-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fedora 31 in dom0 #5529
Comments
Spoke classes no longer have instclass attribute. QubesOS/qubes-issues#5529
Please let me know when this is ready for testing and what will be required for testing. More than happy to test it out on the 4.1 system I have up. |
And I was just about to install 4.1 from the October iso ... |
Oh great, salt package in F31 is broken: https://bugzilla.redhat.com/show_bug.cgi?id=1748170 |
Even better: F31 has pre-release of salt package (salt-2019.2.1rc0.3), which is affected by saltstack/salt#54765 (fixed in 2019.2.2) |
Reported upstream: https://bugzilla.redhat.com/show_bug.cgi?id=1785489 |
Unfortunately the above makes initial setup completely broken. I guess it means no installation image before Xmas :/ |
Salt in Fedora 31 is a buggy version, add a workaround until there will be salt 2019.2.2 or newer. QubesOS/qubes-issues#5529
Maybe we could do the update on upstream? |
Yes, submitting a pull request would probably help them. In worst case, we can ship the update through our repos...
|
@marmarek: would you like me to switch all the travis dom0 to fc31? |
Generally, only after all the required changes are in. But you can add relevant changes to fc31 PRs. Please hold off with creating PRs for other repos until those are merged and default builder.conf is updated, to not clutter pull request list. |
|
Superseded by #5763 |
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If it's present, allow creating PV domain with PCI devices even if IOMMU is not present/enabled. QubesOS/qubes-issues#5529
No description provided.
The text was updated successfully, but these errors were encountered: