From 3b700bfa636acd9818ba86dae928797bb265556c Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Wed, 23 Jun 2021 01:48:00 -0700 Subject: [PATCH] Update "Standalones and HVMs" - Add and update links - Update terminology - Fix and improve syntax - Clarify command-line variables - Fix headings - Improve language - Make syntax consistent - Remove deprecated and inaccurate information - Improve grammar and orthography - Fix typos - Wrap text Related to #1164 --- user/advanced-topics/standalones-and-hvms.md | 296 +++++++++++-------- 1 file changed, 176 insertions(+), 120 deletions(-) diff --git a/user/advanced-topics/standalones-and-hvms.md b/user/advanced-topics/standalones-and-hvms.md index fabb73a4..04df42d5 100644 --- a/user/advanced-topics/standalones-and-hvms.md +++ b/user/advanced-topics/standalones-and-hvms.md @@ -14,41 +14,56 @@ ref: 130 title: Standalones and HVMs --- -A [standalone](/doc/glossary/#standalone) is a type of qube that is created by cloning a [template](/doc/templates/). -Unlike templates, however, standalones do not supply their root filesystems to other qubes. -Examples of situations in which standalones can be useful include: +A [standalone](/doc/glossary/#standalone) is a type of qube that is created by +cloning a [template](/doc/glossary/#template). Unlike templates, however, +standalones do not supply their root filesystems to other qubes. Examples of +situations in which standalones can be useful include: -- Qubes used for development (dev environments often require a lot of specific packages and tools) -- Qubes used for installing untrusted packages. - Normally, you install digitally signed software from Red Hat/Fedora repositories, and it's reasonable that such software has non malicious *installation* scripts (rpm pre/post scripts). - However, when you would like to install some packages from less trusted sources, or unsigned, then using a dedicated (untrusted) standalone might be a better way. +- Qubes used for development (dev environments often require a lot of specific + packages and tools) +- Qubes used for installing untrusted packages. Normally, you install digitally + signed software from Red Hat/Fedora repositories, and it's reasonable that + such software has non malicious *installation* scripts (rpm pre/post + scripts). However, when you would like to install some packages from less + trusted sources, or unsigned, then using a dedicated (untrusted) standalone + might be a better way. -Meanwhile, a [Hardware-assisted Virtual Machine (HVM)](/doc/glossary/#hvm), also known as a "Fully-Virtualized Virtual Machine," utilizes the virtualization extensions of the host CPU. -These are typically contrasted with Paravirtualized (PV) VMs. +Meanwhile, a [Hardware-assisted Virtual Machine (HVM)](/doc/glossary/#hvm), +also known as a "Fully-Virtualized Virtual Machine," utilizes the +virtualization extensions of the host CPU. These are typically contrasted with +Paravirtualized (PV) VMs. -HVMs allow you to create qubes based on any OS for which you have an installation ISO, so you can easily have qubes running Windows, *BSD, or any Linux distribution. -You can also use HVMs to run "live" distros. +HVMs allow you to create qubes based on any OS for which you have an +installation ISO, so you can easily have qubes running Windows, \*BSD, or any +Linux distribution. You can also use HVMs to run "live" distros. -By default, every Qubes VM runs in PVH mode (which has security advantages over both PV and HVM) except for those with attached PCI devices, which run in HVM mode. -See [here](https://blog.invisiblethings.org/2017/07/31/qubes-40-rc1.html) for a discussion of the switch from PV to HVM and [here](/news/2018/01/11/qsb-37/) for the announcement about the change to using PVH as default. +By default, every qube runs in PVH mode (which has security advantages over +both PV and HVM), except for those with attached PCI devices, which run in HVM +mode. See [here](https://blog.invisiblethings.org/2017/07/31/qubes-40-rc1.html) +for a discussion of the switch from PV to HVM and +[here](/news/2018/01/11/qsb-37/) for the announcement about the change to using +PVH as default. -The standalone/template distinction and the HVM/PV/PVH distinctions are orthogonal. -The former is about root filesystem inheritance, whereas the latter is about the virtualization mode. -In practice, however, it is most common for standalones to be HVMs and for HVMs to be standalones. -Hence, this page covers both topics. +The standalone/template distinction and the HVM/PV/PVH distinctions are +orthogonal. The former is about root filesystem inheritance, whereas the latter +is about the virtualization mode. In practice, however, it is most common for +standalones to be HVMs and for HVMs to be standalones. Hence, this page covers +both topics. ## Creating a standalone -You can create a standalone in the Qube Manager by selecting the "Type" of "Standalone qube copied from a template" or "Empty standalone qube (install your own OS)." +You can create a standalone in the Qube Manager by selecting the "Type" of +"Standalone qube copied from a template" or "Empty standalone qube (install +your own OS)." Alternatively, from the dom0 command line: ``` -qvm-create --class StandaloneVM --label