1ZiNy5ecXmzXXpo
 l4nS6Ixz6HQi9fJQc_K4eDnH5NQMUKKj_WEtp1iF7_tpvX4htpoFTTkkGhIDyVSCele37dqAt12y
 cG.U8J6VKiHIpvkT677go2pf9_VxHWEeYDkg42L3dNihSg5_Ct4Fs0P6m_HpZOEGqNGznqpISxXk
 _6IedbIt4yn7g8sVFuGT1QR.kgcSqiDdJwVZhscFBY2xBg5sgbkcom2cmsbda3LRD7TNjDfpW1az
 Pik0_rRGoCiWocXfQrSZCuG57QVJ1qouWQqxAyvJbEbf45BSSwb_h.anzevCb95kjSQpC.3yyQYg
 p1iMaXVbaH7HmmQ3tz9.kCH9STQu8jNF0I8XKn5OhPDjK7qMTrBBgFtC84onqtWIaNROTl0RyTJb
 ucEUmt4HASVzXdibMW2rCBAJHAbapoklBQLGmcyDU6SkZD8_eagGtuR1EhidJcr7BDAQYKbBaaFU
 WmncxaAQg3yU0OLrg4OMJb9QTnP8EJxz3QNZZ
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic312.consmr.mail.bf2.yahoo.com with HTTP; Sat, 4 Jul 2020 19:30:56 +0000
Date: Sat, 4 Jul 2020 19:30:52 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: Xen-users <xen-users@lists.xenproject.org>
Message-ID: <209025853.908348.1593891052840@mail.yahoo.com>
Subject: Dom0-less
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_908347_2123245391.1593891052839"
References: <209025853.908348.1593891052840.ref@mail.yahoo.com>
X-Mailer: WebService/1.1.16197 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 979
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_908347_2123245391.1593891052839
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,In a slide about dom0-less (https://www.slideshare.net/mobile/xen_com_mgr/xpdds19-keynote-xen-dom0less-stefano-stabellini-principal-engineer-xilinx), why just CPU mentioned? How about other hardware like Memory, NIC, Disk and...?

Thanks.
------=_Part_908347_2123245391.1593891052839
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,<div id="yMail_cursorElementTracker_1593890920634">In a slide about dom0-less (https://www.slideshare.net/mobile/xen_com_mgr/xpdds19-keynote-xen-dom0less-stefano-stabellini-principal-engineer-xilinx), why just CPU mentioned? How about other hardware like Memory, NIC, Disk and...?<br id="yMail_cursorElementTracker_1593890916924"><div id="ymail_android_signature"><br></div><div id="yMail_cursorElementTracker_1593891030614">Thanks.</div></div>
------=_Part_908347_2123245391.1593891052839--


From xen-users-bounces@lists.xenproject.org Sun Jul 05 10:55:54 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 05 Jul 2020 10:55:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1js2IH-00089z-LQ; Sun, 05 Jul 2020 10:54:45 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=uSfh=AQ=in.bosch.com=manikandan.chockalingam@srs-us1.protection.inumbo.net>)
 id 1js2IF-00089s-GB
 for xen-users@lists.xenproject.org; Sun, 05 Jul 2020 10:54:44 +0000
X-Inumbo-ID: ec897386-bead-11ea-8496-bc764e2007e4
Received: from de-out1.bosch-org.com (unknown [139.15.230.186])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id ec897386-bead-11ea-8496-bc764e2007e4;
 Sun, 05 Jul 2020 10:54:40 +0000 (UTC)
Received: from si0vm1948.rbesz01.com
 (lb41g3-ha-dmz-psi-sl1-mailout.fe.ssn.bosch.com [139.15.230.188])
 by si0vms0217.rbdmz01.com (Postfix) with ESMTPS id 4B05Dv0bxKz4f3lwL
 for <xen-users@lists.xenproject.org>; Sun,  5 Jul 2020 12:54:39 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=in.bosch.com;
 s=key1-intmail; t=1593946479;
 bh=4XW0biTedxXEHeCWgD27QGwxg2hPwXF6aZcjzBPkSdk=; l=10;
 h=From:Subject:From:Reply-To:Sender;
 b=BC1evx3rBpGsLQUGBbT8y+ELrD6gA4H1i/LGGf4ArfBXAZ1CK3jkqU6wPnlqi9RAw
 lRxgHIOye9xx2ykuLAJpWfe+1aZ0wGt3jGF1XUeUvdPMKyZpLxzl1VRLt3BvZ+GsoB
 ZuRGEAYV7Otpm2eES9CLd+pQ6vjImIKM43jLk+1k=
Received: from si0vm4642.rbesz01.com (unknown [10.58.172.176])
 by si0vm1948.rbesz01.com (Postfix) with ESMTPS id 4B05Dv0BNgz3B3
 for <xen-users@lists.xenproject.org>; Sun,  5 Jul 2020 12:54:39 +0200 (CEST)
X-AuditID: 0a3aad12-235ff700000028b1-4f-5f01b16e6bb8
Received: from si0vm1949.rbesz01.com ( [10.58.173.29])
 (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by si0vm4642.rbesz01.com (SMG Outbound) with SMTP id DB.00.10417.E61B10F5;
 Sun,  5 Jul 2020 12:54:38 +0200 (CEST)
Received: from FE-MBX2033.de.bosch.com (fe-mbx2033.de.bosch.com [10.3.231.43])
 by si0vm1949.rbesz01.com (Postfix) with ESMTPS id 4B05Dt5vPnz6CjZNx
 for <xen-users@lists.xenproject.org>;
 Sun,  5 Jul 2020 12:54:38 +0200 (CEST)
Received: from SGPMBX2022.APAC.bosch.com (10.187.83.37) by
 FE-MBX2033.de.bosch.com (10.3.231.43) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.1979.3; Sun, 5 Jul 2020 12:54:38 +0200
Received: from SGPMBX2022.APAC.bosch.com (10.187.83.37) by
 SGPMBX2022.APAC.bosch.com (10.187.83.37) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.1979.3; Sun, 5 Jul 2020 18:54:36 +0800
Received: from SGPMBX2022.APAC.bosch.com ([fe80::2d4d:b176:b210:896]) by
 SGPMBX2022.APAC.bosch.com ([fe80::2d4d:b176:b210:896%6]) with mapi id
 15.01.1979.003; Sun, 5 Jul 2020 18:54:36 +0800
From: "Manikandan Chockalingam (RBEI/ECF3)"
 <Manikandan.Chockalingam@in.bosch.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: Xen on RCAR
Thread-Topic: Xen on RCAR
Thread-Index: AdZSuLBWVKyIre8+SkaGW4KytBr6ew==
Date: Sun, 5 Jul 2020 10:54:36 +0000
Message-ID: <aea652c74d2a4901b9438dbb2a057540@in.bosch.com>
Accept-Language: en-US, en-SG
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.187.56.210]
Content-Type: multipart/alternative;
 boundary="_000_aea652c74d2a4901b9438dbb2a057540inboschcom_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpkkeLIzCtJLcpLzFFi42Lhslorq5u3kTHeYM4Kc4t3+/4yOzB6HP5w
 hSWAMYrLJiU1J7MstUjfLoErY9X0eewF8zUqHi2ewNTAeFGli5GTQ0LAROL7g3UsXYxcHEIC
 M5gk7uz5wQzhPGaUuH5/KSuE855RYvL7ZVBlnxgl2lq+sEE4Bxklpv3aywYyjE0gRGLf3hvs
 ILaIgKvEvUXNLCC2sICIxM4X91gg4pISs5ZeZISw9SQW985hArFZBFQk+u9PAbN5Bawlfu36
 BTaTUUBWYtHNSWC9zALiEreezGeCOFxAYsme88wQtqjEy8f/WCFsRYlH91cxQdQnSZzs2ccG
 MVNQ4uTMJywTGEVmIRk1C0nZLCRlEHEdiQW7P7FB2NoSyxa+Zoaxzxx4zIQsvoCRfRWjaHGm
 QVmuiZmJkV5RUmpxlYGhXnJ+7iZGSCwJ7WD81fFB7xAjEwfjIUYJDmYlEd5ebcZ4Id6UxMqq
 1KL8+KLSnNTiQ4zSHCxK4rwqPBvjhATSE0tSs1NTC1KLYLJMHJxSDUybXz7kzjZWXc12Tkez
 9qz2XoPWDp69u68917qezvNxhsIuSxcFJ4Ekpyk2WR6qXNub8rTmW7w7NdGrkEewYSf/Pokt
 e2Rmn71SdfAGl1fwpqI575XKl55cuyot7c8/oS37fGdL1WfImLYLXq5n1A59L2jQYqQR6Bkl
 dvMGp8fENlGmAnGerXyfjK8Xn2kNYntlIHRCiXFp62fPB8lzX5/f9a/uTd0MtjyRrmveNge/
 OE0//q2ie2uSw9slAofk5/TM7fnE9lxZkIGv35Yp7WpEPufLfeaqGjxfZF5PjluQZGywm+mX
 loXZz+y0UPdk2der5+zW/vRjgYHVzaQ3FbHlL3KjnuSt6JRhSV4fq8RSnJFoqMVcVJwIAKzI
 6nMUAwAA
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--_000_aea652c74d2a4901b9438dbb2a057540inboschcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hello,

Anybody tried xen on rcar salvator? I am following the https://wiki.xenproj=
ect.org/wiki/Xen_ARM_with_Virtualization_Extensions/Salvator-X steps.

But facing the following error while building

Collected errors:
* satisfy_dependencies_for: Cannot satisfy the following dependencies for x=
en-base:
*      xen-libfsimage *        xen-fsimage *
* opkg_install: Cannot install package xen-base.
ERROR: core-image-weston-1.0-r0 do_rootfs: Function failed: do_rootfs

Thanks,
Manikandan

--_000_aea652c74d2a4901b9438dbb2a057540inboschcom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Arial",sans-serif;
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif">Hello,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif">Anybody tried xen on rcar salvator? I am following th=
e
<a href=3D"https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Ext=
ensions/Salvator-X">
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/Sal=
vator-X</a> steps.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif">But facing the following error while building<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:red">Collected errors:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:red">* satisfy_dependencies_for: Cannot satisfy =
the following dependencies for xen-base:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:red">*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; xen-libfsim=
age *&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; xen-fsimage *<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:red">* opkg_install: Cannot install package xen-=
base.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:red">ERROR: core-image-weston-1.0-r0 do_rootfs: =
Function failed: do_rootfs</span><span style=3D"font-size:10.0pt;font-famil=
y:&quot;Arial&quot;,sans-serif"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:black"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:black">Thanks,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Ar=
ial&quot;,sans-serif;color:black">Manikandan</span><o:p></o:p></p>
</div>
</body>
</html>

--_000_aea652c74d2a4901b9438dbb2a057540inboschcom_--


From xen-users-bounces@lists.xenproject.org Sun Jul 05 16:23:09 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 05 Jul 2020 16:23:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1js7Oh-0001pp-50; Sun, 05 Jul 2020 16:21:43 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Xhop=AQ=sendgrid.net=bounces+1794986-9697-xen-users=lists.xenproject.org@srs-us1.protection.inumbo.net>)
 id 1js7Of-0001pj-J0
 for xen-users@lists.xenproject.org; Sun, 05 Jul 2020 16:21:41 +0000
X-Inumbo-ID: 9b13aa8e-bedb-11ea-bb8b-bc764e2007e4
Received: from xtrwsqzp.outbound-mail.sendgrid.net (unknown [167.89.100.227])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 9b13aa8e-bedb-11ea-bb8b-bc764e2007e4;
 Sun, 05 Jul 2020 16:21:40 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sendgrid.net;
 h=mime-version:content-type:content-transfer-encoding:from:subject:to;
 s=smtpapi; bh=eS6tHEJe5NL6TjoOzJhFL4kA6/wKFNIGIOnZuEqb2eg=;
 b=LHsX//lx+KZrEhl5oznAUmsvrSb0m+iYa3O4lrCf0voBFJbFuL46KQXeLVZXsoapo/S9
 o6HHuyfGyj1OyY5GhNHUv6D27RrNCxxVSCkEk89VY3AT+q8oLVGfJCwBODJIXfgk4R5nXX
 eY6BPttEXIGqHHgyJA3hirvEokhYn+T8Q=
Received: by filterdrecv-p3iad2-5b55dcd864-rnx82 with SMTP id
 filterdrecv-p3iad2-5b55dcd864-rnx82-18-5F01FE13-27
 2020-07-05 16:21:39.408511699 +0000 UTC m=+774744.045260593
Received: from cloudmachine.kow.is (unknown)
 by ismtpd0015p1iad2.sendgrid.net (SG) with ESMTP id vNirraHESRSulgI0O_L7KA
 for <xen-users@lists.xenproject.org>;
 Sun, 05 Jul 2020 16:21:39.298 +0000 (UTC)
Received: from soulreaver.dark.kow.is (unknown [10.10.220.216])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))
 (Client CN "soulreaver.dark.kow.is", Issuer "dark.kow.is CA" (not verified))
 by cloudmachine.kow.is (Postfix) with ESMTPS id CBA8E7D518
 for <xen-users@lists.xenproject.org>; Sun,  5 Jul 2020 11:21:38 -0500 (CDT)
Received: from localhost (elzevir.dark.kow.is [10.10.220.205])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by soulreaver.dark.kow.is (Postfix) with ESMTPSA id 7A3478003F
 for <xen-users@lists.xenproject.org>; Sun,  5 Jul 2020 11:21:38 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Date: Sun, 05 Jul 2020 16:21:39 +0000 (UTC)
From: David Kowis <david@kow.is>
Subject: Having trouble with USB Passthrough to an HVM vm
User-Agent: Roundcube Webmail/1.4.0
Message-ID: <08011bdb6e19e7e8308a11d63464056a@kow.is>
X-Sender: david@kow.is
X-SG-EID: =?us-ascii?Q?+kMxBqj35EdRUKoy8diX1v=2FYwOtV0mBc163WH1fm2RNr7DE+LL3sO=2F0hN7QDBQ?=
 =?us-ascii?Q?f4UDz=2FoMNQtbZX5gR7vFAJ8TJ7ea9g768ytZUGR?=
 =?us-ascii?Q?7gYUcQ+Y+mU8fjuf9ozW=2F+5V3uHeoIUvvehLehF?=
 =?us-ascii?Q?ePTiF6EogT=2FVytnzVzfV0utYEn4QxJ69vqUMu1d?=
 =?us-ascii?Q?aqL5YbsH27y97taYbUDyBEGlTBZb5VjfasTDpIO?=
 =?us-ascii?Q?aTWsoNVqh+0EhuqwqBIwJferZVNMPdT8JUSqmz=2F?=
 =?us-ascii?Q?bPl7jwvJRmeHdlDCSglDw=3D=3D?=
To: xen-users@lists.xenproject.org
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Firstly the error,

root@nosgoth:/etc/xen/conf# xl create hass-hvm.cfg
Parsing config from hass-hvm.cfg
libxl: error: libxl_qmp.c:1813:qmp_ev_parse_error_messages: Domain 
24:failed to open host usb device 2:3
libxl: error: libxl_create.c:1701:domcreate_attach_devices: Domain 
24:unable to add vusb devices
libxl: error: libxl_domain.c:1177:libxl__destroy_domid: Domain 
24:Non-existant domain
libxl: error: libxl_domain.c:1131:domain_destroy_callback: Domain 
24:Unable to destroy guest
libxl: error: libxl_domain.c:1058:domain_destroy_cb: Domain 
24:Destruction of domain failed

from /var/log/xen/qemu-dm-hass.log:
Warning: speed mismatch trying to attach usb device "host:2.3" (full 
speed) to bus "xenusb-0.0", port "1" (high speed)
qemu-system-i386: terminating on signal 1 from pid 12738 (xl)
(that's all there is.)

And, my config:
<hass-hvm.cfg>
name="hass"
type="hvm"
vcpus=4
memory=2048
maxmem=4096
#device_model_version = "qemu-xen"
firmware = "seabios"

# Enable pv on hvm drivers
xen_platform_pci=1

vif = [ 'mac=00:16:3E:DE:AD:78, bridge=xenbr0' ]

boot='c'

disk = [
   
'phy:/dev/disk/by-path/ip-10.255.255.2:3260-iscsi-iqn.2005-10.org.freenas.ctl:xen-lun-35,xvda,w'
   
#'file:/mnt/systems/ubuntu/18.04/ubuntu-18.04.01-netboot.iso,hdc:cdrom,r'
   
#'file:/mnt/systems/ubuntu/18.04/ubuntu-18.04.4-live-server-amd64.iso,hdc:cdrom,r'
        ]


# usb passthrough for the zwave stick
usbctrl=['type=auto,version=2,ports=6']
usbdev=['hostbus=2,hostaddr=3']

#usb=1
#usbdevice=['host:658:200']

vnc=0

# Everything but qxl
vga = 'stdvga'

# Spice configuration?
spice = 1
spicehost = '10.10.220.111'
spiceport = 9701
spicepasswd = 'blerp'
spicevdagent = 1
spice_clipboard_sharing = 1
</hass-hvm.cfg>

Host lsusb:
<lsusb>
root@nosgoth:/etc/xen/conf# lsusb
Bus 002 Device 003: ID 0658:0200 Sigma Designs, Inc.
Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching 
Hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 004: ID 0624:0249 Avocent Corp. Virtual Keyboard/Mouse
Bus 001 Device 003: ID 0624:0248 Avocent Corp. Virtual Hub
Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching 
Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@nosgoth:/etc/xen/conf# lsusb -t
/:  Bus 02.Port 1: Dev 1, Class=root_hub, Driver=ehci-pci/2p, 480M
     |__ Port 1: Dev 2, If 0, Class=Hub, Driver=hub/8p, 480M
         |__ Port 5: Dev 3, If 0, Class=Communications, Driver=cdc_acm, 
12M
         |__ Port 5: Dev 3, If 1, Class=CDC Data, Driver=cdc_acm, 12M
/:  Bus 01.Port 1: Dev 1, Class=root_hub, Driver=ehci-pci/2p, 480M
     |__ Port 1: Dev 2, If 0, Class=Hub, Driver=hub/6p, 480M
         |__ Port 1: Dev 3, If 0, Class=Hub, Driver=hub/5p, 480M
             |__ Port 1: Dev 4, If 0, Class=Human Interface Device, 
Driver=usbhid, 480M
             |__ Port 1: Dev 4, If 1, Class=Human Interface Device, 
Driver=usbhid, 480M
             |__ Port 1: Dev 4, If 2, Class=Human Interface Device, 
Driver=usbhid, 480M
</lsusb>


Next, I've built xen by hand from the upstream tarball, 4.13.1 using 
this docker image: 
https://gitlab.light.kow.is/kowis-projects/xen-builder

Configuration options are as in the readme:
./configure --enable-stubdom 
--with-extra-qemu-configure-args="--enable-spice --enable-libusb 
--enable-usb-redir" --with-xenstored=oxenstored --enable-systemd 
--enable-ovmf

I'm not sure why I can't get usb passthrough to work, I kinda need it to 
work, else I'll have to switch to some other virtualization 
infrastructure :( I'm hoping it's just something simple, and that ya'll 
will be able to point it out to me.

Thanks!


From xen-users-bounces@lists.xenproject.org Mon Jul 06 00:23:26 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 06 Jul 2020 00:23:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsEtk-0000aT-8L; Mon, 06 Jul 2020 00:22:16 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eoK0=AQ=protonmail.com=peter.jac@srs-us1.protection.inumbo.net>)
 id 1jsCNl-0003vm-Fj
 for xen-users@lists.xenproject.org; Sun, 05 Jul 2020 21:41:05 +0000
X-Inumbo-ID: 3845a556-bf08-11ea-8c1c-12813bfff9fa
Received: from mail-40135.protonmail.ch (unknown [185.70.40.135])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 3845a556-bf08-11ea-8c1c-12813bfff9fa;
 Sun, 05 Jul 2020 21:41:01 +0000 (UTC)
Date: Sun, 05 Jul 2020 21:40:57 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1593985260;
 bh=iGfaoW/gqHkrrjqw+sA1+feKmp1r4Cwdl8m74Yx+vA8=;
 h=Date:To:From:Reply-To:Subject:From;
 b=Txmcd/44Ezo3e401OQCFdoJh0CTLhjU75CxSVfwMPIKfiPCzJTuBpIExCTl9lYlN+
 ipj37bJS2etFKf1Nk4idM3f7bxJZHdh/t2dIf2HvPuPbgBZhaSLgPXqgZ9gOm+oeZe
 S0JM9jQsB2o+OvB2ddbpEwJd04b5rhn5TK9AHENI=
To: xen-users <xen-users@lists.xenproject.org>
From: Peter <peter.jac@protonmail.com>
Subject: Xen and Automotive.
Message-ID: <W13oRYopo6JXUwmrUqpTip708bNMCOUdjUMvPTFdcPoXDELbqFbnp5P74J3c6qhlbMtu8qZqPj_Cpr0O9EpX5Ux2lLmc8hoaQ6zuTU_-fC4=@protonmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_aAoLVImcZdMACtzuAnbZQguBHPvxnxWVfAU7KPkcPCA"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Mon, 06 Jul 2020 00:22:15 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Peter <peter.jac@protonmail.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_aAoLVImcZdMACtzuAnbZQguBHPvxnxWVfAU7KPkcPCA
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64

SGVsbG8sCkknbSBhIHN0dWRlbnQgYW5kIG5ldyB0byBYZW4KSSB3YW50IHRvIGtub3cgWGVuIGFu
ZCBhdXRvbW90aXZlIG1lYW4gdGhhdCB0aGUgWGVuIGh5cGVydmlzb3IgcnVubmluZyBvbiBhIGNh
cj8gRm9yIGV4YW1wbGUsIEJNVyBjYXIuCklmIHllcywgdGhlbiB3aHk/IFdoZW4gY2FycyB1c2lu
ZyBBbmRyb2lkIHRoZW4gdGhpcyBBbmRyb2lkIHZpcnR1YWxpemVkIGJ5IFhlbj8gQW0gSSByaWdo
dD8KClBsZWFzZSBhbnN3ZXIgbWUuCgpUbngu

--b1_aAoLVImcZdMACtzuAnbZQguBHPvxnxWVfAU7KPkcPCA
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64

SGVsbG8sIDxicj5JJ20gYSBzdHVkZW50IGFuZCBuZXcgdG8gWGVuPGJyPkkgd2FudCB0byBrbm93
IFhlbiBhbmQgYXV0b21vdGl2ZSBtZWFuIHRoYXQgdGhlIFhlbiBoeXBlcnZpc29yIHJ1bm5pbmcg
b24gYSBjYXI/IEZvciBleGFtcGxlLCBCTVcgY2FyLjxicj5JZiB5ZXMsIHRoZW4gd2h5PyBXaGVu
IGNhcnMgdXNpbmcgQW5kcm9pZCB0aGVuIHRoaXMgQW5kcm9pZCB2aXJ0dWFsaXplZCBieSBYZW4/
IEFtIEkgcmlnaHQ/PGJyPjxicj5QbGVhc2UgYW5zd2VyIG1lLjxicj48YnI+VG54Lg==


--b1_aAoLVImcZdMACtzuAnbZQguBHPvxnxWVfAU7KPkcPCA--



From xen-users-bounces@lists.xenproject.org Mon Jul 06 00:23:26 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 06 Jul 2020 00:23:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsEu3-0000bN-Ln; Mon, 06 Jul 2020 00:22:35 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eoK0=AQ=protonmail.com=peter.jac@srs-us1.protection.inumbo.net>)
 id 1jsCSC-00040P-Pc
 for xen-users@lists.xenproject.org; Sun, 05 Jul 2020 21:45:41 +0000
X-Inumbo-ID: dbcaa33e-bf08-11ea-bb8b-bc764e2007e4
Received: from mail-40141.protonmail.ch (unknown [185.70.40.141])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id dbcaa33e-bf08-11ea-bb8b-bc764e2007e4;
 Sun, 05 Jul 2020 21:45:36 +0000 (UTC)
Date: Sun, 05 Jul 2020 21:45:33 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1593985535;
 bh=mrhU4zsIhzj9gz4no9SFr2Kuh3oIJ0OwNax+gq8pbUs=;
 h=Date:To:From:Reply-To:Subject:From;
 b=LLcAUh58aYOGozSu1JJ46+glwfFtZqnTxedOcbBqTNKYzRKiDbQ+j30CS3siXTRsu
 6Z6NGBeYwJI9EPeC2c9+qG+8eAC3A9gr8aG8eido7vIYJ1JOYO0Jexe4uxHbWT+Nzf
 k1RZ4xDp+f+NJ14C8bZf4zjEjlLtS7blCtk1InF4=
To: xen-users <xen-users@lists.xenproject.org>
From: peter.jac@protonmail.com
Subject: Xen Live patching vs Live-Updating Xen.
Message-ID: <b2Dubc5b4qvhCDWI8WoFhi3bEYdt0muyqxh7uBkydJ7cwrKnQ7UDKinFpgwlIthAhpyJXKs4L_WMkh0If92e44lFIVWonKv3VcrJQYBIwfA=@protonmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_PLWPwCYjMGQfi6RnEngAqKHCBIDdH0nCzleKbm5AHE"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Mon, 06 Jul 2020 00:22:34 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: peter.jac@protonmail.com
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_PLWPwCYjMGQfi6RnEngAqKHCBIDdH0nCzleKbm5AHE
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64

SGVsbG8sClhlbiBMaXZlIHBhdGNoaW5nIGlzIExpdmUtVXBkYXRpbmcgWGVuIG9yIHRoZXkgYXJl
IGRpZmZlcmVuY2U/CgpUbngu

--b1_PLWPwCYjMGQfi6RnEngAqKHCBIDdH0nCzleKbm5AHE
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64

SGVsbG8sPGJyPlhlbiBMaXZlIHBhdGNoaW5nIGlzIExpdmUtVXBkYXRpbmcgWGVuIG9yIHRoZXkg
YXJlIGRpZmZlcmVuY2U/PGJyPjxicj5UbnguPGJyPjxicj4=


--b1_PLWPwCYjMGQfi6RnEngAqKHCBIDdH0nCzleKbm5AHE--



From xen-users-bounces@lists.xenproject.org Mon Jul 06 07:46:16 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 06 Jul 2020 07:46:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsLo4-00064a-Ab; Mon, 06 Jul 2020 07:44:52 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sK4J=AR=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1jsLo3-00064V-Bv
 for xen-users@lists.xenproject.org; Mon, 06 Jul 2020 07:44:51 +0000
X-Inumbo-ID: 92064a1a-bf5c-11ea-bb8b-bc764e2007e4
Received: from FRA01-PR2-obe.outbound.protection.outlook.com (unknown
 [40.107.12.57]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 92064a1a-bf5c-11ea-bb8b-bc764e2007e4;
 Mon, 06 Jul 2020 07:44:50 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; 
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xOCxRBAfrFhp+k5rinMLP/YbVxrhJNFOY8kKSkU4NsA=;
 b=rdzrZ9dBRNkYtLhHb8f+T6nw77podXAp9V9vhYuSD/fQ+bRCu9gmG14krpB3GkegAp1ZwrxLOcoFQVtc2gAHOt7UwkMq9NJ7AdS0iH+JnMe44ETJWQ1mf0W6TeDxISyXl2qtL8c6SSj2e/g87DxjIiLVS1Zg4mZiO+W4IcZ8umQ=
Received: from AM6P192CA0023.EURP192.PROD.OUTLOOK.COM (2603:10a6:209:83::36)
 by PR2PR08MB4892.eurprd08.prod.outlook.com (2603:10a6:101:24::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.21; Mon, 6 Jul
 2020 07:44:48 +0000
Received: from AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:83:cafe::dc) by AM6P192CA0023.outlook.office365.com
 (2603:10a6:209:83::36) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.21 via Frontend
 Transport; Mon, 6 Jul 2020 07:44:48 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org;
 dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT040.mail.protection.outlook.com (10.152.17.148) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3153.24 via Frontend Transport; Mon, 6 Jul 2020 07:44:48 +0000
Received: ("Tessian outbound e44de778b77e:v62");
 Mon, 06 Jul 2020 07:44:47 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 1e2e1241392013d6
X-CR-MTA-TID: 64aa7808
Received: from f64ce16e2997.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 BA101954-A83F-4E64-B325-AAD51F76ACF3.1; 
 Mon, 06 Jul 2020 07:44:42 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f64ce16e2997.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 06 Jul 2020 07:44:42 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=H1ZnveA8znefA8MUa9pxWBjlmnMfQcHhxRC2ymqGYYoM1AZuWXi4ZRodiTZreu4VG2yVZOT2jdnl0RJ5RJ+2v7dxIeZhwNw0lzYZ6EL7HqLbGEajJ5lsgDuhTbX7QurDn2xRyBSrAA91ijk/XlFC+HG0QJaCWFGR4S51NBUAmz30a5AXeVUt8TeyeMo6s71K6T8O8SwFFqaA2ehxov6aIOR042eGrVl8sMNoartlCGC2t8dmXQvMJbv7pofFu8MkY4GQDJWDcQvN0TbLsNXOxhRt54dyEMWze19H4k0Jo/83g4wqNhnDFGvOUht394iJ7a6etIx7BRRWRFMj483thQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; 
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xOCxRBAfrFhp+k5rinMLP/YbVxrhJNFOY8kKSkU4NsA=;
 b=IdY7AUwRbPAQpFME0inXzIi0C4TYSLpYMfiSCkmdK6wAzM0d49cchNL5lj4t+ZI0bdVEtqGDl/wPU22ADoKT7vl2Q1C7SLTalTY7nVwTqPGfWZ5VHtuuzfhFcJPSSmt2+LTxROCUcbNF3goYT8LX6xXPogXMF7Uxj9gq++FKih8TbeByJ7ZNLPJoAzojcg4H8Gb9gYzeKynnz24M//eQNWiI61y0/FbF43TPlh8/YZ8mdetLyT0xeMh/oZx3n9zxYdNS2SleJRwXimLufwWFCsFvqqXgjBGDt5MxZehM6Oxfo1SbY4KWhsWvWvcoo1Vl+icNWLmf/oJRsnjW0lJHPQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; 
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xOCxRBAfrFhp+k5rinMLP/YbVxrhJNFOY8kKSkU4NsA=;
 b=rdzrZ9dBRNkYtLhHb8f+T6nw77podXAp9V9vhYuSD/fQ+bRCu9gmG14krpB3GkegAp1ZwrxLOcoFQVtc2gAHOt7UwkMq9NJ7AdS0iH+JnMe44ETJWQ1mf0W6TeDxISyXl2qtL8c6SSj2e/g87DxjIiLVS1Zg4mZiO+W4IcZ8umQ=
Received: from DB7PR08MB3689.eurprd08.prod.outlook.com (2603:10a6:10:79::16)
 by DB7PR08MB3257.eurprd08.prod.outlook.com (2603:10a6:5:19::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.28; Mon, 6 Jul
 2020 07:44:40 +0000
Received: from DB7PR08MB3689.eurprd08.prod.outlook.com
 ([fe80::4001:43ad:d113:46a8]) by DB7PR08MB3689.eurprd08.prod.outlook.com
 ([fe80::4001:43ad:d113:46a8%5]) with mapi id 15.20.3153.029; Mon, 6 Jul 2020
 07:44:40 +0000
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Peter <peter.jac@protonmail.com>
Subject: Re: Xen and Automotive.
Thread-Topic: Xen and Automotive.
Thread-Index: AQHWUyvlO/9JYcvScUmS2YIAoFyF2Kj6LEOA
Date: Mon, 6 Jul 2020 07:44:39 +0000
Message-ID: <AE3555C6-BC54-4194-9954-F7D758330073@arm.com>
References: <W13oRYopo6JXUwmrUqpTip708bNMCOUdjUMvPTFdcPoXDELbqFbnp5P74J3c6qhlbMtu8qZqPj_Cpr0O9EpX5Ux2lLmc8hoaQ6zuTU_-fC4=@protonmail.com>
In-Reply-To: <W13oRYopo6JXUwmrUqpTip708bNMCOUdjUMvPTFdcPoXDELbqFbnp5P74J3c6qhlbMtu8qZqPj_Cpr0O9EpX5Ux2lLmc8hoaQ6zuTU_-fC4=@protonmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Authentication-Results-Original: protonmail.com; dkim=none (message not
 signed) header.d=none;protonmail.com; dmarc=none action=none
 header.from=arm.com;
x-originating-ip: [82.24.250.194]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: ee994973-8324-467f-190a-08d821807552
x-ms-traffictypediagnostic: DB7PR08MB3257:|PR2PR08MB4892:
X-Microsoft-Antispam-PRVS: <PR2PR08MB489258A90F848B1DDA4B62789D690@PR2PR08MB4892.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:9508;OLM:9508;
x-forefront-prvs: 04569283F9
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: M1veIO3zg3lbmHDUvjPxVjH+HmxOjZN10PLo7uFVRfTzTYWJRidZCdAr4TMUUEq5KZv9vPV/PahpGt5t7jPDVdBKk2ejRfOtth/QFpW3iWslGbdETkK1Q6akk9Hy7bS0u4kGJU0b+NXbC9xnhiMEe/ajXhT/nSKoxKAzmtp5dMbQDgP0yLMceYoe19EPXAI3rzca6K26TSnUr1mrmi3Z7bn9ECi8bP4wEPX1B12OFZYbfrIcGo2tIGGxOL8m0ETxRxQfAlNgHSM6dhOIyH+kIgbGuVhDGJMaPK2gK2SPTFizmLjTbJe6P/RpQosEtz2XXa8olEwbXe8aeT2kY5K77w==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en;
 SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR08MB3689.eurprd08.prod.outlook.com;
 PTR:; CAT:NONE; SFTY:;
 SFS:(4636009)(376002)(136003)(346002)(366004)(396003)(39850400004)(26005)(33656002)(53546011)(6506007)(4326008)(6512007)(36756003)(71200400001)(8676002)(86362001)(2906002)(66446008)(64756008)(66556008)(66476007)(4744005)(8936002)(478600001)(186003)(2616005)(6486002)(316002)(91956017)(5660300002)(7116003)(3480700007)(6916009)(76116006)(66946007)(54906003);
 DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata: rHUECAE9JoXFGQGo3SWiYFgi5G8llkxtnuzdp8p190KgKsPtFSp9lOzWKZxqOXJ5Z2A048oBU8WzC365R9x3SG0yqsk87UbOmQwDY92qTMGoruaHAMXsoeaSs+s2xbsybW5D9SOhp/3PN8RXSo538g7/3nwo5Hry1I18Tt7TS0vqSwQnvixFfKwSjd/PL7vSOaVbkPdAdRDPf9hvQtmJ1hB8dZBTwczwubmjapa8wNsdWdwJ/j5ocSwK0Yv7OMpwFcUkHL34EliEa7Mz0gWpz4qg+aryK5VTroLClr+ExWlNHVKfyZm4G8yUms0mmPYjJAjHbdhUExYsNU+dm+65kwPVwqYuNNPnTeTNzs0OHAjcsBbf5efa1OVKJgEbvklO6O2jpijNRYtnRoXsr+8q4CyvtAcFzEOK8sEcoEs951nuX6j7R+pq+sYs6d6QFTS45QF0LVrj+fqncMCZdZW9wem/KRK0vwk6VO8AWEnUW/E=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <234B9598A2627E4FA3D54F4A6A2F67B1@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3257
Original-Authentication-Results: protonmail.com; dkim=none (message not signed)
 header.d=none; protonmail.com;
 dmarc=none action=none header.from=arm.com; 
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:;
 IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com;
 PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:;
 SFS:(4636009)(136003)(376002)(346002)(39850400004)(396003)(46966005)(47076004)(186003)(2906002)(5660300002)(3480700007)(6512007)(336012)(6486002)(54906003)(2616005)(8676002)(70206006)(53546011)(82310400002)(33656002)(4744005)(26005)(86362001)(82740400003)(316002)(6862004)(6506007)(36756003)(4326008)(70586007)(36906005)(8936002)(356005)(478600001)(7116003)(81166007);
 DIR:OUT; SFP:1101; 
X-MS-Office365-Filtering-Correlation-Id-Prvs: 1f8833b5-cde6-4c61-3acd-08d82180709e
X-Forefront-PRVS: 04569283F9
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 2X9BBj5Ssbzn6DSINC69LnKuS4kEyqUxlEZNcwORwmscS2KSEHBA0AiVhn4Ez+46YIcvDzPJkPR3t1esO4heflwCulyYaC26+lgIhf4kZBp479jghb1E8gBFW8z+kWgWsNpSDNKQSmBkSp+ATaC8CDPRw+6lq6JRQJlFkSbwQ2Ytt5h2Yd9Y03v3dB/09XsxW6nAX4XBHXCap6Fv4y9tsEDTMQTXz+P4E7MYwuRnWwB/+GR1m8oEiL4KuEjVWhW0yp2aErl8ookaJ0Pi7fsO74HroP9J/awAV+cWb+iLQn2VUvT3UFS654PjgNign7My9uuYwYnIVIGfQ8sjxC9QWRfCFlrVtJd5dn5J1jbRxLQ2J5AdUaLdDVcAnHpDeG4MMgmFIHVGOodEmmYlHp2aSQ==
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Jul 2020 07:44:48.0201 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ee994973-8324-467f-190a-08d821807552
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123];
 Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4892
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: nd <nd@arm.com>, xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Tue Jul 07 07:31:35 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 07 Jul 2020 07:31:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsi3G-0003bM-Pi; Tue, 07 Jul 2020 07:30:02 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ow9A=AS=xen.org=paul@srs-us1.protection.inumbo.net>)
 id 1jsi3F-0003NW-Co
 for xen-users@lists.xenproject.org; Tue, 07 Jul 2020 07:30:01 +0000
X-Inumbo-ID: aa5d927c-c023-11ea-bb8b-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id aa5d927c-c023-11ea-bb8b-bc764e2007e4;
 Tue, 07 Jul 2020 07:30:00 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Reply-To:Message-Id:Date:Subject:To:From:Sender:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=uQa8o5nnzDBqujXVcC9m3ummV9P5idnqgq0tOBtVJTg=; b=tvV1+5gy5/dKtW1Xqh8Eh7ksGo
 6dFT0UIknz0l7iidUo2HYTkiVea8KvDcM1QtY1ssTiRAE3jj/LVQuvCcF4hJSXZ0iLsZECsra+CRv
 Ss3O9jQMPWGlmJ8ik8eNkWynKBxZyCneVW6gK7DZcWe313qTh+QKv0Zm/ns/DIORUMGI=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jsi3E-00059h-6k; Tue, 07 Jul 2020 07:30:00 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=CBG-R90WXYV0.amazon.com) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jsi3D-0001hR-RF; Tue, 07 Jul 2020 07:30:00 +0000
From: Paul Durrant <paul@xen.org>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org,
 xen-announce@lists.xenproject.org
Subject: Xen 4.14 RC5
Date: Tue,  7 Jul 2020 08:29:58 +0100
Message-Id: <20200707072958.1035-1-paul@xen.org>
X-Mailer: git-send-email 2.17.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-devel@lists.xenproject.org, paul@xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,

Xen 4.14 RC5 is tagged. You can check that out from xen.git:

git://xenbits.xen.org/xen.git 4.14.0-rc5

For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.14.0-rc5/xen-4.14.0-rc5.tar.gz

And the signature is at:
https://downloads.xenproject.org/release/xen/4.14.0-rc5/xen-4.14.0-rc5.tar.gz.sig

Please send bug reports and test reports to xen-devel@lists.xenproject.org.
When sending bug reports, please CC relevant maintainers and me (paul@xen.org).

As a reminder, there will be a Xen Test Day. Please see the test day schedule at
https://wiki.xenproject.org/wiki/Xen_Project_Test_Days and test instructions at
https://wiki.xenproject.org/wiki/Xen_4.14_RC_test_instructions.

  Paul Durrant



From xen-users-bounces@lists.xenproject.org Tue Jul 07 10:47:11 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 07 Jul 2020 10:47:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsl6s-0005LS-G3; Tue, 07 Jul 2020 10:45:58 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YS/2=AS=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1jsl6q-0005LN-Lb
 for xen-users@lists.xenproject.org; Tue, 07 Jul 2020 10:45:56 +0000
X-Inumbo-ID: 085b68f2-c03f-11ea-b7bb-bc764e2007e4
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (unknown
 [40.107.21.61]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 085b68f2-c03f-11ea-b7bb-bc764e2007e4;
 Tue, 07 Jul 2020 10:45:55 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; 
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=m+h5ecSsAzr1Gv//ByqiQeNqbt9lSHcxa1i6Fxyo520=;
 b=g6VRItwAkriR1JrscbuG1UirxTYdS70rk6DUB15kbXK+ECH6YNm7PGqI6rf2MLYWLhS6iiX9qcrkukjx+jlRa+D5fPx9o4EV2+Gjt9ezY02dseN7+Ob9XgHAI1pvrJ9RvgPytO8/X0b50HvxFJhzoeiksTOFPPc+DzKUALOb+Us=
Received: from AM7PR04CA0005.eurprd04.prod.outlook.com (2603:10a6:20b:110::15)
 by DB8PR08MB5484.eurprd08.prod.outlook.com (2603:10a6:10:111::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.21; Tue, 7 Jul
 2020 10:45:53 +0000
Received: from AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:110:cafe::73) by AM7PR04CA0005.outlook.office365.com
 (2603:10a6:20b:110::15) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3174.20 via Frontend
 Transport; Tue, 7 Jul 2020 10:45:53 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org;
 dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT027.mail.protection.outlook.com (10.152.16.138) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3153.24 via Frontend Transport; Tue, 7 Jul 2020 10:45:53 +0000
Received: ("Tessian outbound 4e683f4039d5:v62");
 Tue, 07 Jul 2020 10:45:53 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 0908f7de799312a3
X-CR-MTA-TID: 64aa7808
Received: from fd6718143655.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 F088E8A6-1A0D-4279-B611-C18AC90DA40B.1; 
 Tue, 07 Jul 2020 10:45:47 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fd6718143655.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 07 Jul 2020 10:45:47 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NY3W9xckgHFeon+OBocZTsGxh5OuvX/Zc8SyznV+FjvWdjsQecsSifM+98RgqYnbKlZSzADM9boFLgsvNrYCLE4d0xzd58nQvytQMdsHS8gWzACwEtxUAHx3BDmnXi+B/wYm0AVBKSRU2J87nL8Pri0beTO+r1gRvqn1zR5/ylI9/e21D2GUuX5FIjgyBDuIB03Zgdcj92CRvqJN+TZC1Fkp4swce6tbqSjiG31zR4rqgXTMe64oSXjqqOvmcmJveI642XUg4GhZqLhsA6pXdisCblvgJBS1TebP4S6UrVDFcCzrbk0ykMs8JrngiK4DHUyaTFcLPUx8tbxBEGU26g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; 
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=m+h5ecSsAzr1Gv//ByqiQeNqbt9lSHcxa1i6Fxyo520=;
 b=a6jlUDST7+S0mzMOoqyROgkvy5XiqwMtThFbyJ3C4lVz/AGSH+NhQct1NlFI2mMIqoYJpHLw+bOjgiFpfRbsUhiBlm4ZtninlzT0A1H4V41Z23nHJPslkHfa/M78MG1V+It4w/3XuSR3YsnbjvO2jqWk++gIMUme8ofBwr3I+W7ovaSGUmGLx2wbnkNF3nzj2EXvfrSwuD4MIsPstEtc71iNrQew9BAkjCGhGBizFg4wZC6ZaSDPXOvjip3rc/g2NPw6wBiJzGDxHK195V868HcS8/zIB+fp4vdRRyxcEDmp7LmBJfH8ztHMOHFLKlkGZjtX6hTM1cALI9awSv5AYg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; 
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=m+h5ecSsAzr1Gv//ByqiQeNqbt9lSHcxa1i6Fxyo520=;
 b=g6VRItwAkriR1JrscbuG1UirxTYdS70rk6DUB15kbXK+ECH6YNm7PGqI6rf2MLYWLhS6iiX9qcrkukjx+jlRa+D5fPx9o4EV2+Gjt9ezY02dseN7+Ob9XgHAI1pvrJ9RvgPytO8/X0b50HvxFJhzoeiksTOFPPc+DzKUALOb+Us=
Received: from DB7PR08MB3689.eurprd08.prod.outlook.com (2603:10a6:10:79::16)
 by DB7PR08MB3516.eurprd08.prod.outlook.com (2603:10a6:10:4f::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.27; Tue, 7 Jul
 2020 10:45:47 +0000
Received: from DB7PR08MB3689.eurprd08.prod.outlook.com
 ([fe80::4001:43ad:d113:46a8]) by DB7PR08MB3689.eurprd08.prod.outlook.com
 ([fe80::4001:43ad:d113:46a8%5]) with mapi id 15.20.3153.029; Tue, 7 Jul 2020
 10:45:47 +0000
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Peter <peter.jac@protonmail.com>
Subject: Re: Xen and Automotive.
Thread-Topic: Xen and Automotive.
Thread-Index: AQHWUyvlO/9JYcvScUmS2YIAoFyF2Kj6LEOAgAALHoCAAbnRAA==
Date: Tue, 7 Jul 2020 10:45:46 +0000
Message-ID: <498D96BB-734D-401D-B35D-74DA1CC1E87E@arm.com>
References: <W13oRYopo6JXUwmrUqpTip708bNMCOUdjUMvPTFdcPoXDELbqFbnp5P74J3c6qhlbMtu8qZqPj_Cpr0O9EpX5Ux2lLmc8hoaQ6zuTU_-fC4=@protonmail.com>
 <AE3555C6-BC54-4194-9954-F7D758330073@arm.com>
 <UTPl4-i82hxZwPbZW1-vzdXtMS9FKEEai5FAuvsO-L-kFwKdADKT_APan1bqiIn3priEZE9re8NEtRqInH0hCkSV4NE6bQJB7xW3whXaRuo=@protonmail.com>
In-Reply-To: <UTPl4-i82hxZwPbZW1-vzdXtMS9FKEEai5FAuvsO-L-kFwKdADKT_APan1bqiIn3priEZE9re8NEtRqInH0hCkSV4NE6bQJB7xW3whXaRuo=@protonmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Authentication-Results-Original: protonmail.com; dkim=none (message not
 signed) header.d=none;protonmail.com; dmarc=none action=none
 header.from=arm.com;
x-originating-ip: [82.24.250.194]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: c05f8f8c-2587-4a16-cd8d-08d82262ebfa
x-ms-traffictypediagnostic: DB7PR08MB3516:|DB8PR08MB5484:
X-Microsoft-Antispam-PRVS: <DB8PR08MB5484F29D4C67585D97C285149D660@DB8PR08MB5484.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
x-forefront-prvs: 0457F11EAF
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: z5n3pWMsLfJNICzWjPmft2PGYYUelcMBXfszoNjggGGdM+enTP/JkpMjud/Ar3YAm3012aLYeKgy3ezW6VWV7AZ8i2zUdzHP4zGm+e4J8Io7rvmS2mNSO5RwqhZuUOmXT1ion2kgxxbldRoV2W8oMEnejJZdBLG3S3KIScyVHzCfAB+K2833uOPOHOObarQy8JPs0rjsMhAi6oCI2GPYgsJVjwwNeKhSuPHonhnfi5Lia4jf64mmhmj0uF+edBiO2t7kN8v5KdJrtGUzesguoS82Iw6YPa2R4jBJmTI7WBKRcdDGoaA5ttwBn3ZFuiFQ8Ufp+bRD31qawrbzEEmbRQ==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en;
 SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR08MB3689.eurprd08.prod.outlook.com;
 PTR:; CAT:NONE; SFTY:;
 SFS:(4636009)(39860400002)(346002)(136003)(376002)(396003)(366004)(8676002)(4326008)(3480700007)(33656002)(66946007)(76116006)(91956017)(6916009)(66476007)(66556008)(64756008)(66446008)(2616005)(83380400001)(8936002)(36756003)(86362001)(71200400001)(478600001)(66574015)(316002)(6486002)(6512007)(54906003)(2906002)(7116003)(5660300002)(6506007)(26005)(186003)(53546011);
 DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata: PXMtholHR1wHSwqr7PopsE7QrUlV0fQvBq5QgMqTMBwJIigTqaBAJnLMKVpp/nfHE+CFiDKQoyiOKJZ7lAOtN+O62jcj+oEVg+DjScWGVmQnxI3OrTYjbDUjmNvxMkhljIeAcf8gqEdA1R3TESY/G6sy2bgH2UCJ4wyIVrLkg+5ecEP9DH0rdzowBEmC+d/i9USq6MO2Ux1lallZBuFCS27bnlsRXRHw88orGk2jG9FuHaGmiJep7crEXXU4zgGCRwDul+YfWcBQ/Bd7WCi04knNsjqZFbcAgbJSjdGiFjTL8RgUMSR4uoHVpaTB+Sf9RpCPm3W5WnruRPyEQ4NOViTFF/hWqYW6XuAz1U4Us5B7IrlNCHMSrQwAxrW+XSe+oVeKlZpl4OFgnjHcSKlz1NdirRNDxzgGNVoxHD3MCYGZx2F+bYzq8c/6Ir7KWrYy/OKZq1PfOLv9HD7JUp2UBgCTgFfUgq0O+ZyFahrenVurZVy8BDIwUXQDcIQqGo6r
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <90333A7741618E45AAD390A59129E57F@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3516
Original-Authentication-Results: protonmail.com; dkim=none (message not signed)
 header.d=none; protonmail.com;
 dmarc=none action=none header.from=arm.com; 
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:;
 IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com;
 PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:;
 SFS:(4636009)(396003)(39860400002)(346002)(376002)(136003)(46966005)(478600001)(33656002)(2616005)(47076004)(2906002)(3480700007)(5660300002)(186003)(82740400003)(66574015)(336012)(6512007)(54906003)(6486002)(7116003)(86362001)(8936002)(4326008)(316002)(81166007)(26005)(53546011)(6506007)(82310400002)(70586007)(70206006)(356005)(6862004)(36906005)(8676002)(36756003)(83380400001);
 DIR:OUT; SFP:1101; 
X-MS-Office365-Filtering-Correlation-Id-Prvs: c832230e-afa7-4bd9-4ac7-08d82262e835
X-Forefront-PRVS: 0457F11EAF
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: lc8rgrR8jX+QVUjwYCxr48EjUKRfgMxyNStUXjfWpBG6vOvCaa59m2JLpI1EKzPXS48PdOLIBMEkheNFGl2LNne/Cx1Ol4fhHV+dxlRP+dhlvZN9hRHMU2nKTxbZPZ3wXmtpRuWqPZjBxIwYAxD67oNqBOZVQoZe/et/mTxk7Z6ZPC4gc0eZ7sMrhHpdVE2xhXoyBQTXA5fiV5+sEcDM1LFq744s8B6XEsrB//lD5EUSiKdaRKmVd6GJS71TGZlNkp7G7OWzkx8psFzDzFgK1bSBIR1SEsnlXUpTFV8jgxpwpZC2fOgMQ4GJstkXOuJFLwUE5cNr9CYXMInfSQoswnlFM+jasH4WB/X/9qZVKE4mbZYcV8X8vER7/oppv0k/9xzESZsmGPCrlxO8yh2Vbg==
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Jul 2020 10:45:53.3117 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c05f8f8c-2587-4a16-cd8d-08d82262ebfa
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123];
 Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB5484
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: nd <nd@arm.com>,
 "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
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From xen-users-bounces@lists.xenproject.org Tue Jul 07 12:20:00 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 07 Jul 2020 12:20:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsmYs-0005VV-EW; Tue, 07 Jul 2020 12:18:58 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1g3R=AS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jsmYq-0005Sv-Qj
 for xen-users@lists.xen.org; Tue, 07 Jul 2020 12:18:56 +0000
X-Inumbo-ID: ff1edf8c-c04b-11ea-8d5d-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id ff1edf8c-c04b-11ea-8d5d-12813bfff9fa;
 Tue, 07 Jul 2020 12:18:42 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=pka224yeKHvOnBWMQf/upTLDc1Wie4UNUJLCWEs/KC4=; b=HQHGlhpB4pJrFNJPJts4F2QL3R
 BQ8USz9N48wvmAx4C9Hsi8zpMVPfGYxWgbuTHqr25bH3KPLI9XeapPHLF+eP1JJPUrwYLtnhlOtCs
 CS7wTaNjlsJK/5yRIieZVFv3NcoeRZ8I/aREgxO68K+iVFFpoOs0R5EKNcaapHhbYUw0=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmYX-0002mz-D6; Tue, 07 Jul 2020 12:18:37 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmYX-0000Xl-BV; Tue, 07 Jul 2020 12:18:37 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 319 v3 (CVE-2020-15563) - inverted code
 paths in x86 dirty VRAM tracking
Message-Id: <E1jsmYX-0000Xl-BV@xenbits.xenproject.org>
Date: Tue, 07 Jul 2020 12:18:37 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-15563 / XSA-319
                               version 3

            inverted code paths in x86 dirty VRAM tracking

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

An inverted conditional in x86 HVM guests' dirty video RAM tracking
code allows such guests to make Xen de-reference a pointer guaranteed
to point at unmapped space.

IMPACT
======

A malicious or buggy HVM guest may cause the hypervisor to crash,
resulting in Denial of Service (DoS) affecting the entire host.

VULNERABLE SYSTEMS
==================

Xen versions from 4.8 onwards are affected.  Xen versions 4.7 and
earlier are not affected.

Only x86 systems are affected.  Arm systems are not affected.

Only x86 HVM guests using shadow paging can leverage the vulnerability.
In addition there needs to be an entity actively monitoring a guest's
video frame buffer (typically for display purposes) in order for such a
guest to be able to leverage the vulnerability.  x86 PV guests as well
as x86 HVM guest using hardware assisted paging (HAP) cannot leverage
the vulnerability.

MITIGATION
==========

Running only PV guests will avoid the vulnerability.

For HVM guest explicitly configured to use shadow paging (e.g. via the
`hap=0' xl domain configuration file parameter), changing to HAP (e.g.
by setting `hap=1') will avoid exposing the vulnerability to those
guests.  HAP is the default (in upstream Xen), where the hardware
supports it; so this mitigation is only applicable if HAP has been
disabled by configuration.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa319.patch           xen-unstable, 4.13 - 4.9

$ sha256sum xsa319*
1fe0dc2e274776b8e1275f85129280f280f94ca4eabe6a8166113283dad93ed8  xsa319.meta
c145f394f8ac7d8838c376a97e1850c4125c12e478fc66ebe025ae397b27e6ea  xsa319.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patch described above (or others which are
substantially similar) is permitted during the embargo, even on
public-facing systems with untrusted guest users and administrators.

HOWEVER deployment of the "use HAP mode" mitigation described above is
NOT permitted (except where all the affected systems and VMs are
administered and used only by organisations which are members of the Xen
Project Security Issues Predisclosure List).  Specifically, deployment
on public cloud systems is NOT permitted.

This is because in that case the configuration change can be observed
by guests, which could lead to the rediscovery of the vulnerability.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.


(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8EZ/sMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ75YH/jX/sAs0icOgBtHkwVZHg318OBExxt9x+ehk/pxb
i+1ZlS/IrJ8eJdHJYq8HYvAlxmtmFP1I0t+C9vmwbP4QMcR++RmKgdJI4+/sqCsB
AMEnK+cVJSbHxD7y7eW2CPuU3h0cKx0H24JgtzA2ONse7dVz7RN+oa97D5IKryTL
cBW8WroMn2InbKMCUy/5zj89NLAlbSuWSVZzQidDwzTITukzhZZ7Xw0+Q2yh1nkK
S4kcmz7Bzzd5Mc1gFr1Eh1FxfmVVl5RxwDE//3a5VbmfPVo/f0kMOIWjXVd1R1dj
x78SPrPojOAZbb8+f1LYqHmqzCgzvpa4EFbsOnsB7CBmP2Q=
=bDFh
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa319.meta"
Content-Disposition: attachment; filename="xsa319.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa319.patch"
Content-Disposition: attachment; filename="xsa319.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Jul 07 12:20:00 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 07 Jul 2020 12:20:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsmYq-0005V3-1l; Tue, 07 Jul 2020 12:18:56 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1g3R=AS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jsmYp-0005Sp-9w
 for xen-users@lists.xen.org; Tue, 07 Jul 2020 12:18:55 +0000
X-Inumbo-ID: fd2469cc-c04b-11ea-bca7-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id fd2469cc-c04b-11ea-bca7-bc764e2007e4;
 Tue, 07 Jul 2020 12:18:39 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=mFmAfu+l9Qnx7Y9fQVSM/XKGmQ57MHrxuyQCgm25OCQ=; b=qFrRGnrO5DPb5kurUU6le/eUUD
 CRXilbVw+GyIW2LF4yoHF83eJv2Lo6OS1FSAteKRby6ngUBfP4WTQTQXEktq/crTkHrQadF43OC/W
 jnoB7/SzpRDfk438u0t5y97zmw9NIc8cVs3vSjL3cKLFhTa2gwzhQ1Z/cOKGfBuF064Q=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmYT-0002mn-TH; Tue, 07 Jul 2020 12:18:33 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmYT-0000Wl-Q7; Tue, 07 Jul 2020 12:18:33 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 317 v3 (CVE-2020-15566) - Incorrect error
 handling in event channel port allocation
Message-Id: <E1jsmYT-0000Wl-Q7@xenbits.xenproject.org>
Date: Tue, 07 Jul 2020 12:18:33 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-15566 / XSA-317
                               version 3

       Incorrect error handling in event channel port allocation

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

The allocation of an event channel port may fail for multiple reasons:
    1) Port is already in use
    2) The memory allocation failed
    3) The port we try to allocate is higher than what is supported by
       the ABI (e.g 2L or FIFO) used by the guest or the limit set by an
       administrator ('max_event_channels' in xl cfg).

Due to the missing error checks, only 1) will be considered as an error.  All
the other cases will provide a "valid" port and will result to a crash when
trying to access the event channel.

IMPACT
======

When the administrator configured a guest to allow more than 1023
event channels, that guest may be able to crash the host.

When Xen is out-of-memory, allocation of new event channels will
result in crashing the host rather than reporting an error.

VULNERABLE SYSTEMS
==================

Xen versions 4.10 and later are affected.  (The special Xen 4.8
"Comet" branch for XSA-254 contains changes similar to those which led
to this vulnerability; so it is likely to be affected, but - like
mainline Xen 4.8 - that branch is longer security-supported.)

Older Xen versions are unaffected.

All architectures are affected.

The default configuration, when guests are created with xl/libxl, is
not vulnerable, because of the default event channel limit (see
Mitigation, below).

MITIGATION
==========

The problem can be avoided by reducing the number of event channels
available to the guest no more than 1023.  For example, setting
"max_event_channels=1023" in the xl domain configuration, or deleting
any existing setting (since 1023 is the default for xl/libxl).

For ARM systems, any limit no more than 4095 is safe.

For 64-bit x86 PV guests, any limit no more than 4095 is likewise safe
if the host configuration prevents the guest administrator from
substituting and running a 32-bit kernel (and thereby putting the
guest into 32-bit PV mode).

CREDITS
=======

This issue was discovered by Amazon.

RESOLUTION
==========

Applying the attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa317.patch           Xen 4.10 - xen-unstable

$ sha256sum xsa317*
11e77dd8644cee40cee609d02e27d70655f3999005cae8c24fb2801980ebb4f2  xsa317.meta
17908035e2da07f6070fa8de345db68c96ed9bd78f8b114e43ba0194c1be3f15  xsa317.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the *patch* described above (or others which are
substantially similar) is permitted during the embargo, even on
public-facing systems with untrusted guest users and administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).


And: deployment of the event channel limit reduction mitigation is NOT
permitted (except where all the affected systems and VMs are
administered and used only by organisations which are members of the
Xen Project Security Issues Predisclosure List).  Specifically,
deployment on public cloud systems is NOT permitted.

This is because such a change can be visible to the guest, so it would
leak the preconditions for the vulnerability and maybe lead to
rediscovery.

Deployment of this, or similar mitigations, is permitted only AFTER
the embargo ends.


Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8EZ/gMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZQUwIAK8W8bZ0xml2bzAu4vsXi8QqhDX4VrpkgADYZS+M
BD8hpllQ+O/CiM5ZMECj7zaWYTt7+VrGrqK4jtf2REBs/sOWcO+k7KdEury4XCKf
jIG4CzCBHC46RVEKftiqQNTX2ebVBDwoj+1fGeIvm7OhcZ7f6KdhYPHvE2bU8D45
ghr2jw33HZHoG7IsPQvJn8u6wqd6l+7h0BxhgzO5U8pI+w3ZXRM4XAno+ERzs8LO
N5ffv8UeaMIpkHoYEdsKOK/ItjhoCASoWTFvbE90u7f2WbimFnBG3oCPEVPt89kv
Y/o0+0jBk+WjXbPChMmMu5WuQuKVFDelMXLLE6mjfhGAvnI=
=vEgE
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa317.meta"
Content-Disposition: attachment; filename="xsa317.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa317.patch"
Content-Disposition: attachment; filename="xsa317.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Jul 07 12:23:32 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 07 Jul 2020 12:23:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsmc1-0006mL-8y; Tue, 07 Jul 2020 12:22:13 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1g3R=AS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jsmbz-0006jB-Dq
 for xen-users@lists.xen.org; Tue, 07 Jul 2020 12:22:11 +0000
X-Inumbo-ID: 71f3babe-c04c-11ea-bb8b-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 71f3babe-c04c-11ea-bb8b-bc764e2007e4;
 Tue, 07 Jul 2020 12:21:55 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=+jb059afZWg7ECHFvnGYbIcRZH6cC5fsjzA8zhBrxqQ=; b=kh2EL+TxbfwSawpcEjdqwVgmfs
 X1HkRdkXQVAzhyfbtPZ9FIoUkdn7qaATSomj8UCNVuREowPibLmJsiXcvyZkd2WxexueoolwoJgwq
 8DlQrORTiohRl3A741rGmYwuDAH54EiWf6401v1kotfOoYUmSKKT1QzWMdWgdts1Nfek=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmbd-0002rk-6d; Tue, 07 Jul 2020 12:21:49 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmbd-0002Fv-4w; Tue, 07 Jul 2020 12:21:49 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 321 v3 (CVE-2020-15565) - insufficient
 cache write-back under VT-d
Message-Id: <E1jsmbd-0002Fv-4w@xenbits.xenproject.org>
Date: Tue, 07 Jul 2020 12:21:49 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-15565 / XSA-321
                               version 3

                 insufficient cache write-back under VT-d

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

When page tables are shared between IOMMU and CPU, changes to them
require flushing of both TLBs.  Furthermore, IOMMUs may be non-coherent,
and hence prior to flushing IOMMU TLBs CPU cached also needs writing
back to memory after changes were made.  Such writing back of cached
data was missing in particular when splitting large page mappings into
smaller granularity ones.

IMPACT
======

A malicious guest may be able to retain read/write DMA access to
frames returned to Xen's free pool, and later reused for another
purpose.  Host crashes (leading to a Denial of Service) and privilege
escalation cannot be ruled out.

VULNERABLE SYSTEMS
==================

Xen versions from at least 3.2 onwards are affected.

Only x86 Intel systems are affected.  x86 AMD as well as Arm systems are
not affected.

Only x86 HVM guests using hardware assisted paging (HAP), having a
passed through PCI device assigned, and having page table sharing
enabled can leverage the vulnerability.  Note that page table
sharing will be enabled (by default) only if Xen considers IOMMU and
CPU large page size support compatible.

MITIGATION
==========

Suppressing the use of page table sharing will avoid the vulnerability
(command line option "iommu=no-sharept").  Note however that as of Xen
version 4.13 there's also a respective per-guest control ("passthrough="
libxl guest config file option).  If any guests have been created with
an explicit setting here, this setting may conflict with the addition of
the "iommu=no-sharept" Xen command line option.

Suppressing the use of large HAP pages will avoid the vulnerability
(command line options "hap_2mb=no hap_1gb=no").

Not passing through PCI devices to HVM guests will avoid the
vulnerability.

CREDITS
=======

This issue was discovered by Roger Pau Monné of Citrix.

RESOLUTION
==========

Applying the appropriate set of attached patches resolves this issue.

Note that unlike implied by the numbering, the patches here are intended
to go on top of XSA-328's.

Note also that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa321/xsa321-?.patch        xen-unstable
xsa321/xsa321-4.13-?.patch   Xen 4.13.x
xsa321/xsa321-4.12-?.patch   Xen 4.12.x
xsa321/xsa321-4.11-?.patch   Xen 4.11.x
xsa321/xsa321-4.10-?.patch   Xen 4.10.x
xsa321/xsa321-4.9-?.patch    Xen 4.9.x

$ sha256sum xsa321* xsa321*/*
f0824c6b6e5de723301223927dbad916e0e5fbeb70f30a7e2467a04094dd840b  xsa321.meta
35ed3be5e66da0580de8fb14ee7e6c073ac60e08e022c35ef194a714698641ad  xsa321/xsa321-1.patch
b2bbb4cf397b7b532dcab120a4d678938c50ca0df6ff2724a416ac8567bd667b  xsa321/xsa321-2.patch
87d2e0446ee3fb013c8f307e71c0ddeae8122d6beee3e5d2871aa429d8d19daa  xsa321/xsa321-3.patch
38d7e715d4ed751a9ce503b61cacaf2d06c91b2eab4be95cbc3a9ae4d2a05efb  xsa321/xsa321-4.9-1.patch
e4d5238233c883ea62491f852e543550bce9d74d7239a866f5e117df46838abc  xsa321/xsa321-4.9-2.patch
d9140aee60c848e2e07a59741bab1fde4669f2627923e5d3f08b8f2971f589c4  xsa321/xsa321-4.9-3.patch
be8e320f64185bb29c52c0c1472d9d9aa1319768076ff70e691d4b40f7938a27  xsa321/xsa321-4.9-4.patch
7d83cb2d7de293f8534fa4eae1c56979984d01d8842ac06cfcb645191f27e51f  xsa321/xsa321-4.9-5.patch
99c7cf186f0fea47ef516e3d477a5f5068adaad44624b406694b9ff33268e05b  xsa321/xsa321-4.9-6.patch
9731286e9af9d83c5bf191aa5a6be0dfa34c79bca15660cd9b9e1c8e930cf974  xsa321/xsa321-4.9-7.patch
360765e859866c466dc1c9c6893dd800407d8f09b0b6f2b07fa403c290c4f0c6  xsa321/xsa321-4.10-1.patch
e4d5238233c883ea62491f852e543550bce9d74d7239a866f5e117df46838abc  xsa321/xsa321-4.10-2.patch
74b5c19a469cc7252a296cb19288f1ab53a411530d06dd364a0e3292c6aa273f  xsa321/xsa321-4.10-3.patch
be8e320f64185bb29c52c0c1472d9d9aa1319768076ff70e691d4b40f7938a27  xsa321/xsa321-4.10-4.patch
7d83cb2d7de293f8534fa4eae1c56979984d01d8842ac06cfcb645191f27e51f  xsa321/xsa321-4.10-5.patch
99c7cf186f0fea47ef516e3d477a5f5068adaad44624b406694b9ff33268e05b  xsa321/xsa321-4.10-6.patch
fb3122d23ae7381d798721fe92c622ea2d37baac369fe89b0707030315dfc896  xsa321/xsa321-4.10-7.patch
360765e859866c466dc1c9c6893dd800407d8f09b0b6f2b07fa403c290c4f0c6  xsa321/xsa321-4.11-1.patch
02e2fda4b467f10a7f38cb2a095b9da04289d9e8489db88bf542d6527b823a23  xsa321/xsa321-4.11-2.patch
04c9bc347f8d3cbb8aecede370189bba2ed47be560d1871b91eb01b962a578cc  xsa321/xsa321-4.11-3.patch
be8e320f64185bb29c52c0c1472d9d9aa1319768076ff70e691d4b40f7938a27  xsa321/xsa321-4.11-4.patch
c1b143b43b59244d5dc755f6a99de70ac39e803a7204296bb47300b9ffe26e59  xsa321/xsa321-4.11-5.patch
38456ff553416e48f2f5438c2a5a163b20929e8a58dbe811942d0d47aacfc9ea  xsa321/xsa321-4.11-6.patch
d3b6df41682e6b88898545590bee8242c00b4593773ba8070ce57a0473094189  xsa321/xsa321-4.11-7.patch
c6d00d7a988002687be9a19a2d631c3562d8ec9f02ae24efc23eb0039f9e0ddb  xsa321/xsa321-4.12-1.patch
64dd3aa18be3ccb17ab6d813df16e2025adabbe38127f2f00175a6a481651d86  xsa321/xsa321-4.12-2.patch
935346f3d0f2759699b0ccb8002abfb0dc173ec3ed616fb9042ad86751445757  xsa321/xsa321-4.12-3.patch
be8e320f64185bb29c52c0c1472d9d9aa1319768076ff70e691d4b40f7938a27  xsa321/xsa321-4.12-4.patch
c1b143b43b59244d5dc755f6a99de70ac39e803a7204296bb47300b9ffe26e59  xsa321/xsa321-4.12-5.patch
0da20aeb89e18490d60649dbfdb9c374e5861032da784a7724216c329f2cc5f0  xsa321/xsa321-4.12-6.patch
4d1954600eeca7e2cb9143ea8e32969731071f991a9a88a245c18e860c57c22c  xsa321/xsa321-4.12-7.patch
946053a8bba53d87b4164acaf3343e30689d91b505b6355d873c016166d87103  xsa321/xsa321-4.13-1.patch
f09e8cbf0cce17647d47f38137792517c8b108c3b54f57793d03578b0d5ccf99  xsa321/xsa321-4.13-2.patch
bd50ad52d23c6fc12b69ecaaf41073833cbe9b1d66a9f4e148df078e30dd45d4  xsa321/xsa321-4.13-3.patch
b181511962ce397302be8b7d5a130abe0995b3fda68b96f1afa95ae64f62dd09  xsa321/xsa321-4.13-4.patch
3286fc184fb377c1ce94344d1dbae3b78e95b0ae766eabb80b2fc612e59ffb69  xsa321/xsa321-4.13-5.patch
03a193197d176109dc586f4d6a76aebe32a4aa147e88c79d57582cf0a186c4ef  xsa321/xsa321-4.13-6.patch
ef7f9ac74313d2dabfb258b2519b2144e4feed3c85b5f705c4b1b7ba31ec316a  xsa321/xsa321-4.13-7.patch
e6d4b77063d4cd7a7242ac54b150ce42ce684ecbf46c7eaff5715976f272f4bc  xsa321/xsa321-4.patch
920771be10110a3eef8e4b8644145794d274042092f3aa14e04fa94fc1e78e8a  xsa321/xsa321-5.patch
b10c5583e01f1c26862806562f30e393960b0bbdd7cf7fca6640f4daa88fe017  xsa321/xsa321-6.patch
18da003fb05b7aebe868ff9f1c77063b8a51be3b07ab0c9fc4821bf46ca86eeb  xsa321/xsa321-7.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8EaM8MHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ35IH/iNi7HaBQrIqks4MB/0odUAIYyUEVsI4eAavChkX
oKO+IQ7sDOyjKG+VHWgMxtnZhcQk9A+qHMnfCjL7igp0HMonT5C1r38x/+Nf203+
V/mQ0h/Vj1Fz7qSk0mtX2j2zkAS7hEFnOQcT5TIkxAt5ZO3wSbPEwmt9UqR7VON9
rXFX6WyAqDhO7Hw2lngPXc2VGoORHqybII4XZGb24TO7q9U4vFhBR0ZVgWKBo1pt
82gl2h2jQn8IA0Rrack+ucfsoD9D+E3AQYtipZVd9PI/SJNsZHvHJdaPxBf2CUqO
Jb1e5MMXRG9Htpe0GPu8Y0TSUAUCoHqBsJTE1wkn4hun5SQ=
=/CNm
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa321.meta"
Content-Disposition: attachment; filename="xsa321.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-1.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-2.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-3.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.9-1.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.9-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.9-2.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.9-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.9-3.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.9-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.9-4.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.9-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.9-5.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.9-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.9-6.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.9-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.9-7.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.9-7.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB4ODYv
ZXB0OiBmbHVzaCBjYWNoZSB3aGVuIG1vZGlmeWluZyBQVEVzIGFuZCBzaGFy
aW5nIHBhZ2UgdGFibGVzCgpNb2RpZmljYXRpb25zIG1hZGUgdG8gdGhlIHBh
Z2UgdGFibGVzIGJ5IEVQVCBjb2RlIG5lZWQgdG8gYmUgd3JpdHRlbgp0byBt
ZW1vcnkgd2hlbiB0aGUgcGFnZSB0YWJsZXMgYXJlIHNoYXJlZCB3aXRoIHRo
ZSBJT01NVSwgYXMgSW50ZWwKSU9NTVVzIGNhbiBiZSBub24tY29oZXJlbnQg
YW5kIHRodXMgcmVxdWlyZSBjaGFuZ2VzIHRvIGJlIHdyaXR0ZW4gdG8KbWVt
b3J5IGluIG9yZGVyIHRvIGJlIHZpc2libGUgdG8gdGhlIElPTU1VLgoKSW4g
b3JkZXIgdG8gYWNoaWV2ZSB0aGlzIG1ha2Ugc3VyZSBkYXRhIGlzIHdyaXR0
ZW4gYmFjayB0byBtZW1vcnkKYWZ0ZXIgd3JpdGluZyBhbiBFUFQgZW50cnkg
d2hlbiB0aGUgcmVjYWxjIGJpdCBpcyBub3Qgc2V0IGluCmF0b21pY193cml0
ZV9lcHRfZW50cnkuIElmIHN1Y2ggYml0IGlzIHNldCwgdGhlIGVudHJ5IHdp
bGwgYmUKYWRqdXN0ZWQgYW5kIGF0b21pY193cml0ZV9lcHRfZW50cnkgd2ls
bCBiZSBjYWxsZWQgYSBzZWNvbmQgdGltZQp3aXRob3V0IHRoZSByZWNhbGMg
Yml0IHNldC4gTm90ZSB0aGF0IHdoZW4gc3BsaXR0aW5nIGEgc3VwZXIgcGFn
ZSB0aGUKbmV3IHRhYmxlcyByZXN1bHRpbmcgb2YgdGhlIHNwbGl0IHNob3Vs
ZCBhbHNvIGJlIHdyaXR0ZW4gYmFjay4KCkZhaWx1cmUgdG8gZG8gc28gY2Fu
IGFsbG93IGRldmljZXMgYmVoaW5kIHRoZSBJT01NVSBhY2Nlc3MgdG8gdGhl
CnN0YWxlIHN1cGVyIHBhZ2UsIG9yIGNhdXNlIGNvaGVyZW5jeSBpc3N1ZXMg
YXMgY2hhbmdlcyBtYWRlIGJ5IHRoZQpwcm9jZXNzb3IgdG8gdGhlIHBhZ2Ug
dGFibGVzIGFyZSBub3QgdmlzaWJsZSB0byB0aGUgSU9NTVUuCgpUaGlzIGFs
bG93cyB0byByZW1vdmUgdGhlIFZULWQgc3BlY2lmaWMgaW9tbXVfcHRlX2Zs
dXNoIGhlbHBlciwgc2luY2UKdGhlIGNhY2hlIHdyaXRlIGJhY2sgaXMgbm93
IHBlcmZvcm1lZCBieSBhdG9taWNfd3JpdGVfZXB0X2VudHJ5LCBhbmQKaGVu
Y2UgaW9tbXVfaW90bGJfZmx1c2ggY2FuIGJlIHVzZWQgdG8gZmx1c2ggdGhl
IElPTU1VIFRMQi4gVGhlIG5ld2x5CnVzZWQgbWV0aG9kIChpb21tdV9pb3Rs
Yl9mbHVzaCkgY2FuIHJlc3VsdCBpbiBsZXNzIGZsdXNoZXMsIHNpbmNlIGl0
Cm1pZ2h0IHNvbWV0aW1lcyBiZSBjYWxsZWQgcmlnaHRseSB3aXRoIDAgZmxh
Z3MsIGluIHdoaWNoIGNhc2UgaXQKYmVjb21lcyBhIG5vLW9wLgoKVGhpcyBp
cyBwYXJ0IG9mIFhTQS0zMjEuCgpSZXZpZXdlZC1ieTogSmFuIEJldWxpY2gg
PGpiZXVsaWNoQHN1c2UuY29tPgoKLS0tIGEveGVuL2FyY2gveDg2L21tL3Ay
bS1lcHQuYworKysgYi94ZW4vYXJjaC94ODYvbW0vcDJtLWVwdC5jCkBAIC05
MCw2ICs5MCwxOSBAQCBzdGF0aWMgaW50IGF0b21pY193cml0ZV9lcHRfZW50
cnkoZXB0X2VuCiAKICAgICB3cml0ZV9hdG9taWMoJmVudHJ5cHRyLT5lcHRl
LCBuZXcuZXB0ZSk7CiAKKyAgICAvKgorICAgICAqIFRoZSByZWNhbGMgZmll
bGQgb24gdGhlIEVQVCBpcyB1c2VkIHRvIHNpZ25hbCBlaXRoZXIgdGhhdCBh
CisgICAgICogcmVjYWxjdWxhdGlvbiBvZiB0aGUgRU1UIGZpZWxkIGlzIHJl
cXVpcmVkICh3aGljaCBkb2Vzbid0IGVmZmVjdCB0aGUKKyAgICAgKiBJT01N
VSksIG9yIGEgdHlwZSBjaGFuZ2UuIFR5cGUgY2hhbmdlcyBjYW4gb25seSBi
ZSBiZXR3ZWVuIHJhbV9ydywKKyAgICAgKiBsb2dkaXJ0eSBhbmQgaW9yZXFf
c2VydmVyOiBjaGFuZ2VzIHRvL2Zyb20gbG9nZGlydHkgd29uJ3Qgd29yayB3
ZWxsIHdpdGgKKyAgICAgKiBhbiBJT01NVSBhbnl3YXksIGFzIElPTU1VICNQ
RnMgYXJlIG5vdCBzeW5jaHJvbm91cyBhbmQgd2lsbCBsZWFkIHRvCisgICAg
ICogYWJvcnRzLCBhbmQgY2hhbmdlcyB0by9mcm9tIGlvcmVxX3NlcnZlciBh
cmUgYWxyZWFkeSBmdWxseSBmbHVzaGVkCisgICAgICogYmVmb3JlIHJldHVy
bmluZyB0byBndWVzdCBjb250ZXh0IChzZWUKKyAgICAgKiBYRU5fRE1PUF9t
YXBfbWVtX3R5cGVfdG9faW9yZXFfc2VydmVyKS4KKyAgICAgKi8KKyAgICBp
ZiAoICFuZXcucmVjYWxjICYmIGlvbW11X2hhcF9wdF9zaGFyZSApCisgICAg
ICAgIGlvbW11X3N5bmNfY2FjaGUoZW50cnlwdHIsIHNpemVvZigqZW50cnlw
dHIpKTsKKwogICAgIGlmICggdW5saWtlbHkob2xkbWZuICE9IG1mbl94KElO
VkFMSURfTUZOKSkgKQogICAgICAgICBwdXRfcGFnZShtZm5fdG9fcGFnZShv
bGRtZm4pKTsKIApAQCAtMzE5LDYgKzMzMiw5IEBAIHN0YXRpYyBib29sX3Qg
ZXB0X3NwbGl0X3N1cGVyX3BhZ2Uoc3RydWMKICAgICAgICAgICAgIGJyZWFr
OwogICAgIH0KIAorICAgIGlmICggaW9tbXVfaGFwX3B0X3NoYXJlICkKKyAg
ICAgICAgaW9tbXVfc3luY19jYWNoZSh0YWJsZSwgRVBUX1BBR0VUQUJMRV9F
TlRSSUVTICogc2l6ZW9mKGVwdF9lbnRyeV90KSk7CisKICAgICB1bm1hcF9k
b21haW5fcGFnZSh0YWJsZSk7CiAKICAgICAvKiBFdmVuIGZhaWxlZCB3ZSBz
aG91bGQgaW5zdGFsbCB0aGUgbmV3bHkgYWxsb2NhdGVkIGVwdCBwYWdlLiAq
LwpAQCAtMzc4LDYgKzM5NCw5IEBAIHN0YXRpYyBpbnQgZXB0X25leHRfbGV2
ZWwoc3RydWN0IHAybV9kb20KICAgICAgICAgaWYgKCAhbmV4dCApCiAgICAg
ICAgICAgICByZXR1cm4gR1VFU1RfVEFCTEVfTUFQX0ZBSUxFRDsKIAorICAg
ICAgICBpZiAoIGlvbW11X2hhcF9wdF9zaGFyZSApCisgICAgICAgICAgICBp
b21tdV9zeW5jX2NhY2hlKG5leHQsIEVQVF9QQUdFVEFCTEVfRU5UUklFUyAq
IHNpemVvZihlcHRfZW50cnlfdCkpOworCiAgICAgICAgIHJjID0gYXRvbWlj
X3dyaXRlX2VwdF9lbnRyeShlcHRfZW50cnksIGUsIG5leHRfbGV2ZWwpOwog
ICAgICAgICBBU1NFUlQocmMgPT0gMCk7CiAgICAgfQpAQCAtODczLDcgKzg5
Miw3IEBAIG91dDoKICAgICAgICAgIG5lZWRfbW9kaWZ5X3Z0ZF90YWJsZSAp
CiAgICAgewogICAgICAgICBpZiAoIGlvbW11X2hhcF9wdF9zaGFyZSApCi0g
ICAgICAgICAgICByYyA9IGlvbW11X3B0ZV9mbHVzaChkLCBnZm4sICZlcHRf
ZW50cnktPmVwdGUsIG9yZGVyLCB2dGRfcHRlX3ByZXNlbnQpOworICAgICAg
ICAgICAgcmMgPSBpb21tdV9mbHVzaF9pb3RsYihkLCBnZm4sIHZ0ZF9wdGVf
cHJlc2VudCwgMXUgPDwgb3JkZXIpOwogICAgICAgICBlbHNlCiAgICAgICAg
IHsKICAgICAgICAgICAgIGlmICggaW9tbXVfZmxhZ3MgKQotLS0gYS94ZW4v
ZHJpdmVycy9wYXNzdGhyb3VnaC92dGQvaW9tbXUuYworKysgYi94ZW4vZHJp
dmVycy9wYXNzdGhyb3VnaC92dGQvaW9tbXUuYwpAQCAtNjEyLDEwICs2MTIs
OCBAQCBzdGF0aWMgaW50IF9fbXVzdF9jaGVjayBpb21tdV9mbHVzaF9hbGwo
CiAgICAgcmV0dXJuIHJjOwogfQogCi1zdGF0aWMgaW50IF9fbXVzdF9jaGVj
ayBpb21tdV9mbHVzaF9pb3RsYihzdHJ1Y3QgZG9tYWluICpkLAotICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdW5zaWduZWQg
bG9uZyBnZm4sCi0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICBib29sX3QgZG1hX29sZF9wdGVfcHJlc2VudCwKLSAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHVuc2lnbmVkIGlu
dCBwYWdlX2NvdW50KQoraW50IGlvbW11X2ZsdXNoX2lvdGxiKHN0cnVjdCBk
b21haW4gKmQsIHVuc2lnbmVkIGxvbmcgZ2ZuLAorICAgICAgICAgICAgICAg
ICAgICAgIGJvb2wgZG1hX29sZF9wdGVfcHJlc2VudCwgdW5zaWduZWQgaW50
IHBhZ2VfY291bnQpCiB7CiAgICAgc3RydWN0IGRvbWFpbl9pb21tdSAqaGQg
PSBkb21faW9tbXUoZCk7CiAgICAgc3RydWN0IGFjcGlfZHJoZF91bml0ICpk
cmhkOwpAQCAtMTg3Niw1MyArMTg3NCw2IEBAIHN0YXRpYyBpbnQgX19tdXN0
X2NoZWNrIGludGVsX2lvbW11X3VubWEKICAgICByZXR1cm4gZG1hX3B0ZV9j
bGVhcl9vbmUoZCwgKHBhZGRyX3QpZ2ZuIDw8IFBBR0VfU0hJRlRfNEspOwog
fQogCi1pbnQgaW9tbXVfcHRlX2ZsdXNoKHN0cnVjdCBkb21haW4gKmQsIHU2
NCBnZm4sIHU2NCAqcHRlLAotICAgICAgICAgICAgICAgICAgICBpbnQgb3Jk
ZXIsIGludCBwcmVzZW50KQotewotICAgIHN0cnVjdCBhY3BpX2RyaGRfdW5p
dCAqZHJoZDsKLSAgICBzdHJ1Y3QgaW9tbXUgKmlvbW11ID0gTlVMTDsKLSAg
ICBzdHJ1Y3QgZG9tYWluX2lvbW11ICpoZCA9IGRvbV9pb21tdShkKTsKLSAg
ICBib29sX3QgZmx1c2hfZGV2X2lvdGxiOwotICAgIGludCBpb21tdV9kb21p
ZDsKLSAgICBpbnQgcmMgPSAwOwotCi0gICAgaW9tbXVfc3luY19jYWNoZShw
dGUsIHNpemVvZihzdHJ1Y3QgZG1hX3B0ZSkpOwotCi0gICAgZm9yX2VhY2hf
ZHJoZF91bml0ICggZHJoZCApCi0gICAgewotICAgICAgICBpb21tdSA9IGRy
aGQtPmlvbW11OwotICAgICAgICBpZiAoICF0ZXN0X2JpdChpb21tdS0+aW5k
ZXgsICZoZC0+YXJjaC5pb21tdV9iaXRtYXApICkKLSAgICAgICAgICAgIGNv
bnRpbnVlOwotCi0gICAgICAgIGZsdXNoX2Rldl9pb3RsYiA9ICEhZmluZF9h
dHNfZGV2X2RyaGQoaW9tbXUpOwotICAgICAgICBpb21tdV9kb21pZD0gZG9t
YWluX2lvbW11X2RvbWlkKGQsIGlvbW11KTsKLSAgICAgICAgaWYgKCBpb21t
dV9kb21pZCA9PSAtMSApCi0gICAgICAgICAgICBjb250aW51ZTsKLQotICAg
ICAgICByYyA9IGlvbW11X2ZsdXNoX2lvdGxiX3BzaShpb21tdSwgaW9tbXVf
ZG9taWQsCi0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIChw
YWRkcl90KWdmbiA8PCBQQUdFX1NISUZUXzRLLAotICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICBvcmRlciwgIXByZXNlbnQsIGZsdXNoX2Rl
dl9pb3RsYik7Ci0gICAgICAgIGlmICggcmMgPiAwICkKLSAgICAgICAgewot
ICAgICAgICAgICAgaW9tbXVfZmx1c2hfd3JpdGVfYnVmZmVyKGlvbW11KTsK
LSAgICAgICAgICAgIHJjID0gMDsKLSAgICAgICAgfQotICAgIH0KLQotICAg
IGlmICggdW5saWtlbHkocmMpICkKLSAgICB7Ci0gICAgICAgIGlmICggIWQt
PmlzX3NodXR0aW5nX2Rvd24gJiYgcHJpbnRrX3JhdGVsaW1pdCgpICkKLSAg
ICAgICAgICAgIHByaW50ayhYRU5MT0dfRVJSIFZURFBSRUZJWAotICAgICAg
ICAgICAgICAgICAgICIgZCVkOiBJT01NVSBwYWdlcyBmbHVzaCBmYWlsZWQ6
ICVkXG4iLAotICAgICAgICAgICAgICAgICAgIGQtPmRvbWFpbl9pZCwgcmMp
OwotCi0gICAgICAgIGlmICggIWlzX2hhcmR3YXJlX2RvbWFpbihkKSApCi0g
ICAgICAgICAgICBkb21haW5fY3Jhc2goZCk7Ci0gICAgfQotCi0gICAgcmV0
dXJuIHJjOwotfQotCiBzdGF0aWMgaW50IF9faW5pdCB2dGRfZXB0X3BhZ2Vf
Y29tcGF0aWJsZShzdHJ1Y3QgaW9tbXUgKmlvbW11KQogewogICAgIHU2NCBl
cHRfY2FwLCB2dGRfY2FwID0gaW9tbXUtPmNhcDsKLS0tIGEveGVuL2luY2x1
ZGUvYXNtLXg4Ni9pb21tdS5oCisrKyBiL3hlbi9pbmNsdWRlL2FzbS14ODYv
aW9tbXUuaApAQCAtODcsOCArODcsOSBAQCBpbnQgaW9tbXVfc2V0dXBfaHBl
dF9tc2koc3RydWN0IG1zaV9kZXNjCiAKIC8qIFdoaWxlIFZULWQgc3BlY2lm
aWMsIHRoaXMgbXVzdCBnZXQgZGVjbGFyZWQgaW4gYSBnZW5lcmljIGhlYWRl
ci4gKi8KIGludCBhZGp1c3RfdnRkX2lycV9hZmZpbml0aWVzKHZvaWQpOwot
aW50IF9fbXVzdF9jaGVjayBpb21tdV9wdGVfZmx1c2goc3RydWN0IGRvbWFp
biAqZCwgdTY0IGdmbiwgdTY0ICpwdGUsCi0gICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICBpbnQgb3JkZXIsIGludCBwcmVzZW50KTsKK2ludCBf
X211c3RfY2hlY2sgaW9tbXVfZmx1c2hfaW90bGIoc3RydWN0IGRvbWFpbiAq
ZCwgdW5zaWduZWQgbG9uZyBnZm4sCisgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgIGJvb2wgZG1hX29sZF9wdGVfcHJlc2VudCwKKyAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdW5zaWduZWQgaW50IHBh
Z2VfY291bnQpOwogYm9vbF90IGlvbW11X3N1cHBvcnRzX2VpbSh2b2lkKTsK
IGludCBpb21tdV9lbmFibGVfeDJhcGljX0lSKHZvaWQpOwogdm9pZCBpb21t
dV9kaXNhYmxlX3gyYXBpY19JUih2b2lkKTsK

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.10-1.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.10-1.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiB2dGQ6IGltcHJvdmUgSU9NTVUgVExCIGZsdXNoCgpEbyBub3QgbGltaXQg
UFNJIGZsdXNoZXMgdG8gb3JkZXIgMCBwYWdlcywgaW4gb3JkZXIgdG8gYXZv
aWQgZG9pbmcgYQpmdWxsIFRMQiBmbHVzaCBpZiB0aGUgcGFzc2VkIGluIHBh
Z2UgaGFzIGFuIG9yZGVyIGdyZWF0ZXIgdGhhbiAwIGFuZAppcyBhbGlnbmVk
LiBTaG91bGQgaW5jcmVhc2UgdGhlIHBlcmZvcm1hbmNlIG9mIElPTU1VIFRM
QiBmbHVzaGVzIHdoZW4KZGVhbGluZyB3aXRoIHBhZ2Ugb3JkZXJzIGdyZWF0
ZXIgdGhhbiAwLgoKVGhpcyBpcyBwYXJ0IG9mIFhTQS0zMjEuCgpTaWduZWQt
b2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+CgotLS0g
YS94ZW4vZHJpdmVycy9wYXNzdGhyb3VnaC92dGQvaW9tbXUuYworKysgYi94
ZW4vZHJpdmVycy9wYXNzdGhyb3VnaC92dGQvaW9tbXUuYwpAQCAtNjEyLDEz
ICs2MTIsMTQgQEAgc3RhdGljIGludCBfX211c3RfY2hlY2sgaW9tbXVfZmx1
c2hfaW90bAogICAgICAgICBpZiAoIGlvbW11X2RvbWlkID09IC0xICkKICAg
ICAgICAgICAgIGNvbnRpbnVlOwogCi0gICAgICAgIGlmICggcGFnZV9jb3Vu
dCAhPSAxIHx8IGdmbiA9PSBnZm5feChJTlZBTElEX0dGTikgKQorICAgICAg
ICBpZiAoICFwYWdlX2NvdW50IHx8IChwYWdlX2NvdW50ICYgKHBhZ2VfY291
bnQgLSAxKSkgfHwKKyAgICAgICAgICAgICBnZm4gPT0gZ2ZuX3goSU5WQUxJ
RF9HRk4pIHx8ICFJU19BTElHTkVEKGdmbiwgcGFnZV9jb3VudCkgKQogICAg
ICAgICAgICAgcmMgPSBpb21tdV9mbHVzaF9pb3RsYl9kc2koaW9tbXUsIGlv
bW11X2RvbWlkLAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgMCwgZmx1c2hfZGV2X2lvdGxiKTsKICAgICAgICAgZWxzZQogICAg
ICAgICAgICAgcmMgPSBpb21tdV9mbHVzaF9pb3RsYl9wc2koaW9tbXUsIGlv
bW11X2RvbWlkLAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgKHBhZGRyX3QpZ2ZuIDw8IFBBR0VfU0hJRlRfNEssCi0gICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBQQUdFX09SREVSXzRL
LAorICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZ2V0
X29yZGVyX2Zyb21fcGFnZXMocGFnZV9jb3VudCksCiAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAhZG1hX29sZF9wdGVfcHJlc2Vu
dCwKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGZs
dXNoX2Rldl9pb3RsYik7CiAK

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.10-2.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.10-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.10-3.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.10-3.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB4ODYv
aW9tbXU6IGludHJvZHVjZSBhIGNhY2hlIHN5bmMgaG9vawoKVGhlIGhvb2sg
aXMgb25seSBpbXBsZW1lbnRlZCBmb3IgVlQtZCBhbmQgaXQgdXNlcyB0aGUg
YWxyZWFkeSBleGlzdGluZwppb21tdV9zeW5jX2NhY2hlIGZ1bmN0aW9uIHBy
ZXNlbnQgaW4gVlQtZCBjb2RlLiBUaGUgbmV3IGhvb2sgaXMKYWRkZWQgc28g
dGhhdCB0aGUgY2FjaGUgY2FuIGJlIGZsdXNoZWQgYnkgY29kZSBvdXRzaWRl
IG9mIFZULWQgd2hlbgp1c2luZyBzaGFyZWQgcGFnZSB0YWJsZXMuCgpOb3Rl
IHRoYXQgYWxsb2NfcGd0YWJsZV9tYWRkciBtdXN0IHVzZSB0aGUgbm93IGxv
Y2FsbHkgZGVmaW5lZApzeW5jX2NhY2hlIGZ1bmN0aW9uLCBiZWNhdXNlIElP
TU1VIG9wcyBhcmUgbm90IHlldCBzZXR1cCB0aGUgZmlyc3QKdGltZSB0aGUg
ZnVuY3Rpb24gZ2V0cyBjYWxsZWQgZHVyaW5nIElPTU1VIGluaXRpYWxpemF0
aW9uLgoKTm8gZnVuY3Rpb25hbCBjaGFuZ2UgaW50ZW5kZWQuCgpUaGlzIGlz
IHBhcnQgb2YgWFNBLTMyMS4KClJldmlld2VkLWJ5OiBKYW4gQmV1bGljaCA8
amJldWxpY2hAc3VzZS5jb20+CgotLS0gYS94ZW4vZHJpdmVycy9wYXNzdGhy
b3VnaC92dGQvZXh0ZXJuLmgKKysrIGIveGVuL2RyaXZlcnMvcGFzc3Rocm91
Z2gvdnRkL2V4dGVybi5oCkBAIC0zNyw3ICszNyw2IEBAIHZvaWQgZGlzYWJs
ZV9xaW52YWwoc3RydWN0IGlvbW11ICppb21tdSkKIGludCBlbmFibGVfaW50
cmVtYXAoc3RydWN0IGlvbW11ICppb21tdSwgaW50IGVpbSk7CiB2b2lkIGRp
c2FibGVfaW50cmVtYXAoc3RydWN0IGlvbW11ICppb21tdSk7CiAKLXZvaWQg
aW9tbXVfc3luY19jYWNoZShjb25zdCB2b2lkICphZGRyLCB1bnNpZ25lZCBp
bnQgc2l6ZSk7CiBpbnQgaW9tbXVfYWxsb2Moc3RydWN0IGFjcGlfZHJoZF91
bml0ICpkcmhkKTsKIHZvaWQgaW9tbXVfZnJlZShzdHJ1Y3QgYWNwaV9kcmhk
X3VuaXQgKmRyaGQpOwogCi0tLSBhL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdo
L3Z0ZC9pb21tdS5jCisrKyBiL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0
ZC9pb21tdS5jCkBAIC0xNTksNyArMTU5LDcgQEAgc3RhdGljIHZvaWQgX19p
bml0IGZyZWVfaW50ZWxfaW9tbXUoc3RydQogCiBzdGF0aWMgaW50IGlvbW11
c19pbmNvaGVyZW50OwogCi12b2lkIGlvbW11X3N5bmNfY2FjaGUoY29uc3Qg
dm9pZCAqYWRkciwgdW5zaWduZWQgaW50IHNpemUpCitzdGF0aWMgdm9pZCBz
eW5jX2NhY2hlKGNvbnN0IHZvaWQgKmFkZHIsIHVuc2lnbmVkIGludCBzaXpl
KQogewogICAgIGludCBpOwogICAgIHN0YXRpYyB1bnNpZ25lZCBpbnQgY2xm
bHVzaF9zaXplID0gMDsKQEAgLTE5OCw3ICsxOTgsNyBAQCB1NjQgYWxsb2Nf
cGd0YWJsZV9tYWRkcihzdHJ1Y3QgYWNwaV9kcmhkCiAgICAgICAgIHZhZGRy
ID0gX19tYXBfZG9tYWluX3BhZ2UoY3VyX3BnKTsKICAgICAgICAgbWVtc2V0
KHZhZGRyLCAwLCBQQUdFX1NJWkUpOwogCi0gICAgICAgIGlvbW11X3N5bmNf
Y2FjaGUodmFkZHIsIFBBR0VfU0laRSk7CisgICAgICAgIHN5bmNfY2FjaGUo
dmFkZHIsIFBBR0VfU0laRSk7CiAgICAgICAgIHVubWFwX2RvbWFpbl9wYWdl
KHZhZGRyKTsKICAgICAgICAgY3VyX3BnKys7CiAgICAgfQpAQCAtMjY5Niw2
ICsyNjk2LDcgQEAgY29uc3Qgc3RydWN0IGlvbW11X29wcyBpbnRlbF9pb21t
dV9vcHMgPQogICAgIC5pb3RsYl9mbHVzaF9hbGwgPSBpb21tdV9mbHVzaF9p
b3RsYl9hbGwsCiAgICAgLmdldF9yZXNlcnZlZF9kZXZpY2VfbWVtb3J5ID0g
aW50ZWxfaW9tbXVfZ2V0X3Jlc2VydmVkX2RldmljZV9tZW1vcnksCiAgICAg
LmR1bXBfcDJtX3RhYmxlID0gdnRkX2R1bXBfcDJtX3RhYmxlLAorICAgIC5z
eW5jX2NhY2hlID0gc3luY19jYWNoZSwKIH07CiAKIC8qCi0tLSBhL3hlbi9p
bmNsdWRlL2FzbS14ODYvaW9tbXUuaAorKysgYi94ZW4vaW5jbHVkZS9hc20t
eDg2L2lvbW11LmgKQEAgLTk4LDYgKzk4LDEzIEBAIGV4dGVybiBib29sIHVu
dHJ1c3RlZF9tc2k7CiBpbnQgcGlfdXBkYXRlX2lydGUoY29uc3Qgc3RydWN0
IHBpX2Rlc2MgKnBpX2Rlc2MsIGNvbnN0IHN0cnVjdCBwaXJxICpwaXJxLAog
ICAgICAgICAgICAgICAgICAgIGNvbnN0IHVpbnQ4X3QgZ3ZlYyk7CiAKKyNk
ZWZpbmUgaW9tbXVfc3luY19jYWNoZShhZGRyLCBzaXplKSAoeyAgICAgICAg
ICAgICAgICAgXAorICAgIGNvbnN0IHN0cnVjdCBpb21tdV9vcHMgKm9wcyA9
IGlvbW11X2dldF9vcHMoKTsgICAgICBcCisgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFwKKyAgICBp
ZiAoIG9wcy0+c3luY19jYWNoZSApICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgXAorICAgICAgICBvcHMtPnN5bmNfY2FjaGUoYWRkciwgc2l6ZSk7
ICAgICAgICAgICAgICAgICAgICBcCit9KQorCiAjZW5kaWYgLyogIV9fQVJD
SF9YODZfSU9NTVVfSF9fICovCiAvKgogICogTG9jYWwgdmFyaWFibGVzOgot
LS0gYS94ZW4vaW5jbHVkZS94ZW4vaW9tbXUuaAorKysgYi94ZW4vaW5jbHVk
ZS94ZW4vaW9tbXUuaApAQCAtMTYwLDYgKzE2MCw3IEBAIHN0cnVjdCBpb21t
dV9vcHMgewogICAgIHZvaWQgKCp1cGRhdGVfaXJlX2Zyb21fYXBpYykodW5z
aWduZWQgaW50IGFwaWMsIHVuc2lnbmVkIGludCByZWcsIHVuc2lnbmVkIGlu
dCB2YWx1ZSk7CiAgICAgdW5zaWduZWQgaW50ICgqcmVhZF9hcGljX2Zyb21f
aXJlKSh1bnNpZ25lZCBpbnQgYXBpYywgdW5zaWduZWQgaW50IHJlZyk7CiAg
ICAgaW50ICgqc2V0dXBfaHBldF9tc2kpKHN0cnVjdCBtc2lfZGVzYyAqKTsK
KyAgICB2b2lkICgqc3luY19jYWNoZSkoY29uc3Qgdm9pZCAqYWRkciwgdW5z
aWduZWQgaW50IHNpemUpOwogI2VuZGlmIC8qIENPTkZJR19YODYgKi8KICAg
ICBpbnQgX19tdXN0X2NoZWNrICgqc3VzcGVuZCkodm9pZCk7CiAgICAgdm9p
ZCAoKnJlc3VtZSkodm9pZCk7Cg==

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.10-4.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.10-4.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB2dGQ6
IGRvbid0IGFzc3VtZSBhZGRyZXNzZXMgYXJlIGFsaWduZWQgaW4gc3luY19j
YWNoZQoKQ3VycmVudCBjb2RlIGluIHN5bmNfY2FjaGUgYXNzdW1lIHRoYXQg
dGhlIGFkZHJlc3MgcGFzc2VkIGluIGlzCmFsaWduZWQgdG8gYSBjYWNoZSBs
aW5lIHNpemUuIEZpeCB0aGUgY29kZSB0byBzdXBwb3J0IHBhc3NpbmcgaW4K
YXJiaXRyYXJ5IGFkZHJlc3NlcyBub3QgbmVjZXNzYXJpbHkgYWxpZ25lZCB0
byBhIGNhY2hlIGxpbmUgc2l6ZS4KClRoaXMgaXMgcGFydCBvZiBYU0EtMzIx
LgoKUmV2aWV3ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNv
bT4KCi0tLSBhL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0ZC9pb21tdS5j
CisrKyBiL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0ZC9pb21tdS5jCkBA
IC0xNjEsOCArMTYxLDggQEAgc3RhdGljIGludCBpb21tdXNfaW5jb2hlcmVu
dDsKIAogc3RhdGljIHZvaWQgc3luY19jYWNoZShjb25zdCB2b2lkICphZGRy
LCB1bnNpZ25lZCBpbnQgc2l6ZSkKIHsKLSAgICBpbnQgaTsKLSAgICBzdGF0
aWMgdW5zaWduZWQgaW50IGNsZmx1c2hfc2l6ZSA9IDA7CisgICAgc3RhdGlj
IHVuc2lnbmVkIGxvbmcgY2xmbHVzaF9zaXplID0gMDsKKyAgICBjb25zdCB2
b2lkICplbmQgPSBhZGRyICsgc2l6ZTsKIAogICAgIGlmICggIWlvbW11c19p
bmNvaGVyZW50ICkKICAgICAgICAgcmV0dXJuOwpAQCAtMTcwLDggKzE3MCw5
IEBAIHN0YXRpYyB2b2lkIHN5bmNfY2FjaGUoY29uc3Qgdm9pZCAqYWRkciwK
ICAgICBpZiAoIGNsZmx1c2hfc2l6ZSA9PSAwICkKICAgICAgICAgY2xmbHVz
aF9zaXplID0gZ2V0X2NhY2hlX2xpbmVfc2l6ZSgpOwogCi0gICAgZm9yICgg
aSA9IDA7IGkgPCBzaXplOyBpICs9IGNsZmx1c2hfc2l6ZSApCi0gICAgICAg
IGNhY2hlbGluZV9mbHVzaCgoY2hhciAqKWFkZHIgKyBpKTsKKyAgICBhZGRy
IC09ICh1bnNpZ25lZCBsb25nKWFkZHIgJiAoY2xmbHVzaF9zaXplIC0gMSk7
CisgICAgZm9yICggOyBhZGRyIDwgZW5kOyBhZGRyICs9IGNsZmx1c2hfc2l6
ZSApCisgICAgICAgIGNhY2hlbGluZV9mbHVzaCgoY2hhciAqKWFkZHIpOwog
fQogCiAvKiBBbGxvY2F0ZSBwYWdlIHRhYmxlLCByZXR1cm4gaXRzIG1hY2hp
bmUgYWRkcmVzcyAqLwo=

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.10-5.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.10-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.10-6.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.10-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.10-7.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.10-7.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.11-1.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.11-1.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiB2dGQ6IGltcHJvdmUgSU9NTVUgVExCIGZsdXNoCgpEbyBub3QgbGltaXQg
UFNJIGZsdXNoZXMgdG8gb3JkZXIgMCBwYWdlcywgaW4gb3JkZXIgdG8gYXZv
aWQgZG9pbmcgYQpmdWxsIFRMQiBmbHVzaCBpZiB0aGUgcGFzc2VkIGluIHBh
Z2UgaGFzIGFuIG9yZGVyIGdyZWF0ZXIgdGhhbiAwIGFuZAppcyBhbGlnbmVk
LiBTaG91bGQgaW5jcmVhc2UgdGhlIHBlcmZvcm1hbmNlIG9mIElPTU1VIFRM
QiBmbHVzaGVzIHdoZW4KZGVhbGluZyB3aXRoIHBhZ2Ugb3JkZXJzIGdyZWF0
ZXIgdGhhbiAwLgoKVGhpcyBpcyBwYXJ0IG9mIFhTQS0zMjEuCgpTaWduZWQt
b2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+CgotLS0g
YS94ZW4vZHJpdmVycy9wYXNzdGhyb3VnaC92dGQvaW9tbXUuYworKysgYi94
ZW4vZHJpdmVycy9wYXNzdGhyb3VnaC92dGQvaW9tbXUuYwpAQCAtNjEyLDEz
ICs2MTIsMTQgQEAgc3RhdGljIGludCBfX211c3RfY2hlY2sgaW9tbXVfZmx1
c2hfaW90bAogICAgICAgICBpZiAoIGlvbW11X2RvbWlkID09IC0xICkKICAg
ICAgICAgICAgIGNvbnRpbnVlOwogCi0gICAgICAgIGlmICggcGFnZV9jb3Vu
dCAhPSAxIHx8IGdmbiA9PSBnZm5feChJTlZBTElEX0dGTikgKQorICAgICAg
ICBpZiAoICFwYWdlX2NvdW50IHx8IChwYWdlX2NvdW50ICYgKHBhZ2VfY291
bnQgLSAxKSkgfHwKKyAgICAgICAgICAgICBnZm4gPT0gZ2ZuX3goSU5WQUxJ
RF9HRk4pIHx8ICFJU19BTElHTkVEKGdmbiwgcGFnZV9jb3VudCkgKQogICAg
ICAgICAgICAgcmMgPSBpb21tdV9mbHVzaF9pb3RsYl9kc2koaW9tbXUsIGlv
bW11X2RvbWlkLAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgMCwgZmx1c2hfZGV2X2lvdGxiKTsKICAgICAgICAgZWxzZQogICAg
ICAgICAgICAgcmMgPSBpb21tdV9mbHVzaF9pb3RsYl9wc2koaW9tbXUsIGlv
bW11X2RvbWlkLAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgKHBhZGRyX3QpZ2ZuIDw8IFBBR0VfU0hJRlRfNEssCi0gICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBQQUdFX09SREVSXzRL
LAorICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZ2V0
X29yZGVyX2Zyb21fcGFnZXMocGFnZV9jb3VudCksCiAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAhZG1hX29sZF9wdGVfcHJlc2Vu
dCwKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGZs
dXNoX2Rldl9pb3RsYik7CiAK

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.11-2.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.11-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.11-3.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.11-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.11-4.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.11-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.11-5.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.11-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.11-6.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.11-6.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB2dGQ6
IG9wdGltaXplIENQVSBjYWNoZSBzeW5jCgpTb21lIFZULWQgSU9NTVVzIGFy
ZSBub24tY29oZXJlbnQsIHdoaWNoIHJlcXVpcmVzIGEgY2FjaGUgd3JpdGUg
YmFjawppbiBvcmRlciBmb3IgdGhlIGNoYW5nZXMgbWFkZSBieSB0aGUgQ1BV
IHRvIGJlIHZpc2libGUgdG8gdGhlIElPTU1VLgpUaGlzIGNhY2hlIHdyaXRl
IGJhY2sgd2FzIHVuY29uZGl0aW9uYWxseSBkb25lIHVzaW5nIGNsZmx1c2gs
IGJ1dCB0aGVyZSBhcmUKb3RoZXIgbW9yZSBlZmZpY2llbnQgaW5zdHJ1Y3Rp
b25zIHRvIGRvIHNvLCBoZW5jZSBpbXBsZW1lbnQgc3VwcG9ydApmb3IgdGhl
bSB1c2luZyB0aGUgYWx0ZXJuYXRpdmUgZnJhbWV3b3JrLgoKVGhpcyBpcyBw
YXJ0IG9mIFhTQS0zMjEuCgpSZXZpZXdlZC1ieTogSmFuIEJldWxpY2ggPGpi
ZXVsaWNoQHN1c2UuY29tPgoKLS0tIGEveGVuL2RyaXZlcnMvcGFzc3Rocm91
Z2gvdnRkL2V4dGVybi5oCisrKyBiL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdo
L3Z0ZC9leHRlcm4uaApAQCAtNjMsNyArNjMsNiBAQCBpbnQgX19tdXN0X2No
ZWNrIHFpbnZhbF9kZXZpY2VfaW90bGJfc3luCiAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICB1MTYgZGlkLCB1MTYgc2l6ZSwg
dTY0IGFkZHIpOwogCiB1bnNpZ25lZCBpbnQgZ2V0X2NhY2hlX2xpbmVfc2l6
ZSh2b2lkKTsKLXZvaWQgY2FjaGVsaW5lX2ZsdXNoKGNoYXIgKik7CiB2b2lk
IGZsdXNoX2FsbF9jYWNoZSh2b2lkKTsKIAogdTY0IGFsbG9jX3BndGFibGVf
bWFkZHIoc3RydWN0IGFjcGlfZHJoZF91bml0ICpkcmhkLCB1bnNpZ25lZCBs
b25nIG5wYWdlcyk7Ci0tLSBhL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0
ZC9pb21tdS5jCisrKyBiL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0ZC9p
b21tdS5jCkBAIC0zMSw2ICszMSw3IEBACiAjaW5jbHVkZSA8eGVuL3BjaV9y
ZWdzLmg+CiAjaW5jbHVkZSA8eGVuL2tleWhhbmRsZXIuaD4KICNpbmNsdWRl
IDxhc20vbXNpLmg+CisjaW5jbHVkZSA8YXNtL25vcHMuaD4KICNpbmNsdWRl
IDxhc20vaXJxLmg+CiAjaW5jbHVkZSA8YXNtL2h2bS92bXgvdm14Lmg+CiAj
aW5jbHVkZSA8YXNtL3AybS5oPgpAQCAtMTcyLDcgKzE3Myw0MiBAQCBzdGF0
aWMgdm9pZCBzeW5jX2NhY2hlKGNvbnN0IHZvaWQgKmFkZHIsCiAKICAgICBh
ZGRyIC09ICh1bnNpZ25lZCBsb25nKWFkZHIgJiAoY2xmbHVzaF9zaXplIC0g
MSk7CiAgICAgZm9yICggOyBhZGRyIDwgZW5kOyBhZGRyICs9IGNsZmx1c2hf
c2l6ZSApCi0gICAgICAgIGNhY2hlbGluZV9mbHVzaCgoY2hhciAqKWFkZHIp
OworLyoKKyAqIFRoZSBhcmd1bWVudHMgdG8gYSBtYWNybyBtdXN0IG5vdCBp
bmNsdWRlIHByZXByb2Nlc3NvciBkaXJlY3RpdmVzLiBEb2luZyBzbworICog
cmVzdWx0cyBpbiB1bmRlZmluZWQgYmVoYXZpb3IsIHNvIHdlIGhhdmUgdG8g
Y3JlYXRlIHNvbWUgZGVmaW5lcyBoZXJlIGluCisgKiBvcmRlciB0byBhdm9p
ZCBpdC4KKyAqLworI2lmIGRlZmluZWQoSEFWRV9BU19DTFdCKQorIyBkZWZp
bmUgQ0xXQl9FTkNPRElORyAiY2x3YiAlW3BdIgorI2VsaWYgZGVmaW5lZChI
QVZFX0FTX1hTQVZFT1BUKQorIyBkZWZpbmUgQ0xXQl9FTkNPRElORyAiZGF0
YTE2IHhzYXZlb3B0ICVbcF0iIC8qIGNsd2IgKi8KKyNlbHNlCisjIGRlZmlu
ZSBDTFdCX0VOQ09ESU5HICIuYnl0ZSAweDY2LCAweDBmLCAweGFlLCAweDMw
IiAvKiBjbHdiICglJXJheCkgKi8KKyNlbmRpZgorCisjZGVmaW5lIEJBU0Vf
SU5QVVQoYWRkcikgW3BdICJtIiAoKihjb25zdCBjaGFyICopKGFkZHIpKQor
I2lmIGRlZmluZWQoSEFWRV9BU19DTFdCKSB8fCBkZWZpbmVkKEhBVkVfQVNf
WFNBVkVPUFQpCisjIGRlZmluZSBJTlBVVCBCQVNFX0lOUFVUCisjZWxzZQor
IyBkZWZpbmUgSU5QVVQoYWRkcikgImEiIChhZGRyKSwgQkFTRV9JTlBVVChh
ZGRyKQorI2VuZGlmCisgICAgICAgIC8qCisgICAgICAgICAqIE5vdGUgcmVn
YXJkaW5nIHRoZSB1c2Ugb2YgTk9QX0RTX1BSRUZJWDogaXQncyBmYXN0ZXIg
dG8gZG8gYSBjbGZsdXNoCisgICAgICAgICAqICsgcHJlZml4IHRoYW4gYSBj
bGZsdXNoICsgbm9wLCBhbmQgaGVuY2UgdGhlIHByZWZpeCBpcyBhZGRlZCBp
bnN0ZWFkCisgICAgICAgICAqIG9mIGxldHRpbmcgdGhlIGFsdGVybmF0aXZl
IGZyYW1ld29yayBmaWxsIHRoZSBnYXAgYnkgYXBwZW5kaW5nIG5vcHMuCisg
ICAgICAgICAqLworICAgICAgICBhbHRlcm5hdGl2ZV9pb18yKCIuYnl0ZSAi
IF9fc3RyaW5naWZ5KE5PUF9EU19QUkVGSVgpICI7IGNsZmx1c2ggJVtwXSIs
CisgICAgICAgICAgICAgICAgICAgICAgICAgImRhdGExNiBjbGZsdXNoICVb
cF0iLCAvKiBjbGZsdXNob3B0ICovCisgICAgICAgICAgICAgICAgICAgICAg
ICAgWDg2X0ZFQVRVUkVfQ0xGTFVTSE9QVCwKKyAgICAgICAgICAgICAgICAg
ICAgICAgICBDTFdCX0VOQ09ESU5HLAorICAgICAgICAgICAgICAgICAgICAg
ICAgIFg4Nl9GRUFUVVJFX0NMV0IsIC8qIG5vIG91dHB1dHMgKi8sCisgICAg
ICAgICAgICAgICAgICAgICAgICAgSU5QVVQoYWRkcikpOworI3VuZGVmIElO
UFVUCisjdW5kZWYgQkFTRV9JTlBVVAorI3VuZGVmIENMV0JfRU5DT0RJTkcK
KworICAgIGFsdGVybmF0aXZlXzIoIiIsICJzZmVuY2UiLCBYODZfRkVBVFVS
RV9DTEZMVVNIT1BULAorICAgICAgICAgICAgICAgICAgICAgICJzZmVuY2Ui
LCBYODZfRkVBVFVSRV9DTFdCKTsKIH0KIAogLyogQWxsb2NhdGUgcGFnZSB0
YWJsZSwgcmV0dXJuIGl0cyBtYWNoaW5lIGFkZHJlc3MgKi8KLS0tIGEveGVu
L2RyaXZlcnMvcGFzc3Rocm91Z2gvdnRkL3g4Ni92dGQuYworKysgYi94ZW4v
ZHJpdmVycy9wYXNzdGhyb3VnaC92dGQveDg2L3Z0ZC5jCkBAIC01MywxMSAr
NTMsNiBAQCB1bnNpZ25lZCBpbnQgZ2V0X2NhY2hlX2xpbmVfc2l6ZSh2b2lk
KQogICAgIHJldHVybiAoKGNwdWlkX2VieCgxKSA+PiA4KSAmIDB4ZmYpICog
ODsKIH0KIAotdm9pZCBjYWNoZWxpbmVfZmx1c2goY2hhciAqIGFkZHIpCi17
Ci0gICAgY2xmbHVzaChhZGRyKTsKLX0KLQogdm9pZCBmbHVzaF9hbGxfY2Fj
aGUoKQogewogICAgIHdiaW52ZCgpOwo=

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.11-7.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.11-7.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.12-1.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.12-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.12-2.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.12-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.12-3.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.12-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.12-4.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.12-4.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB2dGQ6
IGRvbid0IGFzc3VtZSBhZGRyZXNzZXMgYXJlIGFsaWduZWQgaW4gc3luY19j
YWNoZQoKQ3VycmVudCBjb2RlIGluIHN5bmNfY2FjaGUgYXNzdW1lIHRoYXQg
dGhlIGFkZHJlc3MgcGFzc2VkIGluIGlzCmFsaWduZWQgdG8gYSBjYWNoZSBs
aW5lIHNpemUuIEZpeCB0aGUgY29kZSB0byBzdXBwb3J0IHBhc3NpbmcgaW4K
YXJiaXRyYXJ5IGFkZHJlc3NlcyBub3QgbmVjZXNzYXJpbHkgYWxpZ25lZCB0
byBhIGNhY2hlIGxpbmUgc2l6ZS4KClRoaXMgaXMgcGFydCBvZiBYU0EtMzIx
LgoKUmV2aWV3ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNv
bT4KCi0tLSBhL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0ZC9pb21tdS5j
CisrKyBiL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0ZC9pb21tdS5jCkBA
IC0xNjEsOCArMTYxLDggQEAgc3RhdGljIGludCBpb21tdXNfaW5jb2hlcmVu
dDsKIAogc3RhdGljIHZvaWQgc3luY19jYWNoZShjb25zdCB2b2lkICphZGRy
LCB1bnNpZ25lZCBpbnQgc2l6ZSkKIHsKLSAgICBpbnQgaTsKLSAgICBzdGF0
aWMgdW5zaWduZWQgaW50IGNsZmx1c2hfc2l6ZSA9IDA7CisgICAgc3RhdGlj
IHVuc2lnbmVkIGxvbmcgY2xmbHVzaF9zaXplID0gMDsKKyAgICBjb25zdCB2
b2lkICplbmQgPSBhZGRyICsgc2l6ZTsKIAogICAgIGlmICggIWlvbW11c19p
bmNvaGVyZW50ICkKICAgICAgICAgcmV0dXJuOwpAQCAtMTcwLDggKzE3MCw5
IEBAIHN0YXRpYyB2b2lkIHN5bmNfY2FjaGUoY29uc3Qgdm9pZCAqYWRkciwK
ICAgICBpZiAoIGNsZmx1c2hfc2l6ZSA9PSAwICkKICAgICAgICAgY2xmbHVz
aF9zaXplID0gZ2V0X2NhY2hlX2xpbmVfc2l6ZSgpOwogCi0gICAgZm9yICgg
aSA9IDA7IGkgPCBzaXplOyBpICs9IGNsZmx1c2hfc2l6ZSApCi0gICAgICAg
IGNhY2hlbGluZV9mbHVzaCgoY2hhciAqKWFkZHIgKyBpKTsKKyAgICBhZGRy
IC09ICh1bnNpZ25lZCBsb25nKWFkZHIgJiAoY2xmbHVzaF9zaXplIC0gMSk7
CisgICAgZm9yICggOyBhZGRyIDwgZW5kOyBhZGRyICs9IGNsZmx1c2hfc2l6
ZSApCisgICAgICAgIGNhY2hlbGluZV9mbHVzaCgoY2hhciAqKWFkZHIpOwog
fQogCiAvKiBBbGxvY2F0ZSBwYWdlIHRhYmxlLCByZXR1cm4gaXRzIG1hY2hp
bmUgYWRkcmVzcyAqLwo=

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.12-5.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.12-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.12-6.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.12-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.12-7.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.12-7.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.13-1.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.13-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.13-2.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.13-2.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB2dGQ6
IHBydW5lIChhbmQgcmVuYW1lKSBjYWNoZSBmbHVzaCBmdW5jdGlvbnMKClJl
bmFtZSBfX2lvbW11X2ZsdXNoX2NhY2hlIHRvIGlvbW11X3N5bmNfY2FjaGUg
YW5kIHJlbW92ZQppb21tdV9mbHVzaF9jYWNoZV9wYWdlLiBBbHNvIHJlbW92
ZSB0aGUgaW9tbXVfZmx1c2hfY2FjaGVfZW50cnkKd3JhcHBlciBhbmQganVz
dCB1c2UgaW9tbXVfc3luY19jYWNoZSBpbnN0ZWFkLiBOb3RlIHRoZSBfZW50
cnkgc3VmZml4CndhcyBtZWFuaW5nbGVzcyBhcyB0aGUgd3JhcHBlciB3YXMg
YWxyZWFkeSB0YWtpbmcgYSBzaXplIHBhcmFtZXRlciBpbgpieXRlcy4gV2hp
bGUgdGhlcmUgYWxzbyBjb25zdGlmeSB0aGUgYWRkciBwYXJhbWV0ZXIuCgpO
byBmdW5jdGlvbmFsIGNoYW5nZSBpbnRlbmRlZC4KClRoaXMgaXMgcGFydCBv
ZiBYU0EtMzIxLgoKUmV2aWV3ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGlj
aEBzdXNlLmNvbT4KCi0tLSBhL3hlbi9kcml2ZXJzL3Bhc3N0aHJvdWdoL3Z0
ZC9leHRlcm4uaAorKysgYi94ZW4vZHJpdmVycy9wYXNzdGhyb3VnaC92dGQv
ZXh0ZXJuLmgKQEAgLTQzLDggKzQzLDcgQEAgdm9pZCBkaXNhYmxlX3FpbnZh
bChzdHJ1Y3QgdnRkX2lvbW11ICppbwogaW50IGVuYWJsZV9pbnRyZW1hcChz
dHJ1Y3QgdnRkX2lvbW11ICppb21tdSwgaW50IGVpbSk7CiB2b2lkIGRpc2Fi
bGVfaW50cmVtYXAoc3RydWN0IHZ0ZF9pb21tdSAqaW9tbXUpOwogCi12b2lk
IGlvbW11X2ZsdXNoX2NhY2hlX2VudHJ5KHZvaWQgKmFkZHIsIHVuc2lnbmVk
IGludCBzaXplKTsKLXZvaWQgaW9tbXVfZmx1c2hfY2FjaGVfcGFnZSh2b2lk
ICphZGRyLCB1bnNpZ25lZCBsb25nIG5wYWdlcyk7Cit2b2lkIGlvbW11X3N5
bmNfY2FjaGUoY29uc3Qgdm9pZCAqYWRkciwgdW5zaWduZWQgaW50IHNpemUp
OwogaW50IGlvbW11X2FsbG9jKHN0cnVjdCBhY3BpX2RyaGRfdW5pdCAqZHJo
ZCk7CiB2b2lkIGlvbW11X2ZyZWUoc3RydWN0IGFjcGlfZHJoZF91bml0ICpk
cmhkKTsKIAotLS0gYS94ZW4vZHJpdmVycy9wYXNzdGhyb3VnaC92dGQvaW50
cmVtYXAuYworKysgYi94ZW4vZHJpdmVycy9wYXNzdGhyb3VnaC92dGQvaW50
cmVtYXAuYwpAQCAtMjMwLDcgKzIzMCw3IEBAIHN0YXRpYyB2b2lkIGZyZWVf
cmVtYXBfZW50cnkoc3RydWN0IHZ0ZF8KICAgICAgICAgICAgICAgICAgICAg
IGlyZW1hcF9lbnRyaWVzLCBpcmVtYXBfZW50cnkpOwogCiAgICAgdXBkYXRl
X2lydGUoaW9tbXUsIGlyZW1hcF9lbnRyeSwgJm5ld19pcmUsIGZhbHNlKTsK
LSAgICBpb21tdV9mbHVzaF9jYWNoZV9lbnRyeShpcmVtYXBfZW50cnksIHNp
emVvZigqaXJlbWFwX2VudHJ5KSk7CisgICAgaW9tbXVfc3luY19jYWNoZShp
cmVtYXBfZW50cnksIHNpemVvZigqaXJlbWFwX2VudHJ5KSk7CiAgICAgaW9t
bXVfZmx1c2hfaWVjX2luZGV4KGlvbW11LCAwLCBpbmRleCk7CiAKICAgICB1
bm1hcF92dGRfZG9tYWluX3BhZ2UoaXJlbWFwX2VudHJpZXMpOwpAQCAtNDA2
LDcgKzQwNiw3IEBAIHN0YXRpYyBpbnQgaW9hcGljX3J0ZV90b19yZW1hcF9l
bnRyeShzdHIKICAgICB9CiAKICAgICB1cGRhdGVfaXJ0ZShpb21tdSwgaXJl
bWFwX2VudHJ5LCAmbmV3X2lyZSwgIWluaXQpOwotICAgIGlvbW11X2ZsdXNo
X2NhY2hlX2VudHJ5KGlyZW1hcF9lbnRyeSwgc2l6ZW9mKCppcmVtYXBfZW50
cnkpKTsKKyAgICBpb21tdV9zeW5jX2NhY2hlKGlyZW1hcF9lbnRyeSwgc2l6
ZW9mKCppcmVtYXBfZW50cnkpKTsKICAgICBpb21tdV9mbHVzaF9pZWNfaW5k
ZXgoaW9tbXUsIDAsIGluZGV4KTsKIAogICAgIHVubWFwX3Z0ZF9kb21haW5f
cGFnZShpcmVtYXBfZW50cmllcyk7CkBAIC02OTUsNyArNjk1LDcgQEAgc3Rh
dGljIGludCBtc2lfbXNnX3RvX3JlbWFwX2VudHJ5KAogICAgIHVwZGF0ZV9p
cnRlKGlvbW11LCBpcmVtYXBfZW50cnksICZuZXdfaXJlLCBtc2lfZGVzYy0+
aXJ0ZV9pbml0aWFsaXplZCk7CiAgICAgbXNpX2Rlc2MtPmlydGVfaW5pdGlh
bGl6ZWQgPSB0cnVlOwogCi0gICAgaW9tbXVfZmx1c2hfY2FjaGVfZW50cnko
aXJlbWFwX2VudHJ5LCBzaXplb2YoKmlyZW1hcF9lbnRyeSkpOworICAgIGlv
bW11X3N5bmNfY2FjaGUoaXJlbWFwX2VudHJ5LCBzaXplb2YoKmlyZW1hcF9l
bnRyeSkpOwogICAgIGlvbW11X2ZsdXNoX2llY19pbmRleChpb21tdSwgMCwg
aW5kZXgpOwogCiAgICAgdW5tYXBfdnRkX2RvbWFpbl9wYWdlKGlyZW1hcF9l
bnRyaWVzKTsKLS0tIGEveGVuL2RyaXZlcnMvcGFzc3Rocm91Z2gvdnRkL2lv
bW11LmMKKysrIGIveGVuL2RyaXZlcnMvcGFzc3Rocm91Z2gvdnRkL2lvbW11
LmMKQEAgLTE0MCw3ICsxNDAsOCBAQCBzdGF0aWMgaW50IGNvbnRleHRfZ2V0
X2RvbWFpbl9pZChzdHJ1Y3QKIH0KIAogc3RhdGljIGludCBpb21tdXNfaW5j
b2hlcmVudDsKLXN0YXRpYyB2b2lkIF9faW9tbXVfZmx1c2hfY2FjaGUodm9p
ZCAqYWRkciwgdW5zaWduZWQgaW50IHNpemUpCisKK3ZvaWQgaW9tbXVfc3lu
Y19jYWNoZShjb25zdCB2b2lkICphZGRyLCB1bnNpZ25lZCBpbnQgc2l6ZSkK
IHsKICAgICBpbnQgaTsKICAgICBzdGF0aWMgdW5zaWduZWQgaW50IGNsZmx1
c2hfc2l6ZSA9IDA7CkBAIC0xNTUsMTYgKzE1Niw2IEBAIHN0YXRpYyB2b2lk
IF9faW9tbXVfZmx1c2hfY2FjaGUodm9pZCAqYWQKICAgICAgICAgY2FjaGVs
aW5lX2ZsdXNoKChjaGFyICopYWRkciArIGkpOwogfQogCi12b2lkIGlvbW11
X2ZsdXNoX2NhY2hlX2VudHJ5KHZvaWQgKmFkZHIsIHVuc2lnbmVkIGludCBz
aXplKQotewotICAgIF9faW9tbXVfZmx1c2hfY2FjaGUoYWRkciwgc2l6ZSk7
Ci19Ci0KLXZvaWQgaW9tbXVfZmx1c2hfY2FjaGVfcGFnZSh2b2lkICphZGRy
LCB1bnNpZ25lZCBsb25nIG5wYWdlcykKLXsKLSAgICBfX2lvbW11X2ZsdXNo
X2NhY2hlKGFkZHIsIFBBR0VfU0laRSAqIG5wYWdlcyk7Ci19Ci0KIC8qIEFs
bG9jYXRlIHBhZ2UgdGFibGUsIHJldHVybiBpdHMgbWFjaGluZSBhZGRyZXNz
ICovCiB1aW50NjRfdCBhbGxvY19wZ3RhYmxlX21hZGRyKHVuc2lnbmVkIGxv
bmcgbnBhZ2VzLCBub2RlaWRfdCBub2RlKQogewpAQCAtMTgzLDcgKzE3NCw3
IEBAIHVpbnQ2NF90IGFsbG9jX3BndGFibGVfbWFkZHIodW5zaWduZWQgbG8K
ICAgICAgICAgdmFkZHIgPSBfX21hcF9kb21haW5fcGFnZShjdXJfcGcpOwog
ICAgICAgICBtZW1zZXQodmFkZHIsIDAsIFBBR0VfU0laRSk7CiAKLSAgICAg
ICAgaW9tbXVfZmx1c2hfY2FjaGVfcGFnZSh2YWRkciwgMSk7CisgICAgICAg
IGlvbW11X3N5bmNfY2FjaGUodmFkZHIsIFBBR0VfU0laRSk7CiAgICAgICAg
IHVubWFwX2RvbWFpbl9wYWdlKHZhZGRyKTsKICAgICAgICAgY3VyX3BnKys7
CiAgICAgfQpAQCAtMjE2LDcgKzIwNyw3IEBAIHN0YXRpYyB1NjQgYnVzX3Rv
X2NvbnRleHRfbWFkZHIoc3RydWN0IHYKICAgICAgICAgfQogICAgICAgICBz
ZXRfcm9vdF92YWx1ZSgqcm9vdCwgbWFkZHIpOwogICAgICAgICBzZXRfcm9v
dF9wcmVzZW50KCpyb290KTsKLSAgICAgICAgaW9tbXVfZmx1c2hfY2FjaGVf
ZW50cnkocm9vdCwgc2l6ZW9mKHN0cnVjdCByb290X2VudHJ5KSk7CisgICAg
ICAgIGlvbW11X3N5bmNfY2FjaGUocm9vdCwgc2l6ZW9mKHN0cnVjdCByb290
X2VudHJ5KSk7CiAgICAgfQogICAgIG1hZGRyID0gKHU2NCkgZ2V0X2NvbnRl
eHRfYWRkcigqcm9vdCk7CiAgICAgdW5tYXBfdnRkX2RvbWFpbl9wYWdlKHJv
b3RfZW50cmllcyk7CkBAIC0yNjMsNyArMjU0LDcgQEAgc3RhdGljIHU2NCBh
ZGRyX3RvX2RtYV9wYWdlX21hZGRyKHN0cnVjdAogICAgICAgICAgICAgICov
CiAgICAgICAgICAgICBkbWFfc2V0X3B0ZV9yZWFkYWJsZSgqcHRlKTsKICAg
ICAgICAgICAgIGRtYV9zZXRfcHRlX3dyaXRhYmxlKCpwdGUpOwotICAgICAg
ICAgICAgaW9tbXVfZmx1c2hfY2FjaGVfZW50cnkocHRlLCBzaXplb2Yoc3Ry
dWN0IGRtYV9wdGUpKTsKKyAgICAgICAgICAgIGlvbW11X3N5bmNfY2FjaGUo
cHRlLCBzaXplb2Yoc3RydWN0IGRtYV9wdGUpKTsKICAgICAgICAgfQogCiAg
ICAgICAgIGlmICggbGV2ZWwgPT0gMiApCkBAIC02NDAsNyArNjMxLDcgQEAg
c3RhdGljIGludCBfX211c3RfY2hlY2sgZG1hX3B0ZV9jbGVhcl9vbgogICAg
ICpmbHVzaF9mbGFncyB8PSBJT01NVV9GTFVTSEZfbW9kaWZpZWQ7CiAKICAg
ICBzcGluX3VubG9jaygmaGQtPmFyY2gubWFwcGluZ19sb2NrKTsKLSAgICBp
b21tdV9mbHVzaF9jYWNoZV9lbnRyeShwdGUsIHNpemVvZihzdHJ1Y3QgZG1h
X3B0ZSkpOworICAgIGlvbW11X3N5bmNfY2FjaGUocHRlLCBzaXplb2Yoc3Ry
dWN0IGRtYV9wdGUpKTsKIAogICAgIHVubWFwX3Z0ZF9kb21haW5fcGFnZShw
YWdlKTsKIApAQCAtNjc5LDcgKzY3MCw3IEBAIHN0YXRpYyB2b2lkIGlvbW11
X2ZyZWVfcGFnZV90YWJsZShzdHJ1Y3QKICAgICAgICAgICAgIGlvbW11X2Zy
ZWVfcGFnZXRhYmxlKGRtYV9wdGVfYWRkcigqcHRlKSwgbmV4dF9sZXZlbCk7
CiAKICAgICAgICAgZG1hX2NsZWFyX3B0ZSgqcHRlKTsKLSAgICAgICAgaW9t
bXVfZmx1c2hfY2FjaGVfZW50cnkocHRlLCBzaXplb2Yoc3RydWN0IGRtYV9w
dGUpKTsKKyAgICAgICAgaW9tbXVfc3luY19jYWNoZShwdGUsIHNpemVvZihz
dHJ1Y3QgZG1hX3B0ZSkpOwogICAgIH0KIAogICAgIHVubWFwX3Z0ZF9kb21h
aW5fcGFnZShwdF92YWRkcik7CkBAIC0xNDAwLDcgKzEzOTEsNyBAQCBpbnQg
ZG9tYWluX2NvbnRleHRfbWFwcGluZ19vbmUoCiAgICAgY29udGV4dF9zZXRf
YWRkcmVzc193aWR0aCgqY29udGV4dCwgYWdhdyk7CiAgICAgY29udGV4dF9z
ZXRfZmF1bHRfZW5hYmxlKCpjb250ZXh0KTsKICAgICBjb250ZXh0X3NldF9w
cmVzZW50KCpjb250ZXh0KTsKLSAgICBpb21tdV9mbHVzaF9jYWNoZV9lbnRy
eShjb250ZXh0LCBzaXplb2Yoc3RydWN0IGNvbnRleHRfZW50cnkpKTsKKyAg
ICBpb21tdV9zeW5jX2NhY2hlKGNvbnRleHQsIHNpemVvZihzdHJ1Y3QgY29u
dGV4dF9lbnRyeSkpOwogICAgIHNwaW5fdW5sb2NrKCZpb21tdS0+bG9jayk7
CiAKICAgICAvKiBDb250ZXh0IGVudHJ5IHdhcyBwcmV2aW91c2x5IG5vbi1w
cmVzZW50ICh3aXRoIGRvbWlkIDApLiAqLwpAQCAtMTU2NCw3ICsxNTU1LDcg
QEAgaW50IGRvbWFpbl9jb250ZXh0X3VubWFwX29uZSgKIAogICAgIGNvbnRl
eHRfY2xlYXJfcHJlc2VudCgqY29udGV4dCk7CiAgICAgY29udGV4dF9jbGVh
cl9lbnRyeSgqY29udGV4dCk7Ci0gICAgaW9tbXVfZmx1c2hfY2FjaGVfZW50
cnkoY29udGV4dCwgc2l6ZW9mKHN0cnVjdCBjb250ZXh0X2VudHJ5KSk7Cisg
ICAgaW9tbXVfc3luY19jYWNoZShjb250ZXh0LCBzaXplb2Yoc3RydWN0IGNv
bnRleHRfZW50cnkpKTsKIAogICAgIGlvbW11X2RvbWlkPSBkb21haW5faW9t
bXVfZG9taWQoZG9tYWluLCBpb21tdSk7CiAgICAgaWYgKCBpb21tdV9kb21p
ZCA9PSAtMSApCkBAIC0xNzkxLDcgKzE3ODIsNyBAQCBzdGF0aWMgaW50IF9f
bXVzdF9jaGVjayBpbnRlbF9pb21tdV9tYXBfCiAKICAgICAqcHRlID0gbmV3
OwogCi0gICAgaW9tbXVfZmx1c2hfY2FjaGVfZW50cnkocHRlLCBzaXplb2Yo
c3RydWN0IGRtYV9wdGUpKTsKKyAgICBpb21tdV9zeW5jX2NhY2hlKHB0ZSwg
c2l6ZW9mKHN0cnVjdCBkbWFfcHRlKSk7CiAgICAgc3Bpbl91bmxvY2soJmhk
LT5hcmNoLm1hcHBpbmdfbG9jayk7CiAgICAgdW5tYXBfdnRkX2RvbWFpbl9w
YWdlKHBhZ2UpOwogCkBAIC0xODY2LDcgKzE4NTcsNyBAQCBpbnQgaW9tbXVf
cHRlX2ZsdXNoKHN0cnVjdCBkb21haW4gKmQsIHVpCiAgICAgaW50IGlvbW11
X2RvbWlkOwogICAgIGludCByYyA9IDA7CiAKLSAgICBpb21tdV9mbHVzaF9j
YWNoZV9lbnRyeShwdGUsIHNpemVvZihzdHJ1Y3QgZG1hX3B0ZSkpOworICAg
IGlvbW11X3N5bmNfY2FjaGUocHRlLCBzaXplb2Yoc3RydWN0IGRtYV9wdGUp
KTsKIAogICAgIGZvcl9lYWNoX2RyaGRfdW5pdCAoIGRyaGQgKQogICAgIHsK
QEAgLTI3MjQsNyArMjcxNSw3IEBAIHN0YXRpYyBpbnQgX19pbml0IGludGVs
X2lvbW11X3F1YXJhbnRpbmUKICAgICAgICAgICAgIGRtYV9zZXRfcHRlX2Fk
ZHIoKnB0ZSwgbWFkZHIpOwogICAgICAgICAgICAgZG1hX3NldF9wdGVfcmVh
ZGFibGUoKnB0ZSk7CiAgICAgICAgIH0KLSAgICAgICAgaW9tbXVfZmx1c2hf
Y2FjaGVfcGFnZShwYXJlbnQsIDEpOworICAgICAgICBpb21tdV9zeW5jX2Nh
Y2hlKHBhcmVudCwgUEFHRV9TSVpFKTsKIAogICAgICAgICB1bm1hcF92dGRf
ZG9tYWluX3BhZ2UocGFyZW50KTsKICAgICAgICAgcGFyZW50ID0gbWFwX3Z0
ZF9kb21haW5fcGFnZShtYWRkcik7Cg==

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.13-3.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.13-3.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB4ODYv
aW9tbXU6IGludHJvZHVjZSBhIGNhY2hlIHN5bmMgaG9vawoKVGhlIGhvb2sg
aXMgb25seSBpbXBsZW1lbnRlZCBmb3IgVlQtZCBhbmQgaXQgdXNlcyB0aGUg
YWxyZWFkeSBleGlzdGluZwppb21tdV9zeW5jX2NhY2hlIGZ1bmN0aW9uIHBy
ZXNlbnQgaW4gVlQtZCBjb2RlLiBUaGUgbmV3IGhvb2sgaXMKYWRkZWQgc28g
dGhhdCB0aGUgY2FjaGUgY2FuIGJlIGZsdXNoZWQgYnkgY29kZSBvdXRzaWRl
IG9mIFZULWQgd2hlbgp1c2luZyBzaGFyZWQgcGFnZSB0YWJsZXMuCgpOb3Rl
IHRoYXQgYWxsb2NfcGd0YWJsZV9tYWRkciBtdXN0IHVzZSB0aGUgbm93IGxv
Y2FsbHkgZGVmaW5lZApzeW5jX2NhY2hlIGZ1bmN0aW9uLCBiZWNhdXNlIElP
TU1VIG9wcyBhcmUgbm90IHlldCBzZXR1cCB0aGUgZmlyc3QKdGltZSB0aGUg
ZnVuY3Rpb24gZ2V0cyBjYWxsZWQgZHVyaW5nIElPTU1VIGluaXRpYWxpemF0
aW9uLgoKTm8gZnVuY3Rpb25hbCBjaGFuZ2UgaW50ZW5kZWQuCgpUaGlzIGlz
IHBhcnQgb2YgWFNBLTMyMS4KClJldmlld2VkLWJ5OiBKYW4gQmV1bGljaCA8
amJldWxpY2hAc3VzZS5jb20+CgotLS0gYS94ZW4vZHJpdmVycy9wYXNzdGhy
b3VnaC92dGQvZXh0ZXJuLmgKKysrIGIveGVuL2RyaXZlcnMvcGFzc3Rocm91
Z2gvdnRkL2V4dGVybi5oCkBAIC00Myw3ICs0Myw2IEBAIHZvaWQgZGlzYWJs
ZV9xaW52YWwoc3RydWN0IHZ0ZF9pb21tdSAqaW8KIGludCBlbmFibGVfaW50
cmVtYXAoc3RydWN0IHZ0ZF9pb21tdSAqaW9tbXUsIGludCBlaW0pOwogdm9p
ZCBkaXNhYmxlX2ludHJlbWFwKHN0cnVjdCB2dGRfaW9tbXUgKmlvbW11KTsK
IAotdm9pZCBpb21tdV9zeW5jX2NhY2hlKGNvbnN0IHZvaWQgKmFkZHIsIHVu
c2lnbmVkIGludCBzaXplKTsKIGludCBpb21tdV9hbGxvYyhzdHJ1Y3QgYWNw
aV9kcmhkX3VuaXQgKmRyaGQpOwogdm9pZCBpb21tdV9mcmVlKHN0cnVjdCBh
Y3BpX2RyaGRfdW5pdCAqZHJoZCk7CiAKLS0tIGEveGVuL2RyaXZlcnMvcGFz
c3Rocm91Z2gvdnRkL2lvbW11LmMKKysrIGIveGVuL2RyaXZlcnMvcGFzc3Ro
cm91Z2gvdnRkL2lvbW11LmMKQEAgLTE0MSw3ICsxNDEsNyBAQCBzdGF0aWMg
aW50IGNvbnRleHRfZ2V0X2RvbWFpbl9pZChzdHJ1Y3QKIAogc3RhdGljIGlu
dCBpb21tdXNfaW5jb2hlcmVudDsKIAotdm9pZCBpb21tdV9zeW5jX2NhY2hl
KGNvbnN0IHZvaWQgKmFkZHIsIHVuc2lnbmVkIGludCBzaXplKQorc3RhdGlj
IHZvaWQgc3luY19jYWNoZShjb25zdCB2b2lkICphZGRyLCB1bnNpZ25lZCBp
bnQgc2l6ZSkKIHsKICAgICBpbnQgaTsKICAgICBzdGF0aWMgdW5zaWduZWQg
aW50IGNsZmx1c2hfc2l6ZSA9IDA7CkBAIC0xNzQsNyArMTc0LDcgQEAgdWlu
dDY0X3QgYWxsb2NfcGd0YWJsZV9tYWRkcih1bnNpZ25lZCBsbwogICAgICAg
ICB2YWRkciA9IF9fbWFwX2RvbWFpbl9wYWdlKGN1cl9wZyk7CiAgICAgICAg
IG1lbXNldCh2YWRkciwgMCwgUEFHRV9TSVpFKTsKIAotICAgICAgICBpb21t
dV9zeW5jX2NhY2hlKHZhZGRyLCBQQUdFX1NJWkUpOworICAgICAgICBzeW5j
X2NhY2hlKHZhZGRyLCBQQUdFX1NJWkUpOwogICAgICAgICB1bm1hcF9kb21h
aW5fcGFnZSh2YWRkcik7CiAgICAgICAgIGN1cl9wZysrOwogICAgIH0KQEAg
LTI3NjMsNiArMjc2Myw3IEBAIGNvbnN0IHN0cnVjdCBpb21tdV9vcHMgX19p
bml0Y29uc3RyZWwgaW4KICAgICAuaW90bGJfZmx1c2hfYWxsID0gaW9tbXVf
Zmx1c2hfaW90bGJfYWxsLAogICAgIC5nZXRfcmVzZXJ2ZWRfZGV2aWNlX21l
bW9yeSA9IGludGVsX2lvbW11X2dldF9yZXNlcnZlZF9kZXZpY2VfbWVtb3J5
LAogICAgIC5kdW1wX3AybV90YWJsZSA9IHZ0ZF9kdW1wX3AybV90YWJsZSwK
KyAgICAuc3luY19jYWNoZSA9IHN5bmNfY2FjaGUsCiB9OwogCiBjb25zdCBz
dHJ1Y3QgaW9tbXVfaW5pdF9vcHMgX19pbml0Y29uc3RyZWwgaW50ZWxfaW9t
bXVfaW5pdF9vcHMgPSB7Ci0tLSBhL3hlbi9pbmNsdWRlL2FzbS14ODYvaW9t
bXUuaAorKysgYi94ZW4vaW5jbHVkZS9hc20teDg2L2lvbW11LmgKQEAgLTEy
MSw2ICsxMjEsMTMgQEAgZXh0ZXJuIGJvb2wgdW50cnVzdGVkX21zaTsKIGlu
dCBwaV91cGRhdGVfaXJ0ZShjb25zdCBzdHJ1Y3QgcGlfZGVzYyAqcGlfZGVz
YywgY29uc3Qgc3RydWN0IHBpcnEgKnBpcnEsCiAgICAgICAgICAgICAgICAg
ICAgY29uc3QgdWludDhfdCBndmVjKTsKIAorI2RlZmluZSBpb21tdV9zeW5j
X2NhY2hlKGFkZHIsIHNpemUpICh7ICAgICAgICAgICAgICAgICBcCisgICAg
Y29uc3Qgc3RydWN0IGlvbW11X29wcyAqb3BzID0gaW9tbXVfZ2V0X29wcygp
OyAgICAgIFwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgXAorICAgIGlmICggb3BzLT5zeW5jX2Nh
Y2hlICkgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBcCisgICAgICAg
IGlvbW11X3ZjYWxsKG9wcywgc3luY19jYWNoZSwgYWRkciwgc2l6ZSk7ICAg
ICAgIFwKK30pCisKICNlbmRpZiAvKiAhX19BUkNIX1g4Nl9JT01NVV9IX18g
Ki8KIC8qCiAgKiBMb2NhbCB2YXJpYWJsZXM6Ci0tLSBhL3hlbi9pbmNsdWRl
L3hlbi9pb21tdS5oCisrKyBiL3hlbi9pbmNsdWRlL3hlbi9pb21tdS5oCkBA
IC0yNTAsNiArMjUwLDcgQEAgc3RydWN0IGlvbW11X29wcyB7CiAgICAgaW50
ICgqc2V0dXBfaHBldF9tc2kpKHN0cnVjdCBtc2lfZGVzYyAqKTsKIAogICAg
IGludCAoKmFkanVzdF9pcnFfYWZmaW5pdGllcykodm9pZCk7CisgICAgdm9p
ZCAoKnN5bmNfY2FjaGUpKGNvbnN0IHZvaWQgKmFkZHIsIHVuc2lnbmVkIGlu
dCBzaXplKTsKICNlbmRpZiAvKiBDT05GSUdfWDg2ICovCiAKICAgICBpbnQg
X19tdXN0X2NoZWNrICgqc3VzcGVuZCkodm9pZCk7Cg==

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.13-4.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.13-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.13-5.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.13-5.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.13-6.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.13-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.13-7.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.13-7.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-4.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-4.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-5.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-5.patch"
Content-Transfer-Encoding: base64

RnJvbTogUm9nZXIgUGF1IE1vbm7DqSA8cm9nZXIucGF1QGNpdHJpeC5jb20+
ClN1YmplY3Q6IFtQQVRDSCB2NSA3LzldIHg4Ni9hbHRlcm5hdGl2ZTogaW50
cm9kdWNlIGFsdGVybmF0aXZlXzIKCkl0J3MgYmFzZWQgb24gYWx0ZXJuYXRp
dmVfaW9fMiB3aXRob3V0IGlucHV0cyBvciBvdXRwdXRzIGJ1dCB3aXRoIGFu
CmFkZGVkIG1lbW9yeSBjbG9iYmVyLgoKVGhpcyBpcyBwYXJ0IG9mIFhTQS0z
MjEuCgpTaWduZWQtb2ZmLWJ5OiBSb2dlciBQYXUgTW9ubsOpIDxyb2dlci5w
YXVAY2l0cml4LmNvbT4KQWNrZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGlj
aEBzdXNlLmNvbT4KLS0tCkNoYW5nZXMgc2luY2UgdjM6CiAtIFNsaWdodGx5
IHJld29yZCBjb21taXQgbWVzc2FnZS4KCkNoYW5nZXMgc2luY2UgdjI6CiAt
IFJld29yZCB0aGUgY29tbWl0IG1lc3NhZ2UgdG8gbm90ZSB0aGUgYWRkaXRp
b24gb2YgdGhlIG1lbW9yeQogICBjbG9iYmVyLgotLS0KIHhlbi9pbmNsdWRl
L2FzbS14ODYvYWx0ZXJuYXRpdmUuaCB8IDUgKysrKysKIDEgZmlsZSBjaGFu
Z2VkLCA1IGluc2VydGlvbnMoKykKCmRpZmYgLS1naXQgYS94ZW4vaW5jbHVk
ZS9hc20teDg2L2FsdGVybmF0aXZlLmggYi94ZW4vaW5jbHVkZS9hc20teDg2
L2FsdGVybmF0aXZlLmgKaW5kZXggOTJlMzU4MWJjMi4uOGU3OGNjOTFjMyAx
MDA2NDQKLS0tIGEveGVuL2luY2x1ZGUvYXNtLXg4Ni9hbHRlcm5hdGl2ZS5o
CisrKyBiL3hlbi9pbmNsdWRlL2FzbS14ODYvYWx0ZXJuYXRpdmUuaApAQCAt
MTE0LDYgKzExNCwxMSBAQCBleHRlcm4gdm9pZCBhbHRlcm5hdGl2ZV9icmFu
Y2hlcyh2b2lkKTsKICNkZWZpbmUgYWx0ZXJuYXRpdmUob2xkaW5zdHIsIG5l
d2luc3RyLCBmZWF0dXJlKSAgICAgICAgICAgICAgICAgICAgICAgIFwKICAg
ICAgICAgYXNtIHZvbGF0aWxlIChBTFRFUk5BVElWRShvbGRpbnN0ciwgbmV3
aW5zdHIsIGZlYXR1cmUpIDogOiA6ICJtZW1vcnkiKQogCisjZGVmaW5lIGFs
dGVybmF0aXZlXzIob2xkaW5zdHIsIG5ld2luc3RyMSwgZmVhdHVyZTEsIG5l
d2luc3RyMiwgZmVhdHVyZTIpIFwKKwlhc20gdm9sYXRpbGUgKEFMVEVSTkFU
SVZFXzIob2xkaW5zdHIsIG5ld2luc3RyMSwgZmVhdHVyZTEsCVwKKwkJCQkg
ICAgbmV3aW5zdHIyLCBmZWF0dXJlMikJCVwKKwkJICAgICAgOiA6IDogIm1l
bW9yeSIpCisKIC8qCiAgKiBBbHRlcm5hdGl2ZSBpbmxpbmUgYXNzZW1ibHkg
d2l0aCBpbnB1dC4KICAqCi0tIAoyLjI2LjIKCg==

--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-6.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-6.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa321/xsa321-7.patch"
Content-Disposition: attachment; filename="xsa321/xsa321-7.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Jul 07 12:24:40 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 07 Jul 2020 12:24:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsmdw-0007GA-G7; Tue, 07 Jul 2020 12:24:12 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1g3R=AS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jsmdv-0007FV-Cj
 for xen-users@lists.xen.org; Tue, 07 Jul 2020 12:24:11 +0000
X-Inumbo-ID: c2ace552-c04c-11ea-8d5d-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id c2ace552-c04c-11ea-8d5d-12813bfff9fa;
 Tue, 07 Jul 2020 12:24:10 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=OfSeTYeTsKjSZwvL6r1Hs9ToUyWuj9sme0SjaVk1H1c=; b=ZBe1l2yJAbysjWHq+PAhapWEXn
 RC0YCao2qaD6diSAoiz3LaKo4oAGseJajxsgLiUab8j71GFiBA+gp9kO5MKdOwP+vvsb0EOGap0ob
 +yamxp0Rc1lTDxcqIMoCGqbRzqhVAUnPZuJXCBH/IUcnmRJXB1bIUOpfvW8ZQpk+sFtU=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmdp-0002v0-Sz; Tue, 07 Jul 2020 12:24:05 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmdp-0004Ry-Rv; Tue, 07 Jul 2020 12:24:05 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 328 v3 (CVE-2020-15567) - non-atomic
 modification of live EPT PTE
Message-Id: <E1jsmdp-0004Ry-Rv@xenbits.xenproject.org>
Date: Tue, 07 Jul 2020 12:24:05 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-15567 / XSA-328
                               version 3

                non-atomic modification of live EPT PTE

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

When mapping guest EPT (nested paging) tables, Xen would in some
circumstances use a series of non-atomic bitfield writes.

Depending on the compiler version and optimisation flags, Xen might
expose a dangerous partially-written PTE to the hardware, which an
attacker might be able to race to exploit.

IMPACT
======

A guest administrator or perhaps even unprivileged guest user might
be able to cause denial of service, data corruption, or privilege
escalation.

VULNERABLE SYSTEMS
==================

Only systems using Intel CPUs are vulnerable.  Sytems using AMD CPUs,
and Arm systems, are not vulnerable.

Only systems using nested paging ("hap", aka nested paging, aka in
this case Intel EPT) are vulnerable.

Only HVM and PVH guests can exploit the vulnerability.

The presence and scope of the vulnerability depends on the precise
optimisations performed by the compiler used to build Xen.  If the
compiler generates (a) a single 64-bit write, or (b) a series of
read-modify-write operations which are in the same order as the source
code, the hypervisor is not vulnerable.

For example, in one test build with gcc 8.3 with normal settings, the
compiler generated multiple (unlocked) read-modify-write operations in
source code order, which did *not* constitute a vulnerability.

We have not been able to survey compilers; consequently we cannot say
which compiler(s) might produce vulnerable code (with which code
generation options).  The code clearly violates the C rules.  So we
have chosen to issue this advisory.

MITIGATION
==========

Running only PV guests will avoid this vulnerability.

Switching to shadow paging (e.g. using the "hap=0" xl domain domain
configuration file parameter) will avoid exposing the vulnerability to
those guests.

Manual inspection of the generated assembly code might allow a
suitably qualified person to say that a particular build is not
vulnerable.

There is no less broad mitigation.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

For patch 1:
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

For patch 2:
From: Roger Pau Monné <roger.pau@citrix.com>
Reported-by: Jan Beulich <jbeulich@suse.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>

RESOLUTION
==========

Applying the appropriate pair of attached patches resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa328/xsa328-?.patch        xen-unstable
xsa328/xsa328-4.13-?.patch   Xen 4.13.x
xsa328/xsa328-4.12-?.patch   Xen 4.12.x
xsa328/xsa328-4.11-?.patch   Xen 4.11.x, Xen 4.10.x
xsa328/xsa328-4.9-?.patch    Xen 4.9.x

$ sha256sum xsa328* xsa328*/*
61ceb3d039c3ebb06f480a17593b367b01e7c1e5cc3669d77caecb704fbc7071  xsa328.meta
cae53f7e6c46fe245790036279bc50eaa10e4271790e871ad8a7d446629b2e12  xsa328/xsa328-1.patch
d61354a992869451cd7a3c92254672b5e253d1a994135cf9b4a5c784be0a07ef  xsa328/xsa328-2.patch
018412fba6f153c1d6b03fc2fa6f3ac381060efe6a8651404462028d24c830a8  xsa328/xsa328-4.9-1.patch
f3deb26e0ce27c385ab16065a0ba67b86a228afd949c0a6a78b9d48366fc2554  xsa328/xsa328-4.9-2.patch
a600ecef784485e8608cd4549f756ffa24705747a4d876147f9ba64fff118580  xsa328/xsa328-4.11-1.patch
f3deb26e0ce27c385ab16065a0ba67b86a228afd949c0a6a78b9d48366fc2554  xsa328/xsa328-4.11-2.patch
d608921359e561f9c594c9f8f7ee02432518a229ecea638d472ab91227d705ec  xsa328/xsa328-4.12-1.patch
a51162c019e7e6ed394faa7d40c932456059b7b76a784dc7886dd0a47c43da0b  xsa328/xsa328-4.12-2.patch
51a41fae885aed40839887da473e0c8ab4c4d897a121f5fac2cc3c6c0188d6d2  xsa328/xsa328-4.13-1.patch
a51162c019e7e6ed394faa7d40c932456059b7b76a784dc7886dd0a47c43da0b  xsa328/xsa328-4.13-2.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8EaAIMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZi0YH/Aqd/aStpQKD3gTEuif3YBwL9YRf9q8ZxSQqgrG/
du4lABcOE87kRqaAnsVRNe3sQ1sL995O1oiRbcQPcnKqr5q34IPqMghYGJZgpupE
qfreaA6b4Uv7XFEM8Z7NTN17t9dx9Y8aLIoD8dETbFaidtKwjBsQ8fkX7tFSmXH9
YQ0he7B8Is0pGmH6EM5mM6TxqCHz2mtWDdVL4jFuLVqrt10TnNH6S4OHJkEkJcYP
rcSgqOkM7q7tBP3yDWPvlcSGgk+cijEI3AmKREMuISEmimrBpGzrosBpdh8zqbYU
MPmRwbn+luyEEOn2Y8j81EfgJR+LR1Itct1E8CU0vS2v0Gw=
=b0L/
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa328.meta"
Content-Disposition: attachment; filename="xsa328.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-1.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-2.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.9-1.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.9-1.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiB4ODYvRVBUOiBlcHRfc2V0X21pZGRsZV9lbnRyeSgpIHJlbGF0ZWQgYWRq
dXN0bWVudHMKCmVwdF9zcGxpdF9zdXBlcl9wYWdlKCkgd2FudHMgdG8gZnVy
dGhlciBtb2RpZnkgdGhlIG5ld2x5IGFsbG9jYXRlZAp0YWJsZSwgc28gaGF2
ZSBlcHRfc2V0X21pZGRsZV9lbnRyeSgpIHJldHVybiB0aGUgbWFwcGVkIHBv
aW50ZXIgcmF0aGVyCnRoYW4gdGVhcmluZyBpdCBkb3duIGFuZCB0aGVuIGdl
dHRpbmcgcmUtZXN0YWJsaXNoZWQgcmlnaHQgYWdhaW4uCgpTaW1pbGFybHkg
ZXB0X25leHRfbGV2ZWwoKSB3YW50cyB0byBoYW5kIGJhY2sgYSBtYXBwZWQg
cG9pbnRlciBvZgp0aGUgbmV4dCBsZXZlbCBwYWdlLCBzbyByZS11c2UgdGhl
IG9uZSBlc3RhYmxpc2hlZCBieQplcHRfc2V0X21pZGRsZV9lbnRyeSgpIGlu
IGNhc2UgdGhhdCBwYXRoIHdhcyB0YWtlbi4KClB1bGwgdGhlIHNldHRpbmcg
b2Ygc3VwcHJlc3NfdmUgYWhlYWQgb2YgaW5zZXJ0aW9uIGludG8gdGhlIGhp
Z2hlciBsZXZlbAp0YWJsZSwgYW5kIGRvbid0IGhhdmUgZXB0X3NwbGl0X3N1
cGVyX3BhZ2UoKSBzZXQgdGhlIGZpZWxkIGEgMm5kIHRpbWUuCgpUaGlzIGlz
IHBhcnQgb2YgWFNBLTMyOC4KClNpZ25lZC1vZmYtYnk6IEphbiBCZXVsaWNo
IDxqYmV1bGljaEBzdXNlLmNvbT4KUmV2aWV3ZWQtYnk6IFJvZ2VyIFBhdSBN
b25uw6kgPHJvZ2VyLnBhdUBjaXRyaXguY29tPgoKLS0tIGEveGVuL2FyY2gv
eDg2L21tL3AybS1lcHQuYworKysgYi94ZW4vYXJjaC94ODYvbW0vcDJtLWVw
dC5jCkBAIC0yMjgsOCArMjI4LDkgQEAgc3RhdGljIHZvaWQgZXB0X3AybV90
eXBlX3RvX2ZsYWdzKHN0cnVjdAogI2RlZmluZSBHVUVTVF9UQUJMRV9TVVBF
Ul9QQUdFICAyCiAjZGVmaW5lIEdVRVNUX1RBQkxFX1BPRF9QQUdFICAgIDMK
IAotLyogRmlsbCBpbiBtaWRkbGUgbGV2ZWxzIG9mIGVwdCB0YWJsZSAqLwot
c3RhdGljIGludCBlcHRfc2V0X21pZGRsZV9lbnRyeShzdHJ1Y3QgcDJtX2Rv
bWFpbiAqcDJtLCBlcHRfZW50cnlfdCAqZXB0X2VudHJ5KQorLyogRmlsbCBp
biBtaWRkbGUgbGV2ZWwgb2YgZXB0IHRhYmxlOyByZXR1cm4gcG9pbnRlciB0
byBtYXBwZWQgbmV3IHRhYmxlLiAqLworc3RhdGljIGVwdF9lbnRyeV90ICpl
cHRfc2V0X21pZGRsZV9lbnRyeShzdHJ1Y3QgcDJtX2RvbWFpbiAqcDJtLAor
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBlcHRf
ZW50cnlfdCAqZXB0X2VudHJ5KQogewogICAgIHN0cnVjdCBwYWdlX2luZm8g
KnBnOwogICAgIGVwdF9lbnRyeV90ICp0YWJsZTsKQEAgLTIzNyw3ICsyMzgs
MTIgQEAgc3RhdGljIGludCBlcHRfc2V0X21pZGRsZV9lbnRyeShzdHJ1Y3Qg
cAogCiAgICAgcGcgPSBwMm1fYWxsb2NfcHRwKHAybSwgMCk7CiAgICAgaWYg
KCBwZyA9PSBOVUxMICkKLSAgICAgICAgcmV0dXJuIDA7CisgICAgICAgIHJl
dHVybiBOVUxMOworCisgICAgdGFibGUgPSBfX21hcF9kb21haW5fcGFnZShw
Zyk7CisKKyAgICBmb3IgKCBpID0gMDsgaSA8IEVQVF9QQUdFVEFCTEVfRU5U
UklFUzsgaSsrICkKKyAgICAgICAgdGFibGVbaV0uc3VwcHJlc3NfdmUgPSAx
OwogCiAgICAgZXB0X2VudHJ5LT5lcHRlID0gMDsKICAgICBlcHRfZW50cnkt
Pm1mbiA9IHBhZ2VfdG9fbWZuKHBnKTsKQEAgLTI0OSwxNCArMjU1LDcgQEAg
c3RhdGljIGludCBlcHRfc2V0X21pZGRsZV9lbnRyeShzdHJ1Y3QgcAogCiAg
ICAgZXB0X2VudHJ5LT5zdXBwcmVzc192ZSA9IDE7CiAKLSAgICB0YWJsZSA9
IF9fbWFwX2RvbWFpbl9wYWdlKHBnKTsKLQotICAgIGZvciAoIGkgPSAwOyBp
IDwgRVBUX1BBR0VUQUJMRV9FTlRSSUVTOyBpKysgKQotICAgICAgICB0YWJs
ZVtpXS5zdXBwcmVzc192ZSA9IDE7Ci0KLSAgICB1bm1hcF9kb21haW5fcGFn
ZSh0YWJsZSk7Ci0KLSAgICByZXR1cm4gMTsKKyAgICByZXR1cm4gdGFibGU7
CiB9CiAKIC8qIGZyZWUgZXB0IHN1YiB0cmVlIGJlaGluZCBhbiBlbnRyeSAq
LwpAQCAtMjk0LDEwICsyOTMsMTAgQEAgc3RhdGljIGJvb2xfdCBlcHRfc3Bs
aXRfc3VwZXJfcGFnZShzdHJ1YwogCiAgICAgQVNTRVJUKGlzX2VwdGVfc3Vw
ZXJwYWdlKGVwdF9lbnRyeSkpOwogCi0gICAgaWYgKCAhZXB0X3NldF9taWRk
bGVfZW50cnkocDJtLCAmbmV3X2VwdCkgKQorICAgIHRhYmxlID0gZXB0X3Nl
dF9taWRkbGVfZW50cnkocDJtLCAmbmV3X2VwdCk7CisgICAgaWYgKCAhdGFi
bGUgKQogICAgICAgICByZXR1cm4gMDsKIAotICAgIHRhYmxlID0gbWFwX2Rv
bWFpbl9wYWdlKF9tZm4obmV3X2VwdC5tZm4pKTsKICAgICB0cnVuayA9IDFV
TCA8PCAoKGxldmVsIC0gMSkgKiBFUFRfVEFCTEVfT1JERVIpOwogCiAgICAg
Zm9yICggaSA9IDA7IGkgPCBFUFRfUEFHRVRBQkxFX0VOVFJJRVM7IGkrKyAp
CkBAIC0zMDgsNyArMzA3LDYgQEAgc3RhdGljIGJvb2xfdCBlcHRfc3BsaXRf
c3VwZXJfcGFnZShzdHJ1YwogICAgICAgICBlcHRlLT5zcCA9IChsZXZlbCA+
IDEpOwogICAgICAgICBlcHRlLT5tZm4gKz0gaSAqIHRydW5rOwogICAgICAg
ICBlcHRlLT5zbnAgPSAoaW9tbXVfZW5hYmxlZCAmJiBpb21tdV9zbm9vcCk7
Ci0gICAgICAgIGVwdGUtPnN1cHByZXNzX3ZlID0gMTsKIAogICAgICAgICBl
cHRfcDJtX3R5cGVfdG9fZmxhZ3MocDJtLCBlcHRlLCBlcHRlLT5zYV9wMm10
LCBlcHRlLT5hY2Nlc3MpOwogCkBAIC0zNDcsOCArMzQ1LDcgQEAgc3RhdGlj
IGludCBlcHRfbmV4dF9sZXZlbChzdHJ1Y3QgcDJtX2RvbQogICAgICAgICAg
ICAgICAgICAgICAgICAgICBlcHRfZW50cnlfdCAqKnRhYmxlLCB1bnNpZ25l
ZCBsb25nICpnZm5fcmVtYWluZGVyLAogICAgICAgICAgICAgICAgICAgICAg
ICAgICBpbnQgbmV4dF9sZXZlbCkKIHsKLSAgICB1bnNpZ25lZCBsb25nIG1m
bjsKLSAgICBlcHRfZW50cnlfdCAqZXB0X2VudHJ5LCBlOworICAgIGVwdF9l
bnRyeV90ICplcHRfZW50cnksICpuZXh0ID0gTlVMTCwgZTsKICAgICB1MzIg
c2hpZnQsIGluZGV4OwogCiAgICAgc2hpZnQgPSBuZXh0X2xldmVsICogRVBU
X1RBQkxFX09SREVSOwpAQCAtMzczLDE5ICszNzAsMTcgQEAgc3RhdGljIGlu
dCBlcHRfbmV4dF9sZXZlbChzdHJ1Y3QgcDJtX2RvbQogICAgICAgICBpZiAo
IHJlYWRfb25seSApCiAgICAgICAgICAgICByZXR1cm4gR1VFU1RfVEFCTEVf
TUFQX0ZBSUxFRDsKIAotICAgICAgICBpZiAoICFlcHRfc2V0X21pZGRsZV9l
bnRyeShwMm0sIGVwdF9lbnRyeSkgKQorICAgICAgICBuZXh0ID0gZXB0X3Nl
dF9taWRkbGVfZW50cnkocDJtLCBlcHRfZW50cnkpOworICAgICAgICBpZiAo
ICFuZXh0ICkKICAgICAgICAgICAgIHJldHVybiBHVUVTVF9UQUJMRV9NQVBf
RkFJTEVEOwotICAgICAgICBlbHNlCi0gICAgICAgICAgICBlID0gYXRvbWlj
X3JlYWRfZXB0X2VudHJ5KGVwdF9lbnRyeSk7IC8qIFJlZnJlc2ggKi8KKyAg
ICAgICAgLyogZSBpcyBub3cgc3RhbGUgYW5kIGhlbmNlIG1heSBub3QgYmUg
dXNlZCBhbnltb3JlIGJlbG93LiAqLwogICAgIH0KLQogICAgIC8qIFRoZSBv
bmx5IHRpbWUgc3Agd291bGQgYmUgc2V0IGhlcmUgaXMgaWYgd2UgaGFkIGhp
dCBhIHN1cGVycGFnZSAqLwotICAgIGlmICggaXNfZXB0ZV9zdXBlcnBhZ2Uo
JmUpICkKKyAgICBlbHNlIGlmICggaXNfZXB0ZV9zdXBlcnBhZ2UoJmUpICkK
ICAgICAgICAgcmV0dXJuIEdVRVNUX1RBQkxFX1NVUEVSX1BBR0U7CiAKLSAg
ICBtZm4gPSBlLm1mbjsKICAgICB1bm1hcF9kb21haW5fcGFnZSgqdGFibGUp
OwotICAgICp0YWJsZSA9IG1hcF9kb21haW5fcGFnZShfbWZuKG1mbikpOwor
ICAgICp0YWJsZSA9IG5leHQgPzogbWFwX2RvbWFpbl9wYWdlKF9tZm4oZS5t
Zm4pKTsKICAgICAqZ2ZuX3JlbWFpbmRlciAmPSAoMVVMIDw8IHNoaWZ0KSAt
IDE7CiAgICAgcmV0dXJuIEdVRVNUX1RBQkxFX05PUk1BTF9QQUdFOwogfQo=

--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.9-2.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.9-2.patch"
Content-Transfer-Encoding: base64

RnJvbTogPHNlY3VyaXR5QHhlbnByb2plY3Qub3JnPgpTdWJqZWN0OiB4ODYv
ZXB0OiBhdG9taWNhbGx5IG1vZGlmeSBlbnRyaWVzIGluIGVwdF9uZXh0X2xl
dmVsCgplcHRfbmV4dF9sZXZlbCB3YXMgcGFzc2luZyBhIGxpdmUgUFRFIHBv
aW50ZXIgdG8gZXB0X3NldF9taWRkbGVfZW50cnksCndoaWNoIHdhcyB0aGVu
IG1vZGlmaWVkIHdpdGhvdXQgdGFraW5nIGludG8gYWNjb3VudCB0aGF0IHRo
ZSBQVEUgY291bGQKYmUgcGFydCBvZiBhIGxpdmUgRVBUIHRhYmxlLiBUaGlz
IHdhc24ndCBhIHNlY3VyaXR5IGlzc3VlIGJlY2F1c2UgdGhlCnBhZ2VzIHJl
dHVybmVkIGJ5IHAybV9hbGxvY19wdHAgYXJlIHplcm9lZCwgc28gYWRkaW5n
IHN1Y2ggYW4gZW50cnkKYmVmb3JlIGFjdHVhbGx5IGluaXRpYWxpemluZyBp
dCBkaWRuJ3QgYWxsb3cgYSBndWVzdCB0byBhY2Nlc3MKcGh5c2ljYWwgbWVt
b3J5IGFkZHJlc3NlcyBpdCB3YXNuJ3Qgc3VwcG9zZWQgdG8gYWNjZXNzLgoK
VGhpcyBpcyBwYXJ0IG9mIFhTQS0zMjguCgpSZXZpZXdlZC1ieTogSmFuIEJl
dWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgoKLS0tIGEveGVuL2FyY2gveDg2
L21tL3AybS1lcHQuYworKysgYi94ZW4vYXJjaC94ODYvbW0vcDJtLWVwdC5j
CkBAIC0zNDgsNiArMzQ4LDggQEAgc3RhdGljIGludCBlcHRfbmV4dF9sZXZl
bChzdHJ1Y3QgcDJtX2RvbQogICAgIGVwdF9lbnRyeV90ICplcHRfZW50cnks
ICpuZXh0ID0gTlVMTCwgZTsKICAgICB1MzIgc2hpZnQsIGluZGV4OwogCisg
ICAgQVNTRVJUKG5leHRfbGV2ZWwpOworCiAgICAgc2hpZnQgPSBuZXh0X2xl
dmVsICogRVBUX1RBQkxFX09SREVSOwogCiAgICAgaW5kZXggPSAqZ2ZuX3Jl
bWFpbmRlciA+PiBzaGlmdDsKQEAgLTM2NCwxNiArMzY2LDIwIEBAIHN0YXRp
YyBpbnQgZXB0X25leHRfbGV2ZWwoc3RydWN0IHAybV9kb20KIAogICAgIGlm
ICggIWlzX2VwdGVfcHJlc2VudCgmZSkgKQogICAgIHsKKyAgICAgICAgaW50
IHJjOworCiAgICAgICAgIGlmICggZS5zYV9wMm10ID09IHAybV9wb3B1bGF0
ZV9vbl9kZW1hbmQgKQogICAgICAgICAgICAgcmV0dXJuIEdVRVNUX1RBQkxF
X1BPRF9QQUdFOwogCiAgICAgICAgIGlmICggcmVhZF9vbmx5ICkKICAgICAg
ICAgICAgIHJldHVybiBHVUVTVF9UQUJMRV9NQVBfRkFJTEVEOwogCi0gICAg
ICAgIG5leHQgPSBlcHRfc2V0X21pZGRsZV9lbnRyeShwMm0sIGVwdF9lbnRy
eSk7CisgICAgICAgIG5leHQgPSBlcHRfc2V0X21pZGRsZV9lbnRyeShwMm0s
ICZlKTsKICAgICAgICAgaWYgKCAhbmV4dCApCiAgICAgICAgICAgICByZXR1
cm4gR1VFU1RfVEFCTEVfTUFQX0ZBSUxFRDsKLSAgICAgICAgLyogZSBpcyBu
b3cgc3RhbGUgYW5kIGhlbmNlIG1heSBub3QgYmUgdXNlZCBhbnltb3JlIGJl
bG93LiAqLworCisgICAgICAgIHJjID0gYXRvbWljX3dyaXRlX2VwdF9lbnRy
eShlcHRfZW50cnksIGUsIG5leHRfbGV2ZWwpOworICAgICAgICBBU1NFUlQo
cmMgPT0gMCk7CiAgICAgfQogICAgIC8qIFRoZSBvbmx5IHRpbWUgc3Agd291
bGQgYmUgc2V0IGhlcmUgaXMgaWYgd2UgaGFkIGhpdCBhIHN1cGVycGFnZSAq
LwogICAgIGVsc2UgaWYgKCBpc19lcHRlX3N1cGVycGFnZSgmZSkgKQo=

--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.11-1.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.11-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.11-2.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.11-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.12-1.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.12-1.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiB4ODYvRVBUOiBlcHRfc2V0X21pZGRsZV9lbnRyeSgpIHJlbGF0ZWQgYWRq
dXN0bWVudHMKCmVwdF9zcGxpdF9zdXBlcl9wYWdlKCkgd2FudHMgdG8gZnVy
dGhlciBtb2RpZnkgdGhlIG5ld2x5IGFsbG9jYXRlZAp0YWJsZSwgc28gaGF2
ZSBlcHRfc2V0X21pZGRsZV9lbnRyeSgpIHJldHVybiB0aGUgbWFwcGVkIHBv
aW50ZXIgcmF0aGVyCnRoYW4gdGVhcmluZyBpdCBkb3duIGFuZCB0aGVuIGdl
dHRpbmcgcmUtZXN0YWJsaXNoZWQgcmlnaHQgYWdhaW4uCgpTaW1pbGFybHkg
ZXB0X25leHRfbGV2ZWwoKSB3YW50cyB0byBoYW5kIGJhY2sgYSBtYXBwZWQg
cG9pbnRlciBvZgp0aGUgbmV4dCBsZXZlbCBwYWdlLCBzbyByZS11c2UgdGhl
IG9uZSBlc3RhYmxpc2hlZCBieQplcHRfc2V0X21pZGRsZV9lbnRyeSgpIGlu
IGNhc2UgdGhhdCBwYXRoIHdhcyB0YWtlbi4KClB1bGwgdGhlIHNldHRpbmcg
b2Ygc3VwcHJlc3NfdmUgYWhlYWQgb2YgaW5zZXJ0aW9uIGludG8gdGhlIGhp
Z2hlciBsZXZlbAp0YWJsZSwgYW5kIGRvbid0IGhhdmUgZXB0X3NwbGl0X3N1
cGVyX3BhZ2UoKSBzZXQgdGhlIGZpZWxkIGEgMm5kIHRpbWUuCgpUaGlzIGlz
IHBhcnQgb2YgWFNBLTMyOC4KClNpZ25lZC1vZmYtYnk6IEphbiBCZXVsaWNo
IDxqYmV1bGljaEBzdXNlLmNvbT4KCi0tLSBhL3hlbi9hcmNoL3g4Ni9tbS9w
Mm0tZXB0LmMKKysrIGIveGVuL2FyY2gveDg2L21tL3AybS1lcHQuYwpAQCAt
MTg3LDggKzE4Nyw5IEBAIHN0YXRpYyB2b2lkIGVwdF9wMm1fdHlwZV90b19m
bGFncyhzdHJ1Y3QKICNkZWZpbmUgR1VFU1RfVEFCTEVfU1VQRVJfUEFHRSAg
MgogI2RlZmluZSBHVUVTVF9UQUJMRV9QT0RfUEFHRSAgICAzCiAKLS8qIEZp
bGwgaW4gbWlkZGxlIGxldmVscyBvZiBlcHQgdGFibGUgKi8KLXN0YXRpYyBp
bnQgZXB0X3NldF9taWRkbGVfZW50cnkoc3RydWN0IHAybV9kb21haW4gKnAy
bSwgZXB0X2VudHJ5X3QgKmVwdF9lbnRyeSkKKy8qIEZpbGwgaW4gbWlkZGxl
IGxldmVsIG9mIGVwdCB0YWJsZTsgcmV0dXJuIHBvaW50ZXIgdG8gbWFwcGVk
IG5ldyB0YWJsZS4gKi8KK3N0YXRpYyBlcHRfZW50cnlfdCAqZXB0X3NldF9t
aWRkbGVfZW50cnkoc3RydWN0IHAybV9kb21haW4gKnAybSwKKyAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZXB0X2VudHJ5X3Qg
KmVwdF9lbnRyeSkKIHsKICAgICBtZm5fdCBtZm47CiAgICAgZXB0X2VudHJ5
X3QgKnRhYmxlOwpAQCAtMTk2LDcgKzE5NywxMiBAQCBzdGF0aWMgaW50IGVw
dF9zZXRfbWlkZGxlX2VudHJ5KHN0cnVjdCBwCiAKICAgICBtZm4gPSBwMm1f
YWxsb2NfcHRwKHAybSwgMCk7CiAgICAgaWYgKCBtZm5fZXEobWZuLCBJTlZB
TElEX01GTikgKQotICAgICAgICByZXR1cm4gMDsKKyAgICAgICAgcmV0dXJu
IE5VTEw7CisKKyAgICB0YWJsZSA9IG1hcF9kb21haW5fcGFnZShtZm4pOwor
CisgICAgZm9yICggaSA9IDA7IGkgPCBFUFRfUEFHRVRBQkxFX0VOVFJJRVM7
IGkrKyApCisgICAgICAgIHRhYmxlW2ldLnN1cHByZXNzX3ZlID0gMTsKIAog
ICAgIGVwdF9lbnRyeS0+ZXB0ZSA9IDA7CiAgICAgZXB0X2VudHJ5LT5tZm4g
PSBtZm5feChtZm4pOwpAQCAtMjA4LDE0ICsyMTQsNyBAQCBzdGF0aWMgaW50
IGVwdF9zZXRfbWlkZGxlX2VudHJ5KHN0cnVjdCBwCiAKICAgICBlcHRfZW50
cnktPnN1cHByZXNzX3ZlID0gMTsKIAotICAgIHRhYmxlID0gbWFwX2RvbWFp
bl9wYWdlKG1mbik7Ci0KLSAgICBmb3IgKCBpID0gMDsgaSA8IEVQVF9QQUdF
VEFCTEVfRU5UUklFUzsgaSsrICkKLSAgICAgICAgdGFibGVbaV0uc3VwcHJl
c3NfdmUgPSAxOwotCi0gICAgdW5tYXBfZG9tYWluX3BhZ2UodGFibGUpOwot
Ci0gICAgcmV0dXJuIDE7CisgICAgcmV0dXJuIHRhYmxlOwogfQogCiAvKiBm
cmVlIGVwdCBzdWIgdHJlZSBiZWhpbmQgYW4gZW50cnkgKi8KQEAgLTI1Mywx
MCArMjUyLDEwIEBAIHN0YXRpYyBib29sX3QgZXB0X3NwbGl0X3N1cGVyX3Bh
Z2Uoc3RydWMKIAogICAgIEFTU0VSVChpc19lcHRlX3N1cGVycGFnZShlcHRf
ZW50cnkpKTsKIAotICAgIGlmICggIWVwdF9zZXRfbWlkZGxlX2VudHJ5KHAy
bSwgJm5ld19lcHQpICkKKyAgICB0YWJsZSA9IGVwdF9zZXRfbWlkZGxlX2Vu
dHJ5KHAybSwgJm5ld19lcHQpOworICAgIGlmICggIXRhYmxlICkKICAgICAg
ICAgcmV0dXJuIDA7CiAKLSAgICB0YWJsZSA9IG1hcF9kb21haW5fcGFnZShf
bWZuKG5ld19lcHQubWZuKSk7CiAgICAgdHJ1bmsgPSAxVUwgPDwgKChsZXZl
bCAtIDEpICogRVBUX1RBQkxFX09SREVSKTsKIAogICAgIGZvciAoIGkgPSAw
OyBpIDwgRVBUX1BBR0VUQUJMRV9FTlRSSUVTOyBpKysgKQpAQCAtMjY3LDcg
KzI2Niw2IEBAIHN0YXRpYyBib29sX3QgZXB0X3NwbGl0X3N1cGVyX3BhZ2Uo
c3RydWMKICAgICAgICAgZXB0ZS0+c3AgPSAobGV2ZWwgPiAxKTsKICAgICAg
ICAgZXB0ZS0+bWZuICs9IGkgKiB0cnVuazsKICAgICAgICAgZXB0ZS0+c25w
ID0gKGlvbW11X2VuYWJsZWQgJiYgaW9tbXVfc25vb3ApOwotICAgICAgICBl
cHRlLT5zdXBwcmVzc192ZSA9IDE7CiAKICAgICAgICAgZXB0X3AybV90eXBl
X3RvX2ZsYWdzKHAybSwgZXB0ZSwgZXB0ZS0+c2FfcDJtdCwgZXB0ZS0+YWNj
ZXNzKTsKIApAQCAtMzA2LDggKzMwNCw3IEBAIHN0YXRpYyBpbnQgZXB0X25l
eHRfbGV2ZWwoc3RydWN0IHAybV9kb20KICAgICAgICAgICAgICAgICAgICAg
ICAgICAgZXB0X2VudHJ5X3QgKip0YWJsZSwgdW5zaWduZWQgbG9uZyAqZ2Zu
X3JlbWFpbmRlciwKICAgICAgICAgICAgICAgICAgICAgICAgICAgaW50IG5l
eHRfbGV2ZWwpCiB7Ci0gICAgdW5zaWduZWQgbG9uZyBtZm47Ci0gICAgZXB0
X2VudHJ5X3QgKmVwdF9lbnRyeSwgZTsKKyAgICBlcHRfZW50cnlfdCAqZXB0
X2VudHJ5LCAqbmV4dCA9IE5VTEwsIGU7CiAgICAgdTMyIHNoaWZ0LCBpbmRl
eDsKIAogICAgIHNoaWZ0ID0gbmV4dF9sZXZlbCAqIEVQVF9UQUJMRV9PUkRF
UjsKQEAgLTMzMiwxOSArMzI5LDE3IEBAIHN0YXRpYyBpbnQgZXB0X25leHRf
bGV2ZWwoc3RydWN0IHAybV9kb20KICAgICAgICAgaWYgKCByZWFkX29ubHkg
KQogICAgICAgICAgICAgcmV0dXJuIEdVRVNUX1RBQkxFX01BUF9GQUlMRUQ7
CiAKLSAgICAgICAgaWYgKCAhZXB0X3NldF9taWRkbGVfZW50cnkocDJtLCBl
cHRfZW50cnkpICkKKyAgICAgICAgbmV4dCA9IGVwdF9zZXRfbWlkZGxlX2Vu
dHJ5KHAybSwgZXB0X2VudHJ5KTsKKyAgICAgICAgaWYgKCAhbmV4dCApCiAg
ICAgICAgICAgICByZXR1cm4gR1VFU1RfVEFCTEVfTUFQX0ZBSUxFRDsKLSAg
ICAgICAgZWxzZQotICAgICAgICAgICAgZSA9IGF0b21pY19yZWFkX2VwdF9l
bnRyeShlcHRfZW50cnkpOyAvKiBSZWZyZXNoICovCisgICAgICAgIC8qIGUg
aXMgbm93IHN0YWxlIGFuZCBoZW5jZSBtYXkgbm90IGJlIHVzZWQgYW55bW9y
ZSBiZWxvdy4gKi8KICAgICB9Ci0KICAgICAvKiBUaGUgb25seSB0aW1lIHNw
IHdvdWxkIGJlIHNldCBoZXJlIGlzIGlmIHdlIGhhZCBoaXQgYSBzdXBlcnBh
Z2UgKi8KLSAgICBpZiAoIGlzX2VwdGVfc3VwZXJwYWdlKCZlKSApCisgICAg
ZWxzZSBpZiAoIGlzX2VwdGVfc3VwZXJwYWdlKCZlKSApCiAgICAgICAgIHJl
dHVybiBHVUVTVF9UQUJMRV9TVVBFUl9QQUdFOwogCi0gICAgbWZuID0gZS5t
Zm47CiAgICAgdW5tYXBfZG9tYWluX3BhZ2UoKnRhYmxlKTsKLSAgICAqdGFi
bGUgPSBtYXBfZG9tYWluX3BhZ2UoX21mbihtZm4pKTsKKyAgICAqdGFibGUg
PSBuZXh0ID86IG1hcF9kb21haW5fcGFnZShfbWZuKGUubWZuKSk7CiAgICAg
Kmdmbl9yZW1haW5kZXIgJj0gKDFVTCA8PCBzaGlmdCkgLSAxOwogICAgIHJl
dHVybiBHVUVTVF9UQUJMRV9OT1JNQUxfUEFHRTsKIH0K

--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.12-2.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.12-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.13-1.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.13-1.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiB4ODYvRVBUOiBlcHRfc2V0X21pZGRsZV9lbnRyeSgpIHJlbGF0ZWQgYWRq
dXN0bWVudHMKCmVwdF9zcGxpdF9zdXBlcl9wYWdlKCkgd2FudHMgdG8gZnVy
dGhlciBtb2RpZnkgdGhlIG5ld2x5IGFsbG9jYXRlZAp0YWJsZSwgc28gaGF2
ZSBlcHRfc2V0X21pZGRsZV9lbnRyeSgpIHJldHVybiB0aGUgbWFwcGVkIHBv
aW50ZXIgcmF0aGVyCnRoYW4gdGVhcmluZyBpdCBkb3duIGFuZCB0aGVuIGdl
dHRpbmcgcmUtZXN0YWJsaXNoZWQgcmlnaHQgYWdhaW4uCgpTaW1pbGFybHkg
ZXB0X25leHRfbGV2ZWwoKSB3YW50cyB0byBoYW5kIGJhY2sgYSBtYXBwZWQg
cG9pbnRlciBvZgp0aGUgbmV4dCBsZXZlbCBwYWdlLCBzbyByZS11c2UgdGhl
IG9uZSBlc3RhYmxpc2hlZCBieQplcHRfc2V0X21pZGRsZV9lbnRyeSgpIGlu
IGNhc2UgdGhhdCBwYXRoIHdhcyB0YWtlbi4KClB1bGwgdGhlIHNldHRpbmcg
b2Ygc3VwcHJlc3NfdmUgYWhlYWQgb2YgaW5zZXJ0aW9uIGludG8gdGhlIGhp
Z2hlciBsZXZlbAp0YWJsZSwgYW5kIGRvbid0IGhhdmUgZXB0X3NwbGl0X3N1
cGVyX3BhZ2UoKSBzZXQgdGhlIGZpZWxkIGEgMm5kIHRpbWUuCgpUaGlzIGlz
IHBhcnQgb2YgWFNBLTMyOC4KClNpZ25lZC1vZmYtYnk6IEphbiBCZXVsaWNo
IDxqYmV1bGljaEBzdXNlLmNvbT4KCi0tLSBhL3hlbi9hcmNoL3g4Ni9tbS9w
Mm0tZXB0LmMKKysrIGIveGVuL2FyY2gveDg2L21tL3AybS1lcHQuYwpAQCAt
MTg3LDggKzE4Nyw5IEBAIHN0YXRpYyB2b2lkIGVwdF9wMm1fdHlwZV90b19m
bGFncyhzdHJ1Y3QKICNkZWZpbmUgR1VFU1RfVEFCTEVfU1VQRVJfUEFHRSAg
MgogI2RlZmluZSBHVUVTVF9UQUJMRV9QT0RfUEFHRSAgICAzCiAKLS8qIEZp
bGwgaW4gbWlkZGxlIGxldmVscyBvZiBlcHQgdGFibGUgKi8KLXN0YXRpYyBp
bnQgZXB0X3NldF9taWRkbGVfZW50cnkoc3RydWN0IHAybV9kb21haW4gKnAy
bSwgZXB0X2VudHJ5X3QgKmVwdF9lbnRyeSkKKy8qIEZpbGwgaW4gbWlkZGxl
IGxldmVsIG9mIGVwdCB0YWJsZTsgcmV0dXJuIHBvaW50ZXIgdG8gbWFwcGVk
IG5ldyB0YWJsZS4gKi8KK3N0YXRpYyBlcHRfZW50cnlfdCAqZXB0X3NldF9t
aWRkbGVfZW50cnkoc3RydWN0IHAybV9kb21haW4gKnAybSwKKyAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZXB0X2VudHJ5X3Qg
KmVwdF9lbnRyeSkKIHsKICAgICBtZm5fdCBtZm47CiAgICAgZXB0X2VudHJ5
X3QgKnRhYmxlOwpAQCAtMTk2LDcgKzE5NywxMiBAQCBzdGF0aWMgaW50IGVw
dF9zZXRfbWlkZGxlX2VudHJ5KHN0cnVjdCBwCiAKICAgICBtZm4gPSBwMm1f
YWxsb2NfcHRwKHAybSwgMCk7CiAgICAgaWYgKCBtZm5fZXEobWZuLCBJTlZB
TElEX01GTikgKQotICAgICAgICByZXR1cm4gMDsKKyAgICAgICAgcmV0dXJu
IE5VTEw7CisKKyAgICB0YWJsZSA9IG1hcF9kb21haW5fcGFnZShtZm4pOwor
CisgICAgZm9yICggaSA9IDA7IGkgPCBFUFRfUEFHRVRBQkxFX0VOVFJJRVM7
IGkrKyApCisgICAgICAgIHRhYmxlW2ldLnN1cHByZXNzX3ZlID0gMTsKIAog
ICAgIGVwdF9lbnRyeS0+ZXB0ZSA9IDA7CiAgICAgZXB0X2VudHJ5LT5tZm4g
PSBtZm5feChtZm4pOwpAQCAtMjA4LDE0ICsyMTQsNyBAQCBzdGF0aWMgaW50
IGVwdF9zZXRfbWlkZGxlX2VudHJ5KHN0cnVjdCBwCiAKICAgICBlcHRfZW50
cnktPnN1cHByZXNzX3ZlID0gMTsKIAotICAgIHRhYmxlID0gbWFwX2RvbWFp
bl9wYWdlKG1mbik7Ci0KLSAgICBmb3IgKCBpID0gMDsgaSA8IEVQVF9QQUdF
VEFCTEVfRU5UUklFUzsgaSsrICkKLSAgICAgICAgdGFibGVbaV0uc3VwcHJl
c3NfdmUgPSAxOwotCi0gICAgdW5tYXBfZG9tYWluX3BhZ2UodGFibGUpOwot
Ci0gICAgcmV0dXJuIDE7CisgICAgcmV0dXJuIHRhYmxlOwogfQogCiAvKiBm
cmVlIGVwdCBzdWIgdHJlZSBiZWhpbmQgYW4gZW50cnkgKi8KQEAgLTI1Mywx
MCArMjUyLDEwIEBAIHN0YXRpYyBib29sX3QgZXB0X3NwbGl0X3N1cGVyX3Bh
Z2Uoc3RydWMKIAogICAgIEFTU0VSVChpc19lcHRlX3N1cGVycGFnZShlcHRf
ZW50cnkpKTsKIAotICAgIGlmICggIWVwdF9zZXRfbWlkZGxlX2VudHJ5KHAy
bSwgJm5ld19lcHQpICkKKyAgICB0YWJsZSA9IGVwdF9zZXRfbWlkZGxlX2Vu
dHJ5KHAybSwgJm5ld19lcHQpOworICAgIGlmICggIXRhYmxlICkKICAgICAg
ICAgcmV0dXJuIDA7CiAKLSAgICB0YWJsZSA9IG1hcF9kb21haW5fcGFnZShf
bWZuKG5ld19lcHQubWZuKSk7CiAgICAgdHJ1bmsgPSAxVUwgPDwgKChsZXZl
bCAtIDEpICogRVBUX1RBQkxFX09SREVSKTsKIAogICAgIGZvciAoIGkgPSAw
OyBpIDwgRVBUX1BBR0VUQUJMRV9FTlRSSUVTOyBpKysgKQpAQCAtMjY3LDcg
KzI2Niw2IEBAIHN0YXRpYyBib29sX3QgZXB0X3NwbGl0X3N1cGVyX3BhZ2Uo
c3RydWMKICAgICAgICAgZXB0ZS0+c3AgPSAobGV2ZWwgPiAxKTsKICAgICAg
ICAgZXB0ZS0+bWZuICs9IGkgKiB0cnVuazsKICAgICAgICAgZXB0ZS0+c25w
ID0gaXNfaW9tbXVfZW5hYmxlZChwMm0tPmRvbWFpbikgJiYgaW9tbXVfc25v
b3A7Ci0gICAgICAgIGVwdGUtPnN1cHByZXNzX3ZlID0gMTsKIAogICAgICAg
ICBlcHRfcDJtX3R5cGVfdG9fZmxhZ3MocDJtLCBlcHRlLCBlcHRlLT5zYV9w
Mm10LCBlcHRlLT5hY2Nlc3MpOwogCkBAIC0zMDYsOCArMzA0LDcgQEAgc3Rh
dGljIGludCBlcHRfbmV4dF9sZXZlbChzdHJ1Y3QgcDJtX2RvbQogICAgICAg
ICAgICAgICAgICAgICAgICAgICBlcHRfZW50cnlfdCAqKnRhYmxlLCB1bnNp
Z25lZCBsb25nICpnZm5fcmVtYWluZGVyLAogICAgICAgICAgICAgICAgICAg
ICAgICAgICBpbnQgbmV4dF9sZXZlbCkKIHsKLSAgICB1bnNpZ25lZCBsb25n
IG1mbjsKLSAgICBlcHRfZW50cnlfdCAqZXB0X2VudHJ5LCBlOworICAgIGVw
dF9lbnRyeV90ICplcHRfZW50cnksICpuZXh0ID0gTlVMTCwgZTsKICAgICB1
MzIgc2hpZnQsIGluZGV4OwogCiAgICAgc2hpZnQgPSBuZXh0X2xldmVsICog
RVBUX1RBQkxFX09SREVSOwpAQCAtMzMyLDE5ICszMjksMTcgQEAgc3RhdGlj
IGludCBlcHRfbmV4dF9sZXZlbChzdHJ1Y3QgcDJtX2RvbQogICAgICAgICBp
ZiAoIHJlYWRfb25seSApCiAgICAgICAgICAgICByZXR1cm4gR1VFU1RfVEFC
TEVfTUFQX0ZBSUxFRDsKIAotICAgICAgICBpZiAoICFlcHRfc2V0X21pZGRs
ZV9lbnRyeShwMm0sIGVwdF9lbnRyeSkgKQorICAgICAgICBuZXh0ID0gZXB0
X3NldF9taWRkbGVfZW50cnkocDJtLCBlcHRfZW50cnkpOworICAgICAgICBp
ZiAoICFuZXh0ICkKICAgICAgICAgICAgIHJldHVybiBHVUVTVF9UQUJMRV9N
QVBfRkFJTEVEOwotICAgICAgICBlbHNlCi0gICAgICAgICAgICBlID0gYXRv
bWljX3JlYWRfZXB0X2VudHJ5KGVwdF9lbnRyeSk7IC8qIFJlZnJlc2ggKi8K
KyAgICAgICAgLyogZSBpcyBub3cgc3RhbGUgYW5kIGhlbmNlIG1heSBub3Qg
YmUgdXNlZCBhbnltb3JlIGJlbG93LiAqLwogICAgIH0KLQogICAgIC8qIFRo
ZSBvbmx5IHRpbWUgc3Agd291bGQgYmUgc2V0IGhlcmUgaXMgaWYgd2UgaGFk
IGhpdCBhIHN1cGVycGFnZSAqLwotICAgIGlmICggaXNfZXB0ZV9zdXBlcnBh
Z2UoJmUpICkKKyAgICBlbHNlIGlmICggaXNfZXB0ZV9zdXBlcnBhZ2UoJmUp
ICkKICAgICAgICAgcmV0dXJuIEdVRVNUX1RBQkxFX1NVUEVSX1BBR0U7CiAK
LSAgICBtZm4gPSBlLm1mbjsKICAgICB1bm1hcF9kb21haW5fcGFnZSgqdGFi
bGUpOwotICAgICp0YWJsZSA9IG1hcF9kb21haW5fcGFnZShfbWZuKG1mbikp
OworICAgICp0YWJsZSA9IG5leHQgPzogbWFwX2RvbWFpbl9wYWdlKF9tZm4o
ZS5tZm4pKTsKICAgICAqZ2ZuX3JlbWFpbmRlciAmPSAoMVVMIDw8IHNoaWZ0
KSAtIDE7CiAgICAgcmV0dXJuIEdVRVNUX1RBQkxFX05PUk1BTF9QQUdFOwog
fQo=

--=separator
Content-Type: application/octet-stream; name="xsa328/xsa328-4.13-2.patch"
Content-Disposition: attachment; filename="xsa328/xsa328-4.13-2.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Jul 07 12:24:40 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 07 Jul 2020 12:24:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jsmdl-0007Dn-5s; Tue, 07 Jul 2020 12:24:01 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1g3R=AS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jsmdk-0007DT-12
 for xen-users@lists.xen.org; Tue, 07 Jul 2020 12:24:00 +0000
X-Inumbo-ID: bbb45f0a-c04c-11ea-bca7-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id bbb45f0a-c04c-11ea-bca7-bc764e2007e4;
 Tue, 07 Jul 2020 12:23:58 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=ZWlDk5b1NVC6EET/cOV6YdvAXsB2RSRQIeRlFabmc9s=; b=GgqsbibzuG1G6WuLD3aoi4YSAp
 CjXkwfoYWDV6HljfvN+b7aNhE7/UdBrnvT9OiTcCJjg2aPjZ0cCjEm/JQe8l9gr09bgN2gzOmrwrd
 3VZSPQu6H1vt2jCQYXA315Wl30kQ0N9n2at3b5UtwEefe7HW4vVYLnsDPmbDVTxw6CIc=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmde-0002uU-Dd; Tue, 07 Jul 2020 12:23:54 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jsmde-00040K-Bc; Tue, 07 Jul 2020 12:23:54 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 327 v3 (CVE-2020-15564) - Missing alignment
 check in VCPUOP_register_vcpu_info
Message-Id: <E1jsmde-00040K-Bc@xenbits.xenproject.org>
Date: Tue, 07 Jul 2020 12:23:54 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-15564 / XSA-327
                               version 3

         Missing alignment check in VCPUOP_register_vcpu_info

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

The hypercall VCPUOP_register_vcpu_info is used by a guest to register
a shared region with the hypervisor. The region will be mapped into Xen address
space so it can be directly accessed.

On Arm, the region is accessed with instructions which require a specific
alignment. Unfortunately, there is no check that the address provided by
the guest will be correctly aligned.

As a result, a malicious guest could cause a hypervisor crash by passing
a misaligned address.

IMPACT
======

A malicious guest administrator may cause a hypervisor crash, resulting in a
Denial of Service (DoS).

VULNERABLE SYSTEMS
==================

All Xen versions are vulnerable.

Only Arm systems are vulnerable.  x86 systems are not affected.

MITIGATION
==========

There is no mitigation.

CREDITS
=======

This issue was discovered by Julien Grall of Amazon.

RESOLUTION
==========

Applying the attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa327.patch           Xen 4.9 - xen-unstable

$ sha256sum xsa327*
f046eefcc1368708bd1fafc88e063d3dbc5c4cdb593d68b3b04917c6cdb7bcb5  xsa327.meta
1d057695d5b74ce2857204103e943caeaf773bc4fb9d91ea78016e01a9147ed7  xsa327.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patch and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8EaVAMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZcqIIAKpb992pMq1jFStIGPhk6HsaIhxVEGep67eJHq9d
TMaFiyBix125djY0zV8KaznmZmRpM2pNKVsIkGe1XHgtEMcWgMAYARejJLRC4UnW
xHhpunI7rJMQc1vL5ZGxAFbVYF6U/PX0rwESwQb2/Rt0eLBTAmH4m25TQiSEnrkM
3C4Dbk3puCbaeB7VGiyccK07hh6qQhEO8s1FhZTNVTaqqcNWZYqy/SbmRYHiT/in
2dK6XOiBgRhHnjsDDoXj5abSMb00KnJ9PkWu8RC2b7+BVZJUii1557T8zpDo9Fyl
CJ3YXrekd+gQSFxgwCts00BbLr2NUf3uqEtpY1EEV7UKmvQ=
=fPiG
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa327.meta"
Content-Disposition: attachment; filename="xsa327.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa327.patch"
Content-Disposition: attachment; filename="xsa327.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Thu Jul 09 08:47:38 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 08:47:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtSBk-0005WU-Jy; Thu, 09 Jul 2020 08:45:52 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ORNO=AU=os.lv=kl@srs-us1.protection.inumbo.net>)
 id 1jtSBj-0005WP-Cg
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 08:45:51 +0000
X-Inumbo-ID: 95eeceac-c1c0-11ea-8ead-12813bfff9fa
Received: from mamuts.risinajumi.lv (unknown [212.70.177.194])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTP
 id 95eeceac-c1c0-11ea-8ead-12813bfff9fa;
 Thu, 09 Jul 2020 08:45:48 +0000 (UTC)
Received: by mamuts.risinajumi.lv (Postfix, from userid 65534)
 id DE5246AFC3; Thu,  9 Jul 2020 11:49:16 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.2.2 (2007-07-23) on mamuts.risinajumi.lv
X-Spam-Level: *
X-Spam-Status: No, score=1.4 required=9.5 tests=FH_DATE_PAST_20XX autolearn=no
 version=3.2.2
Received: from smtp.risinajumi.lv (smtp.risinajumi.lv [212.70.177.201])
 by mamuts.risinajumi.lv (Postfix) with ESMTP id 9F7E76AFC1
 for <xen-users@lists.xenproject.org>; Thu,  9 Jul 2020 11:49:16 +0300 (EEST)
Received: from [172.23.90.7] (unknown [159.148.90.2])
 by smtp.risinajumi.lv (Postfix) with ESMTPA id F2AD2F1251
 for <xen-users@lists.xenproject.org>; Thu,  9 Jul 2020 11:45:46 +0300 (EEST)
To: xen-users@lists.xenproject.org
From: Casper <kl@os.lv>
Subject: Debian 10, xen 4.11 reliability
Message-ID: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
Date: Thu, 9 Jul 2020 11:45:47 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello,

I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with 
Xen 4.1.4 on some servers still work very reliable with no problems, 
only wanted to change new hard discs pushed me to install new Debian 10 
with Xen packages to newer version.

Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen 
4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now 
it repeats in old reliable servers too. My config is I have 2-3 hard 
discs per server node and RAID1 with sw md raid, it crashes with md lost 
access for disc. After reboot all works as it should.

I tested different HW and discs, all the same problems.
Loads are no big, just few testing DomU nodes.
Any suggestion? I`m currently running latest Debian kernel 4.19 was 
thinking to downgrade to test different kernel.
Or problem with Debian Xen package as it not so popular anymore?
Any suggestion what to test to figure out problem?

Sincerely,
Casper


From xen-users-bounces@lists.xenproject.org Thu Jul 09 08:55:09 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 08:55:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtSKU-0006Rb-Ke; Thu, 09 Jul 2020 08:54:54 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ic4t=AU=gmail.com=sendmailtogoran@srs-us1.protection.inumbo.net>)
 id 1jtSKT-0006RV-6J
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 08:54:53 +0000
X-Inumbo-ID: d9f4aa58-c1c1-11ea-bca7-bc764e2007e4
Received: from mail-io1-xd2b.google.com (unknown [2607:f8b0:4864:20::d2b])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id d9f4aa58-c1c1-11ea-bca7-bc764e2007e4;
 Thu, 09 Jul 2020 08:54:52 +0000 (UTC)
Received: by mail-io1-xd2b.google.com with SMTP id k23so1486001iom.10
 for <xen-users@lists.xenproject.org>; Thu, 09 Jul 2020 01:54:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=HyyUnliBJ/yc6++8k228JiMs+gYKcSRiJLBnzXYmQQI=;
 b=qWVC4EJ2B1ba/v3oKPgj2fBSDdZSdBdKJ3yd/+sNDVM6hV3pDgJQjEBbFIXG2zSO5E
 oLI0dGmKlqlulLAUbTeHYEYrt0Jj1nSkzs1SUa70Onl3iU+JZKk3uGuuLaHIO4VdVKyo
 iaRk5Y7U7+SSOzpXc3hYNCCqgCuQJB9+BsIOGYXMFiCsJtdNfX1RvH0fDEI6y3ffI5rL
 xy7BLGca0V6j4efa25zysEC5QC1YHLDRAWhdKc5SZzkDNaCYT9jFBEryJZAb57aSbF/i
 +oRE8/mJ5e573mQF/ArwNR0tl1hgHrH/pzIs8w/DyCjjAYmJwxx5USVI8Bg/x8g+aV64
 pnrA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=HyyUnliBJ/yc6++8k228JiMs+gYKcSRiJLBnzXYmQQI=;
 b=IKqRA6R8G0LHVyj4xznTtt0PeKJS0D/w1KLy1EzuFovnIW51y0sCM11QQAUrJk4M/z
 FuvNSOODHkNascuENZtkQ6ksnh6RSPc1z7/kZpx4JD0UdxCG4lFWL1wynwqBF8TVqorU
 ZgyU9aDE7oIdn3WJGy6zeTTNaRfpZgM3biPh62osZldl4kX2kC+rwwcIe+TKk/CF6wtv
 Mn+h8+pYJPFShqBToLC3O18oZTmGRcgDGwZ5SfjO4LzQ9ySy+IqAmHCqm5F5W8tYja1T
 YO9NfoaCbm+Cw9UIoCLv4BMYA/o2D5mSDKYNrboskEXSIRPk6CrJxdBhu/4l11g5oDE/
 M5qQ==
X-Gm-Message-State: AOAM533Y0guQ06G+lSBPc8/bJK4OZumbPq6RfIDKkbB78Ro1gZxZHXEM
 vlHBS9A8EVteRENNW365uqlkQO/AFBEZr86iZCYk1jFP
X-Google-Smtp-Source: ABdhPJzV2SbEtCnsVaiUGi/J9isXy3i9F5SmENWEeug7n6d1RL5scnX8qtPhbEfWIadcc8PVM0ilUa1kcHHfZ/UrJck=
X-Received: by 2002:a02:1a06:: with SMTP id 6mr72417525jai.8.1594284891468;
 Thu, 09 Jul 2020 01:54:51 -0700 (PDT)
MIME-Version: 1.0
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
In-Reply-To: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
From: Goran <sendmailtogoran@gmail.com>
Date: Thu, 9 Jul 2020 10:54:41 +0200
Message-ID: <CABS5c+HJ8NEfL49tiN5TMtERHz_-HNDHNty7xq3yREr+b0vhCQ@mail.gmail.com>
Subject: Re: Debian 10, xen 4.11 reliability
To: Casper <kl@os.lv>
Content-Type: multipart/alternative; boundary="000000000000a076b005a9fe603b"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000a076b005a9fe603b
Content-Type: text/plain; charset="UTF-8"

Get rid of Systemd. Use Devuan. Works like a charm.

[ send by mobile device ]

Casper <kl@os.lv> schrieb am Do., 9. Juli 2020, 10:50:

> Hello,
>
> I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with
> Xen 4.1.4 on some servers still work very reliable with no problems,
> only wanted to change new hard discs pushed me to install new Debian 10
> with Xen packages to newer version.
>
> Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen
> 4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now
> it repeats in old reliable servers too. My config is I have 2-3 hard
> discs per server node and RAID1 with sw md raid, it crashes with md lost
> access for disc. After reboot all works as it should.
>
> I tested different HW and discs, all the same problems.
> Loads are no big, just few testing DomU nodes.
> Any suggestion? I`m currently running latest Debian kernel 4.19 was
> thinking to downgrade to test different kernel.
> Or problem with Debian Xen package as it not so popular anymore?
> Any suggestion what to test to figure out problem?
>
> Sincerely,
> Casper
>
>

--000000000000a076b005a9fe603b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Get rid of Systemd. Use Devuan. Works like a charm.<br><b=
r><div data-smartmail=3D"gmail_signature">[ send by mobile device ]</div></=
div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">Ca=
sper &lt;<a href=3D"mailto:kl@os.lv">kl@os.lv</a>&gt; schrieb am Do., 9. Ju=
li 2020, 10:50:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:=
0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hello,<br>
<br>
I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with <b=
r>
Xen 4.1.4 on some servers still work very reliable with no problems, <br>
only wanted to change new hard discs pushed me to install new Debian 10 <br=
>
with Xen packages to newer version.<br>
<br>
Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen <br>
4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now <br>
it repeats in old reliable servers too. My config is I have 2-3 hard <br>
discs per server node and RAID1 with sw md raid, it crashes with md lost <b=
r>
access for disc. After reboot all works as it should.<br>
<br>
I tested different HW and discs, all the same problems.<br>
Loads are no big, just few testing DomU nodes.<br>
Any suggestion? I`m currently running latest Debian kernel 4.19 was <br>
thinking to downgrade to test different kernel.<br>
Or problem with Debian Xen package as it not so popular anymore?<br>
Any suggestion what to test to figure out problem?<br>
<br>
Sincerely,<br>
Casper<br>
<br>
</blockquote></div>

--000000000000a076b005a9fe603b--


From xen-users-bounces@lists.xenproject.org Thu Jul 09 09:48:44 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 09:48:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtT9W-0002aF-JL; Thu, 09 Jul 2020 09:47:38 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=sHay=AU=xen.org=julien@srs-us1.protection.inumbo.net>)
 id 1jtT9V-0002aA-Gr
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 09:47:37 +0000
X-Inumbo-ID: 37526364-c1c9-11ea-8eb0-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 37526364-c1c9-11ea-8eb0-12813bfff9fa;
 Thu, 09 Jul 2020 09:47:35 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
 MIME-Version:Date:Message-ID:From:References:To:Subject:Sender:Reply-To:Cc:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=mHCdSoaum50aMBf0VZO//qM1LXrWUWZe/pkbZwuqa/Y=; b=BnWRK+e5vF4bFU71ZGEaHCW+us
 HAq4nlo2/CTUMVYy3t4haMjyRRj/aDmnp3pGD0GLl9O2BDnxuNZAHEydZ7Emj2zu0gUx8tJAuQ0eH
 3tRgXrfbniuye3bBD3d8Bt0CcF/5WYSjzKlCLb5nSIAC6evg17tvh2AbjPeA3VY2EI7Y=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1jtT9S-000356-QO
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 09:47:34 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1jtT9S-0000tT-Jl
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 09:47:34 +0000
Subject: Re: Xen Live patching vs Live-Updating Xen.
To: xen-users@lists.xenproject.org
References: <b2Dubc5b4qvhCDWI8WoFhi3bEYdt0muyqxh7uBkydJ7cwrKnQ7UDKinFpgwlIthAhpyJXKs4L_WMkh0If92e44lFIVWonKv3VcrJQYBIwfA=@protonmail.com>
From: Julien Grall <julien@xen.org>
Message-ID: <4b6ec2e1-e204-6aaa-329d-593162d045f6@xen.org>
Date: Thu, 9 Jul 2020 10:47:33 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0)
 Gecko/20100101 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <b2Dubc5b4qvhCDWI8WoFhi3bEYdt0muyqxh7uBkydJ7cwrKnQ7UDKinFpgwlIthAhpyJXKs4L_WMkh0If92e44lFIVWonKv3VcrJQYBIwfA=@protonmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>



On 05/07/2020 22:45, peter.jac@protonmail.com wrote:
> Hello,

Hello,

> Xen Live patching is Live-Updating Xen or they are difference?

They are different. In the case of Live patching, you are replacing 
small portion of the hypervisor with a new version. This works quite 
well when the changes are not complex and doesn't require to mutate your 
data.

In the case of live-update, the existing hypervisor will be replaced by 
a new version without requiring a restart of your VMs. This would allow 
you to upgrade between stable release (and possibly major) versions of Xen.

So far, only live-patching is available upstream. But there is plan to 
get live-update support for Xen.

Best regards,

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Thu Jul 09 11:44:40 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 11:44:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtUxM-000492-CC; Thu, 09 Jul 2020 11:43:12 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ORNO=AU=os.lv=kl@srs-us1.protection.inumbo.net>)
 id 1jtUxK-00048x-8h
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 11:43:10 +0000
X-Inumbo-ID: 597f676a-c1d9-11ea-8eb6-12813bfff9fa
Received: from mamuts.risinajumi.lv (unknown [212.70.177.194])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTP
 id 597f676a-c1d9-11ea-8eb6-12813bfff9fa;
 Thu, 09 Jul 2020 11:43:04 +0000 (UTC)
Received: by mamuts.risinajumi.lv (Postfix, from userid 65534)
 id 155A06AFC3; Thu,  9 Jul 2020 14:46:33 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.2.2 (2007-07-23) on mamuts.risinajumi.lv
X-Spam-Level: *
X-Spam-Status: No, score=1.4 required=9.5 tests=FH_DATE_PAST_20XX autolearn=no
 version=3.2.2
Received: from smtp.risinajumi.lv (smtp.risinajumi.lv [212.70.177.201])
 by mamuts.risinajumi.lv (Postfix) with ESMTP id AB8556AFC1
 for <xen-users@lists.xenproject.org>; Thu,  9 Jul 2020 14:46:32 +0300 (EEST)
Received: from [192.168.43.214] (unknown [80.89.78.44])
 by smtp.risinajumi.lv (Postfix) with ESMTPA id CCBD1F1251
 for <xen-users@lists.xenproject.org>; Thu,  9 Jul 2020 14:43:02 +0300 (EEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <CABS5c+HJ8NEfL49tiN5TMtERHz_-HNDHNty7xq3yREr+b0vhCQ@mail.gmail.com>
 <CABS5c+GmZWiD6pVe6jvQPpFxBVp4=gn=7xYnWQxSx0i1Lbfqyw@mail.gmail.com>
From: Casper <kl@os.lv>
Message-ID: <ce891a48-f883-56d7-47aa-b5ef4290afdc@os.lv>
Date: Thu, 9 Jul 2020 14:43:02 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <CABS5c+GmZWiD6pVe6jvQPpFxBVp4=gn=7xYnWQxSx0i1Lbfqyw@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

BSD not bad idea, but it would be interesting to find problem.
I`m curious to go to different kernel/xen version to test problem.

On 09.07.20 11:55, Goran wrote:
> Or take some BSD...
> 
> [ send by mobile device ]
> 
> Goran <sendmailtogoran@gmail.com <mailto:sendmailtogoran@gmail.com>> 
> schrieb am Do., 9. Juli 2020, 10:54:
> 
>     Get rid of Systemd. Use Devuan. Works like a charm.
> 
>     [ send by mobile device ]
> 
>     Casper <kl@os.lv <mailto:kl@os.lv>> schrieb am Do., 9. Juli 2020, 10:50:
> 
>         Hello,
> 
>         I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41
>         kernel with
>         Xen 4.1.4 on some servers still work very reliable with no
>         problems,
>         only wanted to change new hard discs pushed me to install new
>         Debian 10
>         with Xen packages to newer version.
> 
>         Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen
>         4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW,
>         but now
>         it repeats in old reliable servers too. My config is I have 2-3
>         hard
>         discs per server node and RAID1 with sw md raid, it crashes with
>         md lost
>         access for disc. After reboot all works as it should.
> 
>         I tested different HW and discs, all the same problems.
>         Loads are no big, just few testing DomU nodes.
>         Any suggestion? I`m currently running latest Debian kernel 4.19 was
>         thinking to downgrade to test different kernel.
>         Or problem with Debian Xen package as it not so popular anymore?
>         Any suggestion what to test to figure out problem?
> 
>         Sincerely,
>         Casper
> 


From xen-users-bounces@lists.xenproject.org Thu Jul 09 14:43:07 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 14:43:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtXjt-0001ze-7D; Thu, 09 Jul 2020 14:41:29 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=6rC+=AU=prgmr.com=srn@srs-us1.protection.inumbo.net>)
 id 1jtXjs-0001zZ-I9
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 14:41:28 +0000
X-Inumbo-ID: 44f40bb6-c1f2-11ea-8496-bc764e2007e4
Received: from mail.prgmr.com (unknown [2605:2700:0:5::4713:9506])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 44f40bb6-c1f2-11ea-8496-bc764e2007e4;
 Thu, 09 Jul 2020 14:41:27 +0000 (UTC)
Received: from [192.168.2.47] (c-174-62-72-237.hsd1.ca.comcast.net
 [174.62.72.237]) (Authenticated sender: srn)
 by mail.prgmr.com (Postfix) with ESMTPSA id 665107200C2;
 Thu,  9 Jul 2020 10:41:26 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.prgmr.com 665107200C2
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prgmr.com;
 s=default; t=1594305686;
 bh=MlpN8vQP0en46Nv+C0mxKQ5fVf/VeiKaCCU6O9aHq2o=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=HNnkRU+6AtIlqgo3DaeY/kNEleWc7jaFogEgZSyahf0RPfbNP0QFma4oufoIuLRFj
 M6ikvHdb3VKZhueuITCSup7+6Ef/WgSeNR0+wxGFY3r3J+LsoRjLfVS2JWTOguktPH
 X26G73vhdBca69pV3h20zZyGOhGnP1WJAdgKB1RM=
Subject: Re: Debian 10, xen 4.11 reliability
To: Casper <kl@os.lv>, xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
From: Sarah Newman <srn@prgmr.com>
Message-ID: <0ffed2ed-d6a2-35f4-abe4-8ced95277d0a@prgmr.com>
Date: Thu, 9 Jul 2020 07:41:25 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 7/9/20 1:45 AM, Casper wrote:
> Hello,
> 
> I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with Xen 4.1.4 on some servers still work very reliable with no problems, only 
> wanted to change new hard discs pushed me to install new Debian 10 with Xen packages to newer version.
> 
> Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen 4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now it repeats in 
> old reliable servers too. My config is I have 2-3 hard discs per server node and RAID1 with sw md raid, it crashes with md lost access for disc. After 
> reboot all works as it should.
> 
> I tested different HW and discs, all the same problems.
> Loads are no big, just few testing DomU nodes.
> Any suggestion? I`m currently running latest Debian kernel 4.19 was thinking to downgrade to test different kernel.
> Or problem with Debian Xen package as it not so popular anymore?
> Any suggestion what to test to figure out problem?

Kernel messages and all the kernel versions you've tried since Debian 7 please?

We're trying to track down some other issues with debian guests; maybe they are the same root cause.

--Sarah


From xen-users-bounces@lists.xenproject.org Thu Jul 09 17:11:26 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 17:11:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jta3I-0005vm-HY; Thu, 09 Jul 2020 17:09:40 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bMnf=AU=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1jta3G-0005vU-Pl
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 17:09:38 +0000
X-Inumbo-ID: f5802c6c-c206-11ea-bb8b-bc764e2007e4
Received: from sonic305-2.consmr.mail.bf2.yahoo.com (unknown [74.6.133.41])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id f5802c6c-c206-11ea-bb8b-bc764e2007e4;
 Thu, 09 Jul 2020 17:09:33 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1594314573; bh=trrcQUgQAifnMBO3TKpcFwdpml8Fm9HdpLtTju4GKx4=;
 h=Date:From:Reply-To:To:Subject:References:From:Subject;
 b=GBNbYOeZXnLXUgPyCAbh5FEPKYevxWq1Bn8+iifsROKdjHt9zMyG/UaB2cAA3WIsF5Np2HND+aBslXqzkRk+zf2puXU1cEyEVZgLfwCAhfPBTWJeBublA6heO+0SSCOr3HaNzDMuSqiBQmklqssKThN9Rd+YQInIKloASvf6tbFG7vxfC3/paZ0L7SAV2ewGJ8ROOT7QF+OO6chM6FvY/QVae62ZTHDcNT7kNM7tN50G9RKVGRw9UasgXECnTgBQq50qVhEXqCG7Pt57QoksIdimciNaVH26Npz0BDZBg2d/XVOzjYDHXhgFWsn+8FCX1m8HsYLu2DRxuxcwo63pOg==
X-YMail-OSG: V2wGrWQVM1nPgmiYxJQbX1WC21frsq9ctBp9KB6Xxi4Bh_M_K9l.CLSof1nVALD
 HvkpIF2an6TkeQEnWCwm.hiq.N8cTVKNrXLR1NpJkE8RgtCMdHaR4yYwVqw4JWOmqlgTabChnpzJ
 601jCBiRu9tDFSj0Y2pt3CxUb7WWo.Mm7tDt4s.CUZzAgiAkygYfAWCmMALf4vceBOXUQQVZa83E
 dE9M6pL8JYuhct7P_Db79O8kKg4YLrfnsP63jjXZ7H7yv1JlzQS3Im5YPKFTPT5ihBUycL.KlHUZ
 Unr2x_PMoPbnwWz2tYzaSItAEgs3COzFHszLZIvFNG2mCzZ0LodB8JznU9BPbrqpaaxWQLm9IOzQ
 R1q2sqGXwP7uJ1tVL09BGC0AZcJG74KDPvFHVqSsSXshrCoNVRVlriLGMpEAje81UFsOFT8fDRPh
 fSvHTa5rKWcSrpnSVZ69SGbOOdryXchytkvZ9EDcQg540yGxP.NTrzTKbvfIvaetSvqst0qz8PIB
 A2_tGefplXFohAOkDh0dmXjRALBMOhJx94.BBk_l203sPnuGXpn0Tlg1q7MlWxLq5riBPNfTaNZs
 B6IHR3DhT3QCVedviY_CQcZWiLBnAq1X7H3_oyHpM6lg6JdJxvrCZWlLNL7jpDvlO5_Be.1zGOm8
 WIg4TxtSMbD1ULEqK9HPwITBgR5Qky8KTuoKHLGLPVRbwVBBl7xBxsBMVWjwITmon0wpkjkjJwIw
 OL_hEMYoXcWOr0.GjXCST2IB24WsXkcm.NYYUkrrj9YivtvYlETC_.hq4WZdJ1Io141qOnhGtWVk
 cm4luOJBfgF3Ptm5rYCfamJJCHrJybo_SqkE_7KsHgXoimUcHwauvubnJcebA_amRrDoLYSSU7tE
 5KgEuW.0lQBVPcsQJNg03gUTBqJ2HGV_s1ztYZvPr_bch5V3GWoGD77eLEdiNxIvA1RUZAg1rPXV
 4CeKQ3abRlQxUa8kNd_sMAlBiHkr6tLAYEzgLUFBGOiIexHM6Dx9tVDBxZX1dIQ7XJvqR.rPk7f5
 4VwbIZ6k26z6sbX2jv55e6yv0KDC9hESHRgOMh44H28zyqJ766vnV31Pbkixyl3x2HKhjheBeBl7
 zYCd1uTJSz3BXof2TzO4HGwwCtfkuxfvb8ArbOitvtZCijLswkwaD42DX6Q09a_q8Qnd12OBptlF
 2xg3dNeHLJ067A4sB9CT5RWkOjz_MQQ3DkMHGhLaSdvBUTvrOystfK8JbbCm.k6z.szWBN7mJ8x7
 fQaN6TJ2GzY8lArko5OLAbnF_WlNF2w6uPcqSIXeXjr6YGSGgoJzNHRTl2s_0_1K.MMOk84tO7n7
 m8g746evepjCHzsKx6q9k6TLTxp35I.dkIcxrn2ojxEsN77vVwpFMtE8HoQ--
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic305.consmr.mail.bf2.yahoo.com with HTTP; Thu, 9 Jul 2020 17:09:33 +0000
Date: Thu, 9 Jul 2020 17:09:30 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: Xen-users <xen-users@lists.xenproject.org>, 
 "mirageos-devel@lists.xenproject.org" <mirageos-devel@lists.xenproject.org>
Message-ID: <784251130.2623344.1594314570469@mail.yahoo.com>
Subject: MirageOS and Unikernel.
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_2623343_771106849.1594314570468"
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
X-Mailer: WebService/1.1.16197 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 886
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_2623343_771106849.1594314570468
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,Is it true that the Docker acquired the Unikernel technology and MirageOS?Thus, this technology is under Docker control and Xen can't use Unikernel without Docker license?
Cheers.
------=_Part_2623343_771106849.1594314570468
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,<div id="yMail_cursorElementTracker_1594314435911">Is it true that the Docker acquired the Unikernel technology and MirageOS?</div><div id="yMail_cursorElementTracker_1594314472615">Thus, this technology is under Docker control and Xen can't use Unikernel without Docker license?</div><div id="yMail_cursorElementTracker_1594314551445"><br></div><div id="yMail_cursorElementTracker_1594314551690">Cheers.</div>
------=_Part_2623343_771106849.1594314570468--


From xen-users-bounces@lists.xenproject.org Thu Jul 09 22:12:04 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 22:12:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jteko-0005vM-HO; Thu, 09 Jul 2020 22:10:54 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7cEx=AU=jppozzi.dyndns.org=jpp@srs-us1.protection.inumbo.net>)
 id 1jtekm-0005vH-QX
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 22:10:52 +0000
X-Inumbo-ID: 0ce49206-c231-11ea-bb8b-bc764e2007e4
Received: from mail-ay.bbox.fr (unknown [2001:860:e200:0:c000::a])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 0ce49206-c231-11ea-bb8b-bc764e2007e4;
 Thu, 09 Jul 2020 22:10:51 +0000 (UTC)
Received: from mail.jppozzi.dyndns.org (176-172-74-140.abo.bbox.fr
 [176.172.74.140]) by mail-ay.bbox.fr (Postfix) with ESMTP id 4AEA938;
 Fri, 10 Jul 2020 00:10:49 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mail.jppozzi.dyndns.org (Postfix) with ESMTP id D992F3E5AF6;
 Fri, 10 Jul 2020 00:10:48 +0200 (CEST)
Received: from mail.jppozzi.dyndns.org ([127.0.0.1])
 by localhost (mail.jppozzi.dyndns.org [127.0.0.1]) (amavisd-new, port 10032)
 with ESMTP id CP86V-nVzPnP; Fri, 10 Jul 2020 00:10:48 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mail.jppozzi.dyndns.org (Postfix) with ESMTP id 8728C3E5AF7;
 Fri, 10 Jul 2020 00:10:48 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.jppozzi.dyndns.org
Received: from mail.jppozzi.dyndns.org ([127.0.0.1])
 by localhost (mail.jppozzi.dyndns.org [127.0.0.1]) (amavisd-new, port 10026)
 with ESMTP id TR2L_QZddHIJ; Fri, 10 Jul 2020 00:10:48 +0200 (CEST)
Received: from mail.jppozzi.dyndns.org (tmail.jpp.fr [192.168.2.21])
 by mail.jppozzi.dyndns.org (Postfix) with ESMTP id 5C8DB3E5AF6;
 Fri, 10 Jul 2020 00:10:48 +0200 (CEST)
Date: Fri, 10 Jul 2020 00:10:48 +0200 (CEST)
From: JP P <jpp@jppozzi.dyndns.org>
To: Sarah Newman <srn@prgmr.com>
Message-ID: <67309480.494.1594332648237.JavaMail.zimbra@jppozzi.dyndns.org>
In-Reply-To: <0ffed2ed-d6a2-35f4-abe4-8ced95277d0a@prgmr.com>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <0ffed2ed-d6a2-35f4-abe4-8ced95277d0a@prgmr.com>
Subject: Re: Debian 10, xen 4.11 reliability
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [192.168.2.8]
X-Mailer: Zimbra 8.8.15_GA_3953 (ZimbraWebClient - GC79 (Linux)/8.8.15_GA_3953)
Thread-Topic: Debian 10, xen 4.11 reliability
Thread-Index: EwOQC7p6Ktf6hTklUCKhPMswOlqDAQ==
X-VADE-SPAMSTATE: clean
X-VADE-SPAMSCORE: 0
X-VADE-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduiedrvddtgddtjecutefuodetggdotefrodftvfcurfhrohhfihhlvgemuceuqfgfjgfifgfgufdpucfqfgfvpdcuggftfghnshhusghstghrihgsvgenuceurghilhhouhhtmecufedttdenucenucfjughrpeffhffvkfgjfhfugggtgfhiofhtsehtqhgttdertdejnecuhfhrohhmpeflrfcurfcuoehjphhpsehjphhpohiiiihirdguhihnughnshdrohhrgheqnecuggftrfgrthhtvghrnhepuedugeeftdevfeegtdegjeejfeekleefteelhfelteeiieetffejfeehiefhudegnecukfhppedujeeirddujedvrdejgedrudegtddpudelvddrudeikedrvddrkeenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpedujeeirddujedvrdejgedrudegtddphhgvlhhopehmrghilhdrjhhpphhoiiiiihdrugihnhgunhhsrdhorhhgpdhmrghilhhfrhhomheplffrucfruceojhhpphesjhhpphhoiiiiihdrugihnhgunhhsrdhorhhgqedprhgtphhtthhopeigvghnqdhushgvrhhssehlihhsthhsrdigvghnphhrohhjvggtthdrohhrghdprhgtphhtthhopehklhesohhsrdhlvhdprhgtphhtthhopehsrhhnsehprhhgmhhrrdgtohhm
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Casper <kl@os.lv>, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello,

I have exactly the same problem with XEN 4.11 and Buster, Xen does not star=
t (it even does not recognize the boot fidk !) and
never detects the RAID 1 disks.
I cannot boot with Xen, the same Kernel boots perfectly OK without XEN and =
all RAID disks are OK.
I don't find any clue on Internet and can no more use Xen (I used it since =
2009 with no problems ...).

Regards

JP P

----- Mail original -----
De: "Sarah Newman" <srn@prgmr.com>
=C3=80: "Casper" <kl@os.lv>, xen-users@lists.xenproject.org
Envoy=C3=A9: Jeudi 9 Juillet 2020 16:41:25
Objet: Re: Debian 10, xen 4.11 reliability

On 7/9/20 1:45 AM, Casper wrote:
> Hello,
>=20
> I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with =
Xen 4.1.4 on some servers still work very reliable with no problems, only=
=20
> wanted to change new hard discs pushed me to install new Debian 10 with X=
en packages to newer version.
>=20
> Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen 4.11.4-=
pre all crashes in 1-2weeks. In start I was blaming HW, but now it repeats =
in=20
> old reliable servers too. My config is I have 2-3 hard discs per server n=
ode and RAID1 with sw md raid, it crashes with md lost access for disc. Aft=
er=20
> reboot all works as it should.
>=20
> I tested different HW and discs, all the same problems.
> Loads are no big, just few testing DomU nodes.
> Any suggestion? I`m currently running latest Debian kernel 4.19 was think=
ing to downgrade to test different kernel.
> Or problem with Debian Xen package as it not so popular anymore?
> Any suggestion what to test to figure out problem?

Kernel messages and all the kernel versions you've tried since Debian 7 ple=
ase?

We're trying to track down some other issues with debian guests; maybe they=
 are the same root cause.

--Sarah


From xen-users-bounces@lists.xenproject.org Thu Jul 09 22:18:48 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 09 Jul 2020 22:18:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtesE-0006Br-FY; Thu, 09 Jul 2020 22:18:34 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=6rC+=AU=prgmr.com=srn@srs-us1.protection.inumbo.net>)
 id 1jtesC-0006Bl-Up
 for xen-users@lists.xenproject.org; Thu, 09 Jul 2020 22:18:33 +0000
X-Inumbo-ID: 1f24b224-c232-11ea-bca7-bc764e2007e4
Received: from mail.prgmr.com (unknown [2605:2700:0:5::4713:9506])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1f24b224-c232-11ea-bca7-bc764e2007e4;
 Thu, 09 Jul 2020 22:18:31 +0000 (UTC)
Received: from [192.168.2.47] (c-174-62-72-237.hsd1.ca.comcast.net
 [174.62.72.237]) (Authenticated sender: srn)
 by mail.prgmr.com (Postfix) with ESMTPSA id F2633720128;
 Thu,  9 Jul 2020 18:18:30 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.prgmr.com F2633720128
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prgmr.com;
 s=default; t=1594333111;
 bh=ep39xVjVBI9AR8rGxG9yJe3IoyMEVVwnlUgRK2kSafo=;
 h=Subject:To:Cc:References:From:Date:In-Reply-To:From;
 b=irrvA3PPTFXOy1QLRQFYytSfwyVkn6rdND7uFKtETpu58veG4dTIOq2173GpnlAP0
 RBqqpBBPrS+NBhk5ownqYOTYa9mYDZrPsnkA5U5pOwtJOmeS097yrApCkQg8pmH1Ec
 ts9QIO0NZxySbtZPalh4u0eyiKZ3N8+kiIm2QtHI=
Subject: Re: Debian 10, xen 4.11 reliability
To: JP P <jpp@jppozzi.dyndns.org>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <0ffed2ed-d6a2-35f4-abe4-8ced95277d0a@prgmr.com>
 <67309480.494.1594332648237.JavaMail.zimbra@jppozzi.dyndns.org>
From: Sarah Newman <srn@prgmr.com>
Message-ID: <974ce272-49a6-3cd4-3aaf-5efc766d6910@prgmr.com>
Date: Thu, 9 Jul 2020 15:18:30 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <67309480.494.1594332648237.JavaMail.zimbra@jppozzi.dyndns.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Casper <kl@os.lv>, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Please post bottom or inline

On 7/9/20 3:10 PM, JP P wrote:
> 
> ----- Mail original -----
> De: "Sarah Newman" <srn@prgmr.com>
> À: "Casper" <kl@os.lv>, xen-users@lists.xenproject.org
> Envoyé: Jeudi 9 Juillet 2020 16:41:25
> Objet: Re: Debian 10, xen 4.11 reliability
> 
> On 7/9/20 1:45 AM, Casper wrote:
>> Hello,
>>
>> I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with Xen 4.1.4 on some servers still work very reliable with no problems, only
>> wanted to change new hard discs pushed me to install new Debian 10 with Xen packages to newer version.
>>
>> Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen 4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now it repeats in
>> old reliable servers too. My config is I have 2-3 hard discs per server node and RAID1 with sw md raid, it crashes with md lost access for disc. After
>> reboot all works as it should.
>>
>> I tested different HW and discs, all the same problems.
>> Loads are no big, just few testing DomU nodes.
>> Any suggestion? I`m currently running latest Debian kernel 4.19 was thinking to downgrade to test different kernel.
>> Or problem with Debian Xen package as it not so popular anymore?
>> Any suggestion what to test to figure out problem?
> 
> Kernel messages and all the kernel versions you've tried since Debian 7 please?
> 
> We're trying to track down some other issues with debian guests; maybe they are the same root cause.
> 
> --Sarah
> 

 > Hello,
 >
 > I have exactly the same problem with XEN 4.11 and Buster, Xen does not start (it even does not recognize the boot fidk !) and
 > never detects the RAID 1 disks.
 > I cannot boot with Xen, the same Kernel boots perfectly OK without XEN and all RAID disks are OK.
 > I don't find any clue on Internet and can no more use Xen (I used it since 2009 with no problems ...).
 >
 > Regards
 >
 > JP P

I don't think this is the same issue. It's much different to have a problem come up several days after boot versus not booting at all.

--Sarah


From xen-users-bounces@lists.xenproject.org Fri Jul 10 08:41:22 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 08:41:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtoZV-0000ld-Sq; Fri, 10 Jul 2020 08:39:53 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mL13=AV=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1jtoZU-0000lY-C8
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 08:39:52 +0000
X-Inumbo-ID: ebf006ae-c288-11ea-b7bb-bc764e2007e4
Received: from sonic315-15.consmr.mail.bf2.yahoo.com (unknown [74.6.134.125])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id ebf006ae-c288-11ea-b7bb-bc764e2007e4;
 Fri, 10 Jul 2020 08:39:51 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1594370391; bh=6BsF9RkSSikMjw/LHL8zdLBPTzFSRByQCYUwQh0D52w=;
 h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject;
 b=GQCsGVKriAoGdXUdRQ3ePXqp6KR3yGBzs9ZqCD/7c+Y79eYXAbKFbl7l57wyhBOtXmLrr4W4jN92QU2amsl5SvYGgTAqjqmPw3Y+NITVVfHO0vxXW1mBxbVsAXm/w04Bf7XwZl2Qo+chqdap6KIHBDKwnsIi/vL5vEqvws4kj5pRfUch8KxJ4ydGffANVLDNZgaXdYhrZfOg3P8atqMD+Ih9xkwr5W4JVfXcbotUzs1AIvi9ieTXseNN8DLGpBwBMZvuQihDcuRWIBwgrCQReubFY0ollTCIxVK/1dWKSRgfPq4SD5lXzMhzn2RdqbfHmnJOvvms3gT3u8XFmDe23Q==
X-YMail-OSG: Q3IFhmwVM1mcbYt6fKrAj.bbTJR8ewt5dsr.l_Rn0XZq34M5nPlORNc3AszG_XG
 suvNzfj5dPc9ZVe692cnBjiQmGOmQ2NnnktK66Hubmh_HKu5FXVKU_PWnCJbvgWfqaU1XCQLdJtF
 G2yoXGUYRErB17CNnOdpFSNhME6pgCwJOaKaNT.fqL2ppR1GjEsbMJ8.3ITToEZRNVCv6mDgnwNP
 htx7TEdsuD7DoUhCIOIm26HbTPCeWQtMLUw3eLJXeSrE.RbXbhmAHUS1DQsG7o40Kha9Uh107.RL
 xNtH4E0iOEo0hQhlWcvOsyJfDG5YymgypFOOpBKWO1GjW_9brOQdRqVkxgtd2LV.XC8xX3s7eQeN
 TvP3ZhcBYOegIe7E67XxyduO5ZIthsWZdja.7cY3QLKSs_BU5nLn_TNxvse7drkz.xrEypVGs09H
 1vs9yFZB1BriWUCwJVk0lbXjYmBOauozhxdQOOBpKpnBzS1Cab2f91_wwLqSHivr7M7aK_oDlzLE
 QHmL06z6skG.bkvyhmul7WcVsQ16bCmPPk3s7OicHr1AFUeDofCz4P.2FdU_un217a1DpxiTej7o
 X32xCCLjQq_uaEFjt3pVn_nDTlD6SZ9uhd2RYfXvppyOpWAb422S0SYSlsiUQQ3VnVdzeaQ5T9tm
 abmDAZp3bfxFB40cr6ZZ9J6.X1g9QZJDwwT1h7jp.K3VK2Fc9eQSP66GGKs_F9LOLdOQvYm1G2pE
 PzJr1CzampePtnORNuG.ibu2C7NvPDU8N6wtXkr1YOTD5cYOtF7Mx2.in5qSb1KDMFarLl69I93B
 a37IR8nbi7ra6KFjwcH6M2RW1eBhVMizafpMsgtcO8DIhPkrECEGv6UdzrT7dv13giTAzdvovvq2
 rKR7X5QmCZ8Zsyudsix9n3md1ST_sI7H1BkGU_p1LF.J4.d.Mc8QN2eCoR9VzsA5ZA8iLrdAw.VB
 O91qV2KeJMHK6SqrSOsl7gVr0CaymRyAfBMIDbmSyWDvWQH9TAOMuqyildogMb3T1bRQvU7yAzOI
 d8bi0sqVdOxTC0ToxRMZwNUFNnRkvTOVEVPc7FNV6TKjhePobd1wOPbv8m4nbzbrhQE5AJR5z5l0
 ylVJ4iuUaEmfdx4bWOh36Ps5v0L.J_rbQ_qzqeLVg5CKyaHlgwnRXxl23bnCFbQ_THZFHHbi6S1G
 Hr5p_SBOCOl8jR4d.NCdDyeA65HDCLEEP7E4ypWZ7x5tDKFMDn2VVzyZuMfRgcWr_dA5cz3dV8VY
 JE3W10oip8LtuzHeT0ihT8v3klPSSr.nOKmDdn5lxBIJ29BEvTh9gt9FrsQj_5N2GCHFHEKQ45x2
 69.k_JMH22meMhu3q_jYiEDqs0R1V4SdiSNP5lcLtRzCpzvJQ.AztvtLJJasayJUNmf4J3VRPPB9
 fiK9niJk.NboqrrcghLpViQQmEFhn5j5.BchoWtd8IJ3Xd99NtGM9eh_xkKRQZxtBfGUyr5A7cYB
 ocDH2foTutsnqKM.wO2r2zmPDF4ED1xX1r1RID4sVutk5.gAbZQoFh3bbBXcpfVJMHoDxzbNQLre
 S1cK0sqTK6jdOoEtETChYaFtwd18PJMfibqyxpP_abNMqmG.pI6BZBSjOKiVt9QU_qBHf
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic315.consmr.mail.bf2.yahoo.com with HTTP; Fri, 10 Jul 2020 08:39:51 +0000
Date: Fri, 10 Jul 2020 08:39:45 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>, 
 Xen-users <xen-users@lists.xenproject.org>, 
 "mirageos-devel@lists.xenproject.org" <mirageos-devel@lists.xenproject.org>
Message-ID: <919347890.2880516.1594370385847@mail.yahoo.com>
In-Reply-To: <784251130.2623344.1594314570469@mail.yahoo.com>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
Subject: Re: MirageOS and Unikernel.
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_2880515_64391137.1594370385846"
X-Mailer: WebService/1.1.16197 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 1127
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_2880515_64391137.1594370385846
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

The Unikernel system was a company that invented the Unikernel. When Docker bought it then it mean the Docker owned Unikernel technology.Docker is for Red Hat and Red Hat working on KVM, thus...

Sent from Yahoo Mail on Android
------=_Part_2880515_64391137.1594370385846
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

The Unikernel system was a company that invented the Unikernel. When Docker bought it then it mean the Docker owned Unikernel technology.<div id="yMail_cursorElementTracker_1594370207061">Docker is for Red Hat and Red Hat working on KVM, thus...<br id="yMail_cursorElementTracker_1594370103161"><br><div id="ymail_android_signature"><a id="ymail_android_signature_link" href="https://go.onelink.me/107872968?pid=InProduct&amp;c=Global_Internal_YGrowth_AndroidEmailSig__AndroidUsers&amp;af_wl=ym&amp;af_sub1=Internal&amp;af_sub2=Global_YGrowth&amp;af_sub3=EmailSignature">Sent from Yahoo Mail on Android</a></div></div>
------=_Part_2880515_64391137.1594370385846--


From xen-users-bounces@lists.xenproject.org Fri Jul 10 11:46:44 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 11:46:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtrTI-0008FL-1w; Fri, 10 Jul 2020 11:45:40 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mL13=AV=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1jtrTH-0008F4-JW
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 11:45:39 +0000
X-Inumbo-ID: dd3b9e06-c2a2-11ea-bb8b-bc764e2007e4
Received: from sonic309-13.consmr.mail.bf2.yahoo.com (unknown [74.6.129.123])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id dd3b9e06-c2a2-11ea-bb8b-bc764e2007e4;
 Fri, 10 Jul 2020 11:45:34 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1594381533; bh=HeqO/1r9FWw4VCNiFM39Uil5NwIHPwGGwjbSoSyUve0=;
 h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject;
 b=kQkOj6ci4mKiLDn5nN4DcDd48HMQihrLOW4Ahb3mPTlWzFjHwuOxDjS0PfkJy/y+9JOCU32OmI6AWbvWyuN0GOofZHyndIjJbYuug6jCeKyUw4mN/afrD/3iTWHjFWdH/RPXhN+I4n7gEDuoJWa5nWbJvSklldpnip1tkxdDHFA/8b1+WKKJXdgN5gxYgkXW7a5Jz/XQV5DW5lhkxG99wFBnbKkhex0JA0q8bhABJA1gEU8tr9JKpv18bzINUR8l+2RE5YHdQF8CEuWh329Bgka3rFcJOUDHk4tV6rUfM/6ogpYfaEwKRqucVyXfuvBvF3JaWwlUq7zrk2TH2xi/lg==
X-YMail-OSG: cNIalX8VM1nYqM2kVB3VB_pHTENNxF4szcq3C.0n2.ZR45GwU7knowfRXy2kEX6
 jd2nLViw9wPjWjJQNk4OWOk1wzycY6FlsGrLQf5q7icpxt39ZgTAffpbm2nMIxKYbeP3OfKTkMVj
 TecWx7HdohrfizFMStP9S3orFDJibVcWHtKUJ8k1Ky3OeXsnEtZbRya9KIeVbdiEctgw2TvnJUMR
 qIhCxWM7ezbO_U.gbeZxXiiTuP8IW8SMZPhYmbNC8Ee2KeZ7vDyWR157w0xRf4uZj6ip6FSqOEAx
 CtIdM_BEFNTMEz27wIvQi5mRbZ0pXQdQWEoQTZRrUk2LCkp6OVF..weG0KT1o7ficagvxwJnELkF
 sZY2SeR3MsgNV5qHWfHMsQeV7kLnhXOloZ_xsrVbqWuWp.Twd3PTSODbgAp7Se2Z_6Oh7a5Voa8u
 vTq2wYWRaxHeG8U8uG35H83ZY05N2PZLLTJA059guv.Glw3eWa.dof.n1A.sVDFsCq1DurHWwxp4
 Bjw3dbj7UVATupVsN9mFvgqtFWZXZ9UUw9UDx2KCpWJXxOJghSjjsC5k2.BhhPeD6rb_QrOF_W6S
 zS3kwMHLU1v_n6bhc3kpEWUNs96ZRg7TCUjvjhznZ_JWVqCDozf2.z2pYfPuKhRCcmgpvG.9U99X
 vs9XHB66ddUuhNZnMvMoMWmtnYtYLHKkGM0EMB.fvpcNE5YmJAdUe1m5iwg.FAk13Ro7mbCn7LQj
 k.44IQ83VyWWKSsK.rNCGEgR.eypCuYzujO1uZabvkiX_Zam8FJcwDKOUengmislV1YsVATKlvon
 JxI.QCZjkc1rC25Ex3x9UIXaHEXykILdIPc27S8a0aPSMk35WJFlzFNqUTiOtEyIkNqkY3c4_7lU
 MYn8w1F3nSG.XOpjl4ugjFPYZrmY0XYK6oPaLAf29JvUlnbsOUdBs_37d4mQUpSGTW.W3nGi9I4X
 qbm0CnSBql5u7syNbNTUfZYaoOqYrN5ZTgwin4ZZQq_8X4KPQz6LvGEeEzazEc4xyq9OMRHVYH06
 MRZWNCo4mHb.2kv8vganYOIRtqvCdVTbtoszU2tPLRkSwmGkxZv1owlj5ULTQMewa46n6niWSXZE
 FfPGSVQj9uJ35Fe7vr0vZ35vipYDtMOU8c9P0NnOeszx_sFXXeEATGM4arE8DUueVSMfatIdCIPJ
 2NlOytx_X5L9CRN01QahoPYMdI3blh0TmlOM_6uT_86aD2zhywBRviaT1qkhC56YO61dgJbgrkVP
 4wjvmHEOFRgHOEipzTdTpNZiQ82G8PtFmvtQJOPar530ukdhBJ2CB36HyWSJ8bbjYM3PrkpFFy2Q
 __PFgkJsW.Zo8hvTPILwLFGv5y72LPyuiR9ogq64dQZEhgkj2dYYtue8_18Z.Rdjm9TMC2yl2ZwZ
 2m0V1GQ--
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic309.consmr.mail.bf2.yahoo.com with HTTP; Fri, 10 Jul 2020 11:45:33 +0000
Date: Fri, 10 Jul 2020 11:45:29 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: "lists.nick.betteridge@gmail.com" <lists.nick.betteridge@gmail.com>, 
 Xen-users <xen-users@lists.xenproject.org>, 
 "mirageos-devel@lists.xenproject.org" <mirageos-devel@lists.xenproject.org>
Message-ID: <395257948.2903663.1594381529814@mail.yahoo.com>
In-Reply-To: <ecd7b5e1-9deb-34e4-2e73-de2840a35d46@gmail.com>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
 <919347890.2880516.1594370385847@mail.yahoo.com>
 <ecd7b5e1-9deb-34e4-2e73-de2840a35d46@gmail.com>
Subject: Re: MirageOS and Unikernel.
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_2903662_1100230023.1594381529812"
X-Mailer: WebService/1.1.16197 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 3249
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_2903662_1100230023.1594381529812
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

MirageOS is a project of Xen?Why for Unikernel the Ocaml programming language needed? Why not other programming languages?In "https://raw.githubusercontent.com/cetic/unikernels/master/MEDIA/vms-containers-unikernels.PNG" photo, the Unikernel for running each App using a separate Kernel? Or a Kernel run all Apps? In photo, two kernels == two Apps.


Sent from Yahoo Mail on Android 
 
  On Fri, Jul 10, 2020 at 1:18 PM, Nick Betteridge<lists.nick.betteridge@gmail.com> wrote:   > The Unikernel system was a company that invented the Unikernel. When 
> Docker bought it then it mean the Docker owned Unikernel technology.
> Docker is for Red Hat and Red Hat working on KVM, thus...

MirageOS is composed of many libraries, all of which have their own 
license - generally ISC - with copyright going to the authors.

Docker acquired a team of people, not rights to a suit of software.
  

------=_Part_2903662_1100230023.1594381529812
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

MirageOS is a project of Xen?<div id=3D"yMail_cursorElementTracker_15943813=
18291">Why for Unikernel the Ocaml programming language needed? Why not oth=
er programming languages?</div><div id=3D"yMail_cursorElementTracker_159438=
1406303">In "https://raw.githubusercontent.com/cetic/unikernels/master/MEDI=
A/vms-containers-unikernels.PNG" photo, the Unikernel for running each App =
using a separate Kernel? Or a Kernel run all Apps? In photo, two kernels =
=3D=3D two Apps.</div><div id=3D"yMail_cursorElementTracker_1594381505011">=
<br></div><div id=3D"yMail_cursorElementTracker_1594381505302"><br id=3D"yM=
ail_cursorElementTracker_1594381281654"><br><div id=3D"ymail_android_signat=
ure"><a id=3D"ymail_android_signature_link" href=3D"https://go.onelink.me/1=
07872968?pid=3DInProduct&amp;c=3DGlobal_Internal_YGrowth_AndroidEmailSig__A=
ndroidUsers&amp;af_wl=3Dym&amp;af_sub1=3DInternal&amp;af_sub2=3DGlobal_YGro=
wth&amp;af_sub3=3DEmailSignature">Sent from Yahoo Mail on Android</a></div>=
 <br> <blockquote style=3D"margin: 0 0 20px 0;"> <div style=3D"font-family:=
Roboto, sans-serif; color:#6D00F6;"> <div>On Fri, Jul 10, 2020 at 1:18 PM, =
Nick Betteridge</div><div>&lt;lists.nick.betteridge@gmail.com&gt; wrote:</d=
iv> </div> <div style=3D"padding: 10px 0 0 20px; margin: 10px 0 0 0; border=
-left: 1px solid #6D00F6;"> <div class=3D"yqt7558844753 yQTDBase" id=3D"yqt=
fd78217">&gt; The Unikernel system was a company that invented the Unikerne=
l. When <br clear=3D"none">&gt; Docker bought it then it mean the Docker ow=
ned Unikernel technology.<br clear=3D"none">&gt; Docker is for Red Hat and =
Red Hat working on KVM, thus...</div><br clear=3D"none"><br clear=3D"none">=
MirageOS is composed of many libraries, all of which have their own <br cle=
ar=3D"none">license - generally ISC - with copyright going to the authors.<=
br clear=3D"none"><br clear=3D"none">Docker acquired a team of people, not =
rights to a suit of software.<div class=3D"yqt7558844753 yQTDBase" id=3D"yq=
tfd80336"><br clear=3D"none"></div> </div> </blockquote></div>
------=_Part_2903662_1100230023.1594381529812--


From xen-users-bounces@lists.xenproject.org Fri Jul 10 15:02:40 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 15:02:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jtuWK-0000Mj-Bn; Fri, 10 Jul 2020 15:01:00 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mL13=AV=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1jtuWI-0000Me-T8
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 15:00:59 +0000
X-Inumbo-ID: 2969c80a-c2be-11ea-bb8b-bc764e2007e4
Received: from sonic303-2.consmr.mail.bf2.yahoo.com (unknown [74.6.131.41])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2969c80a-c2be-11ea-bb8b-bc764e2007e4;
 Fri, 10 Jul 2020 15:00:58 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1594393258; bh=rENbId8KwyAZPH4+te+DSAWNy+KHt7w55QhHFgWL+O4=;
 h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject;
 b=LOIodMI8KByQqhDldOLf1uVaC5/P8ZzTIOxv3nqCd4f124C1hHxaeBqEtgf1xZc7D0UQHvwW1bBRdotSUsqozf0EqVBgyE806FUnwN5EJmPvEZtdGBFjB64zB1FBRpDfG/hbbx6epdN6V+lnEn5eP9QJ8U4nph3XnaTnZc4AZ9pObETSBNCp7OmJyCHA5RqAxEXMmKLYgetPmjNIBKB05GbVHzyYTpr/Kc/1V2FB5lVwY7Wuxih67RjC8x9+zPEkMoRg7VKwQI8biinCfzV6IAABFi0LtWzZbritMLHRxQiVJQslRrQ0V7isyTBPaeVG90JnoELBzHqcnb4e2NIizA==
X-YMail-OSG: ZpjNx2QVM1l7LZ02UP_1YP6HYygWnm1u9D1uRlUWmb6yKImfja2phuCXlSgup0E
 adumiYjL7yrziT3qw47SePAhPmXElGaTxBCNqyU.4nhmWiiJ2qsQKJfh5wQa20cCyDk15i441nLz
 TdC4__JhPS3JQ0d3vgevSUJ4QENqN3qSqCYTABQYq.LFffGddlJ.oWpunLW6tSsZKoX5tRkLA4UX
 6HoL3sDWJneilXD6QMJDOXwAsMzy2F7aKLtoFdI.Y9GUxxWwD8LAbGVvo2bL_ZvbPR_Ph8GP5Lnl
 _RzlBdex2PZL6w6wMoe8olCl7UhXaMMOcVVwHe5ct1xvD2gvtEzjaMbMgPi6B9_EKp3VzkefgFZ8
 JLHXy7UdNmW8ryl8WN.PjwSq.MIOpmns5N9QhpaYaTlpD.A8Ty5hikAWBAR1A6tSqro0MSnQdDB.
 qeFxh7qg0GlxxpSKpxJVCCdrIJtL6qZ5Qsra5Vh0A678b0s6FFYcK8k3VoimdENBAK9XW.OiQb2t
 uVumPJijRrHkZ3owK.06_Zc42ULBXw6Hieny1nEvfdkDL83q_cZwFtxBr0PamtUUEt2kfNGkwJdM
 hQ8zTWgk3jd_eV8syhjUoZJc0dokTxuc3TnzN07rbJfS_FeQJAQ04NbA1TxXTzknthtfEbSHeX0c
 Y.70QrTFM.Zh8oCNK_VGkqJN.4xzyhBzlYOwp6CsZHqnB6Yj6caOB9pmctS0Gi38aF793zvsHfyz
 nUOnFSYPAGwzjuxWPMu25ZnajgY.uaOvZ0oqDulvmmCIruUFxWifbqkdabxbYVEN8N0iytOta5rj
 6x0AwE5OADFbFSYB1jUaPylSh7imxS.9LTyh9Bt2y5dI.sIcSf.8s7ygYNgsIbxNX_923WQ8kD8c
 _Jrfw56OQO0.hpj3kTqYgjVlfCVd7qcjDUkhs_wxLQcHVEzgaYvv_TUL.jS2jxp1XbkdC4kYrG.9
 VH8dcb5KhzfKLjAjx09Xqdn8c9PqySFBwF_CFm8wrgto244La9y4i8s2qEFvUnV_xdl5f0ip2m__
 sIdxJR2g8wjZDq7UwMFGGanS6rz4NFpdQ6lAPJyDs5pjXldTcIUAfHJXqNNMTBDp4ba2oWBBm4yO
 Yvx3eAmTh_U6r3pabVEQITNx9whvmZIXpH9mXOZfLKmRDld5RqK1H3tUU8NbBFExx7lGRnakaHUB
 UoobBXHF8q_sD38s9f3MaxdxKHItkMJ7x5rQVzqF1_jQnK9J2Rg4gmwbnSGCz2rpKNGk1RURK3Ub
 F4NQsgL6pziJ2wQU94iO47S18tst9k1n_UxjUoMkeyz2RzPYBiA6ZJVy.XhKeuM3tfVGwBkUxq3g
 Jqco0W_1UyRxyrkCI0urEJi2Pcv4W20vBxcr4vzc0rQRzv4lePJuTGLQyMySUCNgA8_U-
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic303.consmr.mail.bf2.yahoo.com with HTTP; Fri, 10 Jul 2020 15:00:57 +0000
Date: Fri, 10 Jul 2020 15:00:56 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>, 
 Xen-users <xen-users@lists.xenproject.org>, 
 "mirageos-devel@lists.xenproject.org" <mirageos-devel@lists.xenproject.org>
Message-ID: <1101730410.2975527.1594393256638@mail.yahoo.com>
In-Reply-To: <784251130.2623344.1594314570469@mail.yahoo.com>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
Subject: Re: MirageOS and Unikernel.
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_2975526_1045331719.1594393256637"
X-Mailer: WebService/1.1.16197 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 2086
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_2975526_1045331719.1594393256637
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Thank you Richard.Kernel == The libraries that an App need to run.Am I right?In the Unikernel, no operating system exist and the Xen play the role of OS. Is it true?The Xen hypervisor can do anything that an OS kernel do???The source of photo is: https://github.com/cetic/unikernels
Can you show me a clear and better diagram about Unikernel?

Sent from Yahoo Mail on Android
------=_Part_2975526_1045331719.1594393256637
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Thank you Richard.<div id=3D"yMail_cursorElementTracker_1594392722114">Kern=
el =3D=3D The libraries that an App need to run.</div><div id=3D"yMail_curs=
orElementTracker_1594392767062">Am I right?</div><div id=3D"yMail_cursorEle=
mentTracker_1594392774893">In the Unikernel, no operating system exist and =
the Xen play the role of OS. Is it true?</div><div id=3D"yMail_cursorElemen=
tTracker_1594393150554">The Xen hypervisor can do anything that an OS kerne=
l do???</div><div id=3D"yMail_cursorElementTracker_1594392881923">The sourc=
e of photo is: <a id=3D"linkextractor__1594393120409" data-yahoo-extracted-=
link=3D"true" href=3D"https://github.com/cetic/unikernels" class=3D"lEnhanc=
r_1594393122079">https://github.com/cetic/unikernels</a></div><div id=3D"yM=
ail_cursorElementTracker_1594393120436"><br></div><div id=3D"yMail_cursorEl=
ementTracker_1594393120696">Can you show me a clear and better diagram abou=
t Unikernel?</div><div id=3D"yMail_cursorElementTracker_1594392882330"><br>=
</div><div id=3D"yMail_cursorElementTracker_1594392867706"><br><div id=3D"y=
mail_android_signature"><a id=3D"ymail_android_signature_link" href=3D"http=
s://go.onelink.me/107872968?pid=3DInProduct&amp;c=3DGlobal_Internal_YGrowth=
_AndroidEmailSig__AndroidUsers&amp;af_wl=3Dym&amp;af_sub1=3DInternal&amp;af=
_sub2=3DGlobal_YGrowth&amp;af_sub3=3DEmailSignature">Sent from Yahoo Mail o=
n Android</a></div></div>
------=_Part_2975526_1045331719.1594393256637--


From xen-users-bounces@lists.xenproject.org Fri Jul 10 18:45:57 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 18:45:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jty14-0002Th-Uw; Fri, 10 Jul 2020 18:44:58 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IDeX=AV=gmail.com=lists.nick.betteridge@srs-us1.protection.inumbo.net>)
 id 1jtoiF-0001jU-Qg
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 08:48:55 +0000
X-Inumbo-ID: 2c960d38-c28a-11ea-bca7-bc764e2007e4
Received: from mail-wm1-x32e.google.com (unknown [2a00:1450:4864:20::32e])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2c960d38-c28a-11ea-bca7-bc764e2007e4;
 Fri, 10 Jul 2020 08:48:50 +0000 (UTC)
Received: by mail-wm1-x32e.google.com with SMTP id l17so5224331wmj.0;
 Fri, 10 Jul 2020 01:48:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=subject:to:references:from:message-id:date:user-agent:mime-version
 :in-reply-to:content-language:content-transfer-encoding;
 bh=bYbiWn4wHOniccBw0+DaOlDRQfD/Y/Y9hlSkafIztBk=;
 b=Vo3UT+Dwl8k4cdscMNgla2WT+xx+aHeMIYK7f8ondkhIAe2EZUZU9Hdg1BHcbuaKDZ
 AnmNBAPElUXCvHC2GlHwJ+Li5/xioA+7k+rrk5Dh0odiXPwfrvsAl21iJqxUiAuT4y+C
 Co1B8bdx2FGZ1TGs2gXghN2XK+ag82U9aPKYi2bdPTOYD2tw77kb+AphO2EpPfI0Lp4r
 Y6sQhpYXtz9/9K8D0yJ0rAQg7cYumoD47U7krYiesPNb4JL6Xci5aomCBuQrF0WWvWqj
 4+itxZviggeFFizLdiW/Xn2c2YtLMHGoDw8BIKGFvVdJN4ID+tnUpQpd2CfTfUKivP5Y
 DPgg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:subject:to:references:from:message-id:date
 :user-agent:mime-version:in-reply-to:content-language
 :content-transfer-encoding;
 bh=bYbiWn4wHOniccBw0+DaOlDRQfD/Y/Y9hlSkafIztBk=;
 b=IDTxbZoUaw3eg8gA0Atj+mupMWfOtZD8TY84rC222RNtaThyVF0rW3A2OYztYd5yL5
 ZsL5Dlap1XKn94TmUGo1i0aCTKNsn8PPM5uofdOBNfG+V7yj1NGSpnOqhcyD/NsGyOn9
 jawCzFvjFsD14JUAHX+OL122YBjzFTXmOi3vrjzGSF/i79MMoD5XtrblgGULKQbMt4oP
 q8ojo/ygc2SNJrhi8dWjQjIQ3Q+xdRSzu1S7YSXZ6D3ut+5UoqapYVkR92vWPoE7okZS
 6Esy0z86FR2/UUJqgb1b9GGfYjnEGkGtiMlhb5N+ekML7CR7jn2W0+vGc0g4PVdTJqvA
 IxBg==
X-Gm-Message-State: AOAM530LYPKZosc3Cy+gE++h6nc/NoiKRnYsUu9+Flx/YpvrGiS/EG4L
 Xjm+n3hFu4Uds2Jm62ZHvz2e82p+JTs=
X-Google-Smtp-Source: ABdhPJxQPgOtBnCePzS8X1eJS0h7WrXR5LgezrGeGJmlASrQctVnVrUvW0ktkjZVfcdMGtKaRnlz+A==
X-Received: by 2002:a7b:c194:: with SMTP id y20mr4333284wmi.83.1594370929213; 
 Fri, 10 Jul 2020 01:48:49 -0700 (PDT)
Received: from [10.0.0.171] (static-90-255-235-69.vodafonexdsl.co.uk.
 [90.255.235.69])
 by smtp.gmail.com with ESMTPSA id k18sm9181751wrx.34.2020.07.10.01.48.48
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Fri, 10 Jul 2020 01:48:48 -0700 (PDT)
Subject: Re: MirageOS and Unikernel.
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>,
 Xen-users <xen-users@lists.xenproject.org>,
 "mirageos-devel@lists.xenproject.org" <mirageos-devel@lists.xenproject.org>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
 <919347890.2880516.1594370385847@mail.yahoo.com>
From: Nick Betteridge <lists.nick.betteridge@gmail.com>
Message-ID: <ecd7b5e1-9deb-34e4-2e73-de2840a35d46@gmail.com>
Date: Fri, 10 Jul 2020 09:48:47 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <919347890.2880516.1594370385847@mail.yahoo.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Mailman-Approved-At: Fri, 10 Jul 2020 18:44:57 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

> The Unikernel system was a company that invented the Unikernel. When 
> Docker bought it then it mean the Docker owned Unikernel technology.
> Docker is for Red Hat and Red Hat working on KVM, thus...

MirageOS is composed of many libraries, all of which have their own 
license - generally ISC - with copyright going to the authors.

Docker acquired a team of people, not rights to a suit of software.


From xen-users-bounces@lists.xenproject.org Fri Jul 10 18:45:57 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 18:45:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jty1I-0002U4-BJ; Fri, 10 Jul 2020 18:45:12 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sqCR=AR=protonmail.com=peter.jac@srs-us1.protection.inumbo.net>)
 id 1jsMQX-0001je-3A
 for xen-users@lists.xenproject.org; Mon, 06 Jul 2020 08:24:37 +0000
X-Inumbo-ID: 1e08ff08-bf62-11ea-b7bb-bc764e2007e4
Received: from mail-40141.protonmail.ch (unknown [185.70.40.141])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1e08ff08-bf62-11ea-b7bb-bc764e2007e4;
 Mon, 06 Jul 2020 08:24:32 +0000 (UTC)
Date: Mon, 06 Jul 2020 08:24:27 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1594023871;
 bh=2UZSt6Qv9RILED2NLjQcuijmNwSLxn80flm73vpA2CQ=;
 h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References:From;
 b=hAPNm5vzkWSqgCcVLTs/H7aKdKestl8Wecy2qyZjx36bZxgJrwWqFZxd26H5emtEJ
 x7pp4dIM8xKNqa+JxQr1rQ9g8uRDnK/7S5w1noA+aCOuKvRTpS+FAdjo/OcdAsFDaI
 3KRoR4yzkucya78EyDCkspwBtg+d2LFlwPbh1G44=
To: Bertrand.Marquis@arm.com
From: peter.jac@protonmail.com
Subject: Re: Xen and Automotive.
Message-ID: <UTPl4-i82hxZwPbZW1-vzdXtMS9FKEEai5FAuvsO-L-kFwKdADKT_APan1bqiIn3priEZE9re8NEtRqInH0hCkSV4NE6bQJB7xW3whXaRuo=@protonmail.com>
In-Reply-To: <AE3555C6-BC54-4194-9954-F7D758330073@arm.com>
References: <W13oRYopo6JXUwmrUqpTip708bNMCOUdjUMvPTFdcPoXDELbqFbnp5P74J3c6qhlbMtu8qZqPj_Cpr0O9EpX5Ux2lLmc8hoaQ6zuTU_-fC4=@protonmail.com>
 <AE3555C6-BC54-4194-9954-F7D758330073@arm.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_z3nUKWXzebuVu0kDliGHUSbAtwgLdAe2HUepMTK15BQ"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Fri, 10 Jul 2020 18:45:10 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: peter.jac@protonmail.com
Cc: nd@arm.com, xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_z3nUKWXzebuVu0kDliGHUSbAtwgLdAe2HUepMTK15BQ
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64

VGhhbmsgeW91IEJlcnRyYW5kLgpDYW4geW91IHRlbGwgbWUgc29tZSBjYXIgY29tcHV0ZXIgbW9k
ZWxzPwpDYW4gYSBjYXIgdXNlIG11bHRpIE9TPyBJZiB5ZXMsIHRoZW4gd2h5PwpJJ20gYSBiZWdp
bm5lciBhbmQgaW1hZ2luZSBpdCBhIGxpdHRsZSBoYXJkIGZvciBtZS4KSW4gdGhpcyBraW5kIG9m
IGNhcnMsIGFsbCBjb21wb25lbnRzIG1hbmFnaW5nIGJ5IE9TPyBDaGFuZ2UgZ2VhcnMgYWxzbz8K
SSBndWVzcyBRTlggb24gTWF6ZXJhdGkgY2FycyBpcyBhbiBleGFtcGxlISEhCgotLS0tLS0tLSBP
cmlnaW5hbCBNZXNzYWdlIC0tLS0tLS0tCk9uIEp1bCA2LCAyMDIwLCAxMjoxNCBQTSwgQmVydHJh
bmQgTWFycXVpcyB3cm90ZToKCj4gSGkgUGV0ZXIsCj4KPj4gT24gNSBKdWwgMjAyMCwgYXQgMjI6
NDAsIFBldGVyIDxwZXRlci5qYWNAcHJvdG9ubWFpbC5jb20+IHdyb3RlOgo+Pgo+PiBIZWxsbywK
Pj4gSSdtIGEgc3R1ZGVudCBhbmQgbmV3IHRvIFhlbgo+PiBJIHdhbnQgdG8ga25vdyBYZW4gYW5k
IGF1dG9tb3RpdmUgbWVhbiB0aGF0IHRoZSBYZW4gaHlwZXJ2aXNvciBydW5uaW5nIG9uIGEgY2Fy
PyBGb3IgZXhhbXBsZSwgQk1XIGNhci4KPgo+IFRoZXJlIGlzIG5vIGRlZmluZWQgYnJhbmQgYnV0
IHRoZSBpZGVhIGlzIHRvIGhhdmUgWGVuIHJ1bm5pbmcgb24gb25lIG9yIHNldmVyYWwgY29tcHV0
ZXJzIGluc2lkZSBhIGNvbW1lcmNpYWwgY2FyIHllcy4KPgo+PiBJZiB5ZXMsIHRoZW4gd2h5PyBX
aGVuIGNhcnMgdXNpbmcgQW5kcm9pZCB0aGVuIHRoaXMgQW5kcm9pZCB2aXJ0dWFsaXplZCBieSBY
ZW4/IEFtIEkgcmlnaHQ/Cj4KPiBBbmRyb2lkIHJ1bm5pbmcgb24gdG9wIG9mIFhlbiBpcyBvbmUg
dXNlIGNhc2UgYnV0IHRoZXJlIGFyZSBsb3QgbW9yZSBjb21wdXRlcnMgaW4gYSBjYXIgb24gd2hp
Y2ggdmlydHVhbGl6YXRpb24gY291bGQgcGxheSBhIHJvbGUuCj4gRm9yIGV4YW1wbGUgdGhlIGRh
c2hib2FyZCwgYXV0b25vbW91cyBkcml2aW5nLCBlbmdpbmUgY29udHJvbCwgbmV0d29yayBjb25u
ZWN0aW9ucywgZXRj4oCmLgo+IFVzaW5nIFhlbiB3b3VsZCBhbGxvdyB0byBydW4gc2V2ZXJhbCBz
eXN0ZW1zIG9uIHRoZSBzYW1lIGNvcmUgYnV0IGlzb2xhdGVkIG9uZSBmcm9tIGFuIG90aGVyIGZv
ciBzYWZldHkgcmVhc29ucyBidXQgYWxzbyB0byBoYXZlIGRpZmZlcmVudCB0eXBlcyBvZiBPUyBv
biB0aGUgc2FtZSBwcm9jZXNzb3IgKGxpa2UgYXV0b3NhciBhbmQgQW5kcm9pZCBmb3IgZXhhbXBs
ZSkuCj4KPiBSZWdhcmRzCj4gQmVydHJhbmQKPgo+Pgo+PiBQbGVhc2UgYW5zd2VyIG1lLgo+Pgo+
PiBUbngu

--b1_z3nUKWXzebuVu0kDliGHUSbAtwgLdAe2HUepMTK15BQ
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64

VGhhbmsgeW91IEJlcnRyYW5kLjxicj5DYW4geW91IHRlbGwgbWUgc29tZSBjYXIgY29tcHV0ZXIg
bW9kZWxzPzxicj5DYW4gYSBjYXIgdXNlIG11bHRpIE9TPyBJZiB5ZXMsIHRoZW4gd2h5Pzxicj5J
J20gYSBiZWdpbm5lciBhbmQgaW1hZ2luZSBpdCBhIGxpdHRsZSBoYXJkIGZvciBtZS48YnI+SW4g
dGhpcyBraW5kIG9mIGNhcnMsIGFsbCBjb21wb25lbnRzIG1hbmFnaW5nIGJ5IE9TPyBDaGFuZ2Ug
Z2VhcnMgYWxzbz88YnI+SSBndWVzcyBRTlggb24gTWF6ZXJhdGkgY2FycyBpcyBhbiBleGFtcGxl
ISEhPGJyPjxicj48YnI+PGJyPi0tLS0tLS0tIE9yaWdpbmFsIE1lc3NhZ2UgLS0tLS0tLS08YnI+
T24gSnVsIDYsIDIwMjAsIDEyOjE0IFBNLCBCZXJ0cmFuZCBNYXJxdWlzIDwgQmVydHJhbmQuTWFy
cXVpc0Bhcm0uY29tPiB3cm90ZTo8YmxvY2txdW90ZSBjbGFzcz0icHJvdG9ubWFpbF9xdW90ZSI+
PGJyPjxwIGRpcj0ibHRyIj5IaSBQZXRlciw8L3A+DQo8cCBkaXI9Imx0ciI+Jmd0OyBPbiA1IEp1
bCAyMDIwLCBhdCAyMjo0MCwgUGV0ZXIgJmx0O3BldGVyLmphY0Bwcm90b25tYWlsLmNvbSZndDsg
d3JvdGU6PGJyPg0KJmd0Ozxicj4NCiZndDsgSGVsbG8sPGJyPg0KJmd0OyBJJ20gYSBzdHVkZW50
IGFuZCBuZXcgdG8gWGVuPGJyPg0KJmd0OyBJIHdhbnQgdG8ga25vdyBYZW4gYW5kIGF1dG9tb3Rp
dmUgbWVhbiB0aGF0IHRoZSBYZW4gaHlwZXJ2aXNvciBydW5uaW5nIG9uIGEgY2FyPyBGb3IgZXhh
bXBsZSwgQk1XIGNhci48L3A+DQo8cCBkaXI9Imx0ciI+VGhlcmUgaXMgbm8gZGVmaW5lZCBicmFu
ZCBidXQgdGhlIGlkZWEgaXMgdG8gaGF2ZSBYZW4gcnVubmluZyBvbiBvbmUgb3Igc2V2ZXJhbCBj
b21wdXRlcnMgaW5zaWRlIGEgY29tbWVyY2lhbCBjYXIgeWVzLjwvcD4NCjxwIGRpcj0ibHRyIj4m
Z3Q7IElmIHllcywgdGhlbiB3aHk/IFdoZW4gY2FycyB1c2luZyBBbmRyb2lkIHRoZW4gdGhpcyBB
bmRyb2lkIHZpcnR1YWxpemVkIGJ5IFhlbj8gQW0gSSByaWdodD88L3A+DQo8cCBkaXI9Imx0ciI+
QW5kcm9pZCBydW5uaW5nIG9uIHRvcCBvZiBYZW4gaXMgb25lIHVzZSBjYXNlIGJ1dCB0aGVyZSBh
cmUgbG90IG1vcmUgY29tcHV0ZXJzIGluIGEgY2FyIG9uIHdoaWNoIHZpcnR1YWxpemF0aW9uIGNv
dWxkIHBsYXkgYSByb2xlLjxicj4NCkZvciBleGFtcGxlIHRoZSBkYXNoYm9hcmQsIGF1dG9ub21v
dXMgZHJpdmluZywgZW5naW5lIGNvbnRyb2wsIG5ldHdvcmsgY29ubmVjdGlvbnMsIGV0YyYjODIz
MDsuPGJyPg0KVXNpbmcgWGVuIHdvdWxkIGFsbG93IHRvIHJ1biBzZXZlcmFsIHN5c3RlbXMgb24g
dGhlIHNhbWUgY29yZSBidXQgaXNvbGF0ZWQgb25lIGZyb20gYW4gb3RoZXIgZm9yIHNhZmV0eSBy
ZWFzb25zIGJ1dCBhbHNvIHRvIGhhdmUgZGlmZmVyZW50IHR5cGVzIG9mIE9TIG9uIHRoZSBzYW1l
IHByb2Nlc3NvciAobGlrZSBhdXRvc2FyIGFuZCBBbmRyb2lkIGZvciBleGFtcGxlKS48L3A+DQo8
cCBkaXI9Imx0ciI+UmVnYXJkczxicj4NCkJlcnRyYW5kPC9wPg0KPHAgZGlyPSJsdHIiPiZndDs8
YnI+DQomZ3Q7IFBsZWFzZSBhbnN3ZXIgbWUuPGJyPg0KJmd0Ozxicj4NCiZndDsgVG54LjwvcD4N
CjwvZGl2Pg==


--b1_z3nUKWXzebuVu0kDliGHUSbAtwgLdAe2HUepMTK15BQ--



From xen-users-bounces@lists.xenproject.org Fri Jul 10 18:45:57 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 18:45:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jty1I-0002UH-OT; Fri, 10 Jul 2020 18:45:12 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R+uf=AV=hermes.cam.ac.uk=rmm1002@srs-us1.protection.inumbo.net>)
 id 1jttIb-00028v-VN
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 13:42:45 +0000
X-Inumbo-ID: 37504422-c2b3-11ea-8fbd-12813bfff9fa
Received: from ppsw-32.csi.cam.ac.uk (unknown [131.111.8.132])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 37504422-c2b3-11ea-8fbd-12813bfff9fa;
 Fri, 10 Jul 2020 13:42:37 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=cam.ac.uk; 
 s=20180806.ppsw;
 h=Sender:References:To:Cc:In-Reply-To:Date:Subject:
 Mime-Version:Content-Type:Message-Id:From:Reply-To:Content-Transfer-Encoding:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=Px5pyAQYw9W8FVeRYbk8VtlefCifnkjjTjeqbwAdS6w=; b=RMZx3hi5iMIDntIFB1gHw88ruv
 6R3qZUvc1ABdMMRWqRqY16NH9KXm38+tCDCtvH8DfqkUmc/GHkvScBFI9ue0r2HGIcOO0lOi+9wuZ
 fa+A4fbh8BfPJRUGyvr2T67pMzK4rWD23kbxxgx2NkGDs4OcbPk731o+CVAd5snm68vY=;
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: http://help.uis.cam.ac.uk/email-scanner-virus
Received: from [90.254.230.213] (port=61970 helo=greyjay.lan)
 by ppsw-32.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.156]:587)
 with esmtpsa (PLAIN:rmm1002) (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1jttIS-000dyr-2l (Exim 4.92.3)
 (return-path <rmm1002@hermes.cam.ac.uk>); Fri, 10 Jul 2020 14:42:36 +0100
From: Richard Mortier <richard.mortier@cl.cam.ac.uk>
Message-Id: <C10078D5-3841-4A9F-B72A-6F7F09038F11@cl.cam.ac.uk>
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_65459BA4-A241-4612-8F41-9367DCE51E53"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Subject: Re: MirageOS and Unikernel.
Date: Fri, 10 Jul 2020 14:42:36 +0100
In-Reply-To: <395257948.2903663.1594381529814@mail.yahoo.com>
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
 <919347890.2880516.1594370385847@mail.yahoo.com>
 <ecd7b5e1-9deb-34e4-2e73-de2840a35d46@gmail.com>
 <395257948.2903663.1594381529814@mail.yahoo.com>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
X-Mailman-Approved-At: Fri, 10 Jul 2020 18:45:10 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "mirageos-devel@lists.xenproject.org"
 <mirageos-devel@lists.xenproject.org>,
 Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--Apple-Mail=_65459BA4-A241-4612-8F41-9367DCE51E53
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

My turn! Hi!

> On 10 Jul 2020, at 12:45, Jason Long <hack3rcon@yahoo.com> wrote:
>=20
> MirageOS is a project of Xen?

Not sure what you mean by that=E2=80=A6?
The Xen Project is a Linux Foundation Collaborative Project (or so its =
webpage says).
The Xen Project hosts Mirage OS as one of its unikernel projects.
Xen was one of the original targets for Mirage OS, though there are now =
quite a few others.

> Why for Unikernel the Ocaml programming language needed?

OCaml is not needed for a unikernel. It happens to be the language that =
Mirage OS used.=20
(And a mighty fine language it is too, or so I am told=E2=80=A6 ;)

> Why not other programming languages?

Why not indeed =E2=80=94 there are many other unikernel projects that =
use other programming languages. Even C these days I hear. =
http://unikernel.org/projects/ <http://unikernel.org/projects/> has a =
(likely incomplete) list.

> In =
"https://raw.githubusercontent.com/cetic/unikernels/master/MEDIA/vms-conta=
iners-unikernels.PNG" photo, the Unikernel for running each App using a =
separate Kernel? Or a Kernel run all Apps? In photo, two kernels =3D=3D =
two Apps.

I=E2=80=99m not sure where exactly is the source of that figure =E2=80=94 =
but my gloss on it would be that the "unikernel apps=E2=80=9D (labelled =
=E2=80=9CVM=E2=80=9D) each contain both the code you=E2=80=99d usually =
think of as being the app, plus the functionality for which an app would =
usually rely on a shared kernel as statically linked libraries. As a =
result labelling both identically as =E2=80=9CKernel=E2=80=9D might be =
slightly misleading as the code represented could be different in each =
case (eg., the lefthand app might have a network stack but no =
filesystem, the righthand app might need a filesystem but no network).


>=20
>=20
>=20
> Sent from Yahoo Mail on Android =
<https://go.onelink.me/107872968?pid=3DInProduct&c=3DGlobal_Internal_YGrow=
th_AndroidEmailSig__AndroidUsers&af_wl=3Dym&af_sub1=3DInternal&af_sub2=3DG=
lobal_YGrowth&af_sub3=3DEmailSignature>
> On Fri, Jul 10, 2020 at 1:18 PM, Nick Betteridge
> <lists.nick.betteridge@gmail.com> wrote:
> > The Unikernel system was a company that invented the Unikernel. When=20=

> > Docker bought it then it mean the Docker owned Unikernel technology.
> > Docker is for Red Hat and Red Hat working on KVM, thus...
>=20
>=20
> MirageOS is composed of many libraries, all of which have their own=20
> license - generally ISC - with copyright going to the authors.
>=20
> Docker acquired a team of people, not rights to a suit of software.
>=20

=E2=80=94 =20
Richard Mortier
richard.mortier@cl.cam.ac.uk





--Apple-Mail=_65459BA4-A241-4612-8F41-9367DCE51E53
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">My =
turn! Hi!<br class=3D""><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On 10 Jul 2020, at 12:45, Jason Long &lt;<a =
href=3D"mailto:hack3rcon@yahoo.com" class=3D"">hack3rcon@yahoo.com</a>&gt;=
 wrote:</div><br class=3D"Apple-interchange-newline"><div =
class=3D"">MirageOS is a project of Xen?</div></blockquote><div><br =
class=3D""></div><div>Not sure what you mean by that=E2=80=A6?</div><div>T=
he Xen Project is a Linux Foundation Collaborative Project (or so its =
webpage says).</div><div>The Xen Project hosts Mirage OS as one of its =
unikernel projects.</div><div>Xen was one of the original targets for =
Mirage OS, though there are now quite a few others.</div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
id=3D"yMail_cursorElementTracker_1594381318291" class=3D"">Why for =
Unikernel the Ocaml programming language needed? =
</div></div></blockquote><div><br class=3D""></div><div>OCaml is not =
needed for a unikernel. It happens to be the language that Mirage OS =
used.&nbsp;</div><div>(And a mighty fine language it is too, or so I am =
told=E2=80=A6 ;)</div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div =
id=3D"yMail_cursorElementTracker_1594381318291" class=3D"">Why not other =
programming languages?</div></div></blockquote><div><br =
class=3D""></div><div>Why not indeed =E2=80=94 there are many other =
unikernel projects that use other programming languages. Even C these =
days I hear.&nbsp;<a href=3D"http://unikernel.org/projects/" =
class=3D"">http://unikernel.org/projects/</a>&nbsp;has a (likely =
incomplete) list.</div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div =
id=3D"yMail_cursorElementTracker_1594381406303" class=3D"">In "<a =
href=3D"https://raw.githubusercontent.com/cetic/unikernels/master/MEDIA/vm=
s-containers-unikernels.PNG" =
class=3D"">https://raw.githubusercontent.com/cetic/unikernels/master/MEDIA=
/vms-containers-unikernels.PNG</a>" photo, the Unikernel for running =
each App using a separate Kernel? Or a Kernel run all Apps? In photo, =
two kernels =3D=3D two Apps.</div></div></blockquote><div><br =
class=3D""></div>I=E2=80=99m not sure where exactly is the source of =
that figure =E2=80=94 but my gloss on it would be that the "unikernel =
apps=E2=80=9D (labelled =E2=80=9CVM=E2=80=9D) each contain both the code =
you=E2=80=99d usually think of as being the app, plus the functionality =
for which an app would usually rely on a shared kernel as statically =
linked libraries. As a result labelling both identically as =E2=80=9CKerne=
l=E2=80=9D might be slightly misleading as the code represented could be =
different in each case (eg., the lefthand app might have a network stack =
but no filesystem, the righthand app might need a filesystem but no =
network).</div><div><br class=3D""></div><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div =
id=3D"yMail_cursorElementTracker_1594381505011" class=3D""><br =
class=3D""></div><div id=3D"yMail_cursorElementTracker_1594381505302" =
class=3D""><br id=3D"yMail_cursorElementTracker_1594381281654" =
class=3D""><br class=3D""><div id=3D"ymail_android_signature" =
class=3D""><a id=3D"ymail_android_signature_link" =
href=3D"https://go.onelink.me/107872968?pid=3DInProduct&amp;c=3DGlobal_Int=
ernal_YGrowth_AndroidEmailSig__AndroidUsers&amp;af_wl=3Dym&amp;af_sub1=3DI=
nternal&amp;af_sub2=3DGlobal_YGrowth&amp;af_sub3=3DEmailSignature" =
class=3D"">Sent from Yahoo Mail on Android</a></div> <br class=3D""> =
<blockquote style=3D"margin: 0 0 20px 0;" class=3D""> <div =
style=3D"font-family:Roboto, sans-serif; color:#6D00F6;" class=3D""> =
<div class=3D"">On Fri, Jul 10, 2020 at 1:18 PM, Nick =
Betteridge</div><div class=3D"">&lt;<a =
href=3D"mailto:lists.nick.betteridge@gmail.com" =
class=3D"">lists.nick.betteridge@gmail.com</a>&gt; wrote:</div> </div> =
<div style=3D"padding: 10px 0 0 20px; margin: 10px 0 0 0; border-left: =
1px solid #6D00F6;" class=3D""> <div class=3D"yqt7558844753 yQTDBase" =
id=3D"yqtfd78217">&gt; The Unikernel system was a company that invented =
the Unikernel. When <br clear=3D"none" class=3D"">&gt; Docker bought it =
then it mean the Docker owned Unikernel technology.<br clear=3D"none" =
class=3D"">&gt; Docker is for Red Hat and Red Hat working on KVM, =
thus...</div><br clear=3D"none" class=3D""><br clear=3D"none" =
class=3D"">MirageOS is composed of many libraries, all of which have =
their own <br clear=3D"none" class=3D"">license - generally ISC - with =
copyright going to the authors.<br clear=3D"none" class=3D""><br =
clear=3D"none" class=3D"">Docker acquired a team of people, not rights =
to a suit of software.<div class=3D"yqt7558844753 yQTDBase" =
id=3D"yqtfd80336"><br clear=3D"none" class=3D""></div> </div> =
</blockquote></div></div></blockquote></div><br class=3D""><div =
class=3D"">
<div dir=3D"auto" style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, =
0); letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; word-wrap: =
break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D""><div>=E2=80=94 &nbsp;</div><div>Richard Mortier</div><div><a =
href=3D"mailto:richard.mortier@cl.cam.ac.uk" =
class=3D"">richard.mortier@cl.cam.ac.uk</a></div><div class=3D""><br =
class=3D""></div></div><br class=3D"Apple-interchange-newline"><br =
class=3D"Apple-interchange-newline">
</div>
<br class=3D""></body></html>=

--Apple-Mail=_65459BA4-A241-4612-8F41-9367DCE51E53--


From xen-users-bounces@lists.xenproject.org Fri Jul 10 18:45:58 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 18:45:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jty1J-0002UT-5q; Fri, 10 Jul 2020 18:45:13 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R+uf=AV=hermes.cam.ac.uk=rmm1002@srs-us1.protection.inumbo.net>)
 id 1jtvXh-0006CS-Is
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 16:06:30 +0000
X-Inumbo-ID: 4ed7ec58-c2c7-11ea-8fe7-12813bfff9fa
Received: from ppsw-32.csi.cam.ac.uk (unknown [131.111.8.132])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 4ed7ec58-c2c7-11ea-8fe7-12813bfff9fa;
 Fri, 10 Jul 2020 16:06:27 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=cam.ac.uk; 
 s=20180806.ppsw;
 h=Sender:References:To:Cc:In-Reply-To:Date:Subject:
 Mime-Version:Content-Type:Message-Id:From:Reply-To:Content-Transfer-Encoding:
 Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
 Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=3EiqvKfuoAckCmvyOA7+6WqIulH+eEx93ZPc4awXuWA=; b=qn1yAJDjQnNA+K3121dx6cTFqr
 9ifZuwnXCqOrW/DgArkDrXaSh79KD0NFsJHXMR5nrRF0RQhiW5bFEdqHJkFCVMk6Uw1wpdhGGxtbk
 tofgDyOsqrBKqU0AQuanwwZ1bTbCF67bTZyOzM2rrwuGr+GS9yy6KpcsuhiapOy9Oqgw=;
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: http://help.uis.cam.ac.uk/email-scanner-virus
Received: from [90.254.230.213] (port=51262 helo=greyjay.lan)
 by ppsw-32.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.156]:587)
 with esmtpsa (PLAIN:rmm1002) (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1jtvXe-000jHC-0k (Exim 4.92.3)
 (return-path <rmm1002@hermes.cam.ac.uk>); Fri, 10 Jul 2020 17:06:26 +0100
From: Richard Mortier <richard.mortier@cl.cam.ac.uk>
Message-Id: <3AEF23C4-FA43-4029-9649-136F702D9D37@cl.cam.ac.uk>
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_7B17DB30-B879-4E94-AD65-A080FBE35D7D"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Subject: Re: MirageOS and Unikernel.
Date: Fri, 10 Jul 2020 17:06:25 +0100
In-Reply-To: <1101730410.2975527.1594393256638@mail.yahoo.com>
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
 <1101730410.2975527.1594393256638@mail.yahoo.com>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
X-Mailman-Approved-At: Fri, 10 Jul 2020 18:45:10 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "mirageos-devel@lists.xenproject.org"
 <mirageos-devel@lists.xenproject.org>,
 Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--Apple-Mail=_7B17DB30-B879-4E94-AD65-A080FBE35D7D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On 10 Jul 2020, at 16:00, Jason Long <hack3rcon@yahoo.com> wrote:
>=20
> Thank you Richard.
> Kernel =3D=3D The libraries that an App need to run.
> Am I right?

In the context of a unikernel, I think that=E2=80=99s a reasonable =
analogy.
But those libraries will not perform all the functions you would =
normally expect an OS kernel to perform.

> In the Unikernel, no operating system exist and the Xen play the role =
of OS. Is it true?

"It depends.=E2=80=9D
What do you mean by the operating system?
In terms of functionality, for a unikernel system, much of the =
functionality you would usually rely on the operating system to perform =
(in most cases, by a kernel) is provided by library code (unikernels =E2=80=
=94 certainly Mirage OS =E2=80=94 are strongly inspired by library =
operating systems). But not all =E2=80=94 if you are using Xen as your =
host environment then yes, Xen will provide some of that functionality =
as well.

> The Xen hypervisor can do anything that an OS kernel do???

I don=E2=80=99t think that=E2=80=99s a well-formed question =E2=80=94 =
first, you probably need to declare what an OS kernel can do.

> The source of photo is: https://github.com/cetic/unikernels =
<https://github.com/cetic/unikernels>
>=20
> Can you show me a clear and better diagram about Unikernel?

Well, it depends what you want the diagram to help explain. I don=E2=80=99=
t have any to hand right now.

=E2=80=94 =20
Richard Mortier
richard.mortier@cl.cam.ac.uk





--Apple-Mail=_7B17DB30-B879-4E94-AD65-A080FBE35D7D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On 10 Jul 2020, at 16:00, Jason Long &lt;<a =
href=3D"mailto:hack3rcon@yahoo.com" class=3D"">hack3rcon@yahoo.com</a>&gt;=
 wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D"">Thank=
 you Richard.<div id=3D"yMail_cursorElementTracker_1594392722114" =
class=3D"">Kernel =3D=3D The libraries that an App need to =
run.</div><div id=3D"yMail_cursorElementTracker_1594392767062" =
class=3D"">Am I right?</div></div></blockquote><div><br =
class=3D""></div>In the context of a unikernel, I think that=E2=80=99s a =
reasonable analogy.</div><div>But those libraries will not perform all =
the functions you would normally expect an OS kernel to =
perform.</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div =
id=3D"yMail_cursorElementTracker_1594392774893" class=3D"">In the =
Unikernel, no operating system exist and the Xen play the role of OS. Is =
it true?</div></div></blockquote><div><br class=3D""></div><div>"It =
depends.=E2=80=9D</div><div>What do you mean by the operating =
system?</div><div>In terms of functionality, for a unikernel system, =
much of the functionality you would usually rely on the operating system =
to perform (in most cases, by a kernel) is provided by library code =
(unikernels =E2=80=94 certainly Mirage OS =E2=80=94 are strongly =
inspired by library operating systems). But not all =E2=80=94 if you are =
using Xen as your host environment then yes, Xen will provide some of =
that functionality as well.</div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div =
id=3D"yMail_cursorElementTracker_1594393150554" class=3D"">The Xen =
hypervisor can do anything that an OS kernel =
do???</div></div></blockquote><div><br class=3D""></div><div>I don=E2=80=99=
t think that=E2=80=99s a well-formed question =E2=80=94 first, you =
probably need to declare what an OS kernel can do.</div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
id=3D"yMail_cursorElementTracker_1594392881923" class=3D"">The source of =
photo is: <a id=3D"linkextractor__1594393120409" =
data-yahoo-extracted-link=3D"true" =
href=3D"https://github.com/cetic/unikernels" =
class=3D"lEnhancr_1594393122079">https://github.com/cetic/unikernels</a></=
div><div id=3D"yMail_cursorElementTracker_1594393120436" class=3D""><br =
class=3D""></div><div id=3D"yMail_cursorElementTracker_1594393120696" =
class=3D"">Can you show me a clear and better diagram about =
Unikernel?</div></div></blockquote><div><br class=3D""></div><div>Well, =
it depends what you want the diagram to help explain. I don=E2=80=99t =
have any to hand right now.</div></div><br class=3D""><div class=3D"">
<div dir=3D"auto" style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, =
0); letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; word-wrap: =
break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D""><div>=E2=80=94 &nbsp;</div><div>Richard Mortier</div><div><a =
href=3D"mailto:richard.mortier@cl.cam.ac.uk" =
class=3D"">richard.mortier@cl.cam.ac.uk</a></div><div class=3D""><br =
class=3D""></div></div><br class=3D"Apple-interchange-newline"><br =
class=3D"Apple-interchange-newline">
</div>
<br class=3D""></body></html>=

--Apple-Mail=_7B17DB30-B879-4E94-AD65-A080FBE35D7D--


From xen-users-bounces@lists.xenproject.org Fri Jul 10 18:50:24 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 18:50:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jty68-0003k6-Tp; Fri, 10 Jul 2020 18:50:12 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+02k=AV=gmail.com=bela.berde@srs-us1.protection.inumbo.net>)
 id 1jty67-0003jq-5v
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 18:50:11 +0000
X-Inumbo-ID: 2e32e00e-c2de-11ea-bb8b-bc764e2007e4
Received: from mail-ot1-x32f.google.com (unknown [2607:f8b0:4864:20::32f])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2e32e00e-c2de-11ea-bb8b-bc764e2007e4;
 Fri, 10 Jul 2020 18:50:10 +0000 (UTC)
Received: by mail-ot1-x32f.google.com with SMTP id e90so4939973ote.1;
 Fri, 10 Jul 2020 11:50:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=7xlQsh3FH6b0DDUNEItm789Iq8kr3RziFE0G1Oy49/w=;
 b=ZXKRM4QTdJGwbW8WCgS4M7r+d40znqhQZFQw6Aqr4aLEHSmW2Hezbxo0IY4LIDhlNQ
 XVBOt37lMcdXNFuu8JA6blBqNCSvZh1HxYiw3dxxsuO0XnQGkEteWYWJY6h1wYJY6uXh
 jSA4CvQgnJX436ibS2wGHEiK/ZbqY7/s2jLjA0hlU18Aj/eoXUXomixV/HoA1cnNaAY7
 Pe5stDx/oYZwRVA242uwSNj5B7XT3e3wapcck62tTLI9rtqx4fnIysNEExSEquCI6M/D
 DXaa5g4R0BL6bxUd+rvdkSz97p8i6x1F/uerD+nplOq9RJT2es2pliy3CJaGqwrIZgAV
 Qt1g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=7xlQsh3FH6b0DDUNEItm789Iq8kr3RziFE0G1Oy49/w=;
 b=MvzTSxHuN/EkXePAjiV0XKYEHfQYv6KZ2O5cKiyOX+eI64jrqyPcKjxEvuSdoIWKn+
 wk/DuhLY0b4Gf3+XKLmouwQh4p5o20R6Ct9QrchJjYEIjc9BPG/Ud0Jkeit9DUYBYRL8
 X/kn23fJ1WZoJR6ad4CTIUjNLwu12SwLxmvxhWf6yVoUZ1vJNQh8OSI/q94D4ZChttpk
 QSZsidhnTT1ZrpLe99Bk0xFX3kda8yu0Sc/7zYZV1r8R/Hk46be2wwzIHC5TWFbz6t76
 Z0b6EeGthhrf+3F2C0oCxatGm0dixSYwEhd3oDAenZmOsjT2emo4edFH0lzd9WtbdKRg
 2lxg==
X-Gm-Message-State: AOAM531AbgPIo5eadIbPHZLyjnDCPKFM4+nBl5t+UaSHmATCoFWvO+xi
 hTwgq8AEe6VfogW+3UCJZlEZMzVZOCSZNQqmagRq79w=
X-Google-Smtp-Source: ABdhPJy8v91wNkHAyF1G3X4gAppsNsxDu/ipaR40Shlj1ivWr71REXurY+gajRdOC321HxEp3QL1D8zlZOjZuQBM2Pk=
X-Received: by 2002:a9d:6484:: with SMTP id g4mr39006969otl.103.1594407009838; 
 Fri, 10 Jul 2020 11:50:09 -0700 (PDT)
MIME-Version: 1.0
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
 <1101730410.2975527.1594393256638@mail.yahoo.com>
In-Reply-To: <1101730410.2975527.1594393256638@mail.yahoo.com>
From: Bela Berde <bela.berde@gmail.com>
Date: Fri, 10 Jul 2020 20:49:59 +0200
Message-ID: <CACWuZi-w0NFqW+_Qbh21OOKGTzRh7ij5JegWCAhhQGgCivGpmQ@mail.gmail.com>
Subject: Re: MirageOS and Unikernel.
To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Content-Type: multipart/alternative; boundary="00000000000072eac305aa1acfc5"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "mirageos-devel@lists.xenproject.org"
 <mirageos-devel@lists.xenproject.org>,
 Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000072eac305aa1acfc5
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Fri 10 Jul 2020 at 17:05, Jason Long <hack3rcon@yahoo.com> wrote:

> Thank you Richard.
> Kernel =3D=3D The libraries that an App need to run.
>
NO

> Am I right?
> In the Unikernel, no operating system exist and the Xen play the role of
> OS. Is it true?
>
NO

> The Xen hypervisor can do anything that an OS kernel do???
>
NO

> The source of photo is: https://github.com/cetic/unikernels
>
> Can you show me a clear and better diagram about Unikernel?
>

The name unikernel means many different things. But a real unikernel has a
definition.
It does not need any hypervisor. It essentially needs a Virtual Machine
Monitor layer that has nothing to do with Virtual Machine (VM).
First of all, OS libraries, meaning the OS split into libraries, are linked
to the app binary.
No OS is needed anymore.
Have a look at Rumprun unikernel for more information, and forget
Docker=E2=80=99stuff.

>
> Sent from Yahoo Mail on Android
> <https://go.onelink.me/107872968?pid=3DInProduct&c=3DGlobal_Internal_YGro=
wth_AndroidEmailSig__AndroidUsers&af_wl=3Dym&af_sub1=3DInternal&af_sub2=3DG=
lobal_YGrowth&af_sub3=3DEmailSignature>
>
--=20
Sent from iPad

--00000000000072eac305aa1acfc5
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div><br></div><div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=
=3D"gmail_attr">On Fri 10 Jul 2020 at 17:05, Jason Long &lt;<a href=3D"mail=
to:hack3rcon@yahoo.com">hack3rcon@yahoo.com</a>&gt; wrote:<br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">Thank you Richard.<div id=3D"m_-4255876627030265982=
yMail_cursorElementTracker_1594392722114">Kernel =3D=3D The libraries that =
an App need to run.</div></blockquote><div dir=3D"auto">NO</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex"><div id=3D"m_-4255876627030265982yMail_cursorElementTra=
cker_1594392722114"></div><div id=3D"m_-4255876627030265982yMail_cursorElem=
entTracker_1594392767062">Am I right?</div><div id=3D"m_-425587662703026598=
2yMail_cursorElementTracker_1594392774893">In the Unikernel, no operating s=
ystem exist and the Xen play the role of OS. Is it true?</div></blockquote>=
<div dir=3D"auto">NO</div><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div id=3D"m_-4255=
876627030265982yMail_cursorElementTracker_1594392774893"></div><div id=3D"m=
_-4255876627030265982yMail_cursorElementTracker_1594393150554">The Xen hype=
rvisor can do anything that an OS kernel do???</div></blockquote><div dir=
=3D"auto">NO</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex"><div id=3D"m_-425587662703=
0265982yMail_cursorElementTracker_1594393150554"></div><div id=3D"m_-425587=
6627030265982yMail_cursorElementTracker_1594392881923">The source of photo =
is: <a id=3D"m_-4255876627030265982linkextractor__1594393120409" href=3D"ht=
tps://github.com/cetic/unikernels" target=3D"_blank">https://github.com/cet=
ic/unikernels</a></div><div id=3D"m_-4255876627030265982yMail_cursorElement=
Tracker_1594393120436"><br></div><div id=3D"m_-4255876627030265982yMail_cur=
sorElementTracker_1594393120696">Can you show me a clear and better diagram=
 about Unikernel?</div></blockquote><div dir=3D"auto"><br></div><div dir=3D=
"auto">The name unikernel means many different things. But a real unikernel=
 has a definition.=C2=A0</div><div dir=3D"auto">It does not need any hyperv=
isor. It essentially needs a Virtual Machine Monitor layer that has nothing=
 to do with Virtual Machine (VM).=C2=A0</div><div dir=3D"auto">First of all=
, OS libraries, meaning the OS split into libraries, are linked to the app =
binary.=C2=A0</div><div dir=3D"auto">No OS is needed anymore.=C2=A0</div><d=
iv dir=3D"auto">Have a look at Rumprun unikernel for more information, and =
forget Docker=E2=80=99stuff.=C2=A0</div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div=
 id=3D"m_-4255876627030265982yMail_cursorElementTracker_1594392867706"><br>=
<div id=3D"m_-4255876627030265982ymail_android_signature"><a id=3D"m_-42558=
76627030265982ymail_android_signature_link" href=3D"https://go.onelink.me/1=
07872968?pid=3DInProduct&amp;c=3DGlobal_Internal_YGrowth_AndroidEmailSig__A=
ndroidUsers&amp;af_wl=3Dym&amp;af_sub1=3DInternal&amp;af_sub2=3DGlobal_YGro=
wth&amp;af_sub3=3DEmailSignature" target=3D"_blank">Sent from Yahoo Mail on=
 Android</a></div></div></blockquote></div></div>-- <br><div dir=3D"ltr" cl=
ass=3D"gmail_signature" data-smartmail=3D"gmail_signature">Sent from iPad</=
div>

--00000000000072eac305aa1acfc5--


From xen-users-bounces@lists.xenproject.org Fri Jul 10 21:47:01 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 21:47:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ju0pQ-0001PW-V1; Fri, 10 Jul 2020 21:45:08 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mL13=AV=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1ju0pP-0001P0-EI
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 21:45:07 +0000
X-Inumbo-ID: 9b63cd56-c2f6-11ea-8496-bc764e2007e4
Received: from sonic308-2.consmr.mail.bf2.yahoo.com (unknown [74.6.130.41])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 9b63cd56-c2f6-11ea-8496-bc764e2007e4;
 Fri, 10 Jul 2020 21:45:01 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1594417501; bh=7CXLtcMybT9QQqLtEFPrvEF03bLU/y4+J1QeZsfmFcE=;
 h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:From:Subject;
 b=SSUQ3q3NKyfelpWN2yyFcupT2/2SiV6SSfUaduRlVWu55k9dCFHhb8SvoHHXrn0If27iot4zBD/AG5JynzipsX3YotORH4JI8lLmuLcwGo7aiZ3HKonR+DtBLp6hCn5q6PR6eslOrzyCDRotJHPkxw5SMMptfy3B4ycLBmma4yyrq9Tn8OQeGH+jcHjmjahWhkE52E/2SvgjIU3AMqmI9uvK6VdKLBrRyDoYCXIfJaDDmRMQc4h/m+Z4a2ZUb9v8sHmdJqUtGLz0bez6X12UgCR0sHZDaX/YpjaN+45c/wqDWTedNAar0lOBiXo8SE1zTvSgrImOWov+SepLRBocrg==
X-YMail-OSG: G1WWPD0VM1nlbxX29aEc3WRh4HRs1I4uImSsN6zCiUWY8kL8uOK3.wlAKyN8xLi
 8Fa3VWBYwtNow9JdpcoiPH8M28Ti4ywTSDcS6iikCRsQh.DCV_8ovVRhlgXcWC.eEKDIVhJeRTuc
 7VFQxLaac.lLg.2TS0ZNotn4Eg7.zaqoQsY0Ub42k5ZaPIx0jlMBBQTUPsDpocM2WHQ1sLEqa6E.
 63ZtQsFsdYuu6gquSr2DgqO21b2umpNNu1GSiqryfnQDM9ioePlrWFHT86Ql2Ww8WgsXNgzfv_Xl
 JiRxW55tA5PRfyDYNEclm711phexQ11PYNtKQRXFeT5gFfjNvAcZFByd6N40DUnXaTOtrdbGo6ux
 0rQC8p0AL3FHhzN_pAv5K3.zXQmIOhUUp8wSb.7ZoG25gG62V53sswXtnYloN4hYmlOVn4.W6Fbe
 l5qssW.jfRNqnAQnwEEIpndm3V6eFd.kvwko6SIoePSPXiQymR2qrLKySVeTSOJy2vcJ4xnGcSOx
 JNvhFgSI5VHTCOjX8gbvFiM5u8e9X_2JQtbTReXGVFF3AO54JlR8FTf7oM_mBK84R0NSg7TBMLTQ
 sEebqmPpa8P2dbpamaDJmK7ctpOd2PrYFlCry.kUO8.OQZq5EAiGpwZET2HHhPxz5B3PkgiZqqoK
 9d8Ra7qMPxM5Ios0rdK5RWUp_DSdemTKkJ4Mxbjv2dfSCwFFYo41B_PUPJ.CZL.FoINMevojWSyV
 NtwMdl2dv4wJPOVdiS0oNlcSnAZxULhEuVwrmYr.DvEQw4US3RrA4L8trosGaY5K9Cm9Y9JO_YD_
 END__m5MJVgnc0J0WekShRv3vxe2Rr2etE2bX2wV9.oQ6IGinY_ohQJi29ocVQCljzzFtFWdhorJ
 yECcD3utLtKufK9okGEWqc8mtdy9W2aHPt_mokKxHcFL3YWr4owjIzqUnKSdgPopBMLnPnWUmbfJ
 .QKf9LFrOuUtXmYceDvcuX_c5Uugve5B6GAJDHgr6Qr0UP6kuAkncXx1oV063LsH3rknqevn2_V8
 IhvscMElcUhPlDOXtoLC7duLYZ0CVlas0KZ9iRcrpd0VzeQ0S7JJ5z4KYBa_1SmBTogrkM5iV.yQ
 dd.NdthcRs6UVfoAWKeG.s6S5aLufhLaBsB92q7hIlrTFbwG_Eu8Xn.ZThMhVvt_ZPqXi1ZPTex0
 f_NUmLCpUbJYg9Zdr.htDOkIO5InSOznmAIOf88hPntGTI.ch5oWrqcQjov_xJP33scjW8guhSgD
 xYp_ccik0vAkarPlH4Rl2aournqZfRg9GPR7laIK3L0P1Xj8Jo4.Pwdws54FXsH_02uuzEyeNcgg
 tYhq4C4YAZ.G4IWLJrWUzveaH2NfV34vZdZqvhnZxrwS7GjBonr.RPmSXmfPDBLhNdCTxywUjj.s
 abKdb0uq9qQER0dXe
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic308.consmr.mail.bf2.yahoo.com with HTTP; Fri, 10 Jul 2020 21:45:01 +0000
Date: Fri, 10 Jul 2020 21:44:58 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: "richard.mortier@cl.cam.ac.uk" <richard.mortier@cl.cam.ac.uk>
Message-ID: <828141896.3113181.1594417498714@mail.yahoo.com>
In-Reply-To: <3AEF23C4-FA43-4029-9649-136F702D9D37@cl.cam.ac.uk>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
 <1101730410.2975527.1594393256638@mail.yahoo.com>
 <3AEF23C4-FA43-4029-9649-136F702D9D37@cl.cam.ac.uk>
Subject: Re: MirageOS and Unikernel.
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_3113180_1894218761.1594417498712"
X-Mailer: WebService/1.1.16197 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 8503
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Cc: "mirageos-devel@lists.xenproject.org"
 <mirageos-devel@lists.xenproject.org>,
 Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_3113180_1894218761.1594417498712
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Thanks.Consider Xen Dom0, it is based on Linux. When Unikernel running on X=
en then its mean that it running on Linux!!!Can Xen without Dom0 handle the=
 Unikernel Apps?Thus, Unikernel Apps need a kernel like linux to work. Am I=
 right?All functions of an applications packed in Unikernel? For example, N=
ginx using many libraries and OS components then how it can be convert to U=
nikernel?


Sent from Yahoo Mail on Android=20
=20
  On Fri, Jul 10, 2020 at 8:36 PM, Richard Mortier<richard.mortier@cl.cam.a=
c.uk> wrote:  =20


On 10 Jul 2020, at 16:00, Jason Long <hack3rcon@yahoo.com> wrote:
Thank you Richard.Kernel =3D=3D The libraries that an App need to run.Am I =
right?

In the context of a unikernel, I think that=E2=80=99s a reasonable analogy.=
But those libraries will not perform all the functions you would normally e=
xpect an OS kernel to perform.

In the Unikernel, no operating system exist and the Xen play the role of OS=
. Is it true?

"It depends.=E2=80=9DWhat do you mean by the operating system?In terms of f=
unctionality, for a unikernel system, much of the functionality you would u=
sually rely on the operating system to perform (in most cases, by a kernel)=
 is provided by library code (unikernels =E2=80=94 certainly Mirage OS =E2=
=80=94 are strongly inspired by library operating systems). But not all =E2=
=80=94 if you are using Xen as your host environment then yes, Xen will pro=
vide some of that functionality as well.

The Xen hypervisor can do anything that an OS kernel do???

I don=E2=80=99t think that=E2=80=99s a well-formed question =E2=80=94 first=
, you probably need to declare what an OS kernel can do.

The source of photo is: https://github.com/cetic/unikernels
Can you show me a clear and better diagram about Unikernel?

Well, it depends what you want the diagram to help explain. I don=E2=80=99t=
 have any to hand right now.
=E2=80=94 =C2=A0Richard Mortierrichard.mortier@cl.cam.ac.uk



 =20

------=_Part_3113180_1894218761.1594417498712
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Thanks.<div id=3D"yMail_cursorElementTracker_1594417070528">Consider Xen Do=
m0, it is based on Linux. When Unikernel running on Xen then its mean that =
it running on Linux!!!</div><div id=3D"yMail_cursorElementTracker_159441721=
1857">Can Xen without Dom0 handle the Unikernel Apps?</div><div id=3D"yMail=
_cursorElementTracker_1594417284950">Thus, Unikernel Apps need a kernel lik=
e linux to work. Am I right?</div><div id=3D"yMail_cursorElementTracker_159=
4417365336">All functions of an applications packed in Unikernel? For examp=
le, Nginx using many libraries and OS components then how it can be convert=
 to Unikernel?</div><div id=3D"yMail_cursorElementTracker_1594417131017"><b=
r></div><div id=3D"yMail_cursorElementTracker_1594417131339"><br id=3D"yMai=
l_cursorElementTracker_1594417060469"><br><div id=3D"ymail_android_signatur=
e"><a id=3D"ymail_android_signature_link" href=3D"https://go.onelink.me/107=
872968?pid=3DInProduct&amp;c=3DGlobal_Internal_YGrowth_AndroidEmailSig__And=
roidUsers&amp;af_wl=3Dym&amp;af_sub1=3DInternal&amp;af_sub2=3DGlobal_YGrowt=
h&amp;af_sub3=3DEmailSignature">Sent from Yahoo Mail on Android</a></div> <=
br> <blockquote style=3D"margin: 0 0 20px 0;"> <div style=3D"font-family:Ro=
boto, sans-serif; color:#6D00F6;"> <div>On Fri, Jul 10, 2020 at 8:36 PM, Ri=
chard Mortier</div><div>&lt;richard.mortier@cl.cam.ac.uk&gt; wrote:</div> <=
/div> <div style=3D"padding: 10px 0 0 20px; margin: 10px 0 0 0; border-left=
: 1px solid #6D00F6;"> <div id=3D"yiv5959155153"><div><br clear=3D"none" cl=
ass=3D"yiv5959155153"><div><br clear=3D"none" class=3D"yiv5959155153"><bloc=
kquote class=3D"yiv5959155153" type=3D"cite"><div class=3D"yiv5959155153">O=
n 10 Jul 2020, at 16:00, Jason Long &lt;<a rel=3D"nofollow" shape=3D"rect" =
class=3D"yiv5959155153" ymailto=3D"mailto:hack3rcon@yahoo.com" target=3D"_b=
lank" href=3D"mailto:hack3rcon@yahoo.com">hack3rcon@yahoo.com</a>&gt; wrote=
:</div><br clear=3D"none" class=3D"yiv5959155153Apple-interchange-newline">=
<div class=3D"yiv5959155153">Thank you Richard.<div class=3D"yiv5959155153"=
 id=3D"yiv5959155153yMail_cursorElementTracker_1594392722114">Kernel =3D=3D=
 The libraries that an App need to run.</div><div class=3D"yiv5959155153" i=
d=3D"yiv5959155153yMail_cursorElementTracker_1594392767062">Am I right?</di=
v></div></blockquote><div><br clear=3D"none" class=3D"yiv5959155153"></div>=
In the context of a unikernel, I think that=E2=80=99s a reasonable analogy.=
</div><div>But those libraries will not perform all the functions you would=
 normally expect an OS kernel to perform.</div><div><br clear=3D"none" clas=
s=3D"yiv5959155153"><blockquote class=3D"yiv5959155153" type=3D"cite"><div =
class=3D"yiv5959155153"><div class=3D"yiv5959155153" id=3D"yiv5959155153yMa=
il_cursorElementTracker_1594392774893">In the Unikernel, no operating syste=
m exist and the Xen play the role of OS. Is it true?</div></div></blockquot=
e><div><br clear=3D"none" class=3D"yiv5959155153"></div><div>"It depends.=
=E2=80=9D</div><div>What do you mean by the operating system?</div><div>In =
terms of functionality, for a unikernel system, much of the functionality y=
ou would usually rely on the operating system to perform (in most cases, by=
 a kernel) is provided by library code (unikernels =E2=80=94 certainly Mira=
ge OS =E2=80=94 are strongly inspired by library operating systems). But no=
t all =E2=80=94 if you are using Xen as your host environment then yes, Xen=
 will provide some of that functionality as well.</div><br clear=3D"none" c=
lass=3D"yiv5959155153"><blockquote class=3D"yiv5959155153" type=3D"cite"><d=
iv class=3D"yiv5959155153"><div class=3D"yiv5959155153" id=3D"yiv5959155153=
yMail_cursorElementTracker_1594393150554">The Xen hypervisor can do anythin=
g that an OS kernel do???</div></div></blockquote><div><br clear=3D"none" c=
lass=3D"yiv5959155153"></div><div>I don=E2=80=99t think that=E2=80=99s a we=
ll-formed question =E2=80=94 first, you probably need to declare what an OS=
 kernel can do.</div><div class=3D"yiv5959155153yqt1239818533 yQTDBase" id=
=3D"yiv5959155153yqtfd75643"><br clear=3D"none" class=3D"yiv5959155153"><bl=
ockquote class=3D"yiv5959155153" type=3D"cite"><div class=3D"yiv5959155153"=
><div class=3D"yiv5959155153" id=3D"yiv5959155153yMail_cursorElementTracker=
_1594392881923">The source of photo is: <a rel=3D"nofollow" shape=3D"rect" =
class=3D"yiv5959155153lEnhancr_1594393122079" id=3D"yiv5959155153linkextrac=
tor__1594393120409" target=3D"_blank" href=3D"https://github.com/cetic/unik=
ernels">https://github.com/cetic/unikernels</a></div><div class=3D"yiv59591=
55153" id=3D"yiv5959155153yMail_cursorElementTracker_1594393120436"><br cle=
ar=3D"none" class=3D"yiv5959155153"></div><div class=3D"yiv5959155153" id=
=3D"yiv5959155153yMail_cursorElementTracker_1594393120696">Can you show me =
a clear and better diagram about Unikernel?</div></div></blockquote></div><=
div><br clear=3D"none" class=3D"yiv5959155153"></div><div>Well, it depends =
what you want the diagram to help explain. I don=E2=80=99t have any to hand=
 right now.</div></div><br clear=3D"none" class=3D"yiv5959155153"><div clas=
s=3D"yiv5959155153">
<div class=3D"yiv5959155153" style=3D"color:rgb(0, 0, 0);letter-spacing:nor=
mal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px=
;text-decoration:none;word-wrap:break-word;"><div>=E2=80=94 &nbsp;</div><di=
v>Richard Mortier</div><div><a rel=3D"nofollow" shape=3D"rect" class=3D"yiv=
5959155153" ymailto=3D"mailto:richard.mortier@cl.cam.ac.uk" target=3D"_blan=
k" href=3D"mailto:richard.mortier@cl.cam.ac.uk">richard.mortier@cl.cam.ac.u=
k</a></div><div class=3D"yiv5959155153yqt1239818533 yQTDBase" id=3D"yiv5959=
155153yqtfd75934"><div class=3D"yiv5959155153"><br clear=3D"none" class=3D"=
yiv5959155153"></div></div></div><div class=3D"yiv5959155153yqt1239818533 y=
QTDBase" id=3D"yiv5959155153yqtfd42859"><br clear=3D"none" class=3D"yiv5959=
155153Apple-interchange-newline"><br clear=3D"none" class=3D"yiv5959155153A=
pple-interchange-newline">
</div></div><div class=3D"yiv5959155153yqt1239818533 yQTDBase" id=3D"yiv595=
9155153yqtfd72443">
<br clear=3D"none" class=3D"yiv5959155153"></div></div></div> </div> </bloc=
kquote></div>
------=_Part_3113180_1894218761.1594417498712--


From xen-users-bounces@lists.xenproject.org Fri Jul 10 21:48:42 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 10 Jul 2020 21:48:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1ju0sQ-0001aI-MG; Fri, 10 Jul 2020 21:48:14 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mL13=AV=yahoo.com=hack3rcon@srs-us1.protection.inumbo.net>)
 id 1ju0sP-0001ZY-M1
 for xen-users@lists.xenproject.org; Fri, 10 Jul 2020 21:48:13 +0000
X-Inumbo-ID: 0a50bf08-c2f7-11ea-9038-12813bfff9fa
Received: from sonic310-43.consmr.mail.bf2.yahoo.com (unknown [74.6.135.217])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 0a50bf08-c2f7-11ea-9038-12813bfff9fa;
 Fri, 10 Jul 2020 21:48:07 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048;
 t=1594417687; bh=HQlH5T8RAG5JqD12s3+I7mcDWFec3YT49pJfstpN6Lk=;
 h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:From:Subject;
 b=D9mNZTMvyYOfB/HE9MbU9dj7XhGt8rGLE1tNBuPp2yUToJjrQJAegV+B3VfQ402r/6G5n8t0QBH70PxY7ygPmYvMPvIzePWs25TLqXNWa+jgMt7b5exjG7AwK0yf5/xzLiOF+eazpt8w4yc+coLPCjUGw8rhi0Wnf5h+zYoxkvqvLVujqpfi2MY+X9ee3NK4cExuKhevBf3RW0xQx6xvkb69kizt9WbFZErA/0vbk2nlLRYKyg1JJ4YAlNUzeinwf35jGbeDweTQAH+vFEr227oPPDJghbAEqRGhD6KsSSbo8DGdP2c0Fw0R9Z/LAJXEeYuEJNeEDQeZJ46LVf6KPw==
X-YMail-OSG: N_6BpMEVRDvd.miR6A7lED5GPdAEx7ojsA--
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic310.consmr.mail.bf2.yahoo.com with HTTP; Fri, 10 Jul 2020 21:48:07 +0000
Date: Fri, 10 Jul 2020 21:46:06 +0000 (UTC)
From: Jason Long <hack3rcon@yahoo.com>
To: "bela.berde@gmail.com" <bela.berde@gmail.com>
Message-ID: <951520100.3111789.1594417566033@mail.yahoo.com>
In-Reply-To: <CACWuZi-w0NFqW+_Qbh21OOKGTzRh7ij5JegWCAhhQGgCivGpmQ@mail.gmail.com>
References: <784251130.2623344.1594314570469.ref@mail.yahoo.com>
 <784251130.2623344.1594314570469@mail.yahoo.com>
 <1101730410.2975527.1594393256638@mail.yahoo.com>
 <CACWuZi-w0NFqW+_Qbh21OOKGTzRh7ij5JegWCAhhQGgCivGpmQ@mail.gmail.com>
Subject: Re: MirageOS and Unikernel.
MIME-Version: 1.0
Content-Type: multipart/alternative; 
 boundary="----=_Part_3111788_2016243221.1594417566032"
X-Mailer: WebService/1.1.16197 YahooMailAndroidMobile YMobile/1.0
 (com.yahoo.mobile.client.android.mail/6.8.3; Android/7.1.1; NMF26F; bbc100;
 BlackBerry; BBC100-1; 5.16; 1184x720; )
Content-Length: 6226
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: "hack3rcon@yahoo.com" <hack3rcon@yahoo.com>
Cc: "mirageos-devel@lists.xenproject.org"
 <mirageos-devel@lists.xenproject.org>,
 Xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

------=_Part_3111788_2016243221.1594417566032
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

The Rumprun unikernel is KVM. I like Xen.

Sent from Yahoo Mail on Android=20
=20
  On Fri, Jul 10, 2020 at 11:20 PM, Bela Berde<bela.berde@gmail.com> wrote:=
  =20

On Fri 10 Jul 2020 at 17:05, Jason Long <hack3rcon@yahoo.com> wrote:

Thank you Richard.Kernel =3D=3D The libraries that an App need to run.
NO
Am I right?In the Unikernel, no operating system exist and the Xen play the=
 role of OS. Is it true?
NO
The Xen hypervisor can do anything that an OS kernel do???
NO
The source of photo is: https://github.com/cetic/unikernels
Can you show me a clear and better diagram about Unikernel?

The name unikernel means many different things. But a real unikernel has a =
definition.=C2=A0It does not need any hypervisor. It essentially needs a Vi=
rtual Machine Monitor layer that has nothing to do with Virtual Machine (VM=
).=C2=A0First of all, OS libraries, meaning the OS split into libraries, ar=
e linked to the app binary.=C2=A0No OS is needed anymore.=C2=A0Have a look =
at Rumprun unikernel for more information, and forget Docker=E2=80=99stuff.=
=C2=A0

Sent from Yahoo Mail on Android
--=20
Sent from iPad =20

------=_Part_3111788_2016243221.1594417566032
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

The Rumprun unikernel is KVM. I like Xen.<br id=3D"yMail_cursorElementTrack=
er_1594417521920"><br><div id=3D"ymail_android_signature"><a id=3D"ymail_an=
droid_signature_link" href=3D"https://go.onelink.me/107872968?pid=3DInProdu=
ct&amp;c=3DGlobal_Internal_YGrowth_AndroidEmailSig__AndroidUsers&amp;af_wl=
=3Dym&amp;af_sub1=3DInternal&amp;af_sub2=3DGlobal_YGrowth&amp;af_sub3=3DEma=
ilSignature">Sent from Yahoo Mail on Android</a></div> <br> <blockquote sty=
le=3D"margin: 0 0 20px 0;"> <div style=3D"font-family:Roboto, sans-serif; c=
olor:#6D00F6;"> <div>On Fri, Jul 10, 2020 at 11:20 PM, Bela Berde</div><div=
>&lt;bela.berde@gmail.com&gt; wrote:</div> </div> <div style=3D"padding: 10=
px 0 0 20px; margin: 10px 0 0 0; border-left: 1px solid #6D00F6;"> <div id=
=3D"yiv3060277519"><div><div><br clear=3D"none"></div><div><br clear=3D"non=
e"><div class=3D"yiv3060277519gmail_quote"><div class=3D"yiv3060277519gmail=
_attr" dir=3D"ltr">On Fri 10 Jul 2020 at 17:05, Jason Long &lt;<a rel=3D"no=
follow" shape=3D"rect" ymailto=3D"mailto:hack3rcon@yahoo.com" target=3D"_bl=
ank" href=3D"mailto:hack3rcon@yahoo.com">hack3rcon@yahoo.com</a>&gt; wrote:=
<br clear=3D"none"></div><blockquote class=3D"yiv3060277519gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">Thank=
 you Richard.<div id=3D"yiv3060277519m_-4255876627030265982yMail_cursorElem=
entTracker_1594392722114">Kernel =3D=3D The libraries that an App need to r=
un.</div></blockquote><div>NO</div><blockquote class=3D"yiv3060277519gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex;"><div id=3D"yiv3060277519m_-4255876627030265982yMail_cursorElementTrack=
er_1594392722114"></div><div id=3D"yiv3060277519m_-4255876627030265982yMail=
_cursorElementTracker_1594392767062">Am I right?</div><div id=3D"yiv3060277=
519m_-4255876627030265982yMail_cursorElementTracker_1594392774893">In the U=
nikernel, no operating system exist and the Xen play the role of OS. Is it =
true?</div></blockquote><div>NO</div><blockquote class=3D"yiv3060277519gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex;"><div id=3D"yiv3060277519m_-4255876627030265982yMail_cursorElementTra=
cker_1594392774893"></div><div id=3D"yiv3060277519m_-4255876627030265982yMa=
il_cursorElementTracker_1594393150554">The Xen hypervisor can do anything t=
hat an OS kernel do???</div></blockquote><div>NO</div><blockquote class=3D"=
yiv3060277519gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex;"><div id=3D"yiv3060277519m_-4255876627030265982yMail=
_cursorElementTracker_1594393150554"></div><div id=3D"yiv3060277519m_-42558=
76627030265982yMail_cursorElementTracker_1594392881923">The source of photo=
 is: <a rel=3D"nofollow" shape=3D"rect" id=3D"yiv3060277519m_-4255876627030=
265982linkextractor__1594393120409" target=3D"_blank" href=3D"https://githu=
b.com/cetic/unikernels">https://github.com/cetic/unikernels</a></div><div i=
d=3D"yiv3060277519m_-4255876627030265982yMail_cursorElementTracker_15943931=
20436"><br clear=3D"none"></div><div id=3D"yiv3060277519m_-4255876627030265=
982yMail_cursorElementTracker_1594393120696">Can you show me a clear and be=
tter diagram about Unikernel?</div></blockquote><div><br clear=3D"none"></d=
iv><div>The name unikernel means many different things. But a real unikerne=
l has a definition.&nbsp;</div><div>It does not need any hypervisor. It ess=
entially needs a Virtual Machine Monitor layer that has nothing to do with =
Virtual Machine (VM).&nbsp;</div><div>First of all, OS libraries, meaning t=
he OS split into libraries, are linked to the app binary.&nbsp;</div><div>N=
o OS is needed anymore.&nbsp;</div><div>Have a look at Rumprun unikernel fo=
r more information, and forget Docker=E2=80=99stuff.&nbsp;</div><blockquote=
 class=3D"yiv3060277519gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:=
1px #ccc solid;padding-left:1ex;"><div class=3D"yiv3060277519yqt6042175162 =
yQTDBase" id=3D"yiv3060277519yqtfd14250"><div id=3D"yiv3060277519m_-4255876=
627030265982yMail_cursorElementTracker_1594392867706"><br clear=3D"none"><d=
iv id=3D"yiv3060277519m_-4255876627030265982ymail_android_signature"><a rel=
=3D"nofollow" shape=3D"rect" id=3D"yiv3060277519m_-4255876627030265982ymail=
_android_signature_link" target=3D"_blank" href=3D"https://go.onelink.me/10=
7872968?pid=3DInProduct&amp;c=3DGlobal_Internal_YGrowth_AndroidEmailSig__An=
droidUsers&amp;af_wl=3Dym&amp;af_sub1=3DInternal&amp;af_sub2=3DGlobal_YGrow=
th&amp;af_sub3=3DEmailSignature">Sent from Yahoo Mail on Android</a></div><=
/div></div></blockquote></div></div>-- <br clear=3D"none"><div class=3D"yiv=
3060277519gmail_signature" dir=3D"ltr">Sent from iPad</div></div></div> </d=
iv> </blockquote>
------=_Part_3111788_2016243221.1594417566032--


From xen-users-bounces@lists.xenproject.org Sat Jul 11 10:37:11 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 11 Jul 2020 10:37:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1juCr5-0000pI-9k; Sat, 11 Jul 2020 10:35:39 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=mokRjz=AW=schramm.by=lists@ulnar.ocb.by>)
 id 1juCr2-0000pD-Qv
 for xen-users@lists.xenproject.org; Sat, 11 Jul 2020 10:35:37 +0000
X-Inumbo-ID: 40832e38-c362-11ea-908e-12813bfff9fa
Received: from ulnar.ocb.by (unknown [138.201.113.237])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 40832e38-c362-11ea-908e-12813bfff9fa;
 Sat, 11 Jul 2020 10:35:35 +0000 (UTC)
Received: from ulnar.ocb.by (localhost [127.0.0.1])
 by ulnar.ocb.by (Postfix) with ESMTP id 1AEA140133
 for <xen-users@lists.xenproject.org>; Sat, 11 Jul 2020 12:35:34 +0200 (CEST)
Authentication-Results: ulnar.ocb.by; dkim=pass (2048-bit key;
 unprotected) header.d=schramm.by header.i=@schramm.by header.b="ODXzT39G"; 
 dkim-atps=neutral
Received: from [IPv6:2a02:8106:f:37fc:329c:23ff:fe9a:9e57] (unknown
 [IPv6:2a02:8106:f:37fc:329c:23ff:fe9a:9e57])
 (Authenticated sender: lists@schramm.by)
 by ulnar.ocb.by (Postfix) with ESMTPSA id EA9B3400D1
 for <xen-users@lists.xenproject.org>; Sat, 11 Jul 2020 12:35:33 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=schramm.by;
 s=20200415; t=1594463734;
 bh=wHAMSBtdyXQ7WxUpVMexjrVJZyi789YYJg37VgkQfnE=;
 h=Subject:To:From:Message-ID:Date:From;
 b=ODXzT39G+1cId/Oln2U4qWaaxMPc0xxVX4PlQvqT63PTHlZSXb0ONbszWG+uvL5sK
 x8FSljjjdv0uWqltaiGN3hq09NVnAf0B82y3bBX1ZerArPQVg2RdtpP/AycdiGCK9V
 l3vxZ8bhlMlehpA9Fnrl7WOi+yk8K3RxNYCz/Auw6xD9blMyDFwRWeg1AeAir9wv4Y
 K0xvuvwkZe0v8Rx0TwfoObiDD+aaWkEUAxlMGOP7d/0/wYVY9AExS6FmMKl0EpwBFH
 DK/k7mbL3ZQ+LOEaDTzTrNiNGGLzB3hBkNciwCktozQUsPDFnqflcWDwY8/QlPSxTi
 t67iGwmzjp/fw==
Subject: Re: Debian 10, xen 4.11 reliability
To: xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
From: Holger Schramm <lists@schramm.by>
Message-ID: <6e81f24a-bff7-ce6e-c5d6-3403ddf5d010@schramm.by>
Date: Sat, 11 Jul 2020 12:35:33 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-AV-Checked: ClamSMTP @ Ulnar
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

i am running Debian Buster with Xen 4.11 on dozens of machines. works 
like a charm. but i use a custom kernel, because debian kernel is too 
old for me.

Don't have any problems with it.

Could you provide more infos?

-- 
~Holger


From xen-users-bounces@lists.xenproject.org Sat Jul 11 14:26:59 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 11 Jul 2020 14:26:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1juGRU-00032I-FI; Sat, 11 Jul 2020 14:25:28 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ZYMn=AW=os.lv=kl@srs-us1.protection.inumbo.net>)
 id 1juGRT-00032D-5A
 for xen-users@lists.xenproject.org; Sat, 11 Jul 2020 14:25:27 +0000
X-Inumbo-ID: 5a64f8b6-c382-11ea-8496-bc764e2007e4
Received: from mamuts.risinajumi.lv (unknown [212.70.177.194])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 5a64f8b6-c382-11ea-8496-bc764e2007e4;
 Sat, 11 Jul 2020 14:25:22 +0000 (UTC)
Received: by mamuts.risinajumi.lv (Postfix, from userid 65534)
 id 2F80E6AFD1; Sat, 11 Jul 2020 17:28:54 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.2.2 (2007-07-23) on mamuts.risinajumi.lv
X-Spam-Level: *
X-Spam-Status: No, score=1.4 required=9.5 tests=FH_DATE_PAST_20XX autolearn=no
 version=3.2.2
Received: from smtp.risinajumi.lv (smtp.risinajumi.lv [212.70.177.201])
 by mamuts.risinajumi.lv (Postfix) with ESMTP id DC98F6AF9B
 for <xen-users@lists.xenproject.org>; Sat, 11 Jul 2020 17:28:53 +0300 (EEST)
Received: from [192.168.1.7] (unknown [80.89.72.241])
 by smtp.risinajumi.lv (Postfix) with ESMTPA id 034DEF1223
 for <xen-users@lists.xenproject.org>; Sat, 11 Jul 2020 17:25:20 +0300 (EEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <6e81f24a-bff7-ce6e-c5d6-3403ddf5d010@schramm.by>
From: Casper <kl@os.lv>
Message-ID: <e80779ac-520b-c712-954d-86889869f0ed@os.lv>
Date: Sat, 11 Jul 2020 17:25:11 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <6e81f24a-bff7-ce6e-c5d6-3403ddf5d010@schramm.by>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

I think default Debian kernel with xen not working.
I have updated original Debian 10.4 packages from I think 10.0 - all the 
same.
Debian 7 works like charm, I will switch to other kernel or, make own 
custom to test it.
I have md raid with 2-3 discs, tried with raid1 and raid5, it all fails 
mostly with i/o problem to access some disc, had another issue with 
e1000e intel driver, but it seems upgrade to latest fixed problem.

What more info are interested?

Casper

On 11.07.20 13:35, Holger Schramm wrote:
> Hi,
> 
> i am running Debian Buster with Xen 4.11 on dozens of machines. works 
> like a charm. but i use a custom kernel, because debian kernel is too 
> old for me.
> 
> Don't have any problems with it.
> 
> Could you provide more infos?
> 


From xen-users-bounces@lists.xenproject.org Sun Jul 12 17:26:10 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 12 Jul 2020 17:26:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jufiG-0002nn-SF; Sun, 12 Jul 2020 17:24:28 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Mbu0=AX=gmail.com=marietto2008@srs-us1.protection.inumbo.net>)
 id 1jufiG-0002nh-Cl
 for xen-users@lists.xenproject.org; Sun, 12 Jul 2020 17:24:28 +0000
X-Inumbo-ID: 896a3f9e-c464-11ea-bca7-bc764e2007e4
Received: from mail-wr1-x432.google.com (unknown [2a00:1450:4864:20::432])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 896a3f9e-c464-11ea-bca7-bc764e2007e4;
 Sun, 12 Jul 2020 17:24:27 +0000 (UTC)
Received: by mail-wr1-x432.google.com with SMTP id b6so10986800wrs.11
 for <xen-users@lists.xenproject.org>; Sun, 12 Jul 2020 10:24:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=l8qr0qOfpdqvjmirO6TiuSxNh/VcU7hYfMHxXE9grkI=;
 b=oktN+zhEroSGltYpzxGf1K/hsRTQ4ZG+8Zh7886M2Ad9StFwFqx9qCzLKNwPufp8gF
 XofdIc48/XlDT4HhQvFPWavOOFQ8uOgMKMLJ/9pfcTqJV2nWi6R42UCSeX9VKHh6heUY
 8bNmDMpRFX/aXz2W5qgI72f0PZkITH/fvleTfqKtSZsDhWi2epkyZ9BUpJ9lcVSWJtnD
 c5uaLRNtf9IoyvPGxnxOw0mtlMNGxHlZAhg7uPyBC6FXCqM5WLB5FID5i+Q6ecNvW9WX
 y9FgGula88n+qb1LIlVD7JqrWeIWKdMUFJPlvz/vHzSiSFsKIrGgn9Lse3BGPB/SlYtS
 PmIw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=l8qr0qOfpdqvjmirO6TiuSxNh/VcU7hYfMHxXE9grkI=;
 b=IPTUS3QOlian5y3lbwNlV3RVHnykLgwm3KrMRn+LHjAVJK41eq7veTSWxSegrm4Kme
 UfMt8HYSXTwtiz30MGA6ow/HevBMedb1XLJwVChG+nMXH/57py/Z7/RjwOOpXhDW1KTb
 IcOVM+La9jO/chVwd2gTeiyswUkyOYsG/9AkjqOazc33iOyaIr/+sqozLBgotAjdd2Pz
 l6HQUZNwkAuQzuDmDd+KSNJAnMVO5Ch0SGfiqJOr2PzmJZnxPSNJ3mRlYSiFMCimdtxt
 15Bkt8TmMay30nsaoPyJOFaE8XRxWIVL5jy/4PeTcnatIxwdl/GYrd9mN/yrZU98HvhS
 LYKw==
X-Gm-Message-State: AOAM533dmHYJQcqE0U4j8kmfmLjM+GnclEqPbXGrRBKF1zTaflfBn6kg
 sdCVy39gzJKPq0flncsGzOGjokmQOmsDI42dt4T2yiu3Lf4=
X-Google-Smtp-Source: ABdhPJwUnWDl6ZIWhMJxoJB+QAmgKRDB6mm0D6kMGRf+4E0qz4/21jvxRaX5iEJvDP01CCB8vV7xxPZ4V5Tmfjw42eA=
X-Received: by 2002:a2e:b8ce:: with SMTP id s14mr44492550ljp.89.1594574184821; 
 Sun, 12 Jul 2020 10:16:24 -0700 (PDT)
MIME-Version: 1.0
From: Mario Marietto <marietto2008@gmail.com>
Date: Sun, 12 Jul 2020 19:15:48 +0200
Message-ID: <CA+1FSig8Pit1cx5Cx2Yg9x-x+0ZLf6Uqoc6Eu7=7RdAH7jJw4A@mail.gmail.com>
Subject: vncviewer tells that "guest has not initialized the display (yet)"
 and it is freezed there forever (trying to boot a phisycal installation of
 windows 10 64 bit with the ovmf bios)
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000dab87d05aa41bb99"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000dab87d05aa41bb99
Content-Type: text/plain; charset="UTF-8"

Hello.

I'm a new xen user. I'm learning how works the xen hypervisor that I have
installed on ubuntu 20.04 with the command : apt install xen-hypervisor. I
want to boot the phisycal installation of windows 10 x64 bit that I have on
/dev/sdb,which belong to these partitions :

Disk /dev/sdb: 465,78 GiB, 500107862016 bytes, 976773168 sectors
Disk model: Samsung SSD 860
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt
Disk identifier: 98970711-6557-43CB-86D8-14B5F013ECFD

Dispositivo     Start      Fine   Settori   Size Tipo
/dev/sdb1          34    262177    262144   128M Microsoft reserved
/dev/sdb2      264192   1286143   1021952   499M Windows recovery
environment
/dev/sdb3     1286144   1488895    202752    99M EFI System
/dev/sdb4     1488896 975591423 974102528 464,5G Microsoft basic data
/dev/sdb5   975591424 976773119   1181696   577M Windows recovery
environment

this is the cfg file that I'm using :

builder = 'hvm'
bios='ovmf'
vif = [ 'type=ioemu, bridge=xenbr0' ]
memory = 8192
name = "windows-10" # domain prefix name
disk = [ 'phy:/dev/sdb,ioemu:sdb,w' ]
boot = "c"
vncconsole=1
vfb = [ 'type=vnc,vnclisten=127.0.0.1,vncdisplay=1' ]
vcpus = 6 # number of cpu's to assign
stdvga = 0
serial = 'pty'
usbdevice = 'tablet' # Required for USB mouse
on_poweroff = 'destroy'
on_reboot   = 'destroy'
on_crash    = 'preserve'

device_model_args_hvm = [
  # Debug OVMF
  '-chardev', 'file,id=debugcon,path=/etc/xen/ovmf.log,',
  '-device', 'isa-debugcon,iobase=0x402,chardev=debugcon',
]

I run this script :

#!/bin/bash

sudo /etc/init.d/xencommons start
sudo /etc/init.d/xendomains start
sudo /etc/init.d/xen-watchdog start
sudo /etc/init.d/xendriverdomain start
xl create xenwin.cfg

but vncviewer tells that "guest has not initialized the display (yet)" and
it is freezed there forever. some help ?

-- 
Mario.

--000000000000dab87d05aa41bb99
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hello.</div><div><br></div><div>I&#39;m a new xen use=
r. I&#39;m learning how works the xen hypervisor that I have installed on u=
buntu 20.04 with the command : apt install xen-hypervisor. I want to boot t=
he phisycal installation of windows 10 x64 bit that I have on /dev/sdb,whic=
h belong to these partitions :</div><div><br></div><div>Disk /dev/sdb: 465,=
78 GiB, 500107862016 bytes, 976773168 sectors<br>Disk model: Samsung SSD 86=
0 <br>Units: sectors of 1 * 512 =3D 512 bytes<br>Sector size (logical/physi=
cal): 512 bytes / 512 bytes<br>I/O size (minimum/optimal): 512 bytes / 512 =
bytes<br>Disklabel type: gpt<br>Disk identifier: 98970711-6557-43CB-86D8-14=
B5F013ECFD<br><br>Dispositivo =C2=A0 =C2=A0 Start =C2=A0 =C2=A0 =C2=A0Fine =
=C2=A0 Settori =C2=A0 Size Tipo<br>/dev/sdb1 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A034 =C2=A0 =C2=A0262177 =C2=A0 =C2=A0262144 =C2=A0 128M Microsoft rese=
rved<br>/dev/sdb2 =C2=A0 =C2=A0 =C2=A0264192 =C2=A0 1286143 =C2=A0 1021952 =
=C2=A0 499M Windows recovery environment<br>/dev/sdb3 =C2=A0 =C2=A0 1286144=
 =C2=A0 1488895 =C2=A0 =C2=A0202752 =C2=A0 =C2=A099M EFI System<br>/dev/sdb=
4 =C2=A0 =C2=A0 1488896 975591423 974102528 464,5G Microsoft basic data<br>=
/dev/sdb5 =C2=A0 975591424 976773119 =C2=A0 1181696 =C2=A0 577M Windows rec=
overy environment</div><div><br></div><div>this is the cfg file that I&#39;=
m using :</div><div><br></div><div>builder =3D &#39;hvm&#39;<br>bios=3D&#39=
;ovmf&#39;<br>vif =3D [ &#39;type=3Dioemu, bridge=3Dxenbr0&#39; ]<br>memory=
 =3D 8192<br>name =3D &quot;windows-10&quot; # domain prefix name<br>disk =
=3D [ &#39;phy:/dev/sdb,ioemu:sdb,w&#39; ]<br>boot =3D &quot;c&quot;<br>vnc=
console=3D1<br>vfb =3D [ &#39;type=3Dvnc,vnclisten=3D127.0.0.1,vncdisplay=
=3D1&#39; ]<br>vcpus =3D 6 # number of cpu&#39;s to assign<br>stdvga =3D 0<=
br>serial =3D &#39;pty&#39;<br>usbdevice =3D &#39;tablet&#39; # Required fo=
r USB mouse<br>on_poweroff =3D &#39;destroy&#39;<br>on_reboot =C2=A0 =3D &#=
39;destroy&#39;<br>on_crash =C2=A0 =C2=A0=3D &#39;preserve&#39;<br><br>devi=
ce_model_args_hvm =3D [<br>=C2=A0 # Debug OVMF<br>=C2=A0 &#39;-chardev&#39;=
, &#39;file,id=3Ddebugcon,path=3D/etc/xen/ovmf.log,&#39;,<br>=C2=A0 &#39;-d=
evice&#39;, &#39;isa-debugcon,iobase=3D0x402,chardev=3Ddebugcon&#39;,<br>]<=
/div><div><br></div><div>I run this script :</div><div><br></div><div>#!/bi=
n/bash<br><br>sudo /etc/init.d/xencommons start<br>sudo /etc/init.d/xendoma=
ins start<br>sudo /etc/init.d/xen-watchdog start<br>sudo /etc/init.d/xendri=
verdomain start<br>xl create xenwin.cfg</div><div><br></div><div>but vncvie=
wer tells that &quot;guest has not initialized the display (yet)&quot; and =
it is freezed there forever. some help ?<br></div><div><br>-- <br><div dir=
=3D"ltr" class=3D"gmail_signature" data-smartmail=3D"gmail_signature">Mario=
.<br></div></div></div>

--000000000000dab87d05aa41bb99--


From xen-users-bounces@lists.xenproject.org Sun Jul 12 22:55:16 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 12 Jul 2020 22:55:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jukrE-000477-Qw; Sun, 12 Jul 2020 22:54:04 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QGTq=AX=jppozzi.dyndns.org=jpp@srs-us1.protection.inumbo.net>)
 id 1jukrD-000472-H4
 for xen-users@lists.xenproject.org; Sun, 12 Jul 2020 22:54:03 +0000
X-Inumbo-ID: 9444f854-c492-11ea-b7bb-bc764e2007e4
Received: from mail-by.bbox.fr (unknown [2001:860:e200:0:c000::b])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 9444f854-c492-11ea-b7bb-bc764e2007e4;
 Sun, 12 Jul 2020 22:54:02 +0000 (UTC)
Received: from mail.jppozzi.dyndns.org
 (mer91-h01-176-172-74-140.dsl.sta.abo.bbox.fr [176.172.74.140])
 by mail-by.bbox.fr (Postfix) with ESMTP id 185C635;
 Mon, 13 Jul 2020 00:53:59 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mail.jppozzi.dyndns.org (Postfix) with ESMTP id 7A47C3E00DA;
 Mon, 13 Jul 2020 00:53:59 +0200 (CEST)
Received: from mail.jppozzi.dyndns.org ([127.0.0.1])
 by localhost (mail.jppozzi.dyndns.org [127.0.0.1]) (amavisd-new, port 10032)
 with ESMTP id CEmf7EgWTK1F; Mon, 13 Jul 2020 00:53:59 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mail.jppozzi.dyndns.org (Postfix) with ESMTP id 27F613E04DC;
 Mon, 13 Jul 2020 00:53:59 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.jppozzi.dyndns.org
Received: from mail.jppozzi.dyndns.org ([127.0.0.1])
 by localhost (mail.jppozzi.dyndns.org [127.0.0.1]) (amavisd-new, port 10026)
 with ESMTP id Pxk5iaE9stcw; Mon, 13 Jul 2020 00:53:59 +0200 (CEST)
Received: from mail.jppozzi.dyndns.org (tmail.jpp.fr [192.168.2.21])
 by mail.jppozzi.dyndns.org (Postfix) with ESMTP id 073213E00DC;
 Mon, 13 Jul 2020 00:53:59 +0200 (CEST)
Date: Mon, 13 Jul 2020 00:53:58 +0200 (CEST)
From: JP P <jpp@jppozzi.dyndns.org>
To: Casper <kl@os.lv>
Message-ID: <604094370.487.1594594438720.JavaMail.zimbra@jppozzi.dyndns.org>
In-Reply-To: <e80779ac-520b-c712-954d-86889869f0ed@os.lv>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <6e81f24a-bff7-ce6e-c5d6-3403ddf5d010@schramm.by>
 <e80779ac-520b-c712-954d-86889869f0ed@os.lv>
Subject: Re: Debian 10, xen 4.11 reliability
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [192.168.2.8]
X-Mailer: Zimbra 8.8.15_GA_3955 (ZimbraWebClient - GC79 (Linux)/8.8.15_GA_3953)
Thread-Topic: Debian 10, xen 4.11 reliability
Thread-Index: 0E8vfKcJBYykxgdYv5tiy7c6+MTRrA==
X-VADE-SPAMSTATE: clean
X-VADE-SPAMSCORE: 0
X-VADE-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduiedrvdejgdduiecutefuodetggdotefrodftvfcurfhrohhfihhlvgemuceuqfgfjgfifgfgufdpucfqfgfvpdcuggftfghnshhusghstghrihgsvgenuceurghilhhouhhtmecufedttdenucenucfjughrpeffhffvkfgjfhfugggtgfhiofhtsehtqhgttdertdejnecuhfhrohhmpeflrfcurfcuoehjphhpsehjphhpohiiiihirdguhihnughnshdrohhrgheqnecuggftrfgrthhtvghrnhepuedugeeftdevfeegtdegjeejfeekleefteelhfelteeiieetffejfeehiefhudegnecukfhppedujeeirddujedvrdejgedrudegtddpudelvddrudeikedrvddrkeenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpedujeeirddujedvrdejgedrudegtddphhgvlhhopehmrghilhdrjhhpphhoiiiiihdrugihnhgunhhsrdhorhhgpdhmrghilhhfrhhomheplffrucfruceojhhpphesjhhpphhoiiiiihdrugihnhgunhhsrdhorhhgqedprhgtphhtthhopeigvghnqdhushgvrhhssehlihhsthhsrdigvghnphhrohhjvggtthdrohhrghdprhgtphhtthhopehklhesohhsrdhlvh
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello,

I try with some different kernels :
Debian 5.4, 5.5,=20
"Home made" with some kernels 5.6, 5.7 with no more luck.

Raid disks (RAID 0 here) are never recognized ... and I can't boot with XEN=
,
I had to use KVM to start different virtual machines ...=20
Xen 4.11 is definitely dead for me.

Regards

JP P

----- Mail original -----
De: "Casper" <kl@os.lv>
=C3=80: xen-users@lists.xenproject.org
Envoy=C3=A9: Samedi 11 Juillet 2020 16:25:11
Objet: Re: Debian 10, xen 4.11 reliability

Hi,

I think default Debian kernel with xen not working.
I have updated original Debian 10.4 packages from I think 10.0 - all the=20
same.
Debian 7 works like charm, I will switch to other kernel or, make own=20
custom to test it.
I have md raid with 2-3 discs, tried with raid1 and raid5, it all fails=20
mostly with i/o problem to access some disc, had another issue with=20
e1000e intel driver, but it seems upgrade to latest fixed problem.

What more info are interested?

Casper

On 11.07.20 13:35, Holger Schramm wrote:
> Hi,
>=20
> i am running Debian Buster with Xen 4.11 on dozens of machines. works=20
> like a charm. but i use a custom kernel, because debian kernel is too=20
> old for me.
>=20
> Don't have any problems with it.
>=20
> Could you provide more infos?
>


From xen-users-bounces@lists.xenproject.org Mon Jul 13 17:04:02 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 13 Jul 2020 17:04:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jv1qF-0001Ke-Ku; Mon, 13 Jul 2020 17:02:11 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WSCT=AY=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1jv1qE-0001KZ-Gy
 for xen-users@lists.xenproject.org; Mon, 13 Jul 2020 17:02:10 +0000
X-Inumbo-ID: 95d774ba-c52a-11ea-8496-bc764e2007e4
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 95d774ba-c52a-11ea-8496-bc764e2007e4;
 Mon, 13 Jul 2020 17:02:08 +0000 (UTC)
Received: from [IPv6:2a02:a213:2b80:f000::12] (unknown
 [IPv6:2a02:a213:2b80:f000::12])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id C26D56099A273;
 Mon, 13 Jul 2020 19:02:07 +0200 (CEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: xen-users@lists.xenproject.org, Casper <kl@os.lv>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
From: Hans van Kranenburg <hans@knorrie.org>
Autocrypt: addr=hans@knorrie.org; keydata=
 mQINBFo2pooBEADwTBe/lrCa78zuhVkmpvuN+pXPWHkYs0LuAgJrOsOKhxLkYXn6Pn7e3xm+
 ySfxwtFmqLUMPWujQYF0r5C6DteypL7XvkPP+FPVlQnDIifyEoKq8JZRPsAFt1S87QThYPC3
 mjfluLUKVBP21H3ZFUGjcf+hnJSN9d9MuSQmAvtJiLbRTo5DTZZvO/SuQlmafaEQteaOswme
 DKRcIYj7+FokaW9n90P8agvPZJn50MCKy1D2QZwvw0g2ZMR8yUdtsX6fHTe7Ym+tHIYM3Tsg
 2KKgt17NTxIqyttcAIaVRs4+dnQ23J98iFmVHyT+X2Jou+KpHuULES8562QltmkchA7YxZpT
 mLMZ6TPit+sIocvxFE5dGiT1FMpjM5mOVCNOP+KOup/N7jobCG15haKWtu9k0kPz+trT3NOn
 gZXecYzBmasSJro60O4bwBayG9ILHNn+v/ZLg/jv33X2MV7oYXf+ustwjXnYUqVmjZkdI/pt
 30lcNUxCANvTF861OgvZUR4WoMNK4krXtodBoEImjmT385LATGFt9HnXd1rQ4QzqyMPBk84j
 roX5NpOzNZrNJiUxj+aUQZcINtbpmvskGpJX0RsfhOh2fxfQ39ZP/0a2C59gBQuVCH6C5qsY
 rc1qTIpGdPYT+J1S2rY88AvPpr2JHZbiVqeB3jIlwVSmkYeB/QARAQABtCZIYW5zIHZhbiBL
 cmFuZW5idXJnIDxoYW5zQGtub3JyaWUub3JnPokCTgQTAQoAOBYhBOJv1o/B6NS2GUVGTueB
 VzIYDCpVBQJaNq7KAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEOeBVzIYDCpVgDMQ
 ANSQMebh0Rr6RNhfA+g9CKiCDMGWZvHvvq3BNo9TqAo9BC4neAoVciSmeZXIlN8xVALf6rF8
 lKy8L1omocMcWw7TlvZHBr2gZHKlFYYC34R2NvxS0xO8Iw5rhEU6paYaKzlrvxuXuHMVXgjj
 bM3zBiN8W4b9VW1MoynP9nvm1WaGtFI9GIyK9j6mBCU+N5hpvFtt4DBmuWjzdDkd3sWUufYd
 nQhGimWHEg95GWhQUiFvr4HRvYJpbjRRRQG3O/5Fm0YyTYZkI5CDzQIm5lhqKNqmuf2ENstS
 8KcBImlbwlzEpK9Pa3Z5MUeLZ5Ywwv+d11fyhk53aT9bipdEipvcGa6DrA0DquO4WlQR+RKU
 ywoGTgntwFu8G0+tmD8J1UE6kIzFwE5kiFWjM0rxv1tAgV9ZWqmp3sbI7vzbZXn+KI/wosHV
 iDeW5rYg+PdmnOlYXQIJO+t0KmF5zJlSe7daylKZKTYtk7w1Fq/Oh1Rps9h1C4sXN8OAUO7h
 1SAnEtehHfv52nPxwZiI6eqbvqV0uEEyLFS5pCuuwmPpC8AmOrciY2T8T+4pmkJNO2Nd3jOP
 cnJgAQrxPvD7ACp/85LParnoz5c9/nPHJB1FgbAa7N5d8ubqJgi+k9Q2lAL9vBxK67aZlFZ0
 Kd7u1w1rUlY12KlFWzxpd4TuHZJ8rwi7PUceuQINBFo2sK8BEADSZP5cKnGl2d7CHXdpAzVF
 6K4Hxwn5eHyKC1D/YvsY+otq3PnfLJeMf1hzv2OSrGaEAkGJh/9yXPOkQ+J1OxJJs9CY0fqB
 MvHZ98iTyeFAq+4CwKcnZxLiBchQJQd0dFPujtcoMkWgzp3QdzONdkK4P7+9XfryPECyCSUF
 ib2aEkuU3Ic4LYfsBqGR5hezbJqOs96ExMnYUCEAS5aeejr3xNb8NqZLPqU38SQCTLrAmPAX
 glKVnYyEVxFUV8EXXY6AK31lRzpCqmPxLoyhPAPda9BXchRluy+QOyg+Yn4Q2DSwbgCYPrxo
 HTZKxH+E+JxCMfSW35ZE5ufvAbY3IrfHIhbNnHyxbTRgYMDbTQCDyN9F2Rvx3EButRMApj+v
 OuaMBJF/fWfxL3pSIosG9Q7uPc+qJvVMHMRNnS0Y1QQ5ZPLG0zI5TeHzMnGmSTbcvn/NOxDe
 6EhumcclFS0foHR78l1uOhUItya/48WCJE3FvOS3+KBhYvXCsG84KVsJeen+ieX/8lnSn0d2
 ZvUsj+6wo+d8tcOAP+KGwJ+ElOilqW29QfV4qvqmxnWjDYQWzxU9WGagU3z0diN97zMEO4D8
 SfUu72S5O0o9ATgid9lEzMKdagXP94x5CRvBydWu1E5CTgKZ3YZv+U3QclOG5p9/4+QNbhqH
 W4SaIIg90CFMiwARAQABiQRsBBgBCgAgFiEE4m/Wj8Ho1LYZRUZO54FXMhgMKlUFAlo2sK8C
 GwICQAkQ54FXMhgMKlXBdCAEGQEKAB0WIQRJbJ13A1ob3rfuShiywd9yY2FfbAUCWjawrwAK
 CRCywd9yY2FfbMKbEACIGLdFrD5j8rz/1fm8xWTJlOb3+o5A6fdJ2eyPwr5njJZSG9i5R28c
 dMmcwLtVisfedBUYLaMBmCEHnj7ylOgJi60HE74ZySX055hKECNfmA9Q7eidxta5WeXeTPSb
 PwTQkAgUZ576AO129MKKP4jkEiNENePMuYugCuW7XGR+FCEC2efYlVwDQy24ZfR9Q1dNK2ny
 0gH1c+313l0JcNTKjQ0e7M9KsQSKUr6Tk0VGTFZE2dp+dJF1sxtWhJ6Ci7N1yyj3buFFpD9c
 kj5YQFqBkEwt3OGtYNuLfdwR4d47CEGdQSm52n91n/AKdhRDG5xvvADG0qLGBXdWvbdQFllm
 v47TlJRDc9LmwpIqgtaUGTVjtkhw0SdiwJX+BjhtWTtrQPbseDe2pN3gWte/dPidJWnj8zzS
 ggZ5otY2reSvM+79w/odUlmtaFx+IyFITuFnBVcMF0uGmQBBxssew8rePQejYQHz0bZUDNbD
 VaZiXqP4njzBJu5+nzNxQKzQJ0VDF6ve5K49y0RpT4IjNOupZ+OtlZTQyM7moag+Y6bcJ7KK
 8+MRdRjGFFWP6H/RCSFAfoOGIKTlZHubjgetyQhMwKJQ5KnGDm+XUkeIWyevPfCVPNvqF2q3
 viQm0taFit8L+x7ATpolZuSCat5PSXtgx1liGjBpPKnERxyNLQ/erRNcEACwEJliFbQm+c2i
 6ccpx2cdtyAI1yzWuE0nr9DqpsEbIZzTCIVyry/VZgdJ27YijGJWesj/ie/8PtpDu0Cf1pty
 QOKSpC9WvRCFGJPGS8MmvzepmX2DYQ5MSKTO5tRJZ8EwCFfd9OxX2g280rdcDyCFkY3BYrf9
 ic2PTKQokx+9sLCHAC/+feSx/MA/vYpY1EJwkAr37mP7Q8KA9PCRShJziiljh5tKQeIG4sz1
 QjOrS8WryEwI160jKBBNc/M5n2kiIPCrapBGsL58MumrtbL53VimFOAJaPaRWNSdWCJSnVSv
 kCHMl/1fRgzXEMpEmOlBEY0Kdd1Ut3S2cuwejzI+WbrQLgeps2N70Ztq50PkfWkj0jeethhI
 FqIJzNlUqVkHl1zCWSFsghxiMyZmqULaGcSDItYQ+3c9fxIO/v0zDg7bLeG9Zbj4y8E47xqJ
 6brtAAEJ1RIM42gzF5GW71BqZrbFFoI0C6AzgHjaQP1xfj7nBRSBz4ObqnsuvRr7H6Jme5rl
 eg7COIbm8R7zsFjF4tC6k5HMc1tZ8xX+WoDsurqeQuBOg7rggmhJEpDK2f+g8DsvKtP14Vs0
 Sn7fVJi87b5HZojry1lZB2pXUH90+GWPF7DabimBki4QLzmyJ/ENH8GspFulVR3U7r3YYQ5K
 ctOSoRq9pGmMi231Q+xx9LkCDQRaOtArARAA50ylThKbq0ACHyomxjQ6nFNxa9ICp6byU9Lh
 hKOax0GB6l4WebMsQLhVGRQ8H7DT84E7QLRYsidEbneB1ciToZkL5YFFaVxY0Hj1wKxCFcVo
 CRNtOfoPnHQ5m/eDLaO4o0KKL/kaxZwTn2jnl6BQDGX1Aak0u4KiUlFtoWn/E/NIv5QbTGSw
 IYuzWqqYBIzFtDbiQRvGw0NuKxAGMhwXy8VP05mmNwRdyh/CC4rWQPBTvTeMwr3nl8/G+16/
 cn4RNGhDiGTTXcX03qzZ5jZ5N7GLY5JtE6pTpLG+EXn5pAnQ7MvuO19cCbp6Dj8fXRmI0SVX
 WKSo0A2C8xH6KLCRfUMzD7nvDRU+bAHQmbi5cZBODBZ5yp5CfIL1KUCSoiGOMpMin3FrarIl
 cxhNtoE+ya23A+JVtOwtM53ESra9cJL4WPkyk/E3OvNDmh8U6iZXn4ZaKQTHaxN9yvmAUhZQ
 iQi/sABwxCcQQ2ydRb86Vjcbx+FUr5OoEyQS46gc3KN5yax9D3H9wrptOzkNNMUhFj0oK0fX
 /MYDWOFeuNBTYk1uFRJDmHAOp01rrMHRogQAkMBuJDMrMHfolivZw8RKfdPzgiI500okLTzH
 C0wgSSAOyHKGZjYjbEwmxsl3sLJck9IPOKvqQi1DkvpOPFSUeX3LPBIav5UUlXt0wjbzInUA
 EQEAAYkCNgQYAQoAIBYhBOJv1o/B6NS2GUVGTueBVzIYDCpVBQJaOtArAhsMAAoJEOeBVzIY
 DCpV4kgP+wUh3BDRhuKaZyianKroStgr+LM8FIUwQs3Fc8qKrcDaa35vdT9cocDZjkaGHprp
 mlN0OuT2PB+Djt7am2noV6Kv1C8EnCPpyDBCwa7DntGdGcGMjH9w6aR4/ruNRUGS1aSMw8sR
 QgpTVWEyzHlnIH92D+k+IhdNG+eJ6o1fc7MeC0gUwMt27Im+TxVxc0JRfniNk8PUAg4kvJq7
 z7NLBUcJsIh3hM0WHQH9AYe/mZhQq5oyZTsz4jo/dWFRSlpY7zrDS2TZNYt4cCfZj1bIdpbf
 SpRi9M3W/yBF2WOkwYgbkqGnTUvr+3r0LMCH2H7nzENrYxNY2kFmDX9bBvOWsWpcMdOEo99/
 Iayz5/q2d1rVjYVFRm5U9hG+C7BYvtUOnUvSEBeE4tnJBMakbJPYxWe61yANDQubPsINB10i
 ngzsm553yqEjLTuWOjzdHLpE4lzD416ExCoZy7RLEHNhM1YQSI2RNs8umlDfZM9Lek1+1kgB
 vT3RH0/CpPJgveWV5xDOKuhD8j5l7FME+t2RWP+gyLid6dE0C7J03ir90PlTEkMEHEzyJMPt
 OhO05Phy+d51WPTo1VSKxhL4bsWddHLfQoXW8RQ388Q69JG4m+JhNH/XvWe3aQFpYP+GZuzO
 hkMez0lHCaVOOLBSKHkAHh9i0/pH+/3hfEa4NsoHCpyy
Message-ID: <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
Date: Mon, 13 Jul 2020 19:02:07 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi Casper,

On 7/9/20 10:45 AM, Casper wrote:
> 
> I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with 
> Xen 4.1.4 on some servers still work very reliable with no problems, 
> only wanted to change new hard discs pushed me to install new Debian 10 
> with Xen packages to newer version.
> 
> Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen 
> 4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now 
> it repeats in old reliable servers too. My config is I have 2-3 hard 
> discs per server node and RAID1 with sw md raid, it crashes with md lost 
> access for disc. After reboot all works as it should.
> 
> I tested different HW and discs, all the same problems.
> Loads are no big, just few testing DomU nodes.
> Any suggestion? I`m currently running latest Debian kernel 4.19 was 
> thinking to downgrade to test different kernel.
> Or problem with Debian Xen package as it not so popular anymore?
> Any suggestion what to test to figure out problem?

The first suggestion is, like Sarah also mentions, capturing logging,
and providing that. Also, all details possible, do not leave out minor
things that you think "this for sure won't cause it" about. Even your
raid controller type.

Does the entire machine crash? Or does only a virtual machine crash? Are
the domUs also Debian Buster?

If something crashes, can you still login to the dom0? Can you do dmesg
and xl dmesg there?

If a domU crashes, then enable logging of the xen console to log files
on the dom0. Also look at xl dmesg to see if there's anything added
while it happens, pointing at Xen choosing to destroy the domU when it's
trying to do something that's absolutely not allowed.

If it completely crashes, then you need a serial console to capture
whatever it tries to tell you in the last breath, because, otherwise
it's invisible.

Use loglvl=all and guest_loglvl=all on the hypervisor command line
(GRUB_CMDLINE_XEN_DEFAULT in /etc/default/grub.d/xen.cfg).

Also, at least update to newest xen and kernel packages in Buster.
That's 4.11.4+24-gddaaccbbab-1~deb10u1 for Xen and 4.19.118-2+deb10u1
for Linux.

When only saying 'it does not work', nobody can help you.

Hans


From xen-users-bounces@lists.xenproject.org Mon Jul 13 23:44:41 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 13 Jul 2020 23:44:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jv86f-0001CR-8N; Mon, 13 Jul 2020 23:43:33 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=prJl=AY=websitemanagers.com.au=mailinglists@srs-us1.protection.inumbo.net>)
 id 1jv86d-0001CM-OR
 for xen-users@lists.xenproject.org; Mon, 13 Jul 2020 23:43:31 +0000
X-Inumbo-ID: a52e069e-c562-11ea-92c0-12813bfff9fa
Received: from hammer.websitemanagers.com.au (unknown [59.100.172.130])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id a52e069e-c562-11ea-92c0-12813bfff9fa;
 Mon, 13 Jul 2020 23:43:27 +0000 (UTC)
Received: (qmail 31363 invoked by uid 1011); 13 Jul 2020 23:16:44 -0000
Received: from 192.168.5.112 by hammer (envelope-from
 <mailinglists@websitemanagers.com.au>, uid 1008) with qmail-scanner-1.24 
 (clamdscan: 0.102.1/25872. spamassassin: 3.4.2.  
 Clear:RC:1(192.168.5.112):. 
 Processed in 0.040442 secs); 13 Jul 2020 23:16:44 -0000
Received: from unknown (HELO ADAM-MBP.local)
 (adamg+websitemanagers.com.au@192.168.5.112)
 by 0 with ESMTPA; 13 Jul 2020 23:16:44 -0000
Subject: Re: Debian 10, xen 4.11 reliability
To: xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
From: Adam Goryachev <mailinglists@websitemanagers.com.au>
Organization: Website Managers
Message-ID: <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
Date: Tue, 14 Jul 2020 09:16:44 +1000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0)
 Gecko/20100101 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


On 14/7/20 03:02, Hans van Kranenburg wrote:
> Hi Casper,
>
> On 7/9/20 10:45 AM, Casper wrote:
>> I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with
>> Xen 4.1.4 on some servers still work very reliable with no problems,
>> only wanted to change new hard discs pushed me to install new Debian 10
>> with Xen packages to newer version.
>>
>> Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen
>> 4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now
>> it repeats in old reliable servers too. My config is I have 2-3 hard
>> discs per server node and RAID1 with sw md raid, it crashes with md lost
>> access for disc. After reboot all works as it should.
>>
>> I tested different HW and discs, all the same problems.
>> Loads are no big, just few testing DomU nodes.
>> Any suggestion? I`m currently running latest Debian kernel 4.19 was
>> thinking to downgrade to test different kernel.
>> Or problem with Debian Xen package as it not so popular anymore?
>> Any suggestion what to test to figure out problem?

BTW, I don't think is a general rule that Debian 10.4 with packages Xen 
4.11 doesn't work. I have a couple of Debian 11 boxes running multiple 
DomU's and they are working well:

ii  libxencall1:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xen 
runtime library - libxencall
ii  libxendevicemodel1:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         
Xen runtime libraries - libxendevicemodel
ii  libxenevtchn1:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xen 
runtime libraries - libxenevtchn
ii  libxenforeignmemory1:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 
i386         Xen runtime libraries - libxenforeignmemory
ii  libxengnttab1:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xen 
runtime libraries - libxengnttab
ii  libxenmisc4.11:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xen 
runtime libraries - miscellaneous, versioned ABI
ii  libxenstore3.0:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xen 
runtime libraries - libxenstore
ii  libxentoolcore1:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         
Xen runtime libraries - libxentoolcore
ii  libxentoollog1:i386 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xen 
runtime libraries - libxentoollog
ii  xen-hypervisor-4.11-amd64 4.11.3+24-g14b62ab3e5-1~deb10u1 
i386         Xen Hypervisor on AMD64
ii  xen-hypervisor-common 4.11.3+24-g14b62ab3e5-1~deb10u1 all          
Xen Hypervisor - common files
ii  xen-utils-4.11 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         XEN 
administrative tools
ii  xen-utils-common 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xen 
administrative tools - common files
ii  xenstore-utils 4.11.3+24-g14b62ab3e5-1~deb10u1 i386         Xenstore 
command line utilities for Xen

Linux flail 4.19.0-9-686-pae #1 SMP Debian 4.19.118-2+deb10u1 
(2020-06-07) i686 GNU/Linux

  09:15:19 up 29 days, 12:56,  2 users,  load average: 0.23, 0.19, 0.18

(This machine was only recently updated, hence a recent reboot, but 
almost a month seems a lot longer than what is being complained about here)

So, YMMV, but I think you will definitely need to provide more detailed 
information on what happens if you are even slightly interested in 
finding and fixing the cause.

Regards,
Adam



From xen-users-bounces@lists.xenproject.org Tue Jul 14 09:03:30 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 14 Jul 2020 09:03:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jvGo0-0008NE-NR; Tue, 14 Jul 2020 09:00:52 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=mHOE=AZ=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1jvGnz-0008N9-4e
 for xen-users@lists.xenproject.org; Tue, 14 Jul 2020 09:00:51 +0000
X-Inumbo-ID: 82e71514-c5b0-11ea-8496-bc764e2007e4
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 82e71514-c5b0-11ea-8496-bc764e2007e4;
 Tue, 14 Jul 2020 09:00:49 +0000 (UTC)
Received: from [IPv6:2a02:a213:2b80:f000::12] (unknown
 [IPv6:2a02:a213:2b80:f000::12])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 7CB7F6099B656;
 Tue, 14 Jul 2020 11:00:48 +0200 (CEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: Adam Goryachev <mailinglists@websitemanagers.com.au>,
 xen-users@lists.xenproject.org, Casper <kl@os.lv>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
From: Hans van Kranenburg <hans@knorrie.org>
Autocrypt: addr=hans@knorrie.org; keydata=
 mQINBFo2pooBEADwTBe/lrCa78zuhVkmpvuN+pXPWHkYs0LuAgJrOsOKhxLkYXn6Pn7e3xm+
 ySfxwtFmqLUMPWujQYF0r5C6DteypL7XvkPP+FPVlQnDIifyEoKq8JZRPsAFt1S87QThYPC3
 mjfluLUKVBP21H3ZFUGjcf+hnJSN9d9MuSQmAvtJiLbRTo5DTZZvO/SuQlmafaEQteaOswme
 DKRcIYj7+FokaW9n90P8agvPZJn50MCKy1D2QZwvw0g2ZMR8yUdtsX6fHTe7Ym+tHIYM3Tsg
 2KKgt17NTxIqyttcAIaVRs4+dnQ23J98iFmVHyT+X2Jou+KpHuULES8562QltmkchA7YxZpT
 mLMZ6TPit+sIocvxFE5dGiT1FMpjM5mOVCNOP+KOup/N7jobCG15haKWtu9k0kPz+trT3NOn
 gZXecYzBmasSJro60O4bwBayG9ILHNn+v/ZLg/jv33X2MV7oYXf+ustwjXnYUqVmjZkdI/pt
 30lcNUxCANvTF861OgvZUR4WoMNK4krXtodBoEImjmT385LATGFt9HnXd1rQ4QzqyMPBk84j
 roX5NpOzNZrNJiUxj+aUQZcINtbpmvskGpJX0RsfhOh2fxfQ39ZP/0a2C59gBQuVCH6C5qsY
 rc1qTIpGdPYT+J1S2rY88AvPpr2JHZbiVqeB3jIlwVSmkYeB/QARAQABtCZIYW5zIHZhbiBL
 cmFuZW5idXJnIDxoYW5zQGtub3JyaWUub3JnPokCTgQTAQoAOBYhBOJv1o/B6NS2GUVGTueB
 VzIYDCpVBQJaNq7KAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEOeBVzIYDCpVgDMQ
 ANSQMebh0Rr6RNhfA+g9CKiCDMGWZvHvvq3BNo9TqAo9BC4neAoVciSmeZXIlN8xVALf6rF8
 lKy8L1omocMcWw7TlvZHBr2gZHKlFYYC34R2NvxS0xO8Iw5rhEU6paYaKzlrvxuXuHMVXgjj
 bM3zBiN8W4b9VW1MoynP9nvm1WaGtFI9GIyK9j6mBCU+N5hpvFtt4DBmuWjzdDkd3sWUufYd
 nQhGimWHEg95GWhQUiFvr4HRvYJpbjRRRQG3O/5Fm0YyTYZkI5CDzQIm5lhqKNqmuf2ENstS
 8KcBImlbwlzEpK9Pa3Z5MUeLZ5Ywwv+d11fyhk53aT9bipdEipvcGa6DrA0DquO4WlQR+RKU
 ywoGTgntwFu8G0+tmD8J1UE6kIzFwE5kiFWjM0rxv1tAgV9ZWqmp3sbI7vzbZXn+KI/wosHV
 iDeW5rYg+PdmnOlYXQIJO+t0KmF5zJlSe7daylKZKTYtk7w1Fq/Oh1Rps9h1C4sXN8OAUO7h
 1SAnEtehHfv52nPxwZiI6eqbvqV0uEEyLFS5pCuuwmPpC8AmOrciY2T8T+4pmkJNO2Nd3jOP
 cnJgAQrxPvD7ACp/85LParnoz5c9/nPHJB1FgbAa7N5d8ubqJgi+k9Q2lAL9vBxK67aZlFZ0
 Kd7u1w1rUlY12KlFWzxpd4TuHZJ8rwi7PUceuQINBFo2sK8BEADSZP5cKnGl2d7CHXdpAzVF
 6K4Hxwn5eHyKC1D/YvsY+otq3PnfLJeMf1hzv2OSrGaEAkGJh/9yXPOkQ+J1OxJJs9CY0fqB
 MvHZ98iTyeFAq+4CwKcnZxLiBchQJQd0dFPujtcoMkWgzp3QdzONdkK4P7+9XfryPECyCSUF
 ib2aEkuU3Ic4LYfsBqGR5hezbJqOs96ExMnYUCEAS5aeejr3xNb8NqZLPqU38SQCTLrAmPAX
 glKVnYyEVxFUV8EXXY6AK31lRzpCqmPxLoyhPAPda9BXchRluy+QOyg+Yn4Q2DSwbgCYPrxo
 HTZKxH+E+JxCMfSW35ZE5ufvAbY3IrfHIhbNnHyxbTRgYMDbTQCDyN9F2Rvx3EButRMApj+v
 OuaMBJF/fWfxL3pSIosG9Q7uPc+qJvVMHMRNnS0Y1QQ5ZPLG0zI5TeHzMnGmSTbcvn/NOxDe
 6EhumcclFS0foHR78l1uOhUItya/48WCJE3FvOS3+KBhYvXCsG84KVsJeen+ieX/8lnSn0d2
 ZvUsj+6wo+d8tcOAP+KGwJ+ElOilqW29QfV4qvqmxnWjDYQWzxU9WGagU3z0diN97zMEO4D8
 SfUu72S5O0o9ATgid9lEzMKdagXP94x5CRvBydWu1E5CTgKZ3YZv+U3QclOG5p9/4+QNbhqH
 W4SaIIg90CFMiwARAQABiQRsBBgBCgAgFiEE4m/Wj8Ho1LYZRUZO54FXMhgMKlUFAlo2sK8C
 GwICQAkQ54FXMhgMKlXBdCAEGQEKAB0WIQRJbJ13A1ob3rfuShiywd9yY2FfbAUCWjawrwAK
 CRCywd9yY2FfbMKbEACIGLdFrD5j8rz/1fm8xWTJlOb3+o5A6fdJ2eyPwr5njJZSG9i5R28c
 dMmcwLtVisfedBUYLaMBmCEHnj7ylOgJi60HE74ZySX055hKECNfmA9Q7eidxta5WeXeTPSb
 PwTQkAgUZ576AO129MKKP4jkEiNENePMuYugCuW7XGR+FCEC2efYlVwDQy24ZfR9Q1dNK2ny
 0gH1c+313l0JcNTKjQ0e7M9KsQSKUr6Tk0VGTFZE2dp+dJF1sxtWhJ6Ci7N1yyj3buFFpD9c
 kj5YQFqBkEwt3OGtYNuLfdwR4d47CEGdQSm52n91n/AKdhRDG5xvvADG0qLGBXdWvbdQFllm
 v47TlJRDc9LmwpIqgtaUGTVjtkhw0SdiwJX+BjhtWTtrQPbseDe2pN3gWte/dPidJWnj8zzS
 ggZ5otY2reSvM+79w/odUlmtaFx+IyFITuFnBVcMF0uGmQBBxssew8rePQejYQHz0bZUDNbD
 VaZiXqP4njzBJu5+nzNxQKzQJ0VDF6ve5K49y0RpT4IjNOupZ+OtlZTQyM7moag+Y6bcJ7KK
 8+MRdRjGFFWP6H/RCSFAfoOGIKTlZHubjgetyQhMwKJQ5KnGDm+XUkeIWyevPfCVPNvqF2q3
 viQm0taFit8L+x7ATpolZuSCat5PSXtgx1liGjBpPKnERxyNLQ/erRNcEACwEJliFbQm+c2i
 6ccpx2cdtyAI1yzWuE0nr9DqpsEbIZzTCIVyry/VZgdJ27YijGJWesj/ie/8PtpDu0Cf1pty
 QOKSpC9WvRCFGJPGS8MmvzepmX2DYQ5MSKTO5tRJZ8EwCFfd9OxX2g280rdcDyCFkY3BYrf9
 ic2PTKQokx+9sLCHAC/+feSx/MA/vYpY1EJwkAr37mP7Q8KA9PCRShJziiljh5tKQeIG4sz1
 QjOrS8WryEwI160jKBBNc/M5n2kiIPCrapBGsL58MumrtbL53VimFOAJaPaRWNSdWCJSnVSv
 kCHMl/1fRgzXEMpEmOlBEY0Kdd1Ut3S2cuwejzI+WbrQLgeps2N70Ztq50PkfWkj0jeethhI
 FqIJzNlUqVkHl1zCWSFsghxiMyZmqULaGcSDItYQ+3c9fxIO/v0zDg7bLeG9Zbj4y8E47xqJ
 6brtAAEJ1RIM42gzF5GW71BqZrbFFoI0C6AzgHjaQP1xfj7nBRSBz4ObqnsuvRr7H6Jme5rl
 eg7COIbm8R7zsFjF4tC6k5HMc1tZ8xX+WoDsurqeQuBOg7rggmhJEpDK2f+g8DsvKtP14Vs0
 Sn7fVJi87b5HZojry1lZB2pXUH90+GWPF7DabimBki4QLzmyJ/ENH8GspFulVR3U7r3YYQ5K
 ctOSoRq9pGmMi231Q+xx9LkCDQRaOtArARAA50ylThKbq0ACHyomxjQ6nFNxa9ICp6byU9Lh
 hKOax0GB6l4WebMsQLhVGRQ8H7DT84E7QLRYsidEbneB1ciToZkL5YFFaVxY0Hj1wKxCFcVo
 CRNtOfoPnHQ5m/eDLaO4o0KKL/kaxZwTn2jnl6BQDGX1Aak0u4KiUlFtoWn/E/NIv5QbTGSw
 IYuzWqqYBIzFtDbiQRvGw0NuKxAGMhwXy8VP05mmNwRdyh/CC4rWQPBTvTeMwr3nl8/G+16/
 cn4RNGhDiGTTXcX03qzZ5jZ5N7GLY5JtE6pTpLG+EXn5pAnQ7MvuO19cCbp6Dj8fXRmI0SVX
 WKSo0A2C8xH6KLCRfUMzD7nvDRU+bAHQmbi5cZBODBZ5yp5CfIL1KUCSoiGOMpMin3FrarIl
 cxhNtoE+ya23A+JVtOwtM53ESra9cJL4WPkyk/E3OvNDmh8U6iZXn4ZaKQTHaxN9yvmAUhZQ
 iQi/sABwxCcQQ2ydRb86Vjcbx+FUr5OoEyQS46gc3KN5yax9D3H9wrptOzkNNMUhFj0oK0fX
 /MYDWOFeuNBTYk1uFRJDmHAOp01rrMHRogQAkMBuJDMrMHfolivZw8RKfdPzgiI500okLTzH
 C0wgSSAOyHKGZjYjbEwmxsl3sLJck9IPOKvqQi1DkvpOPFSUeX3LPBIav5UUlXt0wjbzInUA
 EQEAAYkCNgQYAQoAIBYhBOJv1o/B6NS2GUVGTueBVzIYDCpVBQJaOtArAhsMAAoJEOeBVzIY
 DCpV4kgP+wUh3BDRhuKaZyianKroStgr+LM8FIUwQs3Fc8qKrcDaa35vdT9cocDZjkaGHprp
 mlN0OuT2PB+Djt7am2noV6Kv1C8EnCPpyDBCwa7DntGdGcGMjH9w6aR4/ruNRUGS1aSMw8sR
 QgpTVWEyzHlnIH92D+k+IhdNG+eJ6o1fc7MeC0gUwMt27Im+TxVxc0JRfniNk8PUAg4kvJq7
 z7NLBUcJsIh3hM0WHQH9AYe/mZhQq5oyZTsz4jo/dWFRSlpY7zrDS2TZNYt4cCfZj1bIdpbf
 SpRi9M3W/yBF2WOkwYgbkqGnTUvr+3r0LMCH2H7nzENrYxNY2kFmDX9bBvOWsWpcMdOEo99/
 Iayz5/q2d1rVjYVFRm5U9hG+C7BYvtUOnUvSEBeE4tnJBMakbJPYxWe61yANDQubPsINB10i
 ngzsm553yqEjLTuWOjzdHLpE4lzD416ExCoZy7RLEHNhM1YQSI2RNs8umlDfZM9Lek1+1kgB
 vT3RH0/CpPJgveWV5xDOKuhD8j5l7FME+t2RWP+gyLid6dE0C7J03ir90PlTEkMEHEzyJMPt
 OhO05Phy+d51WPTo1VSKxhL4bsWddHLfQoXW8RQ388Q69JG4m+JhNH/XvWe3aQFpYP+GZuzO
 hkMez0lHCaVOOLBSKHkAHh9i0/pH+/3hfEa4NsoHCpyy
Message-ID: <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
Date: Tue, 14 Jul 2020 11:00:48 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 7/14/20 1:16 AM, Adam Goryachev wrote:
> 
> On 14/7/20 03:02, Hans van Kranenburg wrote:
>> Hi Casper,
>>
>> On 7/9/20 10:45 AM, Casper wrote:
>>> [...]
>>> Or problem with Debian Xen package as it not so popular anymore?
>>> Any suggestion what to test to figure out problem?
> 
> BTW, I don't think is a general rule that Debian 10.4 with packages Xen 
> 4.11 doesn't work.

True. It just works (tm), until you have some edge case hardware that
misbehaves, or you run into an edge case bug with a very specific
combination of non-default configuration here and there (or when you try
to use EFI, cough).

So, to add to the list:
* Run latest BIOS / cpu microcode that is available.
* Other firmware, e.g. for raid controller or whatever?
* Is the box using ECC memory? I mean, even a memory module that flips a
bit now and then can crash a server every few weeks... Run a memtest or
7zip benchmark or what was the thing that's very good at exposing memory
errors...

Also, feel free to open a bug report in the Debian bug tracker, we're
willing to help, but expect that you have to do the work to gather all
info. I don't have a similar piece of hardware lying around here... What
distro package maintainers can do is help users to gather enough info to
have a good report that doesn't waste too much time of the upstream
developers.

Hans (also member of Debian Xen team)

P.S. About the EFI thing, apparently that often does not work, testers
wanted to figure out in what cases, and how to make it work!


From xen-users-bounces@lists.xenproject.org Tue Jul 14 14:44:27 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 14 Jul 2020 14:44:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jvM8z-0004pn-2g; Tue, 14 Jul 2020 14:42:53 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LIhA=AZ=gmail.com=hydrapolic@srs-us1.protection.inumbo.net>)
 id 1jvM8x-0004pi-Qy
 for xen-users@lists.xenproject.org; Tue, 14 Jul 2020 14:42:51 +0000
X-Inumbo-ID: 4b0b210a-c5e0-11ea-8496-bc764e2007e4
Received: from mail-qk1-x741.google.com (unknown [2607:f8b0:4864:20::741])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 4b0b210a-c5e0-11ea-8496-bc764e2007e4;
 Tue, 14 Jul 2020 14:42:51 +0000 (UTC)
Received: by mail-qk1-x741.google.com with SMTP id e13so15780585qkg.5
 for <xen-users@lists.xenproject.org>; Tue, 14 Jul 2020 07:42:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :cc; bh=oNzd+sJABJQJ4mqf44kBQQVMB6rZdhkTnyVni+C8tV8=;
 b=t5a8pFeEKHS7gz7hs3RFL0XqndzyEKdqlqx3ET/3tr5LTs6YDcE+Rh87ShDmtNUihs
 MVKFsChj0J3c+yFc0G72TyX/BWZMkYozL0L11ebCniuD50vDAS4JguZR77jCd1cwgQ8d
 CNMUSDT4B/RYm6FcVlm1hiQlp7kZi7/rNOx0+T2tGQ+WFkWp3y6DykD78+iMeP0RH8fM
 zhfmjmDNS3XEzEfutvXWpb4Ig5FOQK2hYxHvZL/YjWoG107yMziOHOKbGWqcNzth+3aC
 hCViOn6YkaEiGvJN6m7/jc86BuAh0uo99eeleGbN5HA/T10NLxhnD5WLFtMotBoELPWR
 MPMQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:in-reply-to:references:from:date
 :message-id:subject:to:cc;
 bh=oNzd+sJABJQJ4mqf44kBQQVMB6rZdhkTnyVni+C8tV8=;
 b=Glngvn7b9RniO4cz8tJiECPCXIldFe7j69vXFjnRKlLm26zHbjmMnWCUbpGfGlSdaz
 DNY/y6Ufyiv6M4VmrMa5SDwNN2beI3KF7wfwtxPVLDK+AL2AziqyVgpUADYjvYO2MYKy
 FSXyAgPbJ0aFU3E+EkzyMIB+pRUMa79WP4Ina03q4EtSharcTUy04ncnufajzsrSsYWS
 XSiraDkxCQ8W5MwGzW+yr4/JwmXss9IrbDbCm7AOMbLoiCenmEJYztYCUVAwiRYC2Zp+
 SVwe4LeC5njKrbUZZCtH3HiyGTptnkvf4aAPZ5sVhCgvYtEaTAGQntsinXgMbKxHlGxj
 LR6w==
X-Gm-Message-State: AOAM532umFls+dCQhkYsSTdaWzsTaiVbqj3/KXrEYzvVouKSlcvxSSoC
 pwXxCSiT3R7o13us7PqgjbhXWj3hDevSttrIUri8/ebe
X-Google-Smtp-Source: ABdhPJxBjJfTx1E0rNyOeazrGGRt5kCYnfLf1VXgIjucL2T8zKxTkppNgnXc2tk88zwPh9uyIyHz0wOIh53Dipo+xKk=
X-Received: by 2002:a37:a55:: with SMTP id 82mr4596484qkk.294.1594737770606;
 Tue, 14 Jul 2020 07:42:50 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac8:6795:0:0:0:0:0 with HTTP; Tue, 14 Jul 2020 07:42:50
 -0700 (PDT)
In-Reply-To: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
From: Tomas Mozes <hydrapolic@gmail.com>
Date: Tue, 14 Jul 2020 16:42:50 +0200
Message-ID: <CAG6MAzQbCCyxp42ZgFXNgWtyeh_nex9Q7tiP_Ts0h0hCHh0gsg@mail.gmail.com>
Subject: Re: Debian 10, xen 4.11 reliability
To: Casper <kl@os.lv>
Content-Type: multipart/alternative; boundary="00000000000053b31705aa67d24e"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000053b31705aa67d24e
Content-Type: text/plain; charset="UTF-8"

On Thursday, July 9, 2020, Casper <kl@os.lv> wrote:
> Hello,
>
> I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel with
Xen 4.1.4 on some servers still work very reliable with no problems, only
wanted to change new hard discs pushed me to install new Debian 10 with Xen
packages to newer version.
>
> Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen
4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, but now it
repeats in old reliable servers too. My config is I have 2-3 hard discs per
server node and RAID1 with sw md raid, it crashes with md lost access for
disc. After reboot all works as it should.
>
> I tested different HW and discs, all the same problems.
> Loads are no big, just few testing DomU nodes.
> Any suggestion? I`m currently running latest Debian kernel 4.19 was
thinking to downgrade to test different kernel.
> Or problem with Debian Xen package as it not so popular anymore?
> Any suggestion what to test to figure out problem?
>
> Sincerely,
> Casper
>
>

Just a blind shoot - which scheduler are you using? If credit2, try credit
legacy.

https://wiki.gentoo.org/wiki/Xen#Xen_domU_hanging_with_Xen_4.12.2B

--00000000000053b31705aa67d24e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<br><br>On Thursday, July 9, 2020, Casper &lt;<a href=3D"mailto:kl@os.lv">k=
l@os.lv</a>&gt; wrote:<br>&gt; Hello,<br>&gt;<br>&gt; I have used Debian/Xe=
n dom0 for many years, Debian 7, 3.2.41 kernel with Xen 4.1.4 on some serve=
rs still work very reliable with no problems, only wanted to change new har=
d discs pushed me to install new Debian 10 with Xen packages to newer versi=
on.<br>&gt;<br>&gt; Where I reinstall Debian 10, latest 4.19 kernel it come=
s with Xen 4.11.4-pre all crashes in 1-2weeks. In start I was blaming HW, b=
ut now it repeats in old reliable servers too. My config is I have 2-3 hard=
 discs per server node and RAID1 with sw md raid, it crashes with md lost a=
ccess for disc. After reboot all works as it should.<br>&gt;<br>&gt; I test=
ed different HW and discs, all the same problems.<br>&gt; Loads are no big,=
 just few testing DomU nodes.<br>&gt; Any suggestion? I`m currently running=
 latest Debian kernel 4.19 was thinking to downgrade to test different kern=
el.<br>&gt; Or problem with Debian Xen package as it not so popular anymore=
?<br>&gt; Any suggestion what to test to figure out problem?<br>&gt;<br>&gt=
; Sincerely,<br>&gt; Casper<br>&gt;<br>&gt;<br><br>Just a blind shoot - whi=
ch scheduler are you using? If credit2, try credit legacy.<br><br><a href=
=3D"https://wiki.gentoo.org/wiki/Xen#Xen_domU_hanging_with_Xen_4.12.2B">htt=
ps://wiki.gentoo.org/wiki/Xen#Xen_domU_hanging_with_Xen_4.12.2B</a>

--00000000000053b31705aa67d24e--


From xen-users-bounces@lists.xenproject.org Tue Jul 14 16:04:20 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 14 Jul 2020 16:04:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jvNOk-00042x-6J; Tue, 14 Jul 2020 16:03:14 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XCFF=AZ=gmail.com=nick.calvert@srs-us1.protection.inumbo.net>)
 id 1jvNOi-00042s-KW
 for xen-users@lists.xenproject.org; Tue, 14 Jul 2020 16:03:12 +0000
X-Inumbo-ID: 8448fb6c-c5eb-11ea-8496-bc764e2007e4
Received: from mail-il1-x144.google.com (unknown [2607:f8b0:4864:20::144])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 8448fb6c-c5eb-11ea-8496-bc764e2007e4;
 Tue, 14 Jul 2020 16:03:11 +0000 (UTC)
Received: by mail-il1-x144.google.com with SMTP id k6so14636991ili.6
 for <xen-users@lists.xenproject.org>; Tue, 14 Jul 2020 09:03:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc:content-transfer-encoding;
 bh=9hCIW3aH5kyIpF0jnm3ngs1AcK4Vn+eVsaj+3bhjkEk=;
 b=by/6ejqSu6uQHLNnKQWaYu8jzADSgmEhlsaA9maz+cuASzoo7aoJyN/k9FHOPLkmK9
 fNqJG/qg8SQcIriy5+5M+V5FhuJeBKQN0C+pLoFeDc6g/FHR4ait8Zc2ntoh6pve76XE
 fau51dtGoyC9BKQuvK9bGzf89UDbcoSKzwspXM9oPXmKuqKMf4/P0Bbwc69oNkSmzGR7
 x0/vEdNa5e1AF2IT/H9n6Vd5WX9mNsKL1fEUMtA7kowBOrru6hDlT7JuQ80stEh6AECC
 Gr5hDIXk0qRQS7Dn2WsXHRFui6KuTb+Rmk/niI9Li3ceU67b1DihoefUWvHM5JBZA7q2
 O7KQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc:content-transfer-encoding;
 bh=9hCIW3aH5kyIpF0jnm3ngs1AcK4Vn+eVsaj+3bhjkEk=;
 b=c0V/rejXuRbnYwXtpKerZr4slzWHBXerhS27JxqAWjnPMQke7gPTICpYygP7Q7DLzP
 aRuarOLdUqcYXyOEPKNvpH+QgKlWa376W5/Z1ppUvi+5NsDR2E+ebfd9ZOpeSTDafnhF
 aE/LpWHbSizMfvDUBkM3Ktz7wrROrkr1nUy+sxjitdjxplpb/5ju2Yas8mBljOFUQ/vi
 xQrkxtzDsSTLRnUIyg/ZvYUmddIJFqtlIqFfTl7D0Cq+cg/JUZaROG+JtbB8guXRlg0c
 x4dUeiwdAiN02YkkPuywg7nZE+ghVdxONoFCXuiIJri3Toc9zluPMi/dDxEpvzkmiIDL
 hNAw==
X-Gm-Message-State: AOAM533k5DpLCgAI+j7m8QOKyOVndxYrYTnMbRPEun7q+OckJ/Fa7fnS
 rdHpB5g44b+C+O1kdunnH3ZRDtu3Zphgxzhqmgc=
X-Google-Smtp-Source: ABdhPJzRumALHsVCoxkUEZJmdZidHYRiErLkopnEQuBm2aKMtbt1iRMvfQiM8Ol837hKqpHON4BsDfGVWqBRzH54W1c=
X-Received: by 2002:a92:1592:: with SMTP id 18mr5333494ilv.17.1594742591094;
 Tue, 14 Jul 2020 09:03:11 -0700 (PDT)
MIME-Version: 1.0
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <CAG6MAzQbCCyxp42ZgFXNgWtyeh_nex9Q7tiP_Ts0h0hCHh0gsg@mail.gmail.com>
In-Reply-To: <CAG6MAzQbCCyxp42ZgFXNgWtyeh_nex9Q7tiP_Ts0h0hCHh0gsg@mail.gmail.com>
From: Nick Calvert <nick.calvert@gmail.com>
Date: Tue, 14 Jul 2020 17:03:00 +0100
Message-ID: <CAH_TNPtfOk0aZkmbrNW-sY4Bwm3t7d6FnkpH6X8ECrw4GJLsLw@mail.gmail.com>
Subject: Re: Debian 10, xen 4.11 reliability
To: Tomas Mozes <hydrapolic@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Casper <kl@os.lv>,
 "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Another blind shot and this may not be very helpful, but I have seen
general instability with 4.11 on certain hardware that was never fully
diagnosed. It appears to be magically resolved on newer versions.

I suspected this: https://xenbits.xen.org/xsa/advisory-294.html at the
time as some silicon was changed (but not underlying hardware
platform), introducing PCID in all cases. I did not prove this and it
was not a denial of service failure mode.

If you can, perhaps building from source or applying that patch could
help. Please let us know how you get on, issues like this are always
very frustrating.

On Tue, 14 Jul 2020 at 15:46, Tomas Mozes <hydrapolic@gmail.com> wrote:
>
>
>
> On Thursday, July 9, 2020, Casper <kl@os.lv> wrote:
> > Hello,
> >
> > I have used Debian/Xen dom0 for many years, Debian 7, 3.2.41 kernel wit=
h Xen 4.1.4 on some servers still work very reliable with no problems, only=
 wanted to change new hard discs pushed me to install new Debian 10 with Xe=
n packages to newer version.
> >
> > Where I reinstall Debian 10, latest 4.19 kernel it comes with Xen 4.11.=
4-pre all crashes in 1-2weeks. In start I was blaming HW, but now it repeat=
s in old reliable servers too. My config is I have 2-3 hard discs per serve=
r node and RAID1 with sw md raid, it crashes with md lost access for disc. =
After reboot all works as it should.
> >
> > I tested different HW and discs, all the same problems.
> > Loads are no big, just few testing DomU nodes.
> > Any suggestion? I`m currently running latest Debian kernel 4.19 was thi=
nking to downgrade to test different kernel.
> > Or problem with Debian Xen package as it not so popular anymore?
> > Any suggestion what to test to figure out problem?
> >
> > Sincerely,
> > Casper
> >
> >
>
> Just a blind shoot - which scheduler are you using? If credit2, try credi=
t legacy.
>
> https://wiki.gentoo.org/wiki/Xen#Xen_domU_hanging_with_Xen_4.12.2B


From xen-users-bounces@lists.xenproject.org Wed Jul 15 16:01:03 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 15 Jul 2020 16:01:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jvjol-0007jc-IA; Wed, 15 Jul 2020 15:59:35 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=COeM=A2=xen.org=paul@srs-us1.protection.inumbo.net>)
 id 1jvjok-0007iB-Er
 for xen-users@lists.xenproject.org; Wed, 15 Jul 2020 15:59:34 +0000
X-Inumbo-ID: 26c6066e-c6b4-11ea-8496-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 26c6066e-c6b4-11ea-8496-bc764e2007e4;
 Wed, 15 Jul 2020 15:59:23 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Reply-To:Message-Id:Date:Subject:To:From:Sender:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=f3yeW6sSSoYP7f3EUuNv6OxXPwLcAHQm+R6d13VyfOk=; b=5mfnarL1bmdj/Run/5T+UjZKHo
 /MXYkYfu3cEAfgFzFCIJhC5lfJR7R5QAyi8ZQTvSzBXLu3cfzeTwC6uSA8NoK++K17B1siA4suQiw
 72M8kX81JnLJBGMdBH20cMufksgLif2CJ7NQXooM2+E8wRM6ge/fYn4gFlkRjRT6C8rU=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jvjoZ-00013U-Ce; Wed, 15 Jul 2020 15:59:23 +0000
Received: from 54-240-197-235.amazon.com ([54.240.197.235]
 helo=CBG-R90WXYV0.amazon.com) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jvjoZ-0001SJ-1N; Wed, 15 Jul 2020 15:59:23 +0000
From: Paul Durrant <paul@xen.org>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org,
 xen-announce@lists.xenproject.org
Subject: Xen 4.14 RC6
Date: Wed, 15 Jul 2020 16:59:21 +0100
Message-Id: <20200715155921.5543-1-paul@xen.org>
X-Mailer: git-send-email 2.17.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-devel@lists.xenproject.org, paul@xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi all,

Xen 4.14 RC6 is tagged. You can check that out from xen.git:

git://xenbits.xen.org/xen.git 4.14.0-rc6

For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.14.0-rc6/xen-4.14.0-rc6.tar.gz

And the signature is at:
https://downloads.xenproject.org/release/xen/4.14.0-rc6/xen-4.14.0-rc6.tar.gz.sig

This RC is built from the new stable-4.14 branch, with CONFIG_DEBUG=n. Please
test as this intended to be the final RC before release. As always, please send
bug reports and test reports to xen-devel@lists.xenproject.org. When sending
bug reports, please CC relevant maintainers and me (paul@xen.org).

  Paul Durrant



From xen-users-bounces@lists.xenproject.org Thu Jul 16 03:59:16 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 03:59:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jvv1l-0004tF-Gb; Thu, 16 Jul 2020 03:57:45 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=L6TJ=A3=prgmr.com=srn@srs-us1.protection.inumbo.net>)
 id 1jvv1j-0004sj-4M
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 03:57:43 +0000
X-Inumbo-ID: 7f44d054-c718-11ea-bca7-bc764e2007e4
Received: from mail.prgmr.com (unknown [2605:2700:0:5::4713:9506])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 7f44d054-c718-11ea-bca7-bc764e2007e4;
 Thu, 16 Jul 2020 03:57:42 +0000 (UTC)
Received: from [192.168.2.47] (c-174-62-72-237.hsd1.ca.comcast.net
 [174.62.72.237]) (Authenticated sender: srn)
 by mail.prgmr.com (Postfix) with ESMTPSA id 02DF7720131;
 Wed, 15 Jul 2020 23:57:40 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.prgmr.com 02DF7720131
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prgmr.com;
 s=default; t=1594871861;
 bh=Ci03BhGrb5lkD3dAeSsEsAdcT0l21suosKMxM4JncqE=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=mTJ6jr39U3NDJszvsVwJmbxEPjuEgs/lxZp85LNe1p/8hyJXJG3gJjsk1+mqOrLg6
 3gNITItjgaXQoulbJ32WVOcOxGhVkvA4cDCWLFatjX6U1XrxRRmWNRPzPV4yIFki/T
 WGa3JYMPGK6AU1/PI6Z4G08UWHg0iE7/NzrJqnnw=
Subject: Re: Debian 10, xen 4.11 reliability
To: Hans van Kranenburg <hans@knorrie.org>,
 Adam Goryachev <mailinglists@websitemanagers.com.au>,
 xen-users@lists.xenproject.org, Casper <kl@os.lv>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
 <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
From: Sarah Newman <srn@prgmr.com>
Message-ID: <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
Date: Wed, 15 Jul 2020 20:57:40 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 7/14/20 2:00 AM, Hans van Kranenburg wrote:
> On 7/14/20 1:16 AM, Adam Goryachev wrote:
>>
>> On 14/7/20 03:02, Hans van Kranenburg wrote:
>>> Hi Casper,
>>>
>>> On 7/9/20 10:45 AM, Casper wrote:
>>>> [...]
>>>> Or problem with Debian Xen package as it not so popular anymore?
>>>> Any suggestion what to test to figure out problem?
>>
>> BTW, I don't think is a general rule that Debian 10.4 with packages Xen
>> 4.11 doesn't work.
> 
> True. It just works (tm), until you have some edge case hardware that
> misbehaves, or you run into an edge case bug with a very specific
> combination of non-default configuration here and there (or when you try
> to use EFI, cough).
> 
> So, to add to the list:
> * Run latest BIOS / cpu microcode that is available.
> * Other firmware, e.g. for raid controller or whatever?
> * Is the box using ECC memory? I mean, even a memory module that flips a
> bit now and then can crash a server every few weeks... Run a memtest or
> 7zip benchmark or what was the thing that's very good at exposing memory
> errors...
> 
> Also, feel free to open a bug report in the Debian bug tracker, we're
> willing to help, but expect that you have to do the work to gather all
> info. I don't have a similar piece of hardware lying around here... What
> distro package maintainers can do is help users to gather enough info to
> have a good report that doesn't waste too much time of the upstream
> developers.

Here is a bug I opened a week ago against Debian Buster:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964494

It looks like only newer versions of the kernel are a problem. We think the trigger is either ext3 or Xen.

The problem may not show up for weeks, and we do not know what triggers it.

If anyone has more data points to add that would help isolate the issue to one or the other, it would be appreciated.

--Sarah


From xen-users-bounces@lists.xenproject.org Thu Jul 16 06:34:02 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 06:34:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jvxRm-00024k-2n; Thu, 16 Jul 2020 06:32:46 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1QOp=A3=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1jvxRl-00024V-12
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 06:32:45 +0000
X-Inumbo-ID: 241c4d2c-c72e-11ea-9485-12813bfff9fa
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 241c4d2c-c72e-11ea-9485-12813bfff9fa;
 Thu, 16 Jul 2020 06:32:38 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.221.27])
 by mx2.suse.de (Postfix) with ESMTP id F34B2B029;
 Thu, 16 Jul 2020 06:32:40 +0000 (UTC)
Subject: Re: OpenSUSE and Xen
To: peter.jac@protonmail.com, xen-users@lists.xenproject.org,
 xen-devel <xen-devel@lists.xenproject.org>
References: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
Date: Thu, 16 Jul 2020 08:32:36 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 15.07.20 19:16, peter.jac@protonmail.com wrote:
> 
> Hello,
> I have a question from all Xen Project developers and users.

What? Not from me. ;-)

> Is OpenSUSE supporting Xen Project?

Why do you ask this here, instead of an OpenSUSE list/forum/whatever?

> Did anyone install OpenSUSE?

I know several people having done so, yes.

> Why OpenSUSE not have any option about 
> installing Xen during installation but have an option about KVM?

Ask OpenSUSE community?

BTW, I'm able to select "Xen Virtualization Host and Tools" from the
"Software" menu when installing openSUSE 15.2. It is even above the
"KVM Virtualization Host and Tools" option.

> Why Xen package doesn't included?

They are.


Juergen


From xen-users-bounces@lists.xenproject.org Thu Jul 16 08:31:03 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 08:31:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jvzH5-0003vG-HU; Thu, 16 Jul 2020 08:29:51 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1QOp=A3=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1jvzH4-0003vB-Kl
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 08:29:50 +0000
X-Inumbo-ID: 8352a04c-c73e-11ea-948b-12813bfff9fa
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 8352a04c-c73e-11ea-948b-12813bfff9fa;
 Thu, 16 Jul 2020 08:29:49 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.221.27])
 by mx2.suse.de (Postfix) with ESMTP id B0AC6AE25;
 Thu, 16 Jul 2020 08:29:52 +0000 (UTC)
Subject: Re: OpenSUSE and Xen
To: peter.jac@protonmail.com, xen-users@lists.xenproject.org
References: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
 <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
 <uoEjrT5tecvyi0A__wOfDHcCjeQTklewSye5avJNNFIdIj07bJqiWKgfuPDME-moDKtYf0M5GtJjAnXpAez4pDtYq-J2kQKvWs82oi7gNuk=@protonmail.com>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <c664873c-fd6d-50f1-6b8f-6ab2df6117f6@suse.com>
Date: Thu, 16 Jul 2020 10:29:48 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.9.0
MIME-Version: 1.0
In-Reply-To: <uoEjrT5tecvyi0A__wOfDHcCjeQTklewSye5avJNNFIdIj07bJqiWKgfuPDME-moDKtYf0M5GtJjAnXpAez4pDtYq-J2kQKvWs82oi7gNuk=@protonmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 16.07.20 10:19, peter.jac@protonmail.com wrote:
> Did you use internet during installation? The KVM package is available 
> on the DVD without the internet connection but Xen...

Yes, I've used the network installer.

The DVD is limited in space, so there has to be a selection what to put
on it.

Again: this here is the wrong place to ask why a distribution has chosen
to not put some packages on their installation DVD. Ask the distributor,
which is the openSUSE community in this case.


Juergen

> 
> 
> Sent from ProtonMail mobile
> 
> 
> 
> -------- Original Message --------
> On Jul 16, 2020, 11:02 AM, Jürgen Groß < jgross@suse.com> wrote:
> 
> 
>     On 15.07.20 19:16, peter.jac@protonmail.com wrote:
>      >
>      > Hello,
>      > I have a question from all Xen Project developers and users.
> 
>     What? Not from me. ;-)
> 
>      > Is OpenSUSE supporting Xen Project?
> 
>     Why do you ask this here, instead of an OpenSUSE list/forum/whatever?
> 
>      > Did anyone install OpenSUSE?
> 
>     I know several people having done so, yes.
> 
>      > Why OpenSUSE not have any option about
>      > installing Xen during installation but have an option about KVM?
> 
>     Ask OpenSUSE community?
> 
>     BTW, I'm able to select "Xen Virtualization Host and Tools" from the
>     "Software" menu when installing openSUSE 15.2. It is even above the
>     "KVM Virtualization Host and Tools" option.
> 
>      > Why Xen package doesn't included?
> 
>     They are.
> 
>     Juergen
> 



From xen-users-bounces@lists.xenproject.org Thu Jul 16 13:20:24 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 13:20:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jw3nA-0004sW-9A; Thu, 16 Jul 2020 13:19:16 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=xJjh=A3=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jw3n8-0004rq-S5
 for xen-users@lists.xen.org; Thu, 16 Jul 2020 13:19:14 +0000
X-Inumbo-ID: eb9fc9f4-c766-11ea-b7bb-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id eb9fc9f4-c766-11ea-b7bb-bc764e2007e4;
 Thu, 16 Jul 2020 13:19:04 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=3VGZzYg6mn62RtPmWMdMHRbsHJM8t32N5zUX+qK4CUw=; b=G7u8LMu9ALbkKy8HZA3VKFPwtJ
 ExmVOFeRW3Hkjfbt1HVZrvl2CAeZsfBaiq++awmQq1YLnmRYVn9YPIXoEm46dg9pJ6Ps4DPkdYzwd
 pHGAM9/5cy/0G36Iv8l0Y5VmPyGTJIxMP3KLqKuPyYsnAunp95ZFEt46TTSt9M8iRZIY=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jw3ms-0006Kq-VB; Thu, 16 Jul 2020 13:18:58 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jw3ms-0006i6-Se; Thu, 16 Jul 2020 13:18:58 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 329 v2 - Linux ioperm bitmap context
 switching issues
Message-Id: <E1jw3ms-0006i6-Se@xenbits.xenproject.org>
Date: Thu, 16 Jul 2020 13:18:58 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-329
                              version 2

             Linux ioperm bitmap context switching issues

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

Linux 5.5 overhauled the internal state handling for the iopl() and ioperm()
system calls.  Unfortunately, one aspect on context switch wasn't wired up
correctly for the Xen PVOps case.

IMPACT
======

IO port permissions don't get rescinded when context switching to an
unprivileged task.  Therefore, all userspace can use the IO ports granted to
the most recently scheduled task with IO port permissions.

VULNERABLE SYSTEMS
==================

Only x86 guests are vulnerable.

All versions of Linux from 5.5 are potentially vulnerable.

Linux is only vulnerable when running as x86 PV guest.  Linux is not
vulnerable when running as an x86 HVM/PVH guests.

The vulnerability can only be exploited in domains which have been granted
access to IO ports by Xen.  This is typically only the hardware domain, and
guests configured with PCI Passthrough.

MITIGATION
==========

Running only HVM/PVH guests avoids the vulnerability.

CREDITS
=======

This issue was discovered by Andy Lutomirski.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa329.patch           Linux 5.5 and later

$ sha256sum xsa329*
cdb5ac9bfd21192b5965e8ec0a1c4fcf12d0a94a962a8158cd27810e6aa362f0  xsa329.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.


(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8QU6EMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ/sEIAMiCOnz119KTlRU50HTwa4pvIgLphf9htTbPzHXS
iEb8yINqMxmep8NRcAzwFREQP+Z4Tue1upt31Vx0RPkFZpUklLuuBSXsV0JA7+UM
LSGyWhkzDdnfj6iPUHycGmFzRTzkbB7qfcMj7khCvuYtSNbTUdOgUq04ngZksrSJ
UMhfgUNKXawULKvVe7572L/AQTmMXK8eaolb+eWtf1U2pFkZQR8GWoLmiFbKLks2
X2tRUF4U4cHEBzxXRzYrD1ArWLajqK6hQmauwgkCCSowvCHoD1dTv55GlrlEo4od
MSB6YOVLl7HJuUw1GmwlKjA8XqStHq1Fi0urvlKCfHfK2Wk=
=MP+m
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa329.patch"
Content-Disposition: attachment; filename="xsa329.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5keSBMdXRvbWlyc2tpIDxsdXRvQGtlcm5lbC5vcmc+ClN1Ympl
Y3Q6IHg4Ni9pb3Blcm06IEZpeCBpbyBiaXRtYXAgaW52YWxpZGF0aW9uIG9u
IFhlbiBQVgoKdHNzX2ludmFsaWRhdGVfaW9fYml0bWFwKCkgd2Fzbid0IHdp
cmVkIHVwIHByb3Blcmx5IHRocm91Z2ggdGhlIHB2b3AKbWFjaGluZXJ5LCBz
byB0aGUgVFNTIGFuZCBYZW4ncyBpbyBiaXRtYXAgd291bGQgZ2V0IG91dCBv
ZiBzeW5jCndoZW5ldmVyIGRpc2FibGluZyBhIHZhbGlkIGlvIGJpdG1hcC4K
CkFkZCBhIG5ldyBwdm9wIGZvciB0c3NfaW52YWxpZGF0ZV9pb19iaXRtYXAo
KSB0byBmaXggaXQuCgpUaGlzIGlzIFhTQS0zMjkuCgpGaXhlczogMjJmZTVi
MDQzOWRkICgieDg2L2lvcGVybTogTW92ZSBUU1MgYml0bWFwIHVwZGF0ZSB0
byBleGl0IHRvIHVzZXIgd29yayIpClNpZ25lZC1vZmYtYnk6IEFuZHkgTHV0
b21pcnNraSA8bHV0b0BrZXJuZWwub3JnPgpSZXZpZXdlZC1ieTogSnVlcmdl
biBHcm9zcyA8amdyb3NzQHN1c2UuY29tPgpSZXZpZXdlZC1ieTogVGhvbWFz
IEdsZWl4bmVyIDx0Z2x4QGxpbnV0cm9uaXguZGU+CgpkaWZmIC0tZ2l0IGEv
YXJjaC94ODYvaW5jbHVkZS9hc20vaW9fYml0bWFwLmggYi9hcmNoL3g4Ni9p
bmNsdWRlL2FzbS9pb19iaXRtYXAuaAppbmRleCBhYzFhOTlmZmJkOGQuLjdm
MDgwZjVjN2RlZiAxMDA2NDQKLS0tIGEvYXJjaC94ODYvaW5jbHVkZS9hc20v
aW9fYml0bWFwLmgKKysrIGIvYXJjaC94ODYvaW5jbHVkZS9hc20vaW9fYml0
bWFwLmgKQEAgLTE5LDEyICsxOSwyOCBAQCBzdHJ1Y3QgdGFza19zdHJ1Y3Q7
CiB2b2lkIGlvX2JpdG1hcF9zaGFyZShzdHJ1Y3QgdGFza19zdHJ1Y3QgKnRz
ayk7CiB2b2lkIGlvX2JpdG1hcF9leGl0KHN0cnVjdCB0YXNrX3N0cnVjdCAq
dHNrKTsKIAorc3RhdGljIGlubGluZSB2b2lkIG5hdGl2ZV90c3NfaW52YWxp
ZGF0ZV9pb19iaXRtYXAodm9pZCkKK3sKKwkvKgorCSAqIEludmFsaWRhdGUg
dGhlIEkvTyBiaXRtYXAgYnkgbW92aW5nIGlvX2JpdG1hcF9iYXNlIG91dHNp
ZGUgdGhlCisJICogVFNTIGxpbWl0IHNvIGFueSBzdWJzZXF1ZW50IEkvTyBh
Y2Nlc3MgZnJvbSB1c2VyIHNwYWNlIHdpbGwKKwkgKiB0cmlnZ2VyIGEgI0dQ
LgorCSAqCisJICogVGhpcyBpcyBjb3JyZWN0IGV2ZW4gd2hlbiBWTUVYSVQg
cmV3cml0ZXMgdGhlIFRTUyBsaW1pdAorCSAqIHRvIDB4NjcgYXMgdGhlIG9u
bHkgcmVxdWlyZW1lbnQgaXMgdGhhdCB0aGUgYmFzZSBwb2ludHMKKwkgKiBv
dXRzaWRlIHRoZSBsaW1pdC4KKwkgKi8KKwl0aGlzX2NwdV93cml0ZShjcHVf
dHNzX3J3Lng4Nl90c3MuaW9fYml0bWFwX2Jhc2UsCisJCSAgICAgICBJT19C
SVRNQVBfT0ZGU0VUX0lOVkFMSUQpOworfQorCiB2b2lkIG5hdGl2ZV90c3Nf
dXBkYXRlX2lvX2JpdG1hcCh2b2lkKTsKIAogI2lmZGVmIENPTkZJR19QQVJB
VklSVF9YWEwKICNpbmNsdWRlIDxhc20vcGFyYXZpcnQuaD4KICNlbHNlCiAj
ZGVmaW5lIHRzc191cGRhdGVfaW9fYml0bWFwIG5hdGl2ZV90c3NfdXBkYXRl
X2lvX2JpdG1hcAorI2RlZmluZSB0c3NfaW52YWxpZGF0ZV9pb19iaXRtYXAg
bmF0aXZlX3Rzc19pbnZhbGlkYXRlX2lvX2JpdG1hcAogI2VuZGlmCiAKICNl
bHNlCmRpZmYgLS1naXQgYS9hcmNoL3g4Ni9pbmNsdWRlL2FzbS9wYXJhdmly
dC5oIGIvYXJjaC94ODYvaW5jbHVkZS9hc20vcGFyYXZpcnQuaAppbmRleCA1
Y2E1ZDI5N2RmNzUuLjNkMmFmZWNkZTUwYyAxMDA2NDQKLS0tIGEvYXJjaC94
ODYvaW5jbHVkZS9hc20vcGFyYXZpcnQuaAorKysgYi9hcmNoL3g4Ni9pbmNs
dWRlL2FzbS9wYXJhdmlydC5oCkBAIC0zMDIsNiArMzAyLDExIEBAIHN0YXRp
YyBpbmxpbmUgdm9pZCB3cml0ZV9pZHRfZW50cnkoZ2F0ZV9kZXNjICpkdCwg
aW50IGVudHJ5LCBjb25zdCBnYXRlX2Rlc2MgKmcpCiB9CiAKICNpZmRlZiBD
T05GSUdfWDg2X0lPUExfSU9QRVJNCitzdGF0aWMgaW5saW5lIHZvaWQgdHNz
X2ludmFsaWRhdGVfaW9fYml0bWFwKHZvaWQpCit7CisJUFZPUF9WQ0FMTDAo
Y3B1LmludmFsaWRhdGVfaW9fYml0bWFwKTsKK30KKwogc3RhdGljIGlubGlu
ZSB2b2lkIHRzc191cGRhdGVfaW9fYml0bWFwKHZvaWQpCiB7CiAJUFZPUF9W
Q0FMTDAoY3B1LnVwZGF0ZV9pb19iaXRtYXApOwpkaWZmIC0tZ2l0IGEvYXJj
aC94ODYvaW5jbHVkZS9hc20vcGFyYXZpcnRfdHlwZXMuaCBiL2FyY2gveDg2
L2luY2x1ZGUvYXNtL3BhcmF2aXJ0X3R5cGVzLmgKaW5kZXggNzMyZjYyZTA0
ZGRiLi44ZGZjYjI1MDhlNmQgMTAwNjQ0Ci0tLSBhL2FyY2gveDg2L2luY2x1
ZGUvYXNtL3BhcmF2aXJ0X3R5cGVzLmgKKysrIGIvYXJjaC94ODYvaW5jbHVk
ZS9hc20vcGFyYXZpcnRfdHlwZXMuaApAQCAtMTQxLDYgKzE0MSw3IEBAIHN0
cnVjdCBwdl9jcHVfb3BzIHsKIAl2b2lkICgqbG9hZF9zcDApKHVuc2lnbmVk
IGxvbmcgc3AwKTsKIAogI2lmZGVmIENPTkZJR19YODZfSU9QTF9JT1BFUk0K
Kwl2b2lkICgqaW52YWxpZGF0ZV9pb19iaXRtYXApKHZvaWQpOwogCXZvaWQg
KCp1cGRhdGVfaW9fYml0bWFwKSh2b2lkKTsKICNlbmRpZgogCmRpZmYgLS1n
aXQgYS9hcmNoL3g4Ni9rZXJuZWwvcGFyYXZpcnQuYyBiL2FyY2gveDg2L2tl
cm5lbC9wYXJhdmlydC5jCmluZGV4IDY3NGE3ZDY2ZDk2MC4uZGUyMTM4YmEz
OGU1IDEwMDY0NAotLS0gYS9hcmNoL3g4Ni9rZXJuZWwvcGFyYXZpcnQuYwor
KysgYi9hcmNoL3g4Ni9rZXJuZWwvcGFyYXZpcnQuYwpAQCAtMzI0LDcgKzMy
NCw4IEBAIHN0cnVjdCBwYXJhdmlydF9wYXRjaF90ZW1wbGF0ZSBwdl9vcHMg
PSB7CiAJLmNwdS5zd2FwZ3MJCT0gbmF0aXZlX3N3YXBncywKIAogI2lmZGVm
IENPTkZJR19YODZfSU9QTF9JT1BFUk0KLQkuY3B1LnVwZGF0ZV9pb19iaXRt
YXAJPSBuYXRpdmVfdHNzX3VwZGF0ZV9pb19iaXRtYXAsCisJLmNwdS5pbnZh
bGlkYXRlX2lvX2JpdG1hcAk9IG5hdGl2ZV90c3NfaW52YWxpZGF0ZV9pb19i
aXRtYXAsCisJLmNwdS51cGRhdGVfaW9fYml0bWFwCQk9IG5hdGl2ZV90c3Nf
dXBkYXRlX2lvX2JpdG1hcCwKICNlbmRpZgogCiAJLmNwdS5zdGFydF9jb250
ZXh0X3N3aXRjaAk9IHBhcmF2aXJ0X25vcCwKZGlmZiAtLWdpdCBhL2FyY2gv
eDg2L2tlcm5lbC9wcm9jZXNzLmMgYi9hcmNoL3g4Ni9rZXJuZWwvcHJvY2Vz
cy5jCmluZGV4IGYzNjJjZTBkNWFjMC4uZmU2N2RiZDc2ZTUxIDEwMDY0NAot
LS0gYS9hcmNoL3g4Ni9rZXJuZWwvcHJvY2Vzcy5jCisrKyBiL2FyY2gveDg2
L2tlcm5lbC9wcm9jZXNzLmMKQEAgLTMyMiwyMCArMzIyLDYgQEAgdm9pZCBh
cmNoX3NldHVwX25ld19leGVjKHZvaWQpCiB9CiAKICNpZmRlZiBDT05GSUdf
WDg2X0lPUExfSU9QRVJNCi1zdGF0aWMgaW5saW5lIHZvaWQgdHNzX2ludmFs
aWRhdGVfaW9fYml0bWFwKHN0cnVjdCB0c3Nfc3RydWN0ICp0c3MpCi17Ci0J
LyoKLQkgKiBJbnZhbGlkYXRlIHRoZSBJL08gYml0bWFwIGJ5IG1vdmluZyBp
b19iaXRtYXBfYmFzZSBvdXRzaWRlIHRoZQotCSAqIFRTUyBsaW1pdCBzbyBh
bnkgc3Vic2VxdWVudCBJL08gYWNjZXNzIGZyb20gdXNlciBzcGFjZSB3aWxs
Ci0JICogdHJpZ2dlciBhICNHUC4KLQkgKgotCSAqIFRoaXMgaXMgY29ycmVj
dCBldmVuIHdoZW4gVk1FWElUIHJld3JpdGVzIHRoZSBUU1MgbGltaXQKLQkg
KiB0byAweDY3IGFzIHRoZSBvbmx5IHJlcXVpcmVtZW50IGlzIHRoYXQgdGhl
IGJhc2UgcG9pbnRzCi0JICogb3V0c2lkZSB0aGUgbGltaXQuCi0JICovCi0J
dHNzLT54ODZfdHNzLmlvX2JpdG1hcF9iYXNlID0gSU9fQklUTUFQX09GRlNF
VF9JTlZBTElEOwotfQotCiBzdGF0aWMgaW5saW5lIHZvaWQgc3dpdGNoX3Rv
X2JpdG1hcCh1bnNpZ25lZCBsb25nIHRpZnApCiB7CiAJLyoKQEAgLTM0Niw3
ICszMzIsNyBAQCBzdGF0aWMgaW5saW5lIHZvaWQgc3dpdGNoX3RvX2JpdG1h
cCh1bnNpZ25lZCBsb25nIHRpZnApCiAJICogdXNlciBtb2RlLgogCSAqLwog
CWlmICh0aWZwICYgX1RJRl9JT19CSVRNQVApCi0JCXRzc19pbnZhbGlkYXRl
X2lvX2JpdG1hcCh0aGlzX2NwdV9wdHIoJmNwdV90c3NfcncpKTsKKwkJdHNz
X2ludmFsaWRhdGVfaW9fYml0bWFwKCk7CiB9CiAKIHN0YXRpYyB2b2lkIHRz
c19jb3B5X2lvX2JpdG1hcChzdHJ1Y3QgdHNzX3N0cnVjdCAqdHNzLCBzdHJ1
Y3QgaW9fYml0bWFwICppb2JtKQpAQCAtMzgwLDcgKzM2Niw3IEBAIHZvaWQg
bmF0aXZlX3Rzc191cGRhdGVfaW9fYml0bWFwKHZvaWQpCiAJdTE2ICpiYXNl
ID0gJnRzcy0+eDg2X3Rzcy5pb19iaXRtYXBfYmFzZTsKIAogCWlmICghdGVz
dF90aHJlYWRfZmxhZyhUSUZfSU9fQklUTUFQKSkgewotCQl0c3NfaW52YWxp
ZGF0ZV9pb19iaXRtYXAodHNzKTsKKwkJbmF0aXZlX3Rzc19pbnZhbGlkYXRl
X2lvX2JpdG1hcCgpOwogCQlyZXR1cm47CiAJfQogCmRpZmYgLS1naXQgYS9h
cmNoL3g4Ni94ZW4vZW5saWdodGVuX3B2LmMgYi9hcmNoL3g4Ni94ZW4vZW5s
aWdodGVuX3B2LmMKaW5kZXggYWNjNDlmYTZhMDk3Li5jNDc1YTExYzY2MjAg
MTAwNjQ0Ci0tLSBhL2FyY2gveDg2L3hlbi9lbmxpZ2h0ZW5fcHYuYworKysg
Yi9hcmNoL3g4Ni94ZW4vZW5saWdodGVuX3B2LmMKQEAgLTg1MCw2ICs4NTAs
MTcgQEAgc3RhdGljIHZvaWQgeGVuX2xvYWRfc3AwKHVuc2lnbmVkIGxvbmcg
c3AwKQogfQogCiAjaWZkZWYgQ09ORklHX1g4Nl9JT1BMX0lPUEVSTQorc3Rh
dGljIHZvaWQgeGVuX2ludmFsaWRhdGVfaW9fYml0bWFwKHZvaWQpCit7CisJ
c3RydWN0IHBoeXNkZXZfc2V0X2lvYml0bWFwIGlvYml0bWFwID0geworCQku
Yml0bWFwID0gMCwKKwkJLm5yX3BvcnRzID0gMCwKKwl9OworCisJbmF0aXZl
X3Rzc19pbnZhbGlkYXRlX2lvX2JpdG1hcCgpOworCUhZUEVSVklTT1JfcGh5
c2Rldl9vcChQSFlTREVWT1Bfc2V0X2lvYml0bWFwLCAmaW9iaXRtYXApOwor
fQorCiBzdGF0aWMgdm9pZCB4ZW5fdXBkYXRlX2lvX2JpdG1hcCh2b2lkKQog
ewogCXN0cnVjdCBwaHlzZGV2X3NldF9pb2JpdG1hcCBpb2JpdG1hcDsKQEAg
LTEwNzksNiArMTA5MCw3IEBAIHN0YXRpYyBjb25zdCBzdHJ1Y3QgcHZfY3B1
X29wcyB4ZW5fY3B1X29wcyBfX2luaXRjb25zdCA9IHsKIAkubG9hZF9zcDAg
PSB4ZW5fbG9hZF9zcDAsCiAKICNpZmRlZiBDT05GSUdfWDg2X0lPUExfSU9Q
RVJNCisJLmludmFsaWRhdGVfaW9fYml0bWFwID0geGVuX2ludmFsaWRhdGVf
aW9fYml0bWFwLAogCS51cGRhdGVfaW9fYml0bWFwID0geGVuX3VwZGF0ZV9p
b19iaXRtYXAsCiAjZW5kaWYKIAkuaW9fZGVsYXkgPSB4ZW5faW9fZGVsYXks
Cg==

--=separator--


From xen-users-bounces@lists.xenproject.org Thu Jul 16 13:36:03 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 13:36:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jw41k-0006x5-58; Thu, 16 Jul 2020 13:34:20 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=pG+q=A3=abilixsoft.eu=stanislav.ivanov@srs-us1.protection.inumbo.net>)
 id 1jw41i-0006x0-LD
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 13:34:18 +0000
X-Inumbo-ID: 0a071008-c769-11ea-94b9-12813bfff9fa
Received: from Shared9.abilixsoft.eu (unknown [185.246.168.6])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 0a071008-c769-11ea-94b9-12813bfff9fa;
 Thu, 16 Jul 2020 13:34:15 +0000 (UTC)
Received: from [10.255.31.254] (unknown [213.91.182.188])
 by Shared9.abilixsoft.eu (Postfix) with ESMTPSA id D5A7341AC7
 for <xen-users@lists.xenproject.org>; Thu, 16 Jul 2020 16:34:13 +0300 (EEST)
To: xen-users@lists.xenproject.org
From: Stanislav <stanislav.ivanov@abilixsoft.eu>
Subject: System hangs when NVMe is under load
Message-ID: <3448136c-bc11-dc30-7c57-853b51429cb1@abilixsoft.eu>
Date: Thu, 16 Jul 2020 16:34:13 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="------------88BCB1F642124A46412AB5FD"
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.
--------------88BCB1F642124A46412AB5FD
Content-Type: multipart/alternative;
 boundary="------------FD6BC5F3ED56879280BBE34A"


--------------FD6BC5F3ED56879280BBE34A
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Hello,

I would like to be excused beforehand if i am sending something the the 
wrong folks.

We have a strange situation going on here with a couple of our servers. 
We've been experiencing issues with the combination of 
Debian+XEN+Samsung NVMe.

Problem:

It all began with 
https://serverfault.com/questions/1006366/samsung-nvme-disappears-when-server-on-average-to-high-load

The situation is close to the one described above with some differences. 
*Now It can be reproduced.*

  * OS: 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2+deb10u1
  * CPUS: Intel(R) Xeon(R) CPU E5-1650 v4
  * NVMe: Samsung MZ1LB1T9HALS-00007
  * xen_version            : 4.11.4-pre
  * Server: Supermicro Super Server/X10SRW-F, BIOS 3.2

We've gathered some more information - It happens only when XEN is loaded.

The command that breaks everything is the following and it breaks it 
fast. In the following situation it just needs approx 20 secs to hang 
the whole system. I am attaching the Call trace which occurs during the 
hang up.

date; echo; fio --filename=/dev/nvme0n1 --direct=1 --rw=randread --bs=4k 
--ioengine=libaio --iodepth=256 --runtime=345600 --numjobs=10 
--time_based --group_reporting --name=iops-test-job --readonly 
--output=fio_log.randread4k.log; date

I have currently ran the test on one of the nodes where I have booted 
/without /xen. Have in mind that all servers are provisioned with 
Ansible and are the same.

What is tried so far:

Setting kernel option nvme_core.default_ps_max_latency_us to 5500/200 as 
read 
https://wiki.archlinux.org/index.php/Solid_state_drive/NVMe#Samsung_drive_errors_on_Linux_4.10 
and 
https://askubuntu.com/questions/905710/ext4-fs-error-after-ubuntu-17-04-upgrade

Setting kernel option nvme_core.force_apst=1 thus trying to force APST 
since (nvme id-ctrl /dev/nvme0n1  | grep apst
apsta     : 0 )

  * First try - no success.
  * Forcing APST to Y - no success.

I have kind of "overheated" on the subject right now and could be 
possibly missing something important out. Let me know if you need any 
more information.

NB: We began testing this cluster because it was showing really slow 
disk related operations (on the nvme). For comparison - the other 
cluster (mentioned in serverfault), never showed any performance issues.

Best Regards,

-- 
Stanislav Ivanov
System Administrator
–––––––––––––––––––––––––
Abilix Soft LTD.
Варна, ул."Студентска" №1А, Офис 24Б
Support: +359 700 911 44
https://abscloud.eu


--------------FD6BC5F3ED56879280BBE34A
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <p> </p>
    <div class="moz-text-html" lang="x-unicode">
      <p>Hello,</p>
      <p>I would like to be excused beforehand if i am sending something
        the the wrong folks.</p>
      <p>We have a strange situation going on here with a couple of our
        servers. We've been experiencing issues with the combination of
        Debian+XEN+Samsung NVMe.</p>
      <p>Problem: <br>
      </p>
      <p>It all began with
        <a class="moz-txt-link-freetext"
href="https://serverfault.com/questions/1006366/samsung-nvme-disappears-when-server-on-average-to-high-load">https://serverfault.com/questions/1006366/samsung-nvme-disappears-when-server-on-average-to-high-load</a><br>
      </p>
      <p>The situation is close to the one described above with some
        differences. <b>Now It can be reproduced.</b></p>
      <ul>
        <li>OS: 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2+deb10u1<br>
        </li>
        <li>CPUS: Intel(R) Xeon(R) CPU E5-1650 v4<br>
        </li>
        <li>NVMe: Samsung MZ1LB1T9HALS-00007</li>
        <li>xen_version            : 4.11.4-pre</li>
        <li>Server: Supermicro Super Server/X10SRW-F, BIOS 3.2</li>
      </ul>
      <p>We've gathered some more information - It happens only when XEN
        is loaded. <br>
      </p>
      <p>The command that breaks everything is the following and it
        breaks it fast. In the following situation it just needs approx
        20 secs to hang the whole system. I am attaching the Call trace
        which occurs during the hang up.<br>
      </p>
      <p><font color="#0747a6">date; echo; fio --filename=/dev/nvme0n1
          --direct=1 --rw=randread --bs=4k --ioengine=libaio
          --iodepth=256 --runtime=345600 --numjobs=10 --time_based
          --group_reporting --name=iops-test-job --readonly
          --output=fio_log.randread4k.log; date</font></p>
      <p><font color="#0747a6"><font color="black">I have currently ran
            the test on one of the nodes where I have booted <i>without
            </i>xen. Have in mind that all servers are provisioned with
            Ansible and are the same. <br>
          </font></font></p>
      <p><font color="#0747a6"> <font color="black">What is tried so
            far:</font></font></p>
      <p><font color="#0747a6"><font color="black">Setting kernel option
            nvme_core.default_ps_max_latency_us to 5500/200 as read
            <a class="moz-txt-link-freetext"
href="https://wiki.archlinux.org/index.php/Solid_state_drive/NVMe#Samsung_drive_errors_on_Linux_4.10">https://wiki.archlinux.org/index.php/Solid_state_drive/NVMe#Samsung_drive_errors_on_Linux_4.10</a>
            and
            <a class="moz-txt-link-freetext"
href="https://askubuntu.com/questions/905710/ext4-fs-error-after-ubuntu-17-04-upgrade">https://askubuntu.com/questions/905710/ext4-fs-error-after-ubuntu-17-04-upgrade</a></font></font></p>
      <p>Setting kernel option nvme_core.force_apst=1 thus trying to
        force APST since (nvme id-ctrl /dev/nvme0n1  | grep apst<br>
        apsta     : 0 )</p>
      <ul>
        <li>First try - no success.</li>
        <li>Forcing APST to Y - no success. <br>
        </li>
      </ul>
      <p>I have kind of "overheated" on the subject right now and could
        be possibly missing something important out. Let me know if you
        need any more information.</p>
      <p>NB: We began testing this cluster because it was showing really
        slow disk related operations (on the nvme). For comparison - the
        other cluster (mentioned in serverfault), never showed any
        performance issues.<br>
      </p>
      <p>Best Regards,</p>
      <pre class="moz-signature" cols="72">-- 
Stanislav Ivanov
System Administrator
–––––––––––––––––––––––––
Abilix Soft LTD.
Варна, ул."Студентска" №1А, Офис 24Б
Support: +359 700 911 44
<a class="moz-txt-link-freetext" href="https://abscloud.eu">https://abscloud.eu</a></pre>
    </div>
  </body>
</html>

--------------FD6BC5F3ED56879280BBE34A--

--------------88BCB1F642124A46412AB5FD
Content-Type: text/plain; charset=UTF-8;
 name="CallTraceXenNvmeProblem.txt"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="CallTraceXenNvmeProblem.txt"

IFsgNDg4MS4xMzc2ODBdIC0tLS0tLS0tLS0tLVsgY3V0IGhlcmUgXS0tLS0tLS0tLS0tLQog
WyA0ODgxLjEzNzY4Ml0gTkVUREVWIFdBVENIRE9HOiBlbm8xIChpZ2IpOiB0cmFuc21pdCBx
dWV1ZSA3IHRpbWVkIG91dAogWyA0ODgxLjEzNzY5Nl0gV0FSTklORzogQ1BVOiAwIFBJRDog
NSBhdCBuZXQvc2NoZWQvc2NoX2dlbmVyaWMuYzo0NjYgZGV2X3dhdGNoZG9nKzB4MjBkLzB4
MjIwCiBbIDQ4ODEuMTM3NzE5XSAgdXNiY29yZSBpZ2Igc2NzaV9tb2QgbnZtZSBpMmNfaTgw
MSBscGNfaWNoIG52bWVfY29yZSBtZmRfY29yZSBpMmNfYWxnb19iaXQgdXNiX2NvbW1vbiBk
Y2EgbWRpbwogWyA0ODgxLjEzNzcyNF0gQ1BVOiAwIFBJRDogNSBDb21tOiBrd29ya2VyLzA6
MCBOb3QgdGFpbnRlZCA0LjE5LjAtOS1hbWQ2NCAjMSBEZWJpYW4gNC4xOS4xMTgtMitkZWIx
MHUxCiBbIDQ4ODEuMTM3NzI1XSBIYXJkd2FyZSBuYW1lOiBTdXBlcm1pY3JvIFN1cGVyIFNl
cnZlci9YMTBTUlctRiwgQklPUyAzLjIgMTEvMjIvMjAxOQogWyA0ODgxLjEzNzczMV0gV29y
a3F1ZXVlOiBldmVudHMgaWdiX3dhdGNoZG9nX3Rhc2sgW2lnYl0KIFsgNDg4MS4xMzc3MzNd
IFJJUDogZTAzMDpkZXZfd2F0Y2hkb2crMHgyMGQvMHgyMjAKIFsgNDg4MS4xMzc3MzRdIENv
ZGU6IDAwIDQ5IDYzIDRlIGUwIGViIDkyIDRjIDg5IGU3IGM2IDA1IDEwIGMyIGFkIDAwIDAx
IGU4IGU3IGI4IGZjIGZmIDg5IGQ5IDRjIDg5IGU2IDQ4IGM3IGM3IDMwIGQxIGVkIDgxIDQ4
IDg5IGMyIGU4IGFkIGZmIGE1IGZmIDwwZj4gMGIgZWIgYzAgNjYgNjYgMmUgMGYgMWYgODQg
MDAgMDAgMDAgMDAgMDAgMGYgMWYgNDAgMDAgMGYgMWYgNDQKIFsgNDg4MS4xMzc3MzRdIFJT
UDogZTAyYjpmZmZmODg4MTg2YzAzZTk4IEVGTEFHUzogMDAwMTAyODIKIFsgNDg4MS4xMzc3
MzVdIFJBWDogMDAwMDAwMDAwMDAwMDAwMCBSQlg6IDAwMDAwMDAwMDAwMDAwMDcgUkNYOiAw
MDAwMDAwMDAwMDAwMDA2CiBbIDQ4ODEuMTM3NzM2XSBSRFg6IDAwMDAwMDAwMDAwMDAwMDcg
UlNJOiAwMDAwMDAwMDAwMDAwMDAxIFJESTogZmZmZjg4ODE4NmMxNjZiMAogWyA0ODgxLjEz
NzczNl0gUkJQOiBmZmZmODg4MTc4NzVjNDVjIFIwODogMDAwMDAwMDAwMDAwMDZiZiBSMDk6
IDAwMDAwMDAwMDAwMDAwMDQKIFsgNDg4MS4xMzc3MzddIFIxMDogMDAwMDAwMDAwMDAwMDAw
MCBSMTE6IDAwMDAwMDAwMDAwMDAwMDEgUjEyOiBmZmZmODg4MTc4NzVjMDAwCiBbIDQ4ODEu
MTM3NzM3XSBSMTM6IDAwMDAwMDAwMDAwMDAwMDAgUjE0OiBmZmZmODg4MTc4NzVjNDgwIFIx
NTogMDAwMDAwMDAwMDAwMDAwOAogWyA0ODgxLjEzNzc0N10gRlM6ICAwMDAwN2ZhMTg2ZGQ1
ZjAwKDAwMDApIEdTOmZmZmY4ODgxODZjMDAwMDAoMDAwMCkga25sR1M6MDAwMDAwMDAwMDAw
MDAwMAogWyA0ODgxLjEzNzc0OF0gQ1M6ICBlMDMzIERTOiAwMDAwIEVTOiAwMDAwIENSMDog
MDAwMDAwMDA4MDA1MDAzMwogWyA0ODgxLjEzNzc0OF0gQ1IyOiAwMDAwN2ZhMTY1OWY1MmI4
IENSMzogMDAwMDAwMDE1YTdhMDAwMCBDUjQ6IDAwMDAwMDAwMDAwNDA2NjAKIFsgNDg4MS4x
Mzc3NTJdIENhbGwgVHJhY2U6CiBbIDQ4ODEuMTM3NzU0XSAgPElSUT4KIFsgNDg4MS4xMzc3
NTddICA/IHBmaWZvX2Zhc3RfZW5xdWV1ZSsweDExMC8weDExMAogWyA0ODgxLjEzNzc2MF0g
IGNhbGxfdGltZXJfZm4rMHgyYi8weDEzMAogWyA0ODgxLjEzNzc2MV0gIHJ1bl90aW1lcl9z
b2Z0aXJxKzB4MWM3LzB4M2UwCiBbIDQ4ODEuMTM3NzY0XSAgPyBoYW5kbGVfaXJxX2V2ZW50
KzB4NDcvMHg1YwogWyA0ODgxLjEzNzc2NV0gID8gaGFuZGxlX2VkZ2VfaXJxKzB4ZGIvMHgx
ZTAKIFsgNDg4MS4xMzc3NjddICBfX2RvX3NvZnRpcnErMHhkZS8weDJkOAogWyA0ODgxLjEz
Nzc3MV0gIGlycV9leGl0KzB4YmEvMHhjMAogWyA0ODgxLjEzNzc3NF0gIHhlbl9ldnRjaG5f
ZG9fdXBjYWxsKzB4MmMvMHg0MAogWyA0ODgxLjEzNzc3NV0gIHhlbl9kb19oeXBlcnZpc29y
X2NhbGxiYWNrKzB4MjkvMHg0MAogWyA0ODgxLjEzNzc3Nl0gIDwvSVJRPgogWyA0ODgxLjEz
Nzc3OF0gUklQOiBlMDMwOmlnYl9yZDMyKzB4MTkvMHg3MCBbaWdiXQogWyA0ODgxLjEzNzc3
OV0gQ29kZTogMDAgMGYgMWYgNDQgMDAgMDAgNDggOGIgMDcgNDggOGIgODAgMDAgMDIgMDAg
MDAgYzMgMGYgMWYgNDQgMDAgMDAgNDggOGIgNTcgMDggNDggODUgZDIgNzQgNTUgODkgZjAg
NDggODMgZWMgMDggNDggMDEgZDAgOGIgMDAgPDgzPiBmOCBmZiA3NCAwNSA0OCA4MyBjNCAw
OCBjMyA4NSBmNiA3NCAxMSA4YiAxMiA4MyBmYSBmZiA3NCAwYSBiOAogWyA0ODgxLjEzNzc3
OV0gUlNQOiBlMDJiOmZmZmZjOTAwNDA2YzdlMDAgRUZMQUdTOiAwMDAwMDI4NgogWyA0ODgx
LjEzNzc4MF0gUkFYOiAwMDAwMDAwMDAwMDAwMDMxIFJCWDogZmZmZjg4ODE3ODc1YzhjMCBS
Q1g6IDAwMDAwMDAwMDAwOGVjYjQKIFsgNDg4MS4xMzc3ODFdIFJEWDogZmZmZmM5MDA0MGQy
MDAwMCBSU0k6IDAwMDAwMDAwMDAwMDQxMTggUkRJOiBmZmZmODg4MTc4NzVjZTA4CiBbIDQ4
ODEuMTM3NzgxXSBSQlA6IGZmZmY4ODgxNzg3NWNlMDggUjA4OiAwMDAwMDAwMDAwMGYyOThi
IFIwOTogMDAwMDczNzQ2ZTY1NzY2NQogWyA0ODgxLjEzNzc4Ml0gUjEwOiA4MDgwODA4MDgw
ODA4MDgwIFIxMTogMDAwMDAwMDAwMDAwMDAwMCBSMTI6IDAwMDAwMDAwMDAwMDAwMDgKIFsg
NDg4MS4xMzc3ODJdIFIxMzogZmZmZjg4ODE4MTUxYmFjMCBSMTQ6IDAwMDAwMDAwMDAwMDIy
ODQgUjE1OiAwMDAwMDAwMDAwMDBjMjMwCiBbIDQ4ODEuMTM3Nzg2XSAgaWdiX3VwZGF0ZV9z
dGF0cysweDVmZS8weDgxMCBbaWdiXQogWyA0ODgxLjEzNzc4OF0gIGlnYl93YXRjaGRvZ190
YXNrKzB4MTE1LzB4N2IwIFtpZ2JdCiBbIDQ4ODEuMTM3NzkxXSAgcHJvY2Vzc19vbmVfd29y
aysweDFhNy8weDNhMAogWyA0ODgxLjEzNzc5M10gIHdvcmtlcl90aHJlYWQrMHgzMC8weDM5
MAogWyA0ODgxLjEzNzc5NV0gID8gY3JlYXRlX3dvcmtlcisweDFhMC8weDFhMAogWyA0ODgx
LjEzNzc5Nl0gIGt0aHJlYWQrMHgxMTIvMHgxMzAKIFsgNDg4MS4xMzc3OTddICA/IGt0aHJl
YWRfYmluZCsweDMwLzB4MzAKIFsgNDg4MS4xMzc3OThdICByZXRfZnJvbV9mb3JrKzB4MzUv
MHg0MAogWyA0ODgxLjEzNzgwMF0gLS0tWyBlbmQgdHJhY2UgZWY3NWIwNTliZDE5NDcyZSBd
LS0tCg==
--------------88BCB1F642124A46412AB5FD--


From xen-users-bounces@lists.xenproject.org Thu Jul 16 14:28:09 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 14:28:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jw4r4-00030e-Re; Thu, 16 Jul 2020 14:27:22 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QyDK=A2=protonmail.com=peter.jac@srs-us1.protection.inumbo.net>)
 id 1jvl1L-0000D5-9Q
 for xen-users@lists.xenproject.org; Wed, 15 Jul 2020 17:16:39 +0000
X-Inumbo-ID: edb623bc-c6be-11ea-9429-12813bfff9fa
Received: from mail-40132.protonmail.ch (unknown [185.70.40.132])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id edb623bc-c6be-11ea-9429-12813bfff9fa;
 Wed, 15 Jul 2020 17:16:32 +0000 (UTC)
Date: Wed, 15 Jul 2020 17:16:22 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1594833391;
 bh=FGH8dWCw4hV8XCyDkS3efIcLcu5p/CZ6AfNx0XnEB7s=;
 h=Date:To:From:Reply-To:Subject:From;
 b=umYRc7WXhZFnrVxaJySJ2udSuyjRul8hIqy9yd2KKfPPTOhKAwGbXgjCJHY4qsW+d
 LNR5Kw4Rq2Kg45w9pkbfME1Ym2IAs829XI6v0Eg21BQjLPyrm6EOry78jVzO1gVgyI
 NGfw0W0hiO7ygzzXdwBBVsBPpQ4OGUriX8eI/+WM=
To: xen-users@lists.xenproject.org, xen-devel <xen-devel@lists.xenproject.org>
From: peter.jac@protonmail.com
Subject: OpenSUSE and Xen
Message-ID: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_F64iiwOB3gLbt06sPrBEgOIgF8BgaRWf0z9GLTC3c"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Thu, 16 Jul 2020 14:27:21 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: peter.jac@protonmail.com
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_F64iiwOB3gLbt06sPrBEgOIgF8BgaRWf0z9GLTC3c
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64

SGVsbG8sCkkgaGF2ZSBhIHF1ZXN0aW9uIGZyb20gYWxsIFhlbiBQcm9qZWN0IGRldmVsb3BlcnMg
YW5kIHVzZXJzLiBJcyBPcGVuU1VTRSBzdXBwb3J0aW5nIFhlbiBQcm9qZWN0PwpEaWQgYW55b25l
IGluc3RhbGwgT3BlblNVU0U/IFdoeSBPcGVuU1VTRSBub3QgaGF2ZSBhbnkgb3B0aW9uIGFib3V0
IGluc3RhbGxpbmcgWGVuIGR1cmluZyBpbnN0YWxsYXRpb24gYnV0IGhhdmUgYW4gb3B0aW9uIGFi
b3V0IEtWTT8KV2h5IFhlbiBwYWNrYWdlIGRvZXNuJ3QgaW5jbHVkZWQ/CgpDaGVlcnMu

--b1_F64iiwOB3gLbt06sPrBEgOIgF8BgaRWf0z9GLTC3c
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64

PGJyPkhlbGxvLDxicj5JIGhhdmUgYSBxdWVzdGlvbiBmcm9tIGFsbCBYZW4gUHJvamVjdCBkZXZl
bG9wZXJzIGFuZCB1c2Vycy4gSXMgT3BlblNVU0Ugc3VwcG9ydGluZyBYZW4gUHJvamVjdD88YnI+
RGlkIGFueW9uZSBpbnN0YWxsIE9wZW5TVVNFPyBXaHkgT3BlblNVU0Ugbm90IGhhdmUgYW55IG9w
dGlvbiBhYm91dCBpbnN0YWxsaW5nIFhlbiBkdXJpbmcgaW5zdGFsbGF0aW9uIGJ1dCBoYXZlIGFu
IG9wdGlvbiBhYm91dCBLVk0/PGJyPldoeSBYZW4gcGFja2FnZSBkb2Vzbid0IGluY2x1ZGVkPzxi
cj48YnI+PGJyPkNoZWVycy48YnI+PGJyPg==


--b1_F64iiwOB3gLbt06sPrBEgOIgF8BgaRWf0z9GLTC3c--



From xen-users-bounces@lists.xenproject.org Thu Jul 16 14:28:09 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 14:28:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jw4r5-00030l-8X; Thu, 16 Jul 2020 14:27:23 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ojOb=A3=protonmail.com=peter.jac@srs-us1.protection.inumbo.net>)
 id 1jvz7X-0002wE-OU
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 08:19:59 +0000
X-Inumbo-ID: 216cd4d4-c73d-11ea-b7bb-bc764e2007e4
Received: from mail-40141.protonmail.ch (unknown [185.70.40.141])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 216cd4d4-c73d-11ea-b7bb-bc764e2007e4;
 Thu, 16 Jul 2020 08:19:56 +0000 (UTC)
Date: Thu, 16 Jul 2020 08:19:50 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1594887595;
 bh=xEJ9L75McO5xAyI2evYbwkorZc+ujoatY3A6NsvlZ5o=;
 h=Date:To:From:Reply-To:Subject:In-Reply-To:References:From;
 b=ohgpv9SLT1buuHcNajLwev1sC4H3Os8JX1DnosTZYSwCD1PtizdpdSdi5980eZWdQ
 uyh5Wj+9VWbWZ/K8xjn8b6QgpUepz5Tru+0GQOXOQ0g9Y2sjnOzkyjuxgZR5hIBVL3
 IEuFlJGLjmkBSLvlrJZsGOEPqks2OcHoq8T3qULU=
To: jgross@suse.com, xen-users@lists.xenproject.org,
 xen-devel@lists.xenproject.org
From: peter.jac@protonmail.com
Subject: Re: OpenSUSE and Xen
Message-ID: <uoEjrT5tecvyi0A__wOfDHcCjeQTklewSye5avJNNFIdIj07bJqiWKgfuPDME-moDKtYf0M5GtJjAnXpAez4pDtYq-J2kQKvWs82oi7gNuk=@protonmail.com>
In-Reply-To: <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
References: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
 <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_KWkRiXfl3OmaYq6zkzQYYRrxYpPs3k6Ww0lDDodlFTY"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Thu, 16 Jul 2020 14:27:21 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: peter.jac@protonmail.com
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_KWkRiXfl3OmaYq6zkzQYYRrxYpPs3k6Ww0lDDodlFTY
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64
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--b1_KWkRiXfl3OmaYq6zkzQYYRrxYpPs3k6Ww0lDDodlFTY
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64
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=


--b1_KWkRiXfl3OmaYq6zkzQYYRrxYpPs3k6Ww0lDDodlFTY--



From xen-users-bounces@lists.xenproject.org Thu Jul 16 14:28:09 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 14:28:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jw4r5-00030s-Ma; Thu, 16 Jul 2020 14:27:23 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ojOb=A3=protonmail.com=peter.jac@srs-us1.protection.inumbo.net>)
 id 1jvzY1-0005no-0p
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 08:47:21 +0000
X-Inumbo-ID: f3b33bb0-c740-11ea-bca7-bc764e2007e4
Received: from mail-40137.protonmail.ch (unknown [185.70.40.137])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id f3b33bb0-c740-11ea-bca7-bc764e2007e4;
 Thu, 16 Jul 2020 08:47:17 +0000 (UTC)
Date: Thu, 16 Jul 2020 08:47:06 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1594889236;
 bh=4yEatXadegwH6M/hlql8XVeuzfz4xCRVLo2+QfOgGzs=;
 h=Date:To:From:Reply-To:Subject:In-Reply-To:References:From;
 b=iQxsutYfif0b5JzSxyYy6BwqcMtJfJa604aLb5BfC7CIT78qTlgKwuoZJsJUUWnM7
 G+M/7CoTme4A9Zq92IRLZc9lBDuflOwExOLnNU3zKIGNKnwoYGhsS/9YtVswV0lCHo
 S7E7RiAKNpwryJUq/2SC9AekLaGSzW+IBqZCf2i0=
To: jgross@suse.com, xen-users@lists.xenproject.org
From: peter.jac@protonmail.com
Subject: Re: OpenSUSE and Xen
Message-ID: <QJsI6mPfR32_GggzP4GuTblBmFNNxloB_3c-TPtmmrVLxOlAuM6WzZg75dwQo8mqFyMZkJxG3Zc88qXpOR7tWYWZFjCfh2phKbDtsC8k_F8=@protonmail.com>
In-Reply-To: <c664873c-fd6d-50f1-6b8f-6ab2df6117f6@suse.com>
References: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
 <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
 <uoEjrT5tecvyi0A__wOfDHcCjeQTklewSye5avJNNFIdIj07bJqiWKgfuPDME-moDKtYf0M5GtJjAnXpAez4pDtYq-J2kQKvWs82oi7gNuk=@protonmail.com>
 <c664873c-fd6d-50f1-6b8f-6ab2df6117f6@suse.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_379xXhQrotkuFj6FIWpNn8dUehzku6b3SyWFi6uFc"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-Mailman-Approved-At: Thu, 16 Jul 2020 14:27:21 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: peter.jac@protonmail.com
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_379xXhQrotkuFj6FIWpNn8dUehzku6b3SyWFi6uFc
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64
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--b1_379xXhQrotkuFj6FIWpNn8dUehzku6b3SyWFi6uFc
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64
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--b1_379xXhQrotkuFj6FIWpNn8dUehzku6b3SyWFi6uFc--



From xen-users-bounces@lists.xenproject.org Thu Jul 16 15:01:37 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 15:01:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jw5Ml-0007DC-0j; Thu, 16 Jul 2020 15:00:07 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=UeG/=A3=gmail.com=bifferos@srs-us1.protection.inumbo.net>)
 id 1jw5Mj-00074N-8e
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 15:00:05 +0000
X-Inumbo-ID: 07ee3cc2-c775-11ea-bb8b-bc764e2007e4
Received: from mail-vk1-xa35.google.com (unknown [2607:f8b0:4864:20::a35])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 07ee3cc2-c775-11ea-bb8b-bc764e2007e4;
 Thu, 16 Jul 2020 15:00:04 +0000 (UTC)
Received: by mail-vk1-xa35.google.com with SMTP id t187so1375811vke.5
 for <xen-users@lists.xenproject.org>; Thu, 16 Jul 2020 08:00:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc:content-transfer-encoding;
 bh=qPtWiqmfmJJFvtUtxD5M6Ttn1JrJuN+DC7E47ZRbCfQ=;
 b=iNu2cFJVc1cbMtLkEWIrSFrtPP3fJmQ1MQrQTCDb8JOCqKbJEsvS2RE4N9+6pyVAfk
 m/QX3eNX+mljz2J+kXpdC8hVFhrZpBKehtDYEv435NoZVXOvKDd59jaY+/HkpRBe2I6T
 XEwefcc+0OPj74RZzPpdgHKRU0okwZzSFsfbvo8/kYhN9tlCS2EM9kj4nFJW6i3XKDhj
 BSLcOupDRvD8NC7Jm9VJbnOdvTzpDxXF4QS3eiA31qoB/CDJ+Dy+qG66m2AwQM7PDAqy
 I2GbgquDgqdCCKLaMTi9H1JeMpvr1ypBMnQkjJbuwXOpzb1MTRm++rp5J+5myuE7W5Xf
 9qMw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc:content-transfer-encoding;
 bh=qPtWiqmfmJJFvtUtxD5M6Ttn1JrJuN+DC7E47ZRbCfQ=;
 b=AXMmJEHDOAhyKM3D+wX9GUynV0YyMQr5zSoYf1oqJQToM3Ru1SfrzYN8jMOBYOlnzZ
 tjStc2y4OVCtWpUFe5bJ/AZDpL98xjKN1O1pzJVn1kTi7icAbgjpcB1qkkHFJygoWMWE
 L0H1laPmozcM8gm5OaLN3GAVdVNKEAb7cVz05/GxBLeBPhjCnyn3IXSvinkyZ8VN1bkr
 L65Vb3oaCcNhzZthoEVhwsn3R743ct1WaXPLNg862vREVDVw1EoPJhAP7jRbv5Es5PYR
 MYdFdrP2vp+XKPKK2M8yn6InBmfO0bkYJZx2DFfyA9TGWk8oKAuVtKKP8tsh00dXlfJo
 x4hg==
X-Gm-Message-State: AOAM53135/eqIqp46vqd3CawyefzWIBltVu2KMu2f1mW5ZoOVT/ff1DB
 YKZbr1WtgYBirJkRNvLU06w8WyJ24bS1/Jh+YxY=
X-Google-Smtp-Source: ABdhPJyu82wspFFTGYKZu31zVI0/VnbOeX+ZuTR8aa82FxH+SSnnHkHTx/bJobIv7fx6UXxESE367hHWF/vCESa8KTc=
X-Received: by 2002:a05:6122:78d:: with SMTP id
 k13mr4001376vkr.28.1594911604342; 
 Thu, 16 Jul 2020 08:00:04 -0700 (PDT)
MIME-Version: 1.0
References: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
 <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
 <uoEjrT5tecvyi0A__wOfDHcCjeQTklewSye5avJNNFIdIj07bJqiWKgfuPDME-moDKtYf0M5GtJjAnXpAez4pDtYq-J2kQKvWs82oi7gNuk=@protonmail.com>
 <c664873c-fd6d-50f1-6b8f-6ab2df6117f6@suse.com>
 <QJsI6mPfR32_GggzP4GuTblBmFNNxloB_3c-TPtmmrVLxOlAuM6WzZg75dwQo8mqFyMZkJxG3Zc88qXpOR7tWYWZFjCfh2phKbDtsC8k_F8=@protonmail.com>
In-Reply-To: <QJsI6mPfR32_GggzP4GuTblBmFNNxloB_3c-TPtmmrVLxOlAuM6WzZg75dwQo8mqFyMZkJxG3Zc88qXpOR7tWYWZFjCfh2phKbDtsC8k_F8=@protonmail.com>
From: Biff Eros <bifferos@gmail.com>
Date: Thu, 16 Jul 2020 15:24:42 +0000
Message-ID: <CAOcM_bmg0o8GQR3DPsEnWcmW+kG1J71Gwsjd6sVazx59SE3hnA@mail.gmail.com>
Subject: Re: OpenSUSE and Xen
To: peter.jac@protonmail.com
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

I don't know if it helps, but I had to install yast2-vm package before
any Xen options came up.  This must have been a recent change because
I saw guides that made no mention of it.

On Thu, Jul 16, 2020 at 2:30 PM <peter.jac@protonmail.com> wrote:
>
> Why the DVD doesn't have free space for Xen but have for KVM?
> OK, if it is because of DVD space then why not remove KVM and add Xen ins=
tead of it?
> I asked "https://forums.opensuse.org/showthread.php/541471-How-to-install=
-Xen-during-installation" .
>
>
>
> Sent from ProtonMail mobile
>
>
>
> -------- Original Message --------
> On Jul 16, 2020, 12:59 PM, J=C3=BCrgen Gro=C3=9F < jgross@suse.com> wrote=
:
>
>
> On 16.07.20 10:19, peter.jac@protonmail.com wrote:
> > Did you use internet during installation? The KVM package is available
> > on the DVD without the internet connection but Xen...
>
> Yes, I've used the network installer.
>
> The DVD is limited in space, so there has to be a selection what to put
> on it.
>
> Again: this here is the wrong place to ask why a distribution has chosen
> to not put some packages on their installation DVD. Ask the distributor,
> which is the openSUSE community in this case.
>
> Juergen
>
> >
> >
> > Sent from ProtonMail mobile
> >
> >
> >
> > -------- Original Message --------
> > On Jul 16, 2020, 11:02 AM, J=C3=BCrgen Gro=C3=9F < jgross@suse.com> wro=
te:
> >
> >
> > On 15.07.20 19:16, peter.jac@protonmail.com wrote:
> > >
> > > Hello,
> > > I have a question from all Xen Project developers and users.
> >
> > What? Not from me. ;-)
> >
> > > Is OpenSUSE supporting Xen Project?
> >
> > Why do you ask this here, instead of an OpenSUSE list/forum/whatever?
> >
> > > Did anyone install OpenSUSE?
> >
> > I know several people having done so, yes.
> >
> > > Why OpenSUSE not have any option about
> > > installing Xen during installation but have an option about KVM?
> >
> > Ask OpenSUSE community?
> >
> > BTW, I'm able to select "Xen Virtualization Host and Tools" from the
> > "Software" menu when installing openSUSE 15.2. It is even above the
> > "KVM Virtualization Host and Tools" option.
> >
> > > Why Xen package doesn't included?
> >
> > They are.
> >
> > Juergen
> >


From xen-users-bounces@lists.xenproject.org Thu Jul 16 21:36:11 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 21:36:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jwBWg-0007D2-Lu; Thu, 16 Jul 2020 21:34:46 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Jy4u=A3=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1jwBWf-0007Cx-Bd
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 21:34:45 +0000
X-Inumbo-ID: 29466a84-c7ac-11ea-9540-12813bfff9fa
Received: from syrinx.knorrie.org (unknown [82.94.188.77])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 29466a84-c7ac-11ea-9540-12813bfff9fa;
 Thu, 16 Jul 2020 21:34:43 +0000 (UTC)
Received: from [IPv6:2a02:a213:2b80:f000::12] (unknown
 [IPv6:2a02:a213:2b80:f000::12])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 64B27609A29D3;
 Thu, 16 Jul 2020 23:34:42 +0200 (CEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: xen-users@lists.xenproject.org, Sarah Newman <srn@prgmr.com>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
 <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
 <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
From: Hans van Kranenburg <hans@knorrie.org>
Autocrypt: addr=hans@knorrie.org; keydata=
 mQINBFo2pooBEADwTBe/lrCa78zuhVkmpvuN+pXPWHkYs0LuAgJrOsOKhxLkYXn6Pn7e3xm+
 ySfxwtFmqLUMPWujQYF0r5C6DteypL7XvkPP+FPVlQnDIifyEoKq8JZRPsAFt1S87QThYPC3
 mjfluLUKVBP21H3ZFUGjcf+hnJSN9d9MuSQmAvtJiLbRTo5DTZZvO/SuQlmafaEQteaOswme
 DKRcIYj7+FokaW9n90P8agvPZJn50MCKy1D2QZwvw0g2ZMR8yUdtsX6fHTe7Ym+tHIYM3Tsg
 2KKgt17NTxIqyttcAIaVRs4+dnQ23J98iFmVHyT+X2Jou+KpHuULES8562QltmkchA7YxZpT
 mLMZ6TPit+sIocvxFE5dGiT1FMpjM5mOVCNOP+KOup/N7jobCG15haKWtu9k0kPz+trT3NOn
 gZXecYzBmasSJro60O4bwBayG9ILHNn+v/ZLg/jv33X2MV7oYXf+ustwjXnYUqVmjZkdI/pt
 30lcNUxCANvTF861OgvZUR4WoMNK4krXtodBoEImjmT385LATGFt9HnXd1rQ4QzqyMPBk84j
 roX5NpOzNZrNJiUxj+aUQZcINtbpmvskGpJX0RsfhOh2fxfQ39ZP/0a2C59gBQuVCH6C5qsY
 rc1qTIpGdPYT+J1S2rY88AvPpr2JHZbiVqeB3jIlwVSmkYeB/QARAQABtCZIYW5zIHZhbiBL
 cmFuZW5idXJnIDxoYW5zQGtub3JyaWUub3JnPokCTgQTAQoAOBYhBOJv1o/B6NS2GUVGTueB
 VzIYDCpVBQJaNq7KAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEOeBVzIYDCpVgDMQ
 ANSQMebh0Rr6RNhfA+g9CKiCDMGWZvHvvq3BNo9TqAo9BC4neAoVciSmeZXIlN8xVALf6rF8
 lKy8L1omocMcWw7TlvZHBr2gZHKlFYYC34R2NvxS0xO8Iw5rhEU6paYaKzlrvxuXuHMVXgjj
 bM3zBiN8W4b9VW1MoynP9nvm1WaGtFI9GIyK9j6mBCU+N5hpvFtt4DBmuWjzdDkd3sWUufYd
 nQhGimWHEg95GWhQUiFvr4HRvYJpbjRRRQG3O/5Fm0YyTYZkI5CDzQIm5lhqKNqmuf2ENstS
 8KcBImlbwlzEpK9Pa3Z5MUeLZ5Ywwv+d11fyhk53aT9bipdEipvcGa6DrA0DquO4WlQR+RKU
 ywoGTgntwFu8G0+tmD8J1UE6kIzFwE5kiFWjM0rxv1tAgV9ZWqmp3sbI7vzbZXn+KI/wosHV
 iDeW5rYg+PdmnOlYXQIJO+t0KmF5zJlSe7daylKZKTYtk7w1Fq/Oh1Rps9h1C4sXN8OAUO7h
 1SAnEtehHfv52nPxwZiI6eqbvqV0uEEyLFS5pCuuwmPpC8AmOrciY2T8T+4pmkJNO2Nd3jOP
 cnJgAQrxPvD7ACp/85LParnoz5c9/nPHJB1FgbAa7N5d8ubqJgi+k9Q2lAL9vBxK67aZlFZ0
 Kd7u1w1rUlY12KlFWzxpd4TuHZJ8rwi7PUceuQINBFo2sK8BEADSZP5cKnGl2d7CHXdpAzVF
 6K4Hxwn5eHyKC1D/YvsY+otq3PnfLJeMf1hzv2OSrGaEAkGJh/9yXPOkQ+J1OxJJs9CY0fqB
 MvHZ98iTyeFAq+4CwKcnZxLiBchQJQd0dFPujtcoMkWgzp3QdzONdkK4P7+9XfryPECyCSUF
 ib2aEkuU3Ic4LYfsBqGR5hezbJqOs96ExMnYUCEAS5aeejr3xNb8NqZLPqU38SQCTLrAmPAX
 glKVnYyEVxFUV8EXXY6AK31lRzpCqmPxLoyhPAPda9BXchRluy+QOyg+Yn4Q2DSwbgCYPrxo
 HTZKxH+E+JxCMfSW35ZE5ufvAbY3IrfHIhbNnHyxbTRgYMDbTQCDyN9F2Rvx3EButRMApj+v
 OuaMBJF/fWfxL3pSIosG9Q7uPc+qJvVMHMRNnS0Y1QQ5ZPLG0zI5TeHzMnGmSTbcvn/NOxDe
 6EhumcclFS0foHR78l1uOhUItya/48WCJE3FvOS3+KBhYvXCsG84KVsJeen+ieX/8lnSn0d2
 ZvUsj+6wo+d8tcOAP+KGwJ+ElOilqW29QfV4qvqmxnWjDYQWzxU9WGagU3z0diN97zMEO4D8
 SfUu72S5O0o9ATgid9lEzMKdagXP94x5CRvBydWu1E5CTgKZ3YZv+U3QclOG5p9/4+QNbhqH
 W4SaIIg90CFMiwARAQABiQRsBBgBCgAgFiEE4m/Wj8Ho1LYZRUZO54FXMhgMKlUFAlo2sK8C
 GwICQAkQ54FXMhgMKlXBdCAEGQEKAB0WIQRJbJ13A1ob3rfuShiywd9yY2FfbAUCWjawrwAK
 CRCywd9yY2FfbMKbEACIGLdFrD5j8rz/1fm8xWTJlOb3+o5A6fdJ2eyPwr5njJZSG9i5R28c
 dMmcwLtVisfedBUYLaMBmCEHnj7ylOgJi60HE74ZySX055hKECNfmA9Q7eidxta5WeXeTPSb
 PwTQkAgUZ576AO129MKKP4jkEiNENePMuYugCuW7XGR+FCEC2efYlVwDQy24ZfR9Q1dNK2ny
 0gH1c+313l0JcNTKjQ0e7M9KsQSKUr6Tk0VGTFZE2dp+dJF1sxtWhJ6Ci7N1yyj3buFFpD9c
 kj5YQFqBkEwt3OGtYNuLfdwR4d47CEGdQSm52n91n/AKdhRDG5xvvADG0qLGBXdWvbdQFllm
 v47TlJRDc9LmwpIqgtaUGTVjtkhw0SdiwJX+BjhtWTtrQPbseDe2pN3gWte/dPidJWnj8zzS
 ggZ5otY2reSvM+79w/odUlmtaFx+IyFITuFnBVcMF0uGmQBBxssew8rePQejYQHz0bZUDNbD
 VaZiXqP4njzBJu5+nzNxQKzQJ0VDF6ve5K49y0RpT4IjNOupZ+OtlZTQyM7moag+Y6bcJ7KK
 8+MRdRjGFFWP6H/RCSFAfoOGIKTlZHubjgetyQhMwKJQ5KnGDm+XUkeIWyevPfCVPNvqF2q3
 viQm0taFit8L+x7ATpolZuSCat5PSXtgx1liGjBpPKnERxyNLQ/erRNcEACwEJliFbQm+c2i
 6ccpx2cdtyAI1yzWuE0nr9DqpsEbIZzTCIVyry/VZgdJ27YijGJWesj/ie/8PtpDu0Cf1pty
 QOKSpC9WvRCFGJPGS8MmvzepmX2DYQ5MSKTO5tRJZ8EwCFfd9OxX2g280rdcDyCFkY3BYrf9
 ic2PTKQokx+9sLCHAC/+feSx/MA/vYpY1EJwkAr37mP7Q8KA9PCRShJziiljh5tKQeIG4sz1
 QjOrS8WryEwI160jKBBNc/M5n2kiIPCrapBGsL58MumrtbL53VimFOAJaPaRWNSdWCJSnVSv
 kCHMl/1fRgzXEMpEmOlBEY0Kdd1Ut3S2cuwejzI+WbrQLgeps2N70Ztq50PkfWkj0jeethhI
 FqIJzNlUqVkHl1zCWSFsghxiMyZmqULaGcSDItYQ+3c9fxIO/v0zDg7bLeG9Zbj4y8E47xqJ
 6brtAAEJ1RIM42gzF5GW71BqZrbFFoI0C6AzgHjaQP1xfj7nBRSBz4ObqnsuvRr7H6Jme5rl
 eg7COIbm8R7zsFjF4tC6k5HMc1tZ8xX+WoDsurqeQuBOg7rggmhJEpDK2f+g8DsvKtP14Vs0
 Sn7fVJi87b5HZojry1lZB2pXUH90+GWPF7DabimBki4QLzmyJ/ENH8GspFulVR3U7r3YYQ5K
 ctOSoRq9pGmMi231Q+xx9LkCDQRaOtArARAA50ylThKbq0ACHyomxjQ6nFNxa9ICp6byU9Lh
 hKOax0GB6l4WebMsQLhVGRQ8H7DT84E7QLRYsidEbneB1ciToZkL5YFFaVxY0Hj1wKxCFcVo
 CRNtOfoPnHQ5m/eDLaO4o0KKL/kaxZwTn2jnl6BQDGX1Aak0u4KiUlFtoWn/E/NIv5QbTGSw
 IYuzWqqYBIzFtDbiQRvGw0NuKxAGMhwXy8VP05mmNwRdyh/CC4rWQPBTvTeMwr3nl8/G+16/
 cn4RNGhDiGTTXcX03qzZ5jZ5N7GLY5JtE6pTpLG+EXn5pAnQ7MvuO19cCbp6Dj8fXRmI0SVX
 WKSo0A2C8xH6KLCRfUMzD7nvDRU+bAHQmbi5cZBODBZ5yp5CfIL1KUCSoiGOMpMin3FrarIl
 cxhNtoE+ya23A+JVtOwtM53ESra9cJL4WPkyk/E3OvNDmh8U6iZXn4ZaKQTHaxN9yvmAUhZQ
 iQi/sABwxCcQQ2ydRb86Vjcbx+FUr5OoEyQS46gc3KN5yax9D3H9wrptOzkNNMUhFj0oK0fX
 /MYDWOFeuNBTYk1uFRJDmHAOp01rrMHRogQAkMBuJDMrMHfolivZw8RKfdPzgiI500okLTzH
 C0wgSSAOyHKGZjYjbEwmxsl3sLJck9IPOKvqQi1DkvpOPFSUeX3LPBIav5UUlXt0wjbzInUA
 EQEAAYkCNgQYAQoAIBYhBOJv1o/B6NS2GUVGTueBVzIYDCpVBQJaOtArAhsMAAoJEOeBVzIY
 DCpV4kgP+wUh3BDRhuKaZyianKroStgr+LM8FIUwQs3Fc8qKrcDaa35vdT9cocDZjkaGHprp
 mlN0OuT2PB+Djt7am2noV6Kv1C8EnCPpyDBCwa7DntGdGcGMjH9w6aR4/ruNRUGS1aSMw8sR
 QgpTVWEyzHlnIH92D+k+IhdNG+eJ6o1fc7MeC0gUwMt27Im+TxVxc0JRfniNk8PUAg4kvJq7
 z7NLBUcJsIh3hM0WHQH9AYe/mZhQq5oyZTsz4jo/dWFRSlpY7zrDS2TZNYt4cCfZj1bIdpbf
 SpRi9M3W/yBF2WOkwYgbkqGnTUvr+3r0LMCH2H7nzENrYxNY2kFmDX9bBvOWsWpcMdOEo99/
 Iayz5/q2d1rVjYVFRm5U9hG+C7BYvtUOnUvSEBeE4tnJBMakbJPYxWe61yANDQubPsINB10i
 ngzsm553yqEjLTuWOjzdHLpE4lzD416ExCoZy7RLEHNhM1YQSI2RNs8umlDfZM9Lek1+1kgB
 vT3RH0/CpPJgveWV5xDOKuhD8j5l7FME+t2RWP+gyLid6dE0C7J03ir90PlTEkMEHEzyJMPt
 OhO05Phy+d51WPTo1VSKxhL4bsWddHLfQoXW8RQ388Q69JG4m+JhNH/XvWe3aQFpYP+GZuzO
 hkMez0lHCaVOOLBSKHkAHh9i0/pH+/3hfEa4NsoHCpyy
Message-ID: <006d011b-a440-29c6-b9fb-5bd121d55839@knorrie.org>
Date: Thu, 16 Jul 2020 23:34:41 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Adam Goryachev <mailinglists@websitemanagers.com.au>, Casper <kl@os.lv>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 7/16/20 5:57 AM, Sarah Newman wrote:
> On 7/14/20 2:00 AM, Hans van Kranenburg wrote:
>> On 7/14/20 1:16 AM, Adam Goryachev wrote:
>>>
>>> On 14/7/20 03:02, Hans van Kranenburg wrote:
>>>> Hi Casper,
>>>>
>>>> On 7/9/20 10:45 AM, Casper wrote:
>>>>> [...]
>>>>> Or problem with Debian Xen package as it not so popular anymore?
>>>>> Any suggestion what to test to figure out problem?
>>>
>>> BTW, I don't think is a general rule that Debian 10.4 with packages Xen
>>> 4.11 doesn't work.
>>
>> True. It just works (tm), until you have some edge case hardware that
>> misbehaves, or you run into an edge case bug with a very specific
>> combination of non-default configuration here and there (or when you try
>> to use EFI, cough).
>>
>> So, to add to the list:
>> * Run latest BIOS / cpu microcode that is available.
>> * Other firmware, e.g. for raid controller or whatever?
>> * Is the box using ECC memory? I mean, even a memory module that flips a
>> bit now and then can crash a server every few weeks... Run a memtest or
>> 7zip benchmark or what was the thing that's very good at exposing memory
>> errors...
>>
>> Also, feel free to open a bug report in the Debian bug tracker, we're
>> willing to help, but expect that you have to do the work to gather all
>> info. I don't have a similar piece of hardware lying around here... What
>> distro package maintainers can do is help users to gather enough info to
>> have a good report that doesn't waste too much time of the upstream
>> developers.
> 
> Here is a bug I opened a week ago against Debian Buster:
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964494
> 
> It looks like only newer versions of the kernel are a problem. We think the trigger is either ext3 or Xen.
> 
> The problem may not show up for weeks, and we do not know what triggers it.
> 
> If anyone has more data points to add that would help isolate the issue to one or the other, it would be appreciated.

You're not running Debian Xen packages apparently, so I can't say much
about that part. Except that for the Debian stuff, we only use the
upstream stable-X.Y branches and never apply security patches from XSAs
ourselves manually. There are just too many ways in which shooting into
feet can be done. The upstream staging-X.Y branch is tested before the
commits get pushed into stable-X.Y. Debian security updates are done
with that, and the other bug fixes and dependent commits in the stable
branch just also go in at the same time. Doing this means that we make
our users run something that the upstream developers will not disapprove
of, whenever we need to ask them to help with something. (Yes, for the
careful reader, that actually means that the current
4.11.4+24-gddaaccbbab-1~deb10u1 in buster-security is 100% the same as
is if it would be in buster-backports).

But, is that Linux 4.9 in the dom0? Begin by eliminating that. Our
milage may vary, but at work, we skipped from Jessie to Buster (well,
actually to our own strech-backports) because I really could not get
anything working with Linux 4.9 as dom0 kernel after the whole
Spectre/Meltdown stuff unfolded. We never got to the bottom of it, due
to a big lack of time and kernel debugging knowledge/experience, but
what I have seen is random Oopses, disk corruption and other things.

Are you using live migration?

So, why not get those dom0s to latest Xen 4.11 packages from Debian and
Linux 4.19? It's flying here, with several clusters of dozens of servers
and a few dozen TiB of mems, running thousands of domUs, without any
problem.

I agree with Ben that using ext3 nowadays should be discouraged because
of the amount of usage and testing decreasing.

But, I might have the luxury of working with a setup where we manage all
of it and have customers look at some GUI and have no idea about the
actual underlying systems. Having customers run anything they want is a
different slice of bread...

Anyway, the above is just some thinking out loud. I know that it's very
difficult to debug these kinds of things, because you need more failures
happening to be able to correlate, and a reliable reproduction scenario
would be the ultimate thing as a start to figure out what's actually
going wrong, but these are really difficult time consuming tasks.

Have fun,
Hans


From xen-users-bounces@lists.xenproject.org Thu Jul 16 22:00:20 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 22:00:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jwBu3-0000n2-10; Thu, 16 Jul 2020 21:58:55 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=L6TJ=A3=prgmr.com=srn@srs-us1.protection.inumbo.net>)
 id 1jwBu1-0000mx-Gj
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 21:58:53 +0000
X-Inumbo-ID: 88dd33b2-c7af-11ea-8496-bc764e2007e4
Received: from mail.prgmr.com (unknown [2605:2700:0:5::4713:9506])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 88dd33b2-c7af-11ea-8496-bc764e2007e4;
 Thu, 16 Jul 2020 21:58:52 +0000 (UTC)
Received: from [192.168.2.47] (c-174-62-72-237.hsd1.ca.comcast.net
 [174.62.72.237]) (Authenticated sender: srn)
 by mail.prgmr.com (Postfix) with ESMTPSA id 39E6072009F;
 Thu, 16 Jul 2020 17:58:51 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.prgmr.com 39E6072009F
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prgmr.com;
 s=default; t=1594936731;
 bh=/TfOCPGkpwu3ul9iln0tD5KKa03R8SKWu8Wtssc0W6Y=;
 h=Subject:To:Cc:References:From:Date:In-Reply-To:From;
 b=HexX0JwKoDF8iEMAiFZP67iZe6McKAAcmqtggc/6cHt0Em2chJa+ESlibz8sO5qLK
 LBgBZbtUtzm71EFNJ/m8Qh7TsfkAZVGKAcbNSvlMU+iCuN5t+aPp4ZEK49MimPkCHe
 6JlvRtvzhIQG7aVddvmaU49V+ytxa1+qOd+Fk1bE=
Subject: Re: Debian 10, xen 4.11 reliability
To: Hans van Kranenburg <hans@knorrie.org>, xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
 <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
 <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
 <006d011b-a440-29c6-b9fb-5bd121d55839@knorrie.org>
From: Sarah Newman <srn@prgmr.com>
Message-ID: <03a68524-060a-c468-638c-ddf022fc94be@prgmr.com>
Date: Thu, 16 Jul 2020 14:58:50 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <006d011b-a440-29c6-b9fb-5bd121d55839@knorrie.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Adam Goryachev <mailinglists@websitemanagers.com.au>, Casper <kl@os.lv>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 7/16/20 2:34 PM, Hans van Kranenburg wrote:

> You're not running Debian Xen packages apparently, so I can't say much
> about that part. 

> But, is that Linux 4.9 in the dom0? Begin by eliminating that. 

We've been running Linux 4.9 for a long time, though we plan to upgrade soon.

The timing does not correlate, and far less than one percent of our users are having issues.

> Our
> milage may vary, but at work, we skipped from Jessie to Buster (well,
> actually to our own strech-backports) because I really could not get
> anything working with Linux 4.9 as dom0 kernel after the whole
> Spectre/Meltdown stuff unfolded. We never got to the bottom of it, due
> to a big lack of time and kernel debugging knowledge/experience, but
> what I have seen is random Oopses, disk corruption and other things.

There were panics in the dom0 which I traced to a network driver, and I fixed it.

This is the first time we've had complaints of file system corruption.

> Are you using live migration?

Not so recently that it would have affected the two systems with problems.

> 
> So, why not get those dom0s to latest Xen 4.11 packages from Debian and
> Linux 4.19? It's flying here, with several clusters of dozens of servers
> and a few dozen TiB of mems, running thousands of domUs, without any
> problem.

Are your dom0's running the latest kernel version? Are they running ext3? What uptime have they had?

What about the domU's?

> 
> I agree with Ben that using ext3 nowadays should be discouraged because
> of the amount of usage and testing decreasing.

Yes. I think Debian and Ubuntu are the only distributions where we might have users who are using an old file system with a new kernel, which is why 
I'm focused on ext3. But I can't say for certain.

> But, I might have the luxury of working with a setup where we manage all
> of it and have customers look at some GUI and have no idea about the
> actual underlying systems. Having customers run anything they want is a
> different slice of bread...

It very much is.

> 
> Anyway, the above is just some thinking out loud. I know that it's very
> difficult to debug these kinds of things, because you need more failures
> happening to be able to correlate, and a reliable reproduction scenario
> would be the ultimate thing as a start to figure out what's actually
> going wrong, but these are really difficult time consuming tasks.

We're trying.

Thanks, Sarah


From xen-users-bounces@lists.xenproject.org Thu Jul 16 22:09:03 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 16 Jul 2020 22:09:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jwC3V-0001st-Jp; Thu, 16 Jul 2020 22:08:41 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=L6TJ=A3=prgmr.com=srn@srs-us1.protection.inumbo.net>)
 id 1jwC3T-0001si-Ud
 for xen-users@lists.xenproject.org; Thu, 16 Jul 2020 22:08:40 +0000
X-Inumbo-ID: e6d26770-c7b0-11ea-8496-bc764e2007e4
Received: from mail.prgmr.com (unknown [2605:2700:0:5::4713:9506])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id e6d26770-c7b0-11ea-8496-bc764e2007e4;
 Thu, 16 Jul 2020 22:08:39 +0000 (UTC)
Received: from [192.168.2.47] (c-174-62-72-237.hsd1.ca.comcast.net
 [174.62.72.237]) (Authenticated sender: srn)
 by mail.prgmr.com (Postfix) with ESMTPSA id 4D4A972009F;
 Thu, 16 Jul 2020 18:08:38 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.prgmr.com 4D4A972009F
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prgmr.com;
 s=default; t=1594937318;
 bh=J8vifsiqRFYkRtKqiqw5+jrsnwiq5EIqsvw/hqDgpO0=;
 h=From:Subject:To:References:Date:In-Reply-To:From;
 b=K3gvvTcO4v5dXuFrgwg5mJsuPVNMPpH7oIDYlxmtNrbf7vj+g6/xtEfTj85NzuUUR
 tblHo0utFglA2j5TW/FcvnijdIFtqLJchv2OrLnz319b3O6AJt/dZ4JVoIDjpUIZC+
 PvnHlTsbGV0GOB9tgw32nLPI1DThu239//rxat54=
From: Sarah Newman <srn@prgmr.com>
Subject: Re: System hangs when NVMe is under load
To: Stanislav <stanislav.ivanov@abilixsoft.eu>, xen-users@lists.xenproject.org
References: <3448136c-bc11-dc30-7c57-853b51429cb1@abilixsoft.eu>
Message-ID: <b730a2ce-a7e2-55e4-d646-27e7527d97d2@prgmr.com>
Date: Thu, 16 Jul 2020 15:08:37 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <3448136c-bc11-dc30-7c57-853b51429cb1@abilixsoft.eu>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 7/16/20 6:34 AM, Stanislav wrote:
> Hello,
> 
> I would like to be excused beforehand if i am sending something the the wrong folks.
> 
> We have a strange situation going on here with a couple of our servers. We've been experiencing issues with the combination of Debian+XEN+Samsung NVMe.
> 
> Problem:
> 
> It all began with https://serverfault.com/questions/1006366/samsung-nvme-disappears-when-server-on-average-to-high-load
> 
> The situation is close to the one described above with some differences. *Now It can be reproduced.*
> 
>   * OS: 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2+deb10u1
>   * CPUS: Intel(R) Xeon(R) CPU E5-1650 v4
>   * NVMe: Samsung MZ1LB1T9HALS-00007
>   * xen_version            : 4.11.4-pre
>   * Server: Supermicro Super Server/X10SRW-F, BIOS 3.2
> 
> We've gathered some more information - It happens only when XEN is loaded.
> 
> The command that breaks everything is the following and it breaks it fast. In the following situation it just needs approx 20 secs to hang the whole 
> system. I am attaching the Call trace which occurs during the hang up.

Does the system still respond to sysrq https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html ? The dom0 is a PV system so you'll need to use 
ctrl-o to send a break if you're on the serial console. You could try to use that to dump a backtrace for all the CPUs.

You can also try sending a command to xen. Xen has a debug handler, which unfortunately I can't find good documentation for (this seems like something 
really basic missing, oops.) In any case, if you use 'ctrl-a' three times on your console that should switch between Xen and the dom0. From there 'h' 
shows the commands. I do not have useful advice on what to collect there.

You may also be interesting in trying a debug kernel build. We did one already for Debian for other reasons so we may be able to help you with that.

--Sarah


From xen-users-bounces@lists.xenproject.org Fri Jul 17 07:50:32 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 17 Jul 2020 07:50:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jwL7b-00036U-9p; Fri, 17 Jul 2020 07:49:31 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VT94=A4=protonmail.com=peter.jac@srs-us1.protection.inumbo.net>)
 id 1jwL7Z-00036O-7v
 for xen-users@lists.xenproject.org; Fri, 17 Jul 2020 07:49:29 +0000
X-Inumbo-ID: 096da186-c802-11ea-9597-12813bfff9fa
Received: from mail-40141.protonmail.ch (unknown [185.70.40.141])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 096da186-c802-11ea-9597-12813bfff9fa;
 Fri, 17 Jul 2020 07:49:26 +0000 (UTC)
Date: Fri, 17 Jul 2020 07:49:23 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
 s=protonmail; t=1594972165;
 bh=WaqXEQ3EXd8wNgNditYlezxxk36qikH8nMNZrAHcaRI=;
 h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References:From;
 b=oShMxnP48Q0s8oolLXv5IToeO555GTwaiE7xCSBz5GrOMu283SP2tHkIcp46CCFsk
 Jp+zJY5FbvTkOa3j1+QQfbycC+zUeL2UHfZzA8tRQJo43BVidzcx7hsW2dqFuWjnEc
 HypCkt3h5Pp74JBHEAZyvRTn9xqzqNE4fitT76tY=
To: bifferos@gmail.com
From: peter.jac@protonmail.com
Subject: Re: OpenSUSE and Xen
Message-ID: <LCj_OqTxXg5NyQ8e9gzNLgFjAaMJFebFzkp9OQwmowQGCYUzCnrrr4sEgHqVn_isRweKUwY5pexYVhS3LdiUm8Sx0rKOR9rtLrCom29ipVU=@protonmail.com>
In-Reply-To: <CAOcM_bmg0o8GQR3DPsEnWcmW+kG1J71Gwsjd6sVazx59SE3hnA@mail.gmail.com>
References: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
 <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
 <uoEjrT5tecvyi0A__wOfDHcCjeQTklewSye5avJNNFIdIj07bJqiWKgfuPDME-moDKtYf0M5GtJjAnXpAez4pDtYq-J2kQKvWs82oi7gNuk=@protonmail.com>
 <c664873c-fd6d-50f1-6b8f-6ab2df6117f6@suse.com>
 <QJsI6mPfR32_GggzP4GuTblBmFNNxloB_3c-TPtmmrVLxOlAuM6WzZg75dwQo8mqFyMZkJxG3Zc88qXpOR7tWYWZFjCfh2phKbDtsC8k_F8=@protonmail.com>
 <CAOcM_bmg0o8GQR3DPsEnWcmW+kG1J71Gwsjd6sVazx59SE3hnA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
 boundary="b1_sJ4KY5AAyZu7XnAGLmSPuG1HaNJ87UnG2NM8NDS1s"
X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE
 shortcircuit=no autolearn=disabled version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mail.protonmail.ch
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: peter.jac@protonmail.com
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

This is a multi-part message in MIME format.

--b1_sJ4KY5AAyZu7XnAGLmSPuG1HaNJ87UnG2NM8NDS1s
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64
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=

--b1_sJ4KY5AAyZu7XnAGLmSPuG1HaNJ87UnG2NM8NDS1s
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: base64
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==


--b1_sJ4KY5AAyZu7XnAGLmSPuG1HaNJ87UnG2NM8NDS1s--



From xen-users-bounces@lists.xenproject.org Fri Jul 17 08:57:14 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 17 Jul 2020 08:57:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jwM9i-0001lw-UF; Fri, 17 Jul 2020 08:55:46 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=2UYq=A4=mindef.nl=j.witvliet@srs-us1.protection.inumbo.net>)
 id 1jwM9h-0001lr-0p
 for xen-users@lists.xenproject.org; Fri, 17 Jul 2020 08:55:45 +0000
X-Inumbo-ID: 4a955aba-c80b-11ea-bca7-bc764e2007e4
Received: from mx.mindef.nl (unknown [217.169.235.200])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 4a955aba-c80b-11ea-bca7-bc764e2007e4;
 Fri, 17 Jul 2020 08:55:41 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mindef.nl;
 h=from : to : cc :
 subject : date : references : in-reply-to : content-type : mime-version :
 message-id; s=key01; bh=Q3A0wr+0a74ngSoTo7cFt7WevP4HnZkYA6R36z2GaTw=;
 b=jKCBLwACjHB/KDo9Lkqp943UxY1UwFjhqGZIhF6bPGShx+vedYq8HPLyhW7Y15stV2ih
 H1a9MwlDW3Nce5A7gxQY8l/fMbPrxg5d8s0CSlSvvnK2QBLYbCefhD/QhD8f8wNSeu6X
 4RmjBVcTenTLnagmai9b54sM8n2Gu5fmnIOIQpEyfNskjsDzHyMuVH1STpEtr6FmvPho
 9X413WRSL+NjvDwcjMcv7Jy7GNjpzZ9nDZpq6zqNnkJ9boYaWX7vmYQkQucQQE9OxvY3
 DlHO1/R+Dsn+bpwasPxbZmq6YjB1uHT7iyUQoZq1VMpZN7jiD33x4K3u+1OTfJznwYOF aA== 
Received: by someone from somewhere
Message-Id: <3271gfuc2r-1@0151ims402.msg.iegi.nl>
Received: from somewhere by someone
Received: from somewhere by someone
Received: from somewhere by someone
From: <J.Witvliet@mindef.nl>
To: <peter.jac@protonmail.com>, <bifferos@gmail.com>
Subject: RE: OpenSUSE and Xen
Date: Fri, 17 Jul 2020 08:55:39 +0000
References: <jy5CG4DqGrBAir35SWF8DPAZHsHJPYzw4pdQWS8fMylQgEe3hrFhfJG2lZmgvXorh1TayKgqOgrEX8413UGzmF-RU4i_V479poF1OrnKNw8=@protonmail.com>
 <a6b4386f-6722-486d-9933-3cb32906b474@suse.com>
 <uoEjrT5tecvyi0A__wOfDHcCjeQTklewSye5avJNNFIdIj07bJqiWKgfuPDME-moDKtYf0M5GtJjAnXpAez4pDtYq-J2kQKvWs82oi7gNuk=@protonmail.com>
 <c664873c-fd6d-50f1-6b8f-6ab2df6117f6@suse.com>
 <QJsI6mPfR32_GggzP4GuTblBmFNNxloB_3c-TPtmmrVLxOlAuM6WzZg75dwQo8mqFyMZkJxG3Zc88qXpOR7tWYWZFjCfh2phKbDtsC8k_F8=@protonmail.com>
 <CAOcM_bmg0o8GQR3DPsEnWcmW+kG1J71Gwsjd6sVazx59SE3hnA@mail.gmail.com>
 <59e2883f-3ca0-40ae-99b1-e8cbea928d1a@QAD40086.mod.nl>
In-Reply-To: <59e2883f-3ca0-40ae-99b1-e8cbea928d1a@QAD40086.mod.nl>
Accept-Language: en-US, nl-NL
Content-Language: en-US
Content-Type: multipart/alternative;
 boundary="_000_aed265c0148344668b4338882e9d80f6mindefnl_"
MIME-Version: 1.0
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--_000_aed265c0148344668b4338882e9d80f6mindefnl_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

QXBwYXJlbnRseSDigJx0aGlzIGdvYWzigJ0gbmVlZHMgdG8gYmUgc3ByZWFkIHRvIGJleW9uZCB0
aGUgcGVyaW1ldGVycyBvZiBTVVNFLiBIZW5jZSB0aGUgbXNnIG9mIHRoZSBPLlAuIOKYug0KDQpG
cm9tOiBYZW4tdXNlcnMgPHhlbi11c2Vycy1ib3VuY2VzQGxpc3RzLnhlbnByb2plY3Qub3JnPiBP
biBCZWhhbGYgT2YgcGV0ZXIuamFjQHByb3Rvbm1haWwuY29tDQpTZW50OiBGcmlkYXksIEp1bHkg
MTcsIDIwMjAgOTo0OSBBTQ0KVG86IGJpZmZlcm9zQGdtYWlsLmNvbQ0KQ2M6IHhlbi11c2Vyc0Bs
aXN0cy54ZW5wcm9qZWN0Lm9yZw0KU3ViamVjdDogUmU6IE9wZW5TVVNFIGFuZCBYZW4NCg0KVGhl
IGdvYWwgb2YgU1VTRSBpcyBjbGVhci4NCg0KDQpTZW50IGZyb20gUHJvdG9uTWFpbCBtb2JpbGUN
Cg0KDQoNCi0tLS0tLS0tIE9yaWdpbmFsIE1lc3NhZ2UgLS0tLS0tLS0NCk9uIEp1bCAxNiwgMjAy
MCwgNzozMCBQTSwgQmlmZiBFcm9zIDwgYmlmZmVyb3NAZ21haWwuY29tPG1haWx0bzpiaWZmZXJv
c0BnbWFpbC5jb20+PiB3cm90ZToNCg0KDQpJIGRvbid0IGtub3cgaWYgaXQgaGVscHMsIGJ1dCBJ
IGhhZCB0byBpbnN0YWxsIHlhc3QyLXZtIHBhY2thZ2UgYmVmb3JlDQphbnkgWGVuIG9wdGlvbnMg
Y2FtZSB1cC4gVGhpcyBtdXN0IGhhdmUgYmVlbiBhIHJlY2VudCBjaGFuZ2UgYmVjYXVzZQ0KSSBz
YXcgZ3VpZGVzIHRoYXQgbWFkZSBubyBtZW50aW9uIG9mIGl0Lg0KDQpPbiBUaHUsIEp1bCAxNiwg
MjAyMCBhdCAyOjMwIFBNIDxwZXRlci5qYWNAcHJvdG9ubWFpbC5jb208bWFpbHRvOnBldGVyLmph
Y0Bwcm90b25tYWlsLmNvbT4+IHdyb3RlOg0KPg0KPiBXaHkgdGhlIERWRCBkb2Vzbid0IGhhdmUg
ZnJlZSBzcGFjZSBmb3IgWGVuIGJ1dCBoYXZlIGZvciBLVk0/DQo+IE9LLCBpZiBpdCBpcyBiZWNh
dXNlIG9mIERWRCBzcGFjZSB0aGVuIHdoeSBub3QgcmVtb3ZlIEtWTSBhbmQgYWRkIFhlbiBpbnN0
ZWFkIG9mIGl0Pw0KPiBJIGFza2VkICJodHRwczovL2ZvcnVtcy5vcGVuc3VzZS5vcmcvc2hvd3Ro
cmVhZC5waHAvNTQxNDcxLUhvdy10by1pbnN0YWxsLVhlbi1kdXJpbmctaW5zdGFsbGF0aW9uIiAu
DQo+DQo+DQo+DQo+IFNlbnQgZnJvbSBQcm90b25NYWlsIG1vYmlsZQ0KPg0KPg0KPg0KPiAtLS0t
LS0tLSBPcmlnaW5hbCBNZXNzYWdlIC0tLS0tLS0tDQo+IE9uIEp1bCAxNiwgMjAyMCwgMTI6NTkg
UE0sIErDvHJnZW4gR3Jvw58gPCBqZ3Jvc3NAc3VzZS5jb208bWFpbHRvOmpncm9zc0BzdXNlLmNv
bT4+IHdyb3RlOg0KPg0KPg0KPiBPbiAxNi4wNy4yMCAxMDoxOSwgcGV0ZXIuamFjQHByb3Rvbm1h
aWwuY29tPG1haWx0bzpwZXRlci5qYWNAcHJvdG9ubWFpbC5jb20+IHdyb3RlOg0KPiA+IERpZCB5
b3UgdXNlIGludGVybmV0IGR1cmluZyBpbnN0YWxsYXRpb24/IFRoZSBLVk0gcGFja2FnZSBpcyBh
dmFpbGFibGUNCj4gPiBvbiB0aGUgRFZEIHdpdGhvdXQgdGhlIGludGVybmV0IGNvbm5lY3Rpb24g
YnV0IFhlbi4uLg0KPg0KPiBZZXMsIEkndmUgdXNlZCB0aGUgbmV0d29yayBpbnN0YWxsZXIuDQo+
DQo+IFRoZSBEVkQgaXMgbGltaXRlZCBpbiBzcGFjZSwgc28gdGhlcmUgaGFzIHRvIGJlIGEgc2Vs
ZWN0aW9uIHdoYXQgdG8gcHV0DQo+IG9uIGl0Lg0KPg0KPiBBZ2FpbjogdGhpcyBoZXJlIGlzIHRo
ZSB3cm9uZyBwbGFjZSB0byBhc2sgd2h5IGEgZGlzdHJpYnV0aW9uIGhhcyBjaG9zZW4NCj4gdG8g
bm90IHB1dCBzb21lIHBhY2thZ2VzIG9uIHRoZWlyIGluc3RhbGxhdGlvbiBEVkQuIEFzayB0aGUg
ZGlzdHJpYnV0b3IsDQo+IHdoaWNoIGlzIHRoZSBvcGVuU1VTRSBjb21tdW5pdHkgaW4gdGhpcyBj
YXNlLg0KPg0KPiBKdWVyZ2VuDQo+DQo+ID4NCj4gPg0KPiA+IFNlbnQgZnJvbSBQcm90b25NYWls
IG1vYmlsZQ0KPiA+DQo+ID4NCj4gPg0KPiA+IC0tLS0tLS0tIE9yaWdpbmFsIE1lc3NhZ2UgLS0t
LS0tLS0NCj4gPiBPbiBKdWwgMTYsIDIwMjAsIDExOjAyIEFNLCBKw7xyZ2VuIEdyb8OfIDwgamdy
b3NzQHN1c2UuY29tPG1haWx0bzpqZ3Jvc3NAc3VzZS5jb20+PiB3cm90ZToNCj4gPg0KPiA+DQo+
ID4gT24gMTUuMDcuMjAgMTk6MTYsIHBldGVyLmphY0Bwcm90b25tYWlsLmNvbTxtYWlsdG86cGV0
ZXIuamFjQHByb3Rvbm1haWwuY29tPiB3cm90ZToNCj4gPiA+DQo+ID4gPiBIZWxsbywNCj4gPiA+
IEkgaGF2ZSBhIHF1ZXN0aW9uIGZyb20gYWxsIFhlbiBQcm9qZWN0IGRldmVsb3BlcnMgYW5kIHVz
ZXJzLg0KPiA+DQo+ID4gV2hhdD8gTm90IGZyb20gbWUuIDstKQ0KPiA+DQo+ID4gPiBJcyBPcGVu
U1VTRSBzdXBwb3J0aW5nIFhlbiBQcm9qZWN0Pw0KPiA+DQo+ID4gV2h5IGRvIHlvdSBhc2sgdGhp
cyBoZXJlLCBpbnN0ZWFkIG9mIGFuIE9wZW5TVVNFIGxpc3QvZm9ydW0vd2hhdGV2ZXI/DQo+ID4N
Cj4gPiA+IERpZCBhbnlvbmUgaW5zdGFsbCBPcGVuU1VTRT8NCj4gPg0KPiA+IEkga25vdyBzZXZl
cmFsIHBlb3BsZSBoYXZpbmcgZG9uZSBzbywgeWVzLg0KPiA+DQo+ID4gPiBXaHkgT3BlblNVU0Ug
bm90IGhhdmUgYW55IG9wdGlvbiBhYm91dA0KPiA+ID4gaW5zdGFsbGluZyBYZW4gZHVyaW5nIGlu
c3RhbGxhdGlvbiBidXQgaGF2ZSBhbiBvcHRpb24gYWJvdXQgS1ZNPw0KPiA+DQo+ID4gQXNrIE9w
ZW5TVVNFIGNvbW11bml0eT8NCj4gPg0KPiA+IEJUVywgSSdtIGFibGUgdG8gc2VsZWN0ICJYZW4g
VmlydHVhbGl6YXRpb24gSG9zdCBhbmQgVG9vbHMiIGZyb20gdGhlDQo+ID4gIlNvZnR3YXJlIiBt
ZW51IHdoZW4gaW5zdGFsbGluZyBvcGVuU1VTRSAxNS4yLiBJdCBpcyBldmVuIGFib3ZlIHRoZQ0K
PiA+ICJLVk0gVmlydHVhbGl6YXRpb24gSG9zdCBhbmQgVG9vbHMiIG9wdGlvbi4NCj4gPg0KPiA+
ID4gV2h5IFhlbiBwYWNrYWdlIGRvZXNuJ3QgaW5jbHVkZWQ/DQo+ID4NCj4gPiBUaGV5IGFyZS4N
Cj4gPg0KPiA+IEp1ZXJnZW4NCj4gPg0KDQpEaXQgYmVyaWNodCBrYW4gaW5mb3JtYXRpZSBiZXZh
dHRlbiBkaWUgbmlldCB2b29yIHUgaXMgYmVzdGVtZC4gSW5kaWVuIHUgbmlldCBkZSBnZWFkcmVz
c2VlcmRlIGJlbnQgb2YgZGl0IGJlcmljaHQgYWJ1c2lldmVsaWprIGFhbiB1IGlzIHRvZWdlem9u
ZGVuLCB3b3JkdCB1IHZlcnpvY2h0IGRhdCBhYW4gZGUgYWZ6ZW5kZXIgdGUgbWVsZGVuIGVuIGhl
dCBiZXJpY2h0IHRlIHZlcndpamRlcmVuLiBEZSBTdGFhdCBhYW52YWFyZHQgZ2VlbiBhYW5zcHJh
a2VsaWpraGVpZCB2b29yIHNjaGFkZSwgdmFuIHdlbGtlIGFhcmQgb29rLCBkaWUgdmVyYmFuZCBo
b3VkdCBtZXQgcmlzaWNvJ3MgdmVyYm9uZGVuIGFhbiBoZXQgZWxla3Ryb25pc2NoIHZlcnplbmRl
biB2YW4gYmVyaWNodGVuLg0KDQpUaGlzIG1lc3NhZ2UgbWF5IGNvbnRhaW4gaW5mb3JtYXRpb24g
dGhhdCBpcyBub3QgaW50ZW5kZWQgZm9yIHlvdS4gSWYgeW91IGFyZSBub3QgdGhlIGFkZHJlc3Nl
ZSBvciBpZiB0aGlzIG1lc3NhZ2Ugd2FzIHNlbnQgdG8geW91IGJ5IG1pc3Rha2UsIHlvdSBhcmUg
cmVxdWVzdGVkIHRvIGluZm9ybSB0aGUgc2VuZGVyIGFuZCBkZWxldGUgdGhlIG1lc3NhZ2UuIFRo
ZSBTdGF0ZSBhY2NlcHRzIG5vIGxpYWJpbGl0eSBmb3IgZGFtYWdlIG9mIGFueSBraW5kIHJlc3Vs
dGluZyBmcm9tIHRoZSByaXNrcyBpbmhlcmVudCBpbiB0aGUgZWxlY3Ryb25pYyB0cmFuc21pc3Np
b24gb2YgbWVzc2FnZXMuDQo=

--_000_aed265c0148344668b4338882e9d80f6mindefnl_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_aed265c0148344668b4338882e9d80f6mindefnl_--


From xen-users-bounces@lists.xenproject.org Fri Jul 17 23:02:14 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 17 Jul 2020 23:02:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jwZLJ-0002ve-5I; Fri, 17 Jul 2020 23:00:37 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3x7/=A4=knorrie.org=hans@srs-us1.protection.inumbo.net>)
 id 1jwZLH-0002vW-Bf
 for xen-users@lists.xenproject.org; Fri, 17 Jul 2020 23:00:35 +0000
X-Inumbo-ID: 5156cb42-c881-11ea-bca7-bc764e2007e4
Received: from syrinx.knorrie.org (unknown [2001:888:2177::4d])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 5156cb42-c881-11ea-bca7-bc764e2007e4;
 Fri, 17 Jul 2020 23:00:33 +0000 (UTC)
Received: from [IPv6:2a02:a213:2b80:f000::12] (unknown
 [IPv6:2a02:a213:2b80:f000::12])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by syrinx.knorrie.org (Postfix) with ESMTPSA id 4B2CE609A645B;
 Sat, 18 Jul 2020 01:00:32 +0200 (CEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: Sarah Newman <srn@prgmr.com>, xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
 <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
 <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
 <006d011b-a440-29c6-b9fb-5bd121d55839@knorrie.org>
 <03a68524-060a-c468-638c-ddf022fc94be@prgmr.com>
From: Hans van Kranenburg <hans@knorrie.org>
Autocrypt: addr=hans@knorrie.org; keydata=
 mQINBFo2pooBEADwTBe/lrCa78zuhVkmpvuN+pXPWHkYs0LuAgJrOsOKhxLkYXn6Pn7e3xm+
 ySfxwtFmqLUMPWujQYF0r5C6DteypL7XvkPP+FPVlQnDIifyEoKq8JZRPsAFt1S87QThYPC3
 mjfluLUKVBP21H3ZFUGjcf+hnJSN9d9MuSQmAvtJiLbRTo5DTZZvO/SuQlmafaEQteaOswme
 DKRcIYj7+FokaW9n90P8agvPZJn50MCKy1D2QZwvw0g2ZMR8yUdtsX6fHTe7Ym+tHIYM3Tsg
 2KKgt17NTxIqyttcAIaVRs4+dnQ23J98iFmVHyT+X2Jou+KpHuULES8562QltmkchA7YxZpT
 mLMZ6TPit+sIocvxFE5dGiT1FMpjM5mOVCNOP+KOup/N7jobCG15haKWtu9k0kPz+trT3NOn
 gZXecYzBmasSJro60O4bwBayG9ILHNn+v/ZLg/jv33X2MV7oYXf+ustwjXnYUqVmjZkdI/pt
 30lcNUxCANvTF861OgvZUR4WoMNK4krXtodBoEImjmT385LATGFt9HnXd1rQ4QzqyMPBk84j
 roX5NpOzNZrNJiUxj+aUQZcINtbpmvskGpJX0RsfhOh2fxfQ39ZP/0a2C59gBQuVCH6C5qsY
 rc1qTIpGdPYT+J1S2rY88AvPpr2JHZbiVqeB3jIlwVSmkYeB/QARAQABtCZIYW5zIHZhbiBL
 cmFuZW5idXJnIDxoYW5zQGtub3JyaWUub3JnPokCTgQTAQoAOBYhBOJv1o/B6NS2GUVGTueB
 VzIYDCpVBQJaNq7KAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEOeBVzIYDCpVgDMQ
 ANSQMebh0Rr6RNhfA+g9CKiCDMGWZvHvvq3BNo9TqAo9BC4neAoVciSmeZXIlN8xVALf6rF8
 lKy8L1omocMcWw7TlvZHBr2gZHKlFYYC34R2NvxS0xO8Iw5rhEU6paYaKzlrvxuXuHMVXgjj
 bM3zBiN8W4b9VW1MoynP9nvm1WaGtFI9GIyK9j6mBCU+N5hpvFtt4DBmuWjzdDkd3sWUufYd
 nQhGimWHEg95GWhQUiFvr4HRvYJpbjRRRQG3O/5Fm0YyTYZkI5CDzQIm5lhqKNqmuf2ENstS
 8KcBImlbwlzEpK9Pa3Z5MUeLZ5Ywwv+d11fyhk53aT9bipdEipvcGa6DrA0DquO4WlQR+RKU
 ywoGTgntwFu8G0+tmD8J1UE6kIzFwE5kiFWjM0rxv1tAgV9ZWqmp3sbI7vzbZXn+KI/wosHV
 iDeW5rYg+PdmnOlYXQIJO+t0KmF5zJlSe7daylKZKTYtk7w1Fq/Oh1Rps9h1C4sXN8OAUO7h
 1SAnEtehHfv52nPxwZiI6eqbvqV0uEEyLFS5pCuuwmPpC8AmOrciY2T8T+4pmkJNO2Nd3jOP
 cnJgAQrxPvD7ACp/85LParnoz5c9/nPHJB1FgbAa7N5d8ubqJgi+k9Q2lAL9vBxK67aZlFZ0
 Kd7u1w1rUlY12KlFWzxpd4TuHZJ8rwi7PUceuQINBFo2sK8BEADSZP5cKnGl2d7CHXdpAzVF
 6K4Hxwn5eHyKC1D/YvsY+otq3PnfLJeMf1hzv2OSrGaEAkGJh/9yXPOkQ+J1OxJJs9CY0fqB
 MvHZ98iTyeFAq+4CwKcnZxLiBchQJQd0dFPujtcoMkWgzp3QdzONdkK4P7+9XfryPECyCSUF
 ib2aEkuU3Ic4LYfsBqGR5hezbJqOs96ExMnYUCEAS5aeejr3xNb8NqZLPqU38SQCTLrAmPAX
 glKVnYyEVxFUV8EXXY6AK31lRzpCqmPxLoyhPAPda9BXchRluy+QOyg+Yn4Q2DSwbgCYPrxo
 HTZKxH+E+JxCMfSW35ZE5ufvAbY3IrfHIhbNnHyxbTRgYMDbTQCDyN9F2Rvx3EButRMApj+v
 OuaMBJF/fWfxL3pSIosG9Q7uPc+qJvVMHMRNnS0Y1QQ5ZPLG0zI5TeHzMnGmSTbcvn/NOxDe
 6EhumcclFS0foHR78l1uOhUItya/48WCJE3FvOS3+KBhYvXCsG84KVsJeen+ieX/8lnSn0d2
 ZvUsj+6wo+d8tcOAP+KGwJ+ElOilqW29QfV4qvqmxnWjDYQWzxU9WGagU3z0diN97zMEO4D8
 SfUu72S5O0o9ATgid9lEzMKdagXP94x5CRvBydWu1E5CTgKZ3YZv+U3QclOG5p9/4+QNbhqH
 W4SaIIg90CFMiwARAQABiQRsBBgBCgAgFiEE4m/Wj8Ho1LYZRUZO54FXMhgMKlUFAlo2sK8C
 GwICQAkQ54FXMhgMKlXBdCAEGQEKAB0WIQRJbJ13A1ob3rfuShiywd9yY2FfbAUCWjawrwAK
 CRCywd9yY2FfbMKbEACIGLdFrD5j8rz/1fm8xWTJlOb3+o5A6fdJ2eyPwr5njJZSG9i5R28c
 dMmcwLtVisfedBUYLaMBmCEHnj7ylOgJi60HE74ZySX055hKECNfmA9Q7eidxta5WeXeTPSb
 PwTQkAgUZ576AO129MKKP4jkEiNENePMuYugCuW7XGR+FCEC2efYlVwDQy24ZfR9Q1dNK2ny
 0gH1c+313l0JcNTKjQ0e7M9KsQSKUr6Tk0VGTFZE2dp+dJF1sxtWhJ6Ci7N1yyj3buFFpD9c
 kj5YQFqBkEwt3OGtYNuLfdwR4d47CEGdQSm52n91n/AKdhRDG5xvvADG0qLGBXdWvbdQFllm
 v47TlJRDc9LmwpIqgtaUGTVjtkhw0SdiwJX+BjhtWTtrQPbseDe2pN3gWte/dPidJWnj8zzS
 ggZ5otY2reSvM+79w/odUlmtaFx+IyFITuFnBVcMF0uGmQBBxssew8rePQejYQHz0bZUDNbD
 VaZiXqP4njzBJu5+nzNxQKzQJ0VDF6ve5K49y0RpT4IjNOupZ+OtlZTQyM7moag+Y6bcJ7KK
 8+MRdRjGFFWP6H/RCSFAfoOGIKTlZHubjgetyQhMwKJQ5KnGDm+XUkeIWyevPfCVPNvqF2q3
 viQm0taFit8L+x7ATpolZuSCat5PSXtgx1liGjBpPKnERxyNLQ/erRNcEACwEJliFbQm+c2i
 6ccpx2cdtyAI1yzWuE0nr9DqpsEbIZzTCIVyry/VZgdJ27YijGJWesj/ie/8PtpDu0Cf1pty
 QOKSpC9WvRCFGJPGS8MmvzepmX2DYQ5MSKTO5tRJZ8EwCFfd9OxX2g280rdcDyCFkY3BYrf9
 ic2PTKQokx+9sLCHAC/+feSx/MA/vYpY1EJwkAr37mP7Q8KA9PCRShJziiljh5tKQeIG4sz1
 QjOrS8WryEwI160jKBBNc/M5n2kiIPCrapBGsL58MumrtbL53VimFOAJaPaRWNSdWCJSnVSv
 kCHMl/1fRgzXEMpEmOlBEY0Kdd1Ut3S2cuwejzI+WbrQLgeps2N70Ztq50PkfWkj0jeethhI
 FqIJzNlUqVkHl1zCWSFsghxiMyZmqULaGcSDItYQ+3c9fxIO/v0zDg7bLeG9Zbj4y8E47xqJ
 6brtAAEJ1RIM42gzF5GW71BqZrbFFoI0C6AzgHjaQP1xfj7nBRSBz4ObqnsuvRr7H6Jme5rl
 eg7COIbm8R7zsFjF4tC6k5HMc1tZ8xX+WoDsurqeQuBOg7rggmhJEpDK2f+g8DsvKtP14Vs0
 Sn7fVJi87b5HZojry1lZB2pXUH90+GWPF7DabimBki4QLzmyJ/ENH8GspFulVR3U7r3YYQ5K
 ctOSoRq9pGmMi231Q+xx9LkCDQRaOtArARAA50ylThKbq0ACHyomxjQ6nFNxa9ICp6byU9Lh
 hKOax0GB6l4WebMsQLhVGRQ8H7DT84E7QLRYsidEbneB1ciToZkL5YFFaVxY0Hj1wKxCFcVo
 CRNtOfoPnHQ5m/eDLaO4o0KKL/kaxZwTn2jnl6BQDGX1Aak0u4KiUlFtoWn/E/NIv5QbTGSw
 IYuzWqqYBIzFtDbiQRvGw0NuKxAGMhwXy8VP05mmNwRdyh/CC4rWQPBTvTeMwr3nl8/G+16/
 cn4RNGhDiGTTXcX03qzZ5jZ5N7GLY5JtE6pTpLG+EXn5pAnQ7MvuO19cCbp6Dj8fXRmI0SVX
 WKSo0A2C8xH6KLCRfUMzD7nvDRU+bAHQmbi5cZBODBZ5yp5CfIL1KUCSoiGOMpMin3FrarIl
 cxhNtoE+ya23A+JVtOwtM53ESra9cJL4WPkyk/E3OvNDmh8U6iZXn4ZaKQTHaxN9yvmAUhZQ
 iQi/sABwxCcQQ2ydRb86Vjcbx+FUr5OoEyQS46gc3KN5yax9D3H9wrptOzkNNMUhFj0oK0fX
 /MYDWOFeuNBTYk1uFRJDmHAOp01rrMHRogQAkMBuJDMrMHfolivZw8RKfdPzgiI500okLTzH
 C0wgSSAOyHKGZjYjbEwmxsl3sLJck9IPOKvqQi1DkvpOPFSUeX3LPBIav5UUlXt0wjbzInUA
 EQEAAYkCNgQYAQoAIBYhBOJv1o/B6NS2GUVGTueBVzIYDCpVBQJaOtArAhsMAAoJEOeBVzIY
 DCpV4kgP+wUh3BDRhuKaZyianKroStgr+LM8FIUwQs3Fc8qKrcDaa35vdT9cocDZjkaGHprp
 mlN0OuT2PB+Djt7am2noV6Kv1C8EnCPpyDBCwa7DntGdGcGMjH9w6aR4/ruNRUGS1aSMw8sR
 QgpTVWEyzHlnIH92D+k+IhdNG+eJ6o1fc7MeC0gUwMt27Im+TxVxc0JRfniNk8PUAg4kvJq7
 z7NLBUcJsIh3hM0WHQH9AYe/mZhQq5oyZTsz4jo/dWFRSlpY7zrDS2TZNYt4cCfZj1bIdpbf
 SpRi9M3W/yBF2WOkwYgbkqGnTUvr+3r0LMCH2H7nzENrYxNY2kFmDX9bBvOWsWpcMdOEo99/
 Iayz5/q2d1rVjYVFRm5U9hG+C7BYvtUOnUvSEBeE4tnJBMakbJPYxWe61yANDQubPsINB10i
 ngzsm553yqEjLTuWOjzdHLpE4lzD416ExCoZy7RLEHNhM1YQSI2RNs8umlDfZM9Lek1+1kgB
 vT3RH0/CpPJgveWV5xDOKuhD8j5l7FME+t2RWP+gyLid6dE0C7J03ir90PlTEkMEHEzyJMPt
 OhO05Phy+d51WPTo1VSKxhL4bsWddHLfQoXW8RQ388Q69JG4m+JhNH/XvWe3aQFpYP+GZuzO
 hkMez0lHCaVOOLBSKHkAHh9i0/pH+/3hfEa4NsoHCpyy
Message-ID: <8439bfb6-66dc-d134-1570-b9401ff50ca0@knorrie.org>
Date: Sat, 18 Jul 2020 01:00:31 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <03a68524-060a-c468-638c-ddf022fc94be@prgmr.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: Adam Goryachev <mailinglists@websitemanagers.com.au>, Casper <kl@os.lv>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

On 7/16/20 11:58 PM, Sarah Newman wrote:
> On 7/16/20 2:34 PM, Hans van Kranenburg wrote:
> 
>> You're not running Debian Xen packages apparently, so I can't say much
>> about that part. 
> 
>> But, is that Linux 4.9 in the dom0? Begin by eliminating that. 
> 
> We've been running Linux 4.9 for a long time, though we plan to upgrade soon.
> 
> The timing does not correlate, and far less than one percent of our users are having issues.
> 
>> Our
>> milage may vary, but at work, we skipped from Jessie to Buster (well,
>> actually to our own strech-backports) because I really could not get
>> anything working with Linux 4.9 as dom0 kernel after the whole
>> Spectre/Meltdown stuff unfolded. We never got to the bottom of it, due
>> to a big lack of time and kernel debugging knowledge/experience, but
>> what I have seen is random Oopses, disk corruption and other things.
> 
> There were panics in the dom0 which I traced to a network driver, and I fixed it.

Oh, wonderful, thanks! :)

> This is the first time we've had complaints of file system corruption.
> 
>> Are you using live migration?
> 
> Not so recently that it would have affected the two systems with problems.
> 
>>
>> So, why not get those dom0s to latest Xen 4.11 packages from Debian and
>> Linux 4.19? It's flying here, with several clusters of dozens of servers
>> and a few dozen TiB of mems, running thousands of domUs, without any
>> problem.
> 
> Are your dom0's running the latest kernel version? Are they running ext3? What uptime have they had?

There's certainly 4.19.118-2 based dom0 kernels in the mix, yes. Dom0
filesystem is ext4.

> What about the domU's?

Some quite heavily used domUs on these servers. And filesystems are
either ext4 or btrfs.

So, no ext3 anywhere, at all.

>> I agree with Ben that using ext3 nowadays should be discouraged because
>> of the amount of usage and testing decreasing.
> 
> Yes. I think Debian and Ubuntu are the only distributions where we might have users who are using an old file system with a new kernel, which is why 
> I'm focused on ext3. But I can't say for certain.

Interesting. I have no great ideas or anything right now, sorry.

I can of course grab a test domU here and create an ext3 fs on an extra
block device, make it do something and then see what happens after some
time...

>> But, I might have the luxury of working with a setup where we manage all
>> of it and have customers look at some GUI and have no idea about the
>> actual underlying systems. Having customers run anything they want is a
>> different slice of bread...
> 
> It very much is.
> 
>>
>> Anyway, the above is just some thinking out loud. I know that it's very
>> difficult to debug these kinds of things, because you need more failures
>> happening to be able to correlate, and a reliable reproduction scenario
>> would be the ultimate thing as a start to figure out what's actually
>> going wrong, but these are really difficult time consuming tasks.
> 
> We're trying.

Good luck

Hans



From xen-users-bounces@lists.xenproject.org Sun Jul 19 17:25:51 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 19 Jul 2020 17:25:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxD2n-0004TM-Ui; Sun, 19 Jul 2020 17:24:09 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YfW4=A4=redhat.com=mcascell@srs-us1.protection.inumbo.net>)
 id 1jwLCa-0003zl-B8
 for xen-users@lists.xen.org; Fri, 17 Jul 2020 07:54:40 +0000
X-Inumbo-ID: c3b66ae6-c802-11ea-9597-12813bfff9fa
Received: from us-smtp-delivery-1.mimecast.com (unknown [205.139.110.120])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTP
 id c3b66ae6-c802-11ea-9597-12813bfff9fa;
 Fri, 17 Jul 2020 07:54:38 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
 s=mimecast20190719; t=1594972478;
 h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
 in-reply-to:in-reply-to:references:references;
 bh=mCVsudiUaJnZfsa/Js80mZXCIgbfZRyKNbODyzDeHsc=;
 b=dAUFeKc9WEopminlxhiMZnx628fNyHqAHXh0KAGvvWflKX3c+iRnUA81nwZlSvVfSR9KCJ
 vZ95an70CvF2N3pinXbG/SahuY0Mo1N63JwWmhDOFe+IaNeBtA3SlRAbVioADFq3OLyJOV
 U1n+SHq4ppuR7hSWMYEiE3swYlZgNYE=
Received: from mail-ej1-f72.google.com (mail-ej1-f72.google.com
 [209.85.218.72]) (Using TLS) by relay.mimecast.com with ESMTP id
 us-mta-418-MW2Ajpf5OQuaZsqBpcGLCQ-1; Fri, 17 Jul 2020 03:54:33 -0400
X-MC-Unique: MW2Ajpf5OQuaZsqBpcGLCQ-1
Received: by mail-ej1-f72.google.com with SMTP id yh3so5249575ejb.16
 for <xen-users@lists.xen.org>; Fri, 17 Jul 2020 00:54:33 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=mCVsudiUaJnZfsa/Js80mZXCIgbfZRyKNbODyzDeHsc=;
 b=nqXVqoJ0xkbiPEKRgY5ErE7JpQTq61UxuD1oApoOzEHQosT01E1zhkNCckk0v58FAZ
 2ircasSslwL0wQ7XqtWmAm6H3rz4F0bYg3AWlosgDpIX6UssUtEBzV+u4ijkQbPuI4Ye
 xduBoEzFyQwZoq74ZzXzvU9y8qCrKeYPm2ajbmTazvcV5OWEMV/5+Y4yzqjPp5e7VnjH
 bdwWWk2p/K0dJ+hD3LggyVrc0kAjl2T08KfRL1L0yu8Z0g99XPrER0prTUl09Pk58gyQ
 aC8jgCTE5IUzBGHXoykIuIRvvohMsepBUGDN6AtlpWD+LeEusB3dSNrUhcTEZ9tJw6m8
 ZTwg==
X-Gm-Message-State: AOAM5333s1mo9fpeUQy7vmLGuCrCUB5mFvQelBhiy3FKRIgXK//QiGG1
 UWYAKCsikIrYbPf0bx2ekqd/jMEIiazwHWinj8bsjTDvRMoEahJQR6+uxla2RW3thDf/ErktOcd
 mZHrTr9XtSQyL57Qa+lX9S6OnN5FLvTIW3w==
X-Received: by 2002:a05:6402:128c:: with SMTP id
 w12mr8386842edv.65.1594972472438; 
 Fri, 17 Jul 2020 00:54:32 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJxLKN6gyw2bSTiwmuJkYyGhJ40svEPXSZ9d0JZod1YuwomtXujKsvrP2uzhY6aXV7fbZddiMBwbXT37wvkoyuk=
X-Received: by 2002:a05:6402:128c:: with SMTP id
 w12mr8386835edv.65.1594972472226; 
 Fri, 17 Jul 2020 00:54:32 -0700 (PDT)
MIME-Version: 1.0
References: <E1jw3ms-0006i6-Se@xenbits.xenproject.org>
In-Reply-To: <E1jw3ms-0006i6-Se@xenbits.xenproject.org>
From: Mauro Matteo Cascella <mcascell@redhat.com>
Date: Fri, 17 Jul 2020 09:54:21 +0200
Message-ID: <CAA8xKjVib9UERsMrAy3nNdVssNxLciXTmmhmXqq1gvhO16URew@mail.gmail.com>
Subject: Re: [oss-security] Xen Security Advisory 329 v2 - Linux ioperm bitmap
 context switching issues
To: oss-security@lists.openwall.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: multipart/alternative; boundary="000000000000a245b105aa9e773c"
X-Mailman-Approved-At: Sun, 19 Jul 2020 17:24:08 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xen.org, xen-announce@lists.xen.org,
 "Xen.org security team" <security-team-members@xen.org>,
 xen-devel@lists.xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000a245b105aa9e773c
Content-Type: text/plain; charset="UTF-8"

Hello,

Will a CVE be assigned to this flaw?

Thanks,

On Thu, Jul 16, 2020 at 3:21 PM Xen.org security team <security@xen.org>
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
>                     Xen Security Advisory XSA-329
>                               version 2
>
>              Linux ioperm bitmap context switching issues
>
> UPDATES IN VERSION 2
> ====================
>
> Public release.
>
> ISSUE DESCRIPTION
> =================
>
> Linux 5.5 overhauled the internal state handling for the iopl() and
> ioperm()
> system calls.  Unfortunately, one aspect on context switch wasn't wired up
> correctly for the Xen PVOps case.
>
> IMPACT
> ======
>
> IO port permissions don't get rescinded when context switching to an
> unprivileged task.  Therefore, all userspace can use the IO ports granted
> to
> the most recently scheduled task with IO port permissions.
>
> VULNERABLE SYSTEMS
> ==================
>
> Only x86 guests are vulnerable.
>
> All versions of Linux from 5.5 are potentially vulnerable.
>
> Linux is only vulnerable when running as x86 PV guest.  Linux is not
> vulnerable when running as an x86 HVM/PVH guests.
>
> The vulnerability can only be exploited in domains which have been granted
> access to IO ports by Xen.  This is typically only the hardware domain, and
> guests configured with PCI Passthrough.
>
> MITIGATION
> ==========
>
> Running only HVM/PVH guests avoids the vulnerability.
>
> CREDITS
> =======
>
> This issue was discovered by Andy Lutomirski.
>
> RESOLUTION
> ==========
>
> Applying the appropriate attached patch resolves this issue.
>
> xsa329.patch           Linux 5.5 and later
>
> $ sha256sum xsa329*
> cdb5ac9bfd21192b5965e8ec0a1c4fcf12d0a94a962a8158cd27810e6aa362f0
> xsa329.patch
> $
>
> DEPLOYMENT DURING EMBARGO
> =========================
>
> Deployment of the patches and/or mitigations described above (or
> others which are substantially similar) is permitted during the
> embargo, even on public-facing systems with untrusted guest users and
> administrators.
>
> But: Distribution of updated software is prohibited (except to other
> members of the predisclosure list).
>
> Predisclosure list members who wish to deploy significantly different
> patches and/or mitigations, please contact the Xen Project Security
> Team.
>
>
> (Note: this during-embargo deployment notice is retained in
> post-embargo publicly released Xen Project advisories, even though it
> is then no longer applicable.  This is to enable the community to have
> oversight of the Xen Project Security Team's decisionmaking.)
>
> For more information about permissible uses of embargoed information,
> consult the Xen Project community's agreed Security Policy:
>   http://www.xenproject.org/security-policy.html
> -----BEGIN PGP SIGNATURE-----
>
> iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8QU6EMHHBncEB4ZW4u
> b3JnAAoJEIP+FMlX6CvZ/sEIAMiCOnz119KTlRU50HTwa4pvIgLphf9htTbPzHXS
> iEb8yINqMxmep8NRcAzwFREQP+Z4Tue1upt31Vx0RPkFZpUklLuuBSXsV0JA7+UM
> LSGyWhkzDdnfj6iPUHycGmFzRTzkbB7qfcMj7khCvuYtSNbTUdOgUq04ngZksrSJ
> UMhfgUNKXawULKvVe7572L/AQTmMXK8eaolb+eWtf1U2pFkZQR8GWoLmiFbKLks2
> X2tRUF4U4cHEBzxXRzYrD1ArWLajqK6hQmauwgkCCSowvCHoD1dTv55GlrlEo4od
> MSB6YOVLl7HJuUw1GmwlKjA8XqStHq1Fi0urvlKCfHfK2Wk=
> =MP+m
> -----END PGP SIGNATURE-----
>


-- 
Mauro Matteo Cascella, Red Hat Product Security
6F78 E20B 5935 928C F0A8  1A9D 4E55 23B8 BB34 10B0

--000000000000a245b105aa9e773c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello,<div><br></div><div>Will a CVE be assigned to this f=
law?</div><div><br></div><div>Thanks,</div></div><br><div class=3D"gmail_qu=
ote"><div dir=3D"ltr" class=3D"gmail_attr">On Thu, Jul 16, 2020 at 3:21 PM =
Xen.org security team &lt;<a href=3D"mailto:security@xen.org">security@xen.=
org</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"marg=
in:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1e=
x">-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA256<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Xen S=
ecurity Advisory XSA-329<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 version 2<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Linux ioperm bitmap context=
 switching issues<br>
<br>
UPDATES IN VERSION 2<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
Public release.<br>
<br>
ISSUE DESCRIPTION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
Linux 5.5 overhauled the internal state handling for the iopl() and ioperm(=
)<br>
system calls.=C2=A0 Unfortunately, one aspect on context switch wasn&#39;t =
wired up<br>
correctly for the Xen PVOps case.<br>
<br>
IMPACT<br>
=3D=3D=3D=3D=3D=3D<br>
<br>
IO port permissions don&#39;t get rescinded when context switching to an<br=
>
unprivileged task.=C2=A0 Therefore, all userspace can use the IO ports gran=
ted to<br>
the most recently scheduled task with IO port permissions.<br>
<br>
VULNERABLE SYSTEMS<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
Only x86 guests are vulnerable.<br>
<br>
All versions of Linux from 5.5 are potentially vulnerable.<br>
<br>
Linux is only vulnerable when running as x86 PV guest.=C2=A0 Linux is not<b=
r>
vulnerable when running as an x86 HVM/PVH guests.<br>
<br>
The vulnerability can only be exploited in domains which have been granted<=
br>
access to IO ports by Xen.=C2=A0 This is typically only the hardware domain=
, and<br>
guests configured with PCI Passthrough.<br>
<br>
MITIGATION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
Running only HVM/PVH guests avoids the vulnerability.<br>
<br>
CREDITS<br>
=3D=3D=3D=3D=3D=3D=3D<br>
<br>
This issue was discovered by Andy Lutomirski.<br>
<br>
RESOLUTION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
<br>
Applying the appropriate attached patch resolves this issue.<br>
<br>
xsa329.patch=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Linux 5.5 and later<br=
>
<br>
$ sha256sum xsa329*<br>
cdb5ac9bfd21192b5965e8ec0a1c4fcf12d0a94a962a8158cd27810e6aa362f0=C2=A0 xsa3=
29.patch<br>
$<br>
<br>
DEPLOYMENT DURING EMBARGO<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
<br>
<br>
Deployment of the patches and/or mitigations described above (or<br>
others which are substantially similar) is permitted during the<br>
embargo, even on public-facing systems with untrusted guest users and<br>
administrators.<br>
<br>
But: Distribution of updated software is prohibited (except to other<br>
members of the predisclosure list).<br>
<br>
Predisclosure list members who wish to deploy significantly different<br>
patches and/or mitigations, please contact the Xen Project Security<br>
Team.<br>
<br>
<br>
(Note: this during-embargo deployment notice is retained in<br>
post-embargo publicly released Xen Project advisories, even though it<br>
is then no longer applicable.=C2=A0 This is to enable the community to have=
<br>
oversight of the Xen Project Security Team&#39;s decisionmaking.)<br>
<br>
For more information about permissible uses of embargoed information,<br>
consult the Xen Project community&#39;s agreed Security Policy:<br>
=C2=A0 <a href=3D"http://www.xenproject.org/security-policy.html" rel=3D"no=
referrer" target=3D"_blank">http://www.xenproject.org/security-policy.html<=
/a><br>
-----BEGIN PGP SIGNATURE-----<br>
<br>
iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8QU6EMHHBncEB4ZW4u<br>
b3JnAAoJEIP+FMlX6CvZ/sEIAMiCOnz119KTlRU50HTwa4pvIgLphf9htTbPzHXS<br>
iEb8yINqMxmep8NRcAzwFREQP+Z4Tue1upt31Vx0RPkFZpUklLuuBSXsV0JA7+UM<br>
LSGyWhkzDdnfj6iPUHycGmFzRTzkbB7qfcMj7khCvuYtSNbTUdOgUq04ngZksrSJ<br>
UMhfgUNKXawULKvVe7572L/AQTmMXK8eaolb+eWtf1U2pFkZQR8GWoLmiFbKLks2<br>
X2tRUF4U4cHEBzxXRzYrD1ArWLajqK6hQmauwgkCCSowvCHoD1dTv55GlrlEo4od<br>
MSB6YOVLl7HJuUw1GmwlKjA8XqStHq1Fi0urvlKCfHfK2Wk=3D<br>
=3DMP+m<br>
-----END PGP SIGNATURE-----<br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr">Mauro Matteo Cascella, Red Hat =
Product Security<div>6F78 E20B 5935 928C F0A8=C2=A0 1A9D 4E55 23B8 BB34 10B=
0<br></div></div></div>

--000000000000a245b105aa9e773c--



From xen-users-bounces@lists.xenproject.org Mon Jul 20 08:55:07 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 20 Jul 2020 08:55:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxRYM-00019F-Nx; Mon, 20 Jul 2020 08:53:42 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=P8Ht=A7=os.lv=kl@srs-us1.protection.inumbo.net>)
 id 1jxRYL-00019A-TJ
 for xen-users@lists.xenproject.org; Mon, 20 Jul 2020 08:53:41 +0000
X-Inumbo-ID: 80cbd548-ca66-11ea-9f71-12813bfff9fa
Received: from mamuts.risinajumi.lv (unknown [212.70.177.194])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTP
 id 80cbd548-ca66-11ea-9f71-12813bfff9fa;
 Mon, 20 Jul 2020 08:53:38 +0000 (UTC)
Received: by mamuts.risinajumi.lv (Postfix, from userid 65534)
 id 3B6AE6AFBA; Mon, 20 Jul 2020 11:57:23 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.2.2 (2007-07-23) on mamuts.risinajumi.lv
X-Spam-Level: *
X-Spam-Status: No, score=1.4 required=9.5 tests=FH_DATE_PAST_20XX autolearn=no
 version=3.2.2
Received: from smtp.risinajumi.lv (smtp.risinajumi.lv [212.70.177.201])
 by mamuts.risinajumi.lv (Postfix) with ESMTP id E94686A512;
 Mon, 20 Jul 2020 11:57:19 +0300 (EEST)
Received: from [192.168.1.7] (unknown [80.89.73.88])
 by smtp.risinajumi.lv (Postfix) with ESMTPA id 06375F12CA;
 Mon, 20 Jul 2020 11:53:35 +0300 (EEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: Sarah Newman <srn@prgmr.com>, Hans van Kranenburg <hans@knorrie.org>,
 Adam Goryachev <mailinglists@websitemanagers.com.au>,
 xen-users@lists.xenproject.org, Casper <kl@os.lv>
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
 <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
 <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
From: Casper <kl@os.lv>
Message-ID: <f6a96253-9862-11e7-ad3b-0247096fbaae@os.lv>
Date: Mon, 20 Jul 2020 11:53:28 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello,

I can report I have root and rest fs ext3 too, but is it correct Debian 
uses ext4 for mounting ext3?

[    8.314622] EXT4-fs (md0): mounting ext3 file system using the ext4 
subsystem
[   10.192765] EXT4-fs (md0): mounted filesystem with ordered data mode. 
Opts: (null)

All domU use ext3, even new debian machines.

Casper

On 16.07.20 06:57, Sarah Newman wrote:
> On 7/14/20 2:00 AM, Hans van Kranenburg wrote:
>> On 7/14/20 1:16 AM, Adam Goryachev wrote:
>>>
>>> On 14/7/20 03:02, Hans van Kranenburg wrote:
>>>> Hi Casper,
>>>>
>>>> On 7/9/20 10:45 AM, Casper wrote:
>>>>> [...]
>>>>> Or problem with Debian Xen package as it not so popular anymore?
>>>>> Any suggestion what to test to figure out problem?
>>>
>>> BTW, I don't think is a general rule that Debian 10.4 with packages Xen
>>> 4.11 doesn't work.
>>
>> True. It just works (tm), until you have some edge case hardware that
>> misbehaves, or you run into an edge case bug with a very specific
>> combination of non-default configuration here and there (or when you try
>> to use EFI, cough).
>>
>> So, to add to the list:
>> * Run latest BIOS / cpu microcode that is available.
>> * Other firmware, e.g. for raid controller or whatever?
>> * Is the box using ECC memory? I mean, even a memory module that flips a
>> bit now and then can crash a server every few weeks... Run a memtest or
>> 7zip benchmark or what was the thing that's very good at exposing memory
>> errors...
>>
>> Also, feel free to open a bug report in the Debian bug tracker, we're
>> willing to help, but expect that you have to do the work to gather all
>> info. I don't have a similar piece of hardware lying around here... What
>> distro package maintainers can do is help users to gather enough info to
>> have a good report that doesn't waste too much time of the upstream
>> developers.
> 
> Here is a bug I opened a week ago against Debian Buster:
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964494
> 
> It looks like only newer versions of the kernel are a problem. We think 
> the trigger is either ext3 or Xen.
> 
> The problem may not show up for weeks, and we do not know what triggers it.
> 
> If anyone has more data points to add that would help isolate the issue 
> to one or the other, it would be appreciated.
> 
> --Sarah


From xen-users-bounces@lists.xenproject.org Mon Jul 20 13:46:00 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 20 Jul 2020 13:46:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxW6D-0002uG-8F; Mon, 20 Jul 2020 13:44:57 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=gz2F=A7=citrix.com=andrew.cooper3@srs-us1.protection.inumbo.net>)
 id 1jxW6B-0002uB-QM
 for xen-users@lists.xen.org; Mon, 20 Jul 2020 13:44:55 +0000
X-Inumbo-ID: 2ff209ac-ca8f-11ea-9fa7-12813bfff9fa
Received: from esa5.hc3370-68.iphmx.com (unknown [216.71.155.168])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 2ff209ac-ca8f-11ea-9fa7-12813bfff9fa;
 Mon, 20 Jul 2020 13:44:53 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
 d=citrix.com; s=securemail; t=1595252693;
 h=subject:to:cc:references:from:message-id:date:
 mime-version:in-reply-to:content-transfer-encoding;
 bh=OuiEP3D65JBIDm2R1AzKgKM4VFlaTnShCJIfjbHA2Dg=;
 b=LkgaOjcLyiChOPc4jVy8esxPqsRJmHJ7LKxIsxxh6DKd1II1cn6kUVdA
 kC4xN0czVrluqNGZd/1URpkMpnVY5PzcYplqL62qyKR+osQVFVTDLh/+S
 RRGFO5WK8KoQnczx1Yb6uqX1lKmsDBa6rrPrndOAQ7pYwPAc/Jtk9TSX/ Q=;
Authentication-Results: esa5.hc3370-68.iphmx.com;
 dkim=none (message not signed) header.i=none
IronPort-SDR: sNyUv7VO9pjGKXyswLM1TpeV6PWBf4YBhqlfyQbFFMeziSp3EwpWsVcfqABUCpw1FTCaHzUAiw
 ij+9alrRXwiPyLEBu6RgqkIuhM2WIGLbZSOWCqIIbO68a5oGUBt368oGDD0ovD2gTxmpgexUKM
 IxtU0mpQjgJv2B64F5+kc99RKPJavAYpwe3+EpvVgVOYKPcCJjIYnxqg0a86mOx6MBgv01FDqk
 pSc2vBe4DWoIs8K1Aw7NS9AJkkc8+b9OvYFvBzQr6fG4PvAmAMDLFn1LLnSNvZarYUi58i0etn
 H6c=
X-SBRS: 2.7
X-MesageID: 22950362
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.158.21
X-Policy: $RELAYED
X-IronPort-AV: E=Sophos;i="5.75,375,1589256000"; d="scan'208";a="22950362"
Subject: Re: [oss-security] Xen Security Advisory 329 v2 - Linux ioperm bitmap
 context switching issues
To: Mauro Matteo Cascella <mcascell@redhat.com>,
 <oss-security@lists.openwall.com>
References: <E1jw3ms-0006i6-Se@xenbits.xenproject.org>
 <CAA8xKjVib9UERsMrAy3nNdVssNxLciXTmmhmXqq1gvhO16URew@mail.gmail.com>
From: Andrew Cooper <andrew.cooper3@citrix.com>
Message-ID: <57e20b43-53cb-acc6-2634-4fc3b29e2312@citrix.com>
Date: Mon, 20 Jul 2020 14:44:48 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <CAA8xKjVib9UERsMrAy3nNdVssNxLciXTmmhmXqq1gvhO16URew@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
X-ClientProxiedBy: AMSPEX02CAS02.citrite.net (10.69.22.113) To
 AMSPEX02CL02.citrite.net (10.69.22.126)
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xen.org, xen-announce@lists.xen.org,
 "Xen.org security team" <security-team-members@xen.org>,
 xen-devel@lists.xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

/sigh - it seems that stuff like this doesn't get done when I'm on holiday.

I'll get one sorted.

~Andrew

On 17/07/2020 08:54, Mauro Matteo Cascella wrote:
> Hello,
>
> Will a CVE be assigned to this flaw?
>
> Thanks,
>
> On Thu, Jul 16, 2020 at 3:21 PM Xen.org security team
<security@xen.org <mailto:security@xen.org>> wrote:
>
>                     Xen Security Advisory XSA-329
>                               version 2
>
>              Linux ioperm bitmap context switching issues
>
> UPDATES IN VERSION 2
> ====================
>
> Public release.
>
> ISSUE DESCRIPTION
> =================
>
> Linux 5.5 overhauled the internal state handling for the iopl() and
> ioperm()
> system calls.  Unfortunately, one aspect on context switch wasn't wired up
> correctly for the Xen PVOps case.
>
> IMPACT
> ======
>
> IO port permissions don't get rescinded when context switching to an
> unprivileged task.  Therefore, all userspace can use the IO ports
> granted to
> the most recently scheduled task with IO port permissions.
>
> VULNERABLE SYSTEMS
> ==================
>
> Only x86 guests are vulnerable.
>
> All versions of Linux from 5.5 are potentially vulnerable.
>
> Linux is only vulnerable when running as x86 PV guest.  Linux is not
> vulnerable when running as an x86 HVM/PVH guests.
>
> The vulnerability can only be exploited in domains which have been granted
> access to IO ports by Xen.  This is typically only the hardware
> domain, and
> guests configured with PCI Passthrough.
>
> MITIGATION
> ==========
>
> Running only HVM/PVH guests avoids the vulnerability.
>
> CREDITS
> =======
>
> This issue was discovered by Andy Lutomirski.
>
> RESOLUTION
> ==========
>
> Applying the appropriate attached patch resolves this issue.
>
> xsa329.patch           Linux 5.5 and later
>
> $ sha256sum xsa329*
> cdb5ac9bfd21192b5965e8ec0a1c4fcf12d0a94a962a8158cd27810e6aa362f0 
> xsa329.patch
> $
>
> DEPLOYMENT DURING EMBARGO
> =========================
>
> Deployment of the patches and/or mitigations described above (or
> others which are substantially similar) is permitted during the
> embargo, even on public-facing systems with untrusted guest users and
> administrators.
>
> But: Distribution of updated software is prohibited (except to other
> members of the predisclosure list).
>
> Predisclosure list members who wish to deploy significantly different
> patches and/or mitigations, please contact the Xen Project Security
> Team.
>
>
> (Note: this during-embargo deployment notice is retained in
> post-embargo publicly released Xen Project advisories, even though it
> is then no longer applicable.  This is to enable the community to have
> oversight of the Xen Project Security Team's decisionmaking.)
>
> For more information about permissible uses of embargoed information,
> consult the Xen Project community's agreed Security Policy:
>   http://www.xenproject.org/security-policy.html
>
>
>
> --
> Mauro Matteo Cascella, Red Hat Product Security
> 6F78 E20B 5935 928C F0A8  1A9D 4E55 23B8 BB34 10B0




From xen-users-bounces@lists.xenproject.org Mon Jul 20 17:00:53 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 20 Jul 2020 17:00:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxZ8W-0003bQ-HL; Mon, 20 Jul 2020 16:59:32 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=P8Ht=A7=os.lv=kl@srs-us1.protection.inumbo.net>)
 id 1jxZ8U-0003bJ-NB
 for xen-users@lists.xenproject.org; Mon, 20 Jul 2020 16:59:30 +0000
X-Inumbo-ID: 5dcfa60c-caaa-11ea-84a8-bc764e2007e4
Received: from mamuts.risinajumi.lv (unknown [212.70.177.194])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 5dcfa60c-caaa-11ea-84a8-bc764e2007e4;
 Mon, 20 Jul 2020 16:59:25 +0000 (UTC)
Received: by mamuts.risinajumi.lv (Postfix, from userid 65534)
 id 84AC06AFA2; Mon, 20 Jul 2020 20:03:12 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.2.2 (2007-07-23) on mamuts.risinajumi.lv
X-Spam-Level: *
X-Spam-Status: No, score=1.4 required=9.5 tests=FH_DATE_PAST_20XX autolearn=no
 version=3.2.2
Received: from smtp.risinajumi.lv (smtp.risinajumi.lv [212.70.177.201])
 by mamuts.risinajumi.lv (Postfix) with ESMTP id 6906D6A512;
 Mon, 20 Jul 2020 20:03:08 +0300 (EEST)
Received: from [192.168.1.7] (unknown [80.89.73.88])
 by smtp.risinajumi.lv (Postfix) with ESMTPA id 257DDF1253;
 Mon, 20 Jul 2020 19:59:23 +0300 (EEST)
Subject: Re: Debian 10, xen 4.11 reliability
To: Sarah Newman <srn@prgmr.com>, Hans van Kranenburg <hans@knorrie.org>,
 Adam Goryachev <mailinglists@websitemanagers.com.au>,
 xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
 <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
 <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
 <f6a96253-9862-11e7-ad3b-0247096fbaae@os.lv>
From: Casper <kl@os.lv>
Message-ID: <04fe5766-1174-9456-c9b9-30197b3762f3@os.lv>
Date: Mon, 20 Jul 2020 19:59:16 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <f6a96253-9862-11e7-ad3b-0247096fbaae@os.lv>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Was playing with system little bit, got only day uptime and it crashed 
this time with diff. msg:

Jul 20 19:20:28 test systemd[1]: Stopping Availability of block devices...
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 866 
(screen) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 867 
(bash) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 955 
(bash) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 30295 
(ssh) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 30298 
(sshfs) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 30307 
(ssh) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 30310 
(sshfs) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 2730 
(xl) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: session-1.scope: Killing process 3061 
(xl) with signal SIGTERM.
Jul 20 19:20:28 test systemd[1]: Stopping Session 1 of user casper.
Jul 20 19:20:28 test systemd[1]: Stopping Session 352 of user casper.
Jul 20 19:20:28 test systemd[1]: Stopping LVM event activation on device 
9:2...
Jul 20 19:20:28 test systemd[1]: Stopping Session 419 of user root.
Jul 20 19:20:28 test systemd[1]: lvm2-lvmpolld.socket: Succeeded.
Jul 20 19:20:28 test systemd[1]: Closed LVM2 poll daemon socket.
Jul 20 19:20:28 test systemd[1]: Stopped target Graphical Interface.
Jul 20 19:20:28 test systemd[1]: Stopped target Multi-User System.


On 20.07.20 11:53, Casper wrote:
> Hello,
> 
> I can report I have root and rest fs ext3 too, but is it correct Debian 
> uses ext4 for mounting ext3?
> 
> [    8.314622] EXT4-fs (md0): mounting ext3 file system using the ext4 
> subsystem
> [   10.192765] EXT4-fs (md0): mounted filesystem with ordered data mode. 
> Opts: (null)
> 
> All domU use ext3, even new debian machines.
> 
> Casper
> 
> On 16.07.20 06:57, Sarah Newman wrote:
>> On 7/14/20 2:00 AM, Hans van Kranenburg wrote:
>>> On 7/14/20 1:16 AM, Adam Goryachev wrote:
>>>>
>>>> On 14/7/20 03:02, Hans van Kranenburg wrote:
>>>>> Hi Casper,
>>>>>
>>>>> On 7/9/20 10:45 AM, Casper wrote:
>>>>>> [...]
>>>>>> Or problem with Debian Xen package as it not so popular anymore?
>>>>>> Any suggestion what to test to figure out problem?
>>>>
>>>> BTW, I don't think is a general rule that Debian 10.4 with packages Xen
>>>> 4.11 doesn't work.
>>>
>>> True. It just works (tm), until you have some edge case hardware that
>>> misbehaves, or you run into an edge case bug with a very specific
>>> combination of non-default configuration here and there (or when you try
>>> to use EFI, cough).
>>>
>>> So, to add to the list:
>>> * Run latest BIOS / cpu microcode that is available.
>>> * Other firmware, e.g. for raid controller or whatever?
>>> * Is the box using ECC memory? I mean, even a memory module that flips a
>>> bit now and then can crash a server every few weeks... Run a memtest or
>>> 7zip benchmark or what was the thing that's very good at exposing memory
>>> errors...
>>>
>>> Also, feel free to open a bug report in the Debian bug tracker, we're
>>> willing to help, but expect that you have to do the work to gather all
>>> info. I don't have a similar piece of hardware lying around here... What
>>> distro package maintainers can do is help users to gather enough info to
>>> have a good report that doesn't waste too much time of the upstream
>>> developers.
>>
>> Here is a bug I opened a week ago against Debian Buster:
>>
>> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964494
>>
>> It looks like only newer versions of the kernel are a problem. We 
>> think the trigger is either ext3 or Xen.
>>
>> The problem may not show up for weeks, and we do not know what 
>> triggers it.
>>
>> If anyone has more data points to add that would help isolate the 
>> issue to one or the other, it would be appreciated.
>>
>> --Sarah


From xen-users-bounces@lists.xenproject.org Mon Jul 20 17:26:30 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 20 Jul 2020 17:26:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxZXa-0006YX-MJ; Mon, 20 Jul 2020 17:25:26 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=pa+G=A7=prgmr.com=srn@srs-us1.protection.inumbo.net>)
 id 1jxZXZ-0006YS-7l
 for xen-users@lists.xenproject.org; Mon, 20 Jul 2020 17:25:25 +0000
X-Inumbo-ID: fe8a52e2-caad-11ea-84ac-bc764e2007e4
Received: from mail.prgmr.com (unknown [2605:2700:0:5::4713:9506])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id fe8a52e2-caad-11ea-84ac-bc764e2007e4;
 Mon, 20 Jul 2020 17:25:24 +0000 (UTC)
Received: from [192.168.2.47] (c-174-62-72-237.hsd1.ca.comcast.net
 [174.62.72.237]) (Authenticated sender: srn)
 by mail.prgmr.com (Postfix) with ESMTPSA id F2AC572008F;
 Mon, 20 Jul 2020 13:25:22 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.prgmr.com F2AC572008F
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prgmr.com;
 s=default; t=1595265923;
 bh=+gclCOEZaAHoVUIhFOPnHqIJ4o6YrCHGWleOYkmX//I=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=QN0R2tBbVhS+nsrNZX+cNKccSwZyviy7YmeqFLpapVSiOOvg+bXIOraSyCIf9mNYQ
 gJOuWfKCxqteiMVNdNapdMr9EXjp6PqNsb3acda4MutxXYSpDeReObBm6iVbtQxgNf
 zjPdkTC7LavmP/4Q6f4HA+1qoXsAG8aBr8jOH2QU=
Subject: Re: Debian 10, xen 4.11 reliability
To: Casper <kl@os.lv>, Hans van Kranenburg <hans@knorrie.org>,
 Adam Goryachev <mailinglists@websitemanagers.com.au>,
 xen-users@lists.xenproject.org
References: <d95c60b4-2f50-3f65-06f6-e1d04d9ef97d@os.lv>
 <44a022ab-2841-55f7-b165-60fcc3b644b2@knorrie.org>
 <43b22817-71c6-c2ef-4998-31ebf5d0b863@websitemanagers.com.au>
 <9d58daf3-133f-2157-ed18-c8ab020f9627@knorrie.org>
 <e3aa13eb-22aa-90c4-c713-49ec1d7a2e38@prgmr.com>
 <f6a96253-9862-11e7-ad3b-0247096fbaae@os.lv>
From: Sarah Newman <srn@prgmr.com>
Message-ID: <3db2b3d4-ac73-db74-3f44-2465c78ea8b3@prgmr.com>
Date: Mon, 20 Jul 2020 10:25:22 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <f6a96253-9862-11e7-ad3b-0247096fbaae@os.lv>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 7/20/20 1:53 AM, Casper wrote:
> Hello,
> 
> I can report I have root and rest fs ext3 too, but is it correct Debian uses ext4 for mounting ext3?
> 
> [    8.314622] EXT4-fs (md0): mounting ext3 file system using the ext4 subsystem
> [   10.192765] EXT4-fs (md0): mounted filesystem with ordered data mode. Opts: (null)
> 
> All domU use ext3, even new debian machines.
> 
> Casper

Hi Casper,

That still counts as ext3, the functionality has simply been taken over by the ext4 module.

You should probably upgrade to ext4 per

https://debian-administration.org/article/643/Migrating_a_live_system_from_ext3_to_ext4_filesystem

--Sarah


From xen-users-bounces@lists.xenproject.org Tue Jul 21 11:03:33 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 21 Jul 2020 11:03:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxq2F-0008Gz-Ft; Tue, 21 Jul 2020 11:02:11 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=254w=BA=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1jxq2E-0008FW-JK
 for xen-users@lists.xen.org; Tue, 21 Jul 2020 11:02:10 +0000
X-Inumbo-ID: 99b106f6-cb41-11ea-84fe-bc764e2007e4
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 99b106f6-cb41-11ea-84fe-bc764e2007e4;
 Tue, 21 Jul 2020 11:02:00 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
 Content-Transfer-Encoding:Content-Type:Sender:Reply-To:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=rG/yjzz16rNFLpv3o/8yFDCoEwHYZ2FiTwqh9jkLt3M=; b=rx4xY51uu4vIg1rQZB6PVlYekh
 n9YU/P4nL7fGhMMR1ssHfAcYdi4ImR26oW44a4SdEtDx/Uhve0Zu73JQ6SZytx4tHeZU3/jydqNR+
 BG2aM91+m6URSSbNIOn9Yjfpg7hyKe0mFLZBe/fUUk8vl3L4mowutWmVf1EuI4bMP/50=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jxq1y-0003wa-6u; Tue, 21 Jul 2020 11:01:54 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1jxq1y-0007MA-2r; Tue, 21 Jul 2020 11:01:54 +0000
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Subject: Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm
 bitmap context switching issues
Message-Id: <E1jxq1y-0007MA-2r@xenbits.xenproject.org>
Date: Tue, 21 Jul 2020 11:01:54 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: "Xen.org security team" <security-team-members@xen.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2020-15852 / XSA-329
                              version 3

             Linux ioperm bitmap context switching issues

UPDATES IN VERSION 3
====================

CVE assigned.

ISSUE DESCRIPTION
=================

Linux 5.5 overhauled the internal state handling for the iopl() and ioperm()
system calls.  Unfortunately, one aspect on context switch wasn't wired up
correctly for the Xen PVOps case.

IMPACT
======

IO port permissions don't get rescinded when context switching to an
unprivileged task.  Therefore, all userspace can use the IO ports granted to
the most recently scheduled task with IO port permissions.

VULNERABLE SYSTEMS
==================

Only x86 guests are vulnerable.

All versions of Linux from 5.5 are potentially vulnerable.

Linux is only vulnerable when running as x86 PV guest.  Linux is not
vulnerable when running as an x86 HVM/PVH guests.

The vulnerability can only be exploited in domains which have been granted
access to IO ports by Xen.  This is typically only the hardware domain, and
guests configured with PCI Passthrough.

MITIGATION
==========

Running only HVM/PVH guests avoids the vulnerability.

CREDITS
=======

This issue was discovered by Andy Lutomirski.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa329.patch           Linux 5.5 and later

$ sha256sum xsa329*
cdb5ac9bfd21192b5965e8ec0a1c4fcf12d0a94a962a8158cd27810e6aa362f0  xsa329.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.


(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl8WytoMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ4wsH/0/2AMv2kb/Q6rfwlNLSrnDbK2b6bb/QUE+0GcHO
vrJ7Su53xrt7mllk/P4jYmtXfyUeJzfsahdb5GQVh4GBxOA3YGgS5T4pdpnwNoFi
NFZV35qOT0muwpjE/zoefKsESuvqWjd28Vssm4HrllJ4YqcGik9clo6Y5qWMFcFH
rlgchZinl5RtqAzMnuOdirWir7Xika6KdkXWi56CjKZBB5ozoqfH5JKi/XbWbwrz
ZoFHXwKRuckuQSxUlvdpmI7MZDyggii3OhdvA6fIMDWq58EjSVVatrvDxYsGRL8x
4PXmFPBp+871GjLQuQZ294fZH3DaZLWSrzvmwC8uZJr5uds=
=Wdnv
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa329.patch"
Content-Disposition: attachment; filename="xsa329.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Jul 21 11:35:03 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 21 Jul 2020 11:35:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxqWx-00038B-Bc; Tue, 21 Jul 2020 11:33:55 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AbKs=BA=gmx.de=mangel@srs-us1.protection.inumbo.net>)
 id 1jxqWw-000385-1P
 for xen-users@lists.xen.org; Tue, 21 Jul 2020 11:33:54 +0000
X-Inumbo-ID: 0d480520-cb46-11ea-a0a0-12813bfff9fa
Received: from mout.gmx.net (unknown [212.227.15.18])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 0d480520-cb46-11ea-a0a0-12813bfff9fa;
 Tue, 21 Jul 2020 11:33:52 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net;
 s=badeba3b8450; t=1595331228;
 bh=EBkSD8ValMKEDWEubLkofDC+KV+ejQCwE8YNhtFBEm4=;
 h=X-UI-Sender-Class:Date:From:To:Cc:Subject:In-Reply-To:References;
 b=LR1eQ+z4r7rB/KFFXbYK7gNwF+YnqjAWrRTMaoXfZOkM8iZypAbuiuVBnnW8PZdRW
 s1xgwYL60fN64ZdtfWetGhqVO+Gg2l+cnRoxykigi5VpYsSfrWg2EX4CzqAtzUeaL4
 vDY3ww5Lrd4dTW3NnryjL1zWUATjNs51N90jMjsM=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from satan.chao5.int ([91.64.145.81]) by mail.gmx.com (mrgmx004
 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MLi8g-1kFNPg1116-00HbZC; Tue, 21
 Jul 2020 13:33:48 +0200
Received: from webmail.chao5.int (leviathan.chao5.int [192.168.50.60])
 by satan.chao5.int (Postfix) with ESMTP id 76C4C200A86B;
 Tue, 21 Jul 2020 13:33:44 +0200 (CEST)
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.102.3 at satan.chao5.int
MIME-Version: 1.0
Date: Tue, 21 Jul 2020 13:33:44 +0200
From: Christoph <mangel@gmx.de>
To: "Xen.org security team" <security@xen.org>
Subject: Re: Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm
 bitmap context switching issues
In-Reply-To: <E1jxq1y-0007MA-2r@xenbits.xenproject.org>
References: <E1jxq1y-0007MA-2r@xenbits.xenproject.org>
User-Agent: Roundcube Webmail/1.4.6
Message-ID: <5f8e64da9014b2b2bb41aaf60736b558@gmx.de>
X-Sender: mangel@gmx.de
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: quoted-printable
X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,FREEMAIL_FROM
 autolearn=ham autolearn_force=no version=3.4.0
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on satan.chao5.int
X-Provags-ID: V03:K1:HdjPK0WUx8nOH5vyXJUT4pejhcniQg22t7q7jXs5UZY16cOU/2D
 Kqxg9bH6zxvGPlf9/pMSRx3G0pFHCaHepsoVIYWDiaob1mXiPKm9asxBmZILgm2KiWk86Kp
 iTfuAPgL0bxuvuJqVvj4lFEQsMNlhAXa+YdpWoSGtGs3Cm0fl20ZN+2HVGbFYc7RtELJY1w
 hFtfLgDaqGF3RP1NKTesg==
X-Spam-Flag: NO
X-UI-Out-Filterresults: notjunk:1;V03:K0:RZvKnYVcJRg=:JKNJ0sdmPWGOUm9mfJAQhN
 KYAwleMoc8zyTsjuPVCZIH+QXiB0q12hHKg2ZRKIub2Nc/J23Y/MH77tREEerD9weChw8R5Xm
 XDPb+7st2ObYMvYKTu+5HNwpVvSVKhZ/rgltsQGobjzje/X8Yqj353HqU/bOy1zTPdcqCretM
 3O8lSJcGDvoa5Ppb+xPIs0LKRFaptoi6aLJMPFs9kvqIPZuW+eB2YzRscQ7SpWezPq4NHFlLo
 b1sOGJxqYJngrZMaF6x1Hc1SHukgfg0fQPALxKCqPyximU3a1rJYpksrDJwDDdzLzvBg2k3De
 x7UrpZg6Gxq+Ffrx5veW7CPjmjzIyTHC9BSa7p1ZOPBtGwXKkbbwJoOYuNXdWHGL1dQchC8nK
 0z8HC4Li9hhMMn/vabmMMLw0TuRmFeiMz8AB3F1ns+HCVvdQvNLeewlvCGFxRjXQw/AAWu+qs
 91aQVlvboTLgQhyckXmJtGu1wKzXD4QhGXwtxUVWBRxz23Ydlwe/AWU5+RbPjCJEczcJiW7Bh
 CMMJr9K3/dG2v9UULLxOfH38NRxJuFgGssAP45pv7KVHwAmZ0vRquqgRoO2DUTndktVCHxbKE
 FQycjsTlLTfh3miow53PQJQ9H/NHkrENFnfqo4rS5IqnGPkOHopp/+1zbibZtuW4y3LScsCCm
 Vsdq8gRK+H2L4/q4318EPbVfUzfBSKfrbUSLr4csgcVbgL9TJQqt5eiEOm/ng0lZ2JbOj3lEk
 mB5ZECE3XnNpQvDuJRtWt9FetbzqwWhpcK5QXqD3aj+e/AxUaL2ZCaufB59uC2nJV16Qqu4ay
 EOS1Fsi06UH5d0l8AdOAXqHpDj+CYtotid1Nd02IW7QPn/z2cp8RKXp8Gd4CMUaxNNtz4YLXm
 5IlOe6yIGLkvx0jSNgu2pxvJV2ukc1YlXSVgWObCC9yKR2rc4Q2ZnBKkwmTV0t7ZF8eEUjweS
 /HV0AOmA8l/ecewGiZbFQzjqXKg2qERd/KJrYEP4E1vnE7+kaqZKRCENsUstEdrizfXzIAxtq
 p7HTqc2CFLsGynzoHylL+tzTiYhKdmNuEB7lK8p0J/5Oct5lt0S2sX9x2F2GT/OSxkFN1qrqa
 Kh3R05/bI2oip3oEq3xTFGoHbbXNmcDizg8dGPFgXb1bgF/H89CHljsxf5CiChr+KodBbjkMK
 2dFL7Zf++TNWPGhptlg42NZ16YVbNU6PfEQzL8cxu+1AEPcAety2Wb3xghulZo5cTsXxi2ipC
 bvf3BFePvRvVA+U/Y
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hi,

if I build the next xen version, for example xen 4.14-rc7 (when its
available). Does it ever include such a patch?

=2D--
=2D-----
Greetz

Am 21.07.2020 13:01, schrieb Xen.org security team:
> Xen Security Advisory CVE-2020-15852 / XSA-329
>                               version 3
>
>              Linux ioperm bitmap context switching issues
>
> UPDATES IN VERSION 3
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>
> CVE assigned.
>
> ISSUE DESCRIPTION
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>
> Linux 5.5 overhauled the internal state handling for the iopl() and
> ioperm()
> system calls.  Unfortunately, one aspect on context switch wasn't wired
> up
> correctly for the Xen PVOps case.
>
> IMPACT
> =3D=3D=3D=3D=3D=3D
>
> IO port permissions don't get rescinded when context switching to an
> unprivileged task.  Therefore, all userspace can use the IO ports
> granted to
> the most recently scheduled task with IO port permissions.
>
> VULNERABLE SYSTEMS
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>
> Only x86 guests are vulnerable.
>
> All versions of Linux from 5.5 are potentially vulnerable.
>
> Linux is only vulnerable when running as x86 PV guest.  Linux is not
> vulnerable when running as an x86 HVM/PVH guests.
>
> The vulnerability can only be exploited in domains which have been
> granted
> access to IO ports by Xen.  This is typically only the hardware domain,
> and
> guests configured with PCI Passthrough.
>
> MITIGATION
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>
> Running only HVM/PVH guests avoids the vulnerability.
>
> CREDITS
> =3D=3D=3D=3D=3D=3D=3D
>
> This issue was discovered by Andy Lutomirski.
>
> RESOLUTION
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>
> Applying the appropriate attached patch resolves this issue.
>
> xsa329.patch           Linux 5.5 and later
>
> $ sha256sum xsa329*
> cdb5ac9bfd21192b5965e8ec0a1c4fcf12d0a94a962a8158cd27810e6aa362f0
> xsa329.patch
> $
>
> DEPLOYMENT DURING EMBARGO
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
>
> Deployment of the patches and/or mitigations described above (or
> others which are substantially similar) is permitted during the
> embargo, even on public-facing systems with untrusted guest users and
> administrators.
>
> But: Distribution of updated software is prohibited (except to other
> members of the predisclosure list).
>
> Predisclosure list members who wish to deploy significantly different
> patches and/or mitigations, please contact the Xen Project Security
> Team.
>
>
> (Note: this during-embargo deployment notice is retained in
> post-embargo publicly released Xen Project advisories, even though it
> is then no longer applicable.  This is to enable the community to have
> oversight of the Xen Project Security Team's decisionmaking.)
>
> For more information about permissible uses of embargoed information,
> consult the Xen Project community's agreed Security Policy:
>   http://www.xenproject.org/security-policy.html


From xen-users-bounces@lists.xenproject.org Tue Jul 21 11:41:27 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 21 Jul 2020 11:41:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jxqdq-00041v-81; Tue, 21 Jul 2020 11:41:02 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bQ5W=BA=citrix.com=andrew.cooper3@srs-us1.protection.inumbo.net>)
 id 1jxqdp-00041k-83
 for xen-users@lists.xen.org; Tue, 21 Jul 2020 11:41:01 +0000
X-Inumbo-ID: 0c7406d4-cb47-11ea-8503-bc764e2007e4
Received: from esa3.hc3370-68.iphmx.com (unknown [216.71.145.155])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 0c7406d4-cb47-11ea-8503-bc764e2007e4;
 Tue, 21 Jul 2020 11:41:00 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
 d=citrix.com; s=securemail; t=1595331661;
 h=subject:to:cc:references:from:message-id:date:
 mime-version:in-reply-to:content-transfer-encoding;
 bh=KzpV7ufx/ZFlmYmmyhTYbf1J5+lPfuWcTd91DL6F8oo=;
 b=X1wxVwJlyxmPmAyKlHjPbCcz8kCWQuLAFUjb67ZsJiZ7Fz6zz2qaNrTA
 iiYU9jqgDRrLHUvjddGLdD+6QUp/04Tu0Vz29kYu3eqG4M3OqHpql+9ml
 Lzfabj5qtoIEdPb3CXfjuu55RHh+d14yDfYiWpahkTtpho1etDkqTAR85 I=;
Authentication-Results: esa3.hc3370-68.iphmx.com;
 dkim=none (message not signed) header.i=none
IronPort-SDR: IgCFT3qqRQ9IBUNIfOIygtczWp3be1Lsz66qNQlOq/OKRN5W6ArUJmK7qeNCQiyLxzL1IODR8c
 BZYy562cub8+emt9S+kkF0KIPqtC+JNMwHBBnq7dKPDVgAh1odaj94Fb0JaOg5ybpJqjKsn8Be
 Py1br9KsPLt+usWjFdteu3+gmxk5ZBO/lukrCbhqTH4t6xJE7kY3Vmo77jka9If8bn7VeNYTdW
 5JGCQNhMXJmBjPLR9t1MrwZ8fsiNafDZX2VfmAu3pqacDMD1qotEvlf8nP7nrZtEEim1+rIL20
 xHI=
X-SBRS: 2.7
X-MesageID: 22831926
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.158.21
X-Policy: $RELAYED
X-IronPort-AV: E=Sophos;i="5.75,378,1589256000"; d="scan'208";a="22831926"
Subject: Re: Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm
 bitmap context switching issues
To: Christoph <mangel@gmx.de>, Xen.org security team <security@xen.org>
References: <E1jxq1y-0007MA-2r@xenbits.xenproject.org>
 <5f8e64da9014b2b2bb41aaf60736b558@gmx.de>
From: Andrew Cooper <andrew.cooper3@citrix.com>
Message-ID: <c36d52ba-139d-e10e-54d8-8261a86eafb4@citrix.com>
Date: Tue, 21 Jul 2020 12:40:55 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <5f8e64da9014b2b2bb41aaf60736b558@gmx.de>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Content-Language: en-GB
X-ClientProxiedBy: AMSPEX02CAS02.citrite.net (10.69.22.113) To
 AMSPEX02CL02.citrite.net (10.69.22.126)
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 21/07/2020 12:33, Christoph wrote:
> Hi,
>
> if I build the next xen version, for example xen 4.14-rc7 (when its
> available). Does it ever include such a patch?

Hello,

This is a fix to Linux, not a fix to Xen.

It is fixed upstream in Linux just in time for the 5.8 release, and
should be making its way back into the stable trees in due course.

~Andrew


From xen-users-bounces@lists.xenproject.org Fri Jul 24 16:03:01 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 24 Jul 2020 16:03:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jz08l-0005Fg-PQ; Fri, 24 Jul 2020 16:01:43 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=yL+a=BD=xen.org=paul@srs-us1.protection.inumbo.net>)
 id 1jz08k-0005FZ-ID
 for xen-users@lists.xenproject.org; Fri, 24 Jul 2020 16:01:42 +0000
X-Inumbo-ID: f5fea95e-cdc6-11ea-a425-12813bfff9fa
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id f5fea95e-cdc6-11ea-a425-12813bfff9fa;
 Fri, 24 Jul 2020 16:01:40 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
 s=20200302mail; h=Reply-To:Message-Id:Date:Subject:To:From:Sender:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
 :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
 List-Subscribe:List-Post:List-Owner:List-Archive;
 bh=ogZM8im0PZvP/3uvGK3JZM+THCjPOOJBt/a9OxuGozA=; b=tyTtdn8czpvLvCjKwcGfOxzmdD
 toJMPxtzfRirgIXANsEagw43ef26JzgPmM0+3y6QWe6+t/0HfqD2zGTSTblwWt/dyNYAjKvwRPibI
 NIHPHNAWd0N9BNw33BztOKU1vtwH6EUqoFL5gRbbSstZOp77gMLDf93Yd9D84INQYR4U=;
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jz08i-00046f-58; Fri, 24 Jul 2020 16:01:40 +0000
Received: from host86-143-223-30.range86-143.btcentralplus.com
 ([86.143.223.30] helo=CBG-R90WXYV0.home)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92)
 (envelope-from <paul@xen.org>)
 id 1jz08h-0003kp-Su; Fri, 24 Jul 2020 16:01:40 +0000
From: Paul Durrant <paul@xen.org>
To: xen-devel@lists.xenproject.org, xen-users@lists.xenproject.org,
 xen-announce@lists.xenproject.org
Subject: [ANNOUNCEMENT] Xen 4.14 is released
Date: Fri, 24 Jul 2020 17:01:38 +0100
Message-Id: <20200724160138.129-1-paul@xen.org>
X-Mailer: git-send-email 2.17.1
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-devel@lists.xenproject.org, paul@xen.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Dear community members,

I'm pleased to announce that Xen 4.14.0 is released.

Please find the tarball and its signature at:

  https://downloads.xenproject.org/release/xen/4.14.0

Git checkout and build instructions can be found at:

  https://wiki.xenproject.org/wiki/Xen_Project_4.14_Release_Notes#Build_Requirements

Release notes can be found at:

  https://wiki.xenproject.org/wiki/Xen_Project_4.14_Release_Notes

A summary for 4.14 release documents can be found at:

  https://wiki.xenproject.org/wiki/Category:Xen_4.14

Technical blog post for 4.14 can be found at:

  https://xenproject.org/2020/07/24/xen-project-hypervisor-version-4-14-brings-added-security-and-performance

Thanks everyone who contributed to this release. This release would
not have happened without all the awesome contributions from the Xen
community around the globe.

Regards,

Paul Durrant (on behalf of the Xen Project Hypervisor team)



From xen-users-bounces@lists.xenproject.org Sat Jul 25 12:54:15 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 25 Jul 2020 12:54:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzJfP-00084Z-AN; Sat, 25 Jul 2020 12:52:43 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GIO/=BE=gmail.com=marietto2008@srs-us1.protection.inumbo.net>)
 id 1jzJfN-00084U-PP
 for xen-users@lists.xenproject.org; Sat, 25 Jul 2020 12:52:41 +0000
X-Inumbo-ID: b8aa39ce-ce75-11ea-8919-bc764e2007e4
Received: from mail-lf1-x131.google.com (unknown [2a00:1450:4864:20::131])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id b8aa39ce-ce75-11ea-8919-bc764e2007e4;
 Sat, 25 Jul 2020 12:52:40 +0000 (UTC)
Received: by mail-lf1-x131.google.com with SMTP id s9so6629703lfs.4
 for <xen-users@lists.xenproject.org>; Sat, 25 Jul 2020 05:52:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=lLua05lDRWBqlTgbxqBo0g5YThQthf/IOjvJaHte5y8=;
 b=OhSVfEIAtvo8sWofVnDW4iLmfuG20hKQiH98/Smz+dsu1qtjzjBx7w5QXPurpG7kVQ
 AeiGA1hK0Y8hPGqpFLyQbHnoFXG4qQDKKLdqXT0/NSYceKXLeaH3BcwF/3GmDWpcg/nG
 lf3Zo16/EuoX9+kMxYkTcvanwfgdkfiuxsuCzxvj1w6C09iaM/4CGk9bXH8CEl7+/ikC
 +iLctTnrujTXRuSRlasV/SDdzh2z4XAMVTLvXEgXeoLLpt7Cs1bd5nQf4OFt6gebHdDd
 M6BP+GwLNRkWRG8ys7V4wrVGC7LggZURYbYf8XTlo5n6stoprNqnOJxbBqK8MstSAmHo
 wHUA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=lLua05lDRWBqlTgbxqBo0g5YThQthf/IOjvJaHte5y8=;
 b=aBM6dKbTA0jMH1ND08PUEfe1zUeqr+KmRopliCD2SmWXqi67klxacY/Bo/owfBKGfP
 XJEuLXc1C084CXM0pX5fFSeXYQiF8U9rRtCUoYuaItf/7dqYfq9ZU/pYR1ig5thXCJxw
 a5BTrcYVN+nWoPLR7+zkHHGps+Tu1x3XcY+/gJMYs3ucDH/fH/XaCsy2IFQnVo3GXMuY
 oZTsfpS95AOstFPrYNd9ZCQL8dkCtUvywZU5Ohar6fLa6qerFhRBBXDE0NLneRhkgh0u
 t265PgU8Qsgiih/sRVZayrEQPlApUJ8wAOc3+VPM3/93QhkxE+G3WWQxSEOpPEizaqnL
 0aLQ==
X-Gm-Message-State: AOAM530zqkQtPn1JlDl4tiVpYjAY6Ct/JDOZr0bfuMTrW/ZoW6etqY3p
 fvQsgNj36iKNKN5KSDenP5MVLuo5VQnPlXg6tgUrW8pV0PY=
X-Google-Smtp-Source: ABdhPJwJSb+eapG6l/IgX9SEpYZc+Uz6qv8k7Zm8ssd/d1EnxbogH/lErCGjXKUddurl5EFmFZ7SLC1HrnFmeIH2+8A=
X-Received: by 2002:a05:6512:14d:: with SMTP id
 m13mr7444697lfo.173.1595681558199; 
 Sat, 25 Jul 2020 05:52:38 -0700 (PDT)
MIME-Version: 1.0
From: Mario Marietto <marietto2008@gmail.com>
Date: Sat, 25 Jul 2020 14:52:01 +0200
Message-ID: <CA+1FSigsa8=SaxOOieZj7mXURbAas3LGb3iFrvOQT2J6hvvD3w@mail.gmail.com>
Subject: libxl: error: libxl_pci.c:1477:libxl__device_pci_reset: The kernel
 doesn't support reset from sysfs for PCI device 0000:01:00.1
To: xen-users@lists.xenproject.org
Content-Type: multipart/related; boundary="000000000000741b2e05ab4390fc"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000741b2e05ab4390fc
Content-Type: multipart/alternative; boundary="000000000000741b2d05ab4390fb"

--000000000000741b2d05ab4390fb
Content-Type: text/plain; charset="UTF-8"

Hello

So,please come back to the passthrough of my graphic card with xen,that it
does not work. Please note that I'm not trying to use my existing windows
10 installation anymore. Instead I have installed windows 10 from the
official microsoft iso image. The cfg file that I'm using is like this :

builder='hvm'
memory = 8124
name = 'win10'
vcpus=6
pae=1
acpi=1
apic=1
vif = [ 'mac=00:16:3e:68:e1:01,type=vif,bridge=xenbr0' ]
disk = [ 'phy:/dev/guest/win10,hda,w' ,
'file:/media/install/Win10x64.iso,hdb:cdrom,r' ]
#device_model_version = 'qemu-xen-traditional'
boot='dc'
#boot='c'
sdl=1
vnc=1
serial='pty'
tsc_mode="default"
viridian=1
usb=1
usbdevice='tablet'
gfx_passthru=0

pci=[ '01:00.0', '01:00.1' , '01:00.2' , '01:00.3' ]
localtime=1
xen_platform_pci=1
pci_power_mgmt=1
stdvga = 0
serial = 'pty'
on_poweroff = 'destroy'
on_reboot   = 'destroy'
on_crash    = 'destroy'

device_model_args_hvm = [
  # Debug OVMF
  '-chardev', 'file,id=debugcon,path=/etc/xen/win10.log,',
  '-device', 'isa-debugcon,iobase=0x402,chardev=debugcon',
]

Before to create the guest,I run this script :

if [ $# -eq 0 ]; then
    echo "Require PCI devices in format:  <domain>:<bus>:<slot>.<function>"
    echo "Eg: $(basename $0) 0000:00:1b.0"
    exit 1
fi

modprobe xen-pciback

for pcidev in $@; do
    if [ -h /sys/bus/pci/devices/"$pcidev"/driver ]; then
        echo "Unbinding $pcidev from" $(basename $(readlink
/sys/bus/pci/devices/"$pcidev"/driver))
        echo -n "$pcidev" > /sys/bus/pci/devices/"$pcidev"/driver/unbind
    fi
    echo "Binding $pcidev to pciback"
    echo -n "$pcidev" > /sys/bus/pci/drivers/pciback/new_slot
    echo -n "$pcidev" > /sys/bus/pci/drivers/pciback/bind
done

for 4 times,like this :

root@ziomario-I9:/etc/xen# ./pciback-0000:01:00.0.sh 0000:01:00.0
Unbinding 0000:01:00.0 from nvidia
Binding 0000:01:00.0 to pciback

root@ziomario-I9:/etc/xen# ./pciback-0000:01:00.0.sh 0000:01:00.1
Unbinding 0000:01:00.1 from snd_hda_intel
Binding 0000:01:00.1 to pciback

root@ziomario-I9:/etc/xen# ./pciback-0000:01:00.0.sh 0000:01:00.2
Unbinding 0000:01:00.2 from xhci_hcd
Binding 0000:01:00.2 to pciback

root@ziomario-I9:/etc/xen# ./pciback-0000:01:00.0.sh 0000:01:00.3
Unbinding 0000:01:00.3 from nvidia-gpu
Binding 0000:01:00.3 to pciback

it seems good,but It is not,infact this is what happens when I create the
guest :

libxl: error: libxl_pci.c:1477:libxl__device_pci_reset: The kernel doesn't
support reset from sysfs for PCI device 0000:01:00.1
libxl: error: libxl_pci.c:1477:libxl__device_pci_reset: The kernel doesn't
support reset from sysfs for PCI device 0000:01:00.2
libxl: error: libxl_pci.c:1477:libxl__device_pci_reset: The kernel doesn't
support reset from sysfs for PCI device 0000:01:00.3


I tried to pass only the first line,like this :


pci=[ '01:00.0' ]


the guest starts,but :


    1) the resolution is black and white,640x480 and I can't increase it

    2) the nvidia graphic card can't be installed,it says that it can't be
installed on this computer

    3) I see two microsoft basic display adapter,no cirrus graphic card.

[image: Schermata del 2020-07-25 12-47-56.png]


can u give me some suggestion ?

--000000000000741b2d05ab4390fb
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello<br><br>So,please come back to the passthrough of my =
graphic card with xen,that it does not work. Please note that I&#39;m not t=
rying to use my existing windows 10 installation anymore. Instead I have in=
stalled windows 10 from the official microsoft iso image. The cfg file that=
 I&#39;m using is like this :<br><br>builder=3D&#39;hvm&#39;<br>memory =3D =
8124<br>name =3D &#39;win10&#39;<br>vcpus=3D6<br>pae=3D1<br>acpi=3D1<br>api=
c=3D1<br>vif =3D [ &#39;mac=3D00:16:3e:68:e1:01,type=3Dvif,bridge=3Dxenbr0&=
#39; ]<br>disk =3D [ &#39;phy:/dev/guest/win10,hda,w&#39; , &#39;file:/medi=
a/install/Win10x64.iso,hdb:cdrom,r&#39; ]<br>#device_model_version =3D &#39=
;qemu-xen-traditional&#39;<br>boot=3D&#39;dc&#39;<br>#boot=3D&#39;c&#39;<br=
>sdl=3D1<br>vnc=3D1<br>serial=3D&#39;pty&#39;<br>tsc_mode=3D&quot;default&q=
uot;<br>viridian=3D1<br>usb=3D1<br>usbdevice=3D&#39;tablet&#39;<br>gfx_pass=
thru=3D0<br><br>pci=3D[ &#39;01:00.0&#39;, &#39;01:00.1&#39; , &#39;01:00.2=
&#39; , &#39;01:00.3&#39; ]<br>localtime=3D1<br>xen_platform_pci=3D1<br>pci=
_power_mgmt=3D1<br>stdvga =3D 0<br>serial =3D &#39;pty&#39;<br>on_poweroff =
=3D &#39;destroy&#39;<br>on_reboot =C2=A0 =3D &#39;destroy&#39;<br>on_crash=
 =C2=A0 =C2=A0=3D &#39;destroy&#39;<br><br>device_model_args_hvm =3D [<br>=
=C2=A0 # Debug OVMF<br>=C2=A0 &#39;-chardev&#39;, &#39;file,id=3Ddebugcon,p=
ath=3D/etc/xen/win10.log,&#39;,<br>=C2=A0 &#39;-device&#39;, &#39;isa-debug=
con,iobase=3D0x402,chardev=3Ddebugcon&#39;,<br>]<br><br>Before to create th=
e guest,I run this script :<br><br>if [ $# -eq 0 ]; then<br>=C2=A0 =C2=A0 e=
cho &quot;Require PCI devices in format: =C2=A0&lt;domain&gt;:&lt;bus&gt;:&=
lt;slot&gt;.&lt;function&gt;&quot;<br>=C2=A0 =C2=A0 echo &quot;Eg: $(basena=
me $0) 0000:00:1b.0&quot;<br>=C2=A0 =C2=A0 exit 1<br>fi<br><br>modprobe xen=
-pciback<br><br>for pcidev in $@; do<br>=C2=A0 =C2=A0 if [ -h /sys/bus/pci/=
devices/&quot;$pcidev&quot;/driver ]; then<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 e=
cho &quot;Unbinding $pcidev from&quot; $(basename $(readlink /sys/bus/pci/d=
evices/&quot;$pcidev&quot;/driver))<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 echo -n =
&quot;$pcidev&quot; &gt; /sys/bus/pci/devices/&quot;$pcidev&quot;/driver/un=
bind<br>=C2=A0 =C2=A0 fi<br>=C2=A0 =C2=A0 echo &quot;Binding $pcidev to pci=
back&quot;<br>=C2=A0 =C2=A0 echo -n &quot;$pcidev&quot; &gt; /sys/bus/pci/d=
rivers/pciback/new_slot<br>=C2=A0 =C2=A0 echo -n &quot;$pcidev&quot; &gt; /=
sys/bus/pci/drivers/pciback/bind<br>done<br><br>for 4 times,like this :<br>=
<br>root@ziomario-I9:/etc/xen# ./pciback-0000:01:<a href=3D"http://00.0.sh"=
>00.0.sh</a> 0000:01:00.0<br>Unbinding 0000:01:00.0 from nvidia<br>Binding =
0000:01:00.0 to pciback<br><br>root@ziomario-I9:/etc/xen# ./pciback-0000:01=
:<a href=3D"http://00.0.sh">00.0.sh</a> 0000:01:00.1<br>Unbinding 0000:01:0=
0.1 from snd_hda_intel<br>Binding 0000:01:00.1 to pciback<br><br>root@zioma=
rio-I9:/etc/xen# ./pciback-0000:01:<a href=3D"http://00.0.sh">00.0.sh</a> 0=
000:01:00.2<br>Unbinding 0000:01:00.2 from xhci_hcd<br>Binding 0000:01:00.2=
 to pciback<br><br>root@ziomario-I9:/etc/xen# ./pciback-0000:01:<a href=3D"=
http://00.0.sh">00.0.sh</a> 0000:01:00.3<br>Unbinding 0000:01:00.3 from nvi=
dia-gpu<br>Binding 0000:01:00.3 to pciback<br><br>it seems good,but It is n=
ot,infact this is what happens when I create the guest :<br><br>libxl: erro=
r: libxl_pci.c:1477:libxl__device_pci_reset: The kernel doesn&#39;t support=
 reset from sysfs for PCI device 0000:01:00.1<br>libxl: error: libxl_pci.c:=
1477:libxl__device_pci_reset: The kernel doesn&#39;t support reset from sys=
fs for PCI device 0000:01:00.2<br>libxl: error: libxl_pci.c:1477:libxl__dev=
ice_pci_reset: The kernel doesn&#39;t support reset from sysfs for PCI devi=
ce 0000:01:00.3<br><br><br>I tried to pass only the first line,like this :<=
br><br><br>pci=3D[ &#39;01:00.0&#39; ]<br><br><br>the guest starts,but :<br=
><br><br>=C2=A0 =C2=A0 1) the resolution is black and white,640x480 and I c=
an&#39;t increase it<br><br>=C2=A0 =C2=A0 2) the nvidia graphic card can&#3=
9;t be installed,it says that it can&#39;t be installed on this computer<br=
><br>=C2=A0 =C2=A0 3) I see two microsoft basic display adapter,no cirrus g=
raphic card.<br><br><div><img src=3D"cid:ii_kd1nhdmb0" alt=3D"Schermata del=
 2020-07-25 12-47-56.png" width=3D"541" height=3D"426"><br><br></div><br>ca=
n u give me some suggestion ?</div>

--000000000000741b2d05ab4390fb--

--000000000000741b2e05ab4390fc
Content-Type: image/png; name="Schermata del 2020-07-25 12-47-56.png"
Content-Disposition: inline; 
	filename="Schermata del 2020-07-25 12-47-56.png"
Content-Transfer-Encoding: base64
Content-ID: <ii_kd1nhdmb0>
X-Attachment-Id: ii_kd1nhdmb0
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--000000000000741b2e05ab4390fc--


From xen-users-bounces@lists.xenproject.org Sun Jul 26 07:17:33 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 26 Jul 2020 07:17:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzatF-0001me-4U; Sun, 26 Jul 2020 07:16:09 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Sup0=BF=gmail.com=berndbausch@srs-us1.protection.inumbo.net>)
 id 1jzatD-0001m8-I6
 for xen-users@lists.xenproject.org; Sun, 26 Jul 2020 07:16:07 +0000
X-Inumbo-ID: df18dc42-cf0f-11ea-89fd-bc764e2007e4
Received: from mail-pl1-x641.google.com (unknown [2607:f8b0:4864:20::641])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id df18dc42-cf0f-11ea-89fd-bc764e2007e4;
 Sun, 26 Jul 2020 07:16:06 +0000 (UTC)
Received: by mail-pl1-x641.google.com with SMTP id t6so6547796plo.3
 for <xen-users@lists.xenproject.org>; Sun, 26 Jul 2020 00:16:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:subject:to:message-id:date:user-agent:mime-version
 :content-language:content-transfer-encoding;
 bh=bvE8Eug75m2PDS97ohvp0voxcw/JYehhqm/7pJrTRik=;
 b=bTz0DbuKD0w1QZMSALNvPUdbajAC/Cxc1xTJ6aY9JyaBz/+ADy/rVAbtCkkBa9lg5D
 RQVX7KmSxl8JKx7MBO1pLejF7kmoKoyMwIF49w8HVxpMPIipng0gx8SY2MO8wUJ7PzLK
 YGpBP4AP625Ye/fDj/8SKHePHM42UxN/Dg7e/TUPne0Yz7ufItoPoBb+h40EriSmXfZf
 SWDdkl+hH/fPmbc781qsmodfDK122YhgM4Mi+X3pPVQINRW67rQUH/yFz7jRtbOMj/pi
 y2gnnaoeSBCO6aOyFRjLKOE/lfzlvinVFCuMUNUzaLSiJQwzuPD4XEBpA2c/AoQGnOH8
 SS3w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:subject:to:message-id:date:user-agent
 :mime-version:content-language:content-transfer-encoding;
 bh=bvE8Eug75m2PDS97ohvp0voxcw/JYehhqm/7pJrTRik=;
 b=Y046H7FK8QuYVm3rOSDLJ07lSZNvlBscIVzmb1j71pmzzqpir7DDDhEVsV0eLjhkaB
 2mwRzu1FT6BCOzO6dhyim8MpFKNnqpf7fr09rbQfI5MtS3URA9IL6xwkIO3dDAGqQCZj
 D9gl5SGi90UlTyiNVZT3CUKFyZjlBRQhETrm4eOXQvg65xUVOmprJ3LCWHf3um42VJue
 GuRYvkwzKwuFUzyzSlSR5V10p9Szicv9nNA90lTUho6DHUO/agAxFLfwbF0BZvBnbysU
 DygnVqv2dQcx7+RvU6e1X9b7l8f+lcSwQ8dsYxLpp84WZRJpzvf7F52vRQ1p7LpK14Us
 ghJw==
X-Gm-Message-State: AOAM531wsQvfCN8ED0gXqg/VtvQbLoXL+HqH7q0G4T6C4SFPdwWyus9O
 8hq0DX5BgaoeD83CXPc5VXIVYyIHOwY=
X-Google-Smtp-Source: ABdhPJwUOF4zOH8DGLELMB3CqTdCXLLKUJQW6K1gtLG7wzSpYdeitXmxcOnPmSH7irYnHEO4j79toQ==
X-Received: by 2002:a17:90a:6705:: with SMTP id
 n5mr14229418pjj.67.1595747765695; 
 Sun, 26 Jul 2020 00:16:05 -0700 (PDT)
Received: from [192.168.1.35] (fp93c0183f.tkyc626.ap.nuro.jp. [147.192.24.63])
 by smtp.gmail.com with ESMTPSA id
 t73sm11048134pfc.78.2020.07.26.00.16.04
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Sun, 26 Jul 2020 00:16:05 -0700 (PDT)
From: Bernd Bausch <berndbausch@gmail.com>
Subject: Newbie fails booting: "Xen is relinquishing VGA console"
To: xen-users@lists.xenproject.org
Message-ID: <625103f0-0f30-6fe1-1fc1-de597e8da7de@gmail.com>
Date: Sun, 26 Jul 2020 16:16:04 +0900
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

I am following the instructions at 
https://wiki.xenproject.org/wiki/Xen_Project_Beginners_Guide, except 
that I am installing the latest Debian. The machine is a Lenovo Thinkpad 
E540 with ample memory (16GB).

Trying to boot the Xen kernel, all I get is a dark screen. When I remove 
the "quiet" option from Grub's menu point, I see that the last message 
before blanking the screen is "Xen is relinquishing VGA console".

There are various documents on the internet that contain this string, 
but I am a total newcomer to the world of Xen and don't understand them. 
It might have something to do with "booting into domU versus dom0". I 
don't have a domU defined at this point.

I can boot into "normal" Debian without Xen.

How can I proceed? Should I use a different document to bootstrap myself 
into Xen?

Thanks in advance.


From xen-users-bounces@lists.xenproject.org Sun Jul 26 07:56:05 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 26 Jul 2020 07:56:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzbVE-0005Ek-BZ; Sun, 26 Jul 2020 07:55:24 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=KNtp=BF=nethence.com=pbraun@srs-us1.protection.inumbo.net>)
 id 1jzbVD-0005Ef-1G
 for xen-users@lists.xenproject.org; Sun, 26 Jul 2020 07:55:23 +0000
X-Inumbo-ID: 5a824224-cf15-11ea-a645-12813bfff9fa
Received: from slackmx.nethence.com (unknown [212.83.171.255])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 5a824224-cf15-11ea-a645-12813bfff9fa;
 Sun, 26 Jul 2020 07:55:21 +0000 (UTC)
Received: from [172.20.54.199] (219-54.szkti.ru [213.168.54.219])
 by slackmx.nethence.com (Postfix) with ESMTPSA id 4BDvvM4kZ2z1y5H;
 Sun, 26 Jul 2020 10:38:55 +0300 (MSK)
Subject: Re: Newbie fails booting: "Xen is relinquishing VGA console"
To: Bernd Bausch <berndbausch@gmail.com>, xen-users@lists.xenproject.org
References: <625103f0-0f30-6fe1-1fc1-de597e8da7de@gmail.com>
From: Pierre-Philipp Braun <pbraun@nethence.com>
Message-ID: <980cf6f9-8373-aa6e-31ec-4c5a171d2d44@nethence.com>
Date: Sun, 26 Jul 2020 10:39:11 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <625103f0-0f30-6fe1-1fc1-de597e8da7de@gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

> Trying to boot the Xen kernel, all I get is a dark screen. When I remove 
> the "quiet" option from Grub's menu point, I see that the last message 
> before blanking the screen is "Xen is relinquishing VGA console".

Is this EFI or legacy BIOS/CSM?  I will assume legacy, much easier.

Do you see the XEN booting but not the Linux kernel nor the system?  You 
don't get a system prompt either?

Maybe you just need to force output on VGA, in case it goes to serial 
port.

xen.gz argument would be console=vga but you probably don't need that
kernel argument try add console=tty0
but then you should have a prompt showing up anyways, unless systemD 
service mgetty now finds out by itself where to spit? (cray things 
happen nowadays)

At this stage I think you need to play with booting, then will come XEN 
and domU guest tuning.  I suggest you try PV and then switch to PVH with 
builder = "pvh".  By the way you can even run the dom0 as PVH (as it is 
a privileged guest) but you absolutely need to define `dom0_mem` for that.

/boot/xen.gz dom0=pvh dom0_mem=1024M,max:8192M loglvl=info noreboot=true



From xen-users-bounces@lists.xenproject.org Sun Jul 26 15:49:51 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 26 Jul 2020 15:49:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzisk-0003Xj-EW; Sun, 26 Jul 2020 15:48:10 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+2aW=BF=gmail.com=mofta7y@srs-us1.protection.inumbo.net>)
 id 1jzisj-0003Xe-1y
 for xen-users@lists.xenproject.org; Sun, 26 Jul 2020 15:48:09 +0000
X-Inumbo-ID: 656a0a72-cf57-11ea-8a3c-bc764e2007e4
Received: from mail-wr1-x443.google.com (unknown [2a00:1450:4864:20::443])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 656a0a72-cf57-11ea-8a3c-bc764e2007e4;
 Sun, 26 Jul 2020 15:48:06 +0000 (UTC)
Received: by mail-wr1-x443.google.com with SMTP id b6so12478457wrs.11
 for <xen-users@lists.xenproject.org>; Sun, 26 Jul 2020 08:48:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=FIx/D5g+f1We5itmR1i58SPa8GZZqrzCZiDI1QDz2P8=;
 b=cRFpYGkU2cJK2ve1ANnZnmmHu0OkOCHtmD+vu0+HujksJb92ktEuoNkTDGjxORt68U
 EvAtRBEz3zo2vAKOXVrnXTF2gH2iU3+2CaY0HJsW2dzcqZ7a3TojNnIFr72RzAfYlVjg
 SDxGt9X+2tIaEe5Thd3Qs8Gi6j4GrQ1zvH9eyYDnr5zRm/pf+AatBHlgnL38cO9Nxiui
 0GW7LOmWNrfl64L8Q5FKuDR3F02g0z/y9U0Ak7r+R6r4csNnH8dlpSqOgPpbBVXeX6bL
 E/y2UyiOjx5l46XZ6WyrIkZRPwUkBD7JbJg21ZMVcD2QvEZxr+Al2PxucL/9Bo/FDBEe
 4TSA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=FIx/D5g+f1We5itmR1i58SPa8GZZqrzCZiDI1QDz2P8=;
 b=AshvP2EhRuxh+bxXNr1oDgElZHicqK7kpeOWWxf2THMFVgsH6ZLSagCdY5Nb4U/2hx
 K0gkBCNEnYRF6JhGk79utlJ46ueXm9I8jZu2cQFFF1qqrGz+xLYXCr3nollSPK32m0Md
 Cj5FRyFTJQbivnqYVnec/xMI8/sUNAMBdfs2ICGLDZMwsVQgyr5wWUBCjlXYsI43Itzj
 AwJykqCm0BzMlt4poVcdBlAUsjMPRn7ELN+BXSWLSK4lWG4PDV3o7e+6vaLlkHRz+5Qn
 sK9F1cObIVHxFhWK93zI1jaFiB0mwXVOoGvaNNB4DlKjPrkBbBW8QtkqBKsp4mx1kEnD
 43Yg==
X-Gm-Message-State: AOAM530it3awBhZexXmKhowUgb8sIUkJtkJr707p4oqqkd9GPCfPaUko
 hKlMPfYQKU8Pakqm2L7IA3Rx1yXDKgjEpFn9qDkw7QfMVOI=
X-Google-Smtp-Source: ABdhPJw+XDM7mKVhLP3+gr5hCabULtMSPn3emd+AW6jE+22j4MSm1ZRq6KJV1U/pdH0VP1alH6SzuUr5dD5Y/gEf7ks=
X-Received: by 2002:a5d:4d87:: with SMTP id b7mr11903733wru.170.1595778485070; 
 Sun, 26 Jul 2020 08:48:05 -0700 (PDT)
MIME-Version: 1.0
From: moftah moftah <mofta7y@gmail.com>
Date: Sun, 26 Jul 2020 11:47:54 -0400
Message-ID: <CAPFC4RxTRQU8+UsDKDcrgiDKELPHeJgZ20hbEskvsm770naBXQ@mail.gmail.com>
Subject: repeated Kernel oops need help to debug
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000be302e05ab5a21ba"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000be302e05ab5a21ba
Content-Type: text/plain; charset="UTF-8"

Hi All,
We have a problem that is ongoing for more than 1 month

We have several servers running xcp-ng and we are facing kernel oops that
crash the server

My skill is not enough to debug the issue So need someone to point me to
the right direction
the issue is not hardware related
it occurred on servers that are of different processor , nic and even
kernel version (all under 4.19)

the stack trace looks like this

[2399526.430672]  ALERT: BUG: unable to handle kernel NULL pointer
dereference at 0000000000000004
[2399526.430695]   INFO: PGD 447268067 P4D 447268067 PUD 44775f067 PMD 0
[2399526.430710]   WARN: Oops: 0000 [#1] SMP NOPTI
[2399526.430720]   WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted
4.19.108 #1
[2399526.430728]   WARN: Hardware name: HP ProLiant SL230s Gen8   /, BIOS
P75 05/24/2019
[2399526.430745]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
[2399526.430753]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b 57
50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 d0 00
00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f0 ff
[2399526.430773]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
[2399526.430780]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RCX:
0000000000000000
[2399526.430789]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI:
ffff8883de0b9c00
[2399526.430801]   WARN: RBP: 0000000000000000 R08: 0000000000000000 R09:
0000000000000020
[2399526.430811]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12:
0000000000000001
[2399526.430823]   WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15:
ffff8883de0b9c00
[2399526.430852]   WARN: FS:  00007ffac43fe700(0000)
GS:ffff888451240000(0000) knlGS:0000000000000000
[2399526.430868]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033
[2399526.430879]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4:
0000000000040660
[2399526.430899]   WARN: Call Trace:
[2399526.430914]   WARN:  __qdisc_run+0xa2/0x4f0
[2399526.430928]   WARN:  ? __switch_to_asm+0x41/0x70
[2399526.430940]   WARN:  net_tx_action+0x148/0x230
[2399526.430949]   WARN:  __do_softirq+0xd1/0x28c
[2399526.430966]   WARN:  run_ksoftirqd+0x26/0x40
[2399526.430980]   WARN:  smpboot_thread_fn+0x10e/0x160
[2399526.430993]   WARN:  kthread+0xf8/0x130
[2399526.431004]   WARN:  ? sort_range+0x20/0x20
[2399526.431010]   WARN:  ? kthread_bind+0x10/0x10
[2399526.431017]   WARN:  ret_from_fork+0x35/0x40
[2399526.431027]   WARN: Modules linked in: act_police cls_basic
sch_ingress sch_tbf tun rpcsec_gss_krb5 auth_rpcgss oid_registry nfsv4 nfs
lockd grace fscache bnx2fc cnic uio fcoe libfcoe libfc scsi_transport_fc
openvswitch nsh nf_nat_ipv6 nf_nat_ipv4 nf_conncount nf_nat 8021q garp mrp
stp llc ipt_REJECT nf_reject_ipv4 dm_multipath xt_tcpudp xt_multiport
xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter
sunrpc hid_generic sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmul
ghash_clmulni_intel pcbc dm_mod aesni_intel aes_x86_64 crypto_simd cryptd
glue_helper intel_rapl_perf psmouse lpc_ich usbhid hid sg hpilo ipmi_si
ipmi_devintf ipmi_msghandler acpi_power_meter ip_tables x_tables raid1
md_mod sd_mod serio_raw uhci_hcd ahci libahci igb libata ehci_pci ehci_hcd
bnx2x mdio libcrc32c mpt3sas
[2399526.431154]   WARN:  raid_class scsi_transport_sas scsi_dh_rdac
scsi_dh_hp_sw scsi_dh_emc scsi_dh_alua scsi_mod ipv6 crc_ccitt
[2399526.431177]   WARN: CR2: 0000000000000004
[2399526.431189]   WARN: ---[ end trace 32a268c3653eb10c ]---
[2399526.431201]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
[2399526.431212]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b 57
50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 d0 00
00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f0 ff
[2399526.431238]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
[2399526.431247]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RCX:
0000000000000000
[2399526.431260]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI:
ffff8883de0b9c00
[2399526.431270]   WARN: RBP: 0000000000000000 R08: 0000000000000000 R09:
0000000000000020
[2399526.431280]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12:
0000000000000001
[2399526.431289]   WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15:
ffff8883de0b9c00
[2399526.431307]   WARN: FS:  00007ffac43fe700(0000)
GS:ffff888451240000(0000) knlGS:0000000000000000
[2399526.431319]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033
[2399526.431331]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4:
0000000000040660
[2399526.431355]  EMERG: Kernel panic - not syncing: Fatal exception in
interrupt


xen crash analyzer generate many other files as well
dmesg.kexec.log
dom0.log ( for each dom )
dom0.structures.log  for each dom ( for each dom )
....
lspci-tv.out
lspci-vv.out
lspci-vvxxxx.out
readelf-Wl.out
readelf-Wn.out
time-v.out
xen.log
xen.pcpu0.stack.log ( for each pcpu)
...
xen-crashdump-analyser.log

the log can be seen from xenlog file as
 Call Trace:
[ffffffff810014aa] xen_hypercall_kexec_op+0xa/0x20
 ffffffff81071f85  panic+0x111/0x27c
 ffffffff81027a7f  oops_end+0xcf/0xd0
 ffffffff8105da63  no_context+0x1b3/0x3c0
 ffffffff816c0223  inet_gro_receive+0x213/0x2b0
 ffffffff8105e32a  __do_page_fault+0xaa/0x4f0
 ffffffff8162cd44  netif_receive_skb_internal+0x34/0xe0
 ffffffff81800f6e  page_fault+0x1e/0x30
 ffffffff81663ac9  pfifo_fast_dequeue+0xc9/0x140
 ffffffff81663f38  __qdisc_run+0xa8/0x4e0
 ffffffff816290c8  net_tx_action+0x148/0x220
 ffffffff81a000d1  __softirqentry_text_start+0xd1/0x28c
 ffffffff81077ff6  run_ksoftirqd+0x26/0x40
 ffffffff8109763e  smpboot_thread_fn+0x10e/0x160
 ffffffff81093b68  kthread+0xf8/0x130
 ffffffff81097530  smpboot_thread_fn+0/0x160
 ffffffff81093a70  kthread+0/0x130
 ffffffff81800215  ret_from_fork+0x35/0x40

I did use a tool to trace the source code where the issue occure
./decode_stacktrace.sh /usr/lib/debug/lib/modules/4.19.108/vmlinux
/usr/lib/debug/lib/modules/4.19.108/ < ./trace2 > out3

and this is the output

[ffffffff810014aa] xen_hypercall_kexec_op (arch/x86/kernel/.tmp_head_64.o:?)
ffffffff81071f85 panic (/usr/src/debug/kernel-4.19.19/kernel/panic.c:209)
ffffffff81027a7f oops_end
(/usr/src/debug/kernel-4.19.19/arch/x86/kernel/dumpstack.c:352)
ffffffff8105da63 no_context
(/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault.c:808)
ffffffff816c0223 inet_gro_receive
(/usr/src/debug/kernel-4.19.19/include/linux/skbuff.h:2350
/usr/src/debug/kernel-4.19.19/net/ipv4/af_inet.c:1495)
ffffffff8105e32a __do_page_fault
(/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault.c:1435)
ffffffff8162cd44 netif_receive_skb_internal
(/usr/src/debug/kernel-4.19.19/net/core/dev.c:5152)
ffffffff81800f6e page_fault
(/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:1204)
ffffffff81663ac9 pfifo_fast_dequeue
(/usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:723
/usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:740
/usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:747
/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:677)
ffffffff81663f38 __qdisc_run
(/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:283
/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:385
/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:403)
ffffffff816290c8 net_tx_action
(/usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:235
/usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:388
/usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:145
/usr/src/debug/kernel-4.19.19/include/net/pkt_sched.h:121
/usr/src/debug/kernel-4.19.19/net/core/dev.c:4595)
ffffffff81a000d1 __softirqentry_text_start
(/usr/src/debug/kernel-4.19.19/kernel/softirq.c:292
/usr/src/debug/kernel-4.19.19/include/linux/jump_label.h:138
/usr/src/debug/kernel-4.19.19/include/trace/events/irq.h:142
/usr/src/debug/kernel-4.19.19/kernel/softirq.c:293)
ffffffff81077ff6 run_ksoftirqd
(/usr/src/debug/kernel-4.19.19/arch/x86/include/asm/paravirt.h:799
/usr/src/debug/kernel-4.19.19/kernel/softirq.c:654)
ffffffff8109763e smpboot_thread_fn
(/usr/src/debug/kernel-4.19.19/kernel/smpboot.c:164)
ffffffff81093b68 kthread
(/usr/src/debug/kernel-4.19.19/kernel/kthread.c:246)
ffffffff81097530  smpboot_thread_fn+0/0x160
ffffffff81093a70  kthread+0/0x130
ffffffff81800215 ret_from_fork
(/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:421)

based on that the issue occurred when calling
_bstats_update
<https://elixir.bootlin.com/linux/v4.19.128/C/ident/_bstats_update>(&bstats
<https://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats>->bstats
<https://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats>, bytes
<https://elixir.bootlin.com/linux/v4.19.128/C/ident/bytes>, packets
<https://elixir.bootlin.com/linux/v4.19.128/C/ident/packets>);

thats as far as i can reach not sure how to debug further to find the root
cause and fix it

--000000000000be302e05ab5a21ba
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi All,<div>We have a problem that is ongoing for more tha=
n 1 month</div><div><br></div><div>We have several servers running xcp-ng a=
nd we are facing kernel=C2=A0oops that crash the server</div><div><br></div=
><div>My skill is not enough to debug=C2=A0the issue So need someone to poi=
nt me to the right direction</div><div>the issue is not hardware related</d=
iv><div>it occurred=C2=A0on servers that are of different=C2=A0processor , =
nic and even kernel version (all under 4.19)</div><div><br></div><div>the s=
tack trace looks like this</div><div><br></div><div>[2399526.430672] =C2=A0=
ALERT: BUG: unable to handle kernel NULL pointer dereference at 00000000000=
00004<br>[2399526.430695] =C2=A0 INFO: PGD 447268067 P4D 447268067 PUD 4477=
5f067 PMD 0 <br>[2399526.430710] =C2=A0 WARN: Oops: 0000 [#1] SMP NOPTI<br>=
[2399526.430720] =C2=A0 WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted =
4.19.108 #1<br>[2399526.430728] =C2=A0 WARN: Hardware name: HP ProLiant SL2=
30s Gen8 =C2=A0 /, BIOS P75 05/24/2019<br>[2399526.430745] =C2=A0 WARN: RIP=
: e030:pfifo_fast_dequeue+0xc9/0x140<br>[2399526.430753] =C2=A0 WARN: Code:=
 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b 57 50 65 48 03 15 11 64 99 7e 8b=
 88 cc 00 00 00 be 01 00 00 00 48 03 88 d0 00 00 00 &lt;66&gt; 83 79 04 00 =
74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f0 ff<br>[2399526.430773] =C2=
=A0 WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246<br>[2399526.430780] =
=C2=A0 WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RCX: 0000000000000=
000<br>[2399526.430789] =C2=A0 WARN: RDX: ffffe8fffee60a1c RSI: 00000000000=
00001 RDI: ffff8883de0b9c00<br>[2399526.430801] =C2=A0 WARN: RBP: 000000000=
0000000 R08: 0000000000000000 R09: 0000000000000020<br>[2399526.430811] =C2=
=A0 WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12: 0000000000000001=
<br>[2399526.430823] =C2=A0 WARN: R13: ffff8883db210a00 R14: 00000000000000=
02 R15: ffff8883de0b9c00<br>[2399526.430852] =C2=A0 WARN: FS: =C2=A000007ff=
ac43fe700(0000) GS:ffff888451240000(0000) knlGS:0000000000000000<br>[239952=
6.430868] =C2=A0 WARN: CS: =C2=A0e033 DS: 0000 ES: 0000 CR0: 00000000800500=
33<br>[2399526.430879] =C2=A0 WARN: CR2: 0000000000000004 CR3: 000000044ad5=
8000 CR4: 0000000000040660<br>[2399526.430899] =C2=A0 WARN: Call Trace:<br>=
[2399526.430914] =C2=A0 WARN: =C2=A0__qdisc_run+0xa2/0x4f0<br>[2399526.4309=
28] =C2=A0 WARN: =C2=A0? __switch_to_asm+0x41/0x70<br>[2399526.430940] =C2=
=A0 WARN: =C2=A0net_tx_action+0x148/0x230<br>[2399526.430949] =C2=A0 WARN: =
=C2=A0__do_softirq+0xd1/0x28c<br>[2399526.430966] =C2=A0 WARN: =C2=A0run_ks=
oftirqd+0x26/0x40<br>[2399526.430980] =C2=A0 WARN: =C2=A0smpboot_thread_fn+=
0x10e/0x160<br>[2399526.430993] =C2=A0 WARN: =C2=A0kthread+0xf8/0x130<br>[2=
399526.431004] =C2=A0 WARN: =C2=A0? sort_range+0x20/0x20<br>[2399526.431010=
] =C2=A0 WARN: =C2=A0? kthread_bind+0x10/0x10<br>[2399526.431017] =C2=A0 WA=
RN: =C2=A0ret_from_fork+0x35/0x40<br>[2399526.431027] =C2=A0 WARN: Modules =
linked in: act_police cls_basic sch_ingress sch_tbf tun rpcsec_gss_krb5 aut=
h_rpcgss oid_registry nfsv4 nfs lockd grace fscache bnx2fc cnic uio fcoe li=
bfcoe libfc scsi_transport_fc openvswitch nsh nf_nat_ipv6 nf_nat_ipv4 nf_co=
nncount nf_nat 8021q garp mrp stp llc ipt_REJECT nf_reject_ipv4 dm_multipat=
h xt_tcpudp xt_multiport xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag=
_ipv4 iptable_filter sunrpc hid_generic sb_edac intel_powerclamp crct10dif_=
pclmul crc32_pclmul ghash_clmulni_intel pcbc dm_mod aesni_intel aes_x86_64 =
crypto_simd cryptd glue_helper intel_rapl_perf psmouse lpc_ich usbhid hid s=
g hpilo ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter ip_tables x_t=
ables raid1 md_mod sd_mod serio_raw uhci_hcd ahci libahci igb libata ehci_p=
ci ehci_hcd bnx2x mdio libcrc32c mpt3sas<br>[2399526.431154] =C2=A0 WARN: =
=C2=A0raid_class scsi_transport_sas scsi_dh_rdac scsi_dh_hp_sw scsi_dh_emc =
scsi_dh_alua scsi_mod ipv6 crc_ccitt<br>[2399526.431177] =C2=A0 WARN: CR2: =
0000000000000004<br>[2399526.431189] =C2=A0 WARN: ---[ end trace 32a268c365=
3eb10c ]---<br>[2399526.431201] =C2=A0 WARN: RIP: e030:pfifo_fast_dequeue+0=
xc9/0x140<br>[2399526.431212] =C2=A0 WARN: Code: 50 28 48 8b 4f 58 f7 da 65=
 01 51 04 48 8b 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00=
 00 48 03 88 d0 00 00 00 &lt;66&gt; 83 79 04 00 74 04 0f b7 71 06 8b 48 28 =
01 72 08 48 01 0a f0 ff<br>[2399526.431238] =C2=A0 WARN: RSP: e02b:ffffc900=
400c3de0 EFLAGS: 00010246<br>[2399526.431247] =C2=A0 WARN: RAX: ffff8884208=
7b900 RBX: 0000000000000001 RCX: 0000000000000000<br>[2399526.431260] =C2=
=A0 WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI: ffff8883de0b9c00=
<br>[2399526.431270] =C2=A0 WARN: RBP: 0000000000000000 R08: 00000000000000=
00 R09: 0000000000000020<br>[2399526.431280] =C2=A0 WARN: R10: 000000000000=
0000 R11: ffff8883de0b9d40 R12: 0000000000000001<br>[2399526.431289] =C2=A0=
 WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15: ffff8883de0b9c00<br=
>[2399526.431307] =C2=A0 WARN: FS: =C2=A000007ffac43fe700(0000) GS:ffff8884=
51240000(0000) knlGS:0000000000000000<br>[2399526.431319] =C2=A0 WARN: CS: =
=C2=A0e033 DS: 0000 ES: 0000 CR0: 0000000080050033<br>[2399526.431331] =C2=
=A0 WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4: 0000000000040660=
<br>[2399526.431355] =C2=A0EMERG: Kernel panic - not syncing: Fatal excepti=
on in interrupt<br></div><div><br></div><div><br></div><div>xen crash analy=
zer generate many other files as well</div><div>dmesg.kexec.log<br>dom0.log=
 (

for each dom )<br>dom0.structures.log=C2=A0

for each dom (

for each dom )</div><div>....<br>lspci-tv.out<br>lspci-vv.out<br>lspci-vvxx=
xx.out<br>readelf-Wl.out<br>readelf-Wn.out<br>time-v.out<br>xen.log<br>xen.=
pcpu0.stack.log (

for each pcpu)=C2=A0</div><div>...<br>xen-crashdump-analyser.log<br></div><=
div><br></div><div>the log can be seen from xenlog=C2=A0file as=C2=A0</div>=
<div>=C2=A0Call Trace:<br>	 [ffffffff810014aa] xen_hypercall_kexec_op+0xa/0=
x20<br>	 =C2=A0ffffffff81071f85 =C2=A0panic+0x111/0x27c<br>	 =C2=A0ffffffff=
81027a7f =C2=A0oops_end+0xcf/0xd0<br>	 =C2=A0ffffffff8105da63 =C2=A0no_cont=
ext+0x1b3/0x3c0<br>	 =C2=A0ffffffff816c0223 =C2=A0inet_gro_receive+0x213/0x=
2b0<br>	 =C2=A0ffffffff8105e32a =C2=A0__do_page_fault+0xaa/0x4f0<br>	 =C2=
=A0ffffffff8162cd44 =C2=A0netif_receive_skb_internal+0x34/0xe0<br>	 =C2=A0f=
fffffff81800f6e =C2=A0page_fault+0x1e/0x30<br>	 =C2=A0ffffffff81663ac9 =C2=
=A0pfifo_fast_dequeue+0xc9/0x140<br>	 =C2=A0ffffffff81663f38 =C2=A0__qdisc_=
run+0xa8/0x4e0<br>	 =C2=A0ffffffff816290c8 =C2=A0net_tx_action+0x148/0x220<=
br>	 =C2=A0ffffffff81a000d1 =C2=A0__softirqentry_text_start+0xd1/0x28c<br>	=
 =C2=A0ffffffff81077ff6 =C2=A0run_ksoftirqd+0x26/0x40<br>	 =C2=A0ffffffff81=
09763e =C2=A0smpboot_thread_fn+0x10e/0x160<br>	 =C2=A0ffffffff81093b68 =C2=
=A0kthread+0xf8/0x130<br>	 =C2=A0ffffffff81097530 =C2=A0smpboot_thread_fn+0=
/0x160<br>	 =C2=A0ffffffff81093a70 =C2=A0kthread+0/0x130<br>	 =C2=A0fffffff=
f81800215 =C2=A0ret_from_fork+0x35/0x40<br></div><div><br></div><div>I did =
use a tool to trace the source code where the issue occure</div><div>./deco=
de_stacktrace.sh /usr/lib/debug/lib/modules/4.19.108/vmlinux /usr/lib/debug=
/lib/modules/4.19.108/ &lt; ./trace2 &gt; out3<br></div><div><br></div><div=
>and this is the output</div><div><br></div><div>[ffffffff810014aa] xen_hyp=
ercall_kexec_op (arch/x86/kernel/.tmp_head_64.o:?)<br>ffffffff81071f85 pani=
c (/usr/src/debug/kernel-4.19.19/kernel/panic.c:209)<br>ffffffff81027a7f oo=
ps_end (/usr/src/debug/kernel-4.19.19/arch/x86/kernel/dumpstack.c:352)<br>f=
fffffff8105da63 no_context (/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault=
.c:808)<br>ffffffff816c0223 inet_gro_receive (/usr/src/debug/kernel-4.19.19=
/include/linux/skbuff.h:2350 /usr/src/debug/kernel-4.19.19/net/ipv4/af_inet=
.c:1495)<br>ffffffff8105e32a __do_page_fault (/usr/src/debug/kernel-4.19.19=
/arch/x86/mm/fault.c:1435)<br>ffffffff8162cd44 netif_receive_skb_internal (=
/usr/src/debug/kernel-4.19.19/net/core/dev.c:5152)<br>ffffffff81800f6e page=
_fault (/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:1204=
)<br>ffffffff81663ac9 pfifo_fast_dequeue (/usr/src/debug/kernel-4.19.19/inc=
lude/net/sch_generic.h:723 /usr/src/debug/kernel-4.19.19/include/net/sch_ge=
neric.h:740 /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:747 /us=
r/src/debug/kernel-4.19.19/net/sched/sch_generic.c:677)<br>ffffffff81663f38=
 __qdisc_run (/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:283 /us=
r/src/debug/kernel-4.19.19/net/sched/sch_generic.c:385 /usr/src/debug/kerne=
l-4.19.19/net/sched/sch_generic.c:403)<br>ffffffff816290c8 net_tx_action (/=
usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:235 /usr/src/debug/ker=
nel-4.19.19/include/linux/seqlock.h:388 /usr/src/debug/kernel-4.19.19/inclu=
de/net/sch_generic.h:145 /usr/src/debug/kernel-4.19.19/include/net/pkt_sche=
d.h:121 /usr/src/debug/kernel-4.19.19/net/core/dev.c:4595)<br>ffffffff81a00=
0d1 __softirqentry_text_start (/usr/src/debug/kernel-4.19.19/kernel/softirq=
.c:292 /usr/src/debug/kernel-4.19.19/include/linux/jump_label.h:138 /usr/sr=
c/debug/kernel-4.19.19/include/trace/events/irq.h:142 /usr/src/debug/kernel=
-4.19.19/kernel/softirq.c:293)<br>ffffffff81077ff6 run_ksoftirqd (/usr/src/=
debug/kernel-4.19.19/arch/x86/include/asm/paravirt.h:799 /usr/src/debug/ker=
nel-4.19.19/kernel/softirq.c:654)<br>ffffffff8109763e smpboot_thread_fn (/u=
sr/src/debug/kernel-4.19.19/kernel/smpboot.c:164)<br>ffffffff81093b68 kthre=
ad (/usr/src/debug/kernel-4.19.19/kernel/kthread.c:246)<br>ffffffff81097530=
 =C2=A0smpboot_thread_fn+0/0x160<br>ffffffff81093a70 =C2=A0kthread+0/0x130<=
br>ffffffff81800215 ret_from_fork (/usr/src/debug////////kernel-4.19.19/arc=
h/x86/entry/entry_64.S:421)<br></div><div><br></div><div>based on that the =
issue occurred when calling=C2=A0</div><div><span class=3D"gmail-n"><a href=
=3D"https://elixir.bootlin.com/linux/v4.19.128/C/ident/_bstats_update">_bst=
ats_update</a></span><span class=3D"gmail-p">(</span><span class=3D"gmail-o=
">&amp;</span><span class=3D"gmail-n"><a href=3D"https://elixir.bootlin.com=
/linux/v4.19.128/C/ident/bstats">bstats</a></span><span class=3D"gmail-o">-=
&gt;</span><span class=3D"gmail-n"><a href=3D"https://elixir.bootlin.com/li=
nux/v4.19.128/C/ident/bstats">bstats</a></span><span class=3D"gmail-p">,</s=
pan> <span class=3D"gmail-n"><a href=3D"https://elixir.bootlin.com/linux/v4=
.19.128/C/ident/bytes">bytes</a></span><span class=3D"gmail-p">,</span> <sp=
an class=3D"gmail-n"><a href=3D"https://elixir.bootlin.com/linux/v4.19.128/=
C/ident/packets">packets</a></span><span class=3D"gmail-p">);</span><br></d=
iv><div><span class=3D"gmail-p"><br></span></div><div>thats as far as i can=
 reach not sure how to debug further to find the root cause and fix it=C2=
=A0</div><div><br></div><div><span class=3D"gmail-p"><br></span></div></div=
>

--000000000000be302e05ab5a21ba--


From xen-users-bounces@lists.xenproject.org Sun Jul 26 17:05:39 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 26 Jul 2020 17:05:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzk4e-0002VT-KL; Sun, 26 Jul 2020 17:04:32 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Knjy=BF=gmail.com=rob.townley@srs-us1.protection.inumbo.net>)
 id 1jzk4d-0002VO-9o
 for xen-users@lists.xenproject.org; Sun, 26 Jul 2020 17:04:31 +0000
X-Inumbo-ID: 11611a3c-cf62-11ea-8a4e-bc764e2007e4
Received: from mail-vs1-xe30.google.com (unknown [2607:f8b0:4864:20::e30])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 11611a3c-cf62-11ea-8a4e-bc764e2007e4;
 Sun, 26 Jul 2020 17:04:29 +0000 (UTC)
Received: by mail-vs1-xe30.google.com with SMTP id k7so7127289vso.2
 for <xen-users@lists.xenproject.org>; Sun, 26 Jul 2020 10:04:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:reply-to:from:date:message-id
 :subject:to:cc;
 bh=MSUgjY06gBHvctDdhrWILfTZZ51HBzNiG+uWH5zVlSo=;
 b=BtLVhuxJqwLRsr+RxF7ku78iC+xuMK2iG3muwH68pTlq4f8ES3Bj3URtuP4pn24kUi
 fYhpOonLdNq5X8ff+tV4/kUZWWiPsDm3xkZoYx61SXAH06vrqSZim8g5aSBDkBl1o937
 r09jGyAg/sce0ORWbzaeyausTomrJNptNWvghfR0mYhnXUILwmFG3lteeJd6aJp0p96K
 RqqZ+RCU9fWapobLnUOLAtx4/mnWNRDQn/DNm63l6h/HxdvsOhTUeIGCEpl81uZNoN3u
 cxvicOEZwWZ532srl+epzYQ54J4g3WlojluWk+BOA/f1jWhlSEJxvq0AtjNMqycusWQ4
 7Qlw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:reply-to
 :from:date:message-id:subject:to:cc;
 bh=MSUgjY06gBHvctDdhrWILfTZZ51HBzNiG+uWH5zVlSo=;
 b=apk+SOXxZ1KdAqh9fHhc+x/1HMhhovzYdLdlwokjK0I/JCOqkgcPMT62T5eKAU5am2
 kamHZUjLRJ51wVI50V2OF1q8d4klDTcvvLUmo81d8MfL4M12//g6O+mCYlfrLGZHUse+
 XXGtw/GY1IC9crUuw6ePCTnwmlHqVX/01r15fjppKSTSKp7cdkoOTSTgDSZhbsgc5ZY3
 mZkFEpGs6Ao8yD0vRoZALNQ46+53V2vhI2cFQvWWcfM/t9ftf4JXV2i1Nc5OXYCtiNeF
 WB3pOety5U6gQhieQ0xkoYh9pgi3j/V3RBj3VercXumhgu/3hVcbdZI9P45/2EYozO2S
 9OPg==
X-Gm-Message-State: AOAM530x93+xRYbMaPWpRfcHJzffJvHKwiHhU8yEJ+l85iVGRk/1NR5Y
 aLLPj6FYS6Skq6OaDIflOPY2KX0/WGTiXL3qDB4=
X-Google-Smtp-Source: ABdhPJzsKJvcmRT7hBb3JAbzvxeVlT5e6DMNAX69GgWJoRAjEsMhyFT5SmTIRjNwaq4tIMpsXiNClhAg1hFaKKhYfQs=
X-Received: by 2002:a67:8bc4:: with SMTP id
 n187mr13982448vsd.112.1595783068733; 
 Sun, 26 Jul 2020 10:04:28 -0700 (PDT)
MIME-Version: 1.0
References: <CAPFC4RxTRQU8+UsDKDcrgiDKELPHeJgZ20hbEskvsm770naBXQ@mail.gmail.com>
In-Reply-To: <CAPFC4RxTRQU8+UsDKDcrgiDKELPHeJgZ20hbEskvsm770naBXQ@mail.gmail.com>
From: Rob Townley <rob.townley@gmail.com>
Date: Sun, 26 Jul 2020 11:04:17 -0600
Message-ID: <CA+VdTb_NPmbjjGV-BRqkuT5DsCUdZkCVSc=QhaaSJ7qDjVdW3w@mail.gmail.com>
Subject: Re: repeated Kernel oops need help to debug
To: moftah moftah <mofta7y@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000f356db05ab5b3241"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Rob.Townley@gmail.com
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000f356db05ab5b3241
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

We have had crashes on one machine.  Do not have details because i do not
have broadband now.

Somethings that stuck out to me.
Inability to sync would make me wonder if filesystem issue.
Also wondering if you installed the netdata package since some of the
errors seem to be related to statistics?  Our crashes happened after
installing netdata but crashes are only occurring on one machine.

Hypothesis:  netdata needs to read and write filesystem more which has
exposed filesystem corruption.

What fs is it?   extX or LVM/extX or ?

Read out the fs metadata and fs check confuguration with:
tune2fs -l /dev/sdaX
Replace X with 0, 1, 2 ... whatever you may have.

Then triple check these parameters as i am far from from fast internet at
the moment.   I have done the following tons of times on normal Linux
machines, but not so much with xen kernel.  Is Dom-0 VM fs the same as
underlying kernel?   But set fs check interval and mount count with:

=E2=80=98tune2fs -i 1d /dev/sdaX=E2=80=99
=E2=80=98tune2fs -c 1 /dev/sdaX=E2=80=99

=E2=80=98e2fsck -c -c -C0 -D /dev/sdaX=E2=80=98
can be used to check for both read and write, output to stdout, and
optimize layout, directory structure, and so on.  But this would require
booting from install ISO or qlive media.


On Sun, Jul 26, 2020 at 9:51 AM moftah moftah <mofta7y@gmail.com> wrote:

> Hi All,
> We have a problem that is ongoing for more than 1 month
>
> We have several servers running xcp-ng and we are facing kernel oops that
> crash the server
>
> My skill is not enough to debug the issue So need someone to point me to
> the right direction
> the issue is not hardware related
> it occurred on servers that are of different processor , nic and even
> kernel version (all under 4.19)
>
> the stack trace looks like this
>
> [2399526.430672]  ALERT: BUG: unable to handle kernel NULL pointer
> dereference at 0000000000000004
> [2399526.430695]   INFO: PGD 447268067 P4D 447268067 PUD 44775f067 PMD 0
> [2399526.430710]   WARN: Oops: 0000 [#1] SMP NOPTI
> [2399526.430720]   WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted
> 4.19.108 #1
> [2399526.430728]   WARN: Hardware name: HP ProLiant SL230s Gen8   /, BIOS
> P75 05/24/2019
> [2399526.430745]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
> [2399526.430753]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b
> 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 d=
0
> 00 00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f0=
 ff
> [2399526.430773]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
> [2399526.430780]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RCX:
> 0000000000000000
> [2399526.430789]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI:
> ffff8883de0b9c00
> [2399526.430801]   WARN: RBP: 0000000000000000 R08: 0000000000000000 R09:
> 0000000000000020
> [2399526.430811]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12:
> 0000000000000001
> [2399526.430823]   WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15:
> ffff8883de0b9c00
> [2399526.430852]   WARN: FS:  00007ffac43fe700(0000)
> GS:ffff888451240000(0000) knlGS:0000000000000000
> [2399526.430868]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003=
3
> [2399526.430879]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4:
> 0000000000040660
> [2399526.430899]   WARN: Call Trace:
> [2399526.430914]   WARN:  __qdisc_run+0xa2/0x4f0
> [2399526.430928]   WARN:  ? __switch_to_asm+0x41/0x70
> [2399526.430940]   WARN:  net_tx_action+0x148/0x230
> [2399526.430949]   WARN:  __do_softirq+0xd1/0x28c
> [2399526.430966]   WARN:  run_ksoftirqd+0x26/0x40
> [2399526.430980]   WARN:  smpboot_thread_fn+0x10e/0x160
> [2399526.430993]   WARN:  kthread+0xf8/0x130
> [2399526.431004]   WARN:  ? sort_range+0x20/0x20
> [2399526.431010]   WARN:  ? kthread_bind+0x10/0x10
> [2399526.431017]   WARN:  ret_from_fork+0x35/0x40
> [2399526.431027]   WARN: Modules linked in: act_police cls_basic
> sch_ingress sch_tbf tun rpcsec_gss_krb5 auth_rpcgss oid_registry nfsv4 nf=
s
> lockd grace fscache bnx2fc cnic uio fcoe libfcoe libfc scsi_transport_fc
> openvswitch nsh nf_nat_ipv6 nf_nat_ipv4 nf_conncount nf_nat 8021q garp mr=
p
> stp llc ipt_REJECT nf_reject_ipv4 dm_multipath xt_tcpudp xt_multiport
> xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter
> sunrpc hid_generic sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmul
> ghash_clmulni_intel pcbc dm_mod aesni_intel aes_x86_64 crypto_simd cryptd
> glue_helper intel_rapl_perf psmouse lpc_ich usbhid hid sg hpilo ipmi_si
> ipmi_devintf ipmi_msghandler acpi_power_meter ip_tables x_tables raid1
> md_mod sd_mod serio_raw uhci_hcd ahci libahci igb libata ehci_pci ehci_hc=
d
> bnx2x mdio libcrc32c mpt3sas
> [2399526.431154]   WARN:  raid_class scsi_transport_sas scsi_dh_rdac
> scsi_dh_hp_sw scsi_dh_emc scsi_dh_alua scsi_mod ipv6 crc_ccitt
> [2399526.431177]   WARN: CR2: 0000000000000004
> [2399526.431189]   WARN: ---[ end trace 32a268c3653eb10c ]---
> [2399526.431201]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
> [2399526.431212]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b
> 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 d=
0
> 00 00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f0=
 ff
> [2399526.431238]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
> [2399526.431247]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RCX:
> 0000000000000000
> [2399526.431260]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI:
> ffff8883de0b9c00
> [2399526.431270]   WARN: RBP: 0000000000000000 R08: 0000000000000000 R09:
> 0000000000000020
> [2399526.431280]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12:
> 0000000000000001
> [2399526.431289]   WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15:
> ffff8883de0b9c00
> [2399526.431307]   WARN: FS:  00007ffac43fe700(0000)
> GS:ffff888451240000(0000) knlGS:0000000000000000
> [2399526.431319]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003=
3
> [2399526.431331]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4:
> 0000000000040660
> [2399526.431355]  EMERG: Kernel panic - not syncing: Fatal exception in
> interrupt
>
>
> xen crash analyzer generate many other files as well
> dmesg.kexec.log
> dom0.log ( for each dom )
> dom0.structures.log  for each dom ( for each dom )
> ....
> lspci-tv.out
> lspci-vv.out
> lspci-vvxxxx.out
> readelf-Wl.out
> readelf-Wn.out
> time-v.out
> xen.log
> xen.pcpu0.stack.log ( for each pcpu)
> ...
> xen-crashdump-analyser.log
>
> the log can be seen from xenlog file as
>  Call Trace:
> [ffffffff810014aa] xen_hypercall_kexec_op+0xa/0x20
>  ffffffff81071f85  panic+0x111/0x27c
>  ffffffff81027a7f  oops_end+0xcf/0xd0
>  ffffffff8105da63  no_context+0x1b3/0x3c0
>  ffffffff816c0223  inet_gro_receive+0x213/0x2b0
>  ffffffff8105e32a  __do_page_fault+0xaa/0x4f0
>  ffffffff8162cd44  netif_receive_skb_internal+0x34/0xe0
>  ffffffff81800f6e  page_fault+0x1e/0x30
>  ffffffff81663ac9  pfifo_fast_dequeue+0xc9/0x140
>  ffffffff81663f38  __qdisc_run+0xa8/0x4e0
>  ffffffff816290c8  net_tx_action+0x148/0x220
>  ffffffff81a000d1  __softirqentry_text_start+0xd1/0x28c
>  ffffffff81077ff6  run_ksoftirqd+0x26/0x40
>  ffffffff8109763e  smpboot_thread_fn+0x10e/0x160
>  ffffffff81093b68  kthread+0xf8/0x130
>  ffffffff81097530  smpboot_thread_fn+0/0x160
>  ffffffff81093a70  kthread+0/0x130
>  ffffffff81800215  ret_from_fork+0x35/0x40
>
> I did use a tool to trace the source code where the issue occure
> ./decode_stacktrace.sh /usr/lib/debug/lib/modules/4.19.108/vmlinux
> /usr/lib/debug/lib/modules/4.19.108/ < ./trace2 > out3
>
> and this is the output
>
> [ffffffff810014aa] xen_hypercall_kexec_op
> (arch/x86/kernel/.tmp_head_64.o:?)
> ffffffff81071f85 panic (/usr/src/debug/kernel-4.19.19/kernel/panic.c:209)
> ffffffff81027a7f oops_end
> (/usr/src/debug/kernel-4.19.19/arch/x86/kernel/dumpstack.c:352)
> ffffffff8105da63 no_context
> (/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault.c:808)
> ffffffff816c0223 inet_gro_receive
> (/usr/src/debug/kernel-4.19.19/include/linux/skbuff.h:2350
> /usr/src/debug/kernel-4.19.19/net/ipv4/af_inet.c:1495)
> ffffffff8105e32a __do_page_fault
> (/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault.c:1435)
> ffffffff8162cd44 netif_receive_skb_internal
> (/usr/src/debug/kernel-4.19.19/net/core/dev.c:5152)
> ffffffff81800f6e page_fault
> (/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:1204)
> ffffffff81663ac9 pfifo_fast_dequeue
> (/usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:723
> /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:740
> /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:747
> /usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:677)
> ffffffff81663f38 __qdisc_run
> (/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:283
> /usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:385
> /usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:403)
> ffffffff816290c8 net_tx_action
> (/usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:235
> /usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:388
> /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:145
> /usr/src/debug/kernel-4.19.19/include/net/pkt_sched.h:121
> /usr/src/debug/kernel-4.19.19/net/core/dev.c:4595)
> ffffffff81a000d1 __softirqentry_text_start
> (/usr/src/debug/kernel-4.19.19/kernel/softirq.c:292
> /usr/src/debug/kernel-4.19.19/include/linux/jump_label.h:138
> /usr/src/debug/kernel-4.19.19/include/trace/events/irq.h:142
> /usr/src/debug/kernel-4.19.19/kernel/softirq.c:293)
> ffffffff81077ff6 run_ksoftirqd
> (/usr/src/debug/kernel-4.19.19/arch/x86/include/asm/paravirt.h:799
> /usr/src/debug/kernel-4.19.19/kernel/softirq.c:654)
> ffffffff8109763e smpboot_thread_fn
> (/usr/src/debug/kernel-4.19.19/kernel/smpboot.c:164)
> ffffffff81093b68 kthread
> (/usr/src/debug/kernel-4.19.19/kernel/kthread.c:246)
> ffffffff81097530  smpboot_thread_fn+0/0x160
> ffffffff81093a70  kthread+0/0x130
> ffffffff81800215 ret_from_fork
> (/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:421)
>
> based on that the issue occurred when calling
> _bstats_update
> <https://elixir.bootlin.com/linux/v4.19.128/C/ident/_bstats_update>(&
> bstats <https://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats>->bstat=
s
> <https://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats>, bytes
> <https://elixir.bootlin.com/linux/v4.19.128/C/ident/bytes>, packets
> <https://elixir.bootlin.com/linux/v4.19.128/C/ident/packets>);
>
> thats as far as i can reach not sure how to debug further to find the roo=
t
> cause and fix it
>
>
>

--000000000000f356db05ab5b3241
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div><div><div><div dir=3D"auto">We have had crashes on one machine.=C2=A0 =
Do not have details because i do not have broadband now. =C2=A0</div></div>=
<div dir=3D"auto"><br></div><div dir=3D"auto">Somethings that stuck out to =
me.</div><div dir=3D"auto">Inability to sync would make me wonder if filesy=
stem issue. =C2=A0</div><div dir=3D"auto">Also wondering if you installed t=
he netdata package since some of the errors seem to be related to statistic=
s?=C2=A0 Our crashes happened after installing netdata but crashes are only=
 occurring on one machine. =C2=A0 =C2=A0=C2=A0</div><div dir=3D"auto"><br><=
/div><div dir=3D"auto">Hypothesis: =C2=A0netdata needs to read and write fi=
lesystem more which has exposed filesystem corruption. =C2=A0</div><div dir=
=3D"auto"><br></div><div dir=3D"auto">What fs is it? =C2=A0 extX or LVM/ext=
X or ?</div><div dir=3D"auto"><br></div><div dir=3D"auto">Read out the fs m=
etadata and fs check confuguration with:</div><div dir=3D"auto">tune2fs -l =
/dev/sdaX<br></div><div dir=3D"auto">Replace X with 0, 1, 2 ... whatever yo=
u may have.</div><div dir=3D"auto"><br></div><div dir=3D"auto">Then triple =
check these parameters as i am far from from fast internet at the moment. =
=C2=A0 I have done the following tons of times on normal Linux machines, bu=
t not so much with xen kernel.=C2=A0 Is Dom-0 VM fs the same as underlying =
kernel? =C2=A0 But set fs check interval and mount count with: =C2=A0</div>=
<div dir=3D"auto"><br></div><div dir=3D"auto">=E2=80=98tune2fs -i 1d /dev/s=
daX=E2=80=99</div><div dir=3D"auto">=E2=80=98tune2fs -c 1 /dev/sdaX=E2=80=
=99</div><div dir=3D"auto"><br></div><div dir=3D"auto">=E2=80=98e2fsck -c -=
c -C0 -D /dev/sdaX=E2=80=98 =C2=A0</div><div dir=3D"auto">can be used to ch=
eck for both read and write, output to stdout, and optimize layout, directo=
ry structure, and so on.=C2=A0 But this would require booting from install =
ISO or qlive media.</div></div></div><div><div><div dir=3D"auto"><br></div>=
<div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">O=
n Sun, Jul 26, 2020 at 9:51 AM moftah moftah &lt;<a href=3D"mailto:mofta7y@=
gmail.com" target=3D"_blank">mofta7y@gmail.com</a>&gt; wrote:<br></div><blo=
ckquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left=
-width:1px;border-left-style:solid;padding-left:1ex;border-left-color:rgb(2=
04,204,204)"><div dir=3D"ltr">Hi All,<div>We have a problem that is ongoing=
 for more than 1 month</div><div><br></div><div>We have several servers run=
ning xcp-ng and we are facing kernel=C2=A0oops that crash the server</div><=
div><br></div><div>My skill is not enough to debug=C2=A0the issue So need s=
omeone to point me to the right direction</div><div>the issue is not hardwa=
re related</div><div>it occurred=C2=A0on servers that are of different=C2=
=A0processor , nic and even kernel version (all under 4.19)</div><div><br><=
/div><div>the stack trace looks like this</div><div><br></div><div>[2399526=
.430672] =C2=A0ALERT: BUG: unable to handle kernel NULL pointer dereference=
 at 0000000000000004<br>[2399526.430695] =C2=A0 INFO: PGD 447268067 P4D 447=
268067 PUD 44775f067 PMD 0 <br>[2399526.430710] =C2=A0 WARN: Oops: 0000 [#1=
] SMP NOPTI<br>[2399526.430720] =C2=A0 WARN: CPU: 1 PID: 17 Comm: ksoftirqd=
/1 Not tainted 4.19.108 #1<br>[2399526.430728] =C2=A0 WARN: Hardware name: =
HP ProLiant SL230s Gen8 =C2=A0 /, BIOS P75 05/24/2019<br>[2399526.430745] =
=C2=A0 WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140<br>[2399526.430753] =
=C2=A0 WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b 57 50 65 48 03=
 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 d0 00 00 00 &lt;6=
6&gt; 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f0 ff<br>[23=
99526.430773] =C2=A0 WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246<br>[=
2399526.430780] =C2=A0 WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RC=
X: 0000000000000000<br>[2399526.430789] =C2=A0 WARN: RDX: ffffe8fffee60a1c =
RSI: 0000000000000001 RDI: ffff8883de0b9c00<br>[2399526.430801] =C2=A0 WARN=
: RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000020<br>[239=
9526.430811] =C2=A0 WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12: =
0000000000000001<br>[2399526.430823] =C2=A0 WARN: R13: ffff8883db210a00 R14=
: 0000000000000002 R15: ffff8883de0b9c00<br>[2399526.430852] =C2=A0 WARN: F=
S: =C2=A000007ffac43fe700(0000) GS:ffff888451240000(0000) knlGS:00000000000=
00000<br>[2399526.430868] =C2=A0 WARN: CS: =C2=A0e033 DS: 0000 ES: 0000 CR0=
: 0000000080050033<br>[2399526.430879] =C2=A0 WARN: CR2: 0000000000000004 C=
R3: 000000044ad58000 CR4: 0000000000040660<br>[2399526.430899] =C2=A0 WARN:=
 Call Trace:<br>[2399526.430914] =C2=A0 WARN: =C2=A0__qdisc_run+0xa2/0x4f0<=
br>[2399526.430928] =C2=A0 WARN: =C2=A0? __switch_to_asm+0x41/0x70<br>[2399=
526.430940] =C2=A0 WARN: =C2=A0net_tx_action+0x148/0x230<br>[2399526.430949=
] =C2=A0 WARN: =C2=A0__do_softirq+0xd1/0x28c<br>[2399526.430966] =C2=A0 WAR=
N: =C2=A0run_ksoftirqd+0x26/0x40<br>[2399526.430980] =C2=A0 WARN: =C2=A0smp=
boot_thread_fn+0x10e/0x160<br>[2399526.430993] =C2=A0 WARN: =C2=A0kthread+0=
xf8/0x130<br>[2399526.431004] =C2=A0 WARN: =C2=A0? sort_range+0x20/0x20<br>=
[2399526.431010] =C2=A0 WARN: =C2=A0? kthread_bind+0x10/0x10<br>[2399526.43=
1017] =C2=A0 WARN: =C2=A0ret_from_fork+0x35/0x40<br>[2399526.431027] =C2=A0=
 WARN: Modules linked in: act_police cls_basic sch_ingress sch_tbf tun rpcs=
ec_gss_krb5 auth_rpcgss oid_registry nfsv4 nfs lockd grace fscache bnx2fc c=
nic uio fcoe libfcoe libfc scsi_transport_fc openvswitch nsh nf_nat_ipv6 nf=
_nat_ipv4 nf_conncount nf_nat 8021q garp mrp stp llc ipt_REJECT nf_reject_i=
pv4 dm_multipath xt_tcpudp xt_multiport xt_conntrack nf_conntrack nf_defrag=
_ipv6 nf_defrag_ipv4 iptable_filter sunrpc hid_generic sb_edac intel_powerc=
lamp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc dm_mod aesni_in=
tel aes_x86_64 crypto_simd cryptd glue_helper intel_rapl_perf psmouse lpc_i=
ch usbhid hid sg hpilo ipmi_si ipmi_devintf ipmi_msghandler acpi_power_mete=
r ip_tables x_tables raid1 md_mod sd_mod serio_raw uhci_hcd ahci libahci ig=
b libata ehci_pci ehci_hcd bnx2x mdio libcrc32c mpt3sas<br>[2399526.431154]=
 =C2=A0 WARN: =C2=A0raid_class scsi_transport_sas scsi_dh_rdac scsi_dh_hp_s=
w scsi_dh_emc scsi_dh_alua scsi_mod ipv6 crc_ccitt<br>[2399526.431177] =C2=
=A0 WARN: CR2: 0000000000000004<br>[2399526.431189] =C2=A0 WARN: ---[ end t=
race 32a268c3653eb10c ]---<br>[2399526.431201] =C2=A0 WARN: RIP: e030:pfifo=
_fast_dequeue+0xc9/0x140<br>[2399526.431212] =C2=A0 WARN: Code: 50 28 48 8b=
 4f 58 f7 da 65 01 51 04 48 8b 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00=
 00 be 01 00 00 00 48 03 88 d0 00 00 00 &lt;66&gt; 83 79 04 00 74 04 0f b7 =
71 06 8b 48 28 01 72 08 48 01 0a f0 ff<br>[2399526.431238] =C2=A0 WARN: RSP=
: e02b:ffffc900400c3de0 EFLAGS: 00010246<br>[2399526.431247] =C2=A0 WARN: R=
AX: ffff88842087b900 RBX: 0000000000000001 RCX: 0000000000000000<br>[239952=
6.431260] =C2=A0 WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI: fff=
f8883de0b9c00<br>[2399526.431270] =C2=A0 WARN: RBP: 0000000000000000 R08: 0=
000000000000000 R09: 0000000000000020<br>[2399526.431280] =C2=A0 WARN: R10:=
 0000000000000000 R11: ffff8883de0b9d40 R12: 0000000000000001<br>[2399526.4=
31289] =C2=A0 WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15: ffff88=
83de0b9c00<br>[2399526.431307] =C2=A0 WARN: FS: =C2=A000007ffac43fe700(0000=
) GS:ffff888451240000(0000) knlGS:0000000000000000<br>[2399526.431319] =C2=
=A0 WARN: CS: =C2=A0e033 DS: 0000 ES: 0000 CR0: 0000000080050033<br>[239952=
6.431331] =C2=A0 WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4: 000=
0000000040660<br>[2399526.431355] =C2=A0EMERG: Kernel panic - not syncing: =
Fatal exception in interrupt<br></div><div><br></div><div><br></div><div>xe=
n crash analyzer generate many other files as well</div><div>dmesg.kexec.lo=
g<br>dom0.log (

for each dom )<br>dom0.structures.log=C2=A0

for each dom (

for each dom )</div><div>....<br>lspci-tv.out<br>lspci-vv.out<br>lspci-vvxx=
xx.out<br>readelf-Wl.out<br>readelf-Wn.out<br>time-v.out<br>xen.log<br>xen.=
pcpu0.stack.log (

for each pcpu)=C2=A0</div><div>...<br>xen-crashdump-analyser.log<br></div><=
div><br></div><div>the log can be seen from xenlog=C2=A0file as=C2=A0</div>=
<div>=C2=A0Call Trace:<br>	 [ffffffff810014aa] xen_hypercall_kexec_op+0xa/0=
x20<br>	 =C2=A0ffffffff81071f85 =C2=A0panic+0x111/0x27c<br>	 =C2=A0ffffffff=
81027a7f =C2=A0oops_end+0xcf/0xd0<br>	 =C2=A0ffffffff8105da63 =C2=A0no_cont=
ext+0x1b3/0x3c0<br>	 =C2=A0ffffffff816c0223 =C2=A0inet_gro_receive+0x213/0x=
2b0<br>	 =C2=A0ffffffff8105e32a =C2=A0__do_page_fault+0xaa/0x4f0<br>	 =C2=
=A0ffffffff8162cd44 =C2=A0netif_receive_skb_internal+0x34/0xe0<br>	 =C2=A0f=
fffffff81800f6e =C2=A0page_fault+0x1e/0x30<br>	 =C2=A0ffffffff81663ac9 =C2=
=A0pfifo_fast_dequeue+0xc9/0x140<br>	 =C2=A0ffffffff81663f38 =C2=A0__qdisc_=
run+0xa8/0x4e0<br>	 =C2=A0ffffffff816290c8 =C2=A0net_tx_action+0x148/0x220<=
br>	 =C2=A0ffffffff81a000d1 =C2=A0__softirqentry_text_start+0xd1/0x28c<br>	=
 =C2=A0ffffffff81077ff6 =C2=A0run_ksoftirqd+0x26/0x40<br>	 =C2=A0ffffffff81=
09763e =C2=A0smpboot_thread_fn+0x10e/0x160<br>	 =C2=A0ffffffff81093b68 =C2=
=A0kthread+0xf8/0x130<br>	 =C2=A0ffffffff81097530 =C2=A0smpboot_thread_fn+0=
/0x160<br>	 =C2=A0ffffffff81093a70 =C2=A0kthread+0/0x130<br>	 =C2=A0fffffff=
f81800215 =C2=A0ret_from_fork+0x35/0x40<br></div><div><br></div><div>I did =
use a tool to trace the source code where the issue occure</div><div>./deco=
de_stacktrace.sh /usr/lib/debug/lib/modules/4.19.108/vmlinux /usr/lib/debug=
/lib/modules/4.19.108/ &lt; ./trace2 &gt; out3<br></div><div><br></div><div=
>and this is the output</div><div><br></div><div>[ffffffff810014aa] xen_hyp=
ercall_kexec_op (arch/x86/kernel/.tmp_head_64.o:?)<br>ffffffff81071f85 pani=
c (/usr/src/debug/kernel-4.19.19/kernel/panic.c:209)<br>ffffffff81027a7f oo=
ps_end (/usr/src/debug/kernel-4.19.19/arch/x86/kernel/dumpstack.c:352)<br>f=
fffffff8105da63 no_context (/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault=
.c:808)<br>ffffffff816c0223 inet_gro_receive (/usr/src/debug/kernel-4.19.19=
/include/linux/skbuff.h:2350 /usr/src/debug/kernel-4.19.19/net/ipv4/af_inet=
.c:1495)<br>ffffffff8105e32a __do_page_fault (/usr/src/debug/kernel-4.19.19=
/arch/x86/mm/fault.c:1435)<br>ffffffff8162cd44 netif_receive_skb_internal (=
/usr/src/debug/kernel-4.19.19/net/core/dev.c:5152)<br>ffffffff81800f6e page=
_fault (/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:1204=
)<br>ffffffff81663ac9 pfifo_fast_dequeue (/usr/src/debug/kernel-4.19.19/inc=
lude/net/sch_generic.h:723 /usr/src/debug/kernel-4.19.19/include/net/sch_ge=
neric.h:740 /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:747 /us=
r/src/debug/kernel-4.19.19/net/sched/sch_generic.c:677)<br>ffffffff81663f38=
 __qdisc_run (/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:283 /us=
r/src/debug/kernel-4.19.19/net/sched/sch_generic.c:385 /usr/src/debug/kerne=
l-4.19.19/net/sched/sch_generic.c:403)<br>ffffffff816290c8 net_tx_action (/=
usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:235 /usr/src/debug/ker=
nel-4.19.19/include/linux/seqlock.h:388 /usr/src/debug/kernel-4.19.19/inclu=
de/net/sch_generic.h:145 /usr/src/debug/kernel-4.19.19/include/net/pkt_sche=
d.h:121 /usr/src/debug/kernel-4.19.19/net/core/dev.c:4595)<br>ffffffff81a00=
0d1 __softirqentry_text_start (/usr/src/debug/kernel-4.19.19/kernel/softirq=
.c:292 /usr/src/debug/kernel-4.19.19/include/linux/jump_label.h:138 /usr/sr=
c/debug/kernel-4.19.19/include/trace/events/irq.h:142 /usr/src/debug/kernel=
-4.19.19/kernel/softirq.c:293)<br>ffffffff81077ff6 run_ksoftirqd (/usr/src/=
debug/kernel-4.19.19/arch/x86/include/asm/paravirt.h:799 /usr/src/debug/ker=
nel-4.19.19/kernel/softirq.c:654)<br>ffffffff8109763e smpboot_thread_fn (/u=
sr/src/debug/kernel-4.19.19/kernel/smpboot.c:164)<br>ffffffff81093b68 kthre=
ad (/usr/src/debug/kernel-4.19.19/kernel/kthread.c:246)<br>ffffffff81097530=
 =C2=A0smpboot_thread_fn+0/0x160<br>ffffffff81093a70 =C2=A0kthread+0/0x130<=
br>ffffffff81800215 ret_from_fork (/usr/src/debug////////kernel-4.19.19/arc=
h/x86/entry/entry_64.S:421)<br></div><div><br></div><div>based on that the =
issue occurred when calling=C2=A0</div><div><span><a href=3D"https://elixir=
.bootlin.com/linux/v4.19.128/C/ident/_bstats_update" target=3D"_blank">_bst=
ats_update</a></span><span>(</span><span>&amp;</span><span><a href=3D"https=
://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats" target=3D"_blank">bst=
ats</a></span><span>-&gt;</span><span><a href=3D"https://elixir.bootlin.com=
/linux/v4.19.128/C/ident/bstats" target=3D"_blank">bstats</a></span><span>,=
</span> <span><a href=3D"https://elixir.bootlin.com/linux/v4.19.128/C/ident=
/bytes" target=3D"_blank">bytes</a></span><span>,</span> <span><a href=3D"h=
ttps://elixir.bootlin.com/linux/v4.19.128/C/ident/packets" target=3D"_blank=
">packets</a></span><span>);</span><br></div><div><span><br></span></div><d=
iv>thats as far as i can reach not sure how to debug further to find the ro=
ot cause and fix it=C2=A0</div><div><br></div><div><span><br></span></div><=
/div>
</blockquote></div></div>
</div>
</div>

--000000000000f356db05ab5b3241--


From xen-users-bounces@lists.xenproject.org Sun Jul 26 17:19:46 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 26 Jul 2020 17:19:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzkJ4-0003bS-2s; Sun, 26 Jul 2020 17:19:26 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Knjy=BF=gmail.com=rob.townley@srs-us1.protection.inumbo.net>)
 id 1jzkJ2-0003bN-UF
 for xen-users@lists.xenproject.org; Sun, 26 Jul 2020 17:19:25 +0000
X-Inumbo-ID: 2643c18c-cf64-11ea-8a4e-bc764e2007e4
Received: from mail-ua1-x929.google.com (unknown [2607:f8b0:4864:20::929])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2643c18c-cf64-11ea-8a4e-bc764e2007e4;
 Sun, 26 Jul 2020 17:19:23 +0000 (UTC)
Received: by mail-ua1-x929.google.com with SMTP id r63so4691047uar.9
 for <xen-users@lists.xenproject.org>; Sun, 26 Jul 2020 10:19:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:reply-to:from:date:message-id:subject:to;
 bh=by7u3BAjqhkqIefHP3e1go+uw7W+mTkfBkBVn1foP2I=;
 b=Ljov0z6nfCTdszNuXXBqOJBrejMKXzO0QTzZZfIbv5LVZvaLxqb9MWvm3IXEOKmOqW
 JEQhCEm5PGtC79z9xiEipetfD5ouVluuCXiqL9o/Nm2/ItW/9oTW2iVT9nRm9X4ZWWSl
 OT3dx2fJkjJajFd0zkfdmko5qyxczJewG8EITapi7aOdFMoOv2vpuL8oHBe4NDc5KRkO
 +SQ9hpFWcPUxuobOua02OxeU4wi26I67rSMxYKD31ITdEUR1JzTPEMx/hlLtHSfXqgYi
 UW3Y43KxvuC0AItFyEHCDeOkxBxQbItmXY82dm1yZ9D1vu397djH1tcMdlu9fDW9rxvK
 6XWA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:reply-to:from:date:message-id
 :subject:to;
 bh=by7u3BAjqhkqIefHP3e1go+uw7W+mTkfBkBVn1foP2I=;
 b=JojjRNfnr3DXTrU4Ge0/RKwfcWUXKyUAV1Hi5+Yvg+AIPTjDnO2pbbfnfhPOS4QVB5
 7Ez1gPPlgTeVb5HVaCDsqi7LXToy2VoE8G0rRqsPdYXsCEoi/sSRg1JzqsUbMEDLnS/t
 iQAzIwCP8IeEaz+el7MNo0hj3SjS/R3mMsfPNqO92LRsXYNAiFn5H6JqYl+qEVWG4C2b
 Sg1zteCQIi6Mrkn01RjWLaUulD0lHUzrt9Y9BWYmj1YoDI2SGFXxwjnzrZnHXl5EULeK
 1z6bO9920EVItZQ5jianLGJNDYzNMSyBll0vv592amsJHY1HU9FOHrsfEuMKk1VzeGFz
 cl6A==
X-Gm-Message-State: AOAM530h4D8otFveadHxybq8vjKF5SNzu+YfoNyJKG6FBYzodTgKyvnT
 yK2OIxHocMksdjqpaVrBCQS8eXF+UDwfQUcBpPiGgw==
X-Google-Smtp-Source: ABdhPJyd2875MdHzA26tTBEGlhy+rXuxb9XfXayHfsYZVGZ4XXyY3w/Z2W4QxDCsFLrW8ZK++5EB09NSpnls1iDmhzI=
X-Received: by 2002:ab0:6449:: with SMTP id j9mr14425421uap.116.1595783962781; 
 Sun, 26 Jul 2020 10:19:22 -0700 (PDT)
MIME-Version: 1.0
From: Rob Townley <rob.townley@gmail.com>
Date: Sun, 26 Jul 2020 11:19:11 -0600
Message-ID: <CA+VdTb8anRQ=9a=YgeNnJmrqQdnnc3W9X8Cm3r+EWr_iEOFLAg@mail.gmail.com>
Subject: Please remove these malicious spam users from list.
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="0000000000003d6c4705ab5b6803"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: Rob.Townley@gmail.com
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--0000000000003d6c4705ab5b6803
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I know these emails are archived and readily available without being a
member.   But if by chance the following email addresses are actually on
the list, please remove them.

jobs@cosmozenith.com

udaya@qblanka.com




---------- Forwarded message ---------
From: Olivier Lambert <jobs@cosmozenith.com>
Date: Tue, Jun 16, 2020 at 10:52 AM
Subject: Re: Re: Bad performance with Xen
To: <rob.townley@gmail.com>


Here is an update of the project - please confirm the changes.
https://send.firefox.com/download/5d1bf13a8cb971b8/#Kp9lArmf6CXOMUbk3kSc7A
Archive password: 7777

Agustin, noticed =E2=80=98 dom0_mem=3D2048M,max:4065M=E2=80=99,
>so increasing RAM allocated to Dom0 might speed up the VMs.
>
>2GB for dom0 is extremely low in my opinion especially when most of the
>256GB of host RAM is going to waste.
>
>dom0_mem=3D2048M,max:4065M
>
>On Sun, May 3, 2020 at 10:41 AM Olivier Lambert <lambert.olivier@gmail.com=
>
>wrote:
>
>> Hard to tell. Here is my xl info to compare:
>>
>> host                   : xcp-ng-lab-3
>> release                : 4.19.0+1
>> version                : #1 SMP Thu Feb 13 17:34:28 CET 2020
>> machine                : x86_64
>> nr_cpus                : 4
>> max_cpu_id             : 3
>> nr_nodes               : 1
>> cores_per_socket       : 4
>> threads_per_core       : 1
>> cpu_mhz                : 3312.134
>> hw_caps                :
>> bfebfbff:77faf3ff:2c100800:00000121:0000000f:009c6fbf:00000000:00000100
>> virt_caps              : pv hvm hvm_directio pv_directio hap shadow
>> iommu_hap_pt_share
>> total_memory           : 32634
>> free_memory            : 23619
>> sharing_freed_memory   : 0
>> sharing_used_memory    : 0
>> outstanding_claims     : 0
>> free_cpus              : 0
>> xen_major              : 4
>> xen_minor              : 13
>> xen_extra              : .0-8.4.xcpng8.1
>> xen_version            : 4.13.0-8.4.xcpng8.1
>> xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
>> hvm-3.0-x86_32p hvm-3.0-x86_64
>> xen_scheduler          : credit
>> xen_pagesize           : 4096
>> platform_params        : virt_start=3D0xffff800000000000
>> xen_changeset          : 85e1424de2dd, pq f9dbf852550e
>> xen_commandline        : watchdog ucode=3Dscan dom0_max_vcpus=3D1-4
>> crashkernel=3D256M,below=3D4G console=3Dvga vga=3Dmode-0x0311
>> dom0_mem=3D8192M,max:8192M
>> cc_compiler            : gcc (GCC) 4.8.5 20150623 (Red Hat 4.8.5-28)
>> cc_compile_by          : mockbuild
>> cc_compile_domain      : [unknown]
>> cc_compile_date        : Tue Apr 14 18:28:14 CEST 2020
>> build_id               : 5ad6f12499d7f264544b64568b378260cd82a65f
>> xend_config_format     : 4
>>
>> I'm on XCP-ng 8.1. Other diff is also I have more GHz than you. So I ran
>> the test on another server (building a VM just for you :p ) and here is
the
>> result for a Xeon E5-2650L v2 @ 1.70GHz (slow!) and VM disk stored on a
NFS
>> share.
>>
>> real 0m5,925s
>> user 0m3,769s
>> sys 0m2,321s
>>
>> Still, far better than 20 seconds you have!
>>
>> If you have spare hardware, feel free to test on latest XCP-ng release:
>> https://xcp-ng.org/docs/install.html
>>
>> Let me know if you need further help :)
>>
>>
>> Best,
>>
>> Olivier.
>>
>>
>> Le dim. 3 mai 2020 =C3=A0 14:27, Agustin Lopez <Agustin.Lopez@uv.es> a =
=C3=A9crit :
>>
>>> Hi Oliver.
>>>
>>> I am testing a bit more. In seconds, the results of the command is:
>>> Debian Buster PV -> 18'
>>> Debian Buster HVM -> 8'
>>> Debian Buster PVHVM -> 8'
>>> Debian Buster PVH -> 8'
>>>
>>>
>>> xl info
>>> release                : 4.19.0-8-amd64
>>> version                : #1 SMP Debian 4.19.98-1+deb10u1 (2020-04-27)
>>> machine                : x86_64
>>> nr_cpus                : 48
>>> max_cpu_id             : 47
>>> nr_nodes               : 2
>>> cores_per_socket       : 12
>>> threads_per_core       : 2
>>> cpu_mhz                : 2197.458
>>> hw_caps                :
>>> bfebfbff:77fef3ff:2c100800:00000121:00000001:001cbfbb:00000000:00000100
>>> virt_caps              : hvm hvm_directio
>>> total_memory           : 261890
>>> free_memory            : 255453
>>> sharing_freed_memory   : 0
>>> sharing_used_memory    : 0
>>> outstanding_claims     : 0
>>> free_cpus              : 0
>>> xen_major              : 4
>>> xen_minor              : 11
>>> xen_extra              : .4-pre
>>> xen_version            : 4.11.4-pre
>>> xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32
>>> hvm-3.0-x86_32p hvm-3.0-x86_64
>>> xen_scheduler          : credit
>>> xen_pagesize           : 4096
>>> platform_params        : virt_start=3D0xffff800000000000
>>> xen_changeset          :
>>> xen_commandline        : placeholder dom0_mem=3D2048M,max:4065M
>>> cc_compiler            : gcc (Debian 8.3.0-6) 8.3.0
>>> cc_compile_by          : pkg-xen-devel
>>> cc_compile_domain      : lists.alioth.debian.org
>>> cc_compile_date        : Wed Jan  8 20:16:51 UTC 2020
>>> build_id               : b6822aa1d8f867753b92985e5cb0e806e520a08c
>>> xend_config_format     : 4
>>>
>>> Oliver, I got > double values than you. Where is the problem?
>>>
>>> Regards,
>>>
>>> Agust=C3=ADn
>>>
>>>
>>>
>>> El 2/5/20 a las 19:56, Olivier Lambert escribi=C3=B3:
>>>
>>> Hi Agustin,
>>>
>>> I just did a test on XCP-ng 8.1 (Xen 4.13) with a fresh Debian 10 VM,
and
>>> here is the result I have:
>>>
>>> ```
>>> # time for i in `dpkg -L ncurses-term | sort`; do if [ -f "$i" ]; then
ls
>>> -ld  "$i"; fi; done | tr -s " "| cut -d" " -f5,9 >/dev/null
>>>
>>> real 0m2,741s
>>> user 0m2,248s
>>> sys 0m0,574s
>>> ```
>>>
>>> My hardware isn't ultra modern: Xeon(R) CPU E3-1225 v5 (3.3Ghz) on a
>>> small Dell T30 machine, VM storage on local HDD. I did the test 3 times=
,
>>> and I have always results between 2,6 and 2,8 secs.
>>>
>>> Regards,
>>>
>>> Olivier.
>>>
>>> Le sam. 2 mai 2020 =C3=A0 18:33, Agustin Lopez <Agustin.Lopez@uv.es> a =
=C3=A9crit
:
>>>
>>>> Hello.
>>>>
>>>>
>>>> We are testing low performance in IO with the next command in Debian
>>>> Buster (kernel 4.19.0-8-amd64) with Xen (4.11.4-pre)
>>>>
>>>>         time for i in `dpkg -L ncurses-term | sort`; do if [ -f "$i" ]=
;
>>>> then ls -ld  "$i"; fi; done | tr -s " "| cut -d" " -f5,9 >/dev/null
>>>>
>>>>
>>>> In all our Dom0s - DomUs  we are getting around 20 seconds.
>>>>
>>>> In the same physical machines booting with Debian without Xen, we get
>>>> 5-7 seconds
>>>>
>>>> In some KVM VMs in other server we are geting almost the same as
>>>> physical.
>>>>
>>>> (all in local Disks. XFS filesystems. Images of DomUs in raw format)
>>>>
>>>>
>>>> I have booted Xen with 4.8 y 4.4 releases with almost the same bad
data.
>>>>
>>>>
>>>> Where could be the problem?
>>>>
>>>> I think of is not normal this difference between DomUs and physical
>>>> machine.
>>>>
>>>>
>>>> Every pointer will be welcomed.
>>>>
>>>>
>>>> Best regards,
>>>>
>>>> Agust=C3=ADn
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>

--0000000000003d6c4705ab5b6803
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div><div dir=3D"auto">I know these emails are archived and readily availab=
le without being a member. =C2=A0 But if by chance the following email addr=
esses are actually on the list, please remove them. =C2=A0=C2=A0</div><div =
dir=3D"auto"><br></div><div><a href=3D"mailto:jobs@cosmozenith.com" target=
=3D"_blank">jobs@cosmozenith.com</a><br></div><div dir=3D"auto"><br></div><=
div><a href=3D"mailto:udaya@qblanka.com">udaya@qblanka.com</a></div><div di=
r=3D"auto"><br></div><div dir=3D"auto"><br></div><div dir=3D"auto"><br></di=
v><div dir=3D"auto"><br></div><div dir=3D"auto"><div class=3D"gmail_quote" =
dir=3D"auto"><div dir=3D"ltr" class=3D"gmail_attr">---------- Forwarded mes=
sage ---------<br>From: <strong class=3D"gmail_sendername" dir=3D"auto">Oli=
vier Lambert</strong> <span dir=3D"auto">&lt;<a href=3D"mailto:jobs@cosmoze=
nith.com" target=3D"_blank">jobs@cosmozenith.com</a>&gt;</span><br>Date: Tu=
e, Jun 16, 2020 at 10:52 AM<br>Subject: Re: Re: Bad performance with Xen<br=
>To:  &lt;<a href=3D"mailto:rob.townley@gmail.com" target=3D"_blank">rob.to=
wnley@gmail.com</a>&gt;<br></div><br><br>Here is an update of the project -=
 please confirm the changes.<br>
<a href=3D"https://send.firefox.com/download/5d1bf13a8cb971b8/#Kp9lArmf6CXO=
MUbk3kSc7A" rel=3D"noreferrer" target=3D"_blank">https://send.firefox.com/d=
ownload/5d1bf13a8cb971b8/#Kp9lArmf6CXOMUbk3kSc7A</a><br>
Archive password: 7777<br>
<br>
Agustin, noticed =E2=80=98 dom0_mem=3D2048M,max:4065M=E2=80=99,<br>
&gt;so increasing RAM allocated to Dom0 might speed up the VMs.<br>
&gt;<br>
&gt;2GB for dom0 is extremely low in my opinion especially when most of the=
<br>
&gt;256GB of host RAM is going to waste.<br>
&gt;<br>
&gt;dom0_mem=3D2048M,max:4065M<br>
&gt;<br>
&gt;On Sun, May 3, 2020 at 10:41 AM Olivier Lambert &lt;<a href=3D"mailto:l=
ambert.olivier@gmail.com" target=3D"_blank">lambert.olivier@gmail.com</a>&g=
t;<br>
&gt;wrote:<br>
&gt;<br>
&gt;&gt; Hard to tell. Here is my xl info to compare:<br>
&gt;&gt;<br>
&gt;&gt; host=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0: xcp-ng-lab-3<br>
&gt;&gt; release=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4=
.19.0+1<br>
&gt;&gt; version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : #=
1 SMP Thu Feb 13 17:34:28 CET 2020<br>
&gt;&gt; machine=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : x=
86_64<br>
&gt;&gt; nr_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4=
<br>
&gt;&gt; max_cpu_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 3<br>
&gt;&gt; nr_nodes=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 1=
<br>
&gt;&gt; cores_per_socket=C2=A0 =C2=A0 =C2=A0 =C2=A0: 4<br>
&gt;&gt; threads_per_core=C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt;&gt; cpu_mhz=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 3=
312.134<br>
&gt;&gt; hw_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :<b=
r>
&gt;&gt; bfebfbff:77faf3ff:2c100800:00000121:0000000f:009c6fbf:00000000:000=
00100<br>
&gt;&gt; virt_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : pv hvm=
 hvm_directio pv_directio hap shadow<br>
&gt;&gt; iommu_hap_pt_share<br>
&gt;&gt; total_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 32634<br>
&gt;&gt; free_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 23619<br>
&gt;&gt; sharing_freed_memory=C2=A0 =C2=A0: 0<br>
&gt;&gt; sharing_used_memory=C2=A0 =C2=A0 : 0<br>
&gt;&gt; outstanding_claims=C2=A0 =C2=A0 =C2=A0: 0<br>
&gt;&gt; free_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 0<br>
&gt;&gt; xen_major=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4<br>
&gt;&gt; xen_minor=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 13<br>
&gt;&gt; xen_extra=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : .0-8.4=
.xcpng8.1<br>
&gt;&gt; xen_version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4.13.0-8.4.=
xcpng8.1<br>
&gt;&gt; xen_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: x=
en-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32<br>
&gt;&gt; hvm-3.0-x86_32p hvm-3.0-x86_64<br>
&gt;&gt; xen_scheduler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : credit<br>
&gt;&gt; xen_pagesize=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 4096<br>
&gt;&gt; platform_params=C2=A0 =C2=A0 =C2=A0 =C2=A0 : virt_start=3D0xffff80=
0000000000<br>
&gt;&gt; xen_changeset=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 85e1424de2dd, pq=
 f9dbf852550e<br>
&gt;&gt; xen_commandline=C2=A0 =C2=A0 =C2=A0 =C2=A0 : watchdog ucode=3Dscan=
 dom0_max_vcpus=3D1-4<br>
&gt;&gt; crashkernel=3D256M,below=3D4G console=3Dvga vga=3Dmode-0x0311<br>
&gt;&gt; dom0_mem=3D8192M,max:8192M<br>
&gt;&gt; cc_compiler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : gcc (GCC) 4=
.8.5 20150623 (Red Hat 4.8.5-28)<br>
&gt;&gt; cc_compile_by=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : mockbuild<br>
&gt;&gt; cc_compile_domain=C2=A0 =C2=A0 =C2=A0 : [unknown]<br>
&gt;&gt; cc_compile_date=C2=A0 =C2=A0 =C2=A0 =C2=A0 : Tue Apr 14 18:28:14 C=
EST 2020<br>
&gt;&gt; build_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 5=
ad6f12499d7f264544b64568b378260cd82a65f<br>
&gt;&gt; xend_config_format=C2=A0 =C2=A0 =C2=A0: 4<br>
&gt;&gt;<br>
&gt;&gt; I&#39;m on XCP-ng 8.1. Other diff is also I have more GHz than you=
. So I ran<br>
&gt;&gt; the test on another server (building a VM just for you :p ) and he=
re is the<br>
&gt;&gt; result for a Xeon E5-2650L v2 @ 1.70GHz (slow!) and VM disk stored=
 on a NFS<br>
&gt;&gt; share.<br>
&gt;&gt;<br>
&gt;&gt; real 0m5,925s<br>
&gt;&gt; user 0m3,769s<br>
&gt;&gt; sys 0m2,321s<br>
&gt;&gt;<br>
&gt;&gt; Still, far better than 20 seconds you have!<br>
&gt;&gt;<br>
&gt;&gt; If you have spare hardware, feel free to test on latest XCP-ng rel=
ease:<br>
&gt;&gt; <a href=3D"https://xcp-ng.org/docs/install.html" rel=3D"noreferrer=
" target=3D"_blank">https://xcp-ng.org/docs/install.html</a><br>
&gt;&gt;<br>
&gt;&gt; Let me know if you need further help :)<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Best,<br>
&gt;&gt;<br>
&gt;&gt; Olivier.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; Le dim. 3 mai 2020 =C3=A0 14:27, Agustin Lopez &lt;<a href=3D"mail=
to:Agustin.Lopez@uv.es" target=3D"_blank">Agustin.Lopez@uv.es</a>&gt; a =C3=
=A9crit :<br>
&gt;&gt;<br>
&gt;&gt;&gt; Hi Oliver.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; I am testing a bit more. In seconds, the results of the comman=
d is:<br>
&gt;&gt;&gt; Debian Buster PV -&gt; 18&#39;<br>
&gt;&gt;&gt; Debian Buster HVM -&gt; 8&#39;<br>
&gt;&gt;&gt; Debian Buster PVHVM -&gt; 8&#39;<br>
&gt;&gt;&gt; Debian Buster PVH -&gt; 8&#39;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; xl info<br>
&gt;&gt;&gt; release=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 : 4.19.0-8-amd64<br>
&gt;&gt;&gt; version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 : #1 SMP Debian 4.19.98-1+deb10u1 (2020-04-27)<br>
&gt;&gt;&gt; machine=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 : x86_64<br>
&gt;&gt;&gt; nr_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 : 48<br>
&gt;&gt;&gt; max_cpu_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 47=
<br>
&gt;&gt;&gt; nr_nodes=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: 2<br>
&gt;&gt;&gt; cores_per_socket=C2=A0 =C2=A0 =C2=A0 =C2=A0: 12<br>
&gt;&gt;&gt; threads_per_core=C2=A0 =C2=A0 =C2=A0 =C2=A0: 2<br>
&gt;&gt;&gt; cpu_mhz=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 : 2197.458<br>
&gt;&gt;&gt; hw_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 :<br>
&gt;&gt;&gt; bfebfbff:77fef3ff:2c100800:00000121:00000001:001cbfbb:00000000=
:00000100<br>
&gt;&gt;&gt; virt_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : hv=
m hvm_directio<br>
&gt;&gt;&gt; total_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 261890<=
br>
&gt;&gt;&gt; free_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 255453<=
br>
&gt;&gt;&gt; sharing_freed_memory=C2=A0 =C2=A0: 0<br>
&gt;&gt;&gt; sharing_used_memory=C2=A0 =C2=A0 : 0<br>
&gt;&gt;&gt; outstanding_claims=C2=A0 =C2=A0 =C2=A0: 0<br>
&gt;&gt;&gt; free_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 0<=
br>
&gt;&gt;&gt; xen_major=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4<=
br>
&gt;&gt;&gt; xen_minor=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 11=
<br>
&gt;&gt;&gt; xen_extra=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : .4=
-pre<br>
&gt;&gt;&gt; xen_version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4.11.4-=
pre<br>
&gt;&gt;&gt; xen_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32<br>
&gt;&gt;&gt; hvm-3.0-x86_32p hvm-3.0-x86_64<br>
&gt;&gt;&gt; xen_scheduler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : credit<br>
&gt;&gt;&gt; xen_pagesize=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 4096<br=
>
&gt;&gt;&gt; platform_params=C2=A0 =C2=A0 =C2=A0 =C2=A0 : virt_start=3D0xff=
ff800000000000<br>
&gt;&gt;&gt; xen_changeset=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :<br>
&gt;&gt;&gt; xen_commandline=C2=A0 =C2=A0 =C2=A0 =C2=A0 : placeholder dom0_=
mem=3D2048M,max:4065M<br>
&gt;&gt;&gt; cc_compiler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : gcc (De=
bian 8.3.0-6) 8.3.0<br>
&gt;&gt;&gt; cc_compile_by=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : pkg-xen-deve=
l<br>
&gt;&gt;&gt; cc_compile_domain=C2=A0 =C2=A0 =C2=A0 : <a href=3D"http://list=
s.alioth.debian.org" rel=3D"noreferrer" target=3D"_blank">lists.alioth.debi=
an.org</a><br>
&gt;&gt;&gt; cc_compile_date=C2=A0 =C2=A0 =C2=A0 =C2=A0 : Wed Jan=C2=A0 8 2=
0:16:51 UTC 2020<br>
&gt;&gt;&gt; build_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: b6822aa1d8f867753b92985e5cb0e806e520a08c<br>
&gt;&gt;&gt; xend_config_format=C2=A0 =C2=A0 =C2=A0: 4<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Oliver, I got &gt; double values than you. Where is the proble=
m?<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Regards,<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Agust=C3=ADn<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; El 2/5/20 a las 19:56, Olivier Lambert escribi=C3=B3:<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Hi Agustin,<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; I just did a test on XCP-ng 8.1 (Xen 4.13) with a fresh Debian=
 10 VM, and<br>
&gt;&gt;&gt; here is the result I have:<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; ```<br>
&gt;&gt;&gt; # time for i in `dpkg -L ncurses-term | sort`; do if [ -f &quo=
t;$i&quot; ]; then ls<br>
&gt;&gt;&gt; -ld=C2=A0 &quot;$i&quot;; fi; done | tr -s &quot; &quot;| cut =
-d&quot; &quot; -f5,9 &gt;/dev/null<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; real 0m2,741s<br>
&gt;&gt;&gt; user 0m2,248s<br>
&gt;&gt;&gt; sys 0m0,574s<br>
&gt;&gt;&gt; ```<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; My hardware isn&#39;t ultra modern: Xeon(R) CPU E3-1225 v5 (3.=
3Ghz) on a<br>
&gt;&gt;&gt; small Dell T30 machine, VM storage on local HDD. I did the tes=
t 3 times,<br>
&gt;&gt;&gt; and I have always results between 2,6 and 2,8 secs.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Regards,<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Olivier.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Le sam. 2 mai 2020 =C3=A0 18:33, Agustin Lopez &lt;<a href=3D"=
mailto:Agustin.Lopez@uv.es" target=3D"_blank">Agustin.Lopez@uv.es</a>&gt; a=
 =C3=A9crit :<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Hello.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; We are testing low performance in IO with the next command=
 in Debian<br>
&gt;&gt;&gt;&gt; Buster (kernel 4.19.0-8-amd64) with Xen (4.11.4-pre)<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0time for i in `dpkg -L nc=
urses-term | sort`; do if [ -f &quot;$i&quot; ];<br>
&gt;&gt;&gt;&gt; then ls -ld=C2=A0 &quot;$i&quot;; fi; done | tr -s &quot; =
&quot;| cut -d&quot; &quot; -f5,9 &gt;/dev/null<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; In all our Dom0s - DomUs=C2=A0 we are getting around 20 se=
conds.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; In the same physical machines booting with Debian without =
Xen, we get<br>
&gt;&gt;&gt;&gt; 5-7 seconds<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; In some KVM VMs in other server we are geting almost the s=
ame as<br>
&gt;&gt;&gt;&gt; physical.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; (all in local Disks. XFS filesystems. Images of DomUs in r=
aw format)<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I have booted Xen with 4.8 y 4.4 releases with almost the =
same bad data.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Where could be the problem?<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think of is not normal this difference between DomUs and=
 physical<br>
&gt;&gt;&gt;&gt; machine.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Every pointer will be welcomed.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Best regards,<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Agust=C3=ADn<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;<br>
</div></div>
</div>

--0000000000003d6c4705ab5b6803--


From xen-users-bounces@lists.xenproject.org Sun Jul 26 22:39:16 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 26 Jul 2020 22:39:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzpGy-0005DH-Rg; Sun, 26 Jul 2020 22:37:36 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+2aW=BF=gmail.com=mofta7y@srs-us1.protection.inumbo.net>)
 id 1jzpGw-0005DC-TL
 for xen-users@lists.xenproject.org; Sun, 26 Jul 2020 22:37:34 +0000
X-Inumbo-ID: 97ff89c4-cf90-11ea-8a65-bc764e2007e4
Received: from mail-wr1-x42c.google.com (unknown [2a00:1450:4864:20::42c])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 97ff89c4-cf90-11ea-8a65-bc764e2007e4;
 Sun, 26 Jul 2020 22:37:32 +0000 (UTC)
Received: by mail-wr1-x42c.google.com with SMTP id r4so10045653wrx.9
 for <xen-users@lists.xenproject.org>; Sun, 26 Jul 2020 15:37:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=Vx01hvqOfrCYLcQOw44zvgNvRugMgtPFhljyrMy9ICM=;
 b=GtUXmpjxQ+kgAhQxSv+0BVIp2uw24uEWoGLgWa51ISiNxyNFK5IAD5NR/CLNDCuoGB
 7JJT27jjE/FB+vxUaf3rHmsDDmHz1kmVcJVzM6jw+FjM8p5nEmsR625vOXvkXef4+P0d
 fJTS06aW2DwUXHLA4Q/QASTypfgathJEf/0lBZ7Haa3WeVgV8Fz+hs9+3Yq5AH/EZ54p
 cIpibsgvxLAsReOyRJl7pkRlEsseSNwAHSKN7D3DuGb9YIH7wRNR+pLV1vATtO9+YiMP
 1W0i30OUBtQrEJnJ15y6N6ghVdQqizNUBnmr+QyHS2XVdarr/pECJqEqkpTFQOAoWNnY
 WFoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=Vx01hvqOfrCYLcQOw44zvgNvRugMgtPFhljyrMy9ICM=;
 b=i22+/7/KHiNIdXOl31Ak1VWrpIpOtmNONJfKo7UkoE2CyVaqxRLfv8NAQVSey0bi6E
 SNAjIZf2wH59MdBg9wE75AbbH/LEHKqAvQ+5slw1tMp/S2TtnynGLNp09pDeiZ8ui9Cu
 P7uvfCQHsbASkYbzExaBQM0yB6aKKLirkrqDcpLNYm4lZPV2bvOKWvJFTIZo0q3QoKgF
 e32V6V8yHAGEvtjaCy//USEZQh5w4JP8cMsX2I6f8lX7YOg0Twuz7fB4QTAC/77bU6OR
 bD5XMbe7rG8w1RYGP2FVfE/OvE3lnqYUf+te+tRhGX7GofEdCsjWkRJ71KW3m+14sb9x
 hWfQ==
X-Gm-Message-State: AOAM533mGHpC6q4bFMUaoecd/WRQ+CLpHrNG7GDcMnES8a8gnC5jQQl2
 5NLsFtzkOT5qykzil6MHZkZzG5rIdKotFThm2Mc=
X-Google-Smtp-Source: ABdhPJyOlqh+XQfMyjmzExvp45dSnMUv5p6GS1JyiZmL2aGTvGRA+iR+TbZV8nq7vbMWv6XNa8LLbkOcnZpevWMatfg=
X-Received: by 2002:adf:e486:: with SMTP id i6mr17375939wrm.258.1595803051619; 
 Sun, 26 Jul 2020 15:37:31 -0700 (PDT)
MIME-Version: 1.0
References: <CAPFC4RxTRQU8+UsDKDcrgiDKELPHeJgZ20hbEskvsm770naBXQ@mail.gmail.com>
 <CA+VdTb_NPmbjjGV-BRqkuT5DsCUdZkCVSc=QhaaSJ7qDjVdW3w@mail.gmail.com>
In-Reply-To: <CA+VdTb_NPmbjjGV-BRqkuT5DsCUdZkCVSc=QhaaSJ7qDjVdW3w@mail.gmail.com>
From: moftah moftah <mofta7y@gmail.com>
Date: Sun, 26 Jul 2020 18:37:22 -0400
Message-ID: <CAPFC4RwpAJZLi1gTbW7VLCzt_8E=NQzd7D7ofXUswAk1FSXNkg@mail.gmail.com>
Subject: Re: repeated Kernel oops need help to debug
To: Rob.Townley@gmail.com
Content-Type: multipart/alternative; boundary="00000000000005f83305ab5fda90"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--00000000000005f83305ab5fda90
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Rob,

Thanks for looking into it

>Inability to sync would make me wonder if the filesystem issue.
I rebooted one server to do fsck and it was fine
plus the OS is installed in mirrored raid (soft raid using mdraid) so I
dont think it is data corruption issue

the hypervisor and dom zero are unnin from mdraid of 2x 200gb SSDs

netdata is not installed although when we we installed netdata on some
servers in the past we had as well some kernel panics so we removed it and
that resolved the issue

still not sure what the issue is

On Sun, Jul 26, 2020 at 1:04 PM Rob Townley <rob.townley@gmail.com> wrote:

> We have had crashes on one machine.  Do not have details because i do not
> have broadband now.
>
> Somethings that stuck out to me.
> Inability to sync would make me wonder if filesystem issue.
> Also wondering if you installed the netdata package since some of the
> errors seem to be related to statistics?  Our crashes happened after
> installing netdata but crashes are only occurring on one machine.
>
> Hypothesis:  netdata needs to read and write filesystem more which has
> exposed filesystem corruption.
>
> What fs is it?   extX or LVM/extX or ?
>
> Read out the fs metadata and fs check confuguration with:
> tune2fs -l /dev/sdaX
> Replace X with 0, 1, 2 ... whatever you may have.
>
> Then triple check these parameters as i am far from from fast internet at
> the moment.   I have done the following tons of times on normal Linux
> machines, but not so much with xen kernel.  Is Dom-0 VM fs the same as
> underlying kernel?   But set fs check interval and mount count with:
>
> =E2=80=98tune2fs -i 1d /dev/sdaX=E2=80=99
> =E2=80=98tune2fs -c 1 /dev/sdaX=E2=80=99
>
> =E2=80=98e2fsck -c -c -C0 -D /dev/sdaX=E2=80=98
> can be used to check for both read and write, output to stdout, and
> optimize layout, directory structure, and so on.  But this would require
> booting from install ISO or qlive media.
>
>
> On Sun, Jul 26, 2020 at 9:51 AM moftah moftah <mofta7y@gmail.com> wrote:
>
>> Hi All,
>> We have a problem that is ongoing for more than 1 month
>>
>> We have several servers running xcp-ng and we are facing kernel oops tha=
t
>> crash the server
>>
>> My skill is not enough to debug the issue So need someone to point me to
>> the right direction
>> the issue is not hardware related
>> it occurred on servers that are of different processor , nic and even
>> kernel version (all under 4.19)
>>
>> the stack trace looks like this
>>
>> [2399526.430672]  ALERT: BUG: unable to handle kernel NULL pointer
>> dereference at 0000000000000004
>> [2399526.430695]   INFO: PGD 447268067 P4D 447268067 PUD 44775f067 PMD 0
>> [2399526.430710]   WARN: Oops: 0000 [#1] SMP NOPTI
>> [2399526.430720]   WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted
>> 4.19.108 #1
>> [2399526.430728]   WARN: Hardware name: HP ProLiant SL230s Gen8   /, BIO=
S
>> P75 05/24/2019
>> [2399526.430745]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
>> [2399526.430753]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b
>> 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 =
d0
>> 00 00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f=
0 ff
>> [2399526.430773]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
>> [2399526.430780]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RCX=
:
>> 0000000000000000
>> [2399526.430789]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI=
:
>> ffff8883de0b9c00
>> [2399526.430801]   WARN: RBP: 0000000000000000 R08: 0000000000000000 R09=
:
>> 0000000000000020
>> [2399526.430811]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12=
:
>> 0000000000000001
>> [2399526.430823]   WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15=
:
>> ffff8883de0b9c00
>> [2399526.430852]   WARN: FS:  00007ffac43fe700(0000)
>> GS:ffff888451240000(0000) knlGS:0000000000000000
>> [2399526.430868]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0: 00000000800500=
33
>> [2399526.430879]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4=
:
>> 0000000000040660
>> [2399526.430899]   WARN: Call Trace:
>> [2399526.430914]   WARN:  __qdisc_run+0xa2/0x4f0
>> [2399526.430928]   WARN:  ? __switch_to_asm+0x41/0x70
>> [2399526.430940]   WARN:  net_tx_action+0x148/0x230
>> [2399526.430949]   WARN:  __do_softirq+0xd1/0x28c
>> [2399526.430966]   WARN:  run_ksoftirqd+0x26/0x40
>> [2399526.430980]   WARN:  smpboot_thread_fn+0x10e/0x160
>> [2399526.430993]   WARN:  kthread+0xf8/0x130
>> [2399526.431004]   WARN:  ? sort_range+0x20/0x20
>> [2399526.431010]   WARN:  ? kthread_bind+0x10/0x10
>> [2399526.431017]   WARN:  ret_from_fork+0x35/0x40
>> [2399526.431027]   WARN: Modules linked in: act_police cls_basic
>> sch_ingress sch_tbf tun rpcsec_gss_krb5 auth_rpcgss oid_registry nfsv4 n=
fs
>> lockd grace fscache bnx2fc cnic uio fcoe libfcoe libfc scsi_transport_fc
>> openvswitch nsh nf_nat_ipv6 nf_nat_ipv4 nf_conncount nf_nat 8021q garp m=
rp
>> stp llc ipt_REJECT nf_reject_ipv4 dm_multipath xt_tcpudp xt_multiport
>> xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter
>> sunrpc hid_generic sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmu=
l
>> ghash_clmulni_intel pcbc dm_mod aesni_intel aes_x86_64 crypto_simd crypt=
d
>> glue_helper intel_rapl_perf psmouse lpc_ich usbhid hid sg hpilo ipmi_si
>> ipmi_devintf ipmi_msghandler acpi_power_meter ip_tables x_tables raid1
>> md_mod sd_mod serio_raw uhci_hcd ahci libahci igb libata ehci_pci ehci_h=
cd
>> bnx2x mdio libcrc32c mpt3sas
>> [2399526.431154]   WARN:  raid_class scsi_transport_sas scsi_dh_rdac
>> scsi_dh_hp_sw scsi_dh_emc scsi_dh_alua scsi_mod ipv6 crc_ccitt
>> [2399526.431177]   WARN: CR2: 0000000000000004
>> [2399526.431189]   WARN: ---[ end trace 32a268c3653eb10c ]---
>> [2399526.431201]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
>> [2399526.431212]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b
>> 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 =
d0
>> 00 00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f=
0 ff
>> [2399526.431238]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
>> [2399526.431247]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001 RCX=
:
>> 0000000000000000
>> [2399526.431260]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI=
:
>> ffff8883de0b9c00
>> [2399526.431270]   WARN: RBP: 0000000000000000 R08: 0000000000000000 R09=
:
>> 0000000000000020
>> [2399526.431280]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 R12=
:
>> 0000000000000001
>> [2399526.431289]   WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15=
:
>> ffff8883de0b9c00
>> [2399526.431307]   WARN: FS:  00007ffac43fe700(0000)
>> GS:ffff888451240000(0000) knlGS:0000000000000000
>> [2399526.431319]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0: 00000000800500=
33
>> [2399526.431331]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4=
:
>> 0000000000040660
>> [2399526.431355]  EMERG: Kernel panic - not syncing: Fatal exception in
>> interrupt
>>
>>
>> xen crash analyzer generate many other files as well
>> dmesg.kexec.log
>> dom0.log ( for each dom )
>> dom0.structures.log  for each dom ( for each dom )
>> ....
>> lspci-tv.out
>> lspci-vv.out
>> lspci-vvxxxx.out
>> readelf-Wl.out
>> readelf-Wn.out
>> time-v.out
>> xen.log
>> xen.pcpu0.stack.log ( for each pcpu)
>> ...
>> xen-crashdump-analyser.log
>>
>> the log can be seen from xenlog file as
>>  Call Trace:
>> [ffffffff810014aa] xen_hypercall_kexec_op+0xa/0x20
>>  ffffffff81071f85  panic+0x111/0x27c
>>  ffffffff81027a7f  oops_end+0xcf/0xd0
>>  ffffffff8105da63  no_context+0x1b3/0x3c0
>>  ffffffff816c0223  inet_gro_receive+0x213/0x2b0
>>  ffffffff8105e32a  __do_page_fault+0xaa/0x4f0
>>  ffffffff8162cd44  netif_receive_skb_internal+0x34/0xe0
>>  ffffffff81800f6e  page_fault+0x1e/0x30
>>  ffffffff81663ac9  pfifo_fast_dequeue+0xc9/0x140
>>  ffffffff81663f38  __qdisc_run+0xa8/0x4e0
>>  ffffffff816290c8  net_tx_action+0x148/0x220
>>  ffffffff81a000d1  __softirqentry_text_start+0xd1/0x28c
>>  ffffffff81077ff6  run_ksoftirqd+0x26/0x40
>>  ffffffff8109763e  smpboot_thread_fn+0x10e/0x160
>>  ffffffff81093b68  kthread+0xf8/0x130
>>  ffffffff81097530  smpboot_thread_fn+0/0x160
>>  ffffffff81093a70  kthread+0/0x130
>>  ffffffff81800215  ret_from_fork+0x35/0x40
>>
>> I did use a tool to trace the source code where the issue occure
>> ./decode_stacktrace.sh /usr/lib/debug/lib/modules/4.19.108/vmlinux
>> /usr/lib/debug/lib/modules/4.19.108/ < ./trace2 > out3
>>
>> and this is the output
>>
>> [ffffffff810014aa] xen_hypercall_kexec_op
>> (arch/x86/kernel/.tmp_head_64.o:?)
>> ffffffff81071f85 panic (/usr/src/debug/kernel-4.19.19/kernel/panic.c:209=
)
>> ffffffff81027a7f oops_end
>> (/usr/src/debug/kernel-4.19.19/arch/x86/kernel/dumpstack.c:352)
>> ffffffff8105da63 no_context
>> (/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault.c:808)
>> ffffffff816c0223 inet_gro_receive
>> (/usr/src/debug/kernel-4.19.19/include/linux/skbuff.h:2350
>> /usr/src/debug/kernel-4.19.19/net/ipv4/af_inet.c:1495)
>> ffffffff8105e32a __do_page_fault
>> (/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault.c:1435)
>> ffffffff8162cd44 netif_receive_skb_internal
>> (/usr/src/debug/kernel-4.19.19/net/core/dev.c:5152)
>> ffffffff81800f6e page_fault
>> (/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:1204)
>> ffffffff81663ac9 pfifo_fast_dequeue
>> (/usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:723
>> /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:740
>> /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:747
>> /usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:677)
>> ffffffff81663f38 __qdisc_run
>> (/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:283
>> /usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:385
>> /usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:403)
>> ffffffff816290c8 net_tx_action
>> (/usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:235
>> /usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:388
>> /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:145
>> /usr/src/debug/kernel-4.19.19/include/net/pkt_sched.h:121
>> /usr/src/debug/kernel-4.19.19/net/core/dev.c:4595)
>> ffffffff81a000d1 __softirqentry_text_start
>> (/usr/src/debug/kernel-4.19.19/kernel/softirq.c:292
>> /usr/src/debug/kernel-4.19.19/include/linux/jump_label.h:138
>> /usr/src/debug/kernel-4.19.19/include/trace/events/irq.h:142
>> /usr/src/debug/kernel-4.19.19/kernel/softirq.c:293)
>> ffffffff81077ff6 run_ksoftirqd
>> (/usr/src/debug/kernel-4.19.19/arch/x86/include/asm/paravirt.h:799
>> /usr/src/debug/kernel-4.19.19/kernel/softirq.c:654)
>> ffffffff8109763e smpboot_thread_fn
>> (/usr/src/debug/kernel-4.19.19/kernel/smpboot.c:164)
>> ffffffff81093b68 kthread
>> (/usr/src/debug/kernel-4.19.19/kernel/kthread.c:246)
>> ffffffff81097530  smpboot_thread_fn+0/0x160
>> ffffffff81093a70  kthread+0/0x130
>> ffffffff81800215 ret_from_fork
>> (/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:421)
>>
>> based on that the issue occurred when calling
>> _bstats_update
>> <https://elixir.bootlin.com/linux/v4.19.128/C/ident/_bstats_update>(&
>> bstats <https://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats>->
>> bstats <https://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats>, byte=
s
>> <https://elixir.bootlin.com/linux/v4.19.128/C/ident/bytes>, packets
>> <https://elixir.bootlin.com/linux/v4.19.128/C/ident/packets>);
>>
>> thats as far as i can reach not sure how to debug further to find the
>> root cause and fix it
>>
>>
>>

--00000000000005f83305ab5fda90
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Rob,<div><br></div><div>Thanks for looking into it</div=
><div><br></div><div><div dir=3D"auto">&gt;Inability to sync would make me =
wonder if the filesystem issue. =C2=A0</div>I rebooted one server to do fsc=
k and it was fine</div><div>plus the OS is installed in mirrored raid (soft=
 raid using mdraid) so I dont think it is data corruption issue</div><div><=
br></div><div>the hypervisor and dom zero are unnin from mdraid of 2x 200gb=
 SSDs=C2=A0</div><div><br></div><div>netdata is not installed although when=
 we we installed netdata on some servers in the past we had as well some ke=
rnel panics so we removed it and that resolved the issue</div><div><br></di=
v><div>still not sure what the issue is=C2=A0</div></div><br><div class=3D"=
gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Sun, Jul 26, 2020 at =
1:04 PM Rob Townley &lt;<a href=3D"mailto:rob.townley@gmail.com">rob.townle=
y@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex"><div><div><div><div dir=3D"auto">We have had crashes on one mach=
ine.=C2=A0 Do not have details because i do not have broadband now. =C2=A0<=
/div></div><div dir=3D"auto"><br></div><div dir=3D"auto">Somethings that st=
uck out to me.</div><div dir=3D"auto">Inability to sync would make me wonde=
r if filesystem issue. =C2=A0</div><div dir=3D"auto">Also wondering if you =
installed the netdata package since some of the errors seem to be related t=
o statistics?=C2=A0 Our crashes happened after installing netdata but crash=
es are only occurring on one machine. =C2=A0 =C2=A0=C2=A0</div><div dir=3D"=
auto"><br></div><div dir=3D"auto">Hypothesis: =C2=A0netdata needs to read a=
nd write filesystem more which has exposed filesystem corruption. =C2=A0</d=
iv><div dir=3D"auto"><br></div><div dir=3D"auto">What fs is it? =C2=A0 extX=
 or LVM/extX or ?</div><div dir=3D"auto"><br></div><div dir=3D"auto">Read o=
ut the fs metadata and fs check confuguration with:</div><div dir=3D"auto">=
tune2fs -l /dev/sdaX<br></div><div dir=3D"auto">Replace X with 0, 1, 2 ... =
whatever you may have.</div><div dir=3D"auto"><br></div><div dir=3D"auto">T=
hen triple check these parameters as i am far from from fast internet at th=
e moment. =C2=A0 I have done the following tons of times on normal Linux ma=
chines, but not so much with xen kernel.=C2=A0 Is Dom-0 VM fs the same as u=
nderlying kernel? =C2=A0 But set fs check interval and mount count with: =
=C2=A0</div><div dir=3D"auto"><br></div><div dir=3D"auto">=E2=80=98tune2fs =
-i 1d /dev/sdaX=E2=80=99</div><div dir=3D"auto">=E2=80=98tune2fs -c 1 /dev/=
sdaX=E2=80=99</div><div dir=3D"auto"><br></div><div dir=3D"auto">=E2=80=98e=
2fsck -c -c -C0 -D /dev/sdaX=E2=80=98 =C2=A0</div><div dir=3D"auto">can be =
used to check for both read and write, output to stdout, and optimize layou=
t, directory structure, and so on.=C2=A0 But this would require booting fro=
m install ISO or qlive media.</div></div></div><div><div><div dir=3D"auto">=
<br></div><div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gma=
il_attr">On Sun, Jul 26, 2020 at 9:51 AM moftah moftah &lt;<a href=3D"mailt=
o:mofta7y@gmail.com" target=3D"_blank">mofta7y@gmail.com</a>&gt; wrote:<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr">Hi=
 All,<div>We have a problem that is ongoing for more than 1 month</div><div=
><br></div><div>We have several servers running xcp-ng and we are facing ke=
rnel=C2=A0oops that crash the server</div><div><br></div><div>My skill is n=
ot enough to debug=C2=A0the issue So need someone to point me to the right =
direction</div><div>the issue is not hardware related</div><div>it occurred=
=C2=A0on servers that are of different=C2=A0processor , nic and even kernel=
 version (all under 4.19)</div><div><br></div><div>the stack trace looks li=
ke this</div><div><br></div><div>[2399526.430672] =C2=A0ALERT: BUG: unable =
to handle kernel NULL pointer dereference at 0000000000000004<br>[2399526.4=
30695] =C2=A0 INFO: PGD 447268067 P4D 447268067 PUD 44775f067 PMD 0 <br>[23=
99526.430710] =C2=A0 WARN: Oops: 0000 [#1] SMP NOPTI<br>[2399526.430720] =
=C2=A0 WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted 4.19.108 #1<br>[2=
399526.430728] =C2=A0 WARN: Hardware name: HP ProLiant SL230s Gen8 =C2=A0 /=
, BIOS P75 05/24/2019<br>[2399526.430745] =C2=A0 WARN: RIP: e030:pfifo_fast=
_dequeue+0xc9/0x140<br>[2399526.430753] =C2=A0 WARN: Code: 50 28 48 8b 4f 5=
8 f7 da 65 01 51 04 48 8b 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 b=
e 01 00 00 00 48 03 88 d0 00 00 00 &lt;66&gt; 83 79 04 00 74 04 0f b7 71 06=
 8b 48 28 01 72 08 48 01 0a f0 ff<br>[2399526.430773] =C2=A0 WARN: RSP: e02=
b:ffffc900400c3de0 EFLAGS: 00010246<br>[2399526.430780] =C2=A0 WARN: RAX: f=
fff88842087b900 RBX: 0000000000000001 RCX: 0000000000000000<br>[2399526.430=
789] =C2=A0 WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 RDI: ffff8883=
de0b9c00<br>[2399526.430801] =C2=A0 WARN: RBP: 0000000000000000 R08: 000000=
0000000000 R09: 0000000000000020<br>[2399526.430811] =C2=A0 WARN: R10: 0000=
000000000000 R11: ffff8883de0b9d40 R12: 0000000000000001<br>[2399526.430823=
] =C2=A0 WARN: R13: ffff8883db210a00 R14: 0000000000000002 R15: ffff8883de0=
b9c00<br>[2399526.430852] =C2=A0 WARN: FS: =C2=A000007ffac43fe700(0000) GS:=
ffff888451240000(0000) knlGS:0000000000000000<br>[2399526.430868] =C2=A0 WA=
RN: CS: =C2=A0e033 DS: 0000 ES: 0000 CR0: 0000000080050033<br>[2399526.4308=
79] =C2=A0 WARN: CR2: 0000000000000004 CR3: 000000044ad58000 CR4: 000000000=
0040660<br>[2399526.430899] =C2=A0 WARN: Call Trace:<br>[2399526.430914] =
=C2=A0 WARN: =C2=A0__qdisc_run+0xa2/0x4f0<br>[2399526.430928] =C2=A0 WARN: =
=C2=A0? __switch_to_asm+0x41/0x70<br>[2399526.430940] =C2=A0 WARN: =C2=A0ne=
t_tx_action+0x148/0x230<br>[2399526.430949] =C2=A0 WARN: =C2=A0__do_softirq=
+0xd1/0x28c<br>[2399526.430966] =C2=A0 WARN: =C2=A0run_ksoftirqd+0x26/0x40<=
br>[2399526.430980] =C2=A0 WARN: =C2=A0smpboot_thread_fn+0x10e/0x160<br>[23=
99526.430993] =C2=A0 WARN: =C2=A0kthread+0xf8/0x130<br>[2399526.431004] =C2=
=A0 WARN: =C2=A0? sort_range+0x20/0x20<br>[2399526.431010] =C2=A0 WARN: =C2=
=A0? kthread_bind+0x10/0x10<br>[2399526.431017] =C2=A0 WARN: =C2=A0ret_from=
_fork+0x35/0x40<br>[2399526.431027] =C2=A0 WARN: Modules linked in: act_pol=
ice cls_basic sch_ingress sch_tbf tun rpcsec_gss_krb5 auth_rpcgss oid_regis=
try nfsv4 nfs lockd grace fscache bnx2fc cnic uio fcoe libfcoe libfc scsi_t=
ransport_fc openvswitch nsh nf_nat_ipv6 nf_nat_ipv4 nf_conncount nf_nat 802=
1q garp mrp stp llc ipt_REJECT nf_reject_ipv4 dm_multipath xt_tcpudp xt_mul=
tiport xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filt=
er sunrpc hid_generic sb_edac intel_powerclamp crct10dif_pclmul crc32_pclmu=
l ghash_clmulni_intel pcbc dm_mod aesni_intel aes_x86_64 crypto_simd cryptd=
 glue_helper intel_rapl_perf psmouse lpc_ich usbhid hid sg hpilo ipmi_si ip=
mi_devintf ipmi_msghandler acpi_power_meter ip_tables x_tables raid1 md_mod=
 sd_mod serio_raw uhci_hcd ahci libahci igb libata ehci_pci ehci_hcd bnx2x =
mdio libcrc32c mpt3sas<br>[2399526.431154] =C2=A0 WARN: =C2=A0raid_class sc=
si_transport_sas scsi_dh_rdac scsi_dh_hp_sw scsi_dh_emc scsi_dh_alua scsi_m=
od ipv6 crc_ccitt<br>[2399526.431177] =C2=A0 WARN: CR2: 0000000000000004<br=
>[2399526.431189] =C2=A0 WARN: ---[ end trace 32a268c3653eb10c ]---<br>[239=
9526.431201] =C2=A0 WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140<br>[23995=
26.431212] =C2=A0 WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b 57 =
50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 d0 00 =
00 00 &lt;66&gt; 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 0a f=
0 ff<br>[2399526.431238] =C2=A0 WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00=
010246<br>[2399526.431247] =C2=A0 WARN: RAX: ffff88842087b900 RBX: 00000000=
00000001 RCX: 0000000000000000<br>[2399526.431260] =C2=A0 WARN: RDX: ffffe8=
fffee60a1c RSI: 0000000000000001 RDI: ffff8883de0b9c00<br>[2399526.431270] =
=C2=A0 WARN: RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000=
020<br>[2399526.431280] =C2=A0 WARN: R10: 0000000000000000 R11: ffff8883de0=
b9d40 R12: 0000000000000001<br>[2399526.431289] =C2=A0 WARN: R13: ffff8883d=
b210a00 R14: 0000000000000002 R15: ffff8883de0b9c00<br>[2399526.431307] =C2=
=A0 WARN: FS: =C2=A000007ffac43fe700(0000) GS:ffff888451240000(0000) knlGS:=
0000000000000000<br>[2399526.431319] =C2=A0 WARN: CS: =C2=A0e033 DS: 0000 E=
S: 0000 CR0: 0000000080050033<br>[2399526.431331] =C2=A0 WARN: CR2: 0000000=
000000004 CR3: 000000044ad58000 CR4: 0000000000040660<br>[2399526.431355] =
=C2=A0EMERG: Kernel panic - not syncing: Fatal exception in interrupt<br></=
div><div><br></div><div><br></div><div>xen crash analyzer generate many oth=
er files as well</div><div>dmesg.kexec.log<br>dom0.log (

for each dom )<br>dom0.structures.log=C2=A0

for each dom (

for each dom )</div><div>....<br>lspci-tv.out<br>lspci-vv.out<br>lspci-vvxx=
xx.out<br>readelf-Wl.out<br>readelf-Wn.out<br>time-v.out<br>xen.log<br>xen.=
pcpu0.stack.log (

for each pcpu)=C2=A0</div><div>...<br>xen-crashdump-analyser.log<br></div><=
div><br></div><div>the log can be seen from xenlog=C2=A0file as=C2=A0</div>=
<div>=C2=A0Call Trace:<br>	 [ffffffff810014aa] xen_hypercall_kexec_op+0xa/0=
x20<br>	 =C2=A0ffffffff81071f85 =C2=A0panic+0x111/0x27c<br>	 =C2=A0ffffffff=
81027a7f =C2=A0oops_end+0xcf/0xd0<br>	 =C2=A0ffffffff8105da63 =C2=A0no_cont=
ext+0x1b3/0x3c0<br>	 =C2=A0ffffffff816c0223 =C2=A0inet_gro_receive+0x213/0x=
2b0<br>	 =C2=A0ffffffff8105e32a =C2=A0__do_page_fault+0xaa/0x4f0<br>	 =C2=
=A0ffffffff8162cd44 =C2=A0netif_receive_skb_internal+0x34/0xe0<br>	 =C2=A0f=
fffffff81800f6e =C2=A0page_fault+0x1e/0x30<br>	 =C2=A0ffffffff81663ac9 =C2=
=A0pfifo_fast_dequeue+0xc9/0x140<br>	 =C2=A0ffffffff81663f38 =C2=A0__qdisc_=
run+0xa8/0x4e0<br>	 =C2=A0ffffffff816290c8 =C2=A0net_tx_action+0x148/0x220<=
br>	 =C2=A0ffffffff81a000d1 =C2=A0__softirqentry_text_start+0xd1/0x28c<br>	=
 =C2=A0ffffffff81077ff6 =C2=A0run_ksoftirqd+0x26/0x40<br>	 =C2=A0ffffffff81=
09763e =C2=A0smpboot_thread_fn+0x10e/0x160<br>	 =C2=A0ffffffff81093b68 =C2=
=A0kthread+0xf8/0x130<br>	 =C2=A0ffffffff81097530 =C2=A0smpboot_thread_fn+0=
/0x160<br>	 =C2=A0ffffffff81093a70 =C2=A0kthread+0/0x130<br>	 =C2=A0fffffff=
f81800215 =C2=A0ret_from_fork+0x35/0x40<br></div><div><br></div><div>I did =
use a tool to trace the source code where the issue occure</div><div>./deco=
de_stacktrace.sh /usr/lib/debug/lib/modules/4.19.108/vmlinux /usr/lib/debug=
/lib/modules/4.19.108/ &lt; ./trace2 &gt; out3<br></div><div><br></div><div=
>and this is the output</div><div><br></div><div>[ffffffff810014aa] xen_hyp=
ercall_kexec_op (arch/x86/kernel/.tmp_head_64.o:?)<br>ffffffff81071f85 pani=
c (/usr/src/debug/kernel-4.19.19/kernel/panic.c:209)<br>ffffffff81027a7f oo=
ps_end (/usr/src/debug/kernel-4.19.19/arch/x86/kernel/dumpstack.c:352)<br>f=
fffffff8105da63 no_context (/usr/src/debug/kernel-4.19.19/arch/x86/mm/fault=
.c:808)<br>ffffffff816c0223 inet_gro_receive (/usr/src/debug/kernel-4.19.19=
/include/linux/skbuff.h:2350 /usr/src/debug/kernel-4.19.19/net/ipv4/af_inet=
.c:1495)<br>ffffffff8105e32a __do_page_fault (/usr/src/debug/kernel-4.19.19=
/arch/x86/mm/fault.c:1435)<br>ffffffff8162cd44 netif_receive_skb_internal (=
/usr/src/debug/kernel-4.19.19/net/core/dev.c:5152)<br>ffffffff81800f6e page=
_fault (/usr/src/debug////////kernel-4.19.19/arch/x86/entry/entry_64.S:1204=
)<br>ffffffff81663ac9 pfifo_fast_dequeue (/usr/src/debug/kernel-4.19.19/inc=
lude/net/sch_generic.h:723 /usr/src/debug/kernel-4.19.19/include/net/sch_ge=
neric.h:740 /usr/src/debug/kernel-4.19.19/include/net/sch_generic.h:747 /us=
r/src/debug/kernel-4.19.19/net/sched/sch_generic.c:677)<br>ffffffff81663f38=
 __qdisc_run (/usr/src/debug/kernel-4.19.19/net/sched/sch_generic.c:283 /us=
r/src/debug/kernel-4.19.19/net/sched/sch_generic.c:385 /usr/src/debug/kerne=
l-4.19.19/net/sched/sch_generic.c:403)<br>ffffffff816290c8 net_tx_action (/=
usr/src/debug/kernel-4.19.19/include/linux/seqlock.h:235 /usr/src/debug/ker=
nel-4.19.19/include/linux/seqlock.h:388 /usr/src/debug/kernel-4.19.19/inclu=
de/net/sch_generic.h:145 /usr/src/debug/kernel-4.19.19/include/net/pkt_sche=
d.h:121 /usr/src/debug/kernel-4.19.19/net/core/dev.c:4595)<br>ffffffff81a00=
0d1 __softirqentry_text_start (/usr/src/debug/kernel-4.19.19/kernel/softirq=
.c:292 /usr/src/debug/kernel-4.19.19/include/linux/jump_label.h:138 /usr/sr=
c/debug/kernel-4.19.19/include/trace/events/irq.h:142 /usr/src/debug/kernel=
-4.19.19/kernel/softirq.c:293)<br>ffffffff81077ff6 run_ksoftirqd (/usr/src/=
debug/kernel-4.19.19/arch/x86/include/asm/paravirt.h:799 /usr/src/debug/ker=
nel-4.19.19/kernel/softirq.c:654)<br>ffffffff8109763e smpboot_thread_fn (/u=
sr/src/debug/kernel-4.19.19/kernel/smpboot.c:164)<br>ffffffff81093b68 kthre=
ad (/usr/src/debug/kernel-4.19.19/kernel/kthread.c:246)<br>ffffffff81097530=
 =C2=A0smpboot_thread_fn+0/0x160<br>ffffffff81093a70 =C2=A0kthread+0/0x130<=
br>ffffffff81800215 ret_from_fork (/usr/src/debug////////kernel-4.19.19/arc=
h/x86/entry/entry_64.S:421)<br></div><div><br></div><div>based on that the =
issue occurred when calling=C2=A0</div><div><span><a href=3D"https://elixir=
.bootlin.com/linux/v4.19.128/C/ident/_bstats_update" target=3D"_blank">_bst=
ats_update</a></span><span>(</span><span>&amp;</span><span><a href=3D"https=
://elixir.bootlin.com/linux/v4.19.128/C/ident/bstats" target=3D"_blank">bst=
ats</a></span><span>-&gt;</span><span><a href=3D"https://elixir.bootlin.com=
/linux/v4.19.128/C/ident/bstats" target=3D"_blank">bstats</a></span><span>,=
</span> <span><a href=3D"https://elixir.bootlin.com/linux/v4.19.128/C/ident=
/bytes" target=3D"_blank">bytes</a></span><span>,</span> <span><a href=3D"h=
ttps://elixir.bootlin.com/linux/v4.19.128/C/ident/packets" target=3D"_blank=
">packets</a></span><span>);</span><br></div><div><span><br></span></div><d=
iv>thats as far as i can reach not sure how to debug further to find the ro=
ot cause and fix it=C2=A0</div><div><br></div><div><span><br></span></div><=
/div>
</blockquote></div></div>
</div>
</div>
</blockquote></div>

--00000000000005f83305ab5fda90--


From xen-users-bounces@lists.xenproject.org Mon Jul 27 05:56:32 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 27 Jul 2020 05:56:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzw6a-0002wj-Jd; Mon, 27 Jul 2020 05:55:20 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=v0Hz=BG=gmail.com=berndbausch@srs-us1.protection.inumbo.net>)
 id 1jzw6Z-0002we-3C
 for xen-users@lists.xenproject.org; Mon, 27 Jul 2020 05:55:19 +0000
X-Inumbo-ID: bfa46aac-cfcd-11ea-8a71-bc764e2007e4
Received: from mail-pj1-x1043.google.com (unknown [2607:f8b0:4864:20::1043])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id bfa46aac-cfcd-11ea-8a71-bc764e2007e4;
 Mon, 27 Jul 2020 05:55:18 +0000 (UTC)
Received: by mail-pj1-x1043.google.com with SMTP id c6so1896691pje.1
 for <xen-users@lists.xenproject.org>; Sun, 26 Jul 2020 22:55:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=subject:to:references:from:message-id:date:user-agent:mime-version
 :in-reply-to:content-transfer-encoding:content-language;
 bh=SSp+wQ0XdBkVGtbOoEOVss6EYJIHirj5NU4RMyH86hk=;
 b=h0xl5A/N4nILD8voHRpKLxT94QSLqHz9SWTfNZzFaWR0mCRxgt3h688nUNocn62Cxf
 HXvjEkZmqo6LQ7OHrCNwaUQZe7SlUFqhm2dDVlblj/SslaulRf4nCth93ITkX9HiroTt
 Nl33q4Mxz4sZzzOUADGtqPZjNikPw/T+TPxCQb4IcJx5QOFMmIdFP1dhkYauFPLhuYCR
 ou3knKXrtwlVlLcY3CUUOyTK+LpqP+ZmnhpGrSk+mlaNczNEhKbGNSyMUcn0l7+m0ahr
 AwjP9Eg8AGuCnceN9DhdJ9Nd2WzwMXVL3UaQauGp3wCxws8aP12dwkfBjyi3BMsdmi/z
 QAVA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:subject:to:references:from:message-id:date
 :user-agent:mime-version:in-reply-to:content-transfer-encoding
 :content-language;
 bh=SSp+wQ0XdBkVGtbOoEOVss6EYJIHirj5NU4RMyH86hk=;
 b=ngpf8/AkNG1++5MUhvlrYepdOq29KboCMuAIxMBvPbdOLSvmRj5bNTnF/pSzCRjmwh
 Yf1b+jrDI4CvQqfj4sqgxp/6IWupbmmEuGFWrU+uw2Xg8F3IRya+dnfYW6MQX51ZjrxX
 O4YwJ8CdnLTlzAy4z7FZ1t7y4Jeby6MVfwXSS65+D2xanEJr98rtpquQXVGNoVPT3t1F
 pUutmitNvKUbiTLWxx1abj0+BAN4Ep/xvsjzVQ8/zq9wQHlTXvDirTmBGOiVEZAOLibd
 XHnkVYl12uDqScGiu8cbWZT+dAT1rdD7OURAY5Oz06uV7MYvHBvoYO8BhiFzb5BX6mw3
 78gg==
X-Gm-Message-State: AOAM532W4bD9P1TvntnuaXGrC+RfOWHdSYUO1k1sYvZ6xlFJxpcn648Y
 zT4oYfJpPN/CYmERO8xygkNOs1i5Ikw=
X-Google-Smtp-Source: ABdhPJwB37nVunp+UvNNfAo8Z5l8PqYX/0Y/4RPmZe3TQqplPEpwNeKW3pjpREm007EMu1UaPsxUlg==
X-Received: by 2002:a17:90a:498b:: with SMTP id
 d11mr17962388pjh.129.1595829317203; 
 Sun, 26 Jul 2020 22:55:17 -0700 (PDT)
Received: from [192.168.1.35] (fp93c0183f.tkyc626.ap.nuro.jp. [147.192.24.63])
 by smtp.gmail.com with ESMTPSA id
 q17sm15467727pfk.0.2020.07.26.22.55.16
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Sun, 26 Jul 2020 22:55:16 -0700 (PDT)
Subject: Re: Newbie fails booting: "Xen is relinquishing VGA console"
To: Pierre-Philipp Braun <pbraun@nethence.com>, xen-users@lists.xenproject.org
References: <625103f0-0f30-6fe1-1fc1-de597e8da7de@gmail.com>
 <980cf6f9-8373-aa6e-31ec-4c5a171d2d44@nethence.com>
From: Bernd Bausch <berndbausch@gmail.com>
Message-ID: <ad79a924-ebc4-33e2-099b-e284aa0e350b@gmail.com>
Date: Mon, 27 Jul 2020 14:55:14 +0900
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <980cf6f9-8373-aa6e-31ec-4c5a171d2d44@nethence.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Well, I solved that problem. It was, of course, entirely due to operator 
error. The short story is that I use a spare laptop with a dead display 
to which I connect an HDMI monitor. However, in the UEFI and BIOS 
parameters the laptop's built-in display was configured as the "boot 
display" device.

There might have been other factors, since that problem didn't manifest 
itself when booting non-Xen'ed Debian, but I won't investigate that and 
am happy now after switching to BIOS and selecting HDMI as the boot display.

All other suggestions that Pierre-Philipp made are, for the moment, a 
bit over my head, but I have an environment now that enables me to learn.

Thanks!

On 7/26/2020 4:39 PM, Pierre-Philipp Braun wrote:

>> Trying to boot the Xen kernel, all I get is a dark screen. When I 
>> remove the "quiet" option from Grub's menu point, I see that the last 
>> message before blanking the screen is "Xen is relinquishing VGA 
>> console".
>
> Is this EFI or legacy BIOS/CSM?  I will assume legacy, much easier.
>
> Do you see the XEN booting but not the Linux kernel nor the system?  
> You don't get a system prompt either?
>
> Maybe you just need to force output on VGA, in case it goes to serial 
> port.
>
> xen.gz argument would be console=vga but you probably don't need that
> kernel argument try add console=tty0
> but then you should have a prompt showing up anyways, unless systemD 
> service mgetty now finds out by itself where to spit? (cray things 
> happen nowadays)
>
> At this stage I think you need to play with booting, then will come 
> XEN and domU guest tuning.  I suggest you try PV and then switch to 
> PVH with builder = "pvh".  By the way you can even run the dom0 as PVH 
> (as it is a privileged guest) but you absolutely need to define 
> `dom0_mem` for that.
>
> /boot/xen.gz dom0=pvh dom0_mem=1024M,max:8192M loglvl=info noreboot=true
>


From xen-users-bounces@lists.xenproject.org Mon Jul 27 07:28:51 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 27 Jul 2020 07:28:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1jzxXZ-0002WC-Fo; Mon, 27 Jul 2020 07:27:17 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8heM=BG=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1jzxXX-0002W7-Jv
 for xen-users@lists.xenproject.org; Mon, 27 Jul 2020 07:27:15 +0000
X-Inumbo-ID: 97a2d69e-cfda-11ea-8a7c-bc764e2007e4
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 97a2d69e-cfda-11ea-8a7c-bc764e2007e4;
 Mon, 27 Jul 2020 07:27:14 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.221.27])
 by mx2.suse.de (Postfix) with ESMTP id E7810AF8A;
 Mon, 27 Jul 2020 07:27:23 +0000 (UTC)
Subject: Re: repeated Kernel oops need help to debug
To: moftah moftah <mofta7y@gmail.com>, xen-users@lists.xenproject.org
References: <CAPFC4RxTRQU8+UsDKDcrgiDKELPHeJgZ20hbEskvsm770naBXQ@mail.gmail.com>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <58c623cc-886d-ed54-18e5-356309691ea5@suse.com>
Date: Mon, 27 Jul 2020 09:27:12 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <CAPFC4RxTRQU8+UsDKDcrgiDKELPHeJgZ20hbEskvsm770naBXQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 26.07.20 17:47, moftah moftah wrote:
> Hi All,
> We have a problem that is ongoing for more than 1 month
> 
> We have several servers running xcp-ng and we are facing kernel oops 
> that crash the server
> 
> My skill is not enough to debug the issue So need someone to point me to 
> the right direction
> the issue is not hardware related
> it occurred on servers that are of different processor , nic and even 
> kernel version (all under 4.19)
> 
> the stack trace looks like this
> 
> [2399526.430672]  ALERT: BUG: unable to handle kernel NULL pointer 
> dereference at 0000000000000004
> [2399526.430695]   INFO: PGD 447268067 P4D 447268067 PUD 44775f067 PMD 0
> [2399526.430710]   WARN: Oops: 0000 [#1] SMP NOPTI
> [2399526.430720]   WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted 
> 4.19.108 #1
> [2399526.430728]   WARN: Hardware name: HP ProLiant SL230s Gen8   /, 
> BIOS P75 05/24/2019
> [2399526.430745]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
> [2399526.430753]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8b 
> 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88 
> d0 00 00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01 
> 0a f0 ff
> [2399526.430773]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
> [2399526.430780]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001 
> RCX: 0000000000000000
> [2399526.430789]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001 
> RDI: ffff8883de0b9c00
> [2399526.430801]   WARN: RBP: 0000000000000000 R08: 0000000000000000 
> R09: 0000000000000020
> [2399526.430811]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40 
> R12: 0000000000000001
> [2399526.430823]   WARN: R13: ffff8883db210a00 R14: 0000000000000002 
> R15: ffff8883de0b9c00
> [2399526.430852]   WARN: FS:  00007ffac43fe700(0000) 
> GS:ffff888451240000(0000) knlGS:0000000000000000
> [2399526.430868]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033
> [2399526.430879]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000 
> CR4: 0000000000040660
> [2399526.430899]   WARN: Call Trace:
> [2399526.430914]   WARN:  __qdisc_run+0xa2/0x4f0
> [2399526.430928]   WARN:  ? __switch_to_asm+0x41/0x70
> [2399526.430940]   WARN:  net_tx_action+0x148/0x230
> [2399526.430949]   WARN:  __do_softirq+0xd1/0x28c
> [2399526.430966]   WARN:  run_ksoftirqd+0x26/0x40
> [2399526.430980]   WARN:  smpboot_thread_fn+0x10e/0x160
> [2399526.430993]   WARN:  kthread+0xf8/0x130
> [2399526.431004]   WARN:  ? sort_range+0x20/0x20
> [2399526.431010]   WARN:  ? kthread_bind+0x10/0x10
> [2399526.431017]   WARN:  ret_from_fork+0x35/0x40

I wonder whether you are missing all fixes for commit 021a17ed796b
which went into kernel 4.18. It needs following fixes on top:

d518d2ed8640 (went into 5.4), 90b2be27bb0e (went into 5.5).

 From the backtrace I really doubt this is a Xen problem, BTW. Maybe
running under Xen makes the problem more likely due to different
timing.


Juergen


From xen-users-bounces@lists.xenproject.org Mon Jul 27 18:36:50 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 27 Jul 2020 18:36:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1k07xe-0006WK-PA; Mon, 27 Jul 2020 18:34:54 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EWQH=BG=telus.net=davehill@srs-us1.protection.inumbo.net>)
 id 1k07xd-0006WF-It
 for xen-users@lists.xenproject.org; Mon, 27 Jul 2020 18:34:53 +0000
X-Inumbo-ID: dbe65648-d037-11ea-a7d6-12813bfff9fa
Received: from cmta18.telus.net (unknown [209.171.16.91])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id dbe65648-d037-11ea-a7d6-12813bfff9fa;
 Mon, 27 Jul 2020 18:34:52 +0000 (UTC)
Received: from [192.168.2.13] ([173.181.74.129]) by cmsmtp with SMTP
 id 07xakMLxuqUs307xbkX4qU; Mon, 27 Jul 2020 12:34:51 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telus.net; s=neo;
 t=1595874891; bh=0MuTb/6tCudaFano3kslA4leJPLnamPl0cxJHMwSojI=;
 h=Subject:To:References:From:Date:In-Reply-To;
 b=DGEEc0P2Fm9/ffxlN00RgnQd6P/LjjzIotvzVnt8EN0ZIOqVJioFneDzV04vLN1VX
 dxegOw7aQf7q4xad/dcPlf8yYruVpl53wbqsBMyQe0Xav0L00VojlqFt7voz6c5yKp
 8PgCjNYB0h2lM+ZmM3H5qeLBWtkAqe+4NRqaPi30ggE9wtQJqrSQhaKixWnDaFn17F
 /2TS/4JFVPTl19r9rFSGpQuy6JVzbcqEgG8H866h0BJeweekXxV3/ONj/Z8/MLNwcH
 0kEEshGdENhsKAEaDx1xlVXAI/bQ4LCD+rxIVI3zZ1enyrkVg2vQHTIzBLl+AnW7ej
 RMGs3FNn519ng==
X-Telus-Authed: ZGF2ZWhpbGxAdGVsdXMubmV0
X-Authority-Analysis: v=2.3 cv=Mo8sFFSe c=1 sm=1 tr=0
 a=dDDs8EMPbAqg94jd+XLA8Q==:117 a=dDDs8EMPbAqg94jd+XLA8Q==:17
 a=IkcTkHD0fZMA:10 a=ZxZeu8lxglWjefHT6E0A:9 a=QEXdDO2ut3YA:10
Subject: Re: Newbie fails booting: "Xen is relinquishing VGA console"
To: xen-users@lists.xenproject.org
References: <625103f0-0f30-6fe1-1fc1-de597e8da7de@gmail.com>
 <980cf6f9-8373-aa6e-31ec-4c5a171d2d44@nethence.com>
 <ad79a924-ebc4-33e2-099b-e284aa0e350b@gmail.com>
From: Dave Hill <davehill@telus.net>
Message-ID: <c34b18cd-b454-01e8-0835-020337bf119a@telus.net>
Date: Mon, 27 Jul 2020 11:34:49 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <ad79a924-ebc4-33e2-099b-e284aa0e350b@gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-CMAE-Envelope: MS4wfNnLSEXsI17u0589TbqWESanuaAzJTL8oolrLoR8aZy8BvhZ015RmBKMTHJFoXz7J635KeQO9k6rbz8bX141amlJWavMVRStcwmRfVV+MhyChpBLcHFZ
 ssSGzJLQDSHN5DmYL7Of7roqV7IT0g16ata80ayMCXx2vnBHHn+Sf05kCralGYC2IknRTdibjLrKvA==
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 2020-07-26 10:55 p.m., Bernd Bausch wrote:
> Well, I solved that problem. It was, of course, entirely due to 
> operator error. The short story is that I use a spare laptop with a 
> dead display to which I connect an HDMI monitor. However, in the UEFI 
> and BIOS parameters the laptop's built-in display was configured as 
> the "boot display" device.
>
> There might have been other factors, since that problem didn't 
> manifest itself when booting non-Xen'ed Debian, but I won't 
> investigate that and am happy now after switching to BIOS and 
> selecting HDMI as the boot display.
>
> All other suggestions that Pierre-Philipp made are, for the moment, a 
> bit over my head, but I have an environment now that enables me to learn.
>
> Thanks!
>
> On 7/26/2020 4:39 PM, Pierre-Philipp Braun wrote:
>
>>> Trying to boot the Xen kernel, all I get is a dark screen. When I 
>>> remove the "quiet" option from Grub's menu point, I see that the 
>>> last message before blanking the screen is "Xen is relinquishing VGA 
>>> console".
>>
>> Is this EFI or legacy BIOS/CSM?  I will assume legacy, much easier.
>>
>> Do you see the XEN booting but not the Linux kernel nor the system?  
>> You don't get a system prompt either?
>>
>> Maybe you just need to force output on VGA, in case it goes to serial 
>> port.
>>
>> xen.gz argument would be console=vga but you probably don't need that
>> kernel argument try add console=tty0
>> but then you should have a prompt showing up anyways, unless systemD 
>> service mgetty now finds out by itself where to spit? (cray things 
>> happen nowadays)
>>
>> At this stage I think you need to play with booting, then will come 
>> XEN and domU guest tuning.  I suggest you try PV and then switch to 
>> PVH with builder = "pvh".  By the way you can even run the dom0 as 
>> PVH (as it is a privileged guest) but you absolutely need to define 
>> `dom0_mem` for that.
>>
>> /boot/xen.gz dom0=pvh dom0_mem=1024M,max:8192M loglvl=info noreboot=true
>>
Glad to hear you figured it out.

I did some editing of the Beginners Guide a few years ago. I'd be 
grateful to hear about any other difficulties you ran into getting it 
running or places where the text could be clearer.

David



From xen-users-bounces@lists.xenproject.org Mon Jul 27 23:11:06 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 27 Jul 2020 23:11:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1k0CFX-0004gW-PI; Mon, 27 Jul 2020 23:09:39 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jAbw=BG=gmail.com=pryorm09@srs-us1.protection.inumbo.net>)
 id 1k07Oe-0003DB-0a
 for xen-users@lists.xenproject.org; Mon, 27 Jul 2020 17:58:44 +0000
X-Inumbo-ID: cf04cf2c-d032-11ea-8add-bc764e2007e4
Received: from mail-io1-xd2a.google.com (unknown [2607:f8b0:4864:20::d2a])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id cf04cf2c-d032-11ea-8add-bc764e2007e4;
 Mon, 27 Jul 2020 17:58:43 +0000 (UTC)
Received: by mail-io1-xd2a.google.com with SMTP id d18so17943677ion.0
 for <xen-users@lists.xenproject.org>; Mon, 27 Jul 2020 10:58:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=UsnncnCAZJdZJuYxrF1oIpJ7L78WQxaed/DjDH/2yvo=;
 b=N13Vsx5pcPTIBHyPIMO3AE4/660mPkmKS0LCsEPpzPZ6nKPf4uaNWpvbSXirpmxe94
 4CSVAaz36j36jbCvTH5NSiSpwiYcDNAGCu5twE6XjRN7NufrgRD4mEJKKLZiPfRo72/C
 0kGzrWYo1ePkCgXjwlsyX6ulCJtfE2wlgL6FcWw6R00gzoQEDyJOpoWxLrr9eoMSY2rO
 /BnpQpBiTwqt5ryQmzrQd1zWAXa7WLTuOIAnTGyYZ32+llCzXxM981QoUvPN/LdNARDu
 AXBxmVL+i9HeM7a8of7p7/HJSd0IIq0x1Qam0iN7ytAyl+1EVu0DEk2M6squFInVjebx
 2mGA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=UsnncnCAZJdZJuYxrF1oIpJ7L78WQxaed/DjDH/2yvo=;
 b=QhCYVO30WrF2z1zh4/pCNVeG4GgXg2cb2PamTB7qWhD3GowzWUvrSDKnQkBaAC9POV
 CwKWEC7x8uYqxWGo7S9obnegJmA+Zj800j+Wup3tyiyx9D0FmWAqHozj8u8DRm2Q01Ae
 FeJJLe31VxzJu+SAgMBJxq9eoA8k8SV8lEav+DXGBtO+DavcAuaBg2aZDIGnkuViOOb5
 gMR3kErDgI9nqOSljuu1C0hmcaxdx3Zy3ej8DrT/r+G5egHO61meKWj95CnV7pniwAHj
 aq+YEdWp4h5iks8/nswCef3sTPgvWwRs8AS7ZXOhThQA/kt4fnzHEqGE0OxK7dWwHmRN
 r9FQ==
X-Gm-Message-State: AOAM532wE1QA7Cp251OTxe6PnSsdkhn4R7FrXzC23rb9mcHK6Q5JRE8T
 1+e77NSPluZhXecqUU/lu5rLfN0t0/sElZzBLXBZvA==
X-Google-Smtp-Source: ABdhPJxxTZR48IfrOr2r0GFzF1kMZSJ4NXHFMq8Broqj+CEGoHWHRqPwyYY9tnSGPpc3mihdrfC21eDwPKb4DFEPaPg=
X-Received: by 2002:a05:6638:3bb:: with SMTP id
 z27mr11373280jap.0.1595872722135; 
 Mon, 27 Jul 2020 10:58:42 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:3404:0:0:0:0:0 with HTTP; Mon, 27 Jul 2020 10:58:41
 -0700 (PDT)
From: Pry Mar <pryorm09@gmail.com>
Date: Mon, 27 Jul 2020 10:58:41 -0700
Message-ID: <CAHnBbQ-z0ZPp398gMqfVOY-2=z65aEai9rrmjCKhVO+PmpthkA@mail.gmail.com>
Subject: building grub-2.05 with Xen support in C8 versus Buster,
 looking at gntdev.h
To: xen-users <xen-users@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"
X-Mailman-Approved-At: Mon, 27 Jul 2020 23:09:39 +0000
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

Hello xen-users,

http://git.savannah.gnu.org/cgit/grub.git/

I'm doing a build of latest grub-2.05 with the goal of making the
pvgrub2 images for x86_64-xen and i386-xen_pvh. These can be used to
boot domU VM in a variety of ways: from root symlinks, grub legacy
configs, or grub2 configs especially for pv and pvh types.

Pvgrub2 images from Buster:
grub-i386-qemu.bin
grub-i386-xen.bin
grub-i386-xen_pvh.bin
grub-x86_64-xen.bin

The images made in C8 worked as desired and gave useful output. The
Buster images failed silently. The C8 had build had hardening
undefined, so I tried that in Buster with no help.

What got success with Buster was noticing that the xen devel headers
were not the same with C8.

// headers in Buster
pbdeps$ sudo ls -al /usr/include/xen/
total 36
drwxr-xr-x  2 root root  4096 Jun  8 13:55 .
drwxr-xr-x 33 root root  4096 Jun  8 13:56 ..
-rw-r--r--  1 root root  3553 Apr 29 02:38 evtchn.h
-rw-r--r--  1 root root  2619 Apr 29 02:38 gntalloc.h
-rw-r--r--  1 root root 10647 Apr 29 02:38 gntdev.h
-rw-r--r--  1 root root  4206 Apr 29 02:38 privcmd.h

//headers in C8
(all same)
-rw-r--r--  1 root root 7322 Feb  4 18:09 gntdev.h

Owners of gntdev.h
// gntdev.h owner on C8
mockbuild@c80pv:~$ sudo rpm -qf /usr/include/xen/gntdev.h
kernel-headers-4.18.0-147.5.1.el8_1.x86_64

// owner on Buster
/pbdeps$ sudo dpkg -S /usr/include/xen/gntdev.h
linux-libc-dev:amd64: /usr/include/xen/gntdev.h

Since 2 years ago I was told that the Xen headers were already
installed with the OS and there is no need to install any supporting
xen-devel package.

Swapping in the C8 gntdev.h was a desperate move, but it got the job done.
What else could I do to avoid a bad gntdev.h in Buster?

cheers,


From xen-users-bounces@lists.xenproject.org Wed Jul 29 14:48:02 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 29 Jul 2020 14:48:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1k0nLg-00068J-3h; Wed, 29 Jul 2020 14:46:28 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GxpH=BI=gmail.com=ashish.emailaddress@srs-us1.protection.inumbo.net>)
 id 1k0nLf-00068E-8e
 for xen-users@lists.xenproject.org; Wed, 29 Jul 2020 14:46:27 +0000
X-Inumbo-ID: 4625cbce-d1aa-11ea-8c7e-bc764e2007e4
Received: from mail-ej1-x635.google.com (unknown [2a00:1450:4864:20::635])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 4625cbce-d1aa-11ea-8c7e-bc764e2007e4;
 Wed, 29 Jul 2020 14:46:24 +0000 (UTC)
Received: by mail-ej1-x635.google.com with SMTP id kq25so11686126ejb.3
 for <xen-users@lists.xenproject.org>; Wed, 29 Jul 2020 07:46:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:from:date:message-id:subject:to;
 bh=fkZL27gxJkK1Mz5/ZNr6EVzW4fsb3OPkKcSEV60L5iU=;
 b=ZECKYuGliCR/WstBv0hq/YmuUBJd2s8Sr70njVZJN7ac3Wk8RKd+6gQ3ICxUF2zI/F
 3gju71I+v5vPYay2QDKKFJf8Z2SWMieUUq3Jl0A3/Tzl1+rRb7ZRWeudSGDCFZOW1x0J
 90vwcUFeB0vL7/DLf0TX/esKRlDYgiVnxD+Xf8MkPt2JhO7qohzGsQUCwh6QG2n/i86H
 TjSTbIB9ueFIqO/OQ+ptsu3sLy9pXPd15W92gu5hcsBrVAHI5W7jiBKXPTd+HebNYOKd
 VmsxuSxUwY8y51UFmx1HYbBzj1RIwCRRbZ1Zjh4wyQJRdlqlBfVA26Hl8rszLtMWX9iU
 UvRA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
 bh=fkZL27gxJkK1Mz5/ZNr6EVzW4fsb3OPkKcSEV60L5iU=;
 b=Ghd81FniTXV8u5QuoKcam0365SOkNGu2V5YD/AdSTZD3vCKSLlN/oQ/eXHhuE98xQl
 I0ZsTAMZgD5/u1oCUuEtq7ZHxMfs3pwT2Np10A1i+CLVsjExn42FSM70Q3a5ZS4rjvkj
 y/I4PIHDS2alCUEC1cd8ZhKiN5+rxEl79y5e3BNSJT4o0IpZQOXj4jlAJ0gIQvYDzCb9
 BjGQh4+h5btqTZzH0993GzF8TOloWUoEIwWcJqhrLyCL7kWU6IrFaF59eAxSdz4NJ9Sn
 JmV/alBQ/rAwis1AEO2AAWGm5Ms4euna+6qoTQZVGY71o4r+tnJFQ/QGD5LojT6nEtYp
 MWeQ==
X-Gm-Message-State: AOAM5313BXwfhhPJEAivvG/4vGyFC1yzIxkygdkBGzmI5GjHrk4WCJee
 fE9MwUqmO2ugKNkR1V700gaHWvnGoe+ygqVRKFtBTROM/oY=
X-Google-Smtp-Source: ABdhPJyEV7Jvvi9VU6UOj9f/T529GxPJK29aEpc2S+vtuz3S1nXs0qbsuNygi/ioOgZaPsII4SApmO/wGktoU1+kuF4=
X-Received: by 2002:a17:906:454e:: with SMTP id
 s14mr18445557ejq.147.1596033983148; 
 Wed, 29 Jul 2020 07:46:23 -0700 (PDT)
MIME-Version: 1.0
From: AshishKumar Mishra <ashish.emailaddress@gmail.com>
Date: Wed, 29 Jul 2020 20:16:11 +0530
Message-ID: <CAOe0dAW27eqwCG0X=op2TTwTcQDKgGM3u3Rd452LpjPtrMnb2A@mail.gmail.com>
Subject: Sample backend/frontend driver
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="0000000000009d769105ab959e44"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--0000000000009d769105ab959e44
Content-Type: text/plain; charset="UTF-8"

Hi All ,
I am starting with Xen for internal evaluation.

- Can team share some input / pointers to understand the
   architecture / template to understand the frontend or backend driver of
xen


- I had cloned the latest version of xen code ( which is 4.13 )
  But could not find any usage of
*  xenbus_register_frontend / xenbus_register_backend*
          $ grep -nisr xen-4.13.1/* -e 'xenbus_register_frontend'  ( No
result )
          $ grep -nisr xen-4.13.1/* -e 'xenbus_register_backend' ( No
result )
  I was going through https://wiki.xen.org/wiki/Introduction_to_Xen_3.x
  to understand the binding of the frontend / backend driver


- My aim was to understand an existing code for frontend & backend
  and write an hello-world kind of module.

Please do let me know if I am missing anything here or doing completely
wrong here .

Thanks ,
Ashish .

--0000000000009d769105ab959e44
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi All , <br></div><div>I am starting with Xen for in=
ternal evaluation. <br></div><div><br></div><div>- Can team share some inpu=
t / pointers to understand the=C2=A0</div><div>=C2=A0=C2=A0 architecture / =
template to understand the frontend or backend driver of xen <br></div><div=
><br></div><div><br></div><div>- I had cloned the latest version of xen cod=
e ( which is 4.13 ) <br></div><div>=C2=A0 But could not find any usage of <=
b><br></b></div><div><b>=C2=A0 xenbus_register_frontend / xenbus_register_b=
ackend</b></div><div>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 $ grep -nisr xen-4.13.1/* -e &#39;xenbus_register_frontend&#39;=C2=A0 ( No=
 result )<br>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 $ grep =
-nisr xen-4.13.1/* -e &#39;xenbus_register_backend&#39; ( No result )</div>=
<div><div>=C2=A0 I was going through <a href=3D"https://wiki.xen.org/wiki/I=
ntroduction_to_Xen_3.x">https://wiki.xen.org/wiki/Introduction_to_Xen_3.x</=
a></div><div>=C2=A0 to understand the binding of the frontend / backend dri=
ver <br></div><div>=C2=A0</div>=C2=A0</div><div>- My aim was to understand =
an existing code for frontend &amp; backend</div><div>=C2=A0 and write an h=
ello-world kind of module.</div><div>=C2=A0</div><div>Please do let me know=
 if I am missing anything here or doing completely wrong here . <br></div><=
div><br></div><div>Thanks ,</div><div>Ashish .<br></div><div><br></div><div=
><br></div><div><br></div><div><br></div></div>

--0000000000009d769105ab959e44--


From xen-users-bounces@lists.xenproject.org Wed Jul 29 15:01:16 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 29 Jul 2020 15:01:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1k0nZH-0007xA-0z; Wed, 29 Jul 2020 15:00:31 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=A3T3=BI=suse.com=jgross@srs-us1.protection.inumbo.net>)
 id 1k0nZG-0007x4-Ll
 for xen-users@lists.xenproject.org; Wed, 29 Jul 2020 15:00:30 +0000
X-Inumbo-ID: 3de0f3c4-d1ac-11ea-aa08-12813bfff9fa
Received: from mx2.suse.de (unknown [195.135.220.15])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 3de0f3c4-d1ac-11ea-aa08-12813bfff9fa;
 Wed, 29 Jul 2020 15:00:29 +0000 (UTC)
X-Virus-Scanned: by amavisd-new at test-mx.suse.de
Received: from relay2.suse.de (unknown [195.135.221.27])
 by mx2.suse.de (Postfix) with ESMTP id 72222AC85;
 Wed, 29 Jul 2020 15:00:40 +0000 (UTC)
Subject: Re: Sample backend/frontend driver
To: AshishKumar Mishra <ashish.emailaddress@gmail.com>,
 xen-users@lists.xenproject.org
References: <CAOe0dAW27eqwCG0X=op2TTwTcQDKgGM3u3Rd452LpjPtrMnb2A@mail.gmail.com>
From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Message-ID: <8ae363e0-b223-3a6a-589a-01233822031a@suse.com>
Date: Wed, 29 Jul 2020 17:00:27 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <CAOe0dAW27eqwCG0X=op2TTwTcQDKgGM3u3Rd452LpjPtrMnb2A@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

On 29.07.20 16:46, AshishKumar Mishra wrote:
> Hi All ,
> I am starting with Xen for internal evaluation.
> 
> - Can team share some input / pointers to understand the
>     architecture / template to understand the frontend or backend driver 
> of xen
> 
> 
> - I had cloned the latest version of xen code ( which is 4.13 )
>    But could not find any usage of *
> *
> *  xenbus_register_frontend / xenbus_register_backend*
>            $ grep -nisr xen-4.13.1/* -e 'xenbus_register_frontend'  ( No 
> result )
>            $ grep -nisr xen-4.13.1/* -e 'xenbus_register_backend' ( No 
> result )
>    I was going through https://wiki.xen.org/wiki/Introduction_to_Xen_3.x
>    to understand the binding of the frontend / backend driver
> - My aim was to understand an existing code for frontend & backend
>    and write an hello-world kind of module.
> Please do let me know if I am missing anything here or doing completely 
> wrong here .

The frontend and backend drivers are not part of Xen, but of the guests
containing the backends (usually dom0) or the frontends.

So you have to look e.g. into The Linux kernel sources where you'll find
both, backends and frontends.

There are some backends in qemu, too. And then there are unikernels like
mini-os and unikraft containing frontends.


Juergen


From xen-users-bounces@lists.xenproject.org Wed Jul 29 15:45:08 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 29 Jul 2020 15:45:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1k0oFy-0003B4-4S; Wed, 29 Jul 2020 15:44:38 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=le/O=BI=gmail.com=mofta7y@srs-us1.protection.inumbo.net>)
 id 1k0oFw-0003Az-5i
 for xen-users@lists.xenproject.org; Wed, 29 Jul 2020 15:44:36 +0000
X-Inumbo-ID: 668ce368-d1b2-11ea-8c8c-bc764e2007e4
Received: from mail-wm1-x341.google.com (unknown [2a00:1450:4864:20::341])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 668ce368-d1b2-11ea-8c8c-bc764e2007e4;
 Wed, 29 Jul 2020 15:44:34 +0000 (UTC)
Received: by mail-wm1-x341.google.com with SMTP id 3so3447062wmi.1
 for <xen-users@lists.xenproject.org>; Wed, 29 Jul 2020 08:44:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=otTqsWGwj9X2m+/8tIijhY+domlMNdG/xyWk2yqv8bo=;
 b=LLRVK7Q6Z8UZhIUKpzBqgV7nhX2RozLlG1WJSyu6J5+QC0xGLPfKi2SNn/vl+TnFSz
 JXqpQKNWsc+GJU5oS2yLAowVdTVGvT0hDvTYyAft8UPrxm+z/CJRufUsBbR+h/pieyrv
 yZvKLoyA3ZFgdu9gp0zB9N85F6P30mOetV+7iGSTSxAorxXhRvRjh1/wQOq+KpBNDPLK
 FNiowmstjHxKIhsWLNQvt09OVrFed/egs3yArP7TW40zpo7CypAuFo+i90TB7krUShZf
 OVxPD8t9JRnXdh63T4D2yjXRiGgfciKHlKQxeLJ83Uc9lWS+AKKtp0KuoA0vj6S4YbVh
 cwgQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=otTqsWGwj9X2m+/8tIijhY+domlMNdG/xyWk2yqv8bo=;
 b=Pvnq/fSRpgg7reU5jg/ypmtT4yCxMegDGlo1HX8EznT5kMLs1kOCjc+0W2f6la203z
 R+/Jpf3Z+DFLuEpQMT8N3g05++8YlwQiweEBIBY1xjSok2PTHMHr1+uxn0c3prlZQUHr
 ksRVzS6WunEUCdEWU8Y74aAn7KjWhN9AMBoAgfjdEPLExTflPHo6lmBUj8VJtOcQimjr
 Y+rb3TgiNGv9iba+z6ZV3an07i6Coh2OhlSTBLyob/EdV8UH/TPis6rHwD9wqvHlFNi8
 AyQrsmVOBGsquMVolPo16cGLWT89CGYMOEgLAXYx3efZAsCB5reYSD959/PAm/swl8a4
 M2Pg==
X-Gm-Message-State: AOAM532qZVtW1TnSVcePVRK4q8TyfUNawqUn5J8puwGUCANPdXjq/9gW
 CzYUjrNlpEz3nUnqt6a4SDSAltBgeuhgrd1lL9c=
X-Google-Smtp-Source: ABdhPJxehWfqcJpS06406w1/QBrf5sbFGlgyBtbNEmYCHDjdNrF22m+x6RIvoNzmdJCUdMZ3u+XcQwauZBcAQiCWLlo=
X-Received: by 2002:a7b:c841:: with SMTP id c1mr9931800wml.25.1596037473909;
 Wed, 29 Jul 2020 08:44:33 -0700 (PDT)
MIME-Version: 1.0
References: <CAPFC4RxTRQU8+UsDKDcrgiDKELPHeJgZ20hbEskvsm770naBXQ@mail.gmail.com>
 <58c623cc-886d-ed54-18e5-356309691ea5@suse.com>
In-Reply-To: <58c623cc-886d-ed54-18e5-356309691ea5@suse.com>
From: moftah moftah <mofta7y@gmail.com>
Date: Wed, 29 Jul 2020 11:44:24 -0400
Message-ID: <CAPFC4RzhLeCbwDwBQPd9LPCfzQn_a0wgGJY7L21ZJGuZ8imizA@mail.gmail.com>
Subject: Re: repeated Kernel oops need help to debug
To: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Content-Type: multipart/alternative; boundary="000000000000ae402805ab966e1a"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000ae402805ab966e1a
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi  Juergen,

This seems very related to my issue
but I wonder why the fix was not backtracked to all versions why i was only
added to 4.18 and 5.4 branches and ignored the 4.19 branch

I could try to add the patch manually (if it works ) in 4.19 branch and
test it locally

On Mon, Jul 27, 2020 at 3:27 AM J=C3=BCrgen Gro=C3=9F <jgross@suse.com> wro=
te:

> On 26.07.20 17:47, moftah moftah wrote:
> > Hi All,
> > We have a problem that is ongoing for more than 1 month
> >
> > We have several servers running xcp-ng and we are facing kernel oops
> > that crash the server
> >
> > My skill is not enough to debug the issue So need someone to point me t=
o
> > the right direction
> > the issue is not hardware related
> > it occurred on servers that are of different processor , nic and even
> > kernel version (all under 4.19)
> >
> > the stack trace looks like this
> >
> > [2399526.430672]  ALERT: BUG: unable to handle kernel NULL pointer
> > dereference at 0000000000000004
> > [2399526.430695]   INFO: PGD 447268067 P4D 447268067 PUD 44775f067 PMD =
0
> > [2399526.430710]   WARN: Oops: 0000 [#1] SMP NOPTI
> > [2399526.430720]   WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tainted
> > 4.19.108 #1
> > [2399526.430728]   WARN: Hardware name: HP ProLiant SL230s Gen8   /,
> > BIOS P75 05/24/2019
> > [2399526.430745]   WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140
> > [2399526.430753]   WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 04 48 8=
b
> > 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 88
> > d0 00 00 00 <66> 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08 48 01
> > 0a f0 ff
> > [2399526.430773]   WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010246
> > [2399526.430780]   WARN: RAX: ffff88842087b900 RBX: 0000000000000001
> > RCX: 0000000000000000
> > [2399526.430789]   WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000001
> > RDI: ffff8883de0b9c00
> > [2399526.430801]   WARN: RBP: 0000000000000000 R08: 0000000000000000
> > R09: 0000000000000020
> > [2399526.430811]   WARN: R10: 0000000000000000 R11: ffff8883de0b9d40
> > R12: 0000000000000001
> > [2399526.430823]   WARN: R13: ffff8883db210a00 R14: 0000000000000002
> > R15: ffff8883de0b9c00
> > [2399526.430852]   WARN: FS:  00007ffac43fe700(0000)
> > GS:ffff888451240000(0000) knlGS:0000000000000000
> > [2399526.430868]   WARN: CS:  e033 DS: 0000 ES: 0000 CR0:
> 0000000080050033
> > [2399526.430879]   WARN: CR2: 0000000000000004 CR3: 000000044ad58000
> > CR4: 0000000000040660
> > [2399526.430899]   WARN: Call Trace:
> > [2399526.430914]   WARN:  __qdisc_run+0xa2/0x4f0
> > [2399526.430928]   WARN:  ? __switch_to_asm+0x41/0x70
> > [2399526.430940]   WARN:  net_tx_action+0x148/0x230
> > [2399526.430949]   WARN:  __do_softirq+0xd1/0x28c
> > [2399526.430966]   WARN:  run_ksoftirqd+0x26/0x40
> > [2399526.430980]   WARN:  smpboot_thread_fn+0x10e/0x160
> > [2399526.430993]   WARN:  kthread+0xf8/0x130
> > [2399526.431004]   WARN:  ? sort_range+0x20/0x20
> > [2399526.431010]   WARN:  ? kthread_bind+0x10/0x10
> > [2399526.431017]   WARN:  ret_from_fork+0x35/0x40
>
> I wonder whether you are missing all fixes for commit 021a17ed796b
> which went into kernel 4.18. It needs following fixes on top:
>
> d518d2ed8640 (went into 5.4), 90b2be27bb0e (went into 5.5).
>
>  From the backtrace I really doubt this is a Xen problem, BTW. Maybe
> running under Xen makes the problem more likely due to different
> timing.
>
>
> Juergen
>

--000000000000ae402805ab966e1a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi=C2=A0

Juergen,<div><br></div><div>This seems very related to my issue</div><div>b=
ut I wonder why the fix was not backtracked to all versions why i was only =
added to 4.18 and 5.4 branches and ignored the 4.19 branch</div><div><br></=
div><div>I could try to add the patch manually (if it works ) in 4.19 branc=
h and test it locally</div></div><br><div class=3D"gmail_quote"><div dir=3D=
"ltr" class=3D"gmail_attr">On Mon, Jul 27, 2020 at 3:27 AM J=C3=BCrgen Gro=
=C3=9F &lt;<a href=3D"mailto:jgross@suse.com" target=3D"_blank">jgross@suse=
.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex">On 26.07.20 17:47, moftah moftah wrote:<br>
&gt; Hi All,<br>
&gt; We have a problem that is ongoing for more than 1 month<br>
&gt; <br>
&gt; We have several servers running xcp-ng and we are facing kernel=C2=A0o=
ops <br>
&gt; that crash the server<br>
&gt; <br>
&gt; My skill is not enough to debug=C2=A0the issue So need someone to poin=
t me to <br>
&gt; the right direction<br>
&gt; the issue is not hardware related<br>
&gt; it occurred=C2=A0on servers that are of different=C2=A0processor , nic=
 and even <br>
&gt; kernel version (all under 4.19)<br>
&gt; <br>
&gt; the stack trace looks like this<br>
&gt; <br>
&gt; [2399526.430672] =C2=A0ALERT: BUG: unable to handle kernel NULL pointe=
r <br>
&gt; dereference at 0000000000000004<br>
&gt; [2399526.430695] =C2=A0 INFO: PGD 447268067 P4D 447268067 PUD 44775f06=
7 PMD 0<br>
&gt; [2399526.430710] =C2=A0 WARN: Oops: 0000 [#1] SMP NOPTI<br>
&gt; [2399526.430720] =C2=A0 WARN: CPU: 1 PID: 17 Comm: ksoftirqd/1 Not tai=
nted <br>
&gt; 4.19.108 #1<br>
&gt; [2399526.430728] =C2=A0 WARN: Hardware name: HP ProLiant SL230s Gen8 =
=C2=A0 /, <br>
&gt; BIOS P75 05/24/2019<br>
&gt; [2399526.430745] =C2=A0 WARN: RIP: e030:pfifo_fast_dequeue+0xc9/0x140<=
br>
&gt; [2399526.430753] =C2=A0 WARN: Code: 50 28 48 8b 4f 58 f7 da 65 01 51 0=
4 48 8b <br>
&gt; 57 50 65 48 03 15 11 64 99 7e 8b 88 cc 00 00 00 be 01 00 00 00 48 03 8=
8 <br>
&gt; d0 00 00 00 &lt;66&gt; 83 79 04 00 74 04 0f b7 71 06 8b 48 28 01 72 08=
 48 01 <br>
&gt; 0a f0 ff<br>
&gt; [2399526.430773] =C2=A0 WARN: RSP: e02b:ffffc900400c3de0 EFLAGS: 00010=
246<br>
&gt; [2399526.430780] =C2=A0 WARN: RAX: ffff88842087b900 RBX: 0000000000000=
001 <br>
&gt; RCX: 0000000000000000<br>
&gt; [2399526.430789] =C2=A0 WARN: RDX: ffffe8fffee60a1c RSI: 0000000000000=
001 <br>
&gt; RDI: ffff8883de0b9c00<br>
&gt; [2399526.430801] =C2=A0 WARN: RBP: 0000000000000000 R08: 0000000000000=
000 <br>
&gt; R09: 0000000000000020<br>
&gt; [2399526.430811] =C2=A0 WARN: R10: 0000000000000000 R11: ffff8883de0b9=
d40 <br>
&gt; R12: 0000000000000001<br>
&gt; [2399526.430823] =C2=A0 WARN: R13: ffff8883db210a00 R14: 0000000000000=
002 <br>
&gt; R15: ffff8883de0b9c00<br>
&gt; [2399526.430852] =C2=A0 WARN: FS: =C2=A000007ffac43fe700(0000) <br>
&gt; GS:ffff888451240000(0000) knlGS:0000000000000000<br>
&gt; [2399526.430868] =C2=A0 WARN: CS: =C2=A0e033 DS: 0000 ES: 0000 CR0: 00=
00000080050033<br>
&gt; [2399526.430879] =C2=A0 WARN: CR2: 0000000000000004 CR3: 000000044ad58=
000 <br>
&gt; CR4: 0000000000040660<br>
&gt; [2399526.430899] =C2=A0 WARN: Call Trace:<br>
&gt; [2399526.430914] =C2=A0 WARN: =C2=A0__qdisc_run+0xa2/0x4f0<br>
&gt; [2399526.430928] =C2=A0 WARN: =C2=A0? __switch_to_asm+0x41/0x70<br>
&gt; [2399526.430940] =C2=A0 WARN: =C2=A0net_tx_action+0x148/0x230<br>
&gt; [2399526.430949] =C2=A0 WARN: =C2=A0__do_softirq+0xd1/0x28c<br>
&gt; [2399526.430966] =C2=A0 WARN: =C2=A0run_ksoftirqd+0x26/0x40<br>
&gt; [2399526.430980] =C2=A0 WARN: =C2=A0smpboot_thread_fn+0x10e/0x160<br>
&gt; [2399526.430993] =C2=A0 WARN: =C2=A0kthread+0xf8/0x130<br>
&gt; [2399526.431004] =C2=A0 WARN: =C2=A0? sort_range+0x20/0x20<br>
&gt; [2399526.431010] =C2=A0 WARN: =C2=A0? kthread_bind+0x10/0x10<br>
&gt; [2399526.431017] =C2=A0 WARN: =C2=A0ret_from_fork+0x35/0x40<br>
<br>
I wonder whether you are missing all fixes for commit 021a17ed796b<br>
which went into kernel 4.18. It needs following fixes on top:<br>
<br>
d518d2ed8640 (went into 5.4), 90b2be27bb0e (went into 5.5).<br>
<br>
=C2=A0From the backtrace I really doubt this is a Xen problem, BTW. Maybe<b=
r>
running under Xen makes the problem more likely due to different<br>
timing.<br>
<br>
<br>
Juergen<br>
</blockquote></div>

--000000000000ae402805ab966e1a--


From xen-users-bounces@lists.xenproject.org Thu Jul 30 05:59:14 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 30 Jul 2020 05:59:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1k11ZX-00030P-8r; Thu, 30 Jul 2020 05:57:43 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lzy/=BJ=gmail.com=ashish.emailaddress@srs-us1.protection.inumbo.net>)
 id 1k11ZV-00030K-Ri
 for xen-users@lists.xenproject.org; Thu, 30 Jul 2020 05:57:41 +0000
X-Inumbo-ID: 941f1b4e-d229-11ea-8d14-bc764e2007e4
Received: from mail-qk1-x729.google.com (unknown [2607:f8b0:4864:20::729])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 941f1b4e-d229-11ea-8d14-bc764e2007e4;
 Thu, 30 Jul 2020 05:57:41 +0000 (UTC)
Received: by mail-qk1-x729.google.com with SMTP id b79so24591081qkg.9
 for <xen-users@lists.xenproject.org>; Wed, 29 Jul 2020 22:57:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=AQDrQ3pzSwFG8LIp0EM5U8IHimMNpvOD1yKbz2FboEo=;
 b=CIi8XEiPNJtEfwmXW9gn6XOV032NTT16ILYXCjeMuRoneEUKFvnCvM48USTNlrFWp9
 m/PXAo4wcDPDjKXRVx/vh5w35R08OAiOoUePZdsJn4W++V6P0XLbd/ugrim27TWfXNQ/
 2kM+Fjk3StbTpMo0R67dUdgrIQdonLK0mUUD93v8NfDfCwiDEpwttvarTjFi6aVl9fHQ
 jeIHPVVCTXujMm37qF3CBdfyb9rN5xM0c6ydzh7fILTid/btI8mF8k9XPrGsLWJHrGRU
 Ly9arIDa1bSp68HidKeIeUBiuIXAsm44w03hJFRIqz27oeOpSv5TzXwNcCBOzmTEhLmv
 ZDIg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=AQDrQ3pzSwFG8LIp0EM5U8IHimMNpvOD1yKbz2FboEo=;
 b=jvqKcgQ3jatqLnPdgv9zT2+SWMRD2bGPNjpaC33RVa5s5vz38/FGXgBdw+4lsNm6cL
 8wvq4mqvMnfwLuAGCwumBCKqoVRt8AQetl7zdUjuW1Mp9eg47rdMUL3DTwEPxlILEhU1
 x6rTIBofefleUtaHuuS0Fl+fxgFugXeflFyR3edxNFkrCGDnBADgFcFWDzGSjI2a5Ccu
 vgkTwD3Xcfqi6WbreCwMqqgY2MeK0wMfNr90hRtB7omZxpoQVunsJd9Sy+J8R3zC2Esh
 v9czoq7wPdQGS3cSOTHZfLPutZ1yh8771lf9CsiSiSywQuV7TCknqgAloLwZUZiBPQ7M
 uAeQ==
X-Gm-Message-State: AOAM532r1O2Djpywi2/WgbnsgIWN9B3uLgfpkhSGTjLSEWf1pl+30ANW
 YX1wO3g5/BW+Ri0Jvhxe1r44sHWkqmNid12F9EhrkRn7
X-Google-Smtp-Source: ABdhPJy0wLUgqyXJq8FIf+whV6Dmo+Z+2OjcgxMiLlwR16bTTch5886WcHJuMWmWG2jRxrnhKLi0XGR/tkChotT4uaA=
X-Received: by 2002:a37:a354:: with SMTP id m81mr36523861qke.277.1596088660521; 
 Wed, 29 Jul 2020 22:57:40 -0700 (PDT)
MIME-Version: 1.0
References: <CAOe0dAW27eqwCG0X=op2TTwTcQDKgGM3u3Rd452LpjPtrMnb2A@mail.gmail.com>
 <8ae363e0-b223-3a6a-589a-01233822031a@suse.com>
In-Reply-To: <8ae363e0-b223-3a6a-589a-01233822031a@suse.com>
From: AshishKumar Mishra <ashish.emailaddress@gmail.com>
Date: Thu, 30 Jul 2020 11:27:28 +0530
Message-ID: <CAOe0dAX_OHDz3vA63MLy1ohPSRjtN990r2OjVX1p1=4SFaE=BA@mail.gmail.com>
Subject: Re: Sample backend/frontend driver
To: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= <jgross@suse.com>
Content-Type: multipart/alternative; boundary="000000000000a3f50105aba25947"
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Cc: xen-users@lists.xenproject.org
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>

--000000000000a3f50105aba25947
Content-Type: text/plain; charset="UTF-8"

Thanks for pointer , will look into it.

Ashish

--000000000000a3f50105aba25947
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Thanks for pointer , will look into it.<div dir=3D"auto">=
<br></div><div dir=3D"auto">Ashish=C2=A0</div></div>

--000000000000a3f50105aba25947--


From xen-users-bounces@lists.xenproject.org Thu Jul 30 17:09:37 2020
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 30 Jul 2020 17:09:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1k1C2h-0003ZW-7A; Thu, 30 Jul 2020 17:08:31 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=4any=BJ=aepfle.de=olaf@srs-us1.protection.inumbo.net>)
 id 1k1C2e-0003ZP-I3
 for xen-users@lists.xenproject.org; Thu, 30 Jul 2020 17:08:30 +0000
X-Inumbo-ID: 480f98a6-d287-11ea-8daf-bc764e2007e4
Received: from mo4-p01-ob.smtp.rzone.de (unknown [85.215.255.51])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 480f98a6-d287-11ea-8daf-bc764e2007e4;
 Thu, 30 Jul 2020 17:08:26 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1596128905;
 s=strato-dkim-0002; d=aepfle.de;
 h=In-Reply-To:References:Reply-To:Message-ID:Subject:Cc:To:From:Date:
 X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender;
 bh=Hi3S9S/ehQfzjzRLk65azlmL7NUmISCnAQ6cLHWuke4=;
 b=qPWgnlQ6pzi7uPrQ8H/vtaDTDt+4YaDfk0w1qdi8x02mic6j1Fvtu9n+bhtNWdH5X+
 5wKmjJPQAw4cXpXcxQaXVC/hSjDnd81lho6sSu6+WAl66GMiOW/j5j/CibHwgNh9v33S
 eg4m3sHl8hHMkc2wWsuaI8hF/ScG82WvL/DWpqHMBeJyPKkiJxuMCfJLNC1xARM127pe
 +g92uaNx1pgjINdpJ9FB6VXDOdQuDBkRuXDtOYMUCVRrWKxW4EutAb/sJ9xFBzoHCD5Z
 Zg6FSBCNDUOwVbX+sAWPR4R/0log6gXMibnKosMKJhlatymf/3M9mv6gJy7jGexSYc/4
 7WiQ==
X-RZG-AUTH: ":P2EQZWCpfu+qG7CngxMFH1J+3q8wa/QXkBR9MXjAuzBW/OdlBZQ4AHSS1QE="
X-RZG-CLASS-ID: mo00
Received: from aepfle.de by smtp.strato.de (RZmta 46.10.5 DYNA|AUTH)
 with ESMTPSA id m032cfw6UH8PDGa
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits))
 (Client did not present a certificate);
 Thu, 30 Jul 2020 19:08:25 +0200 (CEST)
Date: Thu, 30 Jul 2020 19:08:21 +0200
From: Olaf Hering <olaf@aepfle.de>
To: Pry Mar <pryorm09@gmail.com>
Subject: Re: building grub-2.05 with Xen support in C8 versus Buster, looking
 at gntdev.h
Message-ID: <20200730170821.GA541@aepfle.de>
References: <CAHnBbQ-z0ZPp398gMqfVOY-2=z65aEai9rrmjCKhVO+PmpthkA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature"; boundary="9jxsPFA5p3P2qPhR"
Content-Disposition: inline
In-Reply-To: <CAHnBbQ-z0ZPp398gMqfVOY-2=z65aEai9rrmjCKhVO+PmpthkA@mail.gmail.com>
X-BeenThere: xen-users@lists.xenproject.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Reply-To: xen-users@lists.xenproject.org
Cc: xen-users <xen-users@lists.xenproject.org>
Errors-To: xen-users-bounces@lists.xenproject.org
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>


--9jxsPFA5p3P2qPhR
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline

On Mon, Jul 27, Pry Mar wrote:

> http://git.savannah.gnu.org/cgit/grub.git/
> What else could I do to avoid a bad gntdev.h in Buster?

Be more specific what the error is.

There are no traces of the string 'gntdev.h' in my copy grub.git.


Olaf

--9jxsPFA5p3P2qPhR
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=vNmL
-----END PGP SIGNATURE-----

--9jxsPFA5p3P2qPhR--


