Qubes The new concept of Hidden Service Server

EloyBeltran
Posts: 27
Joined: Tue Jun 25, 2019 11:27 pm
languages_spoken: spanish
ODROIDs: xu4
Has thanked: 0
Been thanked: 0
Contact:

Qubes The new concept of Hidden Service Server

Unread post by EloyBeltran » Sun Mar 22, 2020 7:47 am

Qubes installation is possible in KVM, because QEMU support hipervisor type Xen.

But VT-d doesn't work, I have ennable in the BIOS.

Probably i need additional device in HVMe, in the PCI, because the error said: FILE in attachments.

I would like to make a review with Qubes installation, is very interesting make a Virtual Anonymous Secure Server on LEMP.

PVH Default VMs without PCI devices (most VMs)
HVM Default VMs with PCI devices
N/A Stub domains - Default VMs w/o PCI devices
PV Stub domains - Default VMs w/ PCI devices
PV Stub domains - HVMs

['/usr/bin/qvm-start', 'sys-firewall'] failed:

stdout: ""

stderr: "Start failed: internal error: Unable to reset PCI device 0000:02:00.1:

internal error: Active 0000:02:00.0 devices on bus with 0000:02:00.1, not

doing bus reset, see /var/log/libvirt/libxl-driver.log for details"


First thing first your firewall appVM should be clean or with ip_tabels rules or firewall gui(settings firewall tab) rules or qvm-firewall from dom0 and no pci device should be attached to the appVM.

read the /var/log/libvirt/libxl-driver.log

Anyway try the following:

Disable the memory balancing in settings (advance tab)

or

Configure strict reset for pci devices in settings (devices tab)
Attachments
20200321_214851.jpg
20200321_214851.jpg (281.69 KiB) Viewed 342 times
20200321_215258.jpg
20200321_215258.jpg (247.54 KiB) Viewed 342 times
20200321_215132.jpg
20200321_215132.jpg (316.23 KiB) Viewed 342 times
20200320_023124.jpg
20200320_023124.jpg (581.93 KiB) Viewed 343 times

Post Reply

Return to “Other OS”

Who is online

Users browsing this forum: No registered users and 3 guests