KVM PCI Passthrough and Omni-Path » History » Revision 8
Revision 7 (Brian Smith, 04/07/2018 02:03 AM) → Revision 8/23 (Brian Smith, 04/07/2018 02:04 AM)
# KVM PCI Passthrough and OPA A KVM guest can use OPA hardware when configured for PCI passthrough. ## BIOS Settings 1. Intel VT must be enabled. 2. Integrated IO / IntelVT must be enabled. ## Kernel Command Line ```intel_iommu=on iommu=pt``` When configured properly, ```/sys/kernel/iommu_groups/``` will contain many subdirectories. If that path is empty, IOMMU is not working. ## Install KVM ``` $ sudo apt install qemu-kvm libvirt-clients libvirt-daemon-system virtinst libosinfo-bin virt-viewer virsh $ sudo adduser YOU libvirt $ sudo adduser YOU libvirt-qemu $ sudo adduser YOU kvm ``` ## Disable hfi1 on host The hfi1 driver must not be loaded on the host machine, in order to use PCI passthrough. In /etc/modprobe.d/hfi1.conf: ``` blacklist hfi1 ``` Also, there is no reason to have IFS installed on the host. The host machine should have no OPA functionality enabled. ## Configure PCI Passthrough The hfi1 device must be setup for PCI passthrough. Find the device's port in the output of lspci: ``` $ lspci | grep Omni | cut -f1 '-d ' ``` For the scripts below, prepend the port with 0000:, like "0000:80:02.0". Use the following script, replace PCI_PORT with the port of the hfi1: ``` #!/bin/bash PCI_PORT=0000:80:02.0 DEV_VENDOR=8086 DEV_MODEL=24f0 rmmod vfio rmmod vfio_pci echo "$PCI_PORT" > /sys/bus/pci/devices/$PCI_PORT/driver/unbind modprobe vfio modprobe vfio_pci echo $DEV_VENDOR $DEV_MODEL > /sys/bus/pci/drivers/vfio-pci/new_id ``` ## Configure Default Network for DNS Forwarding ``` $ sudo virsh net-edit default ``` Add this tag: ``` <domain name='sfw.int' localOnly='no'/> ``` ## Create Guest While it is possible to manage guests for an unprivileged user, they get a non-functional network setup in the default config. TBD to figure this out. **Use virsh as root.** ``` $ systemctl start libvirtd $ virt-install --virt-type kvm --name GUEST_NAME GUESTNAME \ --vcpus=4 --virt-type kvm --cdrom $HOME/kvm-guest/debian-8.7.0-amd64-DVD-1.iso \ -v --os-variant debian8 \ --disk path=PATH_TO_CREATE_DISK,size=16 path=PATH_TO_STORE_DISK,size=16 --memory 4096 --graphics vnc ``` Connect a VNC client to a tunneled connection to the host. From the workstation: ``` $ ssh -L5910:host:5900 YOU@host ``` Now connect a VNC client to localhost:5910 and complete the install. ## Import Existing Disk to New Guest To import an existing guest disk image, use the following command: ``` $ sudo virt-install --virt-type kvm --name GUEST_NAME \ --vcpus=4 --virt-type kvm --import \ -v --os-variant debian8 \ --disk PATH_TO_DISK_IMAGE,device=disk,bus=virtio --memory 4096 --graphics vnc ``` ## Connect to Guest, Configure DNS TBD: figure out bridged network The default network for KVM is 192.168.122.0/24 and the guest should be assigned a DHCP address when it boots. Use the VNC connection to execute ```$ ip addr``. ssh should be able to connect to the guest from the host. Unfortunately, dnsmasq doesn't appear to set the search domain properly. For Debian, configure a search domain in the guest's ```/etc/network/interfaces```. ``` allow-hotplug eth0 iface eth0 inet dhcp dns-search sfw.int ``` ## Configure Guest for PCI Passthrough Shutdown the guest if it is running. ``` $ virsh shutdown GUEST ``` Look for the PCI device in virsh. Look for a pci device that matches the port found via lspci. ``` $ virsh nodedev-list --tree ``` Detach the device. Use the child device of the one that matches the device you found via lspci. ``` $ virsh nodedev-detach pci_0000_81_00_0 ``` Dump the device info. ``` $ virsh nodedev-dumpxml pci_0000_81_00_0 ``` Convert bus, slot and function to hex. ```$ printf %x VALUE``` can be used for the hex-challenged. Edit the guest and add a hostdev section: ``` <hostdev mode='subsystem' type='pci' managed='yes'> <source> <address domain='0x0000' bus='0x81' slot='0x0' function='0x0'/> </source> </hostdev> ``` Upon booting the guest, the passthrough device should be present in the guest's lspci output. ## References 1. https://wiki.debian.org/KVM 2. https://jamielinux.com/docs/libvirt-networking-handbook/nat-based-network.html 3. https://www.linux-kvm.org/page/How_to_assign_devices_with_VT-d_in_KVM 4. https://wiki.archlinux.org/index.php/PCI_passthrough_via_OVMF 5. https://wiki.debian.org/VGAPassthrough ---- {{lastupdated_by}} {{lastupdated_at}} {{comment_form}} {{comments}}