Re: dmesg restricted to root in Rawhide

2024-03-04 Thread Chris Murphy


On Wed, Feb 28, 2024, at 6:45 AM, Peter Robinson wrote:
> On Wed, 28 Feb 2024 at 13:38, Barry Scott  wrote:
>>
>>
>>
>> On 28 Feb 2024, at 10:24, Karel Zak  wrote:
>>
>> You can restore the original behavior by using:
>>
>># sysctl kernel.dmesg_restrict=0
>>
>> However, be aware of the security consequences ;-)
>>
>>
>> Given I can get the same information from journalctl -k what is the 
>> improvement?
>
> I believe you need to be in the wheel group to get that info from 
> journalctl

I'm in the wheel group as is everyone else by default installing Fedora. A vast 
majority of Fedora users have this peculiar UX where `journalctl -k` not not 
require `sudo` but `dmesg` does require it. I think that's annoying and weird.


-- 
Chris Murphy
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: reversible dual-boot test station, updated

2024-02-22 Thread Chris Murphy
I've refreshed this write-up based on a system with Windows 10 and Fedora 39 on 
LUKS on Btrfs, "installing" Fedora 40 along side via dnf system-upgrade. 

The two installations share /boot, /boot/efi, /home, with the two root file 
systems on Btrfs in their own subvolumes.

https://fedoraproject.org/wiki/User:Chrismurphy/Draft/dualboot_teststation

Features:

* no re-partitioning;
* no resizing;
* no extra drive;
* no installation or reinstallation, system upgrade is used instead;
* reversibility, or undoability, i.e. you can delete the "test OS", or for that 
matter the older system root, with just a few steps.


-- 
Chris Murphy
--
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Donate 1 minute of your time to test upgrades from F39 to F40

2024-02-21 Thread Chris Murphy
 package "baekmuk-ttf-hline-fonts"
No match for group package "mplayer-gui"
No match for group package "nafees-pakistani-naskh-fonts"
No match for group package "nafees-riqa-fonts"
No match for group package "nafees-web-naskh-fonts"
No match for group package "baekmuk-ttf-batang-fonts"
No match for group package "samyak-tamil-fonts"
No match for group package "samyak-devanagari-fonts"
No match for group package "layla-diwani-fonts"
No match for group package "layla-arcyarc-fonts"
No match for group package "eosrei-emojione-fonts"
No match for group package "nafees-tehreer-naskh-fonts"
No match for group package "layla-basic-arabic-fonts"
No match for group package "layla-digital-fonts"
No match for group package "google-noto-looped-thai-fonts"
No match for group package "lohit-tamil-classical-fonts"
No match for group package "cdac-sakal-marathi-fonts"
No match for group package "kalapi-fonts"
No match for group package "lohit-malayalam-fonts"
No match for group package "baekmuk-ttf-gulim-fonts"
No match for group package "gstreamer1-plugins-bad-nonfree"
No match for group package "multican"
No match for group package "layla-boxer-fonts"
No match for group package "google-noto-sans-phags-pa-fonts"
No match for group package "nafees-pakistani-web-naskh-fonts"
No match for group package "layla-thuluth-fonts"
Error: 
Problem: conflicting requests
  - package libva-intel-media-driver-24.1.3-1.fc40.i686 from fedora conflicts 
with intel-media-driver provided by intel-media-driver-24.1.3-1.fc40.x86_64 
from rpmfusion-nonfree
  - package libva-intel-media-driver-24.1.3-1.fc40.x86_64 from fedora conflicts 
with intel-media-driver provided by intel-media-driver-24.1.3-1.fc40.x86_64 
from rpmfusion-nonfree
  - problem with installed package intel-media-driver-23.4.3-1.fc39.x86_64
  - intel-media-driver-23.4.3-1.fc39.x86_64 from @System  does not belong to a 
distupgrade repository
(try to add '--allowerasing' to command line to replace conflicting packages or 
'--skip-broken' to skip uninstallable packages)


--
Chris Murphy
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Donate 1 minute of your time to test upgrades from F39 to F40

2024-02-21 Thread Chris Murphy


On Wed, Feb 21, 2024, at 6:47 PM, Chris Murphy wrote:
> 
> 
> On Wed, Feb 21, 2024, at 12:11 AM, Miroslav Suchý wrote:
>> 
>> 
>> Do you want to make Fedora 40 better? Please spend 1 minute of your time and 
>> try to run:
>> 
>> # Run this only if you use default Fedora modules
>> # next time you run any DNF command default modules will be enabled again
>> # This is last time we should do that :)
>> 
>> 
>> sudo dnf module reset '*'
>> 
> 
> Uhh haha :)
> 
> $ sudo dnf module reset '*'
> Last metadata expiration check: 0:03:30 ago on Wed 21 Feb 2024 06:41:04 PM 
> MST.
> Unable to resolve argument *
> Error: Problems in request:
> missing groups or modules: *

OK I'm just going to ignore this since I'm not using any module profiles or 
streams.


--
Chris Murphy
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Donate 1 minute of your time to test upgrades from F39 to F40

2024-02-21 Thread Chris Murphy


On Wed, Feb 21, 2024, at 12:11 AM, Miroslav Suchý wrote:
> 
> Do you want to make Fedora 40 better? Please spend 1 minute of your time and 
> try to run:
> 
> # Run this only if you use default Fedora modules
> # next time you run any DNF command default modules will be enabled again
> # This is last time we should do that :)
> 
> sudo dnf module reset '*'
> 

Uhh haha :)

$ sudo dnf module reset '*'
Last metadata expiration check: 0:03:30 ago on Wed 21 Feb 2024 06:41:04 PM MST.
Unable to resolve argument *
Error: Problems in request:
missing groups or modules: *


--
Chris Murphy
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Figure out what killed an app (rhbz#2253099)

2024-01-31 Thread Chris Murphy


On Wed, Jan 31, 2024, at 11:40 AM, Paul Grosu wrote:
> 
> 
> https://github.com/facebookincubator/oomd/
> 
> 2) Or you can completely disable it:
> 
> https://www.cjjackson.dev/posts/what-is-systemd-oomd-how-to-disable-it/

We need bug reports to get it fixed rather than disabling it, if it's causing 
things to get clobbered that shouldn't be.

The kernel OOM killer is strictly concerned about kernel survival in 
dramatically low memory situations. It is unconcerned about user space making 
progress. Hence user space oom managers.

I admit this is probably suboptimal in some cases. Full resource control is a 
better way of handling the ambiguity whether a program is incorrectly hogging 
resources versus simply doing its job. Resource control may not obviate a user 
space oom killer but I think what we really care about is giving a program all 
the resources it needs, up to the point that the user wants an interactive 
desktop - and then the kernel needs to (in effect) preempt the resource hungry 
processes in favor of user-desktop interactivity. Resource control can do this 
but we don't have everything wired up yet, more work is needed.


--
Chris Murphy
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


troff noise when grepping man page?

2023-11-29 Thread Chris Murphy
$ man 5 btrfs | grep enospc
   enospc_debug, noenospc_debug
troff::870: warning: cannot select font 'C'
troff::888: warning: cannot select font 'C'
troff::905: warning: cannot select font 'C'
troff::924: warning: cannot select font 'C'
troff::962: warning: cannot select font 'C'
troff::977: warning: cannot select font 'C'
troff::999: warning: cannot select font 'C'
troff::1013: warning: cannot select font 'C'
troff::1168: warning: cannot select font 'C'
troff::1184: warning: cannot select font 'C'
troff::1259: warning: cannot select font 'C'
troff::1275: warning: cannot select font 'C'
troff::1293: warning: cannot select font 'C'
troff::1354: warning: cannot select font 'C'
...snip...

This seems new with Fedora 39. The root file system is newly installed not an 
upgrade, but the ~/ is positively ancient (possibly 5 years). Any ideas what's 
going on, how to get more information, and what component to file a bug against?


--
Chris Murphy
--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Partitioning in VirtualBox using FedoraCore 40

2023-10-11 Thread Chris Murphy


On Wed, Oct 11, 2023, at 2:21 AM, Adam Williamson wrote:

> UEFI is not the default for VirtualBox, according to its documentation

I haven't used VirtualBox in a long time, but my vague recollection is it has a 
wizard for creating VMs. And in the case you tell it the OS you're going to 
install is macOS, it will create a VM with UEFI firmware. If you repurpose such 
a VM, or clone it, it'll still have UEFI firmware.


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Partitioning in VirtualBox using FedoraCore 40

2023-10-10 Thread Chris Murphy


On Tue, Oct 10, 2023, at 11:25 PM, George R Goffe wrote:
> Chris,
>
> Thanks for responding.
>
> Here's the desired partition scheme:
>
> /boot
> /
> swap
> /var
> /opt
> /usr
> /export/home

It's missing /boot/efi which is required on systems with UEFI firmware. 




-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Partitioning in VirtualBox using FedoraCore 40

2023-10-10 Thread Chris Murphy


On Tue, Oct 10, 2023, at 9:04 PM, George R Goffe via test wrote:
> Hi,
>
> I'm having trouble creating a partition scheme that I have been using 
> it seems like forever. 

Describe the scheme.


> I keep getting this popup error message (enclosed). It looks like 
> anaconda is choosing to try partitions named by appending "/efi" to the 
> partition name.

Looks to me like the same message multiple times, itself a bug (though 
cosmetic). I've only ever seen this message when the EFI system partition, 
which is defined as a partition assigned to /boot/efi as the mount point, is 
formatted ext4 (or anything other than EFI file system, which off hand I forget 
the term anaconda uses for this format).



-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: why is my ESP filesystem getting mounted to /efi/???

2023-10-10 Thread Chris Murphy


On Wed, Oct 4, 2023, at 9:27 PM, Felix Miata wrote:
> # inxi -S
> System:
>   Host: ab560 Kernel: 6.4.16-200.fc38.x86_64 arch: x86_64 bits: 64
> Console: pty pts/1 Distro: Fedora release 39 (Thirty Nine)
> # rpm -qa | grep grub
> # grep -w /efi /proc/mounts
> systemd-1 /efi autofs 
> rw,relatime,fd=52,pgrp=1,timeout=120,minproto=5,maxproto=5,direct,pipe_ino=24799
>  
> 0 0
> /dev/nvme0n1p1 /efi vfat 

If there isn't an /etc/fstab entry for the ESP, then systemd-auto-generator 
detects it's an ESP and will mount it on either /boot or /efi on demand (and 
unmount it after the timeout). If /boot is used in fstab, then /efi is used for 
the ESP.

I'm pretty sure /efi doesn't exist unless you've (at one time or other) 
configured sd-boot instead of grub.




-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


kdump enabled in F39

2023-10-10 Thread Chris Murphy
Hi folks,

I'm having some difficulty tracking down why it's being enabled on Fedora 39 
but not on Fedora 38.

On both Fedora 38 and 39, /etc/kdump.conf contains 

auto_reset_crashkernel yes

However, I've never seen the reported behavior until Fedora 39.

While the crashkernel parameter is being set on the kernel command line,  the 
kdump.service unit is disabled. I don't know how these things interact, so I 
don't know how big a deal the issue is. Maybe it's just wasted space on the 
kernel command line?

In any case, eventually it will clutter up the command line for everyone once 
they update their kernel because this parameter will be added. And I don't know 
how we fix it with an update because it means stepping on everyone's 
/etc/kdump.conf - without a way of knowing if they want this or some other 
setting applied.

https://bugzilla.redhat.com/show_bug.cgi?id=2243068


Thanks,


--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: btrfs loses 32-bit application compatibility after a while

2023-07-20 Thread Chris Murphy


On Thu, Jul 20, 2023, at 11:55 AM, Florian Weimer wrote:
> * Demi Marie Obenour:
>
>> From this thread, it appears that non-LFS 32-bit software is fundamentally
>> unsupportable in the long run, just like software with 32-bit time_t is
>> unsupportable.  That leaves two options:
>>
>> 1. Break the ABI, preferably in such a way that causes non-LFS
>>code to fail at load time rather than crashing.
>>
>> 2. Drop 32-bit support from the distribution altogether.
>>
>> It looks like trying to keep 32-bit non-LFS software working will be an
>> endless time sink and is not sustainable in the long term.
>
> My impression is different.  It's btrfs that is a poor choice for people
> who want to run 32-bit software, have a lot of file creations/deletions,
> and do not want to reformat and reinstall periodically.  The situation
> with XFS, for example, is different because you can supply the inode32
> mount option and get 32-bit applications going again, maybe after making
> in-place copies of a few files.

It should be straightforward to have mock create a subvolume for each chroot 
instead of a directory. Subvolumes have their own inode pool. 

Mock already knows how to delete btrfs subvolumes, which is quite a lot more 
efficient than calling unlinkat() per file and directory. For the many files 
created and deleted workflow, I think it's worth taking advantage of this.

In the meantime, whatever parent directory is used for the chroots could be 
swapped out with a subvolume for a short term work around. It doesn't sound 
like the problem happens very quickly.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Should Fedora switch to full kernel preemption (CONFIG_PREEMPT=y)?

2023-07-20 Thread Chris Murphy


On Thu, Jul 20, 2023, at 9:53 AM, Daniel P. Berrangé wrote:

> What's the downside from full pre-empt that makes it inappropriate
> as the defualt for Fedora server spins too ? Is it that it is
> trading off overall peak performance in favour of reduced latency,
> and we think servers would prefer the peak performance in general ?

Maybe. But I'm not aware of any recent data one way or the other, certainly 
nothing Fedora specific.

I don't expect full preemption will impact servers in any meaningful way. I 
just can't prove that.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Should Fedora switch to full kernel preemption (CONFIG_PREEMPT=y)?

2023-07-20 Thread Chris Murphy


On Thu, Jul 20, 2023, at 9:51 AM, Michael Catanzaro wrote:
> On Wed, Jul 19 2023 at 06:50:24 PM -0400, Chris Murphy 
>  wrote:
>> If restricted to desktops, then we can only do it with kernel 
>> parameters. That probably means doing it in Anaconda kickstart, with 
>> a per edition/spin option for doing so.
>
> I'm not fond of this solution. In practice, this would likely mean the 
> new preemption mode would apply only to new installs and not also to 
> upgraded systems, right?

Probably.

A grubby command could add the proper kernel parameter to the bootloader 
configuration, but grubby isn't being used anywhere in Fedora (not anaconda for 
initial installs, not when installing kernel upgrades) so it isn't being 
exercised.

The more users customize, the less likely grubby is going to detect their use 
case and fail gracefully. grubby would need to have a strict "only add new 
parameter" option. Right now it also replaces the kernel command line with the 
contents of /etc/kernel/cmdline to all bootloader snippets in 
/boot/loader/entries - including snippets for other OS's, which would be bad.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Should Fedora switch to full kernel preemption (CONFIG_PREEMPT=y)?

2023-07-19 Thread Chris Murphy


On Wed, May 24, 2023, at 2:12 PM, Chris Murphy wrote:
> On Sat, May 20, 2023, at 4:43 PM, Demi Marie Obenour wrote:
> Therefore, I am
>> asking if Fedora should use full kernel preemption by default.
>
> https://pagure.io/fedora-workstation/issue/228
>
> The outstanding questions:
>
> a. Do we need some tests that help decide this with metrics? If so what 
> should those be?
> b. Should it be restricted to the desktop edition/spins? Or Fedora wide?
> c. How do we make the change?
>
> I have no ideas for a.) and I don't know what would be a sufficient 
> sample of workloads across all of Fedora; or whether to separately test 
> the different editions.
>
> I think if the answer to b.) is it should be Fedora-wide, means there's 
> more pressure to answer yes to a.)
> Whereas if it's focused on desktops, perhaps less testing is needed?


I lost track of this so unfortunately there's no Fedora 39 proposal. 

If the only comparison is preempt full vs voluntary, that's a simple A vs B 
test to run a pile of benchmarks against. The question then is what set of 
benchmarks do we want to use for this? We could use the Phoronix test suite. At 
least we'd get an idea if the change would result in bad press (everyone laugh 
at the silly bad joke). 

https://github.com/phoronix-test-suite/phoronix-test-suite

Otherwise I don't have any ideas what would be a suitable test suit. And also 
still unanswered is if the change should happen Fedora wide or restricted to 
desktops.

If restricted to desktops, then we can only do it with kernel parameters. That 
probably means doing it in Anaconda kickstart, with a per edition/spin option 
for doing so. 

For this issue to progress, it needs one or more co-owners to help get it 
turned into a feature for Fedora 40.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 Change Proposal: Anaconda WebUI for Fedora Workstation by default (System-Wide)

2023-06-27 Thread Chris Murphy


On Mon, Jun 26, 2023, at 7:09 PM, Jiri Konecny wrote:
> Dne 26. 06. 23 v 20:39 Hans de Goede napsal(a):

>> Says 2G is the supported minimum. It would be good to see if
>> that can actually be made to / kept working.
>>
>> Has anyone already tested the new installer on a system with its
>> RAM limited to 2G ?

> If you need low memory footprint you probably don't want to use Live 
> image for installation. It's the biggest one because it needs to have 
> whole Gnome environment in memory. For that, I would suggest you to use 
> Fedora Server network installation ISO.

I recommend Everything netinstaller for the desktop use case. It's also a 
netinstaller, but the partitioning defaults are the same as Workstation edition.

It's not that easy to find with the new web site design. It's in alternative 
downloads. I had to web search to find it. But it is the first option on that 
page.

https://alt.fedoraproject.org/


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: SecureBoot certificates

2023-06-14 Thread Chris Murphy


On Wed, Jun 14, 2023, at 7:20 PM, Kevin Kofler via devel wrote:
> Chris Murphy wrote:
>> OK I tried this again and discover shim is signed twice.
>> 
>> Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation,
>> CN=Microsoft Corporation UEFI CA 2011
>> Not Before: Sep  9 19:40:20 2021 GMT
>> Not After : Sep  1 19:40:20 2022 GMT
>> 
>> Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation,
>> CN=Microsoft Corporation Third Party Marketplace Root
>> Not Before: Jun 27 21:22:45 2011 GMT
>> Not After : Jun 27 21:32:45 2026 GMT
>
> Are you sure those are 2 independent signatures and not a signature chain?

No idea.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: SecureBoot certificates

2023-06-13 Thread Chris Murphy


On Wed, May 31, 2023, at 1:31 PM, przemek klosowski via devel wrote:
> I also have a recently updated F38 with shim-x64-15.6-2.x86_64. The 
> BOOTX64.EFI file has two certificates

Ha! Yeah so I'm just repeating what you said two weeks ago.

I don't have an explanation for the dual signatures, whether or not it's a 
problem.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: SecureBoot certificates

2023-06-13 Thread Chris Murphy
OK I tried this again and discover shim is signed twice.

Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, 
CN=Microsoft Corporation UEFI CA 2011
Not Before: Sep  9 19:40:20 2021 GMT
Not After : Sep  1 19:40:20 2022 GMT

Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, 
CN=Microsoft Corporation Third Party Marketplace Root
Not Before: Jun 27 21:22:45 2011 GMT
Not After : Jun 27 21:32:45 2026 GMT

This is the same for EFI/fedora/shimx64.efi and EFI/BOOT/BOOTX64.EFI which also 
have the same sha256sum hashes.

So maybe there isn't actually a problem other than it's confusing that there 
are two signatures that also have different validity periods? I'm not sure what 
it means.

--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: SecureBoot certificates

2023-05-30 Thread Chris Murphy


On Fri, May 26, 2023, at 10:20 AM, Steve Grubb wrote:

> sbattach --detach signature  /boot/efi/EFI/BOOT/BOOTX64.EFI
> openssl pkcs7 -inform DER -in signature -text -print_certs > shim-certs.txt
>
> Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, 
> CN=Microsoft Corporation UEFI CA 2011
> Validity
> Not Before: Sep  9 19:40:20 2021 GMT
> Not After : Sep  1 19:40:20 2022 GMT


What version of shim do you have installed? What edition/spin are you using? 

I have shim-x64-15.6-2.x86_64 and it's reporting

Not Before: Jun 27 21:22:45 2011 GMT
Not After : Jun 27 21:32:45 2026 GMT

A possible explanation is rpm-ostree derivatives may show a current version 
grub and shim, but those are not copied to the EFI System partition. That's the 
job of bootupd but I'm not sure if that's fully implemented yet in Fedora.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Election Status?

2023-05-24 Thread Chris Murphy


On Wed, May 24, 2023, at 2:55 PM, Peter Boy wrote:
>> Am 24.05.2023 um 20:30 schrieb Chris Murphy :
>> 
>> I'm pretty sure we no longer have a program manager?
>
> What’s that about? 

As I understand it, part of recent Red Hat layoffs. Red Hat and Fedora 
program/project managers were impacted.

And also no emails or matrix messages from Ben Cotton in two weeks. He is the 
one who announces elections and sets  up that whole system, reports the 
results, updates everything related to the subsequent changes, etc.

That's all I know.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: more distinct default bash prompt?

2023-05-24 Thread Chris Murphy


On Tue, May 23, 2023, at 1:08 AM, Jens-Ulrik Petersen wrote:
> On Tue, May 23, 2023 at 12:47 PM Neal Gompa  wrote:
>> I actually would prefer that we color both, and make it obvious that
>> "root" is special. We should account for common color-blindness
>> issues, though.
> 
> Sure, I think I agree: perhaps purple for root?

I think if we avoid the need to distinguish between redish and greenish, it's 
OK. Redish includes red, pink, magenta. Greenish includes green, cyan, sky blue.

Ergo, you can use green or red, you just don't want to make the A vs B red and 
green because they will look the same to anyone with a red/green color 
discrimination limitation.

Much less common is blue/yellow. I don't have data handy but off the top of my 
head, tritonopia and tritonomaly cases will notice the difference between 
purple vs orange OK. We do have publicly available math to predict the 
discrimination of various nopias and nomalies; I'm not sure exactly how it's 
implemented in GIMP but there is a "color deficient vision" filter should give 
an adequate idea whether or not a design has expected/sufficient/desired 
differentiation of elements based on color. (We don't actually know what 
anyone's color experience is, as it turns out. That's what I mean by this.)

https://docs.gimp.org/2.10/en/gimp-display-filter-dialog.html


> 
> I am all for "color blind testing" (though I am not completely sure that 
> "color-blind" is the right term here
> though I am not an a11y expert - I thought color blind is more about 
> differentiating different colors like green and red,
> but if you mean visual impairment/contrast/readability then I completely 
> agree).

It's common vernacular. But it's more interesting than this term because it 
suggests one variety or effect. There are more than several. If we consider 
"color blind" means total lack of color discrimination, or monochromat - they 
are rare. I don't even know the number. Dichromats are much more common, where 
these are broken down into whether it's the long, medium, or short wavelngth 
cone is missing (entirely). The world does have some color, we think, at least 
there's discrimination possible. But it's of course limited without a third 
color receptor. Quite a lot more common are tricromats with anomalous spectral 
sensitivity of one of the receptors, i.e. the long wavelength cone might be 
green shifted, so it's more sensitive to yellows than the "standard observer". 
This then questions the whole age old concept of the standard observer, and for 
a while now it's been suspected we need more than one standard observer - 
because, well, they did all these tests in the early 1900's with something like 
50 people. Seriously. And that's the data still largely used today. Anyway...

I tend to call it a color discrimination variance. Or limitation.

Oh and there are such folks as quadchromats. They have four color receptors. 
And then still there's the entire non-human animal kingdom full of completely 
different receptor peak wavelenth sensitivities, including tetrachromats and 
pentachromats. 


> I think in the end it will come down also to wider user testing since there 
> are so many different terminals
> and color palettes around.
> 
> Anyway that's why I proposed green since it seems to have reasonable contrast 
> for both light and dark terminals (unlike blue/cyan/yellow often).
> I assume that may also be why Ubuntu and Nixos went with green.

Green is an efficient color choice. It tends to appear to the brightest. Part 
of this relates to the luminosity function of human vision which has a peak 
wavelength that happens to be the same as the medium wavelength photo receptor 
(i.e. green). So given the same amount of  radiant energy emitted across the 
visible spectrum, green will appear to be the brightest.

Light purple is OK, Blue, indigo, or yellow tends to be harder to to detect 
complex shapes (like letters and numbers) but I'm not sure of the reason(s).

--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Election Status?

2023-05-24 Thread Chris Murphy


On Wed, May 24, 2023, at 12:03 PM, Tom Stellard wrote:
> Hi,
>
> According to the schedule[1], the voting period was supposed to begin
> on Friday, but elections.fedoraproject.org does not list any open elections
> yet.  Does anyone have an ETA for when voting will start?

I'm pretty sure we no longer have a program manager? So I'm kinda expecting a 
lot of things to just silently break. I don't know what the fallback plan is.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Should Fedora switch to full kernel preemption (CONFIG_PREEMPT=y)?

2023-05-24 Thread Chris Murphy


On Sat, May 20, 2023, at 4:43 PM, Demi Marie Obenour wrote:
Therefore, I am
> asking if Fedora should use full kernel preemption by default.

https://pagure.io/fedora-workstation/issue/228

The outstanding questions:

a. Do we need some tests that help decide this with metrics? If so what should 
those be?
b. Should it be restricted to the desktop edition/spins? Or Fedora wide?
c. How do we make the change?

I have no ideas for a.) and I don't know what would be a sufficient sample of 
workloads across all of Fedora; or whether to separately test the different 
editions.

I think if the answer to b.) is it should be Fedora-wide, means there's more 
pressure to answer yes to a.)
Whereas if it's focused on desktops, perhaps less testing is needed?

Still another strategy might be to just make preempt full the default Fedora 
wide in Rawhide with enough advance notice (like, nowish or soon after Fedora 
39 branches). And once it starts causing issues, revert. That's a bit spaghetti 
on the wall test strategy but it's also cheap. (I am aware this is not a good 
strategy for testing doneness of spaghetti.)

Regarding c.) gets tricky if it's not Fedora wide. The simplest case is, the 
change applies only to desktops, everything else remains on voluntary. The only 
way I'm aware of we can change it on the desktops is to set a kernel parameter. 
This means we need to have Anaconda set it as a boot parameter, but only for 
desktops. There is a debugfs facility for changing it during runtime, but this 
is not reliable due to debugfs being disabled when kernel lockdown is in place, 
which is tied to Secure Boot being enabled.

Hence, the lkml thread referenced in the issue. But the lkml thread went no 
where (no responses). Possibly it wasn't provocative enough. Or simply there 
are no plans to expose this switch anywhere else.  
https://lkml.org/lkml/2023/4/11/1291

Conversely if even two other Fedora editions/spins/variants want some kind of 
opt out or opt in, it quickly gets tricky to do all that unique work setting a 
boot parameter, rather than just flipping the default across the board and not 
having a boot parameter.

Anyway, it seems like it would be semi-straightforward to do it in Anaconda 
just for desktops using kickstart `bootloader --append=` command.

https://pykickstart.readthedocs.io/en/latest/kickstart-docs.html#bootloader




-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Chris Murphy


On Wed, May 10, 2023, at 7:36 PM, Owen Taylor wrote:
> 
> 
> On Wed, May 10, 2023 at 5:34 PM Chris Murphy  wrote:
>> __
>> 
>> 
>> On Wed, May 10, 2023, at 2:24 PM, Owen Taylor wrote:
>>> 
>>> 
>>> On Wed, May 10, 2023 at 12:02 PM Neal Gompa  wrote:
>>>> 
>>> Now, there's a second problem with reading everything from the ESP - it's 
>>> slow for two reasons. First, because read speeds when going through the 
>>> firmware are much slower than the Linux NVMe stack. And second, because we 
>>> have to read everything in order to checksum and verify it.
>>> 
>>> For that reason, Demi's suggestion of moving things onto a dm-verity 
>>> protected partition is intriguing. Could that even be a loopback file on 
>>> the ESP? It would be like a lazy-read system extension.
>>> 
>>> The performance geek in me thinks "we could see exciting speedups from 
>>> that!" - the practical side of me thinks "it might be a few second faster. 
>>> And much more complex! Let's just go with efifb, keep the initramfs small, 
>>> and accept any minor regressions".
>> 
>> GRUB doesn't support dm-verity, but I don't know if it would make a 
>> difference if it did. Once the kernel has the ability to interact with 
>> physical storage, understand partitions, initialize dm-verity, and read a 
>> file systemt... it could just mount `/` . I think the only way the current 
>> initial root file system works with the kernel is for the bootloader to read 
>> an entire initrd file into RAM, and then the kernel can randomly access 
>> things in that RAM disk.
> 
> In this idea, the dm-verity parition/file would only be accessed from the 
> initrd, once we have enough kernel to ability to interact with physical 
> storage, understand partitions, initialize dm-verity, and read *a* partition, 
> but potentially not enough to read from a bluetooth keyboard, show a 
> graphical prompt, mount / from the network, etc.
> 
> What dm-verity provides here is a way to trust content without requiring it 
> to be read ahead of time, checksumed, signature checked and put into ram.
> 
> To be clear, I don't think this is necessarily the right way to go - I think 
> using efifb, not prompting for a passphrase when possible, etc, are simpler 
> approaches.

OK got it. So it would be some kind of intermediate /usr that bridges between 
initramfs and /sysroot mounting? I'm not sure the added complexity helps 
significantly with authenticity over either LUKS or fscrypt.


>  
>> 
>> It's early still for UKI details but I assume we will need both a universal 
>> UKI (all use cases), and much smaller use case focused UKIs. I say that 
>> because the desktops in the default installation configuration are the 
>> largest single use case. With Btrfs built-into the kernel, we don't need 
>> that much in the initrd to setup block devices, discover their contents, and 
>> perform switch root.
>> 
>> The next most common use case(s), device-mapper and md based, require a pile 
>> of user space programs running to do all the work setting things up. Maybe 
>> we can just get away with two images, a simple fast one and the universal.
> 
> The elephant in the room is whether the "desktops in the default 
> installation" UKI requires piles of graphics firmware. It might not be at all 
> small in that case.

True. I don't know what the limitations/reasons are for firmware blobs needing 
to be available so early during boot.

But (a) we have chosen a file system by default that we can shrink online (b) 
have at least 128 partitions possible (c) we can extent Boot Loader Spec to 
permit multiple XBOOTLDR. So we can make room for these firmware blobs. It's 
just fricking ugly. And I'm not sure it'll be RPM's domain if these things 
really need to exist on /boot. Something will have to put them there, as needed.



--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Chris Murphy


On Wed, May 10, 2023, at 7:11 PM, Chris Adams wrote:
> Once upon a time, Chris Murphy  said:
>> Read-only drivers, which are the only drivers under discussion here, aren't 
>> a per se problem because they can't modify the file system. So they have no 
>> complaints about that.
>
> But those read-only drivers are incomplete and problematic, especially
> as filesystems get more complex.  I've been bitten before by an
> ill-timed unclean shutdown, where an update was still in the /boot ext4
> journal but not comitted, so the system would not boot, because the
> GRUB2 ext4 driver doesn't read the journal.

Right.

But is the program updating /boot doing it correctly? Given the decision to use 
a journaled file system but a bootloader that doesn't do journal replay, it 
means the program needs to use a write order and sync policy to ensure there's 
no expectation of journal replay. Otherwise inevitably it's going to break. So 
it's a series of mistakes.


> There should be _less_ put into GRUB2 filesystem support IMHO, not more.
> No more complex filesystems; keep /boot something simple like ext2 that
> GRUB2 can reasonably be expected to handle basically 100%, possibly
> mounted read-only during normal operation, mount with "sync", and with
> all updates as atomic as practical.

It still needs the program that modifies /boot to do the updates in the proper 
sequence. That's not happening right now so it's a risk no matter the file 
system. But if simpler is better, and ext2 is acceptable, then FAT should also 
be acceptable. It has the added benefit of all firmware supporting it. 


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Chris Murphy


On Wed, May 10, 2023, at 5:21 PM, Lennart Poettering wrote:
> So to add to this. I happen to be at LFSMMBPF at the moment, the Linux
> File System summit (among other things) where all the Linux FS people
> meet. I spoke to a couple of FS maintainers here, and well, let me
> make this very clear: using any of the major Linux file systems with
> drivers that are not the ones in the Linux kernel is a very bad idea,
> and expressly not supported by them. [They actually used much harsher
> words, that I'll not repeat here – this is the "friendly" version of
> their take on your idea.]
>
> So, unless you want to go against what the people who actually
> maintain the file systems expressly say please just get this idea out
> of your head that porting Linux file systems into EFI fs drivers was a
> good, supportable idea.
>
> And Neal, Chris, if you don't believe the above, then hey, I am happy
> to open a thread with them in CC where they can tell you in person how
> bad an idea that is.

I don't know what question you asked them. Any modifications (writes) performed 
outside kernel code is not supported, since forever.

Read-only drivers, which are the only drivers under discussion here, aren't a 
per se problem because they can't modify the file system. So they have no 
complaints about that.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Chris Murphy


On Wed, May 10, 2023, at 2:24 PM, Owen Taylor wrote:
> 
> 
> On Wed, May 10, 2023 at 12:02 PM Neal Gompa  wrote:
>> 
> Now, there's a second problem with reading everything from the ESP - it's 
> slow for two reasons. First, because read speeds when going through the 
> firmware are much slower than the Linux NVMe stack. And second, because we 
> have to read everything in order to checksum and verify it.
> 
> For that reason, Demi's suggestion of moving things onto a dm-verity 
> protected partition is intriguing. Could that even be a loopback file on the 
> ESP? It would be like a lazy-read system extension.
> 
> The performance geek in me thinks "we could see exciting speedups from that!" 
> - the practical side of me thinks "it might be a few second faster. And much 
> more complex! Let's just go with efifb, keep the initramfs small, and accept 
> any minor regressions".

GRUB doesn't support dm-verity, but I don't know if it would make a difference 
if it did. Once the kernel has the ability to interact with physical storage, 
understand partitions, initialize dm-verity, and read a file systemt... it 
could just mount `/` . I think the only way the current initial root file 
system works with the kernel is for the bootloader to read an entire initrd 
file into RAM, and then the kernel can randomly access things in that RAM disk.

It's early still for UKI details but I assume we will need both a universal UKI 
(all use cases), and much smaller use case focused UKIs. I say that because the 
desktops in the default installation configuration are the largest single use 
case. With Btrfs built-into the kernel, we don't need that much in the initrd 
to setup block devices, discover their contents, and perform switch root.

The next most common use case(s), device-mapper and md based, require a pile of 
user space programs running to do all the work setting things up. Maybe we can 
just get away with two images, a simple fast one and the universal.


--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Chris Murphy


On Wed, May 10, 2023, at 9:42 AM, Lennart Poettering wrote:

> You are arguing here into two opposing directions. One one hand you
> want to chainload multiple kernels+initrd (claiming this was a good idea out
> of the problem of sizing ESP/XBOOTLDR sufficientlly), and then on the
> other hand you claim there's too much kernel+initrd in the boot
> process?
>
> What is it now? Pick one: more initrd or less initrd?

I've only ever said I want faster boot and smaller initrd. Everything else is 
pointing out the consequences of alternatives, not advocacy of them.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-10 Thread Chris Murphy


On Mon, Apr 24, 2023, at 12:15 PM, Ben Cotton wrote:
> https://fedoraproject.org/wiki/Changes/BiggerESP

> This change will increase the minimum size of the ESP to be 500MB,
> which is also the same value used by Microsoft for Windows 10 and
> newer.

Issue 1:  Currently anaconda calls mkdosfs on the ESP without any options and 
historically are reluctant to add non-default mkfs options. By default, mkdosfs 
will create a FAT 16 file system on a 500M (either SI or IEC units). The UEFI 
spec clearly prefers FAT 32 for the ESP on built-in drives. To my knowledge 
there haven't been any FAT 16 related bugs reported during the many years 
Fedora created FAT 16 ESPs. But it's probably better to create it as FAT 32.

I don't know where the cutoff is in the mkdosfs code, but a 512MiB (IEC units) 
does result in a FAT 32 file system. So you might make it 512MiB.

Issue 2: Last I checked (about 12 months ago), Windows 10 and 11 images from 
microsoft.com were still creating ~99M (I forget which units, and it may have 
been 100). That's consistent with:

https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/configure-uefigpt-based-hard-drive-partitions?view=windows-11

"The minimum size of this partition is 100 MB, and must be formatted using the 
FAT32 file format."

So I'm not sure if Microsoft got the memo, and it's actually vendors' OEM 
images that are using large ESP size?



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Fun with GRUB2, BLS and Multiboot USB

2023-05-09 Thread Chris Murphy


On Wed, Apr 26, 2023, at 12:26 AM, Philip Rhoades via devel wrote:
> People,
>
> LILO and SysLinux were simple and GRUB1 was straightforward - but by the 
> time GRUB2 came around I was long past configuring my own kernels and 
> hacking around at a lower level . . now I think, finally, I need to know 
> more about how GRUB2 - works specifically with Fedoras 38+.
>
> This current interest was prompted when I upgraded my WS from F37 
> KDE(->Sway) via a beta F38 LiveSway and found that /boot/grub2/grub.cfg 
> did not contain a menuentry for the latest F38!? - much hacking and 
> experimenting followed . .

There are no GRUB native menu entries anymore since Fedora 30. There are Boot 
Loader Spec formatted "snippets" in /boot/loader/entries and Fedora's GRUB 
contains blscfg.mod which is a GRUB module that provides GRUB with the ability 
to read BLS snippets and create menu entries from them.
https://fedoraproject.org/wiki/Releases/30/ChangeSet#Make_BootLoaderSpec-style_configuration_files_the_default


> So, I have git cloned the grub2 stuff and had a look at it but I am too 
> old now to be digging around in that stuff just at the moment - so, has 
> any Fedora Guru produced a diagram or at least a point list, of what 
> Grub does from turning on the power to the display of the Grub menu on a 
> Fedora machine? - that would be nice as a more-detailed overview than I 
> have been able to find so far - but not so low-down I am amongst the 
> weeds . . that might come later . .

It's one of those cases of "no not that specification the other specification". 
There's no way you'd know this is the case without some digging.

Also since 
https://fedoraproject.org/wiki/Releases/34/ChangeSet#Unify_the_GRUB_configuration_files_location_across_all_supported_architectures
 there are two grub.cfg files. One is on the EFI System partition and merely 
points to (forwards) to the real one in /boot/grub2. This is consistent with 
BIOS and upstream GRUB's location for the grub.cfg. 

I guess hindsight being 20/20 we could have changed grubx64.efi to look for 
"grub.static" in the same directory as the EFI program instead of "grub.cfg" 
and then there'd only be one grub.cfg and it'd be the real one rather than the 
forwarding one.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-09 Thread Chris Murphy


On Tue, May 9, 2023, at 2:47 PM, Zbigniew Jędrzejewski-Szmek wrote:
> On Tue, May 09, 2023 at 01:31:01PM -0500, Chris Adams wrote:
>> Once upon a time, Chris Murphy  said:
>> > What about the increasing growth in linux-firmware and in particular the 
>> > NVIDIA firmware requirements? My reading suggests it's significant and the 
>> > future growth also significant.
>> 
>> Could we use a dumb framebuffer in initrd and get rid of all the GPU
>> firmware from the image?
>
> Maybe, probably, who knows… But it's not just the video. The pressure
> to add more stuff and more drivers will only grow: bluetooth for keyboards
> and FIDO2, sound support for voice assistance, network for remote attestation
> or clevis, etc. We can push this can down the road, but it seems we need
> to be ready to add move stuff before root is available anyway.

I still think we need less kernel and initramfs in order to get more by having 
`/` available faster. Fast enough that the user isn't looking for or expecting 
interactivity in the few seconds it should take to get to `/` being mounted.

Otherwise, next up will be embeding GNOME Shell into the initramfs because 
we're tired of waiting for a real a11y and i18n environment to be available so 
we can prompt the user for an encryption passphrase with appropriate rules, 
fonts, locale support, etc.

I can conjure up some use cases for stuffing Firefox in the initramfs. Maybe we 
should just put /usr into the initramfs.

We'll just all accept 20+ second linux+initrd times to accommodate everyone 
getting through the elevator door simultaneously. No problem.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-09 Thread Chris Murphy


On Tue, May 9, 2023, at 12:31 PM, Lennart Poettering wrote:
> On Di, 09.05.23 08:22, Neal Gompa (ngomp...@gmail.com) wrote:
>
>> I've been asked to consider converting /boot to a Btrfs subvolume so
>> that it no longer has a fixed space allocation to deal with the ever
>> increasing amount of firmware required for NVIDIA GPUs[1]. This is
>> currently incompatible with how systemd views the world, because the
>> "discoverable partition spec" is wired to partitions, and there is no
>> equivalent spec for subvolumes of a volume. And I imagine that
>> XBOOTLDR (whatever that is) also would have a problem with this.
>
> This makese no sense. If you want /boot to just be a subvolume of the
> rootfs btrfs, then this would imply it's also covered by the same
> security choices, i.e. encryption. We want to bind that sooner or
> later to things like TPM2, FIDO2, PKCS11. And that's simply not
> feasible from a boot loader environment.

Windows and macOS do this, so it is feasible, the question is what are the 
consequences of this and are we willing to live with them? One obvious 
consequence, it further creates dependency on a single bootloader, GRUB. Or we 
need an independent project that provides an EFI program for unlocking LUKS 
volumes within the pre-boot environment, thus making plaintext view available 
to any bootloader.


> Hence, the place the kernel is loaded from (regardless if you call it
> /efi or /boot or /boot/efi, and regardless what fs it is) must be
> accessible from the boot loader easily, without requiring
> implementation of TPM2/FIDO2/PKCS11 hookup in the boot loader.

I understand that might be difficult and something we don't want to do for 
resource reasons, but there isn't a technical impediment for it.



>
> Hence: btrfs subvols won't work for this
>
> A simple vfat partition however will.

FAT isn't resizable. The growth requirement for /boot is greater for some use 
cases more than others, so there is pressure building because it will create 
waste for some use cases and underprovisioning in other use cases. Those 
unverprovisioned being told they can't upgrade but need to reprovision to solve 
this is kindof annoying.


>
>> Also, as an aside, there is now a "from-scratch" Btrfs EFI driver in
>> development[2] (and for your personal horror, an NTFS one too[3]).
>
> Not sufficient. You'd also have to implement a LUKS EFI driver, and a
> TPM2 EFI driver, and a FIDO2 EFI driver, and so on and so
> on. Basically, you have to reimplement a good chunk of the Linux
> kernel, of Linux userspace, systemd and so on in EFI mode.
>
> Good luck with that.

Right. Hence Linux Boot. Dump all the toy drivers in favor of real ones. And a 
real user space.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F39 proposal: BiggerESP (Self-Contained Change proposal)

2023-05-09 Thread Chris Murphy


On Tue, May 9, 2023, at 8:08 AM, Zbigniew Jędrzejewski-Szmek wrote:
> On Tue, May 09, 2023 at 12:02:26PM +0200, Gerd Hoffmann wrote:
>>   Hi,
>> 
>> > If we want to change the default here, let's do some proper cleanup:
>> > 1. the split between ESP and XBOOTLDR is only useful in the case where
>> >ESP already existed and was small. If the installer is *creating*
>> >an ESP, it should just make it large enough.
>> 
>> And install kernels to /boot/efi in case /boot is not a XBOOTLDR
>> filesystem?
>
> If /boot is not a XBOOTLDR, then we only have one file system which is
> the ESP. It could be mounted on /boot or on /efi or maybe even 
> /boot/efi (*).
> The kernels would then go to /boot/EFI/Linux, /efi/EFI/Linux, or 
> /boot/efi/EFI/Linux,
> respectively. (When you write /boot/efi, it's not clear what exactly you
> mean. The duplication of "efi" and "EFI" on on case-insensitive system
> is confusing.)
>
> (*) This is actually something that'd need to be figure out.
> /boot/efi is the worst choice; either /boot or /efi would be OK,
> but something needs to be chosen.

Related but slightly off topic...

What about the increasing growth in linux-firmware and in particular the NVIDIA 
firmware requirements? My reading suggests it's significant and the future 
growth also significant. There's some preference to put /boot on Btrfs to take 
advantage of storage pooling so that we're neither over nor under provisioning 
the size of /boot. The problem I have with this is two fold: what about our 
non-btrfs use cases? Surely those use cases are equally concerned about this 
problem? And then what are the impediments to booting the kernel faster and 
more quickly getting `/` mounted? Why is there so much pressure to stuff the 
firmware blobs into the initramfs or onto /boot in general? Why does firmware 
availability need to happen so early during boot, and is it really not possible 
to somehow make mounting `/` a higher priority than it has been up until now?

Huge universal initramfs will slow down boot. And it delays mounting `/`. So if 
there is some good reason why firmware blobs need to be available soon, it's in 
direct opposition to booting fast and that strikes me as a design flaw or need 
for a feature request. I just don't know what that could be. But to just keep 
stuffing more things into the initramfs doesn't scale either.


Back to the original topic:

ESP and XBOOTLDR are not user domain, should have no user facing configuration 
in a GUI at all. It's irrelevant esoteric knowledge that 99% of our users do 
not need to worry about. By extension, they don't belong in /etc/fstab nor 
should they be persistently mounted. Whether one or the other are temporarily 
mounted to /boot, /efi, /boot/efi, is up to the developers creating tools that 
modify these volumes. I prefer that they are mounted to a pseudo-random 
location in /run but I don't really care.

NOTE: We can apply SELinux labels to FAT file systems by using 'mount -o 
context=' mount option. The limitation is the label applies to that entire 
mount point, you don't get per directory labels, it's a one size fits all.

Recent Windows 10/11 images on microsoft.com within the last year produce a 
100M EFI System partition per:
https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/configure-uefigpt-based-hard-drive-partitions?view=windows-11

I have reinstalled Windows 10 and 11 using the microsoft.com procured installer 
as of a year ago and it likewise creates a 100M ESP. Maybe Microsoft didn't get 
the memo and the space requirement is really something the OEM's are concerned 
about? So I expect this problem is not only our problem to solve.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: default bash history (non)preservation

2023-04-11 Thread Chris Murphy


On Tue, Apr 11, 2023, at 12:02 PM, stan via devel wrote:
> On Tue, 11 Apr 2023 10:48:11 -0400
> "Chris Murphy"  wrote:
>
>> Hi,
>> 
>> For a long time I've noticed lost history from multiple Terminal
>> tab/windows. It seems like the last tab or window to close is the
>> history that gets written to .bash_history, and everything else is
>> just lost.
>> 
>> Somehow I found this:
>> https://web.archive.org/web/20090815205011/http://www.cuberick.com/2008/11/update-bash-history-in-realtime.html
>> 
>> I've implemented the suggested two line change to .bash_profile:
>> 
>> # User specific environment and startup programs
>> shopt -s histappend
>> PROMPT_COMMAND="history -a;$PROMPT_COMMAND"
>> 
>> The resulting behavior appears to be shells still have their own
>> unique histories while active. But once closed, their histories
>> become merged (interlaced based on the time they were issued?) and
>> available when a new shell is created.
>> 
>> I think this would be a pretty cool yet subtle Fedora 39 feature.
>> However, 
>> 
>> a) I'm uncertain exactly where this belongs as a default, .bashrc or
>> .bash_profile or some parent file that's copied to create these files
>> (for new users); 
>
> I like option 3 if it is going to be automatic.

Right.

Which raises the question whether existing user profiles should be modified. 
There's pros and cons either way.

And whether that more strongly favors adding this to .bashrc or .bash_profile, 
and whether there are subtleties in the resulting behavior depending on which 
file is used; or if they're equivalent.

Normally I'd said don't apply a change to existing users. But in this case, I 
think the risk of modifying existing user behavior is low,  meanwhile the 
potential for even more confusion is high if we don't change it.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: default bash history (non)preservation

2023-04-11 Thread Chris Murphy


On Tue, Apr 11, 2023, at 12:07 PM, Adam Williamson wrote:

> I've been doing something like this for years, but I wouldn't
> necessarily recommend it as an OOTB default. It has some interesting
> subtleties, like the order of the command history you get when you hit
> 'up' changes depending on when the history is updated by other
> terminals and when the terminal you're in reloads it.

I'm not seeing this effect. While active, the shells apparently have completely 
unique histories, and don't interact with each other (until they're closed). 
From time to time I see zero length files, e.g.  .bash_history-04863.tmp appear 
but I don't know what they do, there's nothing in them.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


default bash history (non)preservation

2023-04-11 Thread Chris Murphy
Hi,

For a long time I've noticed lost history from multiple Terminal tab/windows. 
It seems like the last tab or window to close is the history that gets written 
to .bash_history, and everything else is just lost.

Somehow I found this:
https://web.archive.org/web/20090815205011/http://www.cuberick.com/2008/11/update-bash-history-in-realtime.html

I've implemented the suggested two line change to .bash_profile:

# User specific environment and startup programs
shopt -s histappend
PROMPT_COMMAND="history -a;$PROMPT_COMMAND"

The resulting behavior appears to be shells still have their own unique 
histories while active. But once closed, their histories become merged 
(interlaced based on the time they were issued?) and available when a new shell 
is created.

I think this would be a pretty cool yet subtle Fedora 39 feature. However, 

a) I'm uncertain exactly where this belongs as a default, .bashrc or 
.bash_profile or some parent file that's copied to create these files (for new 
users); 

b) if this is (still) an optimal way to go about it;

c) what are the possible negative side effects?

Any thoughts?


--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: is cockpit able to handle btrfs mirror's ?

2023-03-14 Thread Chris Murphy


On Fri, Mar 10, 2023, at 1:57 PM, old sixpack13 wrote:
> more to read:
> https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org/thread/MNAGV2XFQOLXQAXGP2CBHOQRGVYDXD2O/

This is expected behavior right now (certainly not expected by a reasonable 
user) from a development perspective. There's a similar effect with multiple 
device Btrfs in KDE and GNOME, so it's not a Cockpit issue.

https://github.com/storaged-project/udisks/issues/802


-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Boot issue, probably with grub and maybe mdraid

2023-01-31 Thread Chris Murphy


On Wed, Jan 18, 2023, at 1:18 PM, Bruno Wolff III wrote:
> On Tue, Jan 17, 2023 at 18:37:20 -0600,
>   Bruno Wolff III  wrote:
>>Today one of three machines failed to boot 6.2.0-0.rc4. The machine 
>>that failed had not been rebooted in a week and now won't boot any 
>>kernel and it appears grub is aborting with a pointer out of range 
>>error. All three machines use ext4 and luks, but only the failing 
>>machine uses mdraid. I haven't recovered the failing machine yet, but 
>>plan to downgrade grub tomorrow and hope that confirms a grub bug by 
>>allowing it to boot. If so, I'll file a bug report.
>
> Running grub2-install in a live image fixed this. 

Is the system firmware BIOS or UEFI? Either way it's kinda confusing...

BIOS GRUB does not update the embedded core.img (in the MBR gap or GPT BIOS 
BOOT partition), so when the RPM version changes, the embedded GRUB doesn't 
change, nor do any of the modules in /boot/grub2. So a grub bug trigging boot 
failure on BIOS is ... not expected.

UEFI GRUB does update the grubx64.efi OSLoader found on the EFI System 
partition. So a grub bug could trigger boot failure here. But I'm surprised 
grub2-install even executes, due to well known issues making it not recommended 
as the resulting EFI file ends up having rather different behaviors than the 
EFI file produced in Fedora infra and included in the GRUB RPM. 

So either way it's kind of a weird result... I will speculate -> if UEFI,  
problem could be /boot/grub2 contained some older version of modules that your 
specific use case requires (the typical case in Fedora, modules aren't 
installed in either /usr or the EFI system partition on UEFI systems - 
everything needed is baked into the pre-built grubx64.efi OSLoader). Upon 
updating GRUB RPM, a new grubx64.efi was installed, but did not update the 
modules in /boot/grub2, this could cause a problem that would be resolved by 
grub2-install because if that command does execute, it results in version 
parity for grubx64.efi and the modules in /boot/grub2. But again, on UEFI 
grub2-install really should not be used. It's not a great situation but there 
is no agreement right now between distros using Secure Boot and upstream GRUB 
exactly how to handle grub-install any differently than it is right now.

I pretty much see two options. If you want to use Fedora's grub package, you 
should "reset" it by following these instructions:
https://fedoraproject.org/wiki/GRUB_2#Instructions_for_UEFI-based_systems

If you have a special use case for GRUB that Fedora's doesn't meet: (a) I'd 
file a RFE bug in RHBZ and explain that use case, so the bootloader team is at 
least aware of it. And (b) I'd build GRUB from upstream source, and then you 
can use grub-install as expected. (It won't work out of the box with Secure 
Boot enabled and Fedora's shim, but I assume you're not using Secure Boot or 
else grub2-install wouldn't have fixed the problem.)

But after writing all that, maybe UEFI doesn't apply to your use case :D


>I'm not sure if this 
> is 
> a bug or if people are expected to do this themselves (before 
> rebooting) 

On BIOS, yes, it's expected to require manual user intervention to update the 
embedded GRUB binary and its modules found on the /boot volume. 


> because there are issues trying to automate this for legacy systems. It 
> might be that the scripts to do updates don't pull the correct devices 
> when /boot is on raid. It is very annoying though when this happens.

I don't know if https://github.com/coreos/bootupd is doing this automatically 
on BIOS firmware systems now or is planning on doing it? At one time they were. 
I think the thought process from this point forward is focusing on UEFI Secure 
Boot workflows rather than inherently insecurable BIOS scenarios, and that the 
ship has just sailed.



-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Shorter Shutdown Timer (System-Wide Change proposal)

2023-01-17 Thread Chris Murphy


On Tue, Jan 17, 2023, at 11:51 AM, Peter Boy wrote:
>> Am 16.01.2023 um 13:23 schrieb Lennart Poettering :
>> 
>> Just to say this cleary btw: when we introduced the time-out initially
>> we were coming from sysvinit where no such time-out existed at
>> all. Hence we picked a conservative (i.e. overly long) value to not
>> upset things too badly. And yes, some people were very much upset we
>> now defaulted to a time-out.
>> 
>> If we'd start from scratch without sysvinit heritage, I think we
>> would have started with something much much lower right-away.
>
> When introducing a timeout, you obviously had the grace to choose a 
> fairly conservative  (i.e. cautious) default value that did not lead to 
> major problems. Would be interesting what would have been if you had 
> started with 15 sec.

Why? it was 0 sec before systemd. If anything, the time out behavior is masking 
problems with services not shutting down in a timely manner.


>> It
>> appears to me fedora is considering switch to that now, and I
>> certainly think that would make a lot of sense.
>
> The way it is proposed it doesn’t make a lot of sense. Desktops and 
> servers work very differently and have different requirements. For 
> servers, this proposal in its present form makes no sense at all, and 
> is on the contrary dangerous.

Why? It's been said in this thread that servers come with a higher expectation 
of rebooting upon request rather than indefinitely hanging, in contrast to 
desktops where there can be some tolerance for delay in exchange for safety.

Why should a server sysadmin's request for a reboot or shutdown be second 
guessed? What are the consequences of second guessing?

What I've seen on Fedora Server when there are services that hold things up is 
invariably sshd does immediately quit so now I can't even log back in to find 
out what's holding up the reboot. It's quite substantially a worse Ux than on 
the desktop. I mean, ostensibly I know what I'm doing on my own server and 
don't need to be second guessed like a desktop user. 

At least postgresql and libvirtd are configured to inhibit reboot/shutdown 
indefinitely until they properly quit. Services can opt into this behavior, 
overriding the default. But indefinite delay would  pose a bigger problem on 
server than on desktops, due to the loss of any feedback and control.


> A strangely ignorant attitude to take a positive view of the change, 
> even if those affected, the customers, are upset and fear considerable 
> disadvantages. Only someone who is not responsible for TBs of data and 
> thousands of users can talk like this. The least you have to do is test 
> and check what effects it has and prove that the concern is unjustified.

The proposal changes a default behavior. It's not itself an override.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Adding file swap on btrfs

2022-12-23 Thread Chris Murphy
FWIW there are some fixes and enhancements coming in btrfs-progs 6.1, now in 
koji for Rawhide, including making it easier to get info about hibernation file 
offset in a swapfile.

I haven't messed with the new subcommand, but I personally prefer putting 
swapfiles in their own subvolume so that I can still snapshot the root 
subvolume. Snapshotting a subvolume containing a swapfile will render the 
swapfile invalid for use (or maybe the snapshot fails, not sure, haven't tried 
recently).

The way I do this is mount the top-level of the file system (just do a normal 
mount without any options), and inside you'll see what appears to be two 
directories: root and home. Those are the subvolumes the installer creates by 
default. Create a new subvolume in here and add it to fstab such that:

UUID=$fsuuid /var/swap   btrfs   noatime,subvol=swap 0 0

I use chattr +C on this swap subvolume, that way any new files created inside 
will inherit. This is something the new subcommand will do for you.

An additional entry in fstab:
/var/swap/swapfile1 none swap defaults 0 0

You can certainly make a nested /var/swap thereby avoiding the need to create 
the earlier fstab entry. But note that snapshots still don't have this nested 
subvolume in them, so if you do a rollback it also won't have the nested swap 
subvolume or file - thus you boot probably hangs because the fstab is looking 
for this swapfile to activate and never finds it. So I just do it the way I 
describe, that way I can more or less forget about it. But an alternative to 
that, if you really prefer nested, is s/defaults/nofail/ for the swapfile entry 
and now a missing swap won't cause boot to fail *but* you also may one day 
forget all this and come to realize that there's no swap activated because you 
once did a rollback way back when... :D


--
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Shorter Shutdown Timer (System-Wide Change proposal)

2022-12-23 Thread Chris Murphy


On Fri, Dec 23, 2022, at 12:56 AM, Demi Marie Obenour wrote:

> Why cache mode unsafe?  How big a performance win is it?

Huge. In effect fsync is ignored. So if the host dies, write order is not 
guaranteed and can toast the guest file system.

The guest dying shouldn't pose a problem because the write order is eventually 
honored by the host. There's a variety of complex journal replay behaviors of 
the various file systems that'll come into play (no pun intended).

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Shorter Shutdown Timer (System-Wide Change proposal)

2022-12-22 Thread Chris Murphy


On Thu, Dec 22, 2022, at 5:22 PM, Steve Grubb wrote:
> On Thursday, December 22, 2022 1:29:29 PM EST Adam Williamson wrote:
>> On Thu, 2022-12-22 at 18:44 +0100, Tomasz Torcz wrote:
>> 
>> > On Thu, Dec 22, 2022 at 12:35:54PM -0500, Ben Cotton wrote:
>> > 
>> > > https://fedoraproject.org/wiki/Changes/Shorter_Shutdown_Timer
>> > > 
>> > > This document represents a proposed Change. As part of the Changes
>> > > process, proposals are publicly announced in order to receive
>> > > community feedback. This proposal will only be implemented if approved
>> > > by the Fedora Engineering Steering Committee.
>> > > 
>> > > == Summary ==
>> > > A downstream configuration change to reduce the systemd unit timeout
>> > > from 2 minutes to 15 seconds.
>> > 
>> >   Great change, please do it!
>> > 
>> > Also, sometimes after reaching the timeout, systemd extends wait by
>> > another 2 minutes (or 1m30). I wasn't able to find in the sources or
>> > documentation why this happens, but this behaviour should be blocked.
>> > Otherwise some services after 15s will get another 15, and then another…
>> 
>> 15 seconds feels very aggressive to me. I can think of some cases, like
>> libvirtd automatically suspending or cleanly shutting down running VMs,
>> that might well take longer than that. Could we not go for 30 seconds?
>> Going all the way from 90/120 down to 15 seems pretty radical.
>
> I run across this with some regularity. PackageKit is not installed on my 
> system. What I wished was that when there is a stall shutting down, a message 
> to the console or a dialog box explains who is holding up shutdown. If we 
> knew who was holding things up, bugs might get filed.

I wonder if systemctl list-jobs would be too much? 

This information needs to be logged too because 15 seconds won't be enough to 
see much. And for it to be logged, sysroot needs to be rw.


>
> In some cases I know that the system is rebuilding the nvidia drivers so that 
> graphics work on boot up. I'd like to let that finish and it certainly takes 
> more than 15 seconds. But without a blame message, how do we know what needs 
> looking into?

I expect there is (or will be) a way of tagging service units with indefinite 
wait. Reboot can't happen in the middle of kmod updates.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Chris Murphy


On Wed, Dec 21, 2022, at 12:00 PM, Lennart Poettering wrote:
> On Mi, 21.12.22 10:03, Gerd Hoffmann (kra...@redhat.com) wrote:
>
>> For the general case we need some other option.  Could be just stick to
>> grub2 for those cases (we'll continue to need grub2 anyway for bios boot
>> and ppc64le).  Or drop an ext4 driver to /boot/efi/EFI/systemd/drivers,
>> for example this one:
>>   https://github.com/tianocore/edk2-platforms/tree/master/Features/Ext4Pkg
>
> I am pretty strongly against the idea of ext4 for /boot/.
>
> First of all, the firmware can't read it natively, but what's worse,
> uefi cannot even make sense of any of the features it provides above
> vfat. i.e. file ownership, access modes, ACLs, selinux labels, xattrs,
> symlinks, … are all complete nonsense to the UEFI fs layer (and to
> boot loaders that natively implement the fs drivers, the same). The
> UEFI fs API has no concepts for *any* of these features. Hence, if
> this is supposed to carry data intended for consumption by the boot
> loader, why the f**k would you use a file system it cannot even
> remotely take benefit of?

And for btrfs, the GRUB btrfs.mod doesn't do any checksum checking at all, so 
there's not even an incremental improvement to integrity, let alone any support 
for fs-verity. So while I like btrfs for /boot due to the space efficiency 
advantage (I don't have to ask how big boot should be, no space is wasted and I 
don't run out either), I'm willing to give it up for practical matters like 
simplicity and reduced attack and maintenance surface area.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Chris Murphy


On Wed, Dec 21, 2022, at 6:53 AM, Vitaly Zaitsev via devel wrote:
> On 21/12/2022 12:38, Daniel P. Berrangé wrote:
>> Why shouldn't FAT be used for /boot.  In an EFI world, /boot
>> is used for the same functional pupose as the ESP, which is
>> already going to use FAT.
>
> Doesn't support links, lournaling and ACLs.

What's the use case? Is it a nice to have or is it a hard requirement and why?

The Linux FAT driver does support SELinux context with a mount option. We 
aren't using that right now but we can have a suitable SELinux label enforced 
file system wide on ESP and XBOOTLDR.


> Everyone can do whatever they want with the files, and a trivial power 
> outage can easily wipe out all of its contents.

This is a rare but real problem. I think we should be looking at ESP and 
XBOOTLDR updates doing A/B updates, i.e. write the updates to temporary files 
or directories and then use renameat(2) which is atomic at the VFS layer, and 
should get pretty close to atomic at the FAT layer to the degree that worse 
case scenario we have either the old *and* new files following a crash. Ideally 
we'd get old *or* new. But that's probably not possible with FAT. But we can 
still boot. 


>> Such drivers would need to be signed to be used
>> under SecureBoot, thus expanding the set of components you
>> need to audit & trust for security purposes.
>
> These drivers are backports from the grub2 code. If we trust GRUB, we 
> can trust them too.
>
> Fedora Infra can be configured to sign the contents of the efifs package 
> with a Fedora SB key.

Yeah but then try getting all the distros to agree on signing efifs. How many 
distros are there? It's not unfair to say  all distros should be able to put 
their signed efifs drivers on the ESP because that's the only way their 
bootloader can read loader/entries to properly draw a boot menu.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-22 Thread Chris Murphy


On Wed, Dec 21, 2022, at 6:22 AM, Vitaly Zaitsev via devel wrote:
> On 20/12/2022 19:56, Chris Murphy wrote:
>> Great. The gotcha though is this in effect requires a change in the file 
>> system currently mounted at /boot, which is ext4. And ext4 isn't supported 
>> by sd-boot or UEFI firmware. So if you're going to support sd-boot, the 
>> installer needs to be aware that either the ESP is big enough to be used as 
>> /boot, or if it's not big enough then it will be mounted on /efi*and*  a new 
>> partition XBOOTLDR formatted as FAT will be used as /boot.
>
> Nobody should use FAT for /boot. efifs[1] should be used instead.
>
> systemd-boot can load these drivers from ESP out of the box[2].

The founding principle in Boot Loader Spec is that multiboot between Linux 
distros sucks. The cooperation between distros, is shit. And BLS strives to 
present an opportunity to compromise and fix that problem.

It's harder to fix this problem if XBOOTLDR is not FAT. efifs drivers need to 
be Secure Boot signed just like the bootloader. The firmware already trusts its 
built-in FAT driver, for better or worse, so what is the exact problem with 
just using that so we don't have to deal with UEFI SB signing efifs drivers, 
and the much harder job of expecting every distro to include signed efifs 
drivers *on the ESP* for multiboot to work? 

If /boot is ext4, then every Linux distro must include a signed ext4 efifs 
driver in order to properly render the boot menu. But what if (open)SUSE 
doesn't want to use ext4, they want Btrfs? Compromise dictates that every 
distro now needs to provide a signed btrfs efifs driver too. OK Red Hat uses 
XFS for boot, so now every distro needs to include ext4, btrfs, and XFS signed 
efifs drivers with every installation. It's explosively more complicated to 
implement let alone to agree upon than just use the one driver we know everyone 
has and can use.

XBOOTLDR in practice needs to be FAT. I don't like it. But I like it better 
than choosing batshit as the alternative, and having a bunch of signed efifs 
drivers on the ESP per distro sounds like batshit to me. And not in the good 
way.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Shorter Shutdown Timer (System-Wide Change proposal)

2022-12-22 Thread Chris Murphy


On Thu, Dec 22, 2022, at 1:29 PM, Adam Williamson wrote:
> On Thu, 2022-12-22 at 18:44 +0100, Tomasz Torcz wrote:
>> On Thu, Dec 22, 2022 at 12:35:54PM -0500, Ben Cotton wrote:
>> > https://fedoraproject.org/wiki/Changes/Shorter_Shutdown_Timer
>> > 
>> > This document represents a proposed Change. As part of the Changes
>> > process, proposals are publicly announced in order to receive
>> > community feedback. This proposal will only be implemented if approved
>> > by the Fedora Engineering Steering Committee.
>> > 
>> > == Summary ==
>> > A downstream configuration change to reduce the systemd unit timeout
>> > from 2 minutes to 15 seconds.
>> 
>>   Great change, please do it!
>> Also, sometimes after reaching the timeout, systemd extends wait by
>> another 2 minutes (or 1m30). I wasn't able to find in the sources or
>> documentation why this happens, but this behaviour should be blocked.
>> Otherwise some services after 15s will get another 15, and then another…
>
> 15 seconds feels very aggressive to me. I can think of some cases, like
> libvirtd automatically suspending or cleanly shutting down running VMs,
> that might well take longer than that. Could we not go for 30 seconds?
> Going all the way from 90/120 down to 15 seems pretty radical.

Yeah. I'm not opposed to the change, and I understand the main impetus behind 
it (PackageKitd), but it's the consequences of unknowns that I'm still left 
scratching my head trying to imagine worse case before we actually subject 
users to it.

There really isn't a good kernel facility for something in between SIGTERM 
which is ignorable, and SIGKILL which isn't. And I'm not familiar with 
systemd's facilities for tracking service shutdown progress. i.e. I'm OK with 
SIGKILL for a process that isn't responding. But I'm also not sure if there's a 
facility for a process indicating either "I'm working on it" or "don't force 
kill me or it'll be bad".

I also don't know if privileged services doing writes to the file system can 
inhibit either remount read-only or umount? And if so, do we just wait for all 
of that to complete? I think we'd have to. I'm pretty leery of rebooting 
forcibly even if we can't remount ro because some process is holding things up, 
doing the best it can to flush. Databases and VM's do come to mind, in 
particular because I routinely run VMs on my laptop with cache mode unsafe. If 
the VM is forcibly quit, it's fine. But if the host is forcibly rebooted before 
the VM's pending writes are completed by the host, that'd be bad (regardless of 
the file system choice).

Also I wonder if  there's a way for desktops to opt into this behavior? Or a 
way for servers, iot, cloud, and rpm-ostree based systems to opt out? They very 
well might have legitimate reasons for very long service shutdowns: they're 
really super busy, and forward progress is being made but it'll take a *lot* 
longer than 15 minutes to get to a safe shutdown point.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: [systemd-devel] default journal retention policy

2022-12-22 Thread Chris Murphy



On Thu, Dec 22, 2022, at 11:00 AM, Lennart Poettering wrote:
> On Do, 22.12.22 10:56, Chris Murphy (li...@colorremedies.com) wrote:

>> Still another idea, we could add a new setting MinRetentionSec=90day
>> which would translate into "not less than 90 days" and would only
>> delete journal files once all the entries in a journal file are at
>> least 90 days old.
>
> Well, that naming would suggest it would override the size
> constraints, and it shouldn't. But yeah, ignoring the choice of name I
> think it would make sense to add that. Add an RFE.

Yeah I'm not sure what to call it. LessRetentionSec or PrefRetentionSec add 
jargon, but maybe that's adequately dealt with by updating the journald.conf 
man page?



-- 
Chris Murphy


[systemd-devel] default journal retention policy

2022-12-22 Thread Chris Murphy
Hi,

Fedora Workstation working group is considering reducing the journal retention 
policy from upstream default. 

This is the tracking issue
https://pagure.io/fedora-workstation/issue/213

This is the Fedora development list discussion thread
https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/thread/NDO5S2KUUDO5G6JLKZGQNFBXOW5KHPR5/#XATT3XYFV2UALPTJTL5RSQD3D4IVNSVO

As Lennart mentions in that devel thread, it's preferred that the change be 
upstreamable, and the Fedora Workstation working group agrees.
https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/message/XATT3XYFV2UALPTJTL5RSQD3D4IVNSVO/

The consensus of the discussion is that there should be less retention. The 
range of retention varies quite a bit, but I think 3-6 months is OK.

In practice, most configurations eventually up with 4G of journals, since 
that's the cap. This typically is over a year of journals, but of course it 
really depends on additional configuration, e.g. in my case I do a lot of 
debugging, so I'm often enabling debug logging, therefore 4G worth of journal 
files happens pretty quick, maybe 3 months.

As I understand it, rsyslog has a two week retention policy by default.

journald supports quite a lot of knobs related to journal total size, free 
space, file sizes, and rentention time. My favorite simple idea of the moment 
is to set a default MaxRetentionSec=100day which translates to "probably not 
less than 90 days, but not more than 100 days" of retention. The policy looks 
at entry age to determine if the retention threshold is met, but the garbage 
collection affects journal files. So if a single entry in a file reaches 100 
days, the whole file is deleted, which could plausibly be a week or two of 
entries. 

Still another idea, we could add a new setting MinRetentionSec=90day which 
would translate into "not less than 90 days" and would only delete journal 
files once all the entries in a journal file are at least 90 days old.

By leaving all the other settings alone, the 4G cap (or if less, the 10% of 
file system size rule) still applies. So in no case would any use case end up 
using more space for logs.

Any thoughts?


--
Chris Murphy


Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-20 Thread Chris Murphy


On Tue, Dec 20, 2022, at 2:22 PM, Daniel P. Berrangé wrote:

> parted/libparted already have support for handling GUIDs since
> their 3.5 release.
>
> I added pyparted support in
>
>   https://github.com/dcantrell/pyparted/pull/95
>
> and I've got work in progress for blivet support
>
>   https://github.com/storaged-project/blivet/pull/1080
>
> in theory that should merely then require anaconda to set a flag
> in blivet to automagicaly enable setting well known GUIDs.
>
> I've also got some changes to pykickstart to let the GUID be
> set in kickstart file part commands.

Wow, great news!



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-20 Thread Chris Murphy


On Tue, Dec 20, 2022, at 1:56 PM, Chris Murphy wrote:

> For example:
> https://bugzilla.redhat.com/show_bug.cgi?id=2120845
>
> For that matter, grubby likewise steps on *all* BLS snippets found in 
> /boot/loader/entries when using the --update=ALL flag, not just the BLS 
> snippets

Incomplete thought:

--update=ALL modifies all snippets in /boot/loader/entries, not just the BLS 
snippets the currently running root owns. This brings up the concept of each 
installed distro, whether literally a different distro or merely an additional 
instance of the same distro, having ownership of its BLS snippets and not 
owning other BLS snippets.

Fedora A should not be modifying Fedora B's BLS snipets, but it does. And now 
breaks them since the change earlier this year mentioned in the bug.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-20 Thread Chris Murphy


On Tue, Dec 20, 2022, at 1:56 PM, Chris Murphy wrote:

> So I think the first big barrier to entry is answering the questions:
>
> * Enhance parted/libparted to support arbitrary GUIDs and enhance 
> blivet to understand the full listing of GUIDs? Or
>
> * Enhance parted/libparted to support full listing of GUIDs? Or
>
> * switch anaconda/blivet to using fdisk/libfdisk? It already supports 
> pretty much all GPT partition type GUIDs and receives regular updates 
> with additions; I'm not sure if it supports arbitrary GUIDs, the CLI 
> tool seems not to support it but maybe fdisk does.

Typo: maybe libfdisk does (support arbitrary partition type GUIDs)


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Unified Kernel Support Phase 1 (System-Wide Change proposal)

2022-12-20 Thread Chris Murphy
 expanding the discoverable partitions conceptually, a 
sort of "discoverable subvolumes spec" so that Btrfs and OSTree and LVM could 
benefit from discoverability via a naming convention that a new systemd 
generator could parse and take action on. LVM and OSTree don't have an 
approximate equivalent of btrfs default subvolumes, so they are in need of a 
solution to find the proper root without it being explicit. If we're going to 
accept that specifying root trees must be explicit for LVM and OSTree, then I 
think we might as well leave things be for Btrfs and explicitly list the root 
tree there too.


> * Add proper systemd-boot support to installers.


Great. The gotcha though is this in effect requires a change in the file system 
currently mounted at /boot, which is ext4. And ext4 isn't supported by sd-boot 
or UEFI firmware. So if you're going to support sd-boot, the installer needs to 
be aware that either the ESP is big enough to be used as /boot, or if it's not 
big enough then it will be mounted on /efi *and* a new partition XBOOTLDR 
formatted as FAT will be used as /boot.

This is not a major consideration for this feature proposal, but the sooner 
some of these decisions are made the easier it's going to be by not having to 
unwind mistakes down the road:

For the purposes of a VM, it's a single OS setup so it makes sense to go with 
the simplest option which is an ESP on /boot that serves the purposes of both 
ESP and "boot" (bootloader, bootloader configuration, and kernels all on one 
volume). However...

There is the still common and supported baremetal dual-boot scenario were the 
ESP will be too small, so we'll need ESP on /efi, and XBOOTLDR on /boot. While 
we could support both EFI only and EFI+XTBOOTLDR layouts for the different use 
cases, I'd encourage just supporting one size fits all: EFI+XTBOOTLDR. It's 
more compatible (dual boot), and more like what we have today. 



> * Better secure boot support (specifically the initrd is covered by
> the signature).

We need to solve the glaring hole that is the initrd. There's no question about 
it. I can't really assess if this feature is the best way to do that. Or if it 
would be adequate for dracut to self-sign every locally generated initrd with a 
unique key pair and throw away the private key after each initrd is generated.  
Or if we could do enough strict standardization in the boot chain with a 
possibly larger kernel to avoid needing an initrd, i.e. get to sysroot mount 
faster thereby obviating the need for a large initrd.

The problem with a large initrd anyway is that we have to load the whole thing 
in memory and unpack it. And this will increase boot times. For whatever 
reason, the bootloaders don't support particularly fast reading off modern 
storage. Maybe it's a pre-boot environment limitation, not a bootloader 
limitation, I'm not sure.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Small rant: installer environment size

2022-12-09 Thread Chris Murphy


On Fri, Dec 9, 2022, at 7:30 AM, Ray Strode wrote:
> Hi,
>
> On Thu, Dec 8, 2022 at 2:55 PM Adam Williamson
>  wrote:
>> This is the direction Daniel was thinking down. I'm waiting for someone
>> with more expertise to reply, but I suspect the reply is going to be
>> along the lines of "yes, we *can* do that, but it's somewhat tricky
>> work that involves thinking about lots of paths that aren't obvious,
>> and somebody would need to dedicate their time to working on that".
> Presumably we could package the firmware separately and just unpack it
> into place from a udev rule when the hardware is detected?
>
> But first, do we actually know this is a problem?
> I think you're saying squashfs loads the whole decompressed image into
> memory, but my expectation prior to your mail was that it performs I/O
> on the usb stick (with a cache in between).  If my intuition was right
> and files only hit ram when accessed, then it seems like this is
> pretty much not an issue, right?

From a certain point of view there's a potential inefficiency with squashfs 
reads in that there's a minimum block size that it needs to read in order 
decompress its 128 KiB block. It's possible quite a lot of what's decompressed 
isn't (immediately) needed. But it's still a random access file system. It's 
not necessary to read the whole image into RAM.

Repo metadata is the big hit for netinstall because it's downloaded into /tmp 
which is tmpfs. And DVD already has repomd on it, and only downloads more if 
you enable some other repo. Live doesn't need repomd.

So initially netinstaller uses less memory up until the the Anaconda language 
selection screen appears, at which point it starts background downloading 
repomd. It quickly catches up to, and surpasses, Live media memory consumption.

Off hand, I'm not sure what's producing all the anonymous pages during Live 
installation but it's a fairly linear increase as the installation progresses. 
Since it's an rsync based installation, I'm currently frownie facing pondering 
the cause of the anon page explosion.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Small rant: installer environment size

2022-12-09 Thread Chris Murphy


On Thu, Dec 8, 2022, at 12:08 PM, Adam Williamson wrote:

> I mean, the modern systems that *need* GPU firmware generally seem to
> do pretty well with using native resolution and don't perform too
> badly, especially in the simple installer UI. When I test the fallback
> path on my bare metal test box on UEFI it uses the monitor's native
> resolution and performs fine (even, honestly, in GNOME), and that
> motherboard is nearly a decade old even. Don't know if this is the same
> for everyone, of course.


For what it's worth, this is back on the change list for Fedora 37.

https://fedoraproject.org/wiki/Changes/Linux_Firmware_Minimization



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Small rant: installer environment size

2022-12-09 Thread Chris Murphy


On Thu, Dec 8, 2022, at 10:28 AM, Adam Williamson wrote:
> On Thu, 2022-12-08 at 17:10 +, Gary Buhrmaster wrote:
>> On Thu, Dec 8, 2022 at 5:06 PM Adam Williamson
>>  wrote:
>> 
>> > It already *is* compressed, which is why it doesn't get any smaller in
>> > the compressed filesystem image, unlike the other things I mentioned.
>> > Check for yourself - look under /lib/firmware and you'll see only
>> > things ending in .xz.
>> 
>> Right, but zstd *may* have a better compression
>> ratio than .xz (that was at least one of the reasons
>> given for the changes to support it).
>
> I actually spent half an hour looking into that yesterday as I got
> diverted into the details of how the filesystem compression stuff
> works, but all the references I found say xz consistently compresses
> better than zstd. zstd's advantages over xz are in *performance* (time
> taken to compress and decompress). So switching from xz to zstd seems
> like it would make things bigger, not smaller.

xz will use a larger computation cost upfront (compression) to achieve a higher 
compression ratio than zstd, i.e. you can always ask xz to spend more time to 
get a higher compression ratio and thus beat zstd on resulting file size. But 
zstd will always beat xz if you favor time to compress, and significantly beats 
xz on decompression time.

Net costs: Fedora releng takes one compression hit per image created, but 
consumers of those images which also includes a ton of Fedora QA bot time as 
well as human users are in the dozens to thousands of hits per image created. 
The net energy cost is quite a lot higher using xz compared to zstd. Only 
focusing on image size is misleading. There's a very real energy hit of all 
this compression and decompression. I don't know how to weigh the costs and 
figure out a compromise, but totally ignoring one of the costs is probably 
incorrect. For all I know a balanced approach means using xz but at a lower 
compression ratio, but someone with round tuits and interest would need to look 
at it.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Small rant: installer environment size

2022-12-09 Thread Chris Murphy


On Thu, Dec 8, 2022, at 10:06 AM, Daniel P. Berrangé wrote:

> Is there something that can be done to optimize the RAM usage,
> in spite of the large installer env size ?

What's wrong with the RAM usage now?

We do semi-regularly run into issues with openQA VM's running out of memory. So 
far they're all been considered bugs when we hit them, and the change is 
reverted including a system change to bump tmpfs on /tmp quite a lot. But 
keeping the VMs at 2G has helped discover changes that in retrospect shouldn't 
have been changed. Ergo, even though it's a pain to regularly hit these bugs, I 
don't think there is a per se problem with the 2G RAM selection. When it's all 
working as expected, swap on zram is used rather significantly and works as 
expected.


> If we're installing off DVD media, it shouldn't be required to
> pull all of the content into RAM, since it can be fetched on
> demand from the media. 

AFAIK this doesn't happen. Files are read in only on demand, not a monolithic 
read of everything and kept in cache somehow.

> IOW, 99% of the firmware never need
> leave the ISO, so shouldn't matter if firmware is GBs in size [1]
> if we never load it off the media. Same for languages, only
> the one we actually want to use should ever get into RAM.

At first glance it might seem you can get memory savings by not having swap on 
zram enabled.

But what happens is anonymous pages can't be compressed. And also they can't be 
dropped since they have no files backing them. The result is file pages get 
dropped in memory tight situations and we end up getting (file) page faults, 
and it's just super expensive. Yes you can read these pages back from files but 
it's extra costly because even if it's only a 4K read that's needed, it'll 
translate into potentially upwards of 1M reads: to find the 4K extent requires 
reading multiple 4K ext4 metadata blocks, which aren't necessarily colocated in 
a 128 KiB squashfs block, so we end up reading 1 to 10 of those, taking the ram 
and memory hit to decompress them to reveal their 4K content we need, dropping 
the rest. And then doing that every time there's a page fault. So I'd say it's 
probably asking for a performance hit that isn't really going to save much 
memory.

On high latency devices like USB sticks, it's not a good UX.


> If we're installing off a network source, we need to pull content
> into RAM, but that doesn't mean we should pull everything in at
> once upfront.

Pretty sure netinstaller's big RAM hit is repo metadata. All of it is 
downloaded before we have partitioning done, thus the repo metadata isn't 
stored on disk, rather in memory and it's tmpfs so it may not be compressed 
either (at least it's not subject to swap on zram out of the gate). I'm pretty 
sure partitioning happens before the packages are downloaded though, which 
means they get stored on disk not in memory.

But the repo metadata is pretty big now and that's a big memory hit for 
netinstallers.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Unexpected system freeze

2022-11-29 Thread Chris Murphy


On Wed, Nov 23, 2022, at 12:00 AM, George R Goffe via test wrote:
> Howdy,
>
> System is FC38:
>
> Current kernel is: kernel-6.1.0-0.rc5.20221118git84368d882b96.43.fc38.x86_64
>
> I just experienced an unexpected system freeze about an hour or so ago. 
> /var/log/messages contains oom killer messages. Are "we" still having 
> oom problems? Is there a docs location that can provide oom killer 
> information? Is there a system or process dump hiding somewhere on this 
> system?

journalctl is the best way to find out what's going on, we need to see the 
systemd-oomd messages to see if there's a problem in the logic. It could also 
be kernel related.


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Can't create msdos partition table without advanced partitioning?

2022-11-21 Thread Chris Murphy


On Sat, Nov 19, 2022, at 9:18 PM, Tom Horsley wrote:
> Installing fedora 37 from workstation live iso to a virtual machine.
>
> I couldn't find any way to partition a blank disk with a msdos
> partition table without using the advanced manual partitioning.
> Did I miss something, or is that the way it works now?

Yeah it's in the change set but somehow is missing from the release notes. I've 
let docs folks know.
https://fedoraproject.org/wiki/Changes/GPTforBIOSbyDefault

You can force MBR by using a boot parameter at boot time: inst.mbr

I only advise doing this if there's a problem (firmware confusion) with GPT.

-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 prospoal: Enable bootupd for Fedora Silverblue & Kinoite (Self-Contained Change proposal)

2022-11-11 Thread Chris Murphy


On Thu, Nov 10, 2022, at 6:08 PM, Robbie Harwood wrote:
> Ben Cotton  writes:
>
>> By design, ostree does not manage bootloader updates as they can not
>> (yet) happen in a transactional, atomic and safe fashion.
>
> As we've talked about before, it's not possible to make updates
> transactional.  It involves, per spec and depending on processor
> architecture, updating multiple files in different directories,
> potentially on different filesystems entirely, one of which is fat32.

EFI/FedoraA
EFI/FedoraB

NVRAM bootorder uses A then B

Update the bootloader in EFI/FedoraB

At any point of failure, only the EFI/FedoraA bootloader path is used. Once 
everything in EFI/FedoraB is committed to stable media, set bootnext FedoraB. 
If the boot fails, automatic failback to FedoraA. If the boot succeeds, bootupd 
can change bootorder. B then A.

?


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: How do I rebuild Grub/Boot/initramfs from a Live USB?

2022-10-29 Thread Chris Murphy


On Sat, Oct 29, 2022, at 1:18 AM, Tim via users wrote:

> Here's some more advice you probably won't like:  Multi-booting (any
> computer, any OS) can be a pain, and it may be best to only attempt
> that after you've learnt how a system works.  Your safest approach to
> learning a new system is to get a second hard drive, unplug your first
> one, install onto a fresh drive in isolation, and learn how the system
> works.

Multiboot is probably fragile. Or at least it is inclined toward chaos, in that 
we cannot account for everything.

Fedora only tests and blocks releases against Windows and macOS existing first, 
and Fedora second. As there's no manifestation of support beyond community 
support, is anything supported? We more or less say things that we are willing 
to block release on are supported, as in they have to work at the time a 
version is released. But there's lots of buts. And one of those buts is, if 
you're setting up a system in a way we aren't testing, we certainly aren't 
going to block release on such edge cases that affect few users. Triboot is 
definitely one of those.

But case in point, lets say you have a completely clean system. Install Fedora 
copy A, and then you want to do a dual boot of two Fedoras. Say, Fedora 
Workstation and KDE. Or Fedora 35 and 36. Dual boot Fedoras. Supported? Nope. 
We have no release criterion for that. Only bugs that happen independent of 
that configuration would be blockers, not bugs that only manifest as part of a 
dual boot Fedora installation.

-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: How do I rebuild Grub/Boot/initramfs from a Live USB?

2022-10-29 Thread Chris Murphy


On Sat, Oct 29, 2022, at 12:54 AM, Slade Watkins via users wrote:
> On 10/28/22 4:27 PM, Jake D wrote:
>> I really can't believe that these Linux systems are so fragile and the ONLY 
>> option is to start over
>
> Wanted to hop in here real fast and say:
> Pop!_OS, which is my primary distro (with Fedora being my secondary),
> has the option to go into recovery (has a small partition just for
> up-to-date recovery media) and reinstall your OS without losing any
> personal files.
>
> AFAIK, it's one of the only distributions that has something like it.

Fedora doesn't have a recovery partition. But there is a (sort of hidden, or at 
least non-obvious) way of doing a custom installation while preserving home. 
There isn't detailed documentation for it. It's just a test case.

https://fedoraproject.org/wiki/QA:Testcase_partitioning_custom_btrfs_preserve_home

This is more official than the draft dual boot one I posted previously, in that 
I try to keep this one up to date. But it's just a test case, intended for a 
test setup to make sure installer functionality isn't lost. It's not really 
intended as installation advise. It could be adapted into a Quick Doc for that 
purpose though.

But my understanding of the original poster's issue is that he now has a bunch 
of system level customizations. Not so much user level customizations. 
Therefore the reuse home directory method wouldn't help much.

-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: How do I rebuild Grub/Boot/initramfs from a Live USB?

2022-10-29 Thread Chris Murphy


On Fri, Oct 28, 2022, at 7:09 PM, Jake D wrote:
> No, it's not a troll. 
>
> Thank-you for your otherwise completely irrelevant , unsolicited  and 
> entirely unhelpful opinion piece. I'm sorry for not realising Windows 
> upsets you so much and is therefore inferior, and for daring to ask if 
> Linux has similar recovery functionality, after being told the only 
> answer is to completely start from scratch. Clearly, I should have 
> realised immediately that this means it's the more resilient system.
>
> I will immediately stop using my working windows partition and stare at 
> my non booting "grub> prompt instead. Also can you advise which bridge 
> you wish for me to jump off as punishment for my question?

Multiboot systems are inherently complex. Like, you really have had a train 
derailment. And you're asking for help with that as if there's a button you can 
push to fix that. There's no button for train derailments. It's a customized 
recovery every time that requires esoteric knowledge. Everything about it is 
manual.

Are trains fragile? I'm not sure that's the best description but yeah once they 
start going off the rails it's a catastrophic system.

-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: How do I rebuild Grub/Boot/initramfs from a Live USB?

2022-10-29 Thread Chris Murphy


On Fri, Oct 28, 2022, at 5:53 PM, Jonathan Billings wrote:

> It sounds like you only wiped the /boot partition, which should be 
> fairly easy to get back.  

But /boot/grub2 and /boot/loader/entries are on /boot so the real grub.cfg and 
BLS snippets are gone, which are trivial to create if you're an expert. If 
you're not, it might as well be ouji board antics.

There's so many tiny things like this that the installer does, that it sorta 
makes it a grand experiment in "what the hell did we miss" doing the fix 
manually.

We can just (a) reformat the boot partition, get its new fsUUID put into (b) 
/boot/efi/EFI/fedora/grub.cfg and (c) /etc/fstab on the existing root (d) mount 
everything in the proper order so we can do a chroot (e) run grub2.mkconfig (f) 
do a dnf reinstall kernel so that we for sure have a vmlinuz on /boot and 
modules of the same version in /usr  and BLS snippet 

But uhh what am I missing? Like, I'd just reboot at this point and wait for the 
failure to give me a hint what I'm missing. But in this case, the user gets 
stuck in a way they maybe can't get out of or describe and then we're worse off 
 having wasted the time.

>Reinstalling the kernel and grub2 packages 
> will get you the packaged bits, and running dracut like you ran should 
> get you the initrd, although only after you’ve got the kernel.

reinstalling the kernel will run dracut, we don't need to run it again

>
> After everything is reinstalled, then run the grub2-mkconfig command to 
> create the grub config file in your new /boot partition.
>
> Just make sure you do everything from the chroot in an EFI booted 
> rescue environment, either on a livecd or booting the NetBoot iso with 
> the rescue option.

So unfortunately Live images don't have Anaconda rescue environments. And while 
the netinstaller does, it will fail to find /boot by UUID in the /etc/fstab 
because it doesn't exist anymore so the assembly and chroot will fail.

The manual method means high likelihood of missing a step or getting it in the 
wrong order. Or asking someone to test all the steps in a VM.

Hence why reinstallation is easier. 

If it's Btrfs, we can keep the old root and swap roots.

We need to fix two things (a) change the rootflags=subvol argument in the BLS 
snippets, so they mount root subvolume instead of root00 subvolume (b) update 
the /boot fsUUID in /etc/fstab

Right? Is that it? I think that's it.

OH OK there is one more problem. Probably the kernel in the new /boot is old 
and that version's modules don't exist anymore in the (old) root subvolume's 
/usr and therefore we can't boot. So yeah that has to get fixed somehow...

If the Btrfs volume is mounted normally (without any options) to /mnt we can 
copy the old kernel modules from the new root to the old root and now the old 
root will boot.

cp -r /mnt/root00/usr/lib/modules/$theonlydirpresent /mnt/root/usr/lib/modules/

Right? That will return fairly instantly because it'll be a reflink copy, so it 
might lead some folks to think it didn't work because it was too fast :P What 
should be true is in the first path with root00, if you hit TAB after the last 
/, it should autocomplete the only directory present which is the shipping 
kernel for Fedora 36.

Or hey I have that kernel in a btrfs snapshot I created after an F36 clean 
install. It should be 5.17.5-300.fc36.x86_64 so the actual command ought to be

cp -r /mnt/root00/usr/lib/modules/5.17.5-300.fc36.x86_64 
/mnt/root/usr/lib/modules/

OK I think that's everything?

-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: How do I rebuild Grub/Boot/initramfs from a Live USB?

2022-10-29 Thread Chris Murphy


On Fri, Oct 28, 2022, at 4:27 PM, Jake D wrote:
>> My opinion: This is probably easier in a live discussion on IRC or Matrix. 
>> There's
>> just too much back and forth required.
>
> Are these different forums? I just googled 'Fedora matrix 'and I'm 
> getting a lot of very varied  hits

https://chat.fedoraproject.org

IRC and Matrix are chat protocols. There's a bridge in place so that, in 
effect, you're in the same channel whether you join #fedora on libera.chat 
(IRC) or #fedora on fedora.im (Matrix). You can get a native matrix account via 
element.io or you can get a Fedora account and use that to connect to Fedora's 
matrix home server. Why you pick one vs another depends on how big your matrix 
presence is, I guess. You're finding multiple options because of multiple eras: 
IRC then matrix.org then Fedora got its own matrix home servers. But you can 
access them all with any method due to the behind the scenes bridging. I 
personally use cmurf:fedora.im (matrix using the Fedora matrix home servers)



>> But the absolute easiest thing to do is mount the encrypted btrfs, make a 
>> backup of the
>> home directory, and then clean install followed by restoring the home 
>> directory files from
>> the backup.
>
> I understand what you're saying but as I mentioned in a previous 
> comment, I have 4 weeks of setup already in place on this system. 
> Theres not really any files on there worth covering but more dayd and 
> days of fiddling to get things working, much of which im sturggling to 
> remember,
>
> Reinstall is essentially a complete writeoff. THeres no way I'll have 
> it setup up again by Monday, I'll have to withdraw from the class and 
> thats a large course fee  forfeiture I'd rather avoid. 

OK, there is another option which is a clean install along side the existing 
installation, but following this clean install you'll abandon the new root and 
switch to the old root that has all  your customizations. Basically you'll be 
doing a clean install just to get all the nuggets in /boot and /boot/efi in the 
proper shape. Some post install surgery will still necessary though...

Is it more complicated to do a modified dual boot where we have two roots and 
then switch the roots and make the necessary changes to /etc/fstab and BLS 
snippets in /boot/loader/entries? Or just manually create every file we need? 
Uhhh I think it's probably easier to do the side by side installation, 
preserving the existing root. And then abandon the new root, while keeping the 
replacement /boot/efi/EFI/fedora and /boot

But that's a guess.

So this is a draft I helped write for having dual boot Fedoras, i.e. two roots.
https://fedoraproject.org/wiki/User:Sumantrom/Draft/dualboot_f33_btrfs

That needs a number of modifications for your situation though. So I think 
before going down that road we should discuss whether that's really the best 
option or not.

> I really can't believe that these Linux systems are so fragile and the 
> ONLY option is to start over, is there nothing like Resotre Points in 
> windows?

Not automatically and only for the root (/) and home (/home). You've toasted 
the /boot volume which is functionally like Windows' system volume that it 
boots from initially, if you wipe that, you'd be totally screwed on Windows 
too. And also these days on Windows you don't get automatic restore points 
either, you'd have to have done it before the mistake.



-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: How do I rebuild Grub/Boot/initramfs from a Live USB?

2022-10-29 Thread Chris Murphy


On Fri, Oct 28, 2022, at 4:21 PM, Jake D wrote:
>> HyperKitty is a web front-end for what is really a mailing list. Most
>> people here access the list via a standard mailer rather than the web
>> interface, which (IMHO) gives better results, including proper quoting.
>
> I 'm not really sure what a "standard mailer" is or what you mean by 
> 'mailing list', and honestly I'm a bit more focused on getting the 
> computer to boot at all by monday. This was one of the  resources on 
> the course material and I'm asking everywhere I can, I'm a bit frantic 
> frankly.

Panic is one of the best known paths to data loss.

Before making any further changes, I advise a backup of important user data. Do 
not attempt repair or reinstallation until there's at least two independent 
copies of your important data.

-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: How do I rebuild Grub/Boot/initramfs from a Live USB?

2022-10-28 Thread Chris Murphy


On Fri, Oct 28, 2022, at 2:31 PM, Jake D wrote:
> Hello all.
>
> I need some help.


My opinion: This is probably easier in a live discussion on IRC or Matrix. 
There's just too much back and forth required.

But the absolute easiest thing to do is mount the encrypted btrfs, make a 
backup of the home directory, and then clean install followed by restoring the 
home directory files from the backup.

Otherwise you and at just one other person have to have a fairly intense 
conversation about very low level esoterics. Boot is very distro specific. 
There's maybe two or three dozen steps to repair this setup. They all have to 
be exactly correct or it won't work. Much of this logic is in the installer.

-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-05 Thread Chris Murphy


On Wed, Oct 5, 2022, at 3:01 PM, Vít Ondruch wrote:
>
> 3. "Boot menu" in GUI? Given that one can reach the GUI, why it should 
> not be possible to choose the boot entry for next boot? Or even choose 
> to open FW setup.

This could solve this other problem too.

https://bugzilla.redhat.com/show_bug.cgi?id=2049849

The GUI tool can use efibootmgr to set bootnext or even bootorder.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-05 Thread Chris Murphy


On Wed, Oct 5, 2022, at 11:43 AM, Geraldo Simião Kutz wrote:
> On my acer Aspire laptop it's the "esc" key. Works everytime I want to see 
> the grub menu.

The gotcha with ESC is that it brings up firmware settings on qemu-kvm when 
using UEFI (edk2-ovmf).


--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Grub menu with 3 kernels by default

2022-10-05 Thread Chris Murphy


On Wed, Oct 5, 2022, at 11:16 AM, Christopher Klooz wrote:

> However, on ask.fp, a user mentioned that the grub menu is no longer 
> enabled by default on single boot systems so that changing the kernel is 
> no longer easily possible, and put forward 
> https://fedoraproject.org/wiki/Changes/HiddenGrubMenu as evidence for 
> this argument. Yet, the article indicates that the argument is not fully 
> correct and even with single boot installations, SHIFT can be used to 
> get into the grub menu. 

I think it's F8 or SHIFT. F8 doesn't work on many laptops I've found, because 
it's reserved by UEFI firmware for one of its menus. And SHIFT has never 
worked. Maybe Esc or TAB?

Given this inconsistency, I have a mixed opinion of the hidden GRUB menu.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: limiting the (systemd) journal size

2022-09-29 Thread Chris Murphy


On Tue, Sep 27, 2022, at 7:14 PM, Allan via devel wrote:
> On Tue, 27 Sep 2022 12:31:11 -0600
> "Chris Murphy"  wrote:
>
> The original PinePhone only comes with a 16GB eMMC. Using 4GB for
> journal on that would for sure be insane.

The root file system for this device might be around 15G, therefore max journal 
size is 1.5G. But also stops growing its usage once the journal uses more than 
15% free space. The 4G cap is the high end cap which applies when the file 
system is > 40G.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: limiting the (systemd) journal size

2022-09-27 Thread Chris Murphy


On Tue, Sep 27, 2022, at 12:13 PM, Daniel P. Berrangé wrote:
> On Tue, Sep 27, 2022 at 10:12:57AM -0600, Chris Murphy wrote:
>> Hi,
>> 
>> Fedora uses systemd-journald for system logging. By default it is a
>> persistent log kept on /var, and uses up to 4G disk space, although
>> in certain circumstances it can go a bit higher. See 'man journald.conf'
>> for details.
>
> snip
>
>> The obvious bike-shedding questions are:
>> Is 4G is too much or too little? If so what amount it should be?
>> Is size still the correct approach? Or should we consider a max
>> retention time? And if so, what would it be and how granular
>> should it be?
>
> In context of modern physical machines, 4G is probably barely
> noticeable for most people, given common physical disks measure
> 100's of GBs as a starting point.

Dual-boot is pretty common, and so are 128G NVMe drives in new laptops. So it's 
"sufficiently not rare" that Fedora is being installed into less than 50G that 
it needs to be accounted for.


>
> Some people run Fedora on pretty old hardware where disk sizes
> may be more limited.
>
> Virtual machines are probably the place with the biggest disk
> usage constraints where, 4GB could be pretty impactful when
> a VM may only have a few 10's of GB of storage purchased.

Agree. It is possibly similar to the small storage cheap dual-boot baremetal 
case.


> You mentioned '10%' earlier, is that is another existing
> limit that's already applied, in addition to the 4GB absolute
> size limit ?

Yes. SystemMaxUse= defaults to 10% of the file system size, capped to 4G. I'm 
not certain this is a hard limit, i.e. I think if journals take up just under 
4G and a new journal file can be created, it's allowed to grow to the max size 
which I think is 128M (I've only ever seen 128M sized journals, so it's 
anecdotal evidence not man page or code based). So it could plausibly grow to 
~4.1GiB?


> If so that'd obviously benefit the small disk
> scenarios.  A relative limit is going to be way oversized
> for large disk scenarios though.
>
> Both absolute and relative size limits look complementary
> and neccessary.

Currently SystemKeepFree= is 15% of file system size. Once free space goes 
below that limit, systemd will stop growing its usage, but won't reduce its 
usage.


> I wonder if max retention is actually useful at all though,
> at least for generic out of the box usage
>
> For systems with low rate of logging, the size of the journal
> will grow slowly enough that max retention won't have a notable
> impact for along time.
>
> For systems with high rate of logging, a generic max retention
> probably won't be aggressive enough to constrain the disk usage
> quickly enough to stop problems arising.
>
> Max rentention time doesn't take into account available disk
> storage in any way.

Correct, it allows a significant float based on usage, consider space 
consumption relatively less important than the value reduction of the journal 
entries over time. This is what rsyslogd does, which I think its default 
retention is two weeks (?) and is configurable. If you think most users most of 
the time have no need or expectation of needing journal entries beyond X weeks, 
then you'd presumably be a proponent of a relatively more dominant retention 
time policy (while still allowing for the max use limit).

>
> While there might a sweet spot, its effectiveness looks to
> be somewhat limited, narrow in scope & unlikely to please a
> broad enough userbase. IOW, combination of abs+rel size limits
> look a more generally effective OOTB setting to avoid storage
> over use.
>
> Max retention time looks most relevant/useful as a mechanism for
> implementing organizational policies on data record keeping times,
> and quite site specific.

True but also pretty common in the era before systemd-journald in which it 
really was predominately time based rentention.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: limiting the (systemd) journal size

2022-09-27 Thread Chris Murphy


On Tue, Sep 27, 2022, at 10:59 AM, Gregory Bartholomew wrote:
>> 
>> What about modifying /etc/systemd/journald.conf:
>> 
>> MaxFileSec=1week
>> MaxRetentionSec=5week
>> 
>> This should result in at least 4 weeks of journal entries, i.e. it would 
>> delete a journal
>> file once entries reach 5 weeks old, but since the journal files are rotated 
>> weekly, it
>> should mean a given journal file won't have more than a week's worth of 
>> entries.
>> So you'd have between 4-5 weeks worth of entries at any given time.
>
> Thanks for the tip. That does look like a better solution and I'll do 
> that for my containers. Although, since I don't want it to hinder 
> future updates of /etc/systemd/journald.conf, I'll put those lines in 
> /etc/systemd/journald.conf.d/override.conf.

I hadn't considered the container case at all, that containers running 
systemd-journald would have their own journals and retention policy. I wonder 
if the container default should have volatile journals? Or forward the journals 
to the host by default? But yes I can see how many containers each thinking 
they have a 4G cap could quickly become a problem.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: limiting the (systemd) journal size

2022-09-27 Thread Chris Murphy


On Tue, Sep 27, 2022, at 10:38 AM, Gregory Bartholomew wrote:
> FWIW (probably not much), I have run into an issue with regard to the 
> default journal size being too large on Fedora Server when running a 
> bunch of systemd-nspawn containers each with sshd and fail2ban enabled. 
> When I reboot a bunch of the containers at once (or the whole 
> hypervisor), fail2ban really seemed to bog things down and use a lot of 
> CPU time (re)scanning the journals for failed ssh attempts to (re)ban 
> the IP addresses. In my case, I worked around the issue with the 
> following. The real problem might be with my fail2ban configuration or 
> something else. But it might be something to consider when thinking 
> about what would be a good size/time limit for the journal.
>
> # cat /etc/systemd/system/fail2ban.service.d/override.conf 
> [Service]
> ExecStartPre=/usr/bin/journalctl --vacuum-time=1months

What about modifying /etc/systemd/journald.conf:

MaxFileSec=1week
MaxRetentionSec=5week

This should result in at least 4 weeks of journal entries, i.e. it would delete 
a journal file once entries reach 5 weeks old, but since the journal files are 
rotated weekly, it should mean a given journal file won't have more than a 
week's worth of entries. So you'd have between 4-5 weeks worth of entries at 
any given time.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


limiting the (systemd) journal size

2022-09-27 Thread Chris Murphy
Hi,

Fedora uses systemd-journald for system logging. By default it is a persistent 
log kept on /var, and uses up to 4G disk space, although in certain 
circumstances it can go a bit higher. See 'man journald.conf' for details.

Example:
>Sep 27 07:26:05 fovo.local systemd-journald[602]: System Journal 
>(/var/log/journal/$machine_id) is 385.9M, max 4.0G, 3.6G free.

In this example Fedora 37 Workstation system, logging is happening since August 
20, is about 10M/day of journal accumulation, or 1.12 years of journals before 
garbage collection begins. 

Exactly what will trigger garbage collection depends on the system. There are 
quite a few knobs for adjusting various aspects of retention and how granular 
the garbage collection will be. e.g. it's common to see 64M system journal 
files that contain weeks of entries. It's also possible to limit the journal 
file size, thus improving granularity whether to retain a bit more or less than 
the ideal amount.

Some folks use services with verbose or debug logging. 4G might only be a few 
months of logs in such a case. Whereas other folks have a small root device in 
which even the smaller of 10% or 4G can be quite a lot and in certain cases is 
not a hard limit.

Also note that on Btrfs with compression enabled, the stored amount is quite a 
bit less. Like all of user space, systemd-journald sees the uncompressed file 
sizes, so its retention behavior hasn't changed as a result of btrfs 
compression. What has changed is we're only (physically) storing about 1/3 of 
whatever the max retention is on a given system.

The obvious bike-shedding questions are:
Is 4G is too much or too little? If so what amount it should be? Is size still 
the correct approach? Or should we consider a max retention time? And if so, 
what would it be and how granular should it be?

Also, what's the scope? Is a change needed Fedora-wide, in a manner that's 
upstreamable? That could prove difficult because any change will negatively 
impact other use cases, not least of which is what the upgrade behavior should 
be if it'll involve trimming journals. Are the current defaults optimal for 
most use cases most of the time? There will be a higher burden of persuasion to 
get a Fedora-wide change, rather than optimizing for just desktops.

But that isn't intended to limit the discussion to just the desktop case. Just 
to be aware that the broader and grander the change, the more consideration of 
the consequences there needs to be, i.e. less bike shedding.

More background and discussion upstream and Workstation working group issues. 
[1]



[1]
https://pagure.io/fedora-workstation/issue/213
https://github.com/systemd/systemd/issues/17382

--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: gnome-shell crash when resuming/waking up from idle

2022-09-23 Thread Chris Murphy


On Wed, Sep 21, 2022, at 12:08 AM, Kamil Paral wrote:
> Hi folks,
> I wonder if I'm the only one who sees an occasional gnome-shell crash on 
> Fedora 37 when the system is resumed from suspend, or possibly even woken up 
> from idle (screen turned off)? It happens to me a few times per week, 
> completely randomly, I can't reproduce it intentionally. 

I haven't seen any gnome-shell crashes since before branch.


--
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: except BitLocker-enabled installs from Windows dual-boot criterion bootloader requirement

2022-09-20 Thread Chris Murphy


On Tue, Sep 20, 2022, at 9:50 AM, Brian C. Lane wrote:
> On Mon, Sep 19, 2022 at 12:16:33PM -0700, Adam Williamson wrote:
>> "The installer must be able to install into free space alongside an
>> existing clean Windows installation and install a bootloader which can
>> boot into both Windows and Fedora."
>> 
>> to say:
>> 
>> "The installer must be able to install into free space alongside an
>> existing clean Windows installation. As long as the Windows
>> installation does not have BitLocker enabled, the installer must also
>> install a bootloader which can boot into both Windows and Fedora."
>
> We have reached a point where boot security is important enough that
> Windows is now only allowing their bootloader to be used. With bitlocker
> enabled this is working exactly how it was designed so I'd change the
> wording to require that grub2 doesn't prevent windows from continuing to
> boot via their preferred method and leave it at that.
>
> And while there may be a possible solution using BootNext, until someone
> does the work and tests it there is no point in requiring grub2 to do
> something it cannot do.

An additional topic is having boot entries for Windows (and macOS) that don't 
work in the meantime. While we could just remove the scripts that create these 
entries to chainload another bootloader, they're still needed for BIOS systems 
which don't support bootnext.


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: except BitLocker-enabled installs from Windows dual-boot criterion bootloader requirement

2022-09-20 Thread Chris Murphy


On Tue, Sep 20, 2022, at 9:50 AM, Brian C. Lane wrote:
> On Mon, Sep 19, 2022 at 12:16:33PM -0700, Adam Williamson wrote:
>> "The installer must be able to install into free space alongside an
>> existing clean Windows installation and install a bootloader which can
>> boot into both Windows and Fedora."
>> 
>> to say:
>> 
>> "The installer must be able to install into free space alongside an
>> existing clean Windows installation. As long as the Windows
>> installation does not have BitLocker enabled, the installer must also
>> install a bootloader which can boot into both Windows and Fedora."
>
> We have reached a point where boot security is important enough that
> Windows is now only allowing their bootloader to be used. With bitlocker
> enabled this is working exactly how it was designed so I'd change the
> wording to require that grub2 doesn't prevent windows from continuing to
> boot via their preferred method and leave it at that.
>
> And while there may be a possible solution using BootNext, until someone
> does the work and tests it there is no point in requiring grub2 to do
> something it cannot do.

An additional topic is having boot entries for Windows (and macOS) that don't 
work in the meantime. While we could just remove the scripts that create these 
entries to chainload another bootloader, they're still needed for BIOS systems 
which don't support bootnext.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: except BitLocker-enabled installs from Windows dual-boot criterion bootloader requirement

2022-09-20 Thread Chris Murphy


On Mon, Sep 19, 2022, at 1:16 PM, Adam Williamson wrote:

>
> "The installer must be able to install into free space alongside an
> existing clean Windows installation and install a bootloader which can
> boot into both Windows and Fedora."
>
> to say:
>
> "The installer must be able to install into free space alongside an
> existing clean Windows installation. As long as the Windows
> installation does not have BitLocker enabled, the installer must also
> install a bootloader which can boot into both Windows and Fedora."

Workstation working group discussed it at today's meeting, and there were no 
objections to the language change proposal.

-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: except BitLocker-enabled installs from Windows dual-boot criterion bootloader requirement

2022-09-20 Thread Chris Murphy


On Mon, Sep 19, 2022, at 1:16 PM, Adam Williamson wrote:

>
> "The installer must be able to install into free space alongside an
> existing clean Windows installation and install a bootloader which can
> boot into both Windows and Fedora."
>
> to say:
>
> "The installer must be able to install into free space alongside an
> existing clean Windows installation. As long as the Windows
> installation does not have BitLocker enabled, the installer must also
> install a bootloader which can boot into both Windows and Fedora."

Workstation working group discussed it at today's meeting, and there were no 
objections to the language change proposal.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: except BitLocker-enabled installs from Windows dual-boot criterion bootloader requirement

2022-09-20 Thread Chris Murphy


On Mon, Sep 19, 2022, at 2:45 PM, Robbie Harwood wrote:

> The only way to get the TPM state to match not using a particular loader
> is to not use a loader - i.e., have grub2 (or efibootmgr in Fedora
> userspace) set EFI BootNext and reboot the machine.  

I know systemd-boot does implement bootnext, can modify it in NVRAM. But last I 
checked GRUB can't.

I've asked upstream GRUB about supporting bootnext and a reboot, but the 
discussion didn't go anywhere. Is there any interest or work happening to make 
this possible? Because if not, then it seems the only way forward is 
efibootmgr, and see if desktops want to add a GUI wrapper around it.



-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: except BitLocker-enabled installs from Windows dual-boot criterion bootloader requirement

2022-09-20 Thread Chris Murphy


On Mon, Sep 19, 2022, at 2:45 PM, Robbie Harwood wrote:

> The only way to get the TPM state to match not using a particular loader
> is to not use a loader - i.e., have grub2 (or efibootmgr in Fedora
> userspace) set EFI BootNext and reboot the machine.  

I know systemd-boot does implement bootnext, can modify it in NVRAM. But last I 
checked GRUB can't.

I've asked upstream GRUB about supporting bootnext and a reboot, but the 
discussion didn't go anywhere. Is there any interest or work happening to make 
this possible? Because if not, then it seems the only way forward is 
efibootmgr, and see if desktops want to add a GUI wrapper around it.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: except BitLocker-enabled installs from Windows dual-boot criterion bootloader requirement

2022-09-19 Thread Chris Murphy


On Mon, Sep 19, 2022, at 2:45 PM, Robbie Harwood wrote:

> I'm fine with the proposed change.  I'm also fine with the original
> text.
>
> During boot, certain actions are taken that are recorded in the TPM.
> These include, for instance, any loaders that are run - like grub2.  The
> result is that if you load Windows from grub2 rather than the EFI
> firmware, the TPM state will be different.  Bitlocker cares about this
> TPM state.
>
> So: if you install Windows and set up Bitlocker booting through grub, it
> will continue to work through grub.  

The Windows installer drops a payload on the drive, and sets a bootnext for an 
entry that points to the Windows bootloader, not via GRUB. 

And then, the instant we update either shim or grub, Windows boot will break. 

I think working around this is sufficiently tedious no users are likely to do 
it.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Release criteria proposal: require GNOME Shell extension install/remove to work

2022-09-13 Thread Chris Murphy


On Mon, Sep 12, 2022, at 3:35 PM, Adam Williamson wrote:
> Hey folks!
>
> So a bug came up at today's blocker review meeting:
> https://bugzilla.redhat.com/show_bug.cgi?id=2106868
>
> it takes a minute to parse, but the tl;dr is that right now in Fedora
> 37, you can't go to https://extensions.gnome.org and install
> extensions.
>
> We agreed that it doesn't violate any existing release criteria, but to
> me, this is actually kind of a significant problem. Anecdotally, I get
> the impression that a lot of our Workstation users do use extensions,
> and not being able to easily install them on a fresh install would be a
> big problem for them, and make us look pretty bad.
>
> We have a handful of extensions packaged, though I'm not sure how well
> they're kept up to date. Aside from those, I don't know of any other
> really practical way for regular users to install extensions besides
> https://extensions.gnome.org . Is there one?
>
> Assuming for now that there isn't, I'm gonna propose this as a Final
> release criterion to see how people feel about it, to come after
> "Default panel functionality":
>
> #
>
> === GNOME extensions ===
>
> On Fedora Workstation, it must be possible to install and remove
> extensions by visiting https://extensions.gnome.org in the default web
> browser, after installing the required browser extension.
>
> #
>
> Do folks think this is important enough to block Final release on?
> Desktop folks, do you consider it "supportable"?

Discussed at the meeting today, and we definitely want this to work, and 
appreciate the bug report. We expect we'll be able to get it fixed for release. 
However, there's reluctance to broaden the scope of the criteria because our 
influence has limits, including the infrastructure aspects of extensions that 
we can't control (such as the web site itself). So we'd like to see this 
covered under existing criterion.


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Silverblue user mailing list??

2022-09-11 Thread Chris Murphy


On Fri, Sep 9, 2022, at 5:44 AM, Jack Craig wrote:
> hi all,
> 
> I've been subscribed to this list for a while and I have never seen any 
> traffic regarding Silverblue, is there a separate mailing list for 
> Silverblue??

Pretty sure most of it happens on Discourse.
https://discussion.fedoraproject.org/tag/silverblue


--
Chris Murphy___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-30 Thread Chris Murphy


On Tue, Aug 30, 2022, at 9:43 AM, Chris Murphy wrote:
> On Tue, Aug 30, 2022, at 8:27 AM, Richard W.M. Jones wrote:
>> Another is that LUKS filesystem decryption uses a deliberately
>> "memory-hard" algorithm called Argon2 which requires loads of RAM and
>> sometimes has problems running on a machine with 1GB and no swap.
>
> The built-in default for cryptsetup on Fedora is LUKS2 which uses 
> argon2id with parameters:
>   Iteration time: 2000, Memory required: 1048576kB, Parallel threads: 4
>
> It is possible to specify a different memory requirement at luksFormat 
> time. But I'm not sure if there's any warning emitted by cryptsetup if 
> there's significant memory pressure, i.e. high potential that a future 
> Fedora might fail to open this volume.

But yeah, if we have use cases where an encrypted image is created on a system 
or in a container with plenty of memory, thus the high memory requirement of 
the default applies, but then is later used with libguestfs in a container or 
VM with less memory available, it's a possible problem. I'm not really sure 
what the resolution for this is though. We'd either have to change the 
cryptsetup default to something like 512MB Fedora wide, or the burden is on the 
create time sysadmin to override the Fedora default.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-30 Thread Chris Murphy


On Tue, Aug 30, 2022, at 8:27 AM, Richard W.M. Jones wrote:
> Another is that LUKS filesystem decryption uses a deliberately
> "memory-hard" algorithm called Argon2 which requires loads of RAM and
> sometimes has problems running on a machine with 1GB and no swap.

The built-in default for cryptsetup on Fedora is LUKS2 which uses argon2id with 
parameters:
Iteration time: 2000, Memory required: 1048576kB, Parallel threads: 4

It is possible to specify a different memory requirement at luksFormat time. 
But I'm not sure if there's any warning emitted by cryptsetup if there's 
significant memory pressure, i.e. high potential that a future Fedora might 
fail to open this volume.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Request for testing: Fedora 37 pre-Beta validation tests

2022-08-30 Thread Chris Murphy


On Mon, Aug 29, 2022, at 8:36 PM, Josh Berkus wrote:
> On 8/29/22 17:22, Adam Williamson wrote:
>> It would be really great if we can get the validation tests run now so
>> we can find any remaining blocker bugs in good time to get them fixed.
>> Right now the blocker list looks short, but there are definitely some
>> tests that have not been run.
>
> Last I checked, flatpak was still broken.  Will retest this week.

What's broken with flatpak? I've been using several flatpaks OK since 'dnf 
system-upgrade' a week ago.


-- 
Chris Murphy
___
cloud mailing list -- cloud@lists.fedoraproject.org
To unsubscribe send an email to cloud-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/cloud@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Chris Murphy


On Mon, Aug 29, 2022, at 11:12 AM, Chris Murphy wrote:
> On Mon, Aug 29, 2022, at 11:10 AM, Adam Williamson wrote:

>> There *is* a workaround, BTW - I didn't mention this in my original
>> mail, and probably should have. At least according to discussion in the
>> bug, microdnf works OK. So you can use that instead.
>
> Yes, but will you be able to install it? Yes you could go to koji, 
> download the correct RPMs, and have rpm do it without dnf but... that'd 
> be a pretty saucy work around.

Can microdnf and dnf co-exist? If so, maybe the non-desktops should just 
include microdnf along side dnf? Or is this potentially a trap where microdnf 
can also fail for the same reason (i.e. it's not dnf, it's the size of the repo 
metadata)?


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Chris Murphy


On Mon, Aug 29, 2022, at 11:10 AM, Adam Williamson wrote:
> On Mon, 2022-08-29 at 10:53 +0200, Fabio Valentini wrote:
>> On Mon, Aug 29, 2022 at 9:53 AM Brian (bex) Exelbierd
>>  wrote:
>> > 
>> > I wonder if we should take another approach here. Assuming no serious bugs 
>> > in dnf, rather than tuning dnf for low memory environments could we 
>> > suggest those folks use Fedora Silverblue, CoreOS, or IoT?
>> 
>> Just speaking for myself: I have Fedora installations on 1G RAM VM
>> servers that I've been upgrading for many years now, and they just
>> keep chugging along as of Fedora 35. If I would need to either 1) pay
>> twice the money per month to keep this setup, or 2) spend a few days
>> reprovisioning the servers with Fedora CoreOS 36 (assuming it doesn't
>> suffer from the same problem), then I'd consider neither of these
>> options a desirable outcome.
>
> There *is* a workaround, BTW - I didn't mention this in my original
> mail, and probably should have. At least according to discussion in the
> bug, microdnf works OK. So you can use that instead.

Yes, but will you be able to install it? Yes you could go to koji, download the 
correct RPMs, and have rpm do it without dnf but... that'd be a pretty saucy 
work around.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: /etc/grub2.cfg Flagged a Potenially missing

2022-08-29 Thread Chris Murphy


On Sun, Aug 28, 2022, at 7:38 PM, Stephen Morris wrote:
> Hi,
>      /etc/extlinux.conf is flagged as missing

flagged as missing by what? This file is normally not created on any Fedora 
variant I'm aware of. It could be a legacy file.



>      /etc/grub2.cfg and /etc/grub2-efi.cfg both of which point to the 
> same file also display the same way as /etc/extlinux.conf, but in this 
> case the file pointed to actually does exist, and is linking to 
> /boot/grub2/grub.cfg, which I regularly write to with sudo and 
> grub2-mkconfig, 

There is no reason to regularly replace grub.cfg, it's a static file these 
days. The files that change are drop-in files found in /boot/loader/entries and 
can be modified with grubby per examples at:

https://fedoraproject.org/wiki/GRUB_2#Changing_kernel_command-line_parameters_with_grubby


-- 
Chris Murphy
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: After latest updates to F37 from updates testing, tab completion goes missing, wallpapoz stops working

2022-08-29 Thread Chris Murphy
There isn't enough information available to understand the problem. Please 
provide the complete /etc/fstab, blkid, and journalctl -b for a failing boot 
while booting with parameters:

systemd.log_level=debug rd.debug udev.log-priority=debug

That will sufficiently slow down the boot that if the problem is related to a 
race condition, the problem may not happen. If that's the case you'll have to 
do separate boots with one of the above parameters at a time to see which debug 
method exposes the cause.

--
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: [fedora-arm] Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Chris Murphy


On Mon, Aug 29, 2022, at 4:49 AM, Hans de Goede wrote:

> 1. ZRAM helps a lot here, but I guess with containers when limiting them
> to 1G you really only get 1G since ZRAM works on the system level not
> the container level. In the VM case though ZRAM should help, is ZRAM
> enabled ?  ZRAM is enabled by default for Workstation installs, but
> maybe not in other installs ?

swap on zram is used on all Fedora variants except CoreOS.


> 2. Maybe there are some other processes also taking up more RAM
> then expected causing extra memory pressure ?

I've found 'below' (in Fedora repo) very useful in tracking down processes that 
are contributing to memory, cpu, or io pressure - using cgroups accounting. 
It's possible to zoom in on a cgroup, see individual processes, their memory, 
io, cpu and swap activity. Pressure (PSI) is useful because it results in 
latencies, potentially everywhere else. So when you suspect bad behavior in 
your app, it might be because something else is soaking resources. Your app 
might be legitimately putting memory or cpu or io pressure on the system, 
that's the primary purpose of the setup, to service that app. So it can 
sometimes be difficult to figure out whether your app's resource requirements 
are reasonable/normal or if it's run away.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: reversible dual-boot test station

2022-08-23 Thread Chris Murphy
I've added a section how to modify /etc/kernel/cmdline in the snapshot before 
rebooting.

https://fedoraproject.org/wiki/User:Chrismurphy/Draft/dualboot_teststation


--
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: reversible dual-boot test station

2022-08-23 Thread Chris Murphy


On Tue, Aug 23, 2022, at 10:54 AM, Steven A. Falco wrote:

> Under "Setup" it says:
>
> rm /etc/kernel/cmdline /etc/kernel/cmdline
>
> Shouldn't it just be:
>
> rm /etc/kernel/cmdline

Yep. Fixed. Thanks!

However, due to recent changes in grub currently in updates-testing for both 36 
and 37, I'm no longer confident in this write up and have to retest. That 
/etc/kernel/cmdline can contain stale information has broken this use case at 
the moment, so I need to see if there's a better work around than deleting this 
file.

-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: reversible dual-boot test station

2022-08-23 Thread Chris Murphy


On Sun, Aug 21, 2022, at 2:31 PM, Chris Murphy wrote:

>
> https://fedoraproject.org/wiki/User:Chrismurphy/Draft/dualboot_teststation

I found a small problem, fixed in the latest version.

Gory details:

If you've ever used grubby, an /etc/kernel/cmdline file is created that 
contains the current subvolume name, e.g. rootflags=subvol=root36. But then 
when you snapshot it and boot e.g. root37, when performing the upgrade the 
existence of this file causes /etc/grub.d/10_linux to favor that old root. So 
the new BLS snippet for Fedora 37 contains rootflags=subvol=root36 instead of 
root37.

The file can safely be removed or renamed so I added that to the setup section 
instructions.

-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: mount fails for btrfs filesystem, need help please.

2022-08-22 Thread Chris Murphy


On Mon, Aug 22, 2022, at 7:41 PM, George R Goffe via test wrote:
> Howdy,
>
> Thanks to all who responded...
>
> Chris,
>
> I tried the superblock mount but that still fails. Then I tried the 
> rescue=all mount. That succeeded... I have copied all the files I need. 
> From what I read, corrupted files get copied too... and there were some 
> which I removed from the copies.

It does disable data checksum verification, so it's possible. It's a valid 
option to use the individual option method, leaving data checksumming in place, 
e.g.

mount -o ro,rescue=usebackuproot,nologreplay,ibadroots

in this case it will complain about corrupt file blocks and won't let them be 
copied out. How this gets handled depends on the application - some 
applications stop at the first bad file. Others continue reading the rest of 
the same file, then stop. Still others continue reading all file blocks.



> From 
> "https://lists.fedoraproject.org/archives/search?mlist=users%40lists.fedoraproject.org=parent+transid+verify+failed;
>  
> I found some other commands that you wrote. I presume after unmounting 
> this problematic filesystem. Is it time to run them?

Try "mount -o rescue=usebackuproot" this is also used by rescue=all, but 
permits rw mount. If it works, the current damaged root tree will be replaced 
by a good one.


> btrfs rescue zero-log 
> btrfs check --repair --init-extent-tree 
> btrfs check --repair

I don't think any of these are indicated for this problem. 

Zero log is harmless, but the messages don't indicate a problem related to the 
tree log.

Init extent tree is taking a big chance It might work, it might make things 
worse. And it'll take a while. I'd just take advantage of the ro rescue mount 
to get your data out such as it is. And then mkfs time. Wipe it and clean 
install, restore from backups. It's the more reliable way of getting back to 
good.

But it's useful to look at logs over the last couple days to see if there's 
prior evidence of problems and what they might be. Because it sounds to me like 
the hardware has become unreliable in some way.


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: mount fails for btrfs filesystem, need help please.

2022-08-22 Thread Chris Murphy


On Mon, Aug 22, 2022, at 11:47 AM, Chris Murphy wrote:
> On Mon, Aug 22, 2022, at 11:46 AM, Chris Murphy wrote:
>
>> After that, you can umount the file system. And mount again with '-o 
>> rescue=usebackuproot' and hopefully it finds a good backup root, and 
>> can fix itself. If it gets confused again, it'll go read only to avoid 
>> making things worse.
>
> This mount is just a one time thing, assuming it works. You can just 
> umount, and then reboot normally. 

Also, generally easier to ask for me (cmurf) on 
https://matrix.to/#/#fedora:fedoraproject.org to ask about Btrfs questions; or 
if I'm not around ask on #btrfs:libera.chat


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: mount fails for btrfs filesystem, need help please.

2022-08-22 Thread Chris Murphy


On Mon, Aug 22, 2022, at 11:46 AM, Chris Murphy wrote:

> After that, you can umount the file system. And mount again with '-o 
> rescue=usebackuproot' and hopefully it finds a good backup root, and 
> can fix itself. If it gets confused again, it'll go read only to avoid 
> making things worse.

This mount is just a one time thing, assuming it works. You can just umount, 
and then reboot normally. 


-- 
Chris Murphy
___
test mailing list -- test@lists.fedoraproject.org
To unsubscribe send an email to test-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


  1   2   3   4   5   6   7   8   9   10   >