Language Selection

English French German Italian Portuguese Spanish

OpenSUSE 10.3 Alpha 5 report

Filed under
Reviews
SUSE
-s

Alpha 5 in the OpenSUSE 10.3 developmental cycle was released several days ago and with it came a few surprises. As opposed to big changes in the installed system itself, the big news this release was the 1 CD install offerings.

In KDE and GNOME flavors, this release brought the single ~700MB install cdrom. I found them to be complete enough to get a stable desktop system. Not much development will be possible without further package installation, but downloading and installing the required and other desired packages through yast might be preferrable to downloading the usual 5 or 6 cds or the huge dvd.

The only quirk I saw with installation of the one cd installs was the offering of XGL in the patterns of package selection and then receiving a error when trying to "check" it. The error stated those packages weren't available. As XGL is a completely new entry, listed as "Desktop Effects" in the traditional install media, it leads me to think they are in the process of spliting those packages into small enough components to fit on the one cd installers.

In essence, as one might imagine, those 1 cd install disks contain just what is absolutely is necessary. There's a KDE 1 cd install package list Here, and Gnome's Here.

Again, as with the last release, Instlux wasn't able to get very far into the install onto the Windows partition. In fact, it exited with the same exact "Cannot copy E:\boot\x86_64\loader\intrid to C:\openSUSE\initrd" error. Well, I guess it needs more work.

Another new development is the use of libata, which will name devices in the /dev/sdXx format. So I guess my earlier assumption wasn't really too misplaced afterall. Updating from a previous install is supposed to fix all the files necessary in order for this change to go virtually unnoticed by end users, or at least give them no problems. I attempted to test on two installs, one version 10.2 and the other 10.3 Alpha 3. With 10.2, the package selection summary had a warning stating that upgrading from 10.2 to 10.3 isn't compatible. Furthering attempts, I then got several unresolved and locked files conflicts. I had customized that install trying to fix fonts, enable multimedia playback, and such so we can't really put all the blame on OpenSUSE. My other install was pretty much default and that upgrade process didn't fair much better. After warning me that libata doesn't support partition numbers beyond 15, configuration was fairly textbook. Then it spent quite a bit of time working away upgrading without issue, but ultimately shot an error about not being able to create the initrd image. So alas, the only real success I had was with a fresh install.

KDE4 is slowly creeping into OpenSUSE. Some of the directories are filled out and contain quite a few libraries and supporting files. There are even a few KDE4 binaries present - mostly in the form of games. In fact Kmahjongg, Kreversi, Kmines, and Patience have made it into the menu. There are several other KDE4 apps that are not installed by default but are listed in package manager.

Some RPM versioning this release:

  • kernel-default-2.6.22_rc4_git3-2

  • xorg-x11-7.2-83
  • gcc-4.1.3-52
  • qt3-3.3.8-41
  • gtk2-2.10.11-23
  • glibc-2.6-5
  • kdebase3-3.5.7.15
  • gnome-desktop-2.18.1-32
  • OpenOffice_org-2.2-13
  • MozillaFirefox-2.0.0.4-6
  • gimp-2.2.13-83
  • ndiswrapper-1.46-5
  • wpa_supplicant-0.5.7-33
  • Full List

Some Changelog Highlights include:

++++ gaim-otr:

   - replace gaim-devel by pidgin-devel in buildreq
   - add pidgin patch (diff from pidgin-otr-3.0.0)

++++ kernel-default:

   - Enable CONFIG_REISERFS_CHECK.
   - Update to 2.6.22-rc4-git3

++++ dockutils:

   - add 24dock hook to add to pm-utils sleep hooks on installation
   - add support for Thinkpad X40 dock station
   - figure out scsi hosts manually

++++ kdenetwork3:

   - Fix pwc based webcams, eg Quickcams
   - Fix toolbar setting changes don't persist

++++ powertop:

   - Update to PowerTOP 1.6

++++ beagle-index:

   - Use pidgin instead of gaim.

++++ kdebase4:

   - update to 3.90.1.svn670093

++++ koffice:

   - update to 1.6.3

++++ MozillaThunderbird:

   - Security update to version 1.5.0.12

++++ Lots of package renames and splits to create smaller systems

++++ Full Changelog for Alpha 5

Most annoying bugs:

  • YaST do not accept the default gpg key by default and asks for import during registration.

  • grub config completely broken on update
    • the kernel is updated, meaning a new one appears and a old one
      disappears, but:

      • the old entries for the kernel no longer in the system stay in menu.lst

      • the entry pointing to the old kernel is the default boot entry
      • the newly added boot entries have "root (/dev/sda3)" instead of "root (hd0,2)" for example, grub will
        never find that device ...

      • manually added kernel options are removed on update
  • No remote repository gets added during installation
  • ifup/getcfg are broken, so the traditional network scripts will not work
  • No NIS offered during installation
  • Win keys are hard binded to GNOME menu
  • X.org doesn't start when using one CD installation media on some laptops
  • X.org's RADEON Xserver may crash when going to powersave mode

Between the release of 1 CD installs and the appearance of KDE4, it's been a fairly exciting release this time. No apparent new eye candy yet, but updated desktops and applications abound. I did a lot of testing this time and found that the 1 CD installs work okay as well as fresh install of the traditional media, but the upgrade path is still a bit buggy as is the install-on-Windows. We can expect Alpha6 around Thu, Jul 19 and it will feature gcc 4.2.




instlux issues

Hi,

the issue with instlux is known and should be actually fixed for Alpha5. But unfortunately the new version of instlux did make it on the media in time.

See:
https://bugzilla.novell.com/show_bug.cgi?id=275571

Attached on the bugzilla entry you could found a fixed version of instlux for testing...

instlux issues

instlux actually worked quite well for me in Alpha 5, at least in beginning the install. There are two things that I would try to fix before the final release, though.

When dual-booting (which I imagine many, if not most, users will be doing), after selecting Windows in Grub, you get the Windows boot menu (at least in Win2K) asking whether you want to boot Windows or the openSUSE install. This will confuse some folks, and is just an extra click that we don't really need.

When Windows 2K appears, a box asks you if you want to remove the "missing" openSUSE install program. Assuming there's a good reason for the box to appear at all, it would be good to add some language that you're just deleting the install program -- not openSUSE! Newbies get frightened easily.

FWIW, I blogged my Alpha 5 install experience:

http://metaverse.wordpress.com/2007/06/23/installing-opensuse-103-alpha-5/

http://metaverse.wordpress.com/2007/06/23/alpha-5-install-continued/

Re: instlux issues

workingwriter wrote:

When dual-booting (which I imagine many, if not most, users will be doing), after selecting Windows in Grub, you get the Windows boot menu (at least in Win2K) asking whether you want to boot Windows or the openSUSE install. This will confuse some folks, and is just an extra click that we don't really need.

Actually the "openSUSE installer" entry should disappear if you run the uninstaller of the "openSUSE installer". This actually the task of the uninstaller application which is placed in the autostart.
But i guess we should give a final hint about that confusing issue before the installer finishes and the installer reboots the machine.

Thanks for the hint...

workingwriter wrote:

When Windows 2K appears, a box asks you if you want to remove the "missing" openSUSE install program. Assuming there's a good reason for the box to appear at all, it would be good to add some language that you're just deleting the install program -- not openSUSE! Newbies get frightened easily.

As mentioned before the "openSUSE installer" entry in the Windows boot menu will bother you at least tow times. First time if you start the installer .. second time if you reboot into windows after installation. The entry is written in the windows boot menu - until you reboot the first time back to windows and the "openSUSE installer" uninstaller got successfully executed.

workingwriter wrote:

FWIW, I blogged my Alpha 5 install experience:

http://metaverse.wordpress.com/2007/06/23/installing-opensuse-103-alpha-5/

http://metaverse.wordpress.com/2007/06/23/alpha-5-install-continued/


Thanks for your feedback - will have a look to your review.

Btw. the "openSUSE uninstall" name confusion should be fixed with the latest version as well. But again - unfortunately the installer didn't made it on the openSUSE 10.3 Alpha5 media in time. The netinstaller should be affected by all those issue... only the hint about that the "openSUSE installer" entry will disappear after executing the "openSUSE installer - uninstaller" (terrible name).

best regards,
Daniel

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Google, IBM and Microsoft

  • Five Common Chromebook Myths Debunked
    When Chromebooks first came out in 2011, they were basically just low-spec laptops that could access web apps – fine for students maybe, but not to be regarded as serious computers. While they’ve become more popular (the low cost, simplicity, and dependability appeal to businesses and education systems), as of 2018 Chromebooks still haven’t managed to become widely accepted as a Windows/Apple/Linux alternative. That may be about to change. The humble Chromebook has gotten a lot of upgrades, so let’s get ourselves up to speed on some things that just aren’t true anymore. [...] The 2011 Chrome OS was pretty bare-bones, but it’s gone to the opposite extreme since then. Not only is it steadily blurring the line between Chrome and Android, it can now install and run some Windows programs as well, at the same time as a Chrome and an Android app, if you like. And hey, while you’re at it, why not open a Linux app as well? You can already install Linux on a Chromebook if you want, but one of the next versions of Chrome OS is going to include a Linux virtual machine accessible right from your desktop (which is already possible, just not built-in and user-friendly). In sum, Chrome OS has gone from barely being an operating system to one that can run apps from four other OSes at the same time.
  • Like “IBM’s Work During the Holocaust”: Inside Microsoft, Growing Outrage Over a Contract with ICE
  • Ubuntu Podcast from the UK LoCo: S11E15 – Fifteen Minutes - Ubuntu Podcast
    ...Microsoft getting into hot water over their work with US Immigration and Customs Enforcement. Plus we round up the community news.

KDE on Android: CI, CD & SDK

I guess we all agree that one of the biggest stoppers to get a contribution out is the ability to get the system ready to start working on the contribution. Today I want to talk a bit about generating Android binaries from our machine. In the KDE Edu sprint we had the blatant realisation that it’s very frustrating to keep pushing the project while not being swift at delivering fresh packages of our applications in different systems. We looked into windows, flatpak, snap and, personally, I looked into Android once again. Nowadays, KDE developers develop the applications on their systems and then create the binaries on their systems as well. Usually it’s a team effort where possibly just one person in the team will be familiar with Android and have the development combo in place: Android SDK, Android NDK, Qt binaries and often several KDE Frameworks precompiled. Not fun and a fairly complex premise. Read more Also:

today's howtos

Linux Kernel and Security: LVM2, Containers, AMD

  • LVM2 Begins Work On Major Changes To Logical Volume Management
    LVM2 as the user-space tools for Logical Volume Management (LVM) on Linux is in the process of going through a big re-work.
  • Containers and Cloud Security
    The idea behind this blog post is to take a new look at how cloud security is measured and what its impact is on the various actors in the cloud ecosystem. From the measurement point of view, we look at the vertical stack: all code that is traversed to provide a service all the way from input web request to database update to output response potentially contains bugs; the bug density is variable for the different components but the more code you traverse the higher your chance of exposure to exploitable vulnerabilities. We’ll call this the Vertical Attack Profile (VAP) of the stack. However, even this axis is too narrow because the primary actors are the cloud tenant and the cloud service provider (CSP). In an IaaS cloud, part of the vertical profile belongs to the tenant (The guest kernel, guest OS and application) and part (the hypervisor and host OS) belong to the CSP. However, the CSP vertical has the additional problem that any exploit in this piece of the stack can be used to jump into either the host itself or any of the other tenant virtual machines running on the host. We’ll call this exploit causing a failure of containment the Horizontal Attack Profile (HAP). We should also note that any Horizontal Security failure is a potentially business destroying event for the CSP, so they care deeply about preventing them. Conversely any exploit occurring in the VAP owned by the Tenant can be seen by the CSP as a tenant only problem and one which the Tenant is responsible for locating and fixing. We correlate size of profile with attack risk, so the large the profile the greater the probability of being exploited.
  • Canonical Releases AMD Microcode Updates for All Ubuntu Users to Fix Spectre V2
    Canonical released a microcode update for all Ubuntu users with AMD processors to address the well-known Spectre security vulnerability. The Spectre microprocessor side-channel vulnerabilities were publicly disclosed earlier this year and discovered to affect billions of devices made in the past two decades. Unearthed by Jann Horn of Google Project Zero, the second variant (CVE-2017-5715) of the Spectre vulnerability is described as a branch target injection attack.