This repo is a code snapshot of the i915 and xe modules from the mainline linux kernel with SR-IOV support ported from the intel/mainline-tracking.git
Disclaimer: This repository is a community project and is NOT affiliated with, endorsed by, or connected to Intel Corporation. This kernel module is a port based on the mainline kernel and Intel's implementation and may contain experimental and unstable features. Please use it at your own risk.
This package is highly experimental, you should only use it when you know what you are doing.
You need to install this dkms module in both host and guest!
Required kernel: 6.12.x ~ 6.18.x
For older kernel (v6.8 ~ v6.12), please use the 2025.07.22 release.
For v6.1 ~ v6.7, please use intel-lts-v6.1 branch instead.
It is recommended that to upgrade to a supported kernel, the older branches will no longer be maintained.
Note on Secure Boot: Loading out-of-tree kernel modules requires Secure Boot to be disabled. If you require Secure Boot, ensure you are using a signed kernel and follow the instructions in the UEFI Secure Boot Enabled Configuration section to sign the module.
Starting from the current version, this repo provides both the i915 and xe drivers. You can switch between them by modifying the kernel parameters.
intel_iommu=on i915.enable_guc=3 i915.max_vfs=7 module_blacklist=xe
intel_iommu=on xe.max_vfs=7 xe.force_probe=${device_id} module_blacklist=i915
Xe module currently does not support MTL (Meteor Lake) and LNL (Lunar Lake) platforms. Please use i915 instead.
Replace ${device_id} with the output from cat /sys/devices/pci0000:00/0000:00:02.0/device command
echo 7 > /sys/devices/pci0000:00/0000:00:02.0/sriov_numvfs
You can create up to 7 VFs on Intel UHD Graphics
-
Install the kernel headers. Note that if you are using a different kernel, replace the package name, such as
linux-headers,linux-zen-headersorlinux-lts-headers. -
For Arch Linux users, i915-sriov-dkms is available in AUR, you can install it with
yay -S i915-sriov-dkms. Or you can download the package from the Releases Page and install it withpacman -U. -
Add required kernel parameters based on your bootloader. You can refer to the Arch Linux Wiki here.
-
Regenerate the initramfs images. Such as
sudo mkinitcpio -P. -
Optionally use
systemd-tmpfilesto set the number of VFs on boot. The package includes a configuration file at/etc/tmpfiles.d/i915-set-sriov-numvfs.conf. Edit it and uncomment the line, changing the argument to the number of VFs you want:w /sys/devices/pci0000:00/0000:00:02.0/sriov_numvfs - - - - 7 -
Reboot.
For NixOS users, the i915-sriov kernel module can be directly included in your NixOS configuration without the use of DKMS. In particular, the kernel module is provided as a NixOS module that must be included in your NixOS configuration. This NixOS module places the i915-sriov kernel module via an overlay in your pkgs attribute set with the attribute name i915-sriov. This kernel module can then be included in your configuration by declaring boot.extraModulePackages = [ pkgs.i915-sriov ]; The same applies also to xe-sriov. It is recommened to set inputs.nixpkgs.follows = "nixpkgs" to avoid version mismatch.
- Install build tools:
apt install build-* dkms - Install the kernel and headers for desired version:
apt install proxmox-default-kernel proxmox-default-headers(for unsigned kernel). - Download deb package from the releases page
wget -O /tmp/i915-sriov-dkms_2026.02.04_amd64.deb "https://github.com/strongtz/i915-sriov-dkms/releases/download/2026.02.04/i915-sriov-dkms_2026.02.04_amd64.deb" - Install the deb package with dpkg:
dpkg -i /tmp/i915-sriov-dkms_2026.02.04_amd64.deb - Once finished, the kernel commandline needs to be adjusted:
nano /etc/default/gruband changeGRUB_CMDLINE_LINUX_DEFAULTtointel_iommu=on i915.enable_guc=3 i915.max_vfs=7 module_blacklist=xe, or add to it if you have other arguments there already. - You can also use
xedriver instead ofi915as described in the Required Kernel Parameters section. - Update
grubandinitramfsby executingupdate-grubandupdate-initramfs -u - Optionally pin the kernel version and update the boot config via
proxmox-boot-tool. - In order to enable the VFs, a
sysfsattribute must be set. Installsysfsutils, then doecho "devices/pci0000:00/0000:00:02.0/sriov_numvfs = 7" > /etc/sysfs.conf. - Reboot the system.
- When the system is back up again, you should see the number of VFs under 02:00.1 - 02:00.7.
- You can passthrough the VFs to LXCs or VMs. However, never pass the PF (02:00.0) to VM which would crash all other VFs.
While enables VFs, leaving VFs exposed to the host can lead to system instability and software conflicts. In certain desktop environments, hot-plugging or unbinding VFs while assigning them to KVM virtual machines can trigger a complete GUI session crash (See issue#279). Many host-side applications that utilize the iGPU (e.g., Media Servers like Emby/Plex or monitoring tools like intel_gpu_top) may incorrectly identify and attempt to use the VFs. This often results in abnormal output, failed hardware transcoding, or initialization errors. VFs provide no functional benefit to the host environment; their sole purpose is to serve guest virtual machines.
To ensure host stability and performance, it is highly recommended to block these VFs from the host operating system. This ensures the host interacts exclusively with the Physical Function (PF) at address 0000:00:02.0, leaving the VFs "invisible" until they are passed through to a guest.
Here are the steps, tested on Arch Linux, Ubuntu, PVE host:
-
Enable
vfiomodule:echo "vfio-pci" | sudo tee /etc/modules-load.d/vfio.conf
-
Run
cat /sys/devices/pci0000:00/0000:00:02.0/deviceto find your iGPU's Device ID (for example, here isa7a0). -
Create the udev rule: Execute the following command (ensure you replace
a7a0with your actual Device ID):sudo tee /etc/udev/rules.d/99-i915-vf-vfio.rules <<EOF # Bind all i915 VFs (00:02.1 to 00:02.7) to vfio-pci ACTION=="add", SUBSYSTEM=="pci", KERNEL=="0000:00:02.[1-7]", ATTR{vendor}=="0x8086", ATTR{device}=="0xa7a0", DRIVER!="vfio-pci", RUN+="/bin/sh -c 'echo \$kernel > /sys/bus/pci/devices/\$kernel/driver/unbind; echo vfio-pci > /sys/bus/pci/devices/\$kernel/driver_override; modprobe vfio-pci; echo \$kernel > /sys/bus/pci/drivers/vfio-pci/bind'" EOF
-
Regenerate the initramfs images. Such as
sudo mkinitcpio -Pon Arch Linux,sudo update-initramfs -uon Ubuntu or other Debian-based distributions. -
Reboot.
-
Use the lspci command to check which driver is currently in use for the VFs (00:02.1 through 00:02.7).
lspci -nnk -s 00:02
Expected Output: The Physical Function (00:02.0) should still use the
i915orxedriver, while all Virtual Functions should display Kernel driver in use:vfio-pci.00:02.0 VGA compatible controller: Intel Corporation ... (rev 0c) Kernel driver in use: i915 ... 00:02.1 Video device: Intel Corporation ... (rev 0c) Kernel driver in use: vfio-pci 00:02.2 Video device: Intel Corporation ... (rev 0c) Kernel driver in use: vfio-pciAnd check if any render nodes exist for the VFs in /dev/dri/.
ls /dev/dri/
You should typically only see card0 and renderD128. If you see a long list (e.g., renderD130 through renderD135), the VFs have not been blocked successfully.
Note: Only applicable to Ubuntu, PVE, or other distributions based on Debian. If secure boot support is required for you, please enable UEFI secure boot before installing i915-sriov-dkms. For PVE, it is important to ensure that secure boot is enabled when installing PVE, otherwise in some ZFS based installations, a kernel that is not signed may be installed by default, which cannot support secure boot. In this situation, it is necessary to first refer to the PVE documentation to configure secure boot. Arch Linux users please refer to the Arch Linux Wiki.
The precondition for executing the following steps: UEFI Secure Boot is turned on and in User/Standard Mode.
-
Install
mokutill.sudo apt update && sudo apt install mokutil -
Install i915-sriov-dkms according to the usual steps.
-
After installation, before reboot the system, execute this command:
sudo mokutil --import /var/lib/dkms/mok.pub
At this point, you will be prompted to enter a password, which is a temporary password that will only be used once during the reboot process.
-
Reboot your computer. Monitor the boot process and wait for the Perform MOK Management window (a blue screen). If you miss the window, you will need to re-run the mokutil command and reboot again. The i915-sriov-dkms module will NOT load until you step through this setup. Select
Enroll MOK,Continue,Yes, Enter the temporary password in Step 3,Reboot.
We will need to run the same driver under Linux guests.
-
Install build tools
apt install build-* dkms linux-headers-$(uname -r) -
Download and install the
.debwget -O /tmp/i915-sriov-dkms_2026.02.04_amd64.deb "https://github.com/strongtz/i915-sriov-dkms/releases/download/2026.02.04/i915-sriov-dkms_2026.02.04_amd64.deb" dpkg -i /tmp/i915-sriov-dkms_2026.02.04_amd64.deb -
Update kernel parameters
nano /etc/default/gruband changeGRUB_CMDLINE_LINUX_DEFAULTtoi915.enable_guc=3 module_blacklist=xe, or add to it if you have other arguments there already. -
Once that's done, update
grubandinitramfs, then reboot.update-grub update-initramfs -u -
Once the VM is back up again, do
dmesg | grep i915to see if your VF is recognized by the kernel. You should also check ifxeis blacklisted correctly by runninglspci -nnkto see which driver is in use by the VF. -
Optionally, install
vainfoby runningapt install vainfo, then dovainfoto see if the iGPU has been picked up by the VAAPI. -
If OpenCL is desired:
apt install intel-opencl-icd apt install clinfo clinfo
Windows Guest (Tested with Proxmox 8.3 + Windows 11 24H2 + Intel Driver 32.0.101.6460/32.0.101.6259)
Thanks for resiliencer and his contribution in #225.
These steps ensure compatibility across all driver versions. In theory you can install any version and won't be hit by the dreaded Code 43.
- Download UEFITools (
UEFITool_NE_A68_win64for Windows. They supply Linux and Mac binaries, too) - Download BIOS for motherboard (I suspect any motherboard BIOS would work as long as it is for Alder/Raptop Lake Desktop Platform)
- Unzip BIOS
- Use UEFITools (Run as Admin) to load the BIOS (usually
.cap) - Go to
Action - Searchor use keyboard shortcutctrl+Fand search for Hex string49006e00740065006c00280052002900200047004f0050002000440072006900760065007200 - Double click the search result in the search column, it will highlight the item found within the BIOS.
- Right click on the highlighted result and
Extract body... - Save the file, file name and extension do not matter. I used
intelgopdriver_desktopand it would save asintelgopdriver_desktop.bin. - You can also compare the checksum of the file:
- Windows Terminal Command:
Get-FileHash -Path "path-to-rom" -Algorithm SHA256 - For desktop with UHD730 and UHD770:
131c32cadb6716dba59d13891bb70213c6ee931dd1e8b1a5593dee6f3a4c2cbd - For ADL-N:
FA12486D93BEE383AD4D3719015EFAD09FC03352382F17C63DF10B626755954B
- Windows Terminal Command:
- You'll need to copy this file to
/usr/share/kvmdirectory on Proxmox host. I uploaded it to a NAS and downloaded it withwget.
- When setting up the machine, set
CPUashost. - TIPS: You can skip the Microsoft Account setup by pressing
Shift+F10at the first setup screen and typeOOBE\BYPASSNRO. The VM will reboot, and you can choose "I don't have Internet" option to set up a local account. Alternatively, you can remove the network device from the Windows VM. - When the setup process is done and you are at the Desktop, enable Remote Desktop and make sure your local account user has access. You can shut down the VM for now.
- When the VM powered off, edit the configuration file:```
# Passing the 02.1 VF, specify the romfile. ROM path is relative
hostpci0: 0000:00:02.1,pcie=1,romfile=Intelgopdriver_desktop.efi,x-vga=1
- In the
Hardwaretab, setDisplaytonone. - Start the VM. You won't be able to access it with console, so your only way in is Remote Desktop. Once you are in, download the graphics driver from Intel, any version should work.
- During install, you may experience black screen when the actual graphics drivers are being installed and applied. This black screen will persist until you restart the VM. My advice is give it a few minutes to do its thing. You can make your best judgement by looking at the VM CPU usage in Proxmox.
- After rebooting, connect with RDP once again. Go to Device Manager and verify the result. You should see the Intel Graphics is installed and working.
- Install build tools:
apt install build-essential dkms git/pacman -S base-devel dkms git. - Install the kernel and headers for desired version:
apt install linux-headers-$(uname -r)/pacman -S linux-headers. - Clone the repository:
git clone https://github.com/strongtz/i915-sriov-dkms.git. - Add the module to DKMS:
dkms add ./i915-sriov-dkms. - Install the module with DKMS:
dkms install i915-sriov-dkms/2026.02.04. - If you have secureboot enabled, and
dkms installtells you it created a self-signed certificate for MOK and you have not installed the host's certificate yet, install the certificate generated by dkms withmokutil --import /var/lib/dkms/mok.pub. - Once finished, the kernel commandline needs to be adjusted:
nano /etc/default/gruband changeGRUB_CMDLINE_LINUX_DEFAULTtointel_iommu=on i915.enable_guc=3 i915.max_vfs=7, or add to it if you have other arguments there already. - Update
grubandinitramfsby executingupdate-grubandupdate-initramfs -u/ for Arch Linuxgrub-mkconfig -o /boot/grub/grub.cfgandmkinitcpio -P. - Optionally use
sysfsutilsto set the number of VFs on boot. Installsysfsutils, then doecho "devices/pci0000:00/0000:00:02.0/sriov_numvfs = 7" > /etc/sysfs.conf, - Reboot the system.
Remove the package with dpkg -P i915-sriov-dkms
Remove the package with pacman -R i915-sriov-dkms
Remove the dkms module with dkms remove i915-sriov-dkms/2026.02.04
Major contributors to this repository are listed below.
- @strongtz Create the initial dkms module
- @zhtengw Rebase on the linux-intel-lts (v5.15, v6.1) , support for v6.1~v6.4, participation in 15+ issues
- @bbaa-bbaa Rebase on the mainline-tracking linux/v6.12 branch, support for v6.8~v6.13, participation in 10+ issues
- @pasbec Major refactor to the repo, support for (v6.2, v6.5, v6.8), participation in 20+ issues
- @shenwii Support for (v6.7, v6.9)
- @MotherOfTheGracchi Support for v6.5.3
- @michael-pptf Several updates to README.md, participation in 20+ issues
