From 7060c4a6fa8979ce65082768b3b473145a1b87c7 Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Thu, 15 Apr 2021 09:07:15 -0700 Subject: [PATCH] Fix code block syntax --- user/troubleshooting/usb-troubleshooting.md | 26 ++++++++++----------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/user/troubleshooting/usb-troubleshooting.md b/user/troubleshooting/usb-troubleshooting.md index c8194b4e..f83ac75d 100644 --- a/user/troubleshooting/usb-troubleshooting.md +++ b/user/troubleshooting/usb-troubleshooting.md @@ -55,30 +55,30 @@ Errors suggesting this issue: - in `xl dmesg` output: - ``` - (XEN) [VT-D] It's disallowed to assign 0000:00:1a.0 with shared RMRR at dbe9a000 for Dom19. - (XEN) XEN_DOMCTL_assign_device: assign 0000:00:1a.0 to dom19 failed (-1) - ``` + ``` + (XEN) [VT-D] It's disallowed to assign 0000:00:1a.0 with shared RMRR at dbe9a000 for Dom19. + (XEN) XEN_DOMCTL_assign_device: assign 0000:00:1a.0 to dom19 failed (-1) + ``` - during `qvm-start sys-usb`: - ``` - internal error: Unable to reset PCI device [...] no FLR, PM reset or bus reset available. - ``` + ``` + internal error: Unable to reset PCI device [...] no FLR, PM reset or bus reset available. + ``` Another solution would be to set the pci_strictreset option in dom0: - In Qubes R4.x, when attaching the PCI device to the VM (where `` can be obtained from running `qvm-pci`): - ``` - qvm-pci attach --persistent --option no-strict-reset=true usbVM dom0: - ``` + ``` + qvm-pci attach --persistent --option no-strict-reset=true usbVM dom0: + ``` - In Qubes R3.x, by modifying the VM's properties: - ``` - qvm-prefs usbVM -s pci_strictreset false - ``` + ``` + qvm-prefs usbVM -s pci_strictreset false + ``` These options allow the VM to ignore the error and the VM will start. Please review the notes in the `qvm-prefs` man page and [here](/doc/device-handling/) and be aware of the potential risks.