Re: [qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping"
On 09/06/2020 13:25, sysad.andes wrote: Original message From: 'Chris Jones' via qubes-users Date: 6/8/20 22:16 (GMT-05:00) To: qubes-users@googlegroups.com Subject: [qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping" Hi all,New user here, trying and failing to install Qubes R4.0.3 on a new Dell Precision 3630 Tower with Xeon E-2288G cpu.I verfied the ISO and wrote it to a USB stick with dd.If I set the BIOS to boot from the USB stick in UEFI mode then I get dump of registers and stack trace and it says "Panic on CPU 0: FATAL PAGE FAULT"If I set the BIOS to boot in Legacy External Devices mode, and boot from the USB stick, the Qubes installer menu comes up. If I select "Install Qubes R4.0.3" then I am offered the chance to select a language, after which an error window pops up: "Unsupported Hardware Detected"... "Missing Features: HAP/SLAT/EPT/RVI, Interrupt Remapping"In the BIOS settings I had already ticked "Enable Intel Virtualization Technology" and also "Enable VT for Direct I/O". It also does not seem to make any difference whether I tick "Trusted Execution" in the BIOS.I guess there is a possibility that there is a bug in the BIOS, I have R2.3.1 installed.Does anyone have any ideas?Thanks in advance,Chris>>Double check that any reference to any other virtualization technology is enabled in BIOS, specifically EPT/SLAT, ie extended paging tables, your processor seems to support this, but it sounds like the installation candidate isn't detecting the availability of the technology.-- You received this message because you are subscribed to the Google Groups "qubes-users" group.To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.to view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/00ce4587-c920-040b-7d69-8da2fb9d5e4c%40yahoo.com. Thank you very much for replying. I can't see any other virtualization options in the BIOS that I could turn on. I think I must have tried just about everything there. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ed6a71f4-c95f-d88a-b625-c51504dd91de%40yahoo.com.
RE: [qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping"
Original message From: 'Chris Jones' via qubes-users Date: 6/8/20 22:16 (GMT-05:00) To: qubes-users@googlegroups.com Subject: [qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping" Hi all,New user here, trying and failing to install Qubes R4.0.3 on a new Dell Precision 3630 Tower with Xeon E-2288G cpu.I verfied the ISO and wrote it to a USB stick with dd.If I set the BIOS to boot from the USB stick in UEFI mode then I get dump of registers and stack trace and it says "Panic on CPU 0: FATAL PAGE FAULT"If I set the BIOS to boot in Legacy External Devices mode, and boot from the USB stick, the Qubes installer menu comes up. If I select "Install Qubes R4.0.3" then I am offered the chance to select a language, after which an error window pops up: "Unsupported Hardware Detected"... "Missing Features: HAP/SLAT/EPT/RVI, Interrupt Remapping"In the BIOS settings I had already ticked "Enable Intel Virtualization Technology" and also "Enable VT for Direct I/O". It also does not seem to make any difference whether I tick "Trusted Execution" in the BIOS.I guess there is a possibility that there is a bug in the BIOS, I have R2.3.1 installed.Does anyone have any ideas?Thanks in advance,Chris>>Double check that any reference to any other virtualization technology is enabled in BIOS, specifically EPT/SLAT, ie extended paging tables, your processor seems to support this, but it sounds like the installation candidate isn't detecting the availability of the technology.-- You received this message because you are subscribed to the Google Groups "qubes-users" group.To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.to view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/00ce4587-c920-040b-7d69-8da2fb9d5e4c%40yahoo.com. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5edf0144.1c69fb81.5d2e8.10cb%40mx.google.com.
[qubes-users] Fedora template upgrades: recreating DispVM Template vs 'rebasing'
Hello there. When upgrading a Qubes 4 system to a new Fedora template, what are the differences between regenerating the DisposableVM Template from the new template using step 3 from [1]: [user@dom0 ~]$ qvm-create -l red -t new-template new-template-dvm [user@dom0 ~]$ qvm-prefs new-template-dvm template_for_dispvms True [user@dom0 ~]$ qvm-features new-template-dvm appmenus-dispvm 1 [user@dom0 ~]$ qubes-prefs default-dispvm new-template-dvm and changing the base template of the existing DisposableVM Template, either with Qubes Manager or: qvm-prefs template ? I've run the four steps above to regenerate the DispVM Template during previous upgrades, but swapping out the base template also seems to work. I thought the reason the additional steps were recommended in the docs might be to encourage periodically cleaning out/resetting unneeded software/data from the DispVM Template. But that seems like a good practice for AppVMs as well. I only have some light customization of Firefox and a few other applications in the DispVM Template, so I'm wondering if just changing the base template is appropriate for me. Thanks! [1] https://www.qubes-os.org/doc/templates/#switching -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c8d958f1-9c7d-4e2f-86a1-7b1f87be8101o%40googlegroups.com.
[qubes-users] Help with "Missing Features HAP/SLAT/EPT/RVI, Interrupt Remapping"
Hi all, New user here, trying and failing to install Qubes R4.0.3 on a new Dell Precision 3630 Tower with Xeon E-2288G cpu. I verfied the ISO and wrote it to a USB stick with dd. If I set the BIOS to boot from the USB stick in UEFI mode then I get dump of registers and stack trace and it says "Panic on CPU 0: FATAL PAGE FAULT" If I set the BIOS to boot in Legacy External Devices mode, and boot from the USB stick, the Qubes installer menu comes up. If I select "Install Qubes R4.0.3" then I am offered the chance to select a language, after which an error window pops up: "Unsupported Hardware Detected"... "Missing Features: HAP/SLAT/EPT/RVI, Interrupt Remapping" In the BIOS settings I had already ticked "Enable Intel Virtualization Technology" and also "Enable VT for Direct I/O". It also does not seem to make any difference whether I tick "Trusted Execution" in the BIOS. I guess there is a possibility that there is a bug in the BIOS, I have R2.3.1 installed. Does anyone have any ideas? Thanks in advance, Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/00ce4587-c920-040b-7d69-8da2fb9d5e4c%40yahoo.com.
[qubes-users] HCL - Dell Inc. Inspiron 3520
All works really well, since r3.2 . Processor was upgraded to i7-2460M , not sure what the device originally shipped with. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3dUTMB3B9ydTLKH-tfI3MbPb7d9kzt3FfOfaF7GOmQ_khH0K_HJtuH0Fru53q9RjfW_aVkbnUGeMRNcRpU4-hjHEZE8sCgAwSocMqkfm_GU%3D%40protonmail.com.
[qubes-users] Re: Domain XXX has failed to start: volume qubes/BBB missing
Oh and i forgot but i tried lvremove or other simple command but all failed with message > Failed to ... because qubes/poolhd0 not accessible. Manual repair required -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/75195d17-de73-4a98-84a7-68d7490a4e2fo%40googlegroups.com.
[qubes-users] Does qubes protect against all firmware viruses ?
I understand, that Qubes compartmentalizes OS and parts of OS don't have access to other parts of the OS. So even if you had virus in your firmware of a network card, it wouldn't matter. I know firmware viruses are rare, but still better safe than sorry. I am looking for safe OS to do online banking from. If i use live usb of QUBES, does that protect me against all firmware viruses ? I wonder. Even there is like 0.2% chance of being infected with it. Also i can't disable all my disks in BIOS, could that be problem ? I mean if i use live-usb and don't boot my main OS, when usb is plugged in. So my main OS can't compromise Qubes. And even if disks were enabled and i boot up Qubes from live usb, i am not sure if it could get infected, because these viruses has to be loaded somehow right ? But if they are passively on the disk and you launch 2nd OS from live-usb, not sure if it could get infected like this. I wanted to dedicate my old pc for online banking, but Qubes doesn't work there. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/269515e3-2863-4da4-8a17-c9b470df2166o%40googlegroups.com.
Re: [qubes-users] Re: Replacing SSD with larger SSD on Qubes System
I figured out that I could restore as long as I allowed Qubes to set up sys-net, sys-firewall, etc. I wish there was an option during install for "restore Qubes from backup"... so you didn't need to create VMs you'd just need to delete later. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/db71674fee70370b84e9aa446bdedf5b%4086.is.
[qubes-users] How to set firewall rules for disp vms?
I need some help setting firewall rules for disp vms. In my house I have: router 192.168.0.1 printer 192.168.0.123 and everything else is 192.168.0.X For most of my app vms I want them to see the internet, printer and router but not any other device so I apply these rules: qvm-firewall email add action=accept 192.168.0.123/32 qvm-firewall email add action=accept 192.168.0.1/32 qvm-firewall email add action=drop 192.168.0.0/24 qvm-firewall email add action=accept 0.0.0.0/0 This works fine but when I open a document in a disp vm, the disp vm has access to everything. How can I apply the rules above to disp VMs? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8151cb2c-171a-4d74-85af-4282b6e8e5feo%40googlegroups.com.