[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] VGA PASSTHROUGH not working :(
I did : [root@localhost ~]# modprobe -v xen-pciback [root@localhost ~]# lsmod | grep xen-pciback [root@localhost ~]# but not any output :( On Tuesday, May 17, 2016 7:30 PM, "sm8ax1@xxxxxxxxxxx" <sm8ax1@xxxxxxxxxxx> wrote: So the iommu /should/ be working at this point. Now we just need to hide the graphics card from the Dom0 operating system.
Check if xen-pciback is a module using `modprobe -v xen-pciback` or `lsmod | grep xen-pciback`. If xen-pciback is built as a module on your system, you need to make sure that your graphics driver a) is a module and not compiled-in, and b) the graphics driver cannot be loaded before xen-pciback (the article tells you how to achieve this), even in early userspace! I would recommend blacklisting the graphics driver too, just to be safe. See this article for the various methods of hiding PCI devices and the syntax to do so. http://wiki.xen.org/wiki/Xen_PCI_Passthrough#Preparing_a_device_for_passthrough As I said before, you'll want your DomU utilizing passthrough to be automatically started up on boot, because you probably won't be able to see anything on the screen until the DomU starts. Quoting Jason Long <hack3rcon@xxxxxxxxx>:
Well, it looks to me like you don't have an IOMMU. You can check your Intel processor http://ark.intel.com/ and look for "VT-d" support. There is probably a similar site for AMD, but they call it "IOMMU" support; same thing just different names. There might also be some way to check through `lshw` or `/proc/cpuinfo` or the like, but I don't know for sure.
The wiki mentions that generic PCI passthrough might still work on some graphics cards, even without an IOMMU, but I imagine your chances are pretty slim. Something to try perhaps is setting up your HVM to automatically start when the system is booted, with generic PCI passthrough enabled, and blacklist the module on the Dom0 and reboot. In theory this prevents the Dom0 driver from interfering with the HVM's configuration of the graphics card, but once again, it might work or it might not. http://wiki.xen.org/wiki/Xen_VGA_Passthrough http://wiki.xen.org/wiki/VTdHowTo If that doesn't work, your options are buy a new PC/processor with an IOMMU, or use VNC, Spice, SDL, GTK, etc. with userspace frontends in the Dom0. Spice with the QXL video driver is likely to give you the best performance, but even it won't compete with that of VGA passthrough. http://wiki.xen.org/wiki/SPICE_support_in_Xen If you go the route of upgrading your hardware, XenGT (now called "GVT-v for Xen") is something else to look into. The idea behind it is to allow multiple VMs to simultaneously use VGA passthrough in a safe and performant manner by creating multiple virtual graphics cards at the hardware level. At least as of Jan 2015, XenGT is being developed out-of-tree, but I haven't followed up on it as to whether it's been merged (or abandoned). If I recall correctly, this is supported on Intel 6th generation and newer processors with Intel HD 6000+ graphics, but you should definitely double check that. http://wiki.xen.org/wiki/XenGT https://blog.xenproject.org/2014/03/11/xen-graphics-virtualization-xengt/ http://events.linuxfoundation.org/sites/events/files/slides/XenGT-LinuxCollaborationSummit-final_1.pdf There used to be something called "Paravirtualized DRM", which probably worked like the paravirtualized framebuffer, only using the newer and faster Linux DRM API. This, I guess, would have allowed multiple rendering clients across multiple VMs to directly render their window contents just as they would on baremetal (with the PV DRM driver acting as a shim), without any kind of VGA/PCI passthrough. Unfortunately this effort has been abandoned, and I've been unable to track down the author or even the original code. http://wiki.xen.org/wiki/Paravirtualized_DRM Quoting Jason Long <hack3rcon@xxxxxxxxx>:
------------------------------------------------- ONLY AT VFEmail! - Use our Metadata Mitigator™ to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! No Bandwidth Quotas! 15GB disk space! Commercial and Bulk Mail Options! _______________________________________________
Xen-users mailing list Xen-users@xxxxxxxxxxxxx http://lists.xen.org/xen-users ------------------------------------------------- ONLY AT VFEmail! - Use our Metadata Mitigator™ to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! No Bandwidth Quotas! 15GB disk space! Commercial and Bulk Mail Options! _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxx http://lists.xen.org/xen-users _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxx http://lists.xen.org/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |