Back to bug 1375893

Who When What Removed Added
Michal Skrivanek 2016-09-14 08:05:21 UTC Flags needinfo?(mpoledni)
Martin Polednik 2016-09-14 12:49:58 UTC Doc Text The following kernel options are available:

Hostdev passthrough & SR-IOV - Enables support for IOMMU in kernel. The option
itself is *not* enough to enable whole hostdev and SR-IOV, one must consult
documentation regarding bios setting and hardware support for these features.
Roughly translates to intel_iommu (Intel) or amd_iommu (AMD) on kernel command line.

Nested Virtualization - Enables support for nested virtualization. The option
only configures the KVM module, to use nested virtualization the nestedvt hook
must be installed (to propagate the vmx (Intel) and svm (AMD) cpu flags).

Unsafe Interrupts - Enables hostdev passthrough on host without proper hardware
protection for device assignment. This option should be left unchecked by
default, and only considered if VM with hostdev passthrough fails to start and
output of dmesg on the host contains
"
No interrupt remapping support. Use the module param "allow_unsafe_interrupts" to enable VFIO IOMMU support on this platform
". Only trusted guests should be run in this configuration[1]

PCI Reallocation - Enables PCI reallocation, sometimes enabling SR-IOV devices
that could not create VFs to do so. The root cause of the issue is kernel's
inability to allocate enough MMIO space due to a limitation or BIOS issue.

[1] http://vfio.blogspot.cz/2014/08/vfiovga-faq.html
Flags needinfo?(mpoledni)
Julie 2016-09-21 22:56:09 UTC Status NEW CLOSED
CC juwu
Resolution --- DUPLICATE
Last Closed 2016-09-21 18:56:09 UTC

Back to bug 1375893