Skip to content

Facilitates (re)building the Proxmox VE kernel with additional patches.

License

Notifications You must be signed in to change notification settings

ewilly/pve-kernel-builder

 
 

Repository files navigation

Proxmox VE Kernel Builder

Check for new pve-kernel releases
Latest from Proxmox: with  |  with
Latest releases: Latest release  |  Latest release


This project aims to provide an easy way to build kernels for Proxmox VE with a particular set of patches.

At the moment, these are the patches applied during build:

  • Relax Intel RMRR: relax RMRRs on Intel platforms to allow certain PCIe devices to be passed through to VMs (credit to kiler129). This patch works around the dreaded Device is ineligible for IOMMU domain attach due to platform RMRR requirement. Contact your platform vendor. message when trying to passthrough certain PCIe devices to a VM.

How to Build

There are two options:

  1. Trigger the Build pve kernel (in container) workflow.

    This workflow will build a new kernel with the current set of patches applied and produce artifacts that can be downloaded. It will run on a 2-core VM in GitHub and it will take between 2h30m and 3h to complete.

  2. Build it locally

    Use the build.sh script to build the kernel locally with the current set of patches applied. Because you are building everything locally, you can customize the set of patches you want before building.

In all cases, kernel builds are done using docker to contain the dependencies and make cleanup easier.

Installation

Regardless of how you built the kernel, you'll end up with a few of .deb files. To install them you need to:

  1. Go to the releases tab and pick appropriate packages
    • If you don't use your Proxmox machine for building software, you really only need the pve-kernel-<version>-pve-relaxablermrr_<version>_amd64.deb file.
  2. Download all applicable *.debs packages to your machine
  3. Install the package(s) using dpkg -i *.deb in the folder where you downloaded the debs
  4. (OPTIONAL) Verify the kernel works with the patch disabled by rebooting and checking if uname -r shows a version ending with -pve-relaxablermrr
  5. Configure the kernel

Configuration

By default, after the kernel is installed, the patch will be inactive (i.e. the kernel will behave like no patch was applied). To activate it you have to add relax_rmrr to the intel_iommu option on your Linux boot args.

In most distros (including Proxmox) you do this by:

  1. Opening /etc/default/grub (e.g. using nano /etc/default/grub)

  2. Editing the GRUB_CMDLINE_LINUX_DEFAULT to include the option:

    • Example of old line:
      GRUB_CMDLINE_LINUX_DEFAULT="quiet intel_iommu=on iommu=pt intremap=no_x2apic_optout"
      
    • Example of new line:
      GRUB_CMDLINE_LINUX_DEFAULT="quiet intel_iommu=on,relax_rmrr iommu=pt intremap=no_x2apic_optout"
      
    • Side note: these are actually options which will make your PCI passthrough work and do so efficiently
  3. Running update-grub

  4. Rebooting

To verify if the the patch is active execute dmesg | grep 'Intel-IOMMU' after reboot. You should see a result similar to this:

root@sandbox:~# dmesg | grep 'Intel-IOMMU'
[    0.050195] DMAR: Intel-IOMMU: assuming all RMRRs are relaxable. This can lead to instability or data loss
root@sandbox:~# 

Acknowledgements

About

Facilitates (re)building the Proxmox VE kernel with additional patches.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 58.2%
  • Dockerfile 41.8%