[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [iGVT-g] [vfio-users] [PATCH v3 00/11] igd passthrough chipset tweaks



On Tue, 2016-02-02 at 00:04 +0000, Kay, Allen M wrote:
>Â
> > -----Original Message-----
> > From: Alex Williamson [mailto:alex.williamson@xxxxxxxxxx]
> > Sent: Sunday, January 31, 2016 9:42 AM
> > To: Kay, Allen M; Gerd Hoffmann; David Woodhouse
> > Cc: igvt-g@xxxxxxxxxxx; xen-devel@xxxxxxxxxxxxxxxxxxx; Eduardo Habkost;
> > Stefano Stabellini; qemu-devel@xxxxxxxxxx; Cao jin; vfio-
> > users@xxxxxxxxxx
> > Subject: Re: [iGVT-g] [vfio-users] [PATCH v3 00/11] igd passthrough chipset
> > tweaks
>
> > On Sat, 2016-01-30 at 01:18 +0000, Kay, Allen M wrote:
> > >Â
> > > > -----Original Message-----
> > > > From: iGVT-g [mailto:igvt-g-bounces@xxxxxxxxxxxx] On Behalf Of Alex
> > > > Williamson
> > > > Sent: Friday, January 29, 2016 10:00 AM
> > > > To: Gerd Hoffmann
> > > > Cc: igvt-g@xxxxxxxxxxx; xen-devel@xxxxxxxxxxxxxxxxxxx; Eduardo
> > > > Habkost; Stefano Stabellini; qemu-devel@xxxxxxxxxx; Cao jin; vfio-
> > > > users@xxxxxxxxxx
> > > > Subject: Re: [iGVT-g] [vfio-users] [PATCH v3 00/11] igd passthrough
> > > > chipset tweaks
> > > >Â
> > > > Do guest drivers depend on IGD appearing at 00:02.0?ÂÂI'm currently
> > > > testing for any Intel VGA device, but I wonder if I should only be
> > > > enabling anything opregion if it also appears at a specific address.
> > > >Â
> > >Â
> > > No.ÂÂBoth Windows and Linux IGD driver should work at any PCI slot.ÂÂWe
> > have seen 0:5.0 in the guest and the driver works.
>
> > Thanks Allen.ÂÂAnother question, when I boot a VM with an assigned HD
> > P4000 GPU, my console stream with IOMMU faults, like:
>
> > DMAR: DMAR:[DMA Write] Request device [00:02.0] fault addr 9fa30000
> > DMAR: DMAR:[DMA Write] Request device [00:02.0] fault addr 9fa30000
> > DMAR: DMAR:[DMA Write] Request device [00:02.0] fault addr 9fa30000
> > DMAR: DMAR:[DMA Write] Request device [00:02.0] fault addr 9fa30000
> > DMAR: DMAR:[DMA Write] Request device [00:02.0] fault addr 9fa30000
>
> > All of these fall within the host RMRR range for the device:
>
> > DMAR: Setting RMRR:
> > DMAR: Setting identity map for device 0000:00:02.0 [0x9f800000 - 0xaf9fffff]
>Â
> Hi Alex,
>Â
> Do you configure IGD as primary or secondary display in your KVM setup?ÂÂÂIf 
> primary, are you running Intel vBIOS as part of guest boot?
>Â
> On BDW/SKL systems, we have started to configure IGD as secondary and QEMU 
> VGA and primary.ÂÂIn this setup, we are no longer running vBIOS in the guest 
> which avoids some complications.ÂÂvBIOS uses
> stolen memory for display buffers which requires RMRR mapping.ÂÂWe have been 
> using similar setup (IGD as secondary) on other hypervisors and have not seen 
> IOMMU faults.
>Â
> I will setup a KVM configuration on my SKL and see if I can duplicate your 
> problem here.ÂÂÂI will try to call into Don's Thursday meeting to discuss 
> this (I'm on call for jury duty this week).ÂÂI
> will give you a heads up on Wednesday evening.

Hi Allen,

I'm currently trying to run as primary, but I don't get any output until
well into the guest boot, so clearly the Intel vBIOS is not happy,
regardless of whether I provide VGA region access.ÂÂWhen I try to run as
secondary I don't get any output at all on the assigned device and the
FC23 Live CD I'm booting doesn't appear to see the IGD output.ÂÂI've
only just started playing with actually using it though, so perhaps I
haven't dialed it in just yet.ÂÂI will note though that the DMAR faults
are well after the vBIOS would have been run, I see the i915 driver
reads the stolen memory base from config register 0x5c.ÂÂEmulating this
register as returning 0x0 avoids the DMAR faults and fixes corruption of
the framebuffer, so this doesn't appear to be exclusive to the vBIOS.

Regardless of which we intend to support, device assignment is an
advanced topic for most users and I think we need to do something to
protect users from having their VM memory stomped on by an IGD device
writing framebuffer data over RAM.ÂÂThanks,

Alex


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.