Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fedora 31 in dom0 #5529

Closed
marmarek opened this issue Dec 18, 2019 · 88 comments
Closed

Fedora 31 in dom0 #5529

marmarek opened this issue Dec 18, 2019 · 88 comments
Labels
C: other P: major Priority: major. Between "default" and "critical" in severity. release notes This issue should be mentioned in the release notes. T: task Type: task. An action item that is neither a bug nor an enhancement.
Milestone

Comments

@marmarek
Copy link
Member

No description provided.

@marmarek marmarek added this to the Release 4.1 milestone Dec 18, 2019
marmarek added a commit to marmarek/qubes-anaconda-addon that referenced this issue Dec 18, 2019
Spoke classes no longer have instclass attribute.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-mgmt-salt that referenced this issue Dec 19, 2019
marmarek added a commit to marmarek/qubes-mgmt-salt that referenced this issue Dec 19, 2019
@JarrahG
Copy link

JarrahG commented Dec 19, 2019

Please let me know when this is ready for testing and what will be required for testing. More than happy to test it out on the 4.1 system I have up.

@andrewdavidwong andrewdavidwong added C: installer P: major Priority: major. Between "default" and "critical" in severity. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. labels Dec 19, 2019
@brendanhoar
Copy link

And I was just about to install 4.1 from the October iso ...

fepitre added a commit to fepitre/qubes-anaconda that referenced this issue Dec 19, 2019
@marmarek marmarek added the release notes This issue should be mentioned in the release notes. label Dec 19, 2019
@marmarek
Copy link
Member Author

marmarek commented Dec 20, 2019

Oh great, salt package in F31 is broken: https://bugzilla.redhat.com/show_bug.cgi?id=1748170
Nasty workaround: touch /usr/lib64/python3.7/site-packages/tornado/stack_context.py

@marmarek
Copy link
Member Author

marmarek commented Dec 20, 2019

Even better: F31 has pre-release of salt package (salt-2019.2.1rc0.3), which is affected by saltstack/salt#54765 (fixed in 2019.2.2)
And another: saltstack/salt#53570

@marmarek
Copy link
Member Author

Reported upstream: https://bugzilla.redhat.com/show_bug.cgi?id=1785489

@marmarek
Copy link
Member Author

Unfortunately the above makes initial setup completely broken. I guess it means no installation image before Xmas :/

marmarek added a commit to marmarek/qubes-mgmt-salt-base-topd that referenced this issue Dec 20, 2019
marmarek added a commit to marmarek/qubes-mgmt-salt-base that referenced this issue Dec 20, 2019
marmarek added a commit to marmarek/qubes-mgmt-salt that referenced this issue Dec 20, 2019
Salt in Fedora 31 is a buggy version, add a workaround until there will
be salt 2019.2.2 or newer.

QubesOS/qubes-issues#5529
@fepitre
Copy link
Member

fepitre commented Dec 20, 2019

Maybe we could do the update on upstream?

@marmarek
Copy link
Member Author

marmarek commented Dec 20, 2019 via email

marmarek added a commit to QubesOS/qubes-salt that referenced this issue Dec 20, 2019
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Dec 20, 2019
@fepitre
Copy link
Member

fepitre commented Dec 20, 2019

@marmarek: would you like me to switch all the travis dom0 to fc31?

@marmarek
Copy link
Member Author

@marmarek: would you like me to switch all the travis dom0 to fc31?

Generally, only after all the required changes are in. But you can add relevant changes to fc31 PRs. Please hold off with creating PRs for other repos until those are merged and default builder.conf is updated, to not clutter pull request list.

marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Dec 21, 2019
@osresearch
Copy link

"no-real-mode" is/was mostly relevant for people booting through kexec (linuxboot, heads,...)
if this is no longer required (because xen figures out what mode the cpu is in on its own), good.
if it is still required (but gone), bad.

no-real-mode is still there, but is in a set of parameters that are only used by the very early argument parsing code. I've submitted a patch to xen-devel to silence the warning about those parameters. https://lists.xenproject.org/archives/html/xen-devel/2020-08/msg00521.html

@marmarek
Copy link
Member Author

Superseded by #5763

marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 16, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 16, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 16, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 16, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 17, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 17, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 17, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 17, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
marmarek added a commit to marmarek/qubes-vmm-xen that referenced this issue Jan 17, 2021
Look for qubes.enable_insecure_pv_passthrough on dom0 kernel cmdline. If
it's present, allow creating PV domain with PCI devices even if IOMMU is
not present/enabled.

QubesOS/qubes-issues#5529
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: other P: major Priority: major. Between "default" and "critical" in severity. release notes This issue should be mentioned in the release notes. T: task Type: task. An action item that is neither a bug nor an enhancement.
Projects
None yet
Development

No branches or pull requests