Removed resolved issues from known issues section. Added new resolved issues to resolved issues section.
Signed-off-by: Siobhan Butler <siobhan.a.butler at intel.com> --- doc/guides/rel_notes/known_issues.rst | 225 ------------------------------- doc/guides/rel_notes/resolved_issues.rst | 171 +++++++++++++++++++++++ 2 files changed, 171 insertions(+), 225 deletions(-) diff --git a/doc/guides/rel_notes/known_issues.rst b/doc/guides/rel_notes/known_issues.rst index 64782bc..40e88db 100644 --- a/doc/guides/rel_notes/known_issues.rst +++ b/doc/guides/rel_notes/known_issues.rst @@ -62,147 +62,6 @@ Pause Frame Forwarding does not work properly on igb | | | +--------------------------------+--------------------------------------------------------------------------------------+ -Running TestPMD with SRIOV in Domain U may cause it to hang when XENVIRT switch is on -------------------------------------------------------------------------------------- - -+--------------------------------+--------------------------------------------------------------------------------------+ -| Title | Running TestPMD with SRIOV in Domain U may cause it to hang when XENVIRT switch is on| -| | | -+================================+======================================================================================+ -| Reference # | IXA00168949 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Description | When TestPMD is run with only SRIOV port ???./testpmd -c f -n 4 -- -i??? , the following | -| | error occurs: | -| | | -| | PMD: gntalloc: ioctl error | -| | | -| | EAL: Error - exiting with code: 1 | -| | | -| | Cause: Creation of mbuf pool for socket 0 failed | -| | | -| | Then, alternately run SRIOV port and virtIO with testpmd: | -| | | -| | testpmd -c f -n 4 -- -i | -| | | -| | testpmd -c f -n 4 --use-dev="eth_xenvirt0" -- -i | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Implication | DomU will not be accessible after you repeat this action some times | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Resolution/ Workaround | Run testpmd with a "--total-num-mbufs=N(N<=3500)" | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Affected Environment/ Platform | Fedora 16, 64 bits + Xen hypervisor 4.2.3 + Domain 0 kernel 3.10.0 | -| | +Domain U kernel 3.6.11 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Driver/Module | TestPMD Sample Application | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ - -Vhost-xen cannot detect Domain U application exit on Xen version 4.0.1 ----------------------------------------------------------------------- - -+--------------------------------+--------------------------------------------------------------------------------------+ -| Title | Vhost-xen cannot detect Domain U application exit on Xen 4.0.1. | -| | | -+================================+======================================================================================+ -| Reference # | IXA00168947 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Description | When using Intel?? DPDK applications on Xen 4.0.1, e.g. TestPMD Sample Application, | -| | on killing the application (e.g. killall testmd) vhost-switch cannot detect | -| | the domain U exited and does not free the Virtio device. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Implication | Virtio device not freed after application is killed when using vhost-switch on Xen | -| | 4.0.1 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Resolution | | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Affected Environment/ Platform | Xen 4.0.1 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Driver/Module | Vhost-switch | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ - -Virtio incorrect header length used if MSI-X is disabled by kernel driver -------------------------------------------------------------------------- - -+--------------------------------+--------------------------------------------------------------------------------------+ -| Title | Virtio incorrect header length used if MSI-X is disabled by kernel driver or | -| | if VIRTIO_NET_F_MAC is not negotiated. | -| | | -+================================+======================================================================================+ -| Reference # | IXA00384256 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Description | The Virtio header for host-guest communication is of variable length and | -| | is dependent on whether MSI-X has been enabled by the kernel driver for the network | -| | device. | -| | | -| | The base header length of 20 bytes will be extended by 4 bytes to accommodate MSI-X | -| | vectors and the Virtio Network Device header will appear at byte offset 24. | -| | | -| | The Userspace Virtio Poll Mode Driver tests the guest feature bits for the presence | -| | of VIRTIO_PCI_FLAG_MISIX, however this bit field is not part of the Virtio | -| | specification and resolves to the VIRTIO_NET_F_MAC feature instead. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Implication | The Intel?? DPDK kernel driver will enable MSI-X by default, | -| | however if loaded with ???intr_mode=legacy??? on a guest with a Virtio Network Device, | -| | a KVM-Qemu guest may crash with the following error: ???virtio-net header not in first | -| | element???. | -| | | -| | If VIRTIO_NET_F_MAC feature has not been negotiated, then the Userspace Poll Mode | -| | Driver will assume that MSI-X has been disabled and will prevent the proper | -| | functioning of the driver. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Resolution | Ensure #define VIRTIO_PCI_CONFIG(hw) returns the correct offset (20 or 24 bytes) for | -| | the devices where in rare cases MSI-X is disabled or VIRTIO_NET_F_MAC has not been | -| | negotiated. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Affected Environment/ Platform | Virtio devices where MSI-X is disabled or VIRTIO_NET_F_MAC feature has not been | -| | negotiated. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Driver/Module | librte_pmd_virtio | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ - -gmake clean may silently fail for some example applications ------------------------------------------------------------ - -+--------------------------------+--------------------------------------------------------------------------------------+ -| Title | When using Free BSD* 9.2 gmake clean may silently fail for some sample applications | -| | | -+================================+======================================================================================+ -| Reference # | IXA00834605 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Description | gmake clean may silently fail leaving the source object files intact. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Implication | Application object files are not removed. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Resolution | Manually remove ./build folders or rebuild application source after editing. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Affected Environment/ Platform | FreeBSD* 9.2 and below | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Driver/Module | Example Applications | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ - In packets provided by the PMD, some flags are missing ------------------------------------------------------ @@ -415,35 +274,6 @@ Multi-process sample app requires exact memory mapping | | | +--------------------------------+--------------------------------------------------------------------------------------+ -Unstable system performance across application executions with 2MB pages ------------------------------------------------------------------------- - -+--------------------------------+--------------------------------------------------------------------------------------+ -| Title | Unstable system performance across application executions with 2MB pages | -| | | -+================================+======================================================================================+ -| Reference # | IXA00372346 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Description | The performance of an Intel?? DPDK application may vary across executions of an | -| | application due to a varying number of TLB misses depending on the location of | -| | accessed structures in memory. | -| | This situation occurs on rare occasions. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Implication | Occasionally, relatively poor performance of Intel?? DPDK applications is encountered.| -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Resolution/ Workaround | Using 1 GB pages results in lower usage of TLB entries, resolving this issue. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Affected Environment/ Platform | Systems using 2 MB pages | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Driver/Module | All | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ - Packets are not sent by the 1 GbE/10 GbE SR-IOV driver when the source MAC address is not the MAC address assigned to the VF NIC -------------------------------------------------------------------------------------------------------------------------------- @@ -617,33 +447,6 @@ Kernel crash on IGB port unbinding | | | +--------------------------------+--------------------------------------------------------------------------------------+ -Link status change not working with MSI interrupts --------------------------------------------------- - -+--------------------------------+--------------------------------------------------------------------------------------+ -| Title | Link status change not working with MSI interrupts | -| | | -+================================+======================================================================================+ -| Reference # | IXA00378191 | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Description | MSI interrupts are not supported by the PMD. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Implication | Link status change will only work with legacy or MSI-X interrupts. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Resolution/ Workaround | The igb_uio driver can now be loaded with either legacy or MSI-X interrupt support. | -| | However, this configuration is not tested. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Affected Environment/ Platform | All | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Driver/Module | Poll Mode Driver (PMD) | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ - Twinpond and Ironpond NICs do not report link status correctly -------------------------------------------------------------- @@ -820,34 +623,6 @@ Differences in how different Intel NICs handle maximum packet length for jumbo f | | | +--------------------------------+--------------------------------------------------------------------------------------+ -Link status interrupt not working in VF drivers ------------------------------------------------ - -+--------------------------------+--------------------------------------------------------------------------------------+ -| Title | Link status interrupts not working in the VF drivers | -| | | -+================================+======================================================================================+ -| Reference | IXA00381312 | -| # | | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Description | Due to the driver not setting up interrupts for VF drivers, the NIC does not report | -| | link status change to VF devices. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Implication | Link status interrupts will not work in VM guests. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Resolution/ Workaround | There is no workaround available. | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Affected Environment/ Platform | All | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ -| Driver/Module | VF (SR-IOV) Poll Mode Driver (PMD) | -| | | -+--------------------------------+--------------------------------------------------------------------------------------+ - Binding PCI devices to igb_uio fails on Linux* kernel 3.9 when more than one device is used ------------------------------------------------------------------------------------------- diff --git a/doc/guides/rel_notes/resolved_issues.rst b/doc/guides/rel_notes/resolved_issues.rst index 0eb1143..52a7119 100644 --- a/doc/guides/rel_notes/resolved_issues.rst +++ b/doc/guides/rel_notes/resolved_issues.rst @@ -33,6 +33,177 @@ Resolved Issues This section describes previously known issues that have been resolved since release version 1.2. +Running TestPMD with SRIOV in Domain U may cause it to hang when XENVIRT switch is on +------------------------------------------------------------------------------------- + ++--------------------------------+--------------------------------------------------------------------------------------+ +| Title | Running TestPMD with SRIOV in Domain U may cause it to hang when XENVIRT switch is on| +| | | ++================================+======================================================================================+ +| Reference # | IXA00168949 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Description | When TestPMD is run with only SRIOV port ???????o./testpmd -c f -n 4 -- -i???????? , the following | +| | error occurs: | +| | | +| | PMD: gntalloc: ioctl error | +| | | +| | EAL: Error - exiting with code: 1 | +| | | +| | Cause: Creation of mbuf pool for socket 0 failed | +| | | +| | Then, alternately run SRIOV port and virtIO with testpmd: | +| | | +| | testpmd -c f -n 4 -- -i | +| | | +| | testpmd -c f -n 4 --use-dev="eth_xenvirt0" -- -i | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Implication | DomU will not be accessible after you repeat this action some times | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Resolution/ Workaround | Run testpmd with a "--total-num-mbufs=N(N<=3500)" | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Affected Environment/ Platform | Fedora 16, 64 bits + Xen hypervisor 4.2.3 + Domain 0 kernel 3.10.0 | +| | +Domain U kernel 3.6.11 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Driver/Module | TestPMD Sample Application | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ + +Vhost-xen cannot detect Domain U application exit on Xen version 4.0.1 +---------------------------------------------------------------------- + ++--------------------------------+--------------------------------------------------------------------------------------+ +| Title | Vhost-xen cannot detect Domain U application exit on Xen 4.0.1. | +| | | ++================================+======================================================================================+ +| Reference # | IXA00168947 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Description | When using DPDK applications on Xen 4.0.1, e.g. TestPMD Sample Application, | +| | on killing the application (e.g. killall testmd) vhost-switch cannot detect | +| | the domain U exited and does not free the Virtio device. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Implication | Virtio device not freed after application is killed when using vhost-switch on Xen | +| | 4.0.1 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Resolution | Resolved in DPDK 1.8 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Affected Environment/ Platform | Xen 4.0.1 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Driver/Module | Vhost-switch | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ + +Virtio incorrect header length used if MSI-X is disabled by kernel driver +------------------------------------------------------------------------- + ++--------------------------------+--------------------------------------------------------------------------------------+ +| Title | Virtio incorrect header length used if MSI-X is disabled by kernel driver or | +| | if VIRTIO_NET_F_MAC is not negotiated. | +| | | ++================================+======================================================================================+ +| Reference # | IXA00384256 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Description | The Virtio header for host-guest communication is of variable length and | +| | is dependent on whether MSI-X has been enabled by the kernel driver for the network | +| | device. | +| | | +| | The base header length of 20 bytes will be extended by 4 bytes to accommodate MSI-X | +| | vectors and the Virtio Network Device header will appear at byte offset 24. | +| | | +| | The Userspace Virtio Poll Mode Driver tests the guest feature bits for the presence | +| | of VIRTIO_PCI_FLAG_MISIX, however this bit field is not part of the Virtio | +| | specification and resolves to the VIRTIO_NET_F_MAC feature instead. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Implication | The DPDK kernel driver will enable MSI-X by default, | +| | however if loaded with "intr_mode=legacy" on a guest with a Virtio Network Device, | +| | a KVM-Qemu guest may crash with the following error: "virtio-net header not in first | +| | element". | +| | | +| | If VIRTIO_NET_F_MAC feature has not been negotiated, then the Userspace Poll Mode | +| | Driver will assume that MSI-X has been disabled and will prevent the proper | +| | functioning of the driver. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Resolution | Ensure #define VIRTIO_PCI_CONFIG(hw) returns the correct offset (20 or 24 bytes) for | +| | the devices where in rare cases MSI-X is disabled or VIRTIO_NET_F_MAC has not been | +| | negotiated. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Affected Environment/ Platform | Virtio devices where MSI-X is disabled or VIRTIO_NET_F_MAC feature has not been | +| | negotiated. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Driver/Module | librte_pmd_virtio | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ + +Unstable system performance across application executions with 2MB pages +------------------------------------------------------------------------ + ++--------------------------------+--------------------------------------------------------------------------------------+ +| Title | Unstable system performance across application executions with 2MB pages | +| | | ++================================+======================================================================================+ +| Reference # | IXA00372346 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Description | The performance of an DPDK application may vary across executions of an | +| | application due to a varying number of TLB misses depending on the location of | +| | accessed structures in memory. | +| | This situation occurs on rare occasions. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Implication | Occasionally, relatively poor performance of DPDK applications is encountered. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Resolution/ Workaround | Using 1 GB pages results in lower usage of TLB entries, resolving this issue. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Affected Environment/ Platform | Systems using 2 MB pages | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Driver/Module | All | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ + +Link status change not working with MSI interrupts +------------------------------------------------- + ++--------------------------------+--------------------------------------------------------------------------------------+ +| Title | Link status change not working with MSI interrupts | +| | | ++================================+======================================================================================+ +| Reference # | IXA00378191 | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Description | MSI interrupts are not supported by the PMD. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Implication | Link status change will only work with legacy or MSI-X interrupts. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Resolution/ Workaround | The igb_uio driver can now be loaded with either legacy or MSI-X interrupt support. | +| | However, this configuration is not tested. | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Affected Environment/ Platform | All | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ +| Driver/Module | Poll Mode Driver (PMD) | +| | | ++--------------------------------+--------------------------------------------------------------------------------------+ + KNI does not provide Ethtool support for all NICs supported by the Poll-Mode Drivers ------------------------------------------------------------------------------------ -- 1.9.4.msysgit.2