Andrew David Wong:

In addition, advanced users with customized setups are advised that the
LVM patch changes the LVM's default value for "global_filter" [5]. This
means you must ensure that the device that contains the LVM with Qubes'
rootfs is allowed, or else your system will not boot.

[5] https://github.com/QubesOS/qubes-lvm2/blob/v2.03.09-2/lvm2-set-default-global_filter.patch

From looking at part of the patch:

-       # global_filter = [ "a|.*|" ]
+       # global_filter = [ "a|^/dev/disk/by-id/dm-uuid-CRYPT-LUKS[12]-.*|",
+       #                   "a|^/dev/nvme.*|",
+       #                   "a|^/dev/sd.*|",
+       #                   "a|^/dev/md.*|",
+       #                   "r|.*|" ]

I see how it allows crypt-luks volumes in general, along with nvme, sata, and raid. What does that last line allow?

--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6551cfb6-6e89-4598-0b47-0415a73d4a61%40danwin1210.de.

Reply via email to