From xen-users-bounces@lists.xenproject.org Sat Apr 01 21:11:47 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 01 Apr 2023 21:11:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.517180.802297 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1piiUx-0001JJ-Ac; Sat, 01 Apr 2023 21:10:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 517180.802297; Sat, 01 Apr 2023 21:10:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1piiUx-0001If-5C; Sat, 01 Apr 2023 21:10:55 +0000
Received: by outflank-mailman (input) for mailman id 517180;
 Sat, 01 Apr 2023 21:10:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yPnZ=7Y=gmail.com=chrismyers81@srs-se1.protection.inumbo.net>)
 id 1piiUv-0001IZ-0b
 for xen-users@lists.xenproject.org; Sat, 01 Apr 2023 21:10:53 +0000
Received: from mail-ua1-x92a.google.com (mail-ua1-x92a.google.com
 [2607:f8b0:4864:20::92a])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id abbb7ccf-d0d1-11ed-b464-930f4c7d94ae;
 Sat, 01 Apr 2023 23:10:49 +0200 (CEST)
Received: by mail-ua1-x92a.google.com with SMTP id h34so18416104uag.4
 for <xen-users@lists.xenproject.org>; Sat, 01 Apr 2023 14:10:47 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: abbb7ccf-d0d1-11ed-b464-930f4c7d94ae
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112; t=1680383446;
        h=cc:subject:message-id:date:from:in-reply-to:references:mime-version
         :from:to:cc:subject:date:message-id:reply-to;
        bh=wa3+Xmg30hp8pwUtru9+Lp2t/mV7/Zbbq/7Y4ukCt+Q=;
        b=NGyKT7577JYJ1QokG1kTVO2ydeffntXAx9cY2fXia6Lqvg1Rstb7mUwFao7upCeYqs
         N+f9jv7PyhxmUrGgU5I3a/q0IoJqf87IUod3RMEtlCfvMNoVVy4IybKe9IfMPc0yIvbS
         kggiwL7Tw/n/mDaUml03jqmfXn+lCQWSPeVxgnGS8hgO0xezsInJSE4/5wEUX0OlOCKp
         a3IlFQfQ/9ei3UUZ8fJjtAn9M6sYU+PNfnq3RivAXyF1Q13wtUrLjlPwZwSRMl5GapJO
         +s+lES/itWTb4Cu0Z/q2M6MlBJoO+I3bBaX4r/5DhpjZPu5SPkUBQYjKF1oeRwBVyKp4
         YroQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112; t=1680383446;
        h=cc:subject:message-id:date:from:in-reply-to:references:mime-version
         :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
        bh=wa3+Xmg30hp8pwUtru9+Lp2t/mV7/Zbbq/7Y4ukCt+Q=;
        b=vyUlN/CsCuacWOjN/bTQBWECwmC88Er2k2UINM3VytUxqWIfMy5nCFctl9yQ1k/w85
         DXS6qlh7yF/yZVI9LKzYdpS9vrpa4o5NWvIvz8cbDTlnuJ4Yw97djGjcknyio21oKnes
         5UZ1ZW72QAYOvt4+dUJF6dCiRaOsvZeAwoj/izdu9aRKszc+vfZbmFMMsZ9uEGOQsKKv
         b57YPdosx9/xnZMSAREBSYGvqf20ij8xwJaKQ/BH+zMBo+CX0BoSHSM0XaoDWK/f1u67
         psuP+VS1/ap5qLG5BSGT7q+qlvEFoqUCWAauEys6wYYLTjQCoYOPNHmOUr8dxj8+eLBM
         v0LQ==
X-Gm-Message-State: AAQBX9dGQuoDTxLsTcZsTFVW5Wg04HEvI9/DLMHgNFiueYDVs4DxbfkS
	EN/e77fhyNtPZQRwA67cCloORH9iMkQLuBKdoQr8BT2Hf4A=
X-Google-Smtp-Source: AKy350ZbnzhQZD6TPg1euYivqE//6PAfG0wkQSkcwsE0/WxNF1YNTlUK1Z16B1gu/aWEdv90H2bYpgAWsmqkATKxTlI=
X-Received: by 2002:a05:6130:215:b0:688:d612:2024 with SMTP id
 s21-20020a056130021500b00688d6122024mr24112905uac.2.1680383445960; Sat, 01
 Apr 2023 14:10:45 -0700 (PDT)
MIME-Version: 1.0
References: <CAJp3iRPQhuObwwofN-Br0EUq==nJnxSOVb2cwBvMDjLdwv1JYw@mail.gmail.com>
 <CA+zSX=bKjjytdKgbQgjdsrYz6GOVEBBQ0dr4Bm81cJREM95DGw@mail.gmail.com> <CAJp3iROzW8AzsqNq9A3CiFzuHaGZ4h_D67wTGX7g2T4bz8D85Q@mail.gmail.com>
In-Reply-To: <CAJp3iROzW8AzsqNq9A3CiFzuHaGZ4h_D67wTGX7g2T4bz8D85Q@mail.gmail.com>
From: Chris Myers <chrismyers81@gmail.com>
Date: Sat, 1 Apr 2023 16:10:33 -0500
Message-ID: <CADrndxNxE8DN0dzpKNGrz9VZ4z1G=ugv2NSOzq-2G234gj+KBA@mail.gmail.com>
Subject: Web GUI/management tool recommendations
Cc: xen-users@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000620d8d05f84cc24c"

--000000000000620d8d05f84cc24c
Content-Type: text/plain; charset="UTF-8"

Out of curiosity, does anyone have a preferred web-based GUI they like to
use, or a vcenter-esque management tool they can recommend? I've done an
extensive amount of web searches, but most seem to just be for xenserver et
al, not regular Xen itself. I currently have four hypervisors connected to
a shared iscsi SAN and am looking for a cleaner way to manage my growing
list of VMs versus sshing into the different boxes and migrating things
around that way. I love running everything paravirt which things like xcpng
don't seem to support, plus regular xen on Debian just plain works, and
works really well.

--000000000000620d8d05f84cc24c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Out of curiosity, does anyone have a preferred web-based =
GUI they like to use, or a vcenter-esque management tool they can recommend=
? I&#39;ve done an extensive amount of web searches, but most seem to just =
be for xenserver et al, not regular Xen itself. I currently have four hyper=
visors connected to a shared iscsi SAN and am looking for a cleaner way to =
manage my growing list of VMs versus sshing into the different boxes and mi=
grating things around that way. I love running everything paravirt which th=
ings like xcpng don&#39;t seem to support, plus regular xen on Debian just =
plain works, and works really well.=C2=A0</div>

--000000000000620d8d05f84cc24c--


From xen-users-bounces@lists.xenproject.org Tue Apr 11 14:32:02 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 11 Apr 2023 14:32:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.519670.806642 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1pmF1l-00062F-KB; Tue, 11 Apr 2023 14:31:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 519670.806642; Tue, 11 Apr 2023 14:31:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1pmF1l-000624-Fi; Tue, 11 Apr 2023 14:31:21 +0000
Received: by outflank-mailman (input) for mailman id 519670;
 Tue, 11 Apr 2023 14:31:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IUcF=AC=hotmail.com=pharcellus@srs-se1.protection.inumbo.net>)
 id 1pmF1k-00061y-3p
 for xen-users@lists.xenproject.org; Tue, 11 Apr 2023 14:31:20 +0000
Received: from NAM11-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam11olkn20800.outbound.protection.outlook.com
 [2a01:111:f400:7eae::800])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 84677e4e-d875-11ed-8611-37d641c3527e;
 Tue, 11 Apr 2023 16:31:17 +0200 (CEST)
Received: from BN8PR06MB6273.namprd06.prod.outlook.com (2603:10b6:408:52::32)
 by SN6PR06MB4351.namprd06.prod.outlook.com (2603:10b6:805:b3::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6277.36; Tue, 11 Apr
 2023 14:31:14 +0000
Received: from BN8PR06MB6273.namprd06.prod.outlook.com
 ([fe80::c27:b4f2:e58b:3020]) by BN8PR06MB6273.namprd06.prod.outlook.com
 ([fe80::c27:b4f2:e58b:3020%3]) with mapi id 15.20.6277.038; Tue, 11 Apr 2023
 14:31:14 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 84677e4e-d875-11ed-8611-37d641c3527e
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Aw12mV8OeDfO30wcXATZHYcjEK2aAxVOyx1e+1gk9weK+k0tFMksIuLwcVIzzxmeTEC0HHma7vUOT7QdlA7SQdrXFOm88hB8c5E8Ob+gnyCtrXNn1QLJNP5fb7Hp+dfP50c7C8A1sIv2jX6u5OwRS/ogYHkX984z+e8BjHHOkkGUoeJMZbZG1CMqnQ0h4ye2ibrKG4Mlc3uhaa5KlxjYMhtMyiB/fQ6Ia2lZVSQsHCZw4QN5Ol6nTHWRYSf4NnJbFx1TgFwbvGLqtOBp6ngzDAPwz9isPJFqBI9FdePEPiUb0yKwa6FQRXqgoGEWLez8XPc94qiDY/JtWqqHnAzU9g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lUKGc+UVlHS71mgVbTMKKRUbUN8CtTxmp9+oH0OIpOc=;
 b=fjvMoJeh/YHIxGTnykM/5RP8IrpRpr6eDYhZWe/O5GyGoz3MMEShtBIFluw34aAJavGTFkggAUoe5xO9kaVmlDp+H80UiZG2vcu2CpwIsONXz8SxVyTzwCwGDmVyP1CJ3wwPuzH2ItsQqc/QgVdxd6rsYgR54OVw3a1ifcS/0smV4HkjvHq2LqJmrqhC6ELL1fp9haytC1rnxSIn5Zp4HwOz5VjeRIThbDJXmOzJw3kzh4Ufl2BBfeQGYpHMPYgVPnpT8+kGYlKj/IlEz9u/rXNJJYYl8FV//1bdfTe6+OkOeiQPZu7raLyw2XKSV2+GAOignWQKJCjEfUAZjsJMDA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none;
 dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hotmail.com;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lUKGc+UVlHS71mgVbTMKKRUbUN8CtTxmp9+oH0OIpOc=;
 b=S9k3m4gjriUtavg0O9UtSJGxpy3gY2iMotHMFvQhYa6LHH6HZdn/uhyvGAhWNR7S57UxBM5/J71NlVRm49P8WkVApOpNCSigYIOpAyH50zv6LD/m7ZzVEykBt23NBmG7ldq49JrBCOhJeNZ/GqrHfHapIifxaVGXsovw9C33kvvObfTqYxYsSa5zwnvV0YUaK4Plx/Vi5tmua0jLDKbiMExkXCE96oTJEBWoVn+9UDD5n7y/ABm/3Psongt2FObYzfMkNt3jMivfaWEW/Qae0PaWrxGEt6CYQui3qppgpkr3ReZg9496QMFsZVw8dLKUbqs0cHQ4qUCbFkyybGl3yA==
From: "Maltavorn ." <pharcellus@hotmail.com>
To: "xen-users@lists.xenproject.org" <xen-users@lists.xenproject.org>
Subject: Attempting PCI Passthrough, OVMF hang for guest
Thread-Topic: Attempting PCI Passthrough, OVMF hang for guest
Thread-Index: AQHZbIEHM8QoZrnlukSxwPLj5IIXMg==
Date: Tue, 11 Apr 2023 14:31:14 +0000
Message-ID:
 <BN8PR06MB6273A4CDFD5E5F7B3E93FC81C49A9@BN8PR06MB6273.namprd06.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-tmn: [vqYtXMvZymKpV9qJR9akBeWCdIL/csKi]
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN8PR06MB6273:EE_|SN6PR06MB4351:EE_
x-ms-office365-filtering-correlation-id: ea4e6e21-f5d9-458f-fc28-08db3a996789
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 Rr4Y5ydQ4awM9y12SkLvfeyGSHz/PDsH8KF9DqgFx5DnVojs+cQ7U6BW19ZUd6s0wa/FNR3x/cZysl0Ax1JGdaUrS1eMTjJ4g04+7Tj6O0nON1N5oQUtzF7EZ6hb3TmrW9S0SlaO39OgQO3GdcM1GmKChg+x6uFknZzU5r8bEV+zuqOLGOygUbldWNNkPJMedBk+lmWnlVCsHwimZP4e82vKqJHF1P+MXXa2caPul3l9RXWspvz8Asl+osoKeaeyAJWBn+wTwfI+VdLm8p7q84H9qZeuzBzzoCK/BJLGMpGANZ7rh6EGHIFp08yWMnNJrilpslxgmjjjHONFqi9OIYZIEkDk+k1U8qIUTp/lvM1f0Rv+qqJg2z39FktOcP8+hOW8iErcZlLgA7uafC+XU+38qzl4cwjJeDQmiFKxwrBf9R18B8IRojW3pU6Eby7tyrSoBCjSP3c6z8uFwGzxVG+ur7OUyEyzqePc1/6ML+jUK9IjwYGybyqoqk1OlkpmHjrvGHpgZftpAExKZSZDvNRfeiFdrVlD74yXWi8NbWBrW5u+IvsIhwhfDnpCQJMGPpKnEjRVZGQOgwEOVU96799ck88KDPk3PyYEgUsbYaBgOTHRkep1la+FI4xuayqSFp8s3ZqlGTzonzTdtlPBHg==
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?iso-8859-1?Q?URN1K4PQD3EaTyKt/JHMZtqqonTx5TMxdEUfa0z5wRQooOKmmAdF++SPyQ?=
 =?iso-8859-1?Q?uqXJ+BQQQgZlbmHxGWEKiZhOEz82/INl+uzjklyYCPlAuUxcb1BokNXocc?=
 =?iso-8859-1?Q?3MO9FD2ppVKDMEVextUfZLOH2JRZUf1OfE2d9yzZjxS+wH8eya4likgaPb?=
 =?iso-8859-1?Q?z9wIZ6gTpjil4+0pyyqJtIsqWiPYZ6C3ZQDbQjPDVVhk2c5LRFquOWGl/o?=
 =?iso-8859-1?Q?6zrTL5B/v+uC94lY5vecT7Ir8jaczd6y+wuQzo0UtGhfqfWktKYCdyUJAZ?=
 =?iso-8859-1?Q?+ue80JzLRsEmwdAEnuzBa+ETDz21zpfeaKfPsanMiPZVuoS4ABV8DpgY2w?=
 =?iso-8859-1?Q?HJP1GtWlzi5XM63gVwA7YAPY7RqnOsQ0cIxiHhoq/vggIFu3uqLbNqC5oW?=
 =?iso-8859-1?Q?/TOL1aYpeQuo9625NHA5EidABUbHedKQmjybDf5RP75Y5j63fUtmz9ttDm?=
 =?iso-8859-1?Q?2gVrsVJz8LzwUKZSBL2yW3zgh6RRveQzlIigp6LFJxEhciTYsqg+8xX7Wc?=
 =?iso-8859-1?Q?MLKKjdUkhFAa/ZCW0eKAMNKZ//bTRdpbws7BDyhSgORRL3JpL8ygXpkcKQ?=
 =?iso-8859-1?Q?UkYntusSfNdsTKqpy1ukyaucIxQEVAvShzHG/AcWiaIB6Hw1e33bR2UYJ5?=
 =?iso-8859-1?Q?e5G4bAhqyFpN0Eg5LTLGPCHI3M6yruhL1++ArHWn/U74KfLayENive1ben?=
 =?iso-8859-1?Q?qeUTJ+05utFrov38QYBq8fl3de37FkT9fvQsdSeqDDa4/z4kdc+2FmZvQp?=
 =?iso-8859-1?Q?oRjNgiFEJHNTuJ0h+eGW/eT7Ju5iPfnJQXw4NdG5VK/1TbhDqv7UG1dne1?=
 =?iso-8859-1?Q?agB+zZgVTTfouwX7MmU0OjaNe19uMwVNlcU5tByHKl5MKoR8om1XyUOyYS?=
 =?iso-8859-1?Q?n9cGHmSQcs7hBs7Kapkt1PUzQqHbvC9icWMXgKwWxJAlDQ+ck+ZwRraYHr?=
 =?iso-8859-1?Q?Tqii422oJcF0V/dCpe/kyj6c4/oYHUsTJiALqrixf9P7NvbqLkZhQgiHNX?=
 =?iso-8859-1?Q?m4intWXhMTdBRttW704R1/7AbE/md5PYiJq3HJATluM5uVa/gvsNG9+TyJ?=
 =?iso-8859-1?Q?dNrFPAXHQL7e0dlU8doFNhIT4IN5+UZgUTBnPrc/X2/ICalbBF7e5WimBA?=
 =?iso-8859-1?Q?SgrAamBfcFkQ2bSFzFtvXa999xFQyEVCF5Q8vHMbzHQvlqdM9u8NHOJbR5?=
 =?iso-8859-1?Q?Zk0KLLxWqzO+eAsbiFxZjkffiNkU4BUlWTPARONGTk8wvhgxM1FjfHQM30?=
 =?iso-8859-1?Q?HX6FynMSpAm2cp6+pKQw=3D=3D?=
Content-Type: multipart/alternative;
	boundary="_000_BN8PR06MB6273A4CDFD5E5F7B3E93FC81C49A9BN8PR06MB6273namp_"
MIME-Version: 1.0
X-OriginatorOrg: sct-15-20-4755-11-msonline-outlook-89723.templateTenant
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN8PR06MB6273.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-Network-Message-Id: ea4e6e21-f5d9-458f-fc28-08db3a996789
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Apr 2023 14:31:14.4141
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR06MB4351

--_000_BN8PR06MB6273A4CDFD5E5F7B3E93FC81C49A9BN8PR06MB6273namp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Greetings,

I've been wrestling with a Xen 4.15.3 install for a few weeks now, and have=
 resolved a number of issues to get to where I am at, but it seems I've hit=
 a brick wall.

I'm trying to do VGA passthrough to a Windows 10 guest (domO is on CentOS 7=
), and no matter what device I attempt to pass through (and I have put it o=
n the linux startup line in xen-pciback.hide, or added it via xl pci-assign=
able-add, and confirmed it is added to the pciback driver), when I launch t=
he guest, it hangs during OVMF startup. I have managed to build a debug-ena=
ble version of OVMF for the version included in the Xen4CentOS repo for 4.1=
5, and have obtained OVMF logs. The final lines of the log where the firmwa=
re hangs are:

ProtectUefiImageCommon - 0xEF013040
  - 0x00000000EF8FA000 - 0x000000000000CC60
Select Item: 0x0
FW CFG Signature: 0xFFFFFFFF
Select Item: 0x1
FW CFG Revision: 0xFFFFFFFF
QemuFwCfg interface not supported.
InitRootBridge: populated root bus 0, with room for 0 subordinate bus(es)
RootBridge: PciRoot(0x0)
  Support/Attr: 7007F / 7007F
    DmaAbove4G: No
NoExtConfSpace: Yes
     AllocAttr: 0 ()
           Bus: 0 - 0 Translation=3D0
            Io: C000 - C22F Translation=3D0
           Mem: F0000000 - F30550FF Translation=3D0
    MemAbove4G: 383FF3050000 - 383FF3053FFF Translation=3D0
          PMem: FFFFFFFFFFFFFFFF - 0 Translation=3D0
   PMemAbove4G: FFFFFFFFFFFFFFFF - 0 Translation=3D0
Length(0x3055100) is not aligned!
PciHostBridge driver failed to set EFI_MEMORY_UC to MMIO aperture - Unsuppo=
rted.

ASSERT_EFI_ERROR (Status =3D Not Found)
ASSERT /root/rpmbuild/BUILD/edk2/MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciH=
ostBridge.c(336): !EFI_ERROR (CheckStatus)


Here's the full OVMF debug log: https://pastebin.com/tudn1qKt and here's th=
e hypervisor log for the session: https://pastebin.com/KjtPJWHH . The last =
domU run in it is one that generated the OVMF log.

Thank you for any advice on the issue!

--_000_BN8PR06MB6273A4CDFD5E5F7B3E93FC81C49A9BN8PR06MB6273namp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none;"> P {margin-top:0;margin-bo=
ttom:0;} </style>
</head>
<body dir=3D"ltr">
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof">
Greetings,</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof">
<br>
</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof">
I've been wrestling with a Xen 4.15.3 install for a few weeks now, and have=
 resolved a number of issues to get to where I am at, but it seems I've hit=
 a brick wall.</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof">
<br>
</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof">
I'm trying to do VGA passthrough to a Windows 10 guest (domO is on CentOS 7=
), and no matter what device I attempt to pass through (and I have put it o=
n the linux startup line in xen-pciback.hide, or added it via xl pci-assign=
able-add, and confirmed it is added
 to the pciback driver), when I launch the guest, it hangs during OVMF star=
tup. I have managed to build a debug-enable version of OVMF for the version=
 included in the Xen4CentOS repo for 4.15, and have obtained OVMF logs. The=
 final lines of the log where the
 firmware hangs are:</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof">
<br>
</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof ContentPasted1">
ProtectUefiImageCommon - 0xEF013040
<div class=3D"ContentPasted1">&nbsp; - 0x00000000EF8FA000 - 0x000000000000C=
C60</div>
<div class=3D"ContentPasted1">Select Item: 0x0</div>
<div class=3D"ContentPasted1">FW CFG Signature: 0xFFFFFFFF</div>
<div class=3D"ContentPasted1">Select Item: 0x1</div>
<div class=3D"ContentPasted1">FW CFG Revision: 0xFFFFFFFF</div>
<div class=3D"ContentPasted1">QemuFwCfg interface not supported.</div>
<div class=3D"ContentPasted1">InitRootBridge: populated root bus 0, with ro=
om for 0 subordinate bus(es)</div>
<div class=3D"ContentPasted1">RootBridge: PciRoot(0x0)</div>
<div class=3D"ContentPasted1">&nbsp; Support/Attr: 7007F / 7007F</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp; DmaAbove4G: No</div>
<div class=3D"ContentPasted1">NoExtConfSpace: Yes</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp; &nbsp;AllocAttr: 0 ()</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Bus:=
 0 - 0 Translation=3D0</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Io:=
 C000 - C22F Translation=3D0</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Mem:=
 F0000000 - F30550FF Translation=3D0</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp; MemAbove4G: 383FF3050000 - 383F=
F3053FFF Translation=3D0</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; PMem: FFFF=
FFFFFFFFFFFF - 0 Translation=3D0</div>
<div class=3D"ContentPasted1">&nbsp; &nbsp;PMemAbove4G: FFFFFFFFFFFFFFFF - =
0 Translation=3D0</div>
<div class=3D"ContentPasted1">Length(0x3055100) is not aligned!</div>
<div class=3D"ContentPasted1">PciHostBridge driver failed to set EFI_MEMORY=
_UC to MMIO aperture - Unsupported.</div>
<div><br class=3D"ContentPasted1">
</div>
<div class=3D"ContentPasted1">ASSERT_EFI_ERROR (Status =3D Not Found)</div>
<div class=3D"ContentPasted1">ASSERT /root/rpmbuild/BUILD/edk2/MdeModulePkg=
/Bus/Pci/PciHostBridgeDxe/PciHostBridge.c(336): !EFI_ERROR (CheckStatus)</d=
iv>
<br>
</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof">
<br>
</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof ContentPasted0">
Here's the full OVMF debug log: https://pastebin.com/tudn1qKt and here's th=
e hypervisor log for the session:
<a href=3D"https://pastebin.com/KjtPJWHH" id=3D"LPlnk242185">https://pasteb=
in.com/KjtPJWHH</a> . The last domU run in it is one that generated the OVM=
F log.</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof ContentPasted0">
<br>
</div>
<div style=3D"font-family: Calibri, Helvetica, sans-serif; font-size: 12pt;=
 color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class=3D"eleme=
ntToProof ContentPasted0">
Thank you for any advice on the issue!<br>
</div>
</body>
</html>

--_000_BN8PR06MB6273A4CDFD5E5F7B3E93FC81C49A9BN8PR06MB6273namp_--


From xen-users-bounces@lists.xenproject.org Tue Apr 11 15:42:45 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 11 Apr 2023 15:42:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.519707.806662 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1pmG8D-0005ZJ-4k; Tue, 11 Apr 2023 15:42:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 519707.806662; Tue, 11 Apr 2023 15:42:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1pmG8D-0005ZA-21; Tue, 11 Apr 2023 15:42:05 +0000
Received: by outflank-mailman (input) for mailman id 519707;
 Tue, 11 Apr 2023 14:54:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Ji6D=AC=tomli.me=tomli@srs-se1.protection.inumbo.net>)
 id 1pmFNh-0000le-UH
 for xen-users@lists.xenproject.org; Tue, 11 Apr 2023 14:54:01 +0000
Received: from tomli.me (tomli.me [31.220.7.45])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id b0d98b0a-d878-11ed-8611-37d641c3527e;
 Tue, 11 Apr 2023 16:53:59 +0200 (CEST)
Received: from tomli.me (localhost [127.0.0.1])
 by tomli.me (OpenSMTPD) with ESMTP id c08b3553
 for <xen-users@lists.xenproject.org>;
 Tue, 11 Apr 2023 14:53:57 +0000 (UTC)
Received: from Unknown (HELO work) (221.216.209.239)
 by tomli.me (qpsmtpd/0.96) with ESMTPSA (AEAD-AES256-GCM-SHA384 encrypted);
 Tue, 11 Apr 2023 14:53:57 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: b0d98b0a-d878-11ed-8611-37d641c3527e
Authentication-Results: tomli.me; auth=pass (login) smtp.auth=tomli
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=tomli.me; h=date:from:to:subject:message-id:references:mime-version:content-type:in-reply-to; s=1490979754; bh=1USg2+11gM7PwcQNP11U38uG9FI2/CMAvwKWXrfsXH4=; b=whF4TtKwUsRe2DWIRuqbCTtYcwFQXeC7HDrWj5aC3P62pcnTGmTfLIOoOPpy8H1OQdmh7U0NWdcJYqFGfQKIrvjmb4chneiEP0+zHt8phveCqRBQyrdjhgdYoymJN0wzJt7BqcUy/Jf1sofwCXTXKW3Yw7+9Qe10OMQLDxR9hzZ2JUi0lvwVHJ9JdjdTOMkTPqJT/Jlu96S20Gr3mo16/PHN/V4nCeQt+oUxhwL5PJY8qOJWbK3Uw6N/zZAZ6VwOa3ad+J1QHllvYVOGJU2MdOBu9d3cw1P661Q24FjQ9znWj/iR//zFOPx7xpNLnAtSQrV54eCEJgTIFkO1mt1NRw==
Date: Tue, 11 Apr 2023 14:53:45 +0000
From: Tom Li <tomli@tomli.me>
To: xen-users@lists.xenproject.org
Subject: Re: Hang booting Dom0: nvme timeout, completion polled
Message-ID: <ZDV0eYxs4XxtNoqh@work>
References: <b309b524-c7ed-8ac7-ba7c-cf3d46754362werk21!de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <b309b524-c7ed-8ac7-ba7c-cf3d46754362werk21!de>

On Wed, Mar 15, 2023 at 07:22:49PM +0000, Jan Kellermann wrote:
> The host is hanging on:
> nvme nvme0: I/O 0 QID 0 timeout, completion polled
> nvme nvme1: I/O 8 QID 0 timeout, completion polled
> 
> Can anyone give hints for solving this problem?
> 
> Best regards and thank you in advance,
> Jan Kellermann

I've experienced the same problem on a X399 motherboard with Ryzen 5000
(Zen 3). Apparently, malfunctional IOMMU is currently is a systematic
issue on AMD Ryzen with Xen - it really should be reported as an upstream
bug, if nobody has done it yet - I was able to solve it by disabling SMT
(hyperthreading) in BIOS [1].

If SMT is still needed, another suggested solution by QubesOS users [2]
(which uses the Xen hypervisor) is booting Dom0 with the following
Linux kernel parameters:

    dom0_max_vcpus=1 dom0_vcpus_pin

This allocates one CPU to Dom0 exclusively [3] - although I haven't tested
it personally.

Cheers,
Tom Li

[1] https://github.com/QubesOS/qubes-issues/issues/8136

[2] https://forum.qubes-os.org/t/gpd-win-max-2-unable-to-boot-installer/14466/14

[3] https://wiki.xenproject.org/wiki/Xen_FAQ_Dom0


From xen-users-bounces@lists.xenproject.org Tue Apr 25 12:03:53 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 25 Apr 2023 12:03:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.525999.817539 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1prHO7-0008Lf-PD; Tue, 25 Apr 2023 12:03:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 525999.817539; Tue, 25 Apr 2023 12:03:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1prHO7-0008LU-JB; Tue, 25 Apr 2023 12:03:15 +0000
Received: by outflank-mailman (input) for mailman id 525999;
 Tue, 25 Apr 2023 12:03:13 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ShTu=AQ=xenbits.xen.org=julieng@srs-se1.protection.inumbo.net>)
 id 1prHO5-0007lz-LV
 for xen-users@lists.xen.org; Tue, 25 Apr 2023 12:03:13 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 247efbca-e361-11ed-b223-6b7b168915f2;
 Tue, 25 Apr 2023 14:03:09 +0200 (CEST)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julieng@xenbits.xen.org>)
 id 1prHNo-0002qJ-6m; Tue, 25 Apr 2023 12:02:56 +0000
Received: from julieng by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <julieng@xenbits.xen.org>)
 id 1prHNo-0005by-4j; Tue, 25 Apr 2023 12:02:56 +0000
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 247efbca-e361-11ed-b223-6b7b168915f2
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=ibj/UWzx5+E1wzwy1jgTCdemR93SZRFrGnLb7SZfK7o=; b=vnYZJVaE4MkyrFov4K7A4irp1b
	80DgsXynVJoKBr13ljg7brKClUpR2FxOIqLU+DhZCv38d+6+feq+xArL67pLgNYS4fm2/BjVFFEE4
	RRKv+tRFOcE8y9MleNpUcQZDu7rMQHclo59cnQ+AgDZU4LVZZdAY1MU8XgdF4R5ZveBQ=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 430 v2 (CVE-2022-42335) - x86 shadow paging
 arbitrary pointer dereference
Message-Id: <E1prHNo-0005by-4j@xenbits.xenproject.org>
Date: Tue, 25 Apr 2023 12:02:56 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

            Xen Security Advisory CVE-2022-42335 / XSA-430
                               version 2

             x86 shadow paging arbitrary pointer dereference

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

In environments where host assisted address translation is necessary
but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests
in so called shadow mode.  Due to too lax a check in one of the hypervisor
routines used for shadow page handling it is possible for a guest with a PCI
device passed through to cause the hypervisor to access an arbitrary pointer
partially under guest control.

IMPACT
======

Guests running in shadow mode and having a PCI device passed through may be
able to cause Denial of Service and other problems, escalation of privilege
cannot be ruled out.

VULNERABLE SYSTEMS
==================

Only Xen version 4.17 is vulnerable.

Only x86 systems are vulnerable.  The vulnerability can be leveraged only
by HVM guests running with shadow paging and having a PCI device passed
through.

MITIGATION
==========

Not passing through PCI devices to HVM guests will avoid the vulnerability.

Running HVM guests only in HAP (Hardware Assisted Paging) mode will also
avoid the vulnerability.

CREDITS
=======

This issue was discovered by Roger Pau Monné of XenServer.

RESOLUTION
==========

Applying the attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa430.patch           xen-unstable - Xen 4.17.x

$ sha256sum xsa430*
c861cabdf546ec7583f2193f9c4f8a62579047315e5fe9eca3e9e944b67ca852  xsa430.patch
$

DEPLOYMENT DURING EMBARGO
=========================

Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.

But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).

Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmRHr/4MHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ6UsH/ib0ei76XtojIl9eaNCPoAotcGBXLDQScV133z5e
7UhW3JPUEG79+p22ACL52Km7wVtWwuL5QzbBDJaw47hTD1IwvoOTQ8Dx+KwyZGsK
H8VW8WM70XyqxRJVfA+sEIEfRnxXKfWz6qWV5n2085XzFFwbF9c+ZZ6NafGv/Jd3
75eUwyGaR0o4YEnzKpLzqYFihK56YyJmZ0+rdYYydHKUy+oVcWjrNEh41Xa6lCJX
OdZ60inTu8rizItE+xEsKLatvoKVrO9q/zhAtLm+iWldf8PTgY9tq4S89DRMD/BN
uYIAL1xBCS2HC/IyUXI63PMwHg6fYzq+0JLjtYV0IYDfYE8=
=tInZ
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa430.patch"
Content-Disposition: attachment; filename="xsa430.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-users-bounces@lists.xenproject.org Tue Apr 25 20:31:41 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 25 Apr 2023 20:31:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.526346.818053 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1prPJM-0002Z3-Jd; Tue, 25 Apr 2023 20:30:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 526346.818053; Tue, 25 Apr 2023 20:30:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1prPJM-0002Ys-Gb; Tue, 25 Apr 2023 20:30:52 +0000
Received: by outflank-mailman (input) for mailman id 526346;
 Tue, 25 Apr 2023 20:30:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Fa6c=AQ=onlineschubla.de=paul@srs-se1.protection.inumbo.net>)
 id 1prPJL-0002Ym-1q
 for xen-users@lists.xenproject.org; Tue, 25 Apr 2023 20:30:51 +0000
Received: from mo4-p00-ob.smtp.rzone.de (mo4-p00-ob.smtp.rzone.de
 [85.215.255.24]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0f2f6fe4-e3a8-11ed-8611-37d641c3527e;
 Tue, 25 Apr 2023 22:30:48 +0200 (CEST)
Received: from mail.onlineschubla.de by smtp.strato.de (RZmta 49.4.0 DYNA|AUTH)
 with ESMTPSA id Ra004az3PKUkFXn
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits))
 (Client did not present a certificate)
 for <xen-users@lists.xenproject.org>;
 Tue, 25 Apr 2023 22:30:46 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mail.onlineschubla.de (Postfix) with ESMTP id 889EB207DD
 for <xen-users@lists.xenproject.org>; Tue, 25 Apr 2023 22:30:45 +0200 (CEST)
Received: from mail.onlineschubla.de ([127.0.0.1])
 by localhost (mail.onlineschubla.de [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id joZExsSrpG2h for <xen-users@lists.xenproject.org>;
 Tue, 25 Apr 2023 22:30:45 +0200 (CEST)
Received: from [192.168.178.167] (unknown [192.168.12.2])
 by mail.onlineschubla.de (Postfix) with ESMTPA id F298D20036
 for <xen-users@lists.xenproject.org>; Tue, 25 Apr 2023 22:30:44 +0200 (CEST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 0f2f6fe4-e3a8-11ed-8611-37d641c3527e
ARC-Seal: i=1; a=rsa-sha256; t=1682454646; cv=none;
    d=strato.com; s=strato-dkim-0002;
    b=UzGCTcW0IUtnt2zz9hqmhP7bw+BK0HBrENhCFeS/WXt3mSOGgRa0NWx8hNTOXN1Nen
    vEVlcj0TgbhX7JOAjB4ucPRx0L+hAiKuznM4rv3gjXJivMTP2dLLxJR+7VjVmpDJVZ5g
    ilwbX8iuZnBRZSlYhv6cw634rgRyjcomlnqErA7JvVozyiYIkMvGKh5Q7ApeRFi+mVBv
    l29DRsXWm4lWc4B9x2WIuY3y28YjACKp3QSyKR8Ilr9p0Zqc2u3eRvIm+3XONPRx0fMM
    a4VF7vzg0GQo/jjxYAkULr22g56zilGeOXKp1JntUloXG3Gqeo0uNrOM4hNeZiFEel2c
    t82g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1682454646;
    s=strato-dkim-0002; d=strato.com;
    h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender;
    bh=M66C83rzEUOdED5zEp/oxQXgwn44SxhKXgCIqfCirhM=;
    b=TVn35XEWahGojJp+WB0BAKlFsiS1VWQUYoox7ymeuvPbI56i98IUO/6NiJ50UmsQXs
    TxNV6LxJkprNosI73Nmk7ISPmXhoaeK6yd8Y88LkoMuiW7PULFjlR6QX4YHMiCtSAPk/
    N0TMNV9PDiCtg2xS3dZrcdGUq5Qk5EkgkFcEuEnr1LUPkypeY1082GK2q0Xjix42Wzer
    ie69ChNMg16LJlmOL1C6wjx8w7erezNvaiDw8rCpfL/UTHEdNnPxEawGUhevQtF34VtT
    Nr5znCCYlD6/tBLa8uylEETFWWK6irzA9vRCki1lHQMdCCU7LUIwdgxl3yxvPFR6+SxH
    FCpA==
ARC-Authentication-Results: i=1; strato.com;
    arc=none;
    dkim=none
X-RZG-CLASS-ID: mo00
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1682454646;
    s=strato-dkim-0002; d=onlineschubla.de;
    h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender;
    bh=M66C83rzEUOdED5zEp/oxQXgwn44SxhKXgCIqfCirhM=;
    b=Ywt/6NpCQU53HzMkT9JjEm6lz0bx7oD5OY3ohdtcWOygkN3zt9ABhf6EyNCK5Nbz0E
    Vru2gEbkjeFL3POqA/DNStLSvImxqUagvzrztc6PYB0sHmoHxAg+kV0DrhoOBcPUAwO+
    JRk2DmxosjWoXaCWDPyhU93Eeetpl1qTeTi2vLgAba60hSBe/vWNb9cHmFWbEaoUq5mG
    zjbveLgis+N1BIs8LbyAEtHRgJZy8T7kgS2UGDQ/1SBoWcN4RYT9EUdD5gA2MrYCYnO8
    xfLeHSKhCoGsqJ0v82RRk/rZk6xHSyuG09BiSOTupaFKQRdxHTArlXrQdewqh9OqmaHW
    TONw==
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1682454646;
    s=strato-dkim-0003; d=onlineschubla.de;
    h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender;
    bh=M66C83rzEUOdED5zEp/oxQXgwn44SxhKXgCIqfCirhM=;
    b=oXPIzmcJ6AgKvqaAxIywZTBVDZowr7WEBA71F1CK7aXt7Hk8tgB3prXbRdXgfmt9td
    fggZQpID3kjKfufq/oCQ==
X-RZG-AUTH: ":PG0ReWCndfO3rCSML4AvNaDxJ7WJyilEI/NMX3IPsStZLbcZC9mNZx0oO9CUCwKZEwM8PYTKfg=="
X-Virus-Scanned: Debian amavisd-new at onlineschubla.de
Message-ID: <40c80870-8186-61bd-49cd-4322b5711285@onlineschubla.de>
Date: Tue, 25 Apr 2023 22:30:44 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.10.0
Content-Language: en-US
To: xen-users@lists.xenproject.org
From: Paul Leiber <paul@onlineschubla.de>
Subject: "swiotlb buffer is full" in DomU with PCI passthrough is caused by
 low memory in Dom0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

this message is meant mainly to document an issue and the solution to 
help others in a similar situation.

I came across this situation when installing Xen on a small PC (PC 
Engines APU4D4) with 4 GB of RAM and passing through a PCI device (a 
Compex WLE900VX wifi card) to a OpenWRT DomU. In the beginning, I wanted 
to use as little memory as possible for the Debian Dom0, therefore I set 
its memory to 512 MB by using "dom0_mem=512M,max:512M". When trying to 
pass through the PCI card to the DomU, the DomU could see it, but it did 
not work. Dmesg output in the OpenWRT DomU showed several instances of 
the following line:

"ath10k_pci 0000:00:00.0: swiotlb buffer is full (sz: 2112 bytes), total 
2048 (slots), used 2034 (slots)"

Everything else in DomU seemed to work. Searching the web for this error 
message did not give me an indication for the cause. I also could not 
find any cause in the Dom0 logs. Therefore, I could not find the reason 
for this issue for quite some time.

I then randomly tried out to enlarge Dom0 memory to 768 MB, and the 
error message in the DomU disappeared during the next boot. The PCI 
device was working.

I can't rule out that there actually is a log entry in Dom0 for this 
situation, and my Xen and/or linux knowledge was not good enough to let 
me find it. If this is the case, I'd appreciate some pointers.

Best regards,

Paul


From xen-users-bounces@lists.xenproject.org Fri Apr 28 15:29:40 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 28 Apr 2023 15:29:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.527359.819936 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1psQ1f-0003h4-3m; Fri, 28 Apr 2023 15:28:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 527359.819936; Fri, 28 Apr 2023 15:28:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1psQ1e-0003gt-V6; Fri, 28 Apr 2023 15:28:46 +0000
Received: by outflank-mailman (input) for mailman id 527359;
 Fri, 28 Apr 2023 15:28:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=IleN=AT=rabbit.lu=slack@srs-se1.protection.inumbo.net>)
 id 1psQ1d-0003gn-JP
 for xen-users@lists.xenproject.org; Fri, 28 Apr 2023 15:28:45 +0000
Received: from mail-wm1-x32e.google.com (mail-wm1-x32e.google.com
 [2a00:1450:4864:20::32e])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5b9abdfa-e5d9-11ed-8611-37d641c3527e;
 Fri, 28 Apr 2023 17:28:43 +0200 (CEST)
Received: by mail-wm1-x32e.google.com with SMTP id
 5b1f17b1804b1-3f1cfed93e2so73601045e9.3
 for <xen-users@lists.xenproject.org>; Fri, 28 Apr 2023 08:28:42 -0700 (PDT)
Received: from [192.168.2.1] (82-64-138-184.subs.proxad.net. [82.64.138.184])
 by smtp.googlemail.com with ESMTPSA id
 v11-20020a1cf70b000000b003f25b40fc24sm10181497wmh.6.2023.04.28.08.28.41
 for <xen-users@lists.xenproject.org>
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Fri, 28 Apr 2023 08:28:41 -0700 (PDT)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 5b9abdfa-e5d9-11ed-8611-37d641c3527e
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=rabbit-lu.20221208.gappssmtp.com; s=20221208; t=1682695722; x=1685287722;
        h=content-transfer-encoding:in-reply-to:from:content-language
         :references:to:subject:user-agent:mime-version:date:message-id:from
         :to:cc:subject:date:message-id:reply-to;
        bh=1GdttsaTzHgxUSThDvOmc+ni2hOOCR3hDmdHFOWjOzM=;
        b=zip+sdpA9eV4GuEZufl5HtkHYhqeKXlW1wyjKe5GmKGjUICBlnDaJ9ekWeWspOwUEB
         dNunAuGq4vPEA8rpFw7+qvqntIhJida1S6SIrrFve7o+kPGTmDSJorIND5K08YDOezeb
         eUYpF5bZtINc5DQY9Bj9Cl0qqmtrKKx9Dcu7bHkfXIOmz+oV9QegNEh2Y1HyQncORQTf
         KN1ebxDEYjgO93kVXrBG6o0BGgYByXSYrwazoxZOLbRl8IbBJerDXoE5LuMU1R9/CUel
         8+ktVDYjw66Lv5sLpneiN1VF/0ByZNz6QJgSMkVKa+z9f11ntgmUSMfa3S+fNUGDeaRF
         hOUw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20221208; t=1682695722; x=1685287722;
        h=content-transfer-encoding:in-reply-to:from:content-language
         :references:to:subject:user-agent:mime-version:date:message-id
         :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
        bh=1GdttsaTzHgxUSThDvOmc+ni2hOOCR3hDmdHFOWjOzM=;
        b=RtXnlwpCCct95bL25aIuZ/08R+jUfwLbrg1YwF9eRZ1JSv40ZQSdVpN2gon7HS9St4
         PPdP2kxV1hULj7p2mfYPjun7pyIorjMYSzt0URkKrC+MNLZWa928KaIHzl5pf9COfsrJ
         NnvzJry9BMKziFfO/mTTQ9SC8jmrYB7g2mw048uHNZg1gbohECmbYVDftXPTyVU5birB
         yvmHOIfQKfR2OYbvbqUaf7jPRRcRJuNVJMcaOibEhnrC3McPbF6gQnME+SXrqaTSuCLu
         2pDQiFF2k853pHJ9MGcRyVVx+cRuwTmaw7YCuGhMFdSdxo0g79GJg1fz6N9bUoAP2DOn
         KMfg==
X-Gm-Message-State: AC+VfDzjGet3xh2E+2luNYoWjG1PdFhCvM53lsRXr9sYcvfvTJC+5QfC
	Omz9xOimHTp0nhm8tImUrSil6UMKLcO1CGjejA4=
X-Google-Smtp-Source: ACHHUZ4zsXmkN5kmyJxkMu6eKz9dUPsGljPqajKV5djAp1l/S8pev7sf68mEf/i1b4IATiuPdLdMNw==
X-Received: by 2002:a05:600c:2051:b0:3f1:7581:eaaf with SMTP id p17-20020a05600c205100b003f17581eaafmr4107488wmg.4.1682695722158;
        Fri, 28 Apr 2023 08:28:42 -0700 (PDT)
Message-ID: <0cf39252-64de-c9a2-e652-e9fe242b173f@rabbit.lu>
Date: Fri, 28 Apr 2023 17:28:40 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.10.0
Subject: Re: "swiotlb buffer is full" in DomU with PCI passthrough is caused
 by low memory in Dom0
To: xen-users@lists.xenproject.org
References: <40c80870-8186-61bd-49cd-4322b5711285@onlineschubla.de>
Content-Language: en-US
From: zithro <slack@rabbit.lu>
In-Reply-To: <40c80870-8186-61bd-49cd-4322b5711285@onlineschubla.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

On 25 Apr 2023 22:30, Paul Leiber wrote:
> Hi,

Hi,

> I can't rule out that there actually is a log entry in Dom0 for this 
> situation, and my Xen and/or linux knowledge was not good enough to let 
> me find it. If this is the case, I'd appreciate some pointers.

Then why not posting your logs ?

Did you add "loglvl=all" and/or "guest_loglvl=all" to Xen cmdline ?
What logs did you read: "dmesg", "xl dmesg" or logs in /var/log/xen ?

 From the (few) posts I've read, this problems happens on 
non-virtualized systems, so maybe it's not related to Xen at all.
Maybe it's a driver problem.
(Search query used: "swiotlb buffer is full").

Also I found pointers related to the *domU* kernel command line option 
"swiotlb", like using "swiotlb=1" or "swiotlb=65536"

PS: I'm not an expert, just a Xen user ;)


From xen-users-bounces@lists.xenproject.org Fri Apr 28 16:05:39 2023
Return-path: <xen-users-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 28 Apr 2023 16:05:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.527384.819952 (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1psQaw-0000aJ-VK; Fri, 28 Apr 2023 16:05:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 527384.819952; Fri, 28 Apr 2023 16:05:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-users-bounces@lists.xenproject.org>)
	id 1psQaw-0000aB-SR; Fri, 28 Apr 2023 16:05:14 +0000
Received: by outflank-mailman (input) for mailman id 527384;
 Fri, 28 Apr 2023 16:05:13 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nmuo=AT=onlineschubla.de=paul@srs-se1.protection.inumbo.net>)
 id 1psQav-0000ZJ-Lt
 for xen-users@lists.xenproject.org; Fri, 28 Apr 2023 16:05:13 +0000
Received: from mo4-p00-ob.smtp.rzone.de (mo4-p00-ob.smtp.rzone.de
 [81.169.146.218]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 740f52a3-e5de-11ed-b224-6b7b168915f2;
 Fri, 28 Apr 2023 18:05:11 +0200 (CEST)
Received: from mail.onlineschubla.de by smtp.strato.de (RZmta 49.4.0 DYNA|AUTH)
 with ESMTPSA id Ra004az3SG59RAb
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits))
 (Client did not present a certificate)
 for <xen-users@lists.xenproject.org>;
 Fri, 28 Apr 2023 18:05:09 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1])
 by mail.onlineschubla.de (Postfix) with ESMTP id 6EDD020D75
 for <xen-users@lists.xenproject.org>; Fri, 28 Apr 2023 18:05:09 +0200 (CEST)
Received: from mail.onlineschubla.de ([127.0.0.1])
 by localhost (mail.onlineschubla.de [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id MDfyZLei8pNX for <xen-users@lists.xenproject.org>;
 Fri, 28 Apr 2023 18:05:08 +0200 (CEST)
Received: from [192.168.178.167] (unknown [192.168.12.2])
 by mail.onlineschubla.de (Postfix) with ESMTPA id C707D20036
 for <xen-users@lists.xenproject.org>; Fri, 28 Apr 2023 18:05:08 +0200 (CEST)
X-BeenThere: xen-users@lists.xenproject.org
List-Id: Xen user discussion <xen-users.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-users@lists.xenproject.org>
List-Help: <mailto:xen-users-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-users>,
 <mailto:xen-users-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-users-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-users" <xen-users-bounces@lists.xenproject.org>
X-Inumbo-ID: 740f52a3-e5de-11ed-b224-6b7b168915f2
ARC-Seal: i=1; a=rsa-sha256; t=1682697910; cv=none;
    d=strato.com; s=strato-dkim-0002;
    b=Sqttf2BtjzJpBCb+HDDKi26yxL8kxxGjFTDU91t/Ys4mBdKNNZ/3aLXuisMXIeEBr5
    0+xpES/nqZstW6s9gy+5KM5pYIGcV7U+OVoIckij3v0OjdmMo62plY140VgtNCoou1W3
    bqLZwdH2ZVi6//+6iR97aV/b+ew/ScXVaXmLe6ZdjX+lpl0FlOZwpbJQfLMCwXjHTNaN
    Q/xFg6+w7rTyjVxLxr2i9+K8cli4jRH8r+1vXnpaxRZzY9f602gRvh03j9VpjfYRcmXV
    +nCrSaVjVKg0YUrwZ+N5qSPVK1BaSXhF3MOd5lv/x0dLb/rgSSdFhvf2I1sbHdhYC9pT
    0TSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1682697910;
    s=strato-dkim-0002; d=strato.com;
    h=In-Reply-To:From:References:To:Subject:Date:Message-ID:Cc:Date:From:
    Subject:Sender;
    bh=G2K5ra2gzg2lzhI+fLfXpXzwZsNFNrQYk/85bYLcbL8=;
    b=E9Zq3dIhhcYLp2ToNu7GuFCQ6xcUzgFgRCxIU8PtDZ9y9ZA06wYYOzUIBedS4IoMJe
    w1PnLHk58jHJdpOse3zvHJx+QJsFP/Jc6GRwwQWmsolG8/SXBNKMNRvG3sYrfe5uN2Ti
    3JUkjOZFznm98H1ZhKBF2RRsHLsLse/QYzXB4QvIlOlBzImilpyIZMeX48OZ2WLE5BPP
    OniKKABbUH5Gr0yxVakRtIdR9g6H3+N1BBAUcsF4WzxDTAHQI3eqKWDt0qIQULOxXYzk
    LsHpwE+oz8/XfNHooe3dwZSK/NeSsfLz1n7fNzLKJ+kyYyLeawJ/2piZc/H+LFQ0jfEg
    YM+Q==
ARC-Authentication-Results: i=1; strato.com;
    arc=none;
    dkim=none
X-RZG-CLASS-ID: mo00
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1682697910;
    s=strato-dkim-0002; d=onlineschubla.de;
    h=In-Reply-To:From:References:To:Subject:Date:Message-ID:Cc:Date:From:
    Subject:Sender;
    bh=G2K5ra2gzg2lzhI+fLfXpXzwZsNFNrQYk/85bYLcbL8=;
    b=opI40Ef3ghgP6chiHO/CiqW4TJBVpIdvXvrEiMlkBiwuqWLKynT1Z+ZysZ/w0N0tfn
    2KebCkyNQVNWVhoY8nCJofQBafB5tE6xvlnFQ6RjsEqYIrcDv9X4vtjjWDcxr4vngIEp
    k+yWWFCovg5JMxC0fwlSc8OqvSpzryWq1NLxgJPV6a99V1EaeumqhfAet2xd2WJ45UpK
    U7q8EoaoL/4UTsYuANkHpoEZUQYDDKMEg24uD3fNBtHsBJjv6uXn8EfiMgNvxfKweMcx
    ISUzxnHshJpdxLuZwE+VYzrONj8UixK5wo7SfxzucO/JCvjezwso4WODM0pnTzuwh7cQ
    zH3g==
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1682697910;
    s=strato-dkim-0003; d=onlineschubla.de;
    h=In-Reply-To:From:References:To:Subject:Date:Message-ID:Cc:Date:From:
    Subject:Sender;
    bh=G2K5ra2gzg2lzhI+fLfXpXzwZsNFNrQYk/85bYLcbL8=;
    b=Sfm9Fp4z3kq4MKqe/4d+bu9hK40W3Ag9Nvf1YnfF66kZRS5/0Zmu+oaFW++D/+BST2
    RCdTY307niSv36vZIyCg==
X-RZG-AUTH: ":PG0ReWCndfO3rCSML4AvNaDxJ7WJyilEI/NMX3IPsStZLbcZC9mNZx0oO9CUCwKZEwM/PYHDfg=="
X-Virus-Scanned: Debian amavisd-new at onlineschubla.de
Message-ID: <d063348e-b152-29ac-6f65-0cb7c76f57b4@onlineschubla.de>
Date: Fri, 28 Apr 2023 18:05:08 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.10.0
Subject: Re: "swiotlb buffer is full" in DomU with PCI passthrough is caused
 by low memory in Dom0
Content-Language: en-US
To: xen-users@lists.xenproject.org
References: <40c80870-8186-61bd-49cd-4322b5711285@onlineschubla.de>
 <0cf39252-64de-c9a2-e652-e9fe242b173f@rabbit.lu>
From: Paul Leiber <paul@onlineschubla.de>
In-Reply-To: <0cf39252-64de-c9a2-e652-e9fe242b173f@rabbit.lu>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



Am 28.04.2023 um 17:28 schrieb zithro:
> On 25 Apr 2023 22:30, Paul Leiber wrote:
>> Hi,
> 
> Hi,
> 
>> I can't rule out that there actually is a log entry in Dom0 for this 
>> situation, and my Xen and/or linux knowledge was not good enough to 
>> let me find it. If this is the case, I'd appreciate some pointers.
> 
> Then why not posting your logs ?

I didn't find anything that seemed relevant, that's why I didn't post 
any logs. Also, I am not sure which logs are relevant (see below).

As this is from a "production" machine (the family internet connection 
gateway at home), I need to literally beg for time windows where I can 
do the testing, hence I am hesitant to promise any logs soon.

That put aside: Which logs would be relevant? The ones below, or 
more/others?

> Did you add "loglvl=all" and/or "guest_loglvl=all" to Xen cmdline ?

Yes.

> What logs did you read: "dmesg", "xl dmesg" or logs in /var/log/xen ?

I looked at the logs in /var/log/xen and dmesg, don't remember if a also 
looked at "xl dmesg".

>  From the (few) posts I've read, this problems happens on 
> non-virtualized systems, so maybe it's not related to Xen at all.
> Maybe it's a driver problem.
> (Search query used: "swiotlb buffer is full").

I also noticed that most reports of swiotlib issues are for 
non-virtualized systems. But: If my reported issue was not Xen related, 
why would changing the amount of Dom0 memory influence DomU behavior?

> Also I found pointers related to the *domU* kernel command line option 
> "swiotlb", like using "swiotlb=1" or "swiotlb=65536"

Interesting, thank you for the hint.

> PS: I'm not an expert, just a Xen user ;)

Same, although I still consider myself a Xen beginner. :-)


