Hi all, We are pleased to announce an update of Intel GVT-g for KVM. Intel GVT-g for KVM (a.k.a. KVMGT) is a full GPU virtualization solution with mediated pass-through, starting from 5th generation Intel Core(TM) processors with Intel processor graphics. A virtual GPU instance is maintained for each VM, with part of performance critical resources directly assigned. The capability of running native graphics driver inside a VM, without hypervisor intervention in performance critical paths, achieves a good balance among performance, feature, and sharing capability. Repositories: - Kernel: https://github.com/01org/gvt-linux/ (tag: 2017-q2-gvt-stable-4.11) - Qemu: https://github.com/01org/igvtg-qemu (tag: 2017-q2-stable-2.9.0) This update consists of: - GVT-g upgraded to new architecture which has been upstreamed from kernel 4.10. - QEMU version upgraded to 2.9 from 2.3 (There is no any specific code changes in QEMU for KVMGT, so people could directly use upstream QEMU as an alternative). - Supported server platforms: Intel(r) Xeon(r) E3_v4 and E3_v5 with Intel Graphics processor. - Supported client platforms: Intel(r) Core(tm) 5th generation (code name: Broadwell) and 6th generation (code name: Skylake). - Validated Guest OS: Windows7 32bit, Window7 64bit, Windows8.1 64bit, Windows10 64bit and Linux. - GVT-g only supports remote display not local display by this release. - Remote protocol: only guest-side remoting protocol is supported, host-side remoting connection like SPICE is working in progress. For example, user can use X11VNC for Guest Linux VM or TightVNC for Guest Windows VM. Limitation or known issues: - GVT-g can support maximum 7 Guest VMs due to host graphics resource limitation. When user runs 7 VMs simultaneously, host OS can only run in text mode. - In order to support Guest Windows7 32bit VM, user can only uses vGPU type1, type2, type4 not type8 because Guest Windows7 32bit VM needs more graphics resource than other Guest VM. - Some 3rd party applications/tools like GPU_Z, Passmark 9.0 may read/write GPU MSR directly, it will trigger VM BSOD since those MSRs are unhandled registers in KVMGT. The workaround is to set MSR read /write ignore flag to 1 in host grub file by adding "kvm.ignore_msrs=1". - In corner case, Guest Linux VM virtual display screen may freeze and not be able to recover when Guest VM runs into a TDR, but the Guest VM is still running and alive which can be accessed through SSH. Setup guide: https://github.com/01org/gvt-linux/wiki/GVTg_Setup_Guide This is the first GVT-g community release based on new Upstream architecture design, refer to the following document for new architecture introduction: https://01.org/igvt-g/documentation/intel-gvt-g-new-architecture-introduction Please subscribe to join the mailing list if you want to learn more about GVT-g project: https://lists.01.org/mailman/listinfo/igvt-g Please subscribe to join the mailing list if you want to contribute/review latest GVT-g upstream patches: https://lists.freedesktop.org/mailman/listinfo/intel-gvt-dev Official GVT-g portal: https://01.org/igvt-g More information about background, architecture and others about Intel GVT-g, can be found at: http://www.linux-kvm.org/images/f/f3/01x08b-KVMGT-a.pdf https://www.usenix.org/conference/atc14/technical-sessions/presentation/tian Note: The KVMGT project should be considered a work in progress. As such it is not a complete product nor should it be considered one. Extra care should be taken when testing and configuring a system to use the KVMGT project. Thanks Terrence Tel: +86-21-6116 5390 MP: +86-1356 4367 024 Mail: terrence.xu@xxxxxxxxx _______________________________________________ iGVT-g mailing list iGVT-g@xxxxxxxxxxxx https://lists.01.org/mailman/listinfo/igvt-g