-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Listing PCI devices breaks when there is some with non-0000 PCI domain #6932
Comments
Unfortunately I am also experiencing this same issue on:
Tried using 4.1 rc3 and 4.1 rc2 rc2 There is a related post on the qubes forum here. I believe it is just myself and the OP here on that post as well but it seems one thing we have in common is the 11th gen intel processor. So when I do qvm-pci i get an error that says there is no permission to view pci devices, I can give a better more detailed explanation when I get on that device again but essentially the devices tab is greyed out in the settings for any vm. on the other hand, lspci and lsusb populate just fine. The only thing I havent yet tried is putting the ssd in my computer and installing it without using a usb cord and enabling sys-usb during the installation. I will attempt to do so soon though and report back also. Note: |
I have similar issues, adding just to help debugging this: Qubes OS release R4.1 Brief Summary: My device: Dell XPS 9510 Steps to re-produce: Expected behaviour:
Actual behaviour:
|
Same issue after replacing my old thinkpad with 11th gen intel cpu laptop. Everything works, except qvm-pci command and Device tab which is greyed out in AppVM settings window (because of broken qvm-pci command). Device specs (Asus ExpertBook):
Result of qvm-pci while trying to attach pci device to AppVM
|
@xunillen Can you post the output of |
Yes, of course. Hope it helps Output of "journalctl -b -u qubesd.service":
|
Can you show output of |
Here you go. output of
|
Thanks! Obviously |
Here's the problem, nothing is connected to the ThunderBolt port. And i forgot to say, this laptop has Intel Volume Management Device (VMD) technology enabled. Can that cause such issues? Here is the output of
|
That is probably the culprit, but I have no idea how dom0 should handle it.
It does, and is about what I would expect for VMD given what I have just seen on Intel’s website. |
Perhaps Intel Volume Management Device can be disabled in bios? B |
The proposed solution to de-activate VMD worked for me: I de-activated
it in BIOS, and after re-booting the laptop
- I can run "qvm-pci" and get a list of devices
- The tab "Devices" under "Settings" is not greyed out anymore.
Thanks for all your help!
…On 3/31/22 01:08, Brendan Hoar wrote:
Perhaps Intel Volume Management Device can be disabled in bios?
B
—
Reply to this email directly, view it on GitHub
<#6932 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ADEOH7ZERRKZWYSMDJ6ZUWTVCTNHLANCNFSM5FI2BGPA>.
You are receiving this because you commented.Message ID:
***@***.***>
|
I can confirm what RaspyVotan said. I just disabled VMD in BIOS and everything is working fine now. |
This is a quick band-aid to unbreak Qubes on systems having such device. Later change should implement handling them properly instead of ignoring. Fixes QubesOS/qubes-issues#6932 (cherry picked from commit 3384d98)
Automated announcement from builder-github The component
|
Automated announcement from builder-github The component
Or update dom0 via Qubes Manager. |
How to file a helpful issue
Qubes OS release
R4.1
Brief summary
All actions related to PCI devices fail with the following error in journalctl:
Steps to reproduce
Install Qubes 4.1 on Dell Latitude 5520
11th Gen Intel i7-1185G7
Error occurs on initial setup, when configuring sys-net/sys-usb
Expected behavior
PCI devices are usable. no errors occur
Actual behavior
PCI devices are not usable
Devices Tab in Qubes Manager is greyed out
sys-net does not start
qvm-devices pci does show nothing
The text was updated successfully, but these errors were encountered: