[prev in list] [next in list] [prev in thread] [next in thread]
List: qubes-users
Subject: Re: [qubes-users] Failing to passthrough an USB3 PCIE card
From: VÃt_Å esták <groups-no-private-mail--contact-me-at--co
Date: 2016-01-31 15:47:17
Message-ID: af862bc1-a22d-4f73-affa-254afd101928 () googlegroups ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
Aha, got it. :(
On Saturday, January 30, 2016 at 11:50:37 PM UTC+1, Eric Shelton wrote:
>
> On Saturday, January 30, 2016 at 4:43:47 PM UTC-5, VÃt Å esták wrote:
> >
> >
> > On Saturday, January 30, 2016 at 10:30:00 PM UTC+1, Eric Shelton wrote:
> > >
> > > The main issue for drivers and passthrough devices is that Xen restricts
> > > access to certain PCI config registers, and some drivers may expect or even
> > > require access to those registers. I don't think that issue is any
> > > different for HVM domains.
> > >
> >
> > Hmm, I expected HVMs to be as close to physical HW as possible. But there
> > might be some exception.
> >
> > Joanna suggested a switch to PVH for other reasons - reducing hypervisor
> > > complexity by taking advantage of EPT (
> > > https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt
> > > ):
> > >
> >
> > Yes, I remember this :)
> >
> >
> > > Anyone with similar issues:
> > > > * Do you have VT-d/IOMMU?
> > > > * If yes, does it work on HVM?
> > > >
> > >
> > > PCI passthrough is working with HVM domains since Qubes 3.0.
> > >
> >
> > I am not sure if we understand each other there:
> > * PCI passthrough on HVM is working, but requires VT-d/IOMMU.
> > * My question was if the bug with PCI passthrough of some USB controllers
> > is also present in HVM on one's system. (I can't test is, because I don't
> > have VT-d.)
> >
>
> No, I just mistyped my initial response (and corrected it with a followup
> post a minute later).
>
> HVM PCI passthrough has been broken since Qubes 3.0, whether you have an
> IOMMU or not. It is a known issue:
>
> https://github.com/QubesOS/qubes-issues/issues/1659
>
> Eric
>
--
You received this message because you are subscribed to the Google Groups \
"qubes-users" group. To unsubscribe from this group and stop receiving emails from \
it, send an email to qubes-users+unsubscribe@googlegroups.com. To post to this group, \
send email to qubes-users@googlegroups.com. To view this discussion on the web visit \
https://groups.google.com/d/msgid/qubes-users/af862bc1-a22d-4f73-affa-254afd101928%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
[Attachment #5 (text/html)]
<div dir="ltr">Aha, got it. :(<br><br>On Saturday, January 30, 2016 at 11:50:37 PM \
UTC+1, Eric Shelton wrote:<blockquote class="gmail_quote" style="margin: \
0;margin-left: 0.8ex;border-left: 1px #ccc solid;padding-left: 1ex;"><div \
dir="ltr">On Saturday, January 30, 2016 at 4:43:47 PM UTC-5, VÃt Å esták \
wrote:<blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr"><br>On Saturday, January 30, 2016 at 10:30:00 PM UTC+1, Eric Shelton \
wrote:<blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr">The main issue for drivers and passthrough devices is that Xen restricts \
access to certain PCI config registers, and some drivers may expect or even require \
access to those registers. I don't think that issue is any different for HVM \
domains.</div></blockquote><div><br>Hmm, I expected HVMs to be as close to physical \
HW as possible. But there might be some exception.<br><br></div><blockquote \
class="gmail_quote" style="margin:0;margin-left:0.8ex;border-left:1px #ccc \
solid;padding-left:1ex"><div dir="ltr">Joanna suggested a switch to PVH for other \
reasons - reducing hypervisor complexity by taking advantage of EPT (<a \
href="https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt" \
rel="nofollow" target="_blank" \
onmousedown="this.href='https://www.google.com/url?q\75https%3A%2F%2Fgithub.com%2F \
QubesOS%2Fqubes-secpack%2Fblob%2Fmaster%2FQSBs%2Fqsb-022-2015.txt\46sa\75D\46sntz\0751\46usg\75AFQjCNH-d76tRNfu3px2ncpKbWrv5Q-eHA';return \
true;" onclick="this.href='https://www.google.com/url?q\75https%3A%2F%2Fgithub.com \
%2FQubesOS%2Fqubes-secpack%2Fblob%2Fmaster%2FQSBs%2Fqsb-022-2015.txt\46sa\75D\46sntz\0751\46usg\75AFQjCNH-d76tRNfu3px2ncpKbWrv5Q-eHA';return \
true;">https://github.com/QubesOS/<wbr>qubes-secpack/blob/master/<wbr>QSBs/qsb-022-2015.txt</a>):</div></blockquote><div><br>Yes, \
I remember this :)<br> </div><blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr"><blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr"><div>Anyone with similar issues:<br>* Do you have VT-d/IOMMU?<br>* If yes, \
does it work on HVM?<br></div></div></blockquote><div><br></div><div>PCI passthrough \
is working with HVM domains since Qubes 3.0.</div></div></blockquote><div><br>I am \
not sure if we understand each other there:<br>* PCI passthrough on HVM is working, \
but requires VT-d/IOMMU.<br>* My question was if the bug with PCI passthrough of some \
USB controllers is also present in HVM on one's system. (I can't test is, \
because I don't have VT-d.) <br></div></div></blockquote><div><br></div><div>No, \
I just mistyped my initial response (and corrected it with a followup post a minute \
later).</div><div><br></div><div>HVM PCI passthrough has been broken since Qubes 3.0, \
whether you have an IOMMU or not. It is a known issue:</div><div><br></div><div><a \
href="https://github.com/QubesOS/qubes-issues/issues/1659" target="_blank" \
rel="nofollow" onmousedown="this.href='https://www.google.com/url?q\75https%3A%2F% \
2Fgithub.com%2FQubesOS%2Fqubes-issues%2Fissues%2F1659\46sa\75D\46sntz\0751\46usg\75AFQjCNHf7W1ySN4KRHioTUiYHMvN04Q0UQ';return \
true;" onclick="this.href='https://www.google.com/url?q\75https%3A%2F%2Fgithub.com \
%2FQubesOS%2Fqubes-issues%2Fissues%2F1659\46sa\75D\46sntz\0751\46usg\75AFQjCNHf7W1ySN4KRHioTUiYHMvN04Q0UQ';return \
true;">https://github.com/QubesOS/<wbr>qubes-issues/issues/1659</a></div><div><br></div><div>Eric</div></div></blockquote></div>
<p></p>
-- <br />
You received this message because you are subscribed to the Google Groups \
"qubes-users" group.<br /> To unsubscribe from this group and stop \
receiving emails from it, send an email to <a \
href="mailto:qubes-users+unsubscribe@googlegroups.com">qubes-users+unsubscribe@googlegroups.com</a>.<br \
/> To post to this group, send email to <a \
href="mailto:qubes-users@googlegroups.com">qubes-users@googlegroups.com</a>.<br /> To \
view this discussion on the web visit <a \
href="https://groups.google.com/d/msgid/qubes-users/af862bc1-a22d-4f73-affa-254afd1019 \
28%40googlegroups.com?utm_medium=email&utm_source=footer">https://groups.google.com/d/ \
msgid/qubes-users/af862bc1-a22d-4f73-affa-254afd101928%40googlegroups.com</a>.<br /> \
For more options, visit <a \
href="https://groups.google.com/d/optout">https://groups.google.com/d/optout</a>.<br \
/>
------=_Part_3374_1485650610.1454255237455--
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic