Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp30216rwb; Wed, 7 Dec 2022 14:01:29 -0800 (PST) X-Google-Smtp-Source: AA0mqf4iMGvHHqbsEXD3cgRNt3ayNJwphL+cpzakwEpXaKXMjApKnnaV5N/X3yPlyZwErYO1y+xf X-Received: by 2002:a05:6402:1655:b0:46a:80cc:d5bd with SMTP id s21-20020a056402165500b0046a80ccd5bdmr55892852edx.210.1670450489681; Wed, 07 Dec 2022 14:01:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670450489; cv=none; d=google.com; s=arc-20160816; b=g/iK9P1psLg8mHja2Z1nk/PW9KpYjfC2lk5YQBxvKZtkJIIcEwl6Drid8RpEq/mxhe 3gI2TPRRLLXMa4/6xYjDbVxLOHqhHnInXxx+e50Vii7/Xn2WuFTujm8V1Jcy3aI+hrVb c2dorT+jeXVXxHTfkuoJvD/1uWRxokcrCvfgeh3dOAdDTh3S/M3qsyXE9mEj2lVY/gtg R93DOFfHX1CGVy2Y3TwaehXJov9t0Zkd6NoNjm9N3vuGD1wm1ExjO/z/9zLfAuq7abga 7PAb+vJdXWHpmIKdYCZmN58hYpWTZsYmzfdPRATHQ/eQaQ7KaWRZZwfRagWyCKZHnNKA rnMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:subject:cc:to:from :content-language:user-agent:mime-version:date:message-id :dkim-signature; bh=pnyuZgFg+xcx2S/BcdnBd13596bj5i02+Xe9V15Zwwk=; b=0Jnput0T8CpaL2JBqZvfw6No2SBopFyWLH5kZYT6zv++NGVef1kxaZA14Eu/2iA3gr YiJ/FpHWOIRx4hBk6AUcIzWNueEEkFiQn+Kfg51r1FJM7HVcb5evFs3Jb1de2JuTjYsl PjDPXii8SWItzfOuGi7nzBghWeGsYlQfqskHsbuv1NJfM+NQrt1bM3rgNf9f+/OiIuJy rYT+op9lzYJd5/E2qtkZHPUPnjqmdf0IMPkEwWIGsrUSb+Iin1A08VwbtzyHvqFB/m6K r4kFlx2BBrGClWIu+KtC/hwYHgUltbXOrvkY4n8/gWCH3tRW4/kiQqv91e3apQgEetky WdyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@eikelenboom.it header.s=20180706 header.b=hPSvu2SM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=eikelenboom.it Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d16-20020a50fb10000000b0045eec876883si4453379edq.229.2022.12.07.14.01.07; Wed, 07 Dec 2022 14:01:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@eikelenboom.it header.s=20180706 header.b=hPSvu2SM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=eikelenboom.it Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229703AbiLGVm5 (ORCPT + 75 others); Wed, 7 Dec 2022 16:42:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34754 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229564AbiLGVm4 (ORCPT ); Wed, 7 Dec 2022 16:42:56 -0500 Received: from server.eikelenboom.it (server.eikelenboom.it [91.121.65.215]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C1D5361741 for ; Wed, 7 Dec 2022 13:42:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=eikelenboom.it; s=20180706; h=Content-Transfer-Encoding:Content-Type: Subject:Cc:To:From:MIME-Version:Date:Message-ID:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=pnyuZgFg+xcx2S/BcdnBd13596bj5i02+Xe9V15Zwwk=; b=hPSvu2SMPFMrCBWzQxVSPHyrXR 0bDNGNoTgJbGkbcTTvEzH6E1G0lfO16Yi9l4Pu1UAyfXKNjKUGwi+gxPSEAs8RgH0p0BGOuoEQhq3 Yg1bbRfT/3PuhUcgBo6WwVIZnTWEyWlbI9wpAcvoq9H8erI44n8bUlV6sNHRwP2vd8tA=; Received: from 131-195-250-62.ftth.glasoperator.nl ([62.250.195.131]:37498 helo=[172.16.1.50]) by server.eikelenboom.it with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from ) id 1p32Cr-00080a-64; Wed, 07 Dec 2022 22:43:57 +0100 Message-ID: <2f364567-3598-2d86-ae3d-e0fabad4704a@eikelenboom.it> Date: Wed, 7 Dec 2022 22:42:45 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 Content-Language: nl-NL, en-US From: Sander Eikelenboom To: Ross Lagerwall , Juergen Gross , Xen-devel , Paul Durrant Cc: linux-kernel@vger.kernel.org, netdev Subject: Xen + linux 6.1.0-rc8, network to guest VM not working after commit ad7f402ae4f466647c3a669b8a6f3e5d4271c84a fixing XSA-423 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,HEXHASH_WORD,SPF_HELO_PASS, SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ross / Juergen, I just updated my linux kernel to the latest of Linus his tree which included commit ad7f402ae4f466647c3a669b8a6f3e5d4271c84a fixing XSA-423. Unfortunately when using this kernel I can't SSH anymore into the Xen guest I start, but I don't see any apparent failures either. A straight revert of the commit ad7f402ae4f466647c3a669b8a6f3e5d4271c84a makes networking function normally again. I have added some of the logging below, perhaps it at gives some idea off the state around the Xen network front and backend. Any ideas or a test patch that I could run to shed some more light on what is going on ? -- Sander Some of the logging from dom0 dmesg: [ 149.520585] xen_bridge: port 1(vif1.0) entered blocking state [ 149.520594] xen_bridge: port 1(vif1.0) entered disabled state [ 149.520678] device vif1.0 entered promiscuous mode [ 151.221975] xen-blkback: backend/vbd/1/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants [ 151.601458] vif vif-1-0 vif1.0: Guest Rx ready [ 151.601476] xen_bridge: port 1(vif1.0) entered blocking state [ 151.601478] xen_bridge: port 1(vif1.0) entered forwarding state output xenstore-ls regarding vif for the Guest: vif = "" 1 = "" 0 = "" bridge = "xen_bridge" feature-ctrl-ring = "1" feature-dynamic-multicast-control = "1" feature-gso-tcpv4 = "1" feature-gso-tcpv6 = "1" feature-ipv6-csum-offload = "1" feature-multicast-control = "1" feature-rx-copy = "1" feature-rx-flip = "0" feature-sg = "1" feature-split-event-channels = "1" feature-xdp-headroom = "1" frontend = "/local/domain/1/device/vif/0" frontend-id = "1" handle = "0" hotplug-status = "connected" ip = "192.168.1.6" mac = "00:16:3e:49:0e:fa" multi-queue-max-queues = "8" online = "1" script = "/etc/xen/scripts/vif-bridge" state = "4" type = "vif" vif = "" 0 = "" backend = "/local/domain/0/backend/vif/1/0" backend-id = "0" event-channel-rx = "9" event-channel-tx = "8" feature-gso-tcpv4 = "1" feature-gso-tcpv6 = "1" feature-ipv6-csum-offload = "1" feature-rx-notify = "1" feature-sg = "1" handle = "0" mac = "00:16:3e:49:0e:fa" mtu = "1500" multi-queue-num-queues = "1" request-rx-copy = "1" rx-ring-ref = "524" state = "4" trusted = "1" tx-ring-ref = "523" xdp-headroom = "0" ifconfig output for the guest interface on dom0 side: vif1.0: flags=4163 mtu 1500 ether fe:ff:ff:ff:ff:ff txqueuelen 32 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 49 bytes 2058 (2.0 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0