Installation error: need at least 3mb more on /boot/efi

58 views
Skip to first unread message

dark...@gmail.com

unread,
Jan 25, 2018, 4:10:53 AM1/25/18
to qubes-users
Hi,
as per title, when trying to install on a laptop (with new partitions automatically created by the installer) I get this error.
I've seen another person with the same problem but he was upgrading qubes, qhereas I'm on a fresh install.
Thanks for your help!

awokd

unread,
Jan 25, 2018, 5:11:49 AM1/25/18
to dark...@gmail.com, qubes-users
3.2 or 4.0? In 3.2 I believe the installer re-uses the existing EFI
partition instead of creating a new one. 4.0 might be the same. So a
couple options are:
- completely wipe the drive before installing Qubes on it (e.g. secure
erase if SSD). If that doesn't work,
- manually specify partition sizes on install. I'd set EFI at 512MB.

dark...@gmail.com

unread,
Jan 25, 2018, 5:14:39 AM1/25/18
to qubes-users
4.0. I'll try asap.

awokd

unread,
Jan 25, 2018, 5:19:34 AM1/25/18
to dark...@gmail.com, qubes-users
On Thu, January 25, 2018 10:14 am, dark...@gmail.com wrote:
> 4.0. I'll try asap.

Sorry, thought of a third option right after hitting send...

You might have leftover junk in the EFI partition from other OSes. You
could look around in /boot/efi/EFI to see if there's anything to delete to
free up space. It's pretty easy to end up with a non-booting system if
there are other OSes on the same drive, so use caution if that's the case
(don't think it is in yours).

dark...@gmail.com

unread,
Jan 25, 2018, 10:28:30 AM1/25/18
to qubes-users
I'm back and you were right! There was some efi junk on ssd that once deleted let me install smoothly. Although I'm now facing another issue: when I boot up for the first time, the qubes configuration goes all the way until a point when it gives me a pci-related error (I'll try reproducing it again but I dumbly closed the window). Anyways, the os let's me enter the desktop aaaand I can't open VMs. This means that whatever VM I click on won't open. The only VM that opens is sys-usb.
Regards

Yuraeitha

unread,
Jan 25, 2018, 11:47:30 AM1/25/18
to qubes-users
On Thursday, January 25, 2018 at 4:28:30 PM UTC+1, dark...@gmail.com wrote:
> I'm back and you were right! There was some efi junk on ssd that once deleted let me install smoothly. Although I'm now facing another issue: when I boot up for the first time, the qubes configuration goes all the way until a point when it gives me a pci-related error (I'll try reproducing it again but I dumbly closed the window). Anyways, the os let's me enter the desktop aaaand I can't open VMs. This means that whatever VM I click on won't open. The only VM that opens is sys-usb.
> Regards

Were it by any chance python code errors? and happening the moment you tried to configure new VM's, network, etc. during the last step after first boot?

In which case, you can solve it either by identifying missing UEFI/BIOS settings, updating UEFI/BIOS (be sure you know what you do first, so you don't brick your hardware here), and lastly but not least, you can pull out the HDD/SSD/NMMe, whichever you use, and then put it in another computer. Install Qubes, fully update Qubes, and then pull the drive back out and put it back in your original machine. I've successfully done this a few times to bypass the Qubes 4 errors and other installation issues that normally are fixed with updates, but are not fixed in the install medium. This in particular helps in Qubes 4, where this step frequently happens during the last setup step on first boot on the Qubes 4 RC-1 / RC-2 and RC-3. Hopefully RC-4 is free of this issue.

Precausions!!

1): Using this method, it's best to only install with Grub, unless you know your way around UEFI/EFI install paths. If you use UEFI/EFI, then not only will it be tricky to regain any old EFI paths you had on the other machine, it will also be tricky to install on the current machine when you put it back in. If you on the other hand install with LegacyBIOS/Grub, then it should just work, plain and simple.

2: Might want to pull out any drives you got on the other machine, while installing Qubes, just in case anything should be written to the drives, like new grub configurations, etc. just to be safe, remove them. Then put them back in as they were when you pull the drive out you just installed Qubes on (best use same cables if any software is sensitive to the drive numbers).

3: When you put it back in the old machine, and errors that were corrected between RC-3 and now today, will be fixed.

I've had quite a lot of success on multiple different Qubes 4 machines using this method as of late.

Maybe worth a a try if you got a sparing computer around that can run Qubes?

Just keep in mind your Qubes will be exposed to unsafe hardware if the other machine isn't trustworthy. But for the most part, if its beween not getting Qubes to work, and this, then it's well worth the risk imho. Also the risk might be low, depending on what you pulled that machine through, and/or your public profile. Like probably only high profile people are heavily targeted, like really heavy profiles. You're probably not at much rish in this day and age, but you never know for sure though, but probably not big odds.

Either way, it's definitely worth it if its your last option to try.

Also your description of the issue sounds a lot like the issues I encounter, where it helps installing on another machine, update, and then put the drive back. It may be worth a shot if you got the means to do it.

Further keep in mind if you break any still valid warrenties, and/or be sure you don't do something that might break your computer. Think twice, or triple, and ask if you got questions before doing something you're not sure about is doing. Just to be safer, there is always a risk when going into UEFI/BIOS settings, nevermind updating it which can brick your system if it breaks halffway or there is a corruption in your downloaded update file, poweroutages during UEFI/BIOS update, instability causing freezes, etc. etc.

dark...@gmail.com

unread,
Jan 25, 2018, 2:21:37 PM1/25/18
to qubes-users
Thanks for the lenghty response! Indeed the errors were python-code related, but it turns out the problem was in the sys-net domain not starting correctly because of the card reader, which was seemingly seen as a network adapter. Now that I fixed that everything seems to work properly and I'm loving it.
One last thing: I set qubes to update packages over tor. I immediately regretted
the decision. Is there a way to download update w/o Tor?
Regards

Yuraeitha

unread,
Jan 26, 2018, 12:12:20 PM1/26/18
to qubes-users

Glad you love it already, you will likeliy only grow even happier with Qubes over time :-) It's an amazing project indeed! and there is still a lot of new things going on, expanding the idea of what Qubes is about further. Like the recent news here https://www.qubes-os.org/news/2018/01/22/qubes-air/ as far as I understood it it's not changing Qubes or the ideas and principles behind Qubes, but it is however expanding what you can opt-in and with choices you have with Qubes.

Ad for changing updates over Tor, yes, and it's super easy too :-)
Go to Qubes menu ---> System Tools ---> Global Qubes Settings. In there, change the UpdateVM away from sys-whonix, and put it to sys-firewall. There are many in the list, but on any default install, you can only use sys-whonix or sys-firewall, the former for Tor, and the latter for regular network.

If you expand your default setup to include an VPN connection, multiple of VPN connections, or multiple of Tor connections, combine, or have multiple of firewalls, then here too is where you'll change where Qubes gets its updates from :-)

Note in Qubes 4, Qubes will handle the default pre-installed template updates, so that templates has no internet themselves (unlike Qubes 3.2. where every template has internet on their own). You still update the same way, but Qubes will handle the distribution of template packages. As far as I know, this too will follow this setting, although I'm only almost sure, not entire, I did not yet check if my assumption here is true or not.

dark...@gmail.com

unread,
Jan 26, 2018, 3:49:13 PM1/26/18
to qubes-users
Thanks for the support! Altough right now I'm not planning on using a VPN so I might look at that in the future.
I'm sorry I probably still can't understand how updates work in Qubes: I set the updateVM to sys-firewall as you said, I tried running sudo yum update in the fedora template and it still runs through TOR. I see a
package updater utility in system tools, but it hasn't got internet since it's in dom0 so I can't do anything from that. If I try updating from sys-firewall directly, it only updates that specific VM. Also, I don't know how to update the whonix VM, since Tor can't run because it isn't up to date.
Sorry for my noobyness. Have a great day
Reply all
Reply to author
Forward
0 new messages