From patchwork Thu Sep 22 12:37:16 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Phelan, Michael" X-Patchwork-Id: 1681086 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org (client-ip=140.211.166.133; helo=smtp2.osuosl.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256 header.s=Intel header.b=AHwJ0ZSn; dkim-atps=neutral Received: from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4MYFDN3Ckbz1yqL for ; Thu, 22 Sep 2022 22:37:40 +1000 (AEST) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id 2CB7240BB6; Thu, 22 Sep 2022 12:37:38 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 2CB7240BB6 Authentication-Results: smtp2.osuosl.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=intel.com header.i=@intel.com header.a=rsa-sha256 header.s=Intel header.b=AHwJ0ZSn X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TOjqTS9KlwkW; Thu, 22 Sep 2022 12:37:37 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [IPv6:2605:bc80:3010:104::8cd3:938]) by smtp2.osuosl.org (Postfix) with ESMTPS id 36F7840609; Thu, 22 Sep 2022 12:37:36 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 36F7840609 Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 0AC11C0033; Thu, 22 Sep 2022 12:37:36 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@lists.linuxfoundation.org Received: from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133]) by lists.linuxfoundation.org (Postfix) with ESMTP id 6C2C6C002D for ; Thu, 22 Sep 2022 12:37:34 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id 365D240B82 for ; Thu, 22 Sep 2022 12:37:34 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 365D240B82 X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IBo0WBGvVk5C for ; Thu, 22 Sep 2022 12:37:33 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 2902D403AC Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by smtp2.osuosl.org (Postfix) with ESMTPS id 2902D403AC for ; Thu, 22 Sep 2022 12:37:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1663850253; x=1695386253; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=tKbgqK63HeTRBQeygdvXXS9x09s5+2IgVka4RtY5CqA=; b=AHwJ0ZSnXKQX7t+LsWLR+eKnfJQDqdKoK35BtMBumJx6+IubqKAIbJNU LtsfqCTXfEFXq+etQDxHsuflLtWzTgGHeSXzbFPYitLuoVy5qG27ITSts T40/fJVHgKdcXixisRCABl/WCeqKaiDniOt5FqPThrjxP2DYZFIAZ0PNp Q6xUBT5WXL2vVdwci/R5Y0WCH1OOvodwSl8OVa8s4+iqRSFIk7CY2skDv H0nDwh7PkT+hPwX3l4uwJmREhfxaNc05lre5g0WxPpljr7HKDfLMOPM2+ /SxxOJJElYKNcSrSknfkgORyvo1S9w/x4cL90B8/09gwWdamUEzQurC9/ Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10478"; a="280002974" X-IronPort-AV: E=Sophos;i="5.93,335,1654585200"; d="scan'208";a="280002974" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Sep 2022 05:37:32 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.93,335,1654585200"; d="scan'208";a="597415625" Received: from silpixa00401063.ir.intel.com (HELO silpixa00401063.ger.corp.intel.com) ([10.237.223.107]) by orsmga006.jf.intel.com with ESMTP; 22 Sep 2022 05:37:30 -0700 From: Michael Phelan To: dev@openvswitch.org Date: Thu, 22 Sep 2022 12:37:16 +0000 Message-Id: <20220922123716.1341278-1-michael.phelan@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220908103510.686473-1-michael.phelan@intel.com> References: <20220908103510.686473-1-michael.phelan@intel.com> MIME-Version: 1.0 Cc: maxime.coquelin@redhat.com, i.maximets@ovn.org Subject: [ovs-dev] [branch-2.15, v2] dpdk: Use DPDK 20.11.6 release. X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: ovs-dev-bounces@openvswitch.org Sender: "dev" Update OVS CLI and relevant documentation to use DPDK 20.11.6. A bug was introduced in DPDK 20.11.5 by the commit 33f2e3756186 ("vhost: fix unsafe vring addresses modifications"). This bug can cause a deadlock when vIOMMU is enabled and NUMA reallocation of the virtqueues happen. A fix [1] has been posted and pushed to the DPDK 20.11 branch. If a user wishes to avoid the issue then it is recommended to use DPDK 20.11.4 until the release of DPDK 20.11.7. It should be noted that DPDK 20.11.4 does not benefit from the numerous bug fixes addressed since its release. If a user wishes to benefit from these fixes it is recommended to use DPDK 20.11.6. [1] https://patches.dpdk.org/project/dpdk/patch/20220725203206.427083-2-david.marchand@redhat.com/ Signed-off-by: Michael Phelan --- v2: - Update recommended DPDK version for older OvS versions in Documentation. --- --- .ci/linux-build.sh | 2 +- Documentation/faq/releases.rst | 6 +++--- Documentation/intro/install/dpdk.rst | 8 ++++---- NEWS | 15 +++++++++++++++ 4 files changed, 23 insertions(+), 8 deletions(-) diff --git a/.ci/linux-build.sh b/.ci/linux-build.sh index ea51dec8e..ed5fbbb05 100755 --- a/.ci/linux-build.sh +++ b/.ci/linux-build.sh @@ -201,7 +201,7 @@ fi if [ "$DPDK" ] || [ "$DPDK_SHARED" ]; then if [ -z "$DPDK_VER" ]; then - DPDK_VER="20.11.4" + DPDK_VER="20.11.6" fi install_dpdk $DPDK_VER if [ "$CC" = "clang" ]; then diff --git a/Documentation/faq/releases.rst b/Documentation/faq/releases.rst index 4c8b97de6..25574fba4 100644 --- a/Documentation/faq/releases.rst +++ b/Documentation/faq/releases.rst @@ -204,9 +204,9 @@ Q: What DPDK version does each Open vSwitch release work with? 2.10.x 17.11.10 2.11.x 18.11.9 2.12.x 18.11.9 - 2.13.x 19.11.10 - 2.14.x 19.11.10 - 2.15.x 20.11.4 + 2.13.x 19.11.13 + 2.14.x 19.11.13 + 2.15.x 20.11.6 ============ ======== Q: Are all the DPDK releases that OVS versions work with maintained? diff --git a/Documentation/intro/install/dpdk.rst b/Documentation/intro/install/dpdk.rst index f5edfa756..bd34ffde6 100644 --- a/Documentation/intro/install/dpdk.rst +++ b/Documentation/intro/install/dpdk.rst @@ -42,7 +42,7 @@ Build requirements In addition to the requirements described in :doc:`general`, building Open vSwitch with DPDK will require the following: -- DPDK 20.11.4 +- DPDK 20.11.6 - A `DPDK supported NIC`_ @@ -73,9 +73,9 @@ Install DPDK #. Download the `DPDK sources`_, extract the file and set ``DPDK_DIR``:: $ cd /usr/src/ - $ wget https://fast.dpdk.org/rel/dpdk-20.11.4.tar.xz - $ tar xf dpdk-20.11.4.tar.xz - $ export DPDK_DIR=/usr/src/dpdk-stable-20.11.4 + $ wget https://fast.dpdk.org/rel/dpdk-20.11.6.tar.xz + $ tar xf dpdk-20.11.6.tar.xz + $ export DPDK_DIR=/usr/src/dpdk-stable-20.11.6 $ cd $DPDK_DIR #. Configure and install DPDK using Meson diff --git a/NEWS b/NEWS index f58c2c9e4..fb6f766d1 100644 --- a/NEWS +++ b/NEWS @@ -1,5 +1,20 @@ v2.15.6 - xx xxx xxxx --------------------- + - DPDK: + * OVS validated with DPDK 20.11.6. + A bug was introduced in DPDK 20.11.5 by the commit + 33f2e3756186 ("vhost: fix unsafe vring addresses modifications"). + This bug can cause a deadlock when vIOMMU is enabled and NUMA + reallocation of the virtqueues happen. + A fix has been posted and pushed to the DPDK 20.11 branch. + It can be found here: + https://patches.dpdk.org/project/dpdk/patch/20220725203206.427083-2-david.marchand@redhat.com/. + If a user wishes to avoid the issue then it is recommended to use + DPDK 20.11.4 until the release of DPDK 20.11.7. + It should be noted that DPDK 20.11.4 does not benefit from the numerous + bug fixes addressed since its release. + If a user wishes to benefit from these fixes it is recommended to use + DPDK 20.11.6. v2.15.5 - 15 Jun 2022 ---------------------