Re: [qubes-users] Move To a Larger Disk

2020-06-24 Thread 'Matt Drez' via qubes-users
sorry, I was a cottonheaded-ninnymuggins. I was supposed to run the lvextend against the /dev/mapper/qubes_dom0-root Now I did it but for some reason the lvs still won't see the full size [@dom0 ~]$ sudo lvextend -l +100%FREE /dev/mapper/qubes_dom0-root WARNING: Sum of all thin volume

[qubes-users] Quebes for noobs (Installation)

2020-06-24 Thread Bostongeorge
I am new to this OS, wondering if its possible to install this with this specs on a desktop i just made: [image: qubes.jpg] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send

Re: [qubes-users] Move To a Larger Disk

2020-06-24 Thread 'Matt Drez' via qubes-users
I've got this far but got stuck (see last output): [@dom0 ~]$ sudo pvs /dev/mapper/luks-55a20051-8c1a-435e-a1c8-862493f2d576: read failed after 0 of 512 at 998053052416: Input/output error /dev/mapper/luks-55a20051-8c1a-435e-a1c8-862493f2d576: read failed after 0 of 512 at 998053171200:

Re: [qubes-users] Move To a Larger Disk

2020-06-24 Thread dhorf-hfref . 4a288f10
On Wed, Jun 24, 2020 at 04:38:21PM +, Matt Drez wrote: > None of the three commands you gave showed 900+GB you can doublecheck the partition and luks device already have the right size with ... lsblk -d /dev/nvme* /dev/mapper/luks-* if these show 900+GB you are good to go with the lvm

Re: [qubes-users] Move To a Larger Disk

2020-06-24 Thread 'Matt Drez' via qubes-users
> i dont fully understand that gparted screenshot, but it looks like > you resized the partition already. > > so whats missing is on one of the LVM layers of the stack. > > check with "pvs", it should list a /dev/mapper/luks-something. > does that PV have the right PSize of 900+ GB? > if not,

Re: [qubes-users] New Qubes User here: Need guidance in safely & securely installing to DomUs/Fedora TemplateVM

2020-06-24 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 6/24/20 8:04 AM, Set Emeraude wrote: > my assumption is that if its closed source, its backdoored by > default That really should be your assumption of all software unless you have written or audited and compiled it yourself. And even then ...

Re: [qubes-users] New Qubes User here: Need guidance in safely & securely installing to DomUs/Fedora TemplateVM

2020-06-24 Thread verifiablelist
On 2020-06-24 08:04, Set Emeraude wrote: Problem 1: Without inadvertently risking ANY potential breaches to Dom0, or compromising the TemplateVM, how do I install software via the terminal safely. I am aware I can simply enable networking to the templateVM but I am unsure if that is the

[qubes-users] New Qubes User here: Need guidance in safely & securely installing to DomUs/Fedora TemplateVM

2020-06-24 Thread Set Emeraude
Hello there, Prior to writing this email, I have consulted the Qubes Documentation, as well as the relevant documentation for installing any software on the appropriate website. I am currently seeking to install Zoom and Atom to my Fedora TemplateVM. I am required to use certain closed