From owner-freebsd-virtualization@freebsd.org Sun Dec 29 21:01:12 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E044E1E9D1B for ; Sun, 29 Dec 2019 21:01:12 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47mCf05hPJz46gf for ; Sun, 29 Dec 2019 21:01:12 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id C20B71E9D03; Sun, 29 Dec 2019 21:01:12 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BFFC71E9CFF for ; Sun, 29 Dec 2019 21:01:12 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47mCf04cDxz46gT for ; Sun, 29 Dec 2019 21:01:12 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 974E71F47F for ; Sun, 29 Dec 2019 21:01:12 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id xBTL1CZq094334 for ; Sun, 29 Dec 2019 21:01:12 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id xBTL1CI0094321 for virtualization@FreeBSD.org; Sun, 29 Dec 2019 21:01:12 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Message-Id: <201912292101.xBTL1CI0094321@kenobi.freebsd.org> X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@FreeBSD.org using -f From: bugzilla-noreply@FreeBSD.org To: virtualization@FreeBSD.org Subject: Problem reports for virtualization@FreeBSD.org that need special attention Date: Sun, 29 Dec 2019 21:01:12 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 29 Dec 2019 21:01:13 -0000 To view an individual PR, use: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id). The following is a listing of current problems submitted by FreeBSD users, which need special attention. These represent problem reports covering all versions including experimental development code and obsolete releases. Status | Bug Id | Description ------------+-----------+--------------------------------------------------- New | 240945 | [hyper-v] [netvsc] hn network driver incorrectly 1 problems total for which you should take action. From owner-freebsd-virtualization@freebsd.org Mon Dec 30 16:01:13 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 24D001E2B75 for ; Mon, 30 Dec 2019 16:01:13 +0000 (UTC) (envelope-from darkfiberiru@gmail.com) Received: from mail-oi1-x241.google.com (mail-oi1-x241.google.com [IPv6:2607:f8b0:4864:20::241]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47mhxN1dnCz46Tr for ; Mon, 30 Dec 2019 16:01:11 +0000 (UTC) (envelope-from darkfiberiru@gmail.com) Received: by mail-oi1-x241.google.com with SMTP id l9so8359350oii.5 for ; Mon, 30 Dec 2019 08:01:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oAkzFykOvn45rUgiVZEk1t+KfMUmgYCL30FkOqzEolE=; b=NVapMt3VWXhgUwlLjgoK5kaHMZAGv/hjDTi9Tu1Xo1sxIPVtz65+ygkp5suHyvI08+ vY0WLCcO1S+Z83jMyh9OwI6SPaRDT1tmiq9X0iJG9WpQNFLZBiZ33BHbbPTPXX6J0aId P8z1sv394fp4LVWLDDO/PiTEApdlGorAsRyoK9mPWvvcScotwSiOwg7B+STJUffsistc wTqwkARqnpWnl1f/2FssPj9+HUAm+mWEgYdV2qKvXri6JDbpQ/pAnxh86FyHXdasTPrA N38e5k2vlNoLpYcnGEi8tm+ZhrcrMywu64xVcWtPhD0fkuNZDrPnoMkbTZtMnha3mGjz kZVA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oAkzFykOvn45rUgiVZEk1t+KfMUmgYCL30FkOqzEolE=; b=nqLYwTN0yBUuRbjPDphgLlA5GW60B+8fqboxziHukyBchi6bPzYStC2Al05ofbpkKp tDabvkZIwnEGrWY4FsyD6aSI2sx5rHIG9lpUErr/GUXDri9ndDbB76/p3wle5OzPlXGC Qm0oAufOHj3GE7BplFyJvhGVVOKRrN5sRi4KAn7nX/6+m+X1//fu6kxRd3A5JNJyo0Qj J+VVZYg/5hl7in6WjKF3vl5MBy1VgMokmxAmehZHJcCpaI51TZDToT3SK0Msrh8NApDy qVbxaV2mdFACF3jyrSYG5G2IHFP/tcd6s8yFZNVnRl92NW0zzdrhTE0fOnQAV7LfwWWa 0yeg== X-Gm-Message-State: APjAAAVaKDhCKKa8+1EID57ui7BPdGdYKLlwTiAON8i/krXiEVrWSyzO Tr14lbgZ3Gv8FfAuVOAa1btxYaML9YG+7D3KxGUxHUg7 X-Google-Smtp-Source: APXvYqyrjvkkliB4pWcBKYZjYBxwzIqWwaXmHIOzkOPCz1hqv0ohLWG42DHs/8rAl+Da+dSINq4TrYpkGGfD6zx0YTk= X-Received: by 2002:aca:2419:: with SMTP id n25mr5591147oic.13.1577721669599; Mon, 30 Dec 2019 08:01:09 -0800 (PST) MIME-Version: 1.0 References: <20191221202546.caca1f242a907cf50b5562e3@yamagi.org> <20191228100346.Horde.4Vi4FztkxxFnoeK7oGlIZe-@app.eeeit.de> In-Reply-To: <20191228100346.Horde.4Vi4FztkxxFnoeK7oGlIZe-@app.eeeit.de> From: Nick Wolff Date: Mon, 30 Dec 2019 11:02:07 -0500 Message-ID: Subject: Re: [PATCH] Untangle TPR shadowing and APIC virtualization / Make Win guests on Bhyve _fast_ To: Michael Reifenberger Cc: Yamagi , freebsd-virtualization@freebsd.org X-Rspamd-Queue-Id: 47mhxN1dnCz46Tr X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=NVapMt3V; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of darkfiberiru@gmail.com designates 2607:f8b0:4864:20::241 as permitted sender) smtp.mailfrom=darkfiberiru@gmail.com X-Spamd-Result: default: False [-2.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-virtualization@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_DN_SOME(0.00)[]; URI_COUNT_ODD(1.00)[15]; IP_SCORE_FREEMAIL(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[1.4.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(0.00)[ip: (2.13), ipnet: 2607:f8b0::/32(-2.15), asn: 15169(-1.87), country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Dec 2019 16:01:13 -0000 Yamagi, Thanks for the work and putting up the review. https://reviews.freebsd.org/D22942 On Sat, Dec 28, 2019 at 5:04 AM Michael Reifenberger < Michael@reifenberger.com> wrote: > Hi, > did you already get a reply from an developer for review? > Could you open a PR/DR for this patch. > > I would like to review and commit your patch after further tests. > > Thanks! > --- > mike (also mr@freebsd.org) > > Zitat von Yamagi : > > > Hi, > > a long known problem with Bhyve is that Windows guests are rather slow. > > With Windows 10 1903 this became much worse, to the point that the > > guest is unusable. I have found the reason for this: Windows hammers on > > the %cr8 control register. For example, Windows 10 1909 on an i7-2620M > > has about 68,000 %cr8 accesses per second. Each of them triggers a vm > > exit. > > > > The most common solution is TPR shadowing. Many thanks to royger in > > #bhyve for getting me on the right track. Bhyve already implements TPR > > shadowing. On AMD SVM it just works, but the implementation for Intel > > VT-x is bound to APIC virtualization. And APIC virtualization is a Xeon > > feature that is missing on most (all?) desktop CPUs. > > > > The patch - further down inline or under [0] - separates TPR shadowing > > from APIC virtualization, so TPR shadowing can be used on desktop CPUs > > as well. The patch doesn't just give a small speed boost, it's a > > difference like day and night. As an example, without the patch, the > > installation of Windows 10 1909 takes about 2280 seconds from start to > > first reboot. With the patch, only 370 seconds. On an old Thinkpad > > X220, Windows 10 guests were previously unusable, now they are resonabl= e > > fast. > > > > The patch does: > > > > * Add a new tuneable 'hw.vmm.vmx.use_tpr_shadowing' to disable TLP > > shadowing. Also add 'hw.vmm.vmx.cap.tpr_shadowing' to be able to quer= y > > if TPR shadowing is used. > > > > * Detach the initialization of TPR shadowing from the initialization of > > APIC virtualization. APIC virtualization still needs TPR shadowing, > > but not vice versa. Any CPU that supports APIC virtualization should > > also support TPR shadowing. > > > > * When TPR shadowing is used, the APIC page of each vCPU is written to > > the VMCS_VIRTUAL_APIC field of the VMCS so that the CPU can write > > directly to the page without intercept. > > > > * On vm exit, vlapic_update_ppr() is called to update the PPR. > > > > The patch was tested on an i7-2620M, an i7-6700k and a Xeon Silver > > 4110. Both Windows and FreeBSD guests work correctly. > > > > Regards, > > Yamagi > > > > 0: https://gist.github.com/Yamagi/de70c08eadeeef14eec4cb42aeb5957f > > > > ---- > > > > diff --git a/sys/amd64/vmm/intel/vmx.c b/sys/amd64/vmm/intel/vmx.c > > index 605fd0bda766..324a1e9d0c3c 100644 > > --- a/sys/amd64/vmm/intel/vmx.c > > +++ b/sys/amd64/vmm/intel/vmx.c > > @@ -172,6 +172,10 @@ static int cap_invpcid; > > SYSCTL_INT(_hw_vmm_vmx_cap, OID_AUTO, invpcid, CTLFLAG_RD, &cap_invpci= d, > > 0, "Guests are allowed to use INVPCID"); > > > > +static int tpr_shadowing; > > +SYSCTL_INT(_hw_vmm_vmx_cap, OID_AUTO, tpr_shadowing, CTLFLAG_RD, > > + &tpr_shadowing, 0, "TPR shadowin support"); > > + > > static int virtual_interrupt_delivery; > > SYSCTL_INT(_hw_vmm_vmx_cap, OID_AUTO, virtual_interrupt_delivery, > > CTLFLAG_RD, > > &virtual_interrupt_delivery, 0, "APICv virtual interrupt > > delivery support"); > > @@ -627,7 +631,7 @@ vmx_restore(void) > > static int > > vmx_init(int ipinum) > > { > > - int error, use_tpr_shadow; > > + int error; > > uint64_t basic, fixed0, fixed1, feature_control; > > uint32_t tmp, procbased2_vid_bits; > > > > @@ -750,6 +754,24 @@ vmx_init(int ipinum) > > MSR_VMX_PROCBASED_CTLS2, PROCBASED2_ENABLE_INVPCID, 0, > > &tmp) =3D=3D 0); > > > > + /* > > + * Check support for TPR shadow. > > + */ > > + error =3D vmx_set_ctlreg(MSR_VMX_PROCBASED_CTLS, > > + MSR_VMX_TRUE_PROCBASED_CTLS, PROCBASED_USE_TPR_SHADOW, 0, > > + &tmp); > > + if (error =3D=3D 0) { > > + tpr_shadowing =3D 1; > > + TUNABLE_INT_FETCH("hw.vmm.vmx.use_tpr_shadowing", > > + &tpr_shadowing); > > + } > > + > > + if (tpr_shadowing) { > > + procbased_ctls |=3D PROCBASED_USE_TPR_SHADOW; > > + procbased_ctls &=3D ~PROCBASED_CR8_LOAD_EXITING; > > + procbased_ctls &=3D ~PROCBASED_CR8_STORE_EXITING; > > + } > > + > > /* > > * Check support for virtual interrupt delivery. > > */ > > @@ -758,13 +780,9 @@ vmx_init(int ipinum) > > PROCBASED2_APIC_REGISTER_VIRTUALIZATION | > > PROCBASED2_VIRTUAL_INTERRUPT_DELIVERY); > > > > - use_tpr_shadow =3D (vmx_set_ctlreg(MSR_VMX_PROCBASED_CTLS, > > - MSR_VMX_TRUE_PROCBASED_CTLS, PROCBASED_USE_TPR_SHADOW, 0, > > - &tmp) =3D=3D 0); > > - > > error =3D vmx_set_ctlreg(MSR_VMX_PROCBASED_CTLS2, > MSR_VMX_PROCBASED_CTLS2, > > procbased2_vid_bits, 0, &tmp); > > - if (error =3D=3D 0 && use_tpr_shadow) { > > + if (error =3D=3D 0 && tpr_shadowing) { > > virtual_interrupt_delivery =3D 1; > > TUNABLE_INT_FETCH("hw.vmm.vmx.use_apic_vid", > > &virtual_interrupt_delivery); > > @@ -775,13 +793,6 @@ vmx_init(int ipinum) > > procbased_ctls2 |=3D procbased2_vid_bits; > > procbased_ctls2 &=3D ~PROCBASED2_VIRTUALIZE_X2APIC_MODE; > > > > - /* > > - * No need to emulate accesses to %CR8 if virtual > > - * interrupt delivery is enabled. > > - */ > > - procbased_ctls &=3D ~PROCBASED_CR8_LOAD_EXITING; > > - procbased_ctls &=3D ~PROCBASED_CR8_STORE_EXITING; > > - > > /* > > * Check for Posted Interrupts only if Virtual Interrupt > > * Delivery is enabled. > > @@ -1051,10 +1062,13 @@ vmx_vminit(struct vm *vm, pmap_t pmap) > > vmx->ctx[i].guest_dr6 =3D DBREG_DR6_RESERVED1; > > error +=3D vmwrite(VMCS_GUEST_DR7, DBREG_DR7_RESERVED1); > > > > - if (virtual_interrupt_delivery) { > > - error +=3D vmwrite(VMCS_APIC_ACCESS, > APIC_ACCESS_ADDRESS); > > + if (tpr_shadowing) { > > error +=3D vmwrite(VMCS_VIRTUAL_APIC, > > vtophys(&vmx->apic_page[i])); > > + } > > + > > + if (virtual_interrupt_delivery) { > > + error +=3D vmwrite(VMCS_APIC_ACCESS, > APIC_ACCESS_ADDRESS); > > error +=3D vmwrite(VMCS_EOI_EXIT0, 0); > > error +=3D vmwrite(VMCS_EOI_EXIT1, 0); > > error +=3D vmwrite(VMCS_EOI_EXIT2, 0); > > @@ -2313,6 +2327,14 @@ vmx_exit_process(struct vmx *vmx, int vcpu, > > struct vm_exit *vmexit) > > } > > } > > > > + /* > > + * If 'TPR shadowing' is used, update the local APICs PPR. > > + */ > > + if (tpr_shadowing) { > > + vlapic =3D vm_lapic(vmx->vm, vcpu); > > + vlapic_update_ppr(vlapic); > > + } > > + > > switch (reason) { > > case EXIT_REASON_TASK_SWITCH: > > ts =3D &vmexit->u.task_switch; > > diff --git a/sys/amd64/vmm/io/vlapic.c b/sys/amd64/vmm/io/vlapic.c > > index 74e6cd967396..289fdb7e077d 100644 > > --- a/sys/amd64/vmm/io/vlapic.c > > +++ b/sys/amd64/vmm/io/vlapic.c > > @@ -490,7 +490,7 @@ dump_isrvec_stk(struct vlapic *vlapic) > > * Algorithm adopted from section "Interrupt, Task and Processor > Priority" > > * in Intel Architecture Manual Vol 3a. > > */ > > -static void > > +void > > vlapic_update_ppr(struct vlapic *vlapic) > > { > > int isrvec, tpr, ppr; > > diff --git a/sys/amd64/vmm/io/vlapic.h b/sys/amd64/vmm/io/vlapic.h > > index 2a5f54003253..71b97feab6bc 100644 > > --- a/sys/amd64/vmm/io/vlapic.h > > +++ b/sys/amd64/vmm/io/vlapic.h > > @@ -74,6 +74,8 @@ void vlapic_post_intr(struct vlapic *vlapic, int > > hostcpu, int ipinum); > > void vlapic_fire_cmci(struct vlapic *vlapic); > > int vlapic_trigger_lvt(struct vlapic *vlapic, int vector); > > > > +void vlapic_update_ppr(struct vlapic *vlapic); > > + > > uint64_t vlapic_get_apicbase(struct vlapic *vlapic); > > int vlapic_set_apicbase(struct vlapic *vlapic, uint64_t val); > > void vlapic_set_x2apic_state(struct vm *vm, int vcpuid, enum > > x2apic_state s); > > > > -- > > Homepage: https://www.yamagi.org > > Github: https://github.com/yamagi > > GPG: 0x1D502515 > > > > Gru=C3=9F > --- > Michael Reifenberger > > _______________________________________________ > freebsd-virtualization@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-virtualization > To unsubscribe, send any mail to " > freebsd-virtualization-unsubscribe@freebsd.org" > From owner-freebsd-virtualization@freebsd.org Mon Dec 30 18:06:21 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9EDCB1E5EFE for ; Mon, 30 Dec 2019 18:06:21 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 47mljn21pHz4JrC for ; Mon, 30 Dec 2019 18:06:21 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: by mailman.nyi.freebsd.org (Postfix) id 454621E5EFC; Mon, 30 Dec 2019 18:06:21 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 44FDD1E5EFB for ; Mon, 30 Dec 2019 18:06:21 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from smtp.digiware.nl (smtp.digiware.nl [176.74.240.9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 47mljm26PPz4Jqy for ; Mon, 30 Dec 2019 18:06:16 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from router.digiware.nl (localhost.digiware.nl [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id EE41F3FC4E; Mon, 30 Dec 2019 19:06:14 +0100 (CET) X-Virus-Scanned: amavisd-new at digiware.com Received: from smtp.digiware.nl ([127.0.0.1]) by router.digiware.nl (router.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hBUJKtu61Y-z; Mon, 30 Dec 2019 19:06:13 +0100 (CET) Received: from [192.168.10.9] (vaio [192.168.10.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.digiware.nl (Postfix) with ESMTPSA id A2AFA3FC4C for ; Mon, 30 Dec 2019 19:06:13 +0100 (CET) To: virtualization@FreeBSD.org From: Willem Jan Withagen Subject: Adding a different type of blockstore to Bhyve Message-ID: <6e5508d0-4a41-8442-3807-8b9e22bba933@digiware.nl> Date: Mon, 30 Dec 2019 19:06:11 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1 MIME-Version: 1.0 Content-Language: en-GB X-Rspamd-Queue-Id: 47mljm26PPz4Jqy X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of wjw@digiware.nl designates 176.74.240.9 as permitted sender) smtp.mailfrom=wjw@digiware.nl X-Spamd-Result: default: False [-4.61 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[virtualization@freebsd.org]; TO_DN_NONE(0.00)[]; URI_COUNT_ODD(1.00)[3]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_THREE(0.00)[4]; RCVD_TLS_LAST(0.00)[]; RCVD_IN_DNSWL_MED(-0.20)[9.240.74.176.list.dnswl.org : 127.0.9.2]; DMARC_NA(0.00)[digiware.nl]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; IP_SCORE(-3.11)[ip: (-9.75), ipnet: 176.74.224.0/19(-4.88), asn: 28878(-0.92), country: NL(0.03)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:28878, ipnet:176.74.224.0/19, country:NL]; MID_RHS_MATCH_FROM(0.00)[] Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Dec 2019 18:06:21 -0000 Hi, One of the ways to run backing blockstore with KVM/Qemu is thru the Ceph Rados Block Device (RBD). https://github.com/qemu/qemu/blame/master/block/rbd.c And is make it possible use as boot-image or other blockdevice. Where the virtual machine using this image can migrate to another Dom0 host. I've been working on Ceph for quite some time, and one of the ways to offer a block device on FreeBSD is with rbd-ggate. This works thru geom-gate and will give a /dev/ggate# device that is mapped to an image in a rados pool. And I not into migration for Bhyve, but I would like to integrate RBD into Bhyve as an alternative backing store.... Something like:   bhyve -s 1,virtio-blk,rbd:poolname/imagename[@snapshotname] \                          [:option1=value1[:option2=value2...]] So started browsing the bhyve code, and end up in block_if.{hc}. But code there is rather strongly targeted towards a local filesystem storage.... I also ran into net_backends.{ch}, and I guess it would be a nicer solution to create a block_backends.{ch} as well for interfacing to more than just one blockstore provider. And then load the RBD provider in the chain of blockstore providers. That way would it even be possible to make that code dl-loadable in case the LGPL ceph code is not directly importable in the usr.sbin tree. (Which I suspect it is) The alternative is to start using the /dev/ggate# devices but then we probably lose the option of live migration. And performance takes a serious hit:     A block write/read would go from the vm kernel     to the bhyve process in userspace.     Then it would go to/dev/ggate# and again end up in the kernel     only to have geom-gate send it back to userspace     where rbd-ggate sends it to the cluster. Just typing this data flow is a lot of steps, showing that this might not be the best architecture. So the questions are: 1)   Is the abstraction of block_backends.{ch} the way to go? 1.1) And would the extra indirection there be acceptable?      (For network devices it seems no problem) 2)   Does anybody already have such a framework for blockdevs?      (Otherwise I'll try to morph the net_backends.{ch} 3)   Other suggestions I need to consider? Thanx, --WjW From owner-freebsd-virtualization@freebsd.org Mon Dec 30 23:48:17 2019 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 532711ED35C; Mon, 30 Dec 2019 23:48:17 +0000 (UTC) (envelope-from paul@redbarn.org) Received: from family.redbarn.org (family.redbarn.org [24.104.150.213]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 47mvJD2NGZz4cr3; Mon, 30 Dec 2019 23:48:11 +0000 (UTC) (envelope-from paul@redbarn.org) Received: from linux-9daj.localnet (50-255-33-26-static.hfc.comcastbusiness.net [50.255.33.26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id DB82EB0591; Mon, 30 Dec 2019 23:48:09 +0000 (UTC) From: Paul Vixie To: virtualization@freebsd.org, freebsd-virtualization@freebsd.org Subject: Re: Adding a different type of blockstore to Bhyve Date: Mon, 30 Dec 2019 23:48:09 +0000 Message-ID: <42643725.2GhSzOL8V3@linux-9daj> Organization: none In-Reply-To: <6e5508d0-4a41-8442-3807-8b9e22bba933@digiware.nl> References: <6e5508d0-4a41-8442-3807-8b9e22bba933@digiware.nl> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Rspamd-Queue-Id: 47mvJD2NGZz4cr3 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of paul@redbarn.org designates 24.104.150.213 as permitted sender) smtp.mailfrom=paul@redbarn.org X-Spamd-Result: default: False [-1.29 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.993,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:24.104.150.0/24]; NEURAL_HAM_LONG(-0.99)[-0.990,0]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_NOT_FQDN(0.50)[]; DMARC_NA(0.00)[redbarn.org]; TO_DN_SOME(0.00)[]; HAS_ORG_HEADER(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[213.150.104.24.list.dnswl.org : 127.0.10.0]; IP_SCORE(-0.01)[country: US(-0.05)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; CTE_CASE(0.50)[]; ASN(0.00)[asn:33651, ipnet:24.104.150.0/24, country:US]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Dec 2019 23:48:17 -0000 On Monday, 30 December 2019 18:06:11 UTC Willem Jan Withagen wrote: > Something like: > bhyve -s 1,virtio-blk,rbd:poolname/imagename[@snapshotname] \ > [:option1=value1[:option2=value2...]] this is approximately how i'd hope to do object-store level ZFS integration, so as to avoid the zvol abstraction. i know you're working on Ceph not ZFS but the concepts and facilities are similar enough to warrant cooperative thinking. > So the questions are: > 1) Is the abstraction of block_backends.{ch} the way to go? > 1.1) And would the extra indirection there be acceptable? > (For network devices it seems no problem) > > 2) Does anybody already have such a framework for blockdevs? > (Otherwise I'll try to morph the net_backends.{ch} > > 3) Other suggestions I need to consider? i think you're hitting an architectural limit, and that the bhyve design team should be thinking about a third way, one which would also solve my own loopback and mmap requirements as i've described variously. what you want to do should not only be possible, it should be clean and performant. -- Paul From owner-freebsd-virtualization@freebsd.org Wed Jan 1 16:28:40 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E1D441D9BC5 for ; Wed, 1 Jan 2020 16:28:40 +0000 (UTC) (envelope-from crowston@protonmail.com) Received: from mail1.protonmail.ch (mail1.protonmail.ch [185.70.40.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "protonmail.com", Issuer "SwissSign Server Gold CA 2014 - G22" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47nxS73dnrz44Mv for ; Wed, 1 Jan 2020 16:28:39 +0000 (UTC) (envelope-from crowston@protonmail.com) Date: Wed, 01 Jan 2020 16:28:35 +0000 To: FreeBSD virtualization From: Robert Crowston Reply-To: Robert Crowston Subject: RFC: in-guest CPU tick counters Message-ID: <6fKdhaZusPRl6_RJb__9Pb0G7qzUKz9Jm-1cX26HDLrz3DJexiSJ2i-qNV5-iseDRjy1K_PE7ABijXolae03iM223LA4MOsMQ74E2rVu2qA=@protonmail.com> Feedback-ID: 2OVbcR1yHYpdkD8cgQllkFwcuMVZg_LiVMMPvptooFDfHD_03MuQO4ZaF626jWHZYFEhNR2cmIbZ53j4QGWMBQ==:Ext:ProtonMail MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.2 required=7.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM shortcircuit=no autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.protonmail.ch X-Rspamd-Queue-Id: 47nxS73dnrz44Mv X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.10 / 15.00]; ARC_NA(0.00)[]; HAS_REPLYTO(0.00)[crowston@protonmail.com]; R_DKIM_ALLOW(-0.20)[protonmail.com:s=default]; REPLYTO_EQ_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:185.70.40.0/24]; FREEMAIL_FROM(0.00)[protonmail.com]; MIME_GOOD(-0.10)[text/plain]; FREEMAIL_REPLYTO(0.00)[protonmail.com]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; MIME_TRACE(0.00)[0:+]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[protonmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[protonmail.com,quarantine]; TO_MATCH_ENVRCPT_ALL(0.00)[]; IP_SCORE(0.00)[ip: (-9.64), ipnet: 185.70.40.0/24(-4.89), asn: 62371(-3.89), country: CH(0.03)]; RCVD_COUNT_ZERO(0.00)[0]; RCVD_IN_DNSWL_LOW(-0.10)[18.40.70.185.list.dnswl.org : 127.0.5.1]; FROM_EQ_ENVFROM(0.00)[]; FREEMAIL_ENVFROM(0.00)[protonmail.com]; ASN(0.00)[asn:62371, ipnet:185.70.40.0/24, country:CH]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Jan 2020 16:28:40 -0000 I have written a patch that exposes to a sysctl the ticks spent by each CPU= executing guest code under bhyve. This new feature differs from the existing vmm_stats code in that the exist= ing code expresses per-vm information on a per-virtual-cpu basis. This new = patch provides a per-physical-cpu counter of the aggregate number of ticks = dedicated to executing guest-mode code since the vmm.ko module was loaded. = Following the example of kern.cp_times, it is expressed as a new sysctl ("h= w.vmm.stat.guest_ticks") rather than a system call, but I am not particular= ly attached to that. The diffs may be seen here: https://github.com/freebsd/freebsd/compare/master...RobCrowston:vmm-host-st= ats I am looking for comments. If the general idea meets with this list's appro= val, I will submit it to phabricator. The new data are intended to be used by utilities like htop. To that end, I= have written a separate patch for htop that colours the CPU bars to expres= s the time spent for guest execution. After re-compiling htop, enable it wi= th F2 ("Setup") -> "Display Options" -> "Detailed CPU time (System/IO-Wait/= Hard-IRQ/Soft-IRQ/Steal/Guest)". Presently, htop only supports this feature= for Linux hosts. If the above patch is accepted, I will submit the followi= ng patch to htop separately: https://github.com/hishamhm/htop/compare/master...RobCrowston:freebsd-vmm-c= ounter-1 Happy New Year, Rob Crowston. From owner-freebsd-virtualization@freebsd.org Thu Jan 2 13:04:11 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A62661F6EF8 for ; Thu, 2 Jan 2020 13:04:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47pSsl41djz4PKK for ; Thu, 2 Jan 2020 13:04:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 89E6B1F6EF7; Thu, 2 Jan 2020 13:04:11 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 89AA11F6EF6 for ; Thu, 2 Jan 2020 13:04:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47pSsl3BRhz4PKH for ; Thu, 2 Jan 2020 13:04:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 690781BC22 for ; Thu, 2 Jan 2020 13:04:11 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 002D4B6U064730 for ; Thu, 2 Jan 2020 13:04:11 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 002D4BJs064729 for virtualization@FreeBSD.org; Thu, 2 Jan 2020 13:04:11 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 242666] Stopped VM cant restart again Date: Thu, 02 Jan 2020 13:04:10 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: 12.1-RELEASE X-Bugzilla-Keywords: bhyve X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: bernhard@blberger.de X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Jan 2020 13:04:11 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242666 --- Comment #14 from Bernhard Berger --- Is there any status overview The error has repeated itself with another VM --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Thu Jan 2 19:51:26 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0205A1D83ED for ; Thu, 2 Jan 2020 19:51:26 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (gate2.funkthat.com [208.87.223.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "gate2.funkthat.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47pdvc2v2gz3M1T for ; Thu, 2 Jan 2020 19:51:23 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (localhost [127.0.0.1]) by gold.funkthat.com (8.15.2/8.15.2) with ESMTPS id 002Jp3B7096226 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 2 Jan 2020 11:51:03 -0800 (PST) (envelope-from jmg@gold.funkthat.com) Received: (from jmg@localhost) by gold.funkthat.com (8.15.2/8.15.2/Submit) id 002Jp2EJ096225; Thu, 2 Jan 2020 11:51:02 -0800 (PST) (envelope-from jmg) Date: Thu, 2 Jan 2020 11:51:02 -0800 From: John-Mark Gurney To: Robert Crowston Cc: FreeBSD virtualization Subject: Re: RFC: in-guest CPU tick counters Message-ID: <20200102195102.GP22038@funkthat.com> References: <6fKdhaZusPRl6_RJb__9Pb0G7qzUKz9Jm-1cX26HDLrz3DJexiSJ2i-qNV5-iseDRjy1K_PE7ABijXolae03iM223LA4MOsMQ74E2rVu2qA=@protonmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6fKdhaZusPRl6_RJb__9Pb0G7qzUKz9Jm-1cX26HDLrz3DJexiSJ2i-qNV5-iseDRjy1K_PE7ABijXolae03iM223LA4MOsMQ74E2rVu2qA=@protonmail.com> X-Operating-System: FreeBSD 11.0-RELEASE-p7 amd64 X-PGP-Fingerprint: D87A 235F FB71 1F3F 55B7 ED9B D5FF 5A51 C0AC 3D65 X-Files: The truth is out there X-URL: https://www.funkthat.com/ X-Resume: https://www.funkthat.com/~jmg/resume.html X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger? User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (gold.funkthat.com [127.0.0.1]); Thu, 02 Jan 2020 11:51:03 -0800 (PST) X-Rspamd-Queue-Id: 47pdvc2v2gz3M1T X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of jmg@gold.funkthat.com has no SPF policy when checking 208.87.223.18) smtp.mailfrom=jmg@gold.funkthat.com X-Spamd-Result: default: False [-1.16 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.98)[-0.980,0]; RCVD_TLS_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; IP_SCORE(-0.45)[ip: (-1.15), ipnet: 208.87.216.0/21(-0.58), asn: 32354(-0.46), country: US(-0.05)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[funkthat.com]; AUTH_NA(1.00)[]; NEURAL_HAM_LONG(-0.93)[-0.932,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[jmg@funkthat.com,jmg@gold.funkthat.com]; FREEMAIL_TO(0.00)[protonmail.com]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:32354, ipnet:208.87.216.0/21, country:US]; FROM_NEQ_ENVFROM(0.00)[jmg@funkthat.com,jmg@gold.funkthat.com]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Jan 2020 19:51:26 -0000 Robert Crowston via freebsd-virtualization wrote this message on Wed, Jan 01, 2020 at 16:28 +0000: > I have written a patch that exposes to a sysctl the ticks spent by each CPU executing guest code under bhyve. > > This new feature differs from the existing vmm_stats code in that the existing code expresses per-vm information on a per-virtual-cpu basis. This new patch provides a per-physical-cpu counter of the aggregate number of ticks dedicated to executing guest-mode code since the vmm.ko module was loaded. Following the example of kern.cp_times, it is expressed as a new sysctl ("hw.vmm.stat.guest_ticks") rather than a system call, but I am not particularly attached to that. > > The diffs may be seen here: > https://github.com/freebsd/freebsd/compare/master...RobCrowston:vmm-host-stats > > I am looking for comments. If the general idea meets with this list's approval, I will submit it to phabricator. > > The new data are intended to be used by utilities like htop. To that end, I have written a separate patch for htop that colours the CPU bars to express the time spent for guest execution. After re-compiling htop, enable it with F2 ("Setup") -> "Display Options" -> "Detailed CPU time (System/IO-Wait/Hard-IRQ/Soft-IRQ/Steal/Guest)". Presently, htop only supports this feature for Linux hosts. If the above patch is accepted, I will submit the following patch to htop separately: > https://github.com/hishamhm/htop/compare/master...RobCrowston:freebsd-vmm-counter-1 I'm worried about the security implications of this. It is likely to expose a side channel attack on the guest machines from a normal user on the host if these cpu cycle counters are exposed to all users, which is the default. The counters should be restricted on who has access to them, and only allowing root, or the owner of the guest vmm to access them. -- John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not." From owner-freebsd-virtualization@freebsd.org Thu Jan 2 22:37:38 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BE0741DD3ED for ; Thu, 2 Jan 2020 22:37:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47pjbQ4jHbz43xw for ; Thu, 2 Jan 2020 22:37:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 9FB5F1DD3EB; Thu, 2 Jan 2020 22:37:38 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9F79F1DD3EA for ; Thu, 2 Jan 2020 22:37:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47pjbQ3qzbz43xv for ; Thu, 2 Jan 2020 22:37:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 7EE8122812 for ; Thu, 2 Jan 2020 22:37:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 002MbcCM052581 for ; Thu, 2 Jan 2020 22:37:38 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 002MbcaR052580 for virtualization@FreeBSD.org; Thu, 2 Jan 2020 22:37:38 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 242724] bhyve: Unkillable processes stuck in 'STOP' state (vmm::vm_handle_suspend()) Date: Thu, 02 Jan 2020 22:37:38 +0000 X-Bugzilla-Reason: AssignedTo CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Jan 2020 22:37:38 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242724 --- Comment #10 from commit-hook@freebsd.org --- A commit references this bug: Author: kib Date: Thu Jan 2 22:37:05 UTC 2020 New revision: 356296 URL: https://svnweb.freebsd.org/changeset/base/356296 Log: bhyve: terminate waiting loops if thread suspension is requested. PR: 242724 Reviewed by: markj Reported and tested by: Aleksandr Fedorov (previous version) Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D22881 Changes: head/sys/amd64/include/vmm.h head/sys/amd64/vmm/io/vioapic.c head/sys/amd64/vmm/vmm.c head/sys/amd64/vmm/vmm_dev.c --=20 You are receiving this mail because: You are the assignee for the bug. You are on the CC list for the bug.= From owner-freebsd-virtualization@freebsd.org Fri Jan 3 00:56:16 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B85DA1E1766 for ; Fri, 3 Jan 2020 00:56:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 47pmgN4YM5z4Dwq for ; Fri, 3 Jan 2020 00:56:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 9C19B1E1765; Fri, 3 Jan 2020 00:56:16 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9BE0B1E1764 for ; Fri, 3 Jan 2020 00:56:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47pmgN3fMSz4Dwn for ; Fri, 3 Jan 2020 00:56:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 78A0424255 for ; Fri, 3 Jan 2020 00:56:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0030uG1F038952 for ; Fri, 3 Jan 2020 00:56:16 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0030uGkX038945 for virtualization@FreeBSD.org; Fri, 3 Jan 2020 00:56:16 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 236922] Virtio fails as QEMU-KVM guest with Q35 chipset on Ubuntu 18.04.2 LTS Date: Fri, 03 Jan 2020 00:56:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-RELEASE X-Bugzilla-Keywords: needs-qa X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: matt@snowtrek.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Jan 2020 00:56:16 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D236922 MattS changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |matt@snowtrek.org --- Comment #17 from MattS --- Is there any way to work around this? I'm stuck on 11.2 due to this issue. --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Fri Jan 3 19:08:50 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 20E681DC472 for ; Fri, 3 Jan 2020 19:08:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 47qDw206lNz4Dkh for ; Fri, 3 Jan 2020 19:08:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 01D701DC471; Fri, 3 Jan 2020 19:08:50 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0190D1DC470 for ; Fri, 3 Jan 2020 19:08:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47qDw16Dwqz4Dkg for ; Fri, 3 Jan 2020 19:08:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CC11EBB0 for ; Fri, 3 Jan 2020 19:08:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 003J8nx0024842 for ; Fri, 3 Jan 2020 19:08:49 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 003J8nW8024841 for virtualization@FreeBSD.org; Fri, 3 Jan 2020 19:08:49 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 243063] [bhyve] nvme timeouts Date: Fri, 03 Jan 2020 19:08:49 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: 12.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: iron.udjin@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Jan 2020 19:08:50 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D243063 Bug ID: 243063 Summary: [bhyve] nvme timeouts Product: Base System Version: 12.1-STABLE Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: bhyve Assignee: virtualization@FreeBSD.org Reporter: iron.udjin@gmail.com Hello, OS: 12.1-STABLE r356314 I've got two different servers with with NVME disks. First one has VM with Centos 7, second has VM with debian 10. Both Vms use disk0_type=3D"nvme". F= rom time to time disk subsystem in VMs freezes and I see in dmesg: Centos 7: Dec 31 13:26:28 localhost kernel: nvme nvme0: I/O 676 QID 4 timeout, aborti= ng Dec 31 13:26:58 localhost kernel: nvme nvme0: I/O 676 QID 4 timeout, reset controller Debian 10: Jan 3 19:43:46 localhost kernel: [ 472.062677] nvme nvme0: I/O 363 QID 1 timeout, completion polled Jan 3 20:24:38 localhost kernel: [ 2925.514461] nvme nvme0: I/O 545 QID 3 timeout, completion polled Jan 3 20:28:40 localhost kernel: [ 3167.351351] nvme nvme0: I/O 1012 QID 2 timeout, completion polled ...and nothing in logs or dmesg of host systems. Why does it happen and how can be fixed? Thank you! --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Sat Jan 4 02:29:49 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2945F1DCCBF for ; Sat, 4 Jan 2020 02:29:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 47qQhs0McRz4fLP for ; Sat, 4 Jan 2020 02:29:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 0C81D1DCCBE; Sat, 4 Jan 2020 02:29:49 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0C47D1DCCBD for ; Sat, 4 Jan 2020 02:29:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47qQhr6fMGz4fLN for ; Sat, 4 Jan 2020 02:29:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DFB6A5F4E for ; Sat, 4 Jan 2020 02:29:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0042TmZQ099185 for ; Sat, 4 Jan 2020 02:29:48 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0042TmCf099180 for virtualization@FreeBSD.org; Sat, 4 Jan 2020 02:29:48 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 241774] FreeBSD 11.3 & 12.0 has broken SCSI & Networking on KVM/QEMU Q35 with OVMF Date: Sat, 04 Jan 2020 02:29:47 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.3-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: matt@snowtrek.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 04 Jan 2020 02:29:49 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D241774 --- Comment #7 from MattS --- John, Have you made any progress? I'll add that my motherboard has 2 NICs and I passed through the I219-V (em driver), and have the same issue as the emulated e1000 NIC. 11.2 works fine, NIC not detected on 11.3+ --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-virtualization@freebsd.org Sat Jan 4 10:22:51 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 431CB1D8B9A for ; Sat, 4 Jan 2020 10:22:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47qdBg17Z7z45wQ for ; Sat, 4 Jan 2020 10:22:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 26E0E1D8B99; Sat, 4 Jan 2020 10:22:51 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 26A901D8B98 for ; Sat, 4 Jan 2020 10:22:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47qdBg0C12z45wP for ; Sat, 4 Jan 2020 10:22:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0262CB7CB for ; Sat, 4 Jan 2020 10:22:51 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 004AMo8u025319 for ; Sat, 4 Jan 2020 10:22:50 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 004AMoJJ025309 for virtualization@FreeBSD.org; Sat, 4 Jan 2020 10:22:50 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 230580] sysutils/vm-bhyve: Add support for guest memory wiring Date: Sat, 04 Jan 2020 10:22:50 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: feature, needs-patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: vas@sibptus.ru X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 04 Jan 2020 10:22:51 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230580 --- Comment #5 from Victor Sudakov --- With the wired_memory guest configuration option vm-bhyve-1.3.0 I think we= can close the PR. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-virtualization@freebsd.org Sat Jan 4 10:23:06 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7243A1D8BFB for ; Sat, 4 Jan 2020 10:23:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47qdBy2BWsz460P for ; Sat, 4 Jan 2020 10:23:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 4961A1D8BFA; Sat, 4 Jan 2020 10:23:06 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 47E941D8BF8 for ; Sat, 4 Jan 2020 10:23:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47qdBx6pJXz460K for ; Sat, 4 Jan 2020 10:23:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E430BB7CC for ; Sat, 4 Jan 2020 10:23:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 004AN58v039239 for ; Sat, 4 Jan 2020 10:23:05 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 004AN5Sb039220 for virtualization@FreeBSD.org; Sat, 4 Jan 2020 10:23:05 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 230580] sysutils/vm-bhyve: Add support for guest memory wiring Date: Sat, 04 Jan 2020 10:23:06 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: feature, needs-patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: vas@sibptus.ru X-Bugzilla-Status: Closed X-Bugzilla-Resolution: Overcome By Events X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_status resolution Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 04 Jan 2020 10:23:06 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230580 Victor Sudakov changed: What |Removed |Added ---------------------------------------------------------------------------- Status|Open |Closed Resolution|--- |Overcome By Events --=20 You are receiving this mail because: You are on the CC list for the bug.=