Knowledge Search


×
 

[vMX] How to check the SR-IOV capability of NICs in vMX?

  [KB34884] Show Article Properties


Summary:

vMX supports high-bandwidth applications or performance testing only in single-root I/O virtualization (SR-IOV) mode. So, when users do not get proper throughput in vMX, they can start troubleshooting the problem by checking whether the network interface card (NIC) is SR-IOV capable or not.

This article explains how users can check the SR-IOV capability of NICs in vMX devices.

Note: Refer to Installing vMX for Different Use Cases for information about use case requirements.

Solution:

To run these commands, you would need root credentials of the host OS.

Note: If the lshw package is not installed in the host OS, then you need to install this package.

Use the following procedure (commands) to check the SR-IOV capability of a particular NIC (device).

  1. Run the following command: lshw -c network -businfo.

Running this command as a superuser will give you the list of all NICs in the host system.

root@jtac-ulab-vmx-2:~$  lshw -c network -businfo

WARNING: you should run this program as super-user.

Bus info          Device      Class      Description
====================================================
pci@0000:05:00.0  ens1f0      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:05:00.1  ens1f1      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:05:00.2  ens1f2      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:05:00.3  ens1f3      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:05:02.0  enp5s2      network    Illegal Vendor ID
pci@0000:05:02.1  enp5s2f1    network    Illegal Vendor ID
pci@0000:05:02.2  enp5s2f2    network    Illegal Vendor ID
pci@0000:05:02.3  enp5s2f3    network    Illegal Vendor ID
pci@0000:05:02.4  enp5s2f4    network    Illegal Vendor ID
pci@0000:05:02.5  enp5s2f5    network    Illegal Vendor ID
pci@0000:05:02.6  enp5s2f6    network    Illegal Vendor ID
pci@0000:05:06.0  enp5s6      network    Illegal Vendor ID
pci@0000:05:06.1  enp5s6f1    network    Illegal Vendor ID
pci@0000:05:06.2  enp5s6f2    network    Illegal Vendor ID
pci@0000:05:06.3  enp5s6f3    network    Illegal Vendor ID
pci@0000:05:06.4  enp5s6f4    network    Illegal Vendor ID
pci@0000:05:06.5  enp5s6f5    network    Illegal Vendor ID
pci@0000:05:06.6  enp5s6f6    network    Illegal Vendor ID
pci@0000:04:00.0  eno49       network    82599ES 10-Gigabit SFI/SFP+ Network Connection 
pci@0000:04:00.1  eno50       network    82599ES 10-Gigabit SFI/SFP+ Network Connection
pci@0000:0b:00.0  ens2f0      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:0b:00.1  ens2f1      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:0b:00.2  ens2f2      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:0b:00.3  ens2f3      network    Ethernet Controller X710 for 10GbE SFP+
pci@0000:0b:02.0  enp11s2     network    Illegal Vendor ID
pci@0000:0b:02.1  enp11s2f1   network    Illegal Vendor ID
pci@0000:0b:02.2  enp11s2f2   network    Illegal Vendor ID
pci@0000:0b:02.3  enp11s2f3   network    Illegal Vendor ID
pci@0000:0b:02.4  enp11s2f4   network    Illegal Vendor ID
pci@0000:0b:02.5  enp11s2f5   network    Illegal Vendor ID
pci@0000:0b:02.6  enp11s2f6   network    Illegal Vendor ID
pci@0000:0b:06.0  enp11s6     network    Illegal Vendor ID
pci@0000:0b:06.1  enp11s6f1   network    Illegal Vendor ID
pci@0000:0b:06.2  enp11s6f2   network    Illegal Vendor ID
pci@0000:0b:06.3  enp11s6f3   network    Illegal Vendor ID
pci@0000:0b:06.4  enp11s6f4   network    Illegal Vendor ID
pci@0000:0b:06.5  enp11s6f5   network    Illegal Vendor ID
pci@0000:0b:06.6  enp11s6f6   network    Illegal Vendor ID
pci@0000:02:00.0  eno1        network    NetXtreme BCM5719 Gigabit Ethernet PCIe
pci@0000:02:00.1  eno2        network    NetXtreme BCM5719 Gigabit Ethernet PCIe
pci@0000:02:00.2  eno3        network    NetXtreme BCM5719 Gigabit Ethernet PCIe
pci@0000:02:00.3  eno4        network    NetXtreme BCM5719 Gigabit Ethernet PCIe
                  bond0       network    Ethernet interface
                  virbr0-nic  network    Ethernet interface

  1. Run the lspci -vs command and provide the Bus details as an argument.

To get the capabilities of the eno49 device, you need to run the following command:

root@jtac-ulab-vmx-2:~# lspci -vs 0000:04:00.0

04:00.0 Ethernet controller: Intel Corporation 82599ES 10-Gigabit SFI/SFP+ Network Connection (rev 01)
        DeviceName: Embedded FlexibleLOM 1 Port 1
        Subsystem: Hewlett-Packard Company Ethernet 10Gb 2-port 560FLR-SFP+ Adapter
        Flags: bus master, fast devsel, latency 0, IRQ 17
        Memory at 97b00000 (32-bit, non-prefetchable) [size=1M]
        I/O ports at 2020 [size=32]
        Memory at 97c04000 (32-bit, non-prefetchable) [size=16K]
        [virtual] Expansion ROM at 97c80000 [disabled] [size=512K]
        Capabilities: [40] Power Management version 3
        Capabilities: [50] MSI: Enable- Count=1/1 Maskable+ 64bit+
        Capabilities: [70] MSI-X: Enable+ Count=64 Masked-
        Capabilities: [a0] Express Endpoint, MSI 00
        Capabilities: [e0] Vital Product Data
        Capabilities: [100] Advanced Error Reporting
        Capabilities: [140] Device Serial Number 00-00-00-ff-ff-00-00-00
        Capabilities: [150] Alternative Routing-ID Interpretation (ARI)
        Capabilities: [160] Single Root I/O Virtualization (SR-IOV)
        Kernel driver in use: ixgbe
        Kernel modules: ixgbe

root@jtac-ulab-vmx-2:~#

 

Related Links: