diff mbox

kvm-84 + virtio Ubuntu Hardy guests

Message ID d9c105ea0904060955q799e52ffvb7ee45fb3cde5695@mail.gmail.com (mailing list archive)
State Not Applicable
Headers show

Commit Message

Dustin Kirkland April 6, 2009, 4:55 p.m. UTC
On Tue, Mar 31, 2009 at 5:28 PM, Dustin Kirkland <kirkland@canonical.com> wrote:
> I'm receiving a heavy volume of Ubuntu Jaunty Beta users reporting
> that Jaunty hosts running kvm-84 (userspace and kernel) are not able
> to boot previously-working Hardy guests (2.6.24 kernel) if virtio
> networking is enabled [1].  Users report that if e1000 is used
> instead, the guest is able to boot (with degraded network performance,
> obviously).  Users are also reporting that this was not a problem when
> kvm-82 was used in Jaunty (though we also merged libvirt 0.5.1 up to
> 0.6.0 in roughly the same timeframe).
...
> [1] https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/331128

Howdy-

Just a follow-up...

Anthony was able to confirm this issue, and create a patch for KVM,
which we're carrying in Ubuntu.  It's a bit of a special-case hack,
but I'm dropping it here for the sake of completeness.

Basically, Hardy guests do not have working GSO (general segment
offload) support.  Some changes in kvm/libvirt appear to be exposing
this, and breaking some guests when running virtio.

This patch from Anthony basically disables this support in KVM
userspace (until we have a better solution for auto-detecting GSO
support or lack thereof).

:-Dustin

Work around broken virtio drivers in 2.6.26

Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>

     if (tap_has_vnet_hdr(n->vc->vlan->first_client)) {
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Comments

Mark McLoughlin April 6, 2009, 5:43 p.m. UTC | #1
On Mon, 2009-04-06 at 09:55 -0700, Dustin Kirkland wrote:
> On Tue, Mar 31, 2009 at 5:28 PM, Dustin Kirkland <kirkland@canonical.com> wrote:
> > I'm receiving a heavy volume of Ubuntu Jaunty Beta users reporting
> > that Jaunty hosts running kvm-84 (userspace and kernel) are not able
> > to boot previously-working Hardy guests (2.6.24 kernel) if virtio
> > networking is enabled [1].  Users report that if e1000 is used
> > instead, the guest is able to boot (with degraded network performance,
> > obviously).  Users are also reporting that this was not a problem when
> > kvm-82 was used in Jaunty (though we also merged libvirt 0.5.1 up to
> > 0.6.0 in roughly the same timeframe).
> ...
> > [1] https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/331128
> 
> Howdy-
> 
> Just a follow-up...
> 
> Anthony was able to confirm this issue, and create a patch for KVM,
> which we're carrying in Ubuntu.  It's a bit of a special-case hack,
> but I'm dropping it here for the sake of completeness.
> 
> Basically, Hardy guests do not have working GSO (general segment
> offload) support.  Some changes in kvm/libvirt appear to be exposing
> this, and breaking some guests when running virtio.
> 
> This patch from Anthony basically disables this support in KVM
> userspace (until we have a better solution for auto-detecting GSO
> support or lack thereof).

The problem here is that 2.6.24/5 vintage guests are saying they support
something they don't. See this for further details:

http://lists.gnu.org/archive/html/qemu-devel/2009-01/msg00574.html

Cheers,
Mark.

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Dustin Kirkland April 6, 2009, 6:08 p.m. UTC | #2
On Mon, 2009-04-06 at 18:43 +0100, Mark McLoughlin wrote:
> The problem here is that 2.6.24/5 vintage guests are saying they
> support
> something they don't. See this for further details:
> 
> http://lists.gnu.org/archive/html/qemu-devel/2009-01/msg00574.html

Agreed, understood.  And those kernels should be patched.

However, it's a bit of a chicken/egg problem...  One can't even boot
those guests (with virtio) to update the kernel, as it panics on boot
(without the kvm hack).


:-Dustin

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Anthony Liguori April 6, 2009, 11:02 p.m. UTC | #3
Dustin Kirkland wrote:
> On Mon, 2009-04-06 at 18:43 +0100, Mark McLoughlin wrote:
>   
>> The problem here is that 2.6.24/5 vintage guests are saying they
>> support
>> something they don't. See this for further details:
>>
>> http://lists.gnu.org/archive/html/qemu-devel/2009-01/msg00574.html
>>     
>
> Agreed, understood.  And those kernels should be patched.
>
> However, it's a bit of a chicken/egg problem...  One can't even boot
> those guests (with virtio) to update the kernel, as it panics on boot
> (without the kvm hack).
>   

There's now a fix for this in QEMU stable.  It'll make it's way to 
kvm-userspace once Avi merges.

Regards,

Anthony Liguori
> :-Dustin
>
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>   

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/qemu/hw/virtio-net.c b/qemu/hw/virtio-net.c
index 9bce3a0..5b615f9 100644
--- a/qemu/hw/virtio-net.c
+++ b/qemu/hw/virtio-net.c
@@ -120,6 +120,9 @@  static uint32_t virtio_net_get_features(VirtIODevice *vdev)

     if (tap_has_vnet_hdr(host)) {
         tap_using_vnet_hdr(host, 1);
+#if 0
+        /* Stop advertising advanced features until we work around the fact
+         * that this is totally broken in 2.6.26 kernels */
         features |= (1 << VIRTIO_NET_F_CSUM);
         features |= (1 << VIRTIO_NET_F_GUEST_CSUM);
         features |= (1 << VIRTIO_NET_F_GUEST_TSO4);
@@ -130,6 +133,7 @@  static uint32_t virtio_net_get_features(VirtIODevice *vdev)
         features |= (1 << VIRTIO_NET_F_HOST_ECN);
         features |= (1 << VIRTIO_NET_F_MRG_RXBUF);
         /* Kernel can't actually handle UFO in software currently. */
+#endif
     }
 #endif

@@ -374,8 +378,14 @@  static int receive_header(VirtIONet *n, struct
iovec *iov, int iovcnt,
     struct virtio_net_hdr *hdr = iov[0].iov_base;
     int offset = 0;

+#if 0
     hdr->flags = 0;
     hdr->gso_type = VIRTIO_NET_HDR_GSO_NONE;
+#else
+    /* we need to clear out the whole header, including any garbage that may be
+     */
+    memset(hdr, 0, sizeof(*hdr));
+#endif

 #ifdef TAP_VNET_HDR