From owner-freebsd-virtualization@freebsd.org Sun Jun 16 17:01:34 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BD5E415C47DC for ; Sun, 16 Jun 2019 17:01:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 43B9388A7D for ; Sun, 16 Jun 2019 17:01:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 0182A15C47CE; Sun, 16 Jun 2019 17:01:34 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E11AF15C47CA for ; Sun, 16 Jun 2019 17:01:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 326EA88A70 for ; Sun, 16 Jun 2019 17:01:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 66C641AB63 for ; Sun, 16 Jun 2019 17:01:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5GH1WaP012455 for ; Sun, 16 Jun 2019 17:01:32 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5GH1WP7012444 for virtualization@FreeBSD.org; Sun, 16 Jun 2019 17:01:32 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 236374] bhyve: vmm/amd: ivhd0: Error: completion failed Date: Sun, 16 Jun 2019 17:01:30 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: linimon@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: assigned_to short_desc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Jun 2019 17:01:34 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D236374 Mark Linimon changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|bugs@FreeBSD.org |virtualization@FreeBSD.org Summary|vmm/amd: ivhd0: Error: |bhyve: vmm/amd: ivhd0: |completion failed |Error: completion failed --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Sun Jun 16 20:18:01 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6D98815C837E for ; Sun, 16 Jun 2019 20:18:01 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id EFBC78DF73 for ; Sun, 16 Jun 2019 20:18:00 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id A639D15C837B; Sun, 16 Jun 2019 20:18:00 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7D2FB15C837A for ; Sun, 16 Jun 2019 20:18:00 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DE8398DF6E for ; Sun, 16 Jun 2019 20:17:59 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 0FE381C79D for ; Sun, 16 Jun 2019 20:17:59 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5GKHwKJ072584 for ; Sun, 16 Jun 2019 20:17:58 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5GKHwvM072571 for virtualization@FreeBSD.org; Sun, 16 Jun 2019 20:17:58 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 205549] bhyve pci passthru stops working after guest is restarted Date: Sun, 16 Jun 2019 20:17:56 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: julien.mstr320@gmail.com X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Jun 2019 20:18:01 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D205549 julien M changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |julien.mstr320@gmail.com --- Comment #9 from julien M --- Having the same issue here with: FreeBSD 12.0-STABLE r349117 GENERIC amd64 (Generic kernel WITH xhci support) I patched stable with revisions 348778 and 348779 + D20623. FIRST TRY (vm create + vm install): BEFORE installing Ubuntu 18.04 on Bhyve: $ pciconf -r ppt4 0x3f 145c1022 00100007 0c033000 00800010 d9b00004 00000000 00000000 00000000 00000000 00000000 00000000 50071458 00000000 00000048 00000000 00000325 AFTER REBOOT: $ pciconf -r ppt4 0x3f 145c1022 00100407 0c033000 00800010 d9b00004 00000000 00000000 00000000 00000000 00000000 00000000 50071458 00000000 00000048 00000000 00000325 CHANGES: 00100007 =3D> 00100407 SECOND TRY (vm destroy, vm create, vm install): AFTER issuing: vm install linux linux.iso (while ubuntu is installing): $ pciconf -r ppt4 0x3f 145c1022 10100407 0c033000 00800010 d9b00004 00000000 00000000 00000000 00000000 00000000 00000000 50071458 00000000 00000048 00000000 00000325 CHANGES: 00100407 =3D> 10100407 THIRD TRY (vm destroy, vm create, vm install): AFTER issuing: vm install ...: $ pciconf -r ppt4 0x3f 145c1022 10100407 0c033000 00800010 d9b00004 00000000 00000000 00000000 00000000 00000000 00000000 50071458 00000000 00000048 00000000 00000325 CHANGES: NONE It seems that the FIRST install is breaking everything by changing 00100007= to 00100407. After a FreeBSD reboot, the 00100007 is back and passthrough is working when installing for the FIRST time linux in bhyve. This is the device to be passed: ppt2@pci0:8:0:0: class=3D0x130000 card=3D0x145a1022 chip=3D0x145a102= 2 rev=3D0x00 hdr=3D0x00 vendor =3D 'Advanced Micro Devices, Inc. [AMD]' device =3D 'Zeppelin/Raven/Raven2 PCIe Dummy Function' class =3D non-essential instrumentation ppt3@pci0:8:0:2: class=3D0x108000 card=3D0x14561022 chip=3D0x1456102= 2 rev=3D0x00 hdr=3D0x00 vendor =3D 'Advanced Micro Devices, Inc. [AMD]' device =3D 'Family 17h (Models 00h-0fh) Platform Security Processor' class =3D encrypt/decrypt ppt4@pci0:8:0:3: class=3D0x0c0330 card=3D0x50071458 chip=3D0x145c102= 2 rev=3D0x00 hdr=3D0x00 vendor =3D 'Advanced Micro Devices, Inc. [AMD]' device =3D 'Family 17h (Models 00h-0fh) USB 3.0 Host Controller' class =3D serial bus subclass =3D USB Configuration for bhyve-vm: ... passthru0=3D"8/0/0" passthru1=3D"8/0/2" passthru2=3D"8/0/3" ... I might be able to test this configuration in FreeBSD-CURRENT if that's of = any help? (compile times are low on a threadripper 1950x). --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Mon Jun 17 13:38:49 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1334015BA623 for ; Mon, 17 Jun 2019 13:38:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 9A1E669F26 for ; Mon, 17 Jun 2019 13:38:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 5A10315BA622; Mon, 17 Jun 2019 13:38:48 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4787B15BA620 for ; Mon, 17 Jun 2019 13:38:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D99AD69F22 for ; Mon, 17 Jun 2019 13:38:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 2AE0260CA for ; Mon, 17 Jun 2019 13:38:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5HDclTI053293 for ; Mon, 17 Jun 2019 13:38:47 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5HDciCp053271 for virtualization@FreeBSD.org; Mon, 17 Jun 2019 13:38:44 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 205549] bhyve pci passthru stops working after guest is restarted Date: Mon, 17 Jun 2019 13:38:43 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: jhb@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 13:38:49 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D205549 --- Comment #10 from John Baldwin --- (In reply to julien M from comment #9) So this is a different variation and not quite the same as you are passing through different devices. Can you clarify if any of these devices work currently and are broken by the proposed patch, or if the situation is the = same with the proposed patch? In your case the bit being changed is different (= the bit to disable INTx interrupts is being set by the guest). Can you provide 'pciconf -lc' output on the host for these three devices? --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Mon Jun 17 15:29:50 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C442915BD0DA for ; Mon, 17 Jun 2019 15:29:50 +0000 (UTC) (envelope-from lausts@acm.org) Received: from cdptpa-cmomta03.email.rr.com (cdptpa-outbound-snat.email.rr.com [107.14.166.230]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 8116B6E703 for ; Mon, 17 Jun 2019 15:29:48 +0000 (UTC) (envelope-from lausts@acm.org) Received: from mail.laus.org ([65.29.112.189]) by cmsmtp with ESMTP id ctXJhEeqpXGq6ctXMhQl4s; Mon, 17 Jun 2019 15:27:12 +0000 Received: from [192.168.1.100] (inspiron [192.168.1.100]) by mail.laus.org (8.15.2/8.15.2) with ESMTPS id x5HFR9wb077470 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Mon, 17 Jun 2019 11:27:09 -0400 (EDT) (envelope-from lausts@acm.org) X-Authentication-Warning: mail.laus.org: Host inspiron [192.168.1.100] claimed to be [192.168.1.100] Reply-To: lausts@acm.org To: freebsd-virtualization@freebsd.org From: Thomas Laus Subject: VM Switch broken after update on 20190507 Openpgp: preference=signencrypt Autocrypt: addr=lausts@acm.org; prefer-encrypt=mutual; keydata= mQGiBDx1NWwRBADARalI5I8kGeBYYYWnZB73T1fU4333yCuRokRvzlAZ5Zhb3hqsNdTEMheN FDjZSL8J5jeJtvSRinY2p09CxpAMoJR9zHLmHl+zEOY8fInbB+KiFtSfGf0blSEY9/+isQP9 xmUIQWUj0kwVtrns7m1HrYLiI07NVFzbHNKqQcbPuwCg0n/KKi+VJiUs5MqLKwGuPotGeZME AIluMetTQwfLyovundMwFYlSZ/Z8JjkMybqgKuiRrZnaBVVZ80NjAYZI73yAZPfQh9mvFxW9 ipc2tSALwDy/tYDpQRK0k+0EsDmwG/wM6OarkqSuFcYx+tP86+2+6Xitn6E/hriIWa/ZQVef /fx7dZzdwhXH6fd34v8o/BuqhawLBACs4MTMGbdSmyI56vCMXWY1yxRPmuygd4vUnXqYwlrM Ee/LjQdreg1zTAJnnW1K+PgOUW/jvS+uAbgxLa3i59/Z4Uu7nB6G1y+Y1cThojUsLnvoJlt1 4XE1U/vnOcvO3evo6knB1qjbAMsZGaVleiVKDq+7XE7swe4WtBJKbYJthbQcVGhvbWFzIExh dXMgPGxhdXN0c0BhY20ub3JnPoh/BBMRAgA/AheAAh4BBgsJCAcDAgYVCAIJCgsEFgIDAQIZ ARYhBBloSoDtPqFEokqZd+v/gtRiCDbPBQJcKgq6BQkhqyDOAAoJEOv/gtRiCDbP9xQAoL7B hCgFeI2K/0koKP3U8OB52nQyAJ0dd/QVJC7tV8gER4tse5GCUN5CHrkCDQRFspgcEAgAjXsi 9WqowAKZ7d2ix6t7fiYgu2QBGWq36NvN+cPBJIu0CnagL1v4W1UrRW/0cInLzgqlWrSU7SFg y1+rGBlusMHf8/faGeZD0XwMdYgTIYdjdK5VZ0GaRWUs0LbHAOJQkOFRHLMAEG8wrc3f1xrn uVJ4JPOA81kTmTXvYTyQNXJBySc0oNSgvSut8aBbNGBZhw9U2V3yXXnnMeWR8+DYrriYdOdR eK7S0LNN8TPY60PJx3KLN9vUY9Cb5Ly0NavF3wREPQqYlNfTMoG/GA/n8XB6SCoMj73oKCyw FLbckBUjFsl7wTeKKvU68V8kWG762fscXhOhRduETGrja09MbwADBQf/WiycmdfNtB41+vvT HQqz9tm3ZHAW2yE53CxfQpvlyS/KwnWgLjl/iV0SHRDede0NJ5yTEqPVhqq7WCdlqVsHPSpX FfvyOgbNmjPmOY/a1nW4UnWSqA7bgQvkthahhoLeHzkU8YKupW0m05RIBpqQER6HwBOksTq4 sWV/lUy1P0VT8GqqPLNklKe2BEu+KhuhLV6XwEG3VrHNoY6/R5CMGvBhZbtiUViCZktmxJAj Fq0VCcuj7+Oo52eq4BL2vMrzLX+2Ib1JSWid6t0N+grXxbr2mv7H2V2/4Vo0XI3IKxPX1mdG y9RBkbRUGyV9A8RlaS0QTnXvsxZTjOnmjxPX64hmBBgRAgAmAhsMFiEEGWhKgO0+oUSiSpl3 6/+C1GIINs8FAlwqCsMFCRhtvicACgkQ6/+C1GIINs/KCgCdGI1pg3HFhr7VEQeC63bhlMKH 0GAAn0mvTZY9OWKGMPoo0x/HdXkdgJHe Message-ID: <5f12c932-fb2f-bd92-f711-368644ddb5b5@acm.org> Date: Mon, 17 Jun 2019 11:27:09 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-CMAE-Envelope: MS4wfF1BIS5jC11wVH+AQ29oYH+VbTimwbHV/QqBSnI0pbYDypWTv4P15VZB1ZyrD52GaWmaNFkJMmmp7sj3GeuPIr8ThJaLjVdcFkAopSCbymLP+zgm7m4u RXXHxDn70zr1DCmxWx3a/rznT1QVgsQqK1ONA9QnRjUwtbIHFYcgi7zFJqWyJC3mCGNUN/JWjjdYYA== X-Rspamd-Queue-Id: 8116B6E703 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; spf=softfail (mx1.freebsd.org: 107.14.166.230 is neither permitted nor denied by domain of lausts@acm.org) smtp.mailfrom=lausts@acm.org X-Spamd-Result: default: False [-3.68 / 15.00]; HAS_REPLYTO(0.00)[lausts@acm.org]; REPLYTO_ADDR_EQ_FROM(0.00)[]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; MX_GOOD(-0.01)[mail.mailroute.net,mail.mailroute.net]; NEURAL_HAM_SHORT(-0.85)[-0.847,0]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(-0.73)[ipnet: 107.14.160.0/20(-1.99), asn: 14065(-1.59), country: US(-0.06)]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:14065, ipnet:107.14.160.0/20, country:US]; MIME_TRACE(0.00)[0:+]; MID_RHS_MATCH_FROM(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[189.112.29.65.zen.spamhaus.org : 127.0.0.10]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-virtualization@freebsd.org]; DMARC_NA(0.00)[acm.org]; RCPT_COUNT_ONE(0.00)[1]; RCVD_TLS_LAST(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[230.166.14.107.list.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 15:29:51 -0000 I just updated my bhyve server running CURRENT up to r349133 and can't start my network switch. I suspect that this problem has a root cause in the kernel configuration change made on 20190507 that created if_tuntap to replace the tunnel and tap devices. My vm switch has been in use for over a year and worked fine. When booting I get the message: /boot/kernel/if_tap.ko - unsupported file type. I can't remove or destroy my vm switch to create a new one. I get the message: vm switch remove public re0 - unable to locate switch id vm destroy public - failed to remove virtual switch My vm_bhyve port is version 1.3.0 I tried to locate any config files that were generated by the vm switch create utility. I was not successful. I wanted to see if I could just manually edit something to change if_tap to if_tuntap. What do I need to make my vm switch work again? Tom -- Public Keys: PGP KeyID = 0x5F22FDC1 GnuPG KeyID = 0x620836CF From owner-freebsd-virtualization@freebsd.org Mon Jun 17 15:35:18 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AC5C015BD4EC for ; Mon, 17 Jun 2019 15:35:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 3619B6ED3E for ; Mon, 17 Jun 2019 15:35:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id E993215BD4E4; Mon, 17 Jun 2019 15:35:17 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D82DC15BD4E3 for ; Mon, 17 Jun 2019 15:35:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 70F6E6ED39 for ; Mon, 17 Jun 2019 15:35:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id A59ED71B0 for ; Mon, 17 Jun 2019 15:35:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5HFZGuY096574 for ; Mon, 17 Jun 2019 15:35:16 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5HFZBRC096561 for virtualization@FreeBSD.org; Mon, 17 Jun 2019 15:35:11 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 238333] bhyve random crash in rfb.c on FreeBSD current (after r346011) Date: Mon, 17 Jun 2019 15:35:03 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: crash, needs-qa, regression X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: markj@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: markj@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: assigned_to Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 15:35:18 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238333 Mark Johnston changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|virtualization@FreeBSD.org |markj@FreeBSD.org --- Comment #21 from Mark Johnston --- https://reviews.freebsd.org/D20673 --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Mon Jun 17 15:55:14 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 70EB915BDEE3 for ; Mon, 17 Jun 2019 15:55:14 +0000 (UTC) (envelope-from matt.churchyard@userve.net) Received: from smtp-a.userve.net (smtp-outbound.userve.net [217.196.1.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.userve.net", Issuer "Sectigo RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 853236FACA for ; Mon, 17 Jun 2019 15:55:08 +0000 (UTC) (envelope-from matt.churchyard@userve.net) Received: from owa.usd-group.com (owa.usd-group.com [217.196.1.2]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp-a.userve.net (Postfix) with ESMTPS id CED73A20D; Mon, 17 Jun 2019 16:54:59 +0100 (BST) Received: from SERVER.ad.usd-group.com (192.168.0.1) by SERVER.ad.usd-group.com (192.168.0.1) with Microsoft SMTP Server (TLS) id 15.0.847.32; Mon, 17 Jun 2019 16:54:59 +0100 Received: from SERVER.ad.usd-group.com ([fe80::b19d:892a:6fc7:1c9]) by SERVER.ad.usd-group.com ([fe80::b19d:892a:6fc7:1c9%12]) with mapi id 15.00.0847.030; Mon, 17 Jun 2019 16:54:59 +0100 From: Matt Churchyard To: "lausts@acm.org" , "freebsd-virtualization@freebsd.org" Subject: RE: VM Switch broken after update on 20190507 Thread-Topic: VM Switch broken after update on 20190507 Thread-Index: AQHVJSGSIqMtJPuF6EeM0JEru+VtgKaf/0/Q Date: Mon, 17 Jun 2019 15:54:59 +0000 Message-ID: References: <5f12c932-fb2f-bd92-f711-368644ddb5b5@acm.org> In-Reply-To: <5f12c932-fb2f-bd92-f711-368644ddb5b5@acm.org> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [192.168.0.10] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Rspamd-Queue-Id: 853236FACA X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.52 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.997,0]; R_DKIM_ALLOW(-0.20)[userve.net:s=201901]; HAS_XOIP(0.00)[]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:217.196.1.0/24]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[userve.net:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[22.1.196.217.list.dnswl.org : 127.0.10.0]; MX_GOOD(-0.01)[av-smtp-in1.userve.net,av-smtp-in2.userve.net]; TO_DN_EQ_ADDR_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.50)[-0.499,0]; DMARC_POLICY_ALLOW(-0.50)[userve.net,reject]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:20652, ipnet:217.196.0.0/20, country:GB]; IP_SCORE(-0.02)[country: GB(-0.09)] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 15:55:14 -0000 >I just updated my bhyve server running CURRENT up to r349133 and can't sta= rt my network switch. I suspect that this problem has a root cause in the = kernel configuration change made on 20190507 that created if_tuntap to repl= ace the tunnel and tap devices. My vm switch has been in use for over a ye= ar and worked fine. When booting I get the message: > /boot/kernel/if_tap.ko - unsupported file type. > I can't remove or destroy my vm switch to create a new one. I get the > message: > vm switch remove public re0 - unable to locate switch id vm destroy publi= c - failed to remove virtual switch > My vm_bhyve port is version 1.3.0 > I tried to locate any config files that were generated by the vm switch c= reate utility. I was not successful. I wanted to see if I could just manu= ally edit something to change if_tap to if_tuntap. What do I need to make = my vm switch work again? Hi Tom, I haven't tested this myself but there's a recent PR that was provided to f= ix this that hasn't made it into ports yet. https://github.com/churchers/vm-bhyve/pull/305/files Matt >Tom -- Public Keys: PGP KeyID =3D 0x5F22FDC1 GnuPG KeyID =3D 0x620836CF _______________________________________________ freebsd-virtualization@freebsd.org mailing list https://lists.freebsd.org/m= ailman/listinfo/freebsd-virtualization To unsubscribe, send any mail to "freebsd-virtualization-unsubscribe@freebs= d.org" From owner-freebsd-virtualization@freebsd.org Mon Jun 17 23:01:29 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 15F4A15C6C6B for ; Mon, 17 Jun 2019 23:01:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 9A257867F7 for ; Mon, 17 Jun 2019 23:01:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 55B0815C6C6A; Mon, 17 Jun 2019 23:01:28 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4365515C6C69 for ; Mon, 17 Jun 2019 23:01:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D35BA867F3 for ; Mon, 17 Jun 2019 23:01:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 1B01FAF12 for ; Mon, 17 Jun 2019 23:01:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5HN1QIU057194 for ; Mon, 17 Jun 2019 23:01:26 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5HN1QeJ057193 for virtualization@FreeBSD.org; Mon, 17 Jun 2019 23:01:26 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 205549] bhyve pci passthru stops working after guest is restarted Date: Mon, 17 Jun 2019 23:01:25 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: jhb@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 23:01:29 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D205549 --- Comment #11 from John Baldwin --- Actually, I've updated D20623 to always clear INTxDIS on guest start which I think will fix the issue in comment 9 as well if you are able to retest. --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Tue Jun 18 13:43:23 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 55BCD15BC6CA for ; Tue, 18 Jun 2019 13:43:23 +0000 (UTC) (envelope-from lausts@acm.org) Received: from cdptpa-cmomta02.email.rr.com (cdptpa-outbound-snat.email.rr.com [107.14.166.230]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 1D875757C3 for ; Tue, 18 Jun 2019 13:43:21 +0000 (UTC) (envelope-from lausts@acm.org) Received: from mail.laus.org ([65.29.112.189]) by cmsmtp with ESMTP id dEG6hu0DIxfsfdEG8hiryZ; Tue, 18 Jun 2019 13:34:50 +0000 Received: from [192.168.1.100] (inspiron [192.168.1.100]) by mail.laus.org (8.15.2/8.15.2) with ESMTPS id x5IDYj3L081413 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Tue, 18 Jun 2019 09:34:46 -0400 (EDT) (envelope-from lausts@acm.org) X-Authentication-Warning: mail.laus.org: Host inspiron [192.168.1.100] claimed to be [192.168.1.100] Reply-To: lausts@acm.org Subject: Re: VM Switch broken after update on 20190507 To: Matt Churchyard , "freebsd-virtualization@freebsd.org" References: <5f12c932-fb2f-bd92-f711-368644ddb5b5@acm.org> From: Thomas Laus Openpgp: preference=signencrypt Autocrypt: addr=lausts@acm.org; prefer-encrypt=mutual; keydata= mQGiBDx1NWwRBADARalI5I8kGeBYYYWnZB73T1fU4333yCuRokRvzlAZ5Zhb3hqsNdTEMheN FDjZSL8J5jeJtvSRinY2p09CxpAMoJR9zHLmHl+zEOY8fInbB+KiFtSfGf0blSEY9/+isQP9 xmUIQWUj0kwVtrns7m1HrYLiI07NVFzbHNKqQcbPuwCg0n/KKi+VJiUs5MqLKwGuPotGeZME AIluMetTQwfLyovundMwFYlSZ/Z8JjkMybqgKuiRrZnaBVVZ80NjAYZI73yAZPfQh9mvFxW9 ipc2tSALwDy/tYDpQRK0k+0EsDmwG/wM6OarkqSuFcYx+tP86+2+6Xitn6E/hriIWa/ZQVef /fx7dZzdwhXH6fd34v8o/BuqhawLBACs4MTMGbdSmyI56vCMXWY1yxRPmuygd4vUnXqYwlrM Ee/LjQdreg1zTAJnnW1K+PgOUW/jvS+uAbgxLa3i59/Z4Uu7nB6G1y+Y1cThojUsLnvoJlt1 4XE1U/vnOcvO3evo6knB1qjbAMsZGaVleiVKDq+7XE7swe4WtBJKbYJthbQcVGhvbWFzIExh dXMgPGxhdXN0c0BhY20ub3JnPoh/BBMRAgA/AheAAh4BBgsJCAcDAgYVCAIJCgsEFgIDAQIZ ARYhBBloSoDtPqFEokqZd+v/gtRiCDbPBQJcKgq6BQkhqyDOAAoJEOv/gtRiCDbP9xQAoL7B hCgFeI2K/0koKP3U8OB52nQyAJ0dd/QVJC7tV8gER4tse5GCUN5CHrkCDQRFspgcEAgAjXsi 9WqowAKZ7d2ix6t7fiYgu2QBGWq36NvN+cPBJIu0CnagL1v4W1UrRW/0cInLzgqlWrSU7SFg y1+rGBlusMHf8/faGeZD0XwMdYgTIYdjdK5VZ0GaRWUs0LbHAOJQkOFRHLMAEG8wrc3f1xrn uVJ4JPOA81kTmTXvYTyQNXJBySc0oNSgvSut8aBbNGBZhw9U2V3yXXnnMeWR8+DYrriYdOdR eK7S0LNN8TPY60PJx3KLN9vUY9Cb5Ly0NavF3wREPQqYlNfTMoG/GA/n8XB6SCoMj73oKCyw FLbckBUjFsl7wTeKKvU68V8kWG762fscXhOhRduETGrja09MbwADBQf/WiycmdfNtB41+vvT HQqz9tm3ZHAW2yE53CxfQpvlyS/KwnWgLjl/iV0SHRDede0NJ5yTEqPVhqq7WCdlqVsHPSpX FfvyOgbNmjPmOY/a1nW4UnWSqA7bgQvkthahhoLeHzkU8YKupW0m05RIBpqQER6HwBOksTq4 sWV/lUy1P0VT8GqqPLNklKe2BEu+KhuhLV6XwEG3VrHNoY6/R5CMGvBhZbtiUViCZktmxJAj Fq0VCcuj7+Oo52eq4BL2vMrzLX+2Ib1JSWid6t0N+grXxbr2mv7H2V2/4Vo0XI3IKxPX1mdG y9RBkbRUGyV9A8RlaS0QTnXvsxZTjOnmjxPX64hmBBgRAgAmAhsMFiEEGWhKgO0+oUSiSpl3 6/+C1GIINs8FAlwqCsMFCRhtvicACgkQ6/+C1GIINs/KCgCdGI1pg3HFhr7VEQeC63bhlMKH 0GAAn0mvTZY9OWKGMPoo0x/HdXkdgJHe Message-ID: <3075d493-7a6b-105d-66f8-f1c5645984a0@acm.org> Date: Tue, 18 Jun 2019 09:34:45 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfDkCHWp+93pcgKhZt63SRaS0JuzzKxlFPbSEncl+J5GSJfQQ6tFKKU+SJDYxq42BQ6kWxRJ1dkri0D96QkR5qCpTRDnI3nVZFa6SZg46nx3EC5GDyISO 5jVnTUQIc8pcDwl2+ncGbKrit2UwlecESSji5E4Ky2rJMc9EkDiFS/ZzeJyk6AnZY/v0ZzM8zcyGq6W3wnQsi4TnLY6M24kqpSYI39a9aRQz6p0wXNM2Ux0z X-Rspamd-Queue-Id: 1D875757C3 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; spf=softfail (mx1.freebsd.org: 107.14.166.230 is neither permitted nor denied by domain of lausts@acm.org) smtp.mailfrom=lausts@acm.org X-Spamd-Result: default: False [-3.80 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; HAS_REPLYTO(0.00)[lausts@acm.org]; TO_DN_SOME(0.00)[]; HAS_XAW(0.00)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; RCVD_COUNT_THREE(0.00)[3]; MX_GOOD(-0.01)[cached: mail.mailroute.net]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.95)[-0.952,0]; RECEIVED_SPAMHAUS_PBL(0.00)[189.112.29.65.zen.spamhaus.org : 127.0.0.10]; RCVD_TLS_LAST(0.00)[]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:14065, ipnet:107.14.160.0/20, country:US]; MIME_TRACE(0.00)[0:+]; MID_RHS_MATCH_FROM(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[acm.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[230.166.14.107.list.dnswl.org : 127.0.5.0]; IP_SCORE(-0.74)[ipnet: 107.14.160.0/20(-2.03), asn: 14065(-1.62), country: US(-0.06)] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Jun 2019 13:43:23 -0000 On 2019-06-17 11:54, Matt Churchyard wrote: > > I haven't tested this myself but there's a recent PR that was provided to fix this that hasn't made it into ports yet. > > https://github.com/churchers/vm-bhyve/pull/305/files > Matt: Patching this file fixed my issue. My bhyve networking is working again. Thanks Tom -- Public Keys: PGP KeyID = 0x5F22FDC1 GnuPG KeyID = 0x620836CF From owner-freebsd-virtualization@freebsd.org Wed Jun 19 06:41:48 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9797815D3D46 for ; Wed, 19 Jun 2019 06:41:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 1B3AE77B35 for ; Wed, 19 Jun 2019 06:41:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id CAE5A15D3D45; Wed, 19 Jun 2019 06:41:47 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A868D15D3D44 for ; Wed, 19 Jun 2019 06:41:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2DC2177B2E for ; Wed, 19 Jun 2019 06:41:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 38E131C101 for ; Wed, 19 Jun 2019 06:41:46 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5J6fkTv054763 for ; Wed, 19 Jun 2019 06:41:46 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5J6fkZX054762 for virtualization@FreeBSD.org; Wed, 19 Jun 2019 06:41:46 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 229852] [PATCH] bhyve: IOMMU (Intel VTd) PCI passthrough attempt locks up some systems Date: Wed, 19 Jun 2019 06:41:44 +0000 X-Bugzilla-Reason: CC AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.2-RELEASE X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Jun 2019 06:41:48 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D229852 --- Comment #16 from commit-hook@freebsd.org --- A commit references this bug: Author: scottl Date: Wed Jun 19 06:41:07 UTC 2019 New revision: 349184 URL: https://svnweb.freebsd.org/changeset/base/349184 Log: Implement VT-d capability detection on chipsets that have multiple translation units with differing capabilities From the author via Bugzilla: --- When an attempt is made to passthrough a PCI device to a bhyve VM (causing initialisation of IOMMU) on certain Intel chipsets using VT-d the PCI bus stops working entirely. This issue occurs on the E3-1275 v5 processor on C236 chipset and has also been encountered by others on the forums with different hardware in the Skylake series. The chipset has two VT-d translation units. The issue is caused by an attempt to use the VT-d device-IOTLB capability that is supported by only the first unit for devices attached to the second unit which lacks that capability. Only the capabilities of the first unit are checked and are assumed to be the same for all units. Attached is a patch to rectify this issue by determining which unit is responsible for the device being added to a domain and then checking that unit's device-IOTLB capability. In addition to this a few fixes have been made to other instances where the first unit's capabilities are assumed for all units for domains they share. In these cases a mutual set of capabilities is determined. The patch should hopefully fix any bugs for current/future hardware with multiple translation units supporting different capabilities. A description is on the forums at https://forums.freebsd.org/threads/pci-passthrough-bhyve-usb-xhci.65235 The thread includes observations by other users of the bug occurring, and description as well as confirmation of the fix. I'd also like to thank Ordoban for their help. --- Personally tested on a Skylake laptop, Skylake Xeon server, and a Xeon-D-1541, passing through XHCI and NVMe functions. Passthru is hit-or-miss to the point of being unusable without this patch. PR: 229852 Submitted by: callum@aitchison.org MFC after: 1 week Changes: head/sys/amd64/vmm/intel/vtd.c --=20 You are receiving this mail because: You are on the CC list for the bug. You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Wed Jun 19 06:45:33 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0DC0915D3F33 for ; Wed, 19 Jun 2019 06:45:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 999A977C84 for ; Wed, 19 Jun 2019 06:45:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 5A89515D3F32; Wed, 19 Jun 2019 06:45:32 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 48DD915D3F31 for ; Wed, 19 Jun 2019 06:45:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CBBAD77C81 for ; Wed, 19 Jun 2019 06:45:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 285101C12B for ; Wed, 19 Jun 2019 06:45:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5J6jVmx062163 for ; Wed, 19 Jun 2019 06:45:31 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5J6jVXv062162 for virtualization@FreeBSD.org; Wed, 19 Jun 2019 06:45:31 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 229852] [PATCH] bhyve: IOMMU (Intel VTd) PCI passthrough attempt locks up some systems Date: Wed, 19 Jun 2019 06:45:31 +0000 X-Bugzilla-Reason: AssignedTo CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.2-RELEASE X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: scottl@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: resolution cc bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Jun 2019 06:45:33 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D229852 Scott Long changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED CC| |scottl@FreeBSD.org Status|New |Closed --- Comment #17 from Scott Long --- Thanks a lot for submitting this fix, and thanks to everyone who tested it = and reported back. --=20 You are receiving this mail because: You are the assignee for the bug. You are on the CC list for the bug.= From owner-freebsd-virtualization@freebsd.org Thu Jun 20 13:53:19 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B7F0215BC55F for ; Thu, 20 Jun 2019 13:53:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 41CBE8253B for ; Thu, 20 Jun 2019 13:53:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 024F415BC55E; Thu, 20 Jun 2019 13:53:19 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BA50D15BC55D for ; Thu, 20 Jun 2019 13:53:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46B9082538 for ; Thu, 20 Jun 2019 13:53:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 6A8B8CFEB for ; Thu, 20 Jun 2019 13:53:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5KDrHZ4059661 for ; Thu, 20 Jun 2019 13:53:17 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5KDrHIU059660 for virtualization@FreeBSD.org; Thu, 20 Jun 2019 13:53:17 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 205549] bhyve pci passthru stops working after guest is restarted Date: Thu, 20 Jun 2019 13:53:17 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ark@dudevich.dn.ua X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 20 Jun 2019 13:53:20 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D205549 --- Comment #12 from arkadyi --- Maybe I misunderstood you. 1. First I patched pci_passthru.c < diff from 348779 < < D20623.diff 2. Second I patched pci_emul.c < diff from 348778 But bhyve can't build. Please see log bellow: cc -O2 -pipe -march=3Dcore2 -I/usr/src/sys -DINET -DINET6 -I/usr/src/sys/dev/e1000 -I/usr/src/sys/dev/mii -I/usr/src/sys/dev/usb/controller -g -O0 -MD -MF.depend.pci_passthru.o -MTpci_passthru.o -std=3Dgnu99 -fstack-protector-strong -Wsystem-headers -W= error -Wall -Wno-format-y2k -Wno-uninitialized -Wno-pointer-sign -Wno-empty-body -Wno-string-plus-int -Wno-unused-const-variable -Wno-tautological-compare -Wno-unused-value -Wno-parentheses-equality -Wno-unused-function -Wno-enum-conversion -Wno-unused-local-typedef -Wno-address-of-packed-member -Wno-switch -Wno-switch-enum -Wno-knr-promoted-parameter -Qunused-argument= s=20 -c /usr/src/usr.sbin/bhyve/pci_passthru.c -o pci_passthru.o /usr/src/usr.sbin/bhyve/pci_passthru.c:700:6: error: implicit declaration of function 'caph_rights_limit' is invalid in C99 [-Werror,-Wimplicit-function-declaration] if (caph_rights_limit(pcifd, &rights) =3D=3D -1) ^ /usr/src/usr.sbin/bhyve/pci_passthru.c:700:6: note: did you mean 'cap_rights_limit'? /usr/src/sys/sys/capsicum.h:509:5: note: 'cap_rights_limit' declared here int cap_rights_limit(int fd, const cap_rights_t *rights); ^ /usr/src/usr.sbin/bhyve/pci_passthru.c:702:6: error: implicit declaration of function 'caph_ioctls_limit' is invalid in C99 [-Werror,-Wimplicit-function-declaration] if (caph_ioctls_limit(pcifd, pci_ioctls, nitems(pci_ioctls)) =3D=3D= -1) ^ /usr/src/usr.sbin/bhyve/pci_passthru.c:702:6: note: did you mean 'cap_ioctls_limit'? /usr/src/sys/sys/capsicum.h:519:5: note: 'cap_ioctls_limit' declared here int cap_ioctls_limit(int fd, const cap_ioctl_t *cmds, size_t ncmds); ^ /usr/src/usr.sbin/bhyve/pci_passthru.c:901:3: error: implicit declaration of function 'pci_emul_cmd_changed' is invalid in C99 [-Werror,-Wimplicit-function-declaration] pci_emul_cmd_changed(pi, cmd_old); ^ 3 errors generated. *** Error code 1 Stop. make: stopped in /usr/src/usr.sbin/bhyve --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Fri Jun 21 19:55:52 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EAE1215BD5B3 for ; Fri, 21 Jun 2019 19:55:51 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 6D71B764CA for ; Fri, 21 Jun 2019 19:55:51 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 2C3F615BD5A9; Fri, 21 Jun 2019 19:55:51 +0000 (UTC) Delivered-To: virtualization@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 09AD315BD5A8 for ; Fri, 21 Jun 2019 19:55:51 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com [IPv6:2607:f8b0:4864:20::82a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4AC8E764B0 for ; Fri, 21 Jun 2019 19:55:49 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mail-qt1-x82a.google.com with SMTP id d17so8120783qtj.8 for ; Fri, 21 Jun 2019 12:55:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=1HiKrLMhm0smfoSNwfd0FzuYFkaD+GnUPzwzYlH+clo=; b=AfkA+Gr/VJEULsjj1dsw2kUUlrmWziLOkipeDvz4vgN/o0l8J6UYvQxMbKNK4VJce/ 1vogDTU7jz7KYscAJmb58r++xdzKZAOAUE60xWCCVESgjR1cgCgw3EieUWPgoZHyUW+K f3ZM6k48g+kHMXLn77V3UeCLd/wL2gzstQLf51Vi0akVoLiWQpq0FljJ6yl/DN71q35Y FXvQsLn4iFuAoTXXhbzI10Y21e5ETuh4PUGBESeQFTlEzmzrKf4Eu0H7VxuqYTQm7INh PlqHdQhPDgqLdhoAusFz96Ryk6ULEG5p32IzX6yCbldZnfi2DlXg9NmyeyNo96C/MRb9 QQaw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=1HiKrLMhm0smfoSNwfd0FzuYFkaD+GnUPzwzYlH+clo=; b=LNuWe33HF+D3LtYjJVG7tiWOBi6liAIMuXBMjipQT/f9ax+IYY1MKFhW9i+8P4DlZ3 42JQAYqqKdOdxSiZgHvmNjYMhq6klvbYUDtU4cmx2DssHXKi0Mw5t3RQLCQmxdIFRix/ s7w0fuo5Jw9XjP5XzO7OT94fHVYGamCgFClbC5eLDzdOr7ihCe4zysR2gC2KaqnibUST VpkFVR558d4cNDpS0348fIaVd+MXcVBf9XTC0FDs7kpimLAJk19D1m6ftqwPcJJXVEal 5cjgETbPPF9WU/BWCjWcoIOYljsF468bKxuy6LNMa8XpDb9eA4XxBapLLTDeDSjUm4ad v0iQ== X-Gm-Message-State: APjAAAVRZaYh8CVwtB7HFJDQBOCWy56cytPReQ0T9uanU7gOpmHBc/EX rRiM1ycWD94ZQMgv7wjeOvhi3Q== X-Google-Smtp-Source: APXvYqw2Gr9jgq7n+5yDb7ttR2vCvRYDqEr4O6r0yrOl/JKXYXaoYswGmMH+CAsA8yLXOU64EDgY6g== X-Received: by 2002:ac8:41d1:: with SMTP id o17mr44385475qtm.17.1561146948472; Fri, 21 Jun 2019 12:55:48 -0700 (PDT) Received: from mutt-hbsd ([151.196.118.239]) by smtp.gmail.com with ESMTPSA id l40sm2545130qtc.51.2019.06.21.12.55.47 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Fri, 21 Jun 2019 12:55:47 -0700 (PDT) Date: Fri, 21 Jun 2019 15:55:47 -0400 From: Shawn Webb To: Mihai Carabas Cc: virtualization@freebsd.org Subject: Re: bhyve/arm64 status Message-ID: <20190621195547.ciuewyonun2r74br@mutt-hbsd> References: <20190527013609.dl6zup3rinzh3tw4@mutt-hbsd> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="msm27biury2bvoev" Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD mutt-hbsd 13.0-CURRENT-HBSD FreeBSD 13.0-CURRENT-HBSD HARDENEDBSD-13-CURRENT amd64 X-PGP-Key: http://pgp.mit.edu/pks/lookup?op=vindex&search=0xFF2E67A277F8E1FA User-Agent: NeoMutt/20180716 X-Rspamd-Queue-Id: 4AC8E764B0 X-Spamd-Bar: -------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=hardenedbsd.org header.s=google header.b=AfkA+Gr/; spf=pass (mx1.freebsd.org: domain of shawn.webb@hardenedbsd.org designates 2607:f8b0:4864:20::82a as permitted sender) smtp.mailfrom=shawn.webb@hardenedbsd.org X-Spamd-Result: default: False [-8.09 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[hardenedbsd.org:+]; RCPT_COUNT_TWO(0.00)[2]; MX_GOOD(-0.01)[alt1.aspmx.l.google.com,aspmx.l.google.com,aspmx2.googlemail.com,alt2.aspmx.l.google.com,aspmx3.googlemail.com]; SIGNED_PGP(-2.00)[]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; IP_SCORE(-3.00)[ip: (-9.47), ipnet: 2607:f8b0::/32(-3.15), asn: 15169(-2.33), country: US(-0.06)]; RECEIVED_SPAMHAUS_PBL(0.00)[239.118.196.151.zen.spamhaus.org : 127.0.0.10]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[hardenedbsd.org:s=google]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.984,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[virtualization@freebsd.org]; DMARC_NA(0.00)[hardenedbsd.org]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[a.2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Jun 2019 19:55:52 -0000 --msm27biury2bvoev Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Thanks a lot for the info! FYI: I plan to start helping out on this in July (helping in the form of testing) on the ThunderX2. Progress will be slow, but steady. HardenedBSD's ThunderX2 is currently running experimental BIOS firmware, so this may prove to be a rather "interesting" test. :) Thanks, --=20 Shawn Webb Cofounder / Security Engineer HardenedBSD Tor-ified Signal: +1 443-546-8752 Tor+XMPP+OTR: lattera@is.a.hacker.sx GPG Key ID: 0xFF2E67A277F8E1FA GPG Key Fingerprint: D206 BB45 15E0 9C49 0CF9 3633 C85B 0AF8 AB23 0FB2 On Mon, May 27, 2019 at 10:14:33AM +0300, Mihai Carabas wrote: > And also: > - for ARM you have here a tutorial: > https://github.com/FreeBSD-UPB/freebsd/wiki/Running-a-FreeBSD-guest-under= -bhyve-on-ARM-systems > - for ARM64 here: https://github.com/FreeBSD-UPB/bhyvearm64-utils >=20 > On Mon, May 27, 2019 at 10:26 AM Mihai Carabas = wrote: > > > > Hello, > > > > There is no bhyve-arm/arm64 in current. All the code is on our repo > > here [1], but has an old HEAD. > > > > We did a rebase last week but we did not tested [2]. > > > > Currently the code is not mergeable as bhyve does not have a structure > > of machine dependent/independent code and creating such a structure > > would take some time. We talked with John Baldwin at BSDCan to find a > > easiest way to merge arm/arm64. In the next months we hope we will > > find the suitable solution to get the code into current. > > > > Thank you, > > Mihai > > > > [1] https://github.com/FreeBSD-UPB/freebsd/commits/projects/bhyvearm64 > > [2] https://github.com/FreeBSD-UPB/freebsd/commits/projects/bhyvearm64-= refactor > > > > On Mon, May 27, 2019 at 4:37 AM Shawn Webb = wrote: > > > > > > Hey all, > > > > > > I'm trying to figure out the state of bhyve on arm64 in 13-current. I > > > have two SoftIron OverDrive 1000s, a bajillion RPI3s, a Pine64, > > > Rock64, and PineBook, and a ThunderX2. Punish me. > > > > > > Thanks, > > > > > > -- > > > Shawn Webb > > > Cofounder / Security Engineer > > > HardenedBSD > > > > > > Tor-ified Signal: +1 443-546-8752 > > > Tor+XMPP+OTR: lattera@is.a.hacker.sx > > > GPG Key ID: 0xFF2E67A277F8E1FA > > > GPG Key Fingerprint: D206 BB45 15E0 9C49 0CF9 3633 C85B 0AF8 AB23 0F= B2 --msm27biury2bvoev Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEA6TL67gupaZ9nzhT/y5nonf44foFAl0NNj4ACgkQ/y5nonf4 4folfg//YvV7Tc8ZKIJEBUtsUc2oA2VPxH4bRyZ3YlOTBqvypfGt5uA3I/Wkq+i0 CSRp8HUDI+kCK2QENdi3R63/VkQPn5CklmQa3p1sPmCVeKOcUlBLUFfuUqVkpQZH 9nxmxwID8isZ4U7fRuS4CCuHOT9Js+XfR05Ctw7J2/BtzEVbGbwr3EsBnQkI1FP4 GDhN6cn33HvFA6Rjb/HIdSujewhlICNJ4dgfMqSwd1mtMB2o4I1JhBUVu1NzHxgN ijEVB+2fFLslbwxowsz29LU4fHGsCqXTD1d8tb8sbC+OsBJRA3klqVvbVkI8ZvZ5 UvUkTVmxn7mHPKj7leLDcqjIWNn0hJM9wCnHwHM2NFeVEN3nvbvKct9cYwRP03db H5TZhJuGODICrPGPGhEwYQZlMGJznbpsDnm2nskWnZkqkmE0orIj9rOAGvB4qpQi 2OinVWH73ILqsWX8et09Q5z8jvCvLj/YNIxPVHMj3bPmwrmvnH5gFcaCaG2lpjHk DP/QaQJXrjUtSxxa3YMQzoSKCih6vo+JyxXw4Um4+CmTxJTo4TS6G3I8G61drOPg D5PDaHRotw4rDdw+VPILMUOoxRH3+ESAj8TZQ9EQ3BYc4GT6/fZ3wW/DuVxucMxy 5Mj7vHO73ULy4dPD0A5Zjsm1HzA+SLRo6wZBSK1Bf6iqIyKNq00= =CkM6 -----END PGP SIGNATURE----- --msm27biury2bvoev--