Skip to content

Commit 384845c

Browse files
committed
Merge branch 'pr/1549'
2 parents a5eb7a8 + 2f2f909 commit 384845c

File tree

5 files changed

+30
-46
lines changed

5 files changed

+30
-46
lines changed

user/advanced-topics/usb-qubes.rst

Lines changed: 6 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ When using a USB keyboard on a system with multiple USB controllers, we recommen
9292

9393
5. Save and close the file.
9494

95-
6. Run the command ``grub2-mkconfig -o /boot/grub2/grub.cfg`` (legacy boot) or ``grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg`` (EFI) in dom0.
95+
6. Run the command ``grub2-mkconfig -o /boot/grub2/grub.cfg``
9696

9797
7. Reboot.
9898

@@ -182,17 +182,11 @@ USB controllers are automatically hidden from dom0 if you opt to create a USB qu
182182

183183
2. Hide (i.e., blacklist) all USB controllers from dom0.
184184

185+
.. warning:: **If you use a USB keyboard**, hiding your USB controllers from dom0 could lock you out of your system. See :ref:`user/advanced-topics/usb-qubes:usb keyboards` for more information.
185186

187+
.. warning:: **Using a USB AEM device** requires dom0 to have access to the USB controller to which your USB AEM device is attached. If dom0 cannot read your USB AEM device, AEM will hang.
186188

187-
**Warning:** If you use a USB keyboard, hiding your USB controllers from dom0 could lock you out of your system. See :ref:`user/advanced-topics/usb-qubes:usb keyboards` for more information.
188-
189-
**Warning:** Using a USB AEM device requires dom0 to have access to the USB controller to which your USB AEM device is attached. If dom0 cannot read your USB AEM device, AEM will hang.
190-
191-
The following procedure will hide all USB controllers from dom0.
192-
193-
GRUB2 (legacy boot or EFI)
194-
^^^^^^^^^^^^^^^^^^^^^^^^^^
195-
189+
The following procedure will hide all USB controllers from dom0:
196190

197191
1. Open the file ``/etc/default/grub`` in dom0.
198192

@@ -202,21 +196,14 @@ GRUB2 (legacy boot or EFI)
202196

203197
4. Save and close the file.
204198

205-
5. Run the command ``grub2-mkconfig -o /boot/grub2/grub.cfg`` (legacy boot) or ``grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg`` (EFI) in dom0.
199+
5. Run the command ``grub2-mkconfig -o /boot/grub2/grub.cfg``
206200

207201
6. Reboot.
208202

209-
210-
211203
How to remove a USB qube
212204
------------------------
213205

214-
215-
**Warning:** This procedure will result in your USB controller(s) being attached directly to dom0.
216-
217-
GRUB2
218-
^^^^^
219-
206+
.. warning:: This procedure will result in your USB controller(s) being attached directly to dom0.
220207

221208
1. Shut down the USB qube.
222209

@@ -233,25 +220,3 @@ GRUB2
233220
7. Run the command ``grub2-mkconfig -o /boot/grub2/grub.cfg`` in dom0.
234221

235222
8. Reboot.
236-
237-
238-
239-
Qubes 4.0: EFI
240-
^^^^^^^^^^^^^^
241-
242-
243-
1. Shut down the USB qube.
244-
245-
2. In Qubes Manager, right-click on the USB qube and select “Remove VM.”
246-
247-
3. Open the file ``/boot/efi/EFI/qubes/xen.cfg`` in dom0.
248-
249-
4. Find the line(s) that begins with ``kernel=``.
250-
251-
5. If ``rd.qubes.hide_all_usb`` appears anywhere in those lines, remove it.
252-
253-
6. Save and close the file.
254-
255-
7. Reboot.
256-
257-

user/troubleshooting/autostart-troubleshooting.rst

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,6 @@
22
Autostart troubleshooting
33
=========================
44

5-
6-
The following instructions are valid for **Qubes OS R4.0 legacy mode** and **Qubes OS R4.1 legacy and UEFI modes**. For **Qubes OS R4.0 in UEFI mode**, there is no GRUB, so manual boot from another operating system is needed.
7-
85
In several cases, there is a need to prevent ``autostart=True`` for qubes on boot. For example:
96

107
- ``sys-usb`` was enabled, but the only keyboard is attached via USB, and the ``qubes.InputKeyboard`` service is disabled.

user/troubleshooting/installation-troubleshooting.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Here are the steps to fix this. Note that this allows sys-net and sys-usb to tak
125125

126126
2. Add ``qubes.enable_insecure_pv_passthrough`` to ``GRUB_CMDLINE_LINUX`` in ``/etc/default/grub``
127127

128-
3. Run ``sudo grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg``. If you are using a non-UEFI BIOS (where ``/boot/efi/EFI`` doesn’t exist), use the command ``sudo grub-mkconfig -o /boot/grub2/grub.cfg`` instead.
128+
3. Run ``sudo grub-mkconfig -o /boot/grub2/grub.cfg``
129129

130130
4. Reboot
131131

user/troubleshooting/resume-suspend-troubleshooting.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,4 +160,4 @@ Suspend turns off the screen and gets stuck
160160
-------------------------------------------
161161

162162

163-
On some devices suspend-to-RAM does not work and a hard power-off is needed to recover, because the system does not go into deep sleep. To get suspend to work, you need to add ``mem_sleep_default=deep`` kernel option. For legacy boot, or UEFI/legacy in R4.1+, add it to the ``GRUB_CMDLINE_LINUX`` setting in ``/etc/default/grub``, update the grub config, and reboot. In R4.0 with UEFI boot, you need to add it to every ``kernel=`` line in ``/boot/efi/EFI/qubes/xen.cfg`` and reboot.
163+
On some devices suspend-to-RAM does not work and a hard power-off is needed to recover, because the system does not go into deep sleep. To get suspend to work, you need to add ``mem_sleep_default=deep`` kernel option. Add it to the ``GRUB_CMDLINE_LINUX`` setting in ``/etc/default/grub``, update the grub config, and reboot.

user/troubleshooting/uefi-troubleshooting.rst

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -148,3 +148,25 @@ Accessing installer Rescue mode on UEFI
148148
---------------------------------------
149149

150150
Choose “Rescue a Qubes OS system” from grub2 boot menu.
151+
152+
Updating GRUB options doesn't work
153+
----------------------------------
154+
155+
If you upgraded from Qubes OS R4.0 or followed outdated instructions, you might have a wrong `grub.cfg` file.
156+
157+
The content of :file:`/boot/efi/EFI/qubes/grub.cfg` should be something like:
158+
159+
.. code:: bash
160+
161+
search --no-floppy --fs-uuid --set=dev xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
162+
set prefix=($dev)/grub2
163+
export $prefix
164+
configfile $prefix/grub.cfg
165+
166+
Where the end of the first line is replaced by a UUID. If not, you can reinstall this file:
167+
168+
.. code:: console
169+
170+
sudo qubes-dom0-update --action=reinstall grub2-common
171+
172+
After that, running the `grub2-mkconfig` command should work.

0 commit comments

Comments
 (0)