mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-09 15:12:41 -04:00
Merge branch 'usb-troubleshooting' of https://github.com/PROTechThor/qubes-doc into PROTechThor-usb-troubleshooting
This commit is contained in:
commit
6b55542c67
3 changed files with 85 additions and 37 deletions
|
@ -487,43 +487,7 @@ Enable "debug mode" in the qube's settings, either by checking the box labeled "
|
|||
### I created a usbVM and assigned usb controllers to it. Now the usbVM wont boot.
|
||||
|
||||
This is probably because one of the controllers does not support reset.
|
||||
In Qubes R2 any such errors were ignored. In Qubes R3.x they are not.
|
||||
In R4.x, devices that are automatically added to sys-net and sys-usb on install but do not support FLR will be attached with the no-strict-reset option, but see the related warning in the last sentence in this answer.
|
||||
|
||||
A device that does not support reset is not ideal and generally should not be assigned to a VM.
|
||||
|
||||
Most likely the offending controller is a USB 3.0 device.
|
||||
You can remove this controller from the usbVM, and see if this allows the VM to boot.
|
||||
Alternatively you may be able to disable USB 3.0 in the BIOS.
|
||||
If the BIOS does not have the option to disable USB 3.0, try running the following command in dom0 to [force USB 2.0 modes for the USB ports][force_usb2]:
|
||||
|
||||
lspci -nn | grep USB | cut -d '[' -f3 | cut -d ']' -f1 | xargs -I@ setpci -H1 -d @ d0.l=0
|
||||
|
||||
|
||||
Errors suggesting this issue:
|
||||
|
||||
- in `xl dmesg` output:
|
||||
|
||||
(XEN) [VT-D] It's disallowed to assign 0000:00:1a.0 with shared RMRR at dbe9a000 for Dom19.
|
||||
(XEN) XEN_DOMCTL_assign_device: assign 0000:00:1a.0 to dom19 failed (-1)
|
||||
|
||||
- during `qvm-start sys-usb`:
|
||||
|
||||
internal error: Unable to reset PCI device [...] no FLR, PM reset or bus reset available.
|
||||
|
||||
|
||||
Another solution would be to set the pci_strictreset option in dom0:
|
||||
|
||||
- In Qubes R4.x, when attaching the PCI device to the VM (where `<BDF>` can be obtained from running `qvm-pci`):
|
||||
|
||||
qvm-pci attach --persistent --option no-strict-reset=true usbVM dom0:<BDF>
|
||||
|
||||
- In Qubes R3.x, by modifying the VM's properties:
|
||||
|
||||
qvm-prefs usbVM -s pci_strictreset false
|
||||
|
||||
These options allow the VM to ignore the error and the VM will start.
|
||||
Please review the notes in the `qvm-prefs` man page and [here][assign_devices] and be aware of the potential risks.
|
||||
See the [USB Troubleshooting guide](/doc/usb-troubleshooting/#usbvm-does-not-boot-after-creating-and-assigning-usb-controllers-to-it).
|
||||
|
||||
### I assigned a PCI device to a qube, then unassigned it/shut down the qube. Why isn't the device available in dom0?
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue