openSUSE Tumbleweed Release Notes openSUSE Tumbleweed is a free and Linux-based operating system for your PC, laptop or server. You can surf the web, manage your e-mails and photos, do office work, play videos or music and have a lot of fun! Publication Date: 2018-02-28 , Version: 84.87.20180228.827b030 1 Installation 2 General 3 More Information and Feedback The release notes are under constant development. To find out about the latest updates, see the online version at https://doc.opensuse.org/release-notes. The English release notes are updated whenever need arises. Translated language versions can temporarily be incomplete. To report bugs against this release, use the openSUSE Bugzilla. For more information, see https://en.opensuse.org/openSUSE:Submitting_bug_reports. 1 Installation 1.1 UEFI—Unified Extensible Firmware Interface Prior to installing openSUSE on a system that boots using UEFI (Unified Extensible Firmware Interface), you are urgently advised to check for any firmware updates the hardware vendor recommends and, if available, to install such an update. A pre-installed Windows 8 is a strong indication that your system boots using UEFI. Background: Some UEFI firmware has bugs that cause it to break if too much data gets written to the UEFI storage area. Nobody really knows how much "too much" is, though. openSUSE minimizes the risk by not writing more than the bare minimum required to boot the OS. The minimum means telling the UEFI firmware about the location of the openSUSE boot loader. Upstream Linux Kernel features that use the UEFI storage area for storing boot and crash information (pstore) have been disabled by default. Nevertheless, it is recommended to install any firmware updates the hardware vendor recommends. 1.2 UEFI, GPT, and MS-DOS Partitions Together with the EFI/UEFI specification, a new style of partitioning arrived: GPT (GUID Partition Table). This new schema uses globally unique identifiers (128-bit values displayed in 32 hexadecimal digits) to identify devices and partition types. Additionally, the UEFI specification also allows legacy MBR (MS-DOS) partitions. The Linux boot loaders (ELILO or GRUB2) try to automatically generate a GUID for those legacy partitions, and write them to the firmware. Such a GUID can change frequently, causing a rewrite in the firmware. A rewrite consist of two different operation: removing the old entry and creating a new entry that replaces the first one. Modern firmware has a garbage collector that collects deleted entries and frees the memory reserved for old entries. A problem arises when faulty firmware does not collect and free those entries; this may end up with a non-bootable system. The workaround is simple: convert the legacy MBR partition to the new GPT to avoid this problem completely. 2 General 2.1 System with LUKS-Encrypted Partition Does Not Boot In some cases, Plymouth does not display the passphrase prompt properly. To fix this, add plymouth.enable=0 to the kernel command line. See also https:// bugzilla.opensuse.org/show_bug.cgi?id=966255. 2.2 systemctl stop apparmor Does Not Work In the past, there could be confusion over the difference between how the very similarly named systemctl subcommands reload and restart worked for AppArmor: • systemctl reload apparmor properly reloaded all AppArmor profiles. (It was and continues to be the recommended way of reloading AppArmor profiles.) • systemctl restart apparmor meant that AppArmor would stop, thereby unloading all AppArmor profiles and then restart which left all existing processes unconfined. Only newly started processes would then be confined again. Unfortunately, systemd does not provide a solution within its unit file format for the issue posed by the restart scenario. Starting with AppArmor 2.12, the command systemctl stop apparmor will not work. As a consequence, systemctl restart apparmor will now correctly reload AppArmor profiles. To unload all AppArmor profiles, use the new command aa-teardown instead which matches the previous behavior of systemctl stop apparmor. For more information, see https://bugzilla.opensuse.org/show_bug.cgi?id=996520 and https://bugzilla.opensuse.org/show_bug.cgi?id=853019. 2.3 No Default Compose Key Combination In previous versions of openSUSE, the compose key combination allowed typing characters that were not part of the regular keyboard layout. For example, to produce “å”, you could press and release Shift–Right Ctrl and then press a twice. In openSUSE Tumbleweed, there is no longer a predefined compose key combination because Shift–Right Ctrl does not work as expected anymore. • To define a system-wide custom compose key combination, use the file /etc/ X11/Xmodmap and look for the following lines: [...] !! Third example: Change right Control key to Compose key. !! To do Compose Character, press this key and afterwards two !! characters (e.g. `a' and `^' to get 342). !remove Control = Control_R !keysym Control_R = Multi_key !add Control = Control_R [...] To uncomment the example code, remove the ! characters at the beginning of lines. However, note that the setup from Xmodmap will be overwritten if you are using setxkbmap. • To define a user-specific compose key combination, use your desktop's keyboard configuration tool or the command-line tool setxkbmap: setxkbmap [...] -option compose:COMPOSE_KEY For the variable COMPOSE_KEY, use your preferred character, for example ralt, lwin, rwin, menu, rctl, or caps. • Alternatively, use an IBus input method that allows typing the characters you need without a Compose key. 3 More Information and Feedback • Read the README documents on the medium. • View a detailed changelog information about a particular package from its RPM: rpm --changelog -qp FILENAME.rpm Replace FILENAME with the name of the RPM. • Check the ChangeLog file in the top level of the medium for a chronological log of all changes made to the updated packages. • Find more information in the docu directory on the medium. • For additional or updated documentation, see https://doc.opensuse.org/. • For the latest product news, from openSUSE, visit https://www.opensuse.org. Copyright © 2018 SUSE LLC Thanks for using openSUSE. The openSUSE Team. © 2018 SUSE