eve icon indicating copy to clipboard operation
eve copied to clipboard

pillar: Disable vIOMMU for KVM when PCI PT is present

Open temerkhanov opened this issue 5 years ago • 3 comments

vIOMMU enablement requires more elaborate PCI topologies or logic

Signed-off-by: Sergey Temerkhanov [email protected]

temerkhanov avatar Sep 25 '20 13:09 temerkhanov

The most viable vIOMMU use case is nested virtualization with device passthrough. Currently, there are limitations on host device direct assignment imposed by the Linux kernel. Full isolation requires those devices to be unable to communicate directly via P2P transactions or mailboxes/shared memory/etc of multifunction devices. These security implications have been imposed for various large systems with potentially uncontrolled code executed in the VMs. For edge devices VMs/containers are fully controlled and nested virtualization is not in use, so the vIOMMU may be removed from the configuration, saving some overhead.

temerkhanov avatar Sep 29 '20 20:09 temerkhanov

@temerkhanov can you please make sure that GPU (specifically NVIDIA) pass-through works with your changes, especially on Windows 10 guests.

cshari-zededa avatar Oct 01 '20 06:10 cshari-zededa

@temerkhanov can you please make sure that GPU (specifically NVIDIA) pass-through works with your changes, especially on Windows 10 guests.

Configs without vIOMMU have been tested for GPU passthrough on Windows 10 with an ATI card. Only host IOMMU is required to support PCIe passthrough.

temerkhanov avatar Oct 01 '20 12:10 temerkhanov

[the hostess took up a broom] @eriknordmark I think we can close this pr, because the statement "VMs/containers are fully controlled and nested virtualization is not in use" is not true for the current state of eve (at least according to my understanding).

rouming avatar Oct 12 '22 13:10 rouming

Closing this

eriknordmark avatar Oct 14 '22 22:10 eriknordmark