Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save gregorthebigmac/12845ee728781423a113122cd119610e to your computer and use it in GitHub Desktop.
Save gregorthebigmac/12845ee728781423a113122cd119610e to your computer and use it in GitHub Desktop.
# dmesg | grep ecap
[ 2.712243] DMAR: dmar0: reg_base_addr cfffe000 ver 1:0 cap c90780106f0462 ecap f0207e
-----------------------------------------------------------------------------
# dmesg | grep DMAR
[ 0.008188] ACPI: DMAR 0x00000000C762FE80 0001AA (v01 HP ProLiant 00000001 \xd2? 0000162E)
[ 0.732733] DMAR: IOMMU enabled
[ 1.387172] DMAR-IR: This system BIOS has enabled interrupt remapping
[ 2.712222] DMAR: Host address width 39
[ 2.712223] DMAR: DRHD base: 0x000000cfffe000 flags: 0x1
[ 2.712243] DMAR: dmar0: reg_base_addr cfffe000 ver 1:0 cap c90780106f0462 ecap f0207e
[ 2.712244] DMAR: RMRR base: 0x000000c77fc000 end: 0x000000c77fdfff
[ 2.712245] DMAR: RMRR base: 0x000000c77f5000 end: 0x000000c77fafff
[ 2.712246] DMAR: RMRR base: 0x000000c763e000 end: 0x000000c763ffff
[ 2.712247] DMAR: ATSR flags: 0x0
[ 2.712590] DMAR: dmar0: Using Queued invalidation
[ 2.719169] pci 0000:02:00.0: DMAR: Setting identity map [0xc763e000 - 0xc763ffff]
[ 2.719195] pci 0000:02:00.0: DMAR: Setting identity map [0xc77f5000 - 0xc77fafff]
[ 2.719200] pci 0000:02:00.0: DMAR: Device uses a private dma domain.
[ 2.719436] pci 0000:02:00.2: DMAR: Setting identity map [0xc763e000 - 0xc763ffff]
[ 2.719452] pci 0000:02:00.2: DMAR: Setting identity map [0xc77f5000 - 0xc77fafff]
[ 2.719456] pci 0000:02:00.2: DMAR: Device uses a private dma domain.
[ 2.720438] pci 0000:11:00.1: DMAR: Setting identity map [0xc763e000 - 0xc763ffff]
[ 2.720456] pci 0000:11:00.1: DMAR: Device uses a private dma domain.
[ 2.721396] pci 0000:17:00.0: DMAR: Setting identity map [0xc763e000 - 0xc763ffff]
[ 2.721416] pci 0000:17:00.0: DMAR: Device uses a private dma domain.
[ 2.721680] pci 0000:17:00.1: DMAR: Setting identity map [0xc763e000 - 0xc763ffff]
[ 2.721700] pci 0000:17:00.1: DMAR: Device uses a private dma domain.
[ 2.721976] pci 0000:18:00.0: DMAR: Setting identity map [0xc763e000 - 0xc763ffff]
[ 2.721996] pci 0000:18:00.0: DMAR: Device uses a private dma domain.
[ 2.722360] pci 0000:18:00.1: DMAR: Setting identity map [0xc763e000 - 0xc763ffff]
[ 2.722380] pci 0000:18:00.1: DMAR: Device uses a private dma domain.
[ 2.726931] DMAR: Intel(R) Virtualization Technology for Directed I/O
[ 2.959637] ata_piix 0000:00:1f.2: DMAR: 32bit DMA uses non-identity mapping
[ 2.962244] ehci-pci 0000:00:1d.7: DMAR: Setting identity map [0xc77fc000 - 0xc77fdfff]
[ 2.962269] ehci-pci 0000:00:1d.7: DMAR: 32bit DMA uses non-identity mapping
[ 2.980641] uhci_hcd 0000:00:1d.0: DMAR: Setting identity map [0xc77f5000 - 0xc77fafff]
[ 2.980666] uhci_hcd 0000:00:1d.0: DMAR: 32bit DMA uses non-identity mapping
[ 2.981865] uhci_hcd 0000:00:1d.1: DMAR: Setting identity map [0xc77f5000 - 0xc77fafff]
[ 2.981893] uhci_hcd 0000:00:1d.1: DMAR: 32bit DMA uses non-identity mapping
[ 2.982972] uhci_hcd 0000:00:1d.2: DMAR: Setting identity map [0xc77f5000 - 0xc77fafff]
[ 2.982997] uhci_hcd 0000:00:1d.2: DMAR: 32bit DMA uses non-identity mapping
[ 2.984225] uhci_hcd 0000:00:1d.3: DMAR: Setting identity map [0xc77f5000 - 0xc77fafff]
[ 2.984250] uhci_hcd 0000:00:1d.3: DMAR: 32bit DMA uses non-identity mapping
[ 2.985143] uhci_hcd 0000:02:00.4: DMAR: Setting identity map [0xc77f5000 - 0xc77fafff]
[ 2.985170] uhci_hcd 0000:02:00.4: DMAR: 32bit DMA uses non-identity mapping
-----------------------------------------------------------------------------
# ls -la /etc/modprobe.d
total 24
drwxr-xr-x 2 root root 4096 Apr 27 17:53 .
drwxr-xr-x 89 root root 4096 Apr 27 10:10 ..
-rw-r--r-- 1 root root 51 Apr 27 16:41 iommu_unsafe_interrupts.conf
-rw-r--r-- 1 root root 26 Apr 27 15:51 kvm.conf
-rw-r--r-- 1 root root 206 Apr 27 15:49 pve-blacklist.conf
-rw-r--r-- 1 root root 65 Apr 27 15:53 vfio.conf
-----------------------------------------------------------------------------
# cat /etc/modprobe.d iommu_unsafe_interrupts.conf
options vfio_iommu_type1 allow_unsafe_interrupts=1
-----------------------------------------------------------------------------
# cat /etc/modprobe.d/kvm.conf
options kvm ignore_msrs=1
-----------------------------------------------------------------------------
# cat /etc/modprobe.d/
pve-blacklist.conf
# This file contains a list of modules which are not supported by Proxmox VE
# nidiafb see bugreport https://bugzilla.proxmox.com/show_bug.cgi?id=701
blacklist nvidiafb
blacklist nvidia
blacklist nouveau
-----------------------------------------------------------------------------
# cat /etc/modprobe.d/vfio.conf
options vfio-pci ids=10de:06dd,10de:0be5,10de:0780 disable_vga=1
-----------------------------------------------------------------------------
# lspci -nnk | grep NVIDIA
11:00.0 VGA compatible controller [0300]: NVIDIA Corporation GF100GL [Quadro 4000] [10de:06dd] (rev a3)
Subsystem: NVIDIA Corporation GF100GL [Quadro 4000] [10de:0780]
11:00.1 Audio device [0403]: NVIDIA Corporation GF100 High Definition Audio Controller [10de:0be5] (rev a1)
Subsystem: NVIDIA Corporation GF100 High Definition Audio Controller [10de:0780]
-----------------------------------------------------------------------------
# cat /etc/modules
# /etc/modules: kernel modules to load at boot time.
#
# This file contains the names of kernel modules that should be loaded
# at boot time, one per line. Lines beginning with "#" are ignored.
vfio
vfio_iommu_type1
vfio_pci
vfio_virqfd
-----------------------------------------------------------------------------
# cat /etc/default/grub
# If you change this file, run 'update-grub' afterwards to update
# /boot/grub/grub.cfg.
# For full documentation of the options in this file, see:
# info -f grub -n 'Simple configuration'
GRUB_DEFAULT=0
GRUB_TIMEOUT=3
GRUB_DISTRIBUTOR="Proxmox Virtual Environment"
GRUB_CMDLINE_LINUX_DEFAULT="quiet intel_iommu=on iommu=pt,pcie_acs_override=downstream,multifunction nofb nomodeset video=vesafb:off,efifb:off"
GRUB_CMDLINE_LINUX=""
# Disable os-prober, it might add menu entries for each guest
GRUB_DISABLE_OS_PROBER=true
# Uncomment to enable BadRAM filtering, modify to suit your needs
# This works with Linux (no patch required) and with any kernel that obtains
# the memory map information from GRUB (GNU Mach, kernel of FreeBSD ...)
#GRUB_BADRAM="0x01234567,0xfefefefe,0x89abcdef,0xefefefef"
# Uncomment to disable graphical terminal (grub-pc only)
#GRUB_TERMINAL=console
# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command `vbeinfo'
#GRUB_GFXMODE=640x480
# Uncomment if you don't want GRUB to pass "root=UUID=xxx" parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true
# Disable generation of recovery mode menu entries
GRUB_DISABLE_RECOVERY="true"
# Uncomment to get a beep at grub start
#GRUB_INIT_TUNE="480 440 1"
-----------------------------------------------------------------------------
# find /sys/kernel/iommu_groups/ -type l
/sys/kernel/iommu_groups/17/devices/0000:00:1f.2
/sys/kernel/iommu_groups/17/devices/0000:00:1f.0
/sys/kernel/iommu_groups/35/devices/0000:3f:06.1
/sys/kernel/iommu_groups/35/devices/0000:3f:06.2
/sys/kernel/iommu_groups/35/devices/0000:3f:06.0
/sys/kernel/iommu_groups/35/devices/0000:3f:06.3
/sys/kernel/iommu_groups/7/devices/0000:00:07.0
/sys/kernel/iommu_groups/25/devices/0000:3e:02.5
/sys/kernel/iommu_groups/25/devices/0000:3e:02.3
/sys/kernel/iommu_groups/25/devices/0000:3e:02.1
/sys/kernel/iommu_groups/25/devices/0000:3e:02.4
/sys/kernel/iommu_groups/25/devices/0000:3e:02.2
/sys/kernel/iommu_groups/25/devices/0000:3e:02.0
/sys/kernel/iommu_groups/15/devices/0000:00:1d.3
/sys/kernel/iommu_groups/15/devices/0000:00:1d.1
/sys/kernel/iommu_groups/15/devices/0000:00:1d.2
/sys/kernel/iommu_groups/15/devices/0000:00:1d.0
/sys/kernel/iommu_groups/15/devices/0000:00:1d.7
/sys/kernel/iommu_groups/33/devices/0000:3f:04.2
/sys/kernel/iommu_groups/33/devices/0000:3f:04.0
/sys/kernel/iommu_groups/33/devices/0000:3f:04.3
/sys/kernel/iommu_groups/33/devices/0000:3f:04.1
/sys/kernel/iommu_groups/5/devices/0000:00:05.0
/sys/kernel/iommu_groups/23/devices/0000:19:00.0
/sys/kernel/iommu_groups/13/devices/0000:00:14.1
/sys/kernel/iommu_groups/13/devices/0000:00:14.2
/sys/kernel/iommu_groups/13/devices/0000:00:14.0
/sys/kernel/iommu_groups/31/devices/0000:3f:02.5
/sys/kernel/iommu_groups/31/devices/0000:3f:02.3
/sys/kernel/iommu_groups/31/devices/0000:3f:02.1
/sys/kernel/iommu_groups/31/devices/0000:3f:02.4
/sys/kernel/iommu_groups/31/devices/0000:3f:02.2
/sys/kernel/iommu_groups/31/devices/0000:3f:02.0
/sys/kernel/iommu_groups/3/devices/0000:00:03.0
/sys/kernel/iommu_groups/21/devices/0000:17:00.1
/sys/kernel/iommu_groups/21/devices/0000:16:02.0
/sys/kernel/iommu_groups/21/devices/0000:17:00.0
/sys/kernel/iommu_groups/11/devices/0000:00:0d.0
/sys/kernel/iommu_groups/11/devices/0000:00:0d.5
/sys/kernel/iommu_groups/11/devices/0000:00:0d.3
/sys/kernel/iommu_groups/11/devices/0000:00:0d.1
/sys/kernel/iommu_groups/11/devices/0000:00:0d.6
/sys/kernel/iommu_groups/11/devices/0000:00:0d.4
/sys/kernel/iommu_groups/11/devices/0000:00:0d.2
/sys/kernel/iommu_groups/1/devices/0000:00:01.0
/sys/kernel/iommu_groups/28/devices/0000:3e:05.0
/sys/kernel/iommu_groups/28/devices/0000:3e:05.3
/sys/kernel/iommu_groups/28/devices/0000:3e:05.1
/sys/kernel/iommu_groups/28/devices/0000:3e:05.2
/sys/kernel/iommu_groups/18/devices/0000:05:00.0
/sys/kernel/iommu_groups/8/devices/0000:00:08.0
/sys/kernel/iommu_groups/26/devices/0000:3e:03.1
/sys/kernel/iommu_groups/26/devices/0000:3e:03.4
/sys/kernel/iommu_groups/26/devices/0000:3e:03.2
/sys/kernel/iommu_groups/26/devices/0000:3e:03.0
/sys/kernel/iommu_groups/16/devices/0000:01:03.0
/sys/kernel/iommu_groups/16/devices/0000:00:1e.0
/sys/kernel/iommu_groups/34/devices/0000:3f:05.3
/sys/kernel/iommu_groups/34/devices/0000:3f:05.1
/sys/kernel/iommu_groups/34/devices/0000:3f:05.2
/sys/kernel/iommu_groups/34/devices/0000:3f:05.0
/sys/kernel/iommu_groups/6/devices/0000:00:06.0
/sys/kernel/iommu_groups/24/devices/0000:3e:00.0
/sys/kernel/iommu_groups/24/devices/0000:3e:00.1
/sys/kernel/iommu_groups/14/devices/0000:03:00.0
/sys/kernel/iommu_groups/14/devices/0000:00:1c.0
/sys/kernel/iommu_groups/14/devices/0000:02:00.2
/sys/kernel/iommu_groups/14/devices/0000:02:00.0
/sys/kernel/iommu_groups/14/devices/0000:04:00.1
/sys/kernel/iommu_groups/14/devices/0000:03:00.1
/sys/kernel/iommu_groups/14/devices/0000:00:1c.4
/sys/kernel/iommu_groups/14/devices/0000:04:00.0
/sys/kernel/iommu_groups/14/devices/0000:00:1c.2
/sys/kernel/iommu_groups/14/devices/0000:02:00.4
/sys/kernel/iommu_groups/32/devices/0000:3f:03.4
/sys/kernel/iommu_groups/32/devices/0000:3f:03.2
/sys/kernel/iommu_groups/32/devices/0000:3f:03.0
/sys/kernel/iommu_groups/32/devices/0000:3f:03.1
/sys/kernel/iommu_groups/4/devices/0000:00:04.0
/sys/kernel/iommu_groups/22/devices/0000:18:00.0
/sys/kernel/iommu_groups/22/devices/0000:16:04.0
/sys/kernel/iommu_groups/22/devices/0000:18:00.1
/sys/kernel/iommu_groups/12/devices/0000:00:0e.3
/sys/kernel/iommu_groups/12/devices/0000:00:0e.1
/sys/kernel/iommu_groups/12/devices/0000:00:0e.4
/sys/kernel/iommu_groups/12/devices/0000:00:0e.2
/sys/kernel/iommu_groups/12/devices/0000:00:0e.0
/sys/kernel/iommu_groups/30/devices/0000:3f:00.0
/sys/kernel/iommu_groups/30/devices/0000:3f:00.1
/sys/kernel/iommu_groups/2/devices/0000:00:02.0
/sys/kernel/iommu_groups/20/devices/0000:15:00.0
/sys/kernel/iommu_groups/10/devices/0000:00:0a.0
/sys/kernel/iommu_groups/29/devices/0000:3e:06.3
/sys/kernel/iommu_groups/29/devices/0000:3e:06.1
/sys/kernel/iommu_groups/29/devices/0000:3e:06.2
/sys/kernel/iommu_groups/29/devices/0000:3e:06.0
/sys/kernel/iommu_groups/0/devices/0000:00:00.0
/sys/kernel/iommu_groups/19/devices/0000:11:00.1
/sys/kernel/iommu_groups/19/devices/0000:11:00.0
/sys/kernel/iommu_groups/9/devices/0000:00:09.0
/sys/kernel/iommu_groups/27/devices/0000:3e:04.2
/sys/kernel/iommu_groups/27/devices/0000:3e:04.0
/sys/kernel/iommu_groups/27/devices/0000:3e:04.3
/sys/kernel/iommu_groups/27/devices/0000:3e:04.1
-----------------------------------------------------------------------------
# cat /etc/pve/qemu-server/100.conf
agent: 1
balloon: 512
bios: ovmf
bootdisk: scsi0
cores: 4
cpu: host
efidisk0: local:100/vm-100-disk-1.qcow2,size=128K
hostpci1: 11:00,pcie=1
ide2: local:iso/ubuntu-16.04.4-server-amd64.iso,media=cdrom
machine: q35
memory: 16384
name: gpu-test
net0: virtio=CE:68:54:87:EA:13,bridge=vmbr1,firewall=1
numa: 0
ostype: l26
scsi0: local:100/vm-100-disk-0.qcow2,cache=unsafe,discard=on,size=128G
scsihw: virtio-scsi-single
smbios1: uuid=d895c6d8-8b31-4fa1-be00-6feb6489a902
sockets: 2
vga: virtio
vmgenid: 29adba47-ef9c-4877-8952-ecd7e6588472
-----------------------------------------------------------------------------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment