Fix links

This commit is contained in:
Andrew David Wong 2021-06-17 07:01:53 -07:00
parent d4c577e31b
commit 76150ac9d3
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17
26 changed files with 46 additions and 46 deletions

View File

@ -55,7 +55,7 @@ See [Installation Guide](/doc/installation-guide/).
### From Qubes R2 rc1 ### From Qubes R2 rc1
Upgrading from Qubes R2 rc1 should be a simple matter of installing updates for [dom0](/doc/software-update-dom0/) and [VMs](/doc/software-update-vm/). Upgrading from Qubes R2 rc1 should be a simple matter of installing updates for [dom0](/doc/how-to-install-software-in-dom0/) and [VMs](/doc/software-update-vm/).
### From Qubes R2 beta 3 and older ### From Qubes R2 beta 3 and older

View File

@ -15,7 +15,7 @@ title: Qubes R3.1 release notes
* LIVE edition (still alpha, not part of R3.1-rc1) * LIVE edition (still alpha, not part of R3.1-rc1)
* Updated GPU drivers in dom0 * Updated GPU drivers in dom0
* Colorful window application icons (instead of just colorful lock icon) * Colorful window application icons (instead of just colorful lock icon)
* PV Grub support ([documentation](/doc/managing-vm-kernel/)) * PV Grub support ([documentation](/doc/managing-vm-kernels/))
* Out of the box USB VM setup, including [handling USB mouse](https://github.com/QubesOS/qubes-app-linux-input-proxy/blob/master/README.md) * Out of the box USB VM setup, including [handling USB mouse](https://github.com/QubesOS/qubes-app-linux-input-proxy/blob/master/README.md)
* Xen upgraded to 4.6, for better hardware support (especially Skylake platform) * Xen upgraded to 4.6, for better hardware support (especially Skylake platform)
* Improve updates proxy flexibility - especially repositories served over HTTPS * Improve updates proxy flexibility - especially repositories served over HTTPS

View File

@ -201,7 +201,7 @@ This is why `qubes.StartApp` uses our standard `qrexec` argument grammar to stri
### Service policies with arguments ### Service policies with arguments
Sometimes a service name alone isn't enough to make reasonable qrexec policy. Sometimes a service name alone isn't enough to make reasonable qrexec policy.
One example of such a situation is [qrexec-based USB passthrough](/doc/usb-devices/). One example of such a situation is [qrexec-based USB passthrough](/doc/how-to-use-usb-devices/).
Using just a service name would make it difficult to express the policy "allow access to devices X and Y, but deny to all others." Using just a service name would make it difficult to express the policy "allow access to devices X and Y, but deny to all others."
It isn't feasible to create a separate service for every device: we would need to change the code in multiple files any time we wanted to update the service. It isn't feasible to create a separate service for every device: we would need to change the code in multiple files any time we wanted to update the service.

View File

@ -251,7 +251,7 @@ Please refer to [this page](/doc/vm-sudo/).
Please see: Please see:
- [Installing and updating software in dom0](/doc/software-update-dom0/) - [Installing and updating software in dom0](/doc/how-to-install-software-in-dom0/)
- [Note on dom0 and EOL](/doc/supported-versions/#note-on-dom0-and-eol) - [Note on dom0 and EOL](/doc/supported-versions/#note-on-dom0-and-eol)
### Do you recommend coreboot as an alternative to vendor BIOS? ### Do you recommend coreboot as an alternative to vendor BIOS?
@ -503,7 +503,7 @@ For Debian:
For Fedora: For Fedora:
1. (Recommended) Clone an existing Fedora TemplateVM 1. (Recommended) Clone an existing Fedora TemplateVM
2. [Enable the appropriate RPMFusion repos in the desired Fedora TemplateVM](/doc/software-update-domu/#rpmfusion-for-fedora-templatevms). 2. [Enable the appropriate RPMFusion repos in the desired Fedora TemplateVM](/doc/how-to-install-software/#rpmfusion-for-fedora-templatevms).
3. Install VLC in that TemplateVM: 3. Install VLC in that TemplateVM:
```bash_session ```bash_session
@ -525,7 +525,7 @@ From the top part of the list, click on the drive you want to attach, then selec
Although you can also attach the entire USB device to a qube by selecting it from the bottom part of the list, in general this approach should not be used because you are exposing the target qube to unnecessary additional attack surface. Although you can also attach the entire USB device to a qube by selecting it from the bottom part of the list, in general this approach should not be used because you are exposing the target qube to unnecessary additional attack surface.
Although external media such as external hard drives or flash drives plugged in via USB are available in the USB qube, it is not recommended to access them directly from inside the USB qube. Although external media such as external hard drives or flash drives plugged in via USB are available in the USB qube, it is not recommended to access them directly from inside the USB qube.
See [Block (Storage) Devices](/doc/block-devices/) for more information. See [Block (Storage) Devices](/doc/how-to-use-block-storage-devices/) for more information.
### My encrypted drive doesn't appear in Debian qube. ### My encrypted drive doesn't appear in Debian qube.

View File

@ -104,7 +104,7 @@ The Qubes team will classify your issue according to its type.
### New issues should include all relevant information ### ### New issues should include all relevant information ###
When you file a new issue, you should be sure to include the version of Qubes you're using, as well as versions of related software packages ([how to copy information out of dom0](/doc/copy-from-dom0/)). When you file a new issue, you should be sure to include the version of Qubes you're using, as well as versions of related software packages ([how to copy information out of dom0](/doc/how-to-copy-from-dom0/)).
If your issue is related to hardware, provide as many details as possible about the hardware. If your issue is related to hardware, provide as many details as possible about the hardware.
A great way to do this is by [generating and submitting a Hardware Compatibility List (HCL) report](/doc/hcl/#generating-and-submitting-new-reports), then linking to it in your issue. A great way to do this is by [generating and submitting a Hardware Compatibility List (HCL) report](/doc/hcl/#generating-and-submitting-new-reports), then linking to it in your issue.
You may also need to use command-line tools such as `lspci`. You may also need to use command-line tools such as `lspci`.

View File

@ -215,7 +215,7 @@ The filename of the Release Signing Key for your version is usually `qubes-relea
There are several ways to get the Release Signing Key for your Qubes release. There are several ways to get the Release Signing Key for your Qubes release.
- If you have access to an existing Qubes installation, the release keys are available in dom0 in `/etc/pki/rpm-gpg/RPM-GPG-KEY-qubes-*`. - If you have access to an existing Qubes installation, the release keys are available in dom0 in `/etc/pki/rpm-gpg/RPM-GPG-KEY-qubes-*`.
These can be [copied](/doc/copy-from-dom0/#copying-from-dom0) into other VMs for further use. These can be [copied](/doc/how-to-copy-from-dom0/#copying-from-dom0) into other VMs for further use.
In addition, every other VM contains the release key corresponding to that installation's release in `/etc/pki/rpm-gpg/RPM-GPG-KEY-qubes-*`. In addition, every other VM contains the release key corresponding to that installation's release in `/etc/pki/rpm-gpg/RPM-GPG-KEY-qubes-*`.
If you wish to use one of these keys, make sure to import it into your keyring, e.g.: If you wish to use one of these keys, make sure to import it into your keyring, e.g.:

View File

@ -144,7 +144,7 @@ In the `current-testing` repository:
### domU ### domU
The packages `kernel-qubes-vm` and `kernel-latest-qubes-vm` are for domUs. The packages `kernel-qubes-vm` and `kernel-latest-qubes-vm` are for domUs.
See [Managing VM kernel](/doc/managing-vm-kernel/) for more information. See [Managing VM kernel](/doc/managing-vm-kernels/) for more information.
### Example ### Example

View File

@ -12,7 +12,7 @@ title: i3 (window manager)
i3 is part of the stable repository (as of Qubes R3.1) and can be installed by i3 is part of the stable repository (as of Qubes R3.1) and can be installed by
using the [dom0 update mechanism](/doc/software-update-dom0/). To install the i3 using the [dom0 update mechanism](/doc/how-to-install-software-in-dom0/). To install the i3
window manager and the its Qubes specific configuration: window manager and the its Qubes specific configuration:
```shell_session ```shell_session

View File

@ -11,7 +11,7 @@ title: Managing VM Kernels
By default, VMs kernels are provided by dom0. By default, VMs kernels are provided by dom0.
(See [here](/doc/software-update-dom0/#kernel-upgrade) for information about upgrading kernels in dom0.) (See [here](/doc/how-to-install-software-in-dom0/#kernel-upgrade) for information about upgrading kernels in dom0.)
This means that: This means that:
1. You can select the kernel version (using GUI VM Settings tool or `qvm-prefs` commandline tool); 1. You can select the kernel version (using GUI VM Settings tool or `qvm-prefs` commandline tool);

View File

@ -26,7 +26,7 @@ If you find yourself in this situation, see this [issue](https://github.com/Qube
A USB qube acts as a secure handler for potentially malicious USB devices, preventing them from coming into contact with dom0 (which could otherwise be fatal to the security of the whole system). It thereby mitigates some of the [security implications](/doc/device-handling-security/#usb-security) of using USB devices. A USB qube acts as a secure handler for potentially malicious USB devices, preventing them from coming into contact with dom0 (which could otherwise be fatal to the security of the whole system). It thereby mitigates some of the [security implications](/doc/device-handling-security/#usb-security) of using USB devices.
With a USB qube, every time you connect an untrusted USB drive to a USB port managed by that USB controller, you will have to attach it to the qube in which you wish to use it (if different from the USB qube itself), either by using Qubes VM Manager or the command line (see instructions above). With a USB qube, every time you connect an untrusted USB drive to a USB port managed by that USB controller, you will have to attach it to the qube in which you wish to use it (if different from the USB qube itself), either by using Qubes VM Manager or the command line (see instructions above).
The USB controller may be assigned on the **Devices** tab of a qube's settings page in Qubes VM Manager or by using the [qvm-pci](/doc/how-to-use-pci-devices/) command. The USB controller may be assigned on the **Devices** tab of a qube's settings page in Qubes VM Manager or by using the [qvm-pci](/doc/how-to-use-pci-devices/) command.
For guidance on finding the correct USB controller, see the [according passage on PCI-devices](/doc/usb-devices/#finding-the-right-usb-controller). For guidance on finding the correct USB controller, see the [according passage on PCI-devices](/doc/how-to-use-usb-devices/#finding-the-right-usb-controller).
You can create a USB qube using the management stack by performing the following steps as root in dom0: You can create a USB qube using the management stack by performing the following steps as root in dom0:
``` ```
@ -65,7 +65,7 @@ Those steps are not performed by default, because of risk explained in [Security
### Automatic setup ### ### Automatic setup ###
To allow USB keyboard usage (including early boot for LUKS passphrase), make sure you have the latest `qubes-mgmt-salt-dom0-virtual-machines` package (simply [install dom0 updates](/doc/software-update-dom0/#how-to-update-dom0)) and execute in dom0: To allow USB keyboard usage (including early boot for LUKS passphrase), make sure you have the latest `qubes-mgmt-salt-dom0-virtual-machines` package (simply [install dom0 updates](/doc/how-to-install-software-in-dom0/#how-to-update-dom0)) and execute in dom0:
``` ```
sudo qubesctl state.sls qvm.usb-keyboard sudo qubesctl state.sls qvm.usb-keyboard

View File

@ -35,8 +35,8 @@ Updates
How to test updates: How to test updates:
* Enable [dom0 testing repositories](/doc/software-update-dom0/#testing-repositories). * Enable [dom0 testing repositories](/doc/how-to-install-software-in-dom0/#testing-repositories).
* Enable [TemplateVM testing repositories](/doc/software-update-domu/#testing-repositories). * Enable [TemplateVM testing repositories](/doc/how-to-install-software/#testing-repositories).
Every new update is first uploaded to the `security-testing` repository if it is a security update or `current-testing` if it is a normal update. Every new update is first uploaded to the `security-testing` repository if it is a security update or `current-testing` if it is a normal update.
The update remains in `security-testing` or `current-testing` for a minimum of one week. The update remains in `security-testing` or `current-testing` for a minimum of one week.

View File

@ -14,8 +14,8 @@ title: How to Copy and Move Files
*This page is about copying and moving files. *This page is about copying and moving files.
If you wish to simply copy and paste text, that can be done more easily using the inter-qube clipboard. If you wish to simply copy and paste text, that can be done more easily using the inter-qube clipboard.
See [copying and pasting text between qubes](/doc/copy-paste/). See [copying and pasting text between qubes](/doc/how-to-copy-and-paste-text/).
For dom0, see [copying from (and to) dom0](/doc/copy-from-dom0/).* For dom0, see [copying from (and to) dom0](/doc/how-to-copy-from-dom0/).*
Qubes OS supports the secure copying and moving of files and directories (folders) between qubes. Qubes OS supports the secure copying and moving of files and directories (folders) between qubes.

View File

@ -13,8 +13,8 @@ title: How to Copy and Paste Text
*This page is about copying and pasting plain text. *This page is about copying and pasting plain text.
If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/copying-files/). If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/how-to-copy-and-move-files/).
For dom0, see [copying from (and to) dom0](/doc/copy-from-dom0/).* For dom0, see [copying from (and to) dom0](/doc/how-to-copy-from-dom0/).*
Qubes OS features a secure inter-qube clipboard that allows you to copy and paste text between qubes. Qubes OS features a secure inter-qube clipboard that allows you to copy and paste text between qubes.

View File

@ -14,7 +14,7 @@ title: How to Copy from Dom0
This page covers copying files and clipboard text between [dom0](/doc/glossary/#dom0) and [domUs](/doc/glossary/#domu). This page covers copying files and clipboard text between [dom0](/doc/glossary/#dom0) and [domUs](/doc/glossary/#domu).
Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/copy-paste/) and [copying and moving files between qubes](/doc/copying-files/). Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/how-to-copy-and-paste-text/) and [copying and moving files between qubes](/doc/how-to-copy-and-move-files/).
## Copying **from** dom0 ## Copying **from** dom0

View File

@ -134,7 +134,7 @@ If you plan on using your system for work, then it also depends on what kind of
It's a good idea to start out with the three qubes created automatically by the installer: work, personal, and untrusted. It's a good idea to start out with the three qubes created automatically by the installer: work, personal, and untrusted.
If and when you start to feel that some activity just doesn't fit into any of your existing qubes, or you want to partition some part of your life, you can easily create a new qube for it. If and when you start to feel that some activity just doesn't fit into any of your existing qubes, or you want to partition some part of your life, you can easily create a new qube for it.
You'll also be able to easily [copy](/doc/copying-files/) any files you need to the newly created qube. You'll also be able to easily [copy](/doc/how-to-copy-and-move-files/) any files you need to the newly created qube.
Still not sure? Still not sure?
You might find it helpful to read [this article](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html), which describes how one of the Qubes OS architects partitions her digital life into security domains. You might find it helpful to read [this article](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html), which describes how one of the Qubes OS architects partitions her digital life into security domains.
@ -151,12 +151,12 @@ The [Qubes backup system](/doc/backup-restore/) allows you to do this securely a
Here are some other tasks you're likely to want to perform. Here are some other tasks you're likely to want to perform.
(A full list is available in the [How-to Guides](/doc/#how-to-guides) section of the documentation.) (A full list is available in the [How-to Guides](/doc/#how-to-guides) section of the documentation.)
- [Copying and Pasting Text Between Domains](/doc/copy-paste/) - [Copying and Pasting Text Between Domains](/doc/how-to-copy-and-paste-text/)
- [Copying and Moving Files Between Domains](/doc/copying-files/) - [Copying and Moving Files Between Domains](/doc/how-to-copy-and-move-files/)
- [Copying from (and to) dom0](/doc/copy-from-dom0/) - [Copying from (and to) dom0](/doc/how-to-copy-from-dom0/)
- [Fullscreen Mode](/doc/full-screen-mode/) - [Fullscreen Mode](/doc/full-screen-mode/)
- [DisposableVMs](/doc/disposablevm/) - [DisposableVMs](/doc/disposablevm/)
- [Device Handling](/doc/device-handling/) (block, USB, and PCI devices) - [Device Handling](/doc/how-to-use-devices/) (block, USB, and PCI devices)
If you encounter any problems, please visit the [Help, Support, and Mailing Lists](/support/) page. If you encounter any problems, please visit the [Help, Support, and Mailing Lists](/support/) page.

View File

@ -32,9 +32,9 @@ It is important to keep your Qubes OS system up-to-date to ensure you have the l
Fully updating your Qubes OS system means updating: Fully updating your Qubes OS system means updating:
- [Dom0](/doc/software-update-dom0/) - [Dom0](/doc/how-to-install-software-in-dom0/)
- [TemplateVMs](/doc/software-update-domu/#updating-software-in-templatevms) - [TemplateVMs](/doc/how-to-install-software/#updating-software-in-templatevms)
- [StandaloneVMs](/doc/software-update-domu/#standalonevms) (if you have any) - [StandaloneVMs](/doc/how-to-install-software/#standalonevms) (if you have any)
You can accomplish this using the **Qubes Update** tool. You can accomplish this using the **Qubes Update** tool.

View File

@ -13,7 +13,7 @@ title: How to Use Block Storage Devices
--- ---
*This page is part of [device handling in qubes](/doc/device-handling/).* *This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
If you don't know what a "block device" is, just think of it as a fancy way to say "something that stores data". If you don't know what a "block device" is, just think of it as a fancy way to say "something that stores data".
@ -27,7 +27,7 @@ Qubes OS supports the ability to attach a USB drive (or just its partitions) to
Attaching USB drives is integrated into the Devices Widget: ![device manager icon](/attachment/wiki/Devices/media-removable.png) Attaching USB drives is integrated into the Devices Widget: ![device manager icon](/attachment/wiki/Devices/media-removable.png)
Simply insert your USB drive and click on the widget. Simply insert your USB drive and click on the widget.
You will see multiple entries for your USB drive; typically, `sys-usb:sda`, `sys-usb:sda1`, and `sys-usb:2-1` for example. You will see multiple entries for your USB drive; typically, `sys-usb:sda`, `sys-usb:sda1`, and `sys-usb:2-1` for example.
Entries starting with a number (e.g. here `2-1`) are the [whole usb-device](/doc/usb-devices/). Entries starting with a number (e.g. here `2-1`) are the [whole usb-device](/doc/how-to-use-usb-devices/).
Entries without a number (e.g. here `sda`) are the whole block-device. Entries without a number (e.g. here `sda`) are the whole block-device.
Other entries are partitions of that block-device (e.r. here `sda1`). Other entries are partitions of that block-device (e.r. here `sda1`).

View File

@ -14,7 +14,7 @@ title: How to Use Devices
This is an overview of device handling in Qubes OS. This is an overview of device handling in Qubes OS.
For specific devices ([block](/doc/block-devices/), [USB](/doc/usb-devices/) and [PCI](/doc/how-to-use-pci-devices/) devices), please visit their respective pages. For specific devices ([block](/doc/how-to-use-block-storage-devices/), [USB](/doc/how-to-use-usb-devices/) and [PCI](/doc/how-to-use-pci-devices/) devices), please visit their respective pages.
**Important security warning:** Device handling comes with many security implications. **Important security warning:** Device handling comes with many security implications.
Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/)**. Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/)**.

View File

@ -19,7 +19,7 @@ Currently, the only options for reading and recording optical discs (e.g., CDs,
3. Use a SATA optical drive attached to dom0. 3. Use a SATA optical drive attached to dom0.
(**Caution:** This option is [potentially dangerous](https://github.com/Qubes-Community/Contents/blob/master/docs/security/security-guidelines.md#dom0-precautions).) (**Caution:** This option is [potentially dangerous](https://github.com/Qubes-Community/Contents/blob/master/docs/security/security-guidelines.md#dom0-precautions).)
To access an optical disc via USB follow the [typical procedure for attaching a USB device](/doc/usb-devices/#with-the-command-line-tool), then check with the **Qubes Devices** widget to see what device in the target qube the USB optical drive was attached to. To access an optical disc via USB follow the [typical procedure for attaching a USB device](/doc/how-to-use-usb-devices/#with-the-command-line-tool), then check with the **Qubes Devices** widget to see what device in the target qube the USB optical drive was attached to.
Typically this would be `sr0`. Typically this would be `sr0`.
For example, if `sys-usb` has device `3-2` attached to the `work` qube's `sr0`, you would mount it with `mount /dev/sr0 /mnt/removable`. For example, if `sys-usb` has device `3-2` attached to the `work` qube's `sr0`, you would mount it with `mount /dev/sr0 /mnt/removable`.
You could also write to a disc with `wodim -v dev=/dev/sr0 -eject /home/user/Qubes.iso`. You could also write to a disc with `wodim -v dev=/dev/sr0 -eject /home/user/Qubes.iso`.

View File

@ -13,7 +13,7 @@ title: How to Use PCI Devices
--- ---
*This page is part of [device handling in qubes](/doc/device-handling/).* *This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
**Warning:** Only dom0 exposes PCI devices. **Warning:** Only dom0 exposes PCI devices.
Some of them are strictly required in dom0 (e.g., the host bridge). Some of them are strictly required in dom0 (e.g., the host bridge).
@ -23,7 +23,7 @@ Please make sure you carefully read and understand the **[security consideration
## Introduction ## Introduction
Unlike other devices ([USB](/doc/usb-devices/), [block](/doc/block-devices/), mic), PCI devices need to be attached on VM-bootup. Unlike other devices ([USB](/doc/how-to-use-usb-devices/), [block](/doc/how-to-use-block-storage-devices/), mic), PCI devices need to be attached on VM-bootup.
Similar to how you can't attach a new sound-card after your computer booted (and expect it to work properly), attaching PCI devices to already booted VMs isn't supported. Similar to how you can't attach a new sound-card after your computer booted (and expect it to work properly), attaching PCI devices to already booted VMs isn't supported.
The Qubes installer attaches all network class controllers to `sys-net` and all USB controllers to `sys-usb` by default, if you chose to create the network and USB qube during install. The Qubes installer attaches all network class controllers to `sys-net` and all USB controllers to `sys-usb` by default, if you chose to create the network and USB qube during install.
@ -59,7 +59,7 @@ There you can attach PCI-devices to a qube.
## `qvm-pci` Usage ## `qvm-pci` Usage
The `qvm-pci` tool allows PCI attachment and detachment. The `qvm-pci` tool allows PCI attachment and detachment.
It's a shortcut for [`qvm-device pci`](/doc/device-handling/#general-qubes-device-widget-behavior-and-handling). It's a shortcut for [`qvm-device pci`](/doc/how-to-use-devices/#general-qubes-device-widget-behavior-and-handling).
To figure out what device to attach, first list the available PCI devices by running (as user) in dom0: To figure out what device to attach, first list the available PCI devices by running (as user) in dom0:

View File

@ -10,15 +10,15 @@ title: How to Use USB Devices
--- ---
*This page is part of [device handling in qubes](/doc/device-handling/).* *This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
If you are looking to handle USB *storage* devices (thumbdrives or USB-drives), please have a look at the [block device](/doc/block-devices/) page. If you are looking to handle USB *storage* devices (thumbdrives or USB-drives), please have a look at the [block device](/doc/how-to-use-block-storage-devices/) page.
**Note:** Attaching USB devices to VMs requires a [USB qube](/doc/usb-qubes/). **Note:** Attaching USB devices to VMs requires a [USB qube](/doc/usb-qubes/).
**Important security warning:** USB passthrough comes with many security implications. **Important security warning:** USB passthrough comes with many security implications.
Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/#usb-security)**. Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/#usb-security)**.
Whenever possible, attach a [block device](/doc/block-devices/) instead. Whenever possible, attach a [block device](/doc/how-to-use-block-storage-devices/) instead.
Examples of valid cases for USB-passthrough: Examples of valid cases for USB-passthrough:

View File

@ -41,7 +41,7 @@ After installing a fresh Debian TemplateVM, we recommend performing the followin
## Updating ## Updating
For routine daily TemplateVM updates within a given Debian release, see [Updating software in TemplateVMs](/doc/software-update-domu/#updating-software-in-templatevms). For routine daily TemplateVM updates within a given Debian release, see [Updating software in TemplateVMs](/doc/how-to-install-software/#updating-software-in-templatevms).
## Upgrading ## Upgrading

View File

@ -33,7 +33,7 @@ After installing a fresh Fedora TemplateVM, we recommend performing the followin
## Updating ## Updating
For routine daily updates within a given release, see [Updating software in TemplateVMs](/doc/software-update-domu/#updating-software-in-templatevms). For routine daily updates within a given release, see [Updating software in TemplateVMs](/doc/how-to-install-software/#updating-software-in-templatevms).
## Upgrading ## Upgrading

View File

@ -15,7 +15,7 @@ By default, the kernel that is installed in dom0 comes from the `kernel` package
For most cases this works fine since the Linux kernel developers backport fixes to this kernel, but for some newer hardware, you may run into issues. For most cases this works fine since the Linux kernel developers backport fixes to this kernel, but for some newer hardware, you may run into issues.
For example, the audio might not work if the sound card is too new for the LTS kernel. For example, the audio might not work if the sound card is too new for the LTS kernel.
To fix this, you can try the `kernel-latest` package -- though be aware that it's less tested! To fix this, you can try the `kernel-latest` package -- though be aware that it's less tested!
(See [here](/doc/software-update-dom0/#kernel-upgrade) for more information about upgrading kernels in dom0). (See [here](/doc/how-to-install-software-in-dom0/#kernel-upgrade) for more information about upgrading kernels in dom0).
In dom0: In dom0:
~~~ ~~~

View File

@ -15,12 +15,12 @@ For more details on this issue along with possible solutions, look at [PCI passt
## Can't attach a USB device / USB device not showing in qvm-usb ## Can't attach a USB device / USB device not showing in qvm-usb
To successfully attach a USB device, you require a VM dedicated to handling the USB input and output. To successfully attach a USB device, you require a VM dedicated to handling the USB input and output.
For guidance setting up a USB qube, see the [USB documentation](/doc/usb-devices/#creating-and-using-a-usb-qube). For guidance setting up a USB qube, see the [USB documentation](/doc/how-to-use-usb-devices/#creating-and-using-a-usb-qube).
Currently (until issue [1082](https://github.com/QubesOS/qubes-issues/issues/1082) gets implemented), if you remove the device before detaching it from the qube, Qubes OS (more precisely, `libvirtd`) will think that the device is still attached to the qube and will not allow attaching further devices under the same name. Currently (until issue [1082](https://github.com/QubesOS/qubes-issues/issues/1082) gets implemented), if you remove the device before detaching it from the qube, Qubes OS (more precisely, `libvirtd`) will think that the device is still attached to the qube and will not allow attaching further devices under the same name.
This may be characterized by VM manager crashes and the error message: `Houston, we have a problem`. This may be characterized by VM manager crashes and the error message: `Houston, we have a problem`.
The easiest way to recover from such a situation is to reboot the qube to which the device was attached. The easiest way to recover from such a situation is to reboot the qube to which the device was attached.
If this isn't an option, you can manually recover from the situation by following the instructions at the [Block Devices documentation](/doc/block-devices/#what-if-i-removed-the-device-before-detaching-it-from-the-vm) If this isn't an option, you can manually recover from the situation by following the instructions at the [Block Devices documentation](/doc/how-to-use-block-storage-devices/#what-if-i-removed-the-device-before-detaching-it-from-the-vm)
## "Device attach failed" error ## "Device attach failed" error
@ -80,7 +80,7 @@ Another solution would be to set the pci_strictreset option in dom0:
``` ```
These options allow the VM to ignore the error and the VM will start. These options allow the VM to ignore the error and the VM will start.
Please review the notes in the `qvm-prefs` man page and [here](/doc/device-handling/) and be aware of the potential risks. Please review the notes in the `qvm-prefs` man page and [here](/doc/how-to-use-devices/) and be aware of the potential risks.
## Can't use keyboard or mouse after creating sys-usb ## Can't use keyboard or mouse after creating sys-usb
@ -98,7 +98,7 @@ If your computer has a PS/2 port, you may instead use a PS/2 keyboard to enter t
## "qubes-usb-proxy not installed in the VM" error ## "qubes-usb-proxy not installed in the VM" error
When trying to [create and use a USB qube](/doc/usb-devices/#creating-and-using-a-usb-qube) with the `qubes-usb-proxy` package, you may receive this error: `ERROR: qubes-usb-proxy not installed in the VM`. When trying to [create and use a USB qube](/doc/how-to-use-usb-devices/#creating-and-using-a-usb-qube) with the `qubes-usb-proxy` package, you may receive this error: `ERROR: qubes-usb-proxy not installed in the VM`.
If you encounter this error, you can install the `qubes-usb-proxy` with the package manager in the VM you want to attach the USB device to. If you encounter this error, you can install the `qubes-usb-proxy` with the package manager in the VM you want to attach the USB device to.
Depending on your operating system, open a terminal in the TemplateVM and enter one of the following commands: Depending on your operating system, open a terminal in the TemplateVM and enter one of the following commands:

View File

@ -11,7 +11,7 @@ title: VM Troubleshooting
## VM Kernel troubleshooting ## VM Kernel troubleshooting
This troubleshoot applies to the non-default kernel choice described in the [Managing VM docs](/doc/managing-vm-kernel/#using-kernel-installed-in-the-vm). This troubleshoot applies to the non-default kernel choice described in the [Managing VM docs](/doc/managing-vm-kernels/#using-kernel-installed-in-the-vm).
In case of problems, you can access the VM console using `qvm-console-dispvm VMNAME` in dom0, then access the GRUB menu. In case of problems, you can access the VM console using `qvm-console-dispvm VMNAME` in dom0, then access the GRUB menu.
You need to call it just after starting the VM (until `GRUB_TIMEOUT` expires); for example, in a separate dom0 terminal window. You need to call it just after starting the VM (until `GRUB_TIMEOUT` expires); for example, in a separate dom0 terminal window.