ESXi IO connectivity issues or PSOD with VT-d interrupt remapper disabled
search cancel

ESXi IO connectivity issues or PSOD with VT-d interrupt remapper disabled

book

Article ID: 317585

calendar_today

Updated On:

Products

VMware vSphere ESXi

Issue/Introduction

  • The ESXi host has the VT-d interrupt remapper disabled (ESXi boot option iovDisableIR set to TRUE).
  • In the /var/log/vmkernal log file, there are entries similar to:

    ALERT: IntrCookie: 3411: Interrupt received on invalid vector (cpu 0, vector 72); ignoring it.

    Note:
     



Cause

The vmkernel alert shown indicates that ESXi has received an interrupt on an unexpected processor interrupt vector and has ignored the interrupt because ESXi does not know the source of the interrupt or which software handler to invoke.

Reception of such an interrupt is not normal and may cause loss of I/O connectivity and/or ESXi PSODs.
 
In order to distribute the interrupt load evenly across processors, ESXi performs interrupt re-balancing. As part of this process, ESXi may modify the target processor and interrupt vector assigned to an I/O device. This process is known as I/O device interrupt migration.
 
When the VT-d interrupt remapper is not present in a platform or its use is disabled in ESXi (boot option iovDisableIR=TRUE), ESXi performs I/O device interrupt migration by modifying the PCI MSI/MSI-X registers in the I/O device(s).
 
VMware has recently received reports that some I/O devices do not react well when ESXi performs interrupt migration by programming the device's MSI/MSI-X registers. Specifically, some I/O devices may interrupt in a processor vector which ESXi no longer uses and considers invalid, causing the generation of the alert message and its subsequent effects.

Resolution

This issue is resolved ESXi 5.5 P11, ESXi 6.0 P05 and ESXi 6.5 P01, available at Download Broadcom products and software.

 
Alternatively as a workaround enable VT-d interrupt remapper by setting vmkernel boot option iovDisableIR to FALSE.

 
  1. Connect to the ESXi host with an SSH session and root credentials.
     
  2. Run this command:

    esxcli system settings kernel set --setting=iovDisableIR -v FALSE
     
  3. Reboot the ESXi host.
     
  4. Ensure the iovDisableIR setting is set to FALSE with this command:

    esxcli system settings kernel list -o iovDisableIR

    For example:

    esxcli system settings kernel list -o iovDisableIR

    Name Type Description Configured Runtime Default
    ------------ ---- --------------------------------------- ---------- ------- -------
    iovDisableIR Bool Disable Interrupt Routing in the IOMMU... FALSE FALSE TRUE
 
If this issue is observed with other ESXi versions:
  • Ensure the VT-d interrupt remapper is enabled in the BIOS.
     
  • Run this command to verify if it is enabled:

    vsish -e get /hardware/iov/IntrRemappingEnabled

    This command returns the value 1 if the VT-d interrupt remapper is enabled in the BIOS and in use by ESXi, and 0 otherwise.
     
  • If the alert persists, contact VMware Technical Support to file a support request. For more information, see How to file a Support Request in Customer Connect (2006985).



Additional Information