-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fedora 22+ in dom0 #1807
Comments
For anyone wanting to help, approximate build instructions:
Then try to install resulting ISO (I recommend using external disk - not a fast way, but pretty painless). If you've skipped step 4, window decorations will not be marked with VM color on KDE. But it should be possible to test and fix everything else. |
I've started on this with a view to getting dom0 running on Fedora 23 (since Fedora 22 will be EOL in 4-5 months it doesn't seem a good target). There is a lot for me to learn about whats happening under the hood of the build process, but so far I've managed to get a fair amount building with some simple patches. The instructions above assume @marmarek repos rather than the qubes ones I think. I'm building from the qubes repos. Pull requests are incoming for fixes and I will list them in a comment here to track progress. |
I'm confused by |
Xen tarball is composed from multiple git repositories. Or you can simply download the tarball from xenproject.org |
Thanks. Seems its been fixed in upstream qemu here but not back-ported into qemu-xen-traditional. I'll request a back-port at some point if we aren't going to move to using upstream. |
As for qemu - we're stuck with qemu-traditional, because it is the only one supported in stubdomains. Adding support for upstream qemu in stubdomains is being postponed since AFAIR Xen 4.4, and probably will also miss Xen 4.7... So, it's probably good idea to request a backport. Let me know when you want me to merge those fixes. I'd prefer to do it in one go (or at least some bigger chunks) to save time on testing over and over. |
Offtopic: @jgriffiths take a look at https://www.qubes-os.org/doc/code-signing/. Soon we're going to introduce a policy to require contributions to be signed, to be included in https://www.qubes-os.org/team/ page. And it looks like you're going to send a lot of patches ;) |
That's a shame about qemu, the gulf between the two seems large at first blush. I'm not worried about getting the fixes merged so much as reviewed so I can make sure I'm not going off course. As long as you don't mind me submitting them and updating the list here then hold off as long as you need to. I don't want to take up too much of your time, but if you see a pull request thats dumb do please let me know if you can, thanks! edit: I'll check out the signing info. I hope to be able to contribute more in the future, for sure. |
Ok :) Best Regards, |
I'm a bit stuck now building linux-pvgrub2-dom0. The details are in this gist if you have any idea how to find the underlying cause, please let me know. I've built every other component now (skipping linux-dom0-updates), so AFAICS that's the only thing blocking "make iso" from working... |
Probably some inconsistency on Fedora update servers. You can try with Best Regards, |
Yes it looks like it. I need to check my caching setup as well, perhaps I should move to apt-cache-ng as you do. Just want to note (in case anyone else is trying to build) that the fix for libsolv under xen is in testing. I used EDIT: dnf now fixed in stable, above not needed |
FYI I've rebased your fedora22 to master here. My pull request will include a few more changes on top of that. |
Open changes/TODO:
|
Currently QubesOS/qubes-installer-qubes-os#1 can build an fc23 iso. Booting the iso fails due to missing os-release files; my latest attempt to fix that hasn't worked. TODO:
|
As much as it pains me to say it, I may have to give up on this. I am trying different approaches locally to see what works and what doesn't. Most recently I was looking at upgrading pungi to python 3 instead of downgrading everything else to python 2, since http://fedora.portingdb.xyz/pkg/pungi/ indicates many of its dependencies are ported, and the former approach is difficult and not sustainable going forward. However whenever I change the packages and get build failures I have to rebuild from scratch to be sure I am testing the right thing, or face unrelated errors. The time it takes to effectively test changes is so long that I fear I am just wasting my (already quite limited) time. My gut feeling is that it shouldn't be this painful to (essentially) download packaged sources, apply some patches and build them in chroot environments, even given the combinations of distro, dom0, vm and vm+flavours. I'll try to find another way to contribute in the meantime. |
Thanks for enormous amount of work you've done here! I'll take it up from here. |
Regarding python version for pungi/lorax, it looks like pungi in fc23 (version 4.0.7) calls lorax as a separate process, instead of importing it (as it was before). So it shouldn't be a problem - just need to update our pungi version. |
This is required for compatibility with python3-based lorax. Signature verification patches are submitted here: https://pagure.io/pungi/pull-request/63 QubesOS/qubes-issues#1807
Just pushed |
Thanks for the updates @marmarek, I will keep my branches synced in case I have another go at it :-) |
I created a number of pull requests to help with the resolution of this issue:
Other than these, a few minor additional changes are required, but I did not create pull requests for them, as @jgriffiths has already done so:
With the aforementioned changes, I am able to prepare an .iso image that boots into the installer and installs Qubes OS with legacy/BIOS boot. I have also briefly tested the installed system. Some of the remaining to-do items are the following:
|
It should take care of choosing the right one. QubesOS/qubes-issues#1807
As a status update, I started building this commit from scratch. The referenced commit pulls some of my experimental changes via a custom override.conf file. For the record, previous builds of the same commit (but incremental and local) produced good results. I was going to create pull requests for the following commits, but I am not sure if all of my changes are in a deliverable state: marmarek/qubes-installer-qubes-os@fedora-23...m-v-b:fedora-23-updates-merge |
Content of those components depends on dom0 distribution version. Switch to non-master for stable releases to allow upgrading dom0 in next Qubes release. QubesOS/qubes-issues#1807
As another status update, the previous attempt did not go well, as I encountered intermittent errors related to my Internet connection, and I could not continue due to almost filling up the quota for my Internet connection in the past month -- this will hopefully be resolved in a few days. (I have started to use apt-cacher-ng as well.) One issue I encountered with a from-scratch build yesterday is related to the Fedora 23 chroot bootstrap. Due to a bug involving the Otherwise, dnf, rpm and others start to exit with SIGABRT due to the version of the In summary, there is a need to modify the |
Ok, here is preliminary test image: This is just for test upgraded dom0 (mostly new KDE) and make it easier for anyone wanting to help. Should not be used for anything serious and probably will not be able to upgrade to later stable (or even release candidate) version.
This image is compiled with use of qubes-os-master.conf, with those exceptions:
All the packages besides installer, KDE and Xfce4 are also uploaded to current-testing repository. So it is possible to build just specific component without building all the Qubes OS, by adding those options to
|
Workaround for failed default VMs creation - in dom0 terminal, as root:
|
Sadly this image doesnt work for me, after "loading Initrd.img" the screen goes blank (with a cursor) and then goes dark and the system reboots. (thinkpad x260, skylake cpu) (Not really surprised, but tested for completeness sake.) |
UEFI or legacy mode? |
legacy |
Increase release number to 0.24, because upstream systemd package conflicts with fedora-release<23-0.12. Also cleanup transitional upgrade package. QubesOS/qubes-issues#1807
Good morning, Marek. Here is a summary of my experience with the FC23 test ISO on x Lenovo X220 notebook with BIOS 1.42 (I think BIOS version is significant) using UEFI boot. The rest of my observations are probably just gliches that will get ironed out. I also noticed that there is a package missing from the ISO and the installation complains but it continues. I think it was the chrony - I am sorry but, I didn't put it down. I have also noticed that the Plasma is not responding to my notebook display switch button. -- Regards, Matej. |
Add the same options as for yum. And do that with nice markers, instead of forcefully overriding the entries. QubesOS/qubes-issues#1807
DNF based pungi isn't deterministic and sometimes chooses fedora-logos (both provide system-logos). Make sure the right one is installed. QubesOS/qubes-issues#1807
@MMihelic take a look at #2046, and especially commit message of fix. That's about adding |
Main reason: newer X drivers.
This is currently blocked on (any of):
There is some unfinished work done on the installer: https://github.com/marmarek/qubes-installer-qubes-os/tree/fedora-22
Disclaimer: this ticket doesn't mean we've decided to stay with Fedora forever. It can be also replaced with another way of solving the main goal here: newer X drivers.
The text was updated successfully, but these errors were encountered: