Quick Fix: Adjusting MMIO values in ESXi 8U3 to use Large GPUs

Recently I’ve been asked to deploy a “Monster VM” with 8 H200 GPUs aboard. Although everything looks simple, and there weren’t any problems with VMs with small vGPUs, the first thing I faced after running such a large VM was an error:

Error message from esxi-01: The firmware could not allocate 50331648 KB of PCI MMIO. Increase the size of PCI MMIO and try again.

Luckily, I read a recent VMware document, “Deploy Distributed LLM Inference with GPUDirect RDMA over InfiniBand in VMware Private AI“, a few weeks before, and this moment was covered.

I strongly recommend this document to anyone utilizing large GPU servers (HGX, DGX), particularly when cross-server communication is necessary.

To run such a large VM, it requires adjusting the VM’s MMIO settings to add two values to the VM’s advanced settings:

pciPassthru.use64bitMMIO = TRUE
pciPassthru.64bitMMIOSizeGB = 1024

MMIO size should be calculated based on the number and type of passthrough devices attached to the VM.

According to the doc above, each passthrough NVIDIA H100 (or H200) GPU requires 128 GB of MMIO space.

You can obtain more information about calculating the MMIO size in KB 323402. Please refer to the example, which explains how to calculate MMIO size based on the GPU size.

After adjusting MMIO settings, the VM will boot successfully.

Loading

What’s new at Nutanix University? NCP-MCA 6.10 and NCP-EUC 6.10 are open for scheduling

Nutanix Certified Professional – Multicloud Automation (NCP-MCA) 6.10 and Nutanix Certified Professional – End User Computing (NCP-EUC) 6.10 are ready to leave the beta state and are now open for scheduling, with the appointments starting on November 18, 2025.

Great news: now you can book one exam for free using the NCPMCAEUC610 voucher during checkout. It could be NCP-MCA or NCP-EUC. The voucher is valid only for one exam of your choice and only for the first 250 participants. So, hurry!

You can schedule both exams from the Nutanix University Certifications page.

And please remember to check out the updated courses: Nutanix Multicloud Automation Administration (NMCAA) and Nutanix End User Computing Administration (NEUCA). It will help you to prepare.

For more information, please check the official announce.

Loading

Updating VMware ESXi 9 cluster

In the previous articles, we updated VMware Cloud Foundation Operations and vCenter Server to version 9.0.1, and just to complete the series, I will add one more post about updating vSphere hosts using a single-cluster image.

Although the overall procedure for updating is the same and simple, you may have heard of or even faced a new token-based authentication to download updates from the Broadcom repositories, and in this article, I will cover this moment too.

Continue reading “Updating VMware ESXi 9 cluster”

Loading

Updating VMware vCenter Server 9

In the previous article, we updated VMware Cloud Foundation Operations to version 9.0.1 and now it is time to update vCenter Server.

Although the overall procedure for updating is the same and simple, as you may have heard, or even experienced, there is a new token-based authentication to download updates from the Broadcom repositories, and in this article, I will cover this moment too.

Continue reading “Updating VMware vCenter Server 9”

Loading

Veeam Backup & Replication 12.3.2.4165 Patch and critical security issues

Veeam just dropped a new KB, related to three critical security fixes:
CVE-2025-48983, CVSS v3.1 Score: 9.9:
A vulnerability in the Mount service of Veeam Backup & Replication, which allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user.

CVE-2025-48984, CVSS v3.1 Score: 9.9:
A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user.

Both vulnerabilities only impact domain-joined Veeam Backup & Replication v12.

The vulnerabilities affected all versions of Veeam Backup & Replication v12.3.2.3617 and earlier builds and were fixed in the latest VBR release, 12.3.2.4165, so consider updating as soon as possible.

One vulnerability is related to the Veeam agent for MS Windows.
CVE-2025-48982, CVSS v3.1 Score: 7.3:
This vulnerability in Veeam Agent for Microsoft Windows allows for Local Privilege Escalation if a system administrator is tricked into restoring a malicious file.

Consider updating your Veeam Agent for Microsoft Windows to version 6.3.2.1302.

Loading