Andrew David Wong:
In addition, advanced users with customized setups are advised that the
LVM patch changes the LVM's default value for "global_filter" [5]. This
means you must ensure that the device that contains the LVM with Qubes'
rootfs is allowed, or else your system will not boot.
[5]
https://github.com/QubesOS/qubes-lvm2/blob/v2.03.09-2/lvm2-set-default-global_filter.patch
From looking at part of the patch:
- # global_filter = [ "a|.*|" ]
+ # global_filter = [ "a|^/dev/disk/by-id/dm-uuid-CRYPT-LUKS[12]-.*|",
+ # "a|^/dev/nvme.*|",
+ # "a|^/dev/sd.*|",
+ # "a|^/dev/md.*|",
+ # "r|.*|" ]
I see how it allows crypt-luks volumes in general, along with nvme,
sata, and raid. What does that last line allow?
--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/6551cfb6-6e89-4598-0b47-0415a73d4a61%40danwin1210.de.