Initial install with default template settings:
['/usr/bin/qvm-start: 'sys-firewall'] failed: stdout:"" stderr:"start failed: internal error: libxenlight failed to create new domain 'sys-firewall', see /var/log/libvert/libxl/libxl-driver.log
ISO file integrity has
been verified. Media
tests during a multiple re-install attempts with different media have passed, and yet the error is reproduced.
you must run firewallVM in pv mode. then most possibe will start.
Hi please help! Same exact issue here, no matter what I do. Everything is halted except dom0. Nothing starts without being in PV mode, which doesn't seem to be due to hardware incompatibility.
Last 5 lines of qubes-hcl-report=
HVM: Active
I/0 MMU: Active
HAP/SLAT: YES
TPM: Device not found
Remapping: Yes
Just before the final "Setting up network" message of the configuration, the firewall isn't allowed to be created. /var/log/libvert/libxl/libxl-driver.log reveals:
2016-07-25 23:51:37.947+0000: libxl: libxl.c:1853:libxl_console_get_tty: unable to read console tty path `/local/domain/1/console/tty': Resource temporarily unavailable
2016-07-25 23:54:01.037+0000: libxl: libxl.c:1853:libxl_console_get_tty: unable to read console tty path `/local/domain/2/console/tty': Resource temporarily unavailable
2016-07-25 23:56:10.997+0000: libxl: libxl.c:1853:libxl_console_get_tty: unable to read console tty path `/local/domain/3/console/tty': Resource temporarily unavailable
2016-07-25 23:58:15.459+0000: libxl: libxl.c:1853:libxl_console_get_tty: unable to read console tty path `/local/domain/4/console/tty': Resource temporarily unavailable
2016-07-26 00:01:02.935+0000: libxl: libxl_device.c:1081:device_backend_callback: unable to add device with path /local/domain/5/backend/vif/7/0
2016-07-26 00:01:02.935+0000: libxl: libxl_create.c:1512:domcreate_attach_devices: unable to add nic devices
2016-07-26 00:01:02.953+0000: libxl: libxl_device.c:965:libxl__initiate_device_generic_remove: backend /local/domain/5/backend/vif/7/0 already removed, cleanup frontend only
2016-07-26 00:01:03.025+0000: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: unable to release device /dev/loop0: No such device or address
2016-07-25 23:50:31.812+0000: libxl: libxl_device.c:1081:device_backend_callback: unable to add device with path /local/domain/1/backend/vif/3/0
2016-07-25 23:50:31.812+0000: libxl: libxl_create.c:1512:domcreate_attach_devices: unable to add nic devices
2016-07-25 23:50:31.834+0000: libxl: libxl_device.c:965:libxl__initiate_device_generic_remove: backend /local/domain/1/backend/vif/3/0 already removed, cleanup frontend only
2016-07-25 23:50:31.901+0000: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: unable to release device /dev/loop0: No such device or address
2016-07-25 23:50:47.897+0000: libxl: libxl_device.c:1081:device_backend_callback: unable to add device with path /local/domain/4/backend/vif/6/0
2016-07-25 23:50:47.897+0000: libxl: libxl_create.c:1512:domcreate_attach_devices: unable to add nic devices
2016-07-25 23:50:47.914+0000: libxl: libxl_device.c:965:libxl__initiate_device_generic_remove: backend /local/domain/4/backend/vif/6/0 already removed, cleanup frontend only
2016-07-25 23:50:47.985+0000: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: unable to release device /dev/loop0: No such device or address
2016-07-25 23:52:23.457+0000: libxl: libxl_device.c:1081:device_backend_callback: unable to add device with path /local/domain/7/backend/vif/9/0
2016-07-25 23:52:23.457+0000: libxl: libxl_create.c:1512:domcreate_attach_devices: unable to add nic devices
2016-07-25 23:52:23.473+0000: libxl: libxl_device.c:965:libxl__initiate_device_generic_remove: backend /local/domain/7/backend/vif/9/0 already removed, cleanup frontend only
2016-07-25 23:52:23.544+0000: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: unable to release device /dev/loop0: No such device or address
2016-07-26 00:00:12.610+0000: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: unable to release device /dev/loop0: No such device or address
2016-07-26 00:14:48.002+0000: libxl: libxl_linux.c:155:libxl__loopdev_cleanup: unable to release device /dev/loop0: No such device or address
2016-07-26 00:16:23.732+0000: libxl: libxl.c:1853:libxl_console_get_tty: unable to read console tty path `/local/domain/16/console/tty': Resource temporarily unavailable
2016-07-26 00:17:30.891+0000: libxl: libxl.c:1853:libxl_console_get_tty: unable to read console tty path `/local/domain/17/console/tty': Resource temporarily unavailable
> you must run firewallVM in pv mode. then most possibe will start.
Nothing starts without PV mode, but it shouldn't have to be this way.
Thanks for replying! Makes sense. But sys-net still won't start unless in PV mode, like all other VMs. NICs attached or detached is irrelevant. I've even tried not allowing the installer to create them, as in making sys-VMs from scratch with the same result.
Debian/Fedora templates make no difference.
Attach options make no difference. Sys-net attempts to start, pop-up notification states it has started, but never goes pass the yellow state. Refresh qube list reveals it goes back into off state.
Nothing starts without PV mode. :(
It seems that firewall being unable to start during the installation's final configuration makes Qubes believe there is some kind of incompatibility?
What are the default partitions created because I'm seeing a discrepancy now. At times I see /boot/efi - 200MB. At others, it is only /boot at 1024MB... ? Could this be the problem?
It works! My BIOS automatically chooses UEFI for the thumb drive chosen to install. However, it has an option to directly boot any detected device. I chose the thumb drive with the direct boot option, without UEFI in its prefix.
This results in Automatic Partitioning creating a /boot partition for the bootloader, whereas when choosing to boot the thumb drive with UEFI prefixed, the installer creates /boot/efi.
The direct boot allows the installer to finish cleanly. The UEFI boot results in a failure to create sys-firewall domain for some reason.