All of lore.kernel.org
 help / color / mirror / Atom feed
* [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
@ 2016-05-11  6:19 Jimi
  2016-05-19 18:07 ` [Qemu-devel] [Bug 1580459] " kachaffeous
                   ` (59 more replies)
  0 siblings, 60 replies; 62+ messages in thread
From: Jimi @ 2016-05-11  6:19 UTC (permalink / raw)
  To: qemu-devel

Public bug reported:

Problem: after leaving a Windows VM that uses PCI passthrough (as we do
for gaming graphics cards, sound cards, and in my case, a USB card)
running for some amount of time between 1 and 2 hours (it's not
consistent with exactly how long), and for any amount of time longer
than that, shutting down that guest will, right as it finishes shutting
down, freeze the host computer, making it require a hard reboot.
Unbinding (or in the other user's case, unbinding and THEN binding) any
PCI device in sysfs, even one that has nothing to do with the VM, also
has the same effect as shutting down the VM (if the VM has been running
long enough). So, it's probably an issue related to unbinding and
binding PCI devices.

There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
Here's a better-organized list of main details:
-at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
-I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
-issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
-I'm using libvirt but the other user is not, so it's not an issue with libvirt
-It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
-I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
-According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
-Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
-This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

** Affects: qemu
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
@ 2016-05-19 18:07 ` kachaffeous
  2016-05-19 18:18 ` kachaffeous
                   ` (58 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: kachaffeous @ 2016-05-19 18:07 UTC (permalink / raw)
  To: qemu-devel

** Also affects: fedora
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
  2016-05-19 18:07 ` [Qemu-devel] [Bug 1580459] " kachaffeous
@ 2016-05-19 18:18 ` kachaffeous
  2016-05-20  0:11 ` Jimi
                   ` (57 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: kachaffeous @ 2016-05-19 18:18 UTC (permalink / raw)
  To: qemu-devel

I am seeing this issue on arch also.  I also tried Fedora24 to see if it
was a Arch only issue.

If I start a VM and stop it shortly after everything works fine.

If I start a VM and game for a while, on VM shutdown the host will
totally lock.  Tailing the journal to see if anything gets logged shows
nothing (hangs before any errors are logged).  Have to hard power cycle
PC to regain use.

I'm willing to do any test to try to figure this out.

Hardware details:
i7-5820K 3.3 GHz (hex core) 
12g ram
ASRock X99 Extreme4 LGA2011
GTX 970  nvidia drivers (pass thru card) using Display port
Asus Rog Swift 27"

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
  2016-05-19 18:07 ` [Qemu-devel] [Bug 1580459] " kachaffeous
  2016-05-19 18:18 ` kachaffeous
@ 2016-05-20  0:11 ` Jimi
  2016-05-20 16:43 ` kachaffeous
                   ` (56 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-20  0:11 UTC (permalink / raw)
  To: qemu-devel

Oh, I should post my hardware:

i7-5820K (also) (4/6 cores (8/12 threads) being passed to VMs)
12GB RAM (also) (8GB being passed to VMs)
MSI X99 SLI Plus (though I don't use SLI)
NVidia GTX 960 2GB pass-thru (also had this problem on a GTX 660 before that died)
GT 740 host card, using nouveau when VMs are running

We have some pretty similar hardware there.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (2 preceding siblings ...)
  2016-05-20  0:11 ` Jimi
@ 2016-05-20 16:43 ` kachaffeous
  2016-05-20 16:58 ` Jimi
                   ` (55 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: kachaffeous @ 2016-05-20 16:43 UTC (permalink / raw)
  To: qemu-devel

Here is my startup script.

#!/bin/bash


echo "Starting virtual machine..."

cp /usr/share/edk2.git/ovmf-x64/OVMF_VARS-pure-efi.fd /tmp/my_vars.fd

sudo \
 qemu-system-x86_64  \
  -name "Windows 10" \
  -enable-kvm \
  -m 12288 \
  -cpu host,kvm=off \
  -smp threads=2,cores=4,sockets=1 \
  -vga none \
  -soundhw hda \
  -net nic -net bridge,br=br0  \
  -usb -usbdevice host:1af3:0001 -usbdevice host:04d9:2221 -usbdevice host:046d:0a4d  \
  -device vfio-pci,host=01:00.0,multifunction=on \
  -device vfio-pci,host=01:00.1 \
  -drive if=pflash,format=raw,readonly,file=/usr/share/edk2.git/ovmf-x64/OVMF_CODE-pure-efi.fd \
  -drive if=pflash,format=raw,file=/tmp/my_vars.fd \
  -boot order=cd \
  -device virtio-scsi-pci,id=scsi \
  -drive file=/home/jason/kvm/win.img,id=disk,format=qcow2,if=none,cache=writeback -device scsi-hd,drive=disk \

exit 0

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (3 preceding siblings ...)
  2016-05-20 16:43 ` kachaffeous
@ 2016-05-20 16:58 ` Jimi
  2016-05-20 16:58 ` Jimi
                   ` (54 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-20 16:58 UTC (permalink / raw)
  To: qemu-devel

I should also post my "scripts" (libvirt XML files in my case):

But, since the Windows VM and Linux VM are completely identical beyond
the OS that's installed, I don't think our VM configurations have
anything to do with this bug. I mean, they aren't completely identical
right now because I removed the HDMI sound card from the Linux VM in
favor of PulseAudio "network" streaming, but I did that recently and
they had the same behavior or lack thereof before I did that.

** Attachment added: "Windows.xml"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4667052/+files/Windows.xml

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (4 preceding siblings ...)
  2016-05-20 16:58 ` Jimi
@ 2016-05-20 16:58 ` Jimi
  2016-05-28 16:39 ` Gandalf-The-Red
                   ` (53 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-20 16:58 UTC (permalink / raw)
  To: qemu-devel

Also, yeah, the Linux one is called SteamOS, but it is actually just an
almost identical install of Arch. SteamOS wasn't playing nice with most
of my hardware when I tried to install it.

** Attachment added: "SteamOS.xml"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4667053/+files/SteamOS.xml

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (5 preceding siblings ...)
  2016-05-20 16:58 ` Jimi
@ 2016-05-28 16:39 ` Gandalf-The-Red
  2016-05-28 17:08 ` Jimi
                   ` (52 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Gandalf-The-Red @ 2016-05-28 16:39 UTC (permalink / raw)
  To: qemu-devel

I think this is what's happening to me on my windows 8.1 vm although it
might be slightly different.

Just about everything you guys talked about applies except I don't have
to shutdown for it to freeze up in my case(although if it's on for long
enough and I shut it off it freezes). It freezes up on it's own
seemingly at random taking the host with it.

First happened to me on a freshly installed Arch(antergos), then tried
it on Debian after updating my kernel from 4.3 to 4.5(there was a bug
that made the vm excruciatingly slow before 4.4) and it happened again.

My hardware:

i7 5820k 
8GB Ram (Upgrading to 32GB when the ram I ordered gets here)
MSI X99S SLI Plus
AMD Radeon R9-270X (Host GPU using "radeon" drivers)
AMD Radeon HD 6950 1GB (Passthrough GPU)

Interesting that aside from the GPUs(which I'm pretty sure aren't the
problem) we all have very similar hardware.

When I get some free time I'll try to replicate this bug on another OS
but I have a feeling I'll just get the same result. I just want to see
if it'll happen no matter what distro I use.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (6 preceding siblings ...)
  2016-05-28 16:39 ` Gandalf-The-Red
@ 2016-05-28 17:08 ` Jimi
  2016-05-28 17:25 ` Gandalf-The-Red
                   ` (51 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-28 17:08 UTC (permalink / raw)
  To: qemu-devel

I doubt you have a different issue. My VM has randomly hanged my
computer without a shut down a few times during the life of this bug,
and there are two very possible ways it could happen: the VM suddenly
crashed, making a situation similar to it shutting down, or something in
your host caused some PCI device to be bound or unbound to a driver.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (7 preceding siblings ...)
  2016-05-28 17:08 ` Jimi
@ 2016-05-28 17:25 ` Gandalf-The-Red
  2016-05-28 18:31 ` Gandalf-The-Red
                   ` (50 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Gandalf-The-Red @ 2016-05-28 17:25 UTC (permalink / raw)
  To: qemu-devel

** Also affects: debian
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (8 preceding siblings ...)
  2016-05-28 17:25 ` Gandalf-The-Red
@ 2016-05-28 18:31 ` Gandalf-The-Red
  2016-05-28 19:12 ` Jimi
                   ` (49 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Gandalf-The-Red @ 2016-05-28 18:31 UTC (permalink / raw)
  To: qemu-devel

I see, it's definitely the same issue then.

Could it be something to do with our hardware unbinding and binding pci
devices or something of the sort? I sort of doubt it but it is strange
someone else with a more different CPU/mobo combo hasn't reported this
problem yet.

That being said, we have a very small sample size so I don't know if
that means anything.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (9 preceding siblings ...)
  2016-05-28 18:31 ` Gandalf-The-Red
@ 2016-05-28 19:12 ` Jimi
  2016-05-28 19:14 ` Jimi
                   ` (48 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-28 19:12 UTC (permalink / raw)
  To: qemu-devel

Whoops, I clicked the wrong button and added the wrong thing for Arch
Linux, and I don't know how to delete it. (new to launchpad here)

** Also affects: archlinux-lp
   Importance: Undecided
       Status: New

** Also affects: archlinux
   Importance: Undecided
       Status: New

** Changed in: archlinux-lp
       Status: New => Invalid

** No longer affects: archlinux-lp

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (10 preceding siblings ...)
  2016-05-28 19:12 ` Jimi
@ 2016-05-28 19:14 ` Jimi
  2016-05-29  1:33 ` Chris McCarron
                   ` (47 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-28 19:14 UTC (permalink / raw)
  To: qemu-devel

OK, I figured out how to delete it.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (11 preceding siblings ...)
  2016-05-28 19:14 ` Jimi
@ 2016-05-29  1:33 ` Chris McCarron
  2016-05-29  1:40 ` Chris McCarron
                   ` (46 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29  1:33 UTC (permalink / raw)
  To: qemu-devel

I am having the exact same issue!

My Setup:

Model: unRaid 6.2 Beta
M/B: ASUSTeK Computer INC. - Z8P(N)E-D12(X)
CPU: Intel® Xeon® CPU X5690 @ 3.47GHz
HVM: Enabled
IOMMU: Enabled
Cache: 384 kB, 1536 kB, 12288 kB
Memory: 32768 MB (max. installable capacity 96 GB)
Network: bond0: fault-tolerance (active-backup), mtu 1500 
 eth0: 100Mb/s, Full Duplex, mtu 1500 
 eth1: 1000Mb/s, Full Duplex, mtu 1500
Kernel: Linux 4.4.6-unRAID x86_64
OpenSSL: 1.0.2g

<?xml version="1.0" standalone="yes" ?>
<!-- generated by lshw-unknown -->
<!-- GCC 5.3.0 -->
<!-- Linux 4.4.6-unRAID #1 SMP PREEMPT Fri Mar 25 21:34:35 PDT 2016 x86_64 -->
<!-- GNU libc 2 (glibc 2.23) -->
<list>
<node id="computer" claimed="true" class="system" handle="DMI:0001">
 <description>Desktop Computer</description>
 <product>System Product Name (To Be Filled By O.E.M.)</product>
 <vendor>System manufacturer</vendor>
 <version>System Version</version>
 <serial>[REMOVED]</serial>
 <width units="bits">4294967295</width>
 <configuration>
  <setting id="boot" value="normal" />
  <setting id="chassis" value="desktop" />
  <setting id="family" value="To Be Filled By O.E.M." />
  <setting id="sku" value="To Be Filled By O.E.M." />
  <setting id="uuid" value="[REMOVED]" />
 </configuration>
 <capabilities>
  <capability id="smbios-2.6" >SMBIOS version 2.6</capability>
  <capability id="dmi-2.6" >DMI version 2.6</capability>
  <capability id="smp" >Symmetric Multi-Processing</capability>
 </capabilities>
  <node id="core" claimed="true" class="bus" handle="DMI:0002">
   <description>Motherboard</description>
   <product>Z8P(N)E-D12(X)</product>
   <vendor>ASUSTeK Computer INC.</vendor>
   <physid>0</physid>
   <version>Rev 1.0xG</version>
   <serial>[REMOVED]</serial>
   <slot>To Be Filled By O.E.M.</slot>
    <node id="firmware" claimed="true" class="memory" handle="">
     <description>BIOS</description>
     <vendor>American Megatrends Inc.</vendor>
     <physid>0</physid>
     <version>1302</version>
     <date>06/25/2012</date>
     <size units="bytes">65536</size>
     <capacity units="bytes">2031616</capacity>
     <capabilities>
      <capability id="isa" >ISA bus</capability>
      <capability id="pci" >PCI bus</capability>
      <capability id="pnp" >Plug-and-Play</capability>
      <capability id="upgrade" >BIOS EEPROM can be upgraded</capability>
      <capability id="shadowing" >BIOS shadowing</capability>
      <capability id="escd" >ESCD</capability>
      <capability id="cdboot" >Booting from CD-ROM/DVD</capability>
      <capability id="bootselect" >Selectable boot path</capability>
      <capability id="socketedrom" >BIOS ROM is socketed</capability>
      <capability id="edd" >Enhanced Disk Drive extensions</capability>
      <capability id="int13floppy1200" >5.25&quot; 1.2MB floppy</capability>
      <capability id="int13floppy720" >3.5&quot; 720KB floppy</capability>
      <capability id="int13floppy2880" >3.5&quot; 2.88MB floppy</capability>
      <capability id="int5printscreen" >Print Screen key</capability>
      <capability id="int9keyboard" >i8042 keyboard controller</capability>
      <capability id="int14serial" >INT14 serial line control</capability>
      <capability id="int17printer" >INT17 printer control</capability>
      <capability id="int10video" >INT10 CGA/Mono video</capability>
      <capability id="acpi" >ACPI</capability>
      <capability id="usb" >USB legacy emulation</capability>
      <capability id="ls120boot" >Booting from LS-120</capability>
      <capability id="zipboot" >Booting from ATAPI ZIP</capability>
      <capability id="biosbootspecification" >BIOS boot specification</capability>
     </capabilities>
    </node>
    <node id="cpu:0" claimed="true" class="processor" handle="DMI:0004">
     <description>CPU</description>
     <product>Intel(R) Xeon(R) CPU           X5690  @ 3.47GHz</product>
     <vendor>Intel Corp.</vendor>
     <physid>4</physid>
     <businfo>cpu@0</businfo>
     <version>Intel(R) Xeon(R) CPU X5690 @ 3.47GHz</version>
     <serial>[REMOVED]</serial>
     <slot>CPU 1</slot>
     <size units="Hz">3468000000</size>
     <capacity units="Hz">3600000000</capacity>
     <width units="bits">64</width>
     <clock units="Hz">133000000</clock>
     <configuration>
      <setting id="cores" value="6" />
      <setting id="enabledcores" value="6" />
      <setting id="threads" value="12" />
     </configuration>
     <capabilities>
      <capability id="x86-64" >64bits extensions (x86-64)</capability>
      <capability id="fpu" >mathematical co-processor</capability>
      <capability id="fpu_exception" >FPU exceptions reporting</capability>
      <capability id="wp" />
      <capability id="vme" >virtual mode extensions</capability>
      <capability id="de" >debugging extensions</capability>
      <capability id="pse" >page size extensions</capability>
      <capability id="tsc" >time stamp counter</capability>
      <capability id="msr" >model-specific registers</capability>
      <capability id="pae" >4GB+ memory addressing (Physical Address Extension)</capability>
      <capability id="mce" >machine check exceptions</capability>
      <capability id="cx8" >compare and exchange 8-byte</capability>
      <capability id="apic" >on-chip advanced programmable interrupt controller (APIC)</capability>
      <capability id="sep" >fast system calls</capability>
      <capability id="mtrr" >memory type range registers</capability>
      <capability id="pge" >page global enable</capability>
      <capability id="mca" >machine check architecture</capability>
      <capability id="cmov" >conditional move instruction</capability>
      <capability id="pat" >page attribute table</capability>
      <capability id="pse36" >36-bit page size extensions</capability>
      <capability id="clflush" />
      <capability id="dts" >debug trace and EMON store MSRs</capability>
      <capability id="acpi" >thermal control (ACPI)</capability>
      <capability id="mmx" >multimedia extensions (MMX)</capability>
      <capability id="fxsr" >fast floating point save/restore</capability>
      <capability id="sse" >streaming SIMD extensions (SSE)</capability>
      <capability id="sse2" >streaming SIMD extensions (SSE2)</capability>
      <capability id="ss" >self-snoop</capability>
      <capability id="ht" >HyperThreading</capability>
      <capability id="tm" >thermal interrupt and status</capability>
      <capability id="pbe" >pending break event</capability>
      <capability id="syscall" >fast system calls</capability>
      <capability id="nx" >no-execute bit (NX)</capability>
      <capability id="pdpe1gb" />
      <capability id="rdtscp" />
      <capability id="constant_tsc" />
      <capability id="arch_perfmon" />
      <capability id="pebs" />
      <capability id="bts" />
      <capability id="rep_good" />
      <capability id="nopl" />
      <capability id="xtopology" />
      <capability id="nonstop_tsc" />
      <capability id="aperfmperf" />
      <capability id="pni" />
      <capability id="pclmulqdq" />
      <capability id="dtes64" />
      <capability id="monitor" />
      <capability id="ds_cpl" />
      <capability id="vmx" />
      <capability id="smx" />
      <capability id="est" />
      <capability id="tm2" />
      <capability id="ssse3" />
      <capability id="cx16" />
      <capability id="xtpr" />
      <capability id="pdcm" />
      <capability id="pcid" />
      <capability id="dca" />
      <capability id="sse4_1" />
      <capability id="sse4_2" />
      <capability id="popcnt" />
      <capability id="aes" />
      <capability id="lahf_lm" />
      <capability id="ida" />
      <capability id="arat" />
      <capability id="epb" />
      <capability id="dtherm" />
      <capability id="tpr_shadow" />
      <capability id="vnmi" />
      <capability id="flexpriority" />
      <capability id="ept" />
      <capability id="vpid" />
      <capability id="cpufreq" >CPU Frequency scaling</capability>
     </capabilities>
      <node id="cache:0" claimed="true" class="memory" handle="DMI:0005">
       <description>L1 cache</description>
       <physid>5</physid>
       <slot>L1-Cache</slot>
       <size units="bytes">393216</size>
       <capacity units="bytes">393216</capacity>
       <configuration>
        <setting id="level" value="1" />
       </configuration>
       <capabilities>
        <capability id="internal" >Internal</capability>
        <capability id="write-through" >Write-trough</capability>
        <capability id="instruction" >Instruction cache</capability>
       </capabilities>
      </node>
      <node id="cache:1" claimed="true" class="memory" handle="DMI:0006">
       <description>L2 cache</description>
       <physid>6</physid>
       <slot>L2-Cache</slot>
       <size units="bytes">1572864</size>
       <capacity units="bytes">1572864</capacity>
       <configuration>
        <setting id="level" value="2" />
       </configuration>
       <capabilities>
        <capability id="internal" >Internal</capability>
        <capability id="write-through" >Write-trough</capability>
        <capability id="unified" >Unified cache</capability>
       </capabilities>
      </node>
      <node id="cache:2" claimed="true" class="memory" handle="DMI:0007">
       <description>L3 cache</description>
       <physid>7</physid>
       <slot>L3-Cache</slot>
       <size units="bytes">12582912</size>
       <capacity units="bytes">12582912</capacity>
       <configuration>
        <setting id="level" value="3" />
       </configuration>
       <capabilities>
        <capability id="internal" >Internal</capability>
        <capability id="write-back" >Write-back</capability>
        <capability id="unified" >Unified cache</capability>
       </capabilities>
      </node>
    </node>
    <node id="cpu:1" claimed="true" class="processor" handle="DMI:0008">
     <description>CPU</description>
     <product>Intel(R) Xeon(R) CPU           X5690  @ 3.47GHz</product>
     <vendor>Intel Corp.</vendor>
     <physid>8</physid>
     <businfo>cpu@1</businfo>
     <version>Intel(R) Xeon(R) CPU X5690 @ 3.47GHz</version>
     <serial>[REMOVED]</serial>
     <slot>CPU 2</slot>
     <size units="Hz">1733000000</size>
     <capacity units="Hz">3600000000</capacity>
     <width units="bits">64</width>
     <clock units="Hz">133000000</clock>
     <configuration>
      <setting id="cores" value="6" />
      <setting id="enabledcores" value="6" />
      <setting id="threads" value="12" />
     </configuration>
     <capabilities>
      <capability id="x86-64" >64bits extensions (x86-64)</capability>
      <capability id="fpu" >mathematical co-processor</capability>
      <capability id="fpu_exception" >FPU exceptions reporting</capability>
      <capability id="wp" />
      <capability id="vme" >virtual mode extensions</capability>
      <capability id="de" >debugging extensions</capability>
      <capability id="pse" >page size extensions</capability>
      <capability id="tsc" >time stamp counter</capability>
      <capability id="msr" >model-specific registers</capability>
      <capability id="pae" >4GB+ memory addressing (Physical Address Extension)</capability>
      <capability id="mce" >machine check exceptions</capability>
      <capability id="cx8" >compare and exchange 8-byte</capability>
      <capability id="apic" >on-chip advanced programmable interrupt controller (APIC)</capability>
      <capability id="sep" >fast system calls</capability>
      <capability id="mtrr" >memory type range registers</capability>
      <capability id="pge" >page global enable</capability>
      <capability id="mca" >machine check architecture</capability>
      <capability id="cmov" >conditional move instruction</capability>
      <capability id="pat" >page attribute table</capability>
      <capability id="pse36" >36-bit page size extensions</capability>
      <capability id="clflush" />
      <capability id="dts" >debug trace and EMON store MSRs</capability>
      <capability id="acpi" >thermal control (ACPI)</capability>
      <capability id="mmx" >multimedia extensions (MMX)</capability>
      <capability id="fxsr" >fast floating point save/restore</capability>
      <capability id="sse" >streaming SIMD extensions (SSE)</capability>
      <capability id="sse2" >streaming SIMD extensions (SSE2)</capability>
      <capability id="ss" >self-snoop</capability>
      <capability id="ht" >HyperThreading</capability>
      <capability id="tm" >thermal interrupt and status</capability>
      <capability id="pbe" >pending break event</capability>
      <capability id="syscall" >fast system calls</capability>
      <capability id="nx" >no-execute bit (NX)</capability>
      <capability id="pdpe1gb" />
      <capability id="rdtscp" />
      <capability id="constant_tsc" />
      <capability id="arch_perfmon" />
      <capability id="pebs" />
      <capability id="bts" />
      <capability id="rep_good" />
      <capability id="nopl" />
      <capability id="xtopology" />
      <capability id="nonstop_tsc" />
      <capability id="aperfmperf" />
      <capability id="pni" />
      <capability id="pclmulqdq" />
      <capability id="dtes64" />
      <capability id="monitor" />
      <capability id="ds_cpl" />
      <capability id="vmx" />
      <capability id="smx" />
      <capability id="est" />
      <capability id="tm2" />
      <capability id="ssse3" />
      <capability id="cx16" />
      <capability id="xtpr" />
      <capability id="pdcm" />
      <capability id="pcid" />
      <capability id="dca" />
      <capability id="sse4_1" />
      <capability id="sse4_2" />
      <capability id="popcnt" />
      <capability id="aes" />
      <capability id="lahf_lm" />
      <capability id="ida" />
      <capability id="arat" />
      <capability id="epb" />
      <capability id="dtherm" />
      <capability id="tpr_shadow" />
      <capability id="vnmi" />
      <capability id="flexpriority" />
      <capability id="ept" />
      <capability id="vpid" />
      <capability id="cpufreq" >CPU Frequency scaling</capability>
     </capabilities>
      <node id="cache:0" claimed="true" class="memory" handle="DMI:0009">
       <description>L1 cache</description>
       <physid>9</physid>
       <slot>L1-Cache</slot>
       <size units="bytes">393216</size>
       <capacity units="bytes">393216</capacity>
       <configuration>
        <setting id="level" value="1" />
       </configuration>
       <capabilities>
        <capability id="internal" >Internal</capability>
        <capability id="write-through" >Write-trough</capability>
        <capability id="instruction" >Instruction cache</capability>
       </capabilities>
      </node>
      <node id="cache:1" claimed="true" class="memory" handle="DMI:000A">
       <description>L2 cache</description>
       <physid>a</physid>
       <slot>L2-Cache</slot>
       <size units="bytes">1572864</size>
       <capacity units="bytes">1572864</capacity>
       <configuration>
        <setting id="level" value="2" />
       </configuration>
       <capabilities>
        <capability id="internal" >Internal</capability>
        <capability id="write-through" >Write-trough</capability>
        <capability id="unified" >Unified cache</capability>
       </capabilities>
      </node>
      <node id="cache:2" claimed="true" class="memory" handle="DMI:000B">
       <description>L3 cache</description>
       <physid>b</physid>
       <slot>L3-Cache</slot>
       <size units="bytes">12582912</size>
       <capacity units="bytes">12582912</capacity>
       <configuration>
        <setting id="level" value="3" />
       </configuration>
       <capabilities>
        <capability id="internal" >Internal</capability>
        <capability id="write-back" >Write-back</capability>
        <capability id="unified" >Unified cache</capability>
       </capabilities>
      </node>
    </node>
    <node id="memory" claimed="true" class="memory" handle="DMI:0030">
     <description>System Memory</description>
     <physid>30</physid>
     <slot>System board or motherboard</slot>
     <size units="bytes">34359738368</size>
     <configuration>
      <setting id="errordetection" value="multi-bit-ecc" />
     </configuration>
     <capabilities>
      <capability id="ecc" >Multi-bit error-correcting code (ECC)</capability>
     </capabilities>
      <node id="bank:0" claimed="true" class="memory" handle="DMI:0032">
       <description>DIMM DDR3 1333 MHz (0.8 ns)</description>
       <product>ModulePartNumber00</product>
       <vendor>Manufacturer00</vendor>
       <physid>0</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_A1</slot>
       <size units="bytes">8589934592</size>
       <width units="bits">64</width>
       <clock units="Hz">1333000000</clock>
      </node>
      <node id="bank:1" claimed="true" class="memory" handle="DMI:0034">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber01</product>
       <vendor>Manufacturer01</vendor>
       <physid>1</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_A2</slot>
       <width units="bits">64</width>
      </node>
      <node id="bank:2" claimed="true" class="memory" handle="DMI:0036">
       <description>DIMM DDR3 1333 MHz (0.8 ns)</description>
       <product>ModulePartNumber02</product>
       <vendor>Manufacturer02</vendor>
       <physid>2</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_B1</slot>
       <size units="bytes">8589934592</size>
       <width units="bits">64</width>
       <clock units="Hz">1333000000</clock>
      </node>
      <node id="bank:3" claimed="true" class="memory" handle="DMI:0038">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber03</product>
       <vendor>Manufacturer03</vendor>
       <physid>3</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_B2</slot>
       <width units="bits">64</width>
      </node>
      <node id="bank:4" claimed="true" class="memory" handle="DMI:003A">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber04</product>
       <vendor>Manufacturer04</vendor>
       <physid>4</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_C1</slot>
       <width units="bits">64</width>
      </node>
      <node id="bank:5" claimed="true" class="memory" handle="DMI:003C">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber05</product>
       <vendor>Manufacturer05</vendor>
       <physid>5</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_C2</slot>
       <width units="bits">64</width>
      </node>
      <node id="bank:6" claimed="true" class="memory" handle="DMI:003E">
       <description>DIMM DDR3 1333 MHz (0.8 ns)</description>
       <product>ModulePartNumber06</product>
       <vendor>Manufacturer06</vendor>
       <physid>6</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_D1</slot>
       <size units="bytes">8589934592</size>
       <width units="bits">64</width>
       <clock units="Hz">1333000000</clock>
      </node>
      <node id="bank:7" claimed="true" class="memory" handle="DMI:0040">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber07</product>
       <vendor>Manufacturer07</vendor>
       <physid>7</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_D2</slot>
       <width units="bits">64</width>
      </node>
      <node id="bank:8" claimed="true" class="memory" handle="DMI:0042">
       <description>DIMM DDR3 1333 MHz (0.8 ns)</description>
       <product>ModulePartNumber08</product>
       <vendor>Manufacturer08</vendor>
       <physid>8</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_E1</slot>
       <size units="bytes">8589934592</size>
       <width units="bits">64</width>
       <clock units="Hz">1333000000</clock>
      </node>
      <node id="bank:9" claimed="true" class="memory" handle="DMI:0044">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber09</product>
       <vendor>Manufacturer09</vendor>
       <physid>9</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_E2</slot>
       <width units="bits">64</width>
      </node>
      <node id="bank:10" claimed="true" class="memory" handle="DMI:0046">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber10</product>
       <vendor>Manufacturer10</vendor>
       <physid>a</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_F1</slot>
       <width units="bits">64</width>
      </node>
      <node id="bank:11" claimed="true" class="memory" handle="DMI:0048">
       <description>DIMM DDR3 [empty]</description>
       <product>ModulePartNumber11</product>
       <vendor>Manufacturer11</vendor>
       <physid>b</physid>
       <serial>[REMOVED]</serial>
       <slot>DIMM_F2</slot>
       <width units="bits">64</width>
      </node>
    </node>
    <node id="pci:0" claimed="true" class="bridge" handle="PCIBUS:0000:00">
     <description>Host bridge</description>
     <product>5520 I/O Hub to ESI Port</product>
     <vendor>Intel Corporation</vendor>
     <physid>100</physid>
     <businfo>pci@0000:00:00.0</businfo>
     <version>22</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
      <node id="pci:0" claimed="true" class="bridge" handle="PCIBUS:0000:10">
       <description>PCI bridge</description>
       <product>5520/5500/X58 I/O Hub PCI Express Root Port 1</product>
       <vendor>Intel Corporation</vendor>
       <physid>1</physid>
       <businfo>pci@0000:00:01.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
        <resource type="ioport" value="e000(size=4096)" />
        <resource type="memory" value="fb800000-fbefffff" />
       </resources>
        <node id="storage" claimed="true" class="storage" handle="PCI:0000:10:00.0">
         <description>Serial Attached SCSI controller</description>
         <product>SAS2008 PCI-Express Fusion-MPT SAS-2 [Falcon]</product>
         <vendor>LSI Logic / Symbios Logic</vendor>
         <physid>0</physid>
         <businfo>pci@0000:10:00.0</businfo>
         <logicalname>scsi2</logicalname>
         <version>03</version>
         <width units="bits">64</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="driver" value="mpt3sas" />
          <setting id="latency" value="0" />
         </configuration>
         <capabilities>
          <capability id="storage" />
          <capability id="pm" >Power Management</capability>
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="vpd" >Vital Product Data</capability>
          <capability id="msi" >Message Signalled Interrupts</capability>
          <capability id="msix" >MSI-X</capability>
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
          <capability id="rom" >extension ROM</capability>
         </capabilities>
         <resources>
          <resource type="irq" value="0" />
          <resource type="ioport" value="e000(size=256)" />
          <resource type="memory" value="fbe3c000-fbe3ffff" />
          <resource type="memory" value="fbe40000-fbe7ffff" />
          <resource type="memory" value="fbe80000-fbefffff" />
          <resource type="memory" value="fbdc0000-fbdfffff" />
          <resource type="memory" value="fb800000-fbbfffff" />
         </resources>
          <node id="disk:0" claimed="true" class="disk" handle="SCSI:02:00:03:00">
           <description>ATA Disk</description>
           <product>ST9750420AS</product>
           <vendor>Seagate</vendor>
           <physid>0.3.0</physid>
           <businfo>scsi@2:0.3.0</businfo>
           <logicalname>/dev/sdj</logicalname>
           <dev>8:144</dev>
           <version>SDM5</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">750156374016</size>
           <capacity units="bytes">750156513280</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.3.0,1</businfo>
             <logicalname>/dev/sdj1</logicalname>
             <dev>8:145</dev>
             <capacity>750156341248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
          <node id="disk:1" claimed="true" class="disk" handle="SCSI:02:00:04:00">
           <description>ATA Disk</description>
           <product>ST9750420AS</product>
           <vendor>Seagate</vendor>
           <physid>0.4.0</physid>
           <businfo>scsi@2:0.4.0</businfo>
           <logicalname>/dev/sdk</logicalname>
           <dev>8:160</dev>
           <version>SDM5</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">750156374016</size>
           <capacity units="bytes">750156513280</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.4.0,1</businfo>
             <logicalname>/dev/sdk1</logicalname>
             <dev>8:161</dev>
             <capacity>750156341248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
          <node id="disk:2" claimed="true" class="disk" handle="SCSI:02:00:05:00">
           <description>ATA Disk</description>
           <product>ST1000LX001-1EM1</product>
           <vendor>Seagate</vendor>
           <physid>0.5.0</physid>
           <businfo>scsi@2:0.5.0</businfo>
           <logicalname>/dev/sdl</logicalname>
           <dev>8:176</dev>
           <version>SD02</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">1000204886016</size>
           <capacity units="bytes">1000205189120</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
            <setting id="signature" value="0e4ed601" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.5.0,1</businfo>
             <logicalname>/dev/sdl1</logicalname>
             <dev>8:177</dev>
             <capacity>1000204853248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
          <node id="disk:3" claimed="true" class="disk" handle="SCSI:02:00:06:00">
           <description>ATA Disk</description>
           <product>ST1000LX001-1EM1</product>
           <vendor>Seagate</vendor>
           <physid>0.6.0</physid>
           <businfo>scsi@2:0.6.0</businfo>
           <logicalname>/dev/sdm</logicalname>
           <dev>8:192</dev>
           <version>SD02</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">1000204886016</size>
           <capacity units="bytes">1000205189120</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
            <setting id="signature" value="0e4ed603" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.6.0,1</businfo>
             <logicalname>/dev/sdm1</logicalname>
             <dev>8:193</dev>
             <capacity>1000204853248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
          <node id="disk:4" claimed="true" class="disk" handle="SCSI:02:00:07:00">
           <description>ATA Disk</description>
           <product>ST1000LX001-1EM1</product>
           <vendor>Seagate</vendor>
           <physid>0.7.0</physid>
           <businfo>scsi@2:0.7.0</businfo>
           <logicalname>/dev/sdn</logicalname>
           <dev>8:208</dev>
           <version>SD02</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">1000204886016</size>
           <capacity units="bytes">1000205189120</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
            <setting id="signature" value="0e4ed605" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.7.0,1</businfo>
             <logicalname>/dev/sdn1</logicalname>
             <dev>8:209</dev>
             <capacity>1000204853248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
          <node id="disk:5" claimed="true" class="disk" handle="SCSI:02:00:00:00">
           <description>ATA Disk</description>
           <product>ST1000LX001-1EM1</product>
           <vendor>Seagate</vendor>
           <physid>0.0.0</physid>
           <businfo>scsi@2:0.0.0</businfo>
           <logicalname>/dev/sdg</logicalname>
           <dev>8:96</dev>
           <version>SD02</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">1000204886016</size>
           <capacity units="bytes">1000205189120</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
            <setting id="signature" value="0e4ed60f" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.0.0,1</businfo>
             <logicalname>/dev/sdg1</logicalname>
             <dev>8:97</dev>
             <capacity>1000204853248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
          <node id="disk:6" claimed="true" class="disk" handle="SCSI:02:00:01:00">
           <description>ATA Disk</description>
           <product>ST9750420AS</product>
           <vendor>Seagate</vendor>
           <physid>0.1.0</physid>
           <businfo>scsi@2:0.1.0</businfo>
           <logicalname>/dev/sdh</logicalname>
           <dev>8:112</dev>
           <version>SDM5</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">750156374016</size>
           <capacity units="bytes">750156513280</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.1.0,1</businfo>
             <logicalname>/dev/sdh1</logicalname>
             <dev>8:113</dev>
             <capacity>750156341248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
          <node id="disk:7" claimed="true" class="disk" handle="SCSI:02:00:02:00">
           <description>ATA Disk</description>
           <product>ST9750420AS</product>
           <vendor>Seagate</vendor>
           <physid>0.2.0</physid>
           <businfo>scsi@2:0.2.0</businfo>
           <logicalname>/dev/sdi</logicalname>
           <dev>8:128</dev>
           <version>SDM5</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">750156374016</size>
           <capacity units="bytes">750156513280</capacity>
           <configuration>
            <setting id="ansiversion" value="6" />
            <setting id="logicalsectorsize" value="512" />
            <setting id="sectorsize" value="4096" />
           </configuration>
           <capabilities>
            <capability id="15000rpm" >15000 rotations per minute</capability>
            <capability id="partitioned" >Partitioned disk</capability>
            <capability id="partitioned:dos" >MS-DOS partition table</capability>
           </capabilities>
            <node id="volume" claimed="true" class="volume" handle="">
             <description>Linux filesystem partition</description>
             <physid>1</physid>
             <businfo>scsi@2:0.2.0,1</businfo>
             <logicalname>/dev/sdi1</logicalname>
             <dev>8:129</dev>
             <capacity>750156341248</capacity>
             <capabilities>
              <capability id="primary" >Primary partition</capability>
             </capabilities>
            </node>
          </node>
        </node>
      </node>
      <node id="pci:1" claimed="true" class="bridge" handle="PCIBUS:0000:0f">
       <description>PCI bridge</description>
       <product>5520/5500/X58 I/O Hub PCI Express Root Port 2</product>
       <vendor>Intel Corporation</vendor>
       <physid>2</physid>
       <businfo>pci@0000:00:02.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
       </resources>
      </node>
      <node id="pci:2" claimed="true" class="bridge" handle="PCIBUS:0000:0e">
       <description>PCI bridge</description>
       <product>5520/5500/X58 I/O Hub PCI Express Root Port 3</product>
       <vendor>Intel Corporation</vendor>
       <physid>3</physid>
       <businfo>pci@0000:00:03.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
       </resources>
      </node>
      <node id="pci:3" claimed="true" class="bridge" handle="PCIBUS:0000:0d">
       <description>PCI bridge</description>
       <product>5520/X58 I/O Hub PCI Express Root Port 4</product>
       <vendor>Intel Corporation</vendor>
       <physid>4</physid>
       <businfo>pci@0000:00:04.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
       </resources>
      </node>
      <node id="pci:4" claimed="true" class="bridge" handle="PCIBUS:0000:0c">
       <description>PCI bridge</description>
       <product>5520/X58 I/O Hub PCI Express Root Port 5</product>
       <vendor>Intel Corporation</vendor>
       <physid>5</physid>
       <businfo>pci@0000:00:05.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
        <resource type="memory" value="fb700000-fb7fffff" />
       </resources>
        <node id="usb" claimed="true" class="bus" handle="PCI:0000:0c:00.0">
         <description>USB controller</description>
         <product>EJ188/EJ198 USB 3.0 Host Controller</product>
         <vendor>Etron Technology, Inc.</vendor>
         <physid>0</physid>
         <businfo>pci@0000:0c:00.0</businfo>
         <version>00</version>
         <width units="bits">64</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="driver" value="vfio-pci" />
          <setting id="latency" value="0" />
         </configuration>
         <capabilities>
          <capability id="pm" >Power Management</capability>
          <capability id="msi" >Message Signalled Interrupts</capability>
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="xhci" />
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
         </capabilities>
         <resources>
          <resource type="irq" value="37" />
          <resource type="memory" value="fb7f8000-fb7fffff" />
         </resources>
        </node>
      </node>
      <node id="pci:5" claimed="true" class="bridge" handle="PCIBUS:0000:0b">
       <description>PCI bridge</description>
       <product>5520/X58 I/O Hub PCI Express Root Port 6</product>
       <vendor>Intel Corporation</vendor>
       <physid>6</physid>
       <businfo>pci@0000:00:06.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
       </resources>
      </node>
      <node id="pci:6" claimed="true" class="bridge" handle="PCIBUS:0000:0a">
       <description>PCI bridge</description>
       <product>5520/5500/X58 I/O Hub PCI Express Root Port 7</product>
       <vendor>Intel Corporation</vendor>
       <physid>7</physid>
       <businfo>pci@0000:00:07.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
        <resource type="ioport" value="d000(size=4096)" />
        <resource type="memory" value="f9f00000-fb6fffff" />
        <resource type="ioport" value="ce000000(size=301989888)" />
       </resources>
        <node id="display" claimed="true" class="display" handle="PCI:0000:0a:00.0">
         <description>VGA compatible controller</description>
         <product>GM204 [GeForce GTX 970]</product>
         <vendor>NVIDIA Corporation</vendor>
         <physid>0</physid>
         <businfo>pci@0000:0a:00.0</businfo>
         <version>a1</version>
         <width units="bits">64</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="driver" value="vfio-pci" />
          <setting id="latency" value="0" />
         </configuration>
         <capabilities>
          <capability id="pm" >Power Management</capability>
          <capability id="msi" >Message Signalled Interrupts</capability>
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="vga_controller" />
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
          <capability id="rom" >extension ROM</capability>
         </capabilities>
         <resources>
          <resource type="irq" value="28" />
          <resource type="memory" value="fa000000-faffffff" />
          <resource type="memory" value="d0000000-dfffffff" />
          <resource type="memory" value="ce000000-cfffffff" />
          <resource type="ioport" value="dc00(size=128)" />
          <resource type="memory" value="f9f80000-f9ffffff" />
         </resources>
        </node>
        <node id="multimedia" claimed="true" class="multimedia" handle="PCI:0000:0a:00.1">
         <description>Audio device</description>
         <product>GM204 High Definition Audio Controller</product>
         <vendor>NVIDIA Corporation</vendor>
         <physid>0.1</physid>
         <businfo>pci@0000:0a:00.1</businfo>
         <version>a1</version>
         <width units="bits">32</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="driver" value="vfio-pci" />
          <setting id="latency" value="0" />
         </configuration>
         <capabilities>
          <capability id="pm" >Power Management</capability>
          <capability id="msi" >Message Signalled Interrupts</capability>
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
         </capabilities>
         <resources>
          <resource type="irq" value="29" />
          <resource type="memory" value="fb6fc000-fb6fffff" />
         </resources>
        </node>
      </node>
      <node id="pci:7" claimed="true" class="bridge" handle="PCIBUS:0000:09">
       <description>PCI bridge</description>
       <product>5520/5500/X58 I/O Hub PCI Express Root Port 8</product>
       <vendor>Intel Corporation</vendor>
       <physid>8</physid>
       <businfo>pci@0000:00:08.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
       </resources>
      </node>
      <node id="pci:8" claimed="true" class="bridge" handle="PCIBUS:0000:08">
       <description>PCI bridge</description>
       <product>7500/5520/5500/X58 I/O Hub PCI Express Root Port 9</product>
       <vendor>Intel Corporation</vendor>
       <physid>9</physid>
       <businfo>pci@0000:00:09.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
       </resources>
      </node>
      <node id="pci:9" claimed="true" class="bridge" handle="PCIBUS:0000:07">
       <description>PCI bridge</description>
       <product>7500/5520/5500/X58 I/O Hub PCI Express Root Port 10</product>
       <vendor>Intel Corporation</vendor>
       <physid>a</physid>
       <businfo>pci@0000:00:0a.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="0" />
       </resources>
      </node>
      <node id="generic:0" class="generic" handle="PCI:0000:00:10.0">
       <description>PIC</description>
       <product>7500/5520/5500/X58 Physical and Link Layer Registers Port 0</product>
       <vendor>Intel Corporation</vendor>
       <physid>10</physid>
       <businfo>pci@0000:00:10.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="8259" />
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
      </node>
      <node id="generic:1" class="generic" handle="PCI:0000:00:10.1">
       <description>PIC</description>
       <product>7500/5520/5500/X58 Routing and Protocol Layer Registers Port 0</product>
       <vendor>Intel Corporation</vendor>
       <physid>10.1</physid>
       <businfo>pci@0000:00:10.1</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="8259" />
       </capabilities>
      </node>
      <node id="generic:2" class="generic" handle="PCI:0000:00:11.0">
       <description>PIC</description>
       <product>7500/5520/5500 Physical and Link Layer Registers Port 1</product>
       <vendor>Intel Corporation</vendor>
       <physid>11</physid>
       <businfo>pci@0000:00:11.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="8259" />
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
      </node>
      <node id="generic:3" class="generic" handle="PCI:0000:00:11.1">
       <description>PIC</description>
       <product>7500/5520/5500 Routing &amp; Protocol Layer Register Port 1</product>
       <vendor>Intel Corporation</vendor>
       <physid>11.1</physid>
       <businfo>pci@0000:00:11.1</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="8259" />
       </capabilities>
      </node>
      <node id="generic:4" class="generic" handle="PCI:0000:00:14.0">
       <description>PIC</description>
       <product>7500/5520/5500/X58 I/O Hub System Management Registers</product>
       <vendor>Intel Corporation</vendor>
       <physid>14</physid>
       <businfo>pci@0000:00:14.0</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="8259" />
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
      </node>
      <node id="generic:5" class="generic" handle="PCI:0000:00:14.1">
       <description>PIC</description>
       <product>7500/5520/5500/X58 I/O Hub GPIO and Scratch Pad Registers</product>
       <vendor>Intel Corporation</vendor>
       <physid>14.1</physid>
       <businfo>pci@0000:00:14.1</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="8259" />
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
      </node>
      <node id="generic:6" class="generic" handle="PCI:0000:00:14.2">
       <description>PIC</description>
       <product>7500/5520/5500/X58 I/O Hub Control Status and RAS Registers</product>
       <vendor>Intel Corporation</vendor>
       <physid>14.2</physid>
       <businfo>pci@0000:00:14.2</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="8259" />
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
      </node>
      <node id="generic:7" class="generic" handle="PCI:0000:00:14.3">
       <description>PIC</description>
       <product>7500/5520/5500/X58 I/O Hub Throttle Registers</product>
       <vendor>Intel Corporation</vendor>
       <physid>14.3</physid>
       <businfo>pci@0000:00:14.3</businfo>
       <version>22</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="8259" />
       </capabilities>
      </node>
      <node id="generic:8" class="generic" handle="PCI:0000:00:16.0">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16</physid>
       <businfo>pci@0000:00:16.0</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9bd4000-f9bd7fff" />
       </resources>
      </node>
      <node id="generic:9" class="generic" handle="PCI:0000:00:16.1">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16.1</physid>
       <businfo>pci@0000:00:16.1</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9bd8000-f9bdbfff" />
       </resources>
      </node>
      <node id="generic:10" class="generic" handle="PCI:0000:00:16.2">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16.2</physid>
       <businfo>pci@0000:00:16.2</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9bdc000-f9bdffff" />
       </resources>
      </node>
      <node id="generic:11" class="generic" handle="PCI:0000:00:16.3">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16.3</physid>
       <businfo>pci@0000:00:16.3</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9be0000-f9be3fff" />
       </resources>
      </node>
      <node id="generic:12" class="generic" handle="PCI:0000:00:16.4">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16.4</physid>
       <businfo>pci@0000:00:16.4</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9be4000-f9be7fff" />
       </resources>
      </node>
      <node id="generic:13" class="generic" handle="PCI:0000:00:16.5">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16.5</physid>
       <businfo>pci@0000:00:16.5</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9be8000-f9bebfff" />
       </resources>
      </node>
      <node id="generic:14" class="generic" handle="PCI:0000:00:16.6">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16.6</physid>
       <businfo>pci@0000:00:16.6</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9bec000-f9beffff" />
       </resources>
      </node>
      <node id="generic:15" class="generic" handle="PCI:0000:00:16.7">
       <description>System peripheral</description>
       <product>5520/5500/X58 Chipset QuickData Technology Device</product>
       <vendor>Intel Corporation</vendor>
       <physid>16.7</physid>
       <businfo>pci@0000:00:16.7</businfo>
       <version>22</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="msix" >MSI-X</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9bf0000-f9bf3fff" />
       </resources>
      </node>
      <node id="usb:0" claimed="true" class="bus" handle="PCI:0000:00:1a.0">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB UHCI Controller #4</product>
       <vendor>Intel Corporation</vendor>
       <physid>1a</physid>
       <businfo>pci@0000:00:1a.0</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="uhci_hcd" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="uhci" >Universal Host Controller Interface (USB1)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="16" />
        <resource type="ioport" value="7400(size=32)" />
       </resources>
      </node>
      <node id="usb:1" claimed="true" class="bus" handle="PCI:0000:00:1a.1">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB UHCI Controller #5</product>
       <vendor>Intel Corporation</vendor>
       <physid>1a.1</physid>
       <businfo>pci@0000:00:1a.1</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="uhci_hcd" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="uhci" >Universal Host Controller Interface (USB1)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="21" />
        <resource type="ioport" value="7480(size=32)" />
       </resources>
      </node>
      <node id="usb:2" claimed="true" class="bus" handle="PCI:0000:00:1a.7">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB2 EHCI Controller #2</product>
       <vendor>Intel Corporation</vendor>
       <physid>1a.7</physid>
       <businfo>pci@0000:00:1a.7</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="ehci-pci" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="pm" >Power Management</capability>
        <capability id="debug" >Debug port</capability>
        <capability id="ehci" >Enhanced Host Controller Interface (USB2)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="18" />
        <resource type="memory" value="f9bf8000-f9bf83ff" />
       </resources>
      </node>
      <node id="multimedia" class="multimedia" handle="PCI:0000:00:1b.0">
       <description>Audio device</description>
       <product>82801JI (ICH10 Family) HD Audio Controller</product>
       <vendor>Intel Corporation</vendor>
       <physid>1b</physid>
       <businfo>pci@0000:00:1b.0</businfo>
       <version>00</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="pm" >Power Management</capability>
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="memory" value="f9bf4000-f9bf7fff" />
       </resources>
      </node>
      <node id="pci:10" claimed="true" class="bridge" handle="PCIBUS:0000:04">
       <description>PCI bridge</description>
       <product>82801JI (ICH10 Family) PCI Express Root Port 1</product>
       <vendor>Intel Corporation</vendor>
       <physid>1c</physid>
       <businfo>pci@0000:00:1c.0</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="24" />
        <resource type="ioport" value="1000(size=4096)" />
        <resource type="memory" value="f9e00000-f9efffff" />
        <resource type="ioport" value="c0000000(size=2097152)" />
       </resources>
        <node id="pci:0" claimed="true" class="bridge" handle="PCIBUS:0000:06">
         <description>PCI bridge</description>
         <product>uPD720400 PCI Express - PCI/PCI-X Bridge</product>
         <vendor>NEC Corporation</vendor>
         <physid>0</physid>
         <businfo>pci@0000:04:00.0</businfo>
         <version>06</version>
         <width units="bits">64</width>
         <clock units="Hz">33000000</clock>
         <capabilities>
          <capability id="pci" />
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="pcix" >PCI-X</capability>
          <capability id="pm" >Power Management</capability>
          <capability id="normal_decode" />
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
         </capabilities>
         <resources>
          <resource type="iomemory" value="242001f10-242001f0f" />
         </resources>
        </node>
        <node id="pci:1" claimed="true" class="bridge" handle="PCIBUS:0000:05">
         <description>PCI bridge</description>
         <product>uPD720400 PCI Express - PCI/PCI-X Bridge</product>
         <vendor>NEC Corporation</vendor>
         <physid>0.1</physid>
         <businfo>pci@0000:04:00.1</businfo>
         <version>06</version>
         <width units="bits">64</width>
         <clock units="Hz">33000000</clock>
         <capabilities>
          <capability id="pci" />
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="pcix" >PCI-X</capability>
          <capability id="pm" >Power Management</capability>
          <capability id="msi" >Message Signalled Interrupts</capability>
          <capability id="normal_decode" />
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
         </capabilities>
         <resources>
          <resource type="iomemory" value="242001f10-242001f0f" />
          <resource type="memory" value="f9eff000-f9eff07f" />
         </resources>
        </node>
      </node>
      <node id="pci:11" claimed="true" class="bridge" handle="PCIBUS:0000:03">
       <description>PCI bridge</description>
       <product>82801JI (ICH10 Family) PCI Express Root Port 5</product>
       <vendor>Intel Corporation</vendor>
       <physid>1c.4</physid>
       <businfo>pci@0000:00:1c.4</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="25" />
        <resource type="ioport" value="c000(size=4096)" />
        <resource type="memory" value="f9d00000-f9dfffff" />
        <resource type="ioport" value="c0200000(size=2097152)" />
       </resources>
        <node id="network" claimed="true" class="network" handle="PCI:0000:03:00.0">
         <description>Ethernet interface</description>
         <product>82574L Gigabit Network Connection</product>
         <vendor>Intel Corporation</vendor>
         <physid>0</physid>
         <businfo>pci@0000:03:00.0</businfo>
         <logicalname>eth0</logicalname>
         <version>00</version>
         <serial>[REMOVED]</serial>
         <size units="bit/s">100000000</size>
         <capacity>1000000000</capacity>
         <width units="bits">32</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="autonegotiation" value="on" />
          <setting id="broadcast" value="yes" />
          <setting id="driver" value="e1000e" />
          <setting id="driverversion" value="3.2.6-k" />
          <setting id="duplex" value="full" />
          <setting id="firmware" value="1.8-0" />
          <setting id="latency" value="0" />
          <setting id="link" value="yes" />
          <setting id="multicast" value="yes" />
          <setting id="port" value="twisted pair" />
          <setting id="slave" value="yes" />
          <setting id="speed" value="100Mbit/s" />
         </configuration>
         <capabilities>
          <capability id="pm" >Power Management</capability>
          <capability id="msi" >Message Signalled Interrupts</capability>
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="msix" >MSI-X</capability>
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
          <capability id="ethernet" />
          <capability id="physical" >Physical interface</capability>
          <capability id="tp" >twisted pair</capability>
          <capability id="10bt" >10Mbit/s</capability>
          <capability id="10bt-fd" >10Mbit/s (full duplex)</capability>
          <capability id="100bt" >100Mbit/s</capability>
          <capability id="100bt-fd" >100Mbit/s (full duplex)</capability>
          <capability id="1000bt-fd" >1Gbit/s (full duplex)</capability>
          <capability id="autonegotiation" >Auto-negotiation</capability>
         </capabilities>
         <resources>
          <resource type="irq" value="0" />
          <resource type="memory" value="f9de0000-f9dfffff" />
          <resource type="ioport" value="cc00(size=32)" />
          <resource type="memory" value="f9ddc000-f9ddffff" />
         </resources>
        </node>
      </node>
      <node id="pci:12" claimed="true" class="bridge" handle="PCIBUS:0000:02">
       <description>PCI bridge</description>
       <product>82801JI (ICH10 Family) PCI Express Root Port 6</product>
       <vendor>Intel Corporation</vendor>
       <physid>1c.5</physid>
       <businfo>pci@0000:00:1c.5</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="pcieport" />
       </configuration>
       <capabilities>
        <capability id="pci" />
        <capability id="pciexpress" >PCI Express</capability>
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="normal_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="26" />
        <resource type="ioport" value="b000(size=4096)" />
        <resource type="memory" value="f9c00000-f9cfffff" />
        <resource type="ioport" value="c0400000(size=2097152)" />
       </resources>
        <node id="network" claimed="true" class="network" handle="PCI:0000:02:00.0">
         <description>Ethernet interface</description>
         <product>82574L Gigabit Network Connection</product>
         <vendor>Intel Corporation</vendor>
         <physid>0</physid>
         <businfo>pci@0000:02:00.0</businfo>
         <logicalname>eth1</logicalname>
         <version>00</version>
         <serial>[REMOVED]</serial>
         <size units="bit/s">1000000000</size>
         <capacity>1000000000</capacity>
         <width units="bits">32</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="autonegotiation" value="on" />
          <setting id="broadcast" value="yes" />
          <setting id="driver" value="e1000e" />
          <setting id="driverversion" value="3.2.6-k" />
          <setting id="duplex" value="full" />
          <setting id="firmware" value="1.8-0" />
          <setting id="latency" value="0" />
          <setting id="link" value="yes" />
          <setting id="multicast" value="yes" />
          <setting id="port" value="twisted pair" />
          <setting id="slave" value="yes" />
          <setting id="speed" value="1Gbit/s" />
         </configuration>
         <capabilities>
          <capability id="pm" >Power Management</capability>
          <capability id="msi" >Message Signalled Interrupts</capability>
          <capability id="pciexpress" >PCI Express</capability>
          <capability id="msix" >MSI-X</capability>
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
          <capability id="ethernet" />
          <capability id="physical" >Physical interface</capability>
          <capability id="tp" >twisted pair</capability>
          <capability id="10bt" >10Mbit/s</capability>
          <capability id="10bt-fd" >10Mbit/s (full duplex)</capability>
          <capability id="100bt" >100Mbit/s</capability>
          <capability id="100bt-fd" >100Mbit/s (full duplex)</capability>
          <capability id="1000bt-fd" >1Gbit/s (full duplex)</capability>
          <capability id="autonegotiation" >Auto-negotiation</capability>
         </capabilities>
         <resources>
          <resource type="irq" value="0" />
          <resource type="memory" value="f9ce0000-f9cfffff" />
          <resource type="ioport" value="bc00(size=32)" />
          <resource type="memory" value="f9cdc000-f9cdffff" />
         </resources>
        </node>
      </node>
      <node id="usb:3" claimed="true" class="bus" handle="PCI:0000:00:1d.0">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB UHCI Controller #1</product>
       <vendor>Intel Corporation</vendor>
       <physid>1d</physid>
       <businfo>pci@0000:00:1d.0</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="uhci_hcd" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="uhci" >Universal Host Controller Interface (USB1)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="23" />
        <resource type="ioport" value="7800(size=32)" />
       </resources>
      </node>
      <node id="usb:4" claimed="true" class="bus" handle="PCI:0000:00:1d.1">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB UHCI Controller #2</product>
       <vendor>Intel Corporation</vendor>
       <physid>1d.1</physid>
       <businfo>pci@0000:00:1d.1</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="uhci_hcd" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="uhci" >Universal Host Controller Interface (USB1)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="19" />
        <resource type="ioport" value="7880(size=32)" />
       </resources>
      </node>
      <node id="usb:5" claimed="true" class="bus" handle="PCI:0000:00:1d.2">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB UHCI Controller #3</product>
       <vendor>Intel Corporation</vendor>
       <physid>1d.2</physid>
       <businfo>pci@0000:00:1d.2</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="uhci_hcd" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="uhci" >Universal Host Controller Interface (USB1)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="18" />
        <resource type="ioport" value="7c00(size=32)" />
       </resources>
      </node>
      <node id="usb:6" claimed="true" class="bus" handle="PCI:0000:00:1d.3">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB UHCI Controller #6</product>
       <vendor>Intel Corporation</vendor>
       <physid>1d.3</physid>
       <businfo>pci@0000:00:1d.3</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="uhci_hcd" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="uhci" >Universal Host Controller Interface (USB1)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="16" />
        <resource type="ioport" value="8000(size=32)" />
       </resources>
      </node>
      <node id="usb:7" claimed="true" class="bus" handle="PCI:0000:00:1d.7">
       <description>USB controller</description>
       <product>82801JI (ICH10 Family) USB2 EHCI Controller #1</product>
       <vendor>Intel Corporation</vendor>
       <physid>1d.7</physid>
       <businfo>pci@0000:00:1d.7</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="ehci-pci" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="pm" >Power Management</capability>
        <capability id="debug" >Debug port</capability>
        <capability id="ehci" >Enhanced Host Controller Interface (USB2)</capability>
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="23" />
        <resource type="memory" value="f9bf9000-f9bf93ff" />
       </resources>
      </node>
      <node id="pci:13" claimed="true" class="bridge" handle="PCIBUS:0000:01">
       <description>PCI bridge</description>
       <product>82801 PCI Bridge</product>
       <vendor>Intel Corporation</vendor>
       <physid>1e</physid>
       <businfo>pci@0000:00:1e.0</businfo>
       <version>90</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <capabilities>
        <capability id="pci" />
        <capability id="subtractive_decode" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="ioport" value="9000(size=8192)" />
        <resource type="memory" value="f8f00000-f97fffff" />
       </resources>
        <node id="display" claimed="true" class="display" handle="PCI:0000:01:01.0">
         <description>VGA compatible controller</description>
         <product>ASPEED Graphics Family</product>
         <vendor>ASPEED Technology, Inc.</vendor>
         <physid>1</physid>
         <businfo>pci@0000:01:01.0</businfo>
         <version>10</version>
         <width units="bits">32</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="driver" value="ast" />
          <setting id="latency" value="0" />
         </configuration>
         <capabilities>
          <capability id="pm" >Power Management</capability>
          <capability id="vga_controller" />
          <capability id="cap_list" >PCI capabilities listing</capability>
          <capability id="rom" >extension ROM</capability>
         </capabilities>
         <resources>
          <resource type="irq" value="17" />
          <resource type="memory" value="f9000000-f97fffff" />
          <resource type="memory" value="f8fe0000-f8ffffff" />
          <resource type="ioport" value="9000(size=128)" />
         </resources>
        </node>
        <node id="ide" class="storage" handle="PCI:0000:01:04.0">
         <description>IDE interface</description>
         <product>IT8213 IDE Controller</product>
         <vendor>Integrated Technology Express, Inc.</vendor>
         <physid>4</physid>
         <businfo>pci@0000:01:04.0</businfo>
         <version>00</version>
         <width units="bits">32</width>
         <clock units="Hz">33000000</clock>
         <configuration>
          <setting id="latency" value="64" />
          <setting id="maxlatency" value="8" />
          <setting id="mingnt" value="8" />
         </configuration>
         <capabilities>
          <capability id="ide" />
          <capability id="pm" >Power Management</capability>
          <capability id="bus_master" >bus mastering</capability>
          <capability id="cap_list" >PCI capabilities listing</capability>
         </capabilities>
         <resources>
          <resource type="ioport" value="ac00(size=8)" />
          <resource type="ioport" value="a880(size=4)" />
          <resource type="ioport" value="a800(size=8)" />
          <resource type="ioport" value="a480(size=4)" />
          <resource type="ioport" value="a400(size=16)" />
         </resources>
        </node>
      </node>
      <node id="isa" claimed="true" class="bridge" handle="PCI:0000:00:1f.0">
       <description>ISA bridge</description>
       <product>82801JIR (ICH10R) LPC Interface Controller</product>
       <vendor>Intel Corporation</vendor>
       <physid>1f</physid>
       <businfo>pci@0000:00:1f.0</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="isa" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
      </node>
      <node id="storage" claimed="true" class="storage" handle="PCI:0000:00:1f.2">
       <description>SATA controller</description>
       <product>82801JI (ICH10 Family) SATA AHCI Controller</product>
       <vendor>Intel Corporation</vendor>
       <physid>1f.2</physid>
       <businfo>pci@0000:00:1f.2</businfo>
       <version>00</version>
       <width units="bits">32</width>
       <clock units="Hz">66000000</clock>
       <configuration>
        <setting id="driver" value="ahci" />
        <setting id="latency" value="0" />
       </configuration>
       <capabilities>
        <capability id="storage" />
        <capability id="msi" >Message Signalled Interrupts</capability>
        <capability id="pm" >Power Management</capability>
        <capability id="ahci_1.0" />
        <capability id="bus_master" >bus mastering</capability>
        <capability id="cap_list" >PCI capabilities listing</capability>
       </capabilities>
       <resources>
        <resource type="irq" value="49" />
        <resource type="ioport" value="8080(size=8)" />
        <resource type="ioport" value="8880(size=4)" />
        <resource type="ioport" value="8800(size=8)" />
        <resource type="ioport" value="8480(size=4)" />
        <resource type="ioport" value="8400(size=32)" />
        <resource type="memory" value="f9bfa000-f9bfa7ff" />
       </resources>
      </node>
      <node id="serial" claimed="true" class="bus" handle="PCI:0000:00:1f.3">
       <description>SMBus</description>
       <product>82801JI (ICH10 Family) SMBus Controller</product>
       <vendor>Intel Corporation</vendor>
       <physid>1f.3</physid>
       <businfo>pci@0000:00:1f.3</businfo>
       <version>00</version>
       <width units="bits">64</width>
       <clock units="Hz">33000000</clock>
       <configuration>
        <setting id="driver" value="i801_smbus" />
        <setting id="latency" value="0" />
       </configuration>
       <resources>
        <resource type="irq" value="22" />
        <resource type="memory" value="f9bfb000-f9bfb0ff" />
        <resource type="ioport" value="400(size=32)" />
       </resources>
      </node>
    </node>
    <node id="pci:1" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QuickPath Architecture Generic Non-core Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>101</physid>
     <businfo>pci@0000:fe:00.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:2" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QuickPath Architecture System Address Decoder</product>
     <vendor>Intel Corporation</vendor>
     <physid>102</physid>
     <businfo>pci@0000:fe:00.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:3" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Link 0</product>
     <vendor>Intel Corporation</vendor>
     <physid>103</physid>
     <businfo>pci@0000:fe:02.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:4" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Physical 0</product>
     <vendor>Intel Corporation</vendor>
     <physid>104</physid>
     <businfo>pci@0000:fe:02.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:5" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Mirror Port Link 0</product>
     <vendor>Intel Corporation</vendor>
     <physid>105</physid>
     <businfo>pci@0000:fe:02.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:6" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Mirror Port Link 1</product>
     <vendor>Intel Corporation</vendor>
     <physid>106</physid>
     <businfo>pci@0000:fe:02.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:7" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Link 1</product>
     <vendor>Intel Corporation</vendor>
     <physid>107</physid>
     <businfo>pci@0000:fe:02.4</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:8" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Physical 1</product>
     <vendor>Intel Corporation</vendor>
     <physid>108</physid>
     <businfo>pci@0000:fe:02.5</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:9" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>109</physid>
     <businfo>pci@0000:fe:03.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:10" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Target Address Decoder</product>
     <vendor>Intel Corporation</vendor>
     <physid>10a</physid>
     <businfo>pci@0000:fe:03.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:11" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller RAS Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>10b</physid>
     <businfo>pci@0000:fe:03.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:12" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Test Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>10c</physid>
     <businfo>pci@0000:fe:03.4</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:13" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>10d</physid>
     <businfo>pci@0000:fe:04.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:14" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Address</product>
     <vendor>Intel Corporation</vendor>
     <physid>10e</physid>
     <businfo>pci@0000:fe:04.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:15" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Rank</product>
     <vendor>Intel Corporation</vendor>
     <physid>10f</physid>
     <businfo>pci@0000:fe:04.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:16" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Thermal Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>110</physid>
     <businfo>pci@0000:fe:04.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:17" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>111</physid>
     <businfo>pci@0000:fe:05.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:18" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Address</product>
     <vendor>Intel Corporation</vendor>
     <physid>112</physid>
     <businfo>pci@0000:fe:05.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:19" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Rank</product>
     <vendor>Intel Corporation</vendor>
     <physid>113</physid>
     <businfo>pci@0000:fe:05.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:20" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Thermal Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>114</physid>
     <businfo>pci@0000:fe:05.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:21" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>115</physid>
     <businfo>pci@0000:fe:06.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:22" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Address</product>
     <vendor>Intel Corporation</vendor>
     <physid>116</physid>
     <businfo>pci@0000:fe:06.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:23" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Rank</product>
     <vendor>Intel Corporation</vendor>
     <physid>117</physid>
     <businfo>pci@0000:fe:06.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:24" claimed="true" class="bridge" handle="PCIBUS:0000:fe">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Thermal Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>118</physid>
     <businfo>pci@0000:fe:06.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:25" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QuickPath Architecture Generic Non-core Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>119</physid>
     <businfo>pci@0000:ff:00.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:26" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QuickPath Architecture System Address Decoder</product>
     <vendor>Intel Corporation</vendor>
     <physid>11a</physid>
     <businfo>pci@0000:ff:00.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:27" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Link 0</product>
     <vendor>Intel Corporation</vendor>
     <physid>11b</physid>
     <businfo>pci@0000:ff:02.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:28" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Physical 0</product>
     <vendor>Intel Corporation</vendor>
     <physid>11c</physid>
     <businfo>pci@0000:ff:02.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:29" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Mirror Port Link 0</product>
     <vendor>Intel Corporation</vendor>
     <physid>11d</physid>
     <businfo>pci@0000:ff:02.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:30" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Mirror Port Link 1</product>
     <vendor>Intel Corporation</vendor>
     <physid>11e</physid>
     <businfo>pci@0000:ff:02.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:31" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Link 1</product>
     <vendor>Intel Corporation</vendor>
     <physid>11f</physid>
     <businfo>pci@0000:ff:02.4</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:32" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series QPI Physical 1</product>
     <vendor>Intel Corporation</vendor>
     <physid>120</physid>
     <businfo>pci@0000:ff:02.5</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:33" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>121</physid>
     <businfo>pci@0000:ff:03.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:34" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Target Address Decoder</product>
     <vendor>Intel Corporation</vendor>
     <physid>122</physid>
     <businfo>pci@0000:ff:03.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:35" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller RAS Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>123</physid>
     <businfo>pci@0000:ff:03.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:36" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Test Registers</product>
     <vendor>Intel Corporation</vendor>
     <physid>124</physid>
     <businfo>pci@0000:ff:03.4</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:37" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>125</physid>
     <businfo>pci@0000:ff:04.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:38" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Address</product>
     <vendor>Intel Corporation</vendor>
     <physid>126</physid>
     <businfo>pci@0000:ff:04.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:39" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Rank</product>
     <vendor>Intel Corporation</vendor>
     <physid>127</physid>
     <businfo>pci@0000:ff:04.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:40" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 0 Thermal Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>128</physid>
     <businfo>pci@0000:ff:04.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:41" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>129</physid>
     <businfo>pci@0000:ff:05.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:42" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Address</product>
     <vendor>Intel Corporation</vendor>
     <physid>12a</physid>
     <businfo>pci@0000:ff:05.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:43" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Rank</product>
     <vendor>Intel Corporation</vendor>
     <physid>12b</physid>
     <businfo>pci@0000:ff:05.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:44" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 1 Thermal Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>12c</physid>
     <businfo>pci@0000:ff:05.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:45" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>12d</physid>
     <businfo>pci@0000:ff:06.0</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:46" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Address</product>
     <vendor>Intel Corporation</vendor>
     <physid>12e</physid>
     <businfo>pci@0000:ff:06.1</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:47" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Rank</product>
     <vendor>Intel Corporation</vendor>
     <physid>12f</physid>
     <businfo>pci@0000:ff:06.2</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="pci:48" claimed="true" class="bridge" handle="PCIBUS:0000:ff">
     <description>Host bridge</description>
     <product>Xeon 5600 Series Integrated Memory Controller Channel 2 Thermal Control</product>
     <vendor>Intel Corporation</vendor>
     <physid>130</physid>
     <businfo>pci@0000:ff:06.3</businfo>
     <version>02</version>
     <width units="bits">32</width>
     <clock units="Hz">33000000</clock>
    </node>
    <node id="scsi:0" claimed="true" class="storage" handle="">
     <physid>1</physid>
     <businfo>usb@1:4</businfo>
     <logicalname>scsi0</logicalname>
     <capabilities>
      <capability id="emulated" >Emulated device</capability>
     </capabilities>
      <node id="disk" claimed="true" class="disk" handle="SCSI:00:00:00:00">
       <description>SCSI Disk</description>
       <product>Cruzer Fit</product>
       <vendor>SanDisk</vendor>
       <physid>0.0.0</physid>
       <businfo>scsi@0:0.0.0</businfo>
       <logicalname>/dev/sda</logicalname>
       <dev>8:0</dev>
       <version>1.27</version>
       <serial>[REMOVED]</serial>
       <size units="bytes">15631122432</size>
       <configuration>
        <setting id="ansiversion" value="6" />
        <setting id="logicalsectorsize" value="512" />
        <setting id="sectorsize" value="512" />
       </configuration>
       <capabilities>
        <capability id="removable" >support is removable</capability>
       </capabilities>
        <node id="medium" claimed="true" class="disk" handle="">
         <physid>0</physid>
         <logicalname>/dev/sda</logicalname>
         <dev>8:0</dev>
         <size units="bytes">15631122432</size>
         <capabilities>
          <capability id="partitioned" >Partitioned disk</capability>
          <capability id="partitioned:dos" >MS-DOS partition table</capability>
         </capabilities>
          <node id="volume" claimed="true" class="volume" handle="">
           <description>Windows FAT volume</description>
           <vendor>SYSLINUX</vendor>
           <physid>1</physid>
           <logicalname>/dev/sda1</logicalname>
           <logicalname>/boot</logicalname>
           <dev>8:1</dev>
           <version>FAT32</version>
           <serial>[REMOVED]</serial>
           <size units="bytes">15630329856</size>
           <capacity>15631106048</capacity>
           <configuration>
            <setting id="FATs" value="2" />
            <setting id="filesystem" value="fat" />
            <setting id="label" value="UNRAID" />
            <setting id="mount.fstype" value="vfat" />
            <setting id="mount.options" value="rw,noatime,nodiratime,fmask=0000,dmask=0000,allow_utime=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro" />
            <setting id="state" value="mounted" />
           </configuration>
           <capabilities>
            <capability id="primary" >Primary partition</capability>
            <capability id="bootable" >Bootable partition (active)</capability>
            <capability id="fat" >Windows FAT</capability>
            <capability id="initialized" >initialized volume</capability>
           </capabilities>
          </node>
        </node>
      </node>
    </node>
    <node id="scsi:1" claimed="true" class="storage" handle="">
     <physid>2</physid>
     <businfo>usb@2:2.1</businfo>
     <logicalname>scsi1</logicalname>
     <capabilities>
      <capability id="emulated" >Emulated device</capability>
     </capabilities>
      <node id="disk" claimed="true" class="disk" handle="SCSI:01:00:00:00">
       <description>SCSI Disk</description>
       <product>My Book 1140</product>
       <vendor>WD</vendor>
       <physid>0.0.0</physid>
       <businfo>scsi@1:0.0.0</businfo>
       <logicalname>/dev/sdb</logicalname>
       <dev>8:16</dev>
       <version>1003</version>
       <serial>[REMOVED]</serial>
       <size units="bytes">3000558944256</size>
       <configuration>
        <setting id="ansiversion" value="6" />
        <setting id="logicalsectorsize" value="4096" />
        <setting id="sectorsize" value="4096" />
        <setting id="signature" value="000246c6" />
       </configuration>
       <capabilities>
        <capability id="partitioned" >Partitioned disk</capability>
        <capability id="partitioned:dos" >MS-DOS partition table</capability>
       </capabilities>
        <node id="volume" class="volume" handle="">
         <description>HPFS/NTFS partition</description>
         <physid>1</physid>
         <businfo>scsi@1:0.0.0,1</businfo>
         <capacity>375069736960</capacity>
         <capabilities>
          <capability id="primary" >Primary partition</capability>
         </capabilities>
        </node>
      </node>
      <node id="enclosure" class="generic" handle="SCSI:01:00:00:01">
       <description>SCSI Enclosure</description>
       <product>SES Device</product>
       <vendor>WD</vendor>
       <physid>0.0.1</physid>
       <businfo>scsi@1:0.0.1</businfo>
       <version>1003</version>
       <serial>[REMOVED]</serial>
       <configuration>
        <setting id="ansiversion" value="6" />
       </configuration>
      </node>
    </node>
    <node id="scsi:2" claimed="true" class="storage" handle="">
     <physid>3</physid>
     <logicalname>scsi3</logicalname>
     <capabilities>
      <capability id="emulated" >Emulated device</capability>
     </capabilities>
      <node id="disk" claimed="true" class="disk" handle="SCSI:03:00:00:00">
       <description>ATA Disk</description>
       <product>KINGSTON SV300S3</product>
       <physid>0.0.0</physid>
       <businfo>scsi@3:0.0.0</businfo>
       <logicalname>/dev/sdc</logicalname>
       <dev>8:32</dev>
       <version>BBF0</version>
       <serial>[REMOVED]</serial>
       <size units="bytes">240057409536</size>
       <configuration>
        <setting id="ansiversion" value="5" />
        <setting id="logicalsectorsize" value="512" />
        <setting id="sectorsize" value="512" />
        <setting id="signature" value="0e4ed60d" />
       </configuration>
       <capabilities>
        <capability id="partitioned" >Partitioned disk</capability>
        <capability id="partitioned:dos" >MS-DOS partition table</capability>
       </capabilities>
        <node id="volume" claimed="true" class="volume" handle="">
         <description>Linux filesystem partition</description>
         <physid>1</physid>
         <businfo>scsi@3:0.0.0,1</businfo>
         <logicalname>/dev/sdc1</logicalname>
         <logicalname>/mnt/cache</logicalname>
         <dev>8:33</dev>
         <capacity>240057376768</capacity>
         <configuration>
          <setting id="mount.fstype" value="btrfs" />
          <setting id="mount.options" value="rw,noatime,nodiratime,ssd,space_cache,subvolid=5,subvol=/" />
          <setting id="state" value="mounted" />
         </configuration>
         <capabilities>
          <capability id="primary" >Primary partition</capability>
         </capabilities>
        </node>
      </node>
    </node>
    <node id="scsi:3" claimed="true" class="storage" handle="">
     <physid>5</physid>
     <logicalname>scsi4</logicalname>
     <capabilities>
      <capability id="emulated" >Emulated device</capability>
     </capabilities>
      <node id="disk" claimed="true" class="disk" handle="GUID:c82cbad2-4709-4876-a6b0-23fd28f87155">
       <description>ATA Disk</description>
       <product>Samsung SSD 850</product>
       <physid>0.0.0</physid>
       <businfo>scsi@4:0.0.0</businfo>
       <logicalname>/dev/sdd</logicalname>
       <dev>8:48</dev>
       <version>2B6Q</version>
       <serial>[REMOVED]</serial>
       <size units="bytes">256060514304</size>
       <configuration>
        <setting id="ansiversion" value="5" />
        <setting id="guid" value="c82cbad2-4709-4876-a6b0-23fd28f87155" />
        <setting id="logicalsectorsize" value="512" />
        <setting id="sectorsize" value="512" />
       </configuration>
       <capabilities>
        <capability id="gpt-1.00" >GUID Partition Table version 1.00</capability>
        <capability id="partitioned" >Partitioned disk</capability>
        <capability id="partitioned:gpt" >GUID partition table</capability>
       </capabilities>
        <node id="volume:0" claimed="true" class="volume" handle="GUID:6321c16c-cde1-4218-a2f9-1408c373b032">
         <description>Windows NTFS volume</description>
         <vendor>Windows</vendor>
         <physid>1</physid>
         <businfo>scsi@4:0.0.0,1</businfo>
         <logicalname>/dev/sdd1</logicalname>
         <dev>8:49</dev>
         <version>3.1</version>
         <serial>[REMOVED]</serial>
         <size units="bytes">470810112</size>
         <capacity>471858688</capacity>
         <configuration>
          <setting id="clustersize" value="4096" />
          <setting id="created" value="2016-04-28 20:38:52" />
          <setting id="filesystem" value="ntfs" />
          <setting id="label" value="Recovery" />
          <setting id="name" value="Basic data partition" />
          <setting id="state" value="clean" />
         </configuration>
         <capabilities>
          <capability id="boot" >Contains boot code</capability>
          <capability id="ntfs" >Windows NTFS</capability>
          <capability id="initialized" >initialized volume</capability>
         </capabilities>
        </node>
        <node id="volume:1" claimed="true" class="volume" handle="GUID:43399c18-fd0b-4776-948f-1793ef9601f6">
         <description>Windows FAT volume</description>
         <vendor>MSDOS5.0</vendor>
         <physid>2</physid>
         <businfo>scsi@4:0.0.0,2</businfo>
         <logicalname>/dev/sdd2</logicalname>
         <dev>8:50</dev>
         <version>FAT32</version>
         <serial>[REMOVED]</serial>
         <size units="bytes">98305024</size>
         <capacity>104857088</capacity>
         <configuration>
          <setting id="FATs" value="2" />
          <setting id="filesystem" value="fat" />
          <setting id="name" value="EFI system partition" />
         </configuration>
         <capabilities>
          <capability id="boot" >Contains boot code</capability>
          <capability id="fat" >Windows FAT</capability>
          <capability id="initialized" >initialized volume</capability>
         </capabilities>
        </node>
        <node id="volume:2" claimed="true" class="volume" handle="GUID:09693b85-b08d-4703-aa46-43b3f142147c">
         <description>reserved partition</description>
         <vendor>Windows</vendor>
         <physid>3</physid>
         <businfo>scsi@4:0.0.0,3</businfo>
         <logicalname>/dev/sdd3</logicalname>
         <dev>8:51</dev>
         <serial>[REMOVED]</serial>
         <capacity>16776704</capacity>
         <configuration>
          <setting id="name" value="Microsoft reserved partition" />
         </configuration>
         <capabilities>
          <capability id="nofs" >No filesystem</capability>
         </capabilities>
        </node>
        <node id="volume:3" claimed="true" class="volume" handle="GUID:be5940fa-7cde-4df0-b34c-8f83ac141507">
         <description>Windows NTFS volume</description>
         <vendor>Windows</vendor>
         <physid>4</physid>
         <businfo>scsi@4:0.0.0,4</businfo>
         <logicalname>/dev/sdd4</logicalname>
         <dev>8:52</dev>
         <version>3.1</version>
         <serial>[REMOVED]</serial>
         <size units="bytes">255441833984</size>
         <capacity>255465954304</capacity>
         <configuration>
          <setting id="clustersize" value="4096" />
          <setting id="created" value="2016-04-28 20:39:19" />
          <setting id="filesystem" value="ntfs" />
          <setting id="name" value="Basic data partition" />
          <setting id="state" value="clean" />
         </configuration>
         <capabilities>
          <capability id="ntfs" >Windows NTFS</capability>
          <capability id="initialized" >initialized volume</capability>
         </capabilities>
        </node>
      </node>
    </node>
    <node id="scsi:4" claimed="true" class="storage" handle="">
     <physid>6</physid>
     <logicalname>scsi5</logicalname>
     <capabilities>
      <capability id="emulated" >Emulated device</capability>
     </capabilities>
      <node id="disk" claimed="true" class="disk" handle="GUID:f346f840-247e-4b0c-bb5f-aaa6a00d54e6">
       <description>ATA Disk</description>
       <product>SanDisk Ultra II</product>
       <physid>0.0.0</physid>
       <businfo>scsi@5:0.0.0</businfo>
       <logicalname>/dev/sde</logicalname>
       <dev>8:64</dev>
       <version>00RL</version>
       <serial>[REMOVED]</serial>
       <size units="bytes">480103981056</size>
       <configuration>
        <setting id="ansiversion" value="5" />
        <setting id="guid" value="f346f840-247e-4b0c-bb5f-aaa6a00d54e6" />
        <setting id="logicalsectorsize" value="512" />
        <setting id="sectorsize" value="512" />
       </configuration>
       <capabilities>
        <capability id="gpt-1.00" >GUID Partition Table version 1.00</capability>
        <capability id="partitioned" >Partitioned disk</capability>
        <capability id="partitioned:gpt" >GUID partition table</capability>
       </capabilities>
        <node id="volume:0" claimed="true" class="volume" handle="GUID:14d077e9-f6f2-4844-b657-0a600f32fa21">
         <description>Windows FAT volume</description>
         <vendor>MSWIN4.1</vendor>
         <physid>1</physid>
         <businfo>scsi@5:0.0.0,1</businfo>
         <logicalname>/dev/sde1</logicalname>
         <dev>8:65</dev>
         <version>FAT32</version>
         <serial>[REMOVED]</serial>
         <size units="bytes">535802880</size>
         <capacity>536870400</capacity>
         <configuration>
          <setting id="FATs" value="2" />
          <setting id="filesystem" value="fat" />
         </configuration>
         <capabilities>
          <capability id="boot" >Contains boot code</capability>
          <capability id="fat" >Windows FAT</capability>
          <capability id="initialized" >initialized volume</capability>
         </capabilities>
        </node>
        <node id="volume:1" claimed="true" class="volume" handle="GUID:bfc11f4a-eaf3-404c-b7e4-16d2f5843084">
         <description>EFI partition</description>
         <vendor>Linux</vendor>
         <physid>2</physid>
         <businfo>scsi@5:0.0.0,2</businfo>
         <logicalname>/dev/sde2</logicalname>
         <dev>8:66</dev>
         <version>1.0</version>
         <serial>[REMOVED]</serial>
         <size units="bytes">511705088</size>
         <configuration>
          <setting id="filesystem" value="ext2" />
          <setting id="lastmountpoint" value="/boot" />
          <setting id="modified" value="2016-05-28 18:55:14" />
          <setting id="mounted" value="2016-05-28 18:55:14" />
          <setting id="state" value="unknown" />
         </configuration>
         <capabilities>
          <capability id="extended_attributes" >Extended Attributes</capability>
          <capability id="large_files" >4GB+ files</capability>
          <capability id="ext2" >EXT2/EXT3</capability>
          <capability id="initialized" >initialized volume</capability>
         </capabilities>
        </node>
        <node id="volume:2" claimed="true" class="volume" handle="GUID:e521cf5c-840f-4cef-8638-232aaec837a9">
         <description>LVM Physical Volume</description>
         <vendor>Linux</vendor>
         <physid>3</physid>
         <businfo>scsi@5:0.0.0,3</businfo>
         <logicalname>/dev/sde3</logicalname>
         <dev>8:67</dev>
         <serial>[REMOVED]</serial>
         <size units="bytes">52636418048</size>
         <capacity>479053479424</capacity>
         <capabilities>
          <capability id="multi" >Multi-volumes</capability>
          <capability id="lvm2" />
         </capabilities>
        </node>
      </node>
    </node>
    <node id="scsi:5" claimed="true" class="storage" handle="">
     <physid>7</physid>
     <logicalname>scsi6</logicalname>
     <capabilities>
      <capability id="emulated" >Emulated device</capability>
     </capabilities>
      <node id="disk" claimed="true" class="disk" handle="SCSI:06:00:00:00">
       <description>ATA Disk</description>
       <product>SanDisk Ultra II</product>
       <physid>0.0.0</physid>
       <businfo>scsi@6:0.0.0</businfo>
       <logicalname>/dev/sdf</logicalname>
       <dev>8:80</dev>
       <version>00RL</version>
       <serial>[REMOVED]</serial>
       <size units="bytes">480103981056</size>
       <configuration>
        <setting id="ansiversion" value="5" />
        <setting id="logicalsectorsize" value="512" />
        <setting id="sectorsize" value="512" />
        <setting id="signature" value="e8573092" />
       </configuration>
       <capabilities>
        <capability id="partitioned" >Partitioned disk</capability>
        <capability id="partitioned:dos" >MS-DOS partition table</capability>
       </capabilities>
        <node id="volume" claimed="true" class="volume" handle="">
         <description>Windows NTFS volume</description>
         <physid>1</physid>
         <businfo>scsi@6:0.0.0,1</businfo>
         <logicalname>/dev/sdf1</logicalname>
         <dev>8:81</dev>
         <version>3.1</version>
         <serial>[REMOVED]</serial>
         <size units="bytes">480101006848</size>
         <capacity>480102055936</capacity>
         <configuration>
          <setting id="clustersize" value="4096" />
          <setting id="created" value="2016-05-28 17:49:55" />
          <setting id="filesystem" value="ntfs" />
          <setting id="label" value="Extra" />
          <setting id="state" value="clean" />
         </configuration>
         <capabilities>
          <capability id="primary" >Primary partition</capability>
          <capability id="ntfs" >Windows NTFS</capability>
          <capability id="initialized" >initialized volume</capability>
         </capabilities>
        </node>
      </node>
    </node>
  </node>
  <node id="network:0" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>1</physid>
   <logicalname>vnet0</logicalname>
   <serial>[REMOVED]</serial>
   <size units="bit/s">10000000</size>
   <configuration>
    <setting id="autonegotiation" value="off" />
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="tun" />
    <setting id="driverversion" value="1.6" />
    <setting id="duplex" value="full" />
    <setting id="link" value="yes" />
    <setting id="multicast" value="yes" />
    <setting id="port" value="twisted pair" />
    <setting id="speed" value="10Mbit/s" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:1" disabled="true" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>2</physid>
   <logicalname>virbr0-nic</logicalname>
   <serial>[REMOVED]</serial>
   <size units="bit/s">10000000</size>
   <configuration>
    <setting id="autonegotiation" value="off" />
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="tun" />
    <setting id="driverversion" value="1.6" />
    <setting id="duplex" value="full" />
    <setting id="link" value="no" />
    <setting id="multicast" value="yes" />
    <setting id="port" value="twisted pair" />
    <setting id="speed" value="10Mbit/s" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:2" disabled="true" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>3</physid>
   <logicalname>gretap0</logicalname>
   <configuration>
    <setting id="broadcast" value="yes" />
    <setting id="multicast" value="yes" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:3" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>4</physid>
   <logicalname>docker0</logicalname>
   <serial>[REMOVED]</serial>
   <configuration>
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="bridge" />
    <setting id="driverversion" value="2.3" />
    <setting id="firmware" value="N/A" />
    <setting id="ip" value="[REMOVED]" />
    <setting id="link" value="yes" />
    <setting id="multicast" value="yes" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:4" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>5</physid>
   <logicalname>bond0</logicalname>
   <serial>[REMOVED]</serial>
   <size units="bit/s">100000000</size>
   <configuration>
    <setting id="autonegotiation" value="off" />
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="bonding" />
    <setting id="driverversion" value="3.7.1" />
    <setting id="duplex" value="full" />
    <setting id="firmware" value="2" />
    <setting id="link" value="yes" />
    <setting id="master" value="yes" />
    <setting id="multicast" value="yes" />
    <setting id="promiscuous" value="yes" />
    <setting id="speed" value="100Mbit/s" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:5" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>6</physid>
   <logicalname>br0</logicalname>
   <serial>[REMOVED]</serial>
   <configuration>
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="bridge" />
    <setting id="driverversion" value="2.3" />
    <setting id="firmware" value="N/A" />
    <setting id="ip" value="[REMOVED]" />
    <setting id="link" value="yes" />
    <setting id="multicast" value="yes" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:6" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>7</physid>
   <logicalname>virbr0</logicalname>
   <serial>[REMOVED]</serial>
   <configuration>
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="bridge" />
    <setting id="driverversion" value="2.3" />
    <setting id="firmware" value="N/A" />
    <setting id="ip" value="[REMOVED]" />
    <setting id="link" value="no" />
    <setting id="multicast" value="yes" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:7" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>8</physid>
   <logicalname>vnet1</logicalname>
   <serial>[REMOVED]</serial>
   <size units="bit/s">10000000</size>
   <configuration>
    <setting id="autonegotiation" value="off" />
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="tun" />
    <setting id="driverversion" value="1.6" />
    <setting id="duplex" value="full" />
    <setting id="link" value="yes" />
    <setting id="multicast" value="yes" />
    <setting id="port" value="twisted pair" />
    <setting id="speed" value="10Mbit/s" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
  <node id="network:8" claimed="true" class="network" handle="">
   <description>Ethernet interface</description>
   <physid>9</physid>
   <logicalname>veth5321ae1</logicalname>
   <serial>[REMOVED]</serial>
   <size units="bit/s">10000000000</size>
   <configuration>
    <setting id="autonegotiation" value="off" />
    <setting id="broadcast" value="yes" />
    <setting id="driver" value="veth" />
    <setting id="driverversion" value="1.0" />
    <setting id="duplex" value="full" />
    <setting id="link" value="yes" />
    <setting id="multicast" value="yes" />
    <setting id="port" value="twisted pair" />
    <setting id="speed" value="10Gbit/s" />
   </configuration>
   <capabilities>
    <capability id="ethernet" />
    <capability id="physical" >Physical interface</capability>
   </capabilities>
  </node>
</node>
</list>

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (12 preceding siblings ...)
  2016-05-29  1:33 ` Chris McCarron
@ 2016-05-29  1:40 ` Chris McCarron
  2016-05-29  1:59 ` Jimi
                   ` (45 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29  1:40 UTC (permalink / raw)
  To: qemu-devel

I have 2 running virtual machines.

1.  Ubuntu Server 16.04 acting as a headless game server
2.  Windows 10 Pro used for gaming and other daily activities

I too can start/stop the Win 10 vm for a period of time after a cold boot but if it is logged in for a certain period of time, when I go to shut it down the entire system will freeze.    I can reboot the Ubuntu server at will.  It too has a SSD being passed thru.
 
Win 10 VM
<domain type='kvm' id='3'>
  <name>csmccarronwx00</name>
  <uuid>82c5e4f6-6991-cd5f-8207-49db04386cc9</uuid>
  <description>csmccarronwx00 i440fx-2.5 OVMF</description>
  <metadata>
    <vmtemplate xmlns="unraid" name="Windows 10" icon="windows.png" os="windows10"/>
  </metadata>
  <memory unit='KiB'>11010048</memory>
  <currentMemory unit='KiB'>11010048</currentMemory>
  <memoryBacking>
    <nosharepages/>
    <locked/>
  </memoryBacking>
  <vcpu placement='static'>12</vcpu>
  <cputune>
    <vcpupin vcpu='0' cpuset='6'/>
    <vcpupin vcpu='1' cpuset='18'/>
    <vcpupin vcpu='2' cpuset='7'/>
    <vcpupin vcpu='3' cpuset='19'/>
    <vcpupin vcpu='4' cpuset='8'/>
    <vcpupin vcpu='5' cpuset='20'/>
    <vcpupin vcpu='6' cpuset='9'/>
    <vcpupin vcpu='7' cpuset='21'/>
    <vcpupin vcpu='8' cpuset='10'/>
    <vcpupin vcpu='9' cpuset='22'/>
    <vcpupin vcpu='10' cpuset='11'/>
    <vcpupin vcpu='11' cpuset='23'/>
    <emulatorpin cpuset='1-3,13-15'/>
  </cputune>
  <resource>
    <partition>/machine</partition>
  </resource>
  <os>
    <type arch='x86_64' machine='pc-i440fx-2.5'>hvm</type>
    <loader readonly='yes' type='pflash'>/usr/share/qemu/ovmf-x64/OVMF_CODE-pure-efi.fd</loader>
    <nvram>/etc/libvirt/qemu/nvram/82c5e4f6-6991-cd5f-8207-49db04386cc9_VARS-pure-efi.fd</nvram>
    <boot dev='cdrom'/>
    <boot dev='hd'/>
    <bootmenu enable='yes' timeout='3000'/>
  </os>
  <features>
    <acpi/>
    <apic/>
  </features>
  <cpu mode='host-passthrough'>
    <topology sockets='1' cores='6' threads='2'/>
  </cpu>
  <clock offset='localtime'>
    <timer name='rtc' tickpolicy='catchup'/>
    <timer name='pit' tickpolicy='delay'/>
    <timer name='hpet' present='no'/>
  </clock>
  <on_poweroff>destroy</on_poweroff>
  <on_reboot>restart</on_reboot>
  <on_crash>restart</on_crash>
  <devices>
    <emulator>/usr/local/sbin/qemu</emulator>
    <disk type='file' device='cdrom'>
      <driver name='qemu' type='raw'/>
      <source file='/mnt/user/ISO/virtio-win-0.1.117.iso'/>
      <backingStore/>
      <target dev='hda' bus='sata'/>
      <readonly/>
      <alias name='sata0-0-0'/>
      <address type='drive' controller='0' bus='0' target='0' unit='0'/>
    </disk>
    <disk type='file' device='cdrom'>
      <driver name='qemu' type='raw'/>
      <source file='/mnt/user/ISO/Windows10Pro_TH2.iso'/>
      <backingStore/>
      <target dev='hdb' bus='sata'/>
      <readonly/>
      <alias name='sata0-0-1'/>
      <address type='drive' controller='0' bus='0' target='0' unit='1'/>
    </disk>
    <disk type='block' device='disk'>
      <driver name='qemu' type='raw' cache='writeback'/>
      <source dev='/dev/disk/by-id/ata-Samsung_SSD_850_PRO_256GB_S1SUNSAG361503D'/>
      <backingStore/>
      <target dev='hdc' bus='virtio'/>
      <alias name='virtio-disk2'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x0a' function='0x0'/>
    </disk>
    <disk type='block' device='disk'>
      <driver name='qemu' type='raw' cache='writeback'/>
      <source dev='/dev/disk/by-id/ata-SanDisk_Ultra_II_480GB_161322801967'/>
      <backingStore/>
      <target dev='hdd' bus='virtio'/>
      <alias name='virtio-disk3'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x0b' function='0x0'/>
    </disk>
    <controller type='usb' index='0' model='ich9-ehci1'>
      <alias name='usb'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x7'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci1'>
      <alias name='usb'/>
      <master startport='0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x0' multifunction='on'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci2'>
      <alias name='usb'/>
      <master startport='2'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x1'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci3'>
      <alias name='usb'/>
      <master startport='4'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x2'/>
    </controller>
    <controller type='pci' index='0' model='pci-root'>
      <alias name='pci.0'/>
    </controller>
    <controller type='sata' index='0'>
      <alias name='sata0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/>
    </controller>
    <controller type='virtio-serial' index='0'>
      <alias name='virtio-serial0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x04' function='0x0'/>
    </controller>
    <interface type='bridge'>
      <mac address='52:54:00:86:5a:91'/>
      <source bridge='br0'/>
      <target dev='vnet0'/>
      <model type='virtio'/>
      <alias name='net0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x02' function='0x0'/>
    </interface>
    <serial type='pty'>
      <source path='/dev/pts/2'/>
      <target port='0'/>
      <alias name='serial0'/>
    </serial>
    <console type='pty' tty='/dev/pts/2'>
      <source path='/dev/pts/2'/>
      <target type='serial' port='0'/>
      <alias name='serial0'/>
    </console>
    <channel type='unix'>
      <source mode='bind' path='/var/lib/libvirt/qemu/channel/target/domain-csmccarronwx00/org.qemu.guest_agent.0'/>
      <target type='virtio' name='org.qemu.guest_agent.0' state='disconnected'/>
      <alias name='channel0'/>
      <address type='virtio-serial' controller='0' bus='0' port='1'/>
    </channel>
    <hostdev mode='subsystem' type='pci' managed='yes'>
      <driver name='vfio'/>
      <source>
        <address domain='0x0000' bus='0x0a' slot='0x00' function='0x0'/>
      </source>
      <alias name='hostdev0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x05' function='0x0'/>
    </hostdev>
    <hostdev mode='subsystem' type='pci' managed='yes'>
      <driver name='vfio'/>
      <source>
        <address domain='0x0000' bus='0x0a' slot='0x00' function='0x1'/>
      </source>
      <alias name='hostdev1'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x06' function='0x0'/>
    </hostdev>
    <hostdev mode='subsystem' type='pci' managed='yes'>
      <driver name='vfio'/>
      <source>
        <address domain='0x0000' bus='0x0c' slot='0x00' function='0x0'/>
      </source>
      <alias name='hostdev2'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x08' function='0x0'/>
    </hostdev>
    <memballoon model='virtio'>
      <alias name='balloon0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x09' function='0x0'/>
    </memballoon>
  </devices>
</domain>

Ubuntu Server VM
<domain type='kvm' id='2'>
  <name>Ubuntu Server</name>
  <uuid>232de5eb-2276-0762-2e29-29dc917ef34d</uuid>
  <description>Ubuntu Server Q35 OVMF</description>
  <metadata>
    <vmtemplate xmlns="unraid" name="Ubuntu" icon="ubuntu.png" os="ubuntu"/>
  </metadata>
  <memory unit='KiB'>11010048</memory>
  <currentMemory unit='KiB'>11010048</currentMemory>
  <memoryBacking>
    <nosharepages/>
  </memoryBacking>
  <vcpu placement='static'>4</vcpu>
  <cputune>
    <vcpupin vcpu='0' cpuset='4'/>
    <vcpupin vcpu='1' cpuset='16'/>
    <vcpupin vcpu='2' cpuset='5'/>
    <vcpupin vcpu='3' cpuset='17'/>
    <emulatorpin cpuset='1-3,13-15'/>
  </cputune>
  <resource>
    <partition>/machine</partition>
  </resource>
  <os>
    <type arch='x86_64' machine='pc-q35-2.5'>hvm</type>
    <loader readonly='yes' type='pflash'>/usr/share/qemu/ovmf-x64/OVMF_CODE-pure-efi.fd</loader>
    <nvram>/etc/libvirt/qemu/nvram/232de5eb-2276-0762-2e29-29dc917ef34d_VARS-pure-efi.fd</nvram>
  </os>
  <features>
    <acpi/>
    <apic/>
  </features>
  <cpu mode='host-passthrough'>
    <topology sockets='1' cores='2' threads='2'/>
  </cpu>
  <clock offset='utc'>
    <timer name='rtc' tickpolicy='catchup'/>
    <timer name='pit' tickpolicy='delay'/>
    <timer name='hpet' present='no'/>
  </clock>
  <on_poweroff>destroy</on_poweroff>
  <on_reboot>restart</on_reboot>
  <on_crash>restart</on_crash>
  <devices>
    <emulator>/usr/local/sbin/qemu</emulator>
    <disk type='file' device='cdrom'>
      <driver name='qemu' type='raw'/>
      <source file='/mnt/user/ISO/gparted-live-0.25.0-3-i686.iso'/>
      <backingStore/>
      <target dev='hda' bus='sata'/>
      <readonly/>
      <boot order='2'/>
      <alias name='sata0-0-0'/>
      <address type='drive' controller='0' bus='0' target='0' unit='0'/>
    </disk>
    <disk type='block' device='disk'>
      <driver name='qemu' type='raw' cache='writeback'/>
      <source dev='/dev/disk/by-id/ata-SanDisk_Ultra_II_480GB_161002808956'/>
      <backingStore/>
      <target dev='hdd' bus='virtio'/>
      <boot order='1'/>
      <alias name='virtio-disk3'/>
      <address type='pci' domain='0x0000' bus='0x02' slot='0x04' function='0x0'/>
    </disk>
    <controller type='usb' index='0' model='ich9-ehci1'>
      <alias name='usb'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x7'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci1'>
      <alias name='usb'/>
      <master startport='0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x0' multifunction='on'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci2'>
      <alias name='usb'/>
      <master startport='2'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x1'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci3'>
      <alias name='usb'/>
      <master startport='4'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x2'/>
    </controller>
    <controller type='sata' index='0'>
      <alias name='ide'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x1f' function='0x2'/>
    </controller>
    <controller type='pci' index='0' model='pcie-root'>
      <alias name='pcie.0'/>
    </controller>
    <controller type='pci' index='1' model='dmi-to-pci-bridge'>
      <model name='i82801b11-bridge'/>
      <alias name='pci.1'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x1e' function='0x0'/>
    </controller>
    <controller type='pci' index='2' model='pci-bridge'>
      <model name='pci-bridge'/>
      <target chassisNr='2'/>
      <alias name='pci.2'/>
      <address type='pci' domain='0x0000' bus='0x01' slot='0x01' function='0x0'/>
    </controller>
    <controller type='virtio-serial' index='0'>
      <alias name='virtio-serial0'/>
      <address type='pci' domain='0x0000' bus='0x02' slot='0x03' function='0x0'/>
    </controller>
    <filesystem type='mount' accessmode='passthrough'>
      <source dir='/mnt/user/Apps/'/>
      <target dir='Apps'/>
      <alias name='fs0'/>
      <address type='pci' domain='0x0000' bus='0x02' slot='0x01' function='0x0'/>
    </filesystem>
    <interface type='bridge'>
      <mac address='52:54:00:2b:b9:e2'/>
      <source bridge='br0'/>
      <target dev='vnet1'/>
      <model type='virtio'/>
      <alias name='net0'/>
      <address type='pci' domain='0x0000' bus='0x02' slot='0x02' function='0x0'/>
    </interface>
    <serial type='pty'>
      <source path='/dev/pts/1'/>
      <target port='0'/>
      <alias name='serial0'/>
    </serial>
    <console type='pty' tty='/dev/pts/1'>
      <source path='/dev/pts/1'/>
      <target type='serial' port='0'/>
      <alias name='serial0'/>
    </console>
    <channel type='unix'>
      <source mode='bind' path='/var/lib/libvirt/qemu/channel/target/domain-Ubuntu Server/org.qemu.guest_agent.0'/>
      <target type='virtio' name='org.qemu.guest_agent.0' state='disconnected'/>
      <alias name='channel0'/>
      <address type='virtio-serial' controller='0' bus='0' port='1'/>
    </channel>
    <input type='tablet' bus='usb'>
      <alias name='input0'/>
    </input>
    <input type='mouse' bus='ps2'/>
    <input type='keyboard' bus='ps2'/>
    <graphics type='vnc' port='5900' autoport='yes' websocket='5700' listen='0.0.0.0' keymap='en-us'>
      <listen type='address' address='0.0.0.0'/>
    </graphics>
    <video>
      <model type='qxl' ram='65536' vram='65536' vgamem='16384' heads='1'/>
      <alias name='video0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x01' function='0x0'/>
    </video>
    <memballoon model='virtio'>
      <alias name='balloon0'/>
      <address type='pci' domain='0x0000' bus='0x02' slot='0x05' function='0x0'/>
    </memballoon>
  </devices>
</domain>

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (13 preceding siblings ...)
  2016-05-29  1:40 ` Chris McCarron
@ 2016-05-29  1:59 ` Jimi
  2016-05-29 17:50 ` Chris McCarron
                   ` (44 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-29  1:59 UTC (permalink / raw)
  To: qemu-devel

Well, now we finally know that it isn't the i7-5820K's or X99 chipset's
or LGA 2011 socket's faults.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (14 preceding siblings ...)
  2016-05-29  1:59 ` Jimi
@ 2016-05-29 17:50 ` Chris McCarron
  2016-05-29 17:52 ` Chris McCarron
                   ` (43 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29 17:50 UTC (permalink / raw)
  To: qemu-devel

I have tried everything to keep it from happening but have had no
success.  The likely hood of an entire system lock up is based on how
long the Win 10 VM is on.  I personally have not timed it but usually i
can shutdown/restart without problems for about an hour, maybe more.

My Ubuntu vm is not effected by this issue.  I am passing thru 4 vcpus
and a SSD that the vm boots from.

What can we do to help troubleshoot this issue?  I find it strange the
the problem happens at VM power off and not while the VM is in use.
What happens at VM power off that can lock the entire system up and
cause CPU stall errors.

The posts in syslog vary from time to time but they all end in cpu
stalls.

** Attachment added: "20160527_182656.jpg"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4672387/+files/20160527_182656.jpg

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (15 preceding siblings ...)
  2016-05-29 17:50 ` Chris McCarron
@ 2016-05-29 17:52 ` Chris McCarron
  2016-05-29 17:53 ` Chris McCarron
                   ` (42 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29 17:52 UTC (permalink / raw)
  To: qemu-devel

Additional syslog image

** Attachment added: "20160527_182702.jpg"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4672388/+files/20160527_182702.jpg

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (16 preceding siblings ...)
  2016-05-29 17:52 ` Chris McCarron
@ 2016-05-29 17:53 ` Chris McCarron
  2016-05-29 17:55 ` Chris McCarron
                   ` (41 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29 17:53 UTC (permalink / raw)
  To: qemu-devel

Additional syslog image

** Attachment added: "20160527_182710.jpg"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4672389/+files/20160527_182710.jpg

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (17 preceding siblings ...)
  2016-05-29 17:53 ` Chris McCarron
@ 2016-05-29 17:55 ` Chris McCarron
  2016-05-29 17:57 ` Chris McCarron
                   ` (40 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29 17:55 UTC (permalink / raw)
  To: qemu-devel

Additional syslog image

** Attachment added: "20160527_182715.jpg"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4672400/+files/20160527_182715.jpg

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (18 preceding siblings ...)
  2016-05-29 17:55 ` Chris McCarron
@ 2016-05-29 17:57 ` Chris McCarron
  2016-05-29 18:04 ` Chris McCarron
                   ` (39 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29 17:57 UTC (permalink / raw)
  To: qemu-devel

Additional syslog image

** Attachment added: "20160527_182718.jpg"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4672401/+files/20160527_182718.jpg

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (19 preceding siblings ...)
  2016-05-29 17:57 ` Chris McCarron
@ 2016-05-29 18:04 ` Chris McCarron
  2016-05-29 18:15 ` Jimi
                   ` (38 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29 18:04 UTC (permalink / raw)
  To: qemu-devel

I am not having any issues with my drives during normal operation on the
server.  I only see the ata errors when the system locks up.

If there is something I can do please let me know.  I have been trying
to figure this out for over a month now but have had no luck.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (20 preceding siblings ...)
  2016-05-29 18:04 ` Chris McCarron
@ 2016-05-29 18:15 ` Jimi
  2016-05-29 18:29 ` Chris McCarron
                   ` (37 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-29 18:15 UTC (permalink / raw)
  To: qemu-devel

Remember, I think we've done enough testing to know that it isn't
specifically the VM shutting down that causes this, but the binding or
unbinding of PCI devices in sysfs, which is something a VM will do on
shutdown if you're passing hardware into it. It *is* caused by the VM
running for more than an hour, but it is *not* technically caused by the
shutdown itself. I titled it as a shutdown issue because that's pretty
much the only situation anybody's going to notice this problem, and we
need to be Google-friendly.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (21 preceding siblings ...)
  2016-05-29 18:15 ` Jimi
@ 2016-05-29 18:29 ` Chris McCarron
  2016-05-31  6:55 ` James Newman
                   ` (36 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-29 18:29 UTC (permalink / raw)
  To: qemu-devel

Has any one found a way to shutdown/restart the vm without causing a
system lockup or is this just the way it is until a fix is found?

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (22 preceding siblings ...)
  2016-05-29 18:29 ` Chris McCarron
@ 2016-05-31  6:55 ` James Newman
  2016-05-31  7:02 ` James Newman
                   ` (35 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: James Newman @ 2016-05-31  6:55 UTC (permalink / raw)
  To: qemu-devel

I've got the same issue. Pretty much just as it has been described by
everyone else. Same on shutdown or certain events. Same for delay.
Similar setups and hardware/software. (X99, Arch, Qemu, libvirt, pcie
passthrough, windows 10, etc...) I've attached my system info (Hardware,
lscpu, Archlinux package versions, qemu/libvirt xml files).

Brand new pc build, super fresh and clean system and images. Run 2
different Windows 10 vms, and occasionally another Arch vm for some game
server stuffs.

What is the proper way of going about troubleshooting such things? Is
there a way to enable a kernel debug mode or anything? I develop
software and hardware, and am a novice linux user, just haven't ever
troubleshot a hard lock like this. Willing to help if anyone can give me
some direction. :)

** Attachment added: "mySystem.zip"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4673307/+files/mySystem.zip

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (23 preceding siblings ...)
  2016-05-31  6:55 ` James Newman
@ 2016-05-31  7:02 ` James Newman
  2016-05-31  7:37 ` Jimi
                   ` (34 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: James Newman @ 2016-05-31  7:02 UTC (permalink / raw)
  To: qemu-devel

Unsure how to edit a post.

Also wanted to say, I can provide BIOS settings later, and any kernel
logs if anyone wants. Wanted to note though that I am using UEFI with
GPT style partitioning. I'm using bttrfs for the host fs. OVMF for
guests (See package list in my system info for versioning). Guest main
drive images are qcow2. Some SATA hard drives with NTFS partitions are
passed through for each guest additional storage. Systemd Boot as the
boot manager.

Can't think of much else, but hoping to get this fixed up.

** Also affects: libvirt
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (24 preceding siblings ...)
  2016-05-31  7:02 ` James Newman
@ 2016-05-31  7:37 ` Jimi
  2016-05-31 23:13 ` Chris McCarron
                   ` (33 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-05-31  7:37 UTC (permalink / raw)
  To: qemu-devel

Well, that's a bunch more stuff ruled out. My host is a BIOS with MBR
partitioning, using ext4, and the images are all raw. For each guest,
there's an image of the OS (so the C: drive on Windows and the /
partition on Linux) on my SSD, and Windows also has a bigger image on my
HDD (drive D:). I don't pass in any storage media; just the video card,
its HDMI soundcard, and a USB card.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (25 preceding siblings ...)
  2016-05-31  7:37 ` Jimi
@ 2016-05-31 23:13 ` Chris McCarron
  2016-06-01  1:15 ` Jimi
                   ` (32 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-05-31 23:13 UTC (permalink / raw)
  To: qemu-devel

Jimi, does your HDMI sound lag?  I am using a usb sound card and tries
switching to the GTX970 sound and I got horrible lag, sounds like sound
is in slow motion.  Was completely unusable.


Chris

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (26 preceding siblings ...)
  2016-05-31 23:13 ` Chris McCarron
@ 2016-06-01  1:15 ` Jimi
  2016-06-05 23:34 ` jimrif
                   ` (31 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-01  1:15 UTC (permalink / raw)
  To: qemu-devel

I know it didn't with the GTX 660. It worked perfectly fine. But, I went
fully into Steam streaming everything before I got the 960, so the 960
could have that issue for all I know.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (27 preceding siblings ...)
  2016-06-01  1:15 ` Jimi
@ 2016-06-05 23:34 ` jimrif
  2016-06-06  0:44 ` Jimi
                   ` (30 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: jimrif @ 2016-06-05 23:34 UTC (permalink / raw)
  To: qemu-devel

I have been able to stop this from happening by recompiling my kernel
without SND support.  If you can live without sound in your host (it is
still there in your guest if you pass through the sound device of your
card) then try removing SND support from your hosts kernel.  You can
also try blacklisting the snd module and snd-hda-intel instead of
removing it from your kernel if they are modules.  I have not had a
crash from a shutdown in a couple of months after removing SND from my
hosts kernel.  In my mind that points more of a finger at idea that the
root of the problem has to do with binding/unbinding of the device.

Chris, for your HDMI sound issue there are a couple of things that might
help.  I would have that issue immediately if I was using a certain
virtual network card in the guest.  Using virtio as your network driver
helps quite a bit, however it would still mess up on me every now and
again.  In order to fix everything, I switched it over to MSI signalling
from IRQ on the sound device in Windows 10.  I also switched the
graphics card driver over to MSI and have to switch them each time one
of the nVidia drivers gets an update.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (28 preceding siblings ...)
  2016-06-05 23:34 ` jimrif
@ 2016-06-06  0:44 ` Jimi
  2016-06-06  5:04 ` jimrif
                   ` (29 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-06  0:44 UTC (permalink / raw)
  To: qemu-devel

Hm. Sound was the issue in that other bug. Have you already confirmed
that you don't have that other, similar bug? If you undo all the other
fixes you've done, including enabling SND again, does the VM still crash
if you have NO sound device assigned to it at all, whether it be a pass-
thru device or a virtual one?

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (29 preceding siblings ...)
  2016-06-06  0:44 ` Jimi
@ 2016-06-06  5:04 ` jimrif
  2016-06-06  5:55 ` Chris McCarron
                   ` (28 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: jimrif @ 2016-06-06  5:04 UTC (permalink / raw)
  To: qemu-devel

I'm not really sure what the other similar bug was, but what I was
experiencing was a Win10 VM locking up the host machine upon shutdown of
the VM after several minutes of gaming (or even several hours of
youtube/netflix).  It didn't happen all of the time, but most of the
time after the VM had be up for a while.

I am positive that recompiling without SND support is when the host
stopped crashing upon shutdown of the Windows 10 VM as I was only doing
one change at a time.  I had the issue for many months before removing
CONFIG_SND.  Since then, 2 months ago, I've upgraded qemu, libvirt, the
kernel and win10 updates, including the nVidia drivers.  I'm not really
wanting to compile SND back in as my server is also doing a lot more
than just hosting a Win10 VM and I don't want it to crash without anyone
else trying the fix.  If others try removing SND and continue to have
the issue, I will recompile to help troubleshoot but I am very confident
that is what stopped my system from locking up when shutting down a
Windows 10 VM.  If I were to take a guess, my guess is that just
removing snd-hda-intel would do the trick.

My hardware is a X99 board, i7-5820K, and a nVidia 980 graphics card
being passed through to the guest.  The host video card is a cheap 1x
radeon with HDMI sound.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (30 preceding siblings ...)
  2016-06-06  5:04 ` jimrif
@ 2016-06-06  5:55 ` Chris McCarron
  2016-06-06  8:12 ` Jimi
                   ` (27 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-06-06  5:55 UTC (permalink / raw)
  To: qemu-devel

I will try an blacklist the sound module in the unRaid kernel.  Waiting
on instructions on how to do it.

Chris

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (31 preceding siblings ...)
  2016-06-06  5:55 ` Chris McCarron
@ 2016-06-06  8:12 ` Jimi
  2016-06-06 22:21 ` Chris McCarron
                   ` (26 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-06  8:12 UTC (permalink / raw)
  To: qemu-devel

If your Windows VM does and always has a sound card being passed in
(like the .1 address of your video card), then we can't know for sure
that you don't have that other bug. In that other bug, you can fix the
crash by not passing in any sound cards, real or virtual, to the VM.
It's definitely not the same bug as this one.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (32 preceding siblings ...)
  2016-06-06  8:12 ` Jimi
@ 2016-06-06 22:21 ` Chris McCarron
  2016-06-06 22:21 ` Chris McCarron
                   ` (25 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-06-06 22:21 UTC (permalink / raw)
  To: qemu-devel

Well for now my issue is resolved.  This morning when I was shutting
down my unRaid server to blacklist the intel sound module, snd-hda-
intel, I first stopped my ubuntu vm and my two dockers then logged out
of unraid.  I then proceeded to shutdown my Windows 10 VM and like magic
it shutdown nicely without locking up the entire system.  Also, I found
out from unRaid tech support that the unRaid kernel does not include any
sound modules and it was not necessary to blacklist them.

So this is what I have changed since the last lockup last Thursday
night.

1.  Removed the NVIDIA Audio hardware from the VM Setup.  I did this because the sound was lagging horribly and I could not figure out how to fix it.  So I removed the sound hardware and I am now using a USB sound card that is plugged into the USB3 PCI-Express card that is being passed to the VM.
2.  I enabled MSI Interrupts on the GPU using this URL as my reference.
    http://lime-technology.com/wiki/index.php/UnRAID_6/VM_Guest_Support#Enable_MSI_for_Interrupts_to_Fix_HDMI_Audio_Support

I should also mention that while I have the system NIC, USB1, and USB2
virtual modules mapped, they are disabled in the VM.  I did this to
improve latency issues inside the VM.  I am using a wireless NIC plugged
into the USB3 PCI-Express card and I do not require USB1 or USB2.  These
changes where made on Thursday prior to the last lockup, so while I do
believe they have helped overall latency they had no effect on the
system locking up.

USB3 card is handling Logitech G910 keyboard, WOW MMO Legendary Gaming
Mouse, ASUS XONARU3 Sound Card, ASUS USB-AC56 Wireless NIC, and a USB
Mouse.

I still would like to add the NVIDIA Sound card back into the VM and
when I do I will enable MSI Interrupts.  My goal is not not have to use
the USB Sound card.

See next post for current VM setup.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (33 preceding siblings ...)
  2016-06-06 22:21 ` Chris McCarron
@ 2016-06-06 22:21 ` Chris McCarron
  2016-06-06 22:23 ` Chris McCarron
                   ` (24 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-06-06 22:21 UTC (permalink / raw)
  To: qemu-devel

Current VM Config

<domain type='kvm' id='1'>
  <name>csmccarronwx00</name>
  <uuid>82c5e4f6-6991-cd5f-8207-49db04386cc9</uuid>
  <description>csmccarronwx00 i440fx-2.5 OVMF</description>
  <metadata>
    <vmtemplate xmlns="unraid" name="Windows 10" icon="windows.png" os="windows10"/>
  </metadata>
  <memory unit='KiB'>10485760</memory>
  <currentMemory unit='KiB'>10485760</currentMemory>
  <memoryBacking>
    <nosharepages/>
  </memoryBacking>
  <vcpu placement='static'>12</vcpu>
  <cputune>
    <vcpupin vcpu='0' cpuset='6'/>
    <vcpupin vcpu='1' cpuset='18'/>
    <vcpupin vcpu='2' cpuset='7'/>
    <vcpupin vcpu='3' cpuset='19'/>
    <vcpupin vcpu='4' cpuset='8'/>
    <vcpupin vcpu='5' cpuset='20'/>
    <vcpupin vcpu='6' cpuset='9'/>
    <vcpupin vcpu='7' cpuset='21'/>
    <vcpupin vcpu='8' cpuset='10'/>
    <vcpupin vcpu='9' cpuset='22'/>
    <vcpupin vcpu='10' cpuset='11'/>
    <vcpupin vcpu='11' cpuset='23'/>
    <emulatorpin cpuset='1-3,13-15'/>
  </cputune>
  <resource>
    <partition>/machine</partition>
  </resource>
  <os>
    <type arch='x86_64' machine='pc-i440fx-2.5'>hvm</type>
    <loader readonly='yes' type='pflash'>/usr/share/qemu/ovmf-x64/OVMF_CODE-pure-efi.fd</loader>
    <nvram>/etc/libvirt/qemu/nvram/82c5e4f6-6991-cd5f-8207-49db04386cc9_VARS-pure-efi.fd</nvram>
    <boot dev='hd'/>
    <boot dev='cdrom'/>
    <bootmenu enable='yes' timeout='3000'/>
  </os>
  <features>
    <acpi/>
    <apic/>
    <hyperv>
      <relaxed state='on'/>
      <vapic state='on'/>
      <spinlocks state='on' retries='8191'/>
      <vendor id='none'/>
    </hyperv>
  </features>
  <cpu mode='host-passthrough'>
    <topology sockets='1' cores='6' threads='2'/>
  </cpu>
  <clock offset='localtime'>
    <timer name='hypervclock' present='yes'/>
    <timer name='hpet' present='no'/>
  </clock>
  <on_poweroff>destroy</on_poweroff>
  <on_reboot>restart</on_reboot>
  <on_crash>restart</on_crash>
  <devices>
    <emulator>/usr/local/sbin/qemu</emulator>
    <disk type='block' device='disk'>
      <driver name='qemu' type='raw' cache='writeback'/>
      <source dev='/dev/disk/by-id/ata-Samsung_SSD_850_PRO_256GB_S1SUNSAG361503D'/>
      <backingStore/>
      <target dev='hdc' bus='sata'/>
      <alias name='sata0-0-2'/>
      <address type='drive' controller='0' bus='0' target='0' unit='2'/>
    </disk>
    <disk type='block' device='disk'>
      <driver name='qemu' type='raw' cache='writeback'/>
      <source dev='/dev/disk/by-id/ata-SanDisk_Ultra_II_480GB_161322801967'/>
      <backingStore/>
      <target dev='hdd' bus='sata'/>
      <alias name='sata0-0-3'/>
      <address type='drive' controller='0' bus='0' target='0' unit='3'/>
    </disk>
    <controller type='usb' index='0' model='ich9-ehci1'>
      <alias name='usb'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x7'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci1'>
      <alias name='usb'/>
      <master startport='0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x0' multifunction='on'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci2'>
      <alias name='usb'/>
      <master startport='2'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x1'/>
    </controller>
    <controller type='usb' index='0' model='ich9-uhci3'>
      <alias name='usb'/>
      <master startport='4'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x2'/>
    </controller>
    <controller type='pci' index='0' model='pci-root'>
      <alias name='pci.0'/>
    </controller>
    <controller type='sata' index='0'>
      <alias name='sata0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/>
    </controller>
    <controller type='virtio-serial' index='0'>
      <alias name='virtio-serial0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x04' function='0x0'/>
    </controller>
    <interface type='bridge'>
      <mac address='52:54:00:86:5a:91'/>
      <source bridge='br0'/>
      <target dev='vnet0'/>
      <model type='virtio'/>
      <alias name='net0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x02' function='0x0'/>
    </interface>
    <serial type='pty'>
      <source path='/dev/pts/0'/>
      <target port='0'/>
      <alias name='serial0'/>
    </serial>
    <console type='pty' tty='/dev/pts/0'>
      <source path='/dev/pts/0'/>
      <target type='serial' port='0'/>
      <alias name='serial0'/>
    </console>
    <channel type='unix'>
      <source mode='bind' path='/var/lib/libvirt/qemu/channel/target/domain-csmccarronwx00/org.qemu.guest_agent.0'/>
      <target type='virtio' name='org.qemu.guest_agent.0' state='disconnected'/>
      <alias name='channel0'/>
      <address type='virtio-serial' controller='0' bus='0' port='1'/>
    </channel>
    <hostdev mode='subsystem' type='pci' managed='yes'>
      <driver name='vfio'/>
      <source>
        <address domain='0x0000' bus='0x0a' slot='0x00' function='0x0'/>
      </source>
      <alias name='hostdev0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x05' function='0x0'/>
    </hostdev>
    <hostdev mode='subsystem' type='pci' managed='yes'>
      <driver name='vfio'/>
      <source>
        <address domain='0x0000' bus='0x0c' slot='0x00' function='0x0'/>
      </source>
      <alias name='hostdev1'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x08' function='0x0'/>
    </hostdev>
    <memballoon model='virtio'>
      <alias name='balloon0'/>
      <address type='pci' domain='0x0000' bus='0x00' slot='0x09' function='0x0'/>
    </memballoon>
  </devices>
</domain>

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (34 preceding siblings ...)
  2016-06-06 22:21 ` Chris McCarron
@ 2016-06-06 22:23 ` Chris McCarron
  2016-06-06 23:36 ` James Newman
                   ` (23 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-06-06 22:23 UTC (permalink / raw)
  To: qemu-devel

SYSLINUX.CFG

default /syslinux/menu.c32
menu title Lime Technology, Inc.
prompt 0
timeout 50
label unRAID OS
  kernel /bzimage
  append isolcpus=4,16,5,17,6,18,7,19,8,20,9,21,10,22,11,23 pci-stub.ids=1b6f:7052,10de:13c2,10de:0fbb intel_iommu=on iommu=pt vfio_iommu_type1.allow_unsafe_interrupts=1 pcie_acs_override=downstream initrd=/bzroot
label unRAID OS GUI Mode
  menu default
  kernel /bzimage
  append isolcpus=4,16,5,17,6,18,7,19,8,20,9,21,10,22,11,23 pci-stub-ids=1b6f:7052,10de:13c2,10de:0fbb intel_iommu=on iommu=pt vfio_iommu_type1.allow_unsafe_interrupts=1 pcie_acs_override=downstream initrd=/bzroot,/bzroot-gui
label unRAID OS Safe Mode (no plugins, no GUI)
  kernel /bzimage
  append initrd=/bzroot unraidsafemode
label Memtest86+
  kernel /memtest

pci-stub-ids=1b6f:7052,10de:13c2,10de:0fbb
1b6f:7052 = Etron Technology, Inc. EJ188/EJ198 USB 3.0 Host Controller
10de:13c2 = NVIDIA Corporation GM204 [GeForce GTX 970]
10de:0fbb = NVIDIA Corporation GM204 High Definition Audio Controller

** Attachment added: "W10 VM Devices.PNG"
   https://bugs.launchpad.net/qemu/+bug/1580459/+attachment/4678446/+files/W10%20VM%20Devices.PNG

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (35 preceding siblings ...)
  2016-06-06 22:23 ` Chris McCarron
@ 2016-06-06 23:36 ` James Newman
  2016-06-07  1:05 ` Jimi
                   ` (22 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: James Newman @ 2016-06-06 23:36 UTC (permalink / raw)
  To: qemu-devel

So guys, new information.

I was having trouble getting the HTC Vive passed through in host mode.
The thing shows up as 10+ devices! I've also some logitech webcams that
don't seem to work via usb host passthrough. So I gave windows my entire
usb controller (only 1 for all my ports on this mobo). Since then, I
haven't noticed an issue. Furthermore, waaaay more stable overall. I
used to get random blue screens.

I'm going to order a usb3 pcie card for my other windows host. For now,
I'm using a remote desktop connection to it for IO.

Anyway, still tinkering. I'm curious if anyone having the issues would
try with no usb 'host' passthrough?

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (36 preceding siblings ...)
  2016-06-06 23:36 ` James Newman
@ 2016-06-07  1:05 ` Jimi
  2016-06-12  9:32 ` Peter Maloney
                   ` (21 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-07  1:05 UTC (permalink / raw)
  To: qemu-devel

I've been not using USB host passthrough this whole time, as my PCI USB3
card covers that need pretty well. Speaking of those cards, for those of
you who also use one, does it work perfectly? If so, I'd like to know
its model so I can go buy it, because while my card works, about 50% of
the time I try to use it, I get some bad output when I run "dmesg | grep
-i vfio" (the standard spam when a device doesn't get passed through
properly that's full of messages related to power management) and the VM
doesn't seem to have any access to it. When this happens, I have to
restart the whole host to get another 50% chance at using the card.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (37 preceding siblings ...)
  2016-06-07  1:05 ` Jimi
@ 2016-06-12  9:32 ` Peter Maloney
  2016-06-14 19:44 ` Jimi
                   ` (20 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Peter Maloney @ 2016-06-12  9:32 UTC (permalink / raw)
  To: qemu-devel

FYI I had a similar issue years ago until I figured out that adding the
vgarom file fixes it, eg.:

     -device vfio-
pci,host=04:00.0,bus=root.1,multifunction=on,x-vga=on,addr=0.0,romfile=Sapphire.R7260X.1024.131106.rom

For radeon, you can look in /sys. eg. we see
/sys/devices/pci0000:00/0000:00:0b.0/0000:04:00.0/rom, and first we
`echo 1 > rom` to prevent "invalid argument" error, and then `cat rom >
~/yourfile.rom` and you have it.

For nouveau, you have to bind nouveau driver (rather than vfio-pci) and
you can find it somewhere like /sys/kernel/debug/dri/0/vbios.rom

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (38 preceding siblings ...)
  2016-06-12  9:32 ` Peter Maloney
@ 2016-06-14 19:44 ` Jimi
  2016-06-15 14:20 ` kachaffeous
                   ` (19 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-14 19:44 UTC (permalink / raw)
  To: qemu-devel

Can someone else please confirm that? I can't test it because nouveau
doesn't support the GTX 960 yet. If it turns out solid, then I could
just ask EVGA support for the rom file.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (39 preceding siblings ...)
  2016-06-14 19:44 ` Jimi
@ 2016-06-15 14:20 ` kachaffeous
  2016-06-23  3:32 ` Jimi
                   ` (18 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: kachaffeous @ 2016-06-15 14:20 UTC (permalink / raw)
  To: qemu-devel

I just added the romfile argument to mine, will report back later
tonight.  (Don't want to reboot now, as my machine will hang and I'm at
work)

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (40 preceding siblings ...)
  2016-06-15 14:20 ` kachaffeous
@ 2016-06-23  3:32 ` Jimi
  2016-06-23  6:17 ` Jimi
                   ` (17 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-23  3:32 UTC (permalink / raw)
  To: qemu-devel

I got impatient and got the rom file from EVGA and loaded it in, but for
me and my GTX 960, I get no graphical output when it's loaded. I don't
know anything beyond that. I don't get any error messages in dmesg or
anything--just no video output whatsoever. It was also strangely booting
into the Tianocore UEFI command line instead of Windows, so there could
be something else going on here for me that stayed broken after I
removed the romfile option.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (41 preceding siblings ...)
  2016-06-23  3:32 ` Jimi
@ 2016-06-23  6:17 ` Jimi
  2016-06-23 12:05 ` Chris McCarron
                   ` (16 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-23  6:17 UTC (permalink / raw)
  To: qemu-devel

I managed to fix that issue and properly load the VM with the rom file
(what had gone wrong was it inexplicably acted like it had no hard
drives, until I restored the libvirt XML file from a backup). I got a
good test out of it: played video games in Windows for 2 hours, with the
rom file loaded. It still froze on shutdown. So that's confirmedly not a
fix.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (42 preceding siblings ...)
  2016-06-23  6:17 ` Jimi
@ 2016-06-23 12:05 ` Chris McCarron
  2016-06-23 18:25 ` Jimi
                   ` (15 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-06-23 12:05 UTC (permalink / raw)
  To: qemu-devel

My system has been behaving well the last couple of weeks.  I can reboot
at will with no lockups.  I am still not passing the NVIDIA sound card
to the VM and have GPU configure to use MSI interrupts.  I am not
passing the ROM for my GTX 970 gpu.

I know this is not related but I was able to lockup the entire system by
installing BOINC software and configured it to use 100% of cpu's and cpu
time.  Backed those 2 settings down to 90% and no more lockups.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (43 preceding siblings ...)
  2016-06-23 12:05 ` Chris McCarron
@ 2016-06-23 18:25 ` Jimi
  2016-06-24  1:16 ` Chris McCarron
                   ` (14 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-23 18:25 UTC (permalink / raw)
  To: qemu-devel

What are MSI interrupts and how did you configure your card to use them?

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (44 preceding siblings ...)
  2016-06-23 18:25 ` Jimi
@ 2016-06-24  1:16 ` Chris McCarron
  2016-06-25  5:57 ` Jimi
                   ` (13 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-06-24  1:16 UTC (permalink / raw)
  To: qemu-devel

Apparently Passthrough devices work better when using a MSI Interrupt
instead of a traditional interrupt.

See post 32 https://bugs.launchpad.net/qemu/+bug/1580459/comments/32
item 2.

2. I enabled MSI Interrupts on the GPU using this URL as my reference.
    http://lime-technology.com/wiki/index.php/UnRAID_6/VM_Guest_Support#Enable_MSI_for_Interrupts_to_Fix_HDMI_Audio_Support

Chris

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (45 preceding siblings ...)
  2016-06-24  1:16 ` Chris McCarron
@ 2016-06-25  5:57 ` Jimi
  2016-06-25 13:10 ` Chris McCarron
                   ` (12 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-06-25  5:57 UTC (permalink / raw)
  To: qemu-devel

I enabled MSI interrupts, and now for 2 nights in a row I gamed 2 hours
straight and shut down the Windows VM without a freeze. Never in my 7
months of living with this bug have I gotten no freeze twice in a row. I
think the MSI interrupts have fixed it for me, and no, I did not remove
my HDMI sound card from the VM, so that wasn't part of the issue and
should be safe to leave in for those who needed this fix. That's 2
people who this fix has worked for now. Hopefully it'll work for the
rest of you, too. I'll post back if I ever get this freeze again after
confirmed it hasn't suddenly switched my hardware off MSI interrupts or
anything.

Note: I didn't just make my video card use MSI interrupts. Most of the
VM's hardware was already set to use them by default--namely the VirtIO
stuff--and I set EVERYTHING else to also use it, which is the video
card, its HDMI, the USB3 card, and the virtual USB2 controller that I
don't need but libvirt refuses to remove. I figured that'd work out
because the USB3 card is also PCIe, which works better with MSI, and the
USB2 controller doesn't matter. So, if this doesn't fix it for you, try
making every last MSI-capable device use MSI interrupts.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (46 preceding siblings ...)
  2016-06-25  5:57 ` Jimi
@ 2016-06-25 13:10 ` Chris McCarron
  2016-07-07 20:34 ` Clif Houck
                   ` (11 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2016-06-25 13:10 UTC (permalink / raw)
  To: qemu-devel

Thats good to know, I want to reenable my Nvidia sound card as well.

Note:  When you update the video card driver, it will disable the MSI
interrupt so you will have to reenable it.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (47 preceding siblings ...)
  2016-06-25 13:10 ` Chris McCarron
@ 2016-07-07 20:34 ` Clif Houck
  2016-07-07 21:03   ` Alex Williamson
  2016-07-07 21:45 ` Jimi
                   ` (10 subsequent siblings)
  59 siblings, 1 reply; 62+ messages in thread
From: Clif Houck @ 2016-07-07 20:34 UTC (permalink / raw)
  To: qemu-devel

I was also experiencing the host hard locking when shutting down a
Windows 10 guest with a Nvidia GPU passed-through, but the issue appears
to be completely solved after switching the card to MSI mode in the
Windows guest.

However, I would be interested in understanding *why* using the card in
line-interrupt mode in the guest causes the host to lockup when the
guest relinquishes control of the device. Is it a bug in qemu or vfio,
or even the Linux kernel?

I don't know if its relevant, but I've noticed when the card is not
being used by the guest it is listed as MSI: Enable- by lspci,
suggesting that vfio is keeping the card in line-interrupt mode when not
in use.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* Re: [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-07-07 20:34 ` Clif Houck
@ 2016-07-07 21:03   ` Alex Williamson
  0 siblings, 0 replies; 62+ messages in thread
From: Alex Williamson @ 2016-07-07 21:03 UTC (permalink / raw)
  To: qemu-devel, me; +Cc: Bug 1580459

On Thu, 07 Jul 2016 20:34:15 -0000
Clif Houck <me@clifhouck.com> wrote:

> I was also experiencing the host hard locking when shutting down a
> Windows 10 guest with a Nvidia GPU passed-through, but the issue appears
> to be completely solved after switching the card to MSI mode in the
> Windows guest.
> 
> However, I would be interested in understanding *why* using the card in
> line-interrupt mode in the guest causes the host to lockup when the
> guest relinquishes control of the device. Is it a bug in qemu or vfio,
> or even the Linux kernel?
> 
> I don't know if its relevant, but I've noticed when the card is not
> being used by the guest it is listed as MSI: Enable- by lspci,
> suggesting that vfio is keeping the card in line-interrupt mode when not
> in use.
> 

Interrupts are disabled when the card is not in use.  Can you test
whether the following commit fixes the problem:

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=956b56a984ddf10aa69b25318dc04430101beed6

This was added in v4.7-rc2, so it will also be included in anything
newer.  Thanks,

Alex

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (48 preceding siblings ...)
  2016-07-07 20:34 ` Clif Houck
@ 2016-07-07 21:45 ` Jimi
  2016-07-07 21:46 ` Jimi
                   ` (9 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-07-07 21:45 UTC (permalink / raw)
  To: qemu-devel

Oh, that is interesting. Using lscpi -v on my computer reveals that
Linux tends to default to enabling MSI on my PCIe devices that support
it (since the common opinion is that it's better for PCIe), including
all my graphics cards, so the fact that vfio-pci and Windows 10 both
default to disabling it is pretty odd indeed.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (49 preceding siblings ...)
  2016-07-07 21:45 ` Jimi
@ 2016-07-07 21:46 ` Jimi
  2017-02-25 11:04 ` yanman
                   ` (8 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2016-07-07 21:46 UTC (permalink / raw)
  To: qemu-devel

(Forgot to clarify: yes, vfio-pci devices disable MSI by default for me
just like for Clif Houck, but all other PCIe devices have it enabled.)

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (50 preceding siblings ...)
  2016-07-07 21:46 ` Jimi
@ 2017-02-25 11:04 ` yanman
  2017-12-09 18:44 ` john doe
                   ` (7 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: yanman @ 2017-02-25 11:04 UTC (permalink / raw)
  To: qemu-devel

Hi guys, not sure if I'm on the right track here but I think I'm
experiencing the same issue. My install might be a bit of a mess
combining bits from the VFIO Tips site and Ubuntu guides on GPU
passthrough, but I *did* have it all working for a few hours at a
stretch before I got this lock up.

The trouble with this is that after the host lockup, the Windows VM
seems to corrupt the EFI config or something like that as I can never
get it to boot again properly, even though the main partition seems fine
when tested in a bootable WinPE distro.

I'd be happy to supply versions and configs to help if it's related
however.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (51 preceding siblings ...)
  2017-02-25 11:04 ` yanman
@ 2017-12-09 18:44 ` john doe
  2017-12-09 20:56 ` Clif Houck
                   ` (6 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: john doe @ 2017-12-09 18:44 UTC (permalink / raw)
  To: qemu-devel

Enabling MSI interrupts works for me.  One note is that Windows updates
will sometimes revert the changes so if this starts breaking after an
update you may need to re-apply the registry changes.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (52 preceding siblings ...)
  2017-12-09 18:44 ` john doe
@ 2017-12-09 20:56 ` Clif Houck
  2017-12-09 21:30 ` Jimi
                   ` (5 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Clif Houck @ 2017-12-09 20:56 UTC (permalink / raw)
  To: qemu-devel

Updating NVIDIA drivers in the guest also seems to disable MSI for some
reason. Oddly enough I did not run into the host hard locking though.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (53 preceding siblings ...)
  2017-12-09 20:56 ` Clif Houck
@ 2017-12-09 21:30 ` Jimi
  2017-12-18 20:04 ` Benjamin
                   ` (4 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2017-12-09 21:30 UTC (permalink / raw)
  To: qemu-devel

I haven't remembered to reset those interrupts in a year, but I also
haven't remembered to update my drivers in about as long, so I could be
still on the right setting. I've also been on AMD for that year, and I
don't remember whether this bug applies to modern AMD cards.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Qemu-devel] [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (54 preceding siblings ...)
  2017-12-09 21:30 ` Jimi
@ 2017-12-18 20:04 ` Benjamin
  2021-04-22  5:08 ` Thomas Huth
                   ` (3 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Benjamin @ 2017-12-18 20:04 UTC (permalink / raw)
  To: qemu-devel

I've been experiencing something that sounds very similar to what has
been described in this issue post and want to see if you guys think it's
the same issue. For me from a cold boot everything is fine for a while
and I can restart my vm and such just fine. but after a long time or
stressful stuff mining/gaming if I shutdown my vm the host displays will
all go to sleep and the system locks up which I had been assuming is a
display driver crash. I can also sometimes trigger the exact same lockup
by calling lspci. once such a lockup has happened I have to hard reset.
where this gets even weirder is that after this happens I will get the
same lockup during the startup process around when xorg loads. when this
happens I either have to leave my computer alone for around 30 minutes
to an hour, or I can get it to boot by disabling iommu with iommu=off as
a kernel param, and then if I wait around 30 minutes to an hour I can
restart and it will boot fine again with iommu=pt (I get a kernel panic
if i don't use iommu=pt)

Hardware
Ryzen R5 1600
asrock ab350m pro4
32gb ram
Host gpu RX580
Guest gpu GTX1070

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  New
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions

^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (55 preceding siblings ...)
  2017-12-18 20:04 ` Benjamin
@ 2021-04-22  5:08 ` Thomas Huth
  2021-04-22 10:02 ` Chris McCarron
                   ` (2 subsequent siblings)
  59 siblings, 0 replies; 62+ messages in thread
From: Thomas Huth @ 2021-04-22  5:08 UTC (permalink / raw)
  To: qemu-devel

Looking through old bug tickets... can you still reproduce this issue
with the latest available versions? Or could we close this ticket
nowadays?

** Changed in: qemu
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  Incomplete
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions


^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (56 preceding siblings ...)
  2021-04-22  5:08 ` Thomas Huth
@ 2021-04-22 10:02 ` Chris McCarron
  2021-04-22 12:21 ` Jimi
  2021-04-23  4:29 ` Thomas Huth
  59 siblings, 0 replies; 62+ messages in thread
From: Chris McCarron @ 2021-04-22 10:02 UTC (permalink / raw)
  To: qemu-devel

I am no longer having any issues at all.  I am using the NVidia Sound
Card as well.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  Incomplete
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions


^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (57 preceding siblings ...)
  2021-04-22 10:02 ` Chris McCarron
@ 2021-04-22 12:21 ` Jimi
  2021-04-23  4:29 ` Thomas Huth
  59 siblings, 0 replies; 62+ messages in thread
From: Jimi @ 2021-04-22 12:21 UTC (permalink / raw)
  To: qemu-devel

My hardware and the way I run my VM are both now very different from
back then, and I haven't had the issue described here for years. So
either it was fixed or I'm no longer an accurate test subject.

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  Incomplete
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions


^ permalink raw reply	[flat|nested] 62+ messages in thread

* [Bug 1580459] Re: Windows (10?) guest freezes entire host on shutdown if using PCI passthrough
  2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
                   ` (58 preceding siblings ...)
  2021-04-22 12:21 ` Jimi
@ 2021-04-23  4:29 ` Thomas Huth
  59 siblings, 0 replies; 62+ messages in thread
From: Thomas Huth @ 2021-04-23  4:29 UTC (permalink / raw)
  To: qemu-devel

Ok, thanks for answering! So I'm closing this issue now. In case anybody
still has similar issues, please open a new bug ticket instead.

** Changed in: qemu
       Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1580459

Title:
  Windows (10?) guest freezes entire host on shutdown if using PCI
  passthrough

Status in libvirt:
  New
Status in QEMU:
  Fix Released
Status in Arch Linux:
  New
Status in Debian:
  New
Status in Fedora:
  New

Bug description:
  Problem: after leaving a Windows VM that uses PCI passthrough (as we
  do for gaming graphics cards, sound cards, and in my case, a USB card)
  running for some amount of time between 1 and 2 hours (it's not
  consistent with exactly how long), and for any amount of time longer
  than that, shutting down that guest will, right as it finishes
  shutting down, freeze the host computer, making it require a hard
  reboot. Unbinding (or in the other user's case, unbinding and THEN
  binding) any PCI device in sysfs, even one that has nothing to do with
  the VM, also has the same effect as shutting down the VM (if the VM
  has been running long enough). So, it's probably an issue related to
  unbinding and binding PCI devices.

  There's a lot of info on this problem over at https://bbs.archlinux.org/viewtopic.php?id=206050
  Here's a better-organized list of main details:
  -at least 2 confirmed victims of this bug; 2 (including me) have provided lots of info in the link
  -I'm on Arch Linux and the other one is on Gentoo (distro-nonspecific)
  -issue affects my Windows 10 guest and others' Windows guests, but not my Arch Linux guest (the others don't have non-Windows guests to test)
  -I'm using libvirt but the other user is not, so it's not an issue with libvirt
  -It seems to be version non-specific, too. I first noticed it at, or when testing versions still had the issue at (whichever version is lower), Linux 4.1 and qemu 2.4.0. It still persists in all releases of both since, including the newest ones.
  -I can't track down exactly what package downgrade can fix it, as downgrading further than Linux 4.1 and qemu 2.4.0 requires Herculean and system-destroying changes such as downgrading ncurses, meaning I don't know whether it's a bug in QEMU, the Linux kernel, or some weird seemingly unrelated thing.
  -According to the other user, "graphics intensive gameplay (GTA V) can cause the crash to happen sooner," as soon as "15 minutes"
  -Also, "bringing up a second passthrough VM with separate hardware will cause the same crash," and "bringing up another VM before the two-hour mark will not result in a crash," further cementing that it's triggered by the un/binding of PCI devices.
  -This is NOT related to the very similar bug that can be worked around by not passing through the HDMI device or sound card. Even when we removed all traces of any sort of sound card from the VM, it still had the same behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/1580459/+subscriptions


^ permalink raw reply	[flat|nested] 62+ messages in thread

end of thread, other threads:[~2021-04-23  4:40 UTC | newest]

Thread overview: 62+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-05-11  6:19 [Qemu-devel] [Bug 1580459] [NEW] Windows (10?) guest freezes entire host on shutdown if using PCI passthrough Jimi
2016-05-19 18:07 ` [Qemu-devel] [Bug 1580459] " kachaffeous
2016-05-19 18:18 ` kachaffeous
2016-05-20  0:11 ` Jimi
2016-05-20 16:43 ` kachaffeous
2016-05-20 16:58 ` Jimi
2016-05-20 16:58 ` Jimi
2016-05-28 16:39 ` Gandalf-The-Red
2016-05-28 17:08 ` Jimi
2016-05-28 17:25 ` Gandalf-The-Red
2016-05-28 18:31 ` Gandalf-The-Red
2016-05-28 19:12 ` Jimi
2016-05-28 19:14 ` Jimi
2016-05-29  1:33 ` Chris McCarron
2016-05-29  1:40 ` Chris McCarron
2016-05-29  1:59 ` Jimi
2016-05-29 17:50 ` Chris McCarron
2016-05-29 17:52 ` Chris McCarron
2016-05-29 17:53 ` Chris McCarron
2016-05-29 17:55 ` Chris McCarron
2016-05-29 17:57 ` Chris McCarron
2016-05-29 18:04 ` Chris McCarron
2016-05-29 18:15 ` Jimi
2016-05-29 18:29 ` Chris McCarron
2016-05-31  6:55 ` James Newman
2016-05-31  7:02 ` James Newman
2016-05-31  7:37 ` Jimi
2016-05-31 23:13 ` Chris McCarron
2016-06-01  1:15 ` Jimi
2016-06-05 23:34 ` jimrif
2016-06-06  0:44 ` Jimi
2016-06-06  5:04 ` jimrif
2016-06-06  5:55 ` Chris McCarron
2016-06-06  8:12 ` Jimi
2016-06-06 22:21 ` Chris McCarron
2016-06-06 22:21 ` Chris McCarron
2016-06-06 22:23 ` Chris McCarron
2016-06-06 23:36 ` James Newman
2016-06-07  1:05 ` Jimi
2016-06-12  9:32 ` Peter Maloney
2016-06-14 19:44 ` Jimi
2016-06-15 14:20 ` kachaffeous
2016-06-23  3:32 ` Jimi
2016-06-23  6:17 ` Jimi
2016-06-23 12:05 ` Chris McCarron
2016-06-23 18:25 ` Jimi
2016-06-24  1:16 ` Chris McCarron
2016-06-25  5:57 ` Jimi
2016-06-25 13:10 ` Chris McCarron
2016-07-07 20:34 ` Clif Houck
2016-07-07 21:03   ` Alex Williamson
2016-07-07 21:45 ` Jimi
2016-07-07 21:46 ` Jimi
2017-02-25 11:04 ` yanman
2017-12-09 18:44 ` john doe
2017-12-09 20:56 ` Clif Houck
2017-12-09 21:30 ` Jimi
2017-12-18 20:04 ` Benjamin
2021-04-22  5:08 ` Thomas Huth
2021-04-22 10:02 ` Chris McCarron
2021-04-22 12:21 ` Jimi
2021-04-23  4:29 ` Thomas Huth

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.