Passtrough iGPU not working

Oggy512

Member
Oct 18, 2020
25
1
8
36
Hi folks,
I'm reading and testing now for two days, but I can't get it running and hope for a hint from you guys.

My HW:
Board: Supermicro X11SCH-LN4F with C246 chipset
CPU: Intel Xeon E-2176G

Soft;
Proxmox 7.4-3
Kernel: 5.15.107-1-pve

Goal:
Setting up a VM (or LXC) with Frigate and passing iGPU trough this VM. I'm using PCIe Passtrough already for a HBA, which I'm passing into my TrueNAS VM, that is working for years now. But I'm not able to passtrough the iGPU (full) or virtual GPU via GVT.
IOMMU is on, kernel cmd line is edited , modules enabled. According to my findings, the host does not load the driver for the GPU (" Kernel driver in use: vfio-pci"), but I can't start the VM if I configure the PCI device to it.
First, I followed this HowTo to full-passtrough and then I tried this, as well as several other tips and how-tos. Nothing is working.
With full PT I get the error as show below, and I can't get split GVT working, since I'm not seeing any MDEV device to choose in VM config.


Any ideas?


Error:
Code:
[  146.428461] vfio-pci 0000:00:02.0: can't derive routing for PCI INT A
[  146.428784] vfio-pci 0000:00:02.0: PCI INT A: not connected
[  146.536357] vfio-pci 0000:00:02.0: vfio_ecap_init: hiding ecap 0x1b@0x100


etc/default/grub
Code:
GRUB_CMDLINE_LINUX_DEFAULT="quiet intel_iommu=on iommu=pt i915.enable_gvt=1 drm.debug=0 pcie_acs_override=downstream,multifunction video=efifb:off video=vesa:off vfio_iommu_type1.allow_unsafe_interrupts=1 kvm.ignore_msrs=1 modprobe.blacklist=radeon,nouveau,nvidia,nvidiafb,nvidia-gpu"


etc/modules
Code:
coretemp
vfio
vfio_iommu_type1
vfio_pci
vfio_virqfd

kvmgt
vfio-mdev

etc/modprobe.d/blacklist
Code:
blacklist mpt3sas
blacklist snd_hda_intel
blacklist snd_hda_codec_hdmi
blacklist i915

etc/modprobe.d/vfio.conf
Code:
options vfio-pci ids=1000:0087,8086:3e96 disable_vga=1


dmesg|grep -e DMAR -e IOMMU
Code:
[    0.000000] Warning: PCIe ACS overrides enabled; This may allow non-IOMMU protected peer-to-peer DMA
[    0.006999] ACPI: DMAR 0x000000007956DC38 0000A8 (v01 INTEL  EDK2     00000002      01000013)
[    0.007040] ACPI: Reserving DMAR table memory at [mem 0x7956dc38-0x7956dcdf]
[    0.078619] DMAR: IOMMU enabled
[    0.204366] DMAR: Host address width 39
[    0.204368] DMAR: DRHD base: 0x000000fed90000 flags: 0x0
[    0.204372] DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e
[    0.204375] DMAR: DRHD base: 0x000000fed91000 flags: 0x1
[    0.204378] DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da
[    0.204380] DMAR: RMRR base: 0x00000079eb1000 end: 0x0000007a0fafff
[    0.204382] DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff
[    0.204385] DMAR-IR: IOAPIC id 2 under DRHD base  0xfed91000 IOMMU 1
[    0.204387] DMAR-IR: HPET id 0 under DRHD base 0xfed91000
[    0.204388] DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping.
[    0.207484] DMAR-IR: Enabled IRQ remapping in x2apic mode
[    0.524740] DMAR: No ATSR found
[    0.524742] DMAR: No SATC found
[    0.524743] DMAR: IOMMU feature fl1gp_support inconsistent
[    0.524744] DMAR: IOMMU feature pgsel_inv inconsistent
[    0.524746] DMAR: IOMMU feature nwfs inconsistent
[    0.524747] DMAR: IOMMU feature pasid inconsistent
[    0.524749] DMAR: IOMMU feature eafs inconsistent
[    0.524750] DMAR: IOMMU feature prs inconsistent
[    0.524751] DMAR: IOMMU feature nest inconsistent
[    0.524753] DMAR: IOMMU feature mts inconsistent
[    0.524754] DMAR: IOMMU feature sc_support inconsistent
[    0.524755] DMAR: IOMMU feature dev_iotlb_support inconsistent
[    0.524757] DMAR: dmar0: Using Queued invalidation
[    0.524761] DMAR: dmar1: Using Queued invalidation
[    0.527235] DMAR: Intel(R) Virtualization Technology for Directed I/O


dmesg | grep -i vfio
Code:
[   17.281797] VFIO - User Level meta-driver version: 0.3
[   17.532656] vfio_pci: add [1000:0087[ffffffff:ffffffff]] class 0x000000/00000000
[   17.556812] vfio_pci: add [8086:3e96[ffffffff:ffffffff]] class 0x000000/00000000
[  146.428461] vfio-pci 0000:00:02.0: can't derive routing for PCI INT A
[  146.428784] vfio-pci 0000:00:02.0: PCI INT A: not connected
[  146.536357] vfio-pci 0000:00:02.0: vfio_ecap_init: hiding ecap 0x1b@0x100


find /sys/kernel/iommu_groups/ -type l
Code:
/sys/kernel/iommu_groups/17/devices/0000:00:1e.0
/sys/kernel/iommu_groups/7/devices/0000:00:15.1
/sys/kernel/iommu_groups/7/devices/0000:00:15.0
/sys/kernel/iommu_groups/25/devices/0000:09:00.0
/sys/kernel/iommu_groups/25/devices/0000:0a:00.0
/sys/kernel/iommu_groups/15/devices/0000:00:1c.0
/sys/kernel/iommu_groups/5/devices/0000:00:12.0
/sys/kernel/iommu_groups/23/devices/0000:06:00.0
/sys/kernel/iommu_groups/13/devices/0000:00:1b.6
/sys/kernel/iommu_groups/3/devices/0000:00:02.0
/sys/kernel/iommu_groups/21/devices/0000:04:00.0
/sys/kernel/iommu_groups/11/devices/0000:00:1b.4
/sys/kernel/iommu_groups/1/devices/0000:00:01.0
/sys/kernel/iommu_groups/18/devices/0000:00:1f.0
/sys/kernel/iommu_groups/18/devices/0000:00:1f.5
/sys/kernel/iommu_groups/18/devices/0000:00:1f.4
/sys/kernel/iommu_groups/8/devices/0000:00:16.4
/sys/kernel/iommu_groups/8/devices/0000:00:16.0
/sys/kernel/iommu_groups/8/devices/0000:00:16.1
/sys/kernel/iommu_groups/16/devices/0000:00:1c.1
/sys/kernel/iommu_groups/6/devices/0000:00:14.2
/sys/kernel/iommu_groups/6/devices/0000:00:14.0
/sys/kernel/iommu_groups/24/devices/0000:07:00.0
/sys/kernel/iommu_groups/14/devices/0000:00:1b.7
/sys/kernel/iommu_groups/4/devices/0000:00:08.0
/sys/kernel/iommu_groups/22/devices/0000:05:00.0
/sys/kernel/iommu_groups/12/devices/0000:00:1b.5
/sys/kernel/iommu_groups/2/devices/0000:00:01.1
/sys/kernel/iommu_groups/20/devices/0000:02:00.0
/sys/kernel/iommu_groups/10/devices/0000:00:1b.0
/sys/kernel/iommu_groups/0/devices/0000:00:00.0
/sys/kernel/iommu_groups/19/devices/0000:01:00.0
/sys/kernel/iommu_groups/9/devices/0000:00:17.0


lspci -nvks 00:02.0
Code:
00:02.0 0380: 8086:3e96
        Subsystem: 15d9:1b11
        Flags: fast devsel, IRQ -2147483648, IOMMU group 3
        Memory at 90000000 (64-bit, non-prefetchable) [size=16M]
        Memory at 80000000 (64-bit, prefetchable) [size=256M]
        I/O ports at 9000 [size=64]
        Capabilities: [40] Vendor Specific Information: Len=0c <?>
        Capabilities: [70] Express Root Complex Integrated Endpoint, MSI 00
        Capabilities: [ac] MSI: Enable- Count=1/1 Maskable- 64bit-
        Capabilities: [d0] Power Management version 2
        Capabilities: [100] Process Address Space ID (PASID)
        Capabilities: [200] Address Translation Service (ATS)
        Capabilities: [300] Page Request Interface (PRI)
        Kernel driver in use: vfio-pci
        Kernel modules: i915
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!