On Thu, January 18, 2018 3:06 pm, Simon Gaiser wrote: > awokd: > >> On Thu, January 18, 2018 2:26 pm, "Marek Marczykowski-Górecki" wrote: >> >> >>> >>> According to logs provided by mossy-nw permissive mode is correctly >>> enabled in xen-pciback in dom0 for this device. The question here is >>> what else is needed for HVM (using qemu in stubdomain). >> >> My dom0 log shows that too, but the guest-dm/debug log showed the PCI >> device always getting added with permissive=false. Maybe that's what you >> are saying, qemu isn't passing the value along? > > Yes that's the problem. The guide sets permissive mode in pciback and > not via libxl. So the stubdomain never learns about it. Will take a look > today.
Was trying to beat you to it but got lost in all the layers! Does anyone know of a flowchart somewhere of what happens when you enter "qvm-start vm" in 4.0? I gathered: qvm-start qubesadmin -> QubesDB salt libxl calls Xen code-> stubdomain with qemu qemu uses libxl calling Xen code to start vm -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9d5878d4e791694812459dbc01d6b9aa.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.