From xen-users-bounces@lists.xenproject.org Mon Mar 01 08:11:29 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Mar 2021 08:11:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.91315.172563 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGdde-0007hS-Lb; Mon, 01 Mar 2021 08:10:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 91315.172563; Mon, 01 Mar 2021 08:10:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGdde-0007hK-IC; Mon, 01 Mar 2021 08:10:46 +0000
Received: by outflank-mailman (input) for mailman id 91315;
 Mon, 01 Mar 2021 08:10:46 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bV4/=H7=elbitsystems.com=dov.levenglick@srs-us1.protection.inumbo.net>)
 id 1lGdde-0007hF-3w
 for Xen-users@lists.xenproject.org; Mon, 01 Mar 2021 08:10:46 +0000
Received: from mail2.elbitsystems.com (unknown [185.145.28.62])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id d6283459-fba2-4761-a057-b268a235226f;
 Mon, 01 Mar 2021 08:10:44 +0000 (UTC)
Received: from unknown (HELO Router2) ([X.X.10.152]) by mail2.elbitsystems.com
 with ESMTP; 01 Mar 2021 10:10:21 +0200
Received: from DM1 (Not Verified[X.X.12.51]) by Router2 with Something New
 (v8,1,1,11276)	id <B603ca16d0001>; Mon, 01 Mar 2021 10:10:21 +0200
Received: from AH1 (unknown [X.X.12.8])	(using TLSv1.2 with cipher
 DHE-RSA-AES256-SHA256 (256/256 bits))	(No client certificate requested)	by
 Forcepoint Email with ESMTPS id 76D0220D752735A43CC6	for
 <Xen-users@lists.xenproject.org>; Mon,  1 Mar 2021 10:10:21 +0200 (IST)
Received: from Out2 ([X.X.50.250])	by AH1 with ESMTP id
 1218ALto017805-1218ALtp017805; Mon, 1 Mar 2021 10:10:21 +0200
Received: from HMX11 (Not Verified[X.X.54.31]) by Out2 with Something New
 (v8,1,1,11276)	id <B603ca16d0000>; Mon, 01 Mar 2021 10:10:21 +0200
Received: from HMX23 (X.X.54.63) by HMX11 (X.X.54.31) with Microsoft SMTP
 Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.2; Mon, 1 Mar 2021 10:10:21 +0200
Received: from HMX23 ([fe80::55c1:9224:aa39:a411]) by HMX23
 ([fe80::55c1:9224:aa39:a411%2]) with mapi id 15.01.1847.003;
 Mon, 1 Mar 2021 10:10:21 +0200
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: d6283459-fba2-4761-a057-b268a235226f
IronPort-SDR: RssjReRHLUq+71APJvsWgWcP2IXO7Coprr3r1uBbt7iMG72ENfQtUEEmrQBtpfxhfXn61M37+5
 6VsS8DXWLDcA==
X-IPAS-Result: =?us-ascii?q?A2APBABGoTxg/5gKEaxiHQEBAQEJARIBBQUBQAeBSIF8g?=
 =?us-ascii?q?RCBYJYRmmaBaAsBAQEOATQEAQGETYF9JjgTAgMBAQsBAQYBAQEBAQYEhl+HB?=
 =?us-ascii?q?T8SARUpQiYBBA4NtEqBNBoChT2FBoE4gWWKZHqCTSZrh1gJARIBhhYEgnEmE?=
 =?us-ascii?q?IEyNAxpEbkMgRQHgn8EgyuYaCuBKpI/A49qlFWiHQIEAgQFAhaBa4EKcE0jg?=
 =?us-ascii?q?zpPFwKPTwECjSKBKwIGCgEBAwmLBDJdAQE?=
From: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
To: "Xen-users (Xen-users@lists.xenproject.org)"
	<Xen-users@lists.xenproject.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
Subject: Ethernet on Arm true dom0-less
Thread-Topic: Ethernet on Arm true dom0-less
Thread-Index: AdcOcegYZUMjEDlXShiDrT3Q7AcOPw==
Date: Mon, 1 Mar 2021 08:10:20 +0000
Message-ID: <c904dd8b12904b4db33af56f192f2a76@elbitsystems.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.0.54.230]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

Hi all,

I have true dom0-less up and running on Xilinx ZynqMP UltraScale+ (Arm A5=
3), based on Xen-4.11 - the official version of SDK 2019.1.

>From what I see, PV is not supported in this configuration. Without writi=
ng proprietary drivers, would Ethernet sharing between Doms be supported =
- for example via VNIC?

Thank you,
Dov
The information in this e-mail transmission contains proprietary and busi=
ness=20
sensitive information.  Unauthorized interception of this e-mail may cons=
titute=20
a violation of law. If you are not the intended recipient, you are hereby=
=20
notified that any review, dissemination, distribution or duplication of t=
his=20
communication is strictly prohibited. You are also asked to contact the s=
ender=20
by reply email and immediately destroy all copies of the original message=
.


From xen-users-bounces@lists.xenproject.org Mon Mar 01 11:21:19 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Mar 2021 11:21:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.91439.172900 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGgbS-0003ZN-W6; Mon, 01 Mar 2021 11:20:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 91439.172900; Mon, 01 Mar 2021 11:20:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGgbS-0003ZF-RL; Mon, 01 Mar 2021 11:20:42 +0000
Received: by outflank-mailman (input) for mailman id 91439;
 Mon, 01 Mar 2021 11:20:42 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wQjY=H7=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1lGgbR-0003ZA-UG
 for xen-users@lists.xenproject.org; Mon, 01 Mar 2021 11:20:42 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (unknown
 [40.107.6.55]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 3a1d6f8c-798c-474d-b9c6-edecbcb593a2;
 Mon, 01 Mar 2021 11:20:41 +0000 (UTC)
Received: from DB8PR03CA0016.eurprd03.prod.outlook.com (2603:10a6:10:be::29)
 by AM7PR08MB5367.eurprd08.prod.outlook.com (2603:10a6:20b:dd::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20; Mon, 1 Mar
 2021 11:20:40 +0000
Received: from DB5EUR03FT006.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:be:cafe::4a) by DB8PR03CA0016.outlook.office365.com
 (2603:10a6:10:be::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.19 via Frontend
 Transport; Mon, 1 Mar 2021 11:20:40 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT006.mail.protection.outlook.com (10.152.20.106) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3890.19 via Frontend Transport; Mon, 1 Mar 2021 11:20:39 +0000
Received: ("Tessian outbound 38eaf6505aed:v71");
 Mon, 01 Mar 2021 11:20:39 +0000
Received: from 16d3ef30512d.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 1C5F8A6E-F8CF-4F36-8562-E05B6414D7ED.1; 
 Mon, 01 Mar 2021 11:20:17 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 16d3ef30512d.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 01 Mar 2021 11:20:17 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com (2603:10a6:800:1ae::15)
 by VI1PR08MB3887.eurprd08.prod.outlook.com (2603:10a6:803:c2::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.19; Mon, 1 Mar
 2021 11:20:15 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839]) by VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839%6]) with mapi id 15.20.3890.028; Mon, 1 Mar 2021
 11:20:15 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a1d6f8c-798c-474d-b9c6-edecbcb593a2
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Q0AzdRBIPLPWUQS+I0n4vNLr2ES+jdkIz0tefg8otHg=;
 b=nGU0GA957TC2WRIpGmMx20a61SkTi/sxUFnukZdE5JKbinMzNYJTuaqyjemRFhsrdoJPuIIVnPZCR62/+3fxmSRg8cVZxRYERfar8g0KM/HBzuhXRGJLkbmZWzpMNEsX83T2gsqI5g+sJnxh/v7kCnIphsEHsLlG42tvHad7+qM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: ef950646348feb2e
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=giyujxuhF+JaKnFbMkAAtEnxSHg4li4DCxAPOnumrMMFXjHZtWPPqb57ogTHuiBj5kUH4LFH7wx2kXW+rJJskpMgVJPuw1bHLga4Kq1zZzhxavQ3uXUjsVA2SFp5RA1dZeoV8KH1HyyMhZH8LqWJS+KG3fkgZwdGYDKVmDSgjDgBA09AZ0zyCZK5h+OcFQpsOHH+4t+3CiWBiJSQJuaBtyGilY8/+C6c4fIQMkUI7KPFl1SEsNLbpBNhuuNpHXgTEEemWZ/RB7IJ16Ma/ukBMS3ss0y8vsbitrQEFH6Xj4NLjnzwEFatwdSrwsYr8WuXWCmzd4qRneFPy/WqPY0jpw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Q0AzdRBIPLPWUQS+I0n4vNLr2ES+jdkIz0tefg8otHg=;
 b=XawVvvHhPwTdbtrfkeWtD+Eq599S1fgDE3M++bcaVb/geYnlp1FjCiLxFfaF3SYuNYQrYVv8Jv2m/WMx9iTaI5D7cr0Lj3GtNeKhgvNVGlvoL7CbLrMdPlCZfAEs/aqKxfNwUVyo0i8eqSZCRKTmyxdYh0BKAYIGTwfCsGb+NlOWOmEKOJMdbrQenfEHN63Y+6rJZXYlDaFxUaDC573TIYZzKpEHfngjA0Ch3yBQT/OYNIMsst9kc0itFMWeGAGQyVMkfZCZRqVq21OOhrg5QP0YvERabI8j7yGAzyLLz205W7Cf+eZFpqqOWzgIBn6qGHnbehMDU+dhUXTYgQLhcw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Q0AzdRBIPLPWUQS+I0n4vNLr2ES+jdkIz0tefg8otHg=;
 b=nGU0GA957TC2WRIpGmMx20a61SkTi/sxUFnukZdE5JKbinMzNYJTuaqyjemRFhsrdoJPuIIVnPZCR62/+3fxmSRg8cVZxRYERfar8g0KM/HBzuhXRGJLkbmZWzpMNEsX83T2gsqI5g+sJnxh/v7kCnIphsEHsLlG42tvHad7+qM=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Deepthi M. <Deepthi.M@Ltts.com>
CC: Pelluru VamsiKrishna <Pelluru.VamsiKrishna@Ltts.com>, xen-users
	<xen-users@lists.xenproject.org>
Subject: Re: domU failing when flashing with Android images
Thread-Topic: domU failing when flashing with Android images
Thread-Index: AQHXCfJXxjOJsp+zs0WYBEMNWUZCFapqA3EZgAUCXQA=
Date: Mon, 1 Mar 2021 11:20:15 +0000
Message-ID: <B4D29245-59EC-42D3-B5E9-BA52F4F53B82@arm.com>
References:
 <MAXPR01MB37282B83D3E55A8FC6B6DE5C88809@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
 <MAXPR01MB372840DC6DA882B8CC3E417B889D9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
In-Reply-To:
 <MAXPR01MB372840DC6DA882B8CC3E417B889D9@MAXPR01MB3728.INDPRD01.PROD.OUTLOOK.COM>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.60.0.2.21)
Authentication-Results-Original: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [86.26.33.241]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 59327ed5-6eb1-4111-7672-08d8dca40b8c
x-ms-traffictypediagnostic: VI1PR08MB3887:|AM7PR08MB5367:
X-MS-Exchange-MinimumUrlDomainAge: ltts.com#6324
X-Microsoft-Antispam-PRVS:
	<AM7PR08MB5367AEC1302B9DABBD7760CF9D9A9@AM7PR08MB5367.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5696.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(346002)(376002)(396003)(136003)(366004)(39860400002)(36756003)(186003)(2906002)(33656002)(316002)(53546011)(8676002)(478600001)(55236004)(4326008)(86362001)(26005)(6486002)(71200400001)(6916009)(15974865002)(76116006)(91956017)(66556008)(66946007)(6506007)(6512007)(54906003)(2616005)(66446008)(64756008)(8936002)(5660300002)(83380400001)(66476007)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?zBTsLstSge4995qDw+7jw55ZdQClCHGoxyMcoMlWzk1ml4oZQNtxCyXisKJm?=
 =?us-ascii?Q?7Cq9FDR/07ibYwmpZBH/kIoG7LBWCgYcs0Pmavp5Gko1i2fCfIWTbQtWZpFb?=
 =?us-ascii?Q?5U973OEuQHSQzpTlZ74lpP6BwKxOKzX9ykWSISOB3OJXrSVaxPx9ZFETvMZs?=
 =?us-ascii?Q?wARaNI2iuWOJ3RkWhztMxhza/6mfpJzjzKc/usTW88AnL5QrsVocbwfAFnQ0?=
 =?us-ascii?Q?lSQOo9wiyyc2HoBmfQNkDk/W3tahfnR19F5x0dsWLwkzXqQlu+rBpan0fLZ9?=
 =?us-ascii?Q?rPxL/V+kkox57zzAJ+NMSnESYIRFEKJjtD21FVsZ5uzejpp9fDoOo1CO3/6e?=
 =?us-ascii?Q?KgJz+XUUDeT21zqMGVFh8cYgAjM7byGGOJSGMcBlxo+xNbvQY8nbcGS6E296?=
 =?us-ascii?Q?tf2wdocmSiT+aTdws65uJMYDi4Se89b+Vtm2gSVWf7vjOTcSnq/dOgmJMQIq?=
 =?us-ascii?Q?lpJwMrW0a3iRESUJ1cKkw0C9w+f4eg24vVlj9kpg+dB2mCKy1UMvwxRC/TUx?=
 =?us-ascii?Q?ZsBN+VKxnxzxpv8M8S1sAsUXpKBPrVYwyJvAvEdp9ILVwjuXp5NHi1YDrRLJ?=
 =?us-ascii?Q?t7EtP/SKifXxRnyohv31k4HVzz+P8OHSbWf2fIL596juZG826v79Q+9mtbj3?=
 =?us-ascii?Q?Ph+75ewZmuMJPngcYP/+3MZ+E2E/9NvTZtqU5JkI3XstQWE4iQVa1yvfhEqE?=
 =?us-ascii?Q?wz+XiD8pI5/ufdhl3TmuXJiAR52rC+h0ptJYLWg/k8EWu/ZZBOeCCnKP7o30?=
 =?us-ascii?Q?36ugTuOpzVSlim2hspsWciZfFg2n4pV0gPgRewmSeOTE7ikpi4r4BvNot2bS?=
 =?us-ascii?Q?pERRlsBAe5xfQUu5trzZIcGsPriaRzGfjiXP5clad07YfZpAyJqMzuUZUW6X?=
 =?us-ascii?Q?W7uHC5kiMJWr69+zRJqSEUjx0iqu7/RDmUXrg5OZKaT6nj85JKvObmi/tf8W?=
 =?us-ascii?Q?hCla6DQOlPgeIaJPdjgb3RXM0q54x3ILmWigy03uJ2HKP6ZHU4MwU77kmRhs?=
 =?us-ascii?Q?vlFTtnd1FQUU0y1L3HgiAakpNMJHFf08ZEDQvBWNIOrysqHiYZqvpQfpOpwj?=
 =?us-ascii?Q?RoBKv46qhjc4rhbkSzGcV4yqidvn4fO2qQTBOtk0+yIoKK76W+BNlKfy/UCU?=
 =?us-ascii?Q?wShiZB4rkb2egzLAcpsCG6nXSUVWIqKi4BcV4ZsxxCznrb2b4CTxmwZg+kqP?=
 =?us-ascii?Q?qfZmbHvtEMAS46jWrFP1O/BdS+/8zeFblPRtkNHUXAGQ0RjTD6rSTOgAHnRG?=
 =?us-ascii?Q?dE/2BPiYkg23KsOpYVrTMCTkmnvoElgArTUSTyp430CQy4o/Nj+cXfqY3Kjp?=
 =?us-ascii?Q?Ry5zvJ+S0wL0fV+RW/gXpPDf?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <6599A9BDAFFBCE4CA6DE29CDA10D8DFB@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3887
Original-Authentication-Results: Ltts.com; dkim=none (message not signed)
 header.d=none;Ltts.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	69a33e15-8c7b-4bc9-0fbe-08d8dca3fd27
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(136003)(39860400002)(376002)(396003)(346002)(36840700001)(46966006)(336012)(2906002)(47076005)(33656002)(15974865002)(2616005)(8936002)(8676002)(36860700001)(83380400001)(6506007)(53546011)(6486002)(316002)(54906003)(70586007)(6862004)(478600001)(81166007)(86362001)(356005)(70206006)(5660300002)(82740400003)(186003)(26005)(36756003)(4326008)(82310400003)(6512007)(55236004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2021 11:20:39.9367
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 59327ed5-6eb1-4111-7672-08d8dca40b8c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR08MB5367

Hi Deepthi,

Please always send those kind of mails to xen-users so that others could be=
nefit of the answers or could give you answers.

> On 26 Feb 2021, at 06:52, Deepthi M. <Deepthi.M@Ltts.com> wrote:
>=20
>=20
> Hi Bertrand,
>=20
> We are able to boot xen hypervisor dom0 with linux  and domU with linux o=
n RcarH3-Salvator.
>=20
> Now we are trying to port android as domU with the attached configuration=
 file, when we are creating domU.cfg  with xl create list we are getting th=
e error listed in domuconf_failed_log.

The log I received is truncated but it seems that you disk for the guest co=
uld not be setup.

>=20
> Instructions are flashing android to emmc but we copied system.img, ramdi=
sk.img and userdata.img to /home/root/android in sdcard.

Could you resend the failing logs directly in the mail (and not as attached=
 file) ?

Cheers
Bertrand

>=20
> Please provide your guidance to resolve the issue.
>=20
> Thank you,
> Deepthi
>=20
>=20
>=20
>=20
>=20
> L&T Technology Services Ltd
> www.LTTS.com
> L&T Technology Services Limited (LTTS) is committed to safeguard your dat=
a privacy. For more information to view our commitment towards data privacy=
 under GDPR, please visit the privacy policy on our website www.Ltts.com. T=
his Email may contain confidential or privileged information for the intend=
ed recipient (s). If you are not the intended recipient, please do not use =
or disseminate the information, notify the sender and delete it from your s=
ystem.
> <domuconf_failed_log><domU.cfg>



From xen-users-bounces@lists.xenproject.org Mon Mar 01 13:47:37 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Mar 2021 13:47:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.91513.172917 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGisk-0000S0-LO; Mon, 01 Mar 2021 13:46:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 91513.172917; Mon, 01 Mar 2021 13:46:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGisk-0000Rs-Hj; Mon, 01 Mar 2021 13:46:42 +0000
Received: by outflank-mailman (input) for mailman id 91513;
 Mon, 01 Mar 2021 13:46:41 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bV4/=H7=elbitsystems.com=dov.levenglick@srs-us1.protection.inumbo.net>)
 id 1lGisj-0000Rn-5h
 for Xen-users@lists.xenproject.org; Mon, 01 Mar 2021 13:46:41 +0000
Received: from mail2.elbitsystems.com (unknown [185.145.28.62])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id e0da39da-7036-4a4b-97d1-936d6f5d234c;
 Mon, 01 Mar 2021 13:46:39 +0000 (UTC)
Received: from unknown (HELO Router1) ([X.X.10.151]) by mail2.elbitsystems.com
 with ESMTP; 01 Mar 2021 15:46:36 +0200
Received: from DM1 (Not Verified[X.X.12.51]) by Router1 with Something New
 (v8,1,1,11276)	id <B603cf03c0005>; Mon, 01 Mar 2021 15:46:36 +0200
Received: from AH1 (unknown [X.X.12.8])	(using TLSv1.2 with cipher
 DHE-RSA-AES256-SHA256 (256/256 bits))	(No client certificate requested)	by
 Forcepoint Email with ESMTPS id AD05689E9DEF831F6F82	for
 <Xen-users@lists.xenproject.org>; Mon,  1 Mar 2021 15:46:36 +0200 (IST)
Received: from Out1 ([X.X.50.252])	by AH1 with ESMTP id
 121DkaBh021588-121DkaBi021588; Mon, 1 Mar 2021 15:46:36 +0200
Received: from HMX21 (Not Verified[X.X.54.61]) by Out1 with Something New
 (v8,1,1,11276)	id <B603cf03c0000>; Mon, 01 Mar 2021 15:46:36 +0200
Received: from HMX23 (X.X.54.63) by HMX21 (X.X.54.61) with Microsoft SMTP
 Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.1713.5; Mon, 1 Mar 2021 15:46:36 +0200
Received: from HMX23 ([fe80::55c1:9224:aa39:a411]) by HMX23
 ([fe80::55c1:9224:aa39:a411%2]) with mapi id 15.01.1847.003;
 Mon, 1 Mar 2021 15:46:36 +0200
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: e0da39da-7036-4a4b-97d1-936d6f5d234c
IronPort-SDR: Vl5uVuZjvAzZj84jG3oHdCnTgEQ9IsD3c9UFZG1lhjuRk6QsRG3a9M1+vEJU8LLQDp3SJeJIkb
 0/ml4YbCmvyQ==
X-IPAS-Result: =?us-ascii?q?A2CMBQDt7jxg/5cKEaxiHQEBAQEJARIBBQUBQAeBSAKBe?=
 =?us-ascii?q?oElgUEKlhEDmmOBaAsBAQEOASgMBAEBhE0CgXsmOBMCAwEBCwEBBgEBAQEBB?=
 =?us-ascii?q?gSGUg1DARABhW8BAQEDATo/EAIBCA0LHhAyJQEBBAENBQgTglaCZjCtcHSBN?=
 =?us-ascii?q?BoCij6BOAGBZIdrgnl6gk0mg1AHLj6CXAICF4EJCQESAYYWBIFVgQgUJggIW?=
 =?us-ascii?q?QEgOEAqAhojEWKQWoI8pigHgn+DL4YQklgrgSqDQo59A49qk39Wiz2WYAIEA?=
 =?us-ascii?q?gQFAhaBa4EKcE0jgzkJRxcCjjgWgQEBAoErhjKFRXM4AgYKAQEDCYJiiCIyX?=
 =?us-ascii?q?QEB?=
From: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
To: Bertrand Marquis <Bertrand.Marquis@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>
CC: Julien Grall <julien@xen.org>, "Xen-users@lists.xenproject.org"
	<Xen-users@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Subject: RE: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index: AdcIbsi89MadXehWTs+A1h4hE7ONNwAhYRqAAApfvWAAFgEugAAQvBaAATnqRTA=
Date: Mon, 1 Mar 2021 13:46:36 +0000
Message-ID: <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
 <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
 <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
 <32928DB3-0698-4636-B438-262A8465B067@arm.com>
In-Reply-To: <32928DB3-0698-4636-B438-262A8465B067@arm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.0.54.230]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

>=20
> (+ Penny, Wei and Luca)
>=20
> > On 23 Feb 2021, at 01:52, Stefano Stabellini <sstabellini@kernel.org>=
=20wrote:
> >
> > On Mon, 22 Feb 2021, Levenglick Dov wrote:
> >>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen
> >>>> and the DomU have an allocation of 1.25GB, per this memory map:
> >>>> 1. DomU1: 0x60000000 - 0x80000000
> >>>> 2. DomU2: 0x40000000 - 0x60000000
> >>>> 3. Xen: 0x30000000 - 0x40000000
> >>>
> >>> How did you tell Xen which regions is assigned to which guests? Are=

> >>> your domain mapped 1:1 (i.e guest physical address =3D=3D host phys=
ical
> address)?
> >>
> >> I am working on a solution where if the "xen,domain" memory has
> >> #size-cell cells the content is backward compatible. But if it
> >> contains (#address-cells + #size-cells), the address cells should be=

> considered the physical start address.
> >> During the mapping of the entire address space insetup_mm(), the
> >> carved out addresses would be added to the  reserved memory address
> >> space. When the DomU is to be created, this physical space would be
> >> mapped to it. The virtual addresses are less of an issue and needn't=
=20be
> mapped 1x1 (although they could be).
> >
> > As of today neither upstream Xen nor the Xilinx Xen tree come with th=
e
> > feature of allowing the specification of an address range for dom0les=
s
> > guests.
> >
> > The only thing that Xilinx Xen allows, which is not upstream yet, is
> > the ability of creating dom0less guests 1:1 mapped using the "direct-=
map"
> > property. But the memory allocation is still done by Xen (you can't
> > select the addresses).
> >
> > Some time ago I worked on a hacky prototype to allow the specificatio=
n
> > of address ranges, see:
> >
> > http://xenbits.xenproject.org/git-http/people/sstabellini/xen-unstabl=
e
> > .git direct-map-2 from 7372466b21c3b6c96bb7a52754e432bac883a1e3
> onward.
> >
> > In particular, have a look at "xen/arm: introduce 1:1 mapping for
> > domUs". The work is not complete: it might not work depending on the
> > memory ranges you select for your domUs. In particular, you can't
> > select top-of-RAM addresses for your domUs. However, it might help yo=
u
> > getting started.
> >
> >
> >>>> I am able to support True Dom0-less by means of the patch/hack
> >>>> demonstrated By Stefano Stabellini at
> >>> https://youtu.be/UfiP9eAV0WA?t=3D1746.
> >>>>
> >>>> I was able to forcefully put the Xen binary at the address range
> >>>> immediately below 0x40000000 by means of modifying
> get_xen_paddr()
> >>>> -
> >>> in itself an ugly hack.
> >>>>
> >>>> My questions are:
> >>>> 1. Since Xen performs runtime allocations from its heap, it is all=
ocating
> >>>>    downwards from 0x80000000 - thereby "stealing" memory from
> DomU1.
> >>>
> >>> In theory, any memory reserved for domains should have been carved
> >>> out from the heap allocator. This would be sufficient to prevent Xe=
n
> >>> allocating memory from the ranges you described above.
> >>>
> >>> Therefore, to me this looks like a bug in the tree you are using.
> >>
> >> This would be a better approach, but because Xen perform allocations=

> >> from its heap prior to allocating memory to DomU - and since it
> >> allocates from the top of the heap - it is basically taking memory t=
hat I
> wanted to set aside for the DomU.
> >
> > Yeah, this is the main problem that my prototype above couldn't solve=
.

Stephano: Is the approach that I previously described a feasible one?
=20 1. Mark the addresses that I want to set aside as reserved
=20 2. When reaching the proper DomU, map them and then use the mapping
This approach would solve the heap issue
> >
>=20
> Wei and Penny are working on direct map and static allocation to fit
> embedded use cases an might have more answer there.

Bertrand, Wei and Penny: Is there a "sneak preview"? I'd be happy to star=
t backporting to Xen 4.11

>=20
> On the fix from Stefano explained in the video, Luca Fancellu made a pa=
tch to
> propose a long term solution and will push it upstream next week.

Bertrand: Do You know which commit ID this is? Since I'm working on a Xil=
inx fork, I am out of touch with the goings of the main tree.


Thanks,
Dov
The information in this e-mail transmission contains proprietary and busi=
ness=20
sensitive information.  Unauthorized interception of this e-mail may cons=
titute=20
a violation of law. If you are not the intended recipient, you are hereby=
=20
notified that any review, dissemination, distribution or duplication of t=
his=20
communication is strictly prohibited. You are also asked to contact the s=
ender=20
by reply email and immediately destroy all copies of the original message=
.


From xen-users-bounces@lists.xenproject.org Mon Mar 01 14:49:55 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Mar 2021 14:49:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.91344.173021 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGjrW-0007Ai-Eq; Mon, 01 Mar 2021 14:49:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 91344.173021; Mon, 01 Mar 2021 14:49:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGjrW-0007Ab-B7; Mon, 01 Mar 2021 14:49:30 +0000
Received: by outflank-mailman (input) for mailman id 91344;
 Mon, 01 Mar 2021 08:22:33 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ueYy=H7=riomar.se=rio@srs-us1.protection.inumbo.net>)
 id 1lGdp3-0000p4-20
 for xen-users@lists.xenproject.org; Mon, 01 Mar 2021 08:22:33 +0000
Received: from mail2.riocities.com (unknown [185.20.14.89])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 52fa4024-87c2-4a22-81ed-22756f0e4ea5;
 Mon, 01 Mar 2021 08:22:31 +0000 (UTC)
Received: from mail.riomar.se (81-230-197-241-no510.tbcn.telia.com
 [81.230.197.241])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mail2.riocities.com (Postfix) with ESMTPSA id 8ED45400C6
 for <xen-users@lists.xenproject.org>; Mon,  1 Mar 2021 09:06:26 +0100 (CET)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 52fa4024-87c2-4a22-81ed-22756f0e4ea5
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=riomar.se; s=mail;
	t=1614585986; bh=kgaQ2aOQ+ifrDTuON1z0uiKHOkqpD8dr3Z2UlSbwYhM=;
	h=Date:From:To:Subject:From;
	b=gokptmg2vgq7sbxz5gKdLfkLkHzXaNjFWiGdTpZbMnxb2q9Nv+fWiRqZ/MFQVdBdd
	 hdVfEGuVFZiiqcodBaG6faAwNEz+pkFjJhYL5r+9h1tp/O4LqmNcQ7wyCoCewPsVIB
	 w3o8RhNI1RogJ0A9CnyhgeYmbGZrDGwWWZIQdYmg=
Date: Mon, 1 Mar 2021 09:06:24 +0100
From: Henrik Riomar <rio@riomar.se>
To: xen-users@lists.xenproject.org
Subject: pci passthrough and msi-x
Message-Id: <20210301090624.58618427bdf8766896563fcf@riomar.se>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hi,

What options are needed to get MSI-X interrupts working with pci passthrough?

Running Linux 5.10 in dom0 and in the guest with XEN 4.14.1.

Passing trough two Intel X553 NICs to the guest with this in xl.conf:
pci         = [ '08:00.0','08:00.1' ]

But what else is needed for MSI-X?

Also what about the swiotlb warning? whats needed to suppress fix that?

Thanks,
 Henrik

dmesg in domU:
[    1.509720] Mounting root: ok.
[    2.614502] cryptd: max_cpu_qlen set to 1000
[    2.619136] SSE version of gcm_enc/dec engaged.
[    2.632522] EDAC pnd2: Failed to register device with error -19.
[    2.667770] input: PC Speaker as /devices/platform/pcspkr/input/input0
[    2.702441] pcifront pci-0: Installing PCI frontend
[    2.703239] xen:swiotlb_xen: Warning: only able to allocate 4 MB for software IO TLB
[    2.767077] software IO TLB: mapped [mem 0x0000000005800000-0x0000000005c00000] (4MB)
[    2.767384] pcifront pci-0: Creating PCI Frontend Bus 0000:00
[    2.767453] pcifront pci-0: PCI host bridge to bus 0000:00
[    2.767457] pci_bus 0000:00: root bus resource [io  0x0000-0xffff]
[    2.767459] pci_bus 0000:00: root bus resource [mem 0x00000000-0x7fffffffff]
[    2.767461] pci_bus 0000:00: root bus resource [bus 00-ff]
[    2.767869] pci 0000:00:00.0: [8086:15e4] type 00 class 0x020000
[    2.768544] pci 0000:00:00.0: reg 0x10: [mem 0xdd600000-0xdd7fffff 64bit pref]
[    2.769524] pci 0000:00:00.0: reg 0x20: [mem 0xdd804000-0xdd807fff 64bit pref]
[    2.769857] pci 0000:00:00.0: reg 0x30: [mem 0xdf180000-0xdf1fffff pref]
[    2.771631] pci 0000:00:00.0: [Firmware Bug]: reg 0x184: invalid BAR (can't size)
[    2.772607] pci 0000:00:00.0: [Firmware Bug]: reg 0x190: invalid BAR (can't size)
[    2.780194] pci 0000:00:00.1: [8086:15e4] type 00 class 0x020000
[    2.780845] pci 0000:00:00.1: reg 0x10: [mem 0xdd400000-0xdd5fffff 64bit pref]
[    2.781816] pci 0000:00:00.1: reg 0x20: [mem 0xdd800000-0xdd803fff 64bit pref]
[    2.782139] pci 0000:00:00.1: reg 0x30: [mem 0xdf100000-0xdf17ffff pref]
[    2.783949] pci 0000:00:00.1: [Firmware Bug]: reg 0x184: invalid BAR (can't size)
[    2.784917] pci 0000:00:00.1: [Firmware Bug]: reg 0x190: invalid BAR (can't size)
[    2.795870] pcifront pci-0: claiming resource 0000:00:00.0/0
[    2.795875] pcifront pci-0: claiming resource 0000:00:00.0/4
[    2.795876] pcifront pci-0: claiming resource 0000:00:00.0/6
[    2.795878] pcifront pci-0: claiming resource 0000:00:00.1/0
[    2.795879] pcifront pci-0: claiming resource 0000:00:00.1/4
[    2.795883] pcifront pci-0: claiming resource 0000:00:00.1/6
[    2.799838] dca service started, version 1.12.1
[    2.841452] ixgbe: Intel(R) 10 Gigabit PCI Express Network Driver
[    2.841455] ixgbe: Copyright (c) 1999-2016 Intel Corporation.
[    2.853935] ixgbe 0000:00:00.0: Xen PCI mapped GSI17 to IRQ19
[    3.097931] EDAC pnd2: Failed to register device with error -19.
[    3.193603] Interrupt reservation exceeds available resources
[    3.193683] ixgbe 0000:00:00.0: Failed to allocate MSI-X interrupts. Err: -28
[    3.193686] ixgbe 0000:00:00.0: Disabling SR-IOV support
[    3.193688] ixgbe 0000:00:00.0: Disabling RSS support
[    3.193901] Interrupt reservation exceeds available resources
[    3.193912] ixgbe 0000:00:00.0: Failed to allocate MSI interrupt, falling back to legacy. Error: -28
[    3.193918] ixgbe 0000:00:00.0: Multiqueue Disabled: Rx Queue count = 1, Tx Queue count = 1 XDP Queue count = 0
[    3.321556] ixgbe 0000:00:00.0: MAC: 6, PHY: 27, PBA No: 030000-000
[    3.321560] ixgbe 0000:00:00.0: 3c:ec:ef:03:0b:d6
[    3.369729] ixgbe 0000:00:00.0: Intel(R) 10 Gigabit Network Connection
[    3.373883] ixgbe 0000:00:00.1: Xen PCI mapped GSI18 to IRQ20
[    3.903506] Interrupt reservation exceeds available resources
[    3.903566] ixgbe 0000:00:00.1: Failed to allocate MSI-X interrupts. Err: -28
[    3.903569] ixgbe 0000:00:00.1: Disabling SR-IOV support
[    3.903570] ixgbe 0000:00:00.1: Disabling RSS support
[    3.903800] Interrupt reservation exceeds available resources
[    3.903811] ixgbe 0000:00:00.1: Failed to allocate MSI interrupt, falling back to legacy. Error: -28
[    3.903825] ixgbe 0000:00:00.1: Multiqueue Disabled: Rx Queue count = 1, Tx Queue count = 1 XDP Queue count = 0
[    4.036582] ixgbe 0000:00:00.1: MAC: 6, PHY: 27, PBA No: 030000-000
[    4.036587] ixgbe 0000:00:00.1: 3c:ec:ef:03:0b:d7
[    4.080368] ixgbe 0000:00:00.1: Intel(R) 10 Gigabit Network Connection


From xen-users-bounces@lists.xenproject.org Mon Mar 01 14:49:56 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 01 Mar 2021 14:49:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.91564.173039 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGjrd-0007Ee-UB; Mon, 01 Mar 2021 14:49:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 91564.173039; Mon, 01 Mar 2021 14:49:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGjrd-0007EV-Pa; Mon, 01 Mar 2021 14:49:37 +0000
Received: by outflank-mailman (input) for mailman id 91564;
 Mon, 01 Mar 2021 14:47:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lGjq3-0006sI-OC
 for xen-users@lists.xenproject.org; Mon, 01 Mar 2021 14:47:59 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lGjq3-0001oO-NS
 for xen-users@lists.xenproject.org; Mon, 01 Mar 2021 14:47:59 +0000
Received: from iwj (helo=mariner.uk.xensource.com)
 by xenbits.xenproject.org with local-bsmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lGjq3-0002Uw-Lh
 for xen-users@lists.xenproject.org; Mon, 01 Mar 2021 14:47:59 +0000
Received: from iwj by mariner.uk.xensource.com with local (Exim 4.89)
 (envelope-from <iwj@xenproject.org>)
 id 1lGjpy-0004Y6-7q; Mon, 01 Mar 2021 14:47:54 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Subject:CC:To:Date:Message-ID:
	Content-Transfer-Encoding:Content-Type:MIME-Version:From;
	bh=M2WkUt006XUcXBS6ZdOOEsbGxq1SqeHeM11823JqgI8=; b=kFRgc5LrT+BP3gRzUXXbt3hJrw
	baC5bWRo0GuB8vdg+SLGBNPZrKPRyRNeYq5mIx2QMpHGddZW4hiGa13Z+sVGJ8oCc33hF2I14i2LM
	erQt4YNkEW7VD1S47UtLU7t2vwGWX4dMSc/tabgecGU9a+OGsPi1d41DC7c4Ph3uYQLg=;
From: Ian Jackson <iwj@xenproject.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <24636.65178.20011.678957@mariner.uk.xensource.com>
Date: Mon, 1 Mar 2021 14:47:54 +0000
To: xen-announce@lists.xenproject.org
CC: xen-devel@lists.xenproject.org,
    xen-users@lists.xenproject.org
Subject: Xen 4.15 RC1
X-Mailer: VM 8.2.0b under 24.5.1 (i686-pc-linux-gnu)

Xen 4.15 RC1 is now available.

It is available from git:
  git clone https://xenbits.xenproject.org/git-http/xen.git -b 4.15.0-rc1

For your convenience a tarball is available:
  https://downloads.xenproject.org/release/xen/4.15.0-rc1/xen-4.15.0-rc1.tar.gz
  https://downloads.xenproject.org/release/xen/4.15.0-rc1/xen-4.15.0-rc1.tar.gz.sig

Please send bug reports and test reports to
xen-devel@lists.xenproject.org.  When sending bug reports, please CC
relevant maintainers and me (iwj@xenproject.org).

We will have Xen Test Days from RC2 onwards.

Ian.


From xen-users-bounces@lists.xenproject.org Tue Mar 02 01:52:10 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 01:52:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92010.173656 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGuC6-0006V6-1T; Tue, 02 Mar 2021 01:51:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92010.173656; Tue, 02 Mar 2021 01:51:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGuC5-0006Ut-Qp; Tue, 02 Mar 2021 01:51:25 +0000
Received: by outflank-mailman (input) for mailman id 92010;
 Tue, 02 Mar 2021 01:51:24 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aYn2=IA=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1lGuC4-0006Uo-Ai
 for Xen-users@lists.xenproject.org; Tue, 02 Mar 2021 01:51:24 +0000
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 026d2244-d419-4bd2-9207-4a704de85d64;
 Tue, 02 Mar 2021 01:51:23 +0000 (UTC)
Received: by mail.kernel.org (Postfix) with ESMTPSA id 8CA2E601FF;
 Tue,  2 Mar 2021 01:51:22 +0000 (UTC)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 026d2244-d419-4bd2-9207-4a704de85d64
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1614649882;
	bh=d14x1fn+5PZ5cnEXZVCYIf132cZRvk6VInvUi/ZLSX0=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=YCbN/C6FJ9k5Xt8o7Rp2CRgJkbaRw+elSu1hsoIMwfnXJAyIXgT+8E4UmlfgxXpYE
	 wfk50H1WI7o7wsKeX3cIUrByv6SROJE//fPIts1+JQlHDY9wD0b0TWESMLNul4v/h4
	 FMtgMpYf/uWU/YYvtOl1TjpYQIBB5fP8h0GGTFiP6WbS0onhQH6YodcA8YGF9i9I0H
	 OE5jmrDxYq2btf549k/MidEn5brr/05EYg2wHKTSRidhCtMyzsJGMsZ38OFsMwNOiQ
	 ONwXMxlZnKUwoMnWHG9fVPIwZyY9PMn67VJunKkTBvcdnZA68YYL/fMgss+fMnXPMK
	 vsC+JeYcjNV2w==
Date: Mon, 1 Mar 2021 17:51:21 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s
To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
cc: "Xen-users (Xen-users@lists.xenproject.org)" <Xen-users@lists.xenproject.org>, 
    Stefano Stabellini <sstabellini@kernel.org>
Subject: Re: Ethernet on Arm true dom0-less
In-Reply-To: <c904dd8b12904b4db33af56f192f2a76@elbitsystems.com>
Message-ID: <alpine.DEB.2.21.2103011743330.2682@sstabellini-ThinkPad-T480s>
References: <c904dd8b12904b4db33af56f192f2a76@elbitsystems.com>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 1 Mar 2021, Levenglick Dov wrote:
> Hi all,
> 
> I have true dom0-less up and running on Xilinx ZynqMP UltraScale+ (Arm A53), based on Xen-4.11 - the official version of SDK 2019.1.
> 
> >From what I see, PV is not supported in this configuration. Without writing proprietary drivers, would Ethernet sharing between Doms be supported - for example via VNIC?

Hi Dov,

Yes, PV is not supported yet, but there are a couple of workarounds you
can use today.

One workaround is to setup a couple of AXI Ethernet Lite interfaces in
PL connected via a level2 switch (also in PL). Then you can assign each
ethernet interface to a different VM.

Another workaround is to statically share some memory between the two
VMs. Then you can setup your own ring for communication on top.


From xen-users-bounces@lists.xenproject.org Tue Mar 02 06:01:53 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 06:01:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92094.173832 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGy5q-0007dX-Bu; Tue, 02 Mar 2021 06:01:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92094.173832; Tue, 02 Mar 2021 06:01:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGy5q-0007dP-7C; Tue, 02 Mar 2021 06:01:14 +0000
Received: by outflank-mailman (input) for mailman id 92094;
 Tue, 02 Mar 2021 06:01:12 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=OD2G=IA=elbitsystems.com=dov.levenglick@srs-us1.protection.inumbo.net>)
 id 1lGy5o-0007bn-Ii
 for Xen-users@lists.xenproject.org; Tue, 02 Mar 2021 06:01:12 +0000
Received: from mail2.elbitsystems.com (unknown [185.145.28.62])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 3ef9242a-6444-4d2c-86b5-1808568033f1;
 Tue, 02 Mar 2021 06:01:10 +0000 (UTC)
Received: from unknown (HELO Router1) ([X.X.10.151]) by mail2.elbitsystems.com
 with ESMTP; 02 Mar 2021 08:01:08 +0200
Received: from DM1 (Not Verified[X.X.12.51]) by Router1 with Something New
 (v8,1,1,11276)	id <B603dd4a40000>; Tue, 02 Mar 2021 08:01:08 +0200
Received: from AH1 (unknown [X.X.12.8])	(using TLSv1.2 with cipher
 DHE-RSA-AES256-SHA256 (256/256 bits))	(No client certificate requested)	by
 Forcepoint Email with ESMTPS id A717388F87253E739C0B	for
 <Xen-users@lists.xenproject.org>; Tue,  2 Mar 2021 08:01:08 +0200 (IST)
Received: from Out1 ([X.X.50.252])	by AH1 with ESMTP id
 1226182m004134-1226182n004134; Tue, 2 Mar 2021 08:01:08 +0200
Received: from HMX13 (Not Verified[X.X.54.33]) by Out1 with Something New
 (v8,1,1,11276)	id <B603dd4a40000>; Tue, 02 Mar 2021 08:01:08 +0200
Received: from HMX23 (X.X.54.63) by HMX13 (X.X.54.33) with Microsoft SMTP
 Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.2; Tue, 2 Mar 2021 08:01:08 +0200
Received: from HMX23 ([fe80::55c1:9224:aa39:a411]) by HMX23
 ([fe80::55c1:9224:aa39:a411%2]) with mapi id 15.01.1847.003;
 Tue, 2 Mar 2021 08:01:08 +0200
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ef9242a-6444-4d2c-86b5-1808568033f1
IronPort-SDR: wptA1erV/MyAQzOOOw5kCWebBw8FyFPLfKYey1oJAn78LoOcjWFQdRhctH4Eicp/IRbI9i+JrL
 CO61pOKrqfQA==
X-IPAS-Result: =?us-ascii?q?A2DMAgBp0z1g/5cKEaxiHAEBAQEBAQcBARIBAQQEAQFAB?=
 =?us-ascii?q?4FIgXyCZgqWEAOaY4FoCwEBAQ4BHRcEAQGETQKBeyY4EwIDAQELAQEGAQEBA?=
 =?us-ascii?q?QEGBIZfhkQBAQEEATk/DAQCAQgNAQMEAQEBHhAoCh0IAQEEDgUIsj50gTQaA?=
 =?us-ascii?q?oU9hQiBOIFlimR6gk0ma4MaPoQACQESASgxhT0EgnEmEIEyNAxpEQYiDZEHp?=
 =?us-ascii?q?1CBFAeCf4MvkWeHASuBKpI/A49qtnICBAIEBQIWgWuBCnBNI4M5UBcCj08BA?=
 =?us-ascii?q?o0iczgCBgoBAQMJiwQyXQEB?=
From: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "Xen-users (Xen-users@lists.xenproject.org)"
	<Xen-users@lists.xenproject.org>
Subject: RE: Ethernet on Arm true dom0-less
Thread-Topic: Ethernet on Arm true dom0-less
Thread-Index: AdcOcegYZUMjEDlXShiDrT3Q7AcOPwAg9+OAAAzkz/A=
Date: Tue, 2 Mar 2021 06:01:08 +0000
Message-ID: <93b7497105974634b3952f5a9451ca61@elbitsystems.com>
References: <c904dd8b12904b4db33af56f192f2a76@elbitsystems.com>
 <alpine.DEB.2.21.2103011743330.2682@sstabellini-ThinkPad-T480s>
In-Reply-To: <alpine.DEB.2.21.2103011743330.2682@sstabellini-ThinkPad-T480s>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.0.54.230]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

Thank you. I'll look into the option in the PL. If not - shared memory it=
=20is



> -----Original Message-----
> From: Stefano Stabellini <sstabellini@kernel.org>
> Sent: Tuesday, March 2, 2021 3:51 AM
> To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
> Cc: Xen-users (Xen-users@lists.xenproject.org) <Xen-
> users@lists.xenproject.org>; Stefano Stabellini <sstabellini@kernel.org=
>
> Subject: Re: Ethernet on Arm true dom0-less
>=20
> On Mon, 1 Mar 2021, Levenglick Dov wrote:
> > Hi all,
> >
> > I have true dom0-less up and running on Xilinx ZynqMP UltraScale+ (Ar=
m
> A53), based on Xen-4.11 - the official version of SDK 2019.1.
> >
> > >From what I see, PV is not supported in this configuration. Without =
writing
> proprietary drivers, would Ethernet sharing between Doms be supported -=

> for example via VNIC?
>=20
> Hi Dov,
>=20
> Yes, PV is not supported yet, but there are a couple of workarounds you=
=20can
> use today.
>=20
> One workaround is to setup a couple of AXI Ethernet Lite interfaces in =
PL
> connected via a level2 switch (also in PL). Then you can assign each et=
hernet
> interface to a different VM.
>=20
> Another workaround is to statically share some memory between the two
> VMs. Then you can setup your own ring for communication on top.
The information in this e-mail transmission contains proprietary and busi=
ness=20
sensitive information.  Unauthorized interception of this e-mail may cons=
titute=20
a violation of law. If you are not the intended recipient, you are hereby=
=20
notified that any review, dissemination, distribution or duplication of t=
his=20
communication is strictly prohibited. You are also asked to contact the s=
ender=20
by reply email and immediately destroy all copies of the original message=
.


From xen-users-bounces@lists.xenproject.org Tue Mar 02 06:09:04 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 06:09:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92121.173864 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGyDF-00084x-KM; Tue, 02 Mar 2021 06:08:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92121.173864; Tue, 02 Mar 2021 06:08:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lGyDF-00084q-Gj; Tue, 02 Mar 2021 06:08:53 +0000
Received: by outflank-mailman (input) for mailman id 92121;
 Tue, 02 Mar 2021 06:08:52 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=OD2G=IA=elbitsystems.com=dov.levenglick@srs-us1.protection.inumbo.net>)
 id 1lGyDE-00084l-9R
 for Xen-users@lists.xenproject.org; Tue, 02 Mar 2021 06:08:52 +0000
Received: from mail1.elbitsystems.com (unknown [185.145.28.61])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id c7a3a0d2-1711-4308-80a8-e07283c4ad19;
 Tue, 02 Mar 2021 06:08:50 +0000 (UTC)
Received: from unknown (HELO Router1) ([X.X.10.151]) by mail1.elbitsystems.com
 with ESMTP; 02 Mar 2021 08:08:48 +0200
Received: from DM1 (Not Verified[X.X.12.52]) by Router1 with Something New
 (v8,1,1,11276)	id <B603dd66f0001>; Tue, 02 Mar 2021 08:08:47 +0200
Received: from AH1 (unknown [X.X.12.8])	(using TLSv1.2 with cipher
 DHE-RSA-AES256-SHA256 (256/256 bits))	(No client certificate requested)	by
 Forcepoint Email with ESMTPS id E42AB16F0C8C101F7649	for
 <Xen-users@lists.xenproject.org>; Tue,  2 Mar 2021 08:08:47 +0200 (IST)
Received: from Out2 ([X.X.50.250])	by AH1 with ESMTP id
 12268lxB006892-12268lxC006892; Tue, 2 Mar 2021 08:08:47 +0200
Received: from HMX11 (Not Verified[X.X.54.31]) by Out2 with Something New
 (v8,1,1,11276)	id <B603dd66f0001>; Tue, 02 Mar 2021 08:08:47 +0200
Received: from HMX23 (X.X.54.63) by HMX11 (X.X.54.31) with Microsoft SMTP
 Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.2; Tue, 2 Mar 2021 08:08:47 +0200
Received: from HMX23 ([fe80::55c1:9224:aa39:a411]) by HMX23
 ([fe80::55c1:9224:aa39:a411%2]) with mapi id 15.01.1847.003;
 Tue, 2 Mar 2021 08:08:47 +0200
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: c7a3a0d2-1711-4308-80a8-e07283c4ad19
IronPort-SDR: rQnTWXgFXCg4FgCoqWmteUlTyB1Dz1h9ktA6desVzUJKhnFt5Z7NZN8aXnwKLu7R/UbxAAmHu0
 VXBCbBfG9Qkg==
X-IPAS-Result: =?us-ascii?q?A2BhBABt1T1g/5cKEaxiHAEBAQEBAQcBARIBAQQEAQFAB?=
 =?us-ascii?q?4FIgXyBJYFBCpYQA5pjgWgLAQEBDgEdCwwEAQGBWIJ1AoF7JjgTAgMBAQsBA?=
 =?us-ascii?q?QYBAQEBAQYEhlINhkQBAQEDAQE5PwUHBAIBCA0EBAEBAR4QKAodCAIEDgUIE?=
 =?us-ascii?q?4JWgmYwrD10gTQaAoo8gTiBZYpkeoJNJoNQBy4+glwCAheBCQkBEgEoMYU9B?=
 =?us-ascii?q?IFVcRcUJggINiMBIC4KQCoCGQEjAg81Hg+QWoI8pigHgn+DL4YQi1eHASuBK?=
 =?us-ascii?q?oNCjn0Dj2qgEpIPLYQkAgQCBAUCFoFrgQpwTSODOQlHFwKOOBaBAQECgSuGM?=
 =?us-ascii?q?oVFczgCBgoBAQMJiwQyXQEB?=
From: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
To: Stefano Stabellini <stefano.stabellini@xilinx.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	"Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>, Wei Chen
	<Wei.Chen@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Luca Fancellu
	<Luca.Fancellu@arm.com>
Subject: RE: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index: AdcIbsi89MadXehWTs+A1h4hE7ONNwAhYRqAAApfvWAAFgEugAAQvBaAATnqRTAAFQRaAAANQqMA
Date: Tue, 2 Mar 2021 06:08:47 +0000
Message-ID: <ec043ced97074743bd06bb8362c4f38f@elbitsystems.com>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
 <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
 <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
 <32928DB3-0698-4636-B438-262A8465B067@arm.com>
 <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
 <alpine.DEB.2.21.2103011735120.2682@sstabellini-ThinkPad-T480s>
In-Reply-To: <alpine.DEB.2.21.2103011735120.2682@sstabellini-ThinkPad-T480s>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.0.54.230]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

Thank you.
A few final comments below + one last question regarding the Xilinx forks=
:
Xen 4.13 is first available on the 2020.1 branch. Is it required that the=
=202020.1 branch of linux-xlnx be used as well, or can I keep the 2019.1 =
branch that I am currently using?


> -----Original Message-----
> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> Sent: Tuesday, March 2, 2021 3:42 AM
> To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
> Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Stefano Stabellini
> <sstabellini@kernel.org>; Julien Grall <julien@xen.org>; Xen-
> users@lists.xenproject.org; Wei Chen <Wei.Chen@arm.com>; Penny Zheng
> <Penny.Zheng@arm.com>; Luca Fancellu <Luca.Fancellu@arm.com>
> Subject: RE: Aligning Xen to physical memory maps on embedded systems
>=20
> On Mon, 1 Mar 2021, Levenglick Dov wrote:
> > > (+ Penny, Wei and Luca)
> > >
> > > > On 23 Feb 2021, at 01:52, Stefano Stabellini <sstabellini@kernel.=
org>
> wrote:
> > > >
> > > > On Mon, 22 Feb 2021, Levenglick Dov wrote:
> > > >>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of which
> > > >>>> Xen and the DomU have an allocation of 1.25GB, per this memory=

> map:
> > > >>>> 1. DomU1: 0x60000000 - 0x80000000 2. DomU2: 0x40000000 -
> > > >>>> 0x60000000 3. Xen: 0x30000000 - 0x40000000
> > > >>>
> > > >>> How did you tell Xen which regions is assigned to which guests?=

> > > >>> Are your domain mapped 1:1 (i.e guest physical address =3D=3D h=
ost
> > > >>> physical
> > > address)?
> > > >>
> > > >> I am working on a solution where if the "xen,domain" memory has
> > > >> #size-cell cells the content is backward compatible. But if it
> > > >> contains (#address-cells + #size-cells), the address cells shoul=
d
> > > >> be
> > > considered the physical start address.
> > > >> During the mapping of the entire address space insetup_mm(), the=

> > > >> carved out addresses would be added to the  reserved memory
> > > >> address space. When the DomU is to be created, this physical
> > > >> space would be mapped to it. The virtual addresses are less of a=
n
> > > >> issue and needn't be
> > > mapped 1x1 (although they could be).
> > > >
> > > > As of today neither upstream Xen nor the Xilinx Xen tree come wit=
h
> > > > the feature of allowing the specification of an address range for=

> > > > dom0less guests.
> > > >
> > > > The only thing that Xilinx Xen allows, which is not upstream yet,=

> > > > is the ability of creating dom0less guests 1:1 mapped using the "=
direct-
> map"
> > > > property. But the memory allocation is still done by Xen (you
> > > > can't select the addresses).
> > > >
> > > > Some time ago I worked on a hacky prototype to allow the
> > > > specification of address ranges, see:
> > > >
> > > > http://xenbits.xenproject.org/git-http/people/sstabellini/xen-uns=
t
> > > > able .git direct-map-2 from
> > > > 7372466b21c3b6c96bb7a52754e432bac883a1e3
> > > onward.
> > > >
> > > > In particular, have a look at "xen/arm: introduce 1:1 mapping for=

> > > > domUs". The work is not complete: it might not work depending on
> > > > the memory ranges you select for your domUs. In particular, you
> > > > can't select top-of-RAM addresses for your domUs. However, it
> > > > might help you getting started.
> > > >
> > > >
> > > >>>> I am able to support True Dom0-less by means of the patch/hack=

> > > >>>> demonstrated By Stefano Stabellini at
> > > >>> https://youtu.be/UfiP9eAV0WA?t=3D1746.
> > > >>>>
> > > >>>> I was able to forcefully put the Xen binary at the address
> > > >>>> range immediately below 0x40000000 by means of modifying
> > > get_xen_paddr()
> > > >>>> -
> > > >>> in itself an ugly hack.
> > > >>>>
> > > >>>> My questions are:
> > > >>>> 1. Since Xen performs runtime allocations from its heap, it is=

> allocating
> > > >>>>    downwards from 0x80000000 - thereby "stealing" memory from
> > > DomU1.
> > > >>>
> > > >>> In theory, any memory reserved for domains should have been
> > > >>> carved out from the heap allocator. This would be sufficient to=

> > > >>> prevent Xen allocating memory from the ranges you described
> above.
> > > >>>
> > > >>> Therefore, to me this looks like a bug in the tree you are usin=
g.
> > > >>
> > > >> This would be a better approach, but because Xen perform
> > > >> allocations from its heap prior to allocating memory to DomU -
> > > >> and since it allocates from the top of the heap - it is basicall=
y
> > > >> taking memory that I
> > > wanted to set aside for the DomU.
> > > >
> > > > Yeah, this is the main problem that my prototype above couldn't s=
olve.
> >
> > Stephano: Is the approach that I previously described a feasible one?=

> >   1. Mark the addresses that I want to set aside as reserved
> >   2. When reaching the proper DomU, map them and then use the mapping=

> > This approach would solve the heap issue
>=20
> My first suggestion would be actually to let the hypervisor pick the ad=
dress
> ranges. If you don't change setup, you'll see that they are actually st=
able
> across reboot. WARNING: Xen doesn't promise that they are stable;
> however, in practice, they are stable unless you change device tree or
> configuration or software versions.
>=20
> That said, yes, I think your approach might work with some limitations =
(e.g.
> Xen reclaiming memory on domU destruction but you probably don't care
> about that). It could be a decent stopgap until we get a better solutio=
n.

Is DomU destruction an option on true Dom0-less? Who would be doing the d=
estruction?

> From a Xen upstream point of view, it makes sense to follow the approac=
h
> used by Penny, Wei, and Betrand that seems to be the one that is more
> flexible and integrate better with the existing codebase.

I will wait for their response regarding commits and backporting.

> > > Wei and Penny are working on direct map and static allocation to fi=
t
> > > embedded use cases an might have more answer there.
> >
> > Bertrand, Wei and Penny: Is there a "sneak preview"? I'd be happy to
> > start backporting to Xen 4.11
>=20
> As mentioned, there is a 4.13-based Xilinx Xen tree available too.
The information in this e-mail transmission contains proprietary and busi=
ness=20
sensitive information.  Unauthorized interception of this e-mail may cons=
titute=20
a violation of law. If you are not the intended recipient, you are hereby=
=20
notified that any review, dissemination, distribution or duplication of t=
his=20
communication is strictly prohibited. You are also asked to contact the s=
ender=20
by reply email and immediately destroy all copies of the original message=
.


From xen-users-bounces@lists.xenproject.org Tue Mar 02 13:23:19 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 13:23:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92342.174239 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH4z3-0004JY-0D; Tue, 02 Mar 2021 13:22:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92342.174239; Tue, 02 Mar 2021 13:22:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH4z2-0004JQ-Sw; Tue, 02 Mar 2021 13:22:40 +0000
Received: by outflank-mailman (input) for mailman id 92342;
 Tue, 02 Mar 2021 13:22:38 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=2uRO=IA=riseup.net=donoban@srs-us1.protection.inumbo.net>)
 id 1lH4z0-0004JJ-K8
 for xen-users@lists.xenproject.org; Tue, 02 Mar 2021 13:22:38 +0000
Received: from mx1.riseup.net (unknown [198.252.153.129])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id fdb8a31b-b0c2-4068-a544-bad29c5c8e80;
 Tue, 02 Mar 2021 13:22:36 +0000 (UTC)
Received: from fews2.riseup.net (fews2-pn.riseup.net [10.0.1.84])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "Sectigo RSA Domain Validation Secure Server CA" (not verified))
 by mx1.riseup.net (Postfix) with ESMTPS id 4Dqd8q5YFtzDqCV
 for <xen-users@lists.xenproject.org>; Tue,  2 Mar 2021 05:22:35 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1])
 by fews2.riseup.net (Postfix) with ESMTPSA id 4Dqd8q18gMz1y6l
 for <xen-users@lists.xenproject.org>; Tue,  2 Mar 2021 05:22:34 -0800 (PST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: fdb8a31b-b0c2-4068-a544-bad29c5c8e80
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak;
	t=1614691355; bh=qMp2fRLdai9UGNPmn0Xsy0xe4+F3UxmoMr2OV7aeP9k=;
	h=To:From:Subject:Date:From;
	b=VZrlLLEtX9BDW4zpqbSgh3dsiWjMDErsnFKgZzF63WkMcjfi1Lf+uU/8s6lab3JDq
	 aztc3kY+3gY6VcI5EqqX37W6JwGr6huUsWpc2IE691GyQZKwYWzEgz24hzYunnAOdW
	 boRQrcNwqmJzeWqam7dfMDXV8PlRG6cYKM9qYxw0=
X-Riseup-User-ID: 3B1A734A571E040EDEC6C999CF2B88BABC40847E08B3C90EED4A759D295A3B2A
To: xen-users@lists.xenproject.org
From: donoban <donoban@riseup.net>
Subject: Qubes OS freezes with latest kernels
Message-ID: <debc3fc0-27e7-213f-a9b2-df61271a4f46@riseup.net>
Date: Tue, 2 Mar 2021 14:22:29 +0100
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="Mq0ebKKlsBQI3zF0Pdv8oLrB28DkNQXVD"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--Mq0ebKKlsBQI3zF0Pdv8oLrB28DkNQXVD
Content-Type: multipart/mixed; boundary="uPfJxenKIg2KQxoyTZZO0yIkDHtwmmjUz";
 protected-headers="v1"
From: donoban <donoban@riseup.net>
To: xen-users@lists.xenproject.org
Message-ID: <debc3fc0-27e7-213f-a9b2-df61271a4f46@riseup.net>
Subject: Qubes OS freezes with latest kernels

--uPfJxenKIg2KQxoyTZZO0yIkDHtwmmjUz
Content-Type: multipart/mixed;
 boundary="------------C8F91B825E19DD50965F2DF0"
Content-Language: en-US

This is a multi-part message in MIME format.
--------------C8F91B825E19DD50965F2DF0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi,

Some Qubes users are experiencing system freeze [1] (specially with
kernels 5.8 and 5.10) and some stack traces point that the problem could
be related with xen:

[   43.497440] kernel BUG at arch/x86/xen/p2m.c:656!

Any idea about it? How to get more debug info?

Regards.
---

1 - https://github.com/QubesOS/qubes-issues/issues/6397

--------------C8F91B825E19DD50965F2DF0
Content-Type: text/plain; charset=UTF-8;
 name="kernel-bug.txt"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="kernel-bug.txt"
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--------------C8F91B825E19DD50965F2DF0--

--uPfJxenKIg2KQxoyTZZO0yIkDHtwmmjUz--

--Mq0ebKKlsBQI3zF0Pdv8oLrB28DkNQXVD
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=zbtY
-----END PGP SIGNATURE-----

--Mq0ebKKlsBQI3zF0Pdv8oLrB28DkNQXVD--


From xen-users-bounces@lists.xenproject.org Tue Mar 02 15:29:33 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 15:29:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.91974.174332 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH6xK-0000RI-Oo; Tue, 02 Mar 2021 15:29:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 91974.174332; Tue, 02 Mar 2021 15:29:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH6xK-0000RA-LJ; Tue, 02 Mar 2021 15:29:02 +0000
Received: by outflank-mailman (input) for mailman id 91974;
 Mon, 01 Mar 2021 21:13:03 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ueYy=H7=riomar.se=rio@srs-us1.protection.inumbo.net>)
 id 1lGpqh-00005h-K7
 for xen-users@lists.xenproject.org; Mon, 01 Mar 2021 21:13:03 +0000
Received: from mail2.riocities.com (unknown [185.20.14.89])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 2e523476-5431-40d9-95b8-549311d50094;
 Mon, 01 Mar 2021 21:13:02 +0000 (UTC)
Received: from mail.riomar.se (81-230-197-241-no510.tbcn.telia.com
 [81.230.197.241])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mail2.riocities.com (Postfix) with ESMTPSA id 6B02D400C6
 for <xen-users@lists.xenproject.org>; Mon,  1 Mar 2021 22:13:01 +0100 (CET)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 2e523476-5431-40d9-95b8-549311d50094
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=riomar.se; s=mail;
	t=1614633181; bh=0LVwERTSvOFk7sMyJ8sFCA6WYFXPp7GuyLNaaWeZkqo=;
	h=Date:From:To:Subject:In-Reply-To:References:From;
	b=W88w4h99iM50H6yxxEvI19P7iF40761Bl0h4PJoPfL4HDp+9ciBU6+eec+XuQW353
	 c2yFMof4m+NnToiq79YyD5ahEm267pAUjUIeRGw4CwUxY7TcLik6yN0JXcXbPwoQ9e
	 V94M7DbzqBzTvT31A0XFiEiwlvef/bQxv910KNBI=
Date: Mon, 1 Mar 2021 22:13:00 +0100
From: Henrik Riomar <rio@riomar.se>
To: xen-users@lists.xenproject.org
Subject: Re: pci passthrough and msi-x
Message-Id: <20210301221300.994f38f3c58a8ea1ade4a55e@riomar.se>
In-Reply-To: <20210301090624.58618427bdf8766896563fcf@riomar.se>
References: <20210301090624.58618427bdf8766896563fcf@riomar.se>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

On Mon, 1 Mar 2021 09:06:24 +0100
Henrik Riomar <rio@riomar.se> wrote:

> Hi,
> 
> What options are needed to get MSI-X interrupts working with pci passthrough?
> 
> Running Linux 5.10 in dom0 and in the guest with XEN 4.14.1.
> 

Upgrade from Linux 5.10.16 to 5.10.19 seems to solve the issue.

/ Henrik

5.10.19:

[    2.922007] ixgbe: Intel(R) 10 Gigabit PCI Express Network Driver
[    2.922010] ixgbe: Copyright (c) 1999-2016 Intel Corporation.
[    2.934638] ixgbe 0000:00:00.0: Xen PCI mapped GSI17 to IRQ19
[    3.188537] EDAC pnd2: Failed to register device with error -19.
[    3.282965] ixgbe 0000:00:00.0: Multiqueue Enabled: Rx Queue count = 2, Tx Queue count = 2 XDP Queue count = 0
[    3.411026] ixgbe 0000:00:00.0: MAC: 6, PHY: 27, PBA No: 030000-000
[    3.411029] ixgbe 0000:00:00.0: 3c:ec:ef:03:0b:d6
[    3.457704] ixgbe 0000:00:00.0: Intel(R) 10 Gigabit Network Connection
[    3.461237] ixgbe 0000:00:00.1: Xen PCI mapped GSI18 to IRQ23
[    3.943626] ixgbe 0000:00:00.1: Multiqueue Enabled: Rx Queue count = 2, Tx Queue count = 2 XDP Queue count = 0
[    4.081342] ixgbe 0000:00:00.1: MAC: 6, PHY: 27, PBA No: 030000-000
[    4.081347] ixgbe 0000:00:00.1: 3c:ec:ef:03:0b:d7
[    4.125774] ixgbe 0000:00:00.1: Intel(R) 10 Gigabit Network Connection


From xen-users-bounces@lists.xenproject.org Tue Mar 02 15:29:33 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 15:29:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92008.174341 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH6xL-0000S0-7i; Tue, 02 Mar 2021 15:29:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92008.174341; Tue, 02 Mar 2021 15:29:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH6xL-0000Ri-1y; Tue, 02 Mar 2021 15:29:03 +0000
Received: by outflank-mailman (input) for mailman id 92008;
 Tue, 02 Mar 2021 01:42:11 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=idnI=IA=xilinx.com=stefanos@srs-us1.protection.inumbo.net>)
 id 1lGu39-0005Yu-MI
 for Xen-users@lists.xenproject.org; Tue, 02 Mar 2021 01:42:11 +0000
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (unknown
 [40.107.94.62]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id c3a4ee90-a339-4ef8-967d-de828e4ae793;
 Tue, 02 Mar 2021 01:42:09 +0000 (UTC)
Received: from SA9PR13CA0138.namprd13.prod.outlook.com (2603:10b6:806:27::23)
 by SJ0PR02MB7678.namprd02.prod.outlook.com (2603:10b6:a03:32f::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20; Tue, 2 Mar
 2021 01:42:07 +0000
Received: from SN1NAM02FT007.eop-nam02.prod.protection.outlook.com
 (2603:10b6:806:27:cafe::94) by SA9PR13CA0138.outlook.office365.com
 (2603:10b6:806:27::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.9 via Frontend
 Transport; Tue, 2 Mar 2021 01:42:07 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 SN1NAM02FT007.mail.protection.outlook.com (10.152.72.88) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.3890.19 via Frontend Transport; Tue, 2 Mar 2021 01:42:06 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.1913.5; Mon, 1 Mar 2021 17:42:05 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.1913.5 via Frontend Transport; Mon, 1 Mar 2021 17:42:05 -0800
Received: from [10.23.120.43] (port=52958 helo=localhost)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <stefano.stabellini@xilinx.com>)
 id 1lGu33-0002RI-5Y; Mon, 01 Mar 2021 17:42:05 -0800
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: c3a4ee90-a339-4ef8-967d-de828e4ae793
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bg11kBC7vuLgz34p5gsYZm0ipJ6Ct4YEhRxhO51lp3vCfiM/Er9z9CK/4vPmlo96sMJBDCeMIM6kn4LDc/7mRyo2XyrsRf46vpZhWo9/GkZK1OsbcQbNUjv+FPBFVbD/2q8VLj9xKeFEv3UcBoGXys/y+HHgOwCOjZMPIw3C1O5g+iIPGsyQjZ3tT2r7OIA8u+KNyI5K6rTccFXL1VgVMRZbecnD7U/0jqPHnimZuphM5SYf80t7Hi9q8KXznTnxyXPrhuT/LhitQ8AAa2UIXuhLqlUPHqqoZ+tfOuz1SXNXrR905T+Qcd5NLI4HIT7ON2bxR3k3nbm4utrrvmkWgA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TB4SXKJMk7XGrsQms1b8tDBtBEFNN6Q0tiCadBhHxyQ=;
 b=lEptmUu6hoSdrSLKV+7h/oraGbiWqnTfimGufgUlnQ+T+vucE55jte6isr66m9FxPGbG66F9BBRSEhW0g+n07zzz0AOgLo4rCQQ9GVGWuEOKh2oXQiAt9RI4+eCiLm/5Y4Y6rVjY4c/OO2nD/UGtY+EZpczUmq//dc6FjVOaqmenQCWvY2bq04wDUIXfZ/JdBIV+ik4tHC2GEvbez/tVhDyjKOudVNnOK+5IkV5tjfcxHqhq+/7saXCUfsok/YnuWMBMF9GE2tb06t8NoTU5YVLMw6FqhstpUAy9yoonx0KsRQlaJHcIer/A4lltdCQYl7WaCxOMUPZKp1Sx9r/zEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=elbitsystems.com smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TB4SXKJMk7XGrsQms1b8tDBtBEFNN6Q0tiCadBhHxyQ=;
 b=HKs53PYlq0cJgSBu97Ch+uRtbK9uZ1yUJqbdn8US002/27f35xkD2BdHiAN22Z0zVc3dGY6eRKZ/5rD+PTNXDClv+GiR8+Yxc4HaD9ndNSWvXlTw4gZ9F/uDFVRyt4kQgz8NTcFgI/NyToxnJc7O8FAEGz5+AnRxwWNRZ3GhxMM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; elbitsystems.com; dkim=none (message not signed)
 header.d=none;elbitsystems.com; dmarc=pass action=none
 header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
Date: Mon, 1 Mar 2021 17:42:04 -0800
From: Stefano Stabellini <stefano.stabellini@xilinx.com>
X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s
To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	"Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>, Wei Chen
	<Wei.Chen@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Luca Fancellu
	<Luca.Fancellu@arm.com>
Subject: RE: Aligning Xen to physical memory maps on embedded systems
In-Reply-To: <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
Message-ID: <alpine.DEB.2.21.2103011735120.2682@sstabellini-ThinkPad-T480s>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com> <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org> <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com> <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s> <32928DB3-0698-4636-B438-262A8465B067@arm.com>
 <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4dcef3fe-cd72-431a-ed8b-08d8dd1c637a
X-MS-TrafficTypeDiagnostic: SJ0PR02MB7678:
X-MS-Exchange-MinimumUrlDomainAge: xenproject.org#2918
X-Microsoft-Antispam-PRVS:
	<SJ0PR02MB7678DE7F7A031FC4C53484CFA0999@SJ0PR02MB7678.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(7916004)(4636009)(396003)(39860400002)(376002)(136003)(346002)(46966006)(36840700001)(9686003)(6916009)(70586007)(426003)(478600001)(36906005)(70206006)(44832011)(316002)(47076005)(9786002)(54906003)(82740400003)(2906002)(186003)(356005)(7636003)(53546011)(8936002)(8676002)(33716001)(26005)(4326008)(5660300002)(36860700001)(82310400003)(83380400001)(966005)(336012);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2021 01:42:06.9938
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4dcef3fe-cd72-431a-ed8b-08d8dd1c637a
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT007.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR02MB7678

On Mon, 1 Mar 2021, Levenglick Dov wrote:
> > (+ Penny, Wei and Luca)
> > 
> > > On 23 Feb 2021, at 01:52, Stefano Stabellini <sstabellini@kernel.org> wrote:
> > >
> > > On Mon, 22 Feb 2021, Levenglick Dov wrote:
> > >>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen
> > >>>> and the DomU have an allocation of 1.25GB, per this memory map:
> > >>>> 1. DomU1: 0x60000000 - 0x80000000
> > >>>> 2. DomU2: 0x40000000 - 0x60000000
> > >>>> 3. Xen: 0x30000000 - 0x40000000
> > >>>
> > >>> How did you tell Xen which regions is assigned to which guests? Are
> > >>> your domain mapped 1:1 (i.e guest physical address == host physical
> > address)?
> > >>
> > >> I am working on a solution where if the "xen,domain" memory has
> > >> #size-cell cells the content is backward compatible. But if it
> > >> contains (#address-cells + #size-cells), the address cells should be
> > considered the physical start address.
> > >> During the mapping of the entire address space insetup_mm(), the
> > >> carved out addresses would be added to the  reserved memory address
> > >> space. When the DomU is to be created, this physical space would be
> > >> mapped to it. The virtual addresses are less of an issue and needn't be
> > mapped 1x1 (although they could be).
> > >
> > > As of today neither upstream Xen nor the Xilinx Xen tree come with the
> > > feature of allowing the specification of an address range for dom0less
> > > guests.
> > >
> > > The only thing that Xilinx Xen allows, which is not upstream yet, is
> > > the ability of creating dom0less guests 1:1 mapped using the "direct-map"
> > > property. But the memory allocation is still done by Xen (you can't
> > > select the addresses).
> > >
> > > Some time ago I worked on a hacky prototype to allow the specification
> > > of address ranges, see:
> > >
> > > http://xenbits.xenproject.org/git-http/people/sstabellini/xen-unstable
> > > .git direct-map-2 from 7372466b21c3b6c96bb7a52754e432bac883a1e3
> > onward.
> > >
> > > In particular, have a look at "xen/arm: introduce 1:1 mapping for
> > > domUs". The work is not complete: it might not work depending on the
> > > memory ranges you select for your domUs. In particular, you can't
> > > select top-of-RAM addresses for your domUs. However, it might help you
> > > getting started.
> > >
> > >
> > >>>> I am able to support True Dom0-less by means of the patch/hack
> > >>>> demonstrated By Stefano Stabellini at
> > >>> https://youtu.be/UfiP9eAV0WA?t=1746.
> > >>>>
> > >>>> I was able to forcefully put the Xen binary at the address range
> > >>>> immediately below 0x40000000 by means of modifying
> > get_xen_paddr()
> > >>>> -
> > >>> in itself an ugly hack.
> > >>>>
> > >>>> My questions are:
> > >>>> 1. Since Xen performs runtime allocations from its heap, it is allocating
> > >>>>    downwards from 0x80000000 - thereby "stealing" memory from
> > DomU1.
> > >>>
> > >>> In theory, any memory reserved for domains should have been carved
> > >>> out from the heap allocator. This would be sufficient to prevent Xen
> > >>> allocating memory from the ranges you described above.
> > >>>
> > >>> Therefore, to me this looks like a bug in the tree you are using.
> > >>
> > >> This would be a better approach, but because Xen perform allocations
> > >> from its heap prior to allocating memory to DomU - and since it
> > >> allocates from the top of the heap - it is basically taking memory that I
> > wanted to set aside for the DomU.
> > >
> > > Yeah, this is the main problem that my prototype above couldn't solve.
> 
> Stephano: Is the approach that I previously described a feasible one?
>   1. Mark the addresses that I want to set aside as reserved
>   2. When reaching the proper DomU, map them and then use the mapping
> This approach would solve the heap issue

My first suggestion would be actually to let the hypervisor pick the
address ranges. If you don't change setup, you'll see that they are
actually stable across reboot. WARNING: Xen doesn't promise that they
are stable; however, in practice, they are stable unless you change
device tree or configuration or software versions.

That said, yes, I think your approach might work with some limitations
(e.g. Xen reclaiming memory on domU destruction but you probably don't
care about that). It could be a decent stopgap until we get a better
solution.

>From a Xen upstream point of view, it makes sense to follow the approach
used by Penny, Wei, and Betrand that seems to be the one that is more
flexible and integrate better with the existing codebase.



> > Wei and Penny are working on direct map and static allocation to fit
> > embedded use cases an might have more answer there.
> 
> Bertrand, Wei and Penny: Is there a "sneak preview"? I'd be happy to start backporting to Xen 4.11

As mentioned, there is a 4.13-based Xilinx Xen tree available too.


From xen-users-bounces@lists.xenproject.org Tue Mar 02 17:44:53 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 17:44:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92515.174434 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH948-0007F1-FT; Tue, 02 Mar 2021 17:44:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92515.174434; Tue, 02 Mar 2021 17:44:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lH948-0007Et-BB; Tue, 02 Mar 2021 17:44:12 +0000
Received: by outflank-mailman (input) for mailman id 92515;
 Tue, 02 Mar 2021 17:44:10 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9mMN=IA=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1lH946-0007Eo-Et
 for Xen-users@lists.xenproject.org; Tue, 02 Mar 2021 17:44:10 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (unknown
 [40.107.6.71]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 5eef9355-acb1-43f9-9bdf-e9ba3f77d6fd;
 Tue, 02 Mar 2021 17:44:09 +0000 (UTC)
Received: from AM5PR0402CA0015.eurprd04.prod.outlook.com
 (2603:10a6:203:90::25) by AM8PR08MB6339.eurprd08.prod.outlook.com
 (2603:10a6:20b:317::6) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20; Tue, 2 Mar
 2021 17:44:07 +0000
Received: from VE1EUR03FT060.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:90:cafe::7) by AM5PR0402CA0015.outlook.office365.com
 (2603:10a6:203:90::25) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20 via Frontend
 Transport; Tue, 2 Mar 2021 17:44:07 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT060.mail.protection.outlook.com (10.152.19.187) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3890.19 via Frontend Transport; Tue, 2 Mar 2021 17:44:06 +0000
Received: ("Tessian outbound 282f66859e77:v71");
 Tue, 02 Mar 2021 17:44:06 +0000
Received: from adc5c371d64f.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 D840B11A-59DF-443D-8891-7E3077714049.1; 
 Tue, 02 Mar 2021 17:44:00 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id adc5c371d64f.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 02 Mar 2021 17:44:00 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com (2603:10a6:800:1ae::15)
 by VI1PR0802MB2463.eurprd08.prod.outlook.com (2603:10a6:800:bb::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20; Tue, 2 Mar
 2021 17:43:58 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839]) by VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839%6]) with mapi id 15.20.3890.028; Tue, 2 Mar 2021
 17:43:57 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 5eef9355-acb1-43f9-9bdf-e9ba3f77d6fd
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lNHnXD01a+L7I2nlimxlk/OR3cERViVZklfurVSYKLo=;
 b=tMnoPlpMZSIgBpZ3Lx5cmynu/QJcvP2CmNink2yiNXL6nzYJrtnelNDRk008pRn+bH4oZxkzBfzns/54wUKDjGq2GPh9dRsa0EW0eiQxYzoyL5Ws9cyc0iXk3iOnUwhJbEryD4lciemUMA394TkSxDcqI2m2IAND8FcxJaGebXU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d1c83d850c668e67
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=U9Whf/16Xl7KOg5SEBlGm4DLU8oA5Q69eBJn6DULRkj6VKkNZKj7n9nwQI/6d+ZSIDUpdp7yuFcGJ/vuU4jwZ3vfqi4p1YkbG0uYeiDL266NFeA8rn8ovpPYUDZHpgojfDC3bBi2lNORdw8SmoCcmdoEv/x0vHo3ClnRkRsc+s8X4HWM0cdn4vzSwLGsuBF3ajtW2v2a2Y5Rut696uzaf1mKhw1F+NTlGvV89cuLTON4al2VPAgpNMrKchHwaSgMMjPUxOGCNpr033ogE0qPSTTctFC8QxnH9WLZBiIRT3LwbMx1cw6iE4Yq8QV47ezVyukcdRBmhuGSjeYRbWHKyw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lNHnXD01a+L7I2nlimxlk/OR3cERViVZklfurVSYKLo=;
 b=kVemhB4j8uUXWB7nL8YMy9jwHHdWA0deK0H4VEuoH0XD6xfy8gXDDaEuRU5Aoatavb4TzsjWtwrg1Wy8CKo7Wj2DLsVYRFoddaVp4SRgfZXsTwvkTZKm5Rn+6blNDTN2Wxwp9TpywQ4m5E70XjXfacS9UyhGVR1HTUyO1d6Gud/U4I4lLCzleR7mnmTLPpvFFyXfettgY4+BZRYQ1RVa0416M/Rtu0cck2ybFp5GTn5m8eSLl1/ZXUBuN5EfzIwUnX5cSqtT+FzuPvToxRSbx6hE6lijiiwBty+5v6OrOaA3Un3iJCaZDbA5CpSpxt/9kL4ZtEHpV0FemuifV21KGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lNHnXD01a+L7I2nlimxlk/OR3cERViVZklfurVSYKLo=;
 b=tMnoPlpMZSIgBpZ3Lx5cmynu/QJcvP2CmNink2yiNXL6nzYJrtnelNDRk008pRn+bH4oZxkzBfzns/54wUKDjGq2GPh9dRsa0EW0eiQxYzoyL5Ws9cyc0iXk3iOnUwhJbEryD4lciemUMA394TkSxDcqI2m2IAND8FcxJaGebXU=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
	<julien@xen.org>, "Xen-users@lists.xenproject.org"
	<Xen-users@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Subject: Re: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index:
 AdcIbsi89MadXehWTs+A1h4hE7ONNwAlkfyAAAaxfAAAGa9vgAAQu/AAATXyAAAAOpSHAA==
Date: Tue, 2 Mar 2021 17:43:57 +0000
Message-ID: <D81D4B1F-76BD-4D8A-8DBF-E92FB35F403D@arm.com>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
 <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
 <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
 <32928DB3-0698-4636-B438-262A8465B067@arm.com>
 <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
In-Reply-To: <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.60.0.2.21)
Authentication-Results-Original: elbitsystems.com; dkim=none (message not
 signed) header.d=none;elbitsystems.com; dmarc=none action=none
 header.from=arm.com;
x-originating-ip: [86.26.33.241]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 399e36f6-16da-43fa-872f-08d8dda2c720
x-ms-traffictypediagnostic: VI1PR0802MB2463:|AM8PR08MB6339:
X-MS-Exchange-MinimumUrlDomainAge: xenproject.org#2918
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS:
	<AM8PR08MB6339C397D635F6593A1DC7379D999@AM8PR08MB6339.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:6430;OLM:6430;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5696.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(39850400004)(346002)(376002)(136003)(366004)(396003)(2616005)(6512007)(53546011)(6506007)(55236004)(5660300002)(316002)(54906003)(478600001)(6916009)(33656002)(4326008)(6486002)(83380400001)(66556008)(8676002)(91956017)(8936002)(76116006)(66946007)(66476007)(86362001)(66446008)(2906002)(71200400001)(64756008)(26005)(36756003)(186003)(966005)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?vTAvAptptb0DO1IJ/bYzpVSyi+peGS4utg5IHJTWhYJWugV51yEGPiOL9sxy?=
 =?us-ascii?Q?cJWy5aryGkJJ/Do8Rw3v0ClC9DK8SWFHzM+ADyL//88BppA7Nh5R9dLpk1Aw?=
 =?us-ascii?Q?dlMt0fjPkghpROO9+xvKhEXH2pDXJBNHGppdq33FJt2/9E+pMTfbXYw/T7Gh?=
 =?us-ascii?Q?WejUrb7fSADnVVu4v6Vj+PXIxZiBPvgj/27FCO/k2B6yy4WiZFF/kNzXH2Wz?=
 =?us-ascii?Q?1CgPLBURoaU7Nu/an/aKVyJeyFQ81oOUAjkLT2G+vo9+Ki+4s6/8pCKk7ock?=
 =?us-ascii?Q?w/JzncU+iq1sMQipuIojA8ymHPKBwDUWr4tb6eF/7WfQljXGUtAKqXRa46Es?=
 =?us-ascii?Q?odaY+xCHvp+aSUbhLfmp1IBBepY1EGcWeL5pABgjkwq9IaowZFhNX1+gUxht?=
 =?us-ascii?Q?NQOi31Vy9w2b1qA4xLqr1izRJOV10DN0CsMyuCtRX/P/RL29vz4ht3y/HMn8?=
 =?us-ascii?Q?cURMXYMxUHNvBnME8uKNV5Tlc3IIKaBC08m9yGCP4sIO0nCH/OqYn1UGRXtc?=
 =?us-ascii?Q?n82lb1TBaMySCbe7TioU4rW2KdVAJRnHc03zv8tsvimt/YZSFLq7YmW4Hzao?=
 =?us-ascii?Q?mJrU2OF1AJpYzbrSutxxSUqmhunfgjz82xFT9Cf2Ht6DSPqeu8TEc3hLxp+e?=
 =?us-ascii?Q?G5RNnUchzLuUELIkityVdn4A7UffMgBumCXKqKeXlXTZQCvMhSiEcbvkOPNi?=
 =?us-ascii?Q?RB0y46ssZW0DYFvNzCn72R5B1aA6Z6KyE4v5gb7CYmk5TTj/7+PCtlus8K6v?=
 =?us-ascii?Q?xzl5fPnXItJoxW8WMKu0PgF6TnJn0R9lpLfWF6zZNmtflYGMS9byy6/a/YBM?=
 =?us-ascii?Q?PyP4SsiTByOunJq2bGTNxYPw0+ggXAMqTqpPEdgXci/zddobIkCqJfAaKyph?=
 =?us-ascii?Q?lUD7MY33/DuHvwHu1tXRtdVG5ozaYOVYl83fjnBlyQv4bG/+UyVugBOzBDrX?=
 =?us-ascii?Q?tdrvTKPFF9PHHeAaFCDKjSOPWOwpYvxYe3pzUpNwD/i5w/hMyqq633v36Wk3?=
 =?us-ascii?Q?Vevf3UTTu9hpLdeZT1Jl4ckbJB+zgzaCz/0MiHLFtAM/441yppq0fJ2dSO30?=
 =?us-ascii?Q?H5eiKvmM0Vme7HjzGku2CRRvtpkY6317YAqn6P9E8HMsCKDQcJcPYAETavAx?=
 =?us-ascii?Q?GSk0Ia4zRf/LLEP1byq1qbsSxf7A5FcOmbdSvgj4PUOSbJm2SYl+dpRdAO4Z?=
 =?us-ascii?Q?Am3KawS57kASwGyi9rusA7P/E/XQbz/2ndEz+Pb41A6SfqPG6Gg9DsgDQpls?=
 =?us-ascii?Q?cC7mnCSNX5UfzYOfQIea4W6KKwDqHn1KI5RO8MXIiO3uL0bAus0tkpFluZN1?=
 =?us-ascii?Q?JQD+91/k3hYkLdqESjPxJoU4?=
Content-Type: text/plain; charset="us-ascii"
Content-ID: <B9C8190B7075E642B6C0921FA69E300C@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2463
Original-Authentication-Results: elbitsystems.com; dkim=none (message not signed)
 header.d=none;elbitsystems.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT060.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7a740bc4-214c-4989-c8ea-08d8dda2c1b2
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(39850400004)(346002)(396003)(136003)(376002)(46966006)(36840700001)(186003)(966005)(36860700001)(336012)(478600001)(8936002)(4326008)(55236004)(5660300002)(54906003)(36756003)(47076005)(6512007)(316002)(53546011)(82310400003)(356005)(33656002)(70206006)(70586007)(6486002)(81166007)(6506007)(26005)(8676002)(6862004)(2616005)(82740400003)(86362001)(2906002)(83380400001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2021 17:44:06.6882
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 399e36f6-16da-43fa-872f-08d8dda2c720
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT060.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6339

Hi,

> On 1 Mar 2021, at 13:46, Levenglick Dov <Dov.Levenglick@elbitsystems.com>=
 wrote:
>=20
>>=20
>> (+ Penny, Wei and Luca)
>>=20
>>> On 23 Feb 2021, at 01:52, Stefano Stabellini <sstabellini@kernel.org> w=
rote:
>>>=20
>>> On Mon, 22 Feb 2021, Levenglick Dov wrote:
>>>>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of which Xen
>>>>>> and the DomU have an allocation of 1.25GB, per this memory map:
>>>>>> 1. DomU1: 0x60000000 - 0x80000000
>>>>>> 2. DomU2: 0x40000000 - 0x60000000
>>>>>> 3. Xen: 0x30000000 - 0x40000000
>>>>>=20
>>>>> How did you tell Xen which regions is assigned to which guests? Are
>>>>> your domain mapped 1:1 (i.e guest physical address =3D=3D host physic=
al
>> address)?
>>>>=20
>>>> I am working on a solution where if the "xen,domain" memory has
>>>> #size-cell cells the content is backward compatible. But if it
>>>> contains (#address-cells + #size-cells), the address cells should be
>> considered the physical start address.
>>>> During the mapping of the entire address space insetup_mm(), the
>>>> carved out addresses would be added to the  reserved memory address
>>>> space. When the DomU is to be created, this physical space would be
>>>> mapped to it. The virtual addresses are less of an issue and needn't b=
e
>> mapped 1x1 (although they could be).
>>>=20
>>> As of today neither upstream Xen nor the Xilinx Xen tree come with the
>>> feature of allowing the specification of an address range for dom0less
>>> guests.
>>>=20
>>> The only thing that Xilinx Xen allows, which is not upstream yet, is
>>> the ability of creating dom0less guests 1:1 mapped using the "direct-ma=
p"
>>> property. But the memory allocation is still done by Xen (you can't
>>> select the addresses).
>>>=20
>>> Some time ago I worked on a hacky prototype to allow the specification
>>> of address ranges, see:
>>>=20
>>> http://xenbits.xenproject.org/git-http/people/sstabellini/xen-unstable
>>> .git direct-map-2 from 7372466b21c3b6c96bb7a52754e432bac883a1e3
>> onward.
>>>=20
>>> In particular, have a look at "xen/arm: introduce 1:1 mapping for
>>> domUs". The work is not complete: it might not work depending on the
>>> memory ranges you select for your domUs. In particular, you can't
>>> select top-of-RAM addresses for your domUs. However, it might help you
>>> getting started.
>>>=20
>>>=20
>>>>>> I am able to support True Dom0-less by means of the patch/hack
>>>>>> demonstrated By Stefano Stabellini at
>>>>> https://youtu.be/UfiP9eAV0WA?t=3D1746.
>>>>>>=20
>>>>>> I was able to forcefully put the Xen binary at the address range
>>>>>> immediately below 0x40000000 by means of modifying
>> get_xen_paddr()
>>>>>> -
>>>>> in itself an ugly hack.
>>>>>>=20
>>>>>> My questions are:
>>>>>> 1. Since Xen performs runtime allocations from its heap, it is alloc=
ating
>>>>>>   downwards from 0x80000000 - thereby "stealing" memory from
>> DomU1.
>>>>>=20
>>>>> In theory, any memory reserved for domains should have been carved
>>>>> out from the heap allocator. This would be sufficient to prevent Xen
>>>>> allocating memory from the ranges you described above.
>>>>>=20
>>>>> Therefore, to me this looks like a bug in the tree you are using.
>>>>=20
>>>> This would be a better approach, but because Xen perform allocations
>>>> from its heap prior to allocating memory to DomU - and since it
>>>> allocates from the top of the heap - it is basically taking memory tha=
t I
>> wanted to set aside for the DomU.
>>>=20
>>> Yeah, this is the main problem that my prototype above couldn't solve.
>=20
> Stephano: Is the approach that I previously described a feasible one?
>  1. Mark the addresses that I want to set aside as reserved
>  2. When reaching the proper DomU, map them and then use the mapping
> This approach would solve the heap issue
>>>=20
>>=20
>> Wei and Penny are working on direct map and static allocation to fit
>> embedded use cases an might have more answer there.
>=20
> Bertrand, Wei and Penny: Is there a "sneak preview"? I'd be happy to star=
t backporting to Xen 4.11

I am afraid we are not at this stage, we are on early development on this.

>=20
>>=20
>> On the fix from Stefano explained in the video, Luca Fancellu made a pat=
ch to
>> propose a long term solution and will push it upstream next week.
>=20
> Bertrand: Do You know which commit ID this is? Since I'm working on a Xil=
inx fork, I am out of touch with the goings of the main tree.

This will be pushed to the xen-devel mailing list next week.

Cheers
Bertrand

>=20
>=20
> Thanks,
> Dov
> The information in this e-mail transmission contains proprietary and busi=
ness=20
> sensitive information.  Unauthorized interception of this e-mail may cons=
titute=20
> a violation of law. If you are not the intended recipient, you are hereby=
=20
> notified that any review, dissemination, distribution or duplication of t=
his=20
> communication is strictly prohibited. You are also asked to contact the s=
ender=20
> by reply email and immediately destroy all copies of the original message=
.



From xen-users-bounces@lists.xenproject.org Tue Mar 02 19:36:30 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 02 Mar 2021 19:36:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92576.174536 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHAo7-0002Ty-MH; Tue, 02 Mar 2021 19:35:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92576.174536; Tue, 02 Mar 2021 19:35:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHAo7-0002Tq-J0; Tue, 02 Mar 2021 19:35:47 +0000
Received: by outflank-mailman (input) for mailman id 92576;
 Tue, 02 Mar 2021 19:35:46 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=idnI=IA=xilinx.com=stefanos@srs-us1.protection.inumbo.net>)
 id 1lHAo6-0002Th-BP
 for Xen-users@lists.xenproject.org; Tue, 02 Mar 2021 19:35:46 +0000
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (unknown
 [40.107.92.63]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1f0dc0f9-025f-47b5-9461-ac43c8ea0f25;
 Tue, 02 Mar 2021 19:35:44 +0000 (UTC)
Received: from CY4PR15CA0021.namprd15.prod.outlook.com (2603:10b6:910:14::31)
 by CO6PR02MB7779.namprd02.prod.outlook.com (2603:10b6:303:a0::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.23; Tue, 2 Mar
 2021 19:35:43 +0000
Received: from CY1NAM02FT045.eop-nam02.prod.protection.outlook.com
 (2603:10b6:910:14:cafe::e2) by CY4PR15CA0021.outlook.office365.com
 (2603:10b6:910:14::31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend
 Transport; Tue, 2 Mar 2021 19:35:43 +0000
Received: from xsj-pvapexch01.xlnx.xilinx.com (149.199.62.198) by
 CY1NAM02FT045.mail.protection.outlook.com (10.152.75.111) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.3890.19 via Frontend Transport; Tue, 2 Mar 2021 19:35:42 +0000
Received: from xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) by
 xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.1913.5; Tue, 2 Mar 2021 11:35:42 -0800
Received: from smtp.xilinx.com (172.19.127.96) by
 xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server id
 15.1.1913.5 via Frontend Transport; Tue, 2 Mar 2021 11:35:42 -0800
Received: from [10.23.120.43] (port=49459 helo=localhost)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <stefano.stabellini@xilinx.com>)
 id 1lHAo1-0003lw-V1; Tue, 02 Mar 2021 11:35:42 -0800
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 1f0dc0f9-025f-47b5-9461-ac43c8ea0f25
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=laYst6499QCFJRLCnybmxDkZf/ubIYlE0Bxha5C6pEkT9yW0Gco/0YTmsJbHTmDKy7zWyCLWdZ3kQvEd3Kiq3xQIpSp32b/yAuuijXct7wjAMoavUElB7xRnIH89SxIT/z+fhj1Zf3zu3favRpRYrHZPKzs75QhouPryeqWih82Bl3bC0+oJe3mwlbHY52UxK2s5JaQGjFBSjFaDT6m5rE+n5UvegSnlhbxfm4sFLjb3yBdwXfVLHFQo5MW4ejO1NCBnWwzvo9Sv+OT8YK9CvqxN0ndRJ0ASYbPsBwIiigYKq5lvbbqolM4JnuzTa4lsU/pEFte7zbgevJvaWhUViQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sHLyjr1aSVbCIfmQQr3tHv8plE1KMAiwo11/soPmyGA=;
 b=kGWsbO/MWYlDr2fUE8NLxb+dZjXRNx1iIizAdUc/fSurhq5zloPV0hmpH1WcW4C3JfjQKa7oi+FcJvj4etJoaYTlqQrR1K217hlCymd9yNyDNnlsYEFujo0JM/Nz6t8bKymu+ZS9sdwJn+R5zmW8Rv3I+qfLKSW+p8KXvaYIsBXOrwxqUWADjvOj2KHmr0IfGLDHqfFC6xfYCh9+GXt+1rnRdpyp+VpBUC2jw3tQW8Y4ZwjypUAS5rHitIL6AGtxSYMT8h4RSCOHKEvyIXvT9lv3RsG6Fpu5E0acoGTGi6mJOnO0SuwvaqABolti4dZbmbmhjE2mpjzJzZ/8fm76Ww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=elbitsystems.com smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sHLyjr1aSVbCIfmQQr3tHv8plE1KMAiwo11/soPmyGA=;
 b=b3EcDf1QI9TbQxe2zeNGoSHGXOcxyqYf/Ez4GZi+ooz3uRT1dAjgIPEHgMOtKiE4DbFEwV7vT9lUfiQtUOp3CA8/DUt6fO95+RlrYzpEIQmxlrZ4tjUB5qUVFy8dAlUV72naW8L6kpxYgsmeFBP97Ew0pDjpb6gIbI5f3iS9+Zw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; elbitsystems.com; dkim=none (message not signed)
 header.d=none;elbitsystems.com; dmarc=pass action=none
 header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch01.xlnx.xilinx.com;
Date: Tue, 2 Mar 2021 11:35:41 -0800
From: Stefano Stabellini <stefano.stabellini@xilinx.com>
X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s
To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
CC: Stefano Stabellini <stefano.stabellini@xilinx.com>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>, "Xen-users@lists.xenproject.org"
	<Xen-users@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Subject: RE: Aligning Xen to physical memory maps on embedded systems
In-Reply-To: <ec043ced97074743bd06bb8362c4f38f@elbitsystems.com>
Message-ID: <alpine.DEB.2.21.2103021126290.2682@sstabellini-ThinkPad-T480s>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com> <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org> <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com> <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s> <32928DB3-0698-4636-B438-262A8465B067@arm.com>
 <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com> <alpine.DEB.2.21.2103011735120.2682@sstabellini-ThinkPad-T480s> <ec043ced97074743bd06bb8362c4f38f@elbitsystems.com>
User-Agent: Alpine 2.21 (DEB 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7f0ab24e-a886-4284-240b-08d8ddb25e0b
X-MS-TrafficTypeDiagnostic: CO6PR02MB7779:
X-Microsoft-Antispam-PRVS:
	<CO6PR02MB777951D0C96C40DE4237AFAFA0999@CO6PR02MB7779.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Oob-TLC-OOBClassifiers: OLM:8273;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch01.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(4636009)(7916004)(396003)(346002)(39860400002)(376002)(136003)(46966006)(36840700001)(82310400003)(356005)(83380400001)(47076005)(186003)(426003)(36860700001)(4326008)(6916009)(336012)(26005)(53546011)(9686003)(44832011)(7636003)(33716001)(70206006)(54906003)(36906005)(2906002)(316002)(8936002)(5660300002)(70586007)(966005)(478600001)(9786002)(82740400003)(8676002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2021 19:35:42.3991
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7f0ab24e-a886-4284-240b-08d8ddb25e0b
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	CY1NAM02FT045.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR02MB7779

On Tue, 2 Mar 2021, Levenglick Dov wrote:
> Thank you.
> A few final comments below + one last question regarding the Xilinx forks:
> Xen 4.13 is first available on the 2020.1 branch. Is it required that the 2020.1 branch of linux-xlnx be used as well, or can I keep the 2019.1 branch that I am currently using?

Xilinx recommends to always use the same version everywhere, so 2020.1
for Xen, Linux, firwmare, etc.

That said, it should be no problem to use Xen 2020.1 with everything
else from 2019.1. Given that you are using dom0less, you just need to
rebuild the Xen hypervisor alone, you don't even need to update the dom0
rootfs.


> > -----Original Message-----
> > From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > Sent: Tuesday, March 2, 2021 3:42 AM
> > To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
> > Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Stefano Stabellini
> > <sstabellini@kernel.org>; Julien Grall <julien@xen.org>; Xen-
> > users@lists.xenproject.org; Wei Chen <Wei.Chen@arm.com>; Penny Zheng
> > <Penny.Zheng@arm.com>; Luca Fancellu <Luca.Fancellu@arm.com>
> > Subject: RE: Aligning Xen to physical memory maps on embedded systems
> > 
> > On Mon, 1 Mar 2021, Levenglick Dov wrote:
> > > > (+ Penny, Wei and Luca)
> > > >
> > > > > On 23 Feb 2021, at 01:52, Stefano Stabellini <sstabellini@kernel.org>
> > wrote:
> > > > >
> > > > > On Mon, 22 Feb 2021, Levenglick Dov wrote:
> > > > >>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of which
> > > > >>>> Xen and the DomU have an allocation of 1.25GB, per this memory
> > map:
> > > > >>>> 1. DomU1: 0x60000000 - 0x80000000 2. DomU2: 0x40000000 -
> > > > >>>> 0x60000000 3. Xen: 0x30000000 - 0x40000000
> > > > >>>
> > > > >>> How did you tell Xen which regions is assigned to which guests?
> > > > >>> Are your domain mapped 1:1 (i.e guest physical address == host
> > > > >>> physical
> > > > address)?
> > > > >>
> > > > >> I am working on a solution where if the "xen,domain" memory has
> > > > >> #size-cell cells the content is backward compatible. But if it
> > > > >> contains (#address-cells + #size-cells), the address cells should
> > > > >> be
> > > > considered the physical start address.
> > > > >> During the mapping of the entire address space insetup_mm(), the
> > > > >> carved out addresses would be added to the  reserved memory
> > > > >> address space. When the DomU is to be created, this physical
> > > > >> space would be mapped to it. The virtual addresses are less of an
> > > > >> issue and needn't be
> > > > mapped 1x1 (although they could be).
> > > > >
> > > > > As of today neither upstream Xen nor the Xilinx Xen tree come with
> > > > > the feature of allowing the specification of an address range for
> > > > > dom0less guests.
> > > > >
> > > > > The only thing that Xilinx Xen allows, which is not upstream yet,
> > > > > is the ability of creating dom0less guests 1:1 mapped using the "direct-
> > map"
> > > > > property. But the memory allocation is still done by Xen (you
> > > > > can't select the addresses).
> > > > >
> > > > > Some time ago I worked on a hacky prototype to allow the
> > > > > specification of address ranges, see:
> > > > >
> > > > > http://xenbits.xenproject.org/git-http/people/sstabellini/xen-unst
> > > > > able .git direct-map-2 from
> > > > > 7372466b21c3b6c96bb7a52754e432bac883a1e3
> > > > onward.
> > > > >
> > > > > In particular, have a look at "xen/arm: introduce 1:1 mapping for
> > > > > domUs". The work is not complete: it might not work depending on
> > > > > the memory ranges you select for your domUs. In particular, you
> > > > > can't select top-of-RAM addresses for your domUs. However, it
> > > > > might help you getting started.
> > > > >
> > > > >
> > > > >>>> I am able to support True Dom0-less by means of the patch/hack
> > > > >>>> demonstrated By Stefano Stabellini at
> > > > >>> https://youtu.be/UfiP9eAV0WA?t=1746.
> > > > >>>>
> > > > >>>> I was able to forcefully put the Xen binary at the address
> > > > >>>> range immediately below 0x40000000 by means of modifying
> > > > get_xen_paddr()
> > > > >>>> -
> > > > >>> in itself an ugly hack.
> > > > >>>>
> > > > >>>> My questions are:
> > > > >>>> 1. Since Xen performs runtime allocations from its heap, it is
> > allocating
> > > > >>>>    downwards from 0x80000000 - thereby "stealing" memory from
> > > > DomU1.
> > > > >>>
> > > > >>> In theory, any memory reserved for domains should have been
> > > > >>> carved out from the heap allocator. This would be sufficient to
> > > > >>> prevent Xen allocating memory from the ranges you described
> > above.
> > > > >>>
> > > > >>> Therefore, to me this looks like a bug in the tree you are using.
> > > > >>
> > > > >> This would be a better approach, but because Xen perform
> > > > >> allocations from its heap prior to allocating memory to DomU -
> > > > >> and since it allocates from the top of the heap - it is basically
> > > > >> taking memory that I
> > > > wanted to set aside for the DomU.
> > > > >
> > > > > Yeah, this is the main problem that my prototype above couldn't solve.
> > >
> > > Stephano: Is the approach that I previously described a feasible one?
> > >   1. Mark the addresses that I want to set aside as reserved
> > >   2. When reaching the proper DomU, map them and then use the mapping
> > > This approach would solve the heap issue
> > 
> > My first suggestion would be actually to let the hypervisor pick the address
> > ranges. If you don't change setup, you'll see that they are actually stable
> > across reboot. WARNING: Xen doesn't promise that they are stable;
> > however, in practice, they are stable unless you change device tree or
> > configuration or software versions.
> > 
> > That said, yes, I think your approach might work with some limitations (e.g.
> > Xen reclaiming memory on domU destruction but you probably don't care
> > about that). It could be a decent stopgap until we get a better solution.
> 
> Is DomU destruction an option on true Dom0-less? Who would be doing the destruction?

Destruction, yes. You should be able to use "xl destroy" in Dom0 already
today to destroy a dom0less domU. Pass a domid instead of domain name
(they don't have a domain name). Of course you need the xl tools in the
Xen rootfs for that, so if you are going to update Xen, then you also
need to update the Xen tools, hence the Dom0 rootfs. The Xen tools and
Xen actually need to be of the same version.

If you intend to create again a dom0less domain after destroying it
(reboot), then you need to have a config file in dom0 with the same
configuration so that you can call xl create.


From xen-users-bounces@lists.xenproject.org Wed Mar 03 07:39:09 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 03 Mar 2021 07:39:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92703.174723 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHM5M-00027p-Ga; Wed, 03 Mar 2021 07:38:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92703.174723; Wed, 03 Mar 2021 07:38:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHM5M-00027h-CP; Wed, 03 Mar 2021 07:38:20 +0000
Received: by outflank-mailman (input) for mailman id 92703;
 Wed, 03 Mar 2021 07:38:18 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=b4Tw=IB=elbitsystems.com=dov.levenglick@srs-us1.protection.inumbo.net>)
 id 1lHM5K-00027Z-NJ
 for Xen-users@lists.xenproject.org; Wed, 03 Mar 2021 07:38:18 +0000
Received: from mail1.elbitsystems.com (unknown [185.145.28.61])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 5f67b792-9674-4906-b1bd-adb8fda3b16f;
 Wed, 03 Mar 2021 07:38:17 +0000 (UTC)
Received: from unknown (HELO Router2) ([X.X.10.152]) by mail1.elbitsystems.com
 with ESMTP; 03 Mar 2021 09:38:12 +0200
Received: from DM1 (Not Verified[X.X.12.51]) by Router2 with Something New
 (v8,1,1,11276)	id <B603f3ce40002>; Wed, 03 Mar 2021 09:38:12 +0200
Received: from AH1 (unknown [X.X.12.8])	(using TLSv1.2 with cipher
 DHE-RSA-AES256-SHA256 (256/256 bits))	(No client certificate requested)	by
 Forcepoint Email with ESMTPS id 7EC55CD82576AD985816	for
 <Xen-users@lists.xenproject.org>; Wed,  3 Mar 2021 09:38:12 +0200 (IST)
Received: from Out1 ([X.X.50.252])	by AH1 with ESMTP id
 1237cCJ0013488-1237cCJ1013488; Wed, 3 Mar 2021 09:38:12 +0200
Received: from HMX13 (Not Verified[X.X.54.33]) by Out1 with Something New
 (v8,1,1,11276)	id <B603f3ce40000>; Wed, 03 Mar 2021 09:38:12 +0200
Received: from HMX23 (X.X.54.63) by HMX13 (X.X.54.33) with Microsoft SMTP
 Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.2; Wed, 3 Mar 2021 09:38:12 +0200
Received: from HMX23 ([fe80::7818:8c4:7210:4430]) by HMX23
 ([fe80::7818:8c4:7210:4430%2]) with mapi id 15.01.2176.002;
 Wed, 3 Mar 2021 09:38:12 +0200
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 5f67b792-9674-4906-b1bd-adb8fda3b16f
IronPort-SDR: xP3W+2uolWHbAPtEMNGkSRset1O3X+1Cf/zeh6JoSztMpDDjDn8w78j16SgkbPuQboNr+MrPGZ
 XyHcW6Md1aDg==
X-IPAS-Result: =?us-ascii?q?A2AgAABrPD9g/5gKEaxiGgEBAQEBAQEBAQEDAQEBARIBA?=
 =?us-ascii?q?QEBAgIBAQEBR4E3AgEBAQELAYF7gSWBQQqEN5FWA48bi0iBaAsBAQEOAR0LD?=
 =?us-ascii?q?AQBAYFYgnUCgXsmNwYOAgMBAQsBAQYBAQEBAQYEhlINhkQBAQEEASABTAsMB?=
 =?us-ascii?q?AIBCA0EBAEBAQEDCxoDAigKHQgCBAENBQgMB4JWgxaRU5sRcAGBNxoCijWBC?=
 =?us-ascii?q?y0BgWSHa4J5eoJNJoNQBy4+glwCAheBCQkBEgEoMYJbgmIEgVVxFxQmCAgDK?=
 =?us-ascii?q?ysBIC4KQAgiAhkBIwIPMwItkFqCPIg2nXIHgn+DL4YQi1eHASuBKoINgTWOf?=
 =?us-ascii?q?QOPapRVggmJNJIPLYQkAgQCBAUCFjWBNYELcE0jUIJpCUcXAocohxAWgQEBA?=
 =?us-ascii?q?oErhjKFRXM4AgYKAQEDCYsEMl0BAQ?=
From: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
To: Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	"Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>, "Penny
 Zheng" <Penny.Zheng@arm.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Subject: RE: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index: AdcIbsi89MadXehWTs+A1h4hE7ONNwAhYRqAAApfvWAAFgEugAAQvBaAATnqRTAAFQRaAAANQqMAABg8P4AAF1ImAAAGGB3g
Date: Wed, 3 Mar 2021 07:38:11 +0000
Message-ID: <79d7dadd6b0840beb35a04255914b097@elbitsystems.com>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
 <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
 <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
 <32928DB3-0698-4636-B438-262A8465B067@arm.com>
 <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
 <alpine.DEB.2.21.2103011735120.2682@sstabellini-ThinkPad-T480s>
 <ec043ced97074743bd06bb8362c4f38f@elbitsystems.com>
 <alpine.DEB.2.21.2103021126290.2682@sstabellini-ThinkPad-T480s>
 <AM0PR08MB374774AD0D6B0F0DC093095E9E989@AM0PR08MB3747.eurprd08.prod.outlook.com>
In-Reply-To: <AM0PR08MB374774AD0D6B0F0DC093095E9E989@AM0PR08MB3747.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.0.54.230]
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

Thank you all

Dov


> -----Original Message-----
> From: Wei Chen <Wei.Chen@arm.com>
> Sent: Wednesday, March 3, 2021 8:43 AM
> To: Stefano Stabellini <stefano.stabellini@xilinx.com>; Levenglick Dov
> <Dov.Levenglick@elbitsystems.com>
> Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Stefano Stabellini
> <sstabellini@kernel.org>; Julien Grall <julien@xen.org>; Xen-
> users@lists.xenproject.org; Penny Zheng <Penny.Zheng@arm.com>; Luca
> Fancellu <Luca.Fancellu@arm.com>
> Subject: RE: Aligning Xen to physical memory maps on embedded systems
>=20
> Hi,
>=20
> Sorry to reply late. This e-mail had been filtered by my e-mail client.=

> We have been working on direct mapping and static allocation for a whil=
e.
> And Penny had sent an initial version of direct mapping design document=
=20to
> mailing list in last December.
>=20
> Now, we are working on a new version design document, the new version
> design will address the feedbacks we have got from the initial version =
and
> will also include the design of static allocation. This document is nea=
ring
> completion and we will be submitting it to the community for discussion=
=20in
> the next week or two. Once we have some conclusions, we will soon be
> submitting our code to the community to collect the RFC.
>=20
> Besides, I have some comments below:
>=20
> > -----Original Message-----
> > From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > Sent: 2021=1B$BG/=1B(B3=1B$B7n=1B(B3=1B$BF|=1B(B 3:36
> > To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
> > Cc: Stefano Stabellini <stefano.stabellini@xilinx.com>; Bertrand
> > Marquis <Bertrand.Marquis@arm.com>; Stefano Stabellini
> > <sstabellini@kernel.org>; Julien Grall <julien@xen.org>;
> > Xen-users@lists.xenproject.org; Wei Chen <Wei.Chen@arm.com>; Penny
> > Zheng <Penny.Zheng@arm.com>; Luca Fancellu <Luca.Fancellu@arm.com>
> > Subject: RE: Aligning Xen to physical memory maps on embedded systems=

> >
> > On Tue, 2 Mar 2021, Levenglick Dov wrote:
> > > Thank you.
> > > A few final comments below + one last question regarding the Xilinx=

> forks:
> > > Xen 4.13 is first available on the 2020.1 branch. Is it required
> > > that the 2020.1
> > branch of linux-xlnx be used as well, or can I keep the 2019.1 branch=

> > that I am currently using?
> >
> > Xilinx recommends to always use the same version everywhere, so 2020.=
1
> > for Xen, Linux, firwmare, etc.
> >
> > That said, it should be no problem to use Xen 2020.1 with everything
> > else from 2019.1. Given that you are using dom0less, you just need to=

> > rebuild the Xen hypervisor alone, you don't even need to update the
> > dom0 rootfs.
> >
> >
> > > > -----Original Message-----
> > > > From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > > > Sent: Tuesday, March 2, 2021 3:42 AM
> > > > To: Levenglick Dov <Dov.Levenglick@elbitsystems.com>
> > > > Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Stefano
> > > > Stabellini <sstabellini@kernel.org>; Julien Grall
> > > > <julien@xen.org>; Xen- users@lists.xenproject.org; Wei Chen
> > > > <Wei.Chen@arm.com>; Penny Zheng <Penny.Zheng@arm.com>; Luca
> > > > Fancellu <Luca.Fancellu@arm.com>
> > > > Subject: RE: Aligning Xen to physical memory maps on embedded
> > > > systems
> > > >
> > > > On Mon, 1 Mar 2021, Levenglick Dov wrote:
> > > > > > (+ Penny, Wei and Luca)
> > > > > >
> > > > > > > On 23 Feb 2021, at 01:52, Stefano Stabellini
> > > > > > > <sstabellini@kernel.org>
> > > > wrote:
> > > > > > >
> > > > > > > On Mon, 22 Feb 2021, Levenglick Dov wrote:
> > > > > > >>>> The system has 2GB of RAM (0x00000000 - 0x80000000) of
> > > > > > >>>> which Xen and the DomU have an allocation of 1.25GB, per=

> > > > > > >>>> this memory
> > > > map:
> > > > > > >>>> 1. DomU1: 0x60000000 - 0x80000000 2. DomU2: 0x40000000 -=

> > > > > > >>>> 0x60000000 3. Xen: 0x30000000 - 0x40000000
> > > > > > >>>
> > > > > > >>> How did you tell Xen which regions is assigned to which g=
uests?
> > > > > > >>> Are your domain mapped 1:1 (i.e guest physical address =3D=
=3D
> > > > > > >>> host physical
> > > > > > address)?
> > > > > > >>
> > > > > > >> I am working on a solution where if the "xen,domain" memor=
y
> > > > > > >> has #size-cell cells the content is backward compatible.
> > > > > > >> But if it contains (#address-cells + #size-cells), the
> > > > > > >> address cells should be
> > > > > > considered the physical start address.
> > > > > > >> During the mapping of the entire address space
> > > > > > >> insetup_mm(), the carved out addresses would be added to
> > > > > > >> the  reserved memory address space. When the DomU is to be=

> > > > > > >> created, this physical space would be mapped to it. The
> > > > > > >> virtual addresses are less of an issue and needn't be
> > > > > > mapped 1x1 (although they could be).
> > > > > > >
> > > > > > > As of today neither upstream Xen nor the Xilinx Xen tree
> > > > > > > come with the feature of allowing the specification of an
> > > > > > > address range for dom0less guests.
> > > > > > >
> > > > > > > The only thing that Xilinx Xen allows, which is not upstrea=
m
> > > > > > > yet, is the ability of creating dom0less guests 1:1 mapped
> > > > > > > using the "direct-
> > > > map"
> > > > > > > property. But the memory allocation is still done by Xen
> > > > > > > (you can't select the addresses).
> > > > > > >
> > > > > > > Some time ago I worked on a hacky prototype to allow the
> > > > > > > specification of address ranges, see:
> > > > > > >
> > > > > > > http://xenbits.xenproject.org/git-http/people/sstabellini/x=
e
> > > > > > > n-unst
> > > > > > > able .git direct-map-2 from
> > > > > > > 7372466b21c3b6c96bb7a52754e432bac883a1e3
> > > > > > onward.
> > > > > > >
> > > > > > > In particular, have a look at "xen/arm: introduce 1:1
> > > > > > > mapping for domUs". The work is not complete: it might not
> > > > > > > work depending on the memory ranges you select for your
> > > > > > > domUs. In particular, you can't select top-of-RAM addresses=

> > > > > > > for your domUs. However, it might help you getting started.=

> > > > > > >
> > > > > > >
> > > > > > >>>> I am able to support True Dom0-less by means of the
> > > > > > >>>> patch/hack demonstrated By Stefano Stabellini at
> > > > > > >>> https://youtu.be/UfiP9eAV0WA?t=3D1746.
> > > > > > >>>>
> > > > > > >>>> I was able to forcefully put the Xen binary at the
> > > > > > >>>> address range immediately below 0x40000000 by means of
> > > > > > >>>> modifying
> > > > > > get_xen_paddr()
> > > > > > >>>> -
> > > > > > >>> in itself an ugly hack.
> > > > > > >>>>
> > > > > > >>>> My questions are:
> > > > > > >>>> 1. Since Xen performs runtime allocations from its heap,=

> > > > > > >>>> it is
> > > > allocating
> > > > > > >>>>    downwards from 0x80000000 - thereby "stealing" memory=

> > > > > > >>>> from
> > > > > > DomU1.
> > > > > > >>>
> > > > > > >>> In theory, any memory reserved for domains should have
> > > > > > >>> been carved out from the heap allocator. This would be
> > > > > > >>> sufficient to prevent Xen allocating memory from the
> > > > > > >>> ranges you described
> > > > above.
> > > > > > >>>
> > > > > > >>> Therefore, to me this looks like a bug in the tree you ar=
e using.
> > > > > > >>
> > > > > > >> This would be a better approach, but because Xen perform
> > > > > > >> allocations from its heap prior to allocating memory to
> > > > > > >> DomU - and since it allocates from the top of the heap - i=
t
> > > > > > >> is basically taking memory that I
> > > > > > wanted to set aside for the DomU.
> > > > > > >
> > > > > > > Yeah, this is the main problem that my prototype above coul=
dn't
> solve.
> > > > >
> > > > > Stephano: Is the approach that I previously described a feasibl=
e one?
> > > > >   1. Mark the addresses that I want to set aside as reserved
> > > > >   2. When reaching the proper DomU, map them and then use the
> > > > > mapping This approach would solve the heap issue
> > > >
> > > > My first suggestion would be actually to let the hypervisor pick
> > > > the address ranges. If you don't change setup, you'll see that
> > > > they are actually stable across reboot. WARNING: Xen doesn't
> > > > promise that they are stable; however, in practice, they are
> > > > stable unless you change device tree or configuration or software=

> versions.
> > > >
> > > > That said, yes, I think your approach might work with some limita=
tions
> (e.g.
> > > > Xen reclaiming memory on domU destruction but you probably don't
> > > > care about that). It could be a decent stopgap until we get a bet=
ter
> solution.
> > >
>=20
> In our new design, the user defined memory ranges for DomU and memory
> reclaiming on DomU destruction have been considered already. These are
> two features that we really want the community to discuss and get feedb=
ack
> on.
>=20
> > > Is DomU destruction an option on true Dom0-less? Who would be doing=

> > > the
> > destruction?
> >
> > Destruction, yes. You should be able to use "xl destroy" in Dom0
> > already today to destroy a dom0less domU. Pass a domid instead of
> > domain name (they don't have a domain name). Of course you need the x=
l
> > tools in the Xen rootfs for that, so if you are going to update Xen,
> > then you also need to update the Xen tools, hence the Dom0 rootfs. Th=
e
> > Xen tools and Xen actually need to be of the same version.
> >
> > If you intend to create again a dom0less domain after destroying it
> > (reboot), then you need to have a config file in dom0 with the same
> > configuration so that you can call xl create.
>=20
> Cheers,
> Wei Chen
>=20

The information in this e-mail transmission contains proprietary and busi=
ness=20
sensitive information.  Unauthorized interception of this e-mail may cons=
titute=20
a violation of law. If you are not the intended recipient, you are hereby=
=20
notified that any review, dissemination, distribution or duplication of t=
his=20
communication is strictly prohibited. You are also asked to contact the s=
ender=20
by reply email and immediately destroy all copies of the original message=
.


From xen-users-bounces@lists.xenproject.org Thu Mar 04 10:40:36 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Mar 2021 10:40:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.93103.175763 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHlOl-0006Iv-67; Thu, 04 Mar 2021 10:40:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 93103.175763; Thu, 04 Mar 2021 10:40:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHlOl-0006IG-25; Thu, 04 Mar 2021 10:40:03 +0000
Received: by outflank-mailman (input) for mailman id 93103;
 Thu, 04 Mar 2021 10:40:01 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PH3V=IC=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lHlOj-00065n-Qj
 for xen-users@lists.xen.org; Thu, 04 Mar 2021 10:40:01 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 371d9cdb-5c63-454a-9f7f-84cd4103e0dc;
 Thu, 04 Mar 2021 10:39:51 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lHlOS-0000bP-VK; Thu, 04 Mar 2021 10:39:44 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lHlOS-0000Se-RY; Thu, 04 Mar 2021 10:39:44 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 371d9cdb-5c63-454a-9f7f-84cd4103e0dc
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=my0l2403/dVXAUYLCcMAG2vIG582kdfMfEvrO9lUiLo=; b=v9RdhD+AJ/fpTm0ck/gSTXVE/S
	yPUcPnw0xBszoN8OQaV+Twztk3899MbFf0NZ3n2hK1fRVmadGWHaw3SbVd1lq9OZ7EprB8jF+C2HA
	PadLCN5HWot1YqOfN2AxT26NWyCiiscF+MjULXNcjFIKi1jflXsfZrBNQ4mEytaNvw4s=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 367 v1 - Linux: netback fails to honor
 grant mapping errors
Message-Id: <E1lHlOS-0000Se-RY@xenbits.xenproject.org>
Date: Thu, 04 Mar 2021 10:39:44 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-367

          Linux: netback fails to honor grant mapping errors

ISSUE DESCRIPTION
=================

XSA-362 tried to address issues here, but in the case of the netback
driver the changes were insufficient: It left the relevant function
invocation with, effectively, no error handling at all.  As a result,
memory allocation failures there could still lead to frontend-induced
crashes of the backend.

IMPACT
======

A malicious or buggy networking frontend driver may be able to crash
the corresponding backend driver, potentially affecting the entire
domain running the backend driver.  In a typical (non-disaggregated)
system that is a host-wide denial of service (DoS).

VULNERABLE SYSTEMS
==================

Linux versions from at least 2.6.39 onwards are vulnerable, when run in
PV mode.  Earlier versions differ significantly in behavior and may
therefore instead surface other issues under the same conditions.  Linux
run in HVM / PVH modes is not vulnerable.

MITIGATION
==========

For Linux, running the backends in HVM or PVH domains will avoid the
vulnerability.  For example, by running the dom0 in PVH mode.

In all other cases there is no known mitigation.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa367-linux.patch           Linux 5.12-rc

$ sha256sum xsa367*
b0244bfddee91cd7986172893e70664b74e698c5d44f25865870f179f80f9a92  xsa367-linux.patch
$

CREDITS
=======

This issue was reported by Intel's kernel test robot and recognized as a
security issue by Jan Beulich of SUSE.

NOTE REGARDING LACK OF EMBARGO
==============================

This issue was reported publicly, before the XSA could be issued.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmBAuOYMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZUCAH/1zw5d2l1R3k+nvJ659plwOYDe8Cmh4GeJ02PoUv
fC/5efe7l/tXEmfg4rg5WiY8JZqQGeGmhwiOs8bI/8c5IXucaPOM1wDUaHUMkWTA
tl/P/tbDamzd1/dSK4DdILTApibU+M/nmUn0sBBYpu53VUbeyXq2EAtjmliKgCG9
Oo4PW4ys5ro+hwrPtYdLD1ktIN64+C+TqkKUdJset7po5sWX4nV1Cwp/4oKaNyeF
Alh495TUCnhgc8gnXUgXhmxWKp3Iag/tHjmtu34mT5HHZdBrNBShFKhHSP5bJHE2
CxYD1b/KbkRiLPOgZXNec+ikDQT4bTCeVLpnWvOXQ1FTXR4=
=hY2s
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa367-linux.patch"
Content-Disposition: attachment; filename="xsa367-linux.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Thu Mar 04 10:59:01 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Mar 2021 10:59:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.93156.175835 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHlga-0000GU-5S; Thu, 04 Mar 2021 10:58:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 93156.175835; Thu, 04 Mar 2021 10:58:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHlga-0000GN-0X; Thu, 04 Mar 2021 10:58:28 +0000
Received: by outflank-mailman (input) for mailman id 93156;
 Thu, 04 Mar 2021 10:58:27 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PH3V=IC=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lHlgZ-0000EB-2n
 for xen-users@lists.xen.org; Thu, 04 Mar 2021 10:58:27 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 49a6fae3-d2a5-4eaf-90f4-e1164d2812c4;
 Thu, 04 Mar 2021 10:58:16 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lHlgJ-0000v8-Qb; Thu, 04 Mar 2021 10:58:11 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lHlgJ-0003KK-Ms; Thu, 04 Mar 2021 10:58:11 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 49a6fae3-d2a5-4eaf-90f4-e1164d2812c4
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=9//W9NVX0OPw4RURgTZOd9DdR5TW685wHuUJYEASpTA=; b=boeON9A0IU4UYFlMt57H2R5tPx
	/zVYJKzXqEuKmYwn5g27xheTjrHiRO7YohfblG50cUIzgFMEWZuZ4C+TcI8gI7lVcyEgwEjqhABvD
	/i3jb/HKsIJhHyIEyJYOs2bq1fkwoXwgEb6yw5fsoWM45/VARHeN7FfucR//kiIZ5nTs=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 369 v1 - Linux: special config may crash
 when trying to map foreign pages
Message-Id: <E1lHlgJ-0003KK-Ms@xenbits.xenproject.org>
Date: Thu, 04 Mar 2021 10:58:11 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-369

   Linux: special config may crash when trying to map foreign pages

ISSUE DESCRIPTION
=================

With CONFIG_XEN_BALLOON_MEMORY_HOTPLUG disabled and
CONFIG_XEN_UNPOPULATED_ALLOC enabled the Linux kernel will use guest
physical addresses allocated via the ZONE_DEVICE functionality for
mapping foreign guest's pages.

This will result in problems, as the p2m list will only cover the initial
memory size of the domain plus some padding at the end. Most ZONE_DEVICE
allocated addresses will be outside the p2m range and thus a mapping can't
be established with those memory addresses, resulting in a crash.

The attack involves doing I/O requiring large amounts of data to be
mapped by the Dom0 or driver domain.  The amount of data needed to
result in a crash can vary depending on the memory layout of the
affected Dom0 or driver domain.

IMPACT
======

A Dom0 or driver domain based on a Linux kernel (configured as
described above) can be crashed by a malicious guest administrator, or
possibly malicious unprivileged guest processes.

VULNERABLE SYSTEMS
==================

Only x86 paravirtualized (PV) Dom0 or driver domains are
affected.

Only Linux kernels configured *with* CONFIG_XEN_UNPOPULATED_ALLOC and
*without* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG are vulnerable.  Only
kernels from kernel version 5.9 onwards are affected.

CONFIG_XEN_BALLOON_MEMORY_HOTPLUG is enabled by default in upstream
Linux when Xen support is enabled, so kernels using upstream default
Kconfig are not affected.  Most distribution kernels supporting Xen
dom0 use are likewise not vulnerable.

Arm systems or x86 PVH or x86 HVM driver domains are not affected.

MITIGATION
==========

There is no mitigation available.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa369-linux.patch           Linux 5.9-stable - 5.12-rc

$ sha256sum xsa369*
937df4f078a070cf47bdd718c6b8a042ec6bee255eedc422d833c2ae3dd561c7  xsa369-linux.patch
$

CREDITS
=======

This issue was discovered by Marek Marczykowski-Górecki of Invisible
Things Lab.

For patch:
Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

NOTE REGARDING LACK OF EMBARGO
==============================

This was reported publicly multiple times, before the XSA could be
issued.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmBAvMQMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ5PoH/2EY28X1Fe+2RW5SrnAo2dZWLXeIrXQIXbsDCdlI
GKhFChUhYHJP3wLhE4F7J5SAjl48ta/gtdpbpJWXsZSS+2KIdV/dDZ3ZA6cxWFAI
DuVvqqt5O0xpF02bgTZrL1GUL8975L0O7cwtGmsIbPjVSF5UktuLS0Q1zRAiYvG9
l5Xu32nekxz2fGebMYrJTIPYNc8LOg3d+MIAE4W1u3Wj46S8yRJhyNQmsPQXZTEk
nlTp0ed8ScAt7pIZn7dbnLz8zUAQ64h2yar0UBih51kd3Bss5E4PXsS0zlXlVNfk
046nBhbFfB3dgM49NlJ3oHhiZh6dN5LpMblmGK4Tb+FJqNE=
=QwG+
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa369-linux.patch"
Content-Disposition: attachment; filename="xsa369-linux.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Thu Mar 04 14:28:15 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Mar 2021 14:28:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92991.176105 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHox9-0006Jx-3w; Thu, 04 Mar 2021 14:27:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92991.176105; Thu, 04 Mar 2021 14:27:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHox8-0006Jl-T6; Thu, 04 Mar 2021 14:27:46 +0000
Received: by outflank-mailman (input) for mailman id 92991;
 Wed, 03 Mar 2021 19:36:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lHXIU-0005Sy-AL; Wed, 03 Mar 2021 19:36:38 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lHXIP-0007X3-Qm; Wed, 03 Mar 2021 19:36:33 +0000
Received: from 54-240-197-235.amazon.com ([54.240.197.235]
 helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lHXIP-0002sj-EV; Wed, 03 Mar 2021 19:36:33 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
	MIME-Version:Date:Message-ID:From:Cc:References:To:Subject;
	bh=sDk3J6ex41e5UOfMIFRJGkpw25WoxzOov78X8K+E68k=; b=aHEncM9LyU60KAaFMrmYIgDhiF
	E9yYqh02QvUhvsQxqZKNJiY4+SSLF9tUm22UHMB5uXdtSTwc3QX0uH9r6iEYYHeFIXejsMvaouwqf
	loMV7EKupzGZ2xOSCDS+gpjsXaaW1Ff7d3ELVtOzaSPYpX56puu8ozLWtYgNO9GuXwFo=;
Subject: Re: dom0less boot two compressed kernel images out-of-memory
 work-around
To: Charles Chiou <cchiou@ambarella.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <c1b3f92388c34788b76193b70c150521@ambarella.com>
Cc: Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Ian Jackson
 <iwj@xenproject.org>, Andrew Cooper <andrew.cooper3@citrix.com>
From: Julien Grall <julien@xen.org>
Message-ID: <58aaf68f-4499-9400-6eb2-f1ad3b620c73@xen.org>
Date: Wed, 3 Mar 2021 19:36:31 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0)
 Gecko/20100101 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <c1b3f92388c34788b76193b70c150521@ambarella.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 7bit

(BCCing xen-users, CCing xen-devel + a few folks)

Hi,

Moving the discussion to xen-devel.

On 22/02/2021 05:02, Charles Chiou wrote:
> When trying to boot two zImage using dom0less boot on ARM, we encountered this problem when xen runs gunzip on second guest:
> 
> (XEN) ****************************************
> (XEN) Panic on CPU 0:
> (XEN) Out of memory
> (XEN) ****************************************
> 
> And worked around it with the following patch. We'd like to check to see if this is a known issue and if the work-around looks reasonable. Thank you

I haven't seen any similar report in the past.

> 
> 
> diff --git a/xen/common/gunzip.c b/xen/common/gunzip.c
> index db4efcd34b..e5bd19ba7f 100644
> --- a/xen/common/gunzip.c
> +++ b/xen/common/gunzip.c
> @@ -113,8 +113,10 @@ __init int perform_gunzip(char *output, char *image, unsigned long image_len)
> 
>       window = (unsigned char *)output;
> 
> +    if (!free_mem_ptr) {
>           free_mem_ptr = (unsigned long)alloc_xenheap_pages(HEAPORDER, 0);
>           free_mem_end_ptr = free_mem_ptr + (PAGE_SIZE << HEAPORDER);
> +    }
> 
>       inbuf = (unsigned char *)image;
>       insize = image_len;
> @@ -131,7 +133,12 @@ __init int perform_gunzip(char *output, char *image, unsigned long image_len)
>           rc = 0;
>       }
> 
> +    if (free_mem_ptr) {
>           free_xenheap_pages((void *)free_mem_ptr, HEAPORDER);
> +        free_mem_ptr = 0;
> +    }
> +
> +    bytes_out = 0;
> 
>       return rc;
> }
> diff --git a/xen/common/inflate.c b/xen/common/inflate.c
> index f99c985d61..de96002188 100644
> --- a/xen/common/inflate.c
> +++ b/xen/common/inflate.c
> @@ -244,7 +244,7 @@ static void *INIT malloc(int size)
> 
>       if (size < 0)
>           error("Malloc error");
> -    if (!malloc_ptr)
> +    if ((!malloc_ptr) || (!malloc_count))
>           malloc_ptr = free_mem_ptr;
> 

IMHO, this is a bit risky to assume that malloc_count will always be 0 
after each gunzip.

Instead I think, it would be better if we re-initialize the allocator 
every time. How about the following (untested):

commit e1cd2d85234c8d0aa62ad32c824a5568a57be930 (HEAD -> dev)
Author: Julien Grall <jgrall@amazon.com>
Date:   Wed Mar 3 19:27:56 2021 +0000

     xen/gunzip: Allow perform_gunzip() to be called multiple times

     Currently perform_gunzip() can only be called once because the the
     internal allocator is not fully re-initialized.

     This works fine if you are only booting dom0. But this will break when
     booting multiple using the dom0less that uses compressed kernel images.

     This can be resolved by re-initializing malloc_ptr and malloc_count
     every time perform_gunzip() is called.

     Note the latter is only re-initialized for hardening purpose as 
there is
     no guarantee that every malloc() are followed by free() (It should in
     theory!).

     Take the opportunity to check the return of alloc_heap_pages() to 
return
     an error rather than dereferencing a NULL pointer later on failure.

     Reported-by: Charles Chiou <cchiou@ambarella.com>
     Signed-off-by: Julien Grall <jgrall@amazon.com>

     ---

     This patch is candidate for Xen 4.15. Without this patch, it will 
not be
     possible to boot multiple domain using dom0less when they are using
     compressed kernel images.

diff --git a/xen/common/gunzip.c b/xen/common/gunzip.c
index db4efcd34b77..a5c2e25efc0f 100644
--- a/xen/common/gunzip.c
+++ b/xen/common/gunzip.c
@@ -114,7 +114,11 @@ __init int perform_gunzip(char *output, char 
*image, unsigned long image_len)
      window = (unsigned char *)output;

      free_mem_ptr = (unsigned long)alloc_xenheap_pages(HEAPORDER, 0);
+    if ( !free_mem_ptr )
+        return -ENOMEM;
+
      free_mem_end_ptr = free_mem_ptr + (PAGE_SIZE << HEAPORDER);
+    init_allocator();

      inbuf = (unsigned char *)image;
      insize = image_len;
diff --git a/xen/common/inflate.c b/xen/common/inflate.c
index f99c985d6135..d8c28a3e9593 100644
--- a/xen/common/inflate.c
+++ b/xen/common/inflate.c
@@ -238,6 +238,12 @@ STATIC const ush mask_bits[] = {
  static unsigned long INITDATA malloc_ptr;
  static int INITDATA malloc_count;

+static void init_allocator(void)
+{
+    malloc_ptr = free_mem_ptr;
+    malloc_count = 0;
+}
+
  static void *INIT malloc(int size)
  {
      void *p;

Best regards,

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Thu Mar 04 14:28:16 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 04 Mar 2021 14:28:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.92701.176095 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHox8-0006JF-IU; Thu, 04 Mar 2021 14:27:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 92701.176095; Thu, 04 Mar 2021 14:27:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lHox8-0006J7-F9; Thu, 04 Mar 2021 14:27:46 +0000
Received: by outflank-mailman (input) for mailman id 92701;
 Wed, 03 Mar 2021 06:43:49 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=9BJt=IB=arm.com=wei.chen@srs-us1.protection.inumbo.net>)
 id 1lHLEb-0005en-GS
 for Xen-users@lists.xenproject.org; Wed, 03 Mar 2021 06:43:49 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (unknown
 [40.107.8.85]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 6caa4181-bff7-4a2d-adfd-86a53be57a26;
 Wed, 03 Mar 2021 06:43:46 +0000 (UTC)
Received: from AM5PR04CA0019.eurprd04.prod.outlook.com (2603:10a6:206:1::32)
 by AM6PR08MB4456.eurprd08.prod.outlook.com (2603:10a6:20b:b3::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Wed, 3 Mar
 2021 06:43:35 +0000
Received: from VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:1:cafe::8c) by AM5PR04CA0019.outlook.office365.com
 (2603:10a6:206:1::32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend
 Transport; Wed, 3 Mar 2021 06:43:35 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT058.mail.protection.outlook.com (10.152.19.86) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3890.19 via Frontend Transport; Wed, 3 Mar 2021 06:43:34 +0000
Received: ("Tessian outbound 1ad67edf7b2b:v71");
 Wed, 03 Mar 2021 06:43:34 +0000
Received: from c80067150269.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 9637454E-8AC4-4F67-80B3-FD9E8E8CFC8D.1; 
 Wed, 03 Mar 2021 06:43:29 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id c80067150269.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 03 Mar 2021 06:43:29 +0000
Received: from AM0PR08MB3747.eurprd08.prod.outlook.com (2603:10a6:208:105::24)
 by AM4PR08MB2867.eurprd08.prod.outlook.com (2603:10a6:205:b::12) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.41; Wed, 3 Mar
 2021 06:43:27 +0000
Received: from AM0PR08MB3747.eurprd08.prod.outlook.com
 ([fe80::158a:5405:59b6:e0a8]) by AM0PR08MB3747.eurprd08.prod.outlook.com
 ([fe80::158a:5405:59b6:e0a8%6]) with mapi id 15.20.3912.017; Wed, 3 Mar 2021
 06:43:27 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 6caa4181-bff7-4a2d-adfd-86a53be57a26
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xI6UtKUTZC+OhZaiMSNC6wKyJNsIAIYEBmiBJt7N7Qk=;
 b=rF/XNIoNtw0fGip3k6rb91zmFiT+yHEjHRl6Baz8mEEv84JWjoKX6Qh8CPP4w87aqi7B3Q9nFI9ZERZNszTDy7JlEUhZgHbgMlqeGIw/C/VrEo7GDOFQXYL5YZpwwMy0X0pIWBBYSgy/7tDc4h+bnxOWpdEXNUlyckG550wIhuk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CBv3oS3Fh4mV3/VtllXUwfgIDtMuTwQkWXFGvWgItbo3T+vfSv3yMsJDELdqkawc5IFZ4FpT12q4ELUrHU5J7dWLqMLH1OBL4+ySvd1ZPHwCER4rv+S1145XXQGz3ygIG3gZuSmbo9AQsBK891oNEbfhvHstci3iAs0yQTiZPI6FUPpYTqC4RIPjHoBPFA+jvUr8nDNi/1CNEdWCeM9lL7OfuPpinky6Hnv6t5svBnWed61dy2UiWi75yCaUkiHiTJgao9pBXIUhdQ6arBBqo1YWl8RbMbhiTAvpLas0TgUq9Sf8YLfMj/+2UNf2zDZqpq8zoSqstS2ZAHF7W+09bA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xI6UtKUTZC+OhZaiMSNC6wKyJNsIAIYEBmiBJt7N7Qk=;
 b=GhpsOG/iYbfijnuJWaYr5SGl+dWRlmquAQWhrlm7i2SWtf9Og4KPo5sW5FH2g56cqhO3fqDq6t+J2YbTIrue4tJsiaRYj2mquFDUXOdP+rgIR2xVZoaLYXP/PDSibbo1yy+5rGqbsTX9JlptjCGl9+EgYoQNKwDZcfHiaPdVUpADMd3RcMCReFatnD2zXDXVvKpryPe2pCEXK6+c7qFC38XHAS5/TIWWqKe1LU52sn8IIaC/saaSh+AL129DYTC5dUm2Jbao/bYvzte5BYOVWUa5My32cze7ysxZcyTTY2G3wUjR00APaVEuJ31vNrJn0gWz5/JqRxxCV2cENLnCHQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xI6UtKUTZC+OhZaiMSNC6wKyJNsIAIYEBmiBJt7N7Qk=;
 b=rF/XNIoNtw0fGip3k6rb91zmFiT+yHEjHRl6Baz8mEEv84JWjoKX6Qh8CPP4w87aqi7B3Q9nFI9ZERZNszTDy7JlEUhZgHbgMlqeGIw/C/VrEo7GDOFQXYL5YZpwwMy0X0pIWBBYSgy/7tDc4h+bnxOWpdEXNUlyckG550wIhuk=
From: Wei Chen <Wei.Chen@arm.com>
To: Stefano Stabellini <stefano.stabellini@xilinx.com>, Levenglick Dov
	<Dov.Levenglick@elbitsystems.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	"Xen-users@lists.xenproject.org" <Xen-users@lists.xenproject.org>, Penny
 Zheng <Penny.Zheng@arm.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Subject: RE: Aligning Xen to physical memory maps on embedded systems
Thread-Topic: Aligning Xen to physical memory maps on embedded systems
Thread-Index:
 AdcIbsi89MadXehWTs+A1h4hE7ONNwAlkfyAAAaxfAAAGa9vgAAQu/AAATXyAAAAGPzFAAAJUKKAABwuQIAAFfcMQA==
Date: Wed, 3 Mar 2021 06:43:26 +0000
Message-ID:
 <AM0PR08MB374774AD0D6B0F0DC093095E9E989@AM0PR08MB3747.eurprd08.prod.outlook.com>
References: <9017182c5f5c42478d3251dcbba47bda@elbitsystems.com>
 <56319d7f-39dd-097e-2557-f55b4d5fd5b3@xen.org>
 <0b72f12c7f2e41b1874892f9a939ddee@elbitsystems.com>
 <alpine.DEB.2.21.2102221736590.3234@sstabellini-ThinkPad-T480s>
 <32928DB3-0698-4636-B438-262A8465B067@arm.com>
 <85b4a63467c0468583a24ab3858cb97f@elbitsystems.com>
 <alpine.DEB.2.21.2103011735120.2682@sstabellini-ThinkPad-T480s>
 <ec043ced97074743bd06bb8362c4f38f@elbitsystems.com>
 <alpine.DEB.2.21.2103021126290.2682@sstabellini-ThinkPad-T480s>
In-Reply-To: <alpine.DEB.2.21.2103021126290.2682@sstabellini-ThinkPad-T480s>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 19A43CE7D29194448F07AB2CFB571F52.0
x-checkrecipientchecked: true
Authentication-Results-Original: xilinx.com; dkim=none (message not signed)
 header.d=none;xilinx.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [203.126.0.112]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 623b131b-3b00-4831-9001-08d8de0fab18
x-ms-traffictypediagnostic: AM4PR08MB2867:|AM6PR08MB4456:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB4456411335AC18094E5F8E3B9E989@AM6PR08MB4456.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8273;OLM:8273;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3747.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(346002)(396003)(376002)(39840400004)(136003)(366004)(86362001)(66476007)(478600001)(316002)(66446008)(53546011)(66946007)(76116006)(6506007)(64756008)(8676002)(71200400001)(66556008)(110136005)(26005)(8936002)(33656002)(7696005)(966005)(54906003)(55016002)(9686003)(4326008)(83380400001)(2906002)(5660300002)(186003)(52536014);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?gb2312?B?cC93bUIxazhvS2ZBcTRvaHM1cFUwRjg4RnFtNHpFanFmWWZmdUpuTDFnQTZm?=
 =?gb2312?B?Y1RZSnFmdGdzV2NpaEZTb3NvRE90OGJIUG5Sejk4T3FnOHlnSkNXVVp4bWta?=
 =?gb2312?B?cXp4bEQ5YjFNaGNvTGRvTGRRMXJjZisvbWdkWWZWV3kySXRCaWdkR0FvZW1O?=
 =?gb2312?B?MW1iOGFtWFVJdzdOWFlsWGUwdTRzZ2NIL0lDY1Bja01sbDh3N3EvbEdHUlJF?=
 =?gb2312?B?WkNtbGpIZmNFQ21aZHFxSnFKNVFmZG00dFlSNXpkU0wvNktXbFlFR282cjlk?=
 =?gb2312?B?WWpwd0lKcFlUaWFrcDhSdzRlMEZ1ZnJjbW52cUxlN0ZDNjNFMnljSks1Tmpj?=
 =?gb2312?B?NkRwTjlocTVoNm1yd2UyckE3ejVML2JBdnhWWndFeGRNK1dST0dJdTdGcnRh?=
 =?gb2312?B?dGIyRko1VWpsL3JmVUxyVTFycUJXdnpIb1ZnYWwrS0tNVlprWFQ4ckRiWkRJ?=
 =?gb2312?B?aFQvb1dtU3oxTDI2Ym5iY2VtMVdxRUpmVjFXZ3JTZ3R1K1VldVkrYU05dmZ5?=
 =?gb2312?B?VDNQVFd0L0d6OGo1cm9NL2twODhzVUJZeHA3eTJzNkNZNzBkY1lyMnJMZVN4?=
 =?gb2312?B?Q1BHUjNFSDNCVnZSS2tEZVZ6YVVGdDRrL0IzbTArRnhuUlAyQ0M4RWFraTh5?=
 =?gb2312?B?b0d0RnNidXhJT0JPbk0wcEN2THJINmhFN3lBMVVaS2JHWWluYkdZUnVvVXVt?=
 =?gb2312?B?QlpuWWxJLzhrdWZ1VzdhdXVweWRtR2lTQ3BFTXdNZXJDeUNWNFpkcE04SVg1?=
 =?gb2312?B?WVp0V05CTVh0eVlTdktySEN1NVplYmVMQnZBK0JBaldjT1RUdlk3VEZKS1lv?=
 =?gb2312?B?S24xSEZ0Ny94RTVGV0pXTGZYSjhFSjFPYzZuVlh5NzNGTGhVaDB5MUdLY1RM?=
 =?gb2312?B?UVJkcnRCRFN4V0ZWOE1tWmpLaGlkY241ZWNsNitETzFLb3R0VUVJSExaNXJ5?=
 =?gb2312?B?bFYwcy9HVFlMYUF1RjJVb0pqejBMQWN3OHlmYlNvUGQzSTBzdm5Yd2M1a2Fi?=
 =?gb2312?B?QnpnOGp5OGxRU201VkhDSDFMSDQ3blEwTmlUV3NQQ004c3p5QnIzK2xseFVW?=
 =?gb2312?B?b3ZPU0lFRDlYd2tZWU04ZWtHeUpiVTRBNEg3OUNpVHNVS1dUU3dqTml2SU0r?=
 =?gb2312?B?ZXVjSzBST3Vod3lkM0pWK3E1OEp1bGxEZllhellnQWtaYXJiUnhYQ2RRN2dt?=
 =?gb2312?B?NjR2Uy9vaGVWNXdHWnVPOEk2SGs2eTh4VHlLdk5rSEFLZXcxZkNuMDkyU1RU?=
 =?gb2312?B?L3hSWkkyamVBeVRXbFNxRFRPWkp0bmgyYURPaXlxSTRmcjA0NmkwV0hQQXJL?=
 =?gb2312?B?L05YOTMyWXpnczJtSlE3aDBGUjB2Q2NIZGNIK3Z1T2VxNlp0SVQ5MFFJNkVt?=
 =?gb2312?B?OTFybTUyR1JBc0h1YWh6VkpVVEFJWU1FTXUvUzZiRXl2a0VFblBEZjZpTGFS?=
 =?gb2312?B?bEhGOW85R1NxVVlDSXdYWVpuWXpKamtZdVk2VVVjSVcxU2M5cmxab2RyNllt?=
 =?gb2312?B?V3dkMEQwcTE2b3EzaFA2ZHJ3K0doL0MzMU9JRFJiL0psS3E1YnJXWDJ6N1ZC?=
 =?gb2312?B?QVY4RFoyTmhDNnIrNENSUkJHbzNGRndyTGpMeDc5ZU9UWnZQOTJMUlJCRi9H?=
 =?gb2312?B?RDBhRUY5RVROeDE3Y05ncWJrZGFtSmxKQm1STFJpdVJ1K29ma3lTa1o3UExt?=
 =?gb2312?B?VTZWaEhKZ3J4ZHdrUXJmSkhEWHl5ZmxiUUhzM0tqdXJXVFNjVVhRZ2wxUlM2?=
 =?gb2312?Q?hwn5ij3arXlIImpgkkVHRpdaKqstRXLrCOMXFun?=
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR08MB2867
Original-Authentication-Results: xilinx.com; dkim=none (message not signed)
 header.d=none;xilinx.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	8b38c054-7e05-455e-ba47-08d8de0fa6ce
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	e1RSiCNGiR2gfimw0cZn7htPZsLulvuyawUDTZb2uQIUqeSZi6Sd73ZAzVCrezRkROQyCUC8mA34X0gUfkaRe3xADk6Y9rIAv8ORXr+2LLH3a4+yA/LwjyuAd4dE3HiEcYrxMFEx7eY8CvML06yzQUey/NTqrFlrDuirnGgB/odiOLt5cVCHwLBU89blat9P+l/HOTiGnFyIkA4qGCW6ozpCft3cygUdbkH3/FgQkbFQhrqqkYV6i4fb5IWLEaN1Xi38IOOg1oM56EaAGeJha7v111FpFKzwXi2V/E7L7MCxTc6XCjuRWDf7U5HvAGYqASquA5tFbqvPGJPk9PvqarwbY76ao0T6dzLsykzY9e0vXOwHmN9GQSZzkDwLs2PZZso18od66Y3ANMJEF6TYZKGqrdSkD4PJI57Y1mr+B8F/YXhKvIbpuGzcccRhu4xJkmN7tEY7eBtBIgg4mCYGPTuV43RYpXvGuU1okWBUU+VStNLN83+bIMRKIKKfgAbs020cyX9FKXO6Y7T+mqFIimNBKM89UWOHq2sSklB3CKCRxL7GQjLbpuGZu9c/F7wZmBza/tqPci7uub1dLrjE6LoN1jc+0a8QEBQPg5w96DgdaEl+VPDcPZ6G26dM1CEy9q3YKCytfrikVWc7G8dDopG04ywYXLLpYtLO49TJFIO7WhP9ZxU5jSi5LU6FW2dBYI7rjTuWhbDm4KQapDDciv5L3zE5IZ03pTvo/JIPTDA=
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(136003)(396003)(346002)(39840400004)(376002)(36840700001)(46966006)(6506007)(86362001)(2906002)(4326008)(55016002)(9686003)(316002)(33656002)(7696005)(53546011)(110136005)(54906003)(966005)(52536014)(5660300002)(70586007)(336012)(186003)(70206006)(8936002)(478600001)(83380400001)(26005)(47076005)(81166007)(356005)(36860700001)(82310400003)(8676002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2021 06:43:34.7625
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 623b131b-3b00-4831-9001-08d8de0fab18
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4456
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From xen-users-bounces@lists.xenproject.org Fri Mar 05 17:08:37 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Mar 2021 17:08:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.93919.177449 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lIDvr-0008DJ-7o; Fri, 05 Mar 2021 17:08:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 93919.177449; Fri, 05 Mar 2021 17:08:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lIDvr-0008DB-3D; Fri, 05 Mar 2021 17:08:07 +0000
Received: by outflank-mailman (input) for mailman id 93919;
 Fri, 05 Mar 2021 17:08:06 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=uVyW=ID=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lIDvq-0008Bc-Ee
 for xen-users@lists.xen.org; Fri, 05 Mar 2021 17:08:06 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 0a23bac4-c977-4ec3-b76a-846840fe1beb;
 Fri, 05 Mar 2021 17:07:55 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lIDvZ-0002pj-SS; Fri, 05 Mar 2021 17:07:49 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lIDvZ-0006Cd-QZ; Fri, 05 Mar 2021 17:07:49 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 0a23bac4-c977-4ec3-b76a-846840fe1beb
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=CL5PKWaZCv3kmSVfNkNFDGXqsmxIRvBTHwUcV6+gMtE=; b=HgZjDX/XM1XUUawK5lHjJsmDSz
	v4206n3lSNN0bumuAijuvL0OTaJSPMWrHu5aPBpz0lak7irCUqNBN0hIwpGTlwQqRvnwJSBuvRnM6
	YQ7J09RJlEJBTqE0D9c6ZAKU+UHCjmNyoI8ZCASL69VFe2n0hBUZ/nbG9V0rm7IWoZss=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 367 v2 (CVE-2021-28038) - Linux: netback
 fails to honor grant mapping errors
Message-Id: <E1lIDvZ-0006Cd-QZ@xenbits.xenproject.org>
Date: Fri, 05 Mar 2021 17:07:49 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-28038 / XSA-367
                              version 2

          Linux: netback fails to honor grant mapping errors

UPDATES IN VERSION 2
====================

CVE assigned.

ISSUE DESCRIPTION
=================

XSA-362 tried to address issues here, but in the case of the netback
driver the changes were insufficient: It left the relevant function
invocation with, effectively, no error handling at all.  As a result,
memory allocation failures there could still lead to frontend-induced
crashes of the backend.

IMPACT
======

A malicious or buggy networking frontend driver may be able to crash
the corresponding backend driver, potentially affecting the entire
domain running the backend driver.  In a typical (non-disaggregated)
system that is a host-wide denial of service (DoS).

VULNERABLE SYSTEMS
==================

Linux versions from at least 2.6.39 onwards are vulnerable, when run in
PV mode.  Earlier versions differ significantly in behavior and may
therefore instead surface other issues under the same conditions.  Linux
run in HVM / PVH modes is not vulnerable.

MITIGATION
==========

For Linux, running the backends in HVM or PVH domains will avoid the
vulnerability.  For example, by running the dom0 in PVH mode.

In all other cases there is no known mitigation.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa367-linux.patch           Linux 5.12-rc

$ sha256sum xsa367*
b0244bfddee91cd7986172893e70664b74e698c5d44f25865870f179f80f9a92  xsa367-linux.patch
$

CREDITS
=======

This issue was reported by Intel's kernel test robot and recognized as a
security issue by Jan Beulich of SUSE.

NOTE REGARDING LACK OF EMBARGO
==============================

This issue was reported publicly, before the XSA could be issued.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmBCZVEMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZfqAH/i7ypTUP90UIxeyMB9XmNRiqD+LaTSBExt8xTowd
zbsWrxFYnZRPSLqs/dVHlDQfF65eD40Agh/Hxp5f0hGHjv8x1kepvpo2di1ovA2h
C8/WpOK2nFq77/GTG2mAsJA3ltDF0WJsr5oqaBNVf/lwQSmiescTWtI6+LDFmmpd
q1EyKPUClKZW3PoZkCVmiWDtqhVJc3LaJJcy4x/Zd4EgV+uGi2wsYsiQzObrwPss
2D5laUr8RJcSTE7+bXlMA8KnzrOZ6UqK1YIPSGIYBOJnhizGf9CBZCxcNTONWQFC
zh1d9GAv93fugE37xRHE7PRjgl/RVO5rn0k5EQw5GTa676A=
=GKdV
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa367-linux.patch"
Content-Disposition: attachment; filename="xsa367-linux.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Fri Mar 05 17:08:37 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 05 Mar 2021 17:08:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.93923.177493 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lIDw6-0008NP-9S; Fri, 05 Mar 2021 17:08:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 93923.177493; Fri, 05 Mar 2021 17:08:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lIDw6-0008NE-5U; Fri, 05 Mar 2021 17:08:22 +0000
Received: by outflank-mailman (input) for mailman id 93923;
 Fri, 05 Mar 2021 17:08:21 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=uVyW=ID=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lIDw5-0008Bc-F3
 for xen-users@lists.xen.org; Fri, 05 Mar 2021 17:08:21 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id bba8bc0d-d8fe-4eec-91df-9b8f16d0d13c;
 Fri, 05 Mar 2021 17:07:57 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lIDvd-0002py-5g; Fri, 05 Mar 2021 17:07:53 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lIDvd-0006DY-2i; Fri, 05 Mar 2021 17:07:53 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: bba8bc0d-d8fe-4eec-91df-9b8f16d0d13c
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=pcs0J1LGYyWD7P7XSVjGHJrS5z474WyVnONCbcRttWs=; b=gbcqdpYStqyx7Nyz9vVFGxyCHM
	GUAajoYTHYe6983ylwOH7tzRQYsmpeh2+hDukRcJbIWUg/9VsWCXReZIND0B09e4HHFzqVcDOvFer
	cWQWwLMdgKjff9Tx+zaH6Uh3p7KyfExg0oFNPCbtJAEHSbtWtzqqbOEg7U++t7a/DiGw=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special
 config may crash when trying to map foreign pages
Message-Id: <E1lIDvd-0006DY-2i@xenbits.xenproject.org>
Date: Fri, 05 Mar 2021 17:07:53 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-28039 / XSA-369
                              version 2

   Linux: special config may crash when trying to map foreign pages

UPDATES IN VERSION 2
====================

CVE assigned.

ISSUE DESCRIPTION
=================

With CONFIG_XEN_BALLOON_MEMORY_HOTPLUG disabled and
CONFIG_XEN_UNPOPULATED_ALLOC enabled the Linux kernel will use guest
physical addresses allocated via the ZONE_DEVICE functionality for
mapping foreign guest's pages.

This will result in problems, as the p2m list will only cover the initial
memory size of the domain plus some padding at the end. Most ZONE_DEVICE
allocated addresses will be outside the p2m range and thus a mapping can't
be established with those memory addresses, resulting in a crash.

The attack involves doing I/O requiring large amounts of data to be
mapped by the Dom0 or driver domain.  The amount of data needed to
result in a crash can vary depending on the memory layout of the
affected Dom0 or driver domain.

IMPACT
======

A Dom0 or driver domain based on a Linux kernel (configured as
described above) can be crashed by a malicious guest administrator, or
possibly malicious unprivileged guest processes.

VULNERABLE SYSTEMS
==================

Only x86 paravirtualized (PV) Dom0 or driver domains are
affected.

Only Linux kernels configured *with* CONFIG_XEN_UNPOPULATED_ALLOC and
*without* CONFIG_XEN_BALLOON_MEMORY_HOTPLUG are vulnerable.  Only
kernels from kernel version 5.9 onwards are affected.

CONFIG_XEN_BALLOON_MEMORY_HOTPLUG is enabled by default in upstream
Linux when Xen support is enabled, so kernels using upstream default
Kconfig are not affected.  Most distribution kernels supporting Xen
dom0 use are likewise not vulnerable.

Arm systems or x86 PVH or x86 HVM driver domains are not affected.

MITIGATION
==========

There is no mitigation available.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa369-linux.patch           Linux 5.9-stable - 5.12-rc

$ sha256sum xsa369*
937df4f078a070cf47bdd718c6b8a042ec6bee255eedc422d833c2ae3dd561c7  xsa369-linux.patch
$

CREDITS
=======

This issue was discovered by Marek Marczykowski-Górecki of Invisible
Things Lab.

For patch:
Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

NOTE REGARDING LACK OF EMBARGO
==============================

This was reported publicly multiple times, before the XSA could be
issued.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmBCZVUMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZp8wIALvuzrh0iQDIg86Mx/eTtfVflmrz91YiDPfhrDj1
L1D2lR+uFPKFpb3CdDTlzKoby/1ym4wbTLCjnDdXxjmPTdn4KybcBNbNONt2p69X
dr/3KsO6yW5tjSi3FRZnnyTnTJN/q65tijG23sAcF7KuNW+xT2d70tWMH+LeMQZO
fGkztK08cZspFfZZiOJHuqi5qpzoaBw7/vqlCphoiDMeE1EOGpaa/+bGb4doehyj
dN8dyEWbyWdTp5lAxmduJfDMuixeESIxPnXP8jV3Z9b+Gt5l9S0cM+DCWDRUkW3M
W0Z7va35sFLCx4+N7fLuzMUkzoLWpTJq2i2m9lploexe3nY=
=PtNk
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa369-linux.patch"
Content-Disposition: attachment; filename="xsa369-linux.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Wed Mar 10 13:29:14 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Mar 2021 13:29:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.96048.181506 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lJyso-00039j-3v; Wed, 10 Mar 2021 13:28:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 96048.181506; Wed, 10 Mar 2021 13:28:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lJysn-00039b-WB; Wed, 10 Mar 2021 13:28:13 +0000
Received: by outflank-mailman (input) for mailman id 96048;
 Wed, 10 Mar 2021 13:28:12 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ABRc=II=gmail.com=a9121431@srs-us1.protection.inumbo.net>)
 id 1lJysm-00039W-OW
 for xen-users@lists.xen.org; Wed, 10 Mar 2021 13:28:12 +0000
Received: from mail-lf1-x134.google.com (unknown [2a00:1450:4864:20::134])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 4bd75b76-5923-4bc9-8a4d-da765e0a0a34;
 Wed, 10 Mar 2021 13:28:11 +0000 (UTC)
Received: by mail-lf1-x134.google.com with SMTP id q25so33414428lfc.8
 for <xen-users@lists.xen.org>; Wed, 10 Mar 2021 05:28:11 -0800 (PST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 4bd75b76-5923-4bc9-8a4d-da765e0a0a34
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:from:date:message-id:subject:to;
        bh=a9xCKrGJzAWqq7HzTd0WYaFbAlqdZ6zNT4pj1t5dua4=;
        b=ABxuWjwo1gG72eQzWSq4YIYJ6Tf1lng1FjVkw/AsLbJqAzI6W23Um4kObJYGrcL0J/
         UNPqTd4CMTtlZXE8QDcgQIRL35a/Ia+hPWglFS/neyE2AeM83O83QVidYlpW0KTIflaA
         66VKMtPiLp0RzDeRk3yh0F1mTSrTT9AjnE7sZ3eCwJDlRsLwt5QRtNTDB+YypTCA/qHi
         d7jfwBaUVuVmmf9O31Jk5hENrcw7zbq/qlECr0V2ecP8I0JEoYNsgUHHd8vtY2c6nlQq
         ByC4d9sXj7rlC34sw4QvZWupVMewMk2gCPRJtKZgDDG1sjovU4h1nZVxcYn+L1MkSvSX
         MRpA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=a9xCKrGJzAWqq7HzTd0WYaFbAlqdZ6zNT4pj1t5dua4=;
        b=WUkHpAms5m6yGyw49xqhjPKadEBK8Wpmx0znfGStnlpW6blL5ng6OLN58KRH1o51e9
         f5IWFSuVO8fuDBHZkvKQn6Zlxqa5T93MiJuwvzenFdgaHkEygBCIJJmZXVriul/XhC5w
         C/3tcHhYOCsws/s4d5PH0trpRgGpj1m3wN4qCs3VT08A5AwWsZqWauYvkrB5fTVRV8W9
         qARQ2O40BQK1xAR+Mw27mwgfy78+pJ4e1wylJs+bAUsK6Lg8akbHMh9bFen91MjGVPX6
         WQJuo7tPwh5WCMvXkVkd1rRWAG4T4XmosW5x9d2kIRMgZGjiSEEw/eR0dxR8is8ao5v5
         G0OA==
X-Gm-Message-State: AOAM533Qu9rXaz2YAvoFoMrpnY1P3Rn59CR0fxX/h4bjWBA1dXbQxI/h
	8B2zmmjvFKYIxHkhCRrzfqhvReWVXMGjEUi3tsJ7msQJ
X-Google-Smtp-Source: ABdhPJyD8pXDH2+70DxyJ9AP/lI9JvPxPAvnscP9cJ0GrcrfxCI2sr525ErkJz48yM3uun7D+gMnNwmxPVgn1xv4/E4=
X-Received: by 2002:a19:818f:: with SMTP id c137mr1929940lfd.245.1615382890467;
 Wed, 10 Mar 2021 05:28:10 -0800 (PST)
MIME-Version: 1.0
From: John Mok <a9121431@gmail.com>
Date: Wed, 10 Mar 2021 21:27:57 +0800
Message-ID: <CALYzA8EAzX-b2WpHCQ6daOz62n6Jufag-iJUnBsUGM1HVDTRag@mail.gmail.com>
Subject: OVMF Secure Boot on Xen HVM
To: xen-users@lists.xen.org
Content-Type: multipart/alternative; boundary="0000000000005cd45b05bd2ea33b"

--0000000000005cd45b05bd2ea33b
Content-Type: text/plain; charset="UTF-8"

Hi all,

https://wiki.debian.org/SecureBoot/VirtualMachine

Xen 4.15 on Debian Bullseye can use OVMF SecureBoot, like
OVMF_CODE_SecBoot.fd ?

How to make the guest config ?

Thanks a lot.

John Mok

--0000000000005cd45b05bd2ea33b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Hi all,<div dir=3D"auto"><br></div><div dir=3D"auto"><a h=
ref=3D"https://wiki.debian.org/SecureBoot/VirtualMachine">https://wiki.debi=
an.org/SecureBoot/VirtualMachine</a><br></div><div dir=3D"auto"><br></div><=
div dir=3D"auto">Xen 4.15 on Debian Bullseye can use OVMF SecureBoot, like =
OVMF_CODE_SecBoot.fd ?<br></div><div dir=3D"auto"><br></div><div dir=3D"aut=
o">How to make the guest config ?</div><div dir=3D"auto"><br></div><div dir=
=3D"auto">Thanks a lot.</div><div dir=3D"auto"><br></div><div dir=3D"auto">=
John Mok</div></div>

--0000000000005cd45b05bd2ea33b--


From xen-users-bounces@lists.xenproject.org Wed Mar 10 14:01:37 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Mar 2021 14:01:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.96082.181586 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lJzOY-0007H8-70; Wed, 10 Mar 2021 14:01:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 96082.181586; Wed, 10 Mar 2021 14:01:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lJzOY-0007H0-3Z; Wed, 10 Mar 2021 14:01:02 +0000
Received: by outflank-mailman (input) for mailman id 96082;
 Wed, 10 Mar 2021 13:59:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lJzNN-0006Nu-Rw
 for xen-users@lists.xenproject.org; Wed, 10 Mar 2021 13:59:49 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lJzNN-00033T-QD
 for xen-users@lists.xenproject.org; Wed, 10 Mar 2021 13:59:49 +0000
Received: from iwj (helo=mariner.uk.xensource.com)
 by xenbits.xenproject.org with local-bsmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lJzNN-0006Oi-Ms
 for xen-users@lists.xenproject.org; Wed, 10 Mar 2021 13:59:49 +0000
Received: from iwj by mariner.uk.xensource.com with local (Exim 4.89)
 (envelope-from <iwj@xenproject.org>)
 id 1lJzNJ-0006Ma-2W; Wed, 10 Mar 2021 13:59:45 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Subject:CC:To:Date:Message-ID:
	Content-Transfer-Encoding:Content-Type:MIME-Version:From;
	bh=q8OwsW3WlNB1U1E47WtbBFhdXqcGgmgEv3iFeYC72U4=; b=IjC1H7RbJRt3cKLcgywKOVV4d4
	MF7NzgThabkzAsdJS6oHG1a4VYh8DJCIOsUuupVYS08glWpiP/O3tk4Yl8NQY05I3XVojJvQbFASB
	UQJt0R9/V7/rzB8bJVj5wGO+HB1VcPHIHR2Thd1aAbCLbw7OxdrCxhCj1IknansukNS0=;
From: Ian Jackson <iwj@xenproject.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <24648.53456.877705.383162@mariner.uk.xensource.com>
Date: Wed, 10 Mar 2021 13:59:44 +0000
To: xen-announce@lists.xenproject.org
CC: xen-devel@lists.xenproject.org,
    xen-users@lists.xenproject.org
Subject: Xen 4.15 RC2

Xen 4.15 RC2 is now available.

It is available from git:
  git clone https://xenbits.xenproject.org/git-http/xen.git -b 4.15.0-rc2

For your convenience a tarball is available:
  https://downloads.xenproject.org/release/xen/4.15.0-rc2/xen-4.15.0-rc2.tar.gz
  https://downloads.xenproject.org/release/xen/4.15.0-rc2/xen-4.15.0-rc2.tar.gz.sig

Please send bug reports and test reports to
xen-devel@lists.xenproject.org.  When sending bug reports, please CC
relevant maintainers and me (iwj@xenproject.org).

Sorry for the lateness of this RC, which I originally intended to be
available this last Monday.  I hope to resume the schedule with RC3
this coming Monday.

There are still some important fixes and docs changes outstanding.

Ian.


From xen-users-bounces@lists.xenproject.org Wed Mar 10 14:35:17 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 10 Mar 2021 14:35:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.96132.181647 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lJzut-0002N8-Pq; Wed, 10 Mar 2021 14:34:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 96132.181647; Wed, 10 Mar 2021 14:34:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lJzut-0002N1-Lv; Wed, 10 Mar 2021 14:34:27 +0000
Received: by outflank-mailman (input) for mailman id 96132;
 Wed, 10 Mar 2021 14:34:26 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=K0VR=II=arm.com=bertrand.marquis@srs-us1.protection.inumbo.net>)
 id 1lJzus-0002Mw-4m
 for xen-users@lists.xenproject.org; Wed, 10 Mar 2021 14:34:26 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (unknown
 [40.107.7.85]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id bf33cb49-a40f-4732-b680-44f3f29ce770;
 Wed, 10 Mar 2021 14:34:24 +0000 (UTC)
Received: from MR2P264CA0170.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501::9) by
 DB6PR0801MB1751.eurprd08.prod.outlook.com (2603:10a6:4:2e::12) with Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3912.17; Wed, 10 Mar 2021 14:34:22 +0000
Received: from VE1EUR03FT004.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:501:0:cafe::f4) by MR2P264CA0170.outlook.office365.com
 (2603:10a6:501::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.18 via Frontend
 Transport; Wed, 10 Mar 2021 14:34:22 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT004.mail.protection.outlook.com (10.152.18.106) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3933.30 via Frontend Transport; Wed, 10 Mar 2021 14:34:21 +0000
Received: ("Tessian outbound e7a0046930fb:v71");
 Wed, 10 Mar 2021 14:34:21 +0000
Received: from b01601acaef0.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 605A4B3F-ADC0-46E9-B5B4-12A43859360A.1; 
 Wed, 10 Mar 2021 14:34:03 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b01601acaef0.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 10 Mar 2021 14:34:03 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com (2603:10a6:800:1ae::15)
 by VE1PR08MB5613.eurprd08.prod.outlook.com (2603:10a6:800:1a7::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.26; Wed, 10 Mar
 2021 14:34:01 +0000
Received: from VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839]) by VE1PR08MB5696.eurprd08.prod.outlook.com
 ([fe80::5c93:6e79:8f1e:a839%6]) with mapi id 15.20.3912.030; Wed, 10 Mar 2021
 14:34:00 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: bf33cb49-a40f-4732-b680-44f3f29ce770
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TiKmGFwUHvQ8R4nVNIiqTeJAPdurrr1FqcrCBrWOXPI=;
 b=7k7SF/TCqqLXWXb2QA1TVyS898xOhZorRTAZZw1J4RGXY0ZdaKpq69HnnNib6pwujObRT49fe+eE3bq0eCvX32iuyEvm+uMOeSwoUHhCC45ICBvVjZroWQjXRnBTawsnDm7F2vyqlGeFA+FxKG7R5S8t7phK3pmxTY5kKFuftv8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; lists.xenproject.org; dkim=pass (signature was
 verified) header.d=armh.onmicrosoft.com;lists.xenproject.org; dmarc=pass
 action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 27dbd31002a7b23d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=n8CML85oZ9oL9yALh3CM75vTTpnWoepiwM1xUFrB9u9KAIifcA7yEUVlPLqjn3CuZDS/D9mCL9FZ2JPG4QxMXX2ibTDYasRjy9GUSXtrq5SfKrKgDhM+LrqMiBndR7QprGTyuGLMvCU/oz5HwgOd/E+0ydV903eMusDmPLsUdsXyFIHPtI1z5CRG/UPh+1PTkAZlXWtKrzZrS1ycK1QNV3fGsTYAf/ZiF2MBAXyqdV6rgQtW5K1LcG94pDqob/OSx6OvynLrK3TckuzTr/GNBxFJJUmfHd+MxnbAIYEh2sMbvXc/k05IjwvUzG1pDKwQ29LVdjoeeFncvzRJt+SACQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TiKmGFwUHvQ8R4nVNIiqTeJAPdurrr1FqcrCBrWOXPI=;
 b=XBXhdG8MZiOdBwln6KCmJYSadTKoW5HFY9D89fNCoAVhavc0avKteZpuArvr0SSoKEkbWyKB3j5wkzjDLjTJQIpn+fKd+CRiQ2f7cMZDcrxtucg9v+E2S8ZsEaWzgApINvu2RwD6RZt53WFM07P1qcJM52yOL9wAEsfMAxHMO186L7wZUjAv40mhe22ElQLihK9P4MZSoH2ijL0SdMxRlDhtTKDK6RBe40Oalz5YwUVOUpjzIlHQPfs3Ds1OIk1Q6N2T2fcKjsOvWHV+7M89LIh5ckMlXb2Ytwupd2vHkbkILa42sYhMQ3utkuDoCpZT+NBTfpGCqmYF8nrmTaftrQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TiKmGFwUHvQ8R4nVNIiqTeJAPdurrr1FqcrCBrWOXPI=;
 b=7k7SF/TCqqLXWXb2QA1TVyS898xOhZorRTAZZw1J4RGXY0ZdaKpq69HnnNib6pwujObRT49fe+eE3bq0eCvX32iuyEvm+uMOeSwoUHhCC45ICBvVjZroWQjXRnBTawsnDm7F2vyqlGeFA+FxKG7R5S8t7phK3pmxTY5kKFuftv8=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Gurrieri Stefano <Stefano.Gurrieri@roj.com>
CC: xen-users <xen-users@lists.xenproject.org>
Subject: Re: HOWTO enable Xen on my board based on STM32MP1
Thread-Topic: HOWTO enable Xen on my board based on STM32MP1
Thread-Index: AdcVj1dWrgn5iepWTpm9UYvkY91w1wAKxEKA
Date: Wed, 10 Mar 2021 14:34:00 +0000
Message-ID: <B6524EDE-0D69-40E6-A1F9-7F7E9A752294@arm.com>
References: <1449aa784e6243ee9a8e33642dcb7693@roj.com>
In-Reply-To: <1449aa784e6243ee9a8e33642dcb7693@roj.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.60.0.2.21)
Authentication-Results-Original: roj.com; dkim=none (message not signed)
 header.d=none;roj.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [86.243.24.187]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: d8add83a-1067-4a95-452a-08d8e3d19873
x-ms-traffictypediagnostic: VE1PR08MB5613:|DB6PR0801MB1751:
X-Microsoft-Antispam-PRVS:
	<DB6PR0801MB175146C1214615A9B73A4F519D919@DB6PR0801MB1751.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:6108;OLM:6108;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5696.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(39840400004)(136003)(366004)(376002)(396003)(346002)(66556008)(8676002)(76116006)(53546011)(66446008)(86362001)(71200400001)(66946007)(478600001)(33656002)(83380400001)(2906002)(64756008)(4326008)(6512007)(66476007)(91956017)(5660300002)(36756003)(2616005)(966005)(186003)(316002)(26005)(8936002)(6486002)(6506007)(6916009)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?utf-8?B?bGNEd0NMREdibUFrWDh2RWFPbnpvUXE2WkZhQkgvQ0dwV0djekhUOXduT1R2?=
 =?utf-8?B?Y2N5aW80WWoyaW9zN0FiRXZHc2xPRHJqMitlY2szb3pWeVdLSEZWYnAxWlUx?=
 =?utf-8?B?MjVSNmdqdXJGYkdQRGJGRFdmUG83Y3d6Q0dtSGhpR1NhSmZlSGxPQ3psdVBF?=
 =?utf-8?B?VnlvWWltQjY4dTRjcnVVaEVadVpZUVBrU1Y2bDBXMkFndmVwaFNMbmw1bUNk?=
 =?utf-8?B?bVpGK3ZtQUxZVEJFaS9jdVFOd0NmMjBQRVF3UkpwSm9xTC9qT3JpTUhFQVpp?=
 =?utf-8?B?QWVqTEp4WnVYVzJ4aUEybkNiM2g1ZnVqSmU0U3IxR3QrVU5uUXVoWFJGYjg4?=
 =?utf-8?B?V3BYeTArMFhQUEVHZ3FjTDJEZkl6QlBMdW5NcDU5cnFDcUVwUUZBSEN0SnlF?=
 =?utf-8?B?QjJHa3k2T3dZTE5GYjRaclhVYlYzelByeEdpVTRnUjlPUytWRzl6TkQ2SGo0?=
 =?utf-8?B?bjlBcWdVVUx6NG5ZeUxzQ0NGSHlkRHBHaktubHdsV09ybjNqQ3BWc1FxbnJw?=
 =?utf-8?B?SjR3YWE1eW1INHdJSzVoY2FxZTNuVlQxZWhZQUQ3dVNSanZ6T3BZZjNPdERs?=
 =?utf-8?B?SDB6UzZZVTdmQWR0WDF1S2ZZOUNkcmtGNFFvQU9CRTNtL1R1aTdZRWZ1eXFC?=
 =?utf-8?B?bDdOSFN2bW54QlNWTzhZbUFDMDIzR2pjQlRNRksvYjl1STFCMzRXaXV6S0ow?=
 =?utf-8?B?QVIzVXI5ZWZ0M1g1QitqWjRid3lSNGE2QThtY3gxMFlYdUk1bVpYTE0xRVB6?=
 =?utf-8?B?eThmc0xzZEk1YTZlU2dIRGtZTHdDcHNjNnFML2J4bjBFWUplMVVTd3VTUkh2?=
 =?utf-8?B?ZEF4TmFEQnNndS9CZStOczlaT2ZwbG1qb0szbDdIOVRwczl5cFk3TVlBdm9N?=
 =?utf-8?B?eHNIOTl5amdMNkxvRWhBY0FSUk9FYTgzTGxQZnVUNlgybExSZWw1YXRKYng4?=
 =?utf-8?B?Rkk2dDJac3dsSHlvZWE2SGp1SEVKRkFSVzVZa3hRNGFILzRsYUJkWU9OTS96?=
 =?utf-8?B?aUdkVnJHRFVpMmkrYUxpT2sxUXVYYmN5UVFOQksxRnRGQ0JteWVoUllibVhH?=
 =?utf-8?B?Q1FxNCs2aXhYcnR1LzV5cG9uQ2xmNGp3UFR3Syt1T2NZWTJ6elBZbG9UclFn?=
 =?utf-8?B?V0xkVDRwSExQUW5NWEJyMXZaOWpPdUtSai8xOXRYclUzU0pBZC94RFN6UGR3?=
 =?utf-8?B?R2lFV1RraUZucmx2UGR1bjRLZTZhUlJIcVFPanhsYUpnWWpGTzUxQi9iU0l2?=
 =?utf-8?B?cW5VMG1tTXFSdHAvUHRJSlpJVUw1K1dSYkFkZVhZMW1ETHhaL0pWMnlWRmU3?=
 =?utf-8?B?ejZTVE9qMEtoR0gyampJU0ZZWDdqeXlVUTJaVlI4VE9TZHkydVIxSTV0MU5r?=
 =?utf-8?B?TDhyMkFLeWVvRERWTjV2aE9hZ00rS2NFNGh1UldISUpOQVU1SER6ZXNaVFUr?=
 =?utf-8?B?c3FBZDA3WFRUNTl3VWZ4d2FQOThxUFgzQWozNW5EWTh4b1ZGUmlZVWVkbUl1?=
 =?utf-8?B?dkdTeXp2SlRmV3NpSUNjUHp5U0JTbDFZMUdRT0JscHpDYWU3ZnNBTUJZczFs?=
 =?utf-8?B?YUgrODJpK041TmQrMVU2V09haG9YMGJIT09zTUdmeWcxbUZBQ3RRZS9hZU5w?=
 =?utf-8?B?NjdDSW9sQktTc2RqQlRCM0NPazRTR2w3U3JMVERadFhvaDk4RnJ5TTBTMmZq?=
 =?utf-8?B?VHlIUGNZTXJQS2FIZ0ZLekF3bXBHS0tvbm13S3hDeVBUdXRucCtrWW1tRlQ2?=
 =?utf-8?Q?ZobbXyI5fgc+taWKNQQR5VvavrEAZdqXCUTFpXS?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <73254C0531F31249A0A351530512FE8E@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5613
Original-Authentication-Results: roj.com; dkim=none (message not signed)
 header.d=none;roj.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT004.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	388db965-1af5-43a6-0241-08d8e3d18bf1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(136003)(376002)(346002)(396003)(39840400004)(36840700001)(46966006)(6506007)(8936002)(81166007)(5660300002)(2616005)(4326008)(36756003)(26005)(6486002)(53546011)(336012)(316002)(82310400003)(83380400001)(33656002)(47076005)(478600001)(36860700001)(70206006)(2906002)(6512007)(356005)(186003)(6862004)(966005)(8676002)(86362001)(70586007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2021 14:34:21.6996
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d8add83a-1067-4a95-452a-08d8e3d19873
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT004.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1751
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==


From xen-users-bounces@lists.xenproject.org Sun Mar 14 14:38:57 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 14 Mar 2021 14:38:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.97363.185507 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lLRsW-0007IP-MN; Sun, 14 Mar 2021 14:38:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 97363.185507; Sun, 14 Mar 2021 14:38:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lLRsW-0007ID-EX; Sun, 14 Mar 2021 14:38:00 +0000
Received: by outflank-mailman (input) for mailman id 97363;
 Fri, 12 Mar 2021 22:02:15 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QvIR=IK=gmail.com=pryorm09@srs-us1.protection.inumbo.net>)
 id 1lKprK-0007IK-TW
 for xen-users@lists.xenproject.org; Fri, 12 Mar 2021 22:02:14 +0000
Received: from mail-yb1-xb2c.google.com (unknown [2607:f8b0:4864:20::b2c])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 1cf82c25-df51-4cbf-a48f-580c10bb084d;
 Fri, 12 Mar 2021 22:02:13 +0000 (UTC)
Received: by mail-yb1-xb2c.google.com with SMTP id d9so26955022ybq.1
 for <xen-users@lists.xenproject.org>; Fri, 12 Mar 2021 14:02:13 -0800 (PST)
Received: by 2002:a25:8044:0:0:0:0:0 with HTTP; Fri, 12 Mar 2021 14:02:12
 -0800 (PST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 1cf82c25-df51-4cbf-a48f-580c10bb084d
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:from:date:message-id:subject:to;
        bh=YF6frOgk674i6NTnI3k7sMZNle1UAOgaIIltTQw6lYE=;
        b=GjDA0+lY9U2eoFNV+9ej6T+xEJSdtpMmygdA1UnZ+Bjydjv5PnUPp3TaELZSXAx3yJ
         acIamysjlO582dQxhr8pbIVsjjcyB4TemHtJ9seoikB8MdQIGchRD3ikR2jkHRGu/rW0
         j6QasITsTNEeh0DcGb7Cca8iCjqKiEXWxHoSN/86z6V8VDfIb7Sg2OHW8zt+OYxFEIZM
         Tsvs80O5rZ8Yz0613Rg7g2mjHYHx814lmUKsYiK7GloVCMpou2h/Z4qDgTp/CenLGqK2
         SavSxRzxh0AjPUB3pVL1RruQtjDUN0LqoxSPpp4KPOUzH1PGawgRDBTqSwzHkW9/7GBF
         Sh3A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=YF6frOgk674i6NTnI3k7sMZNle1UAOgaIIltTQw6lYE=;
        b=p2LduPQ4btLa4DzpSc4XgmKH3osxnJ+Jy7QYaKdtIRDYFaqHRNRUs5x67ftfLMJENr
         suk+k+fvajYFTw0GVUuHcHQnGlk/Ct/15GBdGuuguQXEwuCDT+srgfori02maSKzjrB4
         iCiHRgSKJhtkwNCdfqG+BvQtz47GZXBKxFdFB0M1Qe5WeUeT7cMUHNw5wyHHE5wZOd32
         nJ1UssowGUG1QeyhjZcUqW4DHJatxHHBcZFh2xAJNQKpyJ4PSkMxR1+e2ss/zzfiV79J
         YVvecejI3KNogYZ1W/FWoP6d7PFNpc1cqnPAXEafZTMY9QZ3IthER1aYU1fCkejfVHDO
         3lqQ==
X-Gm-Message-State: AOAM531fc7Dt9/mupzP52vQZGkCCmj5++Qx3Gzej86yRfb3EeuuvgUl6
	m05+0kzd9GbsbZN3xXVZldpfaM2YwcIiPYTR0nJs8xgd
X-Google-Smtp-Source: ABdhPJxAT2mf86SuEUMlt1PZQCVZyPplkZkui7C+vhAme3sqLfpuQbJXi5Y58kWTba8T4rNPyKgI9b6fVIlMbupMW5I=
X-Received: by 2002:a25:c707:: with SMTP id w7mr20960043ybe.225.1615586533002;
 Fri, 12 Mar 2021 14:02:13 -0800 (PST)
MIME-Version: 1.0
From: Pry Mar <pryorm09@gmail.com>
Date: Fri, 12 Mar 2021 14:02:12 -0800
Message-ID: <CAHnBbQ_K70LH+i2Q_b0OfXSEmM3EKvUyeU1Ha7wu1yr9-N-aEQ@mail.gmail.com>
Subject: [ANN] new approach to pv domU install of CentOS/AlmaLinux (el8)
To: xen-users <xen-users@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

Hello Xen-users,


Its well known that the kernel/ramdisk pair, found below, normally
supports a pv boot with virt-install from libvirt:
http://mirrors.ocf.berkeley.edu/centos/8/BaseOS/x86_64/os/images/pxeboot/

this is no longer the case with any version of el8 in CentOS and other
RH clones.

I've recently tried a new (MacGyver) style approach to a pv domU boot
explained here:
http://strugglers.net/~andy/blog/2021/02/03/booting-the-centosrhel-installer-under-xen-pvh-mode

Basically, from the pxeboot kernel/ramdisk pair above, you throw away
the kernel, substitute it with the elrepo kernel-ml vmlinuz, then
repack the pxeboot initrd.img with the kernel-ml modules and add a
dracut hook. You don't have to use the elrepo kernel+modules, I've
also used those same bits from Debian Bullseye.

My first test boot.iso from CentOS 8.3, but this is quite slow. When
AlmaLinux came out in Feb with a Minimal ISO this seemed an ideal
platform for testing the repacked initrd.img.

With the Alma minimal ISO total elapsed install time was 600s (10m)
and this included some post-install scripts. My cmdline to kick off
the install:
[    0.000000] Command line: console=hvc0 text
ks=http://192.168.1.3/public_html/alma8-crap-ks.cfg
inst.repo=cdrom:xvdc

// trace of pv install using elrepo repacked initrd.img:
tlviewer@xen1804:~/alma8$ grep -iP 'xen|pv' pv-install-alma8-pt1
tlviewer@c8xen:~/alma8$ sudo xl create -c alma8.cfg
[    0.000000] Xen: [mem 0x0000000000000000-0x000000000009ffff] usable
[    0.000000] Xen: [mem 0x00000000000a0000-0x00000000000fffff] reserved
[    0.000000] Xen: [mem 0x0000000000100000-0x00000000693fffff] usable
[    0.000000] Hypervisor detected: Xen PV
[    0.150910] Kernel/User page tables isolation: disabled on XEN PV.
[    0.535495] Booting paravirtualized kernel on Xen
[    0.535496] Xen version: 4.13.2 (preserve-AD)
[    0.645473] PV qspinlock hash table entries: 256 (order: 0, 4096
bytes, linear)
[    0.670204] xen:events: Using FIFO-based ABI
[    0.670757] clocksource: xen: mask: 0xffffffffffffffff max_cycles:
0x1cd42e4dffb, max_idle_ns: 881590591483 ns
[    0.670771] installing Xen timer for CPU 0
[    0.703547] installing Xen timer for CPU 1
[    0.735310] xen:grant_table: Grant tables using version 1 layout
[    0.736838] PCI: setting up Xen PCI frontend stub
[    1.099920] xen:balloon: Initialising balloon driver
[    1.102385] clocksource: Switched to clocksource xen
[   16.039730] systemd[1]: Detected virtualization xen.
[   19.413874] xen_netfront: Initialising Xen virtual ethernet driver
[   27.563288] systemd[1]: Detected virtualization xen.

Here is a line-by-line trace at my first time getting Anaconda to
start (stopped with simple error):
https://pb.psychotic.ninja/view/raw/f78bd1ef

The future of AlmaLinux looks good if such easy techniques can result
in fast pv installs.
Cheers,
PryMar56
 ##xen-packaging of Freenode


From xen-users-bounces@lists.xenproject.org Thu Mar 18 12:01:09 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Mar 2021 12:01:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.98901.187928 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lMrKE-0001kc-Im; Thu, 18 Mar 2021 12:00:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 98901.187928; Thu, 18 Mar 2021 12:00:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lMrKE-0001kU-FK; Thu, 18 Mar 2021 12:00:26 +0000
Received: by outflank-mailman (input) for mailman id 98901;
 Thu, 18 Mar 2021 12:00:25 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=D2pI=IQ=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lMrKD-0001iQ-GX
 for xen-users@lists.xen.org; Thu, 18 Mar 2021 12:00:25 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 7fe64e6f-40c5-4b41-afd7-b488ea1a4ef3;
 Thu, 18 Mar 2021 12:00:18 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lMrJv-0007mb-KC; Thu, 18 Mar 2021 12:00:07 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lMrJv-00073c-GM; Thu, 18 Mar 2021 12:00:07 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 7fe64e6f-40c5-4b41-afd7-b488ea1a4ef3
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=0oQDx6XVZVbI4x/2m9DAoJyP+AFavQiMYTB2bg2sd+c=; b=ZQH7tbTVCW/suZxet6R3c8OEKI
	LIN9t5JkawZimzkTV1tikEZuB/I8e4tViP+MNEUGN98Y5vney8h5u59VYb0FhMR0MDMLaQlhVODIj
	g0vTT6d1icaEnEcT2QQtLJ9asaggrbiVQ7DMJ5lOLfb2DBElTCGbOdJdbHp27MQpxWtU=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 368 v2 - HVM soft-reset crashes toolstack
Message-Id: <E1lMrJv-00073c-GM@xenbits.xenproject.org>
Date: Thu, 18 Mar 2021 12:00:07 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-368
                              version 2

                   HVM soft-reset crashes toolstack

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

libxl requires all data structures passed across its public interface
to be initialized before use and disposed of afterwards by calling a
specific set of functions.  Many internal data structures also require
this initialize / dispose discipline, but not all of them.

When the "soft reset" feature was implemented, the
libxl__domain_suspend_state structure didn't require any
initialization or disposal.  At some point later, an initialization
function was introduced for the structure; but the "soft reset" path
wasn't refactored to call the initialization function.  When a guest
nwo initiates a "soft reboot", uninitialized data structure leads to
an assert() when later code finds the structure in an unexpected
state.

The effect of this is to crash the process monitoring the guest.  How
this affects the system depends on the structure of the toolstack.

For xl, this will have no security-relevant effect: every VM has its
own independent monitoring process, which contains no state.  The
domain in question will hang in a crashed state, but can be destroyed
by `xl destroy` just like any other non-cooperating domain.

For daemon-based toolstacks linked against libxl, such as libvirt,
this will crash the toolstack, losing the state of any in-progress
operations (localized DoS), and preventing further administrator
operations unless the daemon is configured to restart automatically
(system-wide DoS).  If crashes "leak" resources, then repeated crashes
could use up resources, also causing a system-wide DoS.

IMPACT
======

A malicious guest can crash the management daemon, leading to at least
a localized, possibly system-wide denial-of-service.

VULNERABLE SYSTEMS
==================

Only Xen versions 4.12 through 4.14 are affected.  Earlier versions
are not affected.

The issue affects only systems with a guest monitoring process, which
is linked against libxl, and which is important other than simply for
the functioning of one particular guest.  libvirt is one common
toolstack affected.  Systems using the `xl` command-line tool should
generally suffer no security-relevant effects.

The xapi toolstack does not currently link against libxl, and so is
not affected.

MITIGATION
==========

Ensuring that any management daemons are restarted automatically after
a crash will partially mitigate the issue.

CREDITS
=======

This issue was discovered by Olaf Hering.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa368.patch           xen-unstable
xsa368-4.14.patch      Xen 4.14.x
xsa368-4.13.patch      Xen 4.13.x - Xen 4.12.x

$ sha256sum xsa368*
e80f33c3ce45372fef7bd91ec71b2b66e557176b79f9771872ce111bfff34150  xsa368.meta
b82f2b110514cdf47a2688913ad5af68b01050751d56705a15ddf9a970b6fa0d  xsa368.patch
636df70ae5eaf00b50ef0b5ac219a2aeda771c66833fae88e7ee43b18ae889f4  xsa368-4.13.patch
55bbe59c75b69f493e364dfcf6cdbc7db4acd32dbf0b4d2466815b7c1f1823ce  xsa368-4.14.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.


(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmBTQEMMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZDAIH/ibVSFJRukaH4TKAtm0Qy7Qb0jSF6u5lHdUH4lfa
EXTAS4/vAJI70bMt2yePGoaa+QPSJ340MwlKcW8GerAEWeW0hTxOp23GGavEwbtu
I+OFdls2YGrxGM2FMQR0ZEftV4jsyVAcCNF6oq6nqzTDe1OZC0bQSDUL69CWnIKn
hC9Br/hV3AuijwwQdOGQoe+rj8aZK134UaNjr0AI9e1l2jEsJ3NxC3IxeHy4/J3E
meoHKtTRZXFdG2VMu709jqrnhpOQcZDT+meiNhoOdUvXyPBa2MzVj3XY32yWuJxa
Fi7qrpXIAZ8qNbCbLIbNYMGlgB+7sLsKQULycgai8Sk7QpU=
=ea+C
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa368.meta"
Content-Disposition: attachment; filename="xsa368.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa368.patch"
Content-Disposition: attachment; filename="xsa368.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa368-4.13.patch"
Content-Disposition: attachment; filename="xsa368-4.13.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa368-4.14.patch"
Content-Disposition: attachment; filename="xsa368-4.14.patch"
Content-Transfer-Encoding: base64

RnJvbSBiMWQ1ZTAzM2RmMTg1OGVkZDZmYTMyOGFiZDEyNjUyMjk0NzQ0MGFh
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbnRob255IFBFUkFS
RCA8YW50aG9ueS5wZXJhcmRAY2l0cml4LmNvbT4KRGF0ZTogV2VkLCAyNCBG
ZWIgMjAyMSAxODozOToyMCArMDAwMApTdWJqZWN0OiBbUEFUQ0hdIGxpYnhs
OiBGaXggZG9tYWluIHNvZnQgcmVzZXQgc3RhdGUgaGFuZGxpbmcKCkluIGRv
X2RvbWFpbl9zb2Z0X3Jlc2V0KCksIGEgYGxpYnhsX19kb21haW5fc3VzcGVu
ZF9zdGF0ZScgaXMgdXNlZAp3aXRob3V0IGJlZW4gcHJvcGVybHkgaW5pdGlh
bGlzZWQgYW5kIGRpc3Bvc2VkIG9mLiBUaGlzIGxlYWQgZG8gYQphYm9ydCgp
IGluIGxpYnhsIGR1ZSB0byB0aGUgYGRzcHMucW1wJyBzdGF0ZSBiZWVuIHVz
ZWQgYmVmb3JlIGJlZW4KaW5pdGlhbGlzZWQ6CiAgICBsaWJ4bF9fZXZfcW1w
X3NlbmQ6IEFzc2VydGlvbiBgZXYtPnN0YXRlID09IHFtcF9zdGF0ZV9kaXNj
b25uZWN0ZWQgfHwgZXYtPnN0YXRlID09IHFtcF9zdGF0ZV9jb25uZWN0ZWQn
IGZhaWxlZC4KCk9uY2UgaW5pdGlhbGlzZWQsIGBkc3BzJyBhbHNvIG5lZWRz
IHRvIGJlIGRpc3Bvc2VkIG9mIGFzIHRoZSBgcW1wJwpzdGF0ZSBtaWdodCBz
dGlsbCBiZSBpbiB0aGUgYENvbm5lY3RlZCcgc3RhdGUgaW4gdGhlIGNhbGxi
YWNrIGZvcgpsaWJ4bF9fZG9tYWluX3N1c3BlbmRfZGV2aWNlX21vZGVsKCku
IFNvIHRoaXMgcGF0Y2ggYWRkcwpsaWJ4bF9fZG9tYWluX3N1c3BlbmRfZGlz
cG9zZSgpIHdoaWNoIGNhbiBiZSBjYWxsZWQgZnJvbSB0aGUgdHdvCnBsYWNl
cyB3aGVyZSB3ZSBuZWVkIHRvIGRpc3Bvc2Ugb2YgYGRzcHMnLgoKUmVwb3J0
ZWQtYnk6IE9sYWYgSGVyaW5nIDxvbGFmQGFlcGZsZS5kZT4KU2lnbmVkLW9m
Zi1ieTogQW50aG9ueSBQRVJBUkQgPGFudGhvbnkucGVyYXJkQGNpdHJpeC5j
b20+ClJldmlld2VkLWJ5OiBJYW4gSmFja3NvbiA8aXdqQHhlbnByb2plY3Qu
b3JnPgpUZXN0ZWQtYnk6IE9sYWYgSGVyaW5nIDxvbGFmQGFlcGZsZS5kZT4K
LS0tCiB0b29scy9saWJ4bC9saWJ4bF9jcmVhdGUuYyAgICAgIHwgMTEgKysr
KysrKystLS0KIHRvb2xzL2xpYnhsL2xpYnhsX2RvbV9zdXNwZW5kLmMgfCAx
NSArKysrKysrKysrKy0tLS0KIHRvb2xzL2xpYnhsL2xpYnhsX2ludGVybmFs
LmggICAgfCAgMiArKwogMyBmaWxlcyBjaGFuZ2VkLCAyMSBpbnNlcnRpb25z
KCspLCA3IGRlbGV0aW9ucygtKQoKZGlmZiAtLWdpdCBhL3Rvb2xzL2xpYnhs
L2xpYnhsX2NyZWF0ZS5jIGIvdG9vbHMvbGlieGwvbGlieGxfY3JlYXRlLmMK
aW5kZXggMjgxNDgxOGUzNC4uODNiMGViMDBiZiAxMDA2NDQKLS0tIGEvdG9v
bHMvbGlieGwvbGlieGxfY3JlYXRlLmMKKysrIGIvdG9vbHMvbGlieGwvbGli
eGxfY3JlYXRlLmMKQEAgLTIxNzQsOSArMjE3NCw3IEBAIHN0YXRpYyBpbnQg
ZG9fZG9tYWluX3NvZnRfcmVzZXQobGlieGxfY3R4ICpjdHgsCiAgICAgc3Rh
dGUtPmNvbnNvbGVfdHR5ID0gbGlieGxfX3N0cmR1cChnYywgY29uc29sZV90
dHkpOwogCiAgICAgZHNzLT5hbyA9IGFvOwotICAgIGRzcy0+ZG9taWQgPSBk
c3MtPmRzcHMuZG9taWQgPSBkb21pZDsKLSAgICBkc3MtPmRzcHMuZG1fc2F2
ZWZpbGUgPSBHQ1NQUklOVEYoTElCWExfREVWSUNFX01PREVMX1NBVkVfRklM
RSIuJWQiLAotICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICBkb21pZCk7CisgICAgZHNzLT5kb21pZCA9IGRvbWlkOwogCiAgICAgcmMg
PSBsaWJ4bF9fc2F2ZV9lbXVsYXRvcl94ZW5zdG9yZV9kYXRhKGRzcywgJnNy
cy0+dG9vbHN0YWNrX2J1ZiwKICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgJnNycy0+dG9vbHN0YWNrX2xlbik7CkBAIC0y
MTg2LDYgKzIxODQsMTEgQEAgc3RhdGljIGludCBkb19kb21haW5fc29mdF9y
ZXNldChsaWJ4bF9jdHggKmN0eCwKICAgICB9CiAKICAgICBkc3MtPmRzcHMu
YW8gPSBhbzsKKyAgICBkc3MtPmRzcHMuZG9taWQgPSBkb21pZDsKKyAgICBk
c3MtPmRzcHMubGl2ZSA9IGZhbHNlOworICAgIHJjID0gbGlieGxfX2RvbWFp
bl9zdXNwZW5kX2luaXQoZWdjLCAmZHNzLT5kc3BzLCBkX2NvbmZpZy0+Yl9p
bmZvLnR5cGUpOworICAgIGlmIChyYykKKyAgICAgICAgZ290byBvdXQ7CiAg
ICAgZHNzLT5kc3BzLmNhbGxiYWNrX2RldmljZV9tb2RlbF9kb25lID0gc29m
dF9yZXNldF9kbV9zdXNwZW5kZWQ7CiAgICAgbGlieGxfX2RvbWFpbl9zdXNw
ZW5kX2RldmljZV9tb2RlbChlZ2MsICZkc3MtPmRzcHMpOyAvKiBtdXN0IGJl
IGxhc3QgKi8KIApAQCAtMjIwNCw2ICsyMjA3LDggQEAgc3RhdGljIHZvaWQg
c29mdF9yZXNldF9kbV9zdXNwZW5kZWQobGlieGxfX2VnYyAqZWdjLAogICAg
ICAgICBDT05UQUlORVJfT0YoZHNwcywgKnNycywgZHNzLmRzcHMpOwogICAg
IGxpYnhsX19hcHBfZG9tYWluX2NyZWF0ZV9zdGF0ZSAqY2RjcyA9ICZzcnMt
PmNkY3M7CiAKKyAgICBsaWJ4bF9fZG9tYWluX3N1c3BlbmRfZGlzcG9zZShn
YywgZHNwcyk7CisKICAgICAvKgogICAgICAqIEFzayBhbGwgYmFja2VuZHMg
dG8gZGlzY29ubmVjdCBieSByZW1vdmluZyB0aGUgZG9tYWluIGZyb20KICAg
ICAgKiB4ZW5zdG9yZS4gT24gdGhlIGNyZWF0aW9uIHBhdGggdGhlIGRvbWFp
biB3aWxsIGJlIGludHJvZHVjZWQgdG8KZGlmZiAtLWdpdCBhL3Rvb2xzL2xp
YnhsL2xpYnhsX2RvbV9zdXNwZW5kLmMgYi90b29scy9saWJ4bC9saWJ4bF9k
b21fc3VzcGVuZC5jCmluZGV4IDI1ZDE1NzE4OTUuLjJhMjgwZjY5YTEgMTAw
NjQ0Ci0tLSBhL3Rvb2xzL2xpYnhsL2xpYnhsX2RvbV9zdXNwZW5kLmMKKysr
IGIvdG9vbHMvbGlieGwvbGlieGxfZG9tX3N1c3BlbmQuYwpAQCAtNjcsNiAr
NjcsMTYgQEAgb3V0OgogICAgIHJldHVybiByYzsKIH0KIAordm9pZCBsaWJ4
bF9fZG9tYWluX3N1c3BlbmRfZGlzcG9zZShsaWJ4bF9fZ2MgKmdjLAorICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBsaWJ4bF9fZG9tYWlu
X3N1c3BlbmRfc3RhdGUgICpkc3BzKQoreworICAgIGxpYnhsX194c3dhaXRf
c3RvcChnYywgJmRzcHMtPnB2Y29udHJvbCk7CisgICAgbGlieGxfX2V2X2V2
dGNobl9jYW5jZWwoZ2MsICZkc3BzLT5ndWVzdF9ldnRjaG4pOworICAgIGxp
YnhsX19ldl94c3dhdGNoX2RlcmVnaXN0ZXIoZ2MsICZkc3BzLT5ndWVzdF93
YXRjaCk7CisgICAgbGlieGxfX2V2X3RpbWVfZGVyZWdpc3RlcihnYywgJmRz
cHMtPmd1ZXN0X3RpbWVvdXQpOworICAgIGxpYnhsX19ldl9xbXBfZGlzcG9z
ZShnYywgJmRzcHMtPnFtcCk7Cit9CisKIC8qLS0tLS0gY2FsbGJhY2tzLCBj
YWxsZWQgYnkgeGNfZG9tYWluX3NhdmUgLS0tLS0qLwogCiB2b2lkIGxpYnhs
X19kb21haW5fc3VzcGVuZF9kZXZpY2VfbW9kZWwobGlieGxfX2VnYyAqZWdj
LApAQCAtMzg4LDEwICszOTgsNyBAQCBzdGF0aWMgdm9pZCBkb21haW5fc3Vz
cGVuZF9jb21tb25fZG9uZShsaWJ4bF9fZWdjICplZ2MsCiB7CiAgICAgRUdD
X0dDOwogICAgIGFzc2VydCghbGlieGxfX3hzd2FpdF9pbnVzZSgmZHNwcy0+
cHZjb250cm9sKSk7Ci0gICAgbGlieGxfX2V2X2V2dGNobl9jYW5jZWwoZ2Ms
ICZkc3BzLT5ndWVzdF9ldnRjaG4pOwotICAgIGxpYnhsX19ldl94c3dhdGNo
X2RlcmVnaXN0ZXIoZ2MsICZkc3BzLT5ndWVzdF93YXRjaCk7Ci0gICAgbGli
eGxfX2V2X3RpbWVfZGVyZWdpc3RlcihnYywgJmRzcHMtPmd1ZXN0X3RpbWVv
dXQpOwotICAgIGxpYnhsX19ldl9xbXBfZGlzcG9zZShnYywgJmRzcHMtPnFt
cCk7CisgICAgbGlieGxfX2RvbWFpbl9zdXNwZW5kX2Rpc3Bvc2UoZ2MsIGRz
cHMpOwogICAgIGRzcHMtPmNhbGxiYWNrX2NvbW1vbl9kb25lKGVnYywgZHNw
cywgcmMpOwogfQogCmRpZmYgLS1naXQgYS90b29scy9saWJ4bC9saWJ4bF9p
bnRlcm5hbC5oIGIvdG9vbHMvbGlieGwvbGlieGxfaW50ZXJuYWwuaAppbmRl
eCA5NGEyMzE3OWQzLi4zYmMzYmJjZjg0IDEwMDY0NAotLS0gYS90b29scy9s
aWJ4bC9saWJ4bF9pbnRlcm5hbC5oCisrKyBiL3Rvb2xzL2xpYnhsL2xpYnhs
X2ludGVybmFsLmgKQEAgLTM2MTUsNiArMzYxNSw4IEBAIHN0cnVjdCBsaWJ4
bF9fZG9tYWluX3N1c3BlbmRfc3RhdGUgewogaW50IGxpYnhsX19kb21haW5f
c3VzcGVuZF9pbml0KGxpYnhsX19lZ2MgKmVnYywKICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICBsaWJ4bF9fZG9tYWluX3N1c3BlbmRfc3RhdGUg
KmRzcHMsCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbGlieGxf
ZG9tYWluX3R5cGUgdHlwZSk7Cit2b2lkIGxpYnhsX19kb21haW5fc3VzcGVu
ZF9kaXNwb3NlKGxpYnhsX19nYyAqZ2MsCisgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgIGxpYnhsX19kb21haW5fc3VzcGVuZF9zdGF0ZSAg
KmRzcHMpOwogCiAvKiBjYWxscyBkc3BzLT5jYWxsYmFja19kZXZpY2VfbW9k
ZWxfZG9uZSB3aGVuIGRvbmUKICAqIG1heSBzeW5jaHJvbm91c2x5IGNhbGxz
IHRoaXMgY2FsbGJhY2sgKi8KLS0gCjIuMzAuMQoK

--=separator--


From xen-users-bounces@lists.xenproject.org Thu Mar 18 13:51:15 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Mar 2021 13:51:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.97987.187979 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lMt2W-00040v-Qh; Thu, 18 Mar 2021 13:50:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 97987.187979; Thu, 18 Mar 2021 13:50:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lMt2W-00040n-MQ; Thu, 18 Mar 2021 13:50:16 +0000
Received: by outflank-mailman (input) for mailman id 97987;
 Mon, 15 Mar 2021 12:14:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lLm7c-0005BC-GX
 for xen-users@lists.xenproject.org; Mon, 15 Mar 2021 12:14:56 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lLm7c-0007aQ-FL
 for xen-users@lists.xenproject.org; Mon, 15 Mar 2021 12:14:56 +0000
Received: from iwj (helo=mariner.uk.xensource.com)
 by xenbits.xenproject.org with local-bsmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lLm7c-0006k4-EK
 for xen-users@lists.xenproject.org; Mon, 15 Mar 2021 12:14:56 +0000
Received: from iwj by mariner.uk.xensource.com with local (Exim 4.89)
 (envelope-from <iwj@xenproject.org>)
 id 1lLm7X-0003tJ-Mb; Mon, 15 Mar 2021 12:14:51 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Subject:CC:To:Date:Message-ID:
	Content-Transfer-Encoding:Content-Type:MIME-Version:From;
	bh=USBbzM/XOaBEpC7riV/wEGY0P7yozameGwecBSEVX2s=; b=uaCngqlBRqSfqWbY+m77sKuYOY
	oZnA3w+FmAN0o3pvSYYTG4mAKzqox7XeGUnphzDSki+jq8AZlnJeM7v3MvnyU61K0EFanCBTFhUpI
	o9j2K3YKVt95V6273tMyPZzz1e3aJaKIvae+MRy9Sd2sxIcXjxnOiVB2mI5IHIOuEYgc=;
From: Ian Jackson <iwj@xenproject.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <24655.20411.433579.576842@mariner.uk.xensource.com>
Date: Mon, 15 Mar 2021 12:14:51 +0000
To: xen-announce@lists.xenproject.org
CC: xen-devel@lists.xenproject.org,
    xen-users@lists.xenproject.org
Subject: Xen 4.15 RC3

Xen 4.15 RC3 is now available.

It is available from git:
  git clone https://xenbits.xenproject.org/git-http/xen.git -b 4.15.0-rc3

For your convenience a tarball is available:
  https://downloads.xenproject.org/release/xen/4.15.0-rc3/xen-4.15.0-rc3.tar.gz
  https://downloads.xenproject.org/release/xen/4.15.0-rc3/xen-4.15.0-rc3.tar.gz.sig

Please send bug reports and test reports to
xen-devel@lists.xenproject.org.  When sending bug reports, please CC
relevant maintainers and me (iwj@xenproject.org).

I will send an update on the state of the release in a moment.

Ian.


From xen-users-bounces@lists.xenproject.org Thu Mar 18 13:56:42 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 18 Mar 2021 13:56:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.98974.187999 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lMt8d-0004Lz-L6; Thu, 18 Mar 2021 13:56:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 98974.187999; Thu, 18 Mar 2021 13:56:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lMt8d-0004Lr-Hb; Thu, 18 Mar 2021 13:56:35 +0000
Received: by outflank-mailman (input) for mailman id 98974;
 Thu, 18 Mar 2021 13:56:35 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=D2pI=IQ=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lMt8d-0004Jq-2s
 for xen-users@lists.xen.org; Thu, 18 Mar 2021 13:56:35 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 820487c9-4685-42a4-ae71-10b3d4814333;
 Thu, 18 Mar 2021 13:56:28 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lMt8S-0001Dx-0g; Thu, 18 Mar 2021 13:56:24 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lMt8R-000718-Sb; Thu, 18 Mar 2021 13:56:23 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 820487c9-4685-42a4-ae71-10b3d4814333
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=Ut4jnS8RkrbTcZZFmLZa5+CbVR3NJ6IAwQOVyYtLDRM=; b=tTBFURJp6HO4MuTixVQ8klB+6t
	GpnF9pgijqkUDAfN2iW7BKZqg9YRLFp3ncPEUMOOABANAJm6IK7h/TjQJRw8iIOOST9403SBmOAre
	hQERHZX8PhtwKSvRfscYA/KvGVvaMXgbXk7d0UdJlal2QLXfF4n+CVVIapzcnLsGB9dg=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 368 v3 (CVE-2021-28687) - HVM soft-reset
 crashes toolstack
Message-Id: <E1lMt8R-000718-Sb@xenbits.xenproject.org>
Date: Thu, 18 Mar 2021 13:56:23 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-28687 / XSA-368
                              version 3

                   HVM soft-reset crashes toolstack

UPDATES IN VERSION 3
====================

CVE assigned.

ISSUE DESCRIPTION
=================

libxl requires all data structures passed across its public interface
to be initialized before use and disposed of afterwards by calling a
specific set of functions.  Many internal data structures also require
this initialize / dispose discipline, but not all of them.

When the "soft reset" feature was implemented, the
libxl__domain_suspend_state structure didn't require any
initialization or disposal.  At some point later, an initialization
function was introduced for the structure; but the "soft reset" path
wasn't refactored to call the initialization function.  When a guest
nwo initiates a "soft reboot", uninitialized data structure leads to
an assert() when later code finds the structure in an unexpected
state.

The effect of this is to crash the process monitoring the guest.  How
this affects the system depends on the structure of the toolstack.

For xl, this will have no security-relevant effect: every VM has its
own independent monitoring process, which contains no state.  The
domain in question will hang in a crashed state, but can be destroyed
by `xl destroy` just like any other non-cooperating domain.

For daemon-based toolstacks linked against libxl, such as libvirt,
this will crash the toolstack, losing the state of any in-progress
operations (localized DoS), and preventing further administrator
operations unless the daemon is configured to restart automatically
(system-wide DoS).  If crashes "leak" resources, then repeated crashes
could use up resources, also causing a system-wide DoS.

IMPACT
======

A malicious guest can crash the management daemon, leading to at least
a localized, possibly system-wide denial-of-service.

VULNERABLE SYSTEMS
==================

Only Xen versions 4.12 through 4.14 are affected.  Earlier versions
are not affected.

The issue affects only systems with a guest monitoring process, which
is linked against libxl, and which is important other than simply for
the functioning of one particular guest.  libvirt is one common
toolstack affected.  Systems using the `xl` command-line tool should
generally suffer no security-relevant effects.

The xapi toolstack does not currently link against libxl, and so is
not affected.

MITIGATION
==========

Ensuring that any management daemons are restarted automatically after
a crash will partially mitigate the issue.

CREDITS
=======

This issue was discovered by Olaf Hering.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa368.patch           xen-unstable
xsa368-4.14.patch      Xen 4.14.x
xsa368-4.13.patch      Xen 4.13.x - Xen 4.12.x

$ sha256sum xsa368*
e80f33c3ce45372fef7bd91ec71b2b66e557176b79f9771872ce111bfff34150  xsa368.meta
b82f2b110514cdf47a2688913ad5af68b01050751d56705a15ddf9a970b6fa0d  xsa368.patch
636df70ae5eaf00b50ef0b5ac219a2aeda771c66833fae88e7ee43b18ae889f4  xsa368-4.13.patch
55bbe59c75b69f493e364dfcf6cdbc7db4acd32dbf0b4d2466815b7c1f1823ce  xsa368-4.14.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.


(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmBTXAAMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZdgcH/RTW41tLPh8KHJ+82qefaI2EUBK3nmNnR5hnye3c
9GPP/QB7QdHp+JSIRTAZxOayBQeFEcYSX/5VxDypIiqT02wHS9hDr3jcpOfGLcdt
MiN9kB3vYqe353Lask0mN7AX3J5v3wvrYzBRx9ccaYcX/Jcubrx6Jy5laQSYpTUu
4GCeLZQ2tHI8N3ZHiKI7YUyxmn9vKgvFil1gyuk8L5x6npnW4ixdWF0MRyHe7wbS
dbZbug0g6bbJbs4CFZbm1CbQjGGOwznfT8z9ppmgPdi+33X+Cimz3wlbpXeJKpZk
/nJObobdPGk7ClChvUjntv0oaZ+2zFoUoe3Yc08aa+B29e8=
=Dehk
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa368.meta"
Content-Disposition: attachment; filename="xsa368.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa368.patch"
Content-Disposition: attachment; filename="xsa368.patch"
Content-Transfer-Encoding: base64

RnJvbSBlYWIyYjRhYjA2NDE5YjgyYmUxZTJjZmNkYzViYTJhNDYyNTI4ZDY4
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbnRob255IFBFUkFS
RCA8YW50aG9ueS5wZXJhcmRAY2l0cml4LmNvbT4KRGF0ZTogV2VkLCAyNCBG
ZWIgMjAyMSAxODozOToyMCArMDAwMApTdWJqZWN0OiBbUEFUQ0hdIGxpYnhs
OiBGaXggZG9tYWluIHNvZnQgcmVzZXQgc3RhdGUgaGFuZGxpbmcKCkluIGRv
X2RvbWFpbl9zb2Z0X3Jlc2V0KCksIGEgYGxpYnhsX19kb21haW5fc3VzcGVu
ZF9zdGF0ZScgaXMgdXNlZAp3aXRob3V0IGJlZW4gcHJvcGVybHkgaW5pdGlh
bGlzZWQgYW5kIGRpc3Bvc2VkIG9mLiBUaGlzIGxlYWQgZG8gYQphYm9ydCgp
IGluIGxpYnhsIGR1ZSB0byB0aGUgYGRzcHMucW1wJyBzdGF0ZSBiZWVuIHVz
ZWQgYmVmb3JlIGJlZW4KaW5pdGlhbGlzZWQ6CiAgICBsaWJ4bF9fZXZfcW1w
X3NlbmQ6IEFzc2VydGlvbiBgZXYtPnN0YXRlID09IHFtcF9zdGF0ZV9kaXNj
b25uZWN0ZWQgfHwgZXYtPnN0YXRlID09IHFtcF9zdGF0ZV9jb25uZWN0ZWQn
IGZhaWxlZC4KCk9uY2UgaW5pdGlhbGlzZWQsIGBkc3BzJyBhbHNvIG5lZWRz
IHRvIGJlIGRpc3Bvc2VkIG9mIGFzIHRoZSBgcW1wJwpzdGF0ZSBtaWdodCBz
dGlsbCBiZSBpbiB0aGUgYENvbm5lY3RlZCcgc3RhdGUgaW4gdGhlIGNhbGxi
YWNrIGZvcgpsaWJ4bF9fZG9tYWluX3N1c3BlbmRfZGV2aWNlX21vZGVsKCku
IFNvIHRoaXMgcGF0Y2ggYWRkcwpsaWJ4bF9fZG9tYWluX3N1c3BlbmRfZGlz
cG9zZSgpIHdoaWNoIGNhbiBiZSBjYWxsZWQgZnJvbSB0aGUgdHdvCnBsYWNl
cyB3aGVyZSB3ZSBuZWVkIHRvIGRpc3Bvc2Ugb2YgYGRzcHMnLgoKUmVwb3J0
ZWQtYnk6IE9sYWYgSGVyaW5nIDxvbGFmQGFlcGZsZS5kZT4KU2lnbmVkLW9m
Zi1ieTogQW50aG9ueSBQRVJBUkQgPGFudGhvbnkucGVyYXJkQGNpdHJpeC5j
b20+ClJldmlld2VkLWJ5OiBJYW4gSmFja3NvbiA8aXdqQHhlbnByb2plY3Qu
b3JnPgpUZXN0ZWQtYnk6IE9sYWYgSGVyaW5nIDxvbGFmQGFlcGZsZS5kZT4K
LS0tCiB0b29scy9saWJzL2xpZ2h0L2xpYnhsX2NyZWF0ZS5jICAgICAgfCAx
MSArKysrKysrKy0tLQogdG9vbHMvbGlicy9saWdodC9saWJ4bF9kb21fc3Vz
cGVuZC5jIHwgMTUgKysrKysrKysrKystLS0tCiB0b29scy9saWJzL2xpZ2h0
L2xpYnhsX2ludGVybmFsLmggICAgfCAgMiArKwogMyBmaWxlcyBjaGFuZ2Vk
LCAyMSBpbnNlcnRpb25zKCspLCA3IGRlbGV0aW9ucygtKQoKZGlmZiAtLWdp
dCBhL3Rvb2xzL2xpYnMvbGlnaHQvbGlieGxfY3JlYXRlLmMgYi90b29scy9s
aWJzL2xpZ2h0L2xpYnhsX2NyZWF0ZS5jCmluZGV4IDQ2ZjY4ZGE2OTcuLmRj
YTI3NjY4MDUgMTAwNjQ0Ci0tLSBhL3Rvb2xzL2xpYnMvbGlnaHQvbGlieGxf
Y3JlYXRlLmMKKysrIGIvdG9vbHMvbGlicy9saWdodC9saWJ4bF9jcmVhdGUu
YwpAQCAtMjE3OSw5ICsyMTc5LDcgQEAgc3RhdGljIGludCBkb19kb21haW5f
c29mdF9yZXNldChsaWJ4bF9jdHggKmN0eCwKICAgICBzdGF0ZS0+Y29uc29s
ZV90dHkgPSBsaWJ4bF9fc3RyZHVwKGdjLCBjb25zb2xlX3R0eSk7CiAKICAg
ICBkc3MtPmFvID0gYW87Ci0gICAgZHNzLT5kb21pZCA9IGRzcy0+ZHNwcy5k
b21pZCA9IGRvbWlkOwotICAgIGRzcy0+ZHNwcy5kbV9zYXZlZmlsZSA9IEdD
U1BSSU5URihMSUJYTF9ERVZJQ0VfTU9ERUxfU0FWRV9GSUxFIi4lZCIsCi0g
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGRvbWlkKTsK
KyAgICBkc3MtPmRvbWlkID0gZG9taWQ7CiAKICAgICByYyA9IGxpYnhsX19z
YXZlX2VtdWxhdG9yX3hlbnN0b3JlX2RhdGEoZHNzLCAmc3JzLT50b29sc3Rh
Y2tfYnVmLAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAmc3JzLT50b29sc3RhY2tfbGVuKTsKQEAgLTIxOTEsNiArMjE4
OSwxMSBAQCBzdGF0aWMgaW50IGRvX2RvbWFpbl9zb2Z0X3Jlc2V0KGxpYnhs
X2N0eCAqY3R4LAogICAgIH0KIAogICAgIGRzcy0+ZHNwcy5hbyA9IGFvOwor
ICAgIGRzcy0+ZHNwcy5kb21pZCA9IGRvbWlkOworICAgIGRzcy0+ZHNwcy5s
aXZlID0gZmFsc2U7CisgICAgcmMgPSBsaWJ4bF9fZG9tYWluX3N1c3BlbmRf
aW5pdChlZ2MsICZkc3MtPmRzcHMsIGRfY29uZmlnLT5iX2luZm8udHlwZSk7
CisgICAgaWYgKHJjKQorICAgICAgICBnb3RvIG91dDsKICAgICBkc3MtPmRz
cHMuY2FsbGJhY2tfZGV2aWNlX21vZGVsX2RvbmUgPSBzb2Z0X3Jlc2V0X2Rt
X3N1c3BlbmRlZDsKICAgICBsaWJ4bF9fZG9tYWluX3N1c3BlbmRfZGV2aWNl
X21vZGVsKGVnYywgJmRzcy0+ZHNwcyk7IC8qIG11c3QgYmUgbGFzdCAqLwog
CkBAIC0yMjA5LDYgKzIyMTIsOCBAQCBzdGF0aWMgdm9pZCBzb2Z0X3Jlc2V0
X2RtX3N1c3BlbmRlZChsaWJ4bF9fZWdjICplZ2MsCiAgICAgICAgIENPTlRB
SU5FUl9PRihkc3BzLCAqc3JzLCBkc3MuZHNwcyk7CiAgICAgbGlieGxfX2Fw
cF9kb21haW5fY3JlYXRlX3N0YXRlICpjZGNzID0gJnNycy0+Y2RjczsKIAor
ICAgIGxpYnhsX19kb21haW5fc3VzcGVuZF9kaXNwb3NlKGdjLCBkc3BzKTsK
KwogICAgIC8qCiAgICAgICogQXNrIGFsbCBiYWNrZW5kcyB0byBkaXNjb25u
ZWN0IGJ5IHJlbW92aW5nIHRoZSBkb21haW4gZnJvbQogICAgICAqIHhlbnN0
b3JlLiBPbiB0aGUgY3JlYXRpb24gcGF0aCB0aGUgZG9tYWluIHdpbGwgYmUg
aW50cm9kdWNlZCB0bwpkaWZmIC0tZ2l0IGEvdG9vbHMvbGlicy9saWdodC9s
aWJ4bF9kb21fc3VzcGVuZC5jIGIvdG9vbHMvbGlicy9saWdodC9saWJ4bF9k
b21fc3VzcGVuZC5jCmluZGV4IGY3ODIzYmJjOGYuLjRmYTIyYmI3MzkgMTAw
NjQ0Ci0tLSBhL3Rvb2xzL2xpYnMvbGlnaHQvbGlieGxfZG9tX3N1c3BlbmQu
YworKysgYi90b29scy9saWJzL2xpZ2h0L2xpYnhsX2RvbV9zdXNwZW5kLmMK
QEAgLTY3LDYgKzY3LDE2IEBAIG91dDoKICAgICByZXR1cm4gcmM7CiB9CiAK
K3ZvaWQgbGlieGxfX2RvbWFpbl9zdXNwZW5kX2Rpc3Bvc2UobGlieGxfX2dj
ICpnYywKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbGli
eGxfX2RvbWFpbl9zdXNwZW5kX3N0YXRlICAqZHNwcykKK3sKKyAgICBsaWJ4
bF9feHN3YWl0X3N0b3AoZ2MsICZkc3BzLT5wdmNvbnRyb2wpOworICAgIGxp
YnhsX19ldl9ldnRjaG5fY2FuY2VsKGdjLCAmZHNwcy0+Z3Vlc3RfZXZ0Y2hu
KTsKKyAgICBsaWJ4bF9fZXZfeHN3YXRjaF9kZXJlZ2lzdGVyKGdjLCAmZHNw
cy0+Z3Vlc3Rfd2F0Y2gpOworICAgIGxpYnhsX19ldl90aW1lX2RlcmVnaXN0
ZXIoZ2MsICZkc3BzLT5ndWVzdF90aW1lb3V0KTsKKyAgICBsaWJ4bF9fZXZf
cW1wX2Rpc3Bvc2UoZ2MsICZkc3BzLT5xbXApOworfQorCiAvKi0tLS0tIGNh
bGxiYWNrcywgY2FsbGVkIGJ5IHhjX2RvbWFpbl9zYXZlIC0tLS0tKi8KIAog
dm9pZCBsaWJ4bF9fZG9tYWluX3N1c3BlbmRfZGV2aWNlX21vZGVsKGxpYnhs
X19lZ2MgKmVnYywKQEAgLTM4OCwxMCArMzk4LDcgQEAgc3RhdGljIHZvaWQg
ZG9tYWluX3N1c3BlbmRfY29tbW9uX2RvbmUobGlieGxfX2VnYyAqZWdjLAog
ewogICAgIEVHQ19HQzsKICAgICBhc3NlcnQoIWxpYnhsX194c3dhaXRfaW51
c2UoJmRzcHMtPnB2Y29udHJvbCkpOwotICAgIGxpYnhsX19ldl9ldnRjaG5f
Y2FuY2VsKGdjLCAmZHNwcy0+Z3Vlc3RfZXZ0Y2huKTsKLSAgICBsaWJ4bF9f
ZXZfeHN3YXRjaF9kZXJlZ2lzdGVyKGdjLCAmZHNwcy0+Z3Vlc3Rfd2F0Y2gp
OwotICAgIGxpYnhsX19ldl90aW1lX2RlcmVnaXN0ZXIoZ2MsICZkc3BzLT5n
dWVzdF90aW1lb3V0KTsKLSAgICBsaWJ4bF9fZXZfcW1wX2Rpc3Bvc2UoZ2Ms
ICZkc3BzLT5xbXApOworICAgIGxpYnhsX19kb21haW5fc3VzcGVuZF9kaXNw
b3NlKGdjLCBkc3BzKTsKICAgICBkc3BzLT5jYWxsYmFja19jb21tb25fZG9u
ZShlZ2MsIGRzcHMsIHJjKTsKIH0KIApkaWZmIC0tZ2l0IGEvdG9vbHMvbGli
cy9saWdodC9saWJ4bF9pbnRlcm5hbC5oIGIvdG9vbHMvbGlicy9saWdodC9s
aWJ4bF9pbnRlcm5hbC5oCmluZGV4IDAyOGJjMDEzZDkuLmM2YTRhMTg3ZjUg
MTAwNjQ0Ci0tLSBhL3Rvb2xzL2xpYnMvbGlnaHQvbGlieGxfaW50ZXJuYWwu
aAorKysgYi90b29scy9saWJzL2xpZ2h0L2xpYnhsX2ludGVybmFsLmgKQEAg
LTM2MTcsNiArMzYxNyw4IEBAIHN0cnVjdCBsaWJ4bF9fZG9tYWluX3N1c3Bl
bmRfc3RhdGUgewogaW50IGxpYnhsX19kb21haW5fc3VzcGVuZF9pbml0KGxp
YnhsX19lZ2MgKmVnYywKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICBsaWJ4bF9fZG9tYWluX3N1c3BlbmRfc3RhdGUgKmRzcHMsCiAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgbGlieGxfZG9tYWluX3R5cGUgdHlw
ZSk7Cit2b2lkIGxpYnhsX19kb21haW5fc3VzcGVuZF9kaXNwb3NlKGxpYnhs
X19nYyAqZ2MsCisgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
IGxpYnhsX19kb21haW5fc3VzcGVuZF9zdGF0ZSAgKmRzcHMpOwogCiAvKiBj
YWxscyBkc3BzLT5jYWxsYmFja19kZXZpY2VfbW9kZWxfZG9uZSB3aGVuIGRv
bmUKICAqIG1heSBzeW5jaHJvbm91c2x5IGNhbGxzIHRoaXMgY2FsbGJhY2sg
Ki8KLS0gCjIuMzAuMQoK

--=separator
Content-Type: application/octet-stream; name="xsa368-4.13.patch"
Content-Disposition: attachment; filename="xsa368-4.13.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa368-4.14.patch"
Content-Disposition: attachment; filename="xsa368-4.14.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Mon Mar 22 18:49:00 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 22 Mar 2021 18:49:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.100293.191324 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lOPap-0000xC-4K; Mon, 22 Mar 2021 18:47:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 100293.191324; Mon, 22 Mar 2021 18:47:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lOPao-0000x4-WD; Mon, 22 Mar 2021 18:47:59 +0000
Received: by outflank-mailman (input) for mailman id 100293;
 Mon, 22 Mar 2021 15:47:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lOMlr-0006se-6N
 for xen-users@lists.xenproject.org; Mon, 22 Mar 2021 15:47:11 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lOMlr-0006VO-5K
 for xen-users@lists.xenproject.org; Mon, 22 Mar 2021 15:47:11 +0000
Received: from iwj (helo=mariner.uk.xensource.com)
 by xenbits.xenproject.org with local-bsmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lOMlr-0007Zy-3T
 for xen-users@lists.xenproject.org; Mon, 22 Mar 2021 15:47:11 +0000
Received: from iwj by mariner.uk.xensource.com with local (Exim 4.89)
 (envelope-from <iwj@xenproject.org>)
 id 1lOMlm-0000SU-Dc; Mon, 22 Mar 2021 15:47:06 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Subject:CC:To:Date:Message-ID:
	Content-Transfer-Encoding:Content-Type:MIME-Version:From;
	bh=QFVieVe62zkpf8DxrvcbVuPF/MGQ0CiXLe0qGXhW0ek=; b=cmcsQ6bt3tOplT+Csjxg7G1pyC
	5P3MJsfZ994ErY6rHPvs6aqofl2nHmvUdbNtWkf/ExhLzjsa335NN7/KaiUumNC1XRPjsjkiwyItC
	Nr5AnXsngo4Gjt0GBPmT3WsYLwc0+IkwYk9UQK+eTTKNpYnslgZ7fsmgXoT/mEh20SUU=;
From: Ian Jackson <iwj@xenproject.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <24664.48122.241503.647432@mariner.uk.xensource.com>
Date: Mon, 22 Mar 2021 15:47:06 +0000
To: xen-announce@lists.xenproject.org
CC: xen-devel@lists.xenproject.org,
    xen-users@lists.xenproject.org
Subject: Xen 4.15 RC4

From: Ian Jackson <iwj@xenproject.org>
Date: Mon, 15 Mar 2021 12:14:51 +0000

Xen 4.15 RC4 is now available.

It is available from git:
  git clone https://xenbits.xenproject.org/git-http/xen.git -b 4.15.0-rc4

For your convenience a tarball is available:
  https://downloads.xenproject.org/release/xen/4.15.0-rc4/xen-4.15.0-rc4.tar.gz
  https://downloads.xenproject.org/release/xen/4.15.0-rc4/xen-4.15.0-rc4.tar.gz.sig

Please send bug reports and test reports to
xen-devel@lists.xenproject.org.  When sending bug reports, please CC
relevant maintainers and me (iwj@xenproject.org).

I will send an update on the state of the release fairly soon.

Ian.



From xen-users-bounces@lists.xenproject.org Fri Mar 26 18:13:09 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Mar 2021 18:13:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.101997.195433 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lPqwd-0001Bx-8G; Fri, 26 Mar 2021 18:12:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 101997.195433; Fri, 26 Mar 2021 18:12:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lPqwd-0001Bp-42; Fri, 26 Mar 2021 18:12:27 +0000
Received: by outflank-mailman (input) for mailman id 101997;
 Fri, 26 Mar 2021 18:12:26 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=cCDp=IY=gmail.com=a.rajagopal.81@srs-us1.protection.inumbo.net>)
 id 1lPqwb-0001Bj-Rd
 for xen-users@lists.xenproject.org; Fri, 26 Mar 2021 18:12:25 +0000
Received: from mail-pf1-x433.google.com (unknown [2607:f8b0:4864:20::433])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id f9464389-cc6e-43c5-a613-39573d5fc277;
 Fri, 26 Mar 2021 18:12:24 +0000 (UTC)
Received: by mail-pf1-x433.google.com with SMTP id c17so5395473pfn.6
 for <xen-users@lists.xenproject.org>; Fri, 26 Mar 2021 11:12:24 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: f9464389-cc6e-43c5-a613-39573d5fc277
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:from:date:message-id:subject:to;
        bh=1vEzmXBcCfx0UhpOXPknzO0rfKTF2zlGb5jSucqUqIU=;
        b=VrJlOsl0v+ZaWvscLqiQ8LrFAMjTrMwYcwkI5t1HDY3tFKmOpIcMp9mBXUj4YF4IDE
         MX3x77tbolCnkhGBG9U+y/fXB9ON+UfpTlE+bYp3bCfR3gDeuzqGh/5S5Xd0kglZ9K8b
         UYzfNxyf+KBSO6MZr1ZXHvnss7dzQR0icI8Rxpyyq9I1yVdmqGRHdhmR3wCNucVqYixe
         aE+ASpG6JmlFtTBwRwGpf2ssnRciZoVhMfUwzxcSsfyZot+2A2EuGEtHkKGugWitGn6I
         Z5FU7fIIG0uKmJwu8/tA0YfhyTYR/QDsp5UfL3jQwmb3ViXIv6WJCpTrnJdEb7ejOB5+
         QTqw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=1vEzmXBcCfx0UhpOXPknzO0rfKTF2zlGb5jSucqUqIU=;
        b=jf5Snqfjvja6/+GFfir9FAiigmBKNycLW5JOkBxX4vaxW9U/7jDHM7xG8O63/M827I
         VeCsXecPXxoy3e+7PGbDr2pHBznx0OKpLv3O/JsyL/TvKWQAxjGe2aJA9PALsBI+hNei
         Ou6pw7xKguzuaTQeoMTXNBMeXozLev4hG/vhx7srai+bR3ViMxQiS7FvfKJdQUgfNAMn
         zSrCt7jvyWwa1EA3bwCACbKknuR0V6rayCBp7bnSJd+bNbbzTWQdzZtkPYf+ije8YW9h
         NvmrJ5VEh5yu9VnShlSuA2F/N3yomzaFdns/smRoPkMlquvjv2rilW9trKpdVaBTtudp
         04ww==
X-Gm-Message-State: AOAM53206Dd9jOxOK5+Umd4nB8TcRxP8XjOxVJcwmWSjgk9AuWagvRfU
	YMgqUUOUfOXCKUdSO2aVs2NpT3xdb592EIeETNTDk7nuZoI=
X-Google-Smtp-Source: ABdhPJxboCKw2wdDpfMwOvDzSIFJE/u9HdUthp/RgA9hUNSzIFvrXHwwihZrIztgkDH3/jywsAa0f9Pm0IjWXii6MHg=
X-Received: by 2002:a63:3ca:: with SMTP id 193mr13325823pgd.274.1616782343526;
 Fri, 26 Mar 2021 11:12:23 -0700 (PDT)
MIME-Version: 1.0
From: Rajagopal Aravindan <a.rajagopal.81@gmail.com>
Date: Fri, 26 Mar 2021 23:41:48 +0530
Message-ID: <CAEQQSVstbZAnOBc2zaexSNu8kzfA7ZUp_ArM8_F2_=KAJW+FHQ@mail.gmail.com>
Subject: Xen - i.MX8QM vs i.MX8MQ
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="00000000000043dca305be747999"

--00000000000043dca305be747999
Content-Type: text/plain; charset="UTF-8"

Hello All,

Greetings !

I came across a few links saying Xen is supported on NXP's i.MX8QM.
But, I don't see any such thing for i.MX8MQ and people only talking about
jailhouse hypervisor for MQ. [1]

Can someone here clarify whether i.MX8MQ h/w is NOT compatible with Xen or
the required piece of s/w is yet to be upstreamed to Xen ?

Thanks,
Rajagopal

[1] -
https://community.nxp.com/t5/i-MX-Processors/IMX8-XEN-SUPPORT/m-p/841703

--00000000000043dca305be747999
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello All,<div><br></div><div>Greetings !</div><div><br></=
div><div>I came across a few links saying Xen is supported on NXP&#39;s i.M=
X8QM.</div><div>But, I don&#39;t see any such thing for i.MX8MQ and people =
only talking about jailhouse hypervisor for MQ. [1]</div><div><br></div><di=
v>Can someone here clarify whether i.MX8MQ h/w is NOT compatible with Xen o=
r the required piece of s/w is yet to be upstreamed to Xen ?</div><div><br>=
</div><div>Thanks,</div><div>Rajagopal</div><div><br></div><div>[1] -=C2=A0=
<a href=3D"https://community.nxp.com/t5/i-MX-Processors/IMX8-XEN-SUPPORT/m-=
p/841703">https://community.nxp.com/t5/i-MX-Processors/IMX8-XEN-SUPPORT/m-p=
/841703</a></div></div>

--00000000000043dca305be747999--


From xen-users-bounces@lists.xenproject.org Fri Mar 26 18:30:07 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 26 Mar 2021 18:30:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.102022.195452 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lPrDI-0002zI-Rk; Fri, 26 Mar 2021 18:29:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 102022.195452; Fri, 26 Mar 2021 18:29:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lPrDI-0002zA-NA; Fri, 26 Mar 2021 18:29:40 +0000
Received: by outflank-mailman (input) for mailman id 102022;
 Fri, 26 Mar 2021 18:29:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1lPrDG-0002z4-V8
 for xen-users@lists.xenproject.org; Fri, 26 Mar 2021 18:29:38 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lPrDG-0004rX-OE; Fri, 26 Mar 2021 18:29:38 +0000
Received: from [54.239.6.185] (helo=a483e7b01a66.ant.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1lPrDG-0002aV-Fr; Fri, 26 Mar 2021 18:29:38 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
	MIME-Version:Date:Message-ID:From:References:To:Subject;
	bh=kHUSdZ+uYJjENp21LA9yQIt/8ZxNP7GZe33KqRgK8qs=; b=rcyPpv4sRnBFhC0JiDNvBQSdCg
	GCA0yGBEpxx3a0UAitWWGEYzUwCx+zOdUxgc8cmIfLfSu9IscRzNsM55h7lr+dfB5R7tWmGH6s8iw
	bg7n8AtG4/SpEZwooJVwJRcCON+rbEWxhyuY2LN3G5WOMR7qnALpy5487dbkCQycUCnc=;
Subject: Re: Xen - i.MX8QM vs i.MX8MQ
To: Rajagopal Aravindan <a.rajagopal.81@gmail.com>,
 xen-users@lists.xenproject.org, Peng Fan <peng.fan@nxp.com>
References: <CAEQQSVstbZAnOBc2zaexSNu8kzfA7ZUp_ArM8_F2_=KAJW+FHQ@mail.gmail.com>
From: Julien Grall <julien@xen.org>
Message-ID: <4c1553b1-3b4a-be0d-3034-8ad0207a1d9e@xen.org>
Date: Fri, 26 Mar 2021 18:29:37 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0)
 Gecko/20100101 Thunderbird/78.8.1
MIME-Version: 1.0
In-Reply-To: <CAEQQSVstbZAnOBc2zaexSNu8kzfA7ZUp_ArM8_F2_=KAJW+FHQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-GB
Content-Transfer-Encoding: 7bit

(+ Peng)

On 26/03/2021 18:11, Rajagopal Aravindan wrote:
> Hello All,

Hi,

> Greetings !
> 
> I came across a few links saying Xen is supported on NXP's i.MX8QM.
> But, I don't see any such thing for i.MX8MQ and people only talking 
> about jailhouse hypervisor for MQ. [1]
> 
> Can someone here clarify whether i.MX8MQ h/w is NOT compatible with Xen 
> or the required piece of s/w is yet to be upstreamed to Xen ?

I have seen users that are successfuly booting Xen on i.MX8, although 
they are not directly using Xen Project tree but one provided by code 
aurora NXP (see [1]).

AFAIK, there might be some missing pieces in the Xen Project tree for 
that board. I am not sure whether this is just to take full of advantage 
of board.

I have CCed Peng who might be able to provide support.

Cheers,

[1] https://source.codeaurora.org/external/imx/imx-xen/

-- 
Julien Grall


From xen-users-bounces@lists.xenproject.org Mon Mar 29 01:54:20 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Mar 2021 01:54:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.102746.196256 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQh5x-0005AI-L6; Mon, 29 Mar 2021 01:53:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 102746.196256; Mon, 29 Mar 2021 01:53:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQh5x-0005A6-Eq; Mon, 29 Mar 2021 01:53:33 +0000
Received: by outflank-mailman (input) for mailman id 102746;
 Mon, 29 Mar 2021 01:53:32 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=si1v=I3=outlook.com=yinhua_chen@srs-us1.protection.inumbo.net>)
 id 1lQh5w-0005A1-6Q
 for xen-users@lists.xenproject.org; Mon, 29 Mar 2021 01:53:32 +0000
Received: from APC01-SG2-obe.outbound.protection.outlook.com (unknown
 [40.92.253.45]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id e422bc2c-35a0-411b-a9dd-cedf1a219804;
 Mon, 29 Mar 2021 01:53:29 +0000 (UTC)
Received: from SG2APC01FT011.eop-APC01.prod.protection.outlook.com
 (2a01:111:e400:7ebd::49) by
 SG2APC01HT172.eop-APC01.prod.protection.outlook.com (2a01:111:e400:7ebd::236)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.29; Mon, 29 Mar
 2021 01:53:22 +0000
Received: from OSYPR01MB5431.jpnprd01.prod.outlook.com (10.152.250.51) by
 SG2APC01FT011.mail.protection.outlook.com (10.152.250.183) with Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.3977.29 via Frontend Transport; Mon, 29 Mar 2021 01:53:22 +0000
Received: from OSYPR01MB5431.jpnprd01.prod.outlook.com
 ([fe80::311c:8bb5:d1b7:6743]) by OSYPR01MB5431.jpnprd01.prod.outlook.com
 ([fe80::311c:8bb5:d1b7:6743%7]) with mapi id 15.20.3977.033; Mon, 29 Mar 2021
 01:53:22 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: e422bc2c-35a0-411b-a9dd-cedf1a219804
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XNRPedpBE1kXd6RsvMY1+WI0/gx+oDFe2Lkf/Lu2SP9qiGjhu8sgeZxoerajSxWc5bMhDEgpa6lLXBcp/mlkm2vOK/Wb8B79UgDS1fJWRYfqTRxtpftoQstD01nbf0t6+lfwIyV3nnTqQ5RNk2+T20axc8m2bm2+oVLfy5Et+WL62QF6Sv0VE0u8jDBgymjNW+oxNInVhk6TElje8Qmbiv+efsXCB2uSdVjjUpjUarEvwm5PqSBlC6Ow3vNfUPsKmKQI5cFuzs2NlzpIEtsljkbyWspPDbC53M8WB7Rbk7KQ4ZjCh/UKJn1fdpiL2ChL5L0ajC2r/RD4rIuEX/Gwlg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0v6shpR0+BQM8v0oxbNpOCveTwm9dMio8jYIPrl2KyA=;
 b=iTKE9v0v2Jg5TXYqUk5fxw03cwCjaxr8vPO6Z9ZUeaGOpES+aZEoxFyRPiOQTCqqLubSCp0hulszrPGl0mry1B6CEDOXWHjpaxcJsAF1DKkN8de+RsamlWRrZUTxzINbXAX59zuxut6HWttnNKlRusifS5orKRcMcORDaCs09LW3iLKHfC2CfcqWsvErJfhQtum81WnRgh7PM/BfvWCD07BkyU9CN2e0sxKh6FRgy7nOOHotiaW0ZAjsdbv8Kya2RSO8XGgDvKGPWV5kalSrukrZHFNH0ULxwrfDkhhPBuVRhyDKoeM/1JkZzeKLWLg9PmSZE7aEZGlVbMQbW7HKlg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none;
 dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0v6shpR0+BQM8v0oxbNpOCveTwm9dMio8jYIPrl2KyA=;
 b=fnqoPPedoPUc1KgJ37dvASlYVkLhyXSJsSdneuWw4sipCM2mPkklgvKhs27a8pqrZFFd4qZKfQWxGA1yka45E3/Ls2DRuzqb+U6Z03yj51nwfNv7n+3z6++Tjeml7A0uQxNVyfqIFYK093L3ONbx1nPaWZSzCSTCIho26tT4lX5B4/it0RK/rbEq5dzfonFm+JHCRaHzCJ6ztKMLqYP8XdIWvALZOfr9ba536bh5/0esZ0NH9Ekiow1a+yhtVwsNrgqrXE9C/KQLBskAAkmYD4KA6yjL6MUBf7wBAxfLIdBePK7oAyDkJZxh4JPzENRb7dzSGet7BTejuYjfpbWboA==
From: "yinhua_chen@outlook.com" <yinhua_chen@outlook.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: ARMv8-A Xen runs on FVP/fastmodels
Thread-Topic: ARMv8-A Xen runs on FVP/fastmodels
Thread-Index: AQHXJDmKrwPd3eiDnEyPjRTIENGm+g==
Date: Mon, 29 Mar 2021 01:53:22 +0000
Message-ID:
 <OSYPR01MB5431BC16DBD7C3F68047E6D2817E9@OSYPR01MB5431.jpnprd01.prod.outlook.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-incomingtopheadermarker:
 OriginalChecksum:0D8F4CCDFCFE1B0A8E4FC682ECE7F8210FEF072E40F7FEF44A6590E0294EC95F;UpperCasedChecksum:5C6DD7698CD93231A5F1EF6CFD00D32D027664CD38DB00682C6D352C30A625EE;SizeAsReceived:6685;Count:41
x-tmn: [/8qH2ohHwMK64e+nHlpgoT7245Yf/FAU]
x-ms-publictraffictype: Email
x-incomingheadercount: 41
x-eopattributedmessage: 0
x-ms-office365-filtering-correlation-id: 5b0f3b5d-a6a6-49a4-711a-08d8f2556f31
x-ms-traffictypediagnostic: SG2APC01HT172:
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 N7T/sFsMTuO6gP7n31R2ChgwcTICvVPWxrmXLkf6S3nax8wkP/Vfpu8AyXh6tFk2a+BabRGemC0ebihC5B5pPWXsRJYsM1TMr8Ioh6UlKf2Or+BUc0koJgI+kuWCFD0eBMfBeJ7Un2+sfQzAkmVzGs3IvLBdyYy8tmA7L9w1dikjEfA48b9bi8b9+eFs2Iz+r0NR+rlV92kwiIX2BSbRQfTyDraXWmNMZwUibtNVLp/+3Vwu3Lyo7AQZW44USZfi4VKsd6J634mhJ3Cz7IqoZDQ3Ruvw+WOXfHVMyNI7IPoazNhC7HsG++/ibNs7UbQ/tSjceuqw39nq4eoEQyzjVl86wc0gPhuNqmN6KdVMohyq4nEDfOcOEcgvRJVhPIekv7nWat9va3R+E+dPwHvjFkqGRr6bR4nV29V9aAonPU5VEV8kBwW/XtufWc6Hv5Up
x-ms-exchange-antispam-messagedata:
 VmQcKJ1rLE5KtlIeta492lGHNr3B8vxjuRqyw65KGG/bSS3PFOCC8flYg7afas8tPa3vto5Mhh2yhMlagIR43poJgkCXBf/UFhrvSW3nIISw5yUHwwqN4LD5d0VKLX2pZQyeZkRqEduvCH5gxSoovg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative;
	boundary="_000_OSYPR01MB5431BC16DBD7C3F68047E6D2817E9OSYPR01MB5431jpnp_"
MIME-Version: 1.0
X-OriginatorOrg: outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-AuthSource: SG2APC01FT011.eop-APC01.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b0f3b5d-a6a6-49a4-711a-08d8f2556f31
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Mar 2021 01:53:22.2009
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Internet
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SG2APC01HT172

--_000_OSYPR01MB5431BC16DBD7C3F68047E6D2817E9OSYPR01MB5431jpnp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi all,

I am interested in Xen-on-ARM, and I want to test and modify Xen on ARM pla=
tform. For debug purpose, I prefer using simulators.

I do not want to use QEMU because some other softwares I am using does not =
support running on QEMU.

However, I cannot find any Xen-on-FVP blogs or documents published in recen=
t three years, and I met many problems when trying to run Xen on FVP/fast m=
odels according to the old blogs/documents.

If there is anyone who can help me, I appreciate for your help.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DThe following i=
s the effort I made=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

There are two blogs/documents I refer to:

1. (2015)How to boot Xen on FVP(fast) model using UEFI. https://wiki-archiv=
e.linaro.org/LEG/Engineering/Xen_boot_on_FVP_UEFI

I follow this blog, and reset UEFI-tools, linaro-edk2 to 2015 version, use =
Linaro-GCC4.8. Error comes out when running the script "tool-build-v8-fvp.s=
h<https://wiki-archive.linaro.org/LEG/Engineering/Xen_boot_on_FVP_UEFI?acti=
on=3DAttachFile&do=3Dupload_form&ticket=3D0060612dbc.fd8d92425699a7d5621e71=
c63ef8308216153ca5&target=3D+tool-build-v8-fvp.sh>".

And I cannot use 2015-version-ATF, since I need the new features of 2019-ve=
rsion-ATF.

If anyone needs to see the error message, I will reproduce the error messag=
e. I need to spend some time to reproduce the error.

2. (2020 Oct 13)Xen ARM with Virtualization Extension.
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions#Bui=
lding_Xen_on_ARM

I follow "Building Xen on ARM" instructions:

2-1. I clone Xen from https://xenbits.xen.org/git-http/xen.git
2-2. I compile Xen by (with Linaro-GCC7.5)

make dist-xen XEN_TARGET_ARCH=3Darm64 CROSS_COMPILE=3Daarch64-linux-gnu-

2-3. About the toolstack, I follow this wiki Xen_on_ARM_and_Yocto<https://w=
iki.xenproject.org/wiki/Xen_on_ARM_and_Yocto>.
        The Xen-image-on-QEMU part seems works fine. However, I cannot find=
 anything about "FVP/fastmodels" in the conf/local.conf file
        I try to build Xen-image-on-FVP by referencing the Xen-image-on-ras=
pberrypi part in this wiki.
        However, I cannot find any "FVP/fastmodels" branch in yocto reposit=
ory.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

If there is anyone who can help me build Xen on FVP/fastmodels, I appreciat=
e for your help.

Sincerely,
Yinhua


--_000_OSYPR01MB5431BC16DBD7C3F68047E6D2817E9OSYPR01MB5431jpnp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none;"> P {margin-top:0;margin-bo=
ttom:0;} </style>
</head>
<body dir=3D"ltr">
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Hi all,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
I am interested in Xen-on-ARM, and I want to test and modify Xen on ARM pla=
tform. For debug purpose, I prefer using simulators.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
I do not want to use QEMU because some other softwares I am using does not =
support running on QEMU.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
However, I cannot find any Xen-on-FVP blogs or documents published in recen=
t three years, and I met many problems when trying to run Xen on FVP/fast m=
odels according to the old blogs/documents.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
If there is anyone who can help me, I appreciate for your help.</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DThe following i=
s the effort I made=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
There are two blogs/documents I refer to:</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<div><span>1. (2015)How to boot Xen on FVP(fast) model using UEFI.&nbsp;<a =
href=3D"https://wiki-archive.linaro.org/LEG/Engineering/Xen_boot_on_FVP_UEF=
I" id=3D"LPlnk670408">https://wiki-archive.linaro.org/LEG/Engineering/Xen_b=
oot_on_FVP_UEFI</a></span></div>
<div><br>
</div>
<div>I follow this blog, and reset UEFI-tools, linaro-edk2 to 2015 version,=
 use Linaro-GCC4.8. Error comes out when running the script &quot;<a class=
=3D"attachment nonexistent" href=3D"https://wiki-archive.linaro.org/LEG/Eng=
ineering/Xen_boot_on_FVP_UEFI?action=3DAttachFile&amp;do=3Dupload_form&amp;=
ticket=3D0060612dbc.fd8d92425699a7d5621e71c63ef8308216153ca5&amp;target=3D+=
tool-build-v8-fvp.sh" title=3D"&#19978;&#36733;&#26032;&#38468;&#20214;&quo=
t; tool-build-v8-fvp.sh&quot;" style=3D"outline:none;color:rgb(108, 157, 16=
);font-family:Ubuntu, sans-serif;font-size:13px;background-color:rgb(255, 2=
55, 255)" id=3D"LPlnk277173">tool-build-v8-fvp.sh</a>&quot;.</div>
<div><br>
</div>
<div>And I cannot use 2015-version-ATF, since I need the new features of 20=
19-version-ATF.</div>
<div><br>
</div>
<div>If anyone needs to see the error message, I will reproduce the error m=
essage. I need to spend some time to reproduce the error.</div>
<div><span style=3D"background-color:rgb(255, 255, 255);display:inline !imp=
ortant"><br>
</span></div>
<div><span style=3D"background-color:rgb(255, 255, 255);display:inline !imp=
ortant">2. (2020 Oct 13)Xen ARM with Virtualization Extension.&nbsp;</span>=
</div>
<div><span style=3D"background-color:rgb(255, 255, 255);display:inline !imp=
ortant"><a href=3D"https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualiza=
tion_Extensions#Building_Xen_on_ARM" id=3D"LPlnk933933">https://wiki.xenpro=
ject.org/wiki/Xen_ARM_with_Virtualization_Extensions#Building_Xen_on_ARM</a=
></span></div>
<div><br>
</div>
<div>I follow &quot;Building Xen on ARM&quot; instructions:</div>
<div><br>
</div>
<div>2-1. I clone Xen from&nbsp;<a href=3D"https://xenbits.xen.org/git-http=
/xen.git" id=3D"LPlnk375034">https://xenbits.xen.org/git-http/xen.git</a><b=
r>
</div>
<div>2-2. I compile Xen by (with Linaro-GCC7.5)
<pre style=3D"font-family:monospace, monospace;background-color:rgb(248, 24=
9, 250);border:1px solid rgb(234, 236, 240);padding:1em;line-height:1.3em;f=
ont-size:12.7px">make dist-xen XEN_TARGET_ARCH=3Darm64 CROSS_COMPILE=3Daarc=
h64-linux-gnu-</pre>
</div>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
2-3. About the toolstack, I follow this wiki&nbsp;<a href=3D"https://wiki.x=
enproject.org/wiki/Xen_on_ARM_and_Yocto" title=3D"Xen on ARM and Yocto" sty=
le=3D"color:rgb(0, 43, 184);background:none rgb(255, 255, 255);font-family:=
sans-serif;font-size:12.7px">Xen_on_ARM_and_Yocto</a><span style=3D"font-fa=
mily:sans-serif;font-size:12.7px;background-color:rgb(255, 255, 255);displa=
y:inline !important">.</span></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<span style=3D"font-family:sans-serif;font-size:12.7px;background-color:rgb=
(255, 255, 255);display:inline !important">&nbsp; &nbsp; &nbsp; &nbsp; The =
Xen-image-on-QEMU part seems works fine. However, I cannot find anything ab=
out &quot;FVP/fastmodels&quot; in the&nbsp;<b style=3D"background-color:rgb=
(255, 255, 255)">conf/local.conf
</b><span style=3D"background-color:rgb(255, 255, 255)">file</span></span><=
/div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<span style=3D"font-family:sans-serif;font-size:12.7px;background-color:rgb=
(255, 255, 255);display:inline !important"><span style=3D"background-color:=
rgb(255, 255, 255)">&nbsp; &nbsp; &nbsp; &nbsp; I try to build Xen-image-on=
-FVP by referencing the Xen-image-on-raspberrypi part in
 this wiki.</span></span></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<span style=3D"font-family:sans-serif;font-size:12.7px;background-color:rgb=
(255, 255, 255);display:inline !important"><span style=3D"background-color:=
rgb(255, 255, 255)">&nbsp; &nbsp; &nbsp; &nbsp; However, I cannot find any =
&quot;FVP/fastmodels&quot; branch in yocto repository.</span></span></div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<span style=3D"background-color:rgb(255, 255, 255);display:inline !importan=
t">If there is anyone who can help me build Xen on FVP/fastmodels, I apprec=
iate for your help.</span><br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Sincerely,</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
Yinhua</div>
<div style=3D"font-family: Calibri, Arial, Helvetica, sans-serif; font-size=
: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
</body>
</html>

--_000_OSYPR01MB5431BC16DBD7C3F68047E6D2817E9OSYPR01MB5431jpnp_--


From xen-users-bounces@lists.xenproject.org Mon Mar 29 03:09:57 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Mar 2021 03:09:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.102772.196279 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQiH9-0004uN-B8; Mon, 29 Mar 2021 03:09:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 102772.196279; Mon, 29 Mar 2021 03:09:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQiH9-0004uG-7v; Mon, 29 Mar 2021 03:09:11 +0000
Received: by outflank-mailman (input) for mailman id 102772;
 Mon, 29 Mar 2021 03:09:10 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=qE7n=I3=nxp.com=peng.fan@srs-us1.protection.inumbo.net>)
 id 1lQiH7-0004ts-Py
 for xen-users@lists.xenproject.org; Mon, 29 Mar 2021 03:09:09 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (unknown
 [40.107.14.43]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 11f75be8-24f4-4a2e-94fd-b2b7bbc029c4;
 Mon, 29 Mar 2021 03:09:07 +0000 (UTC)
Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com (2603:10a6:4:a1::14)
 by DBBPR04MB7787.eurprd04.prod.outlook.com (2603:10a6:10:1e3::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.25; Mon, 29 Mar
 2021 03:09:05 +0000
Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com
 ([fe80::c57a:6964:f72c:21cf]) by DB6PR0402MB2760.eurprd04.prod.outlook.com
 ([fe80::c57a:6964:f72c:21cf%11]) with mapi id 15.20.3977.033; Mon, 29 Mar
 2021 03:09:05 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 11f75be8-24f4-4a2e-94fd-b2b7bbc029c4
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lQbF3yivetCEKYjVhtS4sDwi4sVBcAZDrkDvvbdMHA/HF9hqpRaMsrvSNgLn/uekM30NSQo+oPgcUYqPO6dxiMOb52IEYmvEZU90l8NgtfuWSwGiAingCj5xAS39xWN01QvW6eotj3wztznpXYbf0+B6NgvwlkxjkHgBv4BE9Nuzw3WJpv3ZfiG/YyFUNwQYPrqhfBdBf9LASxHtHEUSjPU33havovony2BCLgKlKqaotAewqM/EeIjs1IHobdKdvkPE/Eja6FrLVMv16zKa/6DY0YMUE58ifRCXNZoWlGOsdUETg1ziT8Tu5QFbOw8RgjxXkTYY6BL1of+LMMKmBA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+uFC6KuhPEhSAk8+ANqA5/B9IHWPBxU6k/k6vjuN7Ys=;
 b=mdwn4veDFNmcpqLFdGyWR0yovbsePLb599AwNk0mofxrsTpXYxoqujjQhpQSjtvLhw3FoGTbDZ/Z98LTrvHS94fTkWzdrmHI2+BQtfn14MTLACvX0TjO6NiQydRFzo5lhfWk27cWcTt/fMIlSK9Vq1Za1q8YFogC4OYF1vUNbfJq/7qcq5twRVnzhHHVTFy11WWiGh5wBFikmeCoe3SuI02Yi1U2cynezMKx2Oh+XMcrAPmX2xdGw4DtMV4OyGTGUJMIkDIqdNSc+Jr6X5b3vTKLsVfbJJyt5C+tBtXIDS86Wwx+fLw0O3vKwcwrXHN1742KiR7pWqshHYhf0Lbc+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass
 header.d=nxp.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+uFC6KuhPEhSAk8+ANqA5/B9IHWPBxU6k/k6vjuN7Ys=;
 b=bWqxuR2XfyrifNaMkJI7aEnudX0LY14Jij6pP4sdiQqAfDnCKVxTTT+mByyUL9PN9yhqhyw3BvhE/4B1aqNQWUuAMxdqBOZkDDdTT9xrxYZmAnWJPD06KOfs1Utq4bmATBJKQX/BkLyffwjs1KNS0h/VRt8f2DgKr6HxywjNA5M=
From: Peng Fan <peng.fan@nxp.com>
To: Julien Grall <julien@xen.org>, Rajagopal Aravindan
	<a.rajagopal.81@gmail.com>, "xen-users@lists.xenproject.org"
	<xen-users@lists.xenproject.org>
Subject: RE: Xen - i.MX8QM vs i.MX8MQ
Thread-Topic: Xen - i.MX8QM vs i.MX8MQ
Thread-Index: AQHXImuezUqQRv99fkyFpexQrpacT6qWlxyAgAO0zXA=
Date: Mon, 29 Mar 2021 03:09:05 +0000
Message-ID:
 <DB6PR0402MB27601EF103348591F838BF12887E9@DB6PR0402MB2760.eurprd04.prod.outlook.com>
References:
 <CAEQQSVstbZAnOBc2zaexSNu8kzfA7ZUp_ArM8_F2_=KAJW+FHQ@mail.gmail.com>
 <4c1553b1-3b4a-be0d-3034-8ad0207a1d9e@xen.org>
In-Reply-To: <4c1553b1-3b4a-be0d-3034-8ad0207a1d9e@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: xen.org; dkim=none (message not signed)
 header.d=none;xen.org; dmarc=none action=none header.from=nxp.com;
x-originating-ip: [119.31.174.71]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 77a8db19-9054-4f96-716e-08d8f2600316
x-ms-traffictypediagnostic: DBBPR04MB7787:
x-microsoft-antispam-prvs:
 <DBBPR04MB77871F0F0BA165CEAA329648887E9@DBBPR04MB7787.eurprd04.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB6PR0402MB2760.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(376002)(39850400004)(366004)(346002)(396003)(136003)(110136005)(66556008)(2906002)(64756008)(66446008)(316002)(66476007)(45080400002)(38100700001)(71200400001)(44832011)(33656002)(76116006)(55016002)(53546011)(186003)(8676002)(6506007)(86362001)(52536014)(5660300002)(26005)(966005)(83380400001)(66946007)(8936002)(478600001)(9686003)(7696005);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata:
 =?us-ascii?Q?JZklDB7fSrHOkK4epUEv5HsWh7K6eawCgLsmzc4/qofQFEr4udSGTfzNxTsD?=
 =?us-ascii?Q?A9B4u6YwwSpldFoOdywbbWegwl7+/NIfDUjPuOzHXk6oTGoojHzXVjktzCfq?=
 =?us-ascii?Q?0j1RsY2OIqrS2ALhAM3dJF72NnaDWb5WDvflIJQ7lO0t1srP9857A+5TNvlE?=
 =?us-ascii?Q?N1Kqkoutso4ouZKRhPmqemdMrvjOKAhEFXE9rWnT9W6c1hRSJSAAvcCmidYb?=
 =?us-ascii?Q?5Ux8OXkgno2ndbj4r+hux5YBO9i916hyxjB6vqwPXCXZfe/ocaVNRrZcRZm1?=
 =?us-ascii?Q?SCUakSpHWRxfxWvdw6Pl73IaZDYce8juWAgrRo82EexOP5QRC3VL89ep+yXW?=
 =?us-ascii?Q?GYrAztiDpAn7+W/4lCXMppQ9BOsM9jG6VZ16nBbQXZl8JGDarnBOR0eSChBu?=
 =?us-ascii?Q?sPZy1PKmHF9EpQ+ALfvFs1kFMpQXpxjl/z/JZWmvNh+hb2AVrMcnySKTsfxY?=
 =?us-ascii?Q?TERA+WHqeWXEDstmW6fKmjxDNlwAyu1nkLEiVxuBZ8NqoKWm6vZiCriy0ty+?=
 =?us-ascii?Q?3jZPsafdxHXyqW5tWAUxQ2LE8KBA59YXSIIhL9IJYDeB0BgF4GpgN3H2i8LU?=
 =?us-ascii?Q?kH2+yL+beYSkXzLTz5AmLcsZ46JdMIIBLwFDJ9RKygCB3u4xQkdJXycuiWFP?=
 =?us-ascii?Q?Q2ijk+CgNoc9F+OqOxLV+W2qwDAudAUHdfTupzMAMxByBLh5UMF6MHLPi0iu?=
 =?us-ascii?Q?n/dti4NytGBnNITX7EEIwVu4kpJz9ZHkbiMfV1bofJyw0oQWutbrh0QMFfbd?=
 =?us-ascii?Q?7w3DAWeMwJeCuZmoFfceWsqYo94/JzmjmRESzJsjuSZhP6MPi1fQ2Dxz1laC?=
 =?us-ascii?Q?hRNdJ9MeRjvsYR46hgQ6STBjEd8xrArF1UdTCnRoJHfUUYDbt3BDzQ6mPlSp?=
 =?us-ascii?Q?PHtzWHoSIW2QKuY7yR/Jvjoei/tjGd6VKHX9Bd+y7/MD+dXvAsucfRetpXDh?=
 =?us-ascii?Q?L4l9T6isLF7H/rkqeQDd+1FoYtpdHQkaybnwyINIwKaik2CFuR6apyoHOSBD?=
 =?us-ascii?Q?Xt5G2luU3YHNM/ffu9dWrzRpxx+TwzWdYAYptrv76jRI8m+8qEYrdtx/IvFa?=
 =?us-ascii?Q?8SnePJGnqYMKmXkEjFqUFDQhfwMugzF29Egc+kqozprvxEw1A5784FUxApT9?=
 =?us-ascii?Q?BD6iCGYCZ7vbiz266s17Fi6AxleFb3PmokBOEiqsOaq2UyyB8x7tZ91kalJh?=
 =?us-ascii?Q?caHU+Ywm1r5qCFvURbxoMAywz+gku76i5XIyONoRle/hgdCqlAcBNYp1fCrT?=
 =?us-ascii?Q?y2Y0FHJvycwVL27MM2qjp6uyEPx2zlAqUnWHEbK8xk1Axi/Hy+ynCOQvadnB?=
 =?us-ascii?Q?BlA=3D?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nxp.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB6PR0402MB2760.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 77a8db19-9054-4f96-716e-08d8f2600316
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Mar 2021 03:09:05.4080
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: z4TErUx/w7AZlwORZdD93hk+SXTlP31mxI+maVPUqkf7HLU91V98HoDbPaIVBSQS/ZYrCES9nlWQOrpGZ788MQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR04MB7787

> Subject: Re: Xen - i.MX8QM vs i.MX8MQ
>=20
> (+ Peng)

Thanks for adding me.

>=20
> On 26/03/2021 18:11, Rajagopal Aravindan wrote:
> > Hello All,
>=20
> Hi,
>=20
> > Greetings !
> >
> > I came across a few links saying Xen is supported on NXP's i.MX8QM.
> > But, I don't see any such thing for i.MX8MQ and people only talking
> > about jailhouse hypervisor for MQ. [1]
> >
> > Can someone here clarify whether i.MX8MQ h/w is NOT compatible with
> > Xen or the required piece of s/w is yet to be upstreamed to Xen ?

i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in this
chip.

There were people trying to upstream this SoC in community, you should
be able to find patches for 8MQ or 8MM.

We not see customers requesting xen for i.MX8M*, not sure your usecases.

Regards,
Peng.

>=20
> I have seen users that are successfuly booting Xen on i.MX8, although the=
y are
> not directly using Xen Project tree but one provided by code aurora NXP (=
see
> [1]).
>=20
> AFAIK, there might be some missing pieces in the Xen Project tree for tha=
t
> board. I am not sure whether this is just to take full of advantage of bo=
ard.
>=20
> I have CCed Peng who might be able to provide support.
>=20
> Cheers,
>=20
> [1]
> https://eur01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsourc=
e
> .codeaurora.org%2Fexternal%2Fimx%2Fimx-xen%2F&amp;data=3D04%7C01%7
> Cpeng.fan%40nxp.com%7Cc60e9b08fe0949c6654608d8f0851e15%7C686ea1
> d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637523801815383189%7CUn
> known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I
> k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3D7dIXYtfNCOAGNEsVMayTa
> 5ddXkCwewnkLVUMjg4wVt8%3D&amp;reserved=3D0
>=20
> --
> Julien Grall


From xen-users-bounces@lists.xenproject.org Mon Mar 29 08:02:00 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Mar 2021 08:02:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.102837.196372 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQmpa-0002ze-GG; Mon, 29 Mar 2021 08:01:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 102837.196372; Mon, 29 Mar 2021 08:01:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQmpa-0002zW-Cv; Mon, 29 Mar 2021 08:01:02 +0000
Received: by outflank-mailman (input) for mailman id 102837;
 Mon, 29 Mar 2021 08:01:00 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=I5CW=I3=gmail.com=a.rajagopal.81@srs-us1.protection.inumbo.net>)
 id 1lQmpY-0002zN-ME
 for xen-users@lists.xenproject.org; Mon, 29 Mar 2021 08:01:00 +0000
Received: from mail-pg1-x535.google.com (unknown [2607:f8b0:4864:20::535])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 46ec26a3-6a5f-478e-95f6-73a328224c65;
 Mon, 29 Mar 2021 08:00:59 +0000 (UTC)
Received: by mail-pg1-x535.google.com with SMTP id r17so8950991pgi.0
 for <xen-users@lists.xenproject.org>; Mon, 29 Mar 2021 01:00:59 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 46ec26a3-6a5f-478e-95f6-73a328224c65
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=D1uTrlD5ZAc4tBhs9VqvkGUlYYHQUCioUt2PBUch/8Y=;
        b=kLgX+0yzDF7PnOaT+n6pnNgRV4ZXGzRB6a/AAKLplcteTWqbvG8w1ewPsA8yr7r7o/
         /BAjmMWbPtL9lV2k5MFjOMgzORnNKnKnVNuipaCfQrJha5NpWJhz/sIkH8ioRO6LecJr
         QWa8+l3J4XCGGoW6BNOmiSze7xxclhHV/vsLFbaHTC30+hIbI/V1UWdu4ox/OziQ5AoL
         OIl5YS4jlbkMZFmyIq0XAWx07kubYElG+shPJgtEDZeyV5fhYDGSUQtYiC7iek3R5VxI
         TUa5ZGREbpBBCt+PIIrW104jvgbY2FE90NV0Rm0xdu43fBsMs6qZJHIck+JVQw6C34K5
         Gc6w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=D1uTrlD5ZAc4tBhs9VqvkGUlYYHQUCioUt2PBUch/8Y=;
        b=LqC+xnVyM2qnf0GDVEM1hRzQNixBk9vCPrPkbX896kl+r/TdgkqzQ0RyNnxTJvx9Yb
         K49uhfxX8F8QK78+ETuGT15pdokg4Dj0hBcc6eeEOmEzpAWrBuWdcaG2bNcB/4xSo+WN
         ubE4rcTKVmk5p//9zYUCXbzUM2NOS2ToqZoPWDawJ6/hLGK+zR1DJtK+3+FdO+zjF5jU
         S4KD1dE69QqUFqN9oenLLcl0a94drw+H2JT0L9UvnWDLxOC8so5JkrqNhjKoFZpjO5LJ
         WZW/u5F8GMXeybGLX4dvEWdt38wS3zJ5BvndjXgzDlm1qB8R3vhiYvfyTUiBJ0GgTQU1
         Hi/g==
X-Gm-Message-State: AOAM532rFA3BW4Y1rTaWwgrnrFBYkc6F9ldYboOotkesxjNVX1otPSxL
	nd5pjpPXOONBPb9nXj07sWHDZCWyWTvrhIO6flw=
X-Google-Smtp-Source: ABdhPJwHocbqx+o/hPWgDcv9t6JRrTHDPnIMBstin5KPBl9rdw8jsPa79WT11p6SgYv1QWJBURMcmgB2cC+w9+XZ4Ko=
X-Received: by 2002:a62:8cd3:0:b029:1f3:17da:da13 with SMTP id
 m202-20020a628cd30000b02901f317dada13mr24508466pfd.52.1617004858304; Mon, 29
 Mar 2021 01:00:58 -0700 (PDT)
MIME-Version: 1.0
References: <CAEQQSVstbZAnOBc2zaexSNu8kzfA7ZUp_ArM8_F2_=KAJW+FHQ@mail.gmail.com>
 <4c1553b1-3b4a-be0d-3034-8ad0207a1d9e@xen.org> <DB6PR0402MB27601EF103348591F838BF12887E9@DB6PR0402MB2760.eurprd04.prod.outlook.com>
In-Reply-To: <DB6PR0402MB27601EF103348591F838BF12887E9@DB6PR0402MB2760.eurprd04.prod.outlook.com>
From: Rajagopal Aravindan <a.rajagopal.81@gmail.com>
Date: Mon, 29 Mar 2021 13:30:21 +0530
Message-ID: <CAEQQSVvLeqB3twrV3khinbwxYsM4Oc8eU4AYswTgPTZaQaz-Ag@mail.gmail.com>
Subject: Re: Xen - i.MX8QM vs i.MX8MQ
To: Peng Fan <peng.fan@nxp.com>
Cc: Julien Grall <julien@xen.org>, 
	"xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="0000000000002deab905bea84889"

--0000000000002deab905bea84889
Content-Type: text/plain; charset="UTF-8"

Hello Peng,

Thank you for your response.

>>There were people trying to upstream this SoC in community, you should be
able to find patches for 8MQ or 8MM.
Will take a look at Xen repo hosted by both LinuxFoundation as well as
CodeAurora  and get back.

>>i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in this
chip.
Thanks for highlighting this and at this point in time, I see

   1. performance suffering because of this and
   2. drivers may need to be modified, to arbitrate access to main memory,
   between themselves which otherwise SMMU would have taken care of
   3. also, drivers need to ensure that they get ONLY those regions in the
   accessible range to the peripherals

Can you please provide more insight on what the lack of SMMU means to Xen,
other than the above ?

>> We not see customers requesting xen for i.MX8M*, not sure your usecases.
I do NOT have a i.MX8QM board but ONLY have a i.MX8MQ board and hence was
interested in trying Xen on the MQ board.
Mine is the normal use case of running a Ubuntu + Android on top of Xen,
and then running applications inside them.


Regards,
Rajagopal

On Mon, Mar 29, 2021 at 8:39 AM Peng Fan <peng.fan@nxp.com> wrote:

> > Subject: Re: Xen - i.MX8QM vs i.MX8MQ
> >
> > (+ Peng)
>
> Thanks for adding me.
>
> >
> > On 26/03/2021 18:11, Rajagopal Aravindan wrote:
> > > Hello All,
> >
> > Hi,
> >
> > > Greetings !
> > >
> > > I came across a few links saying Xen is supported on NXP's i.MX8QM.
> > > But, I don't see any such thing for i.MX8MQ and people only talking
> > > about jailhouse hypervisor for MQ. [1]
> > >
> > > Can someone here clarify whether i.MX8MQ h/w is NOT compatible with
> > > Xen or the required piece of s/w is yet to be upstreamed to Xen ?
>
> i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in this
> chip.
>
> There were people trying to upstream this SoC in community, you should
> be able to find patches for 8MQ or 8MM.
>
> We not see customers requesting xen for i.MX8M*, not sure your usecases.
>
> Regards,
> Peng.
>
> >
> > I have seen users that are successfuly booting Xen on i.MX8, although
> they are
> > not directly using Xen Project tree but one provided by code aurora NXP
> (see
> > [1]).
> >
> > AFAIK, there might be some missing pieces in the Xen Project tree for
> that
> > board. I am not sure whether this is just to take full of advantage of
> board.
> >
> > I have CCed Peng who might be able to provide support.
> >
> > Cheers,
> >
> > [1]
> > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsource
> > .codeaurora.org%2Fexternal%2Fimx%2Fimx-xen%2F&amp;data=04%7C01%7
> > Cpeng.fan%40nxp.com%7Cc60e9b08fe0949c6654608d8f0851e15%7C686ea1
> > d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637523801815383189%7CUn
> > known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I
> > k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7dIXYtfNCOAGNEsVMayTa
> > 5ddXkCwewnkLVUMjg4wVt8%3D&amp;reserved=0
> >
> > --
> > Julien Grall
>

--0000000000002deab905bea84889
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Hello Peng,<div><br></div><div>Thank you =
for your response.</div><div><br></div><div>&gt;&gt;There were people tryin=
g to upstream this SoC in community, you should be able to find patches for=
 8MQ or 8MM.</div><div>Will take a look at Xen repo hosted by both LinuxFou=
ndation as well as CodeAurora=C2=A0 and get back.</div><div><br></div><div>=
&gt;&gt;i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in=
 this chip.=C2=A0=C2=A0</div><div>Thanks for=C2=A0highlighting this and at =
this=C2=A0point in time, I see</div><div><ol><li>performance suffering beca=
use of this and</li><li>drivers may need to be modified, to arbitrate acces=
s to main memory, between themselves which otherwise SMMU would have taken =
care of</li><li>also, drivers need to ensure that they get ONLY those regio=
ns in the accessible range to the peripherals</li></ol></div><div>Can you p=
lease provide more insight on what the lack of SMMU means to Xen, other tha=
n the above ?</div><div><br></div><div>&gt;&gt;

We not see customers requesting xen for i.MX8M*, not sure your usecases.

</div><div>

I do NOT have a i.MX8QM board but ONLY have a i.MX8MQ board and hence was i=
nterested in trying Xen on the MQ board.=C2=A0</div><div>Mine is the normal=
 use case of running a Ubuntu=C2=A0+ Android on top of Xen, and then runnin=
g applications inside them.</div><div><br></div><div></div></div><div dir=
=3D"ltr">=C2=A0=C2=A0<div>Regards,</div><div>Rajagopal</div></div><br><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 29,=
 2021 at 8:39 AM Peng Fan &lt;<a href=3D"mailto:peng.fan@nxp.com">peng.fan@=
nxp.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"=
margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-lef=
t:1ex">&gt; Subject: Re: Xen - i.MX8QM vs i.MX8MQ<br>
&gt; <br>
&gt; (+ Peng)<br>
<br>
Thanks for adding me.<br>
<br>
&gt; <br>
&gt; On 26/03/2021 18:11, Rajagopal Aravindan wrote:<br>
&gt; &gt; Hello All,<br>
&gt; <br>
&gt; Hi,<br>
&gt; <br>
&gt; &gt; Greetings !<br>
&gt; &gt;<br>
&gt; &gt; I came across a few links saying Xen is supported on NXP&#39;s i.=
MX8QM.<br>
&gt; &gt; But, I don&#39;t see any such thing for i.MX8MQ and people only t=
alking<br>
&gt; &gt; about jailhouse hypervisor for MQ. [1]<br>
&gt; &gt;<br>
&gt; &gt; Can someone here clarify whether i.MX8MQ h/w is NOT compatible wi=
th<br>
&gt; &gt; Xen or the required piece of s/w is yet to be upstreamed to Xen ?=
<br>
<br>
i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in this<br=
>
chip.<br>
<br>
There were people trying to upstream this SoC in community, you should<br>
be able to find patches for 8MQ or 8MM.<br>
<br>
We not see customers requesting xen for i.MX8M*, not sure your usecases.<br=
>
<br>
Regards,<br>
Peng.<br>
<br>
&gt; <br>
&gt; I have seen users that are successfuly booting Xen on i.MX8, although =
they are<br>
&gt; not directly using Xen Project tree but one provided by code aurora NX=
P (see<br>
&gt; [1]).<br>
&gt; <br>
&gt; AFAIK, there might be some missing pieces in the Xen Project tree for =
that<br>
&gt; board. I am not sure whether this is just to take full of advantage of=
 board.<br>
&gt; <br>
&gt; I have CCed Peng who might be able to provide support.<br>
&gt; <br>
&gt; Cheers,<br>
&gt; <br>
&gt; [1]<br>
&gt; <a href=3D"https://eur01.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Fsource" rel=3D"noreferrer" target=3D"_blank">https://eur01.safelin=
ks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsource</a><br>
&gt; .<a href=3D"http://codeaurora.org" rel=3D"noreferrer" target=3D"_blank=
">codeaurora.org</a>%2Fexternal%2Fimx%2Fimx-xen%2F&amp;amp;data=3D04%7C01%7=
<br>
&gt; Cpeng.fan%<a href=3D"http://40nxp.com" rel=3D"noreferrer" target=3D"_b=
lank">40nxp.com</a>%7Cc60e9b08fe0949c6654608d8f0851e15%7C686ea1<br>
&gt; d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637523801815383189%7CUn<br>
&gt; known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I<br>
&gt; k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3D7dIXYtfNCOAGNEsVMayTa<br>
&gt; 5ddXkCwewnkLVUMjg4wVt8%3D&amp;amp;reserved=3D0<br>
&gt; <br>
&gt; --<br>
&gt; Julien Grall<br>
</blockquote></div></div>

--0000000000002deab905bea84889--


From xen-users-bounces@lists.xenproject.org Mon Mar 29 10:09:31 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Mar 2021 10:09:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.102908.196447 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQop2-0007ib-E1; Mon, 29 Mar 2021 10:08:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 102908.196447; Mon, 29 Mar 2021 10:08:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQop2-0007iT-9q; Mon, 29 Mar 2021 10:08:36 +0000
Received: by outflank-mailman (input) for mailman id 102908;
 Mon, 29 Mar 2021 10:08:35 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ew3u=I3=gmail.com=van.freenix@srs-us1.protection.inumbo.net>)
 id 1lQop1-0007iO-9i
 for xen-users@lists.xenproject.org; Mon, 29 Mar 2021 10:08:35 +0000
Received: from mail-oo1-xc2e.google.com (unknown [2607:f8b0:4864:20::c2e])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 73fee05f-fed9-441c-b245-608df278c9f6;
 Mon, 29 Mar 2021 10:08:34 +0000 (UTC)
Received: by mail-oo1-xc2e.google.com with SMTP id
 n12-20020a4ad12c0000b02901b63e7bc1b4so2851249oor.5
 for <xen-users@lists.xenproject.org>; Mon, 29 Mar 2021 03:08:33 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 73fee05f-fed9-441c-b245-608df278c9f6
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=rHdS9M8ZBEzJEAilCxN9mPXXz7XZAu7S91f1W9uw9i0=;
        b=jkRuCNWbp6bvL2j6zU4n2tofcjrkE/m+b7sTYGROzygC43sC9rrsygtOa5OvLVmR1o
         lA7LBAvSopRtea/zazZVz5bSybxJMYhoSHic9Vjk/jTxpj0GxmNzoUqmFifMQ07392pk
         VwrYNhFU9eKzibO+gS0bR/alOmWENpWRBW3MiIPls+pd/W0Cg1HSLTd6UHE9nC7wwTGg
         1/EbMA5gCLUSGeP4QQEwbdzz3mlfAiKOXI1YENeiil0k1Khnmuf0a+SazocGjjbE9to0
         OmKc+EKlZzH2EEJrrPbJXQTl3KxryqZU/LWbFfJxYYrDfx57/3RRyPVWs5bZ/hQlFZZe
         orpw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=rHdS9M8ZBEzJEAilCxN9mPXXz7XZAu7S91f1W9uw9i0=;
        b=MwKc2jwfNV1QGO5qnDUh4pAkkVa1RYpgJl6GYc9lfoLSApA7vpmILCwgPyXuFx1xTd
         iaQoInphOKbBoZTufl3zY8CQsT3VApv1eOxqWcIouAs/or6cqB4rWLmG1AyJjmLkwDae
         EdVeBL0g3Xl+UQk32akvX8KeX1cppaA1uf1Z8lSYUZVgZ89GG3gN4Czxu0RqU91ID7GW
         TveaPWL6SMy3FKAWeSW3a9T077oW/blkap0iHtpOLAiLlfI2NB0hgPhcuCHLHrHGuLy8
         Wk9m1ni2WiPyvmSRlfmjefftANB0+pUWPyRu2Uxbyfrucj9/zkhD7OGrdhYNDOdWAOen
         Uj5w==
X-Gm-Message-State: AOAM5335t+n51xXZRLC54jgyAXWAmAgBrt2i38b+P0muOpdY6Lr8JPlh
	nQGYfNPeWZ/s+vE3Cx5xiHytAeuB2fPlAW88cHQ=
X-Google-Smtp-Source: ABdhPJw00WXWAfI4XNvRuM2m01tbE7FUoyQmqS9xsbiUz+9jeP9xDn/nPc8gdny2KGTd2I0SzmbJQjUL8bCaMUS/c0w=
X-Received: by 2002:a4a:ea94:: with SMTP id r20mr20932155ooh.43.1617012513559;
 Mon, 29 Mar 2021 03:08:33 -0700 (PDT)
MIME-Version: 1.0
References: <CAEQQSVstbZAnOBc2zaexSNu8kzfA7ZUp_ArM8_F2_=KAJW+FHQ@mail.gmail.com>
 <4c1553b1-3b4a-be0d-3034-8ad0207a1d9e@xen.org> <DB6PR0402MB27601EF103348591F838BF12887E9@DB6PR0402MB2760.eurprd04.prod.outlook.com>
 <CAEQQSVvLeqB3twrV3khinbwxYsM4Oc8eU4AYswTgPTZaQaz-Ag@mail.gmail.com>
In-Reply-To: <CAEQQSVvLeqB3twrV3khinbwxYsM4Oc8eU4AYswTgPTZaQaz-Ag@mail.gmail.com>
From: Peng Fan <van.freenix@gmail.com>
Date: Mon, 29 Mar 2021 18:08:22 +0800
Message-ID: <CAEfxd-_f5o4L59=npojxaobgFcyAVO3sBhBL=64wbV3gi8=8=g@mail.gmail.com>
Subject: Re: Xen - i.MX8QM vs i.MX8MQ
To: Rajagopal Aravindan <a.rajagopal.81@gmail.com>
Cc: Peng Fan <peng.fan@nxp.com>, Julien Grall <julien@xen.org>, 
	"xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="00000000000077d91505beaa1024"

--00000000000077d91505beaa1024
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Sorry for HTML format. Inline.

Rajagopal Aravindan <a.rajagopal.81@gmail.com> =E4=BA=8E2021=E5=B9=B43=E6=
=9C=8829=E6=97=A5=E5=91=A8=E4=B8=80 =E4=B8=8B=E5=8D=884:01=E5=86=99=E9=81=
=93=EF=BC=9A

> Hello Peng,
>
> Thank you for your response.
>
> >>There were people trying to upstream this SoC in community, you should
> be able to find patches for 8MQ or 8MM.
> Will take a look at Xen repo hosted by both LinuxFoundation as well as
> CodeAurora  and get back.
>
> >>i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in thi=
s
> chip.
> Thanks for highlighting this and at this point in time, I see
>
>    1. performance suffering because of this and
>    2. drivers may need to be modified, to arbitrate access to main
>    memory, between themselves which otherwise SMMU would have taken care =
of
>    3. also, drivers need to ensure that they get ONLY those regions in
>    the accessible range to the peripherals
>
> Can you please provide more insight on what the lack of SMMU means to Xen=
,
> other than the above ?
>

Without SMMU, you could not do device passthrough.


>
> >> We not see customers requesting xen for i.MX8M*, not sure your
> usecases.
> I do NOT have a i.MX8QM board but ONLY have a i.MX8MQ board and hence was
> interested in trying Xen on the MQ board.
> Mine is the normal use case of running a Ubuntu + Android on top of Xen,
> and then running applications inside them.
>

It will be a bit hard to achieve this. No SMMU, only one GPU.

Regards,
Peng.


>
>
> Regards,
> Rajagopal
>
> On Mon, Mar 29, 2021 at 8:39 AM Peng Fan <peng.fan@nxp.com> wrote:
>
>> > Subject: Re: Xen - i.MX8QM vs i.MX8MQ
>> >
>> > (+ Peng)
>>
>> Thanks for adding me.
>>
>> >
>> > On 26/03/2021 18:11, Rajagopal Aravindan wrote:
>> > > Hello All,
>> >
>> > Hi,
>> >
>> > > Greetings !
>> > >
>> > > I came across a few links saying Xen is supported on NXP's i.MX8QM.
>> > > But, I don't see any such thing for i.MX8MQ and people only talking
>> > > about jailhouse hypervisor for MQ. [1]
>> > >
>> > > Can someone here clarify whether i.MX8MQ h/w is NOT compatible with
>> > > Xen or the required piece of s/w is yet to be upstreamed to Xen ?
>>
>> i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in this
>> chip.
>>
>> There were people trying to upstream this SoC in community, you should
>> be able to find patches for 8MQ or 8MM.
>>
>> We not see customers requesting xen for i.MX8M*, not sure your usecases.
>>
>> Regards,
>> Peng.
>>
>> >
>> > I have seen users that are successfuly booting Xen on i.MX8, although
>> they are
>> > not directly using Xen Project tree but one provided by code aurora NX=
P
>> (see
>> > [1]).
>> >
>> > AFAIK, there might be some missing pieces in the Xen Project tree for
>> that
>> > board. I am not sure whether this is just to take full of advantage of
>> board.
>> >
>> > I have CCed Peng who might be able to provide support.
>> >
>> > Cheers,
>> >
>> > [1]
>> >
>> https://eur01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsour=
ce
>> > .codeaurora.org%2Fexternal%2Fimx%2Fimx-xen%2F&amp;data=3D04%7C01%7
>> > Cpeng.fan%40nxp.com%7Cc60e9b08fe0949c6654608d8f0851e15%7C686ea1
>> > d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637523801815383189%7CUn
>> > known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I
>> > k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3D7dIXYtfNCOAGNEsVMayTa
>> > 5ddXkCwewnkLVUMjg4wVt8%3D&amp;reserved=3D0
>> >
>> > --
>> > Julien Grall
>>
>

--

--00000000000077d91505beaa1024
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Sorry for HTML format. Inline.</div><br><div class=3D=
"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">Rajagopal Aravindan &lt=
;<a href=3D"mailto:a.rajagopal.81@gmail.com">a.rajagopal.81@gmail.com</a>&g=
t; =E4=BA=8E2021=E5=B9=B43=E6=9C=8829=E6=97=A5=E5=91=A8=E4=B8=80 =E4=B8=8B=
=E5=8D=884:01=E5=86=99=E9=81=93=EF=BC=9A<br></div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,20=
4,204);padding-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr">Hello Peng,<div>=
<br></div><div>Thank you for your response.</div><div><br></div><div>&gt;&g=
t;There were people trying to upstream this SoC in community, you should be=
 able to find patches for 8MQ or 8MM.</div><div>Will take a look at Xen rep=
o hosted by both LinuxFoundation as well as CodeAurora=C2=A0 and get back.<=
/div><div><br></div><div>&gt;&gt;i.MX8MQ could use XEN hypervisor, but note=
 that there is no SMMU in this chip.=C2=A0=C2=A0</div><div>Thanks for=C2=A0=
highlighting this and at this=C2=A0point in time, I see</div><div><ol><li>p=
erformance suffering because of this and</li><li>drivers may need to be mod=
ified, to arbitrate access to main memory, between themselves which otherwi=
se SMMU would have taken care of</li><li>also, drivers need to ensure that =
they get ONLY those regions in the accessible range to the peripherals</li>=
</ol></div><div>Can you please provide more insight on what the lack of SMM=
U means to Xen, other than the above ?</div></div></div></blockquote><div><=
br></div><div>Without SMMU, you could not do device passthrough.</div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"l=
tr"><div dir=3D"ltr"><div><br></div><div>&gt;&gt;

We not see customers requesting xen for i.MX8M*, not sure your usecases.

</div><div>

I do NOT have a i.MX8QM board but ONLY have a i.MX8MQ board and hence was i=
nterested in trying Xen on the MQ board.=C2=A0</div><div>Mine is the normal=
 use case of running a Ubuntu=C2=A0+ Android on top of Xen, and then runnin=
g applications inside them.</div></div></div></blockquote><div><br></div><d=
iv>It will be a bit hard to achieve this. No SMMU, only one GPU.</div><div>=
<br></div><div>Regards,</div><div>Peng.</div><div>=C2=A0</div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr"><div=
><br></div><div></div></div><div dir=3D"ltr">=C2=A0=C2=A0<div>Regards,</div=
><div>Rajagopal</div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Mon, Mar 29, 2021 at 8:39 AM Peng Fan &lt;<a href=
=3D"mailto:peng.fan@nxp.com" target=3D"_blank">peng.fan@nxp.com</a>&gt; wro=
te:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">&gt; Subject=
: Re: Xen - i.MX8QM vs i.MX8MQ<br>
&gt; <br>
&gt; (+ Peng)<br>
<br>
Thanks for adding me.<br>
<br>
&gt; <br>
&gt; On 26/03/2021 18:11, Rajagopal Aravindan wrote:<br>
&gt; &gt; Hello All,<br>
&gt; <br>
&gt; Hi,<br>
&gt; <br>
&gt; &gt; Greetings !<br>
&gt; &gt;<br>
&gt; &gt; I came across a few links saying Xen is supported on NXP&#39;s i.=
MX8QM.<br>
&gt; &gt; But, I don&#39;t see any such thing for i.MX8MQ and people only t=
alking<br>
&gt; &gt; about jailhouse hypervisor for MQ. [1]<br>
&gt; &gt;<br>
&gt; &gt; Can someone here clarify whether i.MX8MQ h/w is NOT compatible wi=
th<br>
&gt; &gt; Xen or the required piece of s/w is yet to be upstreamed to Xen ?=
<br>
<br>
i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in this<br=
>
chip.<br>
<br>
There were people trying to upstream this SoC in community, you should<br>
be able to find patches for 8MQ or 8MM.<br>
<br>
We not see customers requesting xen for i.MX8M*, not sure your usecases.<br=
>
<br>
Regards,<br>
Peng.<br>
<br>
&gt; <br>
&gt; I have seen users that are successfuly booting Xen on i.MX8, although =
they are<br>
&gt; not directly using Xen Project tree but one provided by code aurora NX=
P (see<br>
&gt; [1]).<br>
&gt; <br>
&gt; AFAIK, there might be some missing pieces in the Xen Project tree for =
that<br>
&gt; board. I am not sure whether this is just to take full of advantage of=
 board.<br>
&gt; <br>
&gt; I have CCed Peng who might be able to provide support.<br>
&gt; <br>
&gt; Cheers,<br>
&gt; <br>
&gt; [1]<br>
&gt; <a href=3D"https://eur01.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Fsource" rel=3D"noreferrer" target=3D"_blank">https://eur01.safelin=
ks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsource</a><br>
&gt; .<a href=3D"http://codeaurora.org" rel=3D"noreferrer" target=3D"_blank=
">codeaurora.org</a>%2Fexternal%2Fimx%2Fimx-xen%2F&amp;amp;data=3D04%7C01%7=
<br>
&gt; Cpeng.fan%<a href=3D"http://40nxp.com" rel=3D"noreferrer" target=3D"_b=
lank">40nxp.com</a>%7Cc60e9b08fe0949c6654608d8f0851e15%7C686ea1<br>
&gt; d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637523801815383189%7CUn<br>
&gt; known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I<br>
&gt; k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3D7dIXYtfNCOAGNEsVMayTa<br>
&gt; 5ddXkCwewnkLVUMjg4wVt8%3D&amp;amp;reserved=3D0<br>
&gt; <br>
&gt; --<br>
&gt; Julien Grall<br>
</blockquote></div></div>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr"><br></div></div></div>

--00000000000077d91505beaa1024--


From xen-users-bounces@lists.xenproject.org Mon Mar 29 14:11:03 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 29 Mar 2021 14:11:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.103024.196640 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQsb2-0000ff-CE; Mon, 29 Mar 2021 14:10:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 103024.196640; Mon, 29 Mar 2021 14:10:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lQsb2-0000fX-8M; Mon, 29 Mar 2021 14:10:24 +0000
Received: by outflank-mailman (input) for mailman id 103024;
 Mon, 29 Mar 2021 14:10:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lQsb1-0000ex-7B
 for xen-users@lists.xenproject.org; Mon, 29 Mar 2021 14:10:23 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lQsb1-0006wv-61
 for xen-users@lists.xenproject.org; Mon, 29 Mar 2021 14:10:23 +0000
Received: from iwj (helo=mariner.uk.xensource.com)
 by xenbits.xenproject.org with local-bsmtp (Exim 4.92)
 (envelope-from <iwj@xenproject.org>) id 1lQsb1-0004ge-52
 for xen-users@lists.xenproject.org; Mon, 29 Mar 2021 14:10:23 +0000
Received: from iwj by mariner.uk.xensource.com with local (Exim 4.89)
 (envelope-from <iwj@xenproject.org>)
 id 1lQsaw-0001lF-Cc; Mon, 29 Mar 2021 15:10:18 +0100
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Subject:CC:To:Date:Message-ID:
	Content-Transfer-Encoding:Content-Type:MIME-Version:From;
	bh=KlRdUK1U4mJ2FB4CumiP+oB77O33dsxlKoyL1MmCPyU=; b=w2fvo70gOvj3xi9NvC3SpUdXNT
	VXlw6x7pL9u+UTxULaj9ckb92g+/ya2dUWplq1fw4W+k3houWVM3U/vltlsAkjpR//mCgcH3EvUqW
	sme5pkKMzq58kl+/LHHyhxV7JJEKrEOqD/WelKq1ux9ecGeFo4HGFH0K1vJh6MlQoriM=;
From: Ian Jackson <iwj@xenproject.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <24673.57290.133130.448247@mariner.uk.xensource.com>
Date: Mon, 29 Mar 2021 15:10:18 +0100
To: xen-announce@lists.xenproject.org
CC: xen-devel@lists.xenproject.org,
    xen-users@lists.xenproject.org
Subject: Xen 4.15 RC5

Xen 4.15 RC5 is now available.

It is available from git:
  git clone https://xenbits.xenproject.org/git-http/xen.git -b 4.15.0-rc5

For your convenience a tarball is available:
  https://downloads.xenproject.org/release/xen/4.15.0-rc5/xen-4.15.0-rc5.tar.gz
  https://downloads.xenproject.org/release/xen/4.15.0-rc5/xen-4.15.0-rc5.tar.gz.sig

Please send bug reports and test reports to
xen-devel@lists.xenproject.org.  When sending bug reports, please CC
relevant maintainers and me (iwj@xenproject.org).

I am hoping that this will be the last RC.  Please send any reports
of serious bugs (or brown paper bag mistakes) quickly, or we may have
to release without the fix.

Thanks,
Ian.



From xen-users-bounces@lists.xenproject.org Tue Mar 30 12:02:43 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Mar 2021 12:02:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.103432.197336 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRD4D-0006Bl-HZ; Tue, 30 Mar 2021 12:01:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 103432.197336; Tue, 30 Mar 2021 12:01:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRD4D-0006Bd-De; Tue, 30 Mar 2021 12:01:53 +0000
Received: by outflank-mailman (input) for mailman id 103432;
 Tue, 30 Mar 2021 12:01:52 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57]
 helo=us1-amaz-eas2.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PAXT=I4=xenbits.xen.org=iwj@srs-us1.protection.inumbo.net>)
 id 1lRD4C-0006BX-F1
 for xen-users@lists.xen.org; Tue, 30 Mar 2021 12:01:52 +0000
Received: from mail.xenproject.org (unknown [104.130.215.37])
 by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS
 id 792c86ef-4c9b-43b5-8be2-c91b175898c9;
 Tue, 30 Mar 2021 12:01:50 +0000 (UTC)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lRD3z-0003Uf-Uy; Tue, 30 Mar 2021 12:01:39 +0000
Received: from iwj by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <iwj@xenbits.xen.org>)
 id 1lRD3z-0005Dv-Rd; Tue, 30 Mar 2021 12:01:39 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 792c86ef-4c9b-43b5-8be2-c91b175898c9
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=NHPFu1XAUVlJbUfeISmXiuipVxaCU0mvsytRR5Xe7gc=; b=L9zjRtVYmmNayLh/y6MP7JX8ER
	I3AgjlvIFboC04oIQZxXoJCdQ6p9v41/TZqHZCwuH6RVenbOFaBtQ/Hk5ff3aFmmrBVM6C8AZzcms
	tAfIKTsKy8k/ZNv6aaLM1our1QttBgIeiQHanCx/DuDVXDuGGnwVpYwiAei6HHu3cC24=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 371 v3 (CVE-2021-28688) - Linux: blkback
 driver may leak persistent grants
Message-Id: <E1lRD3z-0005Dv-Rd@xenbits.xenproject.org>
Date: Tue, 30 Mar 2021 12:01:39 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2021-28688 / XSA-371
                               version 3

           Linux: blkback driver may leak persistent grants

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

The fix for XSA-365 includes initialization of pointers such that
subsequent cleanup code wouldn't use uninitialized or stale values.
This initialization went too far and may under certain conditions also
overwrite pointers which are in need of cleaning up.  The lack of
cleanup would result in leaking persistent grants.  The leak in turn
would prevent fully cleaning up after a respective guest has died,
leaving around zombie domains.

IMPACT
======

A malicious or buggy frontend driver may be able to cause resource leaks
from the corresponding backend driver.  This can result in a host-wide
Denial of Sevice (DoS).

VULNERABLE SYSTEMS
==================

All Linux versions having the fix for XSA-365 applied are vulnerable.
XSA-365 was classified to affect versions back to at least 3.11.

MITIGATION
==========

Reconfiguring guests to use alternative (e.g. qemu-based) backends may
avoid the vulnerability.

Avoiding the use of persistent grants will also avoid the vulnerability.
This can be achieved by passing the "feature_persistent=0" module option
to the xen-blkback driver.

CREDITS
=======

This issue was discovered by Nicolai Stange of SUSE.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa371-linux.patch           Linux 5.12-rc, 5.11.1 onwards, 5.10.18 onwards
<not directly affected>      Linux 5.10.0 - 5.10.17, 5.11.0
<applicability unknown>      Linux 4.4 - 5.9
<no fix available>           Linux 3.11 - 4.3

$ sha256sum xsa371*
1b2472253aa82385b3eff280fa4adf52742f06813fc093f5f86cd4a3021f736c  xsa371-linux.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches described above (or others which are
substantially similar) is permitted during the embargo, even on
public-facing systems with untrusted guest users and administrators.

HOWEVER, deployment of the mitigations described above is NOT permitted
during the embargo on public-facing systems with untrusted guest users
and administrators.  This is because such configuration changes may be
recognizable by the affected guests.

AND: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.

(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmBjBWYMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZbkQIAKjv5DaESSOUA8DzOk4LmBZQHIMtTsN2wF2Q0/6g
3hJ3HoGzQwul00eUem+sbAqrEKJAEGLrcWpAGlcp8jW5i+44dyHE4o4vDmUOLx/x
eJGMKwhv2Xe7Us15Fh4ioOBtmO6/AH60Scbid3aZ6zlJiUEPwpotzD9Jm/nR+B/E
/KRsXZ+dTIZpeke9vVXbml/nrq/xwvpAZrEGeXBg1FDUHNsGWEeqPFq2ZfygVw22
x5loXeb8cqIETuA3EJQ1fx0Ioqnh3Q85TtNTCTpZrKcrTqJX+lZTlrEn4iAaMvp1
Bp/Mu9dkFrIJaid0iwdJKk2STsROh5ZCXCOyFOo5LFvFoKE=
=DlVS
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa371-linux.patch"
Content-Disposition: attachment; filename="xsa371-linux.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Mar 30 15:22:51 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 30 Mar 2021 15:22:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.103576.197566 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRGC0-0003TD-8J; Tue, 30 Mar 2021 15:22:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 103576.197566; Tue, 30 Mar 2021 15:22:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRGC0-0003T5-4W; Tue, 30 Mar 2021 15:22:08 +0000
Received: by outflank-mailman (input) for mailman id 103576;
 Tue, 30 Mar 2021 15:22:07 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7brO=I4=gmail.com=a.rajagopal.81@srs-us1.protection.inumbo.net>)
 id 1lRGBz-0003Sy-1B
 for xen-users@lists.xenproject.org; Tue, 30 Mar 2021 15:22:07 +0000
Received: from mail-pl1-x62a.google.com (unknown [2607:f8b0:4864:20::62a])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id a414d5bb-8258-4fc0-b1f8-238cf495eacb;
 Tue, 30 Mar 2021 15:22:05 +0000 (UTC)
Received: by mail-pl1-x62a.google.com with SMTP id o2so6337172plg.1
 for <xen-users@lists.xenproject.org>; Tue, 30 Mar 2021 08:22:05 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: a414d5bb-8258-4fc0-b1f8-238cf495eacb
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=ciJzo+ZDhorsRORxEO6vAMD2W3y0Z2c06IaiHGcUsho=;
        b=Xo/0d+lCqNbO63cVPCXuBMZWjfyQMJ5lH7OI1kvHqrtzHOnPNSiQqonjZNwBJ8y5Y0
         eIg6To9zH1s+ReDxnz+GPq+fsBCRZ+l53P7OQ8sx7bpLM3jZ5q4WX8OO0jGeTlz9hft3
         VozkUmgUF8XKyrQBMNDC9xOF47rDiueUKET15mhirBB8ApH9JMeR+nicBVQEBroh0SCj
         UDabMqv4qKdxdOILgO3zndRM/qDyJ7U9WvlC7302NWdZKzRdOb1TP4wLd8Q2cHVYgleE
         96UXGIFKaE+0AthemHbkxhOViom/tMwMtmUw1iKorwmzbJWaPADq5p3+juLnHhZ80Bqj
         TDug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=ciJzo+ZDhorsRORxEO6vAMD2W3y0Z2c06IaiHGcUsho=;
        b=qCfA0jjCBaHMoXYOt6VHj+yRfqskigV9LRYQcGjuAoNv+RrtCTivPbYZ/KBK01ExLY
         /IB6xti8kuU5tuTtwnMm0IVnk1rcZSbc7nMtmRmnuGZHbSIFeDA6v4iQphwbs66ISG5j
         gThggac2ODu7LiqBqwbQQLcpcI7fH/5HZnt9PQ2ZUeAZJm4TLdOYMwDVBUwgq+maeqBA
         vK8K1jCadug36d1fsdWhouKdTPmQKLSXFC1sYid6jLYhiBygU3YWC4DJ6VG3HGSLzlmZ
         M8nglHHv37akFn8ma27RgK32/oLVWw/tncaDHyokuf7rFLv+Vyx4JGtsAuvqgsVxld3R
         KnoA==
X-Gm-Message-State: AOAM533eIlf5Wtt+ukI/kxY9hmHiLB0p/Lx/oUvaCFZmcILf4cFrx470
	QaOw3oL4qzUGOGx/i0i9y/Ec21F+BhGLQXM22PM=
X-Google-Smtp-Source: ABdhPJzOP+NdZZrUxIGrrtqGonz+h8XYiVw6jBvBvl3nN/4tbaxpub0/BMCbCF1qeqZizVoyqqb9FM8+789pc1oQmrA=
X-Received: by 2002:a17:90a:b311:: with SMTP id d17mr4893263pjr.228.1617117724867;
 Tue, 30 Mar 2021 08:22:04 -0700 (PDT)
MIME-Version: 1.0
References: <CAEQQSVstbZAnOBc2zaexSNu8kzfA7ZUp_ArM8_F2_=KAJW+FHQ@mail.gmail.com>
 <4c1553b1-3b4a-be0d-3034-8ad0207a1d9e@xen.org> <DB6PR0402MB27601EF103348591F838BF12887E9@DB6PR0402MB2760.eurprd04.prod.outlook.com>
 <CAEQQSVvLeqB3twrV3khinbwxYsM4Oc8eU4AYswTgPTZaQaz-Ag@mail.gmail.com> <CAEfxd-_f5o4L59=npojxaobgFcyAVO3sBhBL=64wbV3gi8=8=g@mail.gmail.com>
In-Reply-To: <CAEfxd-_f5o4L59=npojxaobgFcyAVO3sBhBL=64wbV3gi8=8=g@mail.gmail.com>
From: Rajagopal Aravindan <a.rajagopal.81@gmail.com>
Date: Tue, 30 Mar 2021 20:51:27 +0530
Message-ID: <CAEQQSVsmv5h16aB94xGoaRncwBYfoF6yj5693+ySbegeUy7-UA@mail.gmail.com>
Subject: Re: Xen - i.MX8QM vs i.MX8MQ
To: Peng Fan <van.freenix@gmail.com>
Cc: Peng Fan <peng.fan@nxp.com>, Julien Grall <julien@xen.org>, 
	"xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="0000000000008d005c05bec28f44"

--0000000000008d005c05bec28f44
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hello Peng,

>> Without SMMU, you could not do device passthrough.
Noted, PV driver should still work is my understanding.

>> It will be a bit hard to achieve this. No SMMU, only one GPU.
If running Ubuntu + Android on top of Xen would be hard to achieve
on i.MX8MQ, what exactly is the target use case for NXP/CodeAurora port of
Xen [1] ?
I do see boards without SMMU listed in Xen wiki project, though [2]


Thanks,
Rajagopal

[1] - https://source.codeaurora.org/external/imx/imx-xen/
[2] - Xen ARM with Virtualization Extensions - Xen (xenproject.org)
<https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions>

On Mon, Mar 29, 2021 at 3:38 PM Peng Fan <van.freenix@gmail.com> wrote:

> Sorry for HTML format. Inline.
>
> Rajagopal Aravindan <a.rajagopal.81@gmail.com> =E4=BA=8E2021=E5=B9=B43=E6=
=9C=8829=E6=97=A5=E5=91=A8=E4=B8=80 =E4=B8=8B=E5=8D=884:01=E5=86=99=E9=81=
=93=EF=BC=9A
>
>> Hello Peng,
>>
>> Thank you for your response.
>>
>> >>There were people trying to upstream this SoC in community, you should
>> be able to find patches for 8MQ or 8MM.
>> Will take a look at Xen repo hosted by both LinuxFoundation as well as
>> CodeAurora  and get back.
>>
>> >>i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in
>> this chip.
>> Thanks for highlighting this and at this point in time, I see
>>
>>    1. performance suffering because of this and
>>    2. drivers may need to be modified, to arbitrate access to main
>>    memory, between themselves which otherwise SMMU would have taken care=
 of
>>    3. also, drivers need to ensure that they get ONLY those regions in
>>    the accessible range to the peripherals
>>
>> Can you please provide more insight on what the lack of SMMU means to
>> Xen, other than the above ?
>>
>
> Without SMMU, you could not do device passthrough.
>
>
>>
>> >> We not see customers requesting xen for i.MX8M*, not sure your
>> usecases.
>> I do NOT have a i.MX8QM board but ONLY have a i.MX8MQ board and hence wa=
s
>> interested in trying Xen on the MQ board.
>> Mine is the normal use case of running a Ubuntu + Android on top of Xen,
>> and then running applications inside them.
>>
>
> It will be a bit hard to achieve this. No SMMU, only one GPU.
>
> Regards,
> Peng.
>
>
>>
>>
>> Regards,
>> Rajagopal
>>
>> On Mon, Mar 29, 2021 at 8:39 AM Peng Fan <peng.fan@nxp.com> wrote:
>>
>>> > Subject: Re: Xen - i.MX8QM vs i.MX8MQ
>>> >
>>> > (+ Peng)
>>>
>>> Thanks for adding me.
>>>
>>> >
>>> > On 26/03/2021 18:11, Rajagopal Aravindan wrote:
>>> > > Hello All,
>>> >
>>> > Hi,
>>> >
>>> > > Greetings !
>>> > >
>>> > > I came across a few links saying Xen is supported on NXP's i.MX8QM.
>>> > > But, I don't see any such thing for i.MX8MQ and people only talking
>>> > > about jailhouse hypervisor for MQ. [1]
>>> > >
>>> > > Can someone here clarify whether i.MX8MQ h/w is NOT compatible with
>>> > > Xen or the required piece of s/w is yet to be upstreamed to Xen ?
>>>
>>> i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in thi=
s
>>> chip.
>>>
>>> There were people trying to upstream this SoC in community, you should
>>> be able to find patches for 8MQ or 8MM.
>>>
>>> We not see customers requesting xen for i.MX8M*, not sure your usecases=
.
>>>
>>> Regards,
>>> Peng.
>>>
>>> >
>>> > I have seen users that are successfuly booting Xen on i.MX8, although
>>> they are
>>> > not directly using Xen Project tree but one provided by code aurora
>>> NXP (see
>>> > [1]).
>>> >
>>> > AFAIK, there might be some missing pieces in the Xen Project tree for
>>> that
>>> > board. I am not sure whether this is just to take full of advantage o=
f
>>> board.
>>> >
>>> > I have CCed Peng who might be able to provide support.
>>> >
>>> > Cheers,
>>> >
>>> > [1]
>>> >
>>> https://eur01.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsou=
rce
>>> > .codeaurora.org%2Fexternal%2Fimx%2Fimx-xen%2F&amp;data=3D04%7C01%7
>>> > Cpeng.fan%40nxp.com%7Cc60e9b08fe0949c6654608d8f0851e15%7C686ea1
>>> > d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637523801815383189%7CUn
>>> > known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I
>>> > k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3D7dIXYtfNCOAGNEsVMayTa
>>> > 5ddXkCwewnkLVUMjg4wVt8%3D&amp;reserved=3D0
>>> >
>>> > --
>>> > Julien Grall
>>>
>>
>
> --
>
>

--0000000000008d005c05bec28f44
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hello Peng,</div><div><br></div><div>&gt;&gt;

Without SMMU, you could not do device passthrough.

</div><div>Noted, PV driver should still work is my understanding.</div><di=
v><br></div><div>&gt;&gt; It will be a bit hard to achieve this. No SMMU, o=
nly one GPU.

</div><div></div><div>If running Ubuntu=C2=A0+ Android on top of Xen would=
=C2=A0be hard to achieve on=C2=A0i.MX8MQ, what exactly is the target use ca=
se for NXP/CodeAurora port of Xen [1] ?</div><div>I do see boards without S=
MMU listed in Xen wiki project, though [2]=C2=A0=C2=A0<br></div><div><br></=
div><div><br></div><div>Thanks,</div><div>Rajagopal</div><div><br></div><di=
v>[1] -=C2=A0<a href=3D"https://source.codeaurora.org/external/imx/imx-xen/=
">https://source.codeaurora.org/external/imx/imx-xen/</a></div><div>[2] -=
=C2=A0<a href=3D"https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualizati=
on_Extensions">Xen ARM with Virtualization Extensions - Xen (xenproject.org=
)</a><br></div><div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=
=3D"gmail_attr">On Mon, Mar 29, 2021 at 3:38 PM Peng Fan &lt;<a href=3D"mai=
lto:van.freenix@gmail.com">van.freenix@gmail.com</a>&gt; wrote:<br></div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-le=
ft:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div>Sorry=
 for HTML format. Inline.</div><br><div class=3D"gmail_quote"><div dir=3D"l=
tr" class=3D"gmail_attr">Rajagopal Aravindan &lt;<a href=3D"mailto:a.rajago=
pal.81@gmail.com" target=3D"_blank">a.rajagopal.81@gmail.com</a>&gt; =E4=BA=
=8E2021=E5=B9=B43=E6=9C=8829=E6=97=A5=E5=91=A8=E4=B8=80 =E4=B8=8B=E5=8D=884=
:01=E5=86=99=E9=81=93=EF=BC=9A<br></div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pad=
ding-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr">Hello Peng,<div><br></div>=
<div>Thank you for your response.</div><div><br></div><div>&gt;&gt;There we=
re people trying to upstream this SoC in community, you should be able to f=
ind patches for 8MQ or 8MM.</div><div>Will take a look at Xen repo hosted b=
y both LinuxFoundation as well as CodeAurora=C2=A0 and get back.</div><div>=
<br></div><div>&gt;&gt;i.MX8MQ could use XEN hypervisor, but note that ther=
e is no SMMU in this chip.=C2=A0=C2=A0</div><div>Thanks for=C2=A0highlighti=
ng this and at this=C2=A0point in time, I see</div><div><ol><li>performance=
 suffering because of this and</li><li>drivers may need to be modified, to =
arbitrate access to main memory, between themselves which otherwise SMMU wo=
uld have taken care of</li><li>also, drivers need to ensure that they get O=
NLY those regions in the accessible range to the peripherals</li></ol></div=
><div>Can you please provide more insight on what the lack of SMMU means to=
 Xen, other than the above ?</div></div></div></blockquote><div><br></div><=
div>Without SMMU, you could not do device passthrough.</div><div>=C2=A0</di=
v><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div d=
ir=3D"ltr"><div><br></div><div>&gt;&gt;

We not see customers requesting xen for i.MX8M*, not sure your usecases.

</div><div>

I do NOT have a i.MX8QM board but ONLY have a i.MX8MQ board and hence was i=
nterested in trying Xen on the MQ board.=C2=A0</div><div>Mine is the normal=
 use case of running a Ubuntu=C2=A0+ Android on top of Xen, and then runnin=
g applications inside them.</div></div></div></blockquote><div><br></div><d=
iv>It will be a bit hard to achieve this. No SMMU, only one GPU.</div><div>=
<br></div><div>Regards,</div><div>Peng.</div><div>=C2=A0</div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr"><div=
><br></div><div></div></div><div dir=3D"ltr">=C2=A0=C2=A0<div>Regards,</div=
><div>Rajagopal</div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Mon, Mar 29, 2021 at 8:39 AM Peng Fan &lt;<a href=
=3D"mailto:peng.fan@nxp.com" target=3D"_blank">peng.fan@nxp.com</a>&gt; wro=
te:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">&gt; Subject=
: Re: Xen - i.MX8QM vs i.MX8MQ<br>
&gt; <br>
&gt; (+ Peng)<br>
<br>
Thanks for adding me.<br>
<br>
&gt; <br>
&gt; On 26/03/2021 18:11, Rajagopal Aravindan wrote:<br>
&gt; &gt; Hello All,<br>
&gt; <br>
&gt; Hi,<br>
&gt; <br>
&gt; &gt; Greetings !<br>
&gt; &gt;<br>
&gt; &gt; I came across a few links saying Xen is supported on NXP&#39;s i.=
MX8QM.<br>
&gt; &gt; But, I don&#39;t see any such thing for i.MX8MQ and people only t=
alking<br>
&gt; &gt; about jailhouse hypervisor for MQ. [1]<br>
&gt; &gt;<br>
&gt; &gt; Can someone here clarify whether i.MX8MQ h/w is NOT compatible wi=
th<br>
&gt; &gt; Xen or the required piece of s/w is yet to be upstreamed to Xen ?=
<br>
<br>
i.MX8MQ could use XEN hypervisor, but note that there is no SMMU in this<br=
>
chip.<br>
<br>
There were people trying to upstream this SoC in community, you should<br>
be able to find patches for 8MQ or 8MM.<br>
<br>
We not see customers requesting xen for i.MX8M*, not sure your usecases.<br=
>
<br>
Regards,<br>
Peng.<br>
<br>
&gt; <br>
&gt; I have seen users that are successfuly booting Xen on i.MX8, although =
they are<br>
&gt; not directly using Xen Project tree but one provided by code aurora NX=
P (see<br>
&gt; [1]).<br>
&gt; <br>
&gt; AFAIK, there might be some missing pieces in the Xen Project tree for =
that<br>
&gt; board. I am not sure whether this is just to take full of advantage of=
 board.<br>
&gt; <br>
&gt; I have CCed Peng who might be able to provide support.<br>
&gt; <br>
&gt; Cheers,<br>
&gt; <br>
&gt; [1]<br>
&gt; <a href=3D"https://eur01.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Fsource" rel=3D"noreferrer" target=3D"_blank">https://eur01.safelin=
ks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsource</a><br>
&gt; .<a href=3D"http://codeaurora.org" rel=3D"noreferrer" target=3D"_blank=
">codeaurora.org</a>%2Fexternal%2Fimx%2Fimx-xen%2F&amp;amp;data=3D04%7C01%7=
<br>
&gt; Cpeng.fan%<a href=3D"http://40nxp.com" rel=3D"noreferrer" target=3D"_b=
lank">40nxp.com</a>%7Cc60e9b08fe0949c6654608d8f0851e15%7C686ea1<br>
&gt; d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637523801815383189%7CUn<br>
&gt; known%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I<br>
&gt; k1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=3D7dIXYtfNCOAGNEsVMayTa<br>
&gt; 5ddXkCwewnkLVUMjg4wVt8%3D&amp;amp;reserved=3D0<br>
&gt; <br>
&gt; --<br>
&gt; Julien Grall<br>
</blockquote></div></div>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
><div dir=3D"ltr"><br></div></div></div>
</blockquote></div></div></div>

--0000000000008d005c05bec28f44--


From xen-users-bounces@lists.xenproject.org Wed Mar 31 06:14:14 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 31 Mar 2021 06:14:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.103726.197867 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRU6N-0003NG-Uf; Wed, 31 Mar 2021 06:13:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 103726.197867; Wed, 31 Mar 2021 06:13:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRU6N-0003N4-Oo; Wed, 31 Mar 2021 06:13:15 +0000
Received: by outflank-mailman (input) for mailman id 103726;
 Wed, 31 Mar 2021 06:13:13 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=tCNl=I5=ca-zephyr.org=bill@srs-us1.protection.inumbo.net>)
 id 1lRU6L-0003Mz-PT
 for xen-users@lists.xenproject.org; Wed, 31 Mar 2021 06:13:13 +0000
Received: from portola.ca-zephyr.org (unknown [166.84.7.202])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTP
 id 35f0c8fd-776b-475b-a263-dadb719bc7ea;
 Wed, 31 Mar 2021 06:13:12 +0000 (UTC)
Received: from webmail.ca-zephyr.org (shelter-3.ca-zephyr.org [50.247.112.108])
 by portola.ca-zephyr.org (Postfix) with ESMTP id EE89F40015
 for <xen-users@lists.xenproject.org>; Wed, 31 Mar 2021 02:13:11 -0400 (EDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 35f0c8fd-776b-475b-a263-dadb719bc7ea
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: 7bit
Date: Tue, 30 Mar 2021 23:13:11 -0700
From: Bill MacAllister <bill@ca-zephyr.org>
To: xen-users@lists.xenproject.org
Subject: domu boot issue
Message-ID: <f942daf3b75c0b63148a5fe895dbef18@ca-zephyr.org>
X-Sender: bill@ca-zephyr.org
User-Agent: Roundcube Webmail/1.3.16

I thought I had solved my problems booting Ubuntu 20.04 domu on a
xen system build on Ubuntu 20.04, but when I went to build a new
domu to day I hit the error below.  This error looks like it is
having problems mounting the disk, but I can manually mount the
logical volume just fine.  What am I missing?  What should I look
at to debug the issue?

Thanks in advance,

Bill

# xl create -c /etc/xen/engine.ca-zephyr.org.cfg
Parsing config from /etc/xen/engine.ca-zephyr.org.cfg
libxl: error: libxl_device.c:1130:device_backend_callback: Domain 
15:unable to add device with path /local/domain/0/backend/vbd/15/51713
libxl: error: libxl_create.c:1299:domcreate_launch_dm: Domain 15:unable 
to add disk devices
libxl: error: libxl_device.c:1130:device_backend_callback: Domain 
15:unable to remove device with path 
/local/domain/0/backend/vbd/15/51713
libxl: error: libxl_domain.c:1107:devices_destroy_cb: Domain 
15:libxl__devices_destroy failed
libxl: error: libxl_domain.c:1034:libxl__destroy_domid: Domain 
15:Non-existant domain
libxl: error: libxl_domain.c:993:domain_destroy_callback: Domain 
15:Unable to destroy guest
libxl: error: libxl_domain.c:920:domain_destroy_cb: Domain 
15:Destruction of domain failed

Here is the cfg file for the host.

type   = 'pvh'
kernel = '/usr/lib/grub-xen/grub-i386-xen_pvh.bin'
vcpus  = '2'
memory = '8192'

root        = '/dev/xvda1 ro'
disk        = [
                   'phy:/dev/vg_xen/engine.ca-zephyr.org-disk,xvda1,w',
               ]

name        = 'engine.ca-zephyr.org'

dhcp        = 'dhcp'
vif         = [ 'mac=00:16:3E:2A:E3:83' ]

on_poweroff = 'destroy'
on_reboot   = 'restart'
on_crash    = 'restart'


-- 
Bill MacAllister <bill@ca-zephyr.org>


From xen-users-bounces@lists.xenproject.org Wed Mar 31 08:21:28 2021
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 31 Mar 2021 08:21:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.103777.197905 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRW5k-0000VW-M5; Wed, 31 Mar 2021 08:20:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 103777.197905; Wed, 31 Mar 2021 08:20:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1lRW5k-0000VP-Ir; Wed, 31 Mar 2021 08:20:44 +0000
Received: by outflank-mailman (input) for mailman id 103777;
 Wed, 31 Mar 2021 08:20:44 +0000
Received: from us1-rack-iad1.inumbo.com ([172.99.69.81])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=chdL=I5=ltri.eu=lukas@srs-us1.protection.inumbo.net>)
 id 1lRW5k-0000VK-1E
 for xen-users@lists.xenproject.org; Wed, 31 Mar 2021 08:20:44 +0000
Received: from mout-p-103.mailbox.org (unknown [80.241.56.161])
 by us1-rack-iad1.inumbo.com (Halon) with ESMTPS
 id 7ce94358-89c4-4db8-b38a-c0d8904d5e91;
 Wed, 31 Mar 2021 08:20:42 +0000 (UTC)
Received: from smtp1.mailbox.org (smtp1.mailbox.org [80.241.60.240])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest
 SHA256) (No client certificate requested)
 by mout-p-103.mailbox.org (Postfix) with ESMTPS id 4F9K5510mXzQjmJ
 for <xen-users@lists.xenproject.org>; Wed, 31 Mar 2021 10:20:41 +0200 (CEST)
Received: from smtp1.mailbox.org ([80.241.60.240])
 by spamfilter01.heinlein-hosting.de (spamfilter01.heinlein-hosting.de
 [80.241.56.116]) (amavisd-new, port 10030)
 with ESMTP id UpYHu3U0kIqY for <xen-users@lists.xenproject.org>;
 Wed, 31 Mar 2021 10:20:32 +0200 (CEST)
Received: by mail-il1-f169.google.com with SMTP id w2so15999661ilj.12
 for <xen-users@lists.xenproject.org>; Wed, 31 Mar 2021 01:20:31 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 7ce94358-89c4-4db8-b38a-c0d8904d5e91
X-Virus-Scanned: amavisd-new at heinlein-support.de
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ltri.eu; s=MBO0001;
	t=1617178837;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=XCEqFCsWed43gC0+J+7gM+o/Zr0pQK/W0EwHZu5RbAs=;
	b=RoBX/DBIzYqjG3iW/6FpGlFZjmngrNQjxvX5MJfwGiFVj1kF9GA2sFiv/El61NgFCzMVW8
	761DwHnn1nS86cvN2wop8wPVA8zU+QIoQ8qdb0ArRaNSjPbKLe7Zu1MCDZrK2NSJ1TT+tH
	OZe0o2SH+8KOr3Sftpmljw76WO3mqp4/rdHdUL9/j6de7Snpt3064gA/ymG8EHc5h/84NL
	+YqR6uR3W0XXKGSUY/F/3CavJE0ax8zolL4PyA61gjT6VnNTt2r5A/6hTlIHsaoEIsgx5I
	ZlTRBytascpvKqvJM1p61YkSGQH8+beIE/g/I4llr/7SB+yU+xywscRgtuacfA==
X-Gm-Message-State: AOAM533HD5G/bdvinYtuRL2EmHRvSyz2TXFk+UEDO1Rg+jyhc8bciFY4
	Bz4DJNvbId+VQG1CQSDNDFlVgl3vcpMJBmLBGgQ=
X-Google-Smtp-Source: ABdhPJyqv4TvX9xmloRFTe8tVOBpJq95EQ+lqcNSPczhFxFt4mpXtVnuBUnUr1+VZQODbbY3Wb5M7NiTOLRIlZHmbTQ=
X-Received: by 2002:a05:6e02:ee3:: with SMTP id j3mr1816290ilk.85.1617178830122;
 Wed, 31 Mar 2021 01:20:30 -0700 (PDT)
MIME-Version: 1.0
References: <f942daf3b75c0b63148a5fe895dbef18@ca-zephyr.org>
In-Reply-To: <f942daf3b75c0b63148a5fe895dbef18@ca-zephyr.org>
From: Lukas Tribus <lukas@ltri.eu>
Date: Wed, 31 Mar 2021 10:20:18 +0200
X-Gmail-Original-Message-ID: <CACC_My_h70r8iqA-Ry1i6JLN6w4bu6GvcMbhOJALZgqokEydYg@mail.gmail.com>
Message-ID: <CACC_My_h70r8iqA-Ry1i6JLN6w4bu6GvcMbhOJALZgqokEydYg@mail.gmail.com>
Subject: Re: domu boot issue
To: bill@ca-zephyr.org
Cc: xen-users@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"
X-MBO-SPAM-Probability: 
X-Rspamd-Score: -2.96 / 15.00 / 15.00
X-Rspamd-Queue-Id: DF2C61867
X-Rspamd-UID: 5bbc00

Hello Bill,

On Wed, 31 Mar 2021 at 08:13, Bill MacAllister <bill@ca-zephyr.org> wrote:
>
> I thought I had solved my problems booting Ubuntu 20.04 domu on a
> [snip]
>
>  libxl: error: libxl_device.c:1130:device_backend_callback: Domain
> 15:unable to add device with path /local/domain/0/backend/vbd/15/51713

It's a kernel regression, you need to wait for Ubuntu to release
5.4.0-71 or enable the HWE stack for a newer kernel on Ubuntu 20.04.

https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1920660


Lukas


