[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-09 Thread Ana Z
I found a solution to my problem.

The culprit was my overclock. I don't know why I didn't reset my BIOS 
settings in start of troubleshooting, but today I reset it and everything 
works...

Interesting note though, naturally I tried to pinpoint what part of 
overclock is messing up the start of HVM VM's and it's the CPU multiplier. 
My CPU is AMD A8-6600K so I assumed everything above its maximum turbo 
frequency would cause the error (x42) but last multiplier before VM's 
wouldn't load is 43. Vcore didn't affect loading.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5fc5747e-a2d8-4e5f-8b01-326cd89ab93e%40googlegroups.com.


[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-05 Thread Ana Z
!!!

I have some, hopefully, great news.

I was messing around searching some help online and I got an idea to try 
installing Win7 StandaloneVM following the 
https://www.qubes-os.org/doc/windows-tools/ guide.

I kid you not, it worked on first try! HVM mode, even got the Windows Tools 
working.

Is there some logs I could extract from this new VM that would help find 
the error in Linux VMs?

Thank you very much for your help so far.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/83c7e76b-5b0b-4328-8cb0-c529656ca68b%40googlegroups.com.


[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-05 Thread qubes123
When I compared your logs to what I have, it came to my mind that some 
years ago I had similar problems - because of processor microcode which was 
too old. I had to update that to get hvms working.
I couldn't find which microcode version you have, it is somehow not shown 
in the cpu log you uploaded (cat /proc/cpuinfo should show that).
But, the solution is not easy, because processor microcode is usually 
stored in the BIOS statically (in non-UEFI bioses), and I don't know if you 
can change that dynamically somehow with your UEFI BIOS or while the kernel 
is booting.  I use a special BIOS (coreboot), where I can statically change 
the microcode to a newer one, but it needs external flashing with the right 
set of tools (SOIC clip, flash programmer etc). Unfortunately coreboot is 
not supported on your MB.
So try to find a solution on the net, how to update the microcode for your 
APU - this works with Intel processors even with kernel parameters (eg. 
ucode=scan in the Qubes cmdline is just enabling that functionality using 
the latest signed processor microcodes available in mainstream Linux 
distros) AFAIK, but success can dependend on your UEFI BIOS
If I'm not mistaken, the latest microcode for A8-6600K is from March 2018 
(https://github.com/platomav/CPUMicrocodes/blob/master/AMD/cpu00610F01_ver0600111F_2018-03-05_AC55EB96.bin)
 
- but this have to be verified knowing your exact CPU infos.  This 
microcode version already has all the needed mitigations for Spectre 
vulnerabilities, therefore strongly recommended...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f39f96a-3cf4-4427-8f78-d21ce2efadde%40googlegroups.com.


[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-04 Thread qubes123
The log file you provided as xl_log.txt is actually the Xen hypervisor log. 
Yes, there are some warnings - which show that there are some bugs in the 
BIOS, but overall, the virtualization and all the required features needed 
for IOMMU are there and enabled. So this is strange.
Maybe - and I just now noticed - you use kernel version 5.x from kernel 
latest in sys-usb - that is still a development version, might not work.  
I'd switch that back to the stable 4.19.x version in the VM settings for 
sys-usb.
Do you have logs for the stubdoms? (eg. dom0: 
/var/log/xen/console/guest-sys-usb-dm.log or similar log for sys-net). It 
might show what is wrong, as the stuboms provide the device model (emulated 
pci devices) needed for HVMs.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c4720476-d9bd-47bb-a2d2-aa741fd763ec%40googlegroups.com.


[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-04 Thread Ana Z
Hi.

I tried everything you said (in both sys-usb and sys-net). I even tried to 
not assign any pass through devices and I still get the same output in 
/var/log/xen/console/guest-sys-net.log.

But not assigning any device, or giving all devices strictreset as you 
mention gives me this output in /var/log/libvirt/libxl/libxl-driver.log:

libxl_linux.c:155:libxl_loopdev_cleanup: unable to release device 
/dev/loop0: No such device or address

I guess there are some errors in deeper level or my installation/BIOS is 
just bugged with IOMMU. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/11f7d05f-509f-4e2d-b4a2-6e533d22d393%40googlegroups.com.


[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-04 Thread qubes123
The libxl-driver.log shows symptoms, when indeed the USB device cannot be 
reseted (FLR functionality missing).
As I wrote, you can disable strictreset for HVM passed through devices:
- go for the "Qube Settings" of one of the HVMs (sys-usb), where the USB 
devices (PCI: 00:10.0, 00:10.1, 00:12.0, 00:13.0 in your case) are passed 
through
- under tab "Devices", you should see in the right side box ("Selected") 
all the USB device I noted above
- there is a horizontal bar in the bottom "Configure Strict Reset for PCI 
Devices" --> push this, then a selection box comes up
- make sure you highlighted all visible devices by clicking on each
- then OK --> (Apply) --> OK
This should disable Strict Reset, and - if no other problems are there - 
the HVM should start

One note: I also have and AMD based PC (laptop).  For me, not all USB 
devices should be passed through to sys-usb, because some of the devices 
(eg. camera, wifi-card usb BT module and somehow the internal keyboard) are 
internally connected to an USB port, and passing those through sys-usb qube 
results sometimes in weird problems like not having WIFI or not being able 
to type etc.  So I only pass through one USB device, which I know don't 
have any internal connections.  
Lastly, you might need to experiment, which devices and ports would work 
for you (passed through to eg. sys-usb), but make sure, that PCI devices 
with multiple functions (00:10.0 and 00:10.1) are "moving" together either 
way.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a7da7171-a225-4be4-b994-f5bfe8f56c68%40googlegroups.com.


[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-03 Thread Ana Z
Dana utorak, 3. prosinca 2019. u 18:15:02 UTC, korisnik qubes123 napisao je:
>
> Maybe if you post the content of /var/log/libvirt/libxl/libxl-driver.log file 
> also, we can see what the problem is. Otherwise the logs seem OK for me.
> If you installed a std R4.0.1 and let the setup configure the base qubes, 
> then sys-net should already be a HVM with all your Net cards passed through 
> to this HVM.
> For USB devices, when passed to a HVM, it could require, that you set 
> "strict reset" in "Devices" tab for the USB devices of that qubes, 
> otherwise it will not boot. Because of this, I recommend to try to start a 
> hvm with only Net devices passed through to it, or even without any passed 
> devices to narrow down the problem to HVMs in general or passthrough issues.
> One tip: if the HVMs problem still persists, change the Virt mode to PV 
> temporarily for the sys-net (make sure, that a Net card is passed to it), 
> and if networking is OK, then update dom0 to the latest version.
> Then switch it back to HVM and try to boot.  PV mode is not recommended 
> (larger attack surface) on long term, but R4.0.1 is and old version...
>
>
Hi.

I sure can! I uploaded the libxl-driver.log as well. 

As of your second part of the message, I didn't mention that after doing 
all the steps suggested in linked "Bug in libxenlight" topic I encountered 
that all assigned HVMs (bullet 8) wouldn't load (such as sys-usb and 
sys-net) and dom0 was updated before that change (bullet 7), and yes, now 
that I think of it, it gave me a different error and suggestion that I read 
the /var/log/libvirt/libxl/libxl-driver.log you asked for! So I hope you 
could tell me from it what's the matter. I then, changed back all the VMs 
to PV mode and I was setting up new templates, even got my USB WIFI dongle 
to work, but as you mentioned it's not as secure as HVM is so I really want 
to make it work 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3c4e8c6-c46d-4715-b231-bf091b212cdf%40googlegroups.com.
2019-12-02 12:34:30.798+: libxl: libxl.c:1853:libxl_console_get_tty: unable 
to read console tty path `/local/domain/1/console/tty': Resource temporarily 
unavailable
2019-12-02 12:36:10.284+: libxl: libxl.c:1853:libxl_console_get_tty: unable 
to read console tty path `/local/domain/2/console/tty': Resource temporarily 
unavailable
2019-12-02 12:39:29.948+: libxl: libxl.c:1853:libxl_console_get_tty: unable 
to read console tty path `/local/domain/4/console/tty': Resource temporarily 
unavailable
2019-12-02 12:47:27.881+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:13.0
2019-12-02 12:47:27.911+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:12.0
2019-12-02 12:47:27.938+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.0
2019-12-02 12:47:27.940+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.1
2019-12-02 13:09:07.331+: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: 
unable to release device /dev/loop1: No such device or address
2019-12-02 13:10:30.867+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:13.0
2019-12-02 13:10:30.922+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=18: Invalid argument
2019-12-02 13:10:30.922+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:12.0
2019-12-02 13:10:30.934+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=17: Invalid argument
2019-12-02 13:10:30.971+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=18: Invalid argument
2019-12-02 13:10:30.971+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.0
2019-12-02 13:10:30.979+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=17: Invalid argument
2019-12-02 13:10:30.979+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.1
2019-12-02 13:10:38.678+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=83: Invalid argument
2019-12-02 13:10:38.678+: libxl: libxl_pci.c:1521:do_pci_remove: 
xc_domain_irq_permission irq=83: Operation not permitted
2019-12-02 13:11:24.859+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI 

[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-03 Thread Ana Z
Hi.

I sure can! I uploaded the libxl-driver.log as well. 

As of your second part of the message, I didn't mention that after doing 
all the steps suggested in linked "Bug in libxenlight" topic I encountered 
that all assigned HVMs (bullet 8) wouldn't load (such as sys-usb and 
sys-net) and dom0 was updated before that change (bullet 7), and yes, now 
that I think of it, it gave me a different error and suggestion that I read 
the /var/log/libvirt/libxl/libxl-driver.log you asked for! So I hope you 
could tell me from it what's the matter. I then, changed back all the VMs 
to PV mode and I was setting up new templates, even got my WIFI card to 
work, but as you mentioned it's not as secure as HVM is so I really want to 
make it work.

Dana utorak, 3. prosinca 2019. u 18:15:02 UTC, korisnik qubes123 napisao je:
>
> Maybe if you post the content of /var/log/libvirt/libxl/libxl-driver.log file 
> also, we can see what the problem is. Otherwise the logs seem OK for me.
> If you installed a std R4.0.1 and let the setup configure the base qubes, 
> then sys-net should already be a HVM with all your Net cards passed through 
> to this HVM.
> For USB devices, when passed to a HVM, it could require, that you set 
> "strict reset" in "Devices" tab for the USB devices of that qubes, 
> otherwise it will not boot. Because of this, I recommend to try to start a 
> hvm with only Net devices passed through to it, or even without any passed 
> devices to narrow down the problem to HVMs in general or passthrough issues.
> One tip: if the HVMs problem still persists, change the Virt mode to PV 
> temporarily for the sys-net (make sure, that a Net card is passed to it), 
> and if networking is OK, then update dom0 to the latest version.
> Then switch it back to HVM and try to boot.  PV mode is not recommended 
> (larger attack surface) on long term, but R4.0.1 is and old version...
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b705f67-ecf0-465d-9fa2-201ebac60854%40googlegroups.com.
2019-12-02 12:34:30.798+: libxl: libxl.c:1853:libxl_console_get_tty: unable 
to read console tty path `/local/domain/1/console/tty': Resource temporarily 
unavailable
2019-12-02 12:36:10.284+: libxl: libxl.c:1853:libxl_console_get_tty: unable 
to read console tty path `/local/domain/2/console/tty': Resource temporarily 
unavailable
2019-12-02 12:39:29.948+: libxl: libxl.c:1853:libxl_console_get_tty: unable 
to read console tty path `/local/domain/4/console/tty': Resource temporarily 
unavailable
2019-12-02 12:47:27.881+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:13.0
2019-12-02 12:47:27.911+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:12.0
2019-12-02 12:47:27.938+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.0
2019-12-02 12:47:27.940+: libxl: libxl_pci.c:1176:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.1
2019-12-02 13:09:07.331+: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: 
unable to release device /dev/loop1: No such device or address
2019-12-02 13:10:30.867+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:13.0
2019-12-02 13:10:30.922+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=18: Invalid argument
2019-12-02 13:10:30.922+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:12.0
2019-12-02 13:10:30.934+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=17: Invalid argument
2019-12-02 13:10:30.971+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=18: Invalid argument
2019-12-02 13:10:30.971+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.0
2019-12-02 13:10:30.979+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=17: Invalid argument
2019-12-02 13:10:30.979+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device :00:10.1
2019-12-02 13:10:38.678+: libxl: libxl_pci.c:1517:do_pci_remove: 
xc_physdev_unmap_pirq irq=83: Invalid argument
2019-12-02 13:10:38.678+: libxl: libxl_pci.c:1521:do_pci_remove: 
xc_domain_irq_permission irq=83: Operation not permitted
2019-12-02 13:11:24.859+: libxl: libxl_pci.c:1199:libxl__device_pci_reset: 
The kernel doesn't support reset from sysfs for PCI device 

[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-03 Thread qubes123
...correction: R4.0.1 is not old (this is the current released version), 
but the iso build is from January...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9dcbdf09-0e11-4065-ae58-af26b4086da0%40googlegroups.com.


[qubes-users] Re: Help regarding IOMMU and HVM

2019-12-03 Thread qubes123
Maybe if you post the content of /var/log/libvirt/libxl/libxl-driver.log file 
also, we can see what the problem is. Otherwise the logs seem OK for me.
If you installed a std R4.0.1 and let the setup configure the base qubes, 
then sys-net should already be a HVM with all your Net cards passed through 
to this HVM.
For USB devices, when passed to a HVM, it could require, that you set 
"strict reset" in "Devices" tab for the USB devices of that qubes, 
otherwise it will not boot. Because of this, I recommend to try to start a 
hvm with only Net devices passed through to it, or even without any passed 
devices to narrow down the problem to HVMs in general or passthrough issues.
One tip: if the HVMs problem still persists, change the Virt mode to PV 
temporarily for the sys-net (make sure, that a Net card is passed to it), 
and if networking is OK, then update dom0 to the latest version.
Then switch it back to HVM and try to boot.  PV mode is not recommended 
(larger attack surface) on long term, but R4.0.1 is and old version...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f17635d6-dcc2-41be-be0f-218ecbe29881%40googlegroups.com.