• 发文章

  • 发资料

  • 发帖

  • 提问

  • 发视频

创作活动
0
登录后你可以
  • 下载海量资料
  • 学习在线课程
  • 观看技术视频
  • 写文章/发帖/加入社区
返回

电子发烧友 电子发烧友

  • 全文搜索
    • 全文搜索
    • 标题搜索
  • 全部时间
    • 全部时间
    • 1小时内
    • 1天内
    • 1周内
    • 1个月内
  • 默认排序
    • 默认排序
    • 按时间排序
  • 全部板块
    • 全部板块
大家还在搜
  • KVM中的SRIOV和ubuntu绑定

    SRIOV卡的KVM。 5:enp4s0f0:mtu 1500 qdisc mq state UP模式DEFAULT group default qlen 1000 link / ether 00:0c

    2018-11-07 11:13

  • Intel图形SR-IOV增强工具箱使用指南

    立的系统上运行,以防止覆盖现有已安装的软件和配置。在 GitHub 安装手册. git clone https://github.com/intel/kubevirt-gfx-sriov

    2023-08-02 16:07

  • Linux KVM SRIOV欺骗数据包丢帧

    主要问题是在几个小时到几周之后,单个VF将进入客户的糟糕状态,我们将在父母和孩子身上看到以下错误。版本:Centos = 7.5.1804内核= 4.4.121-1.el7.centos.x86_64(当前);试过3.10.0,***,***,4.14.68IXGBE = 5.3.7(当前);试过5.3.5,4.2.1-k,......IXGBEVF = 4.3.5(当前);试过2.12.1-k,....QEMU = 1.5.3(当前);试过2.0.0Libvirt = 3.9.0(当前)在父级上我们将看到此错误:ixgbe 0000:05:00.0 ethx:193检测到欺骗数据包x 0000:05:00.0 ethx:45检测到欺骗数据包x 0000:05:00.0 ethx:3检测到欺骗数据包x 0000:05:00.0 ethx:126检测到欺骗数据包在孩子身上,你会看到丢包的增加。2:eth0:mtu 1500 qdisc mq状态***模式DEFAULT组默认qlen 1000链接/ ether 52:54:00:5e:a9:f8 brd ff:ff:ff:ff:ff:ff RX:字节数据包错误丢弃超限mcast 455429589913 520093667 0 375674 0 375680 TX:丢弃的字节数据包载波collsns 463147231075 514071570 0 0 0 0我没有办法查看出来的欺骗数据包,但我可以看到传入的数据包被客户端损坏和丢弃。最好的例子是ARP,因为它会击中每个父母,孩子。 (IP审查)父捕获:10:36:26.492879 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP(0x0806),长度60:请求谁拥有ZZZ.ZZZ.ZZZ.ZZZ告诉XXX.XXX.XXX.XXX,长度4610:36:26.540880 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP(0x0806),长度60:请求 - 有BBB.BBB.BBB.BBB告诉XXX.XXX.XXX.XXX,长度4610:36:26.553161 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP( 0x0806),长度60:请求谁拥有AAA.AAA.AAA.AAA告诉XXX.XXX.XXX.XXX,长度4610:36:26.559508 02:00:00:00:00:01> ff:ff:ff: ff:ff:ff,ethertype ARP(0x0806),长度60:请求谁有YYY.YYY.YYY.YYY告诉XXX.XXX.XXX.XXX,长度46儿童捕获:10:36:26.501491 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP(0x0806),长度60:请求谁有ZZZ.ZZZ.ZZZ.ZZZ告诉XXX.XXX.XXX.XXX,长度4610:36:26.549499 00:00:00:00:00:00> 00:00:00:00:00:00,802.3,长度0:LLC,dsap Null(0x00)个别,ssap Null(0x00)命令,ctrl 0x0000:信息,发送seq 0,rcv seq 0,标志[Command],长度46 0x0000:0000 0000 0000 0000 0000 0000 0000 0000 ........... ..... 0x0010:0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0020:0000 0000 0000 0000 0000 0000 0000 .......... .... 10:36:26.561776 00:00:00:00:00:00> 00:00:00:00:00:00,802.3,长度0:LLC,dsap Null(0x00)个人,ssap Null( 0x00)命令,ctrl 0x0000:信息,发送seq 0,rcv seq 0,标志[命令],长度46 0x0000:0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0010:0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0020:0000 0000 0000 0000 0000 0000 0000 .............. 10 :36:26.568122 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,et hertype ARP(0x0806),长度60:请求谁有YYY.YYY.YYY.YYY告诉XXX.XXX.XXX.XXX,长度46在此一个VF处于错误状态期间,所有其他客户将看到与父母相同的数据包。目前唯一的解决方案是重新启动来宾。有时会摧毁客人并重新启动它。以上来自于谷歌翻译以下为原文The primary issue is after several hours to upwards of a couple weeks a single VF will get into a bad state for a guest and we will see the following errors on the parent and child. Versions:Centos = 7.5.1804Kernel = 4.4.121-1.el7.centos.x86_64 (Current); Tried 3.10.0,***, ***, 4.14.68IXGBE = 5.3.7 (Current); Tried 5.3.5,***, ......IXGBEVF = 4.3.5 (Current); Tried 2.12.1-k, ....QEMU = 1.5.3 (Current); Tried 2.0.0Libvirt = 3.9.0 (Current) On the parent we will see this error:ixgbe 0000:05:00.0 ethx: 193 Spoofed packets detectedixgbe 0000:05:00.0 ethx: 45 Spoofed packets detectedixgbe 0000:05:00.0 ethx: 3 Spoofed packets detectedixgbe 0000:05:00.0 ethx: 126 Spoofed packets detectedOn the child you will see an increase in dropped packets.2: eth0:mtu 1500 qdisc mq state *** mode DEFAULT group default qlen 1000 link/ether 52:54:00:5e:a9:f8 brd ff:ff:ff:ff:ff:ff RX: bytespacketserrorsdropped overrun mcast 455429589913 520093667 0 3756740 375680 TX: bytespacketserrorsdropped carrier collsns 463147231075 514071570 0 0 0 0 I don't have a way to view the spoofed packets going out,***, child. (IPs censored) Parent capture:10:36:26.492879 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.540880 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.553161 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.559508 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 46Child Capture:10:36:26.501491 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.549499 00:00:00:00:00:00 > 00:00:00:00:00:00,***,***,***,***,***,***,***,***, length 460x0000:0000 0000 0000 0000 0000 0000 0000 0000................0x0010:0000 0000 0000 0000 0000 0000 0000 0000................0x0020:0000 0000 0000 0000 0000 0000 0000 ..............10:36:26.561776 00:00:00:00:00:00 > 00:00:00:00:00:00,***,***,***,***,***,***,***,***, length 460x0000:0000 0000 0000 0000 0000 0000 0000 0000................0x0010:0000 0000 0000 0000 0000 0000 0000 0000................0x0020:0000 0000 0000 0000 0000 0000 0000 ..............10:36:26.568122 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 46 During the time this one VF is in a bad state, all other guests will see the same packets as the parent. The only current solution is to reboot the guest. Sometimes destroy the guest and start it back up.

    2018-10-24 15:12

  • 【技术系列】浅谈GPU虚拟化技术(第一章)

    :https://www.linux-kvm.org/images/e/ed/Kvm-forum-2013-VFIO-VGA.pdf)同年初: AMD 也已经开始基于SRIOV的GPU虚拟化方案

    2018-04-16 10:51

  • 2017双11技术揭秘—千亿级流量来袭,如何用硬件加速技术为CPU减负?

    )技术,其大部分处于用户态、只有少部分处理硬件中断应答等逻辑处于内核态,这样不仅方便用户调试,而且还解决了内核不支持浮点数运算的问题。当然QAT加速卡也顺应了Docker虚拟化的潮流,其采用SRIOV

    2017-12-29 11:25