-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hi,
Here is new pre-release image for Qubes 4.0.
Many things have been improved since the previous one[1]. Here is updated list
of known issues/limitations:
- in-place upgrade is not supported (this will be the case for the final
release too)
- backup do not work yet, but restoring backups from Qubes 3.2 should
work
- sys-net and sys-usb are set as PV domains, because of PCI passthrough
problems mentioned in previous message[1]
- on some machines (Thinkpad t460p) installation crashes when started from USB
3.0 stick; works fine from USB 2.0
- this ISO contains only Fedora 25 and Debian 8 templates, no Whonix templates
- VM windows do not have appropriate icons retrieved
- tray widgets (devices, domains) do not update information (new
devices are not visible, memory usage is not updated)
- there is no way to attach microphone to a VM (it isn't listed in
devices widget)
Download links:
https://ftp.qubes-os.org/~marmarek/Qubes-DVD-x86_64-20170718.iso
https://ftp.qubes-os.org/~marmarek/Qubes-DVD-x86_64-20170718.iso.asc
(signed with my code signing key)
For users of previous test image, installing updates *from testing
repository* in dom0 and templates should be enough.
(below is mostly copied from previous announcement)
After installing it, we recommend to enable testing repositories (both in
dom0 and templates) and install updates. We are working hard on fixing those
remaining issues, so new packages may be already available with some
fixes.
As announced earlier, by default all VMs are HVM. This means it requires
IOMMU (aka VT-d on Intel CPU) for working sys-net and sys-usb [update:
for now sys-net and sys-usb are configured as PV]. In this test image,
we've left enabled window of VM's local display, during its startup - so
you'll easily see if anything goes wrong. Additionally there are three
ways of booting VM:
- as HVM, using kernel provided by dom0 - this is default, it's controlled by
non-empty "kernel" VM property and "virt_mode" set to "hvm"
- as HVM, using bootloader and kernel installed inside template - to enable
this mode, set "kernel" property to empty string:
qvm-prefs VMNAME kernel ""
- as PV, using kernel provided by dom0 - we've left this option available
mostly for now, later it will be converted to PVH (when it will finally
works...); to enable this mode, keep kernel set to appropriate version, then
set "virt_mode" property to "pv"
Troubleshooting hints:
- if you get "Got empty response from qubesd" error, look into journalctl in dom0
- if you get "internal error: libxenlight failed ...", look into
/var/log/libvirt/libxl/libxl-driver.log in dom0
- to access VM console either enable debug mode (qvm-prefs VMNAME debug True)
and use its graphics output, or use `sudo xl console -t pv VMNAME`
If you want to send a bug report, please check if it isn't reported already -
both in qubes-issues and on a mailing list. Also, if you want to report
something on the above "known issues" list - we know it already...
[1]
https://groups.google.com/d/msgid/qubes-devel/20170706214430.GA5042%40mail-itl
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJZbnmMAAoJENuP0xzK19cs3dAH/iQHYwEWT8zME3U5yCMSjPfP
9uTwCeUYhumMJKcRUuLcHiHCRGfxs/v92FjN3mTDp+nUVVi6cTbiSR3EZkdQEh1h
UobI2hCWK2bWhO9glJtXgSlIiw0wXn/+KqkoY2dCbduyHe4rrBNWmxP1B3PqL1z6
LbxmDLYf1QfM3R9ZWnOXfdxU52OR7BgLK3DCBIBL7Kdo1vxSvfWewd+ZAgwDMRET
Mwp4r0GwGk18EZTMUSXLQK8hpo8x8wHw/tJuFkmztvxyky6hDqUVUGXQn4vHh8Ef
NmI0hku7VoVoau+Ct8JVJZMOIGJXLUfbUwlI2QVX1JQpfnEelEua+mpAkHyl6Qc=
=3Gij
-----END PGP SIGNATURE-----