Chris:
>> I will do a fresh install and confirm again that disabling msi does the 
>> trick.
> 
> Confirmed. I tweaked the command a bit because it removed the default kernel 
> options.

Depending on hardware, getting Qubes up and running can sometimes be the
hardest part of using it. In comparison, the rest should be smooth
sailing. :) Do remember to run backups, though. EXT3 on thin LVM is not
as resilient as NTFS, for example.

>> qvm-prefs sys-net kernelopts "nopat iommu=soft swiotlb=8192 pci=nomsi"
> 
> Any idea if this would introduce any security vulnerabilities?
> 
I've looked at the Xen/Qubes PCI virtualization code when
troubleshooting a similar issue with interrupts on one of my systems.
IIRC, MSI and standard interrupts get handled the same way and processed
through the same code base, so I don't see any difference in exposure.
For a canonical answer, you might try the qubes-devel mailing list since
they get more in-depth.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3826c678-f998-1a7d-f0ee-b8a75243cf98%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.

Reply via email to