[openstack-dev] [nova] SR-IOV and IOMMU check

Luohao (brian) brian.luohao at huawei.com
Sat Mar 29 01:46:15 UTC 2014


This is the approach mentioned by linux-kvm.org

http://www.linux-kvm.org/page/How_to_assign_devices_with_VT-d_in_KVM

3. reboot and verify that your system has IOMMU support

AMD Machine
dmesg | grep AMD-Vi
     ...
     AMD-Vi: Enabling IOMMU at 0000:00:00.2 cap 0x40
     AMD-Vi: Lazy IO/TLB flushing enabled
     AMD-Vi: Initialized for Passthrough Mode
     ...
Intel Machine
dmesg | grep -e DMAR -e IOMMU
     ...
     DMAR:DRHD base: 0x000000feb03000 flags: 0x0
     IOMMU feb03000: ver 1:0 cap c9008020e30260 ecap 1000
     ...



-----Original Message-----
From: Steve Gordon [mailto:sgordon at redhat.com] 
Sent: Saturday, March 29, 2014 3:37 AM
To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] [nova] SR-IOV and IOMMU check

----- Original Message -----
> Hi, all
> 
> Currently openstack can support SR-IOV device pass-through (at least 
> there are some patches for this), but the prerequisite to this is both 
> IOMMU and SR-IOV must be enabled correctly, it seems there is not a 
> robust way to check this in openstack, I have implemented a way to do 
> this and hope it can be committed into upstream, this can help find 
> the issue beforehand, instead of letting kvm report the issue "no 
> IOMMU found" until the VM is started. I didn't find an appropriate 
> place to put into this, do you think this is necessary? Where can it 
> be put into? Welcome your advice and thank you in advance.

What's the mechanism you are using on the host side to determine that IOMMU is supported/enabled?

Thanks,

Steve

_______________________________________________
OpenStack-dev mailing list
OpenStack-dev at lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev



More information about the OpenStack-dev mailing list