From owner-freebsd-virtualization@freebsd.org Sun Dec 15 02:07:28 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 220211DE485 for ; Sun, 15 Dec 2019 02:07:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47b78J06Hhz41RC for ; Sun, 15 Dec 2019 02:07:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 03B7E1DE484; Sun, 15 Dec 2019 02:07:28 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0378A1DE483 for ; Sun, 15 Dec 2019 02:07:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47b78H6NK2z41R9 for ; Sun, 15 Dec 2019 02:07:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BC7F5602F for ; Sun, 15 Dec 2019 02:07:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id xBF27RIJ031561 for ; Sun, 15 Dec 2019 02:07:27 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id xBF27R4x031560 for virtualization@FreeBSD.org; Sun, 15 Dec 2019 02:07:27 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 203874] [patch] MSI/MSI-X interrupts don't work in VMware virtual machines Date: Sun, 15 Dec 2019 02:07:25 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: mp@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 Dec 2019 02:07:28 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D203874 Mark Peek changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mp@FreeBSD.org --- Comment #29 from Mark Peek --- I looked into this issue a bit to better understand the lineage. There was a report of issues for FreeBSD in ESXi 5.0 back in late 2011: https://forums.freebsd.org/threads/freebsd-9-rc2-breaks-mpt-driver-when-use= d-with-vmware-and-pcie-passthrough.27899/ And the blacklist quirk was added here in 2013-03: https://svnweb.freebsd.org/base/head/sys/dev/pci/pci.c?revision=3D247632&vi= ew=3Dmarkup I could not find a bug report for the above FreeBSD issue within the VMware= bug tracker. But it did show up as a Linux 4.3+ issue in 2016-01 reported again= st ESXi 6.0. The issue and resolution was documented in this knowledge base article which lists fixes in ESXi 5.5 patch 08 and 6.0 patch 03 which came out in 2016. https://kb.vmware.com/s/article/2150585 I will note that Comment #19 indicates it is broken in ESXi 5.5 build 32485= 47 which appears to be in the patch 07 branch prior to this fix being availabl= e. Now, let=E2=80=99s look at EOL dates: vSphere 5.0 and 5.1 EOL - August 24, 2016 vSphere 5.5 EOL =E2=80=93 September 19, 2018 vSphere 6.0 EOL =E2=80=93 March 2020 There have been patch releases made available in 2016 to address both 5.5 a= nd 6.0, plus having 5.5 already EOL and 6.0 in a few months. Given that it is = my recommendation we 1) remove the blacklist for these devices and 2) not investigate or add version checking (which likely would be error prone and would not take into account patch releases). I just proposed a patch to remove the quirk which I can commit with approva= ls: https://reviews.freebsd.org/D22819 --=20 You are receiving this mail because: You are the assignee for the bug.=