mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-06 05:34:27 -04:00
Merge branch 'master' into spelling-grammar-fixes
Resolved conflicts in: basics_user/doc-guidelines.md basics_user/reporting-bugs.md common-tasks/backup-restore.md common-tasks/software-update-dom0.md common-tasks/software-update-vm.md common-tasks/usb.md configuration/disk-trim.md configuration/external-audio.md configuration/network-printer.md configuration/resize-disk-image.md configuration/resize-root-disk-image.md customization/fedora-minimal-template-customization.md managing-os/hvm.md managing-os/templates/archlinux.md privacy/whonix-install.md security/yubi-key.md troubleshooting/install-nvidia-driver.md troubleshooting/macbook-troubleshooting.md
This commit is contained in:
commit
919f2ed17e
123 changed files with 2914 additions and 1254 deletions
|
@ -37,10 +37,9 @@ more information on required and recommended hardware.
|
|||
|
||||
**Note:** We don't recommend installing Qubes in a virtual machine! It will
|
||||
likely not work. Please don't send emails asking about it. You can, however,
|
||||
install it on an external USB hard drive and run from it, at least for testing.
|
||||
(Bear in mind, however, that such disks are typically *orders* of magnitude
|
||||
slower than even the slowest internal hard drives). We also have a [live USB]
|
||||
option (currently in alpha).
|
||||
install it on an external USB hard drive (at least 32 GB) and run from it,
|
||||
at least for testing. Bear in mind, however, that such disks are typically
|
||||
*orders* of magnitude slower than even the slowest internal hard drives.
|
||||
|
||||
|
||||
Downloading the ISO
|
||||
|
@ -65,7 +64,7 @@ an installation medium.)
|
|||
If you prefer to use a USB drive, then you just need to copy the ISO onto the
|
||||
USB device, e.g. using `dd`:
|
||||
|
||||
dd if=Qubes-R3-x86_64.iso of=/dev/sdX bs=1M
|
||||
dd if=Qubes-R3-x86_64.iso of=/dev/sdX bs=1M && sync
|
||||
|
||||
Change `Qubes-R3-x86_64.iso` to the filename of the version you're installing,
|
||||
and change `/dev/sdX` to the correct target device (e.g., `/dev/sda`).
|
||||
|
@ -76,6 +75,9 @@ partition (e.g., `/dev/sda1`).
|
|||
On Windows, you can use the [Rufus] tool. Be sure to select "DD image" mode (you
|
||||
need to do that **after** selecting the Qubes ISO):
|
||||
|
||||
**Warning:** If you do that on Windows 10, you can only install Qubes without
|
||||
MediaTest, which isn't recommended.
|
||||
|
||||
<img src="/attachment/wiki/InstallationGuide/rufus-main-boxed.png" height="350">
|
||||
|
||||
Before proceeding with the installation, you are encouraged to first read all
|
||||
|
@ -85,7 +87,8 @@ simple and asks very few questions. (It's actually easier to install Qubes right
|
|||
now than most other Linux distributions!)
|
||||
|
||||
The installer loads Xen right at the beginning, so chances are high that if you
|
||||
can see the installer's graphical screen, Qubes will work on your system. :)
|
||||
can see the installer's graphical screen and you pass the compatibility check that
|
||||
runs immediately after that, Qubes will work on your system. :)
|
||||
|
||||
|
||||
Installing to a USB drive
|
||||
|
|
|
@ -7,6 +7,11 @@ permalink: /doc/live-usb/
|
|||
Qubes Live USB (alpha)
|
||||
======================
|
||||
|
||||
NOTE: This content applies to Qubes versions earlier than R3.2. See the
|
||||
[Installation Guide](/doc/installation-guide/) for instructions and warnings
|
||||
on creating a USB boot drive for testing purposes with Qubes R3.2, R4.0, and
|
||||
higher.
|
||||
|
||||
Qubes Live USB allows you to run and try Qubes OS without having to install it
|
||||
anywhere. Qubes Live USB is currently in alpha. If you use it, please consider
|
||||
running the [HCL reporting tool](/hcl/) and sending us the results so that we
|
||||
|
@ -16,7 +21,6 @@ please consider applying for a [Google Summer of Code][gsoc-page] scholarship
|
|||
(if you are eligible) and choosing the QubesOS Project as a mentor
|
||||
organization. You can find our list of project ideas [here][project-page].
|
||||
|
||||
|
||||
Introduction
|
||||
------------
|
||||
|
||||
|
@ -117,5 +121,5 @@ Downloading and burning
|
|||
and `of` or specify an incorrect device, you could accidentally overwrite
|
||||
your primary system drive. Please be careful!
|
||||
|
||||
[project-page]: https://www.qubes-os.org/gsoc/
|
||||
[project-page]: /gsoc/
|
||||
[gsoc-page]: https://summerofcode.withgoogle.com/organizations/6239659689508864/
|
||||
|
|
|
@ -39,28 +39,30 @@ The table below shows the OS used for dom0 in each Qubes OS release.
|
|||
| Release 3.2.1 | Fedora 23 |
|
||||
| Release 4.0 | Fedora 25 |
|
||||
|
||||
**Note:** Dom0 is isolated from domUs. DomUs can access only a few interfaces,
|
||||
### Note on dom0 and EOL ###
|
||||
|
||||
Dom0 is isolated from domUs. DomUs can access only a few interfaces,
|
||||
such as Xen, device backends (in the dom0 kernel and in other VMs, such as the
|
||||
NetVM), and Qubes tools (gui-daemon, qrexec-daemon, etc.). These components are
|
||||
[security-critical], and we provide updates for all of them (when necessary),
|
||||
regardless of the support status of the base distribution. For this reason, we
|
||||
consider it safe to continue using a given base distribution in dom0 even after
|
||||
it has reached end-of-life.
|
||||
it has reached EOL (end-of-life).
|
||||
|
||||
TemplateVMs
|
||||
-----------
|
||||
The table below shows the [TemplateVM] versions supported by each Qubes OS
|
||||
release. Currently, only Fedora and Debian TemplateVMs are officially supported.
|
||||
|
||||
| Qubes OS Version | Fedora Versions | Debian Versions |
|
||||
| ---------------- | --------------- | --------------------------------------------- |
|
||||
| Release 1 | 18, 20 | None |
|
||||
| Release 2 | 21 | None |
|
||||
| Release 3.0 | 21, 22\*, 23 | 7 ("wheezy")\*, 8 ("jessie") |
|
||||
| Release 3.1 | 21, 22\*, 23 | 7 ("wheezy")\*, 8 ("jessie"), 9 ("stretch")\* |
|
||||
| Release 3.2 | 23, 24\*, 25\* | 8 ("jessie"), 9 ("stretch")\* |
|
||||
| Release 3.2.1 | TBA | TBA |
|
||||
| Release 4.0 | TBA | TBA |
|
||||
| Qubes OS Version | Fedora Versions | Debian Versions |
|
||||
| ---------------- | -------------------- | --------------------------------------------- |
|
||||
| Release 1 | 18, 20 | None |
|
||||
| Release 2 | 21 | None |
|
||||
| Release 3.0 | 21, 22\*, 23 | 7 ("wheezy")\*, 8 ("jessie") |
|
||||
| Release 3.1 | 21, 22\*, 23 | 7 ("wheezy")\*, 8 ("jessie"), 9 ("stretch")\* |
|
||||
| Release 3.2 | 23\*, 24\*, 25, 26 | 8 ("jessie"), 9 ("stretch") |
|
||||
| Release 3.2.1 | 23\*, 24\*, 25, 26 | 8 ("jessie"), 9 ("stretch") |
|
||||
| Release 4.0 | 25, 26 | 8 ("jessie"), 9 ("stretch") |
|
||||
|
||||
\* Denotes versions for which we have published the packages but have not done
|
||||
extensive testing.
|
||||
|
|
|
@ -107,7 +107,7 @@ Maid passphrase to the new configuration. Please consult the Anti Evil Maid
|
|||
|
||||
If you use USB VM, you may encounter problem with starting it on updated Xen
|
||||
version (because of strict default settings). Take a look at
|
||||
[User FAQ](/doc/user-faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot)
|
||||
[User FAQ](/faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot)
|
||||
for details.
|
||||
|
||||
Once you have upgraded dom0, you can install new templates from Qubes R3.1
|
||||
|
|
104
installing/upgrade/upgrade-to-r4.0.md
Normal file
104
installing/upgrade/upgrade-to-r4.0.md
Normal file
|
@ -0,0 +1,104 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Upgrading to R4.0
|
||||
permalink: /doc/upgrade-to-r4.0/
|
||||
redirect_from:
|
||||
- /en/doc/upgrade-to-r4.0/
|
||||
- /doc/UpgradeToR4.0/
|
||||
- /doc/UpgradeToR4.0rc1/
|
||||
---
|
||||
|
||||
Upgrading Qubes R3.2 to R4.0
|
||||
============================
|
||||
|
||||
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**
|
||||
|
||||
Current Qubes R3.2 systems cannot be upgraded in-place to R4.0.
|
||||
A full backup, clean 4.0 install, and restore is required.
|
||||
This can be done by following the procedure below.
|
||||
|
||||
|
||||
Preparation
|
||||
-----------
|
||||
|
||||
1. Go to [downloads](/downloads/) and prepare a USB drive or DVD with the R4.0 installer.
|
||||
|
||||
2. If this is your only computer, and you do not have a R3.2 installer, you should also create a separate R3.2 USB drive or DVD installer at this time.
|
||||
|
||||
|
||||
Backup R3.2
|
||||
-----------
|
||||
|
||||
1. Attach the backup drive you will be using.
|
||||
These steps assume it is a USB drive.
|
||||
|
||||
2. Shutdown all non-essential VMs.
|
||||
Typically, `sys-usb` will be the only VM you need to leave running.
|
||||
|
||||
3. Follow the **Creating a Backup** section in the [Backup, Restoration, and Migration](/doc/backup-restore/) guide to back up **all VMs** except sys-usb.
|
||||
|
||||
6. Verify the integrity of your backup by following the **Restoring from a Backup** section in the [Backup, Restoration, and Migration](/doc/backup-restore/) guide and:
|
||||
|
||||
* If you're using Qubes Manager, check the box under "Restore options" that says, "Verify backup integrity, do not restore the data."
|
||||
* If you're using `qvm-backup-restore` from the command-line, use the `--verify-only` option.
|
||||
|
||||
7. If your backup verifies successfully, proceed to the next section.
|
||||
If it does not, **stop**.
|
||||
Go back and repeat the backup steps, review the documentation or search the qubes-users mailing list, or ask for assistance on the [qubes-users mailing list](/mailing-lists/#qubes-users) or IRC.
|
||||
|
||||
|
||||
Install R4.0
|
||||
------------
|
||||
|
||||
This section provides general guidance on installing R4.0 as part of migrating from R3.2.
|
||||
For further details, please see the [installation guide](/doc/installation-guide/).
|
||||
|
||||
1. Shut down R3.2 and boot the R4.0 installer.
|
||||
|
||||
2. Follow the installation prompts until you get to the drive selection screen.
|
||||
Choose **I want to make additional space available**.
|
||||
Select the box at the top of the list in order to select all partitions.
|
||||
**This will erase the entire drive**, so do this only if Qubes is the only OS installed on your computer.
|
||||
If you did not successfully verify your backup in the previous section, cancel the installation, and go back to do that now.
|
||||
|
||||
3. Complete the R4.0 installation.
|
||||
Ask for assistance on the [qubes-users mailing list](/mailing-lists/#qubes-users) if you run into trouble.
|
||||
|
||||
4. If you are unable to successfully install R4.0 on your system, all is not lost.
|
||||
Use the R3.2 installer to reinstall R3.2, then restore from your backup.
|
||||
|
||||
|
||||
Restore from your backup
|
||||
------------------------
|
||||
|
||||
1. Welcome to Qubes R4.0!
|
||||
The first thing you might notice is that **Qubes Manager** is not started by default.
|
||||
We won't need it for the next step, but we will be starting it later.
|
||||
|
||||
2. Since patches may have been released since your installation image was created, update Qubes R4.0 by going to the dom0 command line (**Qubes menu -> Terminal Emulator**) then running:
|
||||
|
||||
sudo qubes-dom0-update
|
||||
|
||||
3. Reboot dom0.
|
||||
|
||||
4. Go to **Qubes menu -> System Tools -> Qubes Manager** to start it.
|
||||
|
||||
5. Follow the **Restoring from a Backup** section in the [Backup, Restoration, and Migration](/doc/backup-restore/) guide.
|
||||
We recommend that you restore only your [TemplateBasedVMs](/doc/glossary/#templatebasedvm) and [StandaloneVMs](/doc/glossary/#standalonevm) from R3.2.
|
||||
Using [TemplateVMs](/doc/templates/) and [SystemVMs](/doc/glossary/#systemvm) from R3.2 is not fully supported (see [#3514](https://github.com/QubesOS/qubes-issues/issues/3514)).
|
||||
Instead, we recommend using the TemplateVMs that were created specifically for R4.0, which you can [customize](/doc/software-update-vm/) according to your needs.
|
||||
For the TemplateVM OS versions supported in R4.0, see [Supported Versions](/doc/supported-versions/#templatevms).
|
||||
If the restore tool complains about missing templates, you can select the option to restore the AppVMs anyway, then change them afterward to use one of the default R4.0 templates.
|
||||
|
||||
|
||||
Upgrade all Template and Standalone VM(s)
|
||||
-----------------------------------------
|
||||
|
||||
We strongly recommend that you update **all** TemplateVMs and StandaloneVMs before use so that you have the latest security patches from upstream distributions.
|
||||
In addition, if the default templates have reached EOL (end-of-life) by the time you install R4.0, we strongly recommend that you upgrade them before use.
|
||||
Please see [Supported Versions](/doc/supported-versions/) for information on supported OS versions and consult the guides below for specific upgrade instructions:
|
||||
|
||||
* [Upgrading Fedora TemplateVMs](/doc/templates/fedora/#upgrading)
|
||||
* [Upgrading Debian TemplateVMs](/doc/templates/debian/#upgrading)
|
||||
* [Updating Whonix TemplateVMs](/doc/whonix/update/)
|
||||
|
|
@ -14,4 +14,5 @@ Qubes OS Upgrade Guides
|
|||
* [Upgrading from R2 to R3.0](/doc/upgrade-to-r3.0/)
|
||||
* [Upgrading from R3.0 to R3.1](/doc/upgrade-to-r3.1/)
|
||||
* [Upgrading from R3.1 to R3.2](/doc/upgrade-to-r3.2/)
|
||||
* [Upgrading from R3.2 to R4.0](/doc/upgrade-to-r4.0/)
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue