Am 12.07.2012 00:38, schrieb Eric Blake:
This may be the result of a security fix in the new kernel. I know at least one older version of Intel chips has a bug where IOMMU can be exploited by a guest to take control over the host, so on those chips, newer kernels now require to explicitly enable a kernel module parameter to state that you are going to allow passthrough to the guest in spite of the security risk. That is, you may need to use: modprobe kvm allow_unsafe_assigned_interrupts=1 with your newer kernel. Unfortunately, I wasn't able to find a better URL to a page documenting this issue, so that implies we probably also need a patch to the libvirt documentation with regards to using device passthrough.

Hi Eric,

thanks for the info.

Reading https://bugzilla.redhat.com/show_bug.cgi?id=715555 , it seems that 5.8 shouldn't be affected since the kvm on that version doesn't support interrupt remapping, if I understand correctly. Additionally, if I run the script provided in the issue description, the check passes with "Interrupt remapping support available" and the error message differs: I don't get "Operation not permitted"  but "Invalid argument". I also can't set provides switch in /sys/module/kvm/parameters/allow_unsafe_assigned_interrupts, since the file isn't there on my box.

Are there any other circumstances where pci passthrough could fail? Googling for the error message i get, I can't seem to find any case that matches mine. This makes me guess that I'd rather accidentally introduced a misconfiguration than encountered a qemu-kvm/libvirt bug. I have attached the configuration file of that machine, maybe someone could have a look at the hostdev section?

Unfortunately, i am currently not able to switch back to the prior kernel, since the system is in production right now - I will test that later during the day.

Thanks &  cheers,

Rouven



-- 
Blinkenlichten Open Source Solutions
Maass  Sacha GbR | Weigandufer 45 | 12059 Berlin
tel: +493013896247 | fax: +493013896249 | mob: +491744220127
Web: http://www.blinkenlichten.de/ G+: http://gplus.to/blinkenlichten
Blinkenlichten Zarafa Hosted Tweets: http://twitter.com/zarafamail/