Add solution to force USB ports to use USB 2.0 mode.

Closes #432
This commit is contained in:
Paras Chetal 2017-06-10 11:37:29 +05:30 committed by unman
parent 11f00edaa1
commit 4d1a30ccce
No known key found for this signature in database
GPG Key ID: BB52274595B71262

View File

@ -304,6 +304,10 @@ A device that does not support reset is not safe and generally should not be ass
Most likely the offending controller is a USB 3.0 device.
You can remove this controller from the usbVM, and see if this allows the VM to boot.
Alternatively you may be able to disable USB 3.0 in the BIOS.
If the BIOS does not have the option to disable USB 3.0, try running the following command in dom0 to [force USB 2.0 modes for the USB ports][force_usb2]:
lspci -nn | grep USB | cut -d '[' -f3 | cut -d ']' -f1 | xargs -I@ setpci -H1 -d @ d0.l=0
Errors suggesting this issue:
@ -475,3 +479,4 @@ No. Unlike many other virtualization systems, Qubes takes special effort to keep
This has been achieved thanks to the careful use of Xen's stub domain feature.
For more details about how we improved on Xen's native stub domain use, see [here](https://blog.invisiblethings.org/2012/03/03/windows-support-coming-to-qubes.html).
[force_usb2]: https://www.systutorials.com/qa/1908/how-to-force-a-usb-3-0-port-to-work-in-usb-2-0-mode-in-linux