From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id B637D704DF for ; Fri, 6 May 2022 13:23:50 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id AEA14C8D4 for ; Fri, 6 May 2022 13:23:50 +0200 (CEST) Received: from zen.jarasoft.net (zen.jarasoft.net [IPv6:2a10:3781:150:1::3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 2CB1FC8C9 for ; Fri, 6 May 2022 13:23:50 +0200 (CEST) Received: from [IPV6:2a10:3781:150:1:84d6:e1d:2c49:d214] (unknown [IPv6:2a10:3781:150:1:84d6:e1d:2c49:d214]) by zen.jarasoft.net (Postfix) with ESMTPSA id 300D8100C9; Fri, 6 May 2022 13:23:49 +0200 (CEST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.104.2 at zen.jarasoft.net Message-ID: Date: Fri, 6 May 2022 13:23:48 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.9.0 Reply-To: mlist@jarasoft.net Content-Language: nl To: Arjen , Proxmox VE user list References: <6c2c5815-01c6-23fc-9580-2c428fe6290c@jarasoft.net> From: Jack Raats Organization: Jack Raats, Steenbergen, Nederland In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-SPAM-LEVEL: Spam detection results: 0 AWL 1.721 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment NICE_REPLY_A -3.441 Looks like a legit reply (A) SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record T_SCC_BODY_TEXT_LINE -0.01 - Subject: Re: [PVE-User] Proces BOOTFB X-BeenThere: pve-user@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE user list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 May 2022 11:23:50 -0000 Op 05-05-2022 om 16:08 schreef Arjen: > On Thursday, May 5th, 2022 at 15:56, Jack Raats wrote: > >> Hi, >> >> At this moment I use proxmox 7.2-3. Before this version I could run a VM >> passthrough. >> On proxmox 7.2-3 I get an error that BAR1 doesn't have memory anymore. >> The memory ism occupied by a proces called BOOTFB. >> >> What is this proces doing? >> How to get the passthroug thing working again? >> >> Thanks >> Jack Raats > Before (with kernel 5.13) using video=efifb:off video=vesafb:off would fix this (at the expense of boot messages). > With 7.2 (or kernel 5.15), I would expect video=simplefb:off to fix this, but I my experience this does not work for every GPU. > > I found that, for AMD GPUs, unblacklisting amdgpu AND not early binding to vfio_pci AND removing those video= parameters works best. > amdgpu just takes over from the bootfb, and does release the GPU nicely to vfio_pci when starting the VM. > (Of course, for AMD vendor-reset and reset_method=device_specific might be required.) > I don't know if this also works for nouveau or i915. > > I hope this helps, > Arjen I've tried all the possible, but nothing works... Until I started the old kernel and everything worked perfectly! I think that amdgpu, which is included in the kernel, doesn't takes over from bootfb Greetings, Jack Raats