From owner-freebsd-bugs@freebsd.org Sun Dec 16 19:53:05 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 749431339184 for ; Sun, 16 Dec 2018 19:53:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 0E8EB948A2 for ; Sun, 16 Dec 2018 19:53:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id C70401339183; Sun, 16 Dec 2018 19:53:04 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8C47E1339182 for ; Sun, 16 Dec 2018 19:53:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 29E5F9489D for ; Sun, 16 Dec 2018 19:53:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 57B1A1E245 for ; Sun, 16 Dec 2018 19:53:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wBGJr30k054162 for ; Sun, 16 Dec 2018 19:53:03 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wBGJr363054161 for bugs@FreeBSD.org; Sun, 16 Dec 2018 19:53:03 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 234073] ixl: SR-IOV causes "Malicious Driver Detection event" when not all VFs are in passthrough mode Date: Sun, 16 Dec 2018 19:53:03 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ixbug@riseup.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Dec 2018 19:53:05 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D234073 Bug ID: 234073 Summary: ixl: SR-IOV causes "Malicious Driver Detection event" when not all VFs are in passthrough mode Product: Base System Version: 12.0-RELEASE Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: ixbug@riseup.net SR-IOV config to reproduce: (the important part is that not all VFs are 'passthrough: true') /etc/iov/ixl1.conf --------- PF { device : "ixl1"; num_vfs : 4; } DEFAULT { passthrough : true; } #VF for use by host VF-0 { passthrough : false; } --------- starting a bhyve VM causes the following errors and the host to loose netwo= rk connectivity: (it only happens if a VM is started) kernel: ixl1: Malicious Driver Detection event 1 on RX queue 776, pf number= 64 (PF-1), (VF-0) syslogd: last message repeated 352 times kernel: iavf0: ARQ Critical Error detected kernel: iavf0: ASQ Critical Error detected kernel: iavf0: WARNING: Stopping VF! kernel: iavf0: Unable to send opcode DISABLE_QUEUES to PF, ASQ is not alive kernel: iavf0: 2 timed out kernel: iavf0: Unable to send opcode RESET_VF to PF, ASQ is not alive kernel: ixl1: Malicious Driver Detection event 1 on RX queue 776, pf number= 64 (PF-1), (VF-0) syslogd: last message repeated 3797 times kernel: ixl1:=20 kernel: Malicious Driver Detection event 1 on RX queue 776, pf number 64 (PF-1), (VF-0) kernel: ixl1: Malicious Driver Detection event 1 on RX queue 776, pf number= 64 (PF-1), (VF-0) syslogd: last message repeated 835 times "nvmupdate -v" output: ----------- Intel(R) Ethernet NVM Update Tool NVMUpdate version 1.32.20.30 Copyright (C) 2013 - 2018 Intel Corporation. Version: QV SDK - 2.32.20.28 ixl - 2.1.0-k ----------- This problem does not occur when all VFs are in passthrough mode (and the h= ost does not use ixl1): example: /etc/iov/ixl1.conf --------- PF { device : "ixl1"; num_vfs : 4; } DEFAULT { passthrough : true; } --------- Intel NIC Model: X710-DA2 dev.ixl.1.fw_version: fw 6.0.48442 api 1.7 nvm 6.01 etid 800035cf oem 1.262= .0 --=20 You are receiving this mail because: You are the assignee for the bug.=