On Thu, January 18, 2018 3:06 pm, Simon Gaiser wrote:
> awokd:
>
>> On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote:
>>
>>
>>>
>>> According to logs provided by mossy-nw permissive mode is correctly
>>> enabled in xen-pciback in dom0 for this device. The question here is
>>> what else is needed for HVM (using qemu in stubdomain).
>>
>> My dom0 log shows that too, but the guest-dm/debug log showed the PCI
>> device always getting added with permissive=false. Maybe that's what you
>>  are saying, qemu isn't passing the value along?
>
> Yes that's the problem. The guide sets permissive mode in pciback and
> not via libxl. So the stubdomain never learns about it. Will take a look
> today.

Was trying to beat you to it but got lost in all the layers! Does anyone
know of a flowchart somewhere of what happens when you enter "qvm-start
vm" in 4.0? I gathered:

qvm-start
qubesadmin -> QubesDB
salt
libxl calls Xen code-> stubdomain with qemu
qemu uses libxl calling Xen code to start vm




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d5878d4e791694812459dbc01d6b9aa.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.

Reply via email to