Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upPCI permissive mode broken in Qubes R4.0 #3476
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mossy-nw
Jan 18, 2018
Some (hopefully most relevant) excerpts from that thread so far
According to logs provided by mossy-nw permissive mode is correctly
enabled in xen-pciback in dom0 for this device. The question here is what
else is needed for HVM (using qemu in stubdomain).My dom0 log shows that too, but the guest-dm/debug log showed the PCI
device always getting added with permissive=false. Maybe that's what you
are saying, qemu isn't passing the value along?Yes that's the problem. The guide sets permissive mode in pciback and
not via libxl. So the stubdomain never learns about it. Will take a look
today.If that's the case, it looks we need another option for PCI device, like
this:qvm-pci attach sys-net dom0:xx_yy.zz -o permissive=TrueYes, exactly. And if I didn't miss something we first need to teach
libvirt about the permissive option.
mossy-nw
commented
Jan 18, 2018
|
Some (hopefully most relevant) excerpts from that thread so far
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mossy-nw
Jan 18, 2018
finally an outline of qvm-start control flow:
- qvm-start sends a request to qubesd, using Admin API
- qubesd starts required netvm (recursively), if needed
- qubesd request qmemman to allocate needed memory for new VM
(according to VM's 'memory' property)- qubesd calls into appropriate storage pool driver to prepare for VM
startup (create copy-on-write layers etc)- qubesd gathers needed VM
properties etc and builds libvirt VM configuration (XML format, can be
seen usingvirsh dumpxml)- qubesd calls into libvirt to start the VM
(but in paused mode)- libvirt setup the VM using libxl, this include starting stubdomain if
needed- qubesd start auxiliary processes, including:
- qrexec-daemon
- qubesdb-daemon (and fill its content)
- libvirt unpause the VM
- qvm-start-gui process (running separately from qubesd, as part of
dom0 user GUI session) starts gui daemonmost of the above is in "start" method:
https://dev.qubes-os.org/projects/core-admin/en/latest/qubes-vm/qubesvm.html#qubes.vm.qubesvm.QubesVM.start
(there is "source" link at the right side)
mossy-nw
commented
Jan 18, 2018
|
finally an outline of qvm-start control flow:
|
andrewdavidwong
added
bug
C: core
labels
Jan 19, 2018
andrewdavidwong
added this to the Release 4.0 milestone
Jan 19, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
HW42
commented
Jan 19, 2018
|
Ah, I missed that you created a ticket. Fix: QubesOS/qubes-core-admin#184 |
marmarek
closed this
in
marmarek/qubes-core-libvirt@cd8e08a
Jan 22, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 22, 2018
Automated announcement from builder-github
The package libvirt-3.3.0-6.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Jan 22, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Jan 22, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jan 22, 2018
Closed
core-libvirt v3.3.0-6 (r4.0) #377
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jan 22, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 23, 2018
Automated announcement from builder-github
The package qubes-core-dom0-4.0.19-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Jan 23, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Jan 23, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jan 23, 2018
Closed
core-admin v4.0.19 (r4.0) #380
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The package libvirt-3.3.0-7.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
qubesos-bot
added
r4.0-dom0-stable
and removed
r4.0-dom0-cur-test
labels
Feb 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The package qubes-core-dom0-4.0.21-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mossy-nw
Feb 20, 2018
following this was (also?) necessary for passthrough to work in R4.0_rc4 --
https://github.com/awokd/qubes-doc/blob/patch-15/configuration/assigning-devices.md/#pci-passthrough-issues
specifically for my PCI wifi adapter:
For example, if 00_1a.0 is the BDF of the device you want to assign to the "personal" domain, and it is particularly difficult to pass through you would do this:
qvm-pci attach --persistent --option permissive=true dom0:00_1a.0
not sure if/when this improvement to the docs will be merged? thanks!
mossy-nw
commented
Feb 20, 2018
•
|
following this was (also?) necessary for passthrough to work in R4.0_rc4 --
not sure if/when this improvement to the docs will be merged? thanks! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 21, 2018
Member
not sure if/when this improvement to the docs will be merged? thanks!
If there's an open PR with that content, it'll get merged once it passes review:
If there's an open PR with that content, it'll get merged once it passes review: |
mossy-nw commentedJan 18, 2018
Qubes OS version:
R4.0 (tested in rc3)
Affected TemplateVMs:
Steps to reproduce the behavior:
Follow advice here to get e.g. network card working (successful approach in R3.2)
https://www.qubes-os.org/doc/assigning-devices/#pci-passthrough-issues
Expected behavior:
wireless adapter recognized in sys-net after setting PCI permissive mode
Actual behavior:
wireless adapter not recognized despite PCI permissive mode
General notes:
See qubes-users thread for bug details, example logs, and developer discussion @marmarek et al
https://groups.google.com/forum/#!topic/qubes-users/Klf2q3tEbOI
Related issues: