Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upInstaller option to automatically rescue existing install from common boot issues #3973
Comments
andrewdavidwong
added
enhancement
C: installer
labels
Jun 9, 2018
andrewdavidwong
added this to the Release 4.1 milestone
Jun 9, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
RefinedSoftwareLLC
Jun 13, 2018
Per: https://groups.google.com/forum/#!topic/qubes-users/JwLKyzg32ao
- When needed, automatically remove rd.qubes.hide_all_usb Kernel Param, only if no PS/2 keyboard is in use but a usb one is, as a working keyboard is needed to enter hard drive password to boot Qubes OS. (Maybe their old PS/2 keyboard broke, they bought a new USB keyboard, now they are running Rescue to fix not being able to boot with the new keyboard.) Remove rd.qubes.hide_all_usb from
/etc/default/gruband/or/boot/efi/EFI/qubes/xen.cfgthen if needed runsudo grub2-mkconfig -o /boot/grub2/grub.cfgand/orsudo dracut -f /boot/efi/EFI/qubes/initramfs-$(uname -r).img $(uname -r).
RefinedSoftwareLLC
commented
Jun 13, 2018
•
|
Per: https://groups.google.com/forum/#!topic/qubes-users/JwLKyzg32ao
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
RefinedSoftwareLLC
Jun 13, 2018
- Automatic Rescue should save a human readable log of all the changes it made (if it has access to a hard drive with free space?). This allows debugging if something goes wrong, but also for self taught users to see what was needed to fix their system, and power users to manually revert changes as they wish (maybe to fix a non-standard duel boot that broke when getting Qubes OS to boot).
RefinedSoftwareLLC
commented
Jun 13, 2018
•
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
RefinedSoftwareLLC commentedJun 8, 2018
•
edited
Edited 2 times
-
RefinedSoftwareLLC
edited Jun 13, 2018 (most recent)
-
RefinedSoftwareLLC
edited Jun 8, 2018
-
RefinedSoftwareLLC
created Jun 8, 2018
Installer option to automatically rescue existing install from common boot issues.
This is an industry standard expected by normal users and mandatory for a good user experience (even if Qubes OS is flawless, other things can corrupt the boot sequence).
Qubes OS version:
Qubes-R4.0-x86_64.iso (I burned to DVD and installed onto a blank computer)
Affected component(s):
Entire Qubes OS as it doesn't boot to the screen asking for your encrypted hard drive password.
Qubes-R4.0-x86_64.iso's "Rescue a Qubes system" needs updated with this new feature.
Steps to reproduce the behavior:
Install Qubes OS R4.0.
sudo qubes-dom0-updateorsudo qubes-dom0-update --enablerepo=qubes-dom0-security-testingReboot your computer.
Burn Qubes-R4.0-x86_64.iso to a DVD & Boot from it.
Select "Troubleshooting", then "Rescue a Qubes system".
The only options are to be dropped into a shell, even though the fix can be automated.
chroot /mnt/sysimagevim /boot/efi/EFI/qubes/xen.cfgChange
default=...to have the...be one of the options listed below in the same file.Reboot your computer.
Expected behavior:
Selecting '1' for automatic, will do the following rescue steps:
Note: Before each rescue step makes its change:
[Admins, feel free to edit this post to update these checkboxes as needed]
/boot/efi/is full, before making a change, free up enough space for that change to not error out.default=...has...set to one of the options listed below in the same file and one that passes the following tests. (If listed, use non-corrupt rescue kernel, #3624)More rescue steps to add:
Actual behavior:
During
sudo qubes-dom0-updatethe stepInstall kernel-qubes-vm-1000:4.14.41-1.pvops.qubes.x86_64doesn't clean itself up after the errorcp: error writing '/boot/efi/EFI/qubes/initramfs-4.14.41-1.props.qubes.x86_64.img': no space left on device.Reboot entire computer.
Qubes OS doesn't boot to the screen asking for your encrypted hard drive password.
Burn Qubes-R4.0-x86_64.iso to a DVD & Boot from it.
Select "Troubleshooting", then "Rescue a Qubes system".
The only options are to be dropped into a shell, even though the fix can be automated.
Google error & ask community support. Community support implies that it is normal for the Qubes OS recovery DVD to not be able to automatically fix or rollback a dom0 update (from following a Qubes Security Bulletin) nor any common boot issue. A common user then hates Qubes OS and installs a different operating system.