For keyboard is not totally imposibble to use it with USB qube, but it's
somehow harder to setup (and if something goes wrong, no keyboard will
be available). But currently if booted from USB disk, it is imposible to
work with USB qube then.
At the some time, slightly rework QubesChoice external conditions - have
them checked outside of the object, which make it easier to have
different message when such option is not available (and why).
FixesQubesOS/qubes-issues#1649FixesQubesOS/qubes-issues#1630
Since all the required files are on ESP (and are loaded by xen.efi), we
don't need /boot accessible at all from there. This will in practice
allow to not have separate /boot at all.
FixesQubesOS/qubes-issues#1721
It should be done at package installation time (%post script), but
unfortunately it isn't. Probably because of wrong order of scripts calls
(missin Requires(post) dependencies).
QubesOS/qubes-issues#1258
Linux kernel have some memory overhead depending on maxmem. Dom0 isn't
meant to use that much memory (most should be assigned to AppVMs), so on
big systems this will be pure waste.
QubesOS/qubes-issues#1136FixesQubesOS/qubes-issues#1313
* efi:
lorax: disable debug output from xen and kernel
lorax: make initrd back to work without ifcfg module
lorax: efi: improve using ESP for 'root' device
lorax: fix legacy mode boot after EFI initrd tinyfication
lorax: Add rescue entry to grub2-efi.cfg
lorax: Provide correct device information to xen.efi
anaconda: use correct root= kernel parameter when creating EFI xen.cfg
anaconda: workaround efibootmgr bug (SIGABRT while removing entries)
anaconda: fix dracut module to work with reduced dependencies
lorax: drop plymouth label plugin
lorax: exclude SCSI and misc modules from UEFI initrd
lorax: remove SecureBoot files - save some space in efiboot.img
lorax: do not create macboot.img - it will be too big anyway
lorax: remove network support from UEFI initrd
lorax: select xen.cfg section to enable/disable media check
lorax: disable UEFI Secure Boot shim
pungi: do not use isohybrid --offset as it isn't compatible with EFI
anaconda: generate xen efi configuration
lorax: preliminary EFI support
QubesOS/qubes-issues#794
* liveusb: (31 commits)
livecd-tools: gitignore
livecd-tools: apply patches for verifying downloaded packages
livecd-tools: plug it into qubes-builder scripts
livecd-tools: import unmodified package from Fedora 20
makefile: remove legacy targets
liveusb: EFI support
live: remove automatic swap discovery
live: place private.img of default VMs back on dm-snapshot device
live: remove redundant livecd-creator --verbose flag
live: disable (currently broken) EFI
liveusb: fix package name in build-deps
liveusb: use more friendly output image name
liveusb: overlayfs doesn't support sparse files, use tmpfs directly
liveusb: include default appmenus based on default fedora-21 template
liveusb: use offline-mode of qubes-set-updates
liveusb: mount /var/lib/qubes using overlayfs on tmpfs, instead of dm-snapshot
liveusb: reset list of PCI devices assigned to sys-net before assigning new ones
conf/liveusb: disable updates check - senseless on non-persistent system
liveusb: use qvm-pci --offline-mode
conf/liveusb: create default dispvm template
...
QubesOS/qubes-ossues#1018
Livecd-creator is one more example of program which happily installs
whatever downloads from the network, without any verification
(repository metadata consistency doesn't count)...
Patches sent upstream here:
https://github.com/rhinstaller/livecd-tools/pull/14