Re: kvm-84 + virtio Ubuntu Hardy guests

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Mar 31, 2009 at 5:28 PM, Dustin Kirkland <kirkland@xxxxxxxxxxxxx> wrote:
> I'm receiving a heavy volume of Ubuntu Jaunty Beta users reporting
> that Jaunty hosts running kvm-84 (userspace and kernel) are not able
> to boot previously-working Hardy guests (2.6.24 kernel) if virtio
> networking is enabled [1].  Users report that if e1000 is used
> instead, the guest is able to boot (with degraded network performance,
> obviously).  Users are also reporting that this was not a problem when
> kvm-82 was used in Jaunty (though we also merged libvirt 0.5.1 up to
> 0.6.0 in roughly the same timeframe).
...
> [1] https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/331128

Howdy-

Just a follow-up...

Anthony was able to confirm this issue, and create a patch for KVM,
which we're carrying in Ubuntu.  It's a bit of a special-case hack,
but I'm dropping it here for the sake of completeness.

Basically, Hardy guests do not have working GSO (general segment
offload) support.  Some changes in kvm/libvirt appear to be exposing
this, and breaking some guests when running virtio.

This patch from Anthony basically disables this support in KVM
userspace (until we have a better solution for auto-detecting GSO
support or lack thereof).

:-Dustin

Work around broken virtio drivers in 2.6.26

Signed-off-by: Anthony Liguori <aliguori@xxxxxxxxxx>

diff --git a/qemu/hw/virtio-net.c b/qemu/hw/virtio-net.c
index 9bce3a0..5b615f9 100644
--- a/qemu/hw/virtio-net.c
+++ b/qemu/hw/virtio-net.c
@@ -120,6 +120,9 @@ static uint32_t virtio_net_get_features(VirtIODevice *vdev)

     if (tap_has_vnet_hdr(host)) {
         tap_using_vnet_hdr(host, 1);
+#if 0
+        /* Stop advertising advanced features until we work around the fact
+         * that this is totally broken in 2.6.26 kernels */
         features |= (1 << VIRTIO_NET_F_CSUM);
         features |= (1 << VIRTIO_NET_F_GUEST_CSUM);
         features |= (1 << VIRTIO_NET_F_GUEST_TSO4);
@@ -130,6 +133,7 @@ static uint32_t virtio_net_get_features(VirtIODevice *vdev)
         features |= (1 << VIRTIO_NET_F_HOST_ECN);
         features |= (1 << VIRTIO_NET_F_MRG_RXBUF);
         /* Kernel can't actually handle UFO in software currently. */
+#endif
     }
 #endif

@@ -374,8 +378,14 @@ static int receive_header(VirtIONet *n, struct
iovec *iov, int iovcnt,
     struct virtio_net_hdr *hdr = iov[0].iov_base;
     int offset = 0;

+#if 0
     hdr->flags = 0;
     hdr->gso_type = VIRTIO_NET_HDR_GSO_NONE;
+#else
+    /* we need to clear out the whole header, including any garbage that may be
+     */
+    memset(hdr, 0, sizeof(*hdr));
+#endif

 #ifdef TAP_VNET_HDR
     if (tap_has_vnet_hdr(n->vc->vlan->first_client)) {
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux