-----BEGIN PGP SIGNED MESSAGE-----
On Fri, Jan 29, 2016 at 12:54:25AM -0800, jerome....@gmail.com
> Fresh install Qubes R3.1 RC2. I haven t tested everything yet but it looks
> I attached my detailed HCL report.
> I had the well know freeze at first boot while setting the network. So i
> choose to create the default vm myself. There is a checkbox for this.
> I found this post from marek to create the defaults VM and everything
> worked :
> The sys-net and sys-firewall vms where created with the fedora template. I
> m a debian guy but i assume that these too should be fedora based :/ Am i
Theoretically you can also use Debian template for that, but you'll need
to install linux-firmware package at least (as most wifi cards requires
firmware blobs, unfortunately).
> I m still looking for the first boot script in order to verify that no
> other things are done in the recent version.
> One other way around would be to let the system freeze while setting the
> network, reboot in rescue mode, chroot in /mnt/sysimage and detach the
> device from the netvm.
> In my case the wireless card 02:00.0
> --> qvm-pci -d --offline-mode sys-net 02:00.0
> I haven t tested this yet, but it should work. I have dettached my wireless
> card plenty of times while looking to make the wireless card work using the
> "rescue" method.
> Finally got it to work thanks to the PCI permissive mode :
> Thanks a lot to this users list and to marek for the help provided.
> If someone could point me the first boot script, it would be greatly
> It seems that a lot of people have the freeze problem with BCM wireless
> card. If we can choose to not attach the card at first boot, that could
> really help to get things working and maybe point new users to the
> "permissive" workaround. Qubes seems to be installed primary on laptops.
Generally it is possible to simply not create any VMs there. Then create
them either manually, or using management stack (the same way as
firstboot does it). And adjust some settings then. Creating VMs using
management stack is quite easy (but I think not documented yet...):
1. Choose what you want to use and enable using `qubesctl top.enable`
tool. Available options:
- qvm.sys-net, qvm.sys-firewall - standard sys-net and sys-firewall
VMs, required for other VMs options
- qvm.sys-usb - USB VM
, qvm.personal, qvm.vault, qvm.untrusted - standard AppVMs
- qvm.sys-whonix, qvm.anon-whonix - Whonix gateway and workstation
You can enable multiple of them in a single command call:
qubesctl top.enable qvm.sys-net qvm.sys-firewall qvm.work
2. Apply the configuration (create selected VMs):
@Axon, any idea where to put that in the documentation? User FAQ?
Separate page about boot/installation related troubleshooting? Somewhere
else? Could you put that info there?
Another thing is an option to simply not start the VMs in case of such
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
-----END PGP SIGNATURE-----