From patchwork Fri Oct 11 01:01:07 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luis Chamberlain X-Patchwork-Id: 13831714 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C88344C96 for ; Fri, 11 Oct 2024 01:01:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.133 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728608474; cv=none; b=DQafX9F3lfXBL3a+fXecDpgxf8vqqfTUxveJP2dFyeUDtxPUo4aKHcGgDJFrl4veelTiQedOTmWCBHArNp6Ul9uHr2ZZrduV2S48B7/uncz6vs8ZP8mfy3caAebYjs9iKYkvqB6Cmu/Ow4iw8HM3UbT7s663mqqxbW4Z6Mu+9nE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728608474; c=relaxed/simple; bh=4B1Ju6MDioFRJGTLNcmOQSvpB2guBkqkDHtrec3s2ig=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Y/Gc9bWhmCiUATKw64gzKTSv9k8h1SpZzVplITRv2U+0RJEZW/nYD5WsewvCELDEkl032SzoIfSXePbE0vK3n23VBFwNHwTZGP08Z9NxlESTHgLyEdy07z4Xm/thOH6/X6z/pSZp861NHgk6iz5gggCKOkLZI8plk3SRKsyPAoQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=kernel.org; spf=none smtp.mailfrom=infradead.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b=lGpYwjFM; arc=none smtp.client-ip=198.137.202.133 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=kernel.org Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=infradead.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="lGpYwjFM" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Sender:Content-Transfer-Encoding: MIME-Version:Message-ID:Date:Subject:Cc:To:From:Reply-To:Content-Type: Content-ID:Content-Description:In-Reply-To:References; bh=cGj1sMAHbupdKKIseLaroJ8+RZN08g1Qon4ZRdv8Td0=; b=lGpYwjFM0y3vuVjvmPW6YwnCmv 4+e+UwI1CY+SiwSGAxkXx38zOWxhUDTcomWITfxLCUY318CZ/NbJ+OMVOLcgtL6Ri+/Kk5E/5LSsm xcU6hfuaiaMXbuHx5kfRioJE/OpYzMhvEjpRJ7ALcCUMDMcHpsNNmq+DMrw0hMo12qg7S3S83+x4F vRT87FgeBaK5QJs2CSC7MaZe9jBU5scE2ktLJhXI2Av2DX5Rq00g/76VZypdfdHm3FsKlSF7IOUJA cnM+kfzs/6l0F/bR5iH8cv4MsUaLvcSYdmBkCt16vkRLrE2qJvaffIsFxUKfEWcpy8nx9TQ1tFoYs 7le6hnnQ==; Received: from mcgrof by bombadil.infradead.org with local (Exim 4.98 #2 (Red Hat Linux)) id 1sz41o-0000000ErxI-1XQS; Fri, 11 Oct 2024 01:01:12 +0000 From: Luis Chamberlain To: kdevops@lists.linux.dev, ross@kallisti.us Cc: mcgrof@kernel.org Subject: [PATCH kdevops 0/4] kdevops: make trixie default Date: Thu, 10 Oct 2024 18:01:07 -0700 Message-ID: <20241011010111.3543993-1-mcgrof@kernel.org> X-Mailer: git-send-email 2.46.0 Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Sender: Luis Chamberlain Debian lacks its own directory index which can be used for guestfs. They should add one, though as support in kdevops shows, only a few minor things are needed, and since kdevops has figured out what those things are, it should be easy to use virt-builder on the backend on daily debian images for any release but in particular for debian 13 (trixie) which kdevops cares about a lot since we use it heavily for automated tests. I recently noted also that as we're ramping up kdevops kernel-CI integration with Meta's kernel-patch-daemon [0] for patchwork, we *want* to really get a squeeky clean experience for using debian testing. Development on that front has shown github likes to pretend that Ubuntu is the center of the Linux testing universe and because that it makes using github actions using github runners simply useless for kernel hacking [1]. To this end we need to start drawing up security policies to allow us to use and leverage any Linux distribution a developer prefers to use, for us to leverage a secure way to use self-hosted runners. To reduce bringup make debian trixie the default. This should reduce many bringup times. Although debian trixie hasn't been default for a while, many systems we've been testing for XFS testing / sysbench have been leveraging debian 13 with an upgrade when CONFIG_GUESTFS_COPY_SOURCES_FROM_HOST_TO_GUEST is enabled (debian host on trixie, /etc/apt/sources.list detected to be a local mirror, and guest is debian 12), and so in practice we've already have been testing trixie for a while now. This just makes bringup faster. But debian maintainers: could we please see if perhaps debian can leverage our findings to host official debian guestfs virt-builder images? kdevops shows what's needed to be done using existing images. [0] https://github.com/facebookincubator/kernel-patches-daemon [1] https://lore.kernel.org/kdevops/CAB=NE6VKWSkv1JZ_Z2LKq4o7+JBkKc6u8Wa1zxxBnGHOG4BgjA@mail.gmail.com/T/#u Luis Chamberlain (4): guestfs: make trixie generic image the default guestfs: fix uefi boot for debian trixie guestfs: fix trixie bringup guestfs: make debian trixie default kconfigs/Kconfig.guestfs | 16 +++++++++--- .../gen_nodes/templates/guestfs_q35.j2.xml | 2 +- scripts/bringup_guestfs.sh | 25 +++++++++++++++++++ workflows/linux/Kconfig | 2 +- 4 files changed, 40 insertions(+), 5 deletions(-)