Added referential links

This commit is contained in:
GammaSQ 2019-01-05 10:46:12 +01:00
parent e2258ac74c
commit ea9236234e
No known key found for this signature in database
GPG Key ID: D552FD2F98647C64
3 changed files with 9 additions and 1 deletions

View File

@ -8,6 +8,9 @@ redirect_from:
Block or Storage Devices in Qubes R4.0
======================================
*This page is part of [device handling in qubes]*
(In case you were looking for the [R3.2 documentation](/doc/usb/).)
If you don't know what a "block device" is, just think of it as a fancy way to say "something that stores data".
#Using The GUI to Attach a Drive
@ -159,6 +162,7 @@ This option accepts `cdrom` and `disk`, default is `disk`.
[device handling in qubes]: /doc/device-handling/
[mass-storage]: https://en.wikipedia.org/wiki/USB_mass_storage_device_class
[device manager icon]:https://raw.githubusercontent.com/hrdwrrsk/adwaita-xfce-icon-theme/master/Adwaita-Xfce/22x22/devices/media-removable.png <!--TODO: find actual icon used in qubes!-->
[USB]:/dock/usb-devices-in-qubes-R4.0/

View File

@ -7,7 +7,8 @@ redirect_from:
---
PCI Devices in Qubes R4.0
======================================
=========================
*This page is part of [device handling in qubes]*
(In case you were looking for the [R3.2 documentation](/doc/assigning-devices/).)
**Warning:** Only dom0 exposes PCI devices. Some of them are strictly required in dom0! (e.g. host bridge)
@ -134,6 +135,7 @@ or
<!--TODO: Is this still needed?-->
[device handling in qubes]: /doc/device-handling/
[security considerations]: /doc/device-considerations/#pci-security
[block]:/doc/block-devices-in-qubes-R4.0/
[USB]:/dock/usb-devices-in-qubes-R4.0/

View File

@ -8,6 +8,7 @@ redirect_from:
USB Devices in Qubes R4.0
==========================
*This page is part of [device handling in qubes]*
(In case you were looking for the [R3.2 documentation](/doc/usb/).)
**Important security warning:** USB passthrough comes with many security implications! Please make sure you carefully read and understood the **[security considerations]**! Especially, whenever possible, attach a [block device] instead!
@ -126,6 +127,7 @@ Strip the leading `0000:` and pass the rest to the [`qvm-pci` tool][qvm-pci] to
[device handling in qubes]: /doc/device-handling/
[block device]: /doc/block-devices-in-qubes-R4.0/
[security considerations]: /doc/device-considerations/#usb-security
[usb-challenges]: https://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html