From owner-freebsd-virtualization@freebsd.org Mon Jan 13 17:27:45 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 904761E4075 for ; Mon, 13 Jan 2020 17:27:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 47xLBn3NFWz3K5m for ; Mon, 13 Jan 2020 17:27:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 73DF91E4073; Mon, 13 Jan 2020 17:27:45 +0000 (UTC) Delivered-To: virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 73A241E4072 for ; Mon, 13 Jan 2020 17:27:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47xLBn2Yjgz3K5k for ; Mon, 13 Jan 2020 17:27:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3959381AC for ; Mon, 13 Jan 2020 17:27:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 00DHRj1V019744 for ; Mon, 13 Jan 2020 17:27:45 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 00DHRjd5019743 for virtualization@FreeBSD.org; Mon, 13 Jan 2020 17:27:45 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 241774] FreeBSD 11.3 & 12.0 has broken SCSI & Networking on KVM/QEMU Q35 with OVMF Date: Mon, 13 Jan 2020 17:27:45 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.3-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: drum@graphica.com.au X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 13 Jan 2020 17:27:45 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D241774 --- Comment #48 from John Hartley --- (In reply to Dobri Dobrev from comment #47) Hi Dobri, by way of testing I am doing: 1. Build 12.0-RELEASE with "dev netmap" commented out of GENERIC kernel to = get network access on any of em, vmx or re . You have to keep the kernel with GENERIC id as otherwise update in step 2 will fail. If you are on 12.0 then= I assume you must have SATA disk as Virto and SCSI will not work. 2. Use "freebsd-update" (freebsd-update -r 9.1-RELEASE upgrade) to do upgra= de from 12.0-RELEASE to 12.1-RELEASE. This will require two reboots via to "free-update" steps (both /usr/sbin/freebsd-update install). 3. Build 12.1-RELEASE with "dev netmap" commented out of GENERIC kernel and then do final "freebsd-update" (/usr/sbin/freebsd-update install). 4. Do your Ports or Package updates using postmaster or other tools in usual way. You should now have working 12.1 and can apply VirtIO patch (again via kern= el rebuild) if you want to change from SATA to VirtIO based disk. At this point you should be able to start to use "freebsd-update" to and ot= her utilities to get binary security updates. In fullness of time bugs / patches for fix of VirtIO and netmap should flow through as either binary updates via "freebsd-update" or be part of new rel= ease (12.2). Right now I am testing process and have got to step 4 (it is slow as each kernel rebuild takes some time). Once I have done upgrade test from 12.0 -> 12.1 I will then try some approa= ch but starting from 11.2 and go to 12.1. Once on 12.1 I can test VirtIO fix without need to worry about trying to backport it 11.x . Both VirtIO and netmap are "performance optimisations". So the extent of ne= ed is driven by throughput requirements of your server. A while back I did upg= rade of quite a large number of FreeBSD VMs (from 8.x, 9.x & 10.x to 11.x) and at the time I was forced to change disk to SATA as SCSI (and VirtIO) was broken already at that stage. The final breaking of networking was what prompted me to raise this bug rep= ort, as I can live with SATA but I can't not have networking. So I believe you can get out of the "bind" without needing any of patches in the first instance. Cheers, John Hartley. --=20 You are receiving this mail because: You are the assignee for the bug.=