Unable to passthrough audio device to sys-audio

Thanks @zithro for your response.

After banging head to a wall for a whole day why all the info tell me that my iommu is enabled

Summary

$ sudo dmesg | grep -ie IOMMU|DMAR
[ 1.282178] Kernel command line: … plymouth.ignore-serial-consoles i915.alpha_support=1 rd.driver.pre=btrfs rhgb quiet iommu=1 iommu=pt intel_iommu=on usbcore.authorized_default=0 rd.qubes.hide_all_usb rd.qubes.hide_all_usb
[ 1.282440] DMAR: IOMMU enabled
[ 2.329612] iommu: Default domain type: Passthrough (set via kernel command line)
[ 8.089291] i915 0000:00:02.0: [drm] DMAR active, disabling use of stolen memory
$ cat /proc/cmdline
iommu=1 iommu=pt intel_iommu=on usbcore.authorized_default=0 rd.qubes.hide_all_usb rd.qubes.hide_all_usb
$ qubes-hcl-report
HVM: Active
I/O MMU: Active
HAP/SLAT: Yes
TPM: Device present
Remapping: yes
$ xl dmesg | grep -i vmx
(XEN) VMX: Supported advanced features:
(XEN) HVM: VMX enabled

while I still had my /sys/kernel/iommu_groups/ dir empty, I discovered at the end that “… you can’t see your IOMMU Group when you are using Xen (the information is hidden from dom0).” Off topic, Is this maybe related to what you wrote here?

So I ran Fedora Live USB, put intel_iommu=on in a grub at boot, and after running
[liveuser@localhost-live ~]$ for g in /sys/kernel/iommu_groups/*; do echo "IOMMU Group ${g##*/}:"; for d in $g/devices/*; do echo -e "\t$(lspci -nns ${d##*/})"; done; done
I finally saw my devices there. Luckily, my audio device is alone in it’s group

IOMMU Group 13:
00:1b.0 Audio device [0403]: Intel Corporation 7 Series/C216 Chipset Family High Definition Audio Controller [8086:1e20] (rev 04)

But, it’s also not, because iommu_group obviously is not the cause of my issue.

So do you have any other idea what I could check?

Is the output of

$ xl -v dmesg

(XEN) Intel VT-d iommu 0 supported page sizes: 4kB
(XEN) Intel VT-d iommu 1 supported page sizes: 4kB
(XEN) Intel VT-d Snoop Control not enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables not enabled.
(XEN) I/O virtualisation enabled
(XEN) - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!

(XEN) [VT-D] It’s risky to assign 0000:00:1a.0 with shared RMRR at b9430000 for Dom5.
(XEN) [VT-D] It’s risky to assign 0000:00:1d.0 with shared RMRR at b9430000 for Dom7.
(XEN) [VT-D] It’s risky to assign 0000:00:14.0 with shared RMRR at b9430000 for Dom9.

of an any help to detect further steps?