qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] PCI passthrough of 40G ethernet interface (Openstack/KV


From: jacob jacob
Subject: Re: [Qemu-devel] PCI passthrough of 40G ethernet interface (Openstack/KVM)
Date: Fri, 13 Mar 2015 10:08:21 -0400

> So, it could be the i40e driver then ? Because IIUC, VFs use a separate
> driver. Just to rule out the possibility that there might be some driver 
> fixes that
> could help with this, it might be a good idea to try a 3.19 or later upstream
> kernel.
>

I tried with the latest DPDK release too (dpdk-1.8.0) and see the same issue.
As mentioned earlier, i do not see any issues at all when running
tests using either i40e or dpdk on the host itself.
This is the reason why i am suspecting if it is anything to do with KVM/libvirt.
Both with regular PCI passthrough and VF passthrough i see issues. It
is always pointing to some issue with packet transmission. Receive
seems to work ok.


On Thu, Mar 12, 2015 at 8:02 PM, Bandan Das <address@hidden> wrote:
> jacob jacob <address@hidden> writes:
>
>> On Thu, Mar 12, 2015 at 3:07 PM, Bandan Das <address@hidden> wrote:
>>> jacob jacob <address@hidden> writes:
>>>
>>>>  Hi,
>>>>
>>>>  Seeing failures when trying to do PCI passthrough of Intel XL710 40G
>>>> interface to KVM vm.
>>>>      0a:00.1 Ethernet controller: Intel Corporation Ethernet
>>>> Controller XL710 for 40GbE QSFP+ (rev 01)
>>>
>>> You are assigning the PF right ? Does assigning VFs work or it's
>>> the same behavior ?
>>
>> Yes.Assigning VFs worked ok.But this had other issues while bringing down 
>> VMs.
>> Interested in finding out if PCI passthrough of 40G intel XL710
>> interface is qualified in some specific kernel/kvm release.
>
> So, it could be the i40e driver then ? Because IIUC, VFs use a separate
> driver. Just to rule out the possibility that there might be some driver 
> fixes that
> could help with this, it might be a good idea to try a 3.19 or later upstream
> kernel.
>
>>>> From dmesg on host:
>>>>
>>>>> [80326.559674] kvm: zapping shadow pages for mmio generation wraparound
>>>>> [80327.271191] kvm [175994]: vcpu0 unhandled rdmsr: 0x1c9
>>>>> [80327.271689] kvm [175994]: vcpu0 unhandled rdmsr: 0x1a6
>>>>> [80327.272201] kvm [175994]: vcpu0 unhandled rdmsr: 0x1a7
>>>>> [80327.272681] kvm [175994]: vcpu0 unhandled rdmsr: 0x3f6
>>>>> [80327.376186] kvm [175994]: vcpu0 unhandled rdmsr: 0x606
>>>
>>> These are harmless and are related to unimplemented PMU msrs,
>>> not VFIO.
>>>
>>> Bandan
>> --
>> To unsubscribe from this list: send the line "unsubscribe kvm" in
>> the body of a message to address@hidden
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html



reply via email to

[Prev in Thread] Current Thread [Next in Thread]