On Sunday, January 28, 2018 at 4:17:10 AM UTC+1, Jo wrote: > Yes, im running the backups trough sys-usb-> extern ssd.The sys-usb is > the default one from the installation.Im doing a complete new setup, for > the very same reasons you mentioned. > > Updating (and enabling testingrepos) was the very first thing i did. > > Im using coreboot+seabios and coreboot+grub+encrypted /boot, i could try > an installation with the original bios/firmware, however this would be > only for testing-purposes, since it would completely break my my > security-setup/threat-model. > > They device(x230/i7/16gbram) did run qubes 3:2 so far without any > issues.(and the very same coreboot images) > > Thanks for the hint, i will play around a bit tomorrow with different > coreboot images. > > cheers. > > > On 01/28/2018 03:56 AM, Yuraeitha wrote: > > > > - Are you running the backup through an AppVM? Doing backup in dom0 may > > cause bugs or be really slow. I believe this is involved in the > > python/admin code in Qubes 4, and is therefore different than it was in > > Qubes 3.2. So in Qubes 4, be sure to do it in an AppVM, freshly made in > > Qubes 4. The general idea I believe is to allow to network the backup > > process, that's why it was made to work in an AppVM. No attention was given > > to allow backup in dom0 here, probably on purpose since nothing should be > > done in dom0 anyway. > > > > - Is the template/AppVM you're using specifically to run the backup based > > on a Qubes 4 template/AppVM? While Qubes 3.2. AppVM's can work in Qubes 4, > > it's generally my experience that they are more buggy/slow, and work better > > if re-made in Qubes 4 and then transfer the files over. Personally I took > > no chances and purged all my Qubes 3.2. templates/AppVM's in favour for > > fresh Qubes 4 ones. Removing Qubes 3.2. templates is obvious due to likely > > code differences in the qubes-core-agent-* packages, etc., but the AppVM is > > more controversial without confirmation and based on anecdotal experience. > > Generally I experienced improvements by purging Qubes 3.2. AppVM's in > > favour for freshly Qubes 4 made ones. > > > > - Did you update dom0? I've also seen the qvm-create not working, but this > > only happens on a buggy install of Qubes 4, typically with python errors on > > the last step during first boot when creating default VM-configuarations > > and networking VM's. Generally I solved it either by re-install with > > different UEFI/BIOS settings, EFI/Grub settings, UEFI/BIOS update, try > > switch between EFI/Grub boot methods, loading different drivers. > > > > Generally the most effective method to get Qubes 4 RC-1/2/3 to work on a > > system that I had issues with, was to unplug the drive, put it in a machine > > that works with Qubes. Then install Qubes, update it fully, and then put it > > back into the first machine again. Usually always work for me on any > > machine that on paper should support Qubes. Also Grub is easier to do this, > > as EFI paths can be a pain to adjust, they change when moving from a > > machine to another, while Grub does not change. Also be careful if you > > install on another machine, might be a good idea to remove the other drives > > first, just in case. Also EFI installs on a machine with existing EFI paths > > may cause issues. > > All in all in short, use Grub is recommended here, and also to unplug other > > drives on the install machine you use. > > > > Assuming you did not update dom0 due to the above bug, then once you get it > > updated, everything "should" work much, much better. > >
Np's :) I hope you succeed! I've sometimes had longer issues with the UEFI/BIOS settings. I remember once when I started using Qubes, I used a couple of days to figure out why I could't install Qubes on a z170 Asus motherboard, i5 6500 CPU. Then it turned out it was a UEFI/BIOS setting to allow two graphic cards (one intel onboard, the other extenal nvidia card). Quite frankly, I was stunned by the cause, sometimes it's settings we least expect to cause any problems. The mix of VT-d, hypervisors and other exotic things in Qubes, seems to make it more sensitive to some UEFI/BIOS settings. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/043d86e4-8fec-436e-b2a1-5dc20506957e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.