You can subscribe to this list here.
2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(2) |
Nov
(1) |
Dec
|
---|---|---|---|---|---|---|---|---|---|---|---|---|
2003 |
Jan
|
Feb
|
Mar
(1) |
Apr
(9) |
May
(3) |
Jun
|
Jul
(3) |
Aug
(6) |
Sep
|
Oct
(7) |
Nov
|
Dec
|
2004 |
Jan
|
Feb
(5) |
Mar
(10) |
Apr
(2) |
May
(22) |
Jun
(8) |
Jul
(4) |
Aug
(8) |
Sep
(3) |
Oct
|
Nov
(36) |
Dec
(52) |
2005 |
Jan
(9) |
Feb
(13) |
Mar
(9) |
Apr
|
May
(14) |
Jun
(5) |
Jul
(20) |
Aug
(31) |
Sep
(2) |
Oct
(3) |
Nov
(18) |
Dec
(18) |
2006 |
Jan
(36) |
Feb
(16) |
Mar
(76) |
Apr
(78) |
May
(32) |
Jun
(30) |
Jul
(67) |
Aug
(43) |
Sep
(54) |
Oct
(116) |
Nov
(223) |
Dec
(158) |
2007 |
Jan
(180) |
Feb
(71) |
Mar
(110) |
Apr
(114) |
May
(203) |
Jun
(100) |
Jul
(238) |
Aug
(191) |
Sep
(177) |
Oct
(171) |
Nov
(211) |
Dec
(159) |
2008 |
Jan
(227) |
Feb
(288) |
Mar
(197) |
Apr
(253) |
May
(132) |
Jun
(152) |
Jul
(109) |
Aug
(143) |
Sep
(157) |
Oct
(198) |
Nov
(121) |
Dec
(147) |
2009 |
Jan
(105) |
Feb
(61) |
Mar
(191) |
Apr
(161) |
May
(118) |
Jun
(172) |
Jul
(166) |
Aug
(67) |
Sep
(86) |
Oct
(79) |
Nov
(118) |
Dec
(181) |
2010 |
Jan
(136) |
Feb
(154) |
Mar
(92) |
Apr
(83) |
May
(101) |
Jun
(66) |
Jul
(118) |
Aug
(78) |
Sep
(134) |
Oct
(131) |
Nov
(132) |
Dec
(104) |
2011 |
Jan
(79) |
Feb
(104) |
Mar
(144) |
Apr
(145) |
May
(130) |
Jun
(169) |
Jul
(146) |
Aug
(76) |
Sep
(113) |
Oct
(82) |
Nov
(145) |
Dec
(122) |
2012 |
Jan
(132) |
Feb
(106) |
Mar
(145) |
Apr
(238) |
May
(140) |
Jun
(162) |
Jul
(166) |
Aug
(147) |
Sep
(80) |
Oct
(148) |
Nov
(192) |
Dec
(90) |
2013 |
Jan
(139) |
Feb
(162) |
Mar
(174) |
Apr
(81) |
May
(261) |
Jun
(301) |
Jul
(106) |
Aug
(175) |
Sep
(305) |
Oct
(222) |
Nov
(95) |
Dec
(120) |
2014 |
Jan
(196) |
Feb
(171) |
Mar
(146) |
Apr
(118) |
May
(127) |
Jun
(93) |
Jul
(175) |
Aug
(66) |
Sep
(85) |
Oct
(120) |
Nov
(81) |
Dec
(192) |
2015 |
Jan
(141) |
Feb
(133) |
Mar
(189) |
Apr
(126) |
May
(59) |
Jun
(117) |
Jul
(56) |
Aug
(97) |
Sep
(44) |
Oct
(48) |
Nov
(33) |
Dec
(87) |
2016 |
Jan
(37) |
Feb
(56) |
Mar
(72) |
Apr
(65) |
May
(66) |
Jun
(65) |
Jul
(98) |
Aug
(54) |
Sep
(84) |
Oct
(68) |
Nov
(69) |
Dec
(60) |
2017 |
Jan
(30) |
Feb
(38) |
Mar
(53) |
Apr
(6) |
May
(2) |
Jun
(5) |
Jul
(15) |
Aug
(15) |
Sep
(7) |
Oct
(18) |
Nov
(23) |
Dec
(6) |
2018 |
Jan
(39) |
Feb
(5) |
Mar
(34) |
Apr
(26) |
May
(27) |
Jun
(5) |
Jul
(12) |
Aug
(4) |
Sep
|
Oct
(4) |
Nov
(4) |
Dec
(4) |
2019 |
Jan
(7) |
Feb
(10) |
Mar
(21) |
Apr
(26) |
May
(4) |
Jun
(5) |
Jul
(11) |
Aug
(6) |
Sep
(7) |
Oct
(13) |
Nov
(3) |
Dec
(17) |
2020 |
Jan
|
Feb
(3) |
Mar
(3) |
Apr
(5) |
May
(2) |
Jun
(5) |
Jul
|
Aug
|
Sep
(6) |
Oct
(7) |
Nov
(2) |
Dec
(7) |
2021 |
Jan
(9) |
Feb
(10) |
Mar
(18) |
Apr
(1) |
May
(3) |
Jun
|
Jul
(16) |
Aug
(2) |
Sep
|
Oct
|
Nov
(9) |
Dec
(2) |
2022 |
Jan
(3) |
Feb
|
Mar
(9) |
Apr
(8) |
May
(5) |
Jun
(6) |
Jul
(1) |
Aug
|
Sep
(1) |
Oct
|
Nov
(7) |
Dec
(2) |
2023 |
Jan
(7) |
Feb
(2) |
Mar
(6) |
Apr
|
May
(4) |
Jun
(2) |
Jul
(4) |
Aug
(3) |
Sep
(4) |
Oct
(2) |
Nov
(4) |
Dec
(10) |
2024 |
Jan
(4) |
Feb
(2) |
Mar
(1) |
Apr
|
May
(1) |
Jun
(1) |
Jul
|
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
|
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
|
|
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
11
|
12
|
13
(2) |
14
|
15
|
16
|
17
|
18
|
19
|
20
|
21
(1) |
22
(1) |
23
|
24
|
25
|
26
|
27
|
28
|
29
|
30
|
31
|
|
From: <lso...@cs...> - 2019-05-22 14:55:53
|
On Tue, May 21, 2019 at 04:22:17PM -0700, Alexander Duyck wrote: > So we are either using 0 bits of the LUT or we are just not performing > hashing because this is somehow being parsed into a type that doesn't > support it. > > I have attached 2 more patches we can test. The first enables hashing > on what are called "OAM" packets, The thing is we shouldn't be > identifying these packets as "OAM", Operations Administration & > Management, as normally it would have to be recognized as a tunnel > first and then have a specific flag set in either the GENEVE or > VXLAN-GPE header. The second patch will dump the contents of the > HREGION registers. They should all be 0, however I thought it best to > dump the contents and verify that since I know that these registers > can be used to change the traffic class of a given packet type and if > we are encountering that it might be moving it to an uninitialized TC > which would be using queue offset 0 with 0 bits of the LUT. > > These last 2 patches would pretty much eliminate the entire RSS > subsystem. If we don't see HREGION values set and the OAM flags have > no effect I can only assume there is something going on with the > parser in the NIC since it isn't recognizing the packet type. > > Thanks. > > - Alex OK I applied those two patches and get this: i40e: Intel(R) Ethernet Connection XL710 Network Driver - version 2.1.7-k i40e: Copyright (c) 2013 - 2014 Intel Corporation. i40e 0000:3d:00.0: fw 3.10.52896 api 1.6 nvm 4.00 0x80001577 1.1767.0 i40e 0000:3d:00.0: The driver for the device detected a newer version of the NVM image than expected. Please install the most recent version of the network driver. i40e 0000:3d:00.0: MAC address: a4:bf:01:4e:0c:87 i40e 0000:3d:00.0: PFQF_HREGION[7]: 0x00000000 i40e 0000:3d:00.0: PFQF_HREGION[6]: 0x00000000 i40e 0000:3d:00.0: PFQF_HREGION[5]: 0x00000000 i40e 0000:3d:00.0: PFQF_HREGION[4]: 0x00000000 i40e 0000:3d:00.0: PFQF_HREGION[3]: 0x00000000 i40e 0000:3d:00.0: PFQF_HREGION[2]: 0x00000000 i40e 0000:3d:00.0: PFQF_HREGION[1]: 0x00000000 i40e 0000:3d:00.0: PFQF_HREGION[0]: 0x00000000 i40e 0000:3d:00.0: flow_type: 63 input_mask:0x0000000000004000 i40e 0000:3d:00.0: flow_type: 46 input_mask:0x0007fff800000000 i40e 0000:3d:00.0: flow_type: 45 input_mask:0x0007fff800000000 i40e 0000:3d:00.0: flow_type: 44 input_mask:0x0007ffff80000000 i40e 0000:3d:00.0: flow_type: 43 input_mask:0x0007fffe00000000 i40e 0000:3d:00.0: flow_type: 42 input_mask:0x0007fffe00000000 i40e 0000:3d:00.0: flow_type: 41 input_mask:0x0007fffe00000000 i40e 0000:3d:00.0: flow_type: 40 input_mask:0x0007fffe00000000 i40e 0000:3d:00.0: flow_type: 39 input_mask:0x0007fffe00000000 i40e 0000:3d:00.0: flow_type: 36 input_mask:0x0006060000000000 i40e 0000:3d:00.0: flow_type: 35 input_mask:0x0006060000000000 i40e 0000:3d:00.0: flow_type: 34 input_mask:0x0006060780000000 i40e 0000:3d:00.0: flow_type: 33 input_mask:0x0006060600000000 i40e 0000:3d:00.0: flow_type: 32 input_mask:0x0006060600000000 i40e 0000:3d:00.0: flow_type: 31 input_mask:0x0006060600000000 i40e 0000:3d:00.0: flow_type: 30 input_mask:0x0006060600000000 i40e 0000:3d:00.0: flow_type: 29 input_mask:0x0006060600000000 i40e 0000:3d:00.0: flow_type: 27 input_mask:0x00000000002c0000 i40e 0000:3d:00.0: flow_type: 26 input_mask:0x00000000002c0000 i40e 0000:3d:00.0: flow type: 36 update input mask from:0x0006060000000000, to:0x0001801800000000 i40e 0000:3d:00.0: flow type: 35 update input mask from:0x0006060000000000, to:0x0001801800000000 i40e 0000:3d:00.0: flow type: 34 update input mask from:0x0006060780000000, to:0x0001801f80000000 i40e 0000:3d:00.0: flow type: 33 update input mask from:0x0006060600000000, to:0x0001801e00000000 i40e 0000:3d:00.0: flow type: 32 update input mask from:0x0006060600000000, to:0x0001801e00000000 i40e 0000:3d:00.0: flow type: 31 update input mask from:0x0006060600000000, to:0x0001801e00000000 i40e 0000:3d:00.0: flow type: 30 update input mask from:0x0006060600000000, to:0x0001801e00000000 i40e 0000:3d:00.0: flow type: 29 update input mask from:0x0006060600000000, to:0x0001801e00000000 So seems the regions are all 0. All ipsec packets still hitting queue 0. -- Len Sorensen |
From: Alexander D. <ale...@gm...> - 2019-05-21 23:22:48
|
On Tue, May 21, 2019 at 10:55 AM Lennart Sorensen <lso...@cs...> wrote: > > On Tue, May 21, 2019 at 09:51:33AM -0700, Alexander Duyck wrote: > > I think we need to narrow this down a bit more. Let's try forcing the > > lookup table all to one value and see if traffic is still going to > > queue 0. > > > > Specifically what we need to is run the following command to try and > > force all RSS traffic to queue 8, you can verify the result with > > "ethtool -x": > > ethtool -X <iface> weight 0 0 0 0 0 0 0 0 1 > > > > If that works and the IPSec traffic goes to queue 8 then we are likely > > looking at some sort of input issue, either in the parsing or the > > population of things like the input mask that we can then debug > > further. > > > > If traffic still goes to queue 0 then that tells us the output of the > > RSS hash and lookup table are being ignored, this would imply either > > some other filter is rerouting the traffic or is directing us to limit > > the queue index to 0 bits. > > # ethtool -x eth2 > RX flow hash indirection table for eth2 with 12 RX ring(s): > 0: 7 7 7 7 7 7 7 7 > 8: 7 7 7 7 7 7 7 7 > 16: 7 7 7 7 7 7 7 7 > 24: 7 7 7 7 7 7 7 7 > 32: 7 7 7 7 7 7 7 7 > ... > 472: 7 7 7 7 7 7 7 7 > 480: 7 7 7 7 7 7 7 7 > 488: 7 7 7 7 7 7 7 7 > 496: 7 7 7 7 7 7 7 7 > 504: 7 7 7 7 7 7 7 7 > RSS hash key: > 0b:1f:ae:ed:60:04:7d:e5:8a:2b:43:3f:1d:ee:6c:99:89:29:94:b0:25:db:c7:4b:fa:da:4d:3f:e8:cc:bc:00:ad:32:01:d6:1c:30:3f:f8:79:3e:f4:48:04:1f:51:d2:5a:39:f0:90 > root@ECA:~# ethtool --show-priv-flags eth2 > Private flags for eth2: > MFP : off > LinkPolling : off > flow-director-atr: off > veb-stats : off > hw-atr-eviction : on > legacy-rx : off > > All ipsec packets are still hitting queue 0. > > Seems it is completely ignoring RSS for these packets. That is > impressively weird. > > -- > Len Sorensen So we are either using 0 bits of the LUT or we are just not performing hashing because this is somehow being parsed into a type that doesn't support it. I have attached 2 more patches we can test. The first enables hashing on what are called "OAM" packets, The thing is we shouldn't be identifying these packets as "OAM", Operations Administration & Management, as normally it would have to be recognized as a tunnel first and then have a specific flag set in either the GENEVE or VXLAN-GPE header. The second patch will dump the contents of the HREGION registers. They should all be 0, however I thought it best to dump the contents and verify that since I know that these registers can be used to change the traffic class of a given packet type and if we are encountering that it might be moving it to an uninitialized TC which would be using queue offset 0 with 0 bits of the LUT. These last 2 patches would pretty much eliminate the entire RSS subsystem. If we don't see HREGION values set and the OAM flags have no effect I can only assume there is something going on with the parser in the NIC since it isn't recognizing the packet type. Thanks. - Alex |
From: Jesse B. <jes...@in...> - 2019-05-13 17:53:28
|
On Mon, 13 May 2019 07:36:41 +0000 Periyasamy wrote: > Hi, > > I’m trying to achieve PF passthrough of 40/10G ethernet interface (i40e) into guest VM running on qemu/kvm hypervisor and then create VFs on the PF inside the VM. > This is to have a flexibility and better manageability of VFs inside the VM (for example, kubernetes worker node) itself and not on the host. > > > The ethernet PCI device is seen inside the VM and bound to i40e driver. But I don’t see an option to create VFs. i.e. sriov_numvfs file is not seen under /sys/devices/pci0000:00/0000:00:02.1/0000:02:00.0 directory. Hi Periyasamy, The PCI space itself is not passed-through, it is completely fake and generated by QEMU. Do you know if anyone has ever gotten what you're trying to do to work? I don't think you can do what you're trying to do with using a VM to spawn SR-IOV devices, at least I've not heard of it working. Basically you have a scoping problem. At it's core, the PCI space is owned by the host, not the VM, and the hardware is literally in the host PCI device space no matter where you pass it to. The hardware actually creates (starts decoding addresses and PCI space for) the new PCI devices when you enable the device via sriov_numvfs. Those devices will appear in space reserved by the host, for SR-IOV devices to "appear", but there is no guarantee that memory range will be passed through to the VF, and again all the VM PCI devices are "fake" PCI config space, so without some daemon monitoring and adding the devices via virsh or something, I doubt the VM would ever see them even. > Host versions: > OS: Ubuntu 16.04.5 LTS, Kernel: 4.15.0-48-generic, libvirt: 4.0.0, qemu: 2.11.1 > i40e version: 2.1.14-k, firmware-version: 6.01 0x800034a3 1.1747.0 > > Guest versions: > OS: CentOS 7 (Core) Kernel: 3.10.0-862.14.4.el7.x86_64 > i40e version: 2.1.14-k, firmware-version: 6.01 0x800034a3 1.1747.0 > > The VM libvirt xml configuration [1], PF configuration at host [2], PF configuration at VM [3] are attached. > The lspci output line nos. 63-75 related to SRIOV Capabilities in host [2] are missing in VM which looks bit weird. as per above, the PCI config space is completely virtualized by QEMU. Hope this helps! Jesse |
From: Periyasamy P. <per...@er...> - 2019-05-13 07:36:52
|
Hi, I’m trying to achieve PF passthrough of 40/10G ethernet interface (i40e) into guest VM running on qemu/kvm hypervisor and then create VFs on the PF inside the VM. This is to have a flexibility and better manageability of VFs inside the VM (for example, kubernetes worker node) itself and not on the host. The ethernet PCI device is seen inside the VM and bound to i40e driver. But I don’t see an option to create VFs. i.e. sriov_numvfs file is not seen under /sys/devices/pci0000:00/0000:00:02.1/0000:02:00.0 directory. Host versions: OS: Ubuntu 16.04.5 LTS, Kernel: 4.15.0-48-generic, libvirt: 4.0.0, qemu: 2.11.1 i40e version: 2.1.14-k, firmware-version: 6.01 0x800034a3 1.1747.0 Guest versions: OS: CentOS 7 (Core) Kernel: 3.10.0-862.14.4.el7.x86_64 i40e version: 2.1.14-k, firmware-version: 6.01 0x800034a3 1.1747.0 The VM libvirt xml configuration [1], PF configuration at host [2], PF configuration at VM [3] are attached. The lspci output line nos. 63-75 related to SRIOV Capabilities in host [2] are missing in VM which looks bit weird. Could you please look into it and let us know what’s going wrong ? [1] https://pastebin.ubuntu.com/p/wrDB6T68r3/ [2] https://pastebin.ubuntu.com/p/PW7Z4SxQPt/ [3] https://pastebin.ubuntu.com/p/JcmpMY48D6/ Thanks, Periyasamy |