Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VM settings allow to modify PCI devices while VM is running #4933

Closed
marmarek opened this issue Mar 31, 2019 · 3 comments · Fixed by QubesOS/qubes-manager#169
Closed

VM settings allow to modify PCI devices while VM is running #4933

marmarek opened this issue Mar 31, 2019 · 3 comments · Fixed by QubesOS/qubes-manager#169
Assignees
Labels
C: manager/widget P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. r4.0-dom0-stable r4.1-dom0-cur-test

Comments

@marmarek
Copy link
Member

Qubes OS version
R4.0

Affected component(s) or functionality
manager

Brief summary
If VM is running there is "To modify PCI devices you have to turn off the qube" message, but it's possible to modify PCI devices anyway.

To Reproduce

  1. Open VM settings of running sys-usb
  2. Go to Devices tab
  3. Try to assign new device.

Expected behavior
Widget to modify devices inactive

Actual behavior
Widget to modify devices is active. Only "Configure strict reset for PCI devices" button is inactive.

@marmarek marmarek added T: bug C: manager/widget P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. labels Mar 31, 2019
@andrewdavidwong andrewdavidwong added this to the Release 4.0 updates milestone Mar 31, 2019
marmarta added a commit to marmarta/qubes-manager that referenced this issue Apr 2, 2019
PCI devices will now correctly be unmodifiable if the VM is running.

fixes QubesOS/qubes-issues#4933
@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-manager-4.0.32-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-manager-4.0.32-1.fc29 has been pushed to the r4.1 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-manager-4.0.33-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: manager/widget P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. r4.0-dom0-stable r4.1-dom0-cur-test
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants