Qubes R4.0.2-RC2 Custom Partition Fresh Install Issue

201 views
Skip to first unread message

Rafael Reis

unread,
Nov 6, 2019, 1:58:20 PM11/6/19
to qubes-users
Hey guys, 

TLDR> Qubes Installer does not let me assign mountpoints to the manually created lvm pools. (attachment)


After trying out Qubes for a while on a 64GB USB Drive, decided to pull the plug and get a dedicated 256GB disk for it in my laptop.
Went for the custom partitioning route, to increase encryption levels as per:https://www.qubes-os.org/doc/custom-install/
Followed the guide to the letter. Ran into the following issues:

1 - Step 6 says "Proceed with the installer. At the disk selection screen, select:" 
Does that mean I should reboot and restart installation? Or is there a command to resume installation from the shell? Since I didn't know the command I went for the reboot.

2 -  The installer detects the luks volume, decrypts it just fine. But the LVM pools although seemingly correctly created, have the mountpoints options greyed out (attachment)
If I set for the defaults instead of the custom partitioning, it appears to move with the install just fine.

Since I'm reinstalling from scratch, I'd like to take the opportunity to use the higher encryption levels instead of the defaults. 

Regards,

Rafael
IMG_4584.jpeg

Rafael Reis

unread,
Nov 6, 2019, 3:44:06 PM11/6/19
to qubes-users
Hey, 

So I was able to figure this one out on my own. 

The installer expects you to format filesystems prior to allocating the mountpoints. I honestly wasn't sure which FSes I should use. So i checked out what auto mode would do, and mimicked it with the custom created pools. As soon as I check Reformat option and choose the appropriate FS, the mountpoint box is whited out and I can move on with the installation. 

Maybe this step and the clarification of point 1 on my previous email could make it into the documentation, for improved clarity. 

Regards, 

Rafael

Andrew David Wong

unread,
Nov 7, 2019, 2:06:40 AM11/7/19
to Rafael Reis, qubes-users
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2019-11-06 2:44 PM, Rafael Reis wrote:
> Hey,
>
> So I was able to figure this one out on my own.
>
> The installer expects you to format filesystems prior to allocating
> the mountpoints. I honestly wasn't sure which FSes I should use. So
> i checked out what auto mode would do, and mimicked it with the
> custom created pools. As soon as I check Reformat option and choose
> the appropriate FS, the mountpoint box is whited out and I can move
> on with the installation.
>
> Maybe this step and the clarification of point 1 on my previous
> email could make it into the documentation, for improved clarity.
>
> Regards,
>
> Rafael
>

Would you mind contributing this change to the documentation? Here is
a guide for how to do so:

https://www.qubes-os.org/doc/doc-guidelines/#how-to-contribute

Thank you!
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3Dwm8ACgkQ203TvDlQ
MDCigRAAtNFoYoE9sU5TtapNwgV2ZvjxYGpBoOhCzp0YZ+TVXa0/SzLoTY0zhQVQ
iLfNGh55StiHpmAeZBx0fTy5fW2UnptkXCk55/2kBTF0i5ZFXWIdStzYut6ZAqSP
MGhcM9ewZsxbLqLXu6YOxRWt3i/J1SYjCqX/wDdemd2us3PkktN12eyMFWw97WPA
Eg1Dq91Dc7qCCEswzg78dPs58BS7oO9/OTbsJvJEjSEPReHKpEKOIjic5rNGH62r
rBPh29X9FImC30jbC/c7Ouefq8qFt+1LG11wvkUe93a84pH/D3m13MbRa/6B/jXm
w3zx86lQD2t1k2VV3du2+Zqz0HmYxUCJugfpjRuZrxTdbr8pwh0xe7NcJPXHfCPI
XY/r+JBxvMAimvYqrQjOuSVqnD3w7Ia0OqORRzSFTcjgXDwctartxclSmVdZCjVu
VNChcyOzLvu7Dh7tVZaXlslywS0DB3PmD3w6/FoQ3fdViOQMg6soNoegxEv/RxL0
Gy9yVSRidrrNyH3wXo6XVsT/7qJVDQyxkLTpGHD/2E95qGP8QZy+M2o7tD+yNwzw
Rd5EeNaGx/gTZrXhdyXNrUPb+AokUcfoAU538q2MJMh7DQvqnYNuMsVfzPz8DtMg
38rhnmZq3wosJuL2bC5sOzYubPkkraJBQmmEH4lS6ZlpaAATvJk=
=AD0F
-----END PGP SIGNATURE-----

Claudia

unread,
Nov 7, 2019, 6:01:46 AM11/7/19
to qubes...@googlegroups.com
Rafael Reis:
1: You can go back to the graphical installer from the shell using
ctrl-alt-f6 (or one of the other F-keys, I forget which one). Then click
"rescan devices." But rebooting works too.

2: I haven't quite figured out the Qubes/Fedora installer yet. It seems
it won't touch any filesystem it didn't format itself, so you always
have to let the installer format it. Looks like you figured that out.
This is, for example, why you can't use custom cryptsetup options and
btrfs at the same time - the installer refuses to install to an existing
filesystem, but it also won't let you create btrfs on dm-crypt.

Glad to hear you got it working.

-------------------------------------------------
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!

Rafael Reis

unread,
Nov 7, 2019, 9:59:30 AM11/7/19
to qubes-users
It's done!


Glad to help. Added a TODO note on the pull request to, in the future, add instructions for GPT / UEFI Installations. I ran into this issue. Did the whole thing which implies a MBR disk (step 2) and couldn't boot afterwards. Had to redo the disk initialization from a Live CD to GPT, and figure out the different mount points and filesystems for /boot/efi . I could propose instructions but I'd rather have someone more experienced review it.

Rafael

Andrew David Wong

unread,
Nov 7, 2019, 11:33:14 PM11/7/19
to Rafael Reis, qubes-users
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2019-11-07 8:59 AM, Rafael Reis wrote:
> It's done!
>
> https://github.com/QubesOS/qubes-doc/pull/881
>
> Glad to help. Added a TODO note on the pull request to, in the future, add
> instructions for GPT / UEFI Installations. I ran into this issue. Did the
> whole thing which implies a MBR disk (step 2) and couldn't boot afterwards.
> Had to redo the disk initialization from a Live CD to GPT, and figure out
> the different mount points and filesystems for /boot/efi . I could propose
> instructions but I'd rather have someone more experienced review it.
>
> Rafael
>

Thank you!

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-----BEGIN PGP SIGNATURE-----
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=CKqg
-----END PGP SIGNATURE-----

Reply all
Reply to author
Forward
0 new messages