mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-12-02 01:15:51 -05:00
Fix formattings and other issues
See issue 8180.
This commit is contained in:
parent
810901e5d6
commit
0cfd755295
25 changed files with 114 additions and 76 deletions
|
|
@ -106,7 +106,7 @@ Signature Verification Warnings
|
|||
|
||||
There should be none at the moment. If there was such a warning, it would look like this:
|
||||
|
||||
.. code::
|
||||
.. code:: text
|
||||
|
||||
W: A error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://deb.torproject.org stable Release: The following signatures were invalid: KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681
|
||||
|
||||
|
|
@ -120,7 +120,7 @@ In past various apt repositories were signed with expired key: `The Tor Project
|
|||
|
||||
You saw the following warning:
|
||||
|
||||
.. code::
|
||||
.. code:: text
|
||||
|
||||
W: A error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://deb.torproject.org stable Release: The following signatures were invalid: KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681
|
||||
|
||||
|
|
@ -139,7 +139,7 @@ Changed Configuration Files
|
|||
|
||||
If you see something like the following.
|
||||
|
||||
.. code::
|
||||
.. code:: text
|
||||
|
||||
Setting up ifupdown ...
|
||||
Configuration file /etc/network/interfaces
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@ When a qube starts, a fixed amount of RAM is allocated to the graphics buffer ca
|
|||
|
||||
To determine if this is the problem affecting you, look at the Xorg log inside the Qube at ``/home/user/.local/share/xorg/Xorg.0.log`` for lines like the following:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
[ 1623.988] (EE) DUMMYQBS(0): Unable to set up a virtual screen size of 3440x1440 with 17101 Kb of video memory available. Please increase the video memory size.
|
||||
|
||||
|
|
|
|||
|
|
@ -81,7 +81,24 @@ Or if you have already rebooted after the first stage install and have encounter
|
|||
|
||||
2. Press ‘3’ to go to the shell
|
||||
|
||||
3. Find and mount the EFI system partition. (replace ``/dev/sda`` with your disk name. If unsure, use the ``lsblk`` command to display a list of disks): ``fdisk -l /dev/sda | grep EFI`` The output should look like this: ``/dev/sda1 2048 1230847 1228800 600M EFI System`` Then mount it: ``mkdir -p /mnt/sysimage/boot/efi mount /dev/sda1 /mnt/sysimage/boot/efi``
|
||||
3. Find and mount the EFI system partition. (replace ``/dev/sda`` with your disk name. If unsure, use the ``lsblk`` command to display a list of disks):
|
||||
|
||||
.. code:: console
|
||||
|
||||
fdisk -l /dev/sda | grep EFI
|
||||
|
||||
The output should look like this:
|
||||
|
||||
.. code:: output
|
||||
|
||||
/dev/sda1 2048 1230847 1228800 600M EFI System
|
||||
|
||||
Then mount it:
|
||||
|
||||
.. code:: console
|
||||
|
||||
mkdir -p /mnt/sysimage/boot/efi
|
||||
mount /dev/sda1 /mnt/sysimage/boot/efi
|
||||
|
||||
4. Execute:
|
||||
|
||||
|
|
@ -107,7 +124,24 @@ Some firmware will not recognize the default Qubes EFI configuration. As such, i
|
|||
|
||||
2. Press ‘3’ to go to the shell
|
||||
|
||||
3. Find and mount the EFI system partition. (replace ``/dev/sda`` with your disk name. If unsure, use the ``lsblk`` command to display a list of disks): ``fdisk -l /dev/sda | grep EFI`` The output should look like this: ``/dev/sda1 2048 1230847 1228800 600M EFI System`` Then mount it: ``mkdir -p /mnt/sysimage/boot/efi mount /dev/sda1 /mnt/sysimage/boot/efi``
|
||||
3. Find and mount the EFI system partition. (replace ``/dev/sda`` with your disk name. If unsure, use the ``lsblk`` command to display a list of disks):
|
||||
|
||||
.. code:: console
|
||||
|
||||
fdisk -l /dev/sda | grep EFI
|
||||
|
||||
The output should look like this:
|
||||
|
||||
.. code:: output
|
||||
|
||||
/dev/sda1 2048 1230847 1228800 600M EFI System
|
||||
|
||||
Then mount it:
|
||||
|
||||
.. code:: console
|
||||
|
||||
mkdir -p /mnt/sysimage/boot/efi
|
||||
mount /dev/sda1 /mnt/sysimage/boot/efi
|
||||
|
||||
4. Copy ``grubx64.efi`` to the fallback path:
|
||||
|
||||
|
|
|
|||
|
|
@ -73,7 +73,7 @@ Some packages will throw an error on installation in this situation. For example
|
|||
|
||||
One solution is to add a dummy interface to allow the package to install correctly:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
ip link add d0 type dummy
|
||||
ip addr add 192.168.0.1/24 dev d0
|
||||
|
|
@ -95,7 +95,7 @@ If the error occurs as a result of too little initial memory, increase the initi
|
|||
|
||||
For example:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl qubes-template-debian-10
|
||||
Using sys-whonix as UpdateVM to download updates for Dom0; this may take some time...
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue