From xen-users-bounces@lists.xenproject.org Mon Feb 01 10:03:34 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Feb 2021 10:03:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.79703.145093 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l6W2m-0001ac-Ns; Mon, 01 Feb 2021 10:02:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 79703.145093; Mon, 01 Feb 2021 10:02:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l6W2m-0001aU-JD; Mon, 01 Feb 2021 10:02:52 +0000
Received: by outflank-mailman (input) for mailman id 79703;
 Mon, 01 Feb 2021 10:02:50 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=uA0u=HD=macserve.net=brian@srs-us1.protection.inumbo.net>)
 id 1l6W2k-0001aP-RV
 for xen-users@lists.xen.org; Mon, 01 Feb 2021 10:02:50 +0000
Received: from galileo.macserve.net (unknown [72.5.187.8])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 062ea496-214e-48b9-b8a6-8f707b0b274a;
 Mon, 01 Feb 2021 10:02:48 +0000 (UTC)
Received: from lindbergh.macserve.net (lindbergh.macserve.biz [10.52.2.16])
 by galileo.macserve.net (Postfix) with ESMTPS id 724773B5
 for <xen-users@lists.xen.org>; Mon,  1 Feb 2021 04:02:47 -0600 (CST)
Received: from [47.186.13.80] (helo=[192.168.131.106])
 by lindbergh.macserve.net with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256)
 (Exim 4.84_2) (envelope-from <brian@macserve.net>)
 id 1l6W2g-0008WF-Cr
 for xen-users@lists.xen.org; Mon, 01 Feb 2021 04:02:47 -0600
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 062ea496-214e-48b9-b8a6-8f707b0b274a
From: Brian Blood <brian@macserve.net>
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_C84650FD-6980-4EE9-BA86-BAF14AE8A0E4"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\))
Subject: Re: Domain-0 CPU pinning - is it still a best practice?
Date: Mon, 1 Feb 2021 04:02:45 -0600
References: <20210128144648.GL3712@bitfolk.com>
 <721afc6b-a3ba-8440-8083-f7abaf27a60a@nethence.com>
To: "xen-users@lists.xen.org" <xen-users@lists.xen.org>
In-Reply-To: <721afc6b-a3ba-8440-8083-f7abaf27a60a@nethence.com>
Message-Id: <4257A64B-9C85-43F6-9706-04E73074EEF5@macserve.net>
X-Mailer: Apple Mail (2.3445.104.17)
X-AUTH-Host-Tracking: lindbergh.macserve.net accepted this message from an Authenticated connection. Contact postmaster@macserve.net for abuse issues. Include the X-AUTH-SenderToken header.
X-AUTH-SenderToken: 2f7ad45e77efb790007ac023c8dfd776bee674ef


--Apple-Mail=_C84650FD-6980-4EE9-BA86-BAF14AE8A0E4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Some things I feel comfortable entrusting to the hypervisor scheduler; =
some things I don=E2=80=99t.

For the latter, it gives me more piece of mind to dedicated full blocks =
of resources.

IO and RAID ops (being core to almost any other operation performed on =
the machine) fall into that second category.


My $0.02.



> On Jan 31, 2021, at 3:43 PM, Pierre-Philipp Braun =
<pbraun@nethence.com> wrote:
>=20
>> cpus =3D "all,^0,^1"
>=20
> I rather share all CPUs and let the scheduler prioritize dom0 as such =
(default weight is 256):
>=20
> xl sched-credit2 --domain=3D0 --weight=3D512
>=20
> The only drawback is that I need to be careful on what I do on the =
host, to let some juice available for the guests.  The good thing about =
it is that the dom0 also shares all cores, I guess)
>=20
> Sorry it's not a definitive answer, as I did not compare and =
stress-bench this against an old-school pinning setup.


--Apple-Mail=_C84650FD-6980-4EE9-BA86-BAF14AE8A0E4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Some things I feel comfortable entrusting to the hypervisor =
scheduler; some things I don=E2=80=99t.</div><div class=3D""><br =
class=3D""></div><div class=3D"">For the latter, it gives me more piece =
of mind to dedicated full blocks of resources.</div><div class=3D""><br =
class=3D""></div><div class=3D"">IO and RAID ops (being core to almost =
any other operation performed on the machine) fall into that second =
category.</div><div class=3D""><br class=3D""></div><div class=3D""><br =
class=3D""></div><div class=3D"">My $0.02.</div><div class=3D""><br =
class=3D""></div><br class=3D""><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Jan 31, 2021, at 3:43 PM, =
Pierre-Philipp Braun &lt;<a href=3D"mailto:pbraun@nethence.com" =
class=3D"">pbraun@nethence.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"Singleton"><blockquote type=3D"cite" style=3D"font-family: =
Monaco; font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D"">cpus =
=3D "all,^0,^1"<br class=3D""></blockquote><br style=3D"caret-color: =
rgb(0, 0, 0); font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;" class=3D""><span style=3D"caret-color: rgb(0, 0, =
0); font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; float: none; display: inline !important;" =
class=3D"">I rather share all CPUs and let the scheduler prioritize dom0 =
as such (default weight is 256):</span><br style=3D"caret-color: rgb(0, =
0, 0); font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;" class=3D""><br style=3D"caret-color: rgb(0, 0, =
0); font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;" class=3D""><span style=3D"caret-color: rgb(0, 0, =
0); font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; float: none; display: inline !important;" =
class=3D"">xl sched-credit2 --domain=3D0 --weight=3D512</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Monaco; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Monaco; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><span =
style=3D"caret-color: rgb(0, 0, 0); font-family: Monaco; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; float: none; =
display: inline !important;" class=3D"">The only drawback is that I need =
to be careful on what I do on the host, to let some juice available for =
the guests. &nbsp;The good thing about it is that the dom0 also shares =
all cores, I guess)</span><br style=3D"caret-color: rgb(0, 0, 0); =
font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;" class=3D""><br style=3D"caret-color: rgb(0, 0, =
0); font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;" class=3D""><span style=3D"caret-color: rgb(0, 0, =
0); font-family: Monaco; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none; float: none; display: inline !important;" =
class=3D"">Sorry it's not a definitive answer, as I did not compare and =
stress-bench this against an old-school pinning setup.</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Monaco; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" =
class=3D""></div></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_C84650FD-6980-4EE9-BA86-BAF14AE8A0E4--


From xen-users-bounces@lists.xenproject.org Mon Feb 01 18:21:38 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Feb 2021 18:21:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.80031.146147 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l6dof-0001SI-EW; Mon, 01 Feb 2021 18:20:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 80031.146147; Mon, 01 Feb 2021 18:20:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l6dof-0001SA-B4; Mon, 01 Feb 2021 18:20:49 +0000
Received: by outflank-mailman (input) for mailman id 80031;
 Mon, 01 Feb 2021 17:16:44 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lMXR=HD=vps.thesusis.net=psusi@srs-us1.protection.inumbo.net>)
 id 1l6coe-00033I-EC
 for xen-users@lists.xenproject.org; Mon, 01 Feb 2021 17:16:44 +0000
Received: from vps.thesusis.net (unknown [34.202.238.73])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id c4a7d933-ba89-40fd-a111-4fa8ffb0f68c;
 Mon, 01 Feb 2021 17:16:43 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by vps.thesusis.net (Postfix) with ESMTP id EFF0E23CC4
 for <xen-users@lists.xenproject.org>; Mon,  1 Feb 2021 12:16:42 -0500 (EST)
Received: from vps.thesusis.net ([IPv6:::1])
 by localhost (vps.thesusis.net [IPv6:::1]) (amavisd-new, port 10024)
 with ESMTP id 0FU2SKQ8XmfA for <xen-users@lists.xenproject.org>;
 Mon,  1 Feb 2021 12:16:42 -0500 (EST)
Received: by vps.thesusis.net (Postfix, from userid 1000)
 id A433B23C9C; Mon,  1 Feb 2021 12:16:42 -0500 (EST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: c4a7d933-ba89-40fd-a111-4fa8ffb0f68c
User-agent: mu4e 1.5.7; emacs 26.3
From: Phillip Susi <phill@thesusis.net>
To: xen-users@lists.xenproject.org
Subject: Virtual USB mass storage ( not passthrough )
Date: Mon, 01 Feb 2021 12:15:27 -0500
Message-ID: <87sg6fd7yd.fsf@vps.thesusis.net>
MIME-Version: 1.0
Content-Type: text/plain

Is it possible to emulate a disk drive as a USB mass storage rather than
a virtio or scsi disk?



From xen-users-bounces@lists.xenproject.org Tue Feb 02 04:00:53 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Feb 2021 04:00:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.80317.146859 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l6mrH-0004kv-KX; Tue, 02 Feb 2021 04:00:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 80317.146859; Tue, 02 Feb 2021 04:00:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l6mrH-0004kk-F4; Tue, 02 Feb 2021 04:00:07 +0000
Received: by outflank-mailman (input) for mailman id 80317;
 Tue, 02 Feb 2021 04:00:07 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=As2u=HE=rz-online.de=manfred.haertel@srs-us1.protection.inumbo.net>)
 id 1l6mrG-0004kf-Ty
 for xen-users@lists.xenproject.org; Tue, 02 Feb 2021 04:00:06 +0000
Received: from mx1.isp.ktk.de (unknown [82.115.96.228])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 167e9356-7cf2-49a0-9edb-5c5a30ae0054;
 Tue, 02 Feb 2021 04:00:05 +0000 (UTC)
Received: from donald.local (p5b03e7ad.dip0.t-ipconnect.de [91.3.231.173])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by mx1.isp.ktk.de (Postfix) with ESMTPSA id 4DVB0g5D17zRk4s
 for <xen-users@lists.xenproject.org>; Tue,  2 Feb 2021 05:00:03 +0100 (CET)
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
 by donald.local (Postfix) with ESMTP id ABC0DA0359
 for <xen-users@lists.xenproject.org>; Tue,  2 Feb 2021 04:51:53 +0100 (CET)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 167e9356-7cf2-49a0-9edb-5c5a30ae0054
Subject: Re: Virtual USB mass storage ( not passthrough )
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
References: <87sg6fd7yd.fsf@vps.thesusis.net>
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
Message-ID: <a849948a-d403-5a67-47d4-d5da9fa97501@rz-online.de>
Date: Tue, 2 Feb 2021 04:51:53 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101
 Firefox/60.0 SeaMonkey/2.53.5.1
MIME-Version: 1.0
In-Reply-To: <87sg6fd7yd.fsf@vps.thesusis.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Phillip Susi schrieb:
> Is it possible to emulate a disk drive as a USB mass storage rather than
> a virtio or scsi disk?

Yes, it is, add something similiar to the following line to the xl.cfg 
of your VM:

device_model_args = [ '-drive' , 
'id=fakeusb,file=/path/to/imagefile.img,if=none' , '-device' , 
'usb-storage,drive=fakeusb,removable=on' ]

-- 
Manfred Härtel, DB3HM    mailto:Manfred.Haertel@rz-online.de
                          http://rz-home.de/mhaertel


From xen-users-bounces@lists.xenproject.org Fri Feb 05 16:08:49 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Feb 2021 16:08:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.81519.151287 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l83eP-0003WG-TA; Fri, 05 Feb 2021 16:08:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 81519.151287; Fri, 05 Feb 2021 16:08:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l83eP-0003W8-PX; Fri, 05 Feb 2021 16:08:05 +0000
Received: by outflank-mailman (input) for mailman id 81519;
 Fri, 05 Feb 2021 06:57:10 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+/2H=HH=ltts.com=deepthi.m@srs-us1.protection.inumbo.net>)
 id 1l7v3G-0000hJ-0p
 for xen-users@lists.xenproject.org; Fri, 05 Feb 2021 06:57:10 +0000
Received: from IND01-MA1-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:fea4::623])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 83a05364-3014-4c0f-8199-e1751d3284ef;
 Fri, 05 Feb 2021 06:56:54 +0000 (UTC)
Received: from MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:64::11)
 by MA1PR01MB4106.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:74::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3805.19; Fri, 5 Feb
 2021 06:56:49 +0000
Received: from MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::b2:d8b7:d9e1:536d]) by MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::b2:d8b7:d9e1:536d%4]) with mapi id 15.20.3825.023; Fri, 5 Feb 2021
 06:56:49 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 83a05364-3014-4c0f-8199-e1751d3284ef
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ikfKFonTr+zzpyhmED5ntQq686jqjG9QFndmxKqDL/dbKGjfTN2utpnnpC6ydhGC7jI6xW40ovTtoSXriZW/ApebUswuiX+iQw5y7Zi1C7uLmC9BDe/Nc2BekHj+/h6Qjd+6ovLSEtLTX+6a7wNCl8BMZ8PsbEPKpExppeSTsPfN6Wk2T9qzvzaqonUofugmQdeaYibQnj2A8K2Amv0W8yo70OHikaY6q0VAhOYBNIeBg3s+oXkvhqT9446UbzzTfAJtOMfZnPLdWDeSZ/Es6XNi8f6pXoPyJVl46yJRUBn4IgbElwaNpz8668sJMcIYoiydv9EbQyv6vi4lX1wz1g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bzb8L0DdRnn78j9MfDu+z5PbY0AaROfpCiesCwrdCAU=;
 b=HWMdqrjEU2k1NOBcDU0VMKXwW6WkkfjbtDGeVkgTiKxTD+DEu9sp7pojhgFH4nglCe2aPM9dlahTNimYod3lIUVq0Ou53lZJ0af4YvoFk1MNqQ4EJQlPtncM3Y6mKa2pHokdjkw/JLTRn0a/NhbVB70CF1HQRwsRuWAoGEt+f32DP4IEElTAVDqFtVIRW0rqHQMQWQyibwTHJhRlDf+S0GCYdbQXCjR1ZT74jqxrNmV/DP5diZam0LRjdW8JR0IrWGu2I6PWwYnprnusDvIwzxtCeJvoHZJFVQyxpdWYEAX2n8p6CtDDohPcQtZcQyWbCvYGEgp28V4QuEtjSAHX7g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=ltts.com; dmarc=pass action=none header.from=ltts.com;
 dkim=pass header.d=ltts.com; arc=none
From: Deepthi M. <Deepthi.M@Ltts.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
CC: Pelluru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Error while building Xen
Thread-Topic: Error while building Xen
Thread-Index: AQHW+4uAsZ6jkEYxj0+EtD1UXa6EjQ==
Date: Fri, 5 Feb 2021 06:56:48 +0000
Message-ID:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
 MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Enabled=True;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SiteId=311b3378-8e8a-4b5e-a33f-e80a3d8ba60a;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SetDate=2021-02-05T06:56:48.831Z;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Name=General;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_ContentBits=0;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Method=Standard;
authentication-results: lists.xenproject.org; dkim=none (message not signed)
 header.d=none;lists.xenproject.org; dmarc=none action=none
 header.from=Ltts.com;
x-originating-ip: [14.142.183.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8aa50d06-ead9-4d11-8d45-08d8c9a335bf
x-ms-traffictypediagnostic: MA1PR01MB4106:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs:
 <MA1PR01MB4106E90DAA7B5B9010CE635888B29@MA1PR01MB4106.INDPRD01.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(376002)(136003)(346002)(39860400002)(366004)(396003)(4326008)(33656002)(55016002)(91956017)(107886003)(186003)(26005)(166002)(8936002)(6506007)(5660300002)(55236004)(83380400001)(76116006)(86362001)(8676002)(71200400001)(66476007)(9686003)(66946007)(19627405001)(15974865002)(7696005)(52536014)(66556008)(6916009)(64756008)(316002)(3480700007)(2906002)(66446008)(478600001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?iso-8859-1?Q?YjiQjbBxxtKXdLjNLj652495x2NvXIDIobvm03OBvd+wDtbZQlbTlyJF8q?=
 =?iso-8859-1?Q?1lkvtL8YapIoxLVg+HUcJXLWbt8a7peVxzkA612eSVJtdGZ6owFa8ULz5G?=
 =?iso-8859-1?Q?v5tFUOJeCkwriZJ2QOsQCsPubYkRajN5918r6kR9xjXeDzKvG4Ms0TEPDR?=
 =?iso-8859-1?Q?C+EH4QBNMryd9XE4cXWuIH/G8XHqQBVzKL6SGjoxriVYLU9OzcVf5YOx+f?=
 =?iso-8859-1?Q?kW969dkQMtGabRrQJlPPi/b4BsFtuGjLrrHWHjfrPe7u7Z3ZfGuBQRB+IK?=
 =?iso-8859-1?Q?bZem3U8lud37cWTcnVphwwfIRj0t8/6C8tTBkx6REYFDlmjT4NKnVvMKHo?=
 =?iso-8859-1?Q?yuLRcziedC0umVeshCbmfdIxCrGYajssCO9k1mAaN63AUqWgdsJMNMBSsJ?=
 =?iso-8859-1?Q?QkTUZ7M1KjEhJRi+Md736pYm1hmOhlYwaP23eupdkIVAvlACQrTdkPSaLv?=
 =?iso-8859-1?Q?2q8sN0K42jXQcHctqy/BdffiuW+JzrcoyfRvL1Wgyx56oKc45DFavAjFvt?=
 =?iso-8859-1?Q?HkVrruJs6uyPFuzInnRaKI2oHM+ycTqOSWlXnZKp2MrOOWhXEksTadQtG6?=
 =?iso-8859-1?Q?EBCgFkKyc/yhUW0GhyhVL/2jIrepV9wyFy8PIAgv/wDUlCHlh3EOUh/GwO?=
 =?iso-8859-1?Q?Lz23vmFCToWeEstanIzTQHrvfcTP63ZY/D6mFOLuyHUBMhBYu+k9HjEYPS?=
 =?iso-8859-1?Q?4v0uaailBoCVvDYtSDL/IBTfJOY/q6P3vBJK4ZUZMqa8pfz7wVFsu7OuvZ?=
 =?iso-8859-1?Q?AOeBvsnbY6zxlgImAjTvrLRqqEWzh45qCHhU/ZdfnBJVEfAmtQI+OqEl3O?=
 =?iso-8859-1?Q?QqUPd5kc0qbQDYntOz0LnsCjZMFqobugUCfLcUoSIB1qJi50/QQYlLge7f?=
 =?iso-8859-1?Q?HuoOX0yQAawQ9y6dpa6P3rCpE2Cvx037anEOddy1wQJkV98w0TRnznpyMA?=
 =?iso-8859-1?Q?cVlmD3fC5sWDr2BA1LWW2iZL2R0D+kWRNbwuluwsBHQuVaIWXP3SWCssqY?=
 =?iso-8859-1?Q?xiq3CqCDR0BIZ8Dr/dGony/vbtjzocE0gj8F4InezjXA/nHQJEox07jc2p?=
 =?iso-8859-1?Q?6cx8x5OOLD5yWIxMBHbLOMgx4Pux49EOfM5ZNevY7UNqCXI2D2hxnk8u8x?=
 =?iso-8859-1?Q?OqbXuk0e3N18wwhfr5Ff7V+m2tzWrXT3Zs/4Y72/3XTiooyBOTVx119Fml?=
 =?iso-8859-1?Q?2FZHVhJkTQacDn6Q9IhPimRhW2zzS/Mz05feA2F52/pAJh/o81NsoFoGj+?=
 =?iso-8859-1?Q?XGIDb+j4ZWQ5awaPqccBWdLcafpenzBzOVHivqFeUYaQFQQ2rNM9xZ4PLn?=
 =?iso-8859-1?Q?PIwqFTmSFjKxdLLuoWDjRiw35AtYCpgOhHcfwzVmVmVfvHw=3D?=
Content-Type: multipart/alternative;
	boundary="_000_MAXPR01MB3728A6A2AB3546BD54857D5288B29MAXPR01MB3728INDP_"
MIME-Version: 1.0
X-OriginatorOrg: ltts.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 8aa50d06-ead9-4d11-8d45-08d8c9a335bf
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Feb 2021 06:56:49.0044
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 311b3378-8e8a-4b5e-a33f-e80a3d8ba60a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /pLTGJ/SFWXzLLCHhJB4oIgFBYOTwewGYECRbI506f7hHRZ3cTDSVMJUAMMTFdGvejVP8e60qzXqLBa6IEwm6g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MA1PR01MB4106

--_000_MAXPR01MB3728A6A2AB3546BD54857D5288B29MAXPR01MB3728INDP_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi all,

I am trying to build Xen in Yocto environment for Renesas R-car salvator-xs=
 board I am getting the following error

| cc1: error: include location "/usr/local/include/python3.9" is unsafe for=
 cross-compilation [-Werror=3Dpoison-system-directories] | cc1: all warning=
s being treated as errors | error: command '/home/user/xenrcar/build/build/=
tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-linux-gcc=
' failed with exit code 1 | Makefile:23: recipe for target 'install' failed=
 | make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/user/=
xenrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC+5e7=
aa90440-r0/git/tools/python

Please let me know how to fix the issue.
Thank you,
Deepthi


L&T Technology Services Ltd

www.LTTS.com

L&T Technology Services Limited (LTTS) is committed to safeguard your data =
privacy. For more information to view our commitment towards data privacy u=
nder GDPR, please visit the privacy policy on our website www.Ltts.com. Thi=
s Email may contain confidential or privileged information for the intended=
 recipient (s). If you are not the intended recipient, please do not use or=
 disseminate the information, notify the sender and delete it from your sys=
tem.

--_000_MAXPR01MB3728A6A2AB3546BD54857D5288B29MAXPR01MB3728INDP_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none;"> P {margin-top:0;margin-bo=
ttom:0;} </style>
</head>
<body dir=3D"ltr">
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Hi all,<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
I am trying to build Xen in Yocto environment for Renesas R-car salvator-xs=
 board I am getting the following error</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<div class=3D"_1QqtTPzfO2uVuGQxRAHFQe T1Jr_puZhTSt7VLFoLK2x">
<div class=3D"_1mdDceLyS64xDq6hZuC4o_"><span class=3D"hs18i3Qi17DK-Xn4cgqmg=
 _1ert0VCYzjp_CM4-XAISzR"><span>| cc1: error: include location &quot;/usr/l=
ocal/include/python3.9&quot; is unsafe for cross-compilation [-Werror=3Dpoi=
son-system-directories] | cc1: all warnings being
 treated as errors | error: command '/home/user/xenrcar/build/build/tmp/sys=
roots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-linux-gcc' faile=
d with exit code 1 | Makefile:23: recipe for target 'install' failed | make=
[4]: *** [install] Error 1 | make[4]:
 Leaving directory '/home/user/xenrcar/build/build/tmp/work/aarch64-poky-li=
nux/xen/unstable+gitAUTOINC+5e7aa90440-r0/git/tools/python</span></span></d=
iv>
</div>
<div class=3D"_1XikJYW-Lg03EhQUkEHsX_"><br>
</div>
<div class=3D"_1XikJYW-Lg03EhQUkEHsX_">Please let me know how to fix the is=
sue.</div>
<div class=3D"_1XikJYW-Lg03EhQUkEHsX_">Thank you,</div>
<div class=3D"_1XikJYW-Lg03EhQUkEHsX_">Deepthi<br>
</div>
<br>
</div>
<p><strong>L&amp;T Technology Services Ltd</strong></p>
<p><a href=3D"" http:=3D"" www.LTTS.com=3D"" ??=3D"" target=3D"" _blank??=
=3D"">www.LTTS.com</a></p>
<p>L&amp;T Technology Services Limited (LTTS) is committed to safeguard you=
r data privacy. For more information to view our commitment towards data pr=
ivacy under GDPR, please visit the privacy policy on our website www.Ltts.c=
om. This Email may contain confidential
 or privileged information for the intended recipient (s). If you are not t=
he intended recipient, please do not use or disseminate the information, no=
tify the sender and delete it from your system.</p>
</body>
</html>

--_000_MAXPR01MB3728A6A2AB3546BD54857D5288B29MAXPR01MB3728INDP_--


From xen-users-bounces@lists.xenproject.org Mon Feb 08 13:14:27 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 08 Feb 2021 13:14:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.82849.153201 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l96MQ-0001H9-9C; Mon, 08 Feb 2021 13:13:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 82849.153201; Mon, 08 Feb 2021 13:13:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1l96MQ-0001H1-4x; Mon, 08 Feb 2021 13:13:50 +0000
Received: by outflank-mailman (input) for mailman id 82849;
 Mon, 08 Feb 2021 13:13:48 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=tzJO=HK=gmail.com=empbilly@srs-us1.protection.inumbo.net>)
 id 1l96MO-0001Gw-8x
 for xen-users@lists.xenproject.org; Mon, 08 Feb 2021 13:13:48 +0000
Received: from mail-io1-xd31.google.com (unknown [2607:f8b0:4864:20::d31])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 66e301c9-a620-4783-94aa-455882c864bd;
 Mon, 08 Feb 2021 13:13:47 +0000 (UTC)
Received: by mail-io1-xd31.google.com with SMTP id m17so4338423ioy.4
 for <xen-users@lists.xenproject.org>; Mon, 08 Feb 2021 05:13:47 -0800 (PST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 66e301c9-a620-4783-94aa-455882c864bd
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:from:date:message-id:subject:to;
        bh=BIM51+mS4pdT6T2/Cys7wtcskia0oVH5B2MyTPQP1K8=;
        b=EYOHzHnp0jNMGOMzcNiXxDglUH3ZWbmR+YBEy8iysPIeqSNMYMavWIUrS+qvsa1bKr
         zR7OZNBgMzPokNbEznGNDe8DdFE6fBcZug2mwzAolytwvo/pYb8TIIHdycghmS8+r1Ta
         c57axKPrB0jDxh45v2bu+DG7zbIHIS7MylM3+fHvzUZXhGv+i+oZSTNkNCx2J6SO4FhL
         0ixR19pi+P/oGLEDG2eQQajIetBKFLd9rJQ6M2OdkiVnptejuTb/oGn5jkMqk3GycYHE
         gi6/WgxHohD7Qs22fObrxaeQTfO10MQ0ivKjDIrFL2KRJnrjS+KnVNtOQ8FbtVm+Aoaj
         yo0A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=BIM51+mS4pdT6T2/Cys7wtcskia0oVH5B2MyTPQP1K8=;
        b=D3J8e749ajUKsxzz1jdbZjIFUpFb32DuXf+VKJo8zO46hWeJWVOzXWA0qVZ4f9ZcwG
         vjCGIKB63jJaSLjm+3uSKcNzUplMysQo5Cv5nXHES32oJm7NyUq7Ovpppwes0v3vMauW
         xUZ3gJjL//x0X+lgMCPnStJSJjmI9H21EQZSRlTlhJzmAxZ9UDUAcpyDLsYB15rjTojt
         fWyYEElK0yRHjO1FCVveC3D6K4IKM2CosNppgCu1vlXLtFzA1nLB93T1FCSil9VP4rK/
         E72lq/twPyYyHBWQdSb5Dv5jblrbk/HOgsmN+f6a49NmAnwuTpAAyugilzxkY5kD2un0
         L94Q==
X-Gm-Message-State: AOAM533wfKDRlBL43d1CyZ+8PTzAKAgb/SaXP8pfpq0wjs3uUnUOY0nl
	BXIvIEqoi+3VRBOsw6gCrLhIcpds01Ql7lkO5ysrkuI4YeWZwA==
X-Google-Smtp-Source: ABdhPJyjr+jffGz2DobGwA5kNsXug3uH/OgZML3m79hCWUeJojqFaHbx1coAaTO/Ub7SPScHRhDe9SpGh0afnVc5ZKY=
X-Received: by 2002:a02:a393:: with SMTP id y19mr4729443jak.122.1612790026720;
 Mon, 08 Feb 2021 05:13:46 -0800 (PST)
MIME-Version: 1.0
From: Elias Pereira <empbilly@gmail.com>
Date: Mon, 8 Feb 2021 10:13:10 -0300
Message-ID: <CAHdxDAE7_aHF3N=rw0_HoCsJb78+_LKCJeFCzxaOq5DWSYG3yg@mail.gmail.com>
Subject: IP-CONFIG: no response | eth0 hardware address DHCP RARP
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000a3d94905bad2f0cd"

--000000000000a3d94905bad2f0cd
Content-Type: text/plain; charset="UTF-8"

Hello,

I have debian 10 in a xenserver 7.0 vm with static ip and keeps trying
dhcp. Already removed some packages that could be interfering, but must
still have something installed.

post messages
https://i.stack.imgur.com/9ylgS.png


-- 
Elias Pereira

--000000000000a3d94905bad2f0cd
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:tahoma,s=
ans-serif"><span style=3D"color:rgb(36,39,41);font-family:Arial,&quot;Helve=
tica Neue&quot;,Helvetica,sans-serif;font-size:15px">Hello,</span></div><di=
v class=3D"gmail_default" style=3D"font-family:tahoma,sans-serif"><span sty=
le=3D"color:rgb(36,39,41);font-family:Arial,&quot;Helvetica Neue&quot;,Helv=
etica,sans-serif;font-size:15px"><br></span></div><div class=3D"gmail_defau=
lt" style=3D"font-family:tahoma,sans-serif"><span style=3D"color:rgb(36,39,=
41);font-family:Arial,&quot;Helvetica Neue&quot;,Helvetica,sans-serif;font-=
size:15px">I have debian 10 in a xenserver 7.0 vm with static ip and keeps =
trying dhcp. Already removed some packages that could be interfering, but m=
ust still have something installed.</span><br clear=3D"all"></div><div><br>=
</div><div><div class=3D"gmail_default" style=3D"font-family:tahoma,sans-se=
rif">post messages</div><div class=3D"gmail_default" style=3D"font-family:t=
ahoma,sans-serif"><a href=3D"https://i.stack.imgur.com/9ylgS.png">https://i=
.stack.imgur.com/9ylgS.png</a></div><br></div><div><br></div>-- <br><div di=
r=3D"ltr" class=3D"gmail_signature" data-smartmail=3D"gmail_signature">Elia=
s Pereira</div></div>

--000000000000a3d94905bad2f0cd--


From xen-users-bounces@lists.xenproject.org Thu Feb 11 11:20:20 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Feb 2021 11:20:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.83825.156964 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAA0d-0000H2-9X; Thu, 11 Feb 2021 11:19:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 83825.156964; Thu, 11 Feb 2021 11:19:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAA0d-0000Gv-5t; Thu, 11 Feb 2021 11:19:43 +0000
Received: by outflank-mailman (input) for mailman id 83825;
 Thu, 11 Feb 2021 11:19:41 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6NJs=HN=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1lAA0b-0000GR-6c
 for xen-users@lists.xenproject.org; Thu, 11 Feb 2021 11:19:41 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (unknown
 [40.107.6.87]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 84b178ba-3581-4b62-9e8a-35eb0104cc82;
 Thu, 11 Feb 2021 11:19:39 +0000 (UTC)
Received: from AM0PR01CA0135.eurprd01.prod.exchangelabs.com
 (2603:10a6:208:168::40) by AM0PR08MB3009.eurprd08.prod.outlook.com
 (2603:10a6:208:66::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.30; Thu, 11 Feb
 2021 11:19:37 +0000
Received: from VE1EUR03FT041.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:208:168:cafe::70) by AM0PR01CA0135.outlook.office365.com
 (2603:10a6:208:168::40) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend
 Transport; Thu, 11 Feb 2021 11:19:37 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT041.mail.protection.outlook.com (10.152.19.163) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3846.25 via Frontend Transport; Thu, 11 Feb 2021 11:19:37 +0000
Received: ("Tessian outbound 587c3d093005:v71");
 Thu, 11 Feb 2021 11:19:36 +0000
Received: from 2936db2770d0.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 7A3E155E-0796-4634-B8B1-35AABB431C68.1; 
 Thu, 11 Feb 2021 11:19:31 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 2936db2770d0.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 11 Feb 2021 11:19:31 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com (2603:10a6:800:1ae::15)
 by VE1PR08MB5710.eurprd08.prod.outlook.com (2603:10a6:800:1b0::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Thu, 11 Feb
 2021 11:19:30 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839]) by VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839%6]) with mapi id 15.20.3846.027; Thu, 11 Feb 2021
 11:19:29 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 84b178ba-3581-4b62-9e8a-35eb0104cc82
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HUELcUYFwv8A6xlCfMdAYD4octpyxbw3WeMVWbNrZ4s=;
 b=OLhZajerBtx/bnbCG6WzPQxigrhLBrGNySSV8QhBy8dOZaOCH2HwTsPXBfhtVe6++0QsHyCxlIQaeDDNQ9KmvSxEdsSAEfbQVCh96Kj1x9iOKXARfP09e6r5IbxYjNnYGqlkFtQapK8kHh2zkTAacvtWWr2Df4v2K5+37JUDEjo=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 63e6a2541d9fb7a6
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jMw0Bp/J1t74T+aQ5cRf3LMzEKFvEnuxE9BCIUgD1C3YdjXX6j50d7rxQXHgrO5Lk8Bc8Rvf/VEWADinrlx4CLYxJ3Hbu89szUlXHTriumfTjgjVPeQicYm6EZ7s2ntiIMncC0LpaEwWlxk3qQbgOhYGWm7JFMjJQldRCoR5Fpv1Ch1Vhp9EYfkCeNw7VCkhxt6ftaayM5VIIs6HOGqcQAh1uavtQ9ZcbBJEfx56g3aXF2GfNXuxA6nVR5o2TxWoPot7Qp1FAXsO2nlO6EC0h32E3JlMiGYJI5fBAzFb82pLncM+ELoMoFdMEBlA6Re4L+OtosMmXWcB0SqFaOkc2Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HUELcUYFwv8A6xlCfMdAYD4octpyxbw3WeMVWbNrZ4s=;
 b=kt3cRXhjBFR5Qik3mAeWT/xoL9xosNvkpuNEVBcsBGG1pTYeA/Sq3MnHn5xk8WEQiNpSUfL/FV0uE2HDqnXyVvhZCqurIHwmLGYfqYa/Uby3iLxJcsSfGC0btEMYEx4cBt9nSz2hWZ5oBq4LTqfZJYtSm0uEHV85PaHEOV2uaCJII7jnfgEqd9pY+TB+T2Home6oiWwRgKkN4Ksl/HMjmCot4EbIzYoHs6bcC6V+hJaETn7dAoO8sl1V9SRkjIHvxvNFzMLR1wEFMfb8LffkZCvkyKGjF5dM4Gh5W1jQ8+4D6kLv8HO+xrpHC5fqhFTAvRcVUDVL0WVpbu1B7YCiCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HUELcUYFwv8A6xlCfMdAYD4octpyxbw3WeMVWbNrZ4s=;
 b=OLhZajerBtx/bnbCG6WzPQxigrhLBrGNySSV8QhBy8dOZaOCH2HwTsPXBfhtVe6++0QsHyCxlIQaeDDNQ9KmvSxEdsSAEfbQVCh96Kj1x9iOKXARfP09e6r5IbxYjNnYGqlkFtQapK8kHh2zkTAacvtWWr2Df4v2K5+37JUDEjo=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Deepthi M. <Deepthi.M@Ltts.com>
CC: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>, Pelluru
 VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen
Thread-Topic: Error while building Xen
Thread-Index: AQHW+4uAsZ6jkEYxj0+EtD1UXa6EjapS2G+A
Date: Thu, 11 Feb 2021 11:19:29 +0000
Message-ID: <676DEE4D-C43E-479F-8249-4DC255D5083D@arm.com>
References:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
In-Reply-To:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.120.23.2.4)
Authentication-Results-Original: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [86.26.33.241]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 157c8aa5-2a48-4098-8806-08d8ce7eeb04
x-ms-traffictypediagnostic: VE1PR08MB5710:|AM0PR08MB3009:
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB30094B213CAA1A2D45CAED9A9D8C9@AM0PR08MB3009.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:9508;OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5696.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(136003)(346002)(39860400002)(376002)(366004)(33656002)(186003)(83380400001)(86362001)(3480700007)(2616005)(26005)(15974865002)(71200400001)(66946007)(8936002)(2906002)(6506007)(66446008)(76116006)(66556008)(64756008)(91956017)(66476007)(478600001)(6486002)(6916009)(6512007)(8676002)(316002)(55236004)(36756003)(4326008)(54906003)(53546011)(5660300002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?Osm6OPdAMtlCHJIaLoXvUAssN1N9IgJPHvTOUF2j3hjypcDEpG586dfw+6Zd?=
 =?us-ascii?Q?RSeFConiTML9QL22ISUZdiV/a/GjT0yLVmRSVu7wCjAmYaQe+b+Zt3p3h6Cw?=
 =?us-ascii?Q?RDZ7JHA4BqqQhhI89knGg+4l/eetdosD45TQjbUrkDlfktBXZOq0qVuHXNHP?=
 =?us-ascii?Q?OjTDMFn+39gIfoMvpX1t/phEtEqL0aYX45G3YOAw2MCTILz5XgfXV00eG1kc?=
 =?us-ascii?Q?QJhEvbnMfSRAfGveNXk3avlm9hT4gJMnSo18zB/S+cQWBlCab1NskAu7ZkUQ?=
 =?us-ascii?Q?UhPgo9ZplyhiCNg8V3kg+0hVW4Hl3qCowDySsMRneeTxH/XJCDqhtN0AOBOE?=
 =?us-ascii?Q?y6ffERYOQtTST+8N8x6tSeBouNd46aCwj0tZSvJrURdMKTPZvsSA6lkVOHSO?=
 =?us-ascii?Q?EEB/8p1AJ69Yl942XzPp24NgEvVwRgAiR8OavNrP9IZhXCfuUcn0C6jTN8FP?=
 =?us-ascii?Q?R0+7wFG+fZ6BsMiIbEU0zjQR8jushYbdK1vaK37/xVf/u+H8Tq5/HN2dZDRq?=
 =?us-ascii?Q?AFXwrUvft/PKRg39ROPwd5DKFDQgnu0C9sLp2WO9fkAgfzgFWRKPUxaWJWJu?=
 =?us-ascii?Q?eQnsXlKBPJlojlvtmGGeevPvn9CNEwMOocN9oBbgyNyn15KRa4UnVkM5pk0a?=
 =?us-ascii?Q?h1ozdRA7DdP5fl0IwL247mMvU60Cxf6Pz20BitAv9Pw4tJ6K+f+lJQvMsYVV?=
 =?us-ascii?Q?ohMUSbGNT28fYqoDBLJQKXdA2tkeay+weX6Zjh27R1lMPnAlGLf84qe3msLU?=
 =?us-ascii?Q?ZQQqCx1W1gOGRHctrkLt0oaXA7G/peqOdiSJGKjSW/wF0aNBnmqE9U470EmN?=
 =?us-ascii?Q?f9cvroZMgnXWJFEkJzbUyPu21fyL/00WzfHwjpKWHjMeLprSeYau6ucXcOt5?=
 =?us-ascii?Q?m0+r4g6piekIiuOht+qkogZQYFu5U5gHJEUSTE1Yh2uidC9YRGqKC3gXSkcH?=
 =?us-ascii?Q?ptFWsL/oXwy3ZswTIGyfbz6FK+smjkMvcd93uXMph7uvzsR/8dnpt5zrBcu7?=
 =?us-ascii?Q?USU99sxkA71/u0nYh5gSUWRjuRd0yli1N+ye3KQvb6LwiepANq5Yt+t4ihlW?=
 =?us-ascii?Q?Ep3nKmu6VUAQ/3Rjx/y5XAzgdfco2VspUl2CtPlkX0wiMSOQPbKXYQUq4Z+d?=
 =?us-ascii?Q?DBe6ArJKAJXxOZxB+hKZlQcbubXwU0s6CWiLWXAhG9R/pXS1RPwIDuz8/uKr?=
 =?us-ascii?Q?dATEmT5LvJDEiKUM8hH4J/lRR5N098tr9zISBTPMd7FybzVxGM/192uzgquG?=
 =?us-ascii?Q?UG+b2pELXDVo51DUwTvCd4EavYeVXigV1ydAM85mDuLnF8wAzOnTe4E5oEOm?=
 =?us-ascii?Q?CtofeeNfZLhmq6qybzO9l7jv?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <8407A102F6A50849AB8BE5CBC9F5CE4F@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5710
Original-Authentication-Results: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	b1e1b321-16d7-4779-6950-08d8ce7ee658
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	RntCXgVxCDGNMbH2PRsHkKz2RXWfQuJMFO5cf5RUV0PRA9pz9pWEPWRK+I2SpuKOeKP5YSglyyrQzHLGx8O8vJi+x1hkYd0r1222v9mUHCplubvUyBCClG2/65a4DzUVYrKUUSgvaFX0hErPV94rNqQ7B4IRLGDax4BbGMbZKhinaoXfUbn6QgWcWsz7NQAn++fHWTo/L7ykGSuIfJ4UTa2Mh2jQx3ncgaLEvqdHwaHIVCvQ4OfquHU/WTAKYWgVJVwCOQmMpXczHqYYPEDiT78d23PWlJWaCi1qBuMfhlA/nlCSzp9fe/fu/JppBw5FEXiflG3isz64xmYjj5uaHLt59HzJYgKi/KG81A4uJentTUc67VsSAqAGVjVl/YSCjPxmXNKO3n1RvwY+H68gKyNrcFt+cXp8XtNoh6jl/r6C2hiEV3ax7i8a637B3M+zzo9rQusu5UGQQEvbbMMTGIvl8sS7R/lG2qPml7LYLuBQIMEybdq1uBnpZRSh1zEhNOtnBER0Q+tybhdDeNy94ZlaSgArhEvFregp/25oFKkpxSHKXR1jFpnODC1ikb9HmwwdjEfmqBBVU9Schc5h18KWKj96MgzstVecJDpCP5lHJWDlo/2ANWujFheyT4UCd11wChGXOKcDi6Ad3DL1y7pzSSCelk7bJviRGZzrOA0hK0TT0ydx8WirbrE9Gb/Hs4lY1wT7V37VQG9lXiLWQTgvgRRrMDCWiPoVTU/jwlA=
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(39860400002)(346002)(136003)(396003)(376002)(46966006)(36840700001)(316002)(86362001)(33656002)(8936002)(70206006)(54906003)(336012)(2906002)(47076005)(70586007)(36756003)(5660300002)(15974865002)(8676002)(2616005)(36860700001)(6506007)(478600001)(6512007)(6486002)(356005)(55236004)(26005)(6862004)(4326008)(107886003)(82310400003)(81166007)(53546011)(3480700007)(82740400003)(83380400001)(186003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Feb 2021 11:19:37.2371
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 157c8aa5-2a48-4098-8806-08d8ce7eeb04
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3009

Hi Deepthi,

> On 5 Feb 2021, at 06:56, Deepthi M. <Deepthi.M@Ltts.com> wrote:
>=20
> Hi all,
>=20
> I am trying to build Xen in Yocto environment for Renesas R-car salvator-=
xs board I am getting the following error
>=20
> | cc1: error: include location "/usr/local/include/python3.9" is unsafe f=
or cross-compilation [-Werror=3Dpoison-system-directories] | cc1: all warni=
ngs being treated as errors | error: command '/home/user/xenrcar/build/buil=
d/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-linux-g=
cc' failed with exit code 1 | Makefile:23: recipe for target 'install' fail=
ed | make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/use=
r/xenrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC+5=
e7aa90440-r0/git/tools/python
>=20

It seems that you host python is used instead of the one compiled by Yocto.

Could you tell me:
- which version of Yocto you are using
- what layers you included
- what parameters did you set in your local.conf
- what image you are building ?

Cheers
Bertrand

> Please let me know how to fix the issue.
> Thank you,
> Deepthi
>=20
> L&T Technology Services Ltd
> www.LTTS.com
> L&T Technology Services Limited (LTTS) is committed to safeguard your dat=
a privacy. For more information to view our commitment towards data privacy=
 under GDPR, please visit the privacy policy on our website www.Ltts.com. T=
his Email may contain confidential or privileged information for the intend=
ed recipient (s). If you are not the intended recipient, please do not use =
or disseminate the information, notify the sender and delete it from your s=
ystem.



From xen-users-bounces@lists.xenproject.org Thu Feb 11 12:06:57 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Feb 2021 12:06:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.83876.157072 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAAjl-0005m4-Dn; Thu, 11 Feb 2021 12:06:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 83876.157072; Thu, 11 Feb 2021 12:06:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAAjl-0005lx-9v; Thu, 11 Feb 2021 12:06:21 +0000
Received: by outflank-mailman (input) for mailman id 83876;
 Thu, 11 Feb 2021 12:06:20 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6NJs=HN=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1lAAjk-0005lr-4E
 for xen-users@lists.xenproject.org; Thu, 11 Feb 2021 12:06:20 +0000
Received: from FRA01-MR2-obe.outbound.protection.outlook.com (unknown
 [40.107.9.48]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 302e23bf-7fc9-42e6-82a3-4497c7d130ba;
 Thu, 11 Feb 2021 12:06:18 +0000 (UTC)
Received: from AS8PR04CA0173.eurprd04.prod.outlook.com (2603:10a6:20b:331::28)
 by PR2PR08MB4875.eurprd08.prod.outlook.com (2603:10a6:101:27::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.27; Thu, 11 Feb
 2021 12:06:16 +0000
Received: from AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:331:cafe::c3) by AS8PR04CA0173.outlook.office365.com
 (2603:10a6:20b:331::28) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend
 Transport; Thu, 11 Feb 2021 12:06:16 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT057.mail.protection.outlook.com (10.152.17.44) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3846.25 via Frontend Transport; Thu, 11 Feb 2021 12:06:15 +0000
Received: ("Tessian outbound 4d8113405d55:v71");
 Thu, 11 Feb 2021 12:06:15 +0000
Received: from 90fde0974d39.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 9072850F-DC3E-46A7-9C76-C63D4246326A.1; 
 Thu, 11 Feb 2021 12:06:09 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 90fde0974d39.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 11 Feb 2021 12:06:09 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com (2603:10a6:800:1ae::15)
 by VI1PR08MB4048.eurprd08.prod.outlook.com (2603:10a6:803:e5::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25; Thu, 11 Feb
 2021 12:06:07 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839]) by VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839%6]) with mapi id 15.20.3846.027; Thu, 11 Feb 2021
 12:06:07 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 302e23bf-7fc9-42e6-82a3-4497c7d130ba
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=p+l3S9Ws4PulgASZxo7nzwmsqb6i1L0nL2PbvaBYkoc=;
 b=eEFK9QXRuhqr2GcoYfvzwejQa/dQJYFoUBEecpgNCYhGU5bQjL6j4tLtOv12JcqAFKrntZ4kx8U19x9qNehuiK7kg74rlz6PxgT2SC2ruDqRj0/xc1BZQjVSVj2beG2quk1Hfx66keXcM3YhZIlTuvw9uZoEzPiguKvgbcRcUxE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 8d4145e91a576ced
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bJmjnE1/WFNvdcfvJPg7x6TTjqoaVtc7mSJ64uRnSbkkN74HVuAG2zukVjlrqDM2fGjPPIALf3d4ox2EkKwyYZgazo2zB9OYCLimIj8hdnWeuXjCJKnsRpRP2HIkbV//UtkhC2ajwKSh1+3U5A678kRynY3uAM+Vi6DY1rBV0IAtGzeTe9MuhGNL17PqJNqcG0b+k/LK2aDo5Nt9LJfT8DtFYqX0QOD5ybRUzv2PggyTyIfycM3FYfmR/fCSRlJIMFKM1aiuD73M1yBCY2mwmdf68RTTLXhSuiTAOKJerjJqc9NTImeaNjMk884nbOLCHn0UFDKjRtlo/TZuZ2ImSg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=p+l3S9Ws4PulgASZxo7nzwmsqb6i1L0nL2PbvaBYkoc=;
 b=OFX1cXu515EO5fjqpzuS+XsvaWNT2b7GqTETw0Fy2MZSD8cRQ1y0BLQxk5lV8JP4ZigwzJGVN6um2Ok0a5W65oC/RdQvl/W9IbZyAxV3xOtVAlMd0MhLYeuNfwIzLp9JM/Zn2jaqc4vN7cOppQOSxQE4H2ESdjMOTiSCs3UBuCmIoo1x4+EMQ6P8VOfGt8r8lEglJ3jQRWFSTNzvOCo+PhqbgLZZ1iII5lJ/o8P4qR9W9LMXZE01T8HxF/sWk//a6A2kehEbXcVChh6xAgUdE1F4rGthTaE8F0l1zjO2sf3uOWqGowsO/sd4U5e5kdkf+LJ0q7+rP8dlG6NOpIcWLQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=p+l3S9Ws4PulgASZxo7nzwmsqb6i1L0nL2PbvaBYkoc=;
 b=eEFK9QXRuhqr2GcoYfvzwejQa/dQJYFoUBEecpgNCYhGU5bQjL6j4tLtOv12JcqAFKrntZ4kx8U19x9qNehuiK7kg74rlz6PxgT2SC2ruDqRj0/xc1BZQjVSVj2beG2quk1Hfx66keXcM3YhZIlTuvw9uZoEzPiguKvgbcRcUxE=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Deepthi M. <Deepthi.M@Ltts.com>
CC: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>, Pelluru
 VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen
Thread-Topic: Error while building Xen
Thread-Index: AQHW+4uAsZ6jkEYxj0+EtD1UXa6EjapS2G+AgAAAzIeAAAw7AA==
Date: Thu, 11 Feb 2021 12:06:07 +0000
Message-ID: <67E6CA97-9204-4F6A-9C21-487255F37AAB@arm.com>
References:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
 <676DEE4D-C43E-479F-8249-4DC255D5083D@arm.com>
 <MAXPR01MB3728F463BB960043413FA9DD888C9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
In-Reply-To:
 <MAXPR01MB3728F463BB960043413FA9DD888C9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.120.23.2.4)
Authentication-Results-Original: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [86.26.33.241]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: f7ed6188-0abe-43da-b854-08d8ce856ebb
x-ms-traffictypediagnostic: VI1PR08MB4048:|PR2PR08MB4875:
X-Microsoft-Antispam-PRVS:
	<PR2PR08MB4875FD60CF544CD2AD2E3FF59D8C9@PR2PR08MB4875.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:7691;OLM:7691;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 pmJuei268/kveg+J+UQrzN9/5nMA0iYaGN6uXpFKqm0IQtFKfP7AAwG0v2ATGkehYLjW91KDRCjlKT4hzmN+YFeeNknJOZ5VcXX3kumL6V7syI6L1rBgWd+jmkhnCIH8N/PlGXV0Hc8L57frA174x6dLcIh501OudECtd7BzNl/yFw3cTUasT/XL1xIqiIjitkk3JRt6hOZFkS0YjwMCwIP6xQo0kWdbV3HduRidwE5oejwskEVVuapwm8hLhuvjlddetSp5MC41ixKJQXlMDUOoRyEdY8ImsTK5jFHpBlctiAW7jCCoXgzA8THwMPcWLhu74l+txiD3wa3A8EiRxro6kpgte40ALThWB3SMgZK8RypfgceF2t96i4kQjP8LsuDIg3TXR0wj8S2TPY+98fLV2CbBvNzHRLHq2kMiCGFgS9lB9NHTb3sTOG3k42ecK7bHqe5geO+RpSIBTeSd/Rlo7GBw/TLp5ev8V7SemPQRh7Es5AxIJJBG4X8kwTkZZ6aiilmtZ9++ZkL+/4M2Oi/BRJ3rvhLCcxiA7FNJf5xu1pGYr2ATLqUdvvyd8PNVuTsRzMeYDq5b7ToGpo+NjE1TkrkY913z7EpAKgfXeVEYZKUzOOVATJfezWY7+wqaZ/29FWiaWBrYWCAiKh1yn3ofRoxpWwzK5KwOFuTK/1w=
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5696.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(366004)(136003)(396003)(39860400002)(376002)(346002)(66476007)(6512007)(26005)(2906002)(66446008)(66556008)(6916009)(316002)(6486002)(4326008)(966005)(54906003)(36756003)(66946007)(478600001)(3480700007)(64756008)(15974865002)(71200400001)(55236004)(6506007)(186003)(33656002)(91956017)(76116006)(45080400002)(8676002)(8936002)(5660300002)(83380400001)(53546011)(2616005)(86362001)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?tI+IzIlZKC1EfDii8z7aCr9aJ52wyHZIu4kbgKdOfKgniqE4E/8dq3Qrdcrx?=
 =?us-ascii?Q?Ja1puWOq/O/JU0r0qR8A2y4OCTzHrQBYrdHA5yx5lv5MIoOkWC/d6c7Xj6Qa?=
 =?us-ascii?Q?HygnKJt8b8O5gSA6Fz1mK6CmXUwoNYA6JSl0d/mYOAFOUYesYNfowM//B/VA?=
 =?us-ascii?Q?g6u/+taBes6GiXCQJStGCZoNfwCHlXFwvlJzCNW+BH2Ig8XOJ5H/F78cas9I?=
 =?us-ascii?Q?VGPFn522U8+jptxyxH29YIXQSMzZWMXh05IRhDiODSvwemTTGitODfXyP/8E?=
 =?us-ascii?Q?nkDTfy1ID/W8JnPTpePiCQlCMeWki4EW5ej1/38bKGhMSoHguVJgtYLHTNhA?=
 =?us-ascii?Q?oqPz7v6Z+tfmOjydDP6MkqHjbt703IwuhiSNfBec0RRdomWIXX9d/sw7o3VL?=
 =?us-ascii?Q?jvSIyzePEWH8eeysYxwVh53RQukL4k8wJSq0LLP6jdhgBXAdXwVhffZodjq/?=
 =?us-ascii?Q?b4FSMqdBQyc2yxCEGAE/cUnRe8DxAPNxnjJhMtz4RTubiiMeY+U1qhMB6rcp?=
 =?us-ascii?Q?LMBeqw9L1H11kWF7v4COG2RuTNx3X82SJpGsDdZ44TKPnyVRUn4i6ONRc5aj?=
 =?us-ascii?Q?Gpq95dB5cpAyoduWwSyZ9olunPDyP1Zz68UQqIjqCC4MxBtMTE6A7tgFbfRJ?=
 =?us-ascii?Q?eX9STZIDUMVuVTVXK+mdxifU3x+u0yjTWsys9aTNihm97qLvkoBtb+X+sKXZ?=
 =?us-ascii?Q?rr/Ye484wtSFi5mQm6Oa5zNsMN97XtIzQvIc/HWXHQF/XsGF1ljRIWip4SG2?=
 =?us-ascii?Q?CRwV2BnyJShiYe/+r7khhBMOrwzZPPpbsLsyXCrtdU38T7M+BftmCFvS5jSY?=
 =?us-ascii?Q?avmYcv+GMdAxkI/omJfu5jZFotGFMepOT8VfFq8ArI3eTDkLkrg70775b/i2?=
 =?us-ascii?Q?9MGYbIOZEl+Khmk+AxrDhV4l89dDQ3FsrS12J7D1hkdbpcrIdcy+8/9wDv0M?=
 =?us-ascii?Q?+v8Z/Pg9ElmCoh59AkYHrzp8IvDhl4YosWRaMrC1unczY3uSS2f+hX/S+ox/?=
 =?us-ascii?Q?5oHgJNXrDZ5m2DAZAFYnPsvJHYC1XeZxVKpzc45j9A4vZcCtOWgjldVKm2s3?=
 =?us-ascii?Q?AmlgQmyD8OGtDM19V0lk9ej9MlOAIAAhEPsKBw5yFqckEsVkZjcf43osZo0P?=
 =?us-ascii?Q?QyvAIfAn9fOgK+5wRCtajYqMAC6imcjHHkSszzShHd3IKe9SvgnWhpZoTpUH?=
 =?us-ascii?Q?DKDZCyIHlGPQI5EvZetu0bXG7noNxEU5K6CKqZb7VPL8aMkCQJELCxh7j18W?=
 =?us-ascii?Q?kT84UzVGPc/hGza9ohFcko/si8MwrCMP57C2KimForybNIKmPGPt6m9lkjqm?=
 =?us-ascii?Q?xzNfQDRCQgJ8q6Uaf5l7DnJX?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <12DE75591764FA4F8B02AA7AE8604305@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4048
Original-Authentication-Results: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	9f005f2c-51a7-4469-4d4b-08d8ce8569d1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(376002)(39860400002)(346002)(136003)(396003)(36840700001)(46966006)(70206006)(8676002)(6862004)(2906002)(4326008)(47076005)(6506007)(107886003)(82310400003)(45080400002)(53546011)(356005)(54906003)(33656002)(83380400001)(82740400003)(3480700007)(55236004)(336012)(36860700001)(2616005)(5660300002)(26005)(86362001)(478600001)(15974865002)(8936002)(81166007)(6486002)(6512007)(186003)(36756003)(70586007)(316002)(966005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Feb 2021 12:06:15.6073
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f7ed6188-0abe-43da-b854-08d8ce856ebb
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4875

Hi Deepthi,

> On 11 Feb 2021, at 11:40, Deepthi M. <Deepthi.M@Ltts.com> wrote:
>=20
> Hi Bertrand,
>=20
> Thank you for the reply.
>=20
> It seems that you host python is used instead of the one compiled by Yoct=
o.
>=20
> With python2.7 also we are facing the same issue
>=20
> - which version of Yocto you are using
>     poky-2.1.2

This is a very old release (4 to 5 years old) and it is not supported anymo=
re.

>=20
> - what layers you included
>   meta-virtualization
>  Reference link: https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualiza=
tion_Extensions/Salvator-X

Since this was written it could really be that Renesas updated their suppor=
t so you might try to check an newer version of the gen3 support:
https://elinux.org/R-Car/Boards/Yocto-Gen3/v4.7.0

and use the corresponding version of meta-virtualization.

>=20
> - what parameters did you set in your local.conf
>    Please find the attached local.conf for your reference
>  =20
> - what image you are building ?
>   core-image-weston
>=20
> when executing pygrub we are getting the below error:
> Traceback (most recent call last):
>    File "/usr/lib/xen/bin/pygrub", line 20, in <module>
>      import xen.lowlevel.xc
> ImportError: No module named xen.lowlevel.xc

There are some patches for pygrub on meta-virtualization master that you mi=
ght want to look at:
https://git.yoctoproject.org/cgit/cgit.cgi/meta-virtualization/tree/recipes=
-extended/xen/files/0001-python-pygrub-pass-DISTUTILS-xen-4.14.patch

Cheers
Bertrand

>=20
>=20
> Thank you,
> Deepthi
> From: Bertrand Marquis <Bertrand.Marquis@arm.com>
> Sent: Thursday, February 11, 2021 4:49 PM
> To: Deepthi M. <Deepthi.M@Ltts.com>
> Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pell=
uru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
> Subject: Re: Error while building Xen
> =20
> Hi Deepthi,
>=20
> > On 5 Feb 2021, at 06:56, Deepthi M. <Deepthi.M@Ltts.com> wrote:
> >=20
> > Hi all,
> >=20
> > I am trying to build Xen in Yocto environment for Renesas R-car salvato=
r-xs board I am getting the following error
> >=20
> > | cc1: error: include location "/usr/local/include/python3.9" is unsafe=
 for cross-compilation [-Werror=3Dpoison-system-directories] | cc1: all war=
nings being treated as errors | error: command '/home/user/xenrcar/build/bu=
ild/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-linux=
-gcc' failed with exit code 1 | Makefile:23: recipe for target 'install' fa=
iled | make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/u=
ser/xenrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC=
+5e7aa90440-r0/git/tools/python
> >=20
>=20
> It seems that you host python is used instead of the one compiled by Yoct=
o.
>=20
> Could you tell me:
> - which version of Yocto you are using
> - what layers you included
> - what parameters did you set in your local.conf
> - what image you are building ?
>=20
> Cheers
> Bertrand
>=20
> > Please let me know how to fix the issue.
> > Thank you,
> > Deepthi
> >=20
> > L&T Technology Services Ltd
> > https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.=
ltts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b87349f4a9e45bfbd3=
608d8ce7efd6a%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374863921114391=
22%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DH4ODxnAnH5j4UY7gxoYVsggbwvLuwm1KrMAeL=
zdRd2I%3D&amp;reserved=3D0
> > L&T Technology Services Limited (LTTS) is committed to safeguard your d=
ata privacy. For more information to view our commitment towards data priva=
cy under GDPR, please visit the privacy policy on our website https://ind01=
.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;d=
ata=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b87349f4a9e45bfbd3608d8ce7efd6a%7C3=
11b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486392111439122%7CUnknown%7CTW=
FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3=
D%7C2000&amp;sdata=3DH4ODxnAnH5j4UY7gxoYVsggbwvLuwm1KrMAeLzdRd2I%3D&amp;res=
erved=3D0. This Email may contain confidential or privileged information fo=
r the intended recipient (s). If you are not the intended recipient, please=
 do not use or disseminate the information, notify the sender and delete it=
 from your system.
>=20
> L&T Technology Services Ltd
> www.LTTS.com
> L&T Technology Services Limited (LTTS) is committed to safeguard your dat=
a privacy. For more information to view our commitment towards data privacy=
 under GDPR, please visit the privacy policy on our website www.Ltts.com. T=
his Email may contain confidential or privileged information for the intend=
ed recipient (s). If you are not the intended recipient, please do not use =
or disseminate the information, notify the sender and delete it from your s=
ystem.
> <local.conf>



From xen-users-bounces@lists.xenproject.org Thu Feb 11 16:39:12 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 11 Feb 2021 16:39:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.83861.157357 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAEz5-0008A0-Vw; Thu, 11 Feb 2021 16:38:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 83861.157357; Thu, 11 Feb 2021 16:38:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAEz5-00089s-Sg; Thu, 11 Feb 2021 16:38:27 +0000
Received: by outflank-mailman (input) for mailman id 83861;
 Thu, 11 Feb 2021 11:40:57 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bdk/=HN=ltts.com=deepthi.m@srs-us1.protection.inumbo.net>)
 id 1lAALB-0003Y5-PK
 for xen-users@lists.xenproject.org; Thu, 11 Feb 2021 11:40:57 +0000
Received: from IND01-MA1-obe.outbound.protection.outlook.com (unknown
 [40.107.138.87]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 0778deff-9c25-4e5f-b8ef-9b2cfcc5ac83;
 Thu, 11 Feb 2021 11:40:39 +0000 (UTC)
Received: from MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:64::11)
 by MAXPR0101MB1947.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:1c::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.19; Thu, 11 Feb
 2021 11:40:36 +0000
Received: from MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::b2:d8b7:d9e1:536d]) by MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::b2:d8b7:d9e1:536d%4]) with mapi id 15.20.3846.027; Thu, 11 Feb 2021
 11:40:36 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 0778deff-9c25-4e5f-b8ef-9b2cfcc5ac83
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BAICwCRjYlEYPDgD7HOhHw9oo9gTi9PHw4WluhDJN0jnth15IBpxcn+0rSoBc/c3wXxZm7zoAeZbYYnOUzP8oohA/kWtb8x1EQSFFK+3K2vzXQ2kwqKuQNrFHjQS/0Hk1bzFCBQf4gORpWfUB4lIuDBj4Zumd8Qx4bZQbhEEnOeEvaUQSpQJ8xmDDt5qimmuQQfFpvICC3xM23YDUYqiKccu3wyhh2I5e8OUlwNNifMGTkbE9h/S+s648sn9b2lNreVLsrSh8vUKzjNasBCXhzCgm+eAPrma4JdxkrXWY3O0tTM1HcCJsaphdsIyvChylpiHeWW8kSyC5z28iCT4Iw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=unOero7z1kOBcnZEivusKVH/ZbGBG0HqiwbNF0yNl6M=;
 b=PhJ7x5k3xBRJezl5F4cnCmEHCJZbEPR6BfpSd4BgBdmQXstZdMi/kul0TvmOHZwZliiH0NgqdMlAT0+uUU9+zwdbQmlxx2oA8RVo/s1SrlHQCgcoO5PeUDUmGN7hH0wuMMCq2A0JQAIyqwGj1gd9FfIQEIVY79YWwG95gAaPur7nW9V/H/zAFSF0nVfddyIwC1448AlsUzmAdWAdxeljnPafh0qk6dtaIRmitiR91xZ+UObPWQ3c7O3W60qiIx455ktV1GOB4lOExwr9FarU4IVcppiFOEKdRZcUGJd0NETybVLxzaragj+HVglkVOkEHvbSDzEC1tYgrvmuJL+JPg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=ltts.com; dmarc=pass action=none header.from=ltts.com;
 dkim=pass header.d=ltts.com; arc=none
From: Deepthi M. <Deepthi.M@Ltts.com>
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
CC: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>, Pelluru
 VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen
Thread-Topic: Error while building Xen
Thread-Index: AQHW+4uAsZ6jkEYxj0+EtD1UXa6EjapS2G+AgAAAzIc=
Date: Thu, 11 Feb 2021 11:40:35 +0000
Message-ID:
 <MAXPR01MB3728F463BB960043413FA9DD888C9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
References:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>,<676DEE4D-C43E-479F-8249-4DC255D5083D@arm.com>
In-Reply-To: <676DEE4D-C43E-479F-8249-4DC255D5083D@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
msip_labels:
 MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Enabled=True;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SiteId=311b3378-8e8a-4b5e-a33f-e80a3d8ba60a;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SetDate=2021-02-11T11:40:35.163Z;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Name=General;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_ContentBits=0;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Method=Standard;
authentication-results: arm.com; dkim=none (message not signed)
 header.d=none;arm.com; dmarc=none action=none header.from=Ltts.com;
x-originating-ip: [14.142.183.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: de138f88-22dd-4659-9442-08d8ce81d916
x-ms-traffictypediagnostic: MAXPR0101MB1947:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs:
 <MAXPR0101MB1947F4B060A83AFB30048938888C9@MAXPR0101MB1947.INDPRD01.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(396003)(366004)(136003)(346002)(39860400002)(376002)(7696005)(6506007)(55016002)(26005)(45080400002)(86362001)(53546011)(6916009)(33656002)(99936003)(66556008)(15974865002)(478600001)(54906003)(107886003)(8676002)(316002)(52536014)(5660300002)(76116006)(83380400001)(55236004)(8936002)(2906002)(3480700007)(66946007)(91956017)(66476007)(66446008)(19627405001)(4326008)(9686003)(186003)(966005)(64756008)(166002)(71200400001)(66616009);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?JWMiurqSkTo/CXZTAzDaCqhZqfVIR0Uj0/LE/67NkjcRlhA4vEyk3LxEhU+K?=
 =?us-ascii?Q?D0G8wxHMuJMhBV4aupAMiSQr2/xwbiG4oTXAG9uLUySpVc799OPZj8iUrrWZ?=
 =?us-ascii?Q?QXhdHa471mDcv8gOFHzoa/8u62zGg2PV31cWIziu4F2ywUB8xSIWkbxj6fIE?=
 =?us-ascii?Q?nBjsNQT/avZSX8vDWZtg7SSZ70jjaui6lN73HQRtVWsuJksmfB/VysPNqisM?=
 =?us-ascii?Q?uGNPlRt8T2tj1b/Pf5qr+sHEpPdUNYvSUcL43wWJtNzqV+lrHdOXylfnbY/N?=
 =?us-ascii?Q?CalT41Nqz6fvdAGc/sztQFNwcl2dTqi5iDEvk+4yb667AH1+ktdVw15aqee9?=
 =?us-ascii?Q?riF+cLL5cZYUsJtTuQrDNpR4lEHJQKiB/URNDamL+MzoGsFmK9ueN8/L4qwH?=
 =?us-ascii?Q?whC3b9SZG8UgQAlp1Sd9xKcNWPAyPITvjfsqS/QCUlDsSgkdLZiov/CHA7LE?=
 =?us-ascii?Q?i5FL+kC4zWzDZ+4Ut+GtpyatbAJkwb9EswP8HftJ/vZglUrchX2Z60XtgHbB?=
 =?us-ascii?Q?ep3yWapxfBPy83rr1tfytdAvjFceBV9D8yPnkiJakO9HTvu8W+E97Q/02oRF?=
 =?us-ascii?Q?W9B17lF94kZ8QcCWEsjISDOQg9Iojr6RPeoqqw8nUtNGlHBRzmzNCTv9gc3h?=
 =?us-ascii?Q?tssCxvVNllx3wvdHbS7XfezV/2ylxH8bE26bqGlqRDgkmJMRLflLoK0S98hc?=
 =?us-ascii?Q?nqykHI+5KIu8/PhwW/IxZbUrTJ2+c9ptYvf4FnaaUioaKJ/j4emHDwNT1V8l?=
 =?us-ascii?Q?6OIQHSvz1mUzav7LqxfVpXvRa3FrQASlUguYtpr2oTR6lWhXeYFGgJhejwov?=
 =?us-ascii?Q?2T223PKJTAJDjrFS/+Zq+9/Hrt0L164yY6Oq9U0YvjEf2zOahlRYTASk0U6f?=
 =?us-ascii?Q?oZM5taqiVoKpeucXtk2s/FKOcuM+Te5Sq7VmKhkvFB+sIym2ksE31XirSx97?=
 =?us-ascii?Q?kTmEoyaB4/0q35GlQjML4RkzISDzCtABK2Xpw4W7ykrcAlyHkOsEn0XKbe1J?=
 =?us-ascii?Q?AgJsnZzMk4SXUZhUmWMzb75oHOUklSHfUU2WAiY/Lb45yMnJ/F9OMx3mk6WZ?=
 =?us-ascii?Q?3TKC6l9Ixe5Muz1FUoGBSipUQJlCjSeB1DQhi810LGNSmyDYw6CXpExsYFf1?=
 =?us-ascii?Q?AF70kfXE6p4u0PyYYBIb/XxivW/Akf2rMX/hrLt7IR+zmY6CrTENwC6yFtBq?=
 =?us-ascii?Q?HGR0YKRvhVbkzdH9NDNCcuWoh5uQtRyp42H4BLadHZrOhMSNELGDif3N2N6W?=
 =?us-ascii?Q?9L0Z8UmW/lBbCHq+dLXw7xmfzdggPjk0dHHxAfC3ydym2lAbjpGo/LuvWgWb?=
 =?us-ascii?Q?F2c=3D?=
Content-Type: multipart/mixed;
	boundary="_004_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_"
MIME-Version: 1.0
X-OriginatorOrg: ltts.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: de138f88-22dd-4659-9442-08d8ce81d916
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2021 11:40:35.9384
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 311b3378-8e8a-4b5e-a33f-e80a3d8ba60a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: t3uQmZn/R+hlkCPwpk6gZStrp/EW1YyDJY2ARCevxIBVpZqOt0K9lx61/HlyvuNKCdrRGrQcc0xllBd5NYzjvg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MAXPR0101MB1947

--_004_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_
Content-Type: multipart/alternative;
	boundary="_000_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_"

--_000_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Bertrand,

Thank you for the reply.

It seems that you host python is used instead of the one compiled by Yocto.

With python2.7 also we are facing the same issue

- which version of Yocto you are using
    poky-2.1.2

- what layers you included
  meta-virtualization
 Reference link: https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualizati=
on_Extensions/Salvator-X

- what parameters did you set in your local.conf
   Please find the attached local.conf for your reference

- what image you are building ?
  core-image-weston

when executing pygrub we are getting the below error:

Traceback (most recent call last):
   File "/usr/lib/xen/bin/pygrub", line 20, in <module>
     import xen.lowlevel.xc
ImportError: No module named xen.lowlevel.xc


Thank you,
Deepthi
________________________________
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
Sent: Thursday, February 11, 2021 4:49 PM
To: Deepthi M. <Deepthi.M@Ltts.com>
Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pellur=
u VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen

Hi Deepthi,

> On 5 Feb 2021, at 06:56, Deepthi M. <Deepthi.M@Ltts.com> wrote:
>
> Hi all,
>
> I am trying to build Xen in Yocto environment for Renesas R-car salvator-=
xs board I am getting the following error
>
> | cc1: error: include location "/usr/local/include/python3.9" is unsafe f=
or cross-compilation [-Werror=3Dpoison-system-directories] | cc1: all warni=
ngs being treated as errors | error: command '/home/user/xenrcar/build/buil=
d/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-linux-g=
cc' failed with exit code 1 | Makefile:23: recipe for target 'install' fail=
ed | make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/use=
r/xenrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC+5=
e7aa90440-r0/git/tools/python
>

It seems that you host python is used instead of the one compiled by Yocto.

Could you tell me:
- which version of Yocto you are using
- what layers you included
- what parameters did you set in your local.conf
- what image you are building ?

Cheers
Bertrand

> Please let me know how to fix the issue.
> Thank you,
> Deepthi
>
> L&T Technology Services Ltd
> https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.lt=
ts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b87349f4a9e45bfbd360=
8d8ce7efd6a%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486392111439122=
%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DH4ODxnAnH5j4UY7gxoYVsggbwvLuwm1KrMAeLzd=
Rd2I%3D&amp;reserved=3D0
> L&T Technology Services Limited (LTTS) is committed to safeguard your dat=
a privacy. For more information to view our commitment towards data privacy=
 under GDPR, please visit the privacy policy on our website https://ind01.s=
afelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;dat=
a=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b87349f4a9e45bfbd3608d8ce7efd6a%7C311=
b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486392111439122%7CUnknown%7CTWFp=
bGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%=
7C2000&amp;sdata=3DH4ODxnAnH5j4UY7gxoYVsggbwvLuwm1KrMAeLzdRd2I%3D&amp;reser=
ved=3D0. This Email may contain confidential or privileged information for =
the intended recipient (s). If you are not the intended recipient, please d=
o not use or disseminate the information, notify the sender and delete it f=
rom your system.


L&T Technology Services Ltd

www.LTTS.com

L&T Technology Services Limited (LTTS) is committed to safeguard your data =
privacy. For more information to view our commitment towards data privacy u=
nder GDPR, please visit the privacy policy on our website www.Ltts.com. Thi=
s Email may contain confidential or privileged information for the intended=
 recipient (s). If you are not the intended recipient, please do not use or=
 disseminate the information, notify the sender and delete it from your sys=
tem.

--_000_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<style type=3D"text/css" style=3D"display:none;"> P {margin-top:0;margin-bo=
ttom:0;} </style>
</head>
<body dir=3D"ltr">
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Hi Bertrand,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Thank you for the reply.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">It seems that you host pyth=
on is used instead of the one compiled by Yocto.</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt"><br>
</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">With python2.7 also we are =
facing the same issue<br>
</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt"><br>
</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">- which version of Yocto yo=
u are using</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">&nbsp;&nbsp;&nbsp; poky-2.1=
.2<br>
</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt"><br>
</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">- what layers you included<=
/span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">&nbsp; meta-virtualization<=
/span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">&nbsp;Reference link: <a hr=
ef=3D"https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensio=
ns/Salvator-X" id=3D"LPlnk">
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/Sal=
vator-X</a><br>
</span></font></div>
<div class=3D"_Entity _EType_OWALinkPreview _EId_OWALinkPreview _EReadonly_=
1"></div>
<br>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">- what parameters did you s=
et in your local.conf</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">&nbsp;&nbsp; Please find th=
e attached local.conf for your reference<br>
</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
&nbsp; <br>
<font size=3D"2"><span style=3D"font-size:11pt"></span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<font size=3D"2"><span style=3D"font-size:11pt">- what image you are buildi=
ng ?</span></font></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
&nbsp; core-image-weston</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
when executing pygrub we are getting the below error:</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<pre><span style=3D"font-family: calibri, arial, helvetica, sans-serif; fon=
t-size: 12pt; color: rgb(0, 0, 0); background-color: rgba(0, 0, 0, 0);">Tra=
ceback (most recent call last):=0A=
&nbsp; &nbsp;File &quot;/usr/lib/xen/bin/pygrub&quot;, line 20, in &lt;modu=
le&gt;=0A=
&nbsp; &nbsp; &nbsp;import xen.lowlevel.xc=0A=
ImportError: No module named xen.lowlevel.xc<br></span><br></pre>
Thank you,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Deepthi<br>
</div>
<div id=3D"appendonsend"></div>
<hr style=3D"display:inline-block;width:98%" tabindex=3D"-1">
<div id=3D"divRplyFwdMsg" dir=3D"ltr"><font face=3D"Calibri, sans-serif" st=
yle=3D"font-size:11pt" color=3D"#000000"><b>From:</b> Bertrand Marquis &lt;=
Bertrand.Marquis@arm.com&gt;<br>
<b>Sent:</b> Thursday, February 11, 2021 4:49 PM<br>
<b>To:</b> Deepthi M. &lt;Deepthi.M@Ltts.com&gt;<br>
<b>Cc:</b> xen-users@lists.xenproject.org &lt;xen-users@lists.xenproject.or=
g&gt;; Pelluru VamsiKrishna &lt;Pelluru.VamsiKrishna@Ltts.com&gt;<br>
<b>Subject:</b> Re: Error while building Xen</font>
<div>&nbsp;</div>
</div>
<div class=3D"BodyFragment"><font size=3D"2"><span style=3D"font-size:11pt;=
">
<div class=3D"PlainText">Hi Deepthi,<br>
<br>
&gt; On 5 Feb 2021, at 06:56, Deepthi M. &lt;Deepthi.M@Ltts.com&gt; wrote:<=
br>
&gt; <br>
&gt; Hi all,<br>
&gt; <br>
&gt; I am trying to build Xen in Yocto environment for Renesas R-car salvat=
or-xs board I am getting the following error<br>
&gt; <br>
&gt; | cc1: error: include location &quot;/usr/local/include/python3.9&quot=
; is unsafe for cross-compilation [-Werror=3Dpoison-system-directories] | c=
c1: all warnings being treated as errors | error: command '/home/user/xenrc=
ar/build/build/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64=
-poky-linux-gcc'
 failed with exit code 1 | Makefile:23: recipe for target 'install' failed =
| make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/user/x=
enrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC+5e7a=
a90440-r0/git/tools/python<br>
&gt; <br>
<br>
It seems that you host python is used instead of the one compiled by Yocto.=
<br>
<br>
Could you tell me:<br>
- which version of Yocto you are using<br>
- what layers you included<br>
- what parameters did you set in your local.conf<br>
- what image you are building ?<br>
<br>
Cheers<br>
Bertrand<br>
<br>
&gt; Please let me know how to fix the issue.<br>
&gt; Thank you,<br>
&gt; Deepthi<br>
&gt; <br>
&gt; L&amp;T Technology Services Ltd<br>
&gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%=
3A%2F%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b8=
7349f4a9e45bfbd3608d8ce7efd6a%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C=
637486392111439122%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DH4ODxnAnH5j4UY7gx=
oYVsggbwvLuwm1KrMAeLzdRd2I%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b87349f4a9e45bfbd3=
608d8ce7efd6a%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374863921114391=
22%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DH4ODxnAnH5j4UY7gxoYVsggbwvLuwm1Kr=
MAeLzdRd2I%3D&amp;amp;reserved=3D0</a><br>
&gt; L&amp;T Technology Services Limited (LTTS) is committed to safeguard y=
our data privacy. For more information to view our commitment towards data =
privacy under GDPR, please visit the privacy policy on our website
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F=
%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b87349f=
4a9e45bfbd3608d8ce7efd6a%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748=
6392111439122%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL=
CJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DH4ODxnAnH5j4UY7gxoYVsg=
gbwvLuwm1KrMAeLzdRd2I%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C5b87349f4a9e45bfbd3=
608d8ce7efd6a%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374863921114391=
22%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DH4ODxnAnH5j4UY7gxoYVsggbwvLuwm1Kr=
MAeLzdRd2I%3D&amp;amp;reserved=3D0</a>.
 This Email may contain confidential or privileged information for the inte=
nded recipient (s). If you are not the intended recipient, please do not us=
e or disseminate the information, notify the sender and delete it from your=
 system.<br>
<br>
</div>
</span></font></div>
<p><strong>L&amp;T Technology Services Ltd</strong></p>
<p><a href=3D"" http:=3D"" www.LTTS.com=3D"" ??=3D"" target=3D"" _blank??=
=3D"">www.LTTS.com</a></p>
<p>L&amp;T Technology Services Limited (LTTS) is committed to safeguard you=
r data privacy. For more information to view our commitment towards data pr=
ivacy under GDPR, please visit the privacy policy on our website www.Ltts.c=
om. This Email may contain confidential
 or privileged information for the intended recipient (s). If you are not t=
he intended recipient, please do not use or disseminate the information, no=
tify the sender and delete it from your system.</p>
</body>
</html>

--_000_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_--

--_004_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_
Content-Type: application/octet-stream; name="local.conf"
Content-Description: local.conf
Content-Disposition: attachment; filename="local.conf"; size=15241;
	creation-date="Thu, 11 Feb 2021 11:38:44 GMT";
	modification-date="Thu, 11 Feb 2021 11:40:19 GMT"
Content-Transfer-Encoding: base64
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--_004_MAXPR01MB3728F463BB960043413FA9DD888C9MAXPR01MB3728INDP_--


From xen-users-bounces@lists.xenproject.org Fri Feb 12 13:12:51 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 12 Feb 2021 13:12:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84252.157940 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAYF0-0003Je-Sk; Fri, 12 Feb 2021 13:12:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84252.157940; Fri, 12 Feb 2021 13:12:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAYF0-0003JW-Oe; Fri, 12 Feb 2021 13:12:10 +0000
Received: by outflank-mailman (input) for mailman id 84252;
 Fri, 12 Feb 2021 13:12:09 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8kir=HO=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1lAYEz-0003JR-6T
 for xen-users@lists.xenproject.org; Fri, 12 Feb 2021 13:12:09 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:fe0d::605])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id d2f5b64a-d3e1-40b8-8fff-34c09e63dada;
 Fri, 12 Feb 2021 13:12:07 +0000 (UTC)
Received: from DB7PR05CA0010.eurprd05.prod.outlook.com (2603:10a6:10:36::23)
 by AM6PR08MB5046.eurprd08.prod.outlook.com (2603:10a6:20b:eb::24) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.29; Fri, 12 Feb
 2021 13:12:04 +0000
Received: from DB5EUR03FT033.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:36:cafe::55) by DB7PR05CA0010.outlook.office365.com
 (2603:10a6:10:36::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend
 Transport; Fri, 12 Feb 2021 13:12:04 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT033.mail.protection.outlook.com (10.152.20.76) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 13:12:04 +0000
Received: ("Tessian outbound 587c3d093005:v71");
 Fri, 12 Feb 2021 13:12:04 +0000
Received: from 4429715965c0.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 F65B032D-D9DE-4DB3-AEC6-90781478FC5D.1; 
 Fri, 12 Feb 2021 13:11:58 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4429715965c0.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 12 Feb 2021 13:11:58 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com (2603:10a6:800:1ae::15)
 by VI1PR08MB2861.eurprd08.prod.outlook.com (2603:10a6:802:19::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.30; Fri, 12 Feb
 2021 13:11:57 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839]) by VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839%6]) with mapi id 15.20.3846.027; Fri, 12 Feb 2021
 13:11:56 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: d2f5b64a-d3e1-40b8-8fff-34c09e63dada
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QRSdccz3rBJQRI0Le4OHsf8MSvh6iFBWlT4FbOCJOsY=;
 b=WCvZ7Nha4jgwI3I9+M9Dpootku+GechPjrOmP4vb2sljb9dbdo3rVhAenh09aN73gEw9uumay5OCcKidTtEdvfvhS68wUGcp7jxnWlzKUox5sCxztz/Ot25Co+VJtT56/7YF6UVP87MGD7XmNJIJ3D0YalpDvUkDd0zR0aGj9E4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 840c278d6f942abd
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gGGFJhFtkkJ+74oiOtsF/snrgUO5fy7HsSsm7JC5g4cLshACh6DFCdTA22iuqbsXGmX9PLy1m3dJ7QJBBQ/8jUoM9hqHwenBnlXkRg76wMOKq74fjKBFH3qqAumB8aPOWlMUh8pouwy3UhN4kV6yelBJZPZc/YjU9AVGBGqO86wyZEaWrTkb+RDzdApqvopKmL/GRQ5n6VRiJM7ckq0JQCSxuXIr0e7T/EbExq21Hq14vLIsbdRLsjnOe+ysXF+cMjNEElsQ1XwRwsl7oAZuvjb5N+x6F0WsACUzFA05Olaqd+/9vm4aY+KH9j5oEpPpft/j7UTcDaaSwh6XbFUxRQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QRSdccz3rBJQRI0Le4OHsf8MSvh6iFBWlT4FbOCJOsY=;
 b=OOPukdE9oN+vRDxTdu+Zvvy7JuGlDjTCQE4jooLx71jZtRWtsQ0bsSMU7MOiZOxt2hX3vnxHc+tyVyTFDichSlcb6Bj8kgt7ooMbTYZcr8wDa0y9xhgj4HrLUQxoMtwpViCjJiW7OD4PZOrE7qtGeo9HiECb0IBCxS0Osgwb9o5/4ffhxVDB/Nn4WMM0Zdtoc+vSP39sunIDlZ2JfC8ZcIr2/HYRRVWMqmi1rwqpMFxCJtBhfgk1rMyOu92S5azaMud+2q098sl1S+WhwlUhu6ILmIY1+aTRwSMqVCFN4i1GSzr4HGSq4Gz6bEEqImt5WU2nIzlYMZoQVaXdKqGnjw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QRSdccz3rBJQRI0Le4OHsf8MSvh6iFBWlT4FbOCJOsY=;
 b=WCvZ7Nha4jgwI3I9+M9Dpootku+GechPjrOmP4vb2sljb9dbdo3rVhAenh09aN73gEw9uumay5OCcKidTtEdvfvhS68wUGcp7jxnWlzKUox5sCxztz/Ot25Co+VJtT56/7YF6UVP87MGD7XmNJIJ3D0YalpDvUkDd0zR0aGj9E4=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Deepthi M. <Deepthi.M@Ltts.com>
CC: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>, Pelluru
 VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen
Thread-Topic: Error while building Xen
Thread-Index: AQHW+4uAsZ6jkEYxj0+EtD1UXa6EjapS2G+AgAAAzIeAAAw7AIABoGZngAAEUoA=
Date: Fri, 12 Feb 2021 13:11:56 +0000
Message-ID: <7E6D2E68-2ADB-4F1B-B261-6371A8299615@arm.com>
References:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
 <676DEE4D-C43E-479F-8249-4DC255D5083D@arm.com>
 <MAXPR01MB3728F463BB960043413FA9DD888C9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
 <67E6CA97-9204-4F6A-9C21-487255F37AAB@arm.com>
 <MAXPR01MB372830641860E82368720AFE888B9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
In-Reply-To:
 <MAXPR01MB372830641860E82368720AFE888B9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.120.23.2.4)
Authentication-Results-Original: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [86.26.33.241]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 08c3e925-dced-4b61-984a-08d8cf57cad2
x-ms-traffictypediagnostic: VI1PR08MB2861:|AM6PR08MB5046:
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB5046696487E02A44674838779D8B9@AM6PR08MB5046.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:7691;OLM:7691;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5696.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(376002)(396003)(346002)(366004)(136003)(39840400004)(26005)(55236004)(6486002)(83380400001)(186003)(36756003)(2906002)(66946007)(71200400001)(66446008)(8676002)(478600001)(45080400002)(91956017)(2616005)(6916009)(5660300002)(3480700007)(15974865002)(966005)(54906003)(53546011)(316002)(8936002)(6512007)(66476007)(6506007)(66556008)(33656002)(86362001)(4326008)(64756008)(76116006)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?6DXxAS3f/VG1XvRU9MhAolVKiJJp2NmCI6Rp7dkWOxXsdcM/PgfF11b3QFjV?=
 =?us-ascii?Q?iDUrd03DCNJ+y2YCQJfBoahfEDx/56xpyaf7+xfcWoOWpvsvnYeCA2eKoc21?=
 =?us-ascii?Q?cVhf6KKWtmwBR3zWeHiIdfXZFaSM7nemp5Rm5ss93z56k3yl56eahphzjZfu?=
 =?us-ascii?Q?Xd9inkNv7x+ZiDJTWS6HaPkhSo8EVz9OAj55ADZlPGr0Q4oj8Ms7uEgqDR+2?=
 =?us-ascii?Q?wxln5CjSay72sfZSMhgUrEDOWLkfiMITJAA/Wz0yoLoW3JgE12Mj9JnST0dB?=
 =?us-ascii?Q?5/tNFpoSpjlkqUsUPdqt+W+NrfhNA8m3DjmIpiok9xb6d34YIh5tjufiNKlP?=
 =?us-ascii?Q?af6h/OhIFEtVwNnF6JEbqaQC5Suv4n7bcnzYsQ76V6iYNV1XJwSX7Dp5BhHM?=
 =?us-ascii?Q?HD1GarQiSKUEJpyYaMjvpO/YJDd0u0nxRk/D7t4h1qzcMXi746dcGnx3fXlh?=
 =?us-ascii?Q?cX+bmZyoFhu+9LMCI1hv7MIrPvH/P37l6kC/KWMUHXrVnRBVGwPVNIPjuL+U?=
 =?us-ascii?Q?B4ejqOZMs7Ys+Hy3NZM2PG4AqAqHEXofU5E+6dqmjZl44Jo1+FG75FcD3DV1?=
 =?us-ascii?Q?L+z5LeANCPOxJc1RSBNAS24ycYZ4ib1nYcdjawJLwZ3U6A3eKS5azY7fEuyl?=
 =?us-ascii?Q?e9fQGnXqUh592NCrZEzp8CiOvK+n3Y2wPW3/fjudmysNp8l8tPUmOwVZT+7B?=
 =?us-ascii?Q?BznGkIBZeR7FinDy4gPAtSy9r3rjaAC1/UmSGf2uRRD7WAaB7Pyi5xflShZF?=
 =?us-ascii?Q?utlynedlnDqltsINt/i2ywH4/OZZZ3XGDPrQ/mv2OxM8kD/t5xS40kysZdZP?=
 =?us-ascii?Q?hJ6Xwt9CwW+H0QNY4RN4/gC+w5YQohr5S0SNDziaUkC8WeF+sWbGn596XyNS?=
 =?us-ascii?Q?c0oL3q3rNTKBcZu3iSobb8C6JZLhnAJH/afBgHscev8941d0K1fDbPlOmMtT?=
 =?us-ascii?Q?dgUwYWK+1Bf0Ozear8hjKLPDJRbm7Uf2b4DZEQK2cDnlAoH2+q8byRV6D167?=
 =?us-ascii?Q?3Go2Z8MgJ59z+ZBuLcPyQKepr+wctBeft4sasTQKwgu4CvBMRJ9uqa/booPD?=
 =?us-ascii?Q?zVDSGyQO3Z++EO/84jZ8tY9Ywef6++eV7FAQlRIHRzkd7f6BS8934n4dDrT4?=
 =?us-ascii?Q?5CIKpGgp1Vou08MKeA1iC8BzAXTMon9au4Frgz8HcXgo0TptW1R0ldgLgrUN?=
 =?us-ascii?Q?AoxZh9dE+wELIYKue7Pj3Pn4h85lZhhQPv2JQH2tHyBm6hEfpCZ9fodTZako?=
 =?us-ascii?Q?zsPhRl3LhD1gekFfzbAoSPGdXZcNIBJQv/fOxXz4qsr4ET+nlUalNRdtADDn?=
 =?us-ascii?Q?6azY26Fb4s85vu+6pJrWauSj?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <C641AC842E72FF43BCCFC11559EEAB6B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB2861
Original-Authentication-Results: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT033.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	6ccc5853-c2f0-4156-4462-08d8cf57c65a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(376002)(346002)(396003)(39840400004)(136003)(36840700001)(46966006)(6512007)(107886003)(966005)(316002)(356005)(336012)(81166007)(8676002)(5660300002)(6486002)(54906003)(53546011)(70586007)(33656002)(26005)(6506007)(83380400001)(186003)(45080400002)(478600001)(4326008)(36756003)(70206006)(6862004)(36860700001)(8936002)(3480700007)(47076005)(15974865002)(55236004)(2906002)(86362001)(2616005)(82310400003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 13:12:04.4738
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 08c3e925-dced-4b61-984a-08d8cf57cad2
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT033.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB5046

Hi Deepthi,


> On 12 Feb 2021, at 13:01, Deepthi M. <Deepthi.M@Ltts.com> wrote:
>=20
> Hi Bertrand,
>=20
> I switched all the meta layers to Rocko but meta-demo/meta-rcar-gen3-xen =
is master branch. I got the following error.
>=20
> user@user-OptiPlex-7010:~/build/build$ bitbake core-image-weston
> Parsing recipes: 100% |##################################################=
#######################################################| Time: 0:01:45
> Parsing of 2104 .bb files complete (0 cached, 2104 parsed). 2925 targets,=
 91 skipped, 3 masked, 0 errors.
> ERROR: No recipes available for:
>   /home/user/build/meta-demo/meta-rcar-gen3-xen/recipes-kernel/linux/linu=
x-renesas_4.9.bbappend
>=20
> Summary: There was 1 ERROR message shown, returning a non-zero exit code.

It seems your meta-demo is dependent on an older kernel version.

You should try to contact the maintainer of this meta-demo layer or you wil=
l have to either try to:
- remove this bbappend as it could be that it is not needed anymore
- port the things it does to the current version of the linux-renesas

Cheers
Bertrand

>=20
> Thank you,
> Deepthi
> From: Bertrand Marquis <Bertrand.Marquis@arm.com>
> Sent: Thursday, February 11, 2021 5:36 PM
> To: Deepthi M. <Deepthi.M@Ltts.com>
> Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pell=
uru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
> Subject: Re: Error while building Xen
> =20
> Hi Deepthi,
>=20
> > On 11 Feb 2021, at 11:40, Deepthi M. <Deepthi.M@Ltts.com> wrote:
> >=20
> > Hi Bertrand,
> >=20
> > Thank you for the reply.
> >=20
> > It seems that you host python is used instead of the one compiled by Yo=
cto.
> >=20
> > With python2.7 also we are facing the same issue
> >=20
> > - which version of Yocto you are using
> >     poky-2.1.2
>=20
> This is a very old release (4 to 5 years old) and it is not supported any=
more.
>=20
> >=20
> > - what layers you included
> >   meta-virtualization
> >  Reference link: https://ind01.safelinks.protection.outlook.com/?url=3D=
https%3A%2F%2Fwiki.xenproject.org%2Fwiki%2FXen_ARM_with_Virtualization_Exte=
nsions%2FSalvator-X&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a77486=
14f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748642=
0581774632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D93VkIgXWUGA9hTX%2BQp0AFcaA%2B=
ILuDjagm1MtWDpBy6U%3D&amp;reserved=3D0
>=20
> Since this was written it could really be that Renesas updated their supp=
ort so you might try to check an newer version of the gen3 support:
> https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Felinu=
x.org%2FR-Car%2FBoards%2FYocto-Gen3%2Fv4.7.0&amp;data=3D04%7C01%7CDeepthi.M=
%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d=
8ba60a%7C0%7C0%7C637486420581774632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjA=
wMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DOlLF=
Qd3LzaKtkgHpn4n9PxCsum0MG2wMzD3AprOkzgQ%3D&amp;reserved=3D0
>=20
> and use the corresponding version of meta-virtualization.
>=20
> >=20
> > - what parameters did you set in your local.conf
> >    Please find the attached local.conf for your reference
> >  =20
> > - what image you are building ?
> >   core-image-weston
> >=20
> > when executing pygrub we are getting the below error:
> > Traceback (most recent call last):
> >    File "/usr/lib/xen/bin/pygrub", line 20, in <module>
> >      import xen.lowlevel.xc
> > ImportError: No module named xen.lowlevel.xc
>=20
> There are some patches for pygrub on meta-virtualization master that you =
might want to look at:
> https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgit.y=
octoproject.org%2Fcgit%2Fcgit.cgi%2Fmeta-virtualization%2Ftree%2Frecipes-ex=
tended%2Fxen%2Ffiles%2F0001-python-pygrub-pass-DISTUTILS-xen-4.14.patch&amp=
;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7=
C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581774632%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C2000&amp;sdata=3Dj%2FFqFJpy%2FrxM%2BHp0UkzIcZqKwpngJ5liyUv8K2Es6HQ%3D=
&amp;reserved=3D0
>=20
> Cheers
> Bertrand
>=20
> >=20
> >=20
> > Thank you,
> > Deepthi
> > From: Bertrand Marquis <Bertrand.Marquis@arm.com>
> > Sent: Thursday, February 11, 2021 4:49 PM
> > To: Deepthi M. <Deepthi.M@Ltts.com>
> > Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pe=
lluru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
> > Subject: Re: Error while building Xen
> > =20
> > Hi Deepthi,
> >=20
> > > On 5 Feb 2021, at 06:56, Deepthi M. <Deepthi.M@Ltts.com> wrote:
> > >=20
> > > Hi all,
> > >=20
> > > I am trying to build Xen in Yocto environment for Renesas R-car salva=
tor-xs board I am getting the following error
> > >=20
> > > | cc1: error: include location "/usr/local/include/python3.9" is unsa=
fe for cross-compilation [-Werror=3Dpoison-system-directories] | cc1: all w=
arnings being treated as errors | error: command '/home/user/xenrcar/build/=
build/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-lin=
ux-gcc' failed with exit code 1 | Makefile:23: recipe for target 'install' =
failed | make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home=
/user/xenrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOI=
NC+5e7aa90440-r0/git/tools/python
> > >=20
> >=20
> > It seems that you host python is used instead of the one compiled by Yo=
cto.
> >=20
> > Could you tell me:
> > - which version of Yocto you are using
> > - what layers you included
> > - what parameters did you set in your local.conf
> > - what image you are building ?
> >=20
> > Cheers
> > Bertrand
> >=20
> > > Please let me know how to fix the issue.
> > > Thank you,
> > > Deepthi
> > >=20
> > > L&T Technology Services Ltd
> > > https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fww=
w.ltts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199=
b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748642058177=
4632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik=
1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D4PogkihITi7467D6sCOMOMz2Na2d4wlUelO=
qxYxR%2F70%3D&amp;reserved=3D0
> > > L&T Technology Services Limited (LTTS) is committed to safeguard your=
 data privacy. For more information to view our commitment towards data pri=
vacy under GDPR, please visit the privacy policy on our website https://ind=
01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp=
;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7=
C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581784628%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C2000&amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZm5f4My%2BiJY%3D&amp=
;reserved=3D0. This Email may contain confidential or privileged informatio=
n for the intended recipient (s). If you are not the intended recipient, pl=
ease do not use or disseminate the information, notify the sender and delet=
e it from your system.
> >=20
> > L&T Technology Services Ltd
> > https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.=
ltts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6=
e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374864205817846=
28%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZm5f4=
My%2BiJY%3D&amp;reserved=3D0
> > L&T Technology Services Limited (LTTS) is committed to safeguard your d=
ata privacy. For more information to view our commitment towards data priva=
cy under GDPR, please visit the privacy policy on our website https://ind01=
.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;d=
ata=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C3=
11b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581784628%7CUnknown%7CTW=
FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3=
D%7C2000&amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZm5f4My%2BiJY%3D&amp;r=
eserved=3D0. This Email may contain confidential or privileged information =
for the intended recipient (s). If you are not the intended recipient, plea=
se do not use or disseminate the information, notify the sender and delete =
it from your system.
> > <local.conf>
>=20
> L&T Technology Services Ltd
> www.LTTS.com
> L&T Technology Services Limited (LTTS) is committed to safeguard your dat=
a privacy. For more information to view our commitment towards data privacy=
 under GDPR, please visit the privacy policy on our website www.Ltts.com. T=
his Email may contain confidential or privileged information for the intend=
ed recipient (s). If you are not the intended recipient, please do not use =
or disseminate the information, notify the sender and delete it from your s=
ystem.



From xen-users-bounces@lists.xenproject.org Sat Feb 13 07:51:09 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 13 Feb 2021 07:51:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84515.158549 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAph8-0004Jl-RN; Sat, 13 Feb 2021 07:50:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84515.158549; Sat, 13 Feb 2021 07:50:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAph8-0004Je-OL; Sat, 13 Feb 2021 07:50:22 +0000
Received: by outflank-mailman (input) for mailman id 84515;
 Sat, 13 Feb 2021 07:50:21 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ptQF=HP=ca-zephyr.org=bill@srs-us1.protection.inumbo.net>)
 id 1lAph7-0004JZ-BH
 for xen-users@lists.xenproject.org; Sat, 13 Feb 2021 07:50:21 +0000
Received: from portola.ca-zephyr.org (unknown [166.84.7.202])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id df6a86ae-4876-415c-8405-84d74ab91c1d;
 Sat, 13 Feb 2021 07:50:20 +0000 (UTC)
Received: from webmail.ca-zephyr.org (shelter-3.ca-zephyr.org [50.247.112.108])
 by portola.ca-zephyr.org (Postfix) with ESMTP id 3EE4E4013F
 for <xen-users@lists.xenproject.org>; Sat, 13 Feb 2021 02:50:18 -0500 (EST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: df6a86ae-4876-415c-8405-84d74ab91c1d
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: 7bit
Date: Fri, 12 Feb 2021 23:50:18 -0800
From: Bill MacAllister <bill@ca-zephyr.org>
To: xen-users@lists.xenproject.org
Subject: xen domu problems
Message-ID: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
X-Sender: bill@ca-zephyr.org
User-Agent: Roundcube Webmail/1.3.16

I am working on using FAI to build domU's.  I thought I was had it 
figured out
but when I went to stamp out my work with chef I found that only my test 
system
was building bootable VMs.  On the failing Xen servers the build is 
successful
but when I attempt to boot the system I get the following errors.

# /usr/sbin/xl create /etc/xen/zoot-lab-2.domain.com.cfg
Parsing config from /etc/xen/zoot-lab-2.corp.domain.com.cfg
xc: error: panic: xc_dom_core.c:208: failed to open file 
'/boot/vmlinuz': No such file or directory: Internal error

The relevant part of zoot-lab-2.domain.com.cfg is:

kernel      = '/boot/vmlinuz'
ramdisk     = '/boot/initrd.img'
root        = '/dev/xvda1 ro'
disk        = [
                   
'phy:/dev/vg_xen/zoot-lab-2.corp.dropbox.com-disk,xvda1,w',
               ]

The error seems to indicate that it cannot find the disk or the kernel.  
When I
mount the disk I can see /boot/vmlinuz and /boot/init.img on both the 
working
and the failing systems.

The Xen hypervisors are build on Ubuntu Bionic (18.04) with Xen 4.9.  
The
stock Xen delivery from Ubuntu.  The VM I am building is Ubuntu Focal 
(20.04).

There is something I am missing and I could use some suggestions about 
what I
should be looking for.

Thanks in advance,

Bill

-- 
Bill MacAllister <bill@ca-zephyr.org>


From xen-users-bounces@lists.xenproject.org Sat Feb 13 14:29:05 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 13 Feb 2021 14:29:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84603.158680 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAvuJ-0007B2-4W; Sat, 13 Feb 2021 14:28:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84603.158680; Sat, 13 Feb 2021 14:28:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lAvuJ-0007Au-11; Sat, 13 Feb 2021 14:28:23 +0000
Received: by outflank-mailman (input) for mailman id 84603;
 Sat, 13 Feb 2021 14:28:21 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hP5F=HP=rz-online.de=manfred.haertel@srs-us1.protection.inumbo.net>)
 id 1lAvuH-0007Ap-56
 for xen-users@lists.xenproject.org; Sat, 13 Feb 2021 14:28:21 +0000
Received: from mx1.isp.ktk.de (unknown [82.115.96.228])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id db1640d8-d129-422e-9e46-a6446f8eef09;
 Sat, 13 Feb 2021 14:28:19 +0000 (UTC)
Received: from donald.local (p57b6570e.dip0.t-ipconnect.de [87.182.87.14])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by mx1.isp.ktk.de (Postfix) with ESMTPSA id 4DdCQT523xzRk31
 for <xen-users@lists.xenproject.org>; Sat, 13 Feb 2021 15:28:17 +0100 (CET)
Received: from [192.168.1.13] (work.donald.local [192.168.1.13])
 by donald.local (Postfix) with ESMTP id C6241A0766
 for <xen-users@lists.xenproject.org>; Sat, 13 Feb 2021 15:25:37 +0100 (CET)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: db1640d8-d129-422e-9e46-a6446f8eef09
Subject: Re: xen domu problems
To: xen-users@lists.xenproject.org
References: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
From: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
Message-ID: <5a37235e-fdf0-632d-e829-b41da2931758@rz-online.de>
Date: Sat, 13 Feb 2021 15:25:36 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101
 Firefox/60.0 SeaMonkey/2.53.5.1
MIME-Version: 1.0
In-Reply-To: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Bill MacAllister schrieb:

> # /usr/sbin/xl create /etc/xen/zoot-lab-2.domain.com.cfg
> Parsing config from /etc/xen/zoot-lab-2.corp.domain.com.cfg
> xc: error: panic: xc_dom_core.c:208: failed to open file 
> '/boot/vmlinuz': No such file or directory: Internal error
> 
> The relevant part of zoot-lab-2.domain.com.cfg is:
> 
> kernel      = '/boot/vmlinuz'
> ramdisk     = '/boot/initrd.img'
> root        = '/dev/xvda1 ro'
> disk        = [
> 'phy:/dev/vg_xen/zoot-lab-2.corp.dropbox.com-disk,xvda1,w',
>                ]

Using this configuration you advise Xen to find the kernel at 
/boot/vmlinuz on the *host*, not inside the disk image. The same thing 
applies to the ramdisk.

In addition, your root specification should only contain the device, and 
extra parameters (if needed) go to extra = 'ro'.

-- 
Manfred Härtel, DB3HM    mailto:Manfred.Haertel@rz-online.de
                          http://rz-home.de/mhaertel


From xen-users-bounces@lists.xenproject.org Sun Feb 14 08:22:33 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Feb 2021 08:22:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84806.159042 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBCf3-0007LM-0i; Sun, 14 Feb 2021 08:21:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84806.159042; Sun, 14 Feb 2021 08:21:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBCf2-0007LE-Tr; Sun, 14 Feb 2021 08:21:44 +0000
Received: by outflank-mailman (input) for mailman id 84806;
 Sun, 14 Feb 2021 08:21:43 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TzrP=HQ=ca-zephyr.org=bill@srs-us1.protection.inumbo.net>)
 id 1lBCf1-0007L9-HV
 for xen-users@lists.xenproject.org; Sun, 14 Feb 2021 08:21:43 +0000
Received: from portola.ca-zephyr.org (unknown [166.84.7.202])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTP
 id c5f8bbae-661f-4280-87c9-f5d3cb7be40c;
 Sun, 14 Feb 2021 08:21:42 +0000 (UTC)
Received: from webmail.ca-zephyr.org (shelter-3.ca-zephyr.org [50.247.112.108])
 by portola.ca-zephyr.org (Postfix) with ESMTP id 875F040134
 for <xen-users@lists.xenproject.org>; Sun, 14 Feb 2021 03:21:41 -0500 (EST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: c5f8bbae-661f-4280-87c9-f5d3cb7be40c
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: 7bit
Date: Sun, 14 Feb 2021 00:21:40 -0800
From: Bill MacAllister <bill@ca-zephyr.org>
To: xen-users@lists.xenproject.org
Subject: Re: xen domu problems
In-Reply-To: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
References: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
Message-ID: <552eeff4eddfe6ea30e5bd7cb32d8c90@ca-zephyr.org>
X-Sender: bill@ca-zephyr.org
User-Agent: Roundcube Webmail/1.3.16

On 2021-02-12 23:50, Bill MacAllister wrote:
> I am working on using FAI to build domU's.  I thought I was had it 
> figured out
> but when I went to stamp out my work with chef I found that only my 
> test system
> was building bootable VMs.  On the failing Xen servers the build is 
> successful
> but when I attempt to boot the system I get the following errors.
> 
> # /usr/sbin/xl create /etc/xen/zoot-lab-2.domain.com.cfg
> Parsing config from /etc/xen/zoot-lab-2.corp.domain.com.cfg
> xc: error: panic: xc_dom_core.c:208: failed to open file
> '/boot/vmlinuz': No such file or directory: Internal error
> 
> The relevant part of zoot-lab-2.domain.com.cfg is:
> 
> kernel      = '/boot/vmlinuz'
> ramdisk     = '/boot/initrd.img'
> root        = '/dev/xvda1 ro'
> disk        = [
>                   
> 'phy:/dev/vg_xen/zoot-lab-2.corp.dropbox.com-disk,xvda1,w',
>               ]
> 
> The error seems to indicate that it cannot find the disk or the kernel. 
>  When I
> mount the disk I can see /boot/vmlinuz and /boot/init.img on both the 
> working
> and the failing systems.
> 
> The Xen hypervisors are build on Ubuntu Bionic (18.04) with Xen 4.9.  
> The
> stock Xen delivery from Ubuntu.  The VM I am building is Ubuntu Focal 
> (20.04).
> 
> There is something I am missing and I could use some suggestions about 
> what I
> should be looking for.

I having been staring at this problem for days now and I just don't see 
it.
Last thing I tried was to build a VM on the "failing" hypervisor, 
confirm
that it would not boot, move it to the "working hypervisor", and confirm 
that
it would boot.  So, that argues that the build is fine.  It is something 
I
am not getting correct in the hypervisor configuration.  I could really 
use
some suggestions for things to try.

Bill

-- 
Bill MacAllister <bill@ca-zephyr.org>


From xen-users-bounces@lists.xenproject.org Sun Feb 14 08:53:15 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Feb 2021 08:53:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84825.159068 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBD9J-0001ld-Mh; Sun, 14 Feb 2021 08:53:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84825.159068; Sun, 14 Feb 2021 08:53:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBD9J-0001lV-IN; Sun, 14 Feb 2021 08:53:01 +0000
Received: by outflank-mailman (input) for mailman id 84825;
 Sun, 14 Feb 2021 08:53:00 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=OakY=HQ=strugglers.net=andy@srs-us1.protection.inumbo.net>)
 id 1lBD9I-0001lP-9E
 for xen-users@lists.xenproject.org; Sun, 14 Feb 2021 08:53:00 +0000
Received: from mail.bitfolk.com (unknown [2001:ba8:1f1:f019::25])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 8be7c5c6-3bb4-46cc-8e32-e50aeba6e843;
 Sun, 14 Feb 2021 08:52:58 +0000 (UTC)
Received: from andy by mail.bitfolk.com with local (Exim 4.84_2)
 (envelope-from <andy@strugglers.net>) id 1lBD9F-0001nY-VK
 for xen-users@lists.xenproject.org; Sun, 14 Feb 2021 08:52:57 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 8be7c5c6-3bb4-46cc-8e32-e50aeba6e843
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com; s=alpha;
	h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date; bh=CPY0TybgSoaR5fphOMC3W/dh6BfPkmF2f6kFe4xhgNI=;
	b=leNsd/7tdTHnrdoVUK3kKI0lD1wGpifbZ3jnIY2xUOXnPMSJiccJCYfPEjJhWNAyq/QbNj61TgMga28h0wpL0W4vJBeL32GhuYSSNgy7hwwBL4/QBSGAdQ7YaES4fI4cE7A9jMdOFSI5nmQjAmjvGVWu1IgIrmftXaJCm0jDduJPpLTtW9mhNTUf1EVLFxTrwO2Tnz+b3u4J7clAEvmd35bdQtExPRCmUJN8wETDNy8awCoKxT01jJW//kUVFUkWn7syjvSzr+Y9BM3Dash9C/5eI71tzp94I4KIhchea+kaQ+fAbIiMN4ahinfPlTBopj+5VuKovj/yDUDOlah1hA==;
Date: Sun, 14 Feb 2021 08:52:57 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-users@lists.xenproject.org
Subject: Re: xen domu problems
Message-ID: <20210214085257.GJ3712@bitfolk.com>
References: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
 <552eeff4eddfe6ea30e5bd7cb32d8c90@ca-zephyr.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <552eeff4eddfe6ea30e5bd7cb32d8c90@ca-zephyr.org>
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: Mutt/1.5.23 (2014-03-12)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false

Hi Bill,

On Sun, Feb 14, 2021 at 12:21:40AM -0800, Bill MacAllister wrote:
> It is something I am not getting correct in the hypervisor
> configuration.  I could really use some suggestions for things to
> try.

Did you read Manfred's answer? It is correct as far as I can see:
your kernel and initrd probably don't exist in the *host* (dom0).

You should consider using a bootloader like pvgrub2 or pygrub so
that you can use the boot configuration of the domU.

Note that from 20.04, Ubuntu switched to LZ4-compressed kernels and
unless you have a very recent version of Xen it won't be able to
decompress these for direct kernel boot. From Ubuntu 20.04 you can
use PVH mode and pvhgrub on any version of Xen that supports PVH
mode.

Cheers,
Andy


From xen-users-bounces@lists.xenproject.org Sun Feb 14 16:42:58 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Feb 2021 16:42:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84945.159217 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBKTH-0002Rt-N7; Sun, 14 Feb 2021 16:42:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84945.159217; Sun, 14 Feb 2021 16:42:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBKTH-0002Rl-Jv; Sun, 14 Feb 2021 16:42:07 +0000
Received: by outflank-mailman (input) for mailman id 84945;
 Sun, 14 Feb 2021 16:42:06 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TzrP=HQ=ca-zephyr.org=bill@srs-us1.protection.inumbo.net>)
 id 1lBKTF-0002Rg-Vz
 for xen-users@lists.xenproject.org; Sun, 14 Feb 2021 16:42:06 +0000
Received: from portola.ca-zephyr.org (unknown [166.84.7.202])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id cec30162-9156-46ce-93d9-a0abf594afc3;
 Sun, 14 Feb 2021 16:42:05 +0000 (UTC)
Received: from webmail.ca-zephyr.org (shelter-3.ca-zephyr.org [50.247.112.108])
 by portola.ca-zephyr.org (Postfix) with ESMTP id CFFBD4013F;
 Sun, 14 Feb 2021 11:42:03 -0500 (EST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: cec30162-9156-46ce-93d9-a0abf594afc3
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8;
 format=flowed
Content-Transfer-Encoding: 8bit
Date: Sun, 14 Feb 2021 08:42:03 -0800
From: Bill MacAllister <bill@ca-zephyr.org>
To: "Manfred Haertel, DB3HM" <Manfred.Haertel@rz-online.de>
Cc: xen-users@lists.xenproject.org
Subject: Re: xen domu problems
In-Reply-To: <5a37235e-fdf0-632d-e829-b41da2931758@rz-online.de>
References: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
 <5a37235e-fdf0-632d-e829-b41da2931758@rz-online.de>
Message-ID: <2bd9a7cd90928462868cfefda2180c8c@ca-zephyr.org>
X-Sender: bill@ca-zephyr.org
User-Agent: Roundcube Webmail/1.3.16

On 2021-02-13 06:25, Manfred Haertel, DB3HM wrote:
> Bill MacAllister schrieb:
> 
>> # /usr/sbin/xl create /etc/xen/zoot-lab-2.domain.com.cfg
>> Parsing config from /etc/xen/zoot-lab-2.corp.domain.com.cfg
>> xc: error: panic: xc_dom_core.c:208: failed to open file 
>> '/boot/vmlinuz': No such file or directory: Internal error
>> 
>> The relevant part of zoot-lab-2.domain.com.cfg is:
>> 
>> kernel      = '/boot/vmlinuz'
>> ramdisk     = '/boot/initrd.img'
>> root        = '/dev/xvda1 ro'
>> disk        = [
>> 'phy:/dev/vg_xen/zoot-lab-2.corp.dropbox.com-disk,xvda1,w',
>>                ]
> 
> Using this configuration you advise Xen to find the kernel at
> /boot/vmlinuz on the *host*, not inside the disk image. The same thing
> applies to the ramdisk.
> 
> In addition, your root specification should only contain the device,
> and extra parameters (if needed) go to extra = 'ro'.

Thanks Manfred.  That explains my mistakes.

Bill

-- 
Bill MacAllister <bill@ca-zephyr.org>


From xen-users-bounces@lists.xenproject.org Sun Feb 14 16:43:21 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Feb 2021 16:43:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84952.159235 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBKUQ-0002ZK-5f; Sun, 14 Feb 2021 16:43:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84952.159235; Sun, 14 Feb 2021 16:43:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBKUQ-0002ZC-29; Sun, 14 Feb 2021 16:43:18 +0000
Received: by outflank-mailman (input) for mailman id 84952;
 Sun, 14 Feb 2021 16:43:17 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TzrP=HQ=ca-zephyr.org=bill@srs-us1.protection.inumbo.net>)
 id 1lBKUP-0002Z7-B9
 for xen-users@lists.xenproject.org; Sun, 14 Feb 2021 16:43:17 +0000
Received: from portola.ca-zephyr.org (unknown [166.84.7.202])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTP
 id 41e2f8ce-ca9c-4fdc-86c7-7a62c28f245c;
 Sun, 14 Feb 2021 16:43:16 +0000 (UTC)
Received: from webmail.ca-zephyr.org (shelter-3.ca-zephyr.org [50.247.112.108])
 by portola.ca-zephyr.org (Postfix) with ESMTP id DD0DB4013F;
 Sun, 14 Feb 2021 11:43:15 -0500 (EST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 41e2f8ce-ca9c-4fdc-86c7-7a62c28f245c
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: 7bit
Date: Sun, 14 Feb 2021 08:43:15 -0800
From: Bill MacAllister <bill@ca-zephyr.org>
To: Andy Smith <andy@strugglers.net>
Cc: xen-users@lists.xenproject.org
Subject: Re: xen domu problems
In-Reply-To: <20210214085257.GJ3712@bitfolk.com>
References: <928a9fc54eaa44c7bf9a11e7143af125@ca-zephyr.org>
 <552eeff4eddfe6ea30e5bd7cb32d8c90@ca-zephyr.org>
 <20210214085257.GJ3712@bitfolk.com>
Message-ID: <0185ac75421a93554001713096258a03@ca-zephyr.org>
X-Sender: bill@ca-zephyr.org
User-Agent: Roundcube Webmail/1.3.16

On 2021-02-14 00:52, Andy Smith wrote:
> Hi Bill,
> 
> Did you read Manfred's answer? It is correct as far as I can see:
> your kernel and initrd probably don't exist in the *host* (dom0).

I am embarrassed to say that I missed it in the trash dump that is
my inbox.  Apologies Manfred and thanks for your quick response.
Manfred's response certainly explained the problem clearly.

> You should consider using a bootloader like pvgrub2 or pygrub so
> that you can use the boot configuration of the domU.
> 
> Note that from 20.04, Ubuntu switched to LZ4-compressed kernels and
> unless you have a very recent version of Xen it won't be able to
> decompress these for direct kernel boot. From Ubuntu 20.04 you can
> use PVH mode and pvhgrub on any version of Xen that supports PVH
> mode.

Yes, the 20.04 problem is why I started down the road of using FAI
to build the VMs.  I was having problems getting xen tools to build
bootable 20.04 domu.  Likely my own problem, but I am a lot more
familiar with FAI then xen-tools.  Thanks for helping get moving
again.  In spite of the fact that I wear glasses I often find that
4 eyes is not enough for me to see what is in front of my face.

Thanks,

Bill

-- 
Bill MacAllister <bill@ca-zephyr.org>


From xen-users-bounces@lists.xenproject.org Mon Feb 15 11:02:44 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Feb 2021 11:02:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.85162.159684 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBbdo-0004Mr-Gi; Mon, 15 Feb 2021 11:02:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 85162.159684; Mon, 15 Feb 2021 11:02:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBbdo-0004Mj-Dh; Mon, 15 Feb 2021 11:02:08 +0000
Received: by outflank-mailman (input) for mailman id 85162;
 Mon, 15 Feb 2021 11:02:07 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=4tia=HR=alstadheim.priv.no=hakon@srs-us1.protection.inumbo.net>)
 id 1lBbdn-0004Me-7e
 for xen-users@lists.xenproject.org; Mon, 15 Feb 2021 11:02:07 +0000
Received: from asav21.altibox.net (unknown [109.247.116.8])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id f4f0921b-8ee8-4883-90dc-11aee05e42a6;
 Mon, 15 Feb 2021 11:02:04 +0000 (UTC)
Received: from postfix-relay.alstadheim.priv.no
 (148-252-98.210.3p.ntebredband.no [148.252.98.210])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 (Authenticated sender: hakon.alstadheim@ntebb.no)
 by asav21.altibox.net (Postfix) with ESMTPSA id 7A8AC80036
 for <xen-users@lists.xenproject.org>; Mon, 15 Feb 2021 12:02:03 +0100 (CET)
Received: from smtps.alstadheim.priv.no (localhost [127.0.0.1])
 by postfix-relay.alstadheim.priv.no (Postfix) with ESMTP id 909BD7AD0A00
 for <xen-users@lists.xenproject.org>; Mon, 15 Feb 2021 12:02:02 +0100 (CET)
Received: from [192.168.2.201] (unknown [192.168.2.201])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested) (Authenticated sender: hakon)
 by smtps.alstadheim.priv.no (Postfix) with ESMTPSA id 4E3597AD09C3
 for <xen-users@lists.xenproject.org>; Mon, 15 Feb 2021 12:02:02 +0100 (CET)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: f4f0921b-8ee8-4883-90dc-11aee05e42a6
X-Finnesikke-B-A-I-T: finnesikke@alstadheim.priv.no
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alstadheim.priv.no;
	s=smtp; t=1613386922;
	bh=4+TavXTHJZQNhemqoHmmIx7OxsuJyWwoWNnW0tNFnt0=;
	h=To:From:Subject:Date:From;
	b=Y72pkb7NOnpakJqwfs0VnDA28m2Z06O8T52waKRl40Rlxn1r8MLUKf1pj6FbN6sd5
	 K0gNz0Q3/jBIePB4s7Ehc1KrR99yTUx2MjvdYCe0rpqUnR7cBgfiCd24TQjWhg00ri
	 b7wE5L6R9CdB0LYXp+71E5f1TrHa9Gwd9yPLiXR8=
To: xen-users@lists.xenproject.org
From: =?UTF-8?Q?H=c3=a5kon_Alstadheim?= <hakon@alstadheim.priv.no>
Subject: Network stalls on domU under Xen-4.14.x
Message-ID: <2ff5d54e-28ed-a587-9701-b3991006e962@alstadheim.priv.no>
Date: Mon, 15 Feb 2021 12:02:02 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.7.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-CMAE-Score: 0
X-CMAE-Analysis: v=2.3 cv=Kb38TzQD c=1 sm=1 tr=0
	a=Ln9STfmRvcQJFdEeVvPm9g==:117 a=Ln9STfmRvcQJFdEeVvPm9g==:17
	a=IkcTkHD0fZMA:10 a=qa6Q16uM49sA:10 a=M51BFTxLslgA:10
	a=K3nTlziHg9XkhVt2tMwA:9 a=QEXdDO2ut3YA:10

I'm recently having total network stalls on some domUs . Dmesg on domU 
shows a number of lines like:

Feb 15 11:12:38 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:38 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:38 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:39 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:39 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:40 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:42 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:45 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:12:52 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 11:13:05 gt kernel: net eth0: rx->offset: 0, size: -1

On occasion, with the longer stalls (~ 5 minutes) I get:

Feb 15 09:29:04 gt kernel: net_ratelimit: 5 callbacks suppressed

I have tried this on xen 4.14.0, 4.14.1 and 4.14.2-pre, with various 
guest kernels ranging from linux-4.19.170 to the early 5.10.x kernels. 
Newer 5.10 kernels give me some other error,  to do with interrupts. 
Seems interrupts vectors point to La-La-Land, or else they are routed to 
the wrong CPU. I'm fairly certain I did not have this issue running 
Xen-4.14-staging with the earliest linux-5.10.x, but that had other 
issues. File-system corruption got me a week around christmas with the 
whole system down :- ( . Allowed me to learn how to use bacula from a 
grml rescue cd without a  catalog-database :-) .

The stalls happen under load (net or cpu, don't know which matters 
more). I can reliably reproduce if i run a lot of compilations& network 
fetches in the domu while simultaneously lanunching firefox and 
thunderbird. I have home mounted with nfs from the dom0, so lots of 
traffic when thunderbird and firefox launch.

On occation the stalls are caught by the kernel, and I get a 
stack-trace, but I guess those are consequences of the network stall, 
incidental to the real issue. like:

Feb 15 09:09:38 gt kernel:     status: r
Feb 15 09:09:38 gt kernel: net_ratelimit: 5 callbacks suppressed
Feb 15 09:09:38 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 09:09:38 gt root[45567]: ACPI event unhandled: jack/lineout 
LINEOUT unplug
Feb 15 09:09:38 gt root[45570]: ACPI event unhandled: jack/videoout 
VIDEOOUT unplug
Feb 15 09:09:44 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 09:09:57 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 09:10:01 gt CROND[45682]: (root) CMD (/usr/lib/sa/sa1 1 1)
Feb 15 09:10:23 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 09:11:17 gt kernel: net eth0: rx->offset: 0, size: -1
Feb 15 09:11:58 gt kernel: INFO: task IndexedDB #3:45442 blocked for 
more than 122 seconds.
Feb 15 09:11:58 gt kernel:       Not tainted 5.4.80-gentoo-r1-x86_64 #1
Feb 15 09:11:58 gt kernel: "echo 0 > 
/proc/sys/kernel/hung_task_timeout_secs" disables this message.
Feb 15 09:11:58 gt kernel: IndexedDB #3    D    0 45442   3451 0x00000000
Feb 15 09:11:58 gt kernel: Call Trace:
Feb 15 09:11:58 gt kernel:  __schedule+0x2a3/0x7a0
Feb 15 09:11:58 gt kernel:  ? nfs_pageio_complete+0xa8/0xf0
Feb 15 09:11:58 gt kernel:  schedule+0x34/0xa0
Feb 15 09:11:58 gt kernel:  io_schedule+0x3c/0x60
Feb 15 09:11:58 gt kernel:  wait_on_page_bit_common+0x125/0x330
Feb 15 09:11:58 gt kernel:  ? 
trace_event_raw_event_file_check_and_advance_wb_err+0xf0/0xf0
Feb 15 09:11:58 gt kernel:  __filemap_fdatawait_range+0x7b/0xe0
Feb 15 09:11:58 gt kernel:  file_write_and_wait_range+0x67/0x90
Feb 15 09:11:58 gt kernel:  nfs_file_fsync+0x83/0x190
Feb 15 09:11:58 gt kernel:  __x64_sys_fsync+0x2f/0x60
Feb 15 09:11:58 gt kernel:  do_syscall_64+0x51/0x130
Feb 15 09:11:58 gt kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9
Feb 15 09:11:58 gt kernel: RIP: 0033:0x7f4db9580e1b
Feb 15 09:11:58 gt kernel: Code: Bad RIP value.
Feb 15 09:11:58 gt kernel: RSP: 002b:00007f4d9b4b4d50 EFLAGS: 00000293 
ORIG_RAX: 000000000000004a
Feb 15 09:11:58 gt kernel: RAX: ffffffffffffffda RBX: 00007f4d9f2abd28 
RCX: 00007f4db9580e1b
Feb 15 09:11:58 gt kernel: RDX: 0000000000000002 RSI: 0000000000000002 
RDI: 0000000000000072
Feb 15 09:11:58 gt kernel: RBP: 0000000000000002 R08: 0000000000000000 
R09: 00007f4d9b4b4d70
Feb 15 09:11:58 gt kernel: R10: 0000000000000000 R11: 0000000000000293 
R12: 00000000000001f5
Feb 15 09:11:59 gt kernel: R13: 00007f4d9f2abc70 R14: 0000000000000000 
R15: 00007f4da63774e0
---------

My xl info just now:

xl info
host                   : gentoo
release                : 5.4.97-gentoo-x86_64
version                : #1 SMP Wed Feb 10 16:43:41 CET 2021
machine                : x86_64
nr_cpus                : 12
max_cpu_id             : 11
nr_nodes               : 2
cores_per_socket       : 6
threads_per_core       : 1
cpu_mhz                : 2399.981
hw_caps                : 
bfebfbff:77fef3ff:2c100800:00000021:00000001:000037ab:00000000:00000100
virt_caps              : pv hvm hvm_directio pv_directio hap shadow 
iommu_hap_pt_share
total_memory           : 130953
free_memory            : 1551
sharing_freed_memory   : 0
sharing_used_memory    : 0
outstanding_claims     : 0
free_cpus              : 0
xen_major              : 4
xen_minor              : 14
xen_extra              : .2-pre
xen_version            : 4.14.2-pre
xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 
hvm-3.0-x86_32p hvm-3.0-x86_64
xen_scheduler          : credit2
xen_pagesize           : 4096
platform_params        : virt_start=0xffff800000000000
xen_changeset          :
xen_commandline        : xen.cfg xen-marker-51 console_timestamps=date 
iommu=1 com1=115200,8n1 console=com1 conswitch=lx 
cpufreq=xen:performance,verbose smt=0 maxcpus=12 core_parking=power 
nmi=dom0 gnttab_max_frames=512 gnttab_max_maptrack_frames=1024 
vcpu_migration_delay=2000 tickle_one_idle_cpu=1 spec-ctrl=no-xen 
sched=credit2 timer_slop=5000 max_cstate=2 dom0_mem=16G,max:16G 
dom0_max_vcpus=8 ept=exec_sp=1
cc_compiler            : gcc (Gentoo 9.3.0-r2 p4) 9.3.0
cc_compile_by          : hakon
cc_compile_domain      : alstadheim.priv.no
cc_compile_date        : Sat Feb 13 22:07:40 CET 2021
build_id               : d3fb26987b749da48c2549b12ba9ea4a
xend_config_format     : 4
0:root@gentoo xen-consoles #


P.S: I know I should do something about my dmarc set-up, so I can have a 
separate, unprotected "from:" address for posting to mailing-lists. 
Pointers to how-to appreciated.

---

Håkon





From xen-users-bounces@lists.xenproject.org Mon Feb 15 18:49:37 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Feb 2021 18:49:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84247.159962 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBivr-0004Op-PH; Mon, 15 Feb 2021 18:49:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84247.159962; Mon, 15 Feb 2021 18:49:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBivr-0004Oi-Kg; Mon, 15 Feb 2021 18:49:15 +0000
Received: by outflank-mailman (input) for mailman id 84247;
 Fri, 12 Feb 2021 13:02:07 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fc89=HO=ltts.com=deepthi.m@srs-us1.protection.inumbo.net>)
 id 1lAY5H-0002Iz-RH
 for xen-users@lists.xenproject.org; Fri, 12 Feb 2021 13:02:07 +0000
Received: from IND01-BO1-obe.outbound.protection.outlook.com (unknown
 [40.107.139.75]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id be1f0151-70be-4bbd-86e4-04047b0b9d8a;
 Fri, 12 Feb 2021 13:02:01 +0000 (UTC)
Received: from MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:64::11)
 by MAXPR01MB3471.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:6f::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.31; Fri, 12 Feb
 2021 13:01:56 +0000
Received: from MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::b2:d8b7:d9e1:536d]) by MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::b2:d8b7:d9e1:536d%4]) with mapi id 15.20.3846.027; Fri, 12 Feb 2021
 13:01:56 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: be1f0151-70be-4bbd-86e4-04047b0b9d8a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BvOMoQbfyqjonZvZMqgTEBuniYFfSvr09/bA+YR5YhMh/8BEBZLy7cr6w3FCrKCzKNQ46eghLvazSxxk7jCUucgmuUZJLF61q9U0K0WZwcK0t6mKvnwwfZiP3mfwspqsFdc7iPIrOSCYy4QayEu4fVcKRUIFCbDYBNVITBgMsKjn9ypNIyIwCOS2ztjdt8xDv8KfDjZ7kMTyOvrP2NCfG5++XE+kkxopatu2agJC+fDhQxzivfFBZCYn9gIpnHDHjISg0RWfq/vov1dLYBfg4eyC0t6GcmNcveGXhLMgCg/GtIjHqpixWu3ranicYoWO1b1lKQD3yvrbrqBIJQd7vA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2722QIZ2DLbsz8NjxOXNbeB7hNPUAUw5u1Z7ntDMp64=;
 b=GWY3+6pCrUXkZGlslFmaVuk3ljZPixNQeQV1i2Bm1tQy67RBIH9lafmb5KweQVYEdiAvUxo9gFMGC18IvhaLrajGZkKikz/MvIe55xiG03bhgD4DamHag7Cfjv9ccIfCY6CTyj0bwm3wHOZJuIhkonsdTiWmDpYlYy7RIpEfD0zEkA27HxyGxOe8Zi+zNFzO30d7K/c3UrDwIdJn8h7tnOffafJXkt35wejhIyC8ScUEJbpJD+Ah4+5q3YCBjCEuCh4TV5vRLJkMdhVP7ap4+yACzL1IZZ3UPC4blClyg27W9KGpokyj4gKk7Wl4uYVb2R8AIeK+baI0RAFAELVooQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=ltts.com; dmarc=pass action=none header.from=ltts.com;
 dkim=pass header.d=ltts.com; arc=none
From: Deepthi M. <Deepthi.M@Ltts.com>
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
CC: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>, Pelluru
 VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen
Thread-Topic: Error while building Xen
Thread-Index: AQHW+4uAsZ6jkEYxj0+EtD1UXa6EjapS2G+AgAAAzIeAAAw7AIABoGZn
Date: Fri, 12 Feb 2021 13:01:56 +0000
Message-ID:
 <MAXPR01MB372830641860E82368720AFE888B9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
References:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
 <676DEE4D-C43E-479F-8249-4DC255D5083D@arm.com>
 <MAXPR01MB3728F463BB960043413FA9DD888C9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>,<67E6CA97-9204-4F6A-9C21-487255F37AAB@arm.com>
In-Reply-To: <67E6CA97-9204-4F6A-9C21-487255F37AAB@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
 MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Enabled=True;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SiteId=311b3378-8e8a-4b5e-a33f-e80a3d8ba60a;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SetDate=2021-02-12T13:01:56.263Z;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Name=General;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_ContentBits=0;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Method=Standard;
authentication-results: arm.com; dkim=none (message not signed)
 header.d=none;arm.com; dmarc=none action=none header.from=Ltts.com;
x-originating-ip: [14.142.183.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c679d273-3d6b-499f-6b1e-08d8cf5660ad
x-ms-traffictypediagnostic: MAXPR01MB3471:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs:
 <MAXPR01MB34719CF2019C893DD2F44B35888B9@MAXPR01MB3471.INDPRD01.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(39850400004)(136003)(376002)(346002)(396003)(366004)(71200400001)(8936002)(26005)(33656002)(8676002)(83380400001)(9686003)(7696005)(478600001)(55016002)(86362001)(166002)(3480700007)(5660300002)(6916009)(107886003)(15974865002)(52536014)(6506007)(66946007)(66476007)(66556008)(64756008)(66446008)(54906003)(316002)(91956017)(2906002)(76116006)(186003)(53546011)(55236004)(966005)(4326008)(19627405001)(45080400002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?eB6ZBU72VEA5zYnbNyg9HFA559cH670byLb9yxuDn5mXc9bx9E6Rg/mAeDq+?=
 =?us-ascii?Q?99lc2ZQ6VkMgB0L08KJjBsXMjoAK0ksgZkMuaF+09qQQGp2kmbjKYDm/1Geh?=
 =?us-ascii?Q?XsZdwH1fKfmvJOwOGpNzBGymh+/aECp4z1UxIM3Xl7X1PzK1pnWw44Ubaf1t?=
 =?us-ascii?Q?o2MmN4blStXK5/CLzv0QwjzpZT/s+59NW7hemZBT0+ltBGRqMl2l4Jg9PXuj?=
 =?us-ascii?Q?sTQiJ19RfEhJb2DfVkoVszSsVkCnb6b165L8jjSjHqqLIlMBQyofDPwJFo/h?=
 =?us-ascii?Q?e3BBIAh6yoLESijSMlnqjMHDpYtRuIfengTlleotizatVbgMeDxUPeWIKKhC?=
 =?us-ascii?Q?5Jlb2m31JvKc2IqYysX/y23qJ3fm+XJ5NO4qOBEDpm6cITVTxMMaCJJpnmWu?=
 =?us-ascii?Q?fL1wlSQKxFDecD8tBAm0c9n3jJ2PZsladLHDBykzC9TznTR392y1rMBPVmkl?=
 =?us-ascii?Q?AmB6JgLzs1U0P6d23Wtb+vMyhNR2BOOKFoZiBci2FIFw3Dd6OYC4paG7ELzN?=
 =?us-ascii?Q?SQDXDsUPBppGiqcJQZBycjq0qaz6WEOSRtb1R6KHQ01Zliy9zSDw8Tgti5eq?=
 =?us-ascii?Q?QkHzTSUjKLbLh8YnQ17G6XYpt9S8COZONmisrtHLe5vsvAEwLv5KvdA6PEyX?=
 =?us-ascii?Q?TfV86g1IPzNbbUMfUR9b1o7t/8HIg7Ve+9WyvREeK3JyjydTOQhwv6rqbjgH?=
 =?us-ascii?Q?+za5lkKcutQ65MMWWZPftyM44nPUYcjL/Hct3r/vOcl3OMefSSMPbPfNGloa?=
 =?us-ascii?Q?NfRkr4O7H26T5t2FXLxC9m02DmDsXD1o1CMRBGkYODCEWZh66hZHYuyww3gG?=
 =?us-ascii?Q?BTC0hzoovAWT/XoAqrTJdD/n64bFHXJwh7lQ6MRbrm/Cmg6iQb1Ma7wtJ8zo?=
 =?us-ascii?Q?71EZpORghRsDkZ6VQoXf3ydkalfpeiCr292yaPFHFH5HAb/jGcItUzKJAYdc?=
 =?us-ascii?Q?XPrklSeJ/t/shDgDwfqWh4UaEclwr01HH/ghIjlfPtCYpBAAAMuvG8kt2+L+?=
 =?us-ascii?Q?SWaJFDoX94wCCCR7E/8DkfQJoW6ArwMFKEClKV5upk+7gyH5B7CFzOF6ccDL?=
 =?us-ascii?Q?VD84KLdAhIbtugxLMbrmK26DMj9ayUqvoQmdW3qUPWLugcLZqL+DAFYTBOBf?=
 =?us-ascii?Q?odW2xznS/jQ4BpFM3auaDpA+rqHXQP8aTgfcMQwXO5Dm2ToOCkXanTzkAxQt?=
 =?us-ascii?Q?HGCu2R3SWGpa0eZOczkSW5d8bbqkTKHVlYAUOp7noPYY8mpQaMFTk2sUQ1rj?=
 =?us-ascii?Q?ai/bdo/SsBILcu+GN+E11F5/zASNKDPZ8mJNGRyKR0l8O45sH3250nafi6KS?=
 =?us-ascii?Q?4ew=3D?=
Content-Type: multipart/alternative;
	boundary="_000_MAXPR01MB372830641860E82368720AFE888B9MAXPR01MB3728INDP_"
MIME-Version: 1.0
X-OriginatorOrg: ltts.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: c679d273-3d6b-499f-6b1e-08d8cf5660ad
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2021 13:01:56.8020
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 311b3378-8e8a-4b5e-a33f-e80a3d8ba60a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zh48/6LC61c/ZmDNnFykEpUKkBYCfOcZwpjyTvW5U/dNFVHP2KPLUF9q9RFWiJ+/NHivyOvyGYP4yVFQdppMlQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MAXPR01MB3471

--_000_MAXPR01MB372830641860E82368720AFE888B9MAXPR01MB3728INDP_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Bertrand,

I switched all the meta layers to Rocko but meta-demo/meta-rcar-gen3-xen is=
 master branch. I got the following error.

user@user-OptiPlex-7010:~/build/build$ bitbake core-image-weston
Parsing recipes: 100% |####################################################=
#####################################################| Time: 0:01:45
Parsing of 2104 .bb files complete (0 cached, 2104 parsed). 2925 targets, 9=
1 skipped, 3 masked, 0 errors.
ERROR: No recipes available for:
  /home/user/build/meta-demo/meta-rcar-gen3-xen/recipes-kernel/linux/linux-=
renesas_4.9.bbappend

Summary: There was 1 ERROR message shown, returning a non-zero exit code.

Thank you,
Deepthi
________________________________
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
Sent: Thursday, February 11, 2021 5:36 PM
To: Deepthi M. <Deepthi.M@Ltts.com>
Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pellur=
u VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen

Hi Deepthi,

> On 11 Feb 2021, at 11:40, Deepthi M. <Deepthi.M@Ltts.com> wrote:
>
> Hi Bertrand,
>
> Thank you for the reply.
>
> It seems that you host python is used instead of the one compiled by Yoct=
o.
>
> With python2.7 also we are facing the same issue
>
> - which version of Yocto you are using
>     poky-2.1.2

This is a very old release (4 to 5 years old) and it is not supported anymo=
re.

>
> - what layers you included
>   meta-virtualization
>  Reference link: https://ind01.safelinks.protection.outlook.com/?url=3Dht=
tps%3A%2F%2Fwiki.xenproject.org%2Fwiki%2FXen_ARM_with_Virtualization_Extens=
ions%2FSalvator-X&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614=
f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374864205=
81774632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTi=
I6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D93VkIgXWUGA9hTX%2BQp0AFcaA%2BIL=
uDjagm1MtWDpBy6U%3D&amp;reserved=3D0

Since this was written it could really be that Renesas updated their suppor=
t so you might try to check an newer version of the gen3 support:
https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Felinux.=
org%2FR-Car%2FBoards%2FYocto-Gen3%2Fv4.7.0&amp;data=3D04%7C01%7CDeepthi.M%4=
0ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8b=
a60a%7C0%7C0%7C637486420581774632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM=
DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DOlLFQd=
3LzaKtkgHpn4n9PxCsum0MG2wMzD3AprOkzgQ%3D&amp;reserved=3D0

and use the corresponding version of meta-virtualization.

>
> - what parameters did you set in your local.conf
>    Please find the attached local.conf for your reference
>
> - what image you are building ?
>   core-image-weston
>
> when executing pygrub we are getting the below error:
> Traceback (most recent call last):
>    File "/usr/lib/xen/bin/pygrub", line 20, in <module>
>      import xen.lowlevel.xc
> ImportError: No module named xen.lowlevel.xc

There are some patches for pygrub on meta-virtualization master that you mi=
ght want to look at:
https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgit.yoc=
toproject.org%2Fcgit%2Fcgit.cgi%2Fmeta-virtualization%2Ftree%2Frecipes-exte=
nded%2Fxen%2Ffiles%2F0001-python-pygrub-pass-DISTUTILS-xen-4.14.patch&amp;d=
ata=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C3=
11b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581774632%7CUnknown%7CTW=
FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3=
D%7C2000&amp;sdata=3Dj%2FFqFJpy%2FrxM%2BHp0UkzIcZqKwpngJ5liyUv8K2Es6HQ%3D&a=
mp;reserved=3D0

Cheers
Bertrand

>
>
> Thank you,
> Deepthi
> From: Bertrand Marquis <Bertrand.Marquis@arm.com>
> Sent: Thursday, February 11, 2021 4:49 PM
> To: Deepthi M. <Deepthi.M@Ltts.com>
> Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pell=
uru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
> Subject: Re: Error while building Xen
>
> Hi Deepthi,
>
> > On 5 Feb 2021, at 06:56, Deepthi M. <Deepthi.M@Ltts.com> wrote:
> >
> > Hi all,
> >
> > I am trying to build Xen in Yocto environment for Renesas R-car salvato=
r-xs board I am getting the following error
> >
> > | cc1: error: include location "/usr/local/include/python3.9" is unsafe=
 for cross-compilation [-Werror=3Dpoison-system-directories] | cc1: all war=
nings being treated as errors | error: command '/home/user/xenrcar/build/bu=
ild/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-linux=
-gcc' failed with exit code 1 | Makefile:23: recipe for target 'install' fa=
iled | make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/u=
ser/xenrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC=
+5e7aa90440-r0/git/tools/python
> >
>
> It seems that you host python is used instead of the one compiled by Yoct=
o.
>
> Could you tell me:
> - which version of Yocto you are using
> - what layers you included
> - what parameters did you set in your local.conf
> - what image you are building ?
>
> Cheers
> Bertrand
>
> > Please let me know how to fix the issue.
> > Thank you,
> > Deepthi
> >
> > L&T Technology Services Ltd
> > https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.=
ltts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6=
e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374864205817746=
32%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D4PogkihITi7467D6sCOMOMz2Na2d4wlUelOqx=
YxR%2F70%3D&amp;reserved=3D0
> > L&T Technology Services Limited (LTTS) is committed to safeguard your d=
ata privacy. For more information to view our commitment towards data priva=
cy under GDPR, please visit the privacy policy on our website https://ind01=
.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;d=
ata=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C3=
11b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581784628%7CUnknown%7CTW=
FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3=
D%7C2000&amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZm5f4My%2BiJY%3D&amp;r=
eserved=3D0. This Email may contain confidential or privileged information =
for the intended recipient (s). If you are not the intended recipient, plea=
se do not use or disseminate the information, notify the sender and delete =
it from your system.
>
> L&T Technology Services Ltd
> https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.lt=
ts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e0=
8d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581784628=
%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZm5f4My=
%2BiJY%3D&amp;reserved=3D0
> L&T Technology Services Limited (LTTS) is committed to safeguard your dat=
a privacy. For more information to view our commitment towards data privacy=
 under GDPR, please visit the privacy policy on our website https://ind01.s=
afelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;dat=
a=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C311=
b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581784628%7CUnknown%7CTWFp=
bGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%=
7C2000&amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZm5f4My%2BiJY%3D&amp;res=
erved=3D0. This Email may contain confidential or privileged information fo=
r the intended recipient (s). If you are not the intended recipient, please=
 do not use or disseminate the information, notify the sender and delete it=
 from your system.
> <local.conf>


L&T Technology Services Ltd

www.LTTS.com

L&T Technology Services Limited (LTTS) is committed to safeguard your data =
privacy. For more information to view our commitment towards data privacy u=
nder GDPR, please visit the privacy policy on our website www.Ltts.com. Thi=
s Email may contain confidential or privileged information for the intended=
 recipient (s). If you are not the intended recipient, please do not use or=
 disseminate the information, notify the sender and delete it from your sys=
tem.

--_000_MAXPR01MB372830641860E82368720AFE888B9MAXPR01MB3728INDP_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<style type=3D"text/css" style=3D"display:none;"> P {margin-top:0;margin-bo=
ttom:0;} </style>
</head>
<body dir=3D"ltr">
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Hi Bertrand,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
I switched all the meta layers to Rocko but meta-demo/meta-rcar-gen3-xen is=
 master branch. I got the following error.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
user@user-OptiPlex-7010:~/build/build$ bitbake core-image-weston
<div>Parsing recipes: 100% |###############################################=
##########################################################| Time: 0:01:45</=
div>
<div>Parsing of 2104 .bb files complete (0 cached, 2104 parsed). 2925 targe=
ts, 91 skipped, 3 masked, 0 errors.</div>
<div>ERROR: No recipes available for:</div>
<div>&nbsp; /home/user/build/meta-demo/meta-rcar-gen3-xen/recipes-kernel/li=
nux/linux-renesas_4.9.bbappend</div>
<div><br>
</div>
Summary: There was 1 ERROR message shown, returning a non-zero exit code.</=
div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Thank you,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Deepthi<br>
</div>
<div id=3D"appendonsend"></div>
<hr style=3D"display:inline-block;width:98%" tabindex=3D"-1">
<div id=3D"divRplyFwdMsg" dir=3D"ltr"><font face=3D"Calibri, sans-serif" st=
yle=3D"font-size:11pt" color=3D"#000000"><b>From:</b> Bertrand Marquis &lt;=
Bertrand.Marquis@arm.com&gt;<br>
<b>Sent:</b> Thursday, February 11, 2021 5:36 PM<br>
<b>To:</b> Deepthi M. &lt;Deepthi.M@Ltts.com&gt;<br>
<b>Cc:</b> xen-users@lists.xenproject.org &lt;xen-users@lists.xenproject.or=
g&gt;; Pelluru VamsiKrishna &lt;Pelluru.VamsiKrishna@Ltts.com&gt;<br>
<b>Subject:</b> Re: Error while building Xen</font>
<div>&nbsp;</div>
</div>
<div class=3D"BodyFragment"><font size=3D"2"><span style=3D"font-size:11pt;=
">
<div class=3D"PlainText">Hi Deepthi,<br>
<br>
&gt; On 11 Feb 2021, at 11:40, Deepthi M. &lt;Deepthi.M@Ltts.com&gt; wrote:=
<br>
&gt; <br>
&gt; Hi Bertrand,<br>
&gt; <br>
&gt; Thank you for the reply.<br>
&gt; <br>
&gt; It seems that you host python is used instead of the one compiled by Y=
octo.<br>
&gt; <br>
&gt; With python2.7 also we are facing the same issue<br>
&gt; <br>
&gt; - which version of Yocto you are using<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp; poky-2.1.2<br>
<br>
This is a very old release (4 to 5 years old) and it is not supported anymo=
re.<br>
<br>
&gt; <br>
&gt; - what layers you included<br>
&gt;&nbsp;&nbsp; meta-virtualization<br>
&gt;&nbsp; Reference link: <a href=3D"https://ind01.safelinks.protection.ou=
tlook.com/?url=3Dhttps%3A%2F%2Fwiki.xenproject.org%2Fwiki%2FXen_ARM_with_Vi=
rtualization_Extensions%2FSalvator-X&amp;amp;data=3D04%7C01%7CDeepthi.M%40l=
tts.com%7C87e14a7748614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba6=
0a%7C0%7C0%7C637486420581774632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDA=
iLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3D93Vk=
IgXWUGA9hTX%2BQp0AFcaA%2BILuDjagm1MtWDpBy6U%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwiki.xe=
nproject.org%2Fwiki%2FXen_ARM_with_Virtualization_Extensions%2FSalvator-X&a=
mp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce85=
7b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581774632%7CUnkn=
own%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXV=
CI6Mn0%3D%7C2000&amp;amp;sdata=3D93VkIgXWUGA9hTX%2BQp0AFcaA%2BILuDjagm1MtWD=
pBy6U%3D&amp;amp;reserved=3D0</a><br>
<br>
Since this was written it could really be that Renesas updated their suppor=
t so you might try to check an newer version of the gen3 support:<br>
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Felinux.org%2FR-Car%2FBoards%2FYocto-Gen3%2Fv4.7.0&amp;amp;data=3D04%7C0=
1%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C311b33788e8a4=
b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581774632%7CUnknown%7CTWFpbGZsb3d8ey=
JWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp=
;amp;sdata=3DOlLFQd3LzaKtkgHpn4n9PxCsum0MG2wMzD3AprOkzgQ%3D&amp;amp;reserve=
d=3D0">https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2F=
elinux.org%2FR-Car%2FBoards%2FYocto-Gen3%2Fv4.7.0&amp;amp;data=3D04%7C01%7C=
Deepthi.M%40ltts.com%7C87e14a7748614f199b6e08d8ce857b44%7C311b33788e8a4b5ea=
33fe80a3d8ba60a%7C0%7C0%7C637486420581774632%7CUnknown%7CTWFpbGZsb3d8eyJWIj=
oiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp=
;sdata=3DOlLFQd3LzaKtkgHpn4n9PxCsum0MG2wMzD3AprOkzgQ%3D&amp;amp;reserved=3D=
0</a><br>
<br>
and use the corresponding version of meta-virtualization.<br>
<br>
&gt; <br>
&gt; - what parameters did you set in your local.conf<br>
&gt;&nbsp;&nbsp;&nbsp; Please find the attached local.conf for your referen=
ce<br>
&gt;&nbsp;&nbsp; <br>
&gt; - what image you are building ?<br>
&gt;&nbsp;&nbsp; core-image-weston<br>
&gt; <br>
&gt; when executing pygrub we are getting the below error:<br>
&gt; Traceback (most recent call last):<br>
&gt;&nbsp;&nbsp;&nbsp; File &quot;/usr/lib/xen/bin/pygrub&quot;, line 20, i=
n &lt;module&gt;<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; import xen.lowlevel.xc<br>
&gt; ImportError: No module named xen.lowlevel.xc<br>
<br>
There are some patches for pygrub on meta-virtualization master that you mi=
ght want to look at:<br>
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Fgit.yoctoproject.org%2Fcgit%2Fcgit.cgi%2Fmeta-virtualization%2Ftree%2Fr=
ecipes-extended%2Fxen%2Ffiles%2F0001-python-pygrub-pass-DISTUTILS-xen-4.14.=
patch&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6e0=
8d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637486420581774632=
%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3Dj%2FFqFJpy%2FrxM%2BHp0UkzIcZqKwpngJ=
5liyUv8K2Es6HQ%3D&amp;amp;reserved=3D0">https://ind01.safelinks.protection.=
outlook.com/?url=3Dhttps%3A%2F%2Fgit.yoctoproject.org%2Fcgit%2Fcgit.cgi%2Fm=
eta-virtualization%2Ftree%2Frecipes-extended%2Fxen%2Ffiles%2F0001-python-py=
grub-pass-DISTUTILS-xen-4.14.patch&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltt=
s.com%7C87e14a7748614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a=
%7C0%7C0%7C637486420581774632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiL=
CJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3Dj%2FFq=
FJpy%2FrxM%2BHp0UkzIcZqKwpngJ5liyUv8K2Es6HQ%3D&amp;amp;reserved=3D0</a><br>
<br>
Cheers<br>
Bertrand<br>
<br>
&gt; <br>
&gt; <br>
&gt; Thank you,<br>
&gt; Deepthi<br>
&gt; From: Bertrand Marquis &lt;Bertrand.Marquis@arm.com&gt;<br>
&gt; Sent: Thursday, February 11, 2021 4:49 PM<br>
&gt; To: Deepthi M. &lt;Deepthi.M@Ltts.com&gt;<br>
&gt; Cc: xen-users@lists.xenproject.org &lt;xen-users@lists.xenproject.org&=
gt;; Pelluru VamsiKrishna &lt;Pelluru.VamsiKrishna@Ltts.com&gt;<br>
&gt; Subject: Re: Error while building Xen<br>
&gt;&nbsp; <br>
&gt; Hi Deepthi,<br>
&gt; <br>
&gt; &gt; On 5 Feb 2021, at 06:56, Deepthi M. &lt;Deepthi.M@Ltts.com&gt; wr=
ote:<br>
&gt; &gt; <br>
&gt; &gt; Hi all,<br>
&gt; &gt; <br>
&gt; &gt; I am trying to build Xen in Yocto environment for Renesas R-car s=
alvator-xs board I am getting the following error<br>
&gt; &gt; <br>
&gt; &gt; | cc1: error: include location &quot;/usr/local/include/python3.9=
&quot; is unsafe for cross-compilation [-Werror=3Dpoison-system-directories=
] | cc1: all warnings being treated as errors | error: command '/home/user/=
xenrcar/build/build/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aa=
rch64-poky-linux-gcc'
 failed with exit code 1 | Makefile:23: recipe for target 'install' failed =
| make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/user/x=
enrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC+5e7a=
a90440-r0/git/tools/python<br>
&gt; &gt; <br>
&gt; <br>
&gt; It seems that you host python is used instead of the one compiled by Y=
octo.<br>
&gt; <br>
&gt; Could you tell me:<br>
&gt; - which version of Yocto you are using<br>
&gt; - what layers you included<br>
&gt; - what parameters did you set in your local.conf<br>
&gt; - what image you are building ?<br>
&gt; <br>
&gt; Cheers<br>
&gt; Bertrand<br>
&gt; <br>
&gt; &gt; Please let me know how to fix the issue.<br>
&gt; &gt; Thank you,<br>
&gt; &gt; Deepthi<br>
&gt; &gt; <br>
&gt; &gt; L&amp;T Technology Services Ltd<br>
&gt; &gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3D=
http%3A%2F%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%=
7C87e14a7748614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7=
C0%7C637486420581774632%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3D4PogkihITi74=
67D6sCOMOMz2Na2d4wlUelOqxYxR%2F70%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6=
e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374864205817746=
32%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3D4PogkihITi7467D6sCOMOMz2Na2d4wlUe=
lOqxYxR%2F70%3D&amp;amp;reserved=3D0</a><br>
&gt; &gt; L&amp;T Technology Services Limited (LTTS) is committed to safegu=
ard your data privacy. For more information to view our commitment towards =
data privacy under GDPR, please visit the privacy policy on our website
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F=
%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a77=
48614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748=
6420581784628%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL=
CJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DEdjKj4LUFN0MIxq4FG1o58=
1Kxg82yzAsZm5f4My%2BiJY%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6=
e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374864205817846=
28%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZ=
m5f4My%2BiJY%3D&amp;amp;reserved=3D0</a>.
 This Email may contain confidential or privileged information for the inte=
nded recipient (s). If you are not the intended recipient, please do not us=
e or disseminate the information, notify the sender and delete it from your=
 system.<br>
&gt; <br>
&gt; L&amp;T Technology Services Ltd<br>
&gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%=
3A%2F%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e=
14a7748614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C=
637486420581784628%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DEdjKj4LUFN0MIxq4F=
G1o581Kxg82yzAsZm5f4My%2BiJY%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6=
e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374864205817846=
28%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZ=
m5f4My%2BiJY%3D&amp;amp;reserved=3D0</a><br>
&gt; L&amp;T Technology Services Limited (LTTS) is committed to safeguard y=
our data privacy. For more information to view our commitment towards data =
privacy under GDPR, please visit the privacy policy on our website
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F=
%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a77=
48614f199b6e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748=
6420581784628%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL=
CJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DEdjKj4LUFN0MIxq4FG1o58=
1Kxg82yzAsZm5f4My%2BiJY%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C87e14a7748614f199b6=
e08d8ce857b44%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374864205817846=
28%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C2000&amp;amp;sdata=3DEdjKj4LUFN0MIxq4FG1o581Kxg82yzAsZ=
m5f4My%2BiJY%3D&amp;amp;reserved=3D0</a>.
 This Email may contain confidential or privileged information for the inte=
nded recipient (s). If you are not the intended recipient, please do not us=
e or disseminate the information, notify the sender and delete it from your=
 system.<br>
&gt; &lt;local.conf&gt;<br>
<br>
</div>
</span></font></div>
<p><strong>L&amp;T Technology Services Ltd</strong></p>
<p><a href=3D"" http:=3D"" www.LTTS.com=3D"" ??=3D"" target=3D"" _blank??=
=3D"">www.LTTS.com</a></p>
<p>L&amp;T Technology Services Limited (LTTS) is committed to safeguard you=
r data privacy. For more information to view our commitment towards data pr=
ivacy under GDPR, please visit the privacy policy on our website www.Ltts.c=
om. This Email may contain confidential
 or privileged information for the intended recipient (s). If you are not t=
he intended recipient, please do not use or disseminate the information, no=
tify the sender and delete it from your system.</p>
</body>
</html>

--_000_MAXPR01MB372830641860E82368720AFE888B9MAXPR01MB3728INDP_--


From xen-users-bounces@lists.xenproject.org Mon Feb 15 18:49:37 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 15 Feb 2021 18:49:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.84290.159945 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBiva-0004Lu-CZ; Mon, 15 Feb 2021 18:48:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 84290.159945; Mon, 15 Feb 2021 18:48:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBiva-0004Lm-7d; Mon, 15 Feb 2021 18:48:58 +0000
Received: by outflank-mailman (input) for mailman id 84290;
 Fri, 12 Feb 2021 14:13:55 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fc89=HO=ltts.com=deepthi.m@srs-us1.protection.inumbo.net>)
 id 1lAZCl-000106-Kt
 for xen-users@lists.xenproject.org; Fri, 12 Feb 2021 14:13:55 +0000
Received: from IND01-MA1-obe.outbound.protection.outlook.com (unknown
 [40.107.138.73]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 0bb5690f-ca52-4767-93ac-9a5a98001f52;
 Fri, 12 Feb 2021 14:13:39 +0000 (UTC)
Received: from BMXPR01MB3717.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:5e::14)
 by BMXPR01MB0853.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:13::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.20; Fri, 12 Feb
 2021 14:13:35 +0000
Received: from BMXPR01MB3717.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::38fe:71f0:a53e:c2f9]) by BMXPR01MB3717.INDPRD01.PROD.OUTLOOK.COM
 ([fe80::38fe:71f0:a53e:c2f9%7]) with mapi id 15.20.3846.034; Fri, 12 Feb 2021
 14:13:34 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 0bb5690f-ca52-4767-93ac-9a5a98001f52
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=AGMT1ue5F7gH5YcTJe7wV0QhmrwJb5xBfn8RyLMlb9/Cr2wlx/3+sqOjpKgpWBg97f834xpJyPdUn74o58pOVgf3io6BO6km5ODpawIlm9sPkD2WHKM53+IChxn0RHAsDJXwPbZwZmGAHO99vmD7r4EXGrqIN+0k8+MAcTUcNi/qfoplotfuaskhINVnlrVo2ujTPq/tKUKNfwmvB5ToQmSmWbrZdkTne/iCOzXgcijivQUvkEZIWr0dSuFsC9LaoA09xoPoIv/9Prr5wH6Kw6f9MIxxOe9i4DqOkk4rxaXcRxd1DAIONGvPDHYvChRw+xJWrflgMwBMv2BCaMhm1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=E/+526B9EfaVDmJaTZVTk1+biUqpLOmfYRy7cvLH2Zc=;
 b=YJSXsEe6yeNiI3JWGvDJOQbzmrnHTCxLADX/0lt6WhhEiGt5fdy4uep25yTwzRtTvRE1EFSgN73xz80s+B5/O0vNAPcl9wQmS4ENOkX8QZ9y9zVUKNvLY14FW5kKhjifs4wj1FZrDsmJoixnf4uAOb1SawJhFEHzN0rKTvbnZB+/AEUprrXDz9kz9XWwey9zbiupSwXzXBjgScSPHHazYT5XL71j4ko+hZSl1ZGVx/MrZ8AdMMERkiWzJ4ZH784A+BOVJkjS4aFZnwqjea5QtHN8pIHcCAFwr8oR2OTV1Qjn7Z2rQEXXAU3TLE2Ny6gkUb8SOrEZHLfmxYli8P3v0g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=ltts.com; dmarc=pass action=none header.from=ltts.com;
 dkim=pass header.d=ltts.com; arc=none
From: Deepthi M. <Deepthi.M@Ltts.com>
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
CC: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>, Pelluru
 VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen
Thread-Topic: Error while building Xen
Thread-Index:
 AQHW+4uAsZ6jkEYxj0+EtD1UXa6EjapS2G+AgAAAzIeAAAw7AIABoGZngAAEUoCAABCbSQ==
Date: Fri, 12 Feb 2021 14:13:34 +0000
Message-ID:
 <MAXPR01MB372873203E0E9C8EDD111E29888B9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
References:
 <MAXPR01MB3728A6A2AB3546BD54857D5288B29@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
 <676DEE4D-C43E-479F-8249-4DC255D5083D@arm.com>
 <MAXPR01MB3728F463BB960043413FA9DD888C9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
 <67E6CA97-9204-4F6A-9C21-487255F37AAB@arm.com>
 <MAXPR01MB372830641860E82368720AFE888B9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>,<7E6D2E68-2ADB-4F1B-B261-6371A8299615@arm.com>
In-Reply-To: <7E6D2E68-2ADB-4F1B-B261-6371A8299615@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
 MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Enabled=True;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SiteId=311b3378-8e8a-4b5e-a33f-e80a3d8ba60a;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_SetDate=2021-02-12T14:13:33.559Z;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Name=General;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_ContentBits=0;MSIP_Label_4b5591f2-6b23-403d-aa5f-b6d577f5e572_Method=Standard;
authentication-results: arm.com; dkim=none (message not signed)
 header.d=none;arm.com; dmarc=none action=none header.from=Ltts.com;
x-originating-ip: [14.142.183.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7d2178e7-f7d8-4e78-3c83-08d8cf606268
x-ms-traffictypediagnostic: BMXPR01MB0853:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs:
 <BMXPR01MB085350F3E68CAFC7A2FB262D888B9@BMXPR01MB0853.INDPRD01.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BMXPR01MB3717.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(4636009)(39860400002)(346002)(136003)(376002)(396003)(366004)(26005)(45080400002)(33656002)(15974865002)(71200400001)(52536014)(86362001)(478600001)(83380400001)(76116006)(6512007)(6506007)(6916009)(5660300002)(186003)(9686003)(3480700007)(66476007)(2906002)(4326008)(8936002)(54906003)(6486002)(55236004)(66446008)(316002)(19627405001)(53546011)(966005)(64756008)(66556008)(107886003)(66946007)(30864003)(166002)(8676002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?GaN4Jh8Gu5uq0flvcdGdA36BphK7AiUy1uwwq7d4HF3MetghUPrP29cvHAOE?=
 =?us-ascii?Q?lVoBMnPKpC62Ee/q71huLiKLiIKyFxStwsLYAtbpf/frBOkIDwWIzxYSkkgl?=
 =?us-ascii?Q?GWIHbHsYpzRFbuk8mVlT07gJgo5r1iWmgEV9zrS4yXUa9nPEYkJP8yEa1/L1?=
 =?us-ascii?Q?+9/p4ZRxLMQPStGGhyhNGWd7y/WtWZjF6J7+NBspEai4bgO0v6IphGNcVQRY?=
 =?us-ascii?Q?QMaFHjgOBP9U2DWETExSIaT1M05MuCLeVRW1YtQ9zbgSboFZDLRYpADHZ+Dr?=
 =?us-ascii?Q?uUMoHVTVIKgb01DckPWwERZBfgY9TwEfNnJqV6j+voqc6noJ28fx6bX4B+0j?=
 =?us-ascii?Q?kjOEGLnSfps5OeOETjecgQun6RWZnocr1jqu87i5Sf/UngsL4rWu79Zf3Jro?=
 =?us-ascii?Q?QuOpVCPsMUouCPoZUUrO3NsgN4wW/83F+JqgaP5yB5/aymT59MP7EjYVIjcP?=
 =?us-ascii?Q?/mGWacXgkdOjUSaFAl9F94OExJJWGCVmRQ+VbMQZXBAjYJ0Ms3b1duJrJj+n?=
 =?us-ascii?Q?ddEMzgCJCdxgDnyLG2svzYBDH7xWoUgaU2gfNxNY6yPsUe/fpoqOe+HOZ1Qt?=
 =?us-ascii?Q?gubx9ZXBUiciA49Zfgc8TAZH3ZoNYSe+NOWao4lSXxd4YjFRtNbwe66QqyAE?=
 =?us-ascii?Q?lPCEOaVAhJFLGVXpifZfVeBLzwpyO6BPfp+wj+/nwHZhX+wQ5tEQ7WXtoK7P?=
 =?us-ascii?Q?4P4HkfpyaH6V7pMULVqWUvF5qKuM4K+UXJ3CE8MLApjzM0AYBWh+yJF9fV2H?=
 =?us-ascii?Q?QZPrEyCsaznGje/4j9NRaBip4p8HFUFsuZyPl6nKKCPut1iVThkKpEBnuqQN?=
 =?us-ascii?Q?c4k9e5yZvEaRPl0tOOxozuXvSgVxMXeplBX0sjPFRPu0Pkx+Uq74eWWHTxUy?=
 =?us-ascii?Q?bPLunh35UIAlmUVsILa8OekDOS1xUiTaiCoksf6nekhfh3Hd6Zx1g6l1fhfA?=
 =?us-ascii?Q?MuQhBKn4SThBiRnLB6Lu9LzVE1RWgDmK3e9w1zrfO+g8tfF9mF72jvrxq/hv?=
 =?us-ascii?Q?x9Qr/oDBU3dvi9mFLZiDlIN0gafy9BlWLcVaA9TGcJVY5AdLJP7Q/NnwmgSu?=
 =?us-ascii?Q?esO0k24funYdOEhXpttL30TFwvdK/o527pMwDH4oqkuv45fvYdTwvuAu0vxK?=
 =?us-ascii?Q?13PLgtxyUQlVzq9ebnY0447ObLqCmh4OtuTVYd88fDFwwSeYyWacy88nfDGx?=
 =?us-ascii?Q?teJsC2F/s3/pWLjm7IlxgdTA0kJUAwZqIJo7zTz8bkG7f5NG8V/8JeCAbteC?=
 =?us-ascii?Q?vGYAzwKA3XoBbUdyHv/GAMnR5eLvzxGdEoGcRZKctQIR3vRtw3vGUCxTVkiK?=
 =?us-ascii?Q?rTY=3D?=
Content-Type: multipart/alternative;
	boundary="_000_MAXPR01MB372873203E0E9C8EDD111E29888B9MAXPR01MB3728INDP_"
MIME-Version: 1.0
X-OriginatorOrg: ltts.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BMXPR01MB3717.INDPRD01.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d2178e7-f7d8-4e78-3c83-08d8cf606268
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2021 14:13:34.7113
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 311b3378-8e8a-4b5e-a33f-e80a3d8ba60a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 5GOr9tpRLUdUKuc74mGHqrYiJ1/HjtbLlOFkgHgZSJWy//e+F6/NPjopv0QYFUAfuL9cgdeZgz9YNlC8JR6ukQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BMXPR01MB0853

--_000_MAXPR01MB372873203E0E9C8EDD111E29888B9MAXPR01MB3728INDP_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hello Bertrand,

As per your suggestion I removed .bbappend and my build is going on.

Thank you,
Deepthi


________________________________
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
Sent: Friday, February 12, 2021 6:41 PM
To: Deepthi M. <Deepthi.M@Ltts.com>
Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pellur=
u VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
Subject: Re: Error while building Xen

Hi Deepthi,


> On 12 Feb 2021, at 13:01, Deepthi M. <Deepthi.M@Ltts.com> wrote:
>
> Hi Bertrand,
>
> I switched all the meta layers to Rocko but meta-demo/meta-rcar-gen3-xen =
is master branch. I got the following error.
>
> user@user-OptiPlex-7010:~/build/build$ bitbake core-image-weston
> Parsing recipes: 100% |##################################################=
#######################################################| Time: 0:01:45
> Parsing of 2104 .bb files complete (0 cached, 2104 parsed). 2925 targets,=
 91 skipped, 3 masked, 0 errors.
> ERROR: No recipes available for:
>   /home/user/build/meta-demo/meta-rcar-gen3-xen/recipes-kernel/linux/linu=
x-renesas_4.9.bbappend
>
> Summary: There was 1 ERROR message shown, returning a non-zero exit code.

It seems your meta-demo is dependent on an older kernel version.

You should try to contact the maintainer of this meta-demo layer or you wil=
l have to either try to:
- remove this bbappend as it could be that it is not needed anymore
- port the things it does to the current version of the linux-renesas

Cheers
Bertrand

>
> Thank you,
> Deepthi
> From: Bertrand Marquis <Bertrand.Marquis@arm.com>
> Sent: Thursday, February 11, 2021 5:36 PM
> To: Deepthi M. <Deepthi.M@Ltts.com>
> Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pell=
uru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
> Subject: Re: Error while building Xen
>
> Hi Deepthi,
>
> > On 11 Feb 2021, at 11:40, Deepthi M. <Deepthi.M@Ltts.com> wrote:
> >
> > Hi Bertrand,
> >
> > Thank you for the reply.
> >
> > It seems that you host python is used instead of the one compiled by Yo=
cto.
> >
> > With python2.7 also we are facing the same issue
> >
> > - which version of Yocto you are using
> >     poky-2.1.2
>
> This is a very old release (4 to 5 years old) and it is not supported any=
more.
>
> >
> > - what layers you included
> >   meta-virtualization
> >  Reference link: https://ind01.safelinks.protection.outlook.com/?url=3D=
https%3A%2F%2Fwiki.xenproject.org%2Fwiki%2FXen_ARM_with_Virtualization_Exte=
nsions%2FSalvator-X&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd2987=
94726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748732=
3514791643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3DKF44ME0A6NvyuqCKKC%2BYjA%2F2Z=
MtimhrFF1WumNCb74U%3D&amp;reserved=3D0
>
> Since this was written it could really be that Renesas updated their supp=
ort so you might try to check an newer version of the gen3 support:
> https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Felinu=
x.org%2FR-Car%2FBoards%2FYocto-Gen3%2Fv4.7.0&amp;data=3D04%7C01%7CDeepthi.M=
%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d=
8ba60a%7C0%7C0%7C637487323514801643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjA=
wMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3DOits=
zwTlxKRLPzgi4bAHNz7Bp1gC31un2SAEpn3WXTA%3D&amp;reserved=3D0
>
> and use the corresponding version of meta-virtualization.
>
> >
> > - what parameters did you set in your local.conf
> >    Please find the attached local.conf for your reference
> >
> > - what image you are building ?
> >   core-image-weston
> >
> > when executing pygrub we are getting the below error:
> > Traceback (most recent call last):
> >    File "/usr/lib/xen/bin/pygrub", line 20, in <module>
> >      import xen.lowlevel.xc
> > ImportError: No module named xen.lowlevel.xc
>
> There are some patches for pygrub on meta-virtualization master that you =
might want to look at:
> https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgit.y=
octoproject.org%2Fcgit%2Fcgit.cgi%2Fmeta-virtualization%2Ftree%2Frecipes-ex=
tended%2Fxen%2Ffiles%2F0001-python-pygrub-pass-DISTUTILS-xen-4.14.patch&amp=
;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7=
C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514801643%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C1000&amp;sdata=3DBndrhY6QB1553C7IcDdZ1CddWEBMthBEndPwsG0sKtk%3D&amp;r=
eserved=3D0
>
> Cheers
> Bertrand
>
> >
> >
> > Thank you,
> > Deepthi
> > From: Bertrand Marquis <Bertrand.Marquis@arm.com>
> > Sent: Thursday, February 11, 2021 4:49 PM
> > To: Deepthi M. <Deepthi.M@Ltts.com>
> > Cc: xen-users@lists.xenproject.org <xen-users@lists.xenproject.org>; Pe=
lluru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>
> > Subject: Re: Error while building Xen
> >
> > Hi Deepthi,
> >
> > > On 5 Feb 2021, at 06:56, Deepthi M. <Deepthi.M@Ltts.com> wrote:
> > >
> > > Hi all,
> > >
> > > I am trying to build Xen in Yocto environment for Renesas R-car salva=
tor-xs board I am getting the following error
> > >
> > > | cc1: error: include location "/usr/local/include/python3.9" is unsa=
fe for cross-compilation [-Werror=3Dpoison-system-directories] | cc1: all w=
arnings being treated as errors | error: command '/home/user/xenrcar/build/=
build/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-linux/aarch64-poky-lin=
ux-gcc' failed with exit code 1 | Makefile:23: recipe for target 'install' =
failed | make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home=
/user/xenrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOI=
NC+5e7aa90440-r0/git/tools/python
> > >
> >
> > It seems that you host python is used instead of the one compiled by Yo=
cto.
> >
> > Could you tell me:
> > - which version of Yocto you are using
> > - what layers you included
> > - what parameters did you set in your local.conf
> > - what image you are building ?
> >
> > Cheers
> > Bertrand
> >
> > > Please let me know how to fix the issue.
> > > Thank you,
> > > Deepthi
> > >
> > > L&T Technology Services Ltd
> > > https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fww=
w.ltts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd2987947261=
99908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748732351480=
1643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik=
1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN3W=
PKu3y%2FG3s8%3D&amp;reserved=3D0
> > > L&T Technology Services Limited (LTTS) is committed to safeguard your=
 data privacy. For more information to view our commitment towards data pri=
vacy under GDPR, please visit the privacy policy on our website https://ind=
01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp=
;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7=
C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514801643%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C1000&amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN3WPKu3y%2FG3s8%3D&a=
mp;reserved=3D0. This Email may contain confidential or privileged informat=
ion for the intended recipient (s). If you are not the intended recipient, =
please do not use or disseminate the information, notify the sender and del=
ete it from your system.
> >
> > L&T Technology Services Ltd
> > https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.=
ltts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199=
908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148016=
43%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN3WPK=
u3y%2FG3s8%3D&amp;reserved=3D0
> > L&T Technology Services Limited (LTTS) is committed to safeguard your d=
ata privacy. For more information to view our commitment towards data priva=
cy under GDPR, please visit the privacy policy on our website https://ind01=
.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;d=
ata=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7C3=
11b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514801643%7CUnknown%7CTW=
FpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3=
D%7C1000&amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN3WPKu3y%2FG3s8%3D&amp=
;reserved=3D0. This Email may contain confidential or privileged informatio=
n for the intended recipient (s). If you are not the intended recipient, pl=
ease do not use or disseminate the information, notify the sender and delet=
e it from your system.
> > <local.conf>
>
> L&T Technology Services Ltd
> https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.lt=
ts.com%2F&amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd29879472619990=
8d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514811635=
%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3DXJ%2FPI72OMQM7QILZ42DpEE8vjcuba8PlvyMBs=
DEtyx0%3D&amp;reserved=3D0
> L&T Technology Services Limited (LTTS) is committed to safeguard your dat=
a privacy. For more information to view our commitment towards data privacy=
 under GDPR, please visit the privacy policy on our website https://ind01.s=
afelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;dat=
a=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7C311=
b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514811635%7CUnknown%7CTWFp=
bGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%=
7C1000&amp;sdata=3DXJ%2FPI72OMQM7QILZ42DpEE8vjcuba8PlvyMBsDEtyx0%3D&amp;res=
erved=3D0. This Email may contain confidential or privileged information fo=
r the intended recipient (s). If you are not the intended recipient, please=
 do not use or disseminate the information, notify the sender and delete it=
 from your system.


L&T Technology Services Ltd

www.LTTS.com

L&T Technology Services Limited (LTTS) is committed to safeguard your data =
privacy. For more information to view our commitment towards data privacy u=
nder GDPR, please visit the privacy policy on our website www.Ltts.com. Thi=
s Email may contain confidential or privileged information for the intended=
 recipient (s). If you are not the intended recipient, please do not use or=
 disseminate the information, notify the sender and delete it from your sys=
tem.

--_000_MAXPR01MB372873203E0E9C8EDD111E29888B9MAXPR01MB3728INDP_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<style type=3D"text/css" style=3D"display:none;"> P {margin-top:0;margin-bo=
ttom:0;} </style>
</head>
<body dir=3D"ltr">
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Hello Bertrand,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
As per your suggestion I removed .bbappend and my build is going on.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Thank you,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Deepthi<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div id=3D"appendonsend"></div>
<hr style=3D"display:inline-block;width:98%" tabindex=3D"-1">
<div id=3D"divRplyFwdMsg" dir=3D"ltr"><font face=3D"Calibri, sans-serif" st=
yle=3D"font-size:11pt" color=3D"#000000"><b>From:</b> Bertrand Marquis &lt;=
Bertrand.Marquis@arm.com&gt;<br>
<b>Sent:</b> Friday, February 12, 2021 6:41 PM<br>
<b>To:</b> Deepthi M. &lt;Deepthi.M@Ltts.com&gt;<br>
<b>Cc:</b> xen-users@lists.xenproject.org &lt;xen-users@lists.xenproject.or=
g&gt;; Pelluru VamsiKrishna &lt;Pelluru.VamsiKrishna@Ltts.com&gt;<br>
<b>Subject:</b> Re: Error while building Xen</font>
<div>&nbsp;</div>
</div>
<div class=3D"BodyFragment"><font size=3D"2"><span style=3D"font-size:11pt;=
">
<div class=3D"PlainText">Hi Deepthi,<br>
<br>
<br>
&gt; On 12 Feb 2021, at 13:01, Deepthi M. &lt;Deepthi.M@Ltts.com&gt; wrote:=
<br>
&gt; <br>
&gt; Hi Bertrand,<br>
&gt; <br>
&gt; I switched all the meta layers to Rocko but meta-demo/meta-rcar-gen3-x=
en is master branch. I got the following error.<br>
&gt; <br>
&gt; user@user-OptiPlex-7010:~/build/build$ bitbake core-image-weston<br>
&gt; Parsing recipes: 100% |###############################################=
##########################################################| Time: 0:01:45<b=
r>
&gt; Parsing of 2104 .bb files complete (0 cached, 2104 parsed). 2925 targe=
ts, 91 skipped, 3 masked, 0 errors.<br>
&gt; ERROR: No recipes available for:<br>
&gt;&nbsp;&nbsp; /home/user/build/meta-demo/meta-rcar-gen3-xen/recipes-kern=
el/linux/linux-renesas_4.9.bbappend<br>
&gt; <br>
&gt; Summary: There was 1 ERROR message shown, returning a non-zero exit co=
de.<br>
<br>
It seems your meta-demo is dependent on an older kernel version.<br>
<br>
You should try to contact the maintainer of this meta-demo layer or you wil=
l have to either try to:<br>
- remove this bbappend as it could be that it is not needed anymore<br>
- port the things it does to the current version of the linux-renesas<br>
<br>
Cheers<br>
Bertrand<br>
<br>
&gt; <br>
&gt; Thank you,<br>
&gt; Deepthi<br>
&gt; From: Bertrand Marquis &lt;Bertrand.Marquis@arm.com&gt;<br>
&gt; Sent: Thursday, February 11, 2021 5:36 PM<br>
&gt; To: Deepthi M. &lt;Deepthi.M@Ltts.com&gt;<br>
&gt; Cc: xen-users@lists.xenproject.org &lt;xen-users@lists.xenproject.org&=
gt;; Pelluru VamsiKrishna &lt;Pelluru.VamsiKrishna@Ltts.com&gt;<br>
&gt; Subject: Re: Error while building Xen<br>
&gt;&nbsp; <br>
&gt; Hi Deepthi,<br>
&gt; <br>
&gt; &gt; On 11 Feb 2021, at 11:40, Deepthi M. &lt;Deepthi.M@Ltts.com&gt; w=
rote:<br>
&gt; &gt; <br>
&gt; &gt; Hi Bertrand,<br>
&gt; &gt; <br>
&gt; &gt; Thank you for the reply.<br>
&gt; &gt; <br>
&gt; &gt; It seems that you host python is used instead of the one compiled=
 by Yocto.<br>
&gt; &gt; <br>
&gt; &gt; With python2.7 also we are facing the same issue<br>
&gt; &gt; <br>
&gt; &gt; - which version of Yocto you are using<br>
&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; poky-2.1.2<br>
&gt; <br>
&gt; This is a very old release (4 to 5 years old) and it is not supported =
anymore.<br>
&gt; <br>
&gt; &gt; <br>
&gt; &gt; - what layers you included<br>
&gt; &gt;&nbsp;&nbsp; meta-virtualization<br>
&gt; &gt;&nbsp; Reference link: <a href=3D"https://ind01.safelinks.protecti=
on.outlook.com/?url=3Dhttps%3A%2F%2Fwiki.xenproject.org%2Fwiki%2FXen_ARM_wi=
th_Virtualization_Extensions%2FSalvator-X&amp;amp;data=3D04%7C01%7CDeepthi.=
M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3=
d8ba60a%7C0%7C0%7C637487323514791643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj=
AwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=
=3DKF44ME0A6NvyuqCKKC%2BYjA%2F2ZMtimhrFF1WumNCb74U%3D&amp;amp;reserved=3D0"=
>
https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwiki.xe=
nproject.org%2Fwiki%2FXen_ARM_with_Virtualization_Extensions%2FSalvator-X&a=
mp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199908d8cf57=
d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514791643%7CUnkn=
own%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXV=
CI6Mn0%3D%7C1000&amp;amp;sdata=3DKF44ME0A6NvyuqCKKC%2BYjA%2F2ZMtimhrFF1WumN=
Cb74U%3D&amp;amp;reserved=3D0</a><br>
&gt; <br>
&gt; Since this was written it could really be that Renesas updated their s=
upport so you might try to check an newer version of the gen3 support:<br>
&gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Felinux.org%2FR-Car%2FBoards%2FYocto-Gen3%2Fv4.7.0&amp;amp;data=3D0=
4%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7C311b3378=
8e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514801643%7CUnknown%7CTWFpbGZsb=
3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C100=
0&amp;amp;sdata=3DOitszwTlxKRLPzgi4bAHNz7Bp1gC31un2SAEpn3WXTA%3D&amp;amp;re=
served=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Felinux.=
org%2FR-Car%2FBoards%2FYocto-Gen3%2Fv4.7.0&amp;amp;data=3D04%7C01%7CDeepthi=
.M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a=
3d8ba60a%7C0%7C0%7C637487323514801643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wL=
jAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=
=3DOitszwTlxKRLPzgi4bAHNz7Bp1gC31un2SAEpn3WXTA%3D&amp;amp;reserved=3D0</a><=
br>
&gt; <br>
&gt; and use the corresponding version of meta-virtualization.<br>
&gt; <br>
&gt; &gt; <br>
&gt; &gt; - what parameters did you set in your local.conf<br>
&gt; &gt;&nbsp;&nbsp;&nbsp; Please find the attached local.conf for your re=
ference<br>
&gt; &gt;&nbsp;&nbsp; <br>
&gt; &gt; - what image you are building ?<br>
&gt; &gt;&nbsp;&nbsp; core-image-weston<br>
&gt; &gt; <br>
&gt; &gt; when executing pygrub we are getting the below error:<br>
&gt; &gt; Traceback (most recent call last):<br>
&gt; &gt;&nbsp;&nbsp;&nbsp; File &quot;/usr/lib/xen/bin/pygrub&quot;, line =
20, in &lt;module&gt;<br>
&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; import xen.lowlevel.xc<br>
&gt; &gt; ImportError: No module named xen.lowlevel.xc<br>
&gt; <br>
&gt; There are some patches for pygrub on meta-virtualization master that y=
ou might want to look at:<br>
&gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Fgit.yoctoproject.org%2Fcgit%2Fcgit.cgi%2Fmeta-virtualization%2Ftre=
e%2Frecipes-extended%2Fxen%2Ffiles%2F0001-python-pygrub-pass-DISTUTILS-xen-=
4.14.patch&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726=
199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148=
01643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I=
k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DBndrhY6QB1553C7IcDdZ1CddWEBMth=
BEndPwsG0sKtk%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgit.yoc=
toproject.org%2Fcgit%2Fcgit.cgi%2Fmeta-virtualization%2Ftree%2Frecipes-exte=
nded%2Fxen%2Ffiles%2F0001-python-pygrub-pass-DISTUTILS-xen-4.14.patch&amp;a=
mp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199908d8cf57d8cc=
%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C637487323514801643%7CUnknown%=
7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6M=
n0%3D%7C1000&amp;amp;sdata=3DBndrhY6QB1553C7IcDdZ1CddWEBMthBEndPwsG0sKtk%3D=
&amp;amp;reserved=3D0</a><br>
&gt; <br>
&gt; Cheers<br>
&gt; Bertrand<br>
&gt; <br>
&gt; &gt; <br>
&gt; &gt; <br>
&gt; &gt; Thank you,<br>
&gt; &gt; Deepthi<br>
&gt; &gt; From: Bertrand Marquis &lt;Bertrand.Marquis@arm.com&gt;<br>
&gt; &gt; Sent: Thursday, February 11, 2021 4:49 PM<br>
&gt; &gt; To: Deepthi M. &lt;Deepthi.M@Ltts.com&gt;<br>
&gt; &gt; Cc: xen-users@lists.xenproject.org &lt;xen-users@lists.xenproject=
.org&gt;; Pelluru VamsiKrishna &lt;Pelluru.VamsiKrishna@Ltts.com&gt;<br>
&gt; &gt; Subject: Re: Error while building Xen<br>
&gt; &gt;&nbsp; <br>
&gt; &gt; Hi Deepthi,<br>
&gt; &gt; <br>
&gt; &gt; &gt; On 5 Feb 2021, at 06:56, Deepthi M. &lt;Deepthi.M@Ltts.com&g=
t; wrote:<br>
&gt; &gt; &gt; <br>
&gt; &gt; &gt; Hi all,<br>
&gt; &gt; &gt; <br>
&gt; &gt; &gt; I am trying to build Xen in Yocto environment for Renesas R-=
car salvator-xs board I am getting the following error<br>
&gt; &gt; &gt; <br>
&gt; &gt; &gt; | cc1: error: include location &quot;/usr/local/include/pyth=
on3.9&quot; is unsafe for cross-compilation [-Werror=3Dpoison-system-direct=
ories] | cc1: all warnings being treated as errors | error: command '/home/=
user/xenrcar/build/build/tmp/sysroots/x86_64-linux/usr/bin/aarch64-poky-lin=
ux/aarch64-poky-linux-gcc'
 failed with exit code 1 | Makefile:23: recipe for target 'install' failed =
| make[4]: *** [install] Error 1 | make[4]: Leaving directory '/home/user/x=
enrcar/build/build/tmp/work/aarch64-poky-linux/xen/unstable+gitAUTOINC+5e7a=
a90440-r0/git/tools/python<br>
&gt; &gt; &gt; <br>
&gt; &gt; <br>
&gt; &gt; It seems that you host python is used instead of the one compiled=
 by Yocto.<br>
&gt; &gt; <br>
&gt; &gt; Could you tell me:<br>
&gt; &gt; - which version of Yocto you are using<br>
&gt; &gt; - what layers you included<br>
&gt; &gt; - what parameters did you set in your local.conf<br>
&gt; &gt; - what image you are building ?<br>
&gt; &gt; <br>
&gt; &gt; Cheers<br>
&gt; &gt; Bertrand<br>
&gt; &gt; <br>
&gt; &gt; &gt; Please let me know how to fix the issue.<br>
&gt; &gt; &gt; Thank you,<br>
&gt; &gt; &gt; Deepthi<br>
&gt; &gt; &gt; <br>
&gt; &gt; &gt; L&amp;T Technology Services Ltd<br>
&gt; &gt; &gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?u=
rl=3Dhttp%3A%2F%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts=
.com%7C24e27bd298794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%=
7C0%7C0%7C637487323514801643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4=
%2BAsptf7vtjejZxesQUWcxFXN3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199=
908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148016=
43%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN=
3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0</a><br>
&gt; &gt; &gt; L&amp;T Technology Services Limited (LTTS) is committed to s=
afeguard your data privacy. For more information to view our commitment tow=
ards data privacy under GDPR, please visit the privacy policy on our websit=
e
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F=
%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd2=
98794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748=
7323514801643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL=
CJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4%2BAsptf7vtjejZ=
xesQUWcxFXN3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199=
908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148016=
43%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN=
3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0</a>.
 This Email may contain confidential or privileged information for the inte=
nded recipient (s). If you are not the intended recipient, please do not us=
e or disseminate the information, notify the sender and delete it from your=
 system.<br>
&gt; &gt; <br>
&gt; &gt; L&amp;T Technology Services Ltd<br>
&gt; &gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3D=
http%3A%2F%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%=
7C24e27bd298794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7=
C0%7C637487323514801643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4%2BAs=
ptf7vtjejZxesQUWcxFXN3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199=
908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148016=
43%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN=
3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0</a><br>
&gt; &gt; L&amp;T Technology Services Limited (LTTS) is committed to safegu=
ard your data privacy. For more information to view our commitment towards =
data privacy under GDPR, please visit the privacy policy on our website
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F=
%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd2=
98794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748=
7323514801643%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL=
CJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4%2BAsptf7vtjejZ=
xesQUWcxFXN3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199=
908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148016=
43%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DmDHAaq4%2BAsptf7vtjejZxesQUWcxFXN=
3WPKu3y%2FG3s8%3D&amp;amp;reserved=3D0</a>.
 This Email may contain confidential or privileged information for the inte=
nded recipient (s). If you are not the intended recipient, please do not us=
e or disseminate the information, notify the sender and delete it from your=
 system.<br>
&gt; &gt; &lt;local.conf&gt;<br>
&gt; <br>
&gt; L&amp;T Technology Services Ltd<br>
&gt; <a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%=
3A%2F%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e=
27bd298794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C=
637487323514811635%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DXJ%2FPI72OMQM7QIL=
Z42DpEE8vjcuba8PlvyMBsDEtyx0%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199=
908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148116=
35%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DXJ%2FPI72OMQM7QILZ42DpEE8vjcuba8P=
lvyMBsDEtyx0%3D&amp;amp;reserved=3D0</a><br>
&gt; L&amp;T Technology Services Limited (LTTS) is committed to safeguard y=
our data privacy. For more information to view our commitment towards data =
privacy under GDPR, please visit the privacy policy on our website
<a href=3D"https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F=
%2Fwww.ltts.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd2=
98794726199908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C63748=
7323514811635%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL=
CJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DXJ%2FPI72OMQM7QILZ42Dp=
EE8vjcuba8PlvyMBsDEtyx0%3D&amp;amp;reserved=3D0">
https://ind01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.ltts=
.com%2F&amp;amp;data=3D04%7C01%7CDeepthi.M%40ltts.com%7C24e27bd298794726199=
908d8cf57d8cc%7C311b33788e8a4b5ea33fe80a3d8ba60a%7C0%7C0%7C6374873235148116=
35%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3DXJ%2FPI72OMQM7QILZ42DpEE8vjcuba8P=
lvyMBsDEtyx0%3D&amp;amp;reserved=3D0</a>.
 This Email may contain confidential or privileged information for the inte=
nded recipient (s). If you are not the intended recipient, please do not us=
e or disseminate the information, notify the sender and delete it from your=
 system.<br>
<br>
</div>
</span></font></div>
<p><strong>L&amp;T Technology Services Ltd</strong></p>
<p><a href=3D"" http:=3D"" www.LTTS.com=3D"" ??=3D"" target=3D"" _blank??=
=3D"">www.LTTS.com</a></p>
<p>L&amp;T Technology Services Limited (LTTS) is committed to safeguard you=
r data privacy. For more information to view our commitment towards data pr=
ivacy under GDPR, please visit the privacy policy on our website www.Ltts.c=
om. This Email may contain confidential
 or privileged information for the intended recipient (s). If you are not t=
he intended recipient, please do not use or disseminate the information, no=
tify the sender and delete it from your system.</p>
</body>
</html>

--_000_MAXPR01MB372873203E0E9C8EDD111E29888B9MAXPR01MB3728INDP_--


From xen-users-bounces@lists.xenproject.org Tue Feb 16 08:14:59 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Feb 2021 08:14:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.85426.160184 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBvUy-00037U-46; Tue, 16 Feb 2021 08:14:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 85426.160184; Tue, 16 Feb 2021 08:14:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBvUy-00037M-0Z; Tue, 16 Feb 2021 08:14:20 +0000
Received: by outflank-mailman (input) for mailman id 85426;
 Tue, 16 Feb 2021 08:14:19 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=71Th=HS=garbo.alstadheim.priv.no=hakon@srs-us1.protection.inumbo.net>)
 id 1lBvUx-00037H-0P
 for xen-users@lists.xenproject.org; Tue, 16 Feb 2021 08:14:19 +0000
Received: from asav21.altibox.net (unknown [109.247.116.8])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 6d20e2f7-6800-487c-86e6-d6f98e7fc5e9;
 Tue, 16 Feb 2021 08:14:13 +0000 (UTC)
Received: from postfix-relay.alstadheim.priv.no
 (148-252-98.210.3p.ntebredband.no [148.252.98.210])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 (Authenticated sender: hakon.alstadheim@ntebb.no)
 by asav21.altibox.net (Postfix) with ESMTPSA id 214DE80050
 for <xen-users@lists.xenproject.org>; Tue, 16 Feb 2021 09:14:11 +0100 (CET)
Received: from smtps.alstadheim.priv.no (localhost [127.0.0.1])
 by postfix-relay.alstadheim.priv.no (Postfix) with ESMTP id 8ECC27AD0A16
 for <xen-users@lists.xenproject.org>; Tue, 16 Feb 2021 09:14:11 +0100 (CET)
Received: from [192.168.2.201] (unknown [192.168.2.201])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits))
 (No client certificate requested) (Authenticated sender: hakon)
 by smtps.alstadheim.priv.no (Postfix) with ESMTPSA id 6F49B7A5228A
 for <xen-users@lists.xenproject.org>; Tue, 16 Feb 2021 09:14:11 +0100 (CET)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 6d20e2f7-6800-487c-86e6-d6f98e7fc5e9
X-Finnesikke-B-A-I-T: finnesikke@alstadheim.priv.no
To: xen-users@lists.xenproject.org
From: =?UTF-8?Q?H=c3=a5kon_Alstadheim?= <hakon@garbo.alstadheim.priv.no>
Subject: DomU on Xen 4.14.x : Kernel panic - not syncing: Fatal exception in
 interrupt
Message-ID: <54114868-9398-37d4-01a8-6af3112e82fa@garbo.alstadheim.priv.no>
Date: Tue, 16 Feb 2021 09:14:01 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.7.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-CMAE-Score: 0
X-CMAE-Analysis: v=2.3 cv=Kb38TzQD c=1 sm=1 tr=0
	a=Ln9STfmRvcQJFdEeVvPm9g==:117 a=Ln9STfmRvcQJFdEeVvPm9g==:17
	a=IkcTkHD0fZMA:10 a=qa6Q16uM49sA:10 a=M51BFTxLslgA:10
	a=mOwfyiCkF2CPzWEti1EA:9 a=QS-0seWH56szsJ0B:21 a=xIPwRzjqhIybJ2HF:21
	a=OKWN126kba0r0y0t:21 a=QEXdDO2ut3YA:10

I've tried a couple of the later linux kernels in the 5.10.x range, and 
now 5.11.0 on this domU, and get "BUG: kernel NULL pointer dereference, 
address: 0000000000000000". Below is the entire console log from the 
domU. Anybody know what I should do with this? Currently downgraded the 
domU to linux-5.4.98, dom0 seems happy on all the available kernels from 
gentoo (gentoo-sources) from 4.x to 5.11.0.

Should also note that I use some unsavory pci-passthrough practices to 
give each of two domUs their own USB-adapter.

--------log:---------

Parsing config from /etc/xen/gt.hvm
got a tsc mode string: "native"
libxl: warning: libxl_dm.c:1981:libxl__build_device_model_args_new: 
Domain 7:Only 4 emulated IDE disks are supported.
Disk xvde will be available via PV drivers but not as an emulated disk.
libxl: warning: libxl_dm.c:1981:libxl__build_device_model_args_new: 
Domain 7:Only 4 emulated IDE disks are supported.
Disk xvdf will be available via PV drivers but not as an emulated disk.
libxl: warning: libxl_dm.c:1981:libxl__build_device_model_args_new: 
Domain 7:Only 4 emulated IDE disks are supported.
Disk xvdg will be available via PV drivers but not as an emulated disk.

PXELINUX 6.03 PXE 20150819 Copyright (C) 1994-2014 H. Peter Anvin et al
boot:
Loading boot/genterm/vmlinuz-5.11.0-gentoo-x86_64... ok
Loading boot/genterm/initramfs-5.11.0-gentoo-x86_64.img...ok
Linux version 5.11.0-gentoo-x86_64 (root@gt) (x86_64-pc-linux-gnu-gcc 
(Gentoo 10.2.0-r5 p6) 10.2.0, GNU ld (Gentoo 2.35.2 p1) 2.35.2) #1 SMP 
Mon Feb 15 20:17:11 CET 2021
Command line: BOOT_IMAGE=boot/genterm/vmlinuz-5.11.0-gentoo-x86_64 
initrd=boot/genterm/initramfs-5.11.0-gentoo-x86_64.img 
real_root=LABEL=RAID-GT  ro intel_iommu=on init=/lib/systemd/systemd 
net.ifnames=0 console=ttyS0,115200n8 xen_blkfront.max=128 
udev.log-priority=3 xen_netfront.max_queues=6  scsi_mod.use_blk_mq=1 
elevator=mq-deadline pti=off amdgpu.si_support=1 amdgpu.dpm=1 amdgpu.msi=1
KERNEL supported cpus:
   Intel GenuineIntel
   AMD AuthenticAMD
   Hygon HygonGenuine
   zhaoxin   Shanghai
x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 
'standard' format.
BIOS-provided physical RAM map:
BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
BIOS-e820: [mem 0x0000000000100000-0x000000003ffecfff] usable
BIOS-e820: [mem 0x000000003ffed000-0x000000003fffffff] reserved
BIOS-e820: [mem 0x000000007db85000-0x000000007db94fff] reserved
BIOS-e820: [mem 0x00000000fc000000-0x00000000fc00afff] ACPI NVS
BIOS-e820: [mem 0x00000000fc00b000-0x00000000ffffffff] reserved
BIOS-e820: [mem 0x0000000100000000-0x000000057f7fffff] usable
NX (Execute Disable) protection: active
SMBIOS 2.4 present.
DMI: Xen HVM domU, BIOS 4.14.2-pre 02/10/2021
Hypervisor detected: Xen HVM
Xen version 4.14.
Netfront and the Xen platform PCI driver have been compiled for this 
kernel: unplug emulated NICs.
Blkfront and the Xen platform PCI driver have been compiled for this 
kernel: unplug emulated disks.
You might have to change the root device
from /dev/hd[a-d] to /dev/xvd[a-d]
in your root= kernel command line option
tsc: Fast TSC calibration using PIT
tsc: Detected 2400.079 MHz processor
tsc: Detected 2399.980 MHz TSC
last_pfn = 0x57f800 max_arch_pfn = 0x400000000
x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT
last_pfn = 0x3ffed max_arch_pfn = 0x400000000
check: Scanning 1 areas for low memory corruption
Using GB pages for direct mapping
RAMDISK: [mem 0x3fa64000-0x3feeffff]
ACPI: Early table checksum verification disabled
ACPI: RSDP 0x00000000000F59A0 000024 (v02 Xen   )
ACPI: XSDT 0x00000000FC00A670 000054 (v01 Xen    HVM      00000000 HVML 
00000000)
ACPI: FACP 0x00000000FC00A370 0000F4 (v04 Xen    HVM      00000000 HVML 
00000000)
ACPI: DSDT 0x00000000FC001040 0092A3 (v02 Xen    HVM      00000000 INTL 
20200326)
ACPI: FACS 0x00000000FC001000 000040
ACPI: FACS 0x00000000FC001000 000040
ACPI: APIC 0x00000000FC00A470 000090 (v02 Xen    HVM      00000000 HVML 
00000000)
ACPI: HPET 0x00000000FC00A580 000038 (v01 Xen    HVM      00000000 HVML 
00000000)
ACPI: WAET 0x00000000FC00A5C0 000028 (v01 Xen    HVM      00000000 HVML 
00000000)
ACPI: SSDT 0x00000000FC00A5F0 000031 (v02 Xen    HVM      00000000 INTL 
20200326)
ACPI: SSDT 0x00000000FC00A630 000031 (v02 Xen    HVM      00000000 INTL 
20200326)
Zone ranges:
   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
   Normal   [mem 0x0000000100000000-0x000000057f7fffff]
   Device   empty
Movable zone start for each node
Early memory node ranges
   node   0: [mem 0x0000000000001000-0x000000000009efff]
   node   0: [mem 0x0000000000100000-0x000000003ffecfff]
   node   0: [mem 0x0000000100000000-0x000000057f7fffff]
Zeroed struct page in unavailable ranges: 2165 pages
Initmem setup node 0 [mem 0x0000000000001000-0x000000057f7fffff]
ACPI: PM-Timer IO Port: 0xb008
IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-47
ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 low level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 low level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 low level)
Using ACPI (MADT) for SMP configuration information
ACPI: HPET id: 0x8086a201 base: 0xfed00000
TSC deadline timer available
smpboot: Allowing 6 CPUs, 0 hotplug CPUs
PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff]
PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff]
PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff]
PM: hibernation: Registered nosave memory: [mem 0x3ffed000-0x3fffffff]
PM: hibernation: Registered nosave memory: [mem 0x40000000-0x7db84fff]
PM: hibernation: Registered nosave memory: [mem 0x7db85000-0x7db94fff]
PM: hibernation: Registered nosave memory: [mem 0x7db95000-0xfbffffff]
PM: hibernation: Registered nosave memory: [mem 0xfc000000-0xfc00afff]
PM: hibernation: Registered nosave memory: [mem 0xfc00b000-0xffffffff]
[mem 0x7db95000-0xfbffffff] available for PCI devices
Booting paravirtualized kernel on Xen HVM
clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, 
max_idle_ns: 1910969940391419 ns
setup_percpu: NR_CPUS:32 nr_cpumask_bits:32 nr_cpu_ids:6 nr_node_ids:1
percpu: Embedded 54 pages/cpu s183384 r8192 d29608 u262144
PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Built 1 zonelists, mobility grouping on.  Total pages: 4900758
Kernel command line: 
BOOT_IMAGE=boot/genterm/vmlinuz-5.11.0-gentoo-x86_64 
initrd=boot/genterm/initramfs-5.11.0-gentoo-x86_64.img 
real_root=LABEL=RAID-GT  ro intel_iommu=on init=/lib/systemd/systemd 
net.ifnames=0 console=ttyS0,115200n8 xen_blkfront.max=128 
udev.log-priority=3 xen_netfront.max_queues=6  scsi_mod.use_blk_mq=1 
elevator=mq-deadline pti=off amdgpu.si_support=1 amdgpu.dpm=1 amdgpu.msi=1
DMAR: IOMMU enabled
Kernel parameter elevator= does not have any effect anymore.
Please use sysfs to set IO scheduler for individual devices.
printk: log_buf_len individual max cpu contribution: 4096 bytes
printk: log_buf_len total cpu_extra contributions: 20480 bytes
printk: log_buf_len min size: 32768 bytes
printk: log_buf_len: 65536 bytes
printk: early log buf free: 24048(73%)
Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear)
Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear)
mem auto-init: stack:off, heap alloc:off, heap free:off
Memory: 19446428K/19914284K available (16401K kernel code, 2051K rwdata, 
5228K rodata, 1304K init, 1776K bss, 467600K reserved, 0K cma-reserved)
SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=6, Nodes=1
rcu: Hierarchical RCU implementation.
rcu:     RCU restricting CPUs from NR_CPUS=32 to nr_cpu_ids=6.
     Tracing variant of Tasks RCU enabled.
rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=6
NR_IRQS: 4352, nr_irqs: 880, preallocated irqs: 16
xen:events: Using FIFO-based ABI
xen:events: Xen HVM callback vector for event delivery is enabled
random: get_random_bytes called from start_kernel+0x3c7/0x58d with 
crng_init=0
Console: colour VGA+ 80x25
printk: console [ttyS0] enabled
ACPI: Core revision 20201113
clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 
30580167144 ns
APIC: Switch to symmetric I/O mode setup
x2apic: IRQ remapping doesn't support X2APIC mode
..TIMER: vector=0x30 apic1=0 pin1=2 apic2=0 pin2=0
clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 
0x22982479f67, max_idle_ns: 440795221274 ns
Calibrating delay loop (skipped), value calculated using timer 
frequency.. 4799.96 BogoMIPS (lpj=2399980)
pid_max: default: 32768 minimum: 301
Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024
Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4
Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer 
sanitization
Spectre V2 : Spectre mitigation: kernel not compiled with retpoline; no 
mitigation available!
Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled 
via prctl and seccomp
MDS: Mitigation: Clear CPU buffers
Freeing SMP alternatives memory: 44K
clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, 
max_idle_ns: 881590591483 ns
installing Xen timer for CPU 0
smpboot: CPU0: Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz (family: 0x6, 
model: 0x3f, stepping: 0x2)
cpu 0 spinlock event irq 52
Performance Events: unsupported p6 CPU model 63 no PMU driver, software 
events only.
rcu: Hierarchical SRCU implementation.
NMI watchdog: Perf NMI watchdog permanently disabled
smp: Bringing up secondary CPUs ...
installing Xen timer for CPU 1
x86: Booting SMP configuration:
.... node  #0, CPUs:      #1
cpu 1 spinlock event irq 57
installing Xen timer for CPU 2
  #2
cpu 2 spinlock event irq 62
installing Xen timer for CPU 3
  #3
cpu 3 spinlock event irq 67
installing Xen timer for CPU 4
  #4
cpu 4 spinlock event irq 72
installing Xen timer for CPU 5
  #5
cpu 5 spinlock event irq 77
smp: Brought up 1 node, 6 CPUs
smpboot: Max logical packages: 1
smpboot: Total of 6 processors activated (28799.76 BogoMIPS)
devtmpfs: initialized
x86/mm: Memory block size: 128MB
PM: Registering ACPI NVS region [mem 0xfc000000-0xfc00afff] (45056 bytes)
clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, 
max_idle_ns: 1911260446275000 ns
futex hash table entries: 2048 (order: 5, 131072 bytes, linear)
pinctrl core: initialized pinctrl subsystem
NET: Registered protocol family 16
audit: initializing netlink subsys (disabled)
audit: type=2000 audit(1613423136.576:1): state=initialized 
audit_enabled=0 res=1
thermal_sys: Registered thermal governor 'fair_share'
thermal_sys: Registered thermal governor 'bang_bang'
thermal_sys: Registered thermal governor 'step_wise'
thermal_sys: Registered thermal governor 'user_space'
cpuidle: using governor ladder
cpuidle: using governor menu
ACPI: bus type PCI registered
dca service started, version 1.12.1
PCI: Using configuration type 1 for base access
HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
cryptd: max_cpu_qlen set to 1000
ACPI: Added _OSI(Module Device)
ACPI: Added _OSI(Processor Device)
ACPI: Added _OSI(3.0 _SCP Extensions)
ACPI: Added _OSI(Processor Aggregator Device)
ACPI: Added _OSI(Linux-Dell-Video)
random: fast init done
ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
ACPI: 3 ACPI AML tables successfully acquired and loaded
ACPI: Interpreter enabled
ACPI: (supports S0 S3 S4 S5)
ACPI: Using IOAPIC for interrupt routing
PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" 
and report a bug
ACPI: Enabled 2 GPEs in block 00 to 0F
ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
acpi PNP0A03:00: _OSC: OS supports [Segments MSI HPX-Type3]
acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended 
PCI configuration space under this bridge.
PCI host bridge to bus 0000:00
pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
pci_bus 0000:00: root bus resource [mem 0x40000000-0xfbffffff window]
pci_bus 0000:00: root bus resource [bus 00-ff]
pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
pci 0000:00:01.1: [8086:7010] type 00 class 0x010180
pci 0000:00:01.1: reg 0x20: [io  0xc300-0xc30f]
pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
pci 0000:00:01.3: [8086:7113] type 00 class 0x068000
pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
pci 0000:00:02.0: [5853:0001] type 00 class 0xff8000
pci 0000:00:02.0: reg 0x10: [io  0xc000-0xc0ff]
pci 0000:00:02.0: reg 0x14: [mem 0x52000000-0x52ffffff pref]
pci 0000:00:03.0: [1013:00b8] type 00 class 0x030000
pci 0000:00:03.0: reg 0x10: [mem 0x50000000-0x51ffffff pref]
pci 0000:00:03.0: reg 0x14: [mem 0x530bc000-0x530bcfff]
pci 0000:00:03.0: reg 0x30: [mem 0x530a0000-0x530affff pref]
pci 0000:00:05.0: [1b21:1242] type 00 class 0x0c0330
pci 0000:00:05.0: reg 0x10: [mem 0x530b0000-0x530b7fff 64bit]
pci 0000:00:05.0: enabling Extended Tags
pci 0000:00:06.0: [1002:6811] type 00 class 0x030000
pci 0000:00:06.0: reg 0x10: [mem 0x3ff40000000-0x3ff4fffffff 64bit pref]
pci 0000:00:06.0: reg 0x18: [mem 0x53040000-0x5307ffff 64bit]
pci 0000:00:06.0: reg 0x20: [io  0xc200-0xc2ff]
pci 0000:00:06.0: reg 0x30: [mem 0x53080000-0x5309ffff pref]
pci 0000:00:06.0: enabling Extended Tags
pci 0000:00:06.0: supports D1 D2
pci 0000:00:07.0: [1002:aab0] type 00 class 0x040300
pci 0000:00:07.0: reg 0x10: [mem 0x530b8000-0x530bbfff 64bit]
pci 0000:00:07.0: enabling Extended Tags
pci 0000:00:07.0: supports D1 D2
ACPI: PCI Interrupt Link [LNKA] (IRQs *5 10 11)
ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11)
ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11)
ACPI: PCI Interrupt Link [LNKD] (IRQs *5 10 11)
xen:balloon: Initialising balloon driver
iommu: Default domain type: Translated
pci 0000:00:03.0: vgaarb: setting as boot VGA device
pci 0000:00:03.0: vgaarb: VGA device added: 
decodes=io+mem,owns=io+mem,locks=none
pci 0000:00:06.0: vgaarb: VGA device added: 
decodes=io+mem,owns=io+mem,locks=none
pci 0000:00:03.0: vgaarb: no bridge control possible
pci 0000:00:06.0: vgaarb: bridge control possible
vgaarb: loaded
SCSI subsystem initialized
ACPI: bus type USB registered
usbcore: registered new interface driver usbfs
usbcore: registered new interface driver hub
usbcore: registered new device driver usb
pps_core: LinuxPPS API ver. 1 registered
pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti 
<giometti@linux.it>
PTP clock support registered
EDAC MC: Ver: 3.0.0
PCI: Using ACPI for IRQ routing
pci 0000:00:06.0: can't claim BAR 0 [mem 0x3ff40000000-0x3ff4fffffff 
64bit pref]: no compatible bridge window
hpet: 3 channels of 0 reserved for per-cpu timers
hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0
hpet0: 3 comparators, 64-bit 62.500000 MHz counter
clocksource: Switched to clocksource xen
VFS: Disk quotas dquot_6.6.0
VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
pnp: PnP ACPI init
system 00:00: [mem 0x00000000-0x0009ffff] could not be reserved
system 00:01: [io  0x08a0-0x08a3] has been reserved
system 00:01: [io  0x0cc0-0x0ccf] has been reserved
system 00:01: [io  0x04d0-0x04d1] has been reserved
system 00:07: [io  0xae00-0xae0f] has been reserved
system 00:07: [io  0xb044-0xb047] has been reserved
pnp: PnP ACPI: found 8 devices
clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 
2085701024 ns
NET: Registered protocol family 2
tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 
bytes, linear)
TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear)
TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear)
TCP: Hash tables configured (established 262144 bind 65536)
UDP hash table entries: 16384 (order: 7, 524288 bytes, linear)
UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear)
NET: Registered protocol family 1
RPC: Registered named UNIX socket transport module.
RPC: Registered udp transport module.
RPC: Registered tcp transport module.
RPC: Registered tcp NFSv4.1 backchannel transport module.
pci 0000:00:06.0: BAR 0: assigned [mem 0x40000000-0x4fffffff 64bit pref]
pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
pci_bus 0000:00: resource 7 [mem 0x40000000-0xfbffffff window]
pci 0000:00:01.0: PIIX3: Enabling Passive Release
pci 0000:00:00.0: Limiting direct PCI/PCI transfers
pci 0000:00:01.0: Activating ISA DMA hang workarounds
pci 0000:00:03.0: Video device with shadowed ROM at [mem 
0x000c0000-0x000dffff]
PCI: CLS 0 bytes, default 64
Unpacking initramfs...
Freeing initrd memory: 4656K
PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
software IO TLB: mapped [mem 0x000000003ba64000-0x000000003fa64000] (64MB)
clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x22982479f67, 
max_idle_ns: 440795221274 ns
check: Scanning for low memory corruption every 60 seconds
Initialise system trusted keyrings
workingset: timestamp_bits=46 max_order=23 bucket_order=0
squashfs: version 4.0 (2009/01/31) Phillip Lougher
NFS: Registering the id_resolver key type
Key type id_resolver registered
Key type id_legacy registered
nfs4filelayout_init: NFSv4 File Layout Driver Registering...
fuse: init (API version 7.33)
SGI XFS with ACLs, security attributes, realtime, scrub, repair, quota, 
no debug enabled
NET: Registered protocol family 38
Key type asymmetric registered
Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246)
io scheduler mq-deadline registered
io scheduler kyber registered
input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
ACPI: Power Button [PWRF]
input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input1
ACPI: Sleep Button [SLPF]
ioatdma: Intel(R) QuickData Technology Driver 5.00
xenbus: xs_reset_watches failed: -38
xen:xen_evtchn: Event-channel device installed
xen:grant_table: Grant tables using version 1 layout
Grant table initialized
Initialising Xen pvcalls frontend driver
Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
00:06: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
[drm] Registering XEN PV vdispl
loop: module loaded
Loading iSCSI transport class v2.0-870.
iscsi: registered transport (tcp)
ata_piix 0000:00:01.1: enabling device (0000 -> 0001)
scsi host0: ata_piix
scsi host1: ata_piix
ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc300 irq 14
ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc308 irq 15
e1000: Intel(R) PRO/1000 Network Driver
blkfront: xvde: flush diskcache: enabled; persistent grants: enabled; 
indirect descriptors: enabled;
e1000: Copyright (c) 1999-2006 Intel Corporation.
igb: Intel(R) Gigabit Ethernet Network Driver
igb: Copyright (c) 2007-2014 Intel Corporation.
ixgbe: Intel(R) 10 Gigabit PCI Express Network Driver
ixgbe: Copyright (c) 1999-2016 Intel Corporation.
ixgb: Intel(R) PRO/10GbE Network Driver
blkfront: xvdf: flush diskcache: enabled; persistent grants: enabled; 
indirect descriptors: enabled;
ixgb: Copyright (c) 1999-2008 Intel Corporation.
sky2: driver version 1.30
xen_netfront: Initialising Xen virtual ethernet driver
VFIO - User Level meta-driver version: 0.3
blkfront: xvdg: flush diskcache: enabled; persistent grants: enabled; 
indirect descriptors: enabled;
usbcore: registered new interface driver usb-storage
i8042: PNP: PS/2 Controller [PNP0303:PS2K,PNP0f13:PS2M] at 0x60,0x64 irq 
1,12
serio: i8042 KBD port at 0x60,0x64 irq 1
serio: i8042 AUX port at 0x60,0x64 irq 12
mousedev: PS/2 mouse device common for all mice
input: PC Speaker as /devices/platform/pcspkr/input/input2
input: AT Translated Set 2 keyboard as 
/devices/platform/i8042/serio0/input/input3
input: Xen Virtual Keyboard as /devices/virtual/input/input5
input: Xen Virtual Pointer as /devices/virtual/input/input7
rtc_cmos 00:02: registered as rtc0
rtc_cmos 00:02: setting system clock to 2021-02-15T21:05:38 UTC (1613423138)
rtc_cmos 00:02: alarms up to one day, 114 bytes nvram, hpet irqs
piix4_smbus 0000:00:01.3: SMBus Host Controller not enabled!
EDAC sbridge:  Ver: 1.1.2
intel_pstate: CPU model not supported
hid: raw HID events driver (C) Jiri Kosina
usbcore: registered new interface driver usbhid
usbhid: USB HID core driver
NET: Registered protocol family 10
Segment Routing with IPv6
NET: Registered protocol family 17
NET: Registered protocol family 41
Key type dns_resolver registered
IPI shorthand broadcast: enabled
AVX2 version of gcm_enc/dec engaged.
AES CTR mode by8 optimization enabled
sched_clock: Marking stable (1849594632, 525491026)->(2878509359, 
-503423701)
registered taskstats version 1
Loading compiled-in X.509 certificates
xenbus_probe_frontend: Device with no driver: device/pci/0
Freeing unused kernel image (initmem) memory: 1304K
Write protecting the kernel read-only data: 24576k
Freeing unused kernel image (text/rodata gap) memory: 2028K
Freeing unused kernel image (rodata/data gap) memory: 916K
Run /init as init process
[32;1m>>[0;39m[1m Console switched from '/dev/console' to 
'/dev/ttyS0'! [0;39m
[32;1m>>[0;39m[1m Genkernel 4.1.2 (2021-02-15 19:39:38 UTC). Linux 
kernel 5.11.0-gentoo-x86_64 [0;39m
[32;1m>>[0;39m[1m Activating udev ... [0;39m
[32;1m>>[0;39m[1m Determining root device (trying LABEL=RAID-GT) ...
[32;1m>>[0;39m[1m Root device detected as /dev/xvde! [0;39m
[32;1m>>[0;39m[1m Mounting /dev/xvde as root ... [0;39m
[32;1m>>[0;39m[1m Using mount -t xfs -o ro /dev/xvde /newroot [0;39m
[32;1m>>[0;39m[1m Switching to real root: switch_root /newroot 
/lib/systemd/systemd  [0;39m

Welcome to [1;32mGentoo/Linux[0m!

[[0;32m  OK  [0m] Created slice [0;1;39msystem-getty.slice[0m.
[[0;32m  OK  [0m] Created slice [0;1;39msystem-modprobe.slice[0m.
[[0;32m  OK  [0m] Created slice [0;1;39msystem-serial\x2dgetty.slice[0m.
[[0;32m  OK  [0m] Created slice [0;1;39msystem-syslog\x2dng.slice[0m.
[[0;32m  OK  [0m] Created slice [0;1;39msystem-systemd\x2dfsck.slice[0m.
[[0;32m  OK  [0m] Created slice [0;1;39mUser and Session Slice[0m.
[[0;32m  OK  [0m] Started [0;1;39mDispatch Password …ts to Console 
Directory Watch[0m.
[[0;32m  OK  [0m] Started [0;1;39mForward Password R…uests to Wall 
Directory Watch[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mPaths[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSlices[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mProcess Core Dump Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39minitctl Compatibility Named 
Pipe[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mJournal Audit Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mJournal Socket (/dev/log)[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mJournal Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mNetwork Service Netlink 
Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mudev Control Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mudev Kernel Socket[0m.
          Mounting [0;1;39mHuge Pages File System[0m...
          Mounting [0;1;39mPOSIX Message Queue File System[0m...
          Mounting [0;1;39mKernel Debug File System[0m...
          Mounting [0;1;39mKernel Trace File System[0m...
          Starting [0;1;39mCreate list of st…odes for the current 
kernel[0m...
          Starting [0;1;39mFile System Check on Root Device[0m...
          Starting [0;1;39mJournal Service[0m...
          Starting [0;1;39mLoad Kernel Modules[0m...
          Starting [0;1;39mColdplug All udev Devices[0m...
[[0;32m  OK  [0m] Mounted [0;1;39mHuge Pages File System[0m.
[[0;32m  OK  [0m] Mounted [0;1;39mPOSIX Message Queue File System[0m.
[[0;32m  OK  [0m] Mounted [0;1;39mKernel Debug File System[0m.
[[0;32m  OK  [0m] Mounted [0;1;39mKernel Trace File System[0m.
[[0;32m  OK  [0m] Finished [0;1;39mCreate list of st… nodes for the 
current kernel[0m.
[[0;32m  OK  [0m] Finished [0;1;39mFile System Check on Root Device[0m.
          Starting [0;1;39mRemount Root and Kernel File Systems[0m...
[[0;1;31mFAILED[0m] Failed to start [0;1;39mColdplug All udev 
Devices[0m.
See 'systemctl status systemd-udev-trigger.service' for details.
[[0;32m  OK  [0m] Finished [0;1;39mRemount Root and Kernel File 
Systems[0m.
          Starting [0;1;39mLoad/Save Random Seed[0m...
          Starting [0;1;39mCreate Static Device Nodes in /dev[0m...
[[0;32m  OK  [0m] Started [0;1;39mJournal Service[0m.
          Starting [0;1;39mFlush Journal to Persistent Storage[0m...
[[0;32m  OK  [0m] Finished [0;1;39mLoad/Save Random Seed[0m.
[[0;32m  OK  [0m] Finished [0;1;39mCreate Static Device Nodes in 
/dev[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mLocal File Systems (Pre)[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mContainers[0m.
          Starting [0;1;39mRule-based Manage…for Device Events and 
Files[0m...
[[0;32m  OK  [0m] Started [0;1;39mRule-based Manager for Device 
Events and Files[0m.
[[0;32m  OK  [0m] Found device [0;1;39m/dev/ttyS0[0m.
[[0;32m  OK  [0m] Found device [0;1;39m/dev/hvc0[0m.
[[0;32m  OK  [0m] Found device 
[0;1;39m/dev/disk/by-label/RAID-GT-SWAP[0m.
[[0;32m  OK  [0m] Finished [0;1;39mLoad Kernel Modules[0m.
[[0;32m  OK  [0m] Found device [0;1;39m/dev/disk/by-label/RAID-GT-PT[0m.
          Activating swap [0;1;39m/dev/disk/by-label/RAID-GT-SWAP[0m...
          Mounting [0;1;39mFUSE Control File System[0m...
          Mounting [0;1;39mKernel Configuration File System[0m...
          Starting [0;1;39mFile System 
Check…ev/disk/by-label/RAID-GT-PT[0m...
          Starting [0;1;39mApply Kernel Variables[0m...
          Starting [0;1;39mColdplug All udev Devices[0m...
[[0;32m  OK  [0m] Mounted [0;1;39mFUSE Control File System[0m.
[[0;32m  OK  [0m] Mounted [0;1;39mKernel Configuration File System[0m.
[[0;32m  OK  [0m] Finished [0;1;39mApply Kernel Variables[0m.
          Starting [0;1;39mNetwork Service[0m...
[[0;32m  OK  [0m] Activated swap 
[0;1;39m/dev/disk/by-label/RAID-GT-SWAP[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSwap[0m.
          Mounting [0;1;39m/tmp[0m...
          Mounting [0;1;39m/var/tmp/portage[0m...
[[0;32m  OK  [0m] Mounted [0;1;39m/tmp[0m.
[[0;32m  OK  [0m] Mounted [0;1;39m/var/tmp/portage[0m.
[[0;1;31mFAILED[0m] Failed to start [0;1;39mColdplug All udev 
Devices[0m.
See 'systemctl status systemd-udev-trigger.service' for details.
[[0;32m  OK  [0m] Finished [0;1;39mFile System 
Check…/dev/disk/by-label/RAID-GT-PT[0m.
          Mounting [0;1;39m/pt[0m...
[[0;32m  OK  [0m] Mounted [0;1;39m/pt[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mLocal File Systems[0m.
[[0;32m  OK  [0m] Started [0;1;39mNetwork Service[0m.
          Starting [0;1;39mWait for Network to be Configured[0m...
[[0m[0;31m*     [0m] (1 of 2) A start job is running for…Persistent 
Storage (4s / 1min 28s)
M [K[[0;32m  OK  [0m] Finished [0;1;39mFlush Journal to Persistent 
Storage[0m.
[K         Starting [0;1;39mCreate Volatile Files and Directories[0m...
[[0;32m  OK  [0m] Finished [0;1;39mCreate Volatile Files and 
Directories[0m.
          Starting [0;1;39mNetwork Name Resolution[0m...
          Starting [0;1;39mUpdate UTMP about System Boot/Shutdown[0m...
[[0;32m  OK  [0m] Finished [0;1;39mUpdate UTMP about System 
Boot/Shutdown[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSystem Initialization[0m.
[[0;32m  OK  [0m] Started [0;1;39mDaily Cleanup of Temporary 
Directories[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mTimers[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mACPID Listen Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mAvahi mDNS/DNS-SD Stack 
Activation Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mD-Bus System Message Bus 
Socket[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSockets[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mBasic System[0m.
[[0;32m  OK  [0m] Started [0;1;39mACPI event daemon[0m.
          Starting [0;1;39mSave/Restore Sound Card State[0m...
          Starting [0;1;39mAvahi mDNS/DNS-SD Stack[0m...
[[0;32m  OK  [0m] Started [0;1;39mCUPS Scheduler[0m.
[[0;32m  OK  [0m] Started [0;1;39mD-Bus System Message Bus[0m.
          Starting [0;1;39mUser Login Management[0m...
[[0;32m  OK  [0m] Finished [0;1;39mSave/Restore Sound Card State[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSound Card[0m.
[[0;32m  OK  [0m] Started [0;1;39mNetwork Name Resolution[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mNetwork[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mHost and Network Name 
Lookups[0m.
[[0;32m  OK  [0m] Started [0;1;39mBacula File Daemon service[0m.
          Starting [0;1;39mOpenSSH server daemon[0m...
[[0;32m  OK  [0m] Started [0;1;39mOpenSSH server daemon[0m.
[[0;32m  OK  [0m] Finished [0;1;39mWait for Network to be Configured[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mNetwork is Online[0m.
          Mounting [0;1;39m/home[0m...
          Mounting [0;1;39m/mnt/gentoo-share[0m...
          Mounting [0;1;39m/usr/local/portage[0m...
          Mounting [0;1;39m/usr/portage[0m...
          Starting [0;1;39mSystem Logger Daemon "default" instance[0m...
[[0;32m  OK  [0m] Started [0;1;39mUser Login Management[0m.
[[0;32m  OK  [0m] Started [0;1;39mAvahi mDNS/DNS-SD Stack[0m.
          Starting [0;1;39mManage, Install and Generate Color 
Profiles[0m...
[[0;32m  OK  [0m] Started [0;1;39mMake remote CUPS printers available 
locally[0m.
[[0;32m  OK  [0m] Mounted [0;1;39m/home[0m.
[[0;32m  OK  [0m] Mounted [0;1;39m/mnt/gentoo-share[0m.
[[0;32m  OK  [0m] Mounted [0;1;39m/usr/portage[0m.
[[0;32m  OK  [0m] Mounted [0;1;39m/usr/local/portage[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mRemote File Systems[0m.
          Starting [0;1;39mPermit User Sessions[0m...
[[0;32m  OK  [0m] Finished [0;1;39mPermit User Sessions[0m.
[[0;32m  OK  [0m] Created slice [0;1;39mUser Slice of UID 0[0m.
          Starting [0;1;39mCommand Scheduler[0m...
[[0;32m  OK  [0m] Started [0;1;39mGetty on tty1[0m.
          Starting [0;1;39mLight Display Manager[0m...
[[0;32m  OK  [0m] Started [0;1;39mSerial Getty on hvc0[0m.
[[0;32m  OK  [0m] Started [0;1;39mSerial Getty on ttyS0[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mLogin Prompts[0m.
          Starting [0;1;39mUser Runtime Directory /run/user/0[0m...
[[0;32m  OK  [0m] Started [0;1;39mCommand Scheduler[0m.
[[0;32m  OK  [0m] Finished [0;1;39mUser Runtime Directory 
/run/user/0[0m.
          Starting [0;1;39mUser Manager for UID 0[0m...
[[0;32m  OK  [0m] Started [0;1;39mManage, Install and Generate Color 
Profiles[0m.
[[0;32m  OK  [0m] Started [0;1;39mLight Display Manager[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mUser and Group Name Lookups[0m.
          Starting [0;1;39mAccounts Service[0m...
          Starting [0;1;39mAuthorization Manager[0m...
[[0;32m  OK  [0m] Started [0;1;39mUser Manager for UID 0[0m.
[[0;32m  OK  [0m] Started [0;1;39mSession 1 of user root[0m.
[[0;32m  OK  [0m] Started [0;1;39mSession 3 of user root[0m.
[[0;32m  OK  [0m] Started [0;1;39mAuthorization Manager[0m.
[[0;32m  OK  [0m] Started [0;1;39mAccounts Service[0m.
[[0;32m  OK  [0m] Started [0;1;39mSession 4 of user root[0m.
[[0;32m  OK  [0m] Started [0;1;39mSession 5 of user root[0m.
[[0;32m  OK  [0m] Started [0;1;39mSession 6 of user root[0m.
[[0;32m  OK  [0m] Started [0;1;39mSession 7 of user root[0m.


This is gt.alstadheim.priv.no (Linux x86_64 5.11.0-gentoo-x86_64) 22:05:58

gt login: BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] SMP
CPU: 5 PID: 0 Comm: swapper/5 Not tainted 5.11.0-gentoo-x86_64 #1
Hardware name: Xen HVM domU, BIOS 4.14.2-pre 02/10/2021
RIP: 0010:__skb_ext_put+0x9/0xb0
Code: 41 39 d3 0f 85 9c fe ff ff 8d 14 1f 89 50 04 e9 d0 fe ff ff 44 29 
fa 89 11 31 d2 eb c1 0f 1f 40 00 41 55 41 54 55 48 89 fd 53 <8b> 07 83 
f8 01 74 19 b8 ff ff ff ff f0 0f c1 07 83 f8 01 74 0b 85
RSP: 0018:ffffc9000018ce10 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff88810815e400 RCX: dead0000000000ff
RDX: ffffffff81999dc4 RSI: 0000000000000005 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000ca2 R09: 0000000000001000
R10: 00000000000002c0 R11: 0000000000000000 R12: ffffc9000018ceb8
R13: 0000000000000052 R14: ffff888101d34630 R15: 0000000000026b52
FS:  0000000000000000(0000) GS:ffff88856c540000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000121d63001 CR4: 00000000001706e0
Call Trace:
  <IRQ>
  kfree_skb+0x2a/0xa0
  xennet_poll+0x2d4/0x850
  net_rx_action+0x102/0x3c0
  __do_softirq+0xc8/0x28c
  asm_call_irq_on_stack+0xf/0x20
  </IRQ>
  do_softirq_own_stack+0x32/0x40
  irq_exit_rcu+0xa0/0xd0
  sysvec_xen_hvm_callback+0x36/0x80
  asm_sysvec_xen_hvm_callback+0x12/0x20
RIP: 0010:native_safe_halt+0xe/0x10
Code: 48 8b 04 25 40 7c 01 00 f0 80 48 02 20 48 8b 00 a8 08 75 c4 e9 7b 
ff ff ff cc cc cc e9 07 00 00 00 0f 00 2d 2c 85 5a 00 fb f4 <c3> 90 e9 
07 00 00 00 0f 00 2d 1c 85 5a 00 f4 c3 cc cc 53 65 8b 15
RSP: 0018:ffffc900000a7e80 EFLAGS: 00000286
RAX: 0000000000004000 RBX: 0000000000000001 RCX: ffff88856c56c6c0
RDX: ffff88856c540000 RSI: ffff888100c5c400 RDI: ffff888101a69c00
RBP: ffff888100c5c464 R08: ffffffff8292ca00 R09: 0000000000000018
R10: 000000000000007c R11: ffff88856c56abe4 R12: 0000000000000001
R13: ffffffff8292ca80 R14: 0000000000000001 R15: 0000000000000000
  acpi_safe_halt+0x20/0x40
  acpi_idle_enter+0xe1/0x110
  cpuidle_enter_state+0x77/0x350
  cpuidle_enter+0x24/0x40
  do_idle+0x215/0x2c0
  cpu_startup_entry+0x14/0x20
  secondary_startup_64_no_verify+0xb0/0xbb
Modules linked in: vhci_hcd md4 cmac cifs rpcsec_gss_krb5 libarc4 
snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_hda_codec 
snd_hwdep snd_hda_core snd_pcm snd_timer joydev snd ghash_clmulni_intel 
soundcore amdgpu drm_ttm_helper ttm mfd_core gpu_sched crc32_pclmul 
xhci_pci crc32c_intel xhci_hcd
CR2: 0000000000000000
---[ end trace ef154755948eaf00 ]---
BUG: unable to handle page fault for address: 000000000070776d
RIP: 0010:__skb_ext_put+0x9/0xb0
#PF: supervisor read access in kernel mode
Code: 41 39 d3 0f 85 9c fe ff ff 8d 14 1f 89 50 04 e9 d0 fe ff ff 44 29 
fa 89 11 31 d2 eb c1 0f 1f 40 00 41 55 41 54 55 48 89 fd 53 <8b> 07 83 
f8 01 74 19 b8 ff ff ff ff f0 0f c1 07 83 f8 01 74 0b 85
#PF: error_code(0x0000) - not-present page
RSP: 0018:ffffc9000018ce10 EFLAGS: 00010286
PGD 1be80f067 P4D 1be80f067 PUD 0
Oops: 0000 [#2] SMP
CPU: 1 PID: 0 Comm: swapper/1 Tainted: G      D 5.11.0-gentoo-x86_64 #1
Hardware name: Xen HVM domU, BIOS 4.14.2-pre 02/10/2021
RIP: 0010:__skb_ext_put+0x9/0xb0

Code: 41 39 d3 0f 85 9c fe ff ff 8d 14 1f 89 50 04 e9 d0 fe ff ff 44 29 
fa 89 11 31 d2 eb c1 0f 1f 40 00 41 55 41 54 55 48 89 fd 53 <8b> 07 83 
f8 01 74 19 b8 ff ff ff ff f0 0f c1 07 83 f8 01 74 0b 85
RAX: 0000000000000000 RBX: ffff88810815e400 RCX: dead0000000000ff
RSP: 0018:ffffc900000dce10 EFLAGS: 00010286
RDX: ffffffff81999dc4 RSI: 0000000000000005 RDI: 0000000000000000

RAX: 0000000000000000 RBX: ffff888108210700 RCX: dead0000000000ff
RBP: 0000000000000000 R08: 0000000000000ca2 R09: 0000000000001000
RDX: ffffffff81999dc4 RSI: 0000000000000003 RDI: 000000000070776d
R10: 00000000000002c0 R11: 0000000000000000 R12: ffffc9000018ceb8
RBP: 000000000070776d R08: 0000000000001000 R09: 0000000000001000
R13: 0000000000000052 R14: ffff888101d34630 R15: 0000000000026b52
R10: 00000000000002c0 R11: 0000000000000000 R12: ffffc900000dceb8
FS:  0000000000000000(0000) GS:ffff88856c540000(0000) knlGS:0000000000000000
R13: 0000000000000034 R14: ffff888101d30030 R15: 0000000000000634
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
FS:  0000000000000000(0000) GS:ffff88856c440000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000070776d CR3: 00000001d1187005 CR4: 00000000001706e0
Call Trace:
  <IRQ>
  kfree_skb+0x2a/0xa0
CR2: 0000000000000000 CR3: 0000000121d63001 CR4: 00000000001706e0
  xennet_poll+0x2d4/0x850
  ? clockevents_program_event+0x82/0xe0
  net_rx_action+0x102/0x3c0
  __do_softirq+0xc8/0x28c
  asm_call_irq_on_stack+0xf/0x20
  </IRQ>
  do_softirq_own_stack+0x32/0x40
  irq_exit_rcu+0xa0/0xd0
  sysvec_xen_hvm_callback+0x36/0x80
  asm_sysvec_xen_hvm_callback+0x12/0x20
RIP: 0010:native_safe_halt+0xe/0x10
Code: 48 8b 04 25 40 7c 01 00 f0 80 48 02 20 48 8b 00 a8 08 75 c4 e9 7b 
ff ff ff cc cc cc e9 07 00 00 00 0f 00 2d 2c 85 5a 00 fb f4 <c3> 90 e9 
07 00 00 00 0f 00 2d 1c 85 5a 00 f4 c3 cc cc 53 65 8b 15
RSP: 0018:ffffc90000087e80 EFLAGS: 00000286
RAX: 0000000000004000 RBX: 0000000000000001 RCX: ffff88856c46c6c0
RDX: ffff88856c440000 RSI: ffff888100b8b400 RDI: ffff8881058dfc00
RBP: ffff888100b8b464 R08: ffffffff8292ca00 R09: 0000000000000008
R10: 00000000000003cb R11: ffff88856c46abe4 R12: 0000000000000001
R13: ffffffff8292ca80 R14: 0000000000000001 R15: 0000000000000000
  acpi_safe_halt+0x20/0x40
  acpi_idle_enter+0xe1/0x110
  cpuidle_enter_state+0x77/0x350
  cpuidle_enter+0x24/0x40
  do_idle+0x215/0x2c0
  cpu_startup_entry+0x14/0x20
  secondary_startup_64_no_verify+0xb0/0xbb
Modules linked in: vhci_hcd md4 cmac cifs rpcsec_gss_krb5 libarc4 
snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_hda_codec 
snd_hwdep snd_hda_core snd_pcm snd_timer joydev snd ghash_clmulni_intel 
soundcore amdgpu drm_ttm_helper ttm mfd_core gpu_sched crc32_pclmul 
xhci_pci crc32c_intel xhci_hcd
CR2: 000000000070776d
---[ end trace ef154755948eaf01 ]---
RIP: 0010:__skb_ext_put+0x9/0xb0
Code: 41 39 d3 0f 85 9c fe ff ff 8d 14 1f 89 50 04 e9 d0 fe ff ff 44 29 
fa 89 11 31 d2 eb c1 0f 1f 40 00 41 55 41 54 55 48 89 fd 53 <8b> 07 83 
f8 01 74 19 b8 ff ff ff ff f0 0f c1 07 83 f8 01 74 0b 85
RSP: 0018:ffffc9000018ce10 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff88810815e400 RCX: dead0000000000ff
RDX: ffffffff81999dc4 RSI: 0000000000000005 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000ca2 R09: 0000000000001000
R10: 00000000000002c0 R11: 0000000000000000 R12: ffffc9000018ceb8
R13: 0000000000000052 R14: ffff888101d34630 R15: 0000000000026b52
FS:  0000000000000000(0000) GS:ffff88856c440000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000070776d CR3: 00000001d1187005 CR4: 00000000001706e0
Kernel panic - not syncing: Fatal exception in interrupt
Shutting down cpus with NMI
Kernel Offset: disabled
------------- xl info: ---------

xl info
host                   : gentoo
release                : 5.11.0-gentoo-x86_64
version                : #1 SMP Mon Feb 15 22:29:11 CET 2021
machine                : x86_64
nr_cpus                : 12
max_cpu_id             : 11
nr_nodes               : 2
cores_per_socket       : 6
threads_per_core       : 1
cpu_mhz                : 2399.990
hw_caps                : 
bfebfbff:77fef3ff:2c100800:00000021:00000001:000037ab:00000000:00000100
virt_caps              : pv hvm hvm_directio pv_directio hap shadow 
iommu_hap_pt_share
total_memory           : 130953
free_memory            : 1551
sharing_freed_memory   : 0
sharing_used_memory    : 0
outstanding_claims     : 0
free_cpus              : 0
xen_major              : 4
xen_minor              : 14
xen_extra              : .2-pre
xen_version            : 4.14.2-pre
xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 
hvm-3.0-x86_32p hvm-3.0-x86_64
xen_scheduler          : credit2
xen_pagesize           : 4096
platform_params        : virt_start=0xffff800000000000
xen_changeset          :
xen_commandline        : xen.cfg xen-marker-52 console_timestamps=date 
iommu=1 com1=115200,8n1 console=com1 conswitch=lx 
cpufreq=xen:performance,verbose smt=0 maxcpus=12 core_parking=power 
nmi=dom0 gnttab_max_frames=512 gnttab_max_maptrack_frames=1024 
vcpu_migration_delay=2000 tickle_one_idle_cpu=1 spec-ctrl=no-xen 
sched=credit2 timer_slop=5000 max_cstate=2 dom0_mem=16G,max:16G 
dom0_max_vcpus=8 ept=exec_sp=1
cc_compiler            : gcc (Gentoo 9.3.0-r2 p4) 9.3.0
cc_compile_by          : hakon
cc_compile_domain      : alstadheim.priv.no
cc_compile_date        : Sat Feb 13 22:07:40 CET 2021
build_id               : d3fb26987b749da48c2549b12ba9ea4a
xend_config_format     : 4
0:root@gentoo ~ #

---

Håkon




From xen-users-bounces@lists.xenproject.org Tue Feb 16 12:36:20 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Feb 2021 12:36:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.85542.160527 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBzaO-0002YI-0L; Tue, 16 Feb 2021 12:36:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 85542.160527; Tue, 16 Feb 2021 12:36:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBzaN-0002Xv-O8; Tue, 16 Feb 2021 12:36:11 +0000
Received: by outflank-mailman (input) for mailman id 85542;
 Tue, 16 Feb 2021 12:36:11 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=y7oK=HS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lBzaM-0001zG-Qh
 for xen-users@lists.xen.org; Tue, 16 Feb 2021 12:36:10 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 64ffd9fb-5b5f-406e-9569-84fe0147aac7;
 Tue, 16 Feb 2021 12:35:34 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZh-0008Mj-8f; Tue, 16 Feb 2021 12:35:29 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZh-0002ZO-3z; Tue, 16 Feb 2021 12:35:29 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 64ffd9fb-5b5f-406e-9569-84fe0147aac7
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=6uIFfku8/Q5IsCoK+QTF4nmrkhXMtquEX3JaPS97YIU=; b=bDZA++vMBKc3gSRgVHpMDYWhO6
	a53h5gkN/Mu4INhupxvR4tjZNbkCU5xxc3by3YuhgFlU4ZuYvxfBO3WrHXXNTrSrmxQJavmiQhG4D
	gPwrhsRPEY7e7CMImoH5qAIWoeh59TPhU8+VouZK4Tu9liTXg5qO6UH9yomsgTpaaZ9o=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 361 v4 (CVE-2021-26932) - Linux: grant
 mapping error handling issues
Message-Id: <E1lBzZh-0002ZO-3z@xenbits.xenproject.org>
Date: Tue, 16 Feb 2021 12:35:29 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-26932 / XSA-361
                               version 4

                Linux: grant mapping error handling issues

UPDATES IN VERSION 4
====================

Public release.

ISSUE DESCRIPTION
=================

Grant mapping operations often occur in batch hypercalls, where a
number of operations are done in a single hypercall, the success or
failure of each one reported to the backend driver, and the backend
driver then loops over the results, performing follow-up actions based
on the success or failure of each operation.

Unfortunately, when running in PV mode, the Linux backend drivers
mishandle this: Some errors are ignored, effectively implying their
success from the success of related batch elements.  In other cases,
errors resulting from one batch element lead to further batch elements
not being inspected, and hence successful ones to not be possible to
properly unmap upon error recovery.

IMPACT
======

A malicious or buggy frontend driver may be able to crash the
corresponding backend driver, causing a denial of service potentially
affecting the entire domain running the backend driver.

A malicious or buggy frontend driver may be able to cause resource
leaks in the domain running the corresponding backend driver, leading
to a denial of service.

VULNERABLE SYSTEMS
==================

All Linux versions back to at least 3.2 are vulnerable, when running in
PV mode on x86 or when running on Arm.

On x86, only systems with Linux backends running in PV mode are
vulnerable.  Linux backends run in HVM / PVH modes are not vulnerable.

MITIGATION
==========

On x86, running the backends in HVM or PVH domains will avoid the
vulnerability.

For protocols where other, e.g. non-kernel-based backends are available,
reconfiguring guests to use alternative (e.g. qemu-based) backends may
allow to avoid the vulnerability as long as these backends don't rely on
similar functionality provided by the xen-gntdev (/dev/gntdev) driver.

In all other cases there is no known mitigation.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the attached patches resolves this issue.

xsa361-linux-1.patch           Linux 5.11-rc - 3.19
xsa361-linux-2.patch           Linux 5.11-rc - 3.15
xsa361-linux-3.patch           Linux 5.11-rc - 4.19
xsa361-linux-4.patch           Linux 5.11-rc - 4.19
xsa361-linux-5.patch           Linux 5.11-rc - 4.4

$ sha256sum xsa361*
bb00ab6319b4fc536566af50c73e064f10f8b99eaa6b0f0b35a8d174c285a905  xsa361-linux-1.patch
73b6a54aa3773ce11f0de6b9aa1d80dd7f4c297dc71924b1a3886bc3b99ac859  xsa361-linux-2.patch
8e554cfab8cdb4fe1b74601a9432ea4c570f74a952ad757f9294ba1666cbeaea  xsa361-linux-3.patch
8c290895d10fc148f99e2a6587811b3037f29c3a0201d69d448ff520cea6f96d  xsa361-linux-4.patch
231ae3e1b9bec1b75dbbbee4b5acff620ef7ac2853332aa7b3c4957c6ca7f341  xsa361-linux-5.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches described above (or others which are
substantially similar) is permitted during the embargo, even on
public-facing systems with untrusted guest users and administrators.

Deployment of the mitigation to switch to HVM / PVH backend domains is
also permitted during the embargo, even on public-facing systems with
untrusted guest users and administrators.

HOWEVER, deployment of the non-kernel-based backends mitigation
described above is NOT permitted during the embargo on public-facing
systems with untrusted guest users and administrators.  This is because
such a configuration change may be recognizable by the affected guests.

AND: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmAru/QMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZmFkH/Ay1RoZbbcA4ywdhy9xdnpt0DHMFLjZSbE4sNTi+
J+m9rn69UTK01VDD0RUohTcmWO0nv8ZD+jKETsSq31GiYhVk7XnSmCJkzILGujr8
cf+7jUWWJPcqBmN7xcLBaor9lhpKfMpYlMLBG7twIRHfqOSw6Sm+iD4YC23nkGKF
Cb8tpkYCpX3dPMMP74nX00Wta2rqd1BrpAGvAnt9hrHIBfTcpwWE8A4H1eFL/7Dv
5+pVvrSMkyzaR5kI/QBeriXsuOP509CiafUBpeXU85pGWpLgZAqD+puodEVQ2fpT
/MqATdNRhgnCzqSqh/ElN/1ZdB7406DbdCnErJiyDdN/OCE=
=DUXr
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa361-linux-1.patch"
Content-Disposition: attachment; filename="xsa361-linux-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa361-linux-2.patch"
Content-Disposition: attachment; filename="xsa361-linux-2.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa361-linux-3.patch"
Content-Disposition: attachment; filename="xsa361-linux-3.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa361-linux-4.patch"
Content-Disposition: attachment; filename="xsa361-linux-4.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiBYZW4vZ250ZGV2OiBjb3JyZWN0IGVycm9yIGNoZWNraW5nIGluIGdudGRl
dl9tYXBfZ3JhbnRfcGFnZXMoKQoKRmFpbHVyZSBvZiB0aGUga2VybmVsIHBh
cnQgb2YgdGhlIG1hcHBpbmcgb3BlcmF0aW9uIHNob3VsZCBhbHNvIGJlCmlu
ZGljYXRlZCBhcyBhbiBlcnJvciB0byB0aGUgY2FsbGVyLCBvciBlbHNlIGl0
IG1heSBhc3N1bWUgdGhlCnJlc3BlY3RpdmUga2VybmVsIFZBIGlzIG9rYXkg
dG8gYWNjZXNzLgoKRnVydGhlcm1vcmUgZ250dGFiX21hcF9yZWZzKCkgZmFp
bGluZyBzdGlsbCByZXF1aXJlcyByZWNvcmRpbmcKc3VjY2Vzc2Z1bGx5IG1h
cHBlZCBoYW5kbGVzLCBzbyB0aGV5IGNhbiBiZSB1bm1hcHBlZCBzdWJzZXF1
ZW50bHkuIFRoaXMKaW4gdHVybiByZXF1aXJlcyB0aGVyZSB0byBiZSBhIHdh
eSB0byB0ZWxsIGZ1bGwgaHlwZXJjYWxsIGZhaWx1cmUgZnJvbQpwYXJ0aWFs
IHN1Y2Nlc3MgLSBwcmVzZXQgbWFwX29wIHN0YXR1cyBmaWVsZHMgc3VjaCB0
aGF0IHRoZXkgd29uJ3QKImhhcHBlbiIgdG8gbG9vayBhcyBpZiB0aGUgb3Bl
cmF0aW9uIHN1Y2NlZWRlZC4KCkFsc28gYWdhaW4gdXNlIEdOVFNUX29rYXkg
aW5zdGVhZCBvZiBpbXBseWluZyBpdHMgdmFsdWUgKHplcm8pLgoKVGhpcyBp
cyBwYXJ0IG9mIFhTQS0zNjEuCgpTaWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGlj
aCA8amJldWxpY2hAc3VzZS5jb20+CkNjOiBzdGFibGVAdmdlci5rZXJuZWwu
b3JnClJldmlld2VkLWJ5OiBKdWVyZ2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5j
b20+Ci0tLQp2NDogU3BsaXQgb3V0IHRoZSB2MyBjaGFuZ2VzIGFuZCByZS1i
YXNlIG92ZXIgdGhlIHJlc3VsdGluZyBlYXJsaWVyCiAgICBwYXRjaC4KdjM6
IEFsc28gZml4IEdOVE1BUF9kZXZpY2VfbWFwIC8gLT5kZXZfYnVzX2FkZHIg
aGFuZGxpbmcuCnYyOiBEcm9wIGFuIGluYXBwbGljYWJsZSBwYXJ0IG9mIHRo
ZSBkZXNjcmlwdGlvbi4gVXNlIDEgaW5zdGVhZCBvZgogICAgX19MSU5FX18u
CgotLS0gYS9kcml2ZXJzL3hlbi9nbnRkZXYuYworKysgYi9kcml2ZXJzL3hl
bi9nbnRkZXYuYwpAQCAtMzM0LDIxICszMzQsMjIgQEAgaW50IGdudGRldl9t
YXBfZ3JhbnRfcGFnZXMoc3RydWN0IGdudGRldgogCXByX2RlYnVnKCJtYXAg
JWQrJWRcbiIsIG1hcC0+aW5kZXgsIG1hcC0+Y291bnQpOwogCWVyciA9IGdu
dHRhYl9tYXBfcmVmcyhtYXAtPm1hcF9vcHMsIHVzZV9wdGVtb2QgPyBtYXAt
PmttYXBfb3BzIDogTlVMTCwKIAkJCW1hcC0+cGFnZXMsIG1hcC0+Y291bnQp
OwotCWlmIChlcnIpCi0JCXJldHVybiBlcnI7CiAKIAlmb3IgKGkgPSAwOyBp
IDwgbWFwLT5jb3VudDsgaSsrKSB7Ci0JCWlmIChtYXAtPm1hcF9vcHNbaV0u
c3RhdHVzKSB7CisJCWlmIChtYXAtPm1hcF9vcHNbaV0uc3RhdHVzID09IEdO
VFNUX29rYXkpCisJCQltYXAtPnVubWFwX29wc1tpXS5oYW5kbGUgPSBtYXAt
Pm1hcF9vcHNbaV0uaGFuZGxlOworCQllbHNlIGlmICghZXJyKQogCQkJZXJy
ID0gLUVJTlZBTDsKLQkJCWNvbnRpbnVlOwotCQl9CiAKIAkJaWYgKG1hcC0+
ZmxhZ3MgJiBHTlRNQVBfZGV2aWNlX21hcCkKIAkJCW1hcC0+dW5tYXBfb3Bz
W2ldLmRldl9idXNfYWRkciA9IG1hcC0+bWFwX29wc1tpXS5kZXZfYnVzX2Fk
ZHI7CiAKLQkJbWFwLT51bm1hcF9vcHNbaV0uaGFuZGxlID0gbWFwLT5tYXBf
b3BzW2ldLmhhbmRsZTsKLQkJaWYgKHVzZV9wdGVtb2QpCi0JCQltYXAtPmt1
bm1hcF9vcHNbaV0uaGFuZGxlID0gbWFwLT5rbWFwX29wc1tpXS5oYW5kbGU7
CisJCWlmICh1c2VfcHRlbW9kKSB7CisJCQlpZiAobWFwLT5rbWFwX29wc1tp
XS5zdGF0dXMgPT0gR05UU1Rfb2theSkKKwkJCQltYXAtPmt1bm1hcF9vcHNb
aV0uaGFuZGxlID0gbWFwLT5rbWFwX29wc1tpXS5oYW5kbGU7CisJCQllbHNl
IGlmICghZXJyKQorCQkJCWVyciA9IC1FSU5WQUw7CisJCX0KIAl9CiAJcmV0
dXJuIGVycjsKIH0KLS0tIGEvaW5jbHVkZS94ZW4vZ3JhbnRfdGFibGUuaAor
KysgYi9pbmNsdWRlL3hlbi9ncmFudF90YWJsZS5oCkBAIC0xNTcsNiArMTU3
LDcgQEAgZ250dGFiX3NldF9tYXBfb3Aoc3RydWN0IGdudHRhYl9tYXBfZ3Jh
bgogCW1hcC0+ZmxhZ3MgPSBmbGFnczsKIAltYXAtPnJlZiA9IHJlZjsKIAlt
YXAtPmRvbSA9IGRvbWlkOworCW1hcC0+c3RhdHVzID0gMTsgLyogYXJiaXRy
YXJ5IHBvc2l0aXZlIHZhbHVlICovCiB9CiAKIHN0YXRpYyBpbmxpbmUgdm9p
ZAo=

--=separator
Content-Type: application/octet-stream; name="xsa361-linux-5.patch"
Content-Disposition: attachment; filename="xsa361-linux-5.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Feb 16 12:36:20 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Feb 2021 12:36:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.85533.160439 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBza9-00028h-9a; Tue, 16 Feb 2021 12:35:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 85533.160439; Tue, 16 Feb 2021 12:35:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBza9-00028Y-5R; Tue, 16 Feb 2021 12:35:57 +0000
Received: by outflank-mailman (input) for mailman id 85533;
 Tue, 16 Feb 2021 12:35:55 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=y7oK=HS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lBza7-0001zG-Q1
 for xen-users@lists.xen.org; Tue, 16 Feb 2021 12:35:55 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id cc82297d-811e-47da-95c3-8465355eaf5e;
 Tue, 16 Feb 2021 12:35:35 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZi-0008Mx-Q1; Tue, 16 Feb 2021 12:35:30 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZi-0002bO-P6; Tue, 16 Feb 2021 12:35:30 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: cc82297d-811e-47da-95c3-8465355eaf5e
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=CNx9HA2TuAgcqoV4Hd77YdCoDcvs1DeLFjIGIr9cIf8=; b=VNhge+CiWitYtuDMDdiguZfn3B
	obUidPsr5cz3im2ad4rV5YsGbjJbYFE5FYlUnP8elWnZbO9bjGekvUFcfkltrDh9aipBXOd65NcP0
	j4WJcnoja+Yva7WGZjdXG/fdKbPHTdz3VuXv+wY+CqwcQZprR16SROClEB74DU33CmgQ=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 363 v3 (CVE-2021-26934) - Linux: display
 frontend "be-alloc" mode is unsupported
Message-Id: <E1lBzZi-0002bO-P6@xenbits.xenproject.org>
Date: Tue, 16 Feb 2021 12:35:30 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-26934 / XSA-363
                               version 3

        Linux: display frontend "be-alloc" mode is unsupported

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

The backend allocation mode of Linux'es drm_xen_front drivers was
not meant to be a supported configuration, but this wasn't stated
accordingly in its support status entry.

IMPACT
======

Use of the feature may have unknown effects.

VULNERABLE SYSTEMS
==================

Linux versions from 4.18 onwards are affected.  Earlier Linux versions
do not provide the affected driver.

MITIGATION
==========

Not using the driver or its backend allocation mode will avoid the
vulnerability.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the attached patch documents the situation.  The patch does
not fix any security issues.

xsa363.patch           xen-unstable

$ sha256sum xsa363*
cf2f2eff446aec625b19d9d01301ec66098b58b792d74012235f10c62a21bb68  xsa363.patch
$

-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmAru/UMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZSocH/3jAI0MeZtnhvuyOM4CxkNmr0fI4HIXnA1xGNhWY
Wa2WgtOuFVaPUFX1Tj/e6zCoibatl1gicETI9hL+w4Dg6/GzIeTogOuzv5D6Ux91
9a6n2tryFfSAs0OxTKq6etLv63VEEicYMHrZT8n700JFvJsAWYAMvuanMDknGxBP
5/Z+DASnZxT09cpvP4REKuG7rW9vIif+6EZ0T0kU87InouDts/YOhzNsdvBD1wKH
y5e/MZh2sOyMOovuhgbvoK+YezHTAcZeGWnUk3yQoTGnW3p+W9XZVURsc8/e2FbZ
heY3Tj918LsY50wGpMZ2PDoHC8PSHaUqEOTq0MPmnPlppvU=
=tJD0
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa363.patch"
Content-Disposition: attachment; filename="xsa363.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiBTVVBQT1JULm1kOiBQViBkaXNwbGF5IGZyb250ZW5kIGlzIHVuc3VwcG9y
dGVkIGluICJiYWNrZW5kIGFsbG9jYXRpb24iIG1vZGUKClRoaXMgd2Fzbid0
IG1lYW50IHRvIGJlIHN1cHBvcnRlZCwgYnV0IHdhc24ndCBzdGF0ZWQgdGhp
cyB3YXkuCgpUaGlzIGlzIFhTQS0zNjMuCgpSZXBvcnRlZC1ieTogSmFuIEJl
bGljaCA8amJldWxpY2hAc3VzZS5jb20+ClNpZ25lZC1vZmYtYnk6IEphbiBC
ZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNvbT4KCi0tLSBhL1NVUFBPUlQubWQK
KysrIGIvU1VQUE9SVC5tZApAQCAtNDE0LDcgKzQxNCw4IEBAIEd1ZXN0LXNp
ZGUgZHJpdmVyIGNhcGFibGUgb2Ygc3BlYWtpbmcgdGgKIAogR3Vlc3Qtc2lk
ZSBkcml2ZXIgY2FwYWJsZSBvZiBzcGVha2luZyB0aGUgWGVuIFBWIGRpc3Bs
YXkgcHJvdG9jb2wKIAotICAgIFN0YXR1cywgTGludXg6IFN1cHBvcnRlZAor
ICAgIFN0YXR1cywgTGludXg6IFN1cHBvcnRlZCAob3V0c2lkZSBvZiAiYmFj
a2VuZCBhbGxvY2F0aW9uIiBtb2RlKQorICAgIFN0YXR1cywgTGludXg6IEV4
cGVyaW1lbnRhbCAoaW4gImJhY2tlbmQgYWxsb2NhdGlvbiIgbW9kZSkKIAog
IyMjIFBWIENvbnNvbGUgKGZyb250ZW5kKQogCg==

--=separator--


From xen-users-bounces@lists.xenproject.org Tue Feb 16 12:36:20 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Feb 2021 12:36:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.85531.160422 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBza6-00026E-Q5; Tue, 16 Feb 2021 12:35:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 85531.160422; Tue, 16 Feb 2021 12:35:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBza6-000264-LM; Tue, 16 Feb 2021 12:35:54 +0000
Received: by outflank-mailman (input) for mailman id 85531;
 Tue, 16 Feb 2021 12:35:53 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=y7oK=HS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lBza5-0001zb-4o
 for xen-users@lists.xen.org; Tue, 16 Feb 2021 12:35:53 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id e7cbe405-2f49-4d8d-b1e0-17b00f36c61f;
 Tue, 16 Feb 2021 12:35:36 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZk-0008NO-5U; Tue, 16 Feb 2021 12:35:32 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZk-0002dG-4W; Tue, 16 Feb 2021 12:35:32 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: e7cbe405-2f49-4d8d-b1e0-17b00f36c61f
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=6tV55iGlOj7+xKBOO1uuq23eO+x9bBJGrqnaJXGM2+U=; b=roUx5Vw3x3kv1tIxON22i8ODSL
	MsKzPjCaj+6V9eQ8nrLYY4nOCpHM789U9I2GXZR4Pzx3QDB99QDFDwUCtg1m0/ShnLcSmp+Douwsi
	zEYJDCmJqNDdvdWN5BUUOGSds7M2oo9OFj+OwoRAzEyJ7NYSvexCbsO6z6mKFGcGXsTs=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 365 v3 (CVE-2021-26930) - Linux: error
 handling issues in blkback's grant mapping
Message-Id: <E1lBzZk-0002dG-4W@xenbits.xenproject.org>
Date: Tue, 16 Feb 2021 12:35:32 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-26930 / XSA-365
                               version 3

        Linux: error handling issues in blkback's grant mapping

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

To service requests, the driver maps grant references provided by the
frontend.  In this process, errors may be encountered.  In one case an
error encountered earlier might be discarded by later processing,
resulting in the caller assuming successful mapping, and hence
subsequent operations trying to access space that wasn't mapped.  In
another case internal state would be insufficiently updated, preventing
safe recovery from the error.

IMPACT
======

A malicious or buggy frontend driver may be able to crash the
corresponding backend driver, potentially affecting the entire domain
running the backend driver.  In configurations without driver domains
or similar disaggregation, that is a host-wide denial of sevice.

Privilege escalation and information leaks cannot be ruled out.

VULNERABLE SYSTEMS
==================

Linux versions from at least 3.11 onwards are vulnerable.

MITIGATION
==========

Reconfiguring guests to use alternative (e.g. qemu-based) backends may
avoid the vulnerability.

CREDITS
=======

This issue was discovered by Olivier Benjamin, Norbert Manthey, Martin
Mazein, and Jan H. Schönherr, all from Amazon.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa365-linux.patch           Linux 5.11-rc - 5.10

$ sha256sum xsa365*
7e45fcf3c70eb40debe9997a1773de7c4a2edcde5c23f76aeb5c1b6e3a34a654  xsa365-linux.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches described above (or others which are
substantially similar) is permitted during the embargo, even on
public-facing systems with untrusted guest users and administrators.

HOWEVER, deployment of the non-kernel-based backends mitigation
described above is NOT permitted during the embargo on public-facing
systems with untrusted guest users and administrators.  This is because
such a configuration change may be recognizable by the affected guests.

AND: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmAru/UMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZnpQH/jMHOQao08C5s4VlCUIDJTJ8AZXIjFKW2zOKBqt5
Gp7HiRZSLKa2s/dqxIdiVHTnMzGyFegfzK0AeLjLeftSbOANSvI9tx/S6ajOr6Mx
s5j0r2JzCBsh1bULJbRV7MBVaRqyOR77i3sREu7o0uuRxMd0RNnck7rVm0slmG1P
FoFfC2tF+gxnYZi8tpBS4aY/e3tZ4y+J6s0Fgyfln4p33/j1JwILzzYscGnRdDvG
31DnotOq3E+TqcTZRK4BrLJqZodZLsd9en1DriJj2dDqrobs6QS4sZkHKX20gcxC
RnGvkdHXI+u/du6qpb3GHep2F5pg5+2vMzBNvxxBjr8vmi4=
=HBCB
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa365-linux.patch"
Content-Disposition: attachment; filename="xsa365-linux.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Feb 16 12:39:27 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Feb 2021 12:39:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.85614.160574 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBzdE-0004Kj-Mq; Tue, 16 Feb 2021 12:39:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 85614.160574; Tue, 16 Feb 2021 12:39:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBzdE-0004Ka-Iw; Tue, 16 Feb 2021 12:39:08 +0000
Received: by outflank-mailman (input) for mailman id 85614;
 Tue, 16 Feb 2021 12:39:06 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=y7oK=HS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lBzaP-0001zb-5G
 for xen-users@lists.xen.org; Tue, 16 Feb 2021 12:36:13 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id d9ef4170-2346-4d91-8c5f-8c90166e5d6e;
 Tue, 16 Feb 2021 12:35:36 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZj-0008N9-FT; Tue, 16 Feb 2021 12:35:31 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZj-0002cK-EW; Tue, 16 Feb 2021 12:35:31 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: d9ef4170-2346-4d91-8c5f-8c90166e5d6e
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=IHjlcNqY9zVQG6xPpJPwS1esZBtm3kl4cjbgTTWsTRU=; b=Ww+Gi67omVf9Ru77k14K1xTV/Z
	h3mTaS7e/r1khuCnYVxpZuOomlXQz+ykuTN4mO1X4xfDDy1ChAc4a4lwU0tVy4yIifF0tXvA7LxU7
	/9uRxUDcrduK7p9U1CnLG9275u2h31jacTH0Yh+J7ZERTlYM9RfSGhAXQpMg7WMtrb+0=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 364 v3 (CVE-2021-26933) - arm: The cache
 may not be cleaned for newly allocated scrubbed pages
Message-Id: <E1lBzZj-0002cK-EW@xenbits.xenproject.org>
Date: Tue, 16 Feb 2021 12:35:31 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-26933 / XSA-364
                               version 3

 arm: The cache may not be cleaned for newly allocated scrubbed pages

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

On Arm, a guest is allowed to control whether memory access bypass the
cache.  This means that Xen needs to ensure that all writes (such as
the ones during scrubbing) have reached memory before handing over the
page to a guest.

Unfortunately the operation to clean the cache happens before checking
if the page was scrubbed.  Therefore there is no guarantee when all
the writes will reach the memory.

IMPACT
======

A malicious guest may be able to read sensitive data from memory that
previously belonged to another guest.

VULNERABLE SYSTEMS
==================

Xen version 4.9 onwards are vulnerable. Only Arm systems are vulnerable.

MITIGATION
==========

There is no known mitigation.

CREDITS
=======

This issue was discovered by Julien Grall of Amazon.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa364.patch           xen-unstable - 4.11

$ sha256sum xsa364*
c9dcb3052bb6ca4001e02b3ad889c70b4eebf1931bef83dfb7de86452851f3c8  xsa364.meta
dc313c70bb07b4096bbc4612cbbc180589923277411dede2fda37f04ecc846d6  xsa364.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmAru/UMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZT0UH/0Lzw4sShqmyO06n0HWcXyzXKx7Qh67tjBglmB0D
XHKrlTKR0Cs1S2NR3GCSZCSPNKXcXU689qEXlvK07EpheO/xCUgpZNkt/Eab/JFK
NngYbuev1z6+bGeCi70b6RItCXoWiwDWEJqLlLKROwBXMZaodwgjY7/o3GR2D8ZV
Qyz2EcAdJUIYmMsLC3hJ7gTLXvdySp+0lZ9oO6qe4YYQ3CIwPJnlflWFTzcASfML
D9lMVG6u6ratiqt4N1egE0gxBe3/QP8KoptSqiV+MDdwPnsK009g/G+0Ea430ZEh
lviVSgCxhdELx2Tv+Q7qSSbnfMSdnibSHAxipcbyhvjiEJU=
=mHyv
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa364.meta"
Content-Disposition: attachment; filename="xsa364.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa364.patch"
Content-Disposition: attachment; filename="xsa364.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Feb 16 12:39:27 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 16 Feb 2021 12:39:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.85596.160556 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBzd6-0004DT-8O; Tue, 16 Feb 2021 12:39:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 85596.160556; Tue, 16 Feb 2021 12:39:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lBzd6-0004D4-3U; Tue, 16 Feb 2021 12:39:00 +0000
Received: by outflank-mailman (input) for mailman id 85596;
 Tue, 16 Feb 2021 12:38:59 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=y7oK=HS=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lBzab-0001zG-R9
 for xen-users@lists.xen.org; Tue, 16 Feb 2021 12:36:25 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 058e238a-214d-4b02-9732-042ee8802a6c;
 Tue, 16 Feb 2021 12:35:35 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZi-0008Mp-47; Tue, 16 Feb 2021 12:35:30 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lBzZi-0002aT-2R; Tue, 16 Feb 2021 12:35:30 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 058e238a-214d-4b02-9732-042ee8802a6c
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=lZWifSAdWtqIapxaF/ABMz5U1NS2kxDVUZoclZKPguo=; b=3nniZQLh/q0JG34VPD0xs4VeUH
	HRegZFYig+FQgXOTHx7CBcDBYFzPhSB9NE/4qvF9EaEZzkFN4C7HWi+Ijs4luDq/2w1LavEck4otJ
	K5LTGecfopcu3c7q8XREM2KCw7iwukc1ZQArBpWjLiqQSujSvRNvJ+g9EccWSLbSk00g=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 362 v3 (CVE-2021-26931) - Linux: backends
 treating grant mapping errors as bugs
Message-Id: <E1lBzZi-0002aT-2R@xenbits.xenproject.org>
Date: Tue, 16 Feb 2021 12:35:30 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-26931 / XSA-362
                               version 3

         Linux: backends treating grant mapping errors as bugs

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

Block, net, and SCSI backends consider certain errors a plain bug,
deliberately causing a kernel crash.  For errors potentially being at
least under the influence of guests, like out of memory conditions, it
isn't correct to assume so.  Memory allocations potentially causing
such crashes occur only when Linux is running in PV mode, though.

IMPACT
======

A malicious or buggy frontend driver may be able to crash the
corresponding backend driver, potentially affecting the entire domain
running the backend driver.

VULNERABLE SYSTEMS
==================

Linux versions from at least 2.6.39 onwards are vulnerable, when run in
PV mode.  Earlier versions differ significantly in behavior and may
therefore instead surface other issues under the same conditions.  Linux
run in HVM / PVH modes is not vulnerable.

MITIGATION
==========

For Linux, running the backends in HVM or PVH domains will avoid the
vulnerability.

For protocols where non-Linux-kernel based backends are available,
reconfiguring guests to use alternative (e.g. qemu-based) backends may
allow to avoid the vulnerability.

In all other cases there is no known mitigation.

CREDITS
=======

This issue was discovered by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patches resolves this issue.

Applying the attached patches resolves this issue.

xsa362-linux-1.patch           Linux 5.11-rc - 5.10
xsa362-linux-2.patch           Linux 5.11-rc - 3.16
xsa362-linux-3.patch           Linux 5.11-rc - 4.1

$ sha256sum xsa362*
d64334807f16ff9909503b3cc9b8b93fd42d2c36e1fb0e508b89a765a53071a8  xsa362-linux-1.patch
b6d02952e7fbede55b868cb2dc4d8853284996883dc72518a0cd5b14d6c7fdd4  xsa362-linux-2.patch
0a2661380d8f786fefe12e5a8b1528d4a79f1ad058c26b417c52449a7e16a302  xsa362-linux-3.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches described above (or others which are
substantially similar) is permitted during the embargo, even on
public-facing systems with untrusted guest users and administrators.

Deployment of the mitigation to switch to HVM / PVH backend domains
is also permitted during the embargo, even on public-facing systems with
untrusted guest users and administrators.

HOWEVER, deployment of the non-kernel-based backends mitigation
described above is NOT permitted during the embargo on public-facing
systems with untrusted guest users and administrators.  This is because
such a configuration change may be recognizable by the affected guests.

AND: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmAru/UMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZszQH/jwCgehGBbejtpFjiOqEPdqIQhd0X+Q1feFD9PB6
07gfGanmSds5mitr0ezTHbfLw85CoFbAJhalNdx9XeQrZTIvRAizkCi779rE9UYZ
H0CN73GoObF4E8q+tVRpZni0Rcnb77bETRsmlYjRYRjtZNZ1+7vbn4tf4JMccoo0
qhz1/bqY3e4yHPcdxb9P3T/DQKNG+nJjkn4kNueYo1PUGUetxw6HXbXWHh6WvbOr
mfd+sTxRSf+Nk2OZhtofjIYEIeL058axZoSuARBIPphBmOCumUTGzrypZwe5BTuF
GMQqlguxPU0rFscGd/Js05suFhQQR4ccJlSGRs7pswt9i0M=
=KnG3
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa362-linux-1.patch"
Content-Disposition: attachment; filename="xsa362-linux-1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa362-linux-2.patch"
Content-Disposition: attachment; filename="xsa362-linux-2.patch"
Content-Transfer-Encoding: base64

RnJvbTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpTdWJqZWN0
OiB4ZW4tbmV0YmFjazogZG9uJ3QgImhhbmRsZSIgZXJyb3IgYnkgQlVHKCkK
CkluIHBhcnRpY3VsYXIgLUVOT01FTSBtYXkgY29tZSBiYWNrIGhlcmUsIGZy
b20gc2V0X2ZvcmVpZ25fcDJtX21hcHBpbmcoKS4KRG9uJ3QgbWFrZSBwcm9i
bGVtcyB3b3JzZSwgdGhlIG1vcmUgdGhhdCBoYW5kbGluZyBlbHNld2hlcmUg
KHRvZ2V0aGVyCndpdGggbWFwJ3Mgc3RhdHVzIGZpZWxkcyBub3cgaW5kaWNh
dGluZyB3aGV0aGVyIGEgbWFwcGluZyB3YXNuJ3QgZXZlbgphdHRlbXB0ZWQs
IGFuZCBoZW5jZSBoYXMgdG8gYmUgY29uc2lkZXJlZCBmYWlsZWQpIGRvZXNu
J3QgcmVxdWlyZSB0aGlzCm9kZCB3YXkgb2YgZGVhbGluZyB3aXRoIGVycm9y
cy4KClRoaXMgaXMgcGFydCBvZiBYU0EtMzYyLgoKU2lnbmVkLW9mZi1ieTog
SmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpDYzogc3RhYmxlQHZn
ZXIua2VybmVsLm9yZwpSZXZpZXdlZC1ieTogSnVlcmdlbiBHcm9zcyA8amdy
b3NzQHN1c2UuY29tPgoKLS0tIGEvZHJpdmVycy9uZXQveGVuLW5ldGJhY2sv
bmV0YmFjay5jCisrKyBiL2RyaXZlcnMvbmV0L3hlbi1uZXRiYWNrL25ldGJh
Y2suYwpAQCAtMTM0MiwxMyArMTM0MiwxMSBAQCBpbnQgeGVudmlmX3R4X2Fj
dGlvbihzdHJ1Y3QgeGVudmlmX3F1ZXVlCiAJCXJldHVybiAwOwogCiAJZ250
dGFiX2JhdGNoX2NvcHkocXVldWUtPnR4X2NvcHlfb3BzLCBucl9jb3BzKTsK
LQlpZiAobnJfbW9wcyAhPSAwKSB7CisJaWYgKG5yX21vcHMgIT0gMCkKIAkJ
cmV0ID0gZ250dGFiX21hcF9yZWZzKHF1ZXVlLT50eF9tYXBfb3BzLAogCQkJ
CSAgICAgIE5VTEwsCiAJCQkJICAgICAgcXVldWUtPnBhZ2VzX3RvX21hcCwK
IAkJCQkgICAgICBucl9tb3BzKTsKLQkJQlVHX09OKHJldCk7Ci0JfQogCiAJ
d29ya19kb25lID0geGVudmlmX3R4X3N1Ym1pdChxdWV1ZSk7CiAK

--=separator
Content-Type: application/octet-stream; name="xsa362-linux-3.patch"
Content-Disposition: attachment; filename="xsa362-linux-3.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Thu Feb 18 11:48:02 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Feb 2021 11:48:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.86548.162661 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lChmL-0000NC-IV; Thu, 18 Feb 2021 11:47:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 86548.162661; Thu, 18 Feb 2021 11:47:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lChmL-0000N3-DZ; Thu, 18 Feb 2021 11:47:29 +0000
Received: by outflank-mailman (input) for mailman id 86548;
 Thu, 18 Feb 2021 11:47:27 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZheJ=HU=xenbits.xen.org=gdunlap@srs-us1.protection.inumbo.net>)
 id 1lChmJ-0000Mp-EE
 for xen-users@lists.xen.org; Thu, 18 Feb 2021 11:47:27 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 98c26d30-926e-4a86-8b2e-550b9188d054;
 Thu, 18 Feb 2021 11:47:21 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <gdunlap@xenbits.xen.org>)
 id 1lChm8-0004oj-9n; Thu, 18 Feb 2021 11:47:16 +0000
Received: from gdunlap by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <gdunlap@xenbits.xen.org>)
 id 1lChm8-0008V9-8E; Thu, 18 Feb 2021 11:47:16 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 98c26d30-926e-4a86-8b2e-550b9188d054
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=qAwJ86xNj6iy18bFGlL0Zzk4WSB6wYKH7ThjA2nJMbc=; b=bcGgWZH0tqptJxUlJZbVCtjYcp
	LFW4FUt251tKzjm4otY0GBQoMCyB8XyeeY6drDkaC+tshsCnldctbYVNIh9loeP0DKpWCDANAOodX
	G0/IwRq008RCT+2y99kvrhTMeWI2hWWfildC8sQFJigWFEOPpQoZPIOGc06X1dkvPXD8=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 366 v1 - missed flush in XSA-321 backport
Message-Id: <E1lChm8-0008V9-8E@xenbits.xenproject.org>
Date: Thu, 18 Feb 2021 11:47:16 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-366

                   missed flush in XSA-321 backport

ISSUE DESCRIPTION
=================

An oversight was made when backporting XSA-320, leading entries in the
IOMMU not being properly updated under certain circumstances.

IMPACT
======

A malicious guest may be able to retain read/write DMA access to
frames returned to Xen's free pool, and later reused for another
purpose.  Host crashes (leading to a Denial of Service) and privilege
escalation cannot be ruled out.

VULNERABLE SYSTEMS
==================

Xen versions up to 4.11, from at least 3.2 onwards, are affected.  Xen
versions 4.12 and newer are not affected.

Only x86 Intel systems are affected.  x86 AMD as well as Arm systems are
not affected.

Only x86 HVM guests using hardware assisted paging (HAP), having a
passed through PCI device assigned, and having page table sharing
enabled can leverage the vulnerability.  Note that page table
sharing will be enabled (by default) only if Xen considers IOMMU and
CPU large page size support compatible.

MITIGATION
==========

Suppressing the use of page table sharing will avoid the vulnerability
(command line option "iommu=no-sharept").

Suppressing the use of large HAP pages will avoid the vulnerability
(command line options "hap_2mb=no hap_1gb=no").

Not passing through PCI devices to HVM guests will avoid the
vulnerability.

CREDITS
=======

This issue was reported as a bug by M. Vefa Bicakci, and recognized as
a security issue by Roger Pau Monne of Citrix.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa366-4.11.patch      Xen 4.11.x

$ sha256sum xsa366*
3131c9487b9446655e2e21df4ccf1e003bec471881396d7b2b1a0939f5cbae96  xsa366.meta
8c8c18ca8425e6167535c3cf774ffeb9dcb4572e81c8d2ff4a73fefede2d4d94  xsa366-4.11.patch
$

NOTE REGARDING LACK OF EMBARGO
==============================

This was reported and debugged publicly, before the security
implications were apparent.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmAuU5EMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZMCkIAKq1dU6xOMN3lFqY6LeIV+Pn+JQDvJKhDT+lJT9b
KAP+a44ks5bHHSD6CPyiq5boU5APE7yqiyJnXBycXVDLH6GGjh7uBvc6A00YkeHU
y08l8jxa6/FAyrvCj5P0pYItALwH0NZDtfUE57ueloYUu3KJnyBRtl9icvx/sCa9
CUkpKDpS0te+Rk+G57UPDjGvSPwpIh01vphJ5tyf+2Lrk8rsHTJYWQ7eD8A09jCr
DtSD6FylzEuGGY30vPGLUzXgOm8Nji/WgnXnmmbILCEo8PQs3CcoxN53/F8cYvr6
NRERHKZFhHoLmUUCImoFcApxzzdt11USDnCdEXiAkrEOYsk=
=w9OA
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa366.meta"
Content-Disposition: attachment; filename="xsa366.meta"
Content-Transfer-Encoding: base64

ewogICJYU0EiOiAzNjYsCiAgIlN1cHBvcnRlZFZlcnNpb25zIjogWwogICAg
IjQuMTEiCiAgXSwKICAiVHJlZXMiOiBbCiAgICAieGVuIgogIF0sCiAgIlJl
Y2lwZXMiOiB7CiAgICAiNC4xMSI6IHsKICAgICAgIlJlY2lwZXMiOiB7CiAg
ICAgICAgInhlbiI6IHsKICAgICAgICAgICJTdGFibGVSZWYiOiAiODBjYWQ1
ODRmYjRjMjU5OWFlMTc0MjI2ZTJjOTEzYmIyM2RmM2JmYSIsCiAgICAgICAg
ICAiUHJlcmVxcyI6IFtdLAogICAgICAgICAgIlBhdGNoZXMiOiBbCiAgICAg
ICAgICAgICJ4c2EzNjYtNC4xMS5wYXRjaCIKICAgICAgICAgIF0KICAgICAg
ICB9CiAgICAgIH0KICAgIH0KICB9Cn0=

--=separator
Content-Type: application/octet-stream; name="xsa366-4.11.patch"
Content-Disposition: attachment; filename="xsa366-4.11.patch"
Content-Transfer-Encoding: base64

RnJvbTogUm9nZXIgUGF1IE1vbm5lIDxyb2dlci5wYXVAY2l0cml4LmNvbT4K
U3ViamVjdDogeDg2L2VwdDogZml4IG1pc3NpbmcgSU9NTVUgZmx1c2ggaW4g
YXRvbWljX3dyaXRlX2VwdF9lbnRyeQoKQmFja3BvcnQgb2YgWFNBLTMyMSBt
aXNzZWQgYSBmbHVzaCBpbiBhdG9taWNfd3JpdGVfZXB0X2VudHJ5IHdoZW4K
bGV2ZWwgd2FzIGRpZmZlcmVudCB0aGFuIDAuIFN1Y2ggb21pc3Npb24gd2ls
bCB1bmRlcm1pbmUgdGhlIGZpeCBmb3IKWFNBLTMyMSwgYmVjYXVzZSBwYWdl
IHRhYmxlIGVudHJpZXMgY2FjaGVkIGluIHRoZSBJT01NVSBjYW4gZ2V0IG91
dApvZiBzeW5jIGFuZCBjb250YWluIHN0YWxlIGVudHJpZXMuCgpGaXggdGhp
cyBieSBzbGlnaHRseSByZS1hcnJhbmdpbmcgdGhlIGNvZGUgdG8gcHJldmVu
dCB0aGUgZWFybHkgcmV0dXJuCndoZW4gbGV2ZWwgaXMgZGlmZmVyZW50IHRo
YXQgMC4gTm90ZSB0aGF0IHRoZSBlYXJseSByZXR1cm4gaXMganVzdCBhbgpv
cHRpbWl6YXRpb24gYmVjYXVzZSBmb3JlaWduIGVudHJpZXMgY2Fubm90IGhh
dmUgbGV2ZWwgPiAwLgoKVGhpcyBpcyBYU0EtMzY2LgoKUmVwb3J0ZWQtYnk6
IE0uIFZlZmEgQmljYWtjaSA8bS52LmJAcnVuYm94LmNvbT4KU2lnbmVkLW9m
Zi1ieTogUm9nZXIgUGF1IE1vbm7DqSA8cm9nZXIucGF1QGNpdHJpeC5jb20+
ClJldmlld2VkLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+
Ci0tLQogeGVuL2FyY2gveDg2L21tL3AybS1lcHQuYyB8IDcgKy0tLS0tLQog
MSBmaWxlIGNoYW5nZWQsIDEgaW5zZXJ0aW9uKCspLCA2IGRlbGV0aW9ucygt
KQoKZGlmZiAtLWdpdCBhL3hlbi9hcmNoL3g4Ni9tbS9wMm0tZXB0LmMgYi94
ZW4vYXJjaC94ODYvbW0vcDJtLWVwdC5jCmluZGV4IDAzNjc3MWY0M2MuLmZk
ZTJmNWY3ZTMgMTAwNjQ0Ci0tLSBhL3hlbi9hcmNoL3g4Ni9tbS9wMm0tZXB0
LmMKKysrIGIveGVuL2FyY2gveDg2L21tL3AybS1lcHQuYwpAQCAtNTMsMTIg
KzUzLDcgQEAgc3RhdGljIGludCBhdG9taWNfd3JpdGVfZXB0X2VudHJ5KGVw
dF9lbnRyeV90ICplbnRyeXB0ciwgZXB0X2VudHJ5X3QgbmV3LAogICAgIGJv
b2xfdCBjaGVja19mb3JlaWduID0gKG5ldy5tZm4gIT0gZW50cnlwdHItPm1m
biB8fAogICAgICAgICAgICAgICAgICAgICAgICAgICAgIG5ldy5zYV9wMm10
ICE9IGVudHJ5cHRyLT5zYV9wMm10KTsKIAotICAgIGlmICggbGV2ZWwgKQot
ICAgIHsKLSAgICAgICAgQVNTRVJUKCFpc19lcHRlX3N1cGVycGFnZSgmbmV3
KSB8fCAhcDJtX2lzX2ZvcmVpZ24obmV3LnNhX3AybXQpKTsKLSAgICAgICAg
d3JpdGVfYXRvbWljKCZlbnRyeXB0ci0+ZXB0ZSwgbmV3LmVwdGUpOwotICAg
ICAgICByZXR1cm4gMDsKLSAgICB9CisgICAgQVNTRVJUKCFsZXZlbCB8fCAh
aXNfZXB0ZV9zdXBlcnBhZ2UoJm5ldykgfHwgIXAybV9pc19mb3JlaWduKG5l
dy5zYV9wMm10KSk7CiAKICAgICBpZiAoIHVubGlrZWx5KHAybV9pc19mb3Jl
aWduKG5ldy5zYV9wMm10KSkgKQogICAgIHsK

--=separator--


From xen-users-bounces@lists.xenproject.org Sun Feb 21 16:31:24 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 21 Feb 2021 16:31:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.87593.164747 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lDrcx-0006Fz-EO; Sun, 21 Feb 2021 16:30:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 87593.164747; Sun, 21 Feb 2021 16:30:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lDrcx-0006Fr-9v; Sun, 21 Feb 2021 16:30:35 +0000
Received: by outflank-mailman (input) for mailman id 87593;
 Sun, 21 Feb 2021 16:30:34 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=o/yo=HX=elbitsystems.com=dov.levenglick@srs-us1.protection.inumbo.net>)
 id 1lDrcw-0006Fm-5t
 for Xen-users@lists.xenproject.org; Sun, 21 Feb 2021 16:30:34 +0000
Received: from mail2.elbitsystems.com (unknown [185.145.28.62])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id a246a014-444c-4e4d-82fd-99ee5fbf586f;
 Sun, 21 Feb 2021 16:30:32 +0000 (UTC)
Received: from Router2 ([X.X.10.152]) by mail2.elbitsystems.com with ESMTP;
 21 Feb 2021 18:30:30 +0200
Received: from DM1 (Not Verified[X.X.12.51]) by Router2 with Something New
 (v8,1,1,11276)	id <B60328aa60000>; Sun, 21 Feb 2021 18:30:30 +0200
Received: from AH1 (unknown [X.X.12.8])	(using TLSv1.2 with cipher
 DHE-RSA-AES256-SHA256 (256/256 bits))	(No client certificate requested)	by
 Forcepoint Email with ESMTPS id 4097B13EE823D8234A6E	for
 <Xen-users@lists.xenproject.org>; Sun, 21 Feb 2021 18:30:30 +0200 (IST)
Received: from Out2 ([X.X.50.250])	by AH1 with ESMTP id
 11LGUUdD027334-11LGUUdE027334	for <Xen-users@lists.xenproject.org>;
 Sun, 21 Feb 2021 18:30:30 +0200
Received: from HMX22 (Not Verified[X.X.54.62]) by Out2 with Something New
 (v8,1,1,11276)	id <B60328aa60000>; Sun, 21 Feb 2021 18:30:30 +0200
Received: from HMX23 (X.X.54.63) by HMX22 (X.X.54.62) with Microsoft SMTP
 Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.1713.5; Sun, 21 Feb 2021 18:30:29 +0200
Received: from HMX23 ([fe80::55c1:9224:aa39:a411]) by HMX23
 ([fe80::55c1:9224:aa39:a411%2]) with mapi id 15.01.1847.003;
 Sun, 21 Feb 2021 18:30:29 +0200
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: a246a014-444c-4e4d-82fd-99ee5fbf586f
IronPort-SDR: FTomNtrIxKVgRG+OIDJmZagVHV+SOSUsdhfwFGpnGpEYC41dWqmfP/o00/EOZGciHKgJ9+k6z5
 hz1DZFy72iTg==
X-IPAS-Result: =?us-ascii?q?A2DsEQDviTJg/5gKEaxiHAEBATwBAQQEAQECAQEHAQEVg?=
 =?us-ascii?q?VGBPAIBO4ElgUuWD5plgWgLAQEBDgEFAh0QBAEBhlsnOBMCAwEBCwEBBgEBA?=
 =?us-ascii?q?QEBBgSGUgEMhwVRAT5CJgEEG4JkgxWtUIE0hViEaAaBNgIBAQGMRHqCRCaDV?=
 =?us-ascii?q?4NJAgIXgQgJARIBhhYEgVWBHCYQWiA4QEYjEboKB4J+gy+GD5JRK4Emoh6US?=
 =?us-ascii?q?YkzggKWWQIEAgQFAhaBa009cE0jgzpPFwINj0IBAoErgR6KWYErAgYKAQEDC?=
 =?us-ascii?q?YsEMl0BAQ?=
From: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
To: "Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>
Subject: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index: AdcIbsi89MadXehWTs+A1h4hE7ONNw==
Date: Sun, 21 Feb 2021 16:30:29 +0000
Message-ID: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.0.54.230]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

Hi,

I am booting True Dom0-less on Xilinx ZynqMP UltraScale+ using Xen 4.11,
taken from https://github.com/Xilinx/xen.

The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen and the =
DomU=20
have an allocation of 1.25GB, per this memory map:
1. DomU1: 0x60000000 - 0x80000000
2. DomU2: 0x40000000 - 0x60000000
3. Xen: 0x30000000 - 0x40000000

I am able to support True Dom0-less by means of the patch/hack demonstrat=
ed
By Stefano Stabellini at https://youtu.be/UfiP9eAV0WA?t=3D1746.

I was able to forcefully put the Xen binary at the address range immediat=
ely
below 0x40000000 by means of modifying get_xen_paddr() - in itself an ugl=
y hack.

My questions are:
1. Since Xen performs runtime allocations from its heap, it is allocating=

=20  downwards from 0x80000000 - thereby "stealing" memory from DomU1.
=20  Can I force the runtime allocations to be from a specific address ra=
nge?
2. Has the issue of physical memory map address maps been addressed by Xe=
n for embedded?

Thank you.
Dov
The information in this e-mail transmission contains proprietary and busi=
ness=20
sensitive information.  Unauthorized interception of this e-mail may cons=
titute=20
a violation of law. If you are not the intended recipient, you are hereby=
=20
notified that any review, dissemination, distribution or duplication of t=
his=20
communication is strictly prohibited. You are also asked to contact the s=
ender=20
by reply email and immediately destroy all copies of the original message=
.


From xen-users-bounces@lists.xenproject.org Sun Feb 21 20:16:47 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 21 Feb 2021 20:16:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.86490.164806 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lDv96-0001Wt-2z; Sun, 21 Feb 2021 20:16:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 86490.164806; Sun, 21 Feb 2021 20:16:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lDv95-0001Wm-W5; Sun, 21 Feb 2021 20:15:59 +0000
Received: by outflank-mailman (input) for mailman id 86490;
 Thu, 18 Feb 2021 07:44:09 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LzQu=HU=alstadheim.priv.no=hakon@srs-us1.protection.inumbo.net>)
 id 1lCdyq-0000YM-PH
 for xen-users@lists.xenproject.org; Thu, 18 Feb 2021 07:44:09 +0000
Received: from asav21.altibox.net (unknown [109.247.116.8])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 73a5df2a-b448-4103-acf7-bd53231f566d;
 Thu, 18 Feb 2021 07:44:04 +0000 (UTC)
Received: from postfix-relay.alstadheim.priv.no
 (148-252-98.210.3p.ntebredband.no [148.252.98.210])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 (Authenticated sender: hakon.alstadheim@ntebb.no)
 by asav21.altibox.net (Postfix) with ESMTPSA id 89CFA800F3
 for <xen-users@lists.xenproject.org>; Thu, 18 Feb 2021 08:44:03 +0100 (CET)
Received: from smtps.alstadheim.priv.no (localhost [127.0.0.1])
 by postfix-relay.alstadheim.priv.no (Postfix) with ESMTP id 331937B09872
 for <xen-users@lists.xenproject.org>; Thu, 18 Feb 2021 08:44:03 +0100 (CET)
Received: from [192.168.2.201] (unknown [192.168.2.201])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested) (Authenticated sender: hakon)
 by smtps.alstadheim.priv.no (Postfix) with ESMTPSA id 1CBDD7B095BB
 for <xen-users@lists.xenproject.org>; Thu, 18 Feb 2021 08:44:03 +0100 (CET)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 73a5df2a-b448-4103-acf7-bd53231f566d
X-Finnesikke-B-A-I-T: finnesikke@alstadheim.priv.no
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alstadheim.priv.no;
	s=smtp; t=1613634243;
	bh=tuSwMm11+v8e5AhMW9sK13zK3gqigFVk/b/kPfJtF5o=;
	h=Subject:To:References:From:Date:In-Reply-To:From;
	b=IjDZXp2nA5dPNSB41QGhtRsl2K5mEXQ/9ZGLeCp5O7wS8OuSSXmAERLvAumI0JN/P
	 5hcqAkARiu3U/sbRJjJQP5v8EpJqmBbo0qz2j6pekvczaOerV/VjbsUOO0PrWu0l5m
	 HtR+asUB0iG4HjwOoPecMoLxm/1Kbp0uby2hzepU=
Subject: Re: Network stalls on domU under Xen-4.14.x -- solved, -ish
To: xen-users@lists.xenproject.org
References: <2ff5d54e-28ed-a587-9701-b3991006e962@alstadheim.priv.no>
From: =?UTF-8?Q?H=c3=a5kon_Alstadheim?= <hakon@alstadheim.priv.no>
Message-ID: <a0b6a82a-20c1-6a03-6ab8-142a13df055b@alstadheim.priv.no>
Date: Thu, 18 Feb 2021 08:44:01 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <2ff5d54e-28ed-a587-9701-b3991006e962@alstadheim.priv.no>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-CMAE-Score: 0
X-CMAE-Analysis: v=2.3 cv=Kb38TzQD c=1 sm=1 tr=0
	a=Ln9STfmRvcQJFdEeVvPm9g==:117 a=Ln9STfmRvcQJFdEeVvPm9g==:17
	a=IkcTkHD0fZMA:10 a=qa6Q16uM49sA:10 a=M51BFTxLslgA:10
	a=YPCe6iGzOxnF_W2iGi0A:9 a=QEXdDO2ut3YA:10


Den 15.02.2021 12:02, skrev Håkon Alstadheim:
> I'm recently having total network stalls on some domUs . Dmesg on domU 
> shows a number of lines like:
>
> Feb 15 11:12:38 gt kernel: net eth0: rx->offset: 0, size: -1
Update, for the record.

One piece of info missing from my previous report: I have been running 
the backend with Voluntary preemption on in the dom0 kernel. My set-up 
is basically an organically grown fuzzing machine for xen, and I have 
several ill-considered settings turned on. Anyway changing the kernel 
config to what is seen below, and upgrading to linux kernel 5.10.17 
fixes my issue. Changelog for linux-5.10.17 pointed me to the main 
culprit, a dead-lock on xen_netback, but even with that fix in, I still 
had issues. I figured that turning off preemption would further lessen 
risk of constipation on the backend, and that seems to be true.

----linux config that works: ----

CONFIG_PREEMPT_NONE=y
# CONFIG_PREEMPT_VOLUNTARY is not set
# CONFIG_PREEMPT is not set
# CONFIG_PREEMPTIRQ_DELAY_TEST is not set

[ extra info from previous mail :]

> Feb 15 11:12:38 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:12:38 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:12:39 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:12:39 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:12:40 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:12:42 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:12:45 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:12:52 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 11:13:05 gt kernel: net eth0: rx->offset: 0, size: -1
>
> On occasion, with the longer stalls (~ 5 minutes) I get:
>
> Feb 15 09:29:04 gt kernel: net_ratelimit: 5 callbacks suppressed
>
> I have tried this on xen 4.14.0, 4.14.1 and 4.14.2-pre, with various 
> guest kernels ranging from linux-4.19.170 to the early 5.10.x kernels. 
> Newer 5.10 kernels give me some other error,  to do with interrupts. 
> Seems interrupts vectors point to La-La-Land, or else they are routed 
> to the wrong CPU. I'm fairly certain I did not have this issue running 
> Xen-4.14-staging with the earliest linux-5.10.x, but that had other 
> issues. File-system corruption got me a week around christmas with the 
> whole system down :- ( . Allowed me to learn how to use bacula from a 
> grml rescue cd without a  catalog-database :-) .
>
> The stalls happen under load (net or cpu, don't know which matters 
> more). I can reliably reproduce if i run a lot of compilations& 
> network fetches in the domu while simultaneously lanunching firefox 
> and thunderbird. I have home mounted with nfs from the dom0, so lots 
> of traffic when thunderbird and firefox launch.
>
> On occation the stalls are caught by the kernel, and I get a 
> stack-trace, but I guess those are consequences of the network stall, 
> incidental to the real issue. like:
>
> Feb 15 09:09:38 gt kernel:     status: r
> Feb 15 09:09:38 gt kernel: net_ratelimit: 5 callbacks suppressed
> Feb 15 09:09:38 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 09:09:38 gt root[45567]: ACPI event unhandled: jack/lineout 
> LINEOUT unplug
> Feb 15 09:09:38 gt root[45570]: ACPI event unhandled: jack/videoout 
> VIDEOOUT unplug
> Feb 15 09:09:44 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 09:09:57 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 09:10:01 gt CROND[45682]: (root) CMD (/usr/lib/sa/sa1 1 1)
> Feb 15 09:10:23 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 09:11:17 gt kernel: net eth0: rx->offset: 0, size: -1
> Feb 15 09:11:58 gt kernel: INFO: task IndexedDB #3:45442 blocked for 
> more than 122 seconds.
> Feb 15 09:11:58 gt kernel:       Not tainted 5.4.80-gentoo-r1-x86_64 #1
> Feb 15 09:11:58 gt kernel: "echo 0 > 
> /proc/sys/kernel/hung_task_timeout_secs" disables this message.
> Feb 15 09:11:58 gt kernel: IndexedDB #3    D    0 45442   3451 0x00000000
> Feb 15 09:11:58 gt kernel: Call Trace:
> Feb 15 09:11:58 gt kernel:  __schedule+0x2a3/0x7a0
> Feb 15 09:11:58 gt kernel:  ? nfs_pageio_complete+0xa8/0xf0
> Feb 15 09:11:58 gt kernel:  schedule+0x34/0xa0
> Feb 15 09:11:58 gt kernel:  io_schedule+0x3c/0x60
> Feb 15 09:11:58 gt kernel:  wait_on_page_bit_common+0x125/0x330
> Feb 15 09:11:58 gt kernel:  ? 
> trace_event_raw_event_file_check_and_advance_wb_err+0xf0/0xf0
> Feb 15 09:11:58 gt kernel:  __filemap_fdatawait_range+0x7b/0xe0
> Feb 15 09:11:58 gt kernel:  file_write_and_wait_range+0x67/0x90
> Feb 15 09:11:58 gt kernel:  nfs_file_fsync+0x83/0x190
> Feb 15 09:11:58 gt kernel:  __x64_sys_fsync+0x2f/0x60
> Feb 15 09:11:58 gt kernel:  do_syscall_64+0x51/0x130
> Feb 15 09:11:58 gt kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9
> Feb 15 09:11:58 gt kernel: RIP: 0033:0x7f4db9580e1b
> Feb 15 09:11:58 gt kernel: Code: Bad RIP value.
> Feb 15 09:11:58 gt kernel: RSP: 002b:00007f4d9b4b4d50 EFLAGS: 00000293 
> ORIG_RAX: 000000000000004a
> Feb 15 09:11:58 gt kernel: RAX: ffffffffffffffda RBX: 00007f4d9f2abd28 
> RCX: 00007f4db9580e1b
> Feb 15 09:11:58 gt kernel: RDX: 0000000000000002 RSI: 0000000000000002 
> RDI: 0000000000000072
> Feb 15 09:11:58 gt kernel: RBP: 0000000000000002 R08: 0000000000000000 
> R09: 00007f4d9b4b4d70
> Feb 15 09:11:58 gt kernel: R10: 0000000000000000 R11: 0000000000000293 
> R12: 00000000000001f5
> Feb 15 09:11:59 gt kernel: R13: 00007f4d9f2abc70 R14: 0000000000000000 
> R15: 00007f4da63774e0
> ---------
>
> My xl info just now:
>
> xl info
> host                   : gentoo
> release                : 5.4.97-gentoo-x86_64
> version                : #1 SMP Wed Feb 10 16:43:41 CET 2021
> machine                : x86_64
> nr_cpus                : 12
> max_cpu_id             : 11
> nr_nodes               : 2
> cores_per_socket       : 6
> threads_per_core       : 1
> cpu_mhz                : 2399.981
> hw_caps                : 
> bfebfbff:77fef3ff:2c100800:00000021:00000001:000037ab:00000000:00000100
> virt_caps              : pv hvm hvm_directio pv_directio hap shadow 
> iommu_hap_pt_share
> total_memory           : 130953
> free_memory            : 1551
> sharing_freed_memory   : 0
> sharing_used_memory    : 0
> outstanding_claims     : 0
> free_cpus              : 0
> xen_major              : 4
> xen_minor              : 14
> xen_extra              : .2-pre
> xen_version            : 4.14.2-pre
> xen_caps               : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 
> hvm-3.0-x86_32p hvm-3.0-x86_64
> xen_scheduler          : credit2
> xen_pagesize           : 4096
> platform_params        : virt_start=0xffff800000000000
> xen_changeset          :
> xen_commandline        : xen.cfg xen-marker-51 console_timestamps=date 
> iommu=1 com1=115200,8n1 console=com1 conswitch=lx 
> cpufreq=xen:performance,verbose smt=0 maxcpus=12 core_parking=power 
> nmi=dom0 gnttab_max_frames=512 gnttab_max_maptrack_frames=1024 
> vcpu_migration_delay=2000 tickle_one_idle_cpu=1 spec-ctrl=no-xen 
> sched=credit2 timer_slop=5000 max_cstate=2 dom0_mem=16G,max:16G 
> dom0_max_vcpus=8 ept=exec_sp=1
> cc_compiler            : gcc (Gentoo 9.3.0-r2 p4) 9.3.0
> cc_compile_by          : hakon
> cc_compile_domain      : alstadheim.priv.no
> cc_compile_date        : Sat Feb 13 22:07:40 CET 2021
> build_id               : d3fb26987b749da48c2549b12ba9ea4a
> xend_config_format     : 4
> 0:root@gentoo xen-consoles #
>
>
> P.S: I know I should do something about my dmarc set-up, so I can have 
> a separate, unprotected "from:" address for posting to mailing-lists. 
> Pointers to how-to appreciated.
>
> ---
>
> Håkon
>
>
>
>


From xen-users-bounces@lists.xenproject.org Mon Feb 22 05:03:24 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Feb 2021 05:03:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.87731.164900 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lE3Mm-0003GV-JE; Mon, 22 Feb 2021 05:02:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 87731.164900; Mon, 22 Feb 2021 05:02:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lE3Mm-0003GI-BC; Mon, 22 Feb 2021 05:02:40 +0000
Received: by outflank-mailman (input) for mailman id 87731;
 Mon, 22 Feb 2021 05:02:39 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RUld=HY=ambarella.com=cchiou@srs-us1.protection.inumbo.net>)
 id 1lE3Ml-0003GD-3w
 for xen-users@lists.xenproject.org; Mon, 22 Feb 2021 05:02:39 +0000
Received: from mail1.bemta23.messagelabs.com (unknown [67.219.246.1])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 62a37944-ff97-4797-930c-5946da9c29ac;
 Mon, 22 Feb 2021 05:02:37 +0000 (UTC)
Received: from [100.112.1.13] (using TLSv1.2 with cipher
 DHE-RSA-AES256-GCM-SHA384 (256 bits))
 by server-1.bemta.az-b.us-east-1.aws.symcld.net id 89/6A-44756-DEA33306;
 Mon, 22 Feb 2021 05:02:37 +0000
Received: (qmail 31008 invoked from network); 22 Feb 2021 05:02:34 -0000
Received: from 66-7-251-122.static-ip.telepacific.net (HELO
 webmail.ambarella.com) (66.7.251.122)
 by server-12.tower-392.messagelabs.com with AES256-GCM-SHA384 encrypted SMTP;
 22 Feb 2021 05:02:34 -0000
Received: from ambtw-mbx5.ambarella.net (10.2.4.226) by
 ambus-cas4.ambarella.net (10.1.4.12) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.2; Sun, 21 Feb 2021 21:02:29 -0800
Received: from ambtw-mbx5.ambarella.net (10.2.4.226) by
 ambtw-mbx5.ambarella.net (10.2.4.226) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.2; Mon, 22 Feb 2021 13:02:27 +0800
Received: from ambtw-mbx5.ambarella.net ([10.2.4.226]) by
 ambtw-mbx5.ambarella.net ([10.2.4.226]) with mapi id 15.01.2176.002; Mon, 22
 Feb 2021 13:02:27 +0800
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 62a37944-ff97-4797-930c-5946da9c29ac
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ambarella.com;
	s=com20180801a; t=1613970157; i=@ambarella.com;
	bh=NvDG9j5jv9Xx4UZGKClINq7HLRazWnBA04GnIMcwcMo=;
	h=From:To:Subject:Date:Message-ID:Content-Type:
	 Content-Transfer-Encoding:MIME-Version;
	b=gdIvJRsNpmZL0o6CioZkEI8AchE+GRA1VSYz1krVuHf7anApjPnyIiIxrkEV3Ldd1
	 ywTB+JWSwDMhx7x4HwM1p10kGHwxnNBqJHw0VIyToFEiZF5y7EPlSIcj8zkbevVZnp
	 JY16604VkjGErv2PKq6lWn7dun59ojYSVyC4UrIwiYlGHGcngv/DPoKVETo4STVqRy
	 Q6kVE42VurecamkWoFZmNFPgcevFaIzsLUrMB9ofkP+9kY6N9lpBD00xbva31H5VVR
	 fN0LZr4bDmDK9V2St4GrUg6rb7oGzb8rO+PDOJMBFFDvyYFxj7IKJyNLTMqW60IO+h
	 JYbKh5EXj3ZZw==
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmplleJIrShJLcpLzFFi42JxYv9dpfvGyjj
  BYOUCJot3+/4yOzB6HP5whSWAMYo1My8pvyKBNeNVk3vBboGK2/0XWRoY5/F2MXJxCAm8ZJT4
  t7ObuYuRE8h5xSixc5sbRGIBo8SRqa0sIAk2AS2JR383s4PYIgKuEvcWNYPFhQV8JeY+PwYVD
  5aYdHIRI4StJ7HoynM2EJtFQFVibftpsBpeARuJ/1PPsYLYjAKyEgdftoPFmQXEJW49mc8EYk
  sICEgs2XOeGcIWlXj5+B9QPQeQLS+x82UmRLmOxILdn9ggbG2JZQtfM0OMF5Q4OfMJC0i5kIC
  ixP0LAhMYhWchWTALSfcsJN2zkHQvYGRZxWiWVJSZnlGSm5iZo2toYKBraGika6xrZGqol1il
  m6RXWqybmlhcogvklhfrFVfmJuek6OWllmxiBMZFSgHz7x2MXW8+6B1ilORgUhLlvfzaKEGIL
  yk/pTIjsTgjvqg0J7X4EKMMB4eSBK+KpXGCkGBRanpqRVpmDjBGYdISHDxKIrzPLYDSvMUFib
  nFmekQqVOMxhwHj85bxMxx8/2SRcxCLHn5ealS4rwvQCYJgJRmlObBDYKljkuMslLCvIwMDAx
  CPAWpRbmZJajyrxjFORiVhHkNgYlIiCczrwRuHzBRAH0hwquUYQRySkkiQkqqgSmgY9IB+W3F
  224vdnt43e528nmTUjep7Ip1K70feq2qs+BnVnl378u3GsnJPbpu3FJvuuZEv7nxKTDI2e1B9
  pclWiXh0zKNbswpmtvUbGzgsG/Xm30pLSJC808cEE++r5wjcuPqZmk7+SNsTf+Cz1/uEM524P
  phoR70NfrNjkuX9vwT06jPiKifc99kebvstv2n1nzdknsnlUG+aOLSDxkhqxVvuTwJnVf83H+
  O14FfsxqnOGnkT7T52ff+ZsZ5s/+nz3DFF1maJ3t6PWb/fevN2YiusFfld2JZLqwM22Lx4lHl
  mZx2P+mNJVkiiVVfe0497Vb8seRG6av8Oo09GUu/LBefoxHi2b/p8J1lWhuVWIozEg21mIuKE
  wE01ztRmAMAAA==
X-Env-Sender: cchiou@ambarella.com
X-Msg-Ref: server-12.tower-392.messagelabs.com!1613970150!53398!1
X-Originating-IP: [66.7.251.122]
X-SYMC-ESS-Client-Auth: outbound-route-from=pass
X-StarScan-Received:
X-StarScan-Version: 9.60.3; banners=-,-,-
X-VirusChecked: Checked
From: Charles Chiou <cchiou@ambarella.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: dom0less boot two compressed kernel images out-of-memory work-around
Thread-Topic: dom0less boot two compressed kernel images out-of-memory
 work-around
Thread-Index: AdcI11fXdr1s8424TwKZN3/zNiqdwQ==
Date: Mon, 22 Feb 2021 05:02:27 +0000
Message-ID: <c1b3f92388c34788b76193b70c150521@ambarella.com>
Accept-Language: en-US, zh-TW
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.2.12.141]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

Hello,

When trying to boot two zImage using dom0less boot on ARM, we encountered t=
his problem when xen runs gunzip on second guest:

(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Out of memory
(XEN) ****************************************

And worked around it with the following patch. We'd like to check to see if=
 this is a known issue and if the work-around looks reasonable. Thank you


diff --git a/xen/common/gunzip.c b/xen/common/gunzip.c
index db4efcd34b..e5bd19ba7f 100644
--- a/xen/common/gunzip.c
+++ b/xen/common/gunzip.c
@@ -113,8 +113,10 @@ __init int perform_gunzip(char *output, char *image, u=
nsigned long image_len)

     window =3D (unsigned char *)output;

+    if (!free_mem_ptr) {
         free_mem_ptr =3D (unsigned long)alloc_xenheap_pages(HEAPORDER, 0);
         free_mem_end_ptr =3D free_mem_ptr + (PAGE_SIZE << HEAPORDER);
+    }

     inbuf =3D (unsigned char *)image;
     insize =3D image_len;
@@ -131,7 +133,12 @@ __init int perform_gunzip(char *output, char *image, u=
nsigned long image_len)
         rc =3D 0;
     }

+    if (free_mem_ptr) {
         free_xenheap_pages((void *)free_mem_ptr, HEAPORDER);
+        free_mem_ptr =3D 0;
+    }
+
+    bytes_out =3D 0;

     return rc;
}
diff --git a/xen/common/inflate.c b/xen/common/inflate.c
index f99c985d61..de96002188 100644
--- a/xen/common/inflate.c
+++ b/xen/common/inflate.c
@@ -244,7 +244,7 @@ static void *INIT malloc(int size)

     if (size < 0)
         error("Malloc error");
-    if (!malloc_ptr)
+    if ((!malloc_ptr) || (!malloc_count))
         malloc_ptr =3D free_mem_ptr;

     malloc_ptr =3D (malloc_ptr + 3) & ~3;     /* Align */

--
Charles Chiou


NOTE: This email (including attachments) contain Ambarella Proprietary and/=
or Confidential Information and is intended solely for the use of the indiv=
idual(s) to whom it is addressed. Any unauthorized review, use, disclosure,=
 distribute, copy, or print is prohibited. If you are not an intended recip=
ient, please contact the sender by reply email and destroy all copies of th=
e original message. Thank you.


From xen-users-bounces@lists.xenproject.org Mon Feb 22 10:26:20 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Feb 2021 10:26:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.87860.165080 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lE8PO-0000YZ-Vo; Mon, 22 Feb 2021 10:25:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 87860.165080; Mon, 22 Feb 2021 10:25:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lE8PO-0000YS-Ry; Mon, 22 Feb 2021 10:25:42 +0000
Received: by outflank-mailman (input) for mailman id 87860;
 Mon, 22 Feb 2021 10:25:41 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1lE8PN-0000YM-SY
 for Xen-users@lists.xenproject.org; Mon, 22 Feb 2021 10:25:41 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lE8PN-0005t1-4H; Mon, 22 Feb 2021 10:25:41 +0000
Received: from [54.239.6.185] (helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lE8PM-0001ti-U6; Mon, 22 Feb 2021 10:25:41 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
	MIME-Version:Date:Message-ID:From:References:To:Subject;
	bh=qFI4YwpbekPkZjrGu5pq6hZvnzP5UiX/eHj0RTYOe4M=; b=rfjC0fB+TEIXI1APzL5dY1ywh7
	4tHcCbe2pStXIFDanZBuuUtA/p7voGBmBSikh8mVe6+IWRiiyOyNe66ibKCRABMC6xrqhom8MlZIx
	A4WsWFOlpcR2wvopoiO7xgJjUvFVHrotwpk9DgdAX2ZYjWvjvy77nmYbEbZGJZmatWCc=;
Subject: Re: Aligning Xen to physical memory maps on embedded systems
To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>,
 "Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>,
 Stefano Stabellini <sstabellini@kernel.org>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
From: Julien Grall <julien@xen.org>
Message-ID: <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
Date: Mon, 22 Feb 2021 10:25:39 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0)
 Gecko/20100101 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 7bit

(+ Stefano)

On 21/02/2021 16:30, Levenglick Dov wrote:
> Hi,

Hi,

> I am booting True Dom0-less on Xilinx ZynqMP UltraScale+ using Xen 4.11,
> taken from https://github.com/Xilinx/xen.

This tree is not an official Xen Project tree. I can provide feedback 
based on how Xen upstream works, but I don't know for sure if this will 
apply to the Xilinx tree.

For any support, I would recommend to contect Xilinx directly.

> The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen and the DomU
> have an allocation of 1.25GB, per this memory map:
> 1. DomU1: 0x60000000 - 0x80000000
> 2. DomU2: 0x40000000 - 0x60000000
> 3. Xen: 0x30000000 - 0x40000000

How did you tell Xen which regions is assigned to which guests? Are your 
domain mapped 1:1 (i.e guest physical address == host physical address)?

> 
> I am able to support True Dom0-less by means of the patch/hack demonstrated
> By Stefano Stabellini at https://youtu.be/UfiP9eAV0WA?t=1746.
> 
> I was able to forcefully put the Xen binary at the address range immediately
> below 0x40000000 by means of modifying get_xen_paddr() - in itself an ugly hack.
> 
> My questions are:
> 1. Since Xen performs runtime allocations from its heap, it is allocating
>     downwards from 0x80000000 - thereby "stealing" memory from DomU1.

In theory, any memory reserved for domains should have been carved out 
from the heap allocator. This would be sufficient to prevent Xen 
allocating memory from the ranges you described above.

Therefore, to me this looks like a bug in the tree you are using.

>     Can I force the runtime allocations to be from a specific address range?
> 2. Has the issue of physical memory map address maps been addressed by Xen for embedded?

Xen 4.12+ will not relocate itself to the top of the memory anymore. 
Instead, it will stay where it was first loaded in memory.

I would recommend to ask Xilinx if they can provide you with a more 
recent tree.

> 
> Thank you.
> Dov
> The information in this e-mail transmission contains proprietary and business
> sensitive information.  Unauthorized interception of this e-mail may constitute
> a violation of law. If you are not the intended recipient, you are hereby
> notified that any review, dissemination, distribution or duplication of this
> communication is strictly prohibited. You are also asked to contact the sender
> by reply email and immediately destroy all copies of the original message.
In general, disclaimers should be dropped from e-mail sent to public 
mailing list (by defintion your e-mail is widely distributed).

Cheers,

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Mon Feb 22 13:38:08 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Feb 2021 13:38:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.88051.165416 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEBOx-0003yr-St; Mon, 22 Feb 2021 13:37:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 88051.165416; Mon, 22 Feb 2021 13:37:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEBOx-0003yi-OD; Mon, 22 Feb 2021 13:37:27 +0000
Received: by outflank-mailman (input) for mailman id 88051;
 Mon, 22 Feb 2021 13:37:26 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MxPt=HY=elbitsystems.com=dov.levenglick@srs-us1.protection.inumbo.net>)
 id 1lEBOw-0003yL-5g
 for Xen-users@lists.xenproject.org; Mon, 22 Feb 2021 13:37:26 +0000
Received: from mail2.elbitsystems.com (unknown [185.145.28.62])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id bb5afe4f-132f-4888-bece-430ccf917176;
 Mon, 22 Feb 2021 13:37:23 +0000 (UTC)
Received: from Router2 ([X.X.10.152]) by mail2.elbitsystems.com with ESMTP;
 22 Feb 2021 15:37:21 +0200
Received: from DM1 (Not Verified[X.X.12.51]) by Router2 with Something New
 (v8,1,1,11276)	id <B6033b39X.X.>; Mon, 22 Feb 2021 15:37:21 +0200
Received: from AH1 (unknown [X.X.12.8])	(using TLSv1.2 with cipher
 DHE-RSA-AES256-SHA256 (256/256 bits))	(No client certificate requested)	by
 Forcepoint Email with ESMTPS id B2D0CC29F72C6B9BD2F9	for
 <Xen-users@lists.xenproject.org>; Mon, 22 Feb 2021 15:37:21 +0200 (IST)
Received: from Out1 ([X.X.50.252])	by AH1 with ESMTP id
 11MDbLhs009028-11MDbLht009028; Mon, 22 Feb 2021 15:37:21 +0200
Received: from HMX11 (Not Verified[X.X.54.31]) by Out1 with Something New
 (v8,1,1,11276)	id <B6033b39X.X.>; Mon, 22 Feb 2021 15:37:21 +0200
Received: from HMX23 (X.X.54.63) by HMX11 (X.X.54.31) with Microsoft SMTP
 Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.1713.5; Mon, 22 Feb 2021 15:37:19 +0200
Received: from HMX23 ([fe80::55c1:9224:aa39:a411]) by HMX23
 ([fe80::55c1:9224:aa39:a411%2]) with mapi id 15.01.1847.003;
 Mon, 22 Feb 2021 15:37:19 +0200
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: bb5afe4f-132f-4888-bece-430ccf917176
IronPort-SDR: BqvJPqrXS/NjnbyX1HjQLE0iDGpCPDVASTHXJsbYZ9YDsJG0cZfenqhgEYX+v1WHHbxi4WNb/O
 WI0rJSlFz6/w==
X-IPAS-Result: =?us-ascii?q?A2DqBADksjNg/5gKEaxigQmDS4EQFYFLhDeRWQOaYoFoC?=
 =?us-ascii?q?wEBAQ4BJBAEAQGETQIXgXYnOBMCAwEBCwEBBgEBAQEBBgSGUg2GRAEBAQMBI?=
 =?us-ascii?q?xFVAgEIGAICJgICAjAVEAEBBAEaE4JRgmYvrS92gTKKQwaBDiqGfYJSgnh6g?=
 =?us-ascii?q?kQmg1cuPoJdAgIXgQgJARECATeCf4JfBIFVgRwmEFogODQMKhcFCxgRlCylX?=
 =?us-ascii?q?geCfoMvhg+SUSuBJqIelEmJM4ICllkCBAIEBQIWgWuBCnBNI4M6TxcCDY4rF?=
 =?us-ascii?q?oEBAQKBK4EeilmBKwIGCgEBAwmLBDJdAQE?=
From: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
To: Julien Grall <julien@xen.org>, "Xen-users@lists.xenproject.org"
	<Xen-users@lists.xenproject.org>, Stefano Stabellini <sstabellini@kernel.org>
Subject: RE: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index: AdcIbsi89MadXehWTs+A1h4hE7ONNwAhYRqAAApfvWA=
Date: Mon, 22 Feb 2021 13:37:18 +0000
Message-ID: <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
In-Reply-To: <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.0.54.230]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0

SGkgSnVsaWVuIGV0IGFsLiwNCg0KPiANCj4gKCsgU3RlZmFubykNCj4gDQo+IE9uIDIxLzAyLzIw
MjEgMTY6MzAsIExldmVuZ2xpY2sgRG92IHdyb3RlOg0KPiA+IEhpLA0KPiANCj4gSGksDQo+IA0K
PiA+IEkgYW0gYm9vdGluZyBUcnVlIERvbTAtbGVzcyBvbiBYaWxpbnggWnlucU1QIFVsdHJhU2Nh
bGUrIHVzaW5nIFhlbg0KPiA+IDQuMTEsIHRha2VuIGZyb20gaHR0cHM6Ly9naXRodWIuY29tL1hp
bGlueC94ZW4uDQo+IA0KPiBUaGlzIHRyZWUgaXMgbm90IGFuIG9mZmljaWFsIFhlbiBQcm9qZWN0
IHRyZWUuIEkgY2FuIHByb3ZpZGUgZmVlZGJhY2sgYmFzZWQgb24NCj4gaG93IFhlbiB1cHN0cmVh
bSB3b3JrcywgYnV0IEkgZG9uJ3Qga25vdyBmb3Igc3VyZSBpZiB0aGlzIHdpbGwgYXBwbHkgdG8g
dGhlDQo+IFhpbGlueCB0cmVlLg0KPiANCj4gRm9yIGFueSBzdXBwb3J0LCBJIHdvdWxkIHJlY29t
bWVuZCB0byBjb250ZWN0IFhpbGlueCBkaXJlY3RseS4NCg0KSSB3aWxsIGFwcHJvYWNoIHRoZWly
IHJlcHJlc2VudGF0aXZlcy4gQ2FuIHlvdSBjb21tZW50IHJlZ2FyZGluZyB0aGUgYXBwcm9hY2gg
dGhhdCBJDQpvdXRsaW5lIGluIHRoZSByZXN0IG9mIHRoZSBtYWlsIGFzIHRob3VnaCBpdCB3ZXJl
IHJlZmVycmluZyB0byB0aGUgWGVuIHVwc3RyZWFtPw0KDQo+ID4gVGhlIHN5c3RlbSBoYXMgMkdC
IG9mIFJBTSAoMHgwMDAwMDAwMCAtIDB4ODAwMDAwMDApIG9mIHdoaWNoIFhlbiBhbmQNCj4gPiB0
aGUgRG9tVSBoYXZlIGFuIGFsbG9jYXRpb24gb2YgMS4yNUdCLCBwZXIgdGhpcyBtZW1vcnkgbWFw
Og0KPiA+IDEuIERvbVUxOiAweDYwMDAwMDAwIC0gMHg4MDAwMDAwMA0KPiA+IDIuIERvbVUyOiAw
eDQwMDAwMDAwIC0gMHg2MDAwMDAwMA0KPiA+IDMuIFhlbjogMHgzMDAwMDAwMCAtIDB4NDAwMDAw
MDANCj4gDQo+IEhvdyBkaWQgeW91IHRlbGwgWGVuIHdoaWNoIHJlZ2lvbnMgaXMgYXNzaWduZWQg
dG8gd2hpY2ggZ3Vlc3RzPyBBcmUgeW91cg0KPiBkb21haW4gbWFwcGVkIDE6MSAoaS5lIGd1ZXN0
IHBoeXNpY2FsIGFkZHJlc3MgPT0gaG9zdCBwaHlzaWNhbCBhZGRyZXNzKT8NCg0KSSBhbSB3b3Jr
aW5nIG9uIGEgc29sdXRpb24gd2hlcmUgaWYgdGhlICJ4ZW4sZG9tYWluIiBtZW1vcnkgaGFzICNz
aXplLWNlbGwgY2VsbHMgdGhlDQpjb250ZW50IGlzIGJhY2t3YXJkIGNvbXBhdGlibGUuIEJ1dCBp
ZiBpdCBjb250YWlucyAoI2FkZHJlc3MtY2VsbHMgKyAjc2l6ZS1jZWxscyksIHRoZSANCmFkZHJl
c3MgY2VsbHMgc2hvdWxkIGJlIGNvbnNpZGVyZWQgdGhlIHBoeXNpY2FsIHN0YXJ0IGFkZHJlc3Mu
DQpEdXJpbmcgdGhlIG1hcHBpbmcgb2YgdGhlIGVudGlyZSBhZGRyZXNzIHNwYWNlIGluc2V0dXBf
bW0oKSwgdGhlIGNhcnZlZCBvdXQgYWRkcmVzc2VzDQp3b3VsZCBiZSBhZGRlZCB0byB0aGUgIHJl
c2VydmVkIG1lbW9yeSBhZGRyZXNzIHNwYWNlLiBXaGVuIHRoZSBEb21VIGlzIHRvIGJlIGNyZWF0
ZWQsDQp0aGlzIHBoeXNpY2FsIHNwYWNlIHdvdWxkIGJlIG1hcHBlZCB0byBpdC4gVGhlIHZpcnR1
YWwgYWRkcmVzc2VzIGFyZSBsZXNzIG9mIGFuIGlzc3VlIGFuZA0KbmVlZG4ndCBiZSBtYXBwZWQg
MXgxIChhbHRob3VnaCB0aGV5IGNvdWxkIGJlKS4NCg0KPiANCj4gPg0KPiA+IEkgYW0gYWJsZSB0
byBzdXBwb3J0IFRydWUgRG9tMC1sZXNzIGJ5IG1lYW5zIG9mIHRoZSBwYXRjaC9oYWNrDQo+ID4g
ZGVtb25zdHJhdGVkIEJ5IFN0ZWZhbm8gU3RhYmVsbGluaSBhdA0KPiBodHRwczovL3lvdXR1LmJl
L1VmaVA5ZUFWMFdBP3Q9MTc0Ni4NCj4gPg0KPiA+IEkgd2FzIGFibGUgdG8gZm9yY2VmdWxseSBw
dXQgdGhlIFhlbiBiaW5hcnkgYXQgdGhlIGFkZHJlc3MgcmFuZ2UNCj4gPiBpbW1lZGlhdGVseSBi
ZWxvdyAweDQwMDAwMDAwIGJ5IG1lYW5zIG9mIG1vZGlmeWluZyBnZXRfeGVuX3BhZGRyKCkgLQ0K
PiBpbiBpdHNlbGYgYW4gdWdseSBoYWNrLg0KPiA+DQo+ID4gTXkgcXVlc3Rpb25zIGFyZToNCj4g
PiAxLiBTaW5jZSBYZW4gcGVyZm9ybXMgcnVudGltZSBhbGxvY2F0aW9ucyBmcm9tIGl0cyBoZWFw
LCBpdCBpcyBhbGxvY2F0aW5nDQo+ID4gICAgIGRvd253YXJkcyBmcm9tIDB4ODAwMDAwMDAgLSB0
aGVyZWJ5ICJzdGVhbGluZyIgbWVtb3J5IGZyb20gRG9tVTEuDQo+IA0KPiBJbiB0aGVvcnksIGFu
eSBtZW1vcnkgcmVzZXJ2ZWQgZm9yIGRvbWFpbnMgc2hvdWxkIGhhdmUgYmVlbiBjYXJ2ZWQgb3V0
DQo+IGZyb20gdGhlIGhlYXAgYWxsb2NhdG9yLiBUaGlzIHdvdWxkIGJlIHN1ZmZpY2llbnQgdG8g
cHJldmVudCBYZW4gYWxsb2NhdGluZw0KPiBtZW1vcnkgZnJvbSB0aGUgcmFuZ2VzIHlvdSBkZXNj
cmliZWQgYWJvdmUuDQo+IA0KPiBUaGVyZWZvcmUsIHRvIG1lIHRoaXMgbG9va3MgbGlrZSBhIGJ1
ZyBpbiB0aGUgdHJlZSB5b3UgYXJlIHVzaW5nLg0KDQpUaGlzIHdvdWxkIGJlIGEgYmV0dGVyIGFw
cHJvYWNoLCBidXQgYmVjYXVzZSBYZW4gcGVyZm9ybSBhbGxvY2F0aW9ucyBmcm9tIGl0cw0KaGVh
cCBwcmlvciB0byBhbGxvY2F0aW5nIG1lbW9yeSB0byBEb21VIC0gYW5kIHNpbmNlIGl0IGFsbG9j
YXRlcyBmcm9tIHRoZSB0b3Agb2YNCnRoZSBoZWFwIC0gaXQgaXMgYmFzaWNhbGx5IHRha2luZyBt
ZW1vcnkgdGhhdCBJIHdhbnRlZCB0byBzZXQgYXNpZGUgZm9yIHRoZSBEb21VLg0KVGhpcyBpcyB3
aHkgSSBhbSB0aGlua2luZyBvZiByZXNlcnZpbmcgdGhlIG1lbW9yeS4NCg0KPiANCj4gPiAgICAg
Q2FuIEkgZm9yY2UgdGhlIHJ1bnRpbWUgYWxsb2NhdGlvbnMgdG8gYmUgZnJvbSBhIHNwZWNpZmlj
IGFkZHJlc3MgcmFuZ2U/DQo+ID4gMi4gSGFzIHRoZSBpc3N1ZSBvZiBwaHlzaWNhbCBtZW1vcnkg
bWFwIGFkZHJlc3MgbWFwcyBiZWVuIGFkZHJlc3NlZCBieQ0KPiBYZW4gZm9yIGVtYmVkZGVkPw0K
PiANCj4gWGVuIDQuMTIrIHdpbGwgbm90IHJlbG9jYXRlIGl0c2VsZiB0byB0aGUgdG9wIG9mIHRo
ZSBtZW1vcnkgYW55bW9yZS4NCj4gSW5zdGVhZCwgaXQgd2lsbCBzdGF5IHdoZXJlIGl0IHdhcyBm
aXJzdCBsb2FkZWQgaW4gbWVtb3J5Lg0KPiANCj4gSSB3b3VsZCByZWNvbW1lbmQgdG8gYXNrIFhp
bGlueCBpZiB0aGV5IGNhbiBwcm92aWRlIHlvdSB3aXRoIGEgbW9yZSByZWNlbnQNCj4gdHJlZS4N
Cg0KV2lsbCBkby4gDQoNCj4gDQo+ID4NCj4gPiBUaGFuayB5b3UuDQo+ID4gRG92DQo+IA0KPiBD
aGVlcnMsDQo+IA0KPiAtLQ0KPiBKdWxpZW4gR3JhbGwNCg0KVGhhbmsgeW91LA0KRG92DQoNCg0K
VGhlIGluZm9ybWF0aW9uIGluIHRoaXMgZS1tYWlsIHRyYW5zbWlzc2lvbiBjb250YWlucyBwcm9w
cmlldGFyeSBhbmQgYnVzaW5lc3MgDQpzZW5zaXRpdmUgaW5mb3JtYXRpb24uICBVbmF1dGhvcml6
ZWQgaW50ZXJjZXB0aW9uIG9mIHRoaXMgZS1tYWlsIG1heSBjb25zdGl0dXRlIA0KYSB2aW9sYXRp
b24gb2YgbGF3LiBJZiB5b3UgYXJlIG5vdCB0aGUgaW50ZW5kZWQgcmVjaXBpZW50LCB5b3UgYXJl
IGhlcmVieSANCm5vdGlmaWVkIHRoYXQgYW55IHJldmlldywgZGlzc2VtaW5hdGlvbiwgZGlzdHJp
YnV0aW9uIG9yIGR1cGxpY2F0aW9uIG9mIHRoaXMgDQpjb21tdW5pY2F0aW9uIGlzIHN0cmljdGx5
IHByb2hpYml0ZWQuIFlvdSBhcmUgYWxzbyBhc2tlZCB0byBjb250YWN0IHRoZSBzZW5kZXIgDQpi
eSByZXBseSBlbWFpbCBhbmQgaW1tZWRpYXRlbHkgZGVzdHJveSBhbGwgY29waWVzIG9mIHRoZSBv
cmlnaW5hbCBtZXNzYWdlLg0K


From xen-users-bounces@lists.xenproject.org Mon Feb 22 16:01:08 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Feb 2021 16:01:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.88198.165722 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEDdN-0004H7-1t; Mon, 22 Feb 2021 16:00:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 88198.165722; Mon, 22 Feb 2021 16:00:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEDdM-0004Gz-V1; Mon, 22 Feb 2021 16:00:28 +0000
Received: by outflank-mailman (input) for mailman id 88198;
 Mon, 22 Feb 2021 16:00:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1lEDdL-0004Gu-L6
 for Xen-users@lists.xenproject.org; Mon, 22 Feb 2021 16:00:27 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lEDdK-0003gi-Ow; Mon, 22 Feb 2021 16:00:26 +0000
Received: from [54.239.6.187] (helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lEDdK-0005eR-It; Mon, 22 Feb 2021 16:00:26 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
	MIME-Version:Date:Message-ID:From:References:To:Subject;
	bh=KwxgTkV4+1XSx1ZB0X70GCX4m60l8UwW8A1qTq9xYco=; b=GbbhM5h8eME/fVWZJFSTsnSql0
	vL+WL/11R5fp3STZU94NY4CdmpKGYfMQ9/Nqz8dVtBQJP3eHuoFS6bpET35edbwAN4YNSekzTUWeT
	N1HwyTdnHSqpkaQqGvNQE94VYjuT/56eLAdZcGhKQcNo9QR+kD56Hk3K0HSAP/H+Rhhk=;
Subject: Re: Aligning Xen to physical memory maps on embedded systems
To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>,
 "Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>,
 Stefano Stabellini <sstabellini@kernel.org>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
 <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
From: Julien Grall <julien@xen.org>
Message-ID: <1611b526-ea1d-8f30-6e2e-8e881bb8a6cd@xen.org>
Date: Mon, 22 Feb 2021 16:00:24 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0)
 Gecko/20100101 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 7bit

Hi,

On 22/02/2021 13:37, Levenglick Dov wrote:
>> (+ Stefano)
>>
>> On 21/02/2021 16:30, Levenglick Dov wrote:
>>> Hi,
>>
>> Hi,
>>
>>> I am booting True Dom0-less on Xilinx ZynqMP UltraScale+ using Xen
>>> 4.11, taken from https://github.com/Xilinx/xen.
>>
>> This tree is not an official Xen Project tree. I can provide feedback based on
>> how Xen upstream works, but I don't know for sure if this will apply to the
>> Xilinx tree.
>>
>> For any support, I would recommend to contect Xilinx directly.
> 
> I will approach their representatives. Can you comment regarding the approach that I
> outline in the rest of the mail as though it were referring to the Xen upstream?
> 
>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen and
>>> the DomU have an allocation of 1.25GB, per this memory map:
>>> 1. DomU1: 0x60000000 - 0x80000000
>>> 2. DomU2: 0x40000000 - 0x60000000
>>> 3. Xen: 0x30000000 - 0x40000000
>>
>> How did you tell Xen which regions is assigned to which guests? Are your
>> domain mapped 1:1 (i.e guest physical address == host physical address)?
> 
> I am working on a solution where if the "xen,domain" memory has #size-cell cells the
> content is backward compatible. But if it contains (#address-cells + #size-cells), the
> address cells should be considered the physical start address.
> During the mapping of the entire address space insetup_mm(), the carved out addresses
> would be added to the  reserved memory address space. When the DomU is to be created,
> this physical space would be mapped to it. The virtual addresses are less of an issue and
> needn't be mapped 1x1 (although they could be).
> 
>>
>>>
>>> I am able to support True Dom0-less by means of the patch/hack
>>> demonstrated By Stefano Stabellini at
>> https://youtu.be/UfiP9eAV0WA?t=1746.
>>>
>>> I was able to forcefully put the Xen binary at the address range
>>> immediately below 0x40000000 by means of modifying get_xen_paddr() -
>> in itself an ugly hack.
>>>
>>> My questions are:
>>> 1. Since Xen performs runtime allocations from its heap, it is allocating
>>>      downwards from 0x80000000 - thereby "stealing" memory from DomU1.
>>
>> In theory, any memory reserved for domains should have been carved out
>> from the heap allocator. This would be sufficient to prevent Xen allocating
>> memory from the ranges you described above.
>>
>> Therefore, to me this looks like a bug in the tree you are using.
> 
> This would be a better approach, but because Xen perform allocations from its
> heap prior to allocating memory to DomU - and since it allocates from the top of
> the heap - it is basically taking memory that I wanted to set aside for the DomU.
> This is why I am thinking of reserving the memory.

That's correct. We want to carve out memory from the heap allocator so 
it can't be used by Xen. I would recommend to read [1] as we discussed 
the issue in the greater length about reserving memory.

Cheers,

[1] 
https://lore.kernel.org/xen-devel/a316ed70-da35-8be0-a092-d992e56563d2@xen.org/

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Mon Feb 22 16:10:10 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Feb 2021 16:10:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.88230.165767 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEDmc-0005Gf-Ls; Mon, 22 Feb 2021 16:10:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 88230.165767; Mon, 22 Feb 2021 16:10:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEDmc-0005GX-I5; Mon, 22 Feb 2021 16:10:02 +0000
Received: by outflank-mailman (input) for mailman id 88230;
 Mon, 22 Feb 2021 16:10:01 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XUVP=HY=riseup.net=donoban@srs-us1.protection.inumbo.net>)
 id 1lEDmb-000586-DX
 for xen-users@lists.xenproject.org; Mon, 22 Feb 2021 16:10:01 +0000
Received: from mx1.riseup.net (unknown [198.252.153.129])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id bc07be83-ca3a-4e0a-b0bd-85f3fd7e3ce7;
 Mon, 22 Feb 2021 16:09:59 +0000 (UTC)
Received: from fews1.riseup.net (fews1-pn.riseup.net [10.0.1.83])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "Sectigo RSA Domain Validation Secure Server CA" (not verified))
 by mx1.riseup.net (Postfix) with ESMTPS id 4DknFb4KWczDsmL
 for <xen-users@lists.xenproject.org>; Mon, 22 Feb 2021 08:09:55 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1])
 by fews1.riseup.net (Postfix) with ESMTPSA id 4DknFZ6M8Qz5vMt
 for <xen-users@lists.xenproject.org>; Mon, 22 Feb 2021 08:09:54 -0800 (PST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: bc07be83-ca3a-4e0a-b0bd-85f3fd7e3ce7
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak;
	t=1614010195; bh=KmS4MrZrFnSJAGoOfWoe1VzrGka0/JnFtmFyq20wIm4=;
	h=To:From:Subject:Date:From;
	b=kX7dQuBs8gSDnmfMYS+bT+WpyLwIv5NqZELrNSGGnEw4qM7nWggD4r8fQ22g99cJV
	 +Q+gEsuXt6TZiP4x//hJ+AyAFDWZ7ODUTKL5eLvWkbqUvW8tuADETkH+JEgisJ8TJA
	 MVcyX5K1vzHjfg1wSLObwYXYuQ7g6RixSpYRTZtA=
X-Riseup-User-ID: 785F6A88A9A866BC58A773F31D730E7F05CA0DCF70DAB5F37B07E8BCABDC95E0
To: xen-users@lists.xenproject.org
From: donoban <donoban@riseup.net>
Subject: Intel CPU Throttling and/or Undervolting
Message-ID: <f6d8273b-3417-801e-58ec-6a3dffa9815a@riseup.net>
Date: Mon, 22 Feb 2021 17:09:45 +0100
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="6qLm4kQBex5HKf2BEvnGBM3Y6J6sNsVCp"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--6qLm4kQBex5HKf2BEvnGBM3Y6J6sNsVCp
Content-Type: multipart/mixed; boundary="VNwRR9BgaREAcQ1MARdP3Rf0my2zeq4p1";
 protected-headers="v1"
From: donoban <donoban@riseup.net>
To: xen-users@lists.xenproject.org
Message-ID: <f6d8273b-3417-801e-58ec-6a3dffa9815a@riseup.net>
Subject: Intel CPU Throttling and/or Undervolting

--VNwRR9BgaREAcQ1MARdP3Rf0my2zeq4p1
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable

Hi,

I'm running Qubes OS on a Lenovo E490 and having this messages on 'xl
dmesg':

CPUX: Package temperature above threshold, cpu clock throttled
CPUX: Running in modulated clock mode
CPUX: Core temperature/speed normal

I discovered this project for fixing it:
https://github.com/erpalma/throttled

But unfortunately it fails trying to run directly in dom0.

Does anyone know if I can fix this? I get temp threshold messages with
50=C2=BAC (according to sensors). Can I raise this temp threshold?

The only "solution" that I've currently found is doing 'xenpm
set-scaling-maxfreq 1500000' but I would like to get all the power of my
computer.


--VNwRR9BgaREAcQ1MARdP3Rf0my2zeq4p1--

--6qLm4kQBex5HKf2BEvnGBM3Y6J6sNsVCp
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=lDSf
-----END PGP SIGNATURE-----

--6qLm4kQBex5HKf2BEvnGBM3Y6J6sNsVCp--


From xen-users-bounces@lists.xenproject.org Tue Feb 23 01:53:09 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Feb 2021 01:53:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.88476.166390 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEMsa-00082W-TJ; Tue, 23 Feb 2021 01:52:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 88476.166390; Tue, 23 Feb 2021 01:52:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEMsa-00082O-Of; Tue, 23 Feb 2021 01:52:48 +0000
Received: by outflank-mailman (input) for mailman id 88476;
 Tue, 23 Feb 2021 01:52:47 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fjLX=HZ=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1lEMsZ-000825-8E
 for Xen-users@lists.xenproject.org; Tue, 23 Feb 2021 01:52:47 +0000
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id be6f02ad-6caf-4503-8aa8-17df507414aa;
 Tue, 23 Feb 2021 01:52:46 +0000 (UTC)
Received: by mail.kernel.org (Postfix) with ESMTPSA id C36D96148E;
 Tue, 23 Feb 2021 01:52:45 +0000 (UTC)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: be6f02ad-6caf-4503-8aa8-17df507414aa
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1614045166;
	bh=q0LuoZDJi9k+nq5yxKKMup0PX+NkU8wkAK5dCp2SQ5c=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Gpe+HnJPLFj1d8wg6VY+PijGNNCxfff0fM1+pT4DMcVDeYUNrfUU4lam5AF+zOTL+
	 WNkb6uwg1+i0u0ekD7dxsWZWm6hJliN2kW3yYdb7bgFT6O09Vl7FKhEJ1qexMLhn6w
	 oW4nF0z7gZb5MPvwvCRatwvvyTCEg/ebjNwnbytgrAv9Yz6FOP1Hp5Sd3GLWJ+bky5
	 oaSaebIAiC6iQVm0RG9dKu39tvMLQGuFpTp4fcLWylaC9Nvt3BTaLjtHQyCZTwoFiG
	 EnqgneBNmAuwyZ/+9T2XRBz1T8Q5ACuohemaIODy8QaDHc0Di96EEwKxEyJJtYONE0
	 Byup2e1ep7N4w==
Date: Mon, 22 Feb 2021 17:52:45 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s
To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
cc: Julien Grall <julien@xen.org>, 
    "Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>, 
    Stefano Stabellini <sstabellini@kernel.org>, Bertrand.Marquis@arm.com
Subject: RE: Aligning Xen to physical memory maps on embedded systems
In-Reply-To: <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
Message-ID: <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com> <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org> <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 22 Feb 2021, Levenglick Dov wrote:
> > > The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen and
> > > the DomU have an allocation of 1.25GB, per this memory map:
> > > 1. DomU1: 0x60000000 - 0x80000000
> > > 2. DomU2: 0x40000000 - 0x60000000
> > > 3. Xen: 0x30000000 - 0x40000000
> > 
> > How did you tell Xen which regions is assigned to which guests? Are your
> > domain mapped 1:1 (i.e guest physical address == host physical address)?
> 
> I am working on a solution where if the "xen,domain" memory has #size-cell cells the
> content is backward compatible. But if it contains (#address-cells + #size-cells), the 
> address cells should be considered the physical start address.
> During the mapping of the entire address space insetup_mm(), the carved out addresses
> would be added to the  reserved memory address space. When the DomU is to be created,
> this physical space would be mapped to it. The virtual addresses are less of an issue and
> needn't be mapped 1x1 (although they could be).

As of today neither upstream Xen nor the Xilinx Xen tree come with the
feature of allowing the specification of an address range for dom0less
guests.

The only thing that Xilinx Xen allows, which is not upstream yet, is the
ability of creating dom0less guests 1:1 mapped using the "direct-map"
property. But the memory allocation is still done by Xen (you can't
select the addresses).

Some time ago I worked on a hacky prototype to allow the specification
of address ranges, see:

http://xenbits.xenproject.org/git-http/people/sstabellini/xen-unstable.git direct-map-2
from 7372466b21c3b6c96bb7a52754e432bac883a1e3 onward.

In particular, have a look at "xen/arm: introduce 1:1 mapping for
domUs". The work is not complete: it might not work depending on the
memory ranges you select for your domUs. In particular, you can't select
top-of-RAM addresses for your domUs. However, it might help you getting
started.
 

> > > I am able to support True Dom0-less by means of the patch/hack
> > > demonstrated By Stefano Stabellini at
> > https://youtu.be/UfiP9eAV0WA?t=1746.
> > >
> > > I was able to forcefully put the Xen binary at the address range
> > > immediately below 0x40000000 by means of modifying get_xen_paddr() -
> > in itself an ugly hack.
> > >
> > > My questions are:
> > > 1. Since Xen performs runtime allocations from its heap, it is allocating
> > >     downwards from 0x80000000 - thereby "stealing" memory from DomU1.
> > 
> > In theory, any memory reserved for domains should have been carved out
> > from the heap allocator. This would be sufficient to prevent Xen allocating
> > memory from the ranges you described above.
> > 
> > Therefore, to me this looks like a bug in the tree you are using.
> 
> This would be a better approach, but because Xen perform allocations from its
> heap prior to allocating memory to DomU - and since it allocates from the top of
> the heap - it is basically taking memory that I wanted to set aside for the DomU.

Yeah, this is the main problem that my prototype above couldn't solve.



From xen-users-bounces@lists.xenproject.org Tue Feb 23 01:53:09 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Feb 2021 01:53:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.88475.166372 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEMsN-0007zT-HL; Tue, 23 Feb 2021 01:52:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 88475.166372; Tue, 23 Feb 2021 01:52:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEMsN-0007zH-AM; Tue, 23 Feb 2021 01:52:35 +0000
Received: by outflank-mailman (input) for mailman id 88475;
 Tue, 23 Feb 2021 01:52:33 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fjLX=HZ=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1lEMsL-0007zC-Rt
 for Xen-users@lists.xenproject.org; Tue, 23 Feb 2021 01:52:33 +0000
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1f871581-fbfb-433d-ba2d-da6bed947382;
 Tue, 23 Feb 2021 01:52:33 +0000 (UTC)
Received: by mail.kernel.org (Postfix) with ESMTPSA id 1380D64DE9;
 Tue, 23 Feb 2021 01:52:32 +0000 (UTC)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 1f871581-fbfb-433d-ba2d-da6bed947382
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1614045152;
	bh=bBzrTadQ5k7IlyLWHJ8oxDhb1g/WH7QN4UjAr/xxgFM=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=UILiNatWxKuZ4KDCnlRpVnsSU+YD+V6AKVi0peJkeLMBbCJDyMB5CVKtDMeZ6IP1H
	 DgYZEhgy/bVa4/LUYIcsV/ruBDoDylFE5v73uRLMNNiglNRmLv0AviU9sEadvzjrrQ
	 FQUd1BCkoBM7WBZMjnJb7o7mSbXI1GBF5gOuT1o68d2kAxy3PpirthlkZaqCy3Ei10
	 gf+aq13ErC/bBrLnXQdkqO7oqW/C0wOUr7bKZn8pmF4BXdH/admqV6Fm2wjlKMD8Wl
	 HsbQvtugW67q/Satq56bAJJkbty8FwBSj3UAK649CKqIdyHEznv/vaYGXmOHkXUt9O
	 JvAwpAzyZ8T4A==
Date: Mon, 22 Feb 2021 17:52:31 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s
To: Julien Grall <julien@xen.org>
cc: Levenglick Dov <Dov.Levenglick@elbitsystems.com>, 
    "Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>, 
    Stefano Stabellini <sstabellini@kernel.org>, Bertrand.Marquis@arm.com
Subject: Re: Aligning Xen to physical memory maps on embedded systems
In-Reply-To: <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
Message-ID: <alpine.DEB.2.21.2102221733530.3234@sstabellini-ThinkPad-T480s>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com> <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 22 Feb 2021, Julien Grall wrote:
> (+ Stefano)

Hi Julien, thanks for CCing me.


> On 21/02/2021 16:30, Levenglick Dov wrote:
> > Hi,
> 
> Hi,
> 
> > I am booting True Dom0-less on Xilinx ZynqMP UltraScale+ using Xen 4.11,
> > taken from https://github.com/Xilinx/xen.
> 
> This tree is not an official Xen Project tree. I can provide feedback based on
> how Xen upstream works, but I don't know for sure if this will apply to the
> Xilinx tree.
> 
> For any support, I would recommend to contect Xilinx directly.
> 
> > The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen and the
> > DomU
> > have an allocation of 1.25GB, per this memory map:
> > 1. DomU1: 0x60000000 - 0x80000000
> > 2. DomU2: 0x40000000 - 0x60000000
> > 3. Xen: 0x30000000 - 0x40000000
> 
> How did you tell Xen which regions is assigned to which guests? Are your
> domain mapped 1:1 (i.e guest physical address == host physical address)?
> 
> > I am able to support True Dom0-less by means of the patch/hack demonstrated
> > By Stefano Stabellini at https://youtu.be/UfiP9eAV0WA?t=1746.
> > 
> > I was able to forcefully put the Xen binary at the address range immediately
> > below 0x40000000 by means of modifying get_xen_paddr() - in itself an ugly
> > hack.
> > 
> > My questions are:
> > 1. Since Xen performs runtime allocations from its heap, it is allocating
> >     downwards from 0x80000000 - thereby "stealing" memory from DomU1.
> 
> In theory, any memory reserved for domains should have been carved out from
> the heap allocator. This would be sufficient to prevent Xen allocating memory
> from the ranges you described above.
> 
> Therefore, to me this looks like a bug in the tree you are using.
> 
> >     Can I force the runtime allocations to be from a specific address range?
> > 2. Has the issue of physical memory map address maps been addressed by Xen
> > for embedded?
> 
> Xen 4.12+ will not relocate itself to the top of the memory anymore. Instead,
> it will stay where it was first loaded in memory.
> 
> I would recommend to ask Xilinx if they can provide you with a more recent
> tree.

The following is based on 4.13:

https://github.com/xilinx/xen/tree/xilinx/release-2020.2


From xen-users-bounces@lists.xenproject.org Tue Feb 23 09:52:55 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Feb 2021 09:52:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.88669.166843 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEUMV-0008H5-4N; Tue, 23 Feb 2021 09:52:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 88669.166843; Tue, 23 Feb 2021 09:52:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEUMV-0008Gy-12; Tue, 23 Feb 2021 09:52:11 +0000
Received: by outflank-mailman (input) for mailman id 88669;
 Tue, 23 Feb 2021 09:52:09 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3yIQ=HZ=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1lEUMT-0008Gt-A2
 for Xen-users@lists.xenproject.org; Tue, 23 Feb 2021 09:52:09 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (unknown
 [40.107.8.49]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 43437b19-653b-4e32-9d9c-e69b3ae27bd8;
 Tue, 23 Feb 2021 09:52:06 +0000 (UTC)
Received: from AM5PR0202CA0002.eurprd02.prod.outlook.com
 (2603:10a6:203:69::12) by VI1PR08MB3984.eurprd08.prod.outlook.com
 (2603:10a6:803:e9::27) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.29; Tue, 23 Feb
 2021 09:52:04 +0000
Received: from VE1EUR03FT024.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:69:cafe::86) by AM5PR0202CA0002.outlook.office365.com
 (2603:10a6:203:69::12) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.19 via Frontend
 Transport; Tue, 23 Feb 2021 09:52:04 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT024.mail.protection.outlook.com (10.152.18.87) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3868.27 via Frontend Transport; Tue, 23 Feb 2021 09:52:03 +0000
Received: ("Tessian outbound f8d85101260a:v71");
 Tue, 23 Feb 2021 09:52:03 +0000
Received: from 90dcab808536.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 11753283-14ED-4CDC-AE48-0978836A0A83.1; 
 Tue, 23 Feb 2021 09:51:58 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 90dcab808536.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 23 Feb 2021 09:51:58 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com (2603:10a6:800:1ae::15)
 by VE1PR08MB4927.eurprd08.prod.outlook.com (2603:10a6:802:b1::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.31; Tue, 23 Feb
 2021 09:51:56 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839]) by VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839%6]) with mapi id 15.20.3868.032; Tue, 23 Feb 2021
 09:51:56 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 43437b19-653b-4e32-9d9c-e69b3ae27bd8
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=vhuz/8q+XWKmGDfdqt3vXhuDmdqANWFBTQTgszc8E40=;
 b=K2R1q/aDbBSOfZgiAMiwVvycMJQ8ykYXUroyXVXVwiB0RXPjGxW5A/WscPo4qZANbA1VKLyFlG1O9Q4JGIvI1f4+dQCJ/EJqbV7rxNH8ogFTyCCN1Jpe0XDMLLlsOUCyaGxZkaxAQDYQG/Vfp1M5vfh4otbmo9X1YKXd4ur3eS4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 86532eb41f0ce9a0
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IRix7g5H7YHSxnlXIBnQrYYaWG0eBRG6tpq/Qws11OPPLpaGFI+Zbn5php2m5xShhlgvh/ouTDMPhzPUHMhZcA6ulsIGCp1ghDBiO8zzZ9C2Gt4XA5GTjdggNb7MDrHUtZjAPj1uN6VAG9TBvrEeAwPrUpCJU2HTT1kXDH3ZGcEfWvdbSmV6vhEaikmPJNEIgwO+rYtBMf8lb8p9uQhucGm76UNjJXSCSZ/wLM6MZrE4EUZ6DndbB/CvFW7MfVh1ZRMML3GtUbuEAhIYBgkOahiiCvRuqDorIPgnDXGLZ94PcwXKb/6sDV60ai81RiVjl+QX+C7rB+lCua5RNUnQHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=vhuz/8q+XWKmGDfdqt3vXhuDmdqANWFBTQTgszc8E40=;
 b=j/jaFX1KT7GBC/8lbLLg5nWn9Je0Izq/rS86sf7GchbBQonqsqR5l8y7S25xlINYT3Ew29NCm5AHv2pxjvTivqTdT/PRVW8C1MqGFS5ebBHlsO8SU8O9WkB0h2GoU0Y802AaA3H5Ts5LzBecs9d5BA3ypBCmYrkk5NHvPK8kCawdD8vwhj3sPw8lhxbqWufEooSBUMrLCVCKoVlphfuTEQwszJ1cUst7u06yOQSwtcag1dsyWxez2gvByCM0MIu3dtDopYjdAflL8WeTn+vCvpndQTSoAsqc+pAL1ew+6y+CWEMcVRweiDArKXBtCQHR9SC41E3T1VR4Y5Dg5PJX9w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=vhuz/8q+XWKmGDfdqt3vXhuDmdqANWFBTQTgszc8E40=;
 b=K2R1q/aDbBSOfZgiAMiwVvycMJQ8ykYXUroyXVXVwiB0RXPjGxW5A/WscPo4qZANbA1VKLyFlG1O9Q4JGIvI1f4+dQCJ/EJqbV7rxNH8ogFTyCCN1Jpe0XDMLLlsOUCyaGxZkaxAQDYQG/Vfp1M5vfh4otbmo9X1YKXd4ur3eS4=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Levenglick Dov <Dov.Levenglick@elbitsystems.com>, Julien Grall
	<julien@xen.org>, "Xen-users@lists.xenproject.org"
	<Xen-users@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Subject: Re: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index: AdcIbsi89MadXehWTs+A1h4hE7ONNwAlkfyAAAaxfAAAGa9vgAAQu/AA
Date: Tue, 23 Feb 2021 09:51:55 +0000
Message-ID: <32928DB3-0698-4636-B438-262A8465B067@arm.com>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
 <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
 <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
In-Reply-To: <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.120.23.2.4)
Authentication-Results-Original: kernel.org; dkim=none (message not signed)
 header.d=none;kernel.org; dmarc=none action=none header.from=arm.com;
x-originating-ip: [86.26.33.241]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: f9d7a04a-798e-4322-f987-08d8d7e0ac7e
x-ms-traffictypediagnostic: VE1PR08MB4927:|VI1PR08MB3984:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB3984D4F259FB35F9685E27079D809@VI1PR08MB3984.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8882;OLM:8882;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5696.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(39860400002)(346002)(376002)(136003)(366004)(6506007)(64756008)(66446008)(966005)(26005)(8676002)(53546011)(66556008)(86362001)(54906003)(6512007)(2906002)(5660300002)(6486002)(8936002)(2616005)(71200400001)(91956017)(76116006)(186003)(6916009)(478600001)(36756003)(4326008)(66946007)(66476007)(316002)(33656002)(55236004)(83380400001)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?qOxNNbuAIMA5dTEuF/v0BXujiXTzf/9K+h11PdcQQTbcP9AhM2DECsgdJImh?=
 =?us-ascii?Q?JGlaPq/u11A4pRJ5GSZrgL5A7jXc5SAy7lGgzZClIiNt9taH7jW4kyaNiNaq?=
 =?us-ascii?Q?B++yX4QWDTaTza2bMhFnsqmkCJbl8QupF801xgSoUK0y6v0UsY7aTdR0T7xo?=
 =?us-ascii?Q?ZhV8QWm9Ui+p384URr9AAYjwsqSHWpc7DTWS59mmoCbiuRgUP+CWgP9nJmI9?=
 =?us-ascii?Q?JpH7UeMkDm9fEjF88E8gwbRfiKu8ueEptVz6HUfuOKzqPMo2EQLhQ2J/qB4B?=
 =?us-ascii?Q?BLp2bGfdM0AYvmmZE83yOS0eduKDVNg8uvpofHe8lTlMosjp/7zEWWXJ2DSc?=
 =?us-ascii?Q?boRfXXSQjP2/SsNhSNVt98IVViQXZiQTyGnS3q5d1OQX673uVNTJyHmJbe8Y?=
 =?us-ascii?Q?5gmkgvuaXODa9VmNyO71SL0eYRJNSbFcu+ZPsOKhe5vtfJWWWixxMUi5Xiif?=
 =?us-ascii?Q?H1tySC952NqTa7SEmgpSC8KBUiFBLXMYETEWtw76b+mJpoMJ4sM+jS4lLPz8?=
 =?us-ascii?Q?5RpPbQ5bRi+k7Kx34IqAWHQDLA71L8Mfu3WVQEpu6h+mbgsW+a31SXSZIVeV?=
 =?us-ascii?Q?sw3j0nQ1idzWo6HHgokYnPqMNFsmj5pRfiengXhXa8idSwhGW3ntb1Tp+Q5V?=
 =?us-ascii?Q?ndu4QlsyNHctvmd+H7+TvDQg8HADrHY+XSv0sx8Mdg7tfhQ0sRIxvIJUXY/W?=
 =?us-ascii?Q?qqcElFkxuYrwClR6IWRtfchPLF85H4++zQ2I4Xpk5P3Cjyoi6hmG0dp/l4VO?=
 =?us-ascii?Q?POYuWYv7WcmQpmEcOuYG8rUrIgPuY+r3XQzfgLRUzasqJrWBG2foHN5wppSe?=
 =?us-ascii?Q?xAUzBmz7q82HkHxvx5jHdyQduu85FcjCvZhywHsFDeOO7SWhnl6HEir3y7hU?=
 =?us-ascii?Q?Ox7v6vtg0szBkswGy1NuaaEJX39e+qUrFlAh/O7KCPCIa+kEqVY0reIPk48r?=
 =?us-ascii?Q?0/4/D3oJuxqohzSXx+6kkrHfYFOuKH3/xwUPU8iGhP4XquFHohml91+BVoSu?=
 =?us-ascii?Q?KeZcwfNTwpzGySO5zNKUX3BcSvR9jVx5EQFv20M4BWXTRfuGjyJmYoGWUXex?=
 =?us-ascii?Q?FF1pxahSsAp//WWLVEhfrL+6Ybe2ixIDExMeROXncWUcJfrswoN6OT6obKxR?=
 =?us-ascii?Q?iBH2b56IP39SXpwXP4r6q3wOkmeaZrhG+OoRnxMV8BGyAWWLnbvpxVVTrwj4?=
 =?us-ascii?Q?aK5gKlEmOwdjSFAQ0HYEMUY+H3Thx9FnYRSFYmYyG8KUcGZ451xiflndRIvO?=
 =?us-ascii?Q?8ET9/TIFN6EtccjBwT5odJJATsEsbynSXkDmKjEeOvKUx6TO+RQJ3STwxaDy?=
 =?us-ascii?Q?ynPvvnB2X37C1RKsTfcJtIM/?=
Content-Type: text/plain; charset="us-ascii"
Content-ID: <CD384B6B2A922B4DA4A315D5C64580E4@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB4927
Original-Authentication-Results: kernel.org; dkim=none (message not signed)
 header.d=none;kernel.org; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT024.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	0e1dafba-97a9-4402-cbfe-08d8d7e0a7cb
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(346002)(39860400002)(136003)(396003)(376002)(36840700001)(46966006)(8936002)(356005)(186003)(966005)(55236004)(336012)(36860700001)(2616005)(81166007)(82740400003)(33656002)(53546011)(8676002)(83380400001)(316002)(70586007)(70206006)(47076005)(478600001)(5660300002)(82310400003)(4326008)(86362001)(36756003)(26005)(6862004)(54906003)(6486002)(6512007)(6506007)(2906002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Feb 2021 09:52:03.8154
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f9d7a04a-798e-4322-f987-08d8d7e0ac7e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT024.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3984

(+ Penny, Wei and Luca)

> On 23 Feb 2021, at 01:52, Stefano Stabellini <sstabellini@kernel.org> wro=
te:
>=20
> On Mon, 22 Feb 2021, Levenglick Dov wrote:
>>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen and
>>>> the DomU have an allocation of 1.25GB, per this memory map:
>>>> 1. DomU1: 0x60000000 - 0x80000000
>>>> 2. DomU2: 0x40000000 - 0x60000000
>>>> 3. Xen: 0x30000000 - 0x40000000
>>>=20
>>> How did you tell Xen which regions is assigned to which guests? Are you=
r
>>> domain mapped 1:1 (i.e guest physical address =3D=3D host physical addr=
ess)?
>>=20
>> I am working on a solution where if the "xen,domain" memory has #size-ce=
ll cells the
>> content is backward compatible. But if it contains (#address-cells + #si=
ze-cells), the=20
>> address cells should be considered the physical start address.
>> During the mapping of the entire address space insetup_mm(), the carved =
out addresses
>> would be added to the  reserved memory address space. When the DomU is t=
o be created,
>> this physical space would be mapped to it. The virtual addresses are les=
s of an issue and
>> needn't be mapped 1x1 (although they could be).
>=20
> As of today neither upstream Xen nor the Xilinx Xen tree come with the
> feature of allowing the specification of an address range for dom0less
> guests.
>=20
> The only thing that Xilinx Xen allows, which is not upstream yet, is the
> ability of creating dom0less guests 1:1 mapped using the "direct-map"
> property. But the memory allocation is still done by Xen (you can't
> select the addresses).
>=20
> Some time ago I worked on a hacky prototype to allow the specification
> of address ranges, see:
>=20
> http://xenbits.xenproject.org/git-http/people/sstabellini/xen-unstable.gi=
t direct-map-2
> from 7372466b21c3b6c96bb7a52754e432bac883a1e3 onward.
>=20
> In particular, have a look at "xen/arm: introduce 1:1 mapping for
> domUs". The work is not complete: it might not work depending on the
> memory ranges you select for your domUs. In particular, you can't select
> top-of-RAM addresses for your domUs. However, it might help you getting
> started.
>=20
>=20
>>>> I am able to support True Dom0-less by means of the patch/hack
>>>> demonstrated By Stefano Stabellini at
>>> https://youtu.be/UfiP9eAV0WA?t=3D1746.
>>>>=20
>>>> I was able to forcefully put the Xen binary at the address range
>>>> immediately below 0x40000000 by means of modifying get_xen_paddr() -
>>> in itself an ugly hack.
>>>>=20
>>>> My questions are:
>>>> 1. Since Xen performs runtime allocations from its heap, it is allocat=
ing
>>>>    downwards from 0x80000000 - thereby "stealing" memory from DomU1.
>>>=20
>>> In theory, any memory reserved for domains should have been carved out
>>> from the heap allocator. This would be sufficient to prevent Xen alloca=
ting
>>> memory from the ranges you described above.
>>>=20
>>> Therefore, to me this looks like a bug in the tree you are using.
>>=20
>> This would be a better approach, but because Xen perform allocations fro=
m its
>> heap prior to allocating memory to DomU - and since it allocates from th=
e top of
>> the heap - it is basically taking memory that I wanted to set aside for =
the DomU.
>=20
> Yeah, this is the main problem that my prototype above couldn't solve.
>=20

Wei and Penny are working on direct map and static allocation to fit embedd=
ed use
cases an might have more answer there.

On the fix from Stefano explained in the video, Luca Fancellu made a patch =
to propose
a long term solution and will push it upstream next week.

Cheers
Bertrand




From xen-users-bounces@lists.xenproject.org Tue Feb 23 16:38:03 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 23 Feb 2021 16:38:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.88905.167338 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEagf-0000QM-Ci; Tue, 23 Feb 2021 16:37:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 88905.167338; Tue, 23 Feb 2021 16:37:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lEagf-0000QB-8o; Tue, 23 Feb 2021 16:37:25 +0000
Received: by outflank-mailman (input) for mailman id 88905;
 Tue, 23 Feb 2021 16:37:23 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MteW=HZ=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lEagd-0000NY-Rw
 for xen-users@lists.xen.org; Tue, 23 Feb 2021 16:37:23 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id b1d8a33d-122f-4862-9164-9e8b412781fa;
 Tue, 23 Feb 2021 16:37:14 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lEagN-0007HJ-Gl; Tue, 23 Feb 2021 16:37:07 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lEagN-0005TY-Eq; Tue, 23 Feb 2021 16:37:07 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: b1d8a33d-122f-4862-9164-9e8b412781fa
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=ZVKCACDsa88A+J2oOVB0FQlmNUn9GbX8Js0ggX9rhno=; b=4xAMLjnvN7z2GsUYt2gylMU/d3
	t0UDA9v/XLyQ/WnKNPWWUBppja+J7Ci2nu4Mc+WZ7ozb9Z+PPcjPfIDlisZwVqIT9v1MrsyFhrN3F
	WHFqe3f5ZCx+6peklvNXnB/DEU1MDoc8ca5nNZrg+MzvbSmtwWVpACK2+T1T4PYaXeN8=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 366 v2 (CVE-2021-27379) - missed flush in
 XSA-321 backport
Message-Id: <E1lEagN-0005TY-Eq@xenbits.xenproject.org>
Date: Tue, 23 Feb 2021 16:37:07 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-27379 / XSA-366
                              version 2

                   missed flush in XSA-321 backport

UPDATES IN VERSION 2
====================

CVE assigned.

Fixed erroneous reference to XSA-320; should have read XSA-321.

ISSUE DESCRIPTION
=================

An oversight was made when backporting XSA-321, leading entries in the
IOMMU not being properly updated under certain circumstances.

IMPACT
======

A malicious guest may be able to retain read/write DMA access to
frames returned to Xen's free pool, and later reused for another
purpose.  Host crashes (leading to a Denial of Service) and privilege
escalation cannot be ruled out.

VULNERABLE SYSTEMS
==================

Xen versions up to 4.11, from at least 3.2 onwards, are affected.  Xen
versions 4.12 and newer are not affected.

Only x86 Intel systems are affected.  x86 AMD as well as Arm systems are
not affected.

Only x86 HVM guests using hardware assisted paging (HAP), having a
passed through PCI device assigned, and having page table sharing
enabled can leverage the vulnerability.  Note that page table
sharing will be enabled (by default) only if Xen considers IOMMU and
CPU large page size support compatible.

MITIGATION
==========

Suppressing the use of page table sharing will avoid the vulnerability
(command line option "iommu=no-sharept").

Suppressing the use of large HAP pages will avoid the vulnerability
(command line options "hap_2mb=no hap_1gb=no").

Not passing through PCI devices to HVM guests will avoid the
vulnerability.

CREDITS
=======

This issue was reported as a bug by M. Vefa Bicakci, and recognized as
a security issue by Roger Pau Monne of Citrix.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa366-4.11.patch      Xen 4.11.x

$ sha256sum xsa366*
3131c9487b9446655e2e21df4ccf1e003bec471881396d7b2b1a0939f5cbae96  xsa366.meta
8c8c18ca8425e6167535c3cf774ffeb9dcb4572e81c8d2ff4a73fefede2d4d94  xsa366-4.11.patch
$

NOTE REGARDING LACK OF EMBARGO
==============================

This was reported and debugged publicly, before the security
implications were apparent.
-----BEGIN PGP SIGNATURE-----

iQE/BAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmA1Lx4MHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZXRkH+MsCFrh/HOCaqzbdlT46sZBSS3B7wMjaCt4WtB8z
MKxRY013/MMi7xbOhMvLE/qEtT8cdkOykxac9WjMnAPk2NQE3L3uRvoWsS8cYLa6
39RklCw0o/0YTsiY4bB5X1jI+8dBZxt4QPYl1YQqsLOHTlSJFix2Vm6w/K8+BZt9
ceS58GEoAawwlkVXdSH2115rSVRoBUZqgHCkPIc6eOjAmXCPL++8uUToWWhiROWD
Ic0STLsf/Rt44G71rPh8GoFdncIBULcPlp1LbxCUEzRVhdmeb1/shs79vsIk0Z3l
c2oHzypyS15p/kdQbulGTXDFq933C4ELtjrY/HwPumJSdg==
=er6n
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa366.meta"
Content-Disposition: attachment; filename="xsa366.meta"
Content-Transfer-Encoding: base64

ewogICJYU0EiOiAzNjYsCiAgIlN1cHBvcnRlZFZlcnNpb25zIjogWwogICAg
IjQuMTEiCiAgXSwKICAiVHJlZXMiOiBbCiAgICAieGVuIgogIF0sCiAgIlJl
Y2lwZXMiOiB7CiAgICAiNC4xMSI6IHsKICAgICAgIlJlY2lwZXMiOiB7CiAg
ICAgICAgInhlbiI6IHsKICAgICAgICAgICJTdGFibGVSZWYiOiAiODBjYWQ1
ODRmYjRjMjU5OWFlMTc0MjI2ZTJjOTEzYmIyM2RmM2JmYSIsCiAgICAgICAg
ICAiUHJlcmVxcyI6IFtdLAogICAgICAgICAgIlBhdGNoZXMiOiBbCiAgICAg
ICAgICAgICJ4c2EzNjYtNC4xMS5wYXRjaCIKICAgICAgICAgIF0KICAgICAg
ICB9CiAgICAgIH0KICAgIH0KICB9Cn0=

--=separator
Content-Type: application/octet-stream; name="xsa366-4.11.patch"
Content-Disposition: attachment; filename="xsa366-4.11.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Thu Feb 25 13:08:22 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 25 Feb 2021 13:08:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.89727.169279 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lFGMl-0007SW-ML; Thu, 25 Feb 2021 13:07:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 89727.169279; Thu, 25 Feb 2021 13:07:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lFGMl-0007SO-Hk; Thu, 25 Feb 2021 13:07:39 +0000
Received: by outflank-mailman (input) for mailman id 89727;
 Thu, 25 Feb 2021 13:07:38 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sn6Q=H3=gmail.com=a9121431@srs-us1.protection.inumbo.net>)
 id 1lFGMk-0007SH-2a
 for xen-users@lists.xenproject.org; Thu, 25 Feb 2021 13:07:38 +0000
Received: from mail-ed1-x531.google.com (unknown [2a00:1450:4864:20::531])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 0d9834c9-8fd0-497e-96f6-533925d96d9f;
 Thu, 25 Feb 2021 13:07:37 +0000 (UTC)
Received: by mail-ed1-x531.google.com with SMTP id s8so6783213edd.5
 for <xen-users@lists.xenproject.org>; Thu, 25 Feb 2021 05:07:37 -0800 (PST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 0d9834c9-8fd0-497e-96f6-533925d96d9f
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:from:date:message-id:subject:to;
        bh=zNpWTtKmh9PnDuCA+bYF7Tb5geBFUeEUIHMzIxF0Mqw=;
        b=EAoXDshK/hack7Bj5KtRf++sq9Td0tPFfqZW8ifa+g6drwrrdMof88gW3ibSHtjoK5
         nsn/ebktaRh+NMDj8v1ZMc2PzaVng18X8qDmRLXshWWAqMN3K9Zf80rmhKAtqjCo2B6L
         zv5MYCJa3wM22rXgx5aZZ+gIcbV8Oz19g8K40Wd5miBVbnQ6CT+j2736lEu+bnri0zpD
         9UGQHfzz8vgJm1IKUfbll8u7OpScb+u8XPqDbMbsc9r6FE1bjTb6SgSXdR6sI8lhtq73
         Rx0CraUds6nQBbkpSsd488VWv4+6A1/2Z501DcUCvUB201bpXEoazNPc+GN/yfYWP6/2
         nBhw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=zNpWTtKmh9PnDuCA+bYF7Tb5geBFUeEUIHMzIxF0Mqw=;
        b=pzWmGmHcOOgWg8OIiYGGDyfWFPCBx1sHXXU/FaeJRuYrBfQ/l7Q8stYEMfJqGxsgxQ
         3XFvyPFGSajWHTNRZymRr4oOTxppxHkzX5ZrBYxeLAYh41QxvlafH3ZnUxx0t8L3/Zpd
         QCv8PTDZ+eHYp9SgcYa7QtUu1vdR+X0SssK6u0mT/SL9BsAMmv8J0AO6aOpX3BtuB6Ob
         AyIX/NvrOo9t+lPmTnMR3pAGVFqUDj3ga0RuAwhTDIgRRX18w70mSzwyt2JWRRQhIFcz
         E3bLuYtkDxt42QtJVonpDRBj09mH9glMnbaqIQ/XxeVTy1MPM/Ebwazq8j9jl5NK8KrW
         J+xg==
X-Gm-Message-State: AOAM531ZbbvxxIqr23xRoQB056hG08ZH/6ahlsftJMNpw1GSeOk0uAt+
	6oAN9CDmEawngzIoVR4VJYBAGQQVKo2/RI9kj/IzOYfh
X-Google-Smtp-Source: ABdhPJzlQeuHmKS2yjQkD4F+5JqvTWfAJKA/YFsaziVzbigTiBExhqt5oWDwXSBwaV7br9MBx7U6jnC0w3CnO5aN06g=
X-Received: by 2002:a05:6402:1383:: with SMTP id b3mr2801287edv.374.1614258456267;
 Thu, 25 Feb 2021 05:07:36 -0800 (PST)
MIME-Version: 1.0
From: John Mok <a9121431@gmail.com>
Date: Thu, 25 Feb 2021 21:07:24 +0800
Message-ID: <CALYzA8FEaZC7GeB4viLp6PeE+zrLPSUGmbTn0x9rXm8DmUw3bA@mail.gmail.com>
Subject: Unable to boot on Xen HVM + OVMF
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000dc934905bc28d571"

--000000000000dc934905bc28d571
Content-Type: text/plain; charset="UTF-8"

Hi,

Tried to install Buster on Xen HVM + OVMF. Installation completed
successfully, but unable to boot (Windows HVM guest has no boot problem).

Re-install Buster with BIOS and boot succeeded.

OVMF boot NOT supported on Debian ? I hope someone could point me in the
right direction.

Best regards,

John Mok

--000000000000dc934905bc28d571
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div style=3D"font-family:sans-serif;font-size:12.8px" di=
r=3D"auto"><div style=3D"width:328px;margin:16px 0px"><div>Hi,=C2=A0<br><br=
>Tried to install Buster on Xen HVM + OVMF. Installation completed successf=
ully, but unable to boot (Windows HVM guest has no boot problem).<br><br>Re=
-install Buster with BIOS and boot succeeded.<br><br>OVMF boot NOT supporte=
d on Debian ? I hope someone could point me in the right direction.<br><br>=
Best regards,<br><br>John Mok<br></div></div><div style=3D"height:0px"></di=
v></div><br></div>

--000000000000dc934905bc28d571--


