@@ -42,11 +42,13 @@ potentially in newer versions, those must be temporarily disabled during
4242invocation of ` qubes-dom0-update ` , as shown in the following commands. If any
4343of the packages that are part of AEM are updated in standard repos, you will
4444have to choose between using new versions or having working AEM, at least until
45- new AEM release is published or the code gets merged upstream. If you decide to
45+ new AEM release is published, or the code gets merged upstream. If you decide to
4646restore AEM after an update broke it, you will have to repeat the installation
4747of overwritten package with ` --action=reinstall ` added to ` qubes-dom0-update ` ,
4848if it wasn’t present before.
4949
50+ #### Qubes repository dependencies
51+
5052Start by installing prerequisite packages. Those are not part of newly added
5153repository, but ` qubes-dom0-current-testing ` :
5254
@@ -60,18 +62,35 @@ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing \
6062 tpm-tools
6163```
6264
65+ #### AEM repository dependencies
66+
6367Next set of new packages comes from AEM repository, to avoid conflicts other
6468repositories are disabled for this call:
6569
6670``` bash
6771sudo qubes-dom0-update --disablerepo=" *" --enablerepo=aem \
68- grub2-tools-extra \
72+ grub2-tools-extra
73+ ```
74+
75+ ##### AMD systems dependencies
76+
77+ This package is only needed on AMD systems:
78+
79+ ``` bash
80+ sudo qubes-dom0-update --disablerepo=" *" --enablerepo=aem \
6981 secure-kernel-loader
7082```
7183
72- This is followed by reinstalling additional packages. A reinstall is required
84+ #### AEM repository dependencies to reinstall
85+
86+ This is followed by reinstalling additional packages. A reinstallation is required
7387because currently installed version is equal (or it may be higher in the future)
74- than those provided by AEM.
88+ than those provided by AEM. A couple of GRUB packages differ slightly
89+ depending on whether you use a legacy or UEFI BIOS:
90+
91+ ##### Legacy Systems
92+
93+ If your system has a legacy BIOS, reinstall these packages:
7594
7695``` bash
7796sudo qubes-dom0-update --disablerepo=" *" --enablerepo=aem --action=reinstall \
@@ -88,18 +107,45 @@ sudo qubes-dom0-update --disablerepo="*" --enablerepo=aem --action=reinstall \
88107 grub2-tools-minimal
89108```
90109
91- ### Updating GRUB
110+ ###### Updating GRUB on legacy systems
111+
112+ Booting on legacy systems requires manual installation of GRUB2 to the MBR
113+ of disk where Qubes OS is stored. In the example below it is ` /dev/sda ` ,
114+ yours may be different.
92115
93- Booting on legacy systems (AEM currently doesn’t support UEFI) requires manual
94- installation of GRUB2 to the MBR of disk where Qubes OS is stored. In the
95- example below it is ` /dev/sda ` , yours may be different. Remember that GRUB2
96- must be installed on disk and not on partition, so don’t use ` sda1 ` , ` nvme0n1p1 `
97- etc.
116+ To check on which partition is your OS installed run:
117+
118+ ``` bash
119+ df --output=source /
120+ ```
121+
122+ Remember that GRUB2 must be installed on disk and
123+ not on partition, so don’t use ` sda1 ` , ` nvme0n1p1 ` etc. This step should be
124+ skipped on UEFI systems.
98125
99126``` bash
100127sudo grub2-install /dev/sda
101128```
102129
130+ ##### UEFI Systems
131+
132+ If your system has an UEFI BIOS, install these packages instead:
133+
134+ ``` bash
135+ sudo qubes-dom0-update --disablerepo=" *" --enablerepo=aem --action=reinstall \
136+ python3-xen \
137+ xen \
138+ xen-hypervisor \
139+ xen-libs \
140+ xen-licenses \
141+ xen-runtime \
142+ grub2-common \
143+ grub2-efi-x64 \
144+ grub2-efi-x64-modules \
145+ grub2-tools \
146+ grub2-tools-minimal
147+ ```
148+
103149### Installing main AEM package
104150
105151Finally, ` anti-evil-maid ` package may be installed:
@@ -134,7 +180,14 @@ again.
134180Now all that's left is proper installation of AEM. There are different options,
135181refer to ` anti-evil-maid-install -h ` for examples. In the simplest case, AEM is
136182installed on boot partition (not disk, i.e. ` sda1 ` instead of ` sda ` etc.) of
137- Qubes OS. This can be done with a simple command:
183+ Qubes OS. Run this command to find out where your boot partition is installed:
184+
185+ ``` bash
186+ df --output=source /boot
187+ ```
188+
189+ Assuming that your boot partition is installed on ` /dev/sda1 ` , the
190+ installation can be done with a simple command:
138191
139192``` bash
140193sudo anti-evil-maid-install /dev/sda1
0 commit comments