From nobody Sun Aug 27 15:48:50 2023 X-Original-To: virtualization@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RYdQV46YBz4rLrT for ; Sun, 27 Aug 2023 15:48:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4RYdQT6WbWz4HSH for ; Sun, 27 Aug 2023 15:48:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1693151329; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=27pLtVF51+bjpk6G5EHvkm/UEPwSe67aTHkn4h69mlo=; b=AoZT2q7QzhT3JM3t/VM57tCVQtkkLJiLfQX+F71Myjd0ZDBkA33Kn/0A/drIf+THIw98U2 k3oHQq0g1QX7BZS6UhuLCI4syluNdCcU3JkCVfFUmdqJeZmB0SS0/4WKiB3x7hekUzEfmx piFDCIl+DopvKfWBGIbC7s5c2QTb03/Ntt1oePVFW8UYaSX7JcaGxMKCPyF17fPPL9l7XF YpZ7mb4pchtjQlP9zcv1AyMccK17IjrQZyn2Va3vbMMG6uMphFEbFMNPnHTYU8oEgeOrMn GsteESHyOAML3z/d1bjM3NG0cr1dUktOa+d9MJLFeL1lm1nNKyPTbkZudUG0Yw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1693151329; a=rsa-sha256; cv=none; b=Soh4LlJ77gqzNEZaJqtJqFcj2fPvmdIrghXn5R9QDaivDY9lqUwfOPSFRVBAcybLf7IOTM Ugc0doNAflX1TZu/P6VMX9PjQCyw+S1dYro4hKVaHupWTEOU4zbCAmKXqgDCCC5Taj+dJD foQeRQbV4y45pDJPI23TfnpG87dxoZB9D2NJdvcm2C3M/iV8I9VEx3T0YgsJgUh79tR4pi L6FAXIPsVxKoIEQEk52iqgORaHgwgwN7sT4LAG2xSiIbmwzKHq02qHx4hIwWpKD5n81MVt tDR7wtj7AFHiAYmUnvVjh1Bop+xX7QAjBJHp9UgxBwGamhh5BXHy3LX/faXTHg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4RYdQT5V0szY81 for ; Sun, 27 Aug 2023 15:48:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 37RFmnxq067493 for ; Sun, 27 Aug 2023 15:48:49 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 37RFmnSd067492 for virtualization@FreeBSD.org; Sun, 27 Aug 2023 15:48:49 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 270966] PCI passthru stops working after ~30 guest reboots (ivhd, ILLEGAL CMD, IO_PAGE_FAULT) Date: Sun, 27 Aug 2023 15:48:50 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: sm@codenetworks.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Discussion List-Archive: https://lists.freebsd.org/archives/freebsd-virtualization List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-virtualization@freebsd.org X-BeenThere: freebsd-virtualization@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270966 Santiago Martinez changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |sm@codenetworks.net --- Comment #16 from Santiago Martinez --- Hi Raul,=20 I'm seeing the same issue on AMD EPYC proc. Checking on kernel.org (Linux) seems that they also had issues with AMD-VI. In the Linux world, many people are using iommu=3Dpt to overcome this. This is also a known bug on Redhat K= B. I'm running a script similar to yours and the server behaves quite erratic. My script does the following: - Start and stop 200 times a VM with a PCI pass (in this case is a SRIOV VF, but it does the same without SRIOV, or with any other device, non-network related). - After that 200 times, it reboots the server.=20 - When the server starts it runs the script again. Sometimes, the script can start and stop the VM 200 times, even if I see IVH errors (command not completed or cmd error), and sometimes can only start a= nd stop the VM once, and the server reboots after a few IO_PAGE_FAULT (somethi= ng gets corrupted and the NVME stops responding and machines reboots after com= mand retry-timeout). The server showing the issue is a SuperMicro H12SSW-NT. - AMD EPYC 7552 48-Core Processor=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20 I have updated the BIOS to the latest release as on the Linux forum they mentioned issues with the SP3. Michael Dexter and I also tried to replicate it on other AMD processors without any success. - AMD EPYC 7702P 64-Core Processor - AMD Ryzen 7 3700X 8-Core Processor=20 - Ryzen 6800H --=20 You are receiving this mail because: You are the assignee for the bug.=