[prev in list] [next in list] [prev in thread] [next in thread] 

List:       qubes-users
Subject:    Re: [qubes-users] Failing to passthrough an USB3 PCIE card
From:       Vít_Šesták <groups-no-private-mail--contact-me-at--co
Date:       2016-01-31 15:47:17
Message-ID: af862bc1-a22d-4f73-affa-254afd101928 () googlegroups ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Aha, got it. :(

On Saturday, January 30, 2016 at 11:50:37 PM UTC+1, Eric Shelton wrote:
> 
> On Saturday, January 30, 2016 at 4:43:47 PM UTC-5, Vít Šesták wrote:
> > 
> > 
> > On Saturday, January 30, 2016 at 10:30:00 PM UTC+1, Eric Shelton wrote:
> > > 
> > > The main issue for drivers and passthrough devices is that Xen restricts 
> > > access to certain PCI config registers, and some drivers may expect or even 
> > > require access to those registers.  I don't think that issue is any 
> > > different for HVM domains.
> > > 
> > 
> > Hmm, I expected HVMs to be as close to physical HW as possible. But there 
> > might be some exception.
> > 
> > Joanna suggested a switch to PVH for other reasons - reducing hypervisor 
> > > complexity by taking advantage of EPT (
> > > https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt
> > > ):
> > > 
> > 
> > Yes, I remember this :)
> > 
> > 
> > > Anyone with similar issues:
> > > > * Do you have VT-d/IOMMU?
> > > > * If yes, does it work on HVM?
> > > > 
> > > 
> > > PCI passthrough is working with HVM domains since Qubes 3.0.
> > > 
> > 
> > I am not sure if we understand each other there:
> > * PCI passthrough on HVM is working, but requires VT-d/IOMMU.
> > * My question was if the bug with PCI passthrough of some USB controllers 
> > is also present in HVM on one's system. (I can't test is, because I don't 
> > have VT-d.) 
> > 
> 
> No, I just mistyped my initial response (and corrected it with a followup 
> post a minute later).
> 
> HVM PCI passthrough has been broken since Qubes 3.0, whether you have an 
> IOMMU or not.  It is a known issue:
> 
> https://github.com/QubesOS/qubes-issues/issues/1659
> 
> Eric
> 

-- 
You received this message because you are subscribed to the Google Groups \
"qubes-users" group. To unsubscribe from this group and stop receiving emails from \
it, send an email to qubes-users+unsubscribe@googlegroups.com. To post to this group, \
send email to qubes-users@googlegroups.com. To view this discussion on the web visit \
https://groups.google.com/d/msgid/qubes-users/af862bc1-a22d-4f73-affa-254afd101928%40googlegroups.com.
 For more options, visit https://groups.google.com/d/optout.


[Attachment #5 (text/html)]

<div dir="ltr">Aha, got it. :(<br><br>On Saturday, January 30, 2016 at 11:50:37 PM \
UTC+1, Eric Shelton wrote:<blockquote class="gmail_quote" style="margin: \
0;margin-left: 0.8ex;border-left: 1px #ccc solid;padding-left: 1ex;"><div \
dir="ltr">On Saturday, January 30, 2016 at 4:43:47 PM UTC-5, Vít Šesták \
wrote:<blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr"><br>On Saturday, January 30, 2016 at 10:30:00 PM UTC+1, Eric Shelton \
wrote:<blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr">The main issue for drivers and passthrough devices is that Xen restricts \
access to certain PCI config registers, and some drivers may expect or even require \
access to those registers.   I don&#39;t think that issue is any different for HVM \
domains.</div></blockquote><div><br>Hmm, I expected HVMs to be as close to physical \
HW as possible. But there might be some exception.<br><br></div><blockquote \
class="gmail_quote" style="margin:0;margin-left:0.8ex;border-left:1px #ccc \
solid;padding-left:1ex"><div dir="ltr">Joanna suggested a switch to PVH for other \
reasons - reducing hypervisor complexity by taking advantage of EPT (<a \
href="https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt" \
rel="nofollow" target="_blank" \
onmousedown="this.href=&#39;https://www.google.com/url?q\75https%3A%2F%2Fgithub.com%2F \
QubesOS%2Fqubes-secpack%2Fblob%2Fmaster%2FQSBs%2Fqsb-022-2015.txt\46sa\75D\46sntz\0751\46usg\75AFQjCNH-d76tRNfu3px2ncpKbWrv5Q-eHA&#39;;return \
true;" onclick="this.href=&#39;https://www.google.com/url?q\75https%3A%2F%2Fgithub.com \
%2FQubesOS%2Fqubes-secpack%2Fblob%2Fmaster%2FQSBs%2Fqsb-022-2015.txt\46sa\75D\46sntz\0751\46usg\75AFQjCNH-d76tRNfu3px2ncpKbWrv5Q-eHA&#39;;return \
true;">https://github.com/QubesOS/<wbr>qubes-secpack/blob/master/<wbr>QSBs/qsb-022-2015.txt</a>):</div></blockquote><div><br>Yes, \
I remember this :)<br>  </div><blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr"><blockquote class="gmail_quote" \
style="margin:0;margin-left:0.8ex;border-left:1px #ccc solid;padding-left:1ex"><div \
dir="ltr"><div>Anyone with similar issues:<br>* Do you have VT-d/IOMMU?<br>* If yes, \
does it work on HVM?<br></div></div></blockquote><div><br></div><div>PCI passthrough \
is working with HVM domains since Qubes 3.0.</div></div></blockquote><div><br>I am \
not sure if we understand each other there:<br>* PCI passthrough on HVM is working, \
but requires VT-d/IOMMU.<br>* My question was if the bug with PCI passthrough of some \
USB controllers is also present in HVM on one&#39;s system. (I can&#39;t test is, \
because I don&#39;t have VT-d.) <br></div></div></blockquote><div><br></div><div>No, \
I just mistyped my initial response (and corrected it with a followup post a minute \
later).</div><div><br></div><div>HVM PCI passthrough has been broken since Qubes 3.0, \
whether you have an IOMMU or not.   It is a known issue:</div><div><br></div><div><a \
href="https://github.com/QubesOS/qubes-issues/issues/1659" target="_blank" \
rel="nofollow" onmousedown="this.href=&#39;https://www.google.com/url?q\75https%3A%2F% \
2Fgithub.com%2FQubesOS%2Fqubes-issues%2Fissues%2F1659\46sa\75D\46sntz\0751\46usg\75AFQjCNHf7W1ySN4KRHioTUiYHMvN04Q0UQ&#39;;return \
true;" onclick="this.href=&#39;https://www.google.com/url?q\75https%3A%2F%2Fgithub.com \
%2FQubesOS%2Fqubes-issues%2Fissues%2F1659\46sa\75D\46sntz\0751\46usg\75AFQjCNHf7W1ySN4KRHioTUiYHMvN04Q0UQ&#39;;return \
true;">https://github.com/QubesOS/<wbr>qubes-issues/issues/1659</a></div><div><br></div><div>Eric</div></div></blockquote></div>


<p></p>

-- <br />
You received this message because you are subscribed to the Google Groups \
&quot;qubes-users&quot; group.<br /> To unsubscribe from this group and stop \
receiving emails from it, send an email to <a \
href="mailto:qubes-users+unsubscribe@googlegroups.com">qubes-users+unsubscribe@googlegroups.com</a>.<br \
/> To post to this group, send email to <a \
href="mailto:qubes-users@googlegroups.com">qubes-users@googlegroups.com</a>.<br /> To \
view this discussion on the web visit <a \
href="https://groups.google.com/d/msgid/qubes-users/af862bc1-a22d-4f73-affa-254afd1019 \
28%40googlegroups.com?utm_medium=email&utm_source=footer">https://groups.google.com/d/ \
msgid/qubes-users/af862bc1-a22d-4f73-affa-254afd101928%40googlegroups.com</a>.<br /> \
For more options, visit <a \
href="https://groups.google.com/d/optout">https://groups.google.com/d/optout</a>.<br \
/>

------=_Part_3374_1485650610.1454255237455--



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic