From xen-users-bounces@lists.xenproject.org Sat Jul 01 01:41:37 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 01 Jul 2023 01:41:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.557722.871334 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qFPbX-0003UT-NL; Sat, 01 Jul 2023 01:40:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 557722.871334; Sat, 01 Jul 2023 01:40:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qFPbX-0003S6-Ef; Sat, 01 Jul 2023 01:40:51 +0000
Received: by outflank-mailman (input) for mailman id 557722;
 Sat, 01 Jul 2023 01:40:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=FaHD=CT=gmail.com=yshxxsjt715@srs-se1.protection.inumbo.net>)
 id 1qFPbV-0003QN-Va
 for xen-users@lists.xenproject.org; Sat, 01 Jul 2023 01:40:49 +0000
Received: from mail-yw1-x1131.google.com (mail-yw1-x1131.google.com
 [2607:f8b0:4864:20::1131])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4ae2aa5c-17b0-11ee-8611-37d641c3527e;
 Sat, 01 Jul 2023 03:40:44 +0200 (CEST)
Received: by mail-yw1-x1131.google.com with SMTP id
 00721157ae682-5774098f16eso16007677b3.0; 
 Fri, 30 Jun 2023 18:40:43 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 4ae2aa5c-17b0-11ee-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20221208; t=1688175643; x=1690767643;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:from:to:cc:subject:date:message-id:reply-to;
        bh=SEcfA2Ww7HR2irnIpklXq/A9PNh1FXgpCio5YDgpl0U=;
        b=jmoC5J1PtFdizaR2gL+x54Pc91iCLqZ8hdq5oR6a0BMD4YBcqOaNGA6NpJDERb5ALb
         Rb9Inb1FabtHuAfAHQMZCVS8JbCo5Mbnq6OLVDB2oR470AN+BptAfa3jHkqE50ZDMUBm
         /f+hsTRgyfViphjjlmFOk04ZKWva+RhzsINsZpjXoTJUQSRQJZPbPCuealJJXgekH/Pu
         exiTwvUYAcSl7gVWl86WtSSgI+gbXOZhBocUYeEQ+vJJCDoO9roChlWvC/k4bUpWgIhq
         zIhUmGZutYzVTHFaXWDB6NWRm9CaG73UC8OgTeCpOKtdR6p/6Qq+l+uuXKekgEI7bR0N
         uYew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1688175643; x=1690767643;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id
         :reply-to;
        bh=SEcfA2Ww7HR2irnIpklXq/A9PNh1FXgpCio5YDgpl0U=;
        b=ieL6Hiy/IeClq+oG2pspXDZGS7ADAhNSa1bxB5wiJbZMeto2olcZX1SlarfrVAyaaX
         lER0qw5CkDg/ZfSQS/l+6nkBGvySYrjrNMrTzuNy5o6mwo4gqqKow9iWkTZ8qC8kD9gv
         XQe2o5Qf8LZjqfHfhEjSMV3VVcsp9F1W0no8uQWILB87w6P7RpuoiXBasblOWCoj3781
         fxiPjZ2I5H1Bx+Ax0x7Li+yOHEPVYZd8lfUW1DqvcYj1w8zMNmii+IQEwnTguCD83vxs
         CXj4pPLq7SPOMRJ6yJv/LThxzbUADOw0vShefBXUY8VYKWpAa8ZG8TWBzAntoxeOuODm
         Upxg==
X-Gm-Message-State: ABy/qLaklvtHl131WEiQyk6LqIP4WypE334KBLVsxDZothD+VIUtYgRr
	LV+3AnsAqdPkwQMdpufvDIycMUBDGz9drYRXonjb1bX7064=
X-Google-Smtp-Source: APBJJlHzZgRATzxdC7kGqhsaCy5jV5epnWTg0LUyCnbY/zCR2Fu7oouXEkzjgP2oVPJ5y25cl/JXVVnsrdtd2ycU4mM=
X-Received: by 2002:a81:6646:0:b0:56d:8241:e067 with SMTP id
 a67-20020a816646000000b0056d8241e067mr3848423ywc.49.1688175642818; Fri, 30
 Jun 2023 18:40:42 -0700 (PDT)
MIME-Version: 1.0
References: <CALqm=ddiMwWvdYMgyCtaKMocUEkEJyTgSQup9wJiXm4PrcDuVw@mail.gmail.com>
 <alpine.DEB.2.22.394.2306081537590.3803068@ubuntu-linux-20-04-desktop>
 <e729d60e-b290-dec3-e35b-65c24ffbfda6@xen.org> <CALqm=ddc3BhqRQmPDjnZ3TeMEXPTMUDfj7JCSj0QEDxnMaKLvw@mail.gmail.com>
 <78899eac-9de8-3626-8f40-98f993984f95@xen.org> <CALqm=dfrudbnsy7RdP9GdSmyO2m9JN=8mKD7wQvz2WBv6afJhQ@mail.gmail.com>
 <CALqm=de+zGitK2ofX=gExMX1mVUbN1S45fMtf5a9iBR-WBZpcw@mail.gmail.com>
 <CALqm=dcn02oe=nrL_SEo+y5aTJX8SD3OB3fccFyEwPch6fLfDg@mail.gmail.com>
 <CALqm=deNDzc83QEAUqTE5iKb7g106V_k_F6AEJc19R=W-0TDsw@mail.gmail.com>
 <e3f54279-db7a-973c-e792-712dc2b19eb7@xen.org> <CALqm=dfE=Ni0gzs8F692DmXzBs-EbqCs7sXenBt0qOGV=iyj0g@mail.gmail.com>
 <ebdfe8a6-7aee-a553-907e-e788c3b3df33@xen.org> <CALqm=ddPaaF8PG=ycb0u0iGHR+=35SV9taSo7Q-0FqH9QeMiEA@mail.gmail.com>
 <1ef5a5a6-01ea-4f3f-c05f-7dfd204a1861@xen.org> <CALqm=dd494P-BWCiemXJYgE4QbZ09MfE_bmae75LqGQcV=PiXA@mail.gmail.com>
 <8bf66b4a-7f3b-22e0-6c09-c003ac972fe5@xen.org>
In-Reply-To: <8bf66b4a-7f3b-22e0-6c09-c003ac972fe5@xen.org>
From: Jiatong Shen <yshxxsjt715@gmail.com>
Date: Sat, 1 Jul 2023 09:40:31 +0800
Message-ID: <CALqm=dfwCiFnCd6ypm3y3FtiiPeQjUE9m+w+J8vwNv6t47f0Yg@mail.gmail.com>
Subject: Re: Asking for help to debug xen efi on Kunpeng machine
To: Julien Grall <julien@xen.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>, xen-users@lists.xenproject.org, 
	xen-devel@lists.xenproject.org, bertrand.marquis@arm.com
Content-Type: multipart/alternative; boundary="000000000000823df005ff6305e9"

--000000000000823df005ff6305e9
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Julien,

   Thank you for your answer. Do you have any advice on how to debug the
issue?
I have very little experience with xen so I think I still need
debugging even if I can
get MBI-gen's tech doc...

Best regards,
Jiatong Shen

On Fri, Jun 30, 2023 at 5:42=E2=80=AFAM Julien Grall <julien@xen.org> wrote=
:

> On 24/06/2023 15:54, Jiatong Shen wrote:
> > Hello Julien,
>
> Hi,
>
> >     Thank you very much for your reply. Can you teach me how to find th=
e
> > relationship between MBI-gen and devices?
> > I am not sure how to find out the mbi-gen backed devices..
>
> I am afraid I don't have any experience with the MBI-gen. I have also
> looked at one Hisilicon Device-Tree but I don't know whether this is the
> one for your board.
>
> My recommendation would be to check if there is any technical
> documentation for your HW.
>
> Cheers,
>
> --
> Julien Grall
>


--=20

Best Regards,

Jiatong Shen

--000000000000823df005ff6305e9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi Julien,</div><div><br></div>=C2=A0 =C2=A0Thank you=
 for your answer. Do you have any advice on how to debug the issue?<br><div=
>I have very little experience=C2=A0with xen so I think I still need debugg=
ing=C2=A0even if I can</div><div>get MBI-gen&#39;s tech doc...</div><div><b=
r></div><div>Best=C2=A0regards,</div><div>Jiatong Shen</div></div><br><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, Jun 30,=
 2023 at 5:42=E2=80=AFAM Julien Grall &lt;<a href=3D"mailto:julien@xen.org"=
>julien@xen.org</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pad=
ding-left:1ex">On 24/06/2023 15:54, Jiatong Shen wrote:<br>
&gt; Hello Julien,<br>
<br>
Hi,<br>
<br>
&gt;=C2=A0 =C2=A0 =C2=A0Thank you very much for your reply. Can you teach m=
e how to find the<br>
&gt; relationship between MBI-gen and devices?<br>
&gt; I am not sure how to find out the mbi-gen backed devices..<br>
<br>
I am afraid I don&#39;t have any experience with the MBI-gen. I have also <=
br>
looked at one Hisilicon Device-Tree but I don&#39;t know whether this is th=
e <br>
one for your board.<br>
<br>
My recommendation would be to check if there is any technical <br>
documentation for your HW.<br>
<br>
Cheers,<br>
<br>
-- <br>
Julien Grall<br>
</blockquote></div><br clear=3D"all"><div><br></div><span class=3D"gmail_si=
gnature_prefix">-- </span><br><div dir=3D"ltr" class=3D"gmail_signature"><d=
iv dir=3D"ltr"><br><div>Best Regards,</div><div><br></div><div>Jiatong Shen=
</div></div></div>

--000000000000823df005ff6305e9--


From xen-users-bounces@lists.xenproject.org Sat Jul 01 16:41:14 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 01 Jul 2023 16:41:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.557903.871650 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qFdeA-0007qV-8j; Sat, 01 Jul 2023 16:40:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 557903.871650; Sat, 01 Jul 2023 16:40:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qFdeA-0007qK-4W; Sat, 01 Jul 2023 16:40:30 +0000
Received: by outflank-mailman (input) for mailman id 557903;
 Sat, 01 Jul 2023 16:40:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=DOj3=CT=parit.ca=jamie@srs-se1.protection.inumbo.net>)
 id 1qFde9-0007qA-0g
 for xen-users@lists.xenproject.org; Sat, 01 Jul 2023 16:40:29 +0000
Received: from mail-pl1-x62b.google.com (mail-pl1-x62b.google.com
 [2607:f8b0:4864:20::62b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id faae1beb-182d-11ee-8611-37d641c3527e;
 Sat, 01 Jul 2023 18:40:26 +0200 (CEST)
Received: by mail-pl1-x62b.google.com with SMTP id
 d9443c01a7336-1b84c7a2716so14214425ad.3
 for <xen-users@lists.xenproject.org>; Sat, 01 Jul 2023 09:40:26 -0700 (PDT)
Received: from ?IPV6:2604:3d08:1c89:c800:dd68:8fc7:eff8:e3ec?
 ([2604:3d08:1c89:c800:dd68:8fc7:eff8:e3ec])
 by smtp.gmail.com with ESMTPSA id
 j7-20020a17090276c700b001ac444fd07fsm12497405plt.100.2023.07.01.09.40.23
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Sat, 01 Jul 2023 09:40:23 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: faae1beb-182d-11ee-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=parit.ca; s=google; t=1688229624; x=1690821624;
        h=content-transfer-encoding:subject:from:content-language:to
         :user-agent:mime-version:date:message-id:from:to:cc:subject:date
         :message-id:reply-to;
        bh=NLDuosCJCtUFuw2OozVj2boeahcMAyFzeLuH3B3vu6c=;
        b=sAsYaaWb3lVcq7hY8TEBtY77aIbqMMuho6JDGezUnaNb2GimwHsekrYGd3GGMgUUfl
         bZlGyig+3xoV+fPIx2797IKJcKqSKnUB8xtA2Ml7cLFYNINofKQFfS40kQDfqKbU7A5w
         0MB/u/gmrrRw0axpp2tkovMLSJxS8cy6YCzPc=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1688229624; x=1690821624;
        h=content-transfer-encoding:subject:from:content-language:to
         :user-agent:mime-version:date:message-id:x-gm-message-state:from:to
         :cc:subject:date:message-id:reply-to;
        bh=NLDuosCJCtUFuw2OozVj2boeahcMAyFzeLuH3B3vu6c=;
        b=XZfXvLC+xGsCv6NT/R/HMF4oLdL0oGBsAZrdlHLUfnzGQ8gHEdvX5iKGNdzAuQlAj5
         A7vnCnIxY7kZ1XnuaGuFX8TWberl5HrMntDQecFzIMBmTx4aMLOVVYzyKc568Wrz0umU
         A82aMLX3/UwTRC8U0wXsmP9KiSeA3l9ufHgt32k8O9DsNoYKPNmRGsYtrzEMeBTAR80f
         JCxGBOqqY00JJePil2YBc9WfLS12Cei0KMP5ldd6eHuU32d6EYHhe/gSdobzuWhmHruT
         jm2A0kLJsVxjsO81EBXI978itWr11uhbnb5UUpHtPdHrxcxwqs04uNsWvj7/ln/Dr7/O
         3DXA==
X-Gm-Message-State: ABy/qLae+SjnX66sdeNj84ZVhy/0cpN9ztCMw7Ww5UBGN1JbzMZNnXjk
	2IYmL7DsjqbgbDIPUCaazivmzRb2aEbvrN16YpA=
X-Google-Smtp-Source: APBJJlF2pjnoj88HTW42yiViesU/T6lmU8YQHcl+oFKZEcoCAlnogXi9AE3IUsT8NJLj5PuIVK5vfA==
X-Received: by 2002:a17:902:cf46:b0:1b5:5bf2:b7d2 with SMTP id e6-20020a170902cf4600b001b55bf2b7d2mr3046274plg.49.1688229624207;
        Sat, 01 Jul 2023 09:40:24 -0700 (PDT)
Message-ID: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
Date: Sat, 1 Jul 2023 09:40:22 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.4.2
To: xen-users@lists.xenproject.org
Content-Language: en-US
From: Jamie Campbell <jamie@parit.ca>
Subject: black screen troubles trying to boot with Xen Hypervisor grub option
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

I'm trying to work my way through the beginner guide ( 
https://wiki.xenproject.org/wiki/Xen_Project_Beginners_Guide ). Things 
seem fine all the way down to step 5 "Installing the Xen Project 
Software".  I do the reboot and select the option with Xen Hypervisor 
and instead of getting a console login I get a black screen.  The 
machine doesn't have a serial port or SOL so I took the suggestion on 
the serial console page saying "you could always record a video of the 
boot process".  Then I transcribed it (which means there might be some 
typos).  From my limited understanding the log seems to have some 
warnings and suggestions about possible changes to make things better, 
but nothing that seems to indicate I'm about to be dumped into a black 
screen.  Log below:

-----------------------------

(XEN) ACPI: 32/64X FACS address mismatch in FADT - 
daf5a000/0000000000000000, using 32
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-23
(XEN) PCI: Not using MCFG for segment 0000 bus 00-3f
(XEN) Switched to APIC driver x2apic_cluster
(XEN) CPU0: 1200 ... 2600 MHz
(XEN) xstate: size: 0x340 and states: 0x7
(XEN) Speculative mitigation facilities:
(XEN)   Hardware hints:
(XEN)   Hardware features:
(XEN)   Compiled-in support: INDIRECT_THUNK SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk RETPOLINE, SPEC_CTRL: No, Other: 
BRANCH_HARDEN
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 36, Safe 
address 1000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (without PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN) Platform timer is 14.318MHz HPET
(XEN) Detected 2594.107 MHz processor.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tabled not enabled.
(XEN) I/O virtualization enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) Enabling APIC mode: Clustered. Using 1 I/O APICs
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) Allocated console ring of 16 KiB.
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN) HVM: ASIDs enabled
(XEN) VMX: Disabling executable EPT superpages due to CVE-2018-12207
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes, 4kB, 2MB
(XEN) Brought up 4 CPUs
(XEN) Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) Initializing Credit2 scheduler
(XEN) Dom0 has maximum 648 PIRQs
(XEN)  Xen  kernel: 64-bit, lsb
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x4a00000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000208000000->0000000210000000 (1948531 pages 
to be allocated)
(XEN)  Init. ramdisk: 000000032c0B4000->000000021e5ffd12
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff81000000->ffffffff84a00000
(XEN)  Phys-Mach map: 0000008000000000->0000008000f30778
(XEN)  Start info:    ffffffff84a00000->ffffffff84a004b8
(XEN)  Page tables:   ffffffff84a01000->ffffffff84a2a000
(XEN)  Boot stack:    ffffffff84a2a000->ffffffff84a2b000
(XEN)  TOTAL:         ffffffff80000000->ffffffff84c00000
(XEN)  ENTRY ADDRESS: ffffffff8306e1c0
(XEN) Dom0 has maximum 4 VCPUS
(XEN) Bogus DMIBAR 0xfed18001 on 0000:00:00.0
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Scrubbing Free RAM in background
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) ***************************************************
(XEN) Booted on L1TF-vulnerable hardware with SMT/Hyperthreading
(XEN) enabled.  Please assess your configuration and choose an
(XEN) explicit 'smt=<bool>' setting.  See XSA-273.
(XEN) ***************************************************
(XEN) Booted on MLPDS/MFBDS-vulnerable hardware with SMT/Hyperthreading
(XEN) enabled.  Mitigations will not be fully effective.  Please
(XEN) choose an explicit smt=<bool> setting.  See XSA-297
(XEN) ****************************************************
(XEN) 3... 2... 1...

-----------------------------

-Jamie



From xen-users-bounces@lists.xenproject.org Tue Jul 04 21:07:07 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 04 Jul 2023 21:07:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.558682.873023 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qGnDw-0005ho-9M; Tue, 04 Jul 2023 21:06:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 558682.873023; Tue, 04 Jul 2023 21:06:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qGnDw-0005hf-6g; Tue, 04 Jul 2023 21:06:12 +0000
Received: by outflank-mailman (input) for mailman id 558682;
 Tue, 04 Jul 2023 21:06:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z7Za=CW=onlineschubla.de=paul@srs-se1.protection.inumbo.net>)
 id 1qGnDv-0005hX-8O
 for xen-users@lists.xenproject.org; Tue, 04 Jul 2023 21:06:11 +0000
Received: from mo4-p00-ob.smtp.rzone.de (mo4-p00-ob.smtp.rzone.de
 [81.169.146.217]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 95ee7824-1aae-11ee-8611-37d641c3527e;
 Tue, 04 Jul 2023 23:06:04 +0200 (CEST)
Received: from mail.onlineschubla.de by smtp.strato.de (RZmta 49.6.0 AUTH)
 with ESMTPSA id wae60cz64L63htO
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits))
 (Client did not present a certificate)
 for <xen-users@lists.xenproject.org>;
 Tue, 4 Jul 2023 23:06:03 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mail.onlineschubla.de (Postfix) with ESMTP id 97A322033C
 for <xen-users@lists.xenproject.org>; Tue,  4 Jul 2023 23:06:02 +0200 (CEST)
Received: from mail.onlineschubla.de ([127.0.0.1])
 by localhost (mail.onlineschubla.de [127.0.0.1]) (amavis, port 10024)
 with ESMTP id sAJKX6bw9ktb for <xen-users@lists.xenproject.org>;
 Tue,  4 Jul 2023 23:06:01 +0200 (CEST)
Received: from [10.0.0.105] (unknown [10.0.0.105])
 by mail.onlineschubla.de (Postfix) with ESMTPA id 8441F2010F
 for <xen-users@lists.xenproject.org>; Tue,  4 Jul 2023 23:06:01 +0200 (CEST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 95ee7824-1aae-11ee-8611-37d641c3527e
ARC-Seal: i=1; a=rsa-sha256; t=1688504763; cv=none;
    d=strato.com; s=strato-dkim-0002;
    b=NrP4ZiiosswIBYJskcqFAWPErS+l9diudyL/jn4v7mUdiAQKL6mZgVj+nGE3Fh5ovt
    sPT95juLajaUZNafWCBixN1id06GdilCh1F9KQUGpCihvcm5TucPOLjHJqbqXbtnYgMz
    RaEILjy3QOV6KQ+O27XCWfn2EZynHo5g4i8plMN/N98IxkP8S0Es3SjDMg3+1mA/ImeS
    Y0yh675wvQjpEXJBO8QBo72S/kDQW0jSk8mkktEXojROJd/k1J6Scyf39n79Kv/YSJWj
    FVHRgdCmxjH+cPd2Gltr6AvZgCjHY/zEC7J5oBCB7Jkoaz8PiZ4s9ZkM6BTo5f6Ozg7M
    AhPw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1688504763;
    s=strato-dkim-0002; d=strato.com;
    h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender;
    bh=Nv8k2hJovtRtGQ6akvuFA/yGEvbjlKEHhGDBpnl6UhM=;
    b=fdDs+YEPlL+fNQSmT1vDy4FirhKF9RYcwI/xR7kUlvf/WrWKHP2ZyBqx4dN+xwN/6y
    j3UVRY0J0/RcBIkU5gyo01Z5k7Z2y7LHgaCOqJ6PT2rO0wesvpcglqEQ8+1qocMPYvIN
    6c8F4pbNpFtkjTa4sDB3I2IAqsSizYDVOsKu7fzLu2f4RH+KZuWQMVSIeUajiBakYRHY
    FnKi1yAF4fwK57qNOnLtwun2zQzpDfBS+qqO3f8yQ4/0tDorCqdG0+uLmRmv3Dmn6bwc
    rvXLV+l6EO6EuK3Tkv3ACx2MzB5/hCTB2GO3khX+J0GLGwICg/zTzs4Gqd5xQH64ePfe
    m5sw==
ARC-Authentication-Results: i=1; strato.com;
    arc=none;
    dkim=none
X-RZG-CLASS-ID: mo00
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1688504763;
    s=strato-dkim-0002; d=onlineschubla.de;
    h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender;
    bh=Nv8k2hJovtRtGQ6akvuFA/yGEvbjlKEHhGDBpnl6UhM=;
    b=DnIxE0TODDCp+jfYcPYlqmq5eiyD20G+Q8IlPTPvqgGiXmu29fGsLXt1b6pG825VTD
    sn/dYz5Q+s2C38DDU5mIt7/3O0GNI8H7T36cbEURgjcAlkEZcg2dmjGN+fMvwA0N39/f
    UJBVu++1sMH1PyWf5Bo+t+JGMFaof0iq5BspYHJqucwSzJCavkLH2WFJAo4Iaad6Ho/N
    z8kfB/8UUVrSULuIQHjJXxa4u0KdLZl4GA7HadX2aCrcgyHK66VtCfhwdW+WKYlKHGFB
    hzf4j0LuYGEvCcpiNBJmffQTrmNVcQejrKREGTppXhWQp4/F+mKtPB17BGrwc9mA/BzU
    Ot5w==
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1688504763;
    s=strato-dkim-0003; d=onlineschubla.de;
    h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender;
    bh=Nv8k2hJovtRtGQ6akvuFA/yGEvbjlKEHhGDBpnl6UhM=;
    b=3E46wLieSdsLbM+x8EvhM7zLd8E/OPNSCqJh6m/Oh0vl8WvZLqX/fYc7eGVcM9QQAE
    ycumbYRyvSukDdH+FEDQ==
X-RZG-AUTH: ":PG0ReWCndfO3rCSML4AvNaDxJ7WJyilEI/NMX3IPsStZLbcZC9mNZx0oO9uVFQeS3s1LjmLTORqZAySLdQYvA1+KxOBfB3wLaGri+HQ5Lg=="
X-Virus-Scanned: Debian amavis at onlineschubla.de
Message-ID: <bdd68255-9d93-cbdc-ef0c-9313c04dc853@onlineschubla.de>
Date: Tue, 4 Jul 2023 23:06:01 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.12.0
Content-Language: en-US
To: xen-users@lists.xenproject.org
From: Paul Leiber <paul@onlineschubla.de>
Subject: Xen Ovmf/UEFI HVM error after upgrade to Debian Bookworm (was: xen
 ovmf/uefi firmware does not save screen resolution)
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

On 14/02/2023 8:31 AM, Chuck Zmudzinski wrote:
 > I am adding this information to complete the discussion of this
 > problem I reported several months ago:
 >
 > I discovered the cause of the problems of ovmf/uefi booting with more 
 > recent Xen
 > versions - it is not a bug in Xen, but the problem occurs because
 > newer versions
 > of ovmf do not have Xen support in the OvmfPkgX64 target from edk2 
and > the
 > Xen support is only available from the Xen-specific OvmfXen target
 > from edk2.
 >
 > The problem is discussed here on the Arch Linux forums:
 >
 > https://bbs.archlinux.org/viewtopic.php?pid=2012659#p2012659
 >
 > The last version that had the Xen support in the OvmfPkgX64 target was
 > edk2-stable202105, so for newer versions it is necessary to build and 
 > use the
 > Xen-specific OVMF.fd firmware target to boot properly on Xen.
 >
 > After building using 'OvmfPkg/build.sh -p OvmfPkg/OvmfXen.dsc' as
 > explained
 > here:
 >
 > https://lore.kernel.org/all/20190813113119.14804-1-
 > anthony.perard@xxxxxxxxxx/
 >
 > from the edk2 source at https://github.com/tianocore/edk2 and using
 > the
 > resulting
 > OVMF.fd firmware target with Xen support to boot the Xen HVM guest,
 > the guest
 > works properly with versions of ovmf edk2-stable202108 and newer.
 >
 > Unfortunately distros such as Debian and Fedora don't provide the Xen 
 > specific
 > target in their ovmf packages, so it is necessary to build it from
 > source for
 > ovmf
 > versions of edk2-stable202108 and newer.

Thanks a lot for posting this, Chuck! It seems that I have run into this 
situation after upgrading from Debian Bullseye to Debian Bookworm. With 
standard packages, existing HVM DomUs using "firmware = 'ovmf'" (Windows 
Server 2022 and Windows 10) can't boot anymore. Booting these systems 
leads to the Windows error 0xc0000225. I wasn't able to fix this error. 
Booting an installation .iso leads to the same error. Booting the 
installation media with "firmware = 'bios'" leads to a normal boot.

I tried building Ovmf following
https://lore.kernel.org/all/20190813113119.14804-1-anthony.perard@citrix.com/#t 
, but I wasn't fully able to create a working system:

(1) Using the resulting OVMF.fd from the build process with "firmware =
'/path/to/new/OVMF.fd' led consistently to a black screen in VNC or
Spice with the text "Guest has not initialized the display (yet)".

(2) Replacing the OVMF.fd in /var/lib/ovmf with the freshly built
OVMF.fd led to a slight improvement. I could then boot the Windows
Server installation .iso, but booting the Windows 10 installation .iso
lead to a crash where the TianoCore logo was visible, but nothing
happened. The two existing DomUs were still not bootable. When trying to
boot any of them, in Ovmf log appears an error "FATAL ERROR - RaiseTpl
with OldTpl(0x1F) > NewTpl(0x10)".

However, I am not sure that I followed the procedure correctly, I might
very well have done something very wrong. Any pointers are welcome.

My HVM config file:

type = "hvm"
memory = 6144
vcpus = 2
name = "kalliope"
firmware = 'ovmf'
firmware = '/usr/local/lib/ovmf/OVMF.fd'
vif = ['bridge=xenbr0,mac=XX:XX:XX:XX:XX:XX,ip=10.0.0.4']
disk = ['phy:/dev/vg0/matrix,hda,w']
device_model_version = 'qemu-xen'
hdtype = 'ahci'
pae = 1
acpi = 1
apic = 1
vga = 'stdvga'
videoram = 16
xen_platform_pci = 1
vendor_device = 'xenserver'
viridian = 1
on_crash = 'restart'
device_model_args_hvm = [
   # Debug OVMF
   '-chardev', 'file,id=debugcon,path=/var/log/xen/ovmf.log,',
   '-device', 'isa-debugcon,iobase=0x402,chardev=debugcon',
]
sdl = 0
serial = 'pty'
vnc = 1
vnclisten = "0.0.0.0"
vncpasswd = ""


There is a Debian bug report which seems to be related, I also described 
my situation there: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978595

Paul


From xen-users-bounces@lists.xenproject.org Sun Jul 09 06:09:53 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 09 Jul 2023 06:09:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.560800.876975 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qINbW-00020j-Qw; Sun, 09 Jul 2023 06:09:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 560800.876975; Sun, 09 Jul 2023 06:09:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qINbW-000204-LD; Sun, 09 Jul 2023 06:09:06 +0000
Received: by outflank-mailman (input) for mailman id 560800;
 Sun, 09 Jul 2023 06:09:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=DWUt=C3=nethence.com=pbraun@srs-se1.protection.inumbo.net>)
 id 1qINbV-0001zy-OA
 for xen-users@lists.xenproject.org; Sun, 09 Jul 2023 06:09:05 +0000
Received: from xc.nethence.com (xc.nethence.com [195.154.162.19])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 196ce44c-1e1f-11ee-8611-37d641c3527e;
 Sun, 09 Jul 2023 08:09:03 +0200 (CEST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 196ce44c-1e1f-11ee-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nethence.com;
	s=aug2022; t=1688882941;
	bh=XdGGVWlf/QqxYpYAlIW/fuy/h6LBgX5oNyR3wpmX/Dg=;
	h=Date:Subject:To:References:From:In-Reply-To:From;
	b=dq/vDMjX5++TsCEuySO1++ybooxcU9HhO8gpUEMxZ2V5J5AWXsyorTPz89YHbuc4r
	 25GH6YYp2N0steU6WDVjCJ/SrKbzTZZZ2jEGVilB9zIZXTk2RSVaud3ha5SboArtyc
	 583rdfCQbJayfi0J6IWHGT7CVN6wyZFR9+jJtol2e3mXmEpqMRKJslqxW+0IfAU4MJ
	 gz3sps2cQJyKm+JPrprTYv5hMCLsb9QMl4d8BpXir6iILlHqy2LKxdPPPrn1u/XaGL
	 3+fNB375eAlsRUzdHL33Jca9GPdFwh6fpNCEOZpEbdoXgx4yfeTuWQDsx8/nAYc9qK
	 2WeAjYtbnzLEg==
Message-ID: <5d1568ff-e748-5bed-2169-d63e71139f2c@nethence.com>
Date: Sun, 9 Jul 2023 09:08:58 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.11.0
Subject: Re: black screen troubles trying to boot with Xen Hypervisor grub
 option
To: Jamie Campbell <jamie@parit.ca>, xen-users@lists.xenproject.org
References: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
Content-Language: en-US, fr
From: Pierre-Philipp Braun <pbraun@nethence.com>
In-Reply-To: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

> (XEN) 3... 2... 1...

Hello Jamie, so question is, what does your GRUB config look like 
(without the comments please), so we can see if you are having serial 
console specifics as for booting the linux kernel and userland.

There are mainly three steps in booting a dom0:

1. xen micro-kernel
2. linux kernel (and eventually initramfs)
3. userland and getty

all three can have different output.  Here's a few hints on how to 
tackle grub.conf manually.

https://pub.nethence.com/booting/grub

-elge


From xen-users-bounces@lists.xenproject.org Sun Jul 09 20:21:35 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 09 Jul 2023 20:21:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.560867.877027 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIatb-0004Ik-72; Sun, 09 Jul 2023 20:20:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 560867.877027; Sun, 09 Jul 2023 20:20:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIatb-0004Ic-3N; Sun, 09 Jul 2023 20:20:39 +0000
Received: by outflank-mailman (input) for mailman id 560867;
 Sun, 09 Jul 2023 20:20:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=yzW6=C3=parit.ca=jamie@srs-se1.protection.inumbo.net>)
 id 1qIatZ-0004IU-4f
 for xen-users@lists.xenproject.org; Sun, 09 Jul 2023 20:20:37 +0000
Received: from mail-pf1-x42b.google.com (mail-pf1-x42b.google.com
 [2607:f8b0:4864:20::42b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0cfb2091-1e96-11ee-8611-37d641c3527e;
 Sun, 09 Jul 2023 22:20:31 +0200 (CEST)
Received: by mail-pf1-x42b.google.com with SMTP id
 d2e1a72fcca58-666ed230c81so3296921b3a.0
 for <xen-users@lists.xenproject.org>; Sun, 09 Jul 2023 13:20:31 -0700 (PDT)
Received: from ?IPV6:2604:3d08:1c89:c800:3cdb:baf9:544f:c346?
 ([2604:3d08:1c89:c800:3cdb:baf9:544f:c346])
 by smtp.gmail.com with ESMTPSA id
 12-20020a17090a030c00b00263d15f0e87sm5143344pje.42.2023.07.09.13.20.28
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Sun, 09 Jul 2023 13:20:28 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 0cfb2091-1e96-11ee-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=parit.ca; s=google; t=1688934029; x=1691526029;
        h=in-reply-to:from:content-language:references:to:subject:user-agent
         :mime-version:date:message-id:from:to:cc:subject:date:message-id
         :reply-to;
        bh=5oln+wM6rYxE1xWNqvrR927aCaZBj9CmHVCsP/9ScPg=;
        b=HLRRVyKEpEQsXAE4SzlZpNVQlcXhd9QPNa/Vq5bMkI1geSWuCMPfHUG56VM1SGbwAZ
         Jn3jpNNqNR95TUP8Y2lcyDVJutAaPc89rbj8sF0uiOvKuqAqMuhFMcourvdWFTNsGcRN
         gt/YZ7cEgmzP1adrbYVBV55SeHib+1EJjSeF0=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1688934029; x=1691526029;
        h=in-reply-to:from:content-language:references:to:subject:user-agent
         :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject
         :date:message-id:reply-to;
        bh=5oln+wM6rYxE1xWNqvrR927aCaZBj9CmHVCsP/9ScPg=;
        b=lKfEmfYwynxPcuSZR9fZpG6fGXhV1DZfhFuqq0M+mIQzwaHCydpdmoY0d1yKdSw+GP
         Cwt51DRfhedawPlkla7crilAuXJFqkvEfTHwKBAJRWop5qCxpQWpVmafM22IOubHcOoF
         UPxxNPzP88d2olfTFCaaTVeHxi3s0YNh/ndnOKtOpc3ErYkdMLAZe/r+aur9LJCwSJ3P
         dZtJB31kOzBGgcCaP3dporkgjJYvDLY89efETU6O/qah5Ab2Mrj3hVyjoIOy50xuGUi1
         542Rnq4YM0GTh7P5wZaSooA2De50oX8n7VYd2/iRAcJ3zL9Ma7ry+knoVgVZ70ogEl2T
         NRvA==
X-Gm-Message-State: ABy/qLb9p06VHxQj1LPQySiaQfphy5oysNCotbfcWQiadISlT7YM31K5
	7DSZIKlspdg8ERW7gcchWjniemglZUsBS9pnibM=
X-Google-Smtp-Source: APBJJlGHpL0/+zffJv/0dXlS0txdsE+ynUaMUe+it8qeejMy5wPvFkqZPnQh8Q9a4Y0tH3yZnV19rQ==
X-Received: by 2002:a17:90a:10c9:b0:263:f39:496d with SMTP id b9-20020a17090a10c900b002630f39496dmr10790581pje.44.1688934029434;
        Sun, 09 Jul 2023 13:20:29 -0700 (PDT)
Content-Type: multipart/mixed; boundary="------------67W0mokzz2BSyEufl58CRT2K"
Message-ID: <d35cd904-ae84-4246-5a28-8e04f8b9af91@parit.ca>
Date: Sun, 9 Jul 2023 13:20:27 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.4.2
Subject: Re: black screen troubles trying to boot with Xen Hypervisor grub
 option
To: xen-users@lists.xenproject.org
References: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
 <5d1568ff-e748-5bed-2169-d63e71139f2c@nethence.com>
Content-Language: en-US
From: Jamie Campbell <jamie@parit.ca>
In-Reply-To: <5d1568ff-e748-5bed-2169-d63e71139f2c@nethence.com>

This is a multi-part message in MIME format.
--------------67W0mokzz2BSyEufl58CRT2K
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hello Elge,

I've attached the grub config prior to the xen metapackage and also the 
grub config after xen metapackage install.  The pre-xen config might not 
be relevant but I'm attaching it in case the diff does turn out to have 
relevance.  Comments scrubbed from both.

You mention serial console but in my case the computer has no physical 
serial port nor the virtual SOL approach.

While digging in to what's going on I also noticed that the base 
hypervisor entry has a conditional branch checking $grub_platform so I 
added an echo to figure out which branch it's picking, and it turns out 
that in my case $grub_platform isn't "pc" and isn't empty but rather is 
"efi" so it does the "no-real-mode edd=off" options.  When I read about 
them in the documentation says that no-real-mode should only be used for 
debugging because it prevents vga from working, and I got excited 
because I thought "and therefore black screen!" but when I force it to 
use no options, like the "pc" branch does, it still gets black screen.

-Jamie

On 2023-07-08 11:08 p.m., Pierre-Philipp Braun wrote:
>> (XEN) 3... 2... 1...
>
> Hello Jamie, so question is, what does your GRUB config look like 
> (without the comments please), so we can see if you are having serial 
> console specifics as for booting the linux kernel and userland.
>
> There are mainly three steps in booting a dom0:
>
> 1. xen micro-kernel
> 2. linux kernel (and eventually initramfs)
> 3. userland and getty
>
> all three can have different output.  Here's a few hints on how to 
> tackle grub.conf manually.
>
> https://pub.nethence.com/booting/grub
>
> -elge
>
--------------67W0mokzz2BSyEufl58CRT2K
Content-Type: text/plain; charset=UTF-8;
 name="grub-before-xen--nocomments.cfg"
Content-Disposition: attachment; filename="grub-before-xen--nocomments.cfg"
Content-Transfer-Encoding: base64
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--------------67W0mokzz2BSyEufl58CRT2K
Content-Type: text/plain; charset=UTF-8;
 name="grub-after-metapackage-xen-system-amd64--nocomments.cfg"
Content-Disposition: attachment;
 filename="grub-after-metapackage-xen-system-amd64--nocomments.cfg"
Content-Transfer-Encoding: base64

aWYgWyAtcyAkcHJlZml4L2dydWJlbnYgXTsgdGhlbgogIHNldCBoYXZlX2dydWJlbnY9dHJ1
ZQogIGxvYWRfZW52CmZpCmlmIFsgIiR7bmV4dF9lbnRyeX0iIF0gOyB0aGVuCiAgIHNldCBk
ZWZhdWx0PSIke25leHRfZW50cnl9IgogICBzZXQgbmV4dF9lbnRyeT0KICAgc2F2ZV9lbnYg
bmV4dF9lbnRyeQogICBzZXQgYm9vdF9vbmNlPXRydWUKZWxzZQogICBzZXQgZGVmYXVsdD0i
RGViaWFuIEdOVS9MaW51eCwgd2l0aCBYZW4gaHlwZXJ2aXNvciIKZmkKCmlmIFsgeCIke2Zl
YXR1cmVfbWVudWVudHJ5X2lkfSIgPSB4eSBdOyB0aGVuCiAgbWVudWVudHJ5X2lkX29wdGlv
bj0iLS1pZCIKZWxzZQogIG1lbnVlbnRyeV9pZF9vcHRpb249IiIKZmkKCmV4cG9ydCBtZW51
ZW50cnlfaWRfb3B0aW9uCgppZiBbICIke3ByZXZfc2F2ZWRfZW50cnl9IiBdOyB0aGVuCiAg
c2V0IHNhdmVkX2VudHJ5PSIke3ByZXZfc2F2ZWRfZW50cnl9IgogIHNhdmVfZW52IHNhdmVk
X2VudHJ5CiAgc2V0IHByZXZfc2F2ZWRfZW50cnk9CiAgc2F2ZV9lbnYgcHJldl9zYXZlZF9l
bnRyeQogIHNldCBib290X29uY2U9dHJ1ZQpmaQoKZnVuY3Rpb24gc2F2ZWRlZmF1bHQgewog
IGlmIFsgLXogIiR7Ym9vdF9vbmNlfSIgXTsgdGhlbgogICAgc2F2ZWRfZW50cnk9IiR7Y2hv
c2VufSIKICAgIHNhdmVfZW52IHNhdmVkX2VudHJ5CiAgZmkKfQpmdW5jdGlvbiBsb2FkX3Zp
ZGVvIHsKICBpZiBbIHgkZmVhdHVyZV9hbGxfdmlkZW9fbW9kdWxlID0geHkgXTsgdGhlbgog
ICAgaW5zbW9kIGFsbF92aWRlbwogIGVsc2UKICAgIGluc21vZCBlZmlfZ29wCiAgICBpbnNt
b2QgZWZpX3VnYQogICAgaW5zbW9kIGllZWUxMjc1X2ZiCiAgICBpbnNtb2QgdmJlCiAgICBp
bnNtb2QgdmdhCiAgICBpbnNtb2QgdmlkZW9fYm9jaHMKICAgIGluc21vZCB2aWRlb19jaXJy
dXMKICBmaQp9CgppZiBbIHgkZmVhdHVyZV9kZWZhdWx0X2ZvbnRfcGF0aCA9IHh5IF0gOyB0
aGVuCiAgIGZvbnQ9dW5pY29kZQplbHNlCmluc21vZCBwYXJ0X2dwdAppbnNtb2QgZXh0Mgpz
ZXQgcm9vdD0naGQwLGdwdDInCmlmIFsgeCRmZWF0dXJlX3BsYXRmb3JtX3NlYXJjaF9oaW50
ID0geHkgXTsgdGhlbgogIHNlYXJjaCAtLW5vLWZsb3BweSAtLWZzLXV1aWQgLS1zZXQ9cm9v
dCAtLWhpbnQtYmlvcz1oZDAsZ3B0MiAtLWhpbnQtZWZpPWhkMCxncHQyIC0taGludC1iYXJl
bWV0YWw9YWhjaTAsZ3B0MiAgMGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcw
CmVsc2UKICBzZWFyY2ggLS1uby1mbG9wcHkgLS1mcy11dWlkIC0tc2V0PXJvb3QgMGUyNzZi
MTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwCmZpCiAgICBmb250PSIvdXNyL3NoYXJl
L2dydWIvdW5pY29kZS5wZjIiCmZpCgppZiBsb2FkZm9udCAkZm9udCA7IHRoZW4KICBzZXQg
Z2Z4bW9kZT1hdXRvCiAgbG9hZF92aWRlbwogIGluc21vZCBnZnh0ZXJtCiAgc2V0IGxvY2Fs
ZV9kaXI9JHByZWZpeC9sb2NhbGUKICBzZXQgbGFuZz1lbl9DQQogIGluc21vZCBnZXR0ZXh0
CmZpCnRlcm1pbmFsX291dHB1dCBnZnh0ZXJtCmlmIFsgIiR7cmVjb3JkZmFpbH0iID0gMSBd
IDsgdGhlbgogIHNldCB0aW1lb3V0PTMwCmVsc2UKICBpZiBbIHgkZmVhdHVyZV90aW1lb3V0
X3N0eWxlID0geHkgXSA7IHRoZW4KICAgIHNldCB0aW1lb3V0X3N0eWxlPW1lbnUKICAgIHNl
dCB0aW1lb3V0PTUKICBlbHNlCiAgICBzZXQgdGltZW91dD01CiAgZmkKZmkKCnNldCBtZW51
X2NvbG9yX25vcm1hbD1jeWFuL2JsdWUKc2V0IG1lbnVfY29sb3JfaGlnaGxpZ2h0PXdoaXRl
L2JsdWUKCmZ1bmN0aW9uIGdmeG1vZGUgewoJc2V0IGdmeHBheWxvYWQ9IiR7MX0iCn0Kc2V0
IGxpbnV4X2dmeF9tb2RlPQpleHBvcnQgbGludXhfZ2Z4X21vZGUKbWVudWVudHJ5ICdEZWJp
YW4gR05VL0xpbnV4JyAtLWNsYXNzIGRlYmlhbiAtLWNsYXNzIGdudS1saW51eCAtLWNsYXNz
IGdudSAtLWNsYXNzIG9zICRtZW51ZW50cnlfaWRfb3B0aW9uICdnbnVsaW51eC1zaW1wbGUt
MGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7Cglsb2FkX3ZpZGVvCglp
bnNtb2QgZ3ppbwoJaWYgWyB4JGdydWJfcGxhdGZvcm0gPSB4eGVuIF07IHRoZW4gaW5zbW9k
IHh6aW87IGluc21vZCBsem9waW87IGZpCglpbnNtb2QgcGFydF9ncHQKCWluc21vZCBleHQy
CglzZXQgcm9vdD0naGQwLGdwdDEnCglpZiBbIHgkZmVhdHVyZV9wbGF0Zm9ybV9zZWFyY2hf
aGludCA9IHh5IF07IHRoZW4KCSAgc2VhcmNoIC0tbm8tZmxvcHB5IC0tZnMtdXVpZCAtLXNl
dD1yb290IC0taGludC1iaW9zPWhkMCxncHQxIC0taGludC1lZmk9aGQwLGdwdDEgLS1oaW50
LWJhcmVtZXRhbD1haGNpMCxncHQxICAxZGQ2ODc1NC1jNGViLTQwMTEtOThkNC02ZGY3M2Y5
OWViODEKCWVsc2UKCSAgc2VhcmNoIC0tbm8tZmxvcHB5IC0tZnMtdXVpZCAtLXNldD1yb290
IDFkZDY4NzU0LWM0ZWItNDAxMS05OGQ0LTZkZjczZjk5ZWI4MQoJZmkKCWVjaG8JJ0xvYWRp
bmcgTGludXggNi4xLjAtMTAtYW1kNjQgLi4uJwoJbGludXgJL3ZtbGludXotNi4xLjAtMTAt
YW1kNjQgcm9vdD1VVUlEPTBlMjc2YjE4LTU0YTQtNGZmOS1hNzcwLTFiY2RkOTQ2ZWE3MCBy
byAgcXVpZXQKCWVjaG8JJ0xvYWRpbmcgaW5pdGlhbCByYW1kaXNrIC4uLicKCWluaXRyZAkv
aW5pdHJkLmltZy02LjEuMC0xMC1hbWQ2NAp9CnN1Ym1lbnUgJ0FkdmFuY2VkIG9wdGlvbnMg
Zm9yIERlYmlhbiBHTlUvTGludXgnICRtZW51ZW50cnlfaWRfb3B0aW9uICdnbnVsaW51eC1h
ZHZhbmNlZC0wZTI3NmIxOC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAnIHsKCW1lbnVl
bnRyeSAnRGViaWFuIEdOVS9MaW51eCwgd2l0aCBMaW51eCA2LjEuMC0xMC1hbWQ2NCcgLS1j
bGFzcyBkZWJpYW4gLS1jbGFzcyBnbnUtbGludXggLS1jbGFzcyBnbnUgLS1jbGFzcyBvcyAk
bWVudWVudHJ5X2lkX29wdGlvbiAnZ251bGludXgtNi4xLjAtMTAtYW1kNjQtYWR2YW5jZWQt
MGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7CgkJbG9hZF92aWRlbwoJ
CWluc21vZCBnemlvCgkJaWYgWyB4JGdydWJfcGxhdGZvcm0gPSB4eGVuIF07IHRoZW4gaW5z
bW9kIHh6aW87IGluc21vZCBsem9waW87IGZpCgkJaW5zbW9kIHBhcnRfZ3B0CgkJaW5zbW9k
IGV4dDIKCQlzZXQgcm9vdD0naGQwLGdwdDEnCgkJaWYgWyB4JGZlYXR1cmVfcGxhdGZvcm1f
c2VhcmNoX2hpbnQgPSB4eSBdOyB0aGVuCgkJICBzZWFyY2ggLS1uby1mbG9wcHkgLS1mcy11
dWlkIC0tc2V0PXJvb3QgLS1oaW50LWJpb3M9aGQwLGdwdDEgLS1oaW50LWVmaT1oZDAsZ3B0
MSAtLWhpbnQtYmFyZW1ldGFsPWFoY2kwLGdwdDEgIDFkZDY4NzU0LWM0ZWItNDAxMS05OGQ0
LTZkZjczZjk5ZWI4MQoJCWVsc2UKCQkgIHNlYXJjaCAtLW5vLWZsb3BweSAtLWZzLXV1aWQg
LS1zZXQ9cm9vdCAxZGQ2ODc1NC1jNGViLTQwMTEtOThkNC02ZGY3M2Y5OWViODEKCQlmaQoJ
CWVjaG8JJ0xvYWRpbmcgTGludXggNi4xLjAtMTAtYW1kNjQgLi4uJwoJCWxpbnV4CS92bWxp
bnV6LTYuMS4wLTEwLWFtZDY0IHJvb3Q9VVVJRD0wZTI3NmIxOC01NGE0LTRmZjktYTc3MC0x
YmNkZDk0NmVhNzAgcm8gIHF1aWV0CgkJZWNobwknTG9hZGluZyBpbml0aWFsIHJhbWRpc2sg
Li4uJwoJCWluaXRyZAkvaW5pdHJkLmltZy02LjEuMC0xMC1hbWQ2NAoJfQoJbWVudWVudHJ5
ICdEZWJpYW4gR05VL0xpbnV4LCB3aXRoIExpbnV4IDYuMS4wLTEwLWFtZDY0IChyZWNvdmVy
eSBtb2RlKScgLS1jbGFzcyBkZWJpYW4gLS1jbGFzcyBnbnUtbGludXggLS1jbGFzcyBnbnUg
LS1jbGFzcyBvcyAkbWVudWVudHJ5X2lkX29wdGlvbiAnZ251bGludXgtNi4xLjAtMTAtYW1k
NjQtcmVjb3ZlcnktMGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7CgkJ
bG9hZF92aWRlbwoJCWluc21vZCBnemlvCgkJaWYgWyB4JGdydWJfcGxhdGZvcm0gPSB4eGVu
IF07IHRoZW4gaW5zbW9kIHh6aW87IGluc21vZCBsem9waW87IGZpCgkJaW5zbW9kIHBhcnRf
Z3B0CgkJaW5zbW9kIGV4dDIKCQlzZXQgcm9vdD0naGQwLGdwdDEnCgkJaWYgWyB4JGZlYXR1
cmVfcGxhdGZvcm1fc2VhcmNoX2hpbnQgPSB4eSBdOyB0aGVuCgkJICBzZWFyY2ggLS1uby1m
bG9wcHkgLS1mcy11dWlkIC0tc2V0PXJvb3QgLS1oaW50LWJpb3M9aGQwLGdwdDEgLS1oaW50
LWVmaT1oZDAsZ3B0MSAtLWhpbnQtYmFyZW1ldGFsPWFoY2kwLGdwdDEgIDFkZDY4NzU0LWM0
ZWItNDAxMS05OGQ0LTZkZjczZjk5ZWI4MQoJCWVsc2UKCQkgIHNlYXJjaCAtLW5vLWZsb3Bw
eSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAxZGQ2ODc1NC1jNGViLTQwMTEtOThkNC02ZGY3M2Y5
OWViODEKCQlmaQoJCWVjaG8JJ0xvYWRpbmcgTGludXggNi4xLjAtMTAtYW1kNjQgLi4uJwoJ
CWxpbnV4CS92bWxpbnV6LTYuMS4wLTEwLWFtZDY0IHJvb3Q9VVVJRD0wZTI3NmIxOC01NGE0
LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAgcm8gc2luZ2xlIAoJCWVjaG8JJ0xvYWRpbmcgaW5p
dGlhbCByYW1kaXNrIC4uLicKCQlpbml0cmQJL2luaXRyZC5pbWctNi4xLjAtMTAtYW1kNjQK
CX0KCW1lbnVlbnRyeSAnRGViaWFuIEdOVS9MaW51eCwgd2l0aCBMaW51eCA2LjEuMC05LWFt
ZDY0JyAtLWNsYXNzIGRlYmlhbiAtLWNsYXNzIGdudS1saW51eCAtLWNsYXNzIGdudSAtLWNs
YXNzIG9zICRtZW51ZW50cnlfaWRfb3B0aW9uICdnbnVsaW51eC02LjEuMC05LWFtZDY0LWFk
dmFuY2VkLTBlMjc2YjE4LTU0YTQtNGZmOS1hNzcwLTFiY2RkOTQ2ZWE3MCcgewoJCWxvYWRf
dmlkZW8KCQlpbnNtb2QgZ3ppbwoJCWlmIFsgeCRncnViX3BsYXRmb3JtID0geHhlbiBdOyB0
aGVuIGluc21vZCB4emlvOyBpbnNtb2QgbHpvcGlvOyBmaQoJCWluc21vZCBwYXJ0X2dwdAoJ
CWluc21vZCBleHQyCgkJc2V0IHJvb3Q9J2hkMCxncHQxJwoJCWlmIFsgeCRmZWF0dXJlX3Bs
YXRmb3JtX3NlYXJjaF9oaW50ID0geHkgXTsgdGhlbgoJCSAgc2VhcmNoIC0tbm8tZmxvcHB5
IC0tZnMtdXVpZCAtLXNldD1yb290IC0taGludC1iaW9zPWhkMCxncHQxIC0taGludC1lZmk9
aGQwLGdwdDEgLS1oaW50LWJhcmVtZXRhbD1haGNpMCxncHQxICAxZGQ2ODc1NC1jNGViLTQw
MTEtOThkNC02ZGY3M2Y5OWViODEKCQllbHNlCgkJICBzZWFyY2ggLS1uby1mbG9wcHkgLS1m
cy11dWlkIC0tc2V0PXJvb3QgMWRkNjg3NTQtYzRlYi00MDExLTk4ZDQtNmRmNzNmOTllYjgx
CgkJZmkKCQllY2hvCSdMb2FkaW5nIExpbnV4IDYuMS4wLTktYW1kNjQgLi4uJwoJCWxpbnV4
CS92bWxpbnV6LTYuMS4wLTktYW1kNjQgcm9vdD1VVUlEPTBlMjc2YjE4LTU0YTQtNGZmOS1h
NzcwLTFiY2RkOTQ2ZWE3MCBybyAgcXVpZXQKCQllY2hvCSdMb2FkaW5nIGluaXRpYWwgcmFt
ZGlzayAuLi4nCgkJaW5pdHJkCS9pbml0cmQuaW1nLTYuMS4wLTktYW1kNjQKCX0KCW1lbnVl
bnRyeSAnRGViaWFuIEdOVS9MaW51eCwgd2l0aCBMaW51eCA2LjEuMC05LWFtZDY0IChyZWNv
dmVyeSBtb2RlKScgLS1jbGFzcyBkZWJpYW4gLS1jbGFzcyBnbnUtbGludXggLS1jbGFzcyBn
bnUgLS1jbGFzcyBvcyAkbWVudWVudHJ5X2lkX29wdGlvbiAnZ251bGludXgtNi4xLjAtOS1h
bWQ2NC1yZWNvdmVyeS0wZTI3NmIxOC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAnIHsK
CQlsb2FkX3ZpZGVvCgkJaW5zbW9kIGd6aW8KCQlpZiBbIHgkZ3J1Yl9wbGF0Zm9ybSA9IHh4
ZW4gXTsgdGhlbiBpbnNtb2QgeHppbzsgaW5zbW9kIGx6b3BpbzsgZmkKCQlpbnNtb2QgcGFy
dF9ncHQKCQlpbnNtb2QgZXh0MgoJCXNldCByb290PSdoZDAsZ3B0MScKCQlpZiBbIHgkZmVh
dHVyZV9wbGF0Zm9ybV9zZWFyY2hfaGludCA9IHh5IF07IHRoZW4KCQkgIHNlYXJjaCAtLW5v
LWZsb3BweSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAtLWhpbnQtYmlvcz1oZDAsZ3B0MSAtLWhp
bnQtZWZpPWhkMCxncHQxIC0taGludC1iYXJlbWV0YWw9YWhjaTAsZ3B0MSAgMWRkNjg3NTQt
YzRlYi00MDExLTk4ZDQtNmRmNzNmOTllYjgxCgkJZWxzZQoJCSAgc2VhcmNoIC0tbm8tZmxv
cHB5IC0tZnMtdXVpZCAtLXNldD1yb290IDFkZDY4NzU0LWM0ZWItNDAxMS05OGQ0LTZkZjcz
Zjk5ZWI4MQoJCWZpCgkJZWNobwknTG9hZGluZyBMaW51eCA2LjEuMC05LWFtZDY0IC4uLicK
CQlsaW51eAkvdm1saW51ei02LjEuMC05LWFtZDY0IHJvb3Q9VVVJRD0wZTI3NmIxOC01NGE0
LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAgcm8gc2luZ2xlIAoJCWVjaG8JJ0xvYWRpbmcgaW5p
dGlhbCByYW1kaXNrIC4uLicKCQlpbml0cmQJL2luaXRyZC5pbWctNi4xLjAtOS1hbWQ2NAoJ
fQp9CgptZW51ZW50cnkgJ0RlYmlhbiBHTlUvTGludXgsIHdpdGggWGVuIGh5cGVydmlzb3In
IC0tY2xhc3MgZGViaWFuIC0tY2xhc3MgZ251LWxpbnV4IC0tY2xhc3MgZ251IC0tY2xhc3Mg
b3MgLS1jbGFzcyB4ZW4gJG1lbnVlbnRyeV9pZF9vcHRpb24gJ3hlbi1nbnVsaW51eC1zaW1w
bGUtMGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7CglpbnNtb2QgcGFy
dF9ncHQKCWluc21vZCBleHQyCglzZXQgcm9vdD0naGQwLGdwdDEnCglpZiBbIHgkZmVhdHVy
ZV9wbGF0Zm9ybV9zZWFyY2hfaGludCA9IHh5IF07IHRoZW4KCSAgc2VhcmNoIC0tbm8tZmxv
cHB5IC0tZnMtdXVpZCAtLXNldD1yb290IC0taGludC1iaW9zPWhkMCxncHQxIC0taGludC1l
Zmk9aGQwLGdwdDEgLS1oaW50LWJhcmVtZXRhbD1haGNpMCxncHQxICAxZGQ2ODc1NC1jNGVi
LTQwMTEtOThkNC02ZGY3M2Y5OWViODEKCWVsc2UKCSAgc2VhcmNoIC0tbm8tZmxvcHB5IC0t
ZnMtdXVpZCAtLXNldD1yb290IDFkZDY4NzU0LWM0ZWItNDAxMS05OGQ0LTZkZjczZjk5ZWI4
MQoJZmkKCWVjaG8JJ0xvYWRpbmcgWGVuIDQuMTctYW1kNjQgLi4uJwogICAgICAgIGlmIFsg
IiRncnViX3BsYXRmb3JtIiA9ICJwYyIgLW8gIiRncnViX3BsYXRmb3JtIiA9ICIiIF07IHRo
ZW4KICAgICAgICAgICAgeGVuX3JtX29wdHM9CiAgICAgICAgZWxzZQogICAgICAgICAgICB4
ZW5fcm1fb3B0cz0ibm8tcmVhbC1tb2RlIGVkZD1vZmYiCiAgICAgICAgZmkKCW11bHRpYm9v
dDIJL3hlbi00LjE3LWFtZDY0Lmd6IHBsYWNlaG9sZGVyICAgJHt4ZW5fcm1fb3B0c30KCWVj
aG8JJ0xvYWRpbmcgTGludXggNi4xLjAtMTAtYW1kNjQgLi4uJwoJbW9kdWxlMgkvdm1saW51
ei02LjEuMC0xMC1hbWQ2NCBwbGFjZWhvbGRlciByb290PVVVSUQ9MGUyNzZiMTgtNTRhNC00
ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwIHJvICBxdWlldAoJZWNobwknTG9hZGluZyBpbml0aWFs
IHJhbWRpc2sgLi4uJwoJbW9kdWxlMgktLW5vdW56aXAgICAvaW5pdHJkLmltZy02LjEuMC0x
MC1hbWQ2NAp9CnN1Ym1lbnUgJ0FkdmFuY2VkIG9wdGlvbnMgZm9yIERlYmlhbiBHTlUvTGlu
dXggKHdpdGggWGVuIGh5cGVydmlzb3IpJyAkbWVudWVudHJ5X2lkX29wdGlvbiAnZ251bGlu
dXgtYWR2YW5jZWQtMGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7Cglz
dWJtZW51ICdYZW4gaHlwZXJ2aXNvciwgdmVyc2lvbiA0LjE3LWFtZDY0JyAkbWVudWVudHJ5
X2lkX29wdGlvbiAneGVuLWh5cGVydmlzb3ItNC4xNy1hbWQ2NC0wZTI3NmIxOC01NGE0LTRm
ZjktYTc3MC0xYmNkZDk0NmVhNzAnIHsKCQltZW51ZW50cnkgJ0RlYmlhbiBHTlUvTGludXgs
IHdpdGggWGVuIDQuMTctYW1kNjQgYW5kIExpbnV4IDYuMS4wLTEwLWFtZDY0JyAtLWNsYXNz
IGRlYmlhbiAtLWNsYXNzIGdudS1saW51eCAtLWNsYXNzIGdudSAtLWNsYXNzIG9zIC0tY2xh
c3MgeGVuICRtZW51ZW50cnlfaWRfb3B0aW9uICd4ZW4tZ251bGludXgtNi4xLjAtMTAtYW1k
NjQtYWR2YW5jZWQtMGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7CgkJ
CWluc21vZCBwYXJ0X2dwdAoJCQlpbnNtb2QgZXh0MgoJCQlzZXQgcm9vdD0naGQwLGdwdDEn
CgkJCWlmIFsgeCRmZWF0dXJlX3BsYXRmb3JtX3NlYXJjaF9oaW50ID0geHkgXTsgdGhlbgoJ
CQkgIHNlYXJjaCAtLW5vLWZsb3BweSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAtLWhpbnQtYmlv
cz1oZDAsZ3B0MSAtLWhpbnQtZWZpPWhkMCxncHQxIC0taGludC1iYXJlbWV0YWw9YWhjaTAs
Z3B0MSAgMWRkNjg3NTQtYzRlYi00MDExLTk4ZDQtNmRmNzNmOTllYjgxCgkJCWVsc2UKCQkJ
ICBzZWFyY2ggLS1uby1mbG9wcHkgLS1mcy11dWlkIC0tc2V0PXJvb3QgMWRkNjg3NTQtYzRl
Yi00MDExLTk4ZDQtNmRmNzNmOTllYjgxCgkJCWZpCgkJCWVjaG8JJ0xvYWRpbmcgWGVuIDQu
MTctYW1kNjQgLi4uJwoJCSAgICAgICAgaWYgWyAiJGdydWJfcGxhdGZvcm0iID0gInBjIiAt
byAiJGdydWJfcGxhdGZvcm0iID0gIiIgXTsgdGhlbgoJCSAgICAgICAgICAgIHhlbl9ybV9v
cHRzPQoJCSAgICAgICAgZWxzZQoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPSJuby1yZWFs
LW1vZGUgZWRkPW9mZiIKCQkgICAgICAgIGZpCgkJCW11bHRpYm9vdDIJL3hlbi00LjE3LWFt
ZDY0Lmd6IHBsYWNlaG9sZGVyICAgJHt4ZW5fcm1fb3B0c30KCQkJZWNobwknTG9hZGluZyBM
aW51eCA2LjEuMC0xMC1hbWQ2NCAuLi4nCgkJCW1vZHVsZTIJL3ZtbGludXotNi4xLjAtMTAt
YW1kNjQgcGxhY2Vob2xkZXIgcm9vdD1VVUlEPTBlMjc2YjE4LTU0YTQtNGZmOS1hNzcwLTFi
Y2RkOTQ2ZWE3MCBybyAgcXVpZXQKCQkJZWNobwknTG9hZGluZyBpbml0aWFsIHJhbWRpc2sg
Li4uJwoJCQltb2R1bGUyCS0tbm91bnppcCAgIC9pbml0cmQuaW1nLTYuMS4wLTEwLWFtZDY0
CgkJfQoJCW1lbnVlbnRyeSAnRGViaWFuIEdOVS9MaW51eCwgd2l0aCBYZW4gNC4xNy1hbWQ2
NCBhbmQgTGludXggNi4xLjAtMTAtYW1kNjQgKHJlY292ZXJ5IG1vZGUpJyAtLWNsYXNzIGRl
YmlhbiAtLWNsYXNzIGdudS1saW51eCAtLWNsYXNzIGdudSAtLWNsYXNzIG9zIC0tY2xhc3Mg
eGVuICRtZW51ZW50cnlfaWRfb3B0aW9uICd4ZW4tZ251bGludXgtNi4xLjAtMTAtYW1kNjQt
cmVjb3ZlcnktMGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7CgkJCWlu
c21vZCBwYXJ0X2dwdAoJCQlpbnNtb2QgZXh0MgoJCQlzZXQgcm9vdD0naGQwLGdwdDEnCgkJ
CWlmIFsgeCRmZWF0dXJlX3BsYXRmb3JtX3NlYXJjaF9oaW50ID0geHkgXTsgdGhlbgoJCQkg
IHNlYXJjaCAtLW5vLWZsb3BweSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAtLWhpbnQtYmlvcz1o
ZDAsZ3B0MSAtLWhpbnQtZWZpPWhkMCxncHQxIC0taGludC1iYXJlbWV0YWw9YWhjaTAsZ3B0
MSAgMWRkNjg3NTQtYzRlYi00MDExLTk4ZDQtNmRmNzNmOTllYjgxCgkJCWVsc2UKCQkJICBz
ZWFyY2ggLS1uby1mbG9wcHkgLS1mcy11dWlkIC0tc2V0PXJvb3QgMWRkNjg3NTQtYzRlYi00
MDExLTk4ZDQtNmRmNzNmOTllYjgxCgkJCWZpCgkJCWVjaG8JJ0xvYWRpbmcgWGVuIDQuMTct
YW1kNjQgLi4uJwoJCSAgICAgICAgaWYgWyAiJGdydWJfcGxhdGZvcm0iID0gInBjIiAtbyAi
JGdydWJfcGxhdGZvcm0iID0gIiIgXTsgdGhlbgoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRz
PQoJCSAgICAgICAgZWxzZQoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPSJuby1yZWFsLW1v
ZGUgZWRkPW9mZiIKCQkgICAgICAgIGZpCgkJCW11bHRpYm9vdDIJL3hlbi00LjE3LWFtZDY0
Lmd6IHBsYWNlaG9sZGVyICAke3hlbl9ybV9vcHRzfQoJCQllY2hvCSdMb2FkaW5nIExpbnV4
IDYuMS4wLTEwLWFtZDY0IC4uLicKCQkJbW9kdWxlMgkvdm1saW51ei02LjEuMC0xMC1hbWQ2
NCBwbGFjZWhvbGRlciByb290PVVVSUQ9MGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5
NDZlYTcwIHJvIHNpbmdsZSAKCQkJZWNobwknTG9hZGluZyBpbml0aWFsIHJhbWRpc2sgLi4u
JwoJCQltb2R1bGUyCS0tbm91bnppcCAgIC9pbml0cmQuaW1nLTYuMS4wLTEwLWFtZDY0CgkJ
fQoJCW1lbnVlbnRyeSAnRGViaWFuIEdOVS9MaW51eCwgd2l0aCBYZW4gNC4xNy1hbWQ2NCBh
bmQgTGludXggNi4xLjAtOS1hbWQ2NCcgLS1jbGFzcyBkZWJpYW4gLS1jbGFzcyBnbnUtbGlu
dXggLS1jbGFzcyBnbnUgLS1jbGFzcyBvcyAtLWNsYXNzIHhlbiAkbWVudWVudHJ5X2lkX29w
dGlvbiAneGVuLWdudWxpbnV4LTYuMS4wLTktYW1kNjQtYWR2YW5jZWQtMGUyNzZiMTgtNTRh
NC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7CgkJCWluc21vZCBwYXJ0X2dwdAoJCQlpbnNt
b2QgZXh0MgoJCQlzZXQgcm9vdD0naGQwLGdwdDEnCgkJCWlmIFsgeCRmZWF0dXJlX3BsYXRm
b3JtX3NlYXJjaF9oaW50ID0geHkgXTsgdGhlbgoJCQkgIHNlYXJjaCAtLW5vLWZsb3BweSAt
LWZzLXV1aWQgLS1zZXQ9cm9vdCAtLWhpbnQtYmlvcz1oZDAsZ3B0MSAtLWhpbnQtZWZpPWhk
MCxncHQxIC0taGludC1iYXJlbWV0YWw9YWhjaTAsZ3B0MSAgMWRkNjg3NTQtYzRlYi00MDEx
LTk4ZDQtNmRmNzNmOTllYjgxCgkJCWVsc2UKCQkJICBzZWFyY2ggLS1uby1mbG9wcHkgLS1m
cy11dWlkIC0tc2V0PXJvb3QgMWRkNjg3NTQtYzRlYi00MDExLTk4ZDQtNmRmNzNmOTllYjgx
CgkJCWZpCgkJCWVjaG8JJ0xvYWRpbmcgWGVuIDQuMTctYW1kNjQgLi4uJwoJCSAgICAgICAg
aWYgWyAiJGdydWJfcGxhdGZvcm0iID0gInBjIiAtbyAiJGdydWJfcGxhdGZvcm0iID0gIiIg
XTsgdGhlbgoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPQoJCSAgICAgICAgZWxzZQoJCSAg
ICAgICAgICAgIHhlbl9ybV9vcHRzPSJuby1yZWFsLW1vZGUgZWRkPW9mZiIKCQkgICAgICAg
IGZpCgkJCW11bHRpYm9vdDIJL3hlbi00LjE3LWFtZDY0Lmd6IHBsYWNlaG9sZGVyICAgJHt4
ZW5fcm1fb3B0c30KCQkJZWNobwknTG9hZGluZyBMaW51eCA2LjEuMC05LWFtZDY0IC4uLicK
CQkJbW9kdWxlMgkvdm1saW51ei02LjEuMC05LWFtZDY0IHBsYWNlaG9sZGVyIHJvb3Q9VVVJ
RD0wZTI3NmIxOC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAgcm8gIHF1aWV0CgkJCWVj
aG8JJ0xvYWRpbmcgaW5pdGlhbCByYW1kaXNrIC4uLicKCQkJbW9kdWxlMgktLW5vdW56aXAg
ICAvaW5pdHJkLmltZy02LjEuMC05LWFtZDY0CgkJfQoJCW1lbnVlbnRyeSAnRGViaWFuIEdO
VS9MaW51eCwgd2l0aCBYZW4gNC4xNy1hbWQ2NCBhbmQgTGludXggNi4xLjAtOS1hbWQ2NCAo
cmVjb3ZlcnkgbW9kZSknIC0tY2xhc3MgZGViaWFuIC0tY2xhc3MgZ251LWxpbnV4IC0tY2xh
c3MgZ251IC0tY2xhc3Mgb3MgLS1jbGFzcyB4ZW4gJG1lbnVlbnRyeV9pZF9vcHRpb24gJ3hl
bi1nbnVsaW51eC02LjEuMC05LWFtZDY0LXJlY292ZXJ5LTBlMjc2YjE4LTU0YTQtNGZmOS1h
NzcwLTFiY2RkOTQ2ZWE3MCcgewoJCQlpbnNtb2QgcGFydF9ncHQKCQkJaW5zbW9kIGV4dDIK
CQkJc2V0IHJvb3Q9J2hkMCxncHQxJwoJCQlpZiBbIHgkZmVhdHVyZV9wbGF0Zm9ybV9zZWFy
Y2hfaGludCA9IHh5IF07IHRoZW4KCQkJICBzZWFyY2ggLS1uby1mbG9wcHkgLS1mcy11dWlk
IC0tc2V0PXJvb3QgLS1oaW50LWJpb3M9aGQwLGdwdDEgLS1oaW50LWVmaT1oZDAsZ3B0MSAt
LWhpbnQtYmFyZW1ldGFsPWFoY2kwLGdwdDEgIDFkZDY4NzU0LWM0ZWItNDAxMS05OGQ0LTZk
ZjczZjk5ZWI4MQoJCQllbHNlCgkJCSAgc2VhcmNoIC0tbm8tZmxvcHB5IC0tZnMtdXVpZCAt
LXNldD1yb290IDFkZDY4NzU0LWM0ZWItNDAxMS05OGQ0LTZkZjczZjk5ZWI4MQoJCQlmaQoJ
CQllY2hvCSdMb2FkaW5nIFhlbiA0LjE3LWFtZDY0IC4uLicKCQkgICAgICAgIGlmIFsgIiRn
cnViX3BsYXRmb3JtIiA9ICJwYyIgLW8gIiRncnViX3BsYXRmb3JtIiA9ICIiIF07IHRoZW4K
CQkgICAgICAgICAgICB4ZW5fcm1fb3B0cz0KCQkgICAgICAgIGVsc2UKCQkgICAgICAgICAg
ICB4ZW5fcm1fb3B0cz0ibm8tcmVhbC1tb2RlIGVkZD1vZmYiCgkJICAgICAgICBmaQoJCQlt
dWx0aWJvb3QyCS94ZW4tNC4xNy1hbWQ2NC5neiBwbGFjZWhvbGRlciAgJHt4ZW5fcm1fb3B0
c30KCQkJZWNobwknTG9hZGluZyBMaW51eCA2LjEuMC05LWFtZDY0IC4uLicKCQkJbW9kdWxl
Mgkvdm1saW51ei02LjEuMC05LWFtZDY0IHBsYWNlaG9sZGVyIHJvb3Q9VVVJRD0wZTI3NmIx
OC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAgcm8gc2luZ2xlIAoJCQllY2hvCSdMb2Fk
aW5nIGluaXRpYWwgcmFtZGlzayAuLi4nCgkJCW1vZHVsZTIJLS1ub3VuemlwICAgL2luaXRy
ZC5pbWctNi4xLjAtOS1hbWQ2NAoJCX0KCX0KCXN1Ym1lbnUgJ1hlbiBoeXBlcnZpc29yLCB2
ZXJzaW9uIDQuMTctYW1kNjQuZWZpJyAkbWVudWVudHJ5X2lkX29wdGlvbiAneGVuLWh5cGVy
dmlzb3ItNC4xNy1hbWQ2NC5lZmktMGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZl
YTcwJyB7CgkJbWVudWVudHJ5ICdEZWJpYW4gR05VL0xpbnV4LCB3aXRoIFhlbiA0LjE3LWFt
ZDY0LmVmaSBhbmQgTGludXggNi4xLjAtMTAtYW1kNjQnIC0tY2xhc3MgZGViaWFuIC0tY2xh
c3MgZ251LWxpbnV4IC0tY2xhc3MgZ251IC0tY2xhc3Mgb3MgLS1jbGFzcyB4ZW4gJG1lbnVl
bnRyeV9pZF9vcHRpb24gJ3hlbi1nbnVsaW51eC02LjEuMC0xMC1hbWQ2NC1hZHZhbmNlZC0w
ZTI3NmIxOC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAnIHsKCQkJaW5zbW9kIHBhcnRf
Z3B0CgkJCWluc21vZCBleHQyCgkJCXNldCByb290PSdoZDAsZ3B0MScKCQkJaWYgWyB4JGZl
YXR1cmVfcGxhdGZvcm1fc2VhcmNoX2hpbnQgPSB4eSBdOyB0aGVuCgkJCSAgc2VhcmNoIC0t
bm8tZmxvcHB5IC0tZnMtdXVpZCAtLXNldD1yb290IC0taGludC1iaW9zPWhkMCxncHQxIC0t
aGludC1lZmk9aGQwLGdwdDEgLS1oaW50LWJhcmVtZXRhbD1haGNpMCxncHQxICAxZGQ2ODc1
NC1jNGViLTQwMTEtOThkNC02ZGY3M2Y5OWViODEKCQkJZWxzZQoJCQkgIHNlYXJjaCAtLW5v
LWZsb3BweSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAxZGQ2ODc1NC1jNGViLTQwMTEtOThkNC02
ZGY3M2Y5OWViODEKCQkJZmkKCQkJZWNobwknTG9hZGluZyBYZW4gNC4xNy1hbWQ2NC5lZmkg
Li4uJwoJCSAgICAgICAgaWYgWyAiJGdydWJfcGxhdGZvcm0iID0gInBjIiAtbyAiJGdydWJf
cGxhdGZvcm0iID0gIiIgXTsgdGhlbgoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPQoJCSAg
ICAgICAgZWxzZQoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPSJuby1yZWFsLW1vZGUgZWRk
PW9mZiIKCQkgICAgICAgIGZpCgkJCW11bHRpYm9vdDIJL3hlbi00LjE3LWFtZDY0LmVmaSBw
bGFjZWhvbGRlciAgICR7eGVuX3JtX29wdHN9CgkJCWVjaG8JJ0xvYWRpbmcgTGludXggNi4x
LjAtMTAtYW1kNjQgLi4uJwoJCQltb2R1bGUyCS92bWxpbnV6LTYuMS4wLTEwLWFtZDY0IHBs
YWNlaG9sZGVyIHJvb3Q9VVVJRD0wZTI3NmIxOC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVh
NzAgcm8gIHF1aWV0CgkJCWVjaG8JJ0xvYWRpbmcgaW5pdGlhbCByYW1kaXNrIC4uLicKCQkJ
bW9kdWxlMgktLW5vdW56aXAgICAvaW5pdHJkLmltZy02LjEuMC0xMC1hbWQ2NAoJCX0KCQlt
ZW51ZW50cnkgJ0RlYmlhbiBHTlUvTGludXgsIHdpdGggWGVuIDQuMTctYW1kNjQuZWZpIGFu
ZCBMaW51eCA2LjEuMC0xMC1hbWQ2NCAocmVjb3ZlcnkgbW9kZSknIC0tY2xhc3MgZGViaWFu
IC0tY2xhc3MgZ251LWxpbnV4IC0tY2xhc3MgZ251IC0tY2xhc3Mgb3MgLS1jbGFzcyB4ZW4g
JG1lbnVlbnRyeV9pZF9vcHRpb24gJ3hlbi1nbnVsaW51eC02LjEuMC0xMC1hbWQ2NC1yZWNv
dmVyeS0wZTI3NmIxOC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAnIHsKCQkJaW5zbW9k
IHBhcnRfZ3B0CgkJCWluc21vZCBleHQyCgkJCXNldCByb290PSdoZDAsZ3B0MScKCQkJaWYg
WyB4JGZlYXR1cmVfcGxhdGZvcm1fc2VhcmNoX2hpbnQgPSB4eSBdOyB0aGVuCgkJCSAgc2Vh
cmNoIC0tbm8tZmxvcHB5IC0tZnMtdXVpZCAtLXNldD1yb290IC0taGludC1iaW9zPWhkMCxn
cHQxIC0taGludC1lZmk9aGQwLGdwdDEgLS1oaW50LWJhcmVtZXRhbD1haGNpMCxncHQxICAx
ZGQ2ODc1NC1jNGViLTQwMTEtOThkNC02ZGY3M2Y5OWViODEKCQkJZWxzZQoJCQkgIHNlYXJj
aCAtLW5vLWZsb3BweSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAxZGQ2ODc1NC1jNGViLTQwMTEt
OThkNC02ZGY3M2Y5OWViODEKCQkJZmkKCQkJZWNobwknTG9hZGluZyBYZW4gNC4xNy1hbWQ2
NC5lZmkgLi4uJwoJCSAgICAgICAgaWYgWyAiJGdydWJfcGxhdGZvcm0iID0gInBjIiAtbyAi
JGdydWJfcGxhdGZvcm0iID0gIiIgXTsgdGhlbgoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRz
PQoJCSAgICAgICAgZWxzZQoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPSJuby1yZWFsLW1v
ZGUgZWRkPW9mZiIKCQkgICAgICAgIGZpCgkJCW11bHRpYm9vdDIJL3hlbi00LjE3LWFtZDY0
LmVmaSBwbGFjZWhvbGRlciAgJHt4ZW5fcm1fb3B0c30KCQkJZWNobwknTG9hZGluZyBMaW51
eCA2LjEuMC0xMC1hbWQ2NCAuLi4nCgkJCW1vZHVsZTIJL3ZtbGludXotNi4xLjAtMTAtYW1k
NjQgcGxhY2Vob2xkZXIgcm9vdD1VVUlEPTBlMjc2YjE4LTU0YTQtNGZmOS1hNzcwLTFiY2Rk
OTQ2ZWE3MCBybyBzaW5nbGUgCgkJCWVjaG8JJ0xvYWRpbmcgaW5pdGlhbCByYW1kaXNrIC4u
LicKCQkJbW9kdWxlMgktLW5vdW56aXAgICAvaW5pdHJkLmltZy02LjEuMC0xMC1hbWQ2NAoJ
CX0KCQltZW51ZW50cnkgJ0RlYmlhbiBHTlUvTGludXgsIHdpdGggWGVuIDQuMTctYW1kNjQu
ZWZpIGFuZCBMaW51eCA2LjEuMC05LWFtZDY0JyAtLWNsYXNzIGRlYmlhbiAtLWNsYXNzIGdu
dS1saW51eCAtLWNsYXNzIGdudSAtLWNsYXNzIG9zIC0tY2xhc3MgeGVuICRtZW51ZW50cnlf
aWRfb3B0aW9uICd4ZW4tZ251bGludXgtNi4xLjAtOS1hbWQ2NC1hZHZhbmNlZC0wZTI3NmIx
OC01NGE0LTRmZjktYTc3MC0xYmNkZDk0NmVhNzAnIHsKCQkJaW5zbW9kIHBhcnRfZ3B0CgkJ
CWluc21vZCBleHQyCgkJCXNldCByb290PSdoZDAsZ3B0MScKCQkJaWYgWyB4JGZlYXR1cmVf
cGxhdGZvcm1fc2VhcmNoX2hpbnQgPSB4eSBdOyB0aGVuCgkJCSAgc2VhcmNoIC0tbm8tZmxv
cHB5IC0tZnMtdXVpZCAtLXNldD1yb290IC0taGludC1iaW9zPWhkMCxncHQxIC0taGludC1l
Zmk9aGQwLGdwdDEgLS1oaW50LWJhcmVtZXRhbD1haGNpMCxncHQxICAxZGQ2ODc1NC1jNGVi
LTQwMTEtOThkNC02ZGY3M2Y5OWViODEKCQkJZWxzZQoJCQkgIHNlYXJjaCAtLW5vLWZsb3Bw
eSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAxZGQ2ODc1NC1jNGViLTQwMTEtOThkNC02ZGY3M2Y5
OWViODEKCQkJZmkKCQkJZWNobwknTG9hZGluZyBYZW4gNC4xNy1hbWQ2NC5lZmkgLi4uJwoJ
CSAgICAgICAgaWYgWyAiJGdydWJfcGxhdGZvcm0iID0gInBjIiAtbyAiJGdydWJfcGxhdGZv
cm0iID0gIiIgXTsgdGhlbgoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPQoJCSAgICAgICAg
ZWxzZQoJCSAgICAgICAgICAgIHhlbl9ybV9vcHRzPSJuby1yZWFsLW1vZGUgZWRkPW9mZiIK
CQkgICAgICAgIGZpCgkJCW11bHRpYm9vdDIJL3hlbi00LjE3LWFtZDY0LmVmaSBwbGFjZWhv
bGRlciAgICR7eGVuX3JtX29wdHN9CgkJCWVjaG8JJ0xvYWRpbmcgTGludXggNi4xLjAtOS1h
bWQ2NCAuLi4nCgkJCW1vZHVsZTIJL3ZtbGludXotNi4xLjAtOS1hbWQ2NCBwbGFjZWhvbGRl
ciByb290PVVVSUQ9MGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwIHJvICBx
dWlldAoJCQllY2hvCSdMb2FkaW5nIGluaXRpYWwgcmFtZGlzayAuLi4nCgkJCW1vZHVsZTIJ
LS1ub3VuemlwICAgL2luaXRyZC5pbWctNi4xLjAtOS1hbWQ2NAoJCX0KCQltZW51ZW50cnkg
J0RlYmlhbiBHTlUvTGludXgsIHdpdGggWGVuIDQuMTctYW1kNjQuZWZpIGFuZCBMaW51eCA2
LjEuMC05LWFtZDY0IChyZWNvdmVyeSBtb2RlKScgLS1jbGFzcyBkZWJpYW4gLS1jbGFzcyBn
bnUtbGludXggLS1jbGFzcyBnbnUgLS1jbGFzcyBvcyAtLWNsYXNzIHhlbiAkbWVudWVudHJ5
X2lkX29wdGlvbiAneGVuLWdudWxpbnV4LTYuMS4wLTktYW1kNjQtcmVjb3ZlcnktMGUyNzZi
MTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwJyB7CgkJCWluc21vZCBwYXJ0X2dwdAoJ
CQlpbnNtb2QgZXh0MgoJCQlzZXQgcm9vdD0naGQwLGdwdDEnCgkJCWlmIFsgeCRmZWF0dXJl
X3BsYXRmb3JtX3NlYXJjaF9oaW50ID0geHkgXTsgdGhlbgoJCQkgIHNlYXJjaCAtLW5vLWZs
b3BweSAtLWZzLXV1aWQgLS1zZXQ9cm9vdCAtLWhpbnQtYmlvcz1oZDAsZ3B0MSAtLWhpbnQt
ZWZpPWhkMCxncHQxIC0taGludC1iYXJlbWV0YWw9YWhjaTAsZ3B0MSAgMWRkNjg3NTQtYzRl
Yi00MDExLTk4ZDQtNmRmNzNmOTllYjgxCgkJCWVsc2UKCQkJICBzZWFyY2ggLS1uby1mbG9w
cHkgLS1mcy11dWlkIC0tc2V0PXJvb3QgMWRkNjg3NTQtYzRlYi00MDExLTk4ZDQtNmRmNzNm
OTllYjgxCgkJCWZpCgkJCWVjaG8JJ0xvYWRpbmcgWGVuIDQuMTctYW1kNjQuZWZpIC4uLicK
CQkgICAgICAgIGlmIFsgIiRncnViX3BsYXRmb3JtIiA9ICJwYyIgLW8gIiRncnViX3BsYXRm
b3JtIiA9ICIiIF07IHRoZW4KCQkgICAgICAgICAgICB4ZW5fcm1fb3B0cz0KCQkgICAgICAg
IGVsc2UKCQkgICAgICAgICAgICB4ZW5fcm1fb3B0cz0ibm8tcmVhbC1tb2RlIGVkZD1vZmYi
CgkJICAgICAgICBmaQoJCQltdWx0aWJvb3QyCS94ZW4tNC4xNy1hbWQ2NC5lZmkgcGxhY2Vo
b2xkZXIgICR7eGVuX3JtX29wdHN9CgkJCWVjaG8JJ0xvYWRpbmcgTGludXggNi4xLjAtOS1h
bWQ2NCAuLi4nCgkJCW1vZHVsZTIJL3ZtbGludXotNi4xLjAtOS1hbWQ2NCBwbGFjZWhvbGRl
ciByb290PVVVSUQ9MGUyNzZiMTgtNTRhNC00ZmY5LWE3NzAtMWJjZGQ5NDZlYTcwIHJvIHNp
bmdsZSAKCQkJZWNobwknTG9hZGluZyBpbml0aWFsIHJhbWRpc2sgLi4uJwoJCQltb2R1bGUy
CS0tbm91bnppcCAgIC9pbml0cmQuaW1nLTYuMS4wLTktYW1kNjQKCQl9Cgl9Cn0KCm1lbnVl
bnRyeSAnVUVGSSBGaXJtd2FyZSBTZXR0aW5ncycgJG1lbnVlbnRyeV9pZF9vcHRpb24gJ3Vl
ZmktZmlybXdhcmUnIHsKCWZ3c2V0dXAKfQoKaWYgWyAtZiAgJHtjb25maWdfZGlyZWN0b3J5
fS9jdXN0b20uY2ZnIF07IHRoZW4KICBzb3VyY2UgJHtjb25maWdfZGlyZWN0b3J5fS9jdXN0
b20uY2ZnCmVsaWYgWyAteiAiJHtjb25maWdfZGlyZWN0b3J5fSIgLWEgLWYgICRwcmVmaXgv
Y3VzdG9tLmNmZyBdOyB0aGVuCiAgc291cmNlICRwcmVmaXgvY3VzdG9tLmNmZwpmaQo=

--------------67W0mokzz2BSyEufl58CRT2K--


From xen-users-bounces@lists.xenproject.org Mon Jul 10 06:58:38 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 10 Jul 2023 06:58:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.560921.877095 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIkq2-0001oi-Si; Mon, 10 Jul 2023 06:57:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 560921.877095; Mon, 10 Jul 2023 06:57:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIkq2-0001oX-NN; Mon, 10 Jul 2023 06:57:38 +0000
Received: by outflank-mailman (input) for mailman id 560921;
 Mon, 10 Jul 2023 06:57:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zA/p=C4=nethence.com=pbraun@srs-se1.protection.inumbo.net>)
 id 1qIkq1-0001oR-2b
 for xen-users@lists.xenproject.org; Mon, 10 Jul 2023 06:57:37 +0000
Received: from xc.nethence.com (xc.nethence.com [195.154.162.19])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 09c62e8e-1eef-11ee-8611-37d641c3527e;
 Mon, 10 Jul 2023 08:57:34 +0200 (CEST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 09c62e8e-1eef-11ee-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nethence.com;
	s=aug2022; t=1688972249;
	bh=J9qKPfKiMlermf1RH6GF15QOS4Vk1k98ELvFuTd7phA=;
	h=Date:Subject:To:References:From:In-Reply-To:From;
	b=zXY98iFfr2Ypoko3JQ/Zok0I2pbbDi8/K7+2M/E0vgC5qGyMRWHYNLk9v0nyLLBZS
	 PHJue76j931AkXS7h0Mcg2pzw2wqAxSYx5V6mnRRwG9HqHgHokD4t8/r+lT1HqhL/6
	 yiCxwzIQoDpl3oZqseS6UgrxvFn6I7RTyxyzdnrzh0QtkRvNL6fb01ZCuf2MBxa7TR
	 p6A/6ltnz3VHzr+VICIqFXTzyb5j4P0rKPsiHn/KmyYOlB1Yth30oBH2yibenlWYXC
	 WHim2z+brue4ldmBHBLD+qHMEBblM1ukShFeoTS0jyx0WFIMa3KzwfUl9u8f1hWDBo
	 3hlHXp9XQpbUA==
Message-ID: <52c84e4d-3c71-a929-a402-9517d6c78d7b@nethence.com>
Date: Mon, 10 Jul 2023 09:57:27 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.11.0
Subject: Re: black screen troubles trying to boot with Xen Hypervisor grub
 option
To: Jamie Campbell <jamie@parit.ca>, xen-users@lists.xenproject.org
References: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
 <5d1568ff-e748-5bed-2169-d63e71139f2c@nethence.com>
 <d35cd904-ae84-4246-5a28-8e04f8b9af91@parit.ca>
Content-Language: en-US, fr
From: Pierre-Philipp Braun <pbraun@nethence.com>
In-Reply-To: <d35cd904-ae84-4246-5a28-8e04f8b9af91@parit.ca>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

> While digging in to what's going on I also noticed that the base 
> hypervisor entry has a conditional branch checking $grub_platform so I 
> added an echo to figure out which branch it's picking, and it turns out 
> that in my case $grub_platform isn't "pc" and isn't empty but rather is 
> "efi" so it does the "no-real-mode edd=off" options.  When I read about 
> them in the documentation says that no-real-mode should only be used for 
> debugging because it prevents vga from working, and I got excited 
> because I thought "and therefore black screen!" but when I force it to 
> use no options, like the "pc" branch does, it still gets black screen.

About no-real-mode edd=off, you might be right.  But to test without it, I would go with my own grub.cfg by overwriting it altogether, to keep it simple (keep insmod part_gpt as for EFI).  I find interesting that there is usually `insmod all_video` or a call to function `load_video` with the valid entries (EFI capable), but those are missing in the XEN entries.

So this is the relevant part:

menuentry 'Debian GNU/Linux, with Xen hypervisor' --class debian --class gnu-linux --class gnu --class os --class xen $menuentry_id_option 'xen-gnulinux-simple-0e276b18-54a4-4ff9-a770-1bcdd946ea70' {
	insmod part_gpt
	insmod ext2
	set root='hd0,gpt1'
	if [ x$feature_platform_search_hint = xy ]; then
	  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt1 --hint-efi=hd0,gpt1 --hint-baremetal=ahci0,gpt1  1dd68754-c4eb-4011-98d4-6df73f99eb81
	else
	  search --no-floppy --fs-uuid --set=root 1dd68754-c4eb-4011-98d4-6df73f99eb81
	fi
	echo	'Loading Xen 4.17-amd64 ...'
         if [ "$grub_platform" = "pc" -o "$grub_platform" = "" ]; then
             xen_rm_opts=
         else
             xen_rm_opts="no-real-mode edd=off"
         fi
	multiboot2	/xen-4.17-amd64.gz placeholder   ${xen_rm_opts}
	echo	'Loading Linux 6.1.0-10-amd64 ...'
	module2	/vmlinuz-6.1.0-10-amd64 placeholder root=UUID=0e276b18-54a4-4ff9-a770-1bcdd946ea70 ro  quiet
	echo	'Loading initial ramdisk ...'
	module2	--nounzip   /initrd.img-6.1.0-10-amd64
}

You could try add load_video in top of that and reboot (and without re-generating the entire thing with update-grub).

Besides, note there used to be an issue on Debian systems while setting up XEN.  One had to elevate the boot priority.

	dpkg-divert --divert /etc/grub.d/08_linux_xen --rename /etc/grub.d/20_linux_xen
         update-grub

However I am not sure this is still the case.  Also, to get the login prompt, some console needs to point hvc0, and I don't see any specific console= argument to the kernel here.  You can also disable the casual serial console prompt altogether, since you don't have any.

         systemctl disable serial-getty@ttyS0

It's usually harder to setup XEN on EFI systems compared to legacy MBR boot process.  The easy way would be to enable CSM in your firmware and go MBR.


From xen-users-bounces@lists.xenproject.org Mon Jul 10 16:48:39 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 10 Jul 2023 16:48:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.561287.877746 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIu31-0003lc-Lv; Mon, 10 Jul 2023 16:47:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 561287.877746; Mon, 10 Jul 2023 16:47:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIu31-0003lR-Ic; Mon, 10 Jul 2023 16:47:39 +0000
Received: by outflank-mailman (input) for mailman id 561287;
 Mon, 10 Jul 2023 16:47:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dNMG=C4=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1qIu2z-0003lL-3Y
 for xen-users@lists.xenproject.org; Mon, 10 Jul 2023 16:47:37 +0000
Received: from sonic304-24.consmr.mail.gq1.yahoo.com
 (sonic304-24.consmr.mail.gq1.yahoo.com [98.137.68.205])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 765968f0-1f41-11ee-b239-6b7b168915f2;
 Mon, 10 Jul 2023 18:47:34 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic304.consmr.mail.gq1.yahoo.com with HTTP; Mon, 10 Jul 2023 16:47:30 +0000
Received: by hermes--production-bf1-5d96b4b9f-pq975 (Yahoo Inc. Hermes SMTP
 Server) with ESMTPA ID b6aae14816fadead1fc0710d0b36fd46; 
 Mon, 10 Jul 2023 16:47:24 +0000 (UTC)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 765968f0-1f41-11ee-b239-6b7b168915f2
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1689007650; bh=KoDkRjVmSoAlG0aK4fl0yHLaMkszAWTCt51iq7cHn64=; h=Date:From:Subject:To:References:In-Reply-To:From:Subject:Reply-To; b=k16zbjjiHU/v46vHNM7x+XRuxlQ2K/sYZcxUhtfL/FJXeHAmoBYiG0TSuMLPzT2PzM2YEHw1MxhDz15qBKGouwKrAHQ617riD/kBHPHYojxt/pSWhZ9TQDP7VFfi3uxBxhlxnXRUFM5JMxwQQemej8lCRRzWT17zLHN9HGFE6LfFGObSvY0erHsa5QZ/1Ec/OZ6hj/7D7fzHAeDpkq21bh7cPoTJedOKNoCOPKnjU75VDNnLPyAO3PrGcOXYQ8mvz8R5uTpqn6olLoBH3uxJhuBp32FxGVG1KOhCyPvANK2s+QJNWzJRs11CzJnO17le5gA6GLp+Cnh+fAo+LLDDVQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1689007650; bh=jVaAOqllBZU85Fl7miJ3uzBNhG4L+ftwGy1SJMLz8LR=; h=X-Sonic-MF:Date:From:Subject:To:From:Subject; b=bjRMsEIC8juBduMOz2b0yfjDg3Mpn4GCVVjMlsrfTte/jBJV81o0KFL2o7D0hgXAuyeaMPuAubuHJWCSTXZ7GfuxAn0L0v0c0h3JJSIZuOCyoWfXawlU+iFKIRVnoIDF5IAEqZ+IZecDzSvwN0BLVVGCn+hatHUENltPwKWILX8VsnzrALvj3nTWE/rp2JtlBvfy5X/dOkjC4Y2L5h0tZYbiVeKXDEFxQewaZ5ZYQGRlaucJzKKgW6yMzfLCaOZK2s0A8CpTozLGJXyc9CU11BeFZ7C+WsuSFEeJQCxQBDdvidJ5VQbanyf1OPA1fH/m2DMrLJcXviyi1pSMGN+sFw==
X-YMail-OSG: 07dWkp4VM1nIixnUKfrdHexoOftiTLtB2OOfcFL4.Cr2FIHmnpF1SuhFbNZY.r7
 vxgszfUp2nUZqduX0VR1fbiHV6LDTygtsjmskTubdGfHNjh9BjX1ZaHBUxqxsfjh8On2NqtSMVHk
 7uRwCgPM.jj6dUriqsu2zdfIA44fkzfZiA8mk3meJLT36scDnaG5wIxk.XvVPDH9SkTtViF7zzKo
 uKSXjgW7TAr.rUM6gppWfdMgyTu7KdIxZjdRA35bUwFm4cPrMjTiOAiFSqsb47NbnMAw5A.Xfm5Z
 Jgu5aUfcExmGn5r1V96F3a6xmJT64aQVE65C.J0VESpAzPfnOBPNVdEI3RDYwy6yqhBpQk0UotoH
 ZLDtLA2N4t6QfKOfwtCPCkWHpbpAatlbrr.6quWYilZA1eRwjtlfMFNszBfVs1WGVsoU_fcOJDN1
 pGquK3Dv4NvLYaT6aTf1doE1HGDya.1yvTx2JygtE3gQOhRWFWsG6lXkjM_2tTQpT5NVKJnThzo8
 ipcyQI48JX27thSHEht_WJ98H87C22.0qZjTpw5vk70X1LO3frZJ27NuiA9stcJBhLvDGBnbhg0z
 8DNHQAVJDQbMSay7Zlib5_N5dhpFzJHDhbJRfj4iy8eZ7jEcam8G08FfHe7mefm7GpE93LRWv4Ae
 N.dXBMe15f6Dx6VQuyutEpijUnpJ7MBc2gWiOPJrJZAXiECP2mHTCt2XD8K93IRI6ZevjOXAtv.z
 RTCgf.CiEgObMdfD2rP0llv31S.Ej3RWSKEiQ1vnZV9ajSEuw5B4POkG.jU_gcAAtE_WIoySPeAu
 DjuVp937nDaIXIzP9vhUdq81p5kPy6EjK1utLRgxjcxGTnFNebyoWZc95s.htsWSY7lJTbeAsAXd
 tXth548kqmoN51i4bhJ1ATaHBMycEAmWCfW.adXm6aQ2Cene.DArs5PX930m2Gr6ZVEdPyL331wR
 70DtKZmKVOIBX6yuakt6trP2s38uEZiNdcE.8FfxSxjRgP3G.oGWkMChTD6QbWCiKZSJ6xRY0tln
 poyMwCniI3h.HSKtvaEQBfXGZPjsB_G0zZGNBCwMg1ZnW.aJoQtddq1g9mtvEEkd6oe_nKz.mOIW
 lV3WM1XpdsnVCPkhO46GlqPXvmJ07LLFnz1o8brjroNXRyf174FnMBpKuzbma00I_Ys1ETjZZAz9
 eQE3S21qgvszLpBL2GtG_YTtTwyv6sZ1gDYhjbclxMSmuBjiJNWZTAhYO9RHsiw4PGs5utQ.lv1_
 Ty6ZVv0PWhGBydbCXEawYW2VbXXg2elCSHjJrfdWedGHd6NOpX5ObxTxQ9lRUTOgb1Hsnz3UJR2.
 NVToeQ3yJJwkBsruOt3btsIEVThFhwRaYj5GBPtFXBK2SkAQJ.twEFSgnoLkSs89Ew2VAr6pHN0U
 J9y983BrNMrgLIquwGscuUOCxl9AlIlH5dArSMHN1faIqIO302FWGtPsxuoRqjgxg1.zuOt2l2VT
 ITVaKtYB4.eVd11PlgBUuL1tQ5PvLk5TtDyZl5sQ4RgUDDXHtRqzO54e8ecoNMvUj_pQPMznNRfS
 _.G84k67nrvtyd3TUalsD1xqDSvo2ONKOPdv46g5lMoNQU8hEmj0hnGuT7ccI2xMKGDIjBlmcZwA
 ZB.9V72NzIFzU7.Uf.t3aLblu1SfVYQ43c3AMFkqU353PeYlz4plBSILoqTzoeYp4T..uzApeFtm
 C3xtXJoIxjxvrpx40fUDYukjtVhrqk3zxxu5OlPk0kbcPf_7KvNxTSqzLYPrxxniDn.gT_Nu2dTq
 BepspDXC.kqbaxeAYlg7HsXb4_LuGvzBiDYH2nxWtcmheBnaHud31IHD102IhKn2x99rxrDf6pD7
 izIdrKnvHuER76M7ilWWPqmSDfjbpO.fabgEIe9xyg5.obqatabE33v5L31Y3blbGPEnhTbigz1h
 zqvzsY3_lY_Q1UO5BpmZB7La9BZdxgG9FZMf.HK57wBd5MNoyRkyQfPoBFwBLK5IBT9inmJds2RG
 LQtsWaAVeXggGLtKDRsPPYEE2jryba7.uGqou_2VSoQXiRVORaRokvOulwARQYGFyyVWAjfdLn1D
 7lX_Cr.ObDHE9.pm26HO7wvCV518CaDPmlX_.osvobgAWXxhQSurY1X4ev782XCKZNCsy73IiAGd
 Xz8Cgt4lLdIy0dOXhZ0OPwayPSBmHovtLxdEFxeMkVZS9tZX9lU.lLfYWx4NlGu603Jc-
X-Sonic-MF: <brchuckz@aim.com>
X-Sonic-ID: 12e60c5c-a8c0-48a2-a3e5-1056b31e1b7b
Message-ID: <83a94ee6-6fcd-204a-7b8d-b89858d7831d@netscape.net>
Date: Mon, 10 Jul 2023 12:47:23 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.13.0
From: Chuck Zmudzinski <brchuckz@netscape.net>
Subject: Re: Xen Ovmf/UEFI HVM error after upgrade to Debian Bookworm (was:
 xen ovmf/uefi firmware does not save screen resolution)
To: xen-users@lists.xenproject.org
References: <bdd68255-9d93-cbdc-ef0c-9313c04dc853@onlineschubla.de>
Content-Language: en-US
In-Reply-To: <bdd68255-9d93-cbdc-ef0c-9313c04dc853@onlineschubla.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.21638 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 5308

On 7/4/2023 5:06 PM, Paul Leiber wrote:
> On 14/02/2023 8:31 AM, Chuck Zmudzinski wrote:
>  > I am adding this information to complete the discussion of this
>  > problem I reported several months ago:
>  >
>  > I discovered the cause of the problems of ovmf/uefi booting with more 
>  > recent Xen
>  > versions - it is not a bug in Xen, but the problem occurs because
>  > newer versions
>  > of ovmf do not have Xen support in the OvmfPkgX64 target from edk2 
> and > the
>  > Xen support is only available from the Xen-specific OvmfXen target
>  > from edk2.
>  >
>  > The problem is discussed here on the Arch Linux forums:
>  >
>  > https://bbs.archlinux.org/viewtopic.php?pid=2012659#p2012659
>  >
>  > The last version that had the Xen support in the OvmfPkgX64 target was
>  > edk2-stable202105, so for newer versions it is necessary to build and 
>  > use the
>  > Xen-specific OVMF.fd firmware target to boot properly on Xen.
>  >
>  > After building using 'OvmfPkg/build.sh -p OvmfPkg/OvmfXen.dsc' as
>  > explained
>  > here:
>  >
>  > https://lore.kernel.org/all/20190813113119.14804-1-
>  > anthony.perard@xxxxxxxxxx/
>  >
>  > from the edk2 source at https://github.com/tianocore/edk2 and using
>  > the
>  > resulting
>  > OVMF.fd firmware target with Xen support to boot the Xen HVM guest,
>  > the guest
>  > works properly with versions of ovmf edk2-stable202108 and newer.
>  >
>  > Unfortunately distros such as Debian and Fedora don't provide the Xen 
>  > specific
>  > target in their ovmf packages, so it is necessary to build it from
>  > source for
>  > ovmf
>  > versions of edk2-stable202108 and newer.
>
> Thanks a lot for posting this, Chuck! It seems that I have run into this 
> situation after upgrading from Debian Bullseye to Debian Bookworm. With 
> standard packages, existing HVM DomUs using "firmware = 'ovmf'" (Windows 
> Server 2022 and Windows 10) can't boot anymore. Booting these systems 
> leads to the Windows error 0xc0000225. I wasn't able to fix this error. 
> Booting an installation .iso leads to the same error. Booting the 
> installation media with "firmware = 'bios'" leads to a normal boot.
>
> I tried building Ovmf following
> https://lore.kernel.org/all/20190813113119.14804-1-anthony.perard@citrix.com/#t 
> , but I wasn't fully able to create a working system:
>
> (1) Using the resulting OVMF.fd from the build process with "firmware =
> '/path/to/new/OVMF.fd' led consistently to a black screen in VNC or
> Spice with the text "Guest has not initialized the display (yet)".
>
> (2) Replacing the OVMF.fd in /var/lib/ovmf with the freshly built
> OVMF.fd led to a slight improvement. I could then boot the Windows
> Server installation .iso, but booting the Windows 10 installation .iso
> lead to a crash where the TianoCore logo was visible, but nothing
> happened. The two existing DomUs were still not bootable. When trying to
> boot any of them, in Ovmf log appears an error "FATAL ERROR - RaiseTpl
> with OldTpl(0x1F) > NewTpl(0x10)".
>
> However, I am not sure that I followed the procedure correctly, I might
> very well have done something very wrong. Any pointers are welcome.
>
> My HVM config file:
>
> type = "hvm"
> memory = 6144
> vcpus = 2
> name = "kalliope"
> firmware = 'ovmf'
> firmware = '/usr/local/lib/ovmf/OVMF.fd'
> vif = ['bridge=xenbr0,mac=XX:XX:XX:XX:XX:XX,ip=10.0.0.4']
> disk = ['phy:/dev/vg0/matrix,hda,w']
> device_model_version = 'qemu-xen'
> hdtype = 'ahci'
> pae = 1
> acpi = 1
> apic = 1
> vga = 'stdvga'
> videoram = 16
> xen_platform_pci = 1
> vendor_device = 'xenserver'
> viridian = 1
> on_crash = 'restart'
> device_model_args_hvm = [
>    # Debug OVMF
>    '-chardev', 'file,id=debugcon,path=/var/log/xen/ovmf.log,',
>    '-device', 'isa-debugcon,iobase=0x402,chardev=debugcon',
> ]
> sdl = 0
> serial = 'pty'
> vnc = 1
> vnclisten = "0.0.0.0"
> vncpasswd = ""
>
>
> There is a Debian bug report which seems to be related, I also described 
> my situation there: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978595
>
> Paul
>

Hi Paul,

Your config looks OK to me, except that I have no pointers for a Windows guest.
I have a Windows HVM guest, but it uses BIOS / MBR instead of EFI / GPT so I
cannot easily reproduce your setup. I did not see any problems when using the
OVMF.fd file built for Xen in a bookworm dom0 according to Anthony's guide and
booting Linux HVM guests with EFI / GPT, so the problem might be that the graphics
for the Windows efi bootloader is not compatible with the efi implementation
that Xen uses (edk2 and Qemu with bochs vga) but the grub bootloader and
Linux graphics is compatible with the efi implementation for Xen HVM, but that is
just a guess.

Someone with more expertise about booting Windows in the Qemu / edk2 / bochs
environment might be able to shed more light on the error you are seeing with
some of your Windows guests. IIRC, I think there are some discussions of this
problem on Qemu or Xen or edk2 mailing lists in past years and you might try
searching those mailing lists for clues to the problem and patches that might
fix it.

Now, I have migrated my dom0 from Debian to Fedora since Fedora provides
an official ovmf-xen package now, but Debian still does not and I would have
to maintain it myself if I stayed with Debian.

Kind regards,

Chuck


From xen-users-bounces@lists.xenproject.org Mon Jul 10 17:02:59 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 10 Jul 2023 17:02:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.561338.877773 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIuHb-0007DR-6i; Mon, 10 Jul 2023 17:02:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 561338.877773; Mon, 10 Jul 2023 17:02:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIuHb-0007DG-3o; Mon, 10 Jul 2023 17:02:43 +0000
Received: by outflank-mailman (input) for mailman id 561338;
 Mon, 10 Jul 2023 17:02:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=hbz8=C4=parit.ca=jamie@srs-se1.protection.inumbo.net>)
 id 1qIuHZ-0007Cu-J6
 for xen-users@lists.xenproject.org; Mon, 10 Jul 2023 17:02:41 +0000
Received: from mail-pl1-x635.google.com (mail-pl1-x635.google.com
 [2607:f8b0:4864:20::635])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 93c4b6d1-1f43-11ee-b239-6b7b168915f2;
 Mon, 10 Jul 2023 19:02:40 +0200 (CEST)
Received: by mail-pl1-x635.google.com with SMTP id
 d9443c01a7336-1b8b2886364so30196975ad.0
 for <xen-users@lists.xenproject.org>; Mon, 10 Jul 2023 10:02:40 -0700 (PDT)
Received: from ?IPV6:2604:3d08:1c89:c800:522:5e3a:862d:1088?
 ([2604:3d08:1c89:c800:522:5e3a:862d:1088])
 by smtp.gmail.com with ESMTPSA id
 c9-20020a170902c1c900b001b523714ed5sm122760plc.252.2023.07.10.10.02.38
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 10 Jul 2023 10:02:38 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 93c4b6d1-1f43-11ee-b239-6b7b168915f2
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=parit.ca; s=google; t=1689008559; x=1691600559;
        h=content-transfer-encoding:in-reply-to:from:references:to
         :content-language:subject:user-agent:mime-version:date:message-id
         :from:to:cc:subject:date:message-id:reply-to;
        bh=rSr6TEjG1NQ6PDg9Vm5pKgL1EHtqU+4rpgUyl9xc0kA=;
        b=beGUVU7pVvvtbU+BI75oFLPwg1eWSJvxdR6BG+TyRNx42bZL2Oiikg8qDyQubcCkPz
         Q5tL+xY6gPyxwADWBpvu0OvMQIDhPNjmbojxhZiF3GomakUvMIiAOzftRLmrkdUjSkoe
         WOVHtRVc7VKhW/8hXzDsH5drgjLA2kEnHrmhw=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1689008559; x=1691600559;
        h=content-transfer-encoding:in-reply-to:from:references:to
         :content-language:subject:user-agent:mime-version:date:message-id
         :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
        bh=rSr6TEjG1NQ6PDg9Vm5pKgL1EHtqU+4rpgUyl9xc0kA=;
        b=OCfJYm28v5LzcqKV2Bv1nBYDcGi0t7z4ZBBToRViTAWxL2chqunHF30vVr01ipvfoT
         5IblgXe2PyYVbdATKIyZCupBvxh6LCwc+/NmLmnoWcwGl00rn68Qa9gcDC6Yo06LlwiH
         RNxmqHuxA6Bq6/AIKnm2MrdruAoIanCGAfv8OS5tep+lbJb9R837rz9/0kL7utOu/SEM
         5iV6wLi3bmevj9RwYJuZdKTDm6kKDx5TEOrszZ/DekgTS+b7jDuOdsO/8kuEuY5D1nKq
         RbuNV2vcneaP+133rcXo7ouwFaQc9ncjvQP4EJdFLK9ClPMAJZBVdyPTu0UcOgcPz3rL
         rFmQ==
X-Gm-Message-State: ABy/qLZoevVCqfUX4D1YfgFJZnQ3ouR/f5IaTxAKo32TyRhE2SAd3JYn
	SznEk8m7cMEUM33VGJAw9mLMcMG3kXmvEMnVfM8=
X-Google-Smtp-Source: APBJJlEE+BMFxBYEVxebwADznGhpyTNeSIQ8ng7gX9mgdwti0BAoHYWdI3gmpINtrdehVd2ktxqh3A==
X-Received: by 2002:a17:902:db10:b0:1b8:5bf5:543a with SMTP id m16-20020a170902db1000b001b85bf5543amr12417171plx.49.1689008558997;
        Mon, 10 Jul 2023 10:02:38 -0700 (PDT)
Message-ID: <10993796-8eb2-e8d8-41b2-7091ffe0b721@parit.ca>
Date: Mon, 10 Jul 2023 10:02:37 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.4.2
Subject: Re: black screen troubles trying to boot with Xen Hypervisor grub
 option
Content-Language: en-US
To: Pierre-Philipp Braun <pbraun@nethence.com>, xen-users@lists.xenproject.org
References: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
 <5d1568ff-e748-5bed-2169-d63e71139f2c@nethence.com>
 <d35cd904-ae84-4246-5a28-8e04f8b9af91@parit.ca>
 <52c84e4d-3c71-a929-a402-9517d6c78d7b@nethence.com>
From: Jamie Campbell <jamie@parit.ca>
In-Reply-To: <52c84e4d-3c71-a929-a402-9517d6c78d7b@nethence.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

I tried load_video, serial disable, and diverting I still got black 
screen but then I tried your suggestion of going into BIOS and just 
totally suppressing EFI and forcing the system to do strictly legacy 
stuff and now it actually boots!  I'm curious as to whether the EFI 
approach could still get to a bootable system, but not curious enough to 
re-break it and be stuck again.  Thanks for getting me to bootability!

-Jamie

On 2023-07-09 11:57 p.m., Pierre-Philipp Braun wrote:
>> While digging in to what's going on I also noticed that the base 
>> hypervisor entry has a conditional branch checking $grub_platform so 
>> I added an echo to figure out which branch it's picking, and it turns 
>> out that in my case $grub_platform isn't "pc" and isn't empty but 
>> rather is "efi" so it does the "no-real-mode edd=off" options.  When 
>> I read about them in the documentation says that no-real-mode should 
>> only be used for debugging because it prevents vga from working, and 
>> I got excited because I thought "and therefore black screen!" but 
>> when I force it to use no options, like the "pc" branch does, it 
>> still gets black screen.
>
> About no-real-mode edd=off, you might be right.  But to test without 
> it, I would go with my own grub.cfg by overwriting it altogether, to 
> keep it simple (keep insmod part_gpt as for EFI). I find interesting 
> that there is usually `insmod all_video` or a call to function 
> `load_video` with the valid entries (EFI capable), but those are 
> missing in the XEN entries.
>
> So this is the relevant part:
>
> menuentry 'Debian GNU/Linux, with Xen hypervisor' --class debian 
> --class gnu-linux --class gnu --class os --class xen 
> $menuentry_id_option 
> 'xen-gnulinux-simple-0e276b18-54a4-4ff9-a770-1bcdd946ea70' {
>     insmod part_gpt
>     insmod ext2
>     set root='hd0,gpt1'
>     if [ x$feature_platform_search_hint = xy ]; then
>       search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt1 
> --hint-efi=hd0,gpt1 --hint-baremetal=ahci0,gpt1 
> 1dd68754-c4eb-4011-98d4-6df73f99eb81
>     else
>       search --no-floppy --fs-uuid --set=root 
> 1dd68754-c4eb-4011-98d4-6df73f99eb81
>     fi
>     echo    'Loading Xen 4.17-amd64 ...'
>         if [ "$grub_platform" = "pc" -o "$grub_platform" = "" ]; then
>             xen_rm_opts=
>         else
>             xen_rm_opts="no-real-mode edd=off"
>         fi
>     multiboot2    /xen-4.17-amd64.gz placeholder   ${xen_rm_opts}
>     echo    'Loading Linux 6.1.0-10-amd64 ...'
>     module2    /vmlinuz-6.1.0-10-amd64 placeholder 
> root=UUID=0e276b18-54a4-4ff9-a770-1bcdd946ea70 ro  quiet
>     echo    'Loading initial ramdisk ...'
>     module2    --nounzip   /initrd.img-6.1.0-10-amd64
> }
>
> You could try add load_video in top of that and reboot (and without 
> re-generating the entire thing with update-grub).
>
> Besides, note there used to be an issue on Debian systems while 
> setting up XEN.  One had to elevate the boot priority.
>
>     dpkg-divert --divert /etc/grub.d/08_linux_xen --rename 
> /etc/grub.d/20_linux_xen
>         update-grub
>
> However I am not sure this is still the case.  Also, to get the login 
> prompt, some console needs to point hvc0, and I don't see any specific 
> console= argument to the kernel here.  You can also disable the casual 
> serial console prompt altogether, since you don't have any.
>
>         systemctl disable serial-getty@ttyS0
>
> It's usually harder to setup XEN on EFI systems compared to legacy MBR 
> boot process.  The easy way would be to enable CSM in your firmware 
> and go MBR.


From xen-users-bounces@lists.xenproject.org Mon Jul 10 22:48:33 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 10 Jul 2023 22:48:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.561435.877895 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIzfZ-0004Qu-1i; Mon, 10 Jul 2023 22:47:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 561435.877895; Mon, 10 Jul 2023 22:47:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qIzfY-0004Qm-Uu; Mon, 10 Jul 2023 22:47:48 +0000
Received: by outflank-mailman (input) for mailman id 561435;
 Mon, 10 Jul 2023 22:47:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=jRm9=C4=rabbit.lu=slack@srs-se1.protection.inumbo.net>)
 id 1qIzfY-0004Qf-2G
 for xen-users@lists.xenproject.org; Mon, 10 Jul 2023 22:47:48 +0000
Received: from mail-wm1-x32d.google.com (mail-wm1-x32d.google.com
 [2a00:1450:4864:20::32d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c9b2e42d-1f73-11ee-b239-6b7b168915f2;
 Tue, 11 Jul 2023 00:47:46 +0200 (CEST)
Received: by mail-wm1-x32d.google.com with SMTP id
 5b1f17b1804b1-3fbef8ad9bbso56315705e9.0
 for <xen-users@lists.xenproject.org>; Mon, 10 Jul 2023 15:47:46 -0700 (PDT)
Received: from [192.168.2.1] (82-64-138-184.subs.proxad.net. [82.64.138.184])
 by smtp.googlemail.com with ESMTPSA id
 q3-20020a5d5743000000b003143c6e09ccsm577159wrw.16.2023.07.10.15.47.45
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 10 Jul 2023 15:47:45 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: c9b2e42d-1f73-11ee-b239-6b7b168915f2
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=rabbit-lu.20221208.gappssmtp.com; s=20221208; t=1689029266; x=1691621266;
        h=content-transfer-encoding:in-reply-to:from:content-language
         :references:to:subject:user-agent:mime-version:date:message-id:from
         :to:cc:subject:date:message-id:reply-to;
        bh=zK7UDs+I605Qq0HOnXkxio/ZTsiMuGG5vWw4KxbtaSY=;
        b=tDKcjaWGXqJXJ3jJuXZfLwtIlAM/04Pzj6yT+WqAgmx1+/gK+OY0UU6Vmfedh7nBnO
         JAk5GSHP0X214M2UoocJZEh+JUBJTffYkuLmvUtSPzuntc/ZOEjTHTSR+8etntw4TSnW
         VBPXVO7N28a1rkgiQ+3JvSLS925xtezdwXP3NBnuQK+KGh6jJf9JAFLdthUM6+VkhwU4
         pbhbzqTPMZ+wV6JpE9zb/+aBdyGTX1HXOF6bGUT/mhxn04TzZxW+36yVDKGi7lNYJ29U
         AaWZz7S6g8v2aOHdT99/R7WkcGssnzPFTIDc4eXGwdbatgQ3tfzph0ccXWPphjY1Kjgc
         7gVQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1689029266; x=1691621266;
        h=content-transfer-encoding:in-reply-to:from:content-language
         :references:to:subject:user-agent:mime-version:date:message-id
         :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
        bh=zK7UDs+I605Qq0HOnXkxio/ZTsiMuGG5vWw4KxbtaSY=;
        b=GvlYKjnsNwkiPSFgKTVJvK5kuUEO3sc4DV/p23QrFCr+fKLxwZy9fW4HGjSL9LI/SL
         awGUXauImk5MPcZl3VY7b1HMR/D10zClXDyCKJDdHUDVHxh3oo0gsiDZrE79z5QSjQXl
         U+WSoY6oCITNbqrmPbkcEYkHAyhXlDFXMuG6AmSKBckgiRDFym7y2cJmhQnoETVKfIzG
         zfrfKEMb/VKWogdy7dyKcNnV8TJHcxMtVYSz1v82/vYmQRv//EmZo2/ck5l7O3gEh8kx
         qXPYNH3WOcqARk+OMitvsbgBbzDcZD5B7ZLgUj1D8Hk5kVfVDzd+mlPt94k7W3qLqOZG
         hOzQ==
X-Gm-Message-State: ABy/qLbhMLKBHolqc8GKpgO2qw61rw0GIq67HZv6N3Why1K/ZSyTSX4r
	UhXbMhVeNspIHNGuRWjZ9KOS8U3WWb8RQ+i7mqU=
X-Google-Smtp-Source: APBJJlEgyGeurPjh6sdGt923yn9gwBjiiwEsiIZT8Bb5q64qenaFqlg/qQHomgePJHIqQoVK5w0dcA==
X-Received: by 2002:a7b:c8d1:0:b0:3fa:8fb1:50fe with SMTP id f17-20020a7bc8d1000000b003fa8fb150femr13723618wml.15.1689029266100;
        Mon, 10 Jul 2023 15:47:46 -0700 (PDT)
Message-ID: <21df3979-282b-2d44-f6ac-6f3137882a01@rabbit.lu>
Date: Tue, 11 Jul 2023 00:47:44 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.13.0
Subject: Re: black screen troubles trying to boot with Xen Hypervisor grub
 option
To: xen-users@lists.xenproject.org
References: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
 <5d1568ff-e748-5bed-2169-d63e71139f2c@nethence.com>
 <d35cd904-ae84-4246-5a28-8e04f8b9af91@parit.ca>
 <52c84e4d-3c71-a929-a402-9517d6c78d7b@nethence.com>
 <10993796-8eb2-e8d8-41b2-7091ffe0b721@parit.ca>
Content-Language: en-US
From: zithro <slack@rabbit.lu>
In-Reply-To: <10993796-8eb2-e8d8-41b2-7091ffe0b721@parit.ca>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 10 Jul 2023 19:02, Jamie Campbell wrote:
> I tried load_video, serial disable, and diverting I still got black 
> screen but then I tried your suggestion of going into BIOS and just 
> totally suppressing EFI and forcing the system to do strictly legacy 
> stuff and now it actually boots!  I'm curious as to whether the EFI 
> approach could still get to a bootable system, but not curious enough to 
> re-break it and be stuck again.  Thanks for getting me to bootability!
> 
> -Jamie
> 

(Please bottom-post (; )

I had the same problem booting Xen+Debian on UEFI, found a solution, 
maybe it applies to you ?

The problem started when I updated dom0 from Stretch to Buster (at the 
time Buster became stable). With the new version of 
"/etc/grub.d/20_linux_xen", no more boot.

If you compare the old (stretch) and the actual files (from buster on), 
some changes are about multiboot/module to multiboot2/module2 and in the 
check you pointed ($grub_platform isn't "pc").
But as you may have eliminated the $grub_platform problem, maybe it's 
the use of multiboot versus multiboot2 ?

What I would do is move or rename "/etc/grub.d/20_linux_xen", and then 
try with the Stretch version of the file.
(If just renaming, I recommend you to edit the "title" stanzas to better 
identify the menus : you'd have identical lines).

If you want to rambo edit "20_linux_xen" in place, below you will find 
the concerning differences between two versions.
Basically replace ${xen_loader} and ${module_loader} by respectively 
multiboot and module.

I'm still booting a bookworm dom0 with multiboot/module, YMMV !

---
WORKING VERSION
[...]
if [ "\$grub_platform" = "pc" -o "\$grub_platform" = "efi" -o 
"\$grub_platform" = "" ]; then
             xen_rm_opts=
         else
             xen_rm_opts="no-real-mode edd=off"
         fi
	multiboot	${rel_xen_dirname}/${xen_basename} placeholder ${xen_args} 
\${xen_rm_opts}
	echo	'$(echo "$lmessage" | grub_quote)'
	module	${rel_dirname}/${basename} placeholder 
root=${linux_root_device_thisversion} ro ${args}
[...]
	module	--nounzip   ${rel_dirname}/${initrd}
[...]

---
NON-WORKING VERSION
[...]
if [ "\$grub_platform" = "pc" -o "\$grub_platform" = "" ]; then
             xen_rm_opts=
         else
             xen_rm_opts="no-real-mode edd=off"
         fi
	${xen_loader}	${rel_xen_dirname}/${xen_basename} placeholder 
${xen_args} \${xen_rm_opts}
	echo	'$(echo "$lmessage" | grub_quote)'
	${module_loader}	${rel_dirname}/${basename} placeholder 
root=${linux_root_device_thisversion} ro ${args}
[...]
	${module_loader}	--nounzip   ${rel_dirname}/${initrd}
[...]
if ($grub_file --is-x86-multiboot2 $current_xen); then
	xen_loader="multiboot2"
	module_loader="module2"
     else
	xen_loader="multiboot"
	module_loader="module"
     fi
[...]


From xen-users-bounces@lists.xenproject.org Tue Jul 11 00:39:17 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 11 Jul 2023 00:39:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.561477.877913 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qJ1Om-0008Hv-GO; Tue, 11 Jul 2023 00:38:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 561477.877913; Tue, 11 Jul 2023 00:38:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qJ1Om-0008Hn-Bw; Tue, 11 Jul 2023 00:38:36 +0000
Received: by outflank-mailman (input) for mailman id 561477;
 Tue, 11 Jul 2023 00:38:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=iUsN=C5=parit.ca=jamie@srs-se1.protection.inumbo.net>)
 id 1qJ1Ok-0008Hd-Ji
 for xen-users@lists.xenproject.org; Tue, 11 Jul 2023 00:38:34 +0000
Received: from mail-pf1-x432.google.com (mail-pf1-x432.google.com
 [2607:f8b0:4864:20::432])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 426a1e42-1f83-11ee-8611-37d641c3527e;
 Tue, 11 Jul 2023 02:38:32 +0200 (CEST)
Received: by mail-pf1-x432.google.com with SMTP id
 d2e1a72fcca58-6687096c6ddso2817657b3a.0
 for <xen-users@lists.xenproject.org>; Mon, 10 Jul 2023 17:38:31 -0700 (PDT)
Received: from ?IPV6:2604:3d08:1c89:c800:522:5e3a:862d:1088?
 ([2604:3d08:1c89:c800:522:5e3a:862d:1088])
 by smtp.gmail.com with ESMTPSA id
 u15-20020aa7848f000000b00663ab37ff74sm370870pfn.72.2023.07.10.17.38.28
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 10 Jul 2023 17:38:29 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 426a1e42-1f83-11ee-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=parit.ca; s=google; t=1689035910; x=1691627910;
        h=content-transfer-encoding:in-reply-to:from:references:to
         :content-language:subject:user-agent:mime-version:date:message-id
         :from:to:cc:subject:date:message-id:reply-to;
        bh=uj6diXVyxYsSjW0Gzj3DVqZ74A/7wNdlrdM96wASqPQ=;
        b=T76NCPQ4+E73Quz8A4Sv1hHJOhOBPDYEceG/1Ty5CCXgkoMICPCwuhsBtwUHiw4lMr
         q9QCqFY8YisuDK1td8/dJX5rOu3eBMpMC0WrTjEXM9gxfX4nBvdzddzQs4R+XgkyDpLv
         +NavvcrLThY/f98G6Eo31WrNWDAYNAdNdpWSs=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1689035910; x=1691627910;
        h=content-transfer-encoding:in-reply-to:from:references:to
         :content-language:subject:user-agent:mime-version:date:message-id
         :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
        bh=uj6diXVyxYsSjW0Gzj3DVqZ74A/7wNdlrdM96wASqPQ=;
        b=aSWPs48S0ML+nr3+3cLikuh2YH0MBdufuaVb6yc9raSkX5cjcIuZm0Gb6RHrZQ6LIk
         e2X0nzubI/fd9lfORJG9pBfW5M/Sy4PhdoyB5Vp64Kb467bdMwxBQutfxnimbzij7iTu
         I4d2FdRyRhwV4kY/BuHm0JKO28x/oTSMXs8Xo8lmAYIKpivk8WFuRswnnPZK+RoCo5il
         6sRcQVgO19r26WhP/+K3Xq06GHGmdSuBd3e+uhlSA7X7y0KMDZLg0NUIPbBqxSCh5V3L
         Hl1waT0Ad/GqDi57hiKqd2MZ3bUnim6F9CapmR8TC/5CvE0fSYMFNcetibliYQcc/FJe
         WNVg==
X-Gm-Message-State: ABy/qLbmgXy7JQyPa3TijmjHMZRIAMoIasqLsVqmWl3cy/Y9PKRy78b7
	C63By2gUPiBzGYUPNb+cSI+hvEWoCEhgCdLBpkI=
X-Google-Smtp-Source: APBJJlECf9qc80rSiRONVEWP0JI0q93E7gxKFo3x+cCJUiAGnPUF/XSoD3mf5GA5HvIxOAsEKe3c1A==
X-Received: by 2002:a05:6a00:2e04:b0:682:140c:245b with SMTP id fc4-20020a056a002e0400b00682140c245bmr13752646pfb.5.1689035909955;
        Mon, 10 Jul 2023 17:38:29 -0700 (PDT)
Message-ID: <b016a256-920c-56be-4349-a2e62ef2eb28@parit.ca>
Date: Mon, 10 Jul 2023 17:38:27 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.4.2
Subject: Re: black screen troubles trying to boot with Xen Hypervisor grub
 option
Content-Language: en-US
To: xen-users@lists.xenproject.org
References: <0294c3af-ee69-ca88-39ec-0f99a508b08c@parit.ca>
 <5d1568ff-e748-5bed-2169-d63e71139f2c@nethence.com>
 <d35cd904-ae84-4246-5a28-8e04f8b9af91@parit.ca>
 <52c84e4d-3c71-a929-a402-9517d6c78d7b@nethence.com>
 <10993796-8eb2-e8d8-41b2-7091ffe0b721@parit.ca>
 <21df3979-282b-2d44-f6ac-6f3137882a01@rabbit.lu>
From: Jamie Campbell <jamie@parit.ca>
In-Reply-To: <21df3979-282b-2d44-f6ac-6f3137882a01@rabbit.lu>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 2023-07-10 3:47 p.m., zithro wrote:
> On 10 Jul 2023 19:02, Jamie Campbell wrote:
>> I tried load_video, serial disable, and diverting I still got black 
>> screen but then I tried your suggestion of going into BIOS and just 
>> totally suppressing EFI and forcing the system to do strictly legacy 
>> stuff and now it actually boots!  I'm curious as to whether the EFI 
>> approach could still get to a bootable system, but not curious enough 
>> to re-break it and be stuck again.  Thanks for getting me to 
>> bootability!
>>
>> -Jamie
>>
>
> (Please bottom-post (; )
>
> I had the same problem booting Xen+Debian on UEFI, found a solution, 
> maybe it applies to you ?
>
> The problem started when I updated dom0 from Stretch to Buster (at the 
> time Buster became stable). With the new version of 
> "/etc/grub.d/20_linux_xen", no more boot.
>
> If you compare the old (stretch) and the actual files (from buster 
> on), some changes are about multiboot/module to multiboot2/module2 and 
> in the check you pointed ($grub_platform isn't "pc").
> But as you may have eliminated the $grub_platform problem, maybe it's 
> the use of multiboot versus multiboot2 ?
>
> What I would do is move or rename "/etc/grub.d/20_linux_xen", and then 
> try with the Stretch version of the file.
> (If just renaming, I recommend you to edit the "title" stanzas to 
> better identify the menus : you'd have identical lines).
>
> If you want to rambo edit "20_linux_xen" in place, below you will find 
> the concerning differences between two versions.
> Basically replace ${xen_loader} and ${module_loader} by respectively 
> multiboot and module.
>
> I'm still booting a bookworm dom0 with multiboot/module, YMMV !
>
> ---
> WORKING VERSION
> [...]
> if [ "\$grub_platform" = "pc" -o "\$grub_platform" = "efi" -o 
> "\$grub_platform" = "" ]; then
>             xen_rm_opts=
>         else
>             xen_rm_opts="no-real-mode edd=off"
>         fi
>     multiboot    ${rel_xen_dirname}/${xen_basename} placeholder 
> ${xen_args} \${xen_rm_opts}
>     echo    '$(echo "$lmessage" | grub_quote)'
>     module    ${rel_dirname}/${basename} placeholder 
> root=${linux_root_device_thisversion} ro ${args}
> [...]
>     module    --nounzip   ${rel_dirname}/${initrd}
> [...]
>
> ---
> NON-WORKING VERSION
> [...]
> if [ "\$grub_platform" = "pc" -o "\$grub_platform" = "" ]; then
>             xen_rm_opts=
>         else
>             xen_rm_opts="no-real-mode edd=off"
>         fi
>     ${xen_loader}    ${rel_xen_dirname}/${xen_basename} placeholder 
> ${xen_args} \${xen_rm_opts}
>     echo    '$(echo "$lmessage" | grub_quote)'
>     ${module_loader}    ${rel_dirname}/${basename} placeholder 
> root=${linux_root_device_thisversion} ro ${args}
> [...]
>     ${module_loader}    --nounzip   ${rel_dirname}/${initrd}
> [...]
> if ($grub_file --is-x86-multiboot2 $current_xen); then
>     xen_loader="multiboot2"
>     module_loader="module2"
>     else
>     xen_loader="multiboot"
>     module_loader="module"
>     fi
> [...]
>

I re-installed with EFI stuff on again, tested that it black screens the 
same was as before, then removed the 2s (module, multiboot) and did a 
reboot, and it locks up when it gets to "Loading initial ramdisk", and 
also warns that "no console will be available to OS".  I'll go back to 
legacy again, but it was worth a shot, thanks for the suggestion, and 
sorry for the netiquette oops!

-Jamie




From xen-users-bounces@lists.xenproject.org Fri Jul 14 17:41:57 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 14 Jul 2023 17:41:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.563723.881173 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qKMnA-0008Ma-Da; Fri, 14 Jul 2023 17:41:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 563723.881173; Fri, 14 Jul 2023 17:41:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qKMnA-0008Ji-7i; Fri, 14 Jul 2023 17:41:20 +0000
Received: by outflank-mailman (input) for mailman id 563723;
 Fri, 14 Jul 2023 17:41:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GXWP=DA=xenbits.xen.org=andrewcoop@srs-se1.protection.inumbo.net>)
 id 1qKMn8-00083u-Sy
 for xen-users@lists.xen.org; Fri, 14 Jul 2023 17:41:18 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9e7e1b83-226d-11ee-8611-37d641c3527e;
 Fri, 14 Jul 2023 19:41:14 +0200 (CEST)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qKMmq-0000i8-Up; Fri, 14 Jul 2023 17:41:00 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qKMmq-00035B-SS; Fri, 14 Jul 2023 17:41:00 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 9e7e1b83-226d-11ee-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=gxB4B4uIvI6wAiFwKGJzyX3wE3vX8wzw64hKr8BxA9I=; b=FXF2NKoFKFfVrspdb9BJ/B/frR
	8W+LCdD1qV75H2UAogqF38xZnScWubmNwXpKQySknnKHr5impkoj7BWMp98CdeAzKJkxAW4ltoOSV
	EDXn1LNqXMD7+5wlk7QQMxOuLsHxi/jf7Wf6qJG5cnS7J3PunBsJ/tPzrcUs0aM3eJvo=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Notice 1 v1 - winpvdrvbuild.xenproject.org
 potentially compromised
Message-Id: <E1qKMmq-00035B-SS@xenbits.xenproject.org>
Date: Fri, 14 Jul 2023 17:41:00 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                     Xen Security Notice 1

         winpvdrvbuild.xenproject.org potentially compromised

ISSUE DESCRIPTION
=================

Software running on the Xen Project hosted subdomain
winpvdrvbuild.xenproject.org is outdated and vulnerable to several
CVEs.  Some of the reported issues include remote code execution.  The
affected host was running the Jenkins build system for the Windows PV
Drivers subproject.

IMPACT
======

Since the list of CVEs reported include remote code execution we no
longer have confidence that binaries previously available at:

https://xenbits.xen.org/pvdrivers/win/

are trustworthy.  This includes binaries signed with Xen Project's EV
key that is cross-signed by Microsoft.

Note that the source code for the windows drivers, hosted on
xenbits.xen.org is in a separate system and we are confident that it
has not been tampered with.  The EV key was also not available to the
possibly compromised system.

ACTIONS TAKEN
=============

The possibly compromised system has been decommissioned.

We have removed all previous binaries from:

https://xenbits.xen.org/pvdrivers/win/

A new set of drivers based on the current master branch
(9.0-unstable) and built on a trusted environment have been uploaded
on the same folder with the following hashes:

$ sha256sum xen*.tar
b089e46d52ffc64a14799c609272ccdded805c1552a88b45d95a64a27e775de7  xenbus.tar
afc6f11f9078cb457daa000b8b8d8ab69656d3950e7afbf6f40aaa5da217301a  xencons.tar
7bbcedcda5e2ffa8ab32eb3d207d1c7db5b91e22926b26d75750bfadde6611f0  xenhid.tar
a8f3344e370647696e3ed39201f5c9db693aca1c093a638fde8b7a928a4416c2  xeniface.tar
560d7049f5e321545dda25c26b5f56e0975a7f62d35629f4c9a73f0fbd148cf3  xennet.tar
9cb34cd135aab045a2401098c4044c95dbd179c454718e43045e433401b8e3dd  xenvbd.tar
47c1b9bc6e90e20d3f524036a3171cf7f8da1d94186febbae0d4a108db7bb3b5  xenvif.tar
09a4b108a9d3fca699c3c31aeb4836cfee2538e588462b0646dcccbde42a4263  xenvkbd.tar

ACTIONS IN PROGRESS
===================

The security team is attempting to inspect existing binaries to
determine whether there are any obvious signs of tampering.

CREDITS
=======

We would like to thank Mahmud Hasan for bringing this to our
attention.

WHAT IS AN XSN
==============

A Xen Security Notice is a mechanism the Security Team was already in
the process of introducing, for providing official communication of
security-relevant information that is not of the form that fits in the
normal XSA template.  Please bear with us as we find the right balance
while trying to fast-track it into use.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmSxe3YMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZgwgH/1serMIChH2tFlbU0HSgVk07KCO17lFcCJnhDSA8
uEv3uYiW8NCZEwaD2wmgxN9tW7yTIoeSrsnTyU9D305M6gy3F9g1XcktAv9HhtEO
fS/Pdq1q/ec4vStOYUzx6yG/2GIKNYny5Um4X2Odr/dvYcdZJPkmeJtv6yIa5wSC
q3jCou/VoBCwXUGqlqzRdRsJ+srmsFfmsTn/oNuM28gkV+qRAUc+J6z+psObo2yp
KE/Jgl9B6Nq2+d7sbcgto77a/4FrgtW01qFgIbvQPcE8BBlPF4xymKeCBSGEY/yL
MrOyYpw81cOd0IvSVdQglW63+DO76EksBJJWQbtazwhbPDs=
=jmGB
-----END PGP SIGNATURE-----

--=separator--


From xen-users-bounces@lists.xenproject.org Mon Jul 24 16:04:52 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 24 Jul 2023 16:04:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.569055.889367 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qNy2U-0008Gg-Ov; Mon, 24 Jul 2023 16:04:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 569055.889367; Mon, 24 Jul 2023 16:04:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qNy2U-0008GY-Kj; Mon, 24 Jul 2023 16:04:02 +0000
Received: by outflank-mailman (input) for mailman id 569055;
 Mon, 24 Jul 2023 16:04:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VoGu=DK=xenbits.xen.org=andrewcoop@srs-se1.protection.inumbo.net>)
 id 1qNy2S-0008EZ-VQ
 for xen-users@lists.xen.org; Mon, 24 Jul 2023 16:04:01 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9f1e281d-2a3b-11ee-8612-37d641c3527e;
 Mon, 24 Jul 2023 18:03:28 +0200 (CEST)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qNy2D-0005bj-7X; Mon, 24 Jul 2023 16:03:45 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qNy2D-00042T-65; Mon, 24 Jul 2023 16:03:45 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 9f1e281d-2a3b-11ee-8612-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=q0hSbsYW9qaxMw1fIRui10REp4EqcBzJKVI5U2eNgXw=; b=RBAKC0tmeugUhMUvdHF8KNvaI3
	w5ZA/Aq9B/hMvU8Weqx2M31Y8DuaNDVO4C7cZidHte37g75YKzoNATU4WH096OjRPW77vytxD0eIz
	K2NCH0bmGokqW0x3sne2DRoQWMm3BepyLsPTPH2L2453qMcnCfJc2oqL4FitMDBpM4aw=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 433 v1 - x86/AMD: Zenbleed
Message-Id: <E1qNy2D-00042T-65@xenbits.xenproject.org>
Date: Mon, 24 Jul 2023 16:03:45 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-433

                          x86/AMD: Zenbleed

ISSUE DESCRIPTION
=================

Researchers at Google have discovered Zenbleed, a hardware bug causing
corruption of the vector registers.

When a VZEROUPPER instruction is discarded as part of a bad transient
execution path, its effect on internal tracking are not unwound
correctly.  This manifests as the wrong micro-architectural state
becoming architectural, and corrupting the vector registers.

Note: While this malfunction is related to speculative execution, this
      is not a speculative sidechannel vulnerability.

The corruption is not random.  It happens to be stale values from the
physical vector register file, a structure competitively shared between
sibling threads.  Therefore, an attacker can directly access data from
the sibling thread, or from a more privileged context.

For more details, see:
  https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
  https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8

IMPACT
======

With very low probability, corruption of the vector registers can occur.
This data corruption causes mis-calculations in subsequent logic.

An attacker can exploit this bug to read data from different contexts on
the same core.  Examples of such data includes key material, cypher and
plaintext from the AES-NI instructions, or the contents of REP-MOVS
instructions, commonly used to implement memcpy().

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

This bug is specific to the AMD Zen2 microarchitecture.  AMD do not
believe that other microarchitectures are affected.

MITIGATION
==========

This issue can be mitigated by disabling AVX, either by booting Xen with
`cpuid=no-avx` on the command line, or by specifying `cpuid="host:avx=0"` in
the vm.cfg file of all untrusted VMs.  However, this will come with a
significant impact on the system and is not recommended for anyone able to
deploy the microcode or patch described below.

RESOLUTION
==========

AMD are producing microcode updates to address the bug.  Consult your
dom0 OS vendor.  This microcode is effective when late-loaded, which can
be performed on a live system without reboot.

In cases where microcode is not available, the appropriate attached
patch updates Xen to use a control register to avoid the issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa433.patch           xen-unstable
xsa433-4.17.patch      Xen 4.17.x
xsa433-4.16.patch      Xen 4.16.x
xsa433-4.15.patch      Xen 4.15.x
xsa433-4.14.patch      Xen 4.14.x

$ sha256sum xsa433*
a9331733b63e3e566f1436a48e9bd9e8b86eb48da6a8ced72ff4affb7859e027  xsa433.patch
6f1db2a2078b0152631f819f8ddee21720dabe185ec49dc9806d4a9d3478adfd  xsa433-4.14.patch
ca3a92605195307ae9b6ff87240beb52a097c125a760c919d7b9a0aff6e557c0  xsa433-4.15.patch
e5e94b3de68842a1c8d222802fb204d64acd118e3293c8e909dfaf3ada23d912  xsa433-4.16.patch
41d12104869b7e8307cd93af1af12b4fd75a669aeff15d31b234dc72981ae407  xsa433-4.17.patch
$

NOTE CONCERNING TIMELINE
========================

This issue is subject to coordinated disclosure on August 8th.  The
discoverer chose to publish details ahead of this timeline.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmS+oDEMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ4JkIAMOW9i78luUOEgggrQDp97T1CMAhew+3v+r2ZPMl
z7a6ATRU3oW7yeepYEP/1mrRFi2E09zrj0rDLvLVrYrhqeDGVIL+ZfI480508/5Y
ubRYZC13rA3jDMDu9r+oBIzObumecRAVj54j5BQmuKyXDqkDMGfbVShpMMvARvhE
wqlBXNFB1Z+ARlDrDZZo6sKhfUqHS4Fo8iilWthKxY9Eb0cxxA1PazMJz5OOaqe6
6Y3hHrSN4dq3DseAhYGgtw+BOTa/XlgAzkdlJM0DvooS22HFuHqwB7dckrtpCMlC
6I3P3p0GfsnG8U99lxYWzuEbtAKwSsFf/da2S8A4rel0aOE=
=xmQd
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa433.patch"
Content-Disposition: attachment; filename="xsa433.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.14.patch"
Content-Disposition: attachment; filename="xsa433-4.14.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.15.patch"
Content-Disposition: attachment; filename="xsa433-4.15.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L2FtZDogTWl0aWdhdGlvbnMgZm9yIFplbmJsZWVk
CgpaZW5ibGVlZCBpcyBhIG1hbGZ1bmN0aW9uIG9uIEFNRCBaZW4yIHVhcmNo
IHBhcnRzIHdoaWNoIHJlc3VsdHMgaW4gY29ycnVwdGlvbgpvZiB0aGUgdmVj
dG9yIHJlZ2lzdGVycy4gIEFuIGF0dGFja2VyIGNhbiB0cmlnZ2VyIHRoaXMg
YnVnIGRlbGliZXJhdGVseSBpbgpvcmRlciB0byBhY2Nlc3Mgc3RhbGUgZGF0
YSBpbiB0aGUgcGh5c2ljYWwgdmVjdG9yIHJlZ2lzdGVyIGZpbGUuICBUaGlz
IGNhbgppbmNsdWRlIGRhdGEgZnJvbSBzaWJsaW5nIHRocmVhZHMsIG9yIGEg
aGlnaGVyLXByaXZpbGVnZSBjb250ZXh0LgoKTWljcm9jb2RlIGlzIHRoZSBw
cmVmZXJyZWQgbWl0aWdhdGlvbiBidXQgaW4gdGhlIGNhc2UgdGhhdCdzIG5v
dCBhdmFpbGFibGUgdXNlCnRoZSBjaGlja2VuYml0IGFzIGluc3RydWN0ZWQg
YnkgQU1ELiAgUmUtZXZhbHVhdGUgdGhlIG1pdGlnYXRpb24gb24gbGF0ZQpt
aWNyb2NvZGUgbG9hZCB0b28uCgpUaGlzIGlzIFhTQS00MzMgLyBDVkUtMjAy
My0yMDU5My4KClNpZ25lZC1vZmYtYnk6IEFuZHJldyBDb29wZXIgPGFuZHJl
dy5jb29wZXIzQGNpdHJpeC5jb20+CkFja2VkLWJ5OiBSb2dlciBQYXUgTW9u
bsOpIDxyb2dlci5wYXVAY2l0cml4LmNvbT4KCmRpZmYgLS1naXQgYS94ZW4v
YXJjaC94ODYvY3B1L2FtZC5jIGIveGVuL2FyY2gveDg2L2NwdS9hbWQuYwpp
bmRleCBhOGQyZmI4YTE1OTAuLmRkNGRjMzE1N2MyNiAxMDA2NDQKLS0tIGEv
eGVuL2FyY2gveDg2L2NwdS9hbWQuYworKysgYi94ZW4vYXJjaC94ODYvY3B1
L2FtZC5jCkBAIC0xMyw2ICsxMyw3IEBACiAjaW5jbHVkZSA8YXNtL3NwZWNf
Y3RybC5oPgogI2luY2x1ZGUgPGFzbS9hY3BpLmg+CiAjaW5jbHVkZSA8YXNt
L2FwaWMuaD4KKyNpbmNsdWRlIDxhc20vbWljcm9jb2RlLmg+CiAKICNpbmNs
dWRlICJjcHUuaCIKIApAQCAtNzU2LDYgKzc1Nyw3MiBAQCB2b2lkIGFtZF9p
bml0X3NwZWN0cmFsX2NoaWNrZW4odm9pZCkKIAkJd3Jtc3Jfc2FmZShNU1Jf
QU1ENjRfREVfQ0ZHMiwgdmFsIHwgY2hpY2tlbmJpdCk7CiB9CiAKK3ZvaWQg
YW1kX2NoZWNrX3plbmJsZWVkKHZvaWQpCit7CisJY29uc3Qgc3RydWN0IGNw
dV9zaWduYXR1cmUgKnNpZyA9ICZ0aGlzX2NwdShjcHVfc2lnKTsKKwl1bnNp
Z25lZCBpbnQgZ29vZF9yZXYsIGNoaWNrZW5iaXQgPSAoMSA8PCA5KTsKKwl1
aW50NjRfdCB2YWwsIG9sZF92YWw7CisKKwkvKgorCSAqIElmIHdlJ3JlIHZp
cnR1YWxpc2VkLCB3ZSBjYW4ndCBkbyBmYW1pbHkvbW9kZWwgY2hlY2tzIHNh
ZmVseSwgYW5kCisJICogd2UgbGlrZWx5IHdvdWxkbid0IGhhdmUgYWNjZXNz
IHRvIERFX0NGRyBldmVuIGlmIHdlIGNvdWxkIHNlZSBhCisJICogbWljcm9j
b2RlIHJldmlzaW9uLgorCSAqCisJICogQSBoeXBlcnZpc29yIG1heSBoaWRl
IEFWWCBhcyBhIHN0b3BnYXAgbWl0aWdhdGlvbi4gIFdlJ3JlIG5vdCBpbiBh
CisJICogcG9zaXRpb24gdG8gY2FyZSBlaXRoZXIgd2F5LiAgQW4gYWRtaW4g
ZG9lc24ndCB3YW50IHRvIGJlIGRpc2FibGluZworCSAqIEFWWCBhcyBhIG1p
dGlnYXRpb24gb24gYW55IGJ1aWxkIG9mIFhlbiB3aXRoIHRoaXMgbG9naWMg
cHJlc2VudC4KKwkgKi8KKwlpZiAoY3B1X2hhc19oeXBlcnZpc29yIHx8IGJv
b3RfY3B1X2RhdGEueDg2ICE9IDB4MTcpCisJCXJldHVybjsKKworCXN3aXRj
aCAoYm9vdF9jcHVfZGF0YS54ODZfbW9kZWwpIHsKKwljYXNlIDB4MzAgLi4u
IDB4M2Y6IGdvb2RfcmV2ID0gMHgwODMwMTA3YTsgYnJlYWs7CisJY2FzZSAw
eDYwIC4uLiAweDY3OiBnb29kX3JldiA9IDB4MDg2MDAxMGI7IGJyZWFrOwor
CWNhc2UgMHg2OCAuLi4gMHg2ZjogZ29vZF9yZXYgPSAweDA4NjA4MTA1OyBi
cmVhazsKKwljYXNlIDB4NzAgLi4uIDB4N2Y6IGdvb2RfcmV2ID0gMHgwODcw
MTAzMjsgYnJlYWs7CisJY2FzZSAweGEwIC4uLiAweGFmOiBnb29kX3JldiA9
IDB4MDhhMDAwMDg7IGJyZWFrOworCWRlZmF1bHQ6CisJCS8qCisJCSAqIFdp
dGggdGhlIEZhbTE3aCBjaGVjayBhYm92ZSwgcGFydHMgZ2V0dGluZyBoZXJl
IGFyZSBaZW4xLgorCQkgKiBUaGV5J3JlIG5vdCBhZmZlY3RlZC4KKwkJICov
CisJCXJldHVybjsKKwl9CisKKwlyZG1zcmwoTVNSX0FNRDY0X0RFX0NGRywg
dmFsKTsKKwlvbGRfdmFsID0gdmFsOworCisJLyoKKwkgKiBNaWNyb2NvZGUg
aXMgdGhlIHByZWZlcnJlZCBtaXRpZ2F0aW9uLCBpbiB0ZXJtcyBvZiBwZXJm
b3JtYW5jZS4KKwkgKiBIb3dldmVyLCB3aXRob3V0IG1pY3JvY29kZSwgdGhp
cyBjaGlja2VuYml0IChzcGVjaWZpYyB0byB0aGUgWmVuMgorCSAqIHVhcmNo
KSBkaXNhYmxlcyBGbG9hdGluZyBQb2ludCBNb3YtRWxpbWluYXRpb24gdG8g
bWl0aWdhdGUgdGhlCisJICogaXNzdWUuCisJICovCisJdmFsICY9IH5jaGlj
a2VuYml0OworCWlmIChzaWctPnJldiA8IGdvb2RfcmV2KQorCQl2YWwgfD0g
Y2hpY2tlbmJpdDsKKworCWlmICh2YWwgPT0gb2xkX3ZhbCkKKwkJLyogTm90
aGluZyB0byBjaGFuZ2UuICovCisJCXJldHVybjsKKworCS8qCisJICogREVf
Q0ZHIGlzIGEgQ29yZS1zY29wZWQgTVNSLCBhbmQgdGhpcyB3cml0ZSBpcyBy
YWN5IGR1cmluZyBsYXRlCisJICogbWljcm9jb2RlIGxvYWQuICBIb3dldmVy
LCBib3RoIHRocmVhZHMgY2FsY3VsYXRlIHRoZSBuZXcgdmFsdWUgZnJvbQor
CSAqIHN0YXRlIHdoaWNoIGlzIHNoYXJlZCwgYW5kIHVucmVsYXRlZCB0byB0
aGUgb2xkIHZhbHVlLCBzbyB0aGUKKwkgKiByZXN1bHQgc2hvdWxkIGJlIGNv
bnNpc3RlbnQuCisJICovCisJd3Jtc3JsKE1TUl9BTUQ2NF9ERV9DRkcsIHZh
bCk7CisKKwkvKgorCSAqIEluZm9ybSB0aGUgYWRtaW4gdGhhdCB3ZSBjaGFu
Z2VkIHNvbWV0aGluZywgYnV0IGRvbid0IHNwYW0sCisJICogZXNwZWNpYWxs
eSBkdXJpbmcgYSBsYXRlIG1pY3JvY29kZSBsb2FkLgorCSAqLworCWlmIChz
bXBfcHJvY2Vzc29yX2lkKCkgPT0gMCkKKwkJcHJpbnRrKFhFTkxPR19JTkZP
ICJaZW5ibGVlZCBtaXRpZ2F0aW9uIC0gdXNpbmcgJXNcbiIsCisJCSAgICAg
ICB2YWwgJiBjaGlja2VuYml0ID8gImNoaWNrZW5iaXQiIDogIm1pY3JvY29k
ZSIpOworfQorCiBzdGF0aWMgdm9pZCBpbml0X2FtZChzdHJ1Y3QgY3B1aW5m
b194ODYgKmMpCiB7CiAJdTMyIGwsIGg7CkBAIC0xMDE2LDYgKzEwODMsOCBA
QCBzdGF0aWMgdm9pZCBpbml0X2FtZChzdHJ1Y3QgY3B1aW5mb194ODYgKmMp
CiAJaWYgKChzbXBfcHJvY2Vzc29yX2lkKCkgPT0gMSkgJiYgIWNwdV9oYXMo
YywgWDg2X0ZFQVRVUkVfSVRTQykpCiAJCWRpc2FibGVfYzFfcmFtcGluZygp
OwogCisJYW1kX2NoZWNrX3plbmJsZWVkKCk7CisKIAljaGVja19zeXNjZmdf
ZHJhbV9tb2RfZW4oKTsKIAogCWFtZF9sb2dfZnJlcShjKTsKZGlmZiAtLWdp
dCBhL3hlbi9hcmNoL3g4Ni9jcHUvbWljcm9jb2RlL2FtZC5jIGIveGVuL2Fy
Y2gveDg2L2NwdS9taWNyb2NvZGUvYW1kLmMKaW5kZXggODA5YmE0OTY3Yzcw
Li45MDYyOWJlZTBkYWIgMTAwNjQ0Ci0tLSBhL3hlbi9hcmNoL3g4Ni9jcHUv
bWljcm9jb2RlL2FtZC5jCisrKyBiL3hlbi9hcmNoL3g4Ni9jcHUvbWljcm9j
b2RlL2FtZC5jCkBAIC0yNTQsNiArMjU0LDggQEAgc3RhdGljIGludCBhcHBs
eV9taWNyb2NvZGUoY29uc3Qgc3RydWN0IG1pY3JvY29kZV9wYXRjaCAqcGF0
Y2gpCiAgICAgcHJpbnRrKFhFTkxPR19XQVJOSU5HICJtaWNyb2NvZGU6IENQ
VSV1IHVwZGF0ZWQgZnJvbSByZXZpc2lvbiAlI3ggdG8gJSN4XG4iLAogICAg
ICAgICAgICBjcHUsIG9sZF9yZXYsIHJldik7CiAKKyAgICBhbWRfY2hlY2tf
emVuYmxlZWQoKTsKKwogICAgIHJldHVybiAwOwogfQogCmRpZmYgLS1naXQg
YS94ZW4vaW5jbHVkZS9hc20teDg2L3Byb2Nlc3Nvci5oIGIveGVuL2luY2x1
ZGUvYXNtLXg4Ni9wcm9jZXNzb3IuaAppbmRleCBjODc0NWUxZjMxYWEuLjdi
NWJhNDFhNDBhMCAxMDA2NDQKLS0tIGEveGVuL2luY2x1ZGUvYXNtLXg4Ni9w
cm9jZXNzb3IuaAorKysgYi94ZW4vaW5jbHVkZS9hc20teDg2L3Byb2Nlc3Nv
ci5oCkBAIC02NDEsNiArNjQxLDggQEAgZW51bSBhcF9ib290X21ldGhvZCB7
CiB9OwogZXh0ZXJuIGVudW0gYXBfYm9vdF9tZXRob2QgYXBfYm9vdF9tZXRo
b2Q7CiAKK3ZvaWQgYW1kX2NoZWNrX3plbmJsZWVkKHZvaWQpOworCiAjZW5k
aWYgLyogIV9fQVNTRU1CTFlfXyAqLwogCiAjZW5kaWYgLyogX19BU01fWDg2
X1BST0NFU1NPUl9IICovCgo=

--=separator
Content-Type: application/octet-stream; name="xsa433-4.16.patch"
Content-Disposition: attachment; filename="xsa433-4.16.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.17.patch"
Content-Disposition: attachment; filename="xsa433-4.17.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L2FtZDogTWl0aWdhdGlvbnMgZm9yIFplbmJsZWVk
CgpaZW5ibGVlZCBpcyBhIG1hbGZ1bmN0aW9uIG9uIEFNRCBaZW4yIHVhcmNo
IHBhcnRzIHdoaWNoIHJlc3VsdHMgaW4gY29ycnVwdGlvbgpvZiB0aGUgdmVj
dG9yIHJlZ2lzdGVycy4gIEFuIGF0dGFja2VyIGNhbiB0cmlnZ2VyIHRoaXMg
YnVnIGRlbGliZXJhdGVseSBpbgpvcmRlciB0byBhY2Nlc3Mgc3RhbGUgZGF0
YSBpbiB0aGUgcGh5c2ljYWwgdmVjdG9yIHJlZ2lzdGVyIGZpbGUuICBUaGlz
IGNhbgppbmNsdWRlIGRhdGEgZnJvbSBzaWJsaW5nIHRocmVhZHMsIG9yIGEg
aGlnaGVyLXByaXZpbGVnZSBjb250ZXh0LgoKTWljcm9jb2RlIGlzIHRoZSBw
cmVmZXJyZWQgbWl0aWdhdGlvbiBidXQgaW4gdGhlIGNhc2UgdGhhdCdzIG5v
dCBhdmFpbGFibGUgdXNlCnRoZSBjaGlja2VuYml0IGFzIGluc3RydWN0ZWQg
YnkgQU1ELiAgUmUtZXZhbHVhdGUgdGhlIG1pdGlnYXRpb24gb24gbGF0ZQpt
aWNyb2NvZGUgbG9hZCB0b28uCgpUaGlzIGlzIFhTQS00MzMgLyBDVkUtMjAy
My0yMDU5My4KClNpZ25lZC1vZmYtYnk6IEFuZHJldyBDb29wZXIgPGFuZHJl
dy5jb29wZXIzQGNpdHJpeC5jb20+CkFja2VkLWJ5OiBSb2dlciBQYXUgTW9u
bsOpIDxyb2dlci5wYXVAY2l0cml4LmNvbT4KCmRpZmYgLS1naXQgYS94ZW4v
YXJjaC94ODYvY3B1L2FtZC5jIGIveGVuL2FyY2gveDg2L2NwdS9hbWQuYwpp
bmRleCBiNmEyMGQzNzVhZDEuLjhkMjNhNWJlMGM1ZiAxMDA2NDQKLS0tIGEv
eGVuL2FyY2gveDg2L2NwdS9hbWQuYworKysgYi94ZW4vYXJjaC94ODYvY3B1
L2FtZC5jCkBAIC0xMyw2ICsxMyw3IEBACiAjaW5jbHVkZSA8YXNtL3NwZWNf
Y3RybC5oPgogI2luY2x1ZGUgPGFzbS9hY3BpLmg+CiAjaW5jbHVkZSA8YXNt
L2FwaWMuaD4KKyNpbmNsdWRlIDxhc20vbWljcm9jb2RlLmg+CiAKICNpbmNs
dWRlICJjcHUuaCIKIApAQCAtODc4LDYgKzg3OSw3MiBAQCB2b2lkIF9faW5p
dCBkZXRlY3RfemVuMl9udWxsX3NlZ19iZWhhdmlvdXIodm9pZCkKIAogfQog
Cit2b2lkIGFtZF9jaGVja196ZW5ibGVlZCh2b2lkKQoreworCWNvbnN0IHN0
cnVjdCBjcHVfc2lnbmF0dXJlICpzaWcgPSAmdGhpc19jcHUoY3B1X3NpZyk7
CisJdW5zaWduZWQgaW50IGdvb2RfcmV2LCBjaGlja2VuYml0ID0gKDEgPDwg
OSk7CisJdWludDY0X3QgdmFsLCBvbGRfdmFsOworCisJLyoKKwkgKiBJZiB3
ZSdyZSB2aXJ0dWFsaXNlZCwgd2UgY2FuJ3QgZG8gZmFtaWx5L21vZGVsIGNo
ZWNrcyBzYWZlbHksIGFuZAorCSAqIHdlIGxpa2VseSB3b3VsZG4ndCBoYXZl
IGFjY2VzcyB0byBERV9DRkcgZXZlbiBpZiB3ZSBjb3VsZCBzZWUgYQorCSAq
IG1pY3JvY29kZSByZXZpc2lvbi4KKwkgKgorCSAqIEEgaHlwZXJ2aXNvciBt
YXkgaGlkZSBBVlggYXMgYSBzdG9wZ2FwIG1pdGlnYXRpb24uICBXZSdyZSBu
b3QgaW4gYQorCSAqIHBvc2l0aW9uIHRvIGNhcmUgZWl0aGVyIHdheS4gIEFu
IGFkbWluIGRvZXNuJ3Qgd2FudCB0byBiZSBkaXNhYmxpbmcKKwkgKiBBVlgg
YXMgYSBtaXRpZ2F0aW9uIG9uIGFueSBidWlsZCBvZiBYZW4gd2l0aCB0aGlz
IGxvZ2ljIHByZXNlbnQuCisJICovCisJaWYgKGNwdV9oYXNfaHlwZXJ2aXNv
ciB8fCBib290X2NwdV9kYXRhLng4NiAhPSAweDE3KQorCQlyZXR1cm47CisK
Kwlzd2l0Y2ggKGJvb3RfY3B1X2RhdGEueDg2X21vZGVsKSB7CisJY2FzZSAw
eDMwIC4uLiAweDNmOiBnb29kX3JldiA9IDB4MDgzMDEwN2E7IGJyZWFrOwor
CWNhc2UgMHg2MCAuLi4gMHg2NzogZ29vZF9yZXYgPSAweDA4NjAwMTBiOyBi
cmVhazsKKwljYXNlIDB4NjggLi4uIDB4NmY6IGdvb2RfcmV2ID0gMHgwODYw
ODEwNTsgYnJlYWs7CisJY2FzZSAweDcwIC4uLiAweDdmOiBnb29kX3JldiA9
IDB4MDg3MDEwMzI7IGJyZWFrOworCWNhc2UgMHhhMCAuLi4gMHhhZjogZ29v
ZF9yZXYgPSAweDA4YTAwMDA4OyBicmVhazsKKwlkZWZhdWx0OgorCQkvKgor
CQkgKiBXaXRoIHRoZSBGYW0xN2ggY2hlY2sgYWJvdmUsIHBhcnRzIGdldHRp
bmcgaGVyZSBhcmUgWmVuMS4KKwkJICogVGhleSdyZSBub3QgYWZmZWN0ZWQu
CisJCSAqLworCQlyZXR1cm47CisJfQorCisJcmRtc3JsKE1TUl9BTUQ2NF9E
RV9DRkcsIHZhbCk7CisJb2xkX3ZhbCA9IHZhbDsKKworCS8qCisJICogTWlj
cm9jb2RlIGlzIHRoZSBwcmVmZXJyZWQgbWl0aWdhdGlvbiwgaW4gdGVybXMg
b2YgcGVyZm9ybWFuY2UuCisJICogSG93ZXZlciwgd2l0aG91dCBtaWNyb2Nv
ZGUsIHRoaXMgY2hpY2tlbmJpdCAoc3BlY2lmaWMgdG8gdGhlIFplbjIKKwkg
KiB1YXJjaCkgZGlzYWJsZXMgRmxvYXRpbmcgUG9pbnQgTW92LUVsaW1pbmF0
aW9uIHRvIG1pdGlnYXRlIHRoZQorCSAqIGlzc3VlLgorCSAqLworCXZhbCAm
PSB+Y2hpY2tlbmJpdDsKKwlpZiAoc2lnLT5yZXYgPCBnb29kX3JldikKKwkJ
dmFsIHw9IGNoaWNrZW5iaXQ7CisKKwlpZiAodmFsID09IG9sZF92YWwpCisJ
CS8qIE5vdGhpbmcgdG8gY2hhbmdlLiAqLworCQlyZXR1cm47CisKKwkvKgor
CSAqIERFX0NGRyBpcyBhIENvcmUtc2NvcGVkIE1TUiwgYW5kIHRoaXMgd3Jp
dGUgaXMgcmFjeSBkdXJpbmcgbGF0ZQorCSAqIG1pY3JvY29kZSBsb2FkLiAg
SG93ZXZlciwgYm90aCB0aHJlYWRzIGNhbGN1bGF0ZSB0aGUgbmV3IHZhbHVl
IGZyb20KKwkgKiBzdGF0ZSB3aGljaCBpcyBzaGFyZWQsIGFuZCB1bnJlbGF0
ZWQgdG8gdGhlIG9sZCB2YWx1ZSwgc28gdGhlCisJICogcmVzdWx0IHNob3Vs
ZCBiZSBjb25zaXN0ZW50LgorCSAqLworCXdybXNybChNU1JfQU1ENjRfREVf
Q0ZHLCB2YWwpOworCisJLyoKKwkgKiBJbmZvcm0gdGhlIGFkbWluIHRoYXQg
d2UgY2hhbmdlZCBzb21ldGhpbmcsIGJ1dCBkb24ndCBzcGFtLAorCSAqIGVz
cGVjaWFsbHkgZHVyaW5nIGEgbGF0ZSBtaWNyb2NvZGUgbG9hZC4KKwkgKi8K
KwlpZiAoc21wX3Byb2Nlc3Nvcl9pZCgpID09IDApCisJCXByaW50ayhYRU5M
T0dfSU5GTyAiWmVuYmxlZWQgbWl0aWdhdGlvbiAtIHVzaW5nICVzXG4iLAor
CQkgICAgICAgdmFsICYgY2hpY2tlbmJpdCA/ICJjaGlja2VuYml0IiA6ICJt
aWNyb2NvZGUiKTsKK30KKwogc3RhdGljIHZvaWQgY2ZfY2hlY2sgaW5pdF9h
bWQoc3RydWN0IGNwdWluZm9feDg2ICpjKQogewogCXUzMiBsLCBoOwpAQCAt
MTE1MCw2ICsxMjE3LDggQEAgc3RhdGljIHZvaWQgY2ZfY2hlY2sgaW5pdF9h
bWQoc3RydWN0IGNwdWluZm9feDg2ICpjKQogCWlmICgoc21wX3Byb2Nlc3Nv
cl9pZCgpID09IDEpICYmICFjcHVfaGFzKGMsIFg4Nl9GRUFUVVJFX0lUU0Mp
KQogCQlkaXNhYmxlX2MxX3JhbXBpbmcoKTsKIAorCWFtZF9jaGVja196ZW5i
bGVlZCgpOworCiAJY2hlY2tfc3lzY2ZnX2RyYW1fbW9kX2VuKCk7CiAKIAlh
bWRfbG9nX2ZyZXEoYyk7CmRpZmYgLS1naXQgYS94ZW4vYXJjaC94ODYvY3B1
L21pY3JvY29kZS9hbWQuYyBiL3hlbi9hcmNoL3g4Ni9jcHUvbWljcm9jb2Rl
L2FtZC5jCmluZGV4IGRlZDhmZTkwZTY1MC4uYzZkMTNmM2ZiMzVmIDEwMDY0
NAotLS0gYS94ZW4vYXJjaC94ODYvY3B1L21pY3JvY29kZS9hbWQuYworKysg
Yi94ZW4vYXJjaC94ODYvY3B1L21pY3JvY29kZS9hbWQuYwpAQCAtMjYyLDYg
KzI2Miw4IEBAIHN0YXRpYyBpbnQgY2ZfY2hlY2sgYXBwbHlfbWljcm9jb2Rl
KGNvbnN0IHN0cnVjdCBtaWNyb2NvZGVfcGF0Y2ggKnBhdGNoKQogICAgICAg
ICAgICAibWljcm9jb2RlOiBDUFUldSB1cGRhdGVkIGZyb20gcmV2aXNpb24g
JSN4IHRvICUjeCwgZGF0ZSA9ICUwNHgtJTAyeC0lMDJ4XG4iLAogICAgICAg
ICAgICBjcHUsIG9sZF9yZXYsIHJldiwgcGF0Y2gtPnllYXIsIHBhdGNoLT5t
b250aCwgcGF0Y2gtPmRheSk7CiAKKyAgICBhbWRfY2hlY2tfemVuYmxlZWQo
KTsKKwogICAgIHJldHVybiAwOwogfQogCmRpZmYgLS1naXQgYS94ZW4vYXJj
aC94ODYvaW5jbHVkZS9hc20vcHJvY2Vzc29yLmggYi94ZW4vYXJjaC94ODYv
aW5jbHVkZS9hc20vcHJvY2Vzc29yLmgKaW5kZXggOGUyODE2ZmFlOWI5Li42
NjYxMWRmNmVmYzEgMTAwNjQ0Ci0tLSBhL3hlbi9hcmNoL3g4Ni9pbmNsdWRl
L2FzbS9wcm9jZXNzb3IuaAorKysgYi94ZW4vYXJjaC94ODYvaW5jbHVkZS9h
c20vcHJvY2Vzc29yLmgKQEAgLTYzNyw2ICs2MzcsOCBAQCBlbnVtIGFwX2Jv
b3RfbWV0aG9kIHsKIH07CiBleHRlcm4gZW51bSBhcF9ib290X21ldGhvZCBh
cF9ib290X21ldGhvZDsKIAordm9pZCBhbWRfY2hlY2tfemVuYmxlZWQodm9p
ZCk7CisKICNlbmRpZiAvKiAhX19BU1NFTUJMWV9fICovCiAKICNlbmRpZiAv
KiBfX0FTTV9YODZfUFJPQ0VTU09SX0ggKi8KCg==

--=separator--


From xen-users-bounces@lists.xenproject.org Wed Jul 26 11:14:14 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 26 Jul 2023 11:14:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.570334.892114 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qOcSN-0001l8-0J; Wed, 26 Jul 2023 11:13:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 570334.892114; Wed, 26 Jul 2023 11:13:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qOcSM-0001kx-SI; Wed, 26 Jul 2023 11:13:26 +0000
Received: by outflank-mailman (input) for mailman id 570334;
 Wed, 26 Jul 2023 11:13:25 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LYfz=DM=xenbits.xen.org=andrewcoop@srs-se1.protection.inumbo.net>)
 id 1qOcSL-0001km-Fd
 for xen-users@lists.xen.org; Wed, 26 Jul 2023 11:13:25 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6c58eb4e-2ba5-11ee-8613-37d641c3527e;
 Wed, 26 Jul 2023 13:13:20 +0200 (CEST)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qOcS0-00084H-SG; Wed, 26 Jul 2023 11:13:04 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qOcS0-0007bb-Pt; Wed, 26 Jul 2023 11:13:04 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 6c58eb4e-2ba5-11ee-8613-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=Hy6QSi/95sh5Gms38RZprGTol6LrLiupnOt52RrznXg=; b=XR6tfhaBxTQYooRc2anjTTDM+l
	yezEFVS7WgjNxCoRjoiMCAWB566MSbGsXQvj8q1rDroONhFv2iwy3bLm8cxiX06TBJ9jnwld2AQ8G
	UcMCSliUSjmHk1eWp0rlX+UBcmmOx9eSsAon/7O7bQa3oz/15Xy+V1bkZbsqp5Hlekeg=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 433 v2 (CVE-2023-20593) - x86/AMD: Zenbleed
Message-Id: <E1qOcS0-0007bb-Pt@xenbits.xenproject.org>
Date: Wed, 26 Jul 2023 11:13:04 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2023-20593 / XSA-433
                              version 2

                          x86/AMD: Zenbleed

UPDATES IN VERSION 2
====================

Include the CVE, which was missed accidentally in the rush of
timelines repeatedly moving underfoot.

ISSUE DESCRIPTION
=================

Researchers at Google have discovered Zenbleed, a hardware bug causing
corruption of the vector registers.

When a VZEROUPPER instruction is discarded as part of a bad transient
execution path, its effect on internal tracking are not unwound
correctly.  This manifests as the wrong micro-architectural state
becoming architectural, and corrupting the vector registers.

Note: While this malfunction is related to speculative execution, this
      is not a speculative sidechannel vulnerability.

The corruption is not random.  It happens to be stale values from the
physical vector register file, a structure competitively shared between
sibling threads.  Therefore, an attacker can directly access data from
the sibling thread, or from a more privileged context.

For more details, see:
  https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
  https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8

IMPACT
======

With very low probability, corruption of the vector registers can occur.
This data corruption causes mis-calculations in subsequent logic.

An attacker can exploit this bug to read data from different contexts on
the same core.  Examples of such data includes key material, cypher and
plaintext from the AES-NI instructions, or the contents of REP-MOVS
instructions, commonly used to implement memcpy().

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

This bug is specific to the AMD Zen2 microarchitecture.  AMD do not
believe that other microarchitectures are affected.

MITIGATION
==========

This issue can be mitigated by disabling AVX, either by booting Xen with
`cpuid=no-avx` on the command line, or by specifying `cpuid="host:avx=0"` in
the vm.cfg file of all untrusted VMs.  However, this will come with a
significant impact on the system and is not recommended for anyone able to
deploy the microcode or patch described below.

RESOLUTION
==========

AMD are producing microcode updates to address the bug.  Consult your
dom0 OS vendor.  This microcode is effective when late-loaded, which can
be performed on a live system without reboot.

In cases where microcode is not available, the appropriate attached
patch updates Xen to use a control register to avoid the issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa433.patch           xen-unstable
xsa433-4.17.patch      Xen 4.17.x
xsa433-4.16.patch      Xen 4.16.x
xsa433-4.15.patch      Xen 4.15.x
xsa433-4.14.patch      Xen 4.14.x

$ sha256sum xsa433*
a9331733b63e3e566f1436a48e9bd9e8b86eb48da6a8ced72ff4affb7859e027  xsa433.patch
6f1db2a2078b0152631f819f8ddee21720dabe185ec49dc9806d4a9d3478adfd  xsa433-4.14.patch
ca3a92605195307ae9b6ff87240beb52a097c125a760c919d7b9a0aff6e557c0  xsa433-4.15.patch
e5e94b3de68842a1c8d222802fb204d64acd118e3293c8e909dfaf3ada23d912  xsa433-4.16.patch
41d12104869b7e8307cd93af1af12b4fd75a669aeff15d31b234dc72981ae407  xsa433-4.17.patch
$

NOTE CONCERNING TIMELINE
========================

This issue is subject to coordinated disclosure on August 8th.  The
discoverer chose to publish details ahead of this timeline.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmTA/2cMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ0EIH/02n/gvMGF5RCwfs/uvwjsQASAgELWTgAFv+tXOG
yLZWCxNkWAWDxTWAEWfdcSsLCN8GDc4c6lNuhqnV3mVsIDiGSHmXgSkI9pcCQ79T
2KTgC+ncMM4yeYTI5SUL4xvzzIQ/38t5gK5+AyPxg3jpMhCLEz2dJwbjgd4CKai+
ax+l3cX9ibLj/lQQwvgkPXweAVsfILnCAB5J1VQb1Jw0DWauYJLurMj0flz82a2O
NftdEx3b5ADDxXHdE52J5p/kpXMDohdPm0R07Y63j+eY+QJADLHfwE+n4pqyzvDf
kPEGUtxbcCj4VygmO6xrHgoHYqaGbRYeHJyHEt4jpZDLwP4=
=9wn5
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa433.patch"
Content-Disposition: attachment; filename="xsa433.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.14.patch"
Content-Disposition: attachment; filename="xsa433-4.14.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.15.patch"
Content-Disposition: attachment; filename="xsa433-4.15.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.16.patch"
Content-Disposition: attachment; filename="xsa433-4.16.patch"
Content-Transfer-Encoding: base64

RnJvbTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNv
bT4KU3ViamVjdDogeDg2L2FtZDogTWl0aWdhdGlvbnMgZm9yIFplbmJsZWVk
CgpaZW5ibGVlZCBpcyBhIG1hbGZ1bmN0aW9uIG9uIEFNRCBaZW4yIHVhcmNo
IHBhcnRzIHdoaWNoIHJlc3VsdHMgaW4gY29ycnVwdGlvbgpvZiB0aGUgdmVj
dG9yIHJlZ2lzdGVycy4gIEFuIGF0dGFja2VyIGNhbiB0cmlnZ2VyIHRoaXMg
YnVnIGRlbGliZXJhdGVseSBpbgpvcmRlciB0byBhY2Nlc3Mgc3RhbGUgZGF0
YSBpbiB0aGUgcGh5c2ljYWwgdmVjdG9yIHJlZ2lzdGVyIGZpbGUuICBUaGlz
IGNhbgppbmNsdWRlIGRhdGEgZnJvbSBzaWJsaW5nIHRocmVhZHMsIG9yIGEg
aGlnaGVyLXByaXZpbGVnZSBjb250ZXh0LgoKTWljcm9jb2RlIGlzIHRoZSBw
cmVmZXJyZWQgbWl0aWdhdGlvbiBidXQgaW4gdGhlIGNhc2UgdGhhdCdzIG5v
dCBhdmFpbGFibGUgdXNlCnRoZSBjaGlja2VuYml0IGFzIGluc3RydWN0ZWQg
YnkgQU1ELiAgUmUtZXZhbHVhdGUgdGhlIG1pdGlnYXRpb24gb24gbGF0ZQpt
aWNyb2NvZGUgbG9hZCB0b28uCgpUaGlzIGlzIFhTQS00MzMgLyBDVkUtMjAy
My0yMDU5My4KClNpZ25lZC1vZmYtYnk6IEFuZHJldyBDb29wZXIgPGFuZHJl
dy5jb29wZXIzQGNpdHJpeC5jb20+CkFja2VkLWJ5OiBSb2dlciBQYXUgTW9u
bsOpIDxyb2dlci5wYXVAY2l0cml4LmNvbT4KCmRpZmYgLS1naXQgYS94ZW4v
YXJjaC94ODYvY3B1L2FtZC5jIGIveGVuL2FyY2gveDg2L2NwdS9hbWQuYwpp
bmRleCAwOGUzZTFlOGEyZDguLjRlZDA4ZGY0YThjZSAxMDA2NDQKLS0tIGEv
eGVuL2FyY2gveDg2L2NwdS9hbWQuYworKysgYi94ZW4vYXJjaC94ODYvY3B1
L2FtZC5jCkBAIC0xMyw2ICsxMyw3IEBACiAjaW5jbHVkZSA8YXNtL3NwZWNf
Y3RybC5oPgogI2luY2x1ZGUgPGFzbS9hY3BpLmg+CiAjaW5jbHVkZSA8YXNt
L2FwaWMuaD4KKyNpbmNsdWRlIDxhc20vbWljcm9jb2RlLmg+CiAKICNpbmNs
dWRlICJjcHUuaCIKIApAQCAtNzY5LDYgKzc3MCw3MiBAQCB2b2lkIF9faW5p
dCBkZXRlY3RfemVuMl9udWxsX3NlZ19iZWhhdmlvdXIodm9pZCkKIAogfQog
Cit2b2lkIGFtZF9jaGVja196ZW5ibGVlZCh2b2lkKQoreworCWNvbnN0IHN0
cnVjdCBjcHVfc2lnbmF0dXJlICpzaWcgPSAmdGhpc19jcHUoY3B1X3NpZyk7
CisJdW5zaWduZWQgaW50IGdvb2RfcmV2LCBjaGlja2VuYml0ID0gKDEgPDwg
OSk7CisJdWludDY0X3QgdmFsLCBvbGRfdmFsOworCisJLyoKKwkgKiBJZiB3
ZSdyZSB2aXJ0dWFsaXNlZCwgd2UgY2FuJ3QgZG8gZmFtaWx5L21vZGVsIGNo
ZWNrcyBzYWZlbHksIGFuZAorCSAqIHdlIGxpa2VseSB3b3VsZG4ndCBoYXZl
IGFjY2VzcyB0byBERV9DRkcgZXZlbiBpZiB3ZSBjb3VsZCBzZWUgYQorCSAq
IG1pY3JvY29kZSByZXZpc2lvbi4KKwkgKgorCSAqIEEgaHlwZXJ2aXNvciBt
YXkgaGlkZSBBVlggYXMgYSBzdG9wZ2FwIG1pdGlnYXRpb24uICBXZSdyZSBu
b3QgaW4gYQorCSAqIHBvc2l0aW9uIHRvIGNhcmUgZWl0aGVyIHdheS4gIEFu
IGFkbWluIGRvZXNuJ3Qgd2FudCB0byBiZSBkaXNhYmxpbmcKKwkgKiBBVlgg
YXMgYSBtaXRpZ2F0aW9uIG9uIGFueSBidWlsZCBvZiBYZW4gd2l0aCB0aGlz
IGxvZ2ljIHByZXNlbnQuCisJICovCisJaWYgKGNwdV9oYXNfaHlwZXJ2aXNv
ciB8fCBib290X2NwdV9kYXRhLng4NiAhPSAweDE3KQorCQlyZXR1cm47CisK
Kwlzd2l0Y2ggKGJvb3RfY3B1X2RhdGEueDg2X21vZGVsKSB7CisJY2FzZSAw
eDMwIC4uLiAweDNmOiBnb29kX3JldiA9IDB4MDgzMDEwN2E7IGJyZWFrOwor
CWNhc2UgMHg2MCAuLi4gMHg2NzogZ29vZF9yZXYgPSAweDA4NjAwMTBiOyBi
cmVhazsKKwljYXNlIDB4NjggLi4uIDB4NmY6IGdvb2RfcmV2ID0gMHgwODYw
ODEwNTsgYnJlYWs7CisJY2FzZSAweDcwIC4uLiAweDdmOiBnb29kX3JldiA9
IDB4MDg3MDEwMzI7IGJyZWFrOworCWNhc2UgMHhhMCAuLi4gMHhhZjogZ29v
ZF9yZXYgPSAweDA4YTAwMDA4OyBicmVhazsKKwlkZWZhdWx0OgorCQkvKgor
CQkgKiBXaXRoIHRoZSBGYW0xN2ggY2hlY2sgYWJvdmUsIHBhcnRzIGdldHRp
bmcgaGVyZSBhcmUgWmVuMS4KKwkJICogVGhleSdyZSBub3QgYWZmZWN0ZWQu
CisJCSAqLworCQlyZXR1cm47CisJfQorCisJcmRtc3JsKE1TUl9BTUQ2NF9E
RV9DRkcsIHZhbCk7CisJb2xkX3ZhbCA9IHZhbDsKKworCS8qCisJICogTWlj
cm9jb2RlIGlzIHRoZSBwcmVmZXJyZWQgbWl0aWdhdGlvbiwgaW4gdGVybXMg
b2YgcGVyZm9ybWFuY2UuCisJICogSG93ZXZlciwgd2l0aG91dCBtaWNyb2Nv
ZGUsIHRoaXMgY2hpY2tlbmJpdCAoc3BlY2lmaWMgdG8gdGhlIFplbjIKKwkg
KiB1YXJjaCkgZGlzYWJsZXMgRmxvYXRpbmcgUG9pbnQgTW92LUVsaW1pbmF0
aW9uIHRvIG1pdGlnYXRlIHRoZQorCSAqIGlzc3VlLgorCSAqLworCXZhbCAm
PSB+Y2hpY2tlbmJpdDsKKwlpZiAoc2lnLT5yZXYgPCBnb29kX3JldikKKwkJ
dmFsIHw9IGNoaWNrZW5iaXQ7CisKKwlpZiAodmFsID09IG9sZF92YWwpCisJ
CS8qIE5vdGhpbmcgdG8gY2hhbmdlLiAqLworCQlyZXR1cm47CisKKwkvKgor
CSAqIERFX0NGRyBpcyBhIENvcmUtc2NvcGVkIE1TUiwgYW5kIHRoaXMgd3Jp
dGUgaXMgcmFjeSBkdXJpbmcgbGF0ZQorCSAqIG1pY3JvY29kZSBsb2FkLiAg
SG93ZXZlciwgYm90aCB0aHJlYWRzIGNhbGN1bGF0ZSB0aGUgbmV3IHZhbHVl
IGZyb20KKwkgKiBzdGF0ZSB3aGljaCBpcyBzaGFyZWQsIGFuZCB1bnJlbGF0
ZWQgdG8gdGhlIG9sZCB2YWx1ZSwgc28gdGhlCisJICogcmVzdWx0IHNob3Vs
ZCBiZSBjb25zaXN0ZW50LgorCSAqLworCXdybXNybChNU1JfQU1ENjRfREVf
Q0ZHLCB2YWwpOworCisJLyoKKwkgKiBJbmZvcm0gdGhlIGFkbWluIHRoYXQg
d2UgY2hhbmdlZCBzb21ldGhpbmcsIGJ1dCBkb24ndCBzcGFtLAorCSAqIGVz
cGVjaWFsbHkgZHVyaW5nIGEgbGF0ZSBtaWNyb2NvZGUgbG9hZC4KKwkgKi8K
KwlpZiAoc21wX3Byb2Nlc3Nvcl9pZCgpID09IDApCisJCXByaW50ayhYRU5M
T0dfSU5GTyAiWmVuYmxlZWQgbWl0aWdhdGlvbiAtIHVzaW5nICVzXG4iLAor
CQkgICAgICAgdmFsICYgY2hpY2tlbmJpdCA/ICJjaGlja2VuYml0IiA6ICJt
aWNyb2NvZGUiKTsKK30KKwogc3RhdGljIHZvaWQgaW5pdF9hbWQoc3RydWN0
IGNwdWluZm9feDg2ICpjKQogewogCXUzMiBsLCBoOwpAQCAtMTA0MSw2ICsx
MTA4LDggQEAgc3RhdGljIHZvaWQgaW5pdF9hbWQoc3RydWN0IGNwdWluZm9f
eDg2ICpjKQogCWlmICgoc21wX3Byb2Nlc3Nvcl9pZCgpID09IDEpICYmICFj
cHVfaGFzKGMsIFg4Nl9GRUFUVVJFX0lUU0MpKQogCQlkaXNhYmxlX2MxX3Jh
bXBpbmcoKTsKIAorCWFtZF9jaGVja196ZW5ibGVlZCgpOworCiAJY2hlY2tf
c3lzY2ZnX2RyYW1fbW9kX2VuKCk7CiAKIAlhbWRfbG9nX2ZyZXEoYyk7CmRp
ZmYgLS1naXQgYS94ZW4vYXJjaC94ODYvY3B1L21pY3JvY29kZS9hbWQuYyBi
L3hlbi9hcmNoL3g4Ni9jcHUvbWljcm9jb2RlL2FtZC5jCmluZGV4IDUyMTgy
YzFhMjM4My4uNDgzYTliNTQ3ZjgwIDEwMDY0NAotLS0gYS94ZW4vYXJjaC94
ODYvY3B1L21pY3JvY29kZS9hbWQuYworKysgYi94ZW4vYXJjaC94ODYvY3B1
L21pY3JvY29kZS9hbWQuYwpAQCAtMjYyLDYgKzI2Miw4IEBAIHN0YXRpYyBp
bnQgYXBwbHlfbWljcm9jb2RlKGNvbnN0IHN0cnVjdCBtaWNyb2NvZGVfcGF0
Y2ggKnBhdGNoKQogICAgICAgICAgICAibWljcm9jb2RlOiBDUFUldSB1cGRh
dGVkIGZyb20gcmV2aXNpb24gJSN4IHRvICUjeCwgZGF0ZSA9ICUwNHgtJTAy
eC0lMDJ4XG4iLAogICAgICAgICAgICBjcHUsIG9sZF9yZXYsIHJldiwgcGF0
Y2gtPnllYXIsIHBhdGNoLT5tb250aCwgcGF0Y2gtPmRheSk7CiAKKyAgICBh
bWRfY2hlY2tfemVuYmxlZWQoKTsKKwogICAgIHJldHVybiAwOwogfQogCmRp
ZmYgLS1naXQgYS94ZW4vaW5jbHVkZS9hc20teDg2L3Byb2Nlc3Nvci5oIGIv
eGVuL2luY2x1ZGUvYXNtLXg4Ni9wcm9jZXNzb3IuaAppbmRleCAzZDhhYWNk
M2FhYjIuLjk2NjIxZWMzOWY4YiAxMDA2NDQKLS0tIGEveGVuL2luY2x1ZGUv
YXNtLXg4Ni9wcm9jZXNzb3IuaAorKysgYi94ZW4vaW5jbHVkZS9hc20teDg2
L3Byb2Nlc3Nvci5oCkBAIC02MzksNiArNjM5LDggQEAgZW51bSBhcF9ib290
X21ldGhvZCB7CiB9OwogZXh0ZXJuIGVudW0gYXBfYm9vdF9tZXRob2QgYXBf
Ym9vdF9tZXRob2Q7CiAKK3ZvaWQgYW1kX2NoZWNrX3plbmJsZWVkKHZvaWQp
OworCiAjZW5kaWYgLyogIV9fQVNTRU1CTFlfXyAqLwogCiAjZW5kaWYgLyog
X19BU01fWDg2X1BST0NFU1NPUl9IICovCgo=

--=separator
Content-Type: application/octet-stream; name="xsa433-4.17.patch"
Content-Disposition: attachment; filename="xsa433-4.17.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Sat Jul 29 12:03:07 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 29 Jul 2023 12:03:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.571882.896043 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qPieJ-0002bT-GO; Sat, 29 Jul 2023 12:02:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 571882.896043; Sat, 29 Jul 2023 12:02:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qPieJ-0002bI-Bg; Sat, 29 Jul 2023 12:02:19 +0000
Received: by outflank-mailman (input) for mailman id 571882;
 Sat, 29 Jul 2023 12:02:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fPHj=DP=gmail.com=chrismyers81@srs-se1.protection.inumbo.net>)
 id 1qPieH-0002ap-Sw
 for xen-users@lists.xenproject.org; Sat, 29 Jul 2023 12:02:17 +0000
Received: from mail-yb1-xb29.google.com (mail-yb1-xb29.google.com
 [2607:f8b0:4864:20::b29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c1bfec19-2e07-11ee-8613-37d641c3527e;
 Sat, 29 Jul 2023 14:02:16 +0200 (CEST)
Received: by mail-yb1-xb29.google.com with SMTP id
 3f1490d57ef6-d05a63946e0so2897684276.1
 for <xen-users@lists.xenproject.org>; Sat, 29 Jul 2023 05:02:15 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: c1bfec19-2e07-11ee-8613-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20221208; t=1690632134; x=1691236934;
        h=to:subject:message-id:date:from:mime-version:from:to:cc:subject
         :date:message-id:reply-to;
        bh=Nu5SkDkPP/8E4B53vrE7s0HzJMGRmme5oPY39AAKQ+w=;
        b=X07Nd4lN2oTTC57smWLoCutbq+FQHWnmpz3Ow/YBSMSVxEdYkwQPa9dL88sUnQCB92
         izX3y8TVOS7Ri6FR4ZWd5CkOhMP9knwCfS7FZ6Z7E4XBEp0tKecZwd84iSqyRvr4/1vY
         Nrken54rmfA9RyA2VLmlnnXken4dYzoz/Pz7jX5izudq5/toBeeisuhueyjn9rXHFAn3
         +8KXjBJ708eB0X0M7oGH+p6f1j5VPVn+lIbh+m+mCxG8mlNpuJkeVQt0uI3zZdrLLmoa
         K5F0ktCafq/Euyxb5LF5X+dWQuaIB/ANVxqvT/auyoeIqDT11+F8xi6eWLefcZPMPokd
         uslQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1690632134; x=1691236934;
        h=to:subject:message-id:date:from:mime-version:x-gm-message-state
         :from:to:cc:subject:date:message-id:reply-to;
        bh=Nu5SkDkPP/8E4B53vrE7s0HzJMGRmme5oPY39AAKQ+w=;
        b=ZpaRmhcJC4MolbuK20+apUn5l+/PlnDyP2kn0e8LKAeEGrfYxI7wnlsttWF/LmBtZ9
         NWDI+FHxp4QuQKQ/xQiHPNEiNhhEwy6IyLVhTB3Af2ui9WA7uxB8LesX6DMCCx0k9Afp
         kkCUNEV/mxM6mwOd8AgQEk3QMwXn1QkEPYusDJ3XsNUEjv6l2ngtRsU+pVU2JfO+QsMx
         Y+Z9w6T0td489m0uvsyhgtlw49LrwUnjO3TQ468OH0g4UPq4DMrU/Ua3VkvH4i2XzrBa
         hzn6tFHpWTiIlY3ysepgLXVaS7HSkxDPZU66FSHqWPDa9j6y1faX5O98JCyDDg7M4NSX
         vSUQ==
X-Gm-Message-State: ABy/qLb1OquyDCHvpF3LwOGmpt07v5D8V7DBhIPUYg4gA3iKwhmifFlc
	VbukkCZ8qce0pH52iK+eHrp9pZQ9AMuy3/rruPpjxkjZVnI=
X-Google-Smtp-Source: APBJJlGAg9OAOMSyeZy849/gRpPEbD1+OUXdT2N/KRSd+v2bVU58LYnwxAxdPWziAFLlvfBLIEegdKJ2QaiouG7//yQ=
X-Received: by 2002:a25:cb4f:0:b0:c41:a05d:5da8 with SMTP id
 b76-20020a25cb4f000000b00c41a05d5da8mr4069206ybg.11.1690632133706; Sat, 29
 Jul 2023 05:02:13 -0700 (PDT)
MIME-Version: 1.0
From: Chris Myers <chrismyers81@gmail.com>
Date: Sat, 29 Jul 2023 07:02:02 -0500
Message-ID: <CADrndxOUfRKLEWBcSTzD6rqi2PRqVkCsx1-fL0SJtKDLk-0itg@mail.gmail.com>
Subject: Debian Xen bookworm upgrade - vm interface naming scheme change from
 eth0 to enX0
To: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000c6896606019ef7c0"

--000000000000c6896606019ef7c0
Content-Type: text/plain; charset="UTF-8"

I upgraded my first Xen host to bookworm this morning. That seemed to go
fine (so far...it's only been online for an hour.)

After upgrading the first VM to bookworm, the networking service wouldn't
start up. Looking at the logs it was because instead of being named eg.
"eth0", the interfaces are now named eg. "enX0".

Doing some poking around on the internet, it seems to have been a change
with systemd - https://github.com/systemd/systemd/releases/tag/v250

    * The predictable naming logic for network interfaces has been extended
      to generate stable names from Xen netfront device information.

Mostly sharing to make others aware; most of my VMs will be fine but I have
one critical firewall VM with a dozen network interfaces that's going to be
... interesting.

-- 
People use duct tape to fix everything....God used nails.

http://www.myerscountry.net

--000000000000c6896606019ef7c0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I upgraded my first Xen host to bookworm this morning=
. That seemed to go fine (so far...it&#39;s only been online for an hour.)<=
/div><div><br></div><div>After upgrading the first VM to bookworm, the netw=
orking service wouldn&#39;t start up. Looking at the logs it was because in=
stead of being named eg. &quot;eth0&quot;, the interfaces are now named eg.=
 &quot;enX0&quot;.</div><div><br></div><div>Doing some poking around on the=
 internet, it seems to have been a change with systemd - <a href=3D"https:/=
/github.com/systemd/systemd/releases/tag/v250">https://github.com/systemd/s=
ystemd/releases/tag/v250</a></div><div><pre class=3D"gmail-notranslate"><co=
de>    * The predictable naming logic for network interfaces has been exten=
ded
      to generate stable names from Xen netfront device information.</code>=
</pre></div><div>Mostly sharing to make others aware; most of my VMs will b=
e fine but I have one critical firewall VM with a dozen network interfaces =
that&#39;s going to be ... interesting.</div><div><span style=3D"font-famil=
y:monospace"></span></div><div><span style=3D"font-family:monospace"></span=
></div><div><br><span class=3D"gmail_signature_prefix">-- </span><br><div d=
ir=3D"ltr" class=3D"gmail_signature" data-smartmail=3D"gmail_signature">Peo=
ple use duct tape to fix everything....God used nails.<br><br><a href=3D"ht=
tp://www.myerscountry.net" target=3D"_blank">http://www.myerscountry.net</a=
></div></div></div>

--000000000000c6896606019ef7c0--


From xen-users-bounces@lists.xenproject.org Sat Jul 29 13:47:34 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 29 Jul 2023 13:47:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.571991.896062 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qPkHQ-0005Qm-V2; Sat, 29 Jul 2023 13:46:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 571991.896062; Sat, 29 Jul 2023 13:46:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qPkHQ-0005Qb-SH; Sat, 29 Jul 2023 13:46:48 +0000
Received: by outflank-mailman (input) for mailman id 571991;
 Sat, 29 Jul 2023 13:46:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ggIV=DP=gmail.com=davidwhodgins@srs-se1.protection.inumbo.net>)
 id 1qPkHP-0005QV-EJ
 for xen-users@lists.xenproject.org; Sat, 29 Jul 2023 13:46:47 +0000
Received: from mail-qt1-x831.google.com (mail-qt1-x831.google.com
 [2607:f8b0:4864:20::831])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5b144c32-2e16-11ee-b250-6b7b168915f2;
 Sat, 29 Jul 2023 15:46:46 +0200 (CEST)
Received: by mail-qt1-x831.google.com with SMTP id
 d75a77b69052e-4055c143ca6so21032601cf.3
 for <xen-users@lists.xenproject.org>; Sat, 29 Jul 2023 06:46:45 -0700 (PDT)
Received: from hodgins.homeip.net (198-84-196-73.cpe.teksavvy.com.
 [198.84.196.73]) by smtp.gmail.com with ESMTPSA id
 l22-20020ac87256000000b00403eab8b7cesm1926263qtp.16.2023.07.29.06.46.43
 for <xen-users@lists.xenproject.org>
 (version=TLS1_2 cipher=AES128-SHA bits=128/128);
 Sat, 29 Jul 2023 06:46:43 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 5b144c32-2e16-11ee-b250-6b7b168915f2
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20221208; t=1690638404; x=1691243204;
        h=user-agent:in-reply-to:message-id:from:content-transfer-encoding
         :mime-version:date:references:subject:to:from:to:cc:subject:date
         :message-id:reply-to;
        bh=3c5YrcAJWYkNYsLx6oCUJYzfendATezbrgN4PS/wxz0=;
        b=K8zSRdiwvSS/br96Oe6Ldha1vcpgjzSGxk8EcQ1RsDGqm4fiFuUHt+A+ZWWi75z03w
         oddsUieHQZBIhzxvk1xlamEoJu0ss4RDvIcgZwlF4NOzC9MzDQk+9PT2X5LHFq693qEm
         78T/Sidm19y+aThI+XmB0AFfi/FQKG4kDaNxRPxwGVXjLxElf0dXaYX4/Ou8PXIv9zYL
         00JMt5nggThonapUtKKO0QzxjdB4AYtqTbzr19CqRSHxoAHdC+gUFfYbRjiKe5M9r1T9
         1vCkeHbMi9CqE3k9TtJwvLpARurnIeQ0dx4Tac5LMfyPE1051DMo3HHuUQwSgnL6lAht
         ZgTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1690638404; x=1691243204;
        h=user-agent:in-reply-to:message-id:from:content-transfer-encoding
         :mime-version:date:references:subject:to:x-gm-message-state:from:to
         :cc:subject:date:message-id:reply-to;
        bh=3c5YrcAJWYkNYsLx6oCUJYzfendATezbrgN4PS/wxz0=;
        b=T4a/nWbwecyh2vbeEalfJMU68l3Jbq61NWFztyxcQ0Z5zdnq/Yx46zohSlIAEb6Uql
         FRPE/AJjPfqimN0mb0IPA7WLiJfCttO8thOCU9lbEg19Y9tA5vScysXsgltd/RJE+KK1
         yEIsVJncCjrCKdCGBLr/Am6uBPbwp1tkUZb1ZMYmArcYkKFhWRu0NdUEqwue1fZDub61
         OAMzYAnKK2uPDU6Jn1fTn//OugCs4IP4QclmmYam93Xaq9t5Y44wt2kBEs/pnzGeEyog
         Ra32McYgRAfAz1uZkcsn0EHv1hTap+CaxaVV8E2goUVGBUFnUo6HdK2Fm6afvInKk9F/
         TU1w==
X-Gm-Message-State: ABy/qLaQ6l9jXlskaCSxREGWdqBdRlMoYHJVUVBuIYKyx6CT7BeJ/LNO
	KiLYJMBha0eULzXIbugo4XIdodw1OUE=
X-Google-Smtp-Source: APBJJlG9V2Wty0z8sr+FXXqMGn14TBXrfcnLXKdM56N7Ba7vLMywms6FZW368lOlk4LRlcHOHJi4qQ==
X-Received: by 2002:ac8:7f09:0:b0:403:aac1:3ce with SMTP id f9-20020ac87f09000000b00403aac103cemr6584608qtk.42.1690638403991;
        Sat, 29 Jul 2023 06:46:43 -0700 (PDT)
Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes
To: xen-users@lists.xenproject.org
Subject: Re: Debian Xen bookworm upgrade - vm interface naming scheme change
 from eth0 to enX0
References: <CADrndxOUfRKLEWBcSTzD6rqi2PRqVkCsx1-fL0SJtKDLk-0itg@mail.gmail.com>
Date: Sat, 29 Jul 2023 09:46:42 -0400
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
From: "David W. Hodgins" <davidwhodgins@gmail.com>
Message-ID: <op.18ui74eln7mcit@hodgins.homeip.net>
In-Reply-To: <CADrndxOUfRKLEWBcSTzD6rqi2PRqVkCsx1-fL0SJtKDLk-0itg@mail.gmail.com>
User-Agent: Opera Mail/12.16 (Linux)

On Sat, 29 Jul 2023 08:02:02 -0400, Chris Myers <chrismyers81@gmail.com> wrote:

> I upgraded my first Xen host to bookworm this morning. That seemed to go
> fine (so far...it's only been online for an hour.)
>
> After upgrading the first VM to bookworm, the networking service wouldn't
> start up. Looking at the logs it was because instead of being named eg.
> "eth0", the interfaces are now named eg. "enX0".
>
> Doing some poking around on the internet, it seems to have been a change
> with systemd - https://github.com/systemd/systemd/releases/tag/v250
>
>     * The predictable naming logic for network interfaces has been extended
>       to generate stable names from Xen netfront device information.
>
> Mostly sharing to make others aware; most of my VMs will be fine but I have
> one critical firewall VM with a dozen network interfaces that's going to be
> ... interesting.

You can add the kernel boot option net.ifnames=0 to go back to eth0.

The reason systemd made that change is that in some cases where there are
multiple network interfaces, the order they are detected is not guaranteed
by the hardware. If that happens eth0 may switch with eth1.

Regards, Dave Hodgins


From xen-users-bounces@lists.xenproject.org Sun Jul 30 04:48:34 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 30 Jul 2023 04:48:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.572201.896120 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qPyLD-000346-R1; Sun, 30 Jul 2023 04:47:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 572201.896120; Sun, 30 Jul 2023 04:47:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qPyLD-00033H-JG; Sun, 30 Jul 2023 04:47:39 +0000
Received: by outflank-mailman (input) for mailman id 572201;
 Sun, 30 Jul 2023 04:47:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZGUX=DQ=gmail.com=cjcollier@srs-se1.protection.inumbo.net>)
 id 1qPyLC-00033B-Fr
 for xen-users@lists.xenproject.org; Sun, 30 Jul 2023 04:47:38 +0000
Received: from mail-pg1-x529.google.com (mail-pg1-x529.google.com
 [2607:f8b0:4864:20::529])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 33a5d8bc-2e94-11ee-8613-37d641c3527e;
 Sun, 30 Jul 2023 06:47:36 +0200 (CEST)
Received: by mail-pg1-x529.google.com with SMTP id
 41be03b00d2f7-55ba895d457so1989317a12.0
 for <xen-users@lists.xenproject.org>; Sat, 29 Jul 2023 21:47:36 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 33a5d8bc-2e94-11ee-8613-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20221208; t=1690692454; x=1691297254;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:from:to:cc:subject:date:message-id:reply-to;
        bh=vGCQbBRI8/WAnW+kjFz5XObCUkYGxVwnIAsWVJsGspg=;
        b=ZhUKZHoq/iKg6w3mn/9SIY0BUmc08E7AZHuiA33arpmJn/6xYemi3braWan8btXSQ7
         gvEQv659Sz8Zx44xuu0KlEL/+TL1NKUFacOFtNi56P1ZHdW5mjLPWvpaZns0Bwg4Ygim
         O2VK3WvVFVIpjelu2sxHwrEqtDH0AsoLOPkAeB86qeSiL8pkD+Os1lT9jQl5/leqYjqz
         P4adnwFEEKgmNPHHR/n+6tRTX+AlQAm9ePE+Lv4SjHcErQ8iqNm0ydyzbye5FYHuE7Vj
         CF4egfb75Cw2/NtuY0Ttcv2XqWaDIXqF6o9K4mxgGCWGNcSZp5A3ZReouEbD3oyYQmFt
         bNvw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1690692454; x=1691297254;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id
         :reply-to;
        bh=vGCQbBRI8/WAnW+kjFz5XObCUkYGxVwnIAsWVJsGspg=;
        b=d80M0UVBC+Yj4gcmA3Hon6TQ5TKefZvrALXnKIcDhgHoQ692jlYVonUMFKfmb81/Tc
         sbWeJ5OekOyxmS3i/zJXEJZvUndDVb24CdHtAZhuBhW28r/B96IHIzaqcGLz8xxOWKIW
         GTB1ngen3Co2icw4uJxYpdkdoyVekt1YaiZSb3v1G/XBjf0TU9zdVLGTxPLPn0RnVSnW
         f6uygdG6P8XsC9KMgmTnTozJ3TWtk7XzRHvVWsF7gLeoZETTuPIPLGo4ZPZhA8CGcWNL
         r9XtoxHBk7Y66K4HVTtnnTTd23uw/Rj4GgLG5hItcO4dzagaCno8IPVy2pXt60bK8oSu
         Yl+Q==
X-Gm-Message-State: ABy/qLYDU8UfBzM2bggoyqiuuZH6J7AiLBnGTMzk+z6B/58GSxY1im5M
	tN1g9nVAVl+a1PnuGsswxJj9e7PgeTGj1OQp97M=
X-Google-Smtp-Source: APBJJlGtb2h1iS2g4nbv1oUmXLiXMR1KPQFUk6MkwVs8VxTv0auzugOu49xQlaulP9ZSqzYesyj9eHA+dw/5vry4VZg=
X-Received: by 2002:a17:90a:f083:b0:268:c29:52ad with SMTP id
 cn3-20020a17090af08300b002680c2952admr5574361pjb.13.1690692454292; Sat, 29
 Jul 2023 21:47:34 -0700 (PDT)
MIME-Version: 1.0
References: <CADrndxOUfRKLEWBcSTzD6rqi2PRqVkCsx1-fL0SJtKDLk-0itg@mail.gmail.com>
 <op.18ui74eln7mcit@hodgins.homeip.net>
In-Reply-To: <op.18ui74eln7mcit@hodgins.homeip.net>
From: "C.J. Collier" <cjcollier@gmail.com>
Date: Sat, 29 Jul 2023 21:47:22 -0700
Message-ID: <CABoWg9W+AT8nqX2VUe6DfeWU7n2ZWTcbYmwoRpuUR2bLf5xAhw@mail.gmail.com>
Subject: Re: Debian Xen bookworm upgrade - vm interface naming scheme change
 from eth0 to enX0
To: "David W. Hodgins" <davidwhodgins@gmail.com>, "C.J. Collier" <cjac@colliertech.org>
Cc: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="00000000000029a3ba0601ad0317"

--00000000000029a3ba0601ad0317
Content-Type: text/plain; charset="UTF-8"

On Sat, Jul 29, 2023, 06:47 David W. Hodgins <davidwhodgins@gmail.com>
wrote:

> On Sat, 29 Jul 2023 08:02:02 -0400, Chris Myers <chrismyers81@gmail.com>
> wrote:
>
> > I upgraded my first Xen host to bookworm this morning. That seemed to go
> > fine (so far...it's only been online for an hour.)
> >
> > After upgrading the first VM to bookworm, the networking service wouldn't
> > start up. Looking at the logs it was because instead of being named eg.
> > "eth0", the interfaces are now named eg. "enX0".
> >
> > Doing some poking around on the internet, it seems to have been a change
> > with systemd - https://github.com/systemd/systemd/releases/tag/v250
> >
> >     * The predictable naming logic for network interfaces has been
> extended
> >       to generate stable names from Xen netfront device information.
> >
> > Mostly sharing to make others aware; most of my VMs will be fine but I
> have
> > one critical firewall VM with a dozen network interfaces that's going to
> be
> > ... interesting.
>
> You can add the kernel boot option net.ifnames=0 to go back to eth0.
>
> The reason systemd made that change is that in some cases where there are
> multiple network interfaces, the order they are detected is not guaranteed
> by the hardware. If that happens eth0 may switch with eth1.
>
> Regards, Dave Hodgins
>

Just because you can doesn't mean you should.  I would like to help you
move on to the new normal, if you're interested in that.  I have not used
interface names directly for a while.  You may review this config for
Debian ifupdown2.

https://web.c9h.org/~cjac/for-proxmox/interfaces

If I have more than one interface, I create a lacp bond across all similar
speed interfaces.  I then refer to bond0 or whatever the interface name is
rather than an individual interface.

For systems with a single interface, I will either hard code the interface
name into /etc/network/interfaces (replace any eth0 you have with the new
interface name), or create a bridge on the interface.

I also tend to be a heavy user of VLANs.  I like to think of each CIDR as
unique and exclusive on a given broadcast domain.

If you're curious about how to migrate to the new syntax, I recommend
taking a look at what is no longer referred to as the "iproute2 cheat sheet
<https://baturin.org/docs/iproute2/>":
Task-centered iproute2 user guide
<https://www.google.com/search?q=iproute2+cheat+sheet>
I'll include the content of the example interfaces file inline for
reference.


I recall using [1] to find the files which needed to have the eth0 replaced
with the new interface name.

[1] grep -rsil eth0 /etc


If you wanted to shoot from the hip, you could

sed -i -e 's/eth0/enp1s0/' $(grep -rsil eth0 /etc)


But I'd probably take a backup and do it in multiple steps if I were to do
it in production.  During a scheduled maintenance window.  After letting
your boss know ;-)

C.J.

__END__

auto lo
iface lo inet loopback

auto enp1s0
iface enp1s0 inet manual

auto enp2s0
iface enp2s0 inet manual

auto enp3s0
iface enp3s0 inet manual

auto enp4s0
iface enp4s0 inet manual

auto bond0
iface bond0 inet static
        bond-miimon 100
        bond-lacp-rate 1
        bond-mode 802.3ad
        bond-miimon 100
        bond-slaves regex (enp.s0)

auto vmbr0
iface vmbr0 inet static
        bridge-vlan-aware yes
        bridge-ports bond0
        bridge-stp on
        bridge-fd 0
        bridge-vids 78,79,101,179,201,279,401,600,601

auto int
iface int inet static
        address 100.64.79.64/24
        vlan-id 179
        vlan-raw-device vmbr0

auto biz
iface biz inet static
        address 23.REDACTED.200/26
        route 23.REDACTED.0/24 23.REDACTED.193
        vlan-id 101
        vlan-raw-device vmbr0

auto ha
iface ha inet static
      address 10.64.79.64/24
      vlan-id 279
      vlan-raw-device vmbr0

auto six
iface six inet static
        address 2602:REDACTED:1337::0.0.0.200/64
        gateway 2602:REDACTED:1337::1
        vlan-id 600
        vlan-raw-device vmbr0

--00000000000029a3ba0601ad0317
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"auto"><div><br><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sat, Jul 29, 2023, 06:47 David W. =
Hodgins &lt;<a href=3D"mailto:davidwhodgins@gmail.com" target=3D"_blank">da=
vidwhodgins@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex=
">On Sat, 29 Jul 2023 08:02:02 -0400, Chris Myers &lt;<a href=3D"mailto:chr=
ismyers81@gmail.com" rel=3D"noreferrer" target=3D"_blank">chrismyers81@gmai=
l.com</a>&gt; wrote:<br>
<br>
&gt; I upgraded my first Xen host to bookworm this morning. That seemed to =
go<br>
&gt; fine (so far...it&#39;s only been online for an hour.)<br>
&gt;<br>
&gt; After upgrading the first VM to bookworm, the networking service would=
n&#39;t<br>
&gt; start up. Looking at the logs it was because instead of being named eg=
.<br>
&gt; &quot;eth0&quot;, the interfaces are now named eg. &quot;enX0&quot;.<b=
r>
&gt;<br>
&gt; Doing some poking around on the internet, it seems to have been a chan=
ge<br>
&gt; with systemd - <a href=3D"https://github.com/systemd/systemd/releases/=
tag/v250" rel=3D"noreferrer noreferrer" target=3D"_blank">https://github.co=
m/systemd/systemd/releases/tag/v250</a><br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0* The predictable naming logic for network interfac=
es has been extended<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0to generate stable names from Xen netfront d=
evice information.<br>
&gt;<br>
&gt; Mostly sharing to make others aware; most of my VMs will be fine but I=
 have<br>
&gt; one critical firewall VM with a dozen network interfaces that&#39;s go=
ing to be<br>
&gt; ... interesting.<br>
<br>
You can add the kernel boot option net.ifnames=3D0 to go back to eth0.<br>
<br>
The reason systemd made that change is that in some cases where there are<b=
r>
multiple network interfaces, the order they are detected is not guaranteed<=
br>
by the hardware. If that happens eth0 may switch with eth1.<br>
<br>
Regards, Dave Hodgins<br></blockquote></div></div><div dir=3D"auto"><br></d=
iv><div dir=3D"auto">Just because you can doesn&#39;t mean you should.=C2=
=A0 I would like to help you move on to the new normal,=C2=A0if you&#39;re =
interested in=C2=A0that.=C2=A0 I have not used interface names directly for=
 a while.=C2=A0 You may review this config for Debian ifupdown2.</div><div =
dir=3D"auto"><br></div><div dir=3D"auto"><a href=3D"https://web.c9h.org/~cj=
ac/for-proxmox/interfaces">https://web.c9h.org/~cjac/for-proxmox/interfaces=
</a><br></div><div dir=3D"auto"><br></div><div>If I have more than one inte=
rface, I create a lacp bond across all similar speed interfaces.=C2=A0 I th=
en refer to bond0 or whatever the interface name is rather than an individu=
al interface.</div><div><br></div><div>For systems with a single interface,=
 I will either hard code the interface name into /etc/network/interfaces (r=
eplace any eth0 you have with the new interface name), or create a bridge o=
n the interface.</div><div><br></div><div>I also tend to be a heavy user of=
 VLANs.=C2=A0 I like to think of each CIDR as unique and exclusive on a giv=
en broadcast domain.=C2=A0=C2=A0</div><div><br></div><div>If you&#39;re cur=
ious about how to migrate to the new syntax, I recommend taking a look at w=
hat is no longer referred to as the &quot;<a href=3D"https://baturin.org/do=
cs/iproute2/">iproute2 cheat sheet</a>&quot;:</div><div><h1 id=3D"gmail-tas=
k-centered-iproute2-user-guide" style=3D"color:rgb(68,68,68);font-family:He=
lvetica,sans-serif;text-align:justify"><a href=3D"https://www.google.com/se=
arch?q=3Diproute2+cheat+sheet">Task-centered iproute2 user guide</a></h1></=
div><div>I&#39;ll include the content of the example interfaces file inline=
 for reference.</div><div dir=3D"auto"><br></div><div dir=3D"auto"><br></di=
v><div>I recall using [1]=C2=A0to find the files which needed to have the e=
th0 replaced with the new interface name.</div><div><br></div></div><blockq=
uote style=3D"margin:0 0 0 40px;border:none;padding:0px"><div dir=3D"auto">=
<div>[1] grep -rsil eth0 /etc</div></div></blockquote><div dir=3D"auto"><di=
v><br></div><div>If you wanted to shoot from the hip, you could</div><div><=
br></div></div><blockquote style=3D"margin:0 0 0 40px;border:none;padding:0=
px"><div dir=3D"auto"><div>sed -i -e &#39;s/eth0/enp1s0/&#39; $(grep -rsil =
eth0 /etc)</div></div></blockquote><div dir=3D"auto"><div dir=3D"auto"><br>=
</div><div>But I&#39;d probably take a backup and do it in multiple steps i=
f I were to do it in production.=C2=A0 During a scheduled maintenance windo=
w.=C2=A0 After letting your boss know ;-)</div><div><br></div><div>C.J.</di=
v><div><br></div><div>__END__</div><div dir=3D"auto"><pre style=3D"color:rg=
b(0,0,0)">auto lo
iface lo inet loopback

auto enp1s0
iface enp1s0 inet manual

auto enp2s0
iface enp2s0 inet manual

auto enp3s0
iface enp3s0 inet manual

auto enp4s0
iface enp4s0 inet manual

auto bond0
iface bond0 inet static
        bond-miimon 100
        bond-lacp-rate 1
        bond-mode 802.3ad
        bond-miimon 100
        bond-slaves regex (enp.s0)

auto vmbr0
iface vmbr0 inet static
        bridge-vlan-aware yes
        bridge-ports bond0
        bridge-stp on
        bridge-fd 0
        bridge-vids 78,79,101,179,201,279,401,600,601

auto int
iface int inet static
        address <a href=3D"http://100.64.79.64/24">100.64.79.64/24</a>
        vlan-id 179
        vlan-raw-device vmbr0

auto biz
iface biz inet static
        address 23.REDACTED.200/26
        route 23.REDACTED.0/24 23.REDACTED.193
        vlan-id 101
        vlan-raw-device vmbr0

auto ha
iface ha inet static
      address <a href=3D"http://10.64.79.64/24">10.64.79.64/24</a>
      vlan-id 279
      vlan-raw-device vmbr0

auto six
iface six inet static
        address 2602:REDACTED:1337::<a href=3D"http://0.0.0.200/64">0.0.0.2=
00/64</a>
        gateway 2602:REDACTED:1337::1
        vlan-id 600
        vlan-raw-device vmbr0</pre></div><div dir=3D"auto"><br></div><div d=
ir=3D"auto"><br></div><div dir=3D"auto"><br></div></div>
</div>

--00000000000029a3ba0601ad0317--


From xen-users-bounces@lists.xenproject.org Mon Jul 31 17:01:40 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 31 Jul 2023 17:01:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.573212.897730 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qQWGM-0006Pz-77; Mon, 31 Jul 2023 17:00:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 573212.897730; Mon, 31 Jul 2023 17:00:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1qQWGL-0006Nt-Vb; Mon, 31 Jul 2023 17:00:53 +0000
Received: by outflank-mailman (input) for mailman id 573212;
 Mon, 31 Jul 2023 17:00:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hQw6=DR=xenbits.xen.org=andrewcoop@srs-se1.protection.inumbo.net>)
 id 1qQWGK-00065P-TZ
 for xen-users@lists.xen.org; Mon, 31 Jul 2023 17:00:53 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c9733ee0-2fc3-11ee-b255-6b7b168915f2;
 Mon, 31 Jul 2023 19:00:47 +0200 (CEST)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qQWG3-0005vO-U3; Mon, 31 Jul 2023 17:00:35 +0000
Received: from andrewcoop by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <andrewcoop@xenbits.xen.org>)
 id 1qQWG3-0005s9-Ra; Mon, 31 Jul 2023 17:00:35 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: c9733ee0-2fc3-11ee-b255-6b7b168915f2
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=lUWaPx255xgy/Wk7+s6PWswBPC1EbIoBEW6g8Jveb5c=; b=gyU/QaVmZAbH/53SqCq0/iRHaX
	/Zx6EICQKuxcZqJ2L26VrYR47Le54MUEXkm+2NZ+CjwK6klpW9sQW3cRgBF5Mvoa0A3xNNZmtc0Cw
	qQkPuVnJhSJzc44IS9zV6jbIN8IUAosvgiJqlBf681rRqIS0AZWZEWf0nFC936ld7nh0=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 433 v3 (CVE-2023-20593) - x86/AMD: Zenbleed
Message-Id: <E1qQWG3-0005s9-Ra@xenbits.xenproject.org>
Date: Mon, 31 Jul 2023 17:00:35 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2023-20593 / XSA-433
                               version 3

                          x86/AMD: Zenbleed

UPDATES IN VERSION 3
====================

The patch provided with earlier versions was buggy.  It unintentionally
disable more bits than expected in the control register.  The contents of this
register is not generally known, so the effects on the system are unknown.

A patch correcting this error has been committed and backported to all stable
trees which got the XSA-433 fix originally.  Additionally, it is attached to
this advisory as xsa433-bugfix.patch, and applicable to all branches in this
form.

ISSUE DESCRIPTION
=================

Researchers at Google have discovered Zenbleed, a hardware bug causing
corruption of the vector registers.

When a VZEROUPPER instruction is discarded as part of a bad transient
execution path, its effect on internal tracking are not unwound
correctly.  This manifests as the wrong micro-architectural state
becoming architectural, and corrupting the vector registers.

Note: While this malfunction is related to speculative execution, this
      is not a speculative sidechannel vulnerability.

The corruption is not random.  It happens to be stale values from the
physical vector register file, a structure competitively shared between
sibling threads.  Therefore, an attacker can directly access data from
the sibling thread, or from a more privileged context.

For more details, see:
  https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
  https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8

IMPACT
======

With very low probability, corruption of the vector registers can occur.
This data corruption causes mis-calculations in subsequent logic.

An attacker can exploit this bug to read data from different contexts on
the same core.  Examples of such data includes key material, cypher and
plaintext from the AES-NI instructions, or the contents of REP-MOVS
instructions, commonly used to implement memcpy().

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

This bug is specific to the AMD Zen2 microarchitecture.  AMD do not
believe that other microarchitectures are affected.

MITIGATION
==========

This issue can be mitigated by disabling AVX, either by booting Xen with
`cpuid=no-avx` on the command line, or by specifying `cpuid="host:avx=0"` in
the vm.cfg file of all untrusted VMs.  However, this will come with a
significant impact on the system and is not recommended for anyone able to
deploy the microcode or patch described below.

RESOLUTION
==========

AMD are producing microcode updates to address the bug.  Consult your
dom0 OS vendor.  This microcode is effective when late-loaded, which can
be performed on a live system without reboot.

In cases where microcode is not available, the appropriate attached
patch updates Xen to use a control register to avoid the issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa433.patch           xen-unstable
xsa433-4.17.patch      Xen 4.17.x
xsa433-4.16.patch      Xen 4.16.x
xsa433-4.15.patch      Xen 4.15.x
xsa433-4.14.patch      Xen 4.14.x

xsa433-bugfix.patch    xen-unstable - Xen 4.14.x

$ sha256sum xsa433*
a9331733b63e3e566f1436a48e9bd9e8b86eb48da6a8ced72ff4affb7859e027  xsa433.patch
6f1db2a2078b0152631f819f8ddee21720dabe185ec49dc9806d4a9d3478adfd  xsa433-4.14.patch
ca3a92605195307ae9b6ff87240beb52a097c125a760c919d7b9a0aff6e557c0  xsa433-4.15.patch
e5e94b3de68842a1c8d222802fb204d64acd118e3293c8e909dfaf3ada23d912  xsa433-4.16.patch
41d12104869b7e8307cd93af1af12b4fd75a669aeff15d31b234dc72981ae407  xsa433-4.17.patch
b197e45aef1f47b6aebc005f876e3f593c2f32b9e5164a195f487cea6e174f75  xsa433-bugfix.patch
$

NOTE CONCERNING TIMELINE
========================

This issue is subject to coordinated disclosure on August 8th.  The
discoverer chose to publish details ahead of this timeline.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmTH6HQMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZlIoH/jv0CJKyFgiaOLp4DFeLfzKLHJDbLKywj0bv4Q3V
wgrWVYwzVbpPwvuArS1dOujgEosTiUggKbzDPEpHa5reVKeeLwCBFxMrU+KYRf9h
6eglOJfiW73xxyggnvQLyh3tEGY0sQF0+OFQMsN5twiXsZS0pxLPomq0slun1VkV
8ZDl4FKjmEmAurE7fOtVdvzwZ6tKVLNaGYIm4wUwNZ0Cd4qo1GHIHsvUT9ZPFc82
jwMjCwk7Ca0Iv1GMyXESwOyR/0tLm07nT9isdkXcVFNgg8JL4f2CxGK9Vt97POEw
w9KVo3SoBf+/vY4Fk4HGSXieEofzVBDjO5NkPhESEC+3oMw=
=Z3fJ
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa433.patch"
Content-Disposition: attachment; filename="xsa433.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.14.patch"
Content-Disposition: attachment; filename="xsa433-4.14.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.15.patch"
Content-Disposition: attachment; filename="xsa433-4.15.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.16.patch"
Content-Disposition: attachment; filename="xsa433-4.16.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-4.17.patch"
Content-Disposition: attachment; filename="xsa433-4.17.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa433-bugfix.patch"
Content-Disposition: attachment; filename="xsa433-bugfix.patch"
Content-Transfer-Encoding: base64
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--=separator--


