I decide to try R4.2 on a usb disk so that I can report bugs earlier and have most of R4.2 problems solved and ready to install R4.2 on my production machine.
I tried installing Qubes R4.2 rc1 onto my usb stick. It runs on my machine however there are various problems, big or small.
I am using btrfs and it runs good.
-
I wonder whether swap partition is required in the install, and I wonder why the swap partition is not under the same luks subtree as the main partition, causing two luks partition under the same device (cannot it be merged into one?). In R4.1 swap partition does not exist;
-
I have installed the system with non-English setup. There are too many part that are localized that surprised me, however certain part of qubes os does not seem to be aware of localization.
dom0 qubesd[3832]: self.transport.write('{}\0{}\0'.format(k, str(v)).encode('ascii'))
dom0 qubesd[3832]: File "/usr/lib/python3.11/site-packages/qubes/api/__init__.py", line 374, in send_event
dom0 qubesd[3832]: self.send_event(subject, event, **kwargs)
dom0 qubesd[3832]: File "/usr/lib/python3.11/site-packages/qubes/api/admin.py", line 70, in vm_handler
dom0 qubesd[3832]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^
dom0 qubesd[3832]: effect = func(self, event, **kwargs)
dom0 qubesd[3832]: File "/usr/lib/python3.11/site-packages/qubes/events.py", line 164, in _fire_event
dom0 qubesd[3832]: ^^^^^^^^^^^^^^^^^^^^^^^
dom0 qubesd[3832]: sync_effects, async_effects = self._fire_event(event,
dom0 qubesd[3832]: File "/usr/lib/python3.11/site-packages/qubes/events.py", line 227, in fire_event_async
dom0 qubesd[3832]: await self.fire_event_async('domain-start-failed',
dom0 qubesd[3832]: File "/usr/lib/python3.11/site-packages/qubes/vm/qubesvm.py", line 1215, in start
dom0 qubesd[3832]: await self.dest.start()
dom0 qubesd[3832]: File "/usr/lib/python3.11/site-packages/qubes/api/admin.py", line 862, in vm_start
dom0 qubesd[3832]: ^^^^^^^^^^^^^^^^^^^^^^^^
dom0 qubesd[3832]: response = await self.mgmt.execute(
dom0 qubesd[3832]: File "/usr/lib/python3.11/site-packages/qubes/api/__init__.py", line 297, in respond
dom0 qubesd[3832]: Traceback (most recent call last):
dom0 qubesd[3832]: During handling of the above exception, another exception occurred:
(it happens when I use a non-English language and starts a sys-net that ought to pop “internal error: cannot reset PCI device xxxx:yy.z: no available FLR, PM or bus reset” in my language)
- maybe related to btrfs. The disk usage for sys-net incorrectly accounts for the template vm size - it shows 4575MB of usage while it only has 2GB of private storage
UPDATE for 3. When I boot Qubes OS the second time, the sys-net size becomes correct. I suspect that there may be a bug somehow.
UPDATE second time for 3. When I boots sys-net, this size become incorrect again
- sys-net cannot reset the device again and i cannot fix this with simple no strict reset, not sure why, maybe similar to the old problem in R4.1; I can only remove the offending device and restart it
UPDATE: it turns out that strict reset is the key to solve it. It is only that the GUI way of strict reset is bad.
The Qube Manager → sys-net → settings → Devices → Configure strict reset for PCI devices is buggy and not intuitive. It is buggy since the option only works when I click “OK” but not “Apply”. Intuitive way is to make strict reset (and permissive) to be a checkbox giving clear information about whether one device is currently under strict reset mode.
I was investigating qvm-device
when I found this. Again this might be reported somewhen however not fixed now.
- little aesthetic problem: Qubes Global Config app: the help snippet is helpful but some of them contains
<b></b>
characters which are not rendered and shows on itself. (example: updates → dom0 updates → enable all testing updates → (question mark))
(Also can be shown is that the text on OK/Cancel/Apply buttons are not visible. this is true for most of the themes. afaik it has been reported before)
- Qubes Global Config app: this device → xen is unknown. is it good?
- screen saver settings cannot be started
dom0
$ xscreensaver-settings
xscreensaver-settings: 15:32:11.31: Unable to retrieve object 'manual' from class template for type 'XScreenSaverDialog' while building a 'XScreenSaverDialog'
- suspend not working. I will investigate on this later when I have more time; basically it sleeps but not correctly resumes; it takes a long time to sleep.
UPDATE: it works perfectly today. do not know why.
- despite I have installed R4.2 on my usb disk, it still overrides the efi boot option of the Qubes R4.1 and I need to use efibootmgr to rescue it.
-
sys-net default install has 400MB memory; it does not contains common utilities such as netstat and ifconfig; they are all fine and I am good with them. However on command not found error, the command_not_found_handle is invoked and dnf package list is refetched. This is meaningless on individual vm and the dnf invocation effectively ooms my sys-net. No command_not_found_handle inside such a small vm please.
-
also dark theme makes certain tray icon invisible
The tray icons become visible after a reboot. Anyway it is still a small annoyance.
- multi lingual support are here. however time locales are incorrect. Incorrect time locale annoys user
time panel orders using rfc5322: weekday, day, month
while the correct order (as is the output of the command date
in dom0 shell) should be rfc3339 style in current locale: year, month, day, weekday
-
on boot grub
unicode.pf2 not found
still happens. a very old problem -
Qubes OS VM Backup compression algorithm, where can it be configured? I heard that R4.2 may allow zstd to be one of compression algorithms?
-
in
/proc/cmdline
of dom0,rd.net.dhcp.vendor-class=anaconda-Linux 6.1.28-1.qubes.fc37.x86_64 x86_64
I see this in dom0 linux command line. It is obviously a unexpected command line injection here. Where is it from? -
(R4.0 R4.1 R4.2) The Qubes Application Menu (default on the top-left corner of screen) lags a while when the system freshly boots up. An aged bug that still remains to be fixed.
-
(R4.1 R4.2)
/dev/xvdc
is 10G while swap is 1G for each vm. what is the 9G /dev/xvdc3 for anyway? -
qvm-run
directly fails when the vm is not fully boot up. In earlier version this command should wait for vm to boot up. -
installing vm using .iso is not direct any more. Mostly because such vm default setup becomes (pvh+default kernel) rather than (hvm+no kernel).
-
appvm based on
fedora-38-minimal
+ … cannot boot within 60 seconds.
[2023-07-09 02:36:18] [ 4.741964] blkfront: xvdd: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled
[2023-07-09 02:36:18] Waiting for /dev/xvda* devices...
[2023-07-09 02:36:18] Qubes: Doing R/W setup for TemplateVM...
[2023-07-09 02:36:19] [ 6.097959] xvdc: xvdc1 xvdc3
[2023-07-09 02:36:21] Setting up swapspace version 1, size = 1073737728 bytes
[2023-07-09 02:36:21] UUID=763f47ba-ce44-4dd7-96b7-b49abd812fa4
[2023-07-09 02:36:33] Qubes: done.
[2023-07-09 02:36:36] [ 23.350408] EXT4-fs (xvda3): mounted filesystem with ordered data mode. Quota mode: none.
[2023-07-09 02:36:36] Waiting for /dev/xvdd device...
[2023-07-09 02:36:36] [ 23.497547] /dev/xvdd: Can't open blockdev
[2023-07-09 02:36:36] [ 23.497781] EXT4-fs (xvdd): mounting ext3 file system using the ext4 subsystem
[2023-07-09 02:36:36] [ 23.498576] EXT4-fs (xvdd): mounted filesystem with ordered data mode. Quota mode: none.
[2023-07-09 02:36:37] mount: can't read '/proc/mounts': No such file or directory
[2023-07-09 02:36:49] [ 35.667824] systemd[1]: systemd 253.5-1.fc38 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
[2023-07-09 02:36:49] [ 35.667964] systemd[1]: Detected virtualization xen.
[2023-07-09 02:36:49] [ 35.667994] systemd[1]: Detected architecture x86-64.
[2023-07-09 02:36:49]
[2023-07-09 02:36:49] Welcome to .[0;38;2;60;110;180mFedora Linux 38 (Thirty Eight).[0m!
[2023-07-09 02:36:49]
[2023-07-09 02:36:49] [ 35.899254] systemd[1]: No hostname configured, using default hostname.
[2023-07-09 02:36:49] [ 35.899339] systemd[1]: Hostname set to <fedora>.
[2023-07-09 02:36:49] [ 36.398102] systemd[1]: bpf-lsm: BPF LSM hook not enabled in the kernel, BPF LSM not supported
[2023-07-09 02:37:08] [ 55.379181] systemd[1]: /usr/lib/systemd/system/qubes-gui-agent.service:15: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
what is the vm doing?
-
fedora-38-xfce
~/.bashrc
is empty, which makes the default terminal prompt barebash-5.2$
rather than with some basic info about cwd. -
qvm-copy .
seems not working
$ qvm-copy .
qfile-agent: Fatal error: File copy: “Invalid or incomplete multibyte or wide character; Last file: .” (error type: Invalid or incomplete multibyte or wide character)
TODO: testing on more apps, pulseaudio, docker, and etc; solve suspension problem and sys-net problems; make screenshots for some of the problems; find out whether btrfs features are correctly used by the system; etc.
Despite all them, R4.2 seems very familiar and similar to R4.1 on gui, with many ui improvements and it takes time to find them all.
also sys-gui is still on experiment stage now?
Written inside untrusted at qubes r4.2