Skip to content
Menu
Open World News Open World News
  • Privacy Policy
Open World News Open World News

Category: News

Strengthening the African Framework within Wikimedia Communities: AWA Quarterly Conferences Recap

Posted on November 25, 2024 by Michael G
In the September and October 2024 sessions, the African Wikipedian Alliance (AWA) brought together Anglophone and Francophone Wikimedia communities for their quarterly conferences under the…

unwind: wildcard in blacklist

Posted on November 25, 2024 by Michael G

Soon, unwind will have support wildcard in blacklist.

Here, a change that makes any domain in the blacklist that starts with ‘.’, which is not a legal name due to an empty label, is treated as any subdomain on that zone.

This means that .example.com blocks all requests to any subdomain of example.com, but allows example.com.

Changes: https://marc.info/?l=openbsd-cvs&m=173244784522937&w=2

GNU Guix: Guix/Hurd on a Thinkpad X60

Posted on November 25, 2024 by Michael G

A lot has happened with respect to the Hurd
since our Childhurds and GNU/Hurd
Substitutes

post. As long as two years ago some of you have been
asking
for a
progress update and although there have been
rumours

on a new blog post for over a year, we
were
kind of
waiting for
the rumoured x86_64
support
.

With all the exciting progress on the Hurd coming available after the
recent (last?) merger of
core-updates

we thought it better not to
wait
any
longer. So here is a short overview of our Hurd work over the past
years:

  • Update Hurd to 3ff7053, gnumach 1.8+git20220827, and fix build
    failures
    ,

  • A native compilation fix for
    gcc-boot0
    ,

  • Initial rumpdisk
    support
    ,
    more on this below, which needed to
    wait

    for:

  • A libc specific to
    Hurd
    ,
    updating gnumach to 1.8+git20221224 and hurd to 0.9.git20230216,

  • Some 40 native package build fixes for the
    Hurd

    so that all development dependencies of the guix package are now
    available,

  • A hack to use Git source in commencement to update and fix cross
    build and native build for the
    Hurd
    ,

  • Support for buiding guix natively on the Hurd by splitting the
    build into more steps for 32-bit
    hosts

  • Even nicer offloading support for Childhurds by introducing Smart
    Hurdloading

    so that now both the Bordeaux and Berlin build farms build
    packages for i586-gnu,

  • Locale fixes for wrong glibc-utf8-locales package used on
    GNU/Hurd
    ,

  • More locale fixes to use glibc-utf8-locales/hurd in
    %standard-patch-inputs
    ,

  • And even more locale fixes for using the right locales on
    GNU/Hurd
    ,

  • A new glibc
    2.38

    allowing us to do (define-public glibc/hurd glibc)—i.e., once
    again use the same glibc for Linux and Hurd alike, and: Better
    Hurd support!,

  • Creation of hurd-team
    branch

    with build fixes, updating gnumach to 1.8+git20230410 and hurd to
    0.9.git20231217,

  • A constructive meeting with sixteen people during the Guix
    Days

    just before FOSDEM ’24 with
    notes

    that contain some nice ideas,

  • Another new glibc
    2.39
    ;
    even better Hurd support, opening the door to x86_64 support,

  • Yet another restoring of i586-gnu (32-bit GNU/Hurd)
    support
    ,

  • The installer just learnt about the
    Hurd
    !
    More on this below, and finally,

  • Another set of updates: gnumach (1.8+git20240714), mig
    (1.8+git20231217), hurd (0.9.git20240714), netdde (c0ef248d),
    rumpkernel (f1ffd640), and initial support for x86_64-gnu, aka
    the 64bit
    Hurd
    .

NetDDE and Rumpdisk support

Back in 2020, Ricardo Wurmus added the NetDDE
package

that provides Linux 2.6 network drivers. At the time we didn’t get to
integrate and use it though and meanwhile it bitrotted.

After we resurrected the NetDDE
build
,
and with kind help of the Hurd
developers

we finally managed to support NetDDE for the
Hurd.
.
This allows the usage of the Intel 82573L Gigabit Ethernet Controller
of the Thinkpad X60 (and many other network cards, possibly even
WIFI). Instead of using the builtin kernel driver in GNU Mach, it
would be running as a userland driver.

What sparked this development was upstream’s NetBSD rumpdisk support
that would allow using modern hard disks such as SSDs, again running
as a userland driver. Hard disk support builtin in GNU Mach was
once considered to be a nice hack but it only supported disks up to
128 GiB…

First, we needed to fix the cross build on
Guix
.

After the initial attempt at rumpdisk support for the
Hurd

it took
(v2)

some
(v3)

work
(v4)

to finally arrive at rumpdisk support for the Hurd, really, *really*
(v5)

Sadly when actually using them, booting hangs:

start: pci.arbiter:

What did not really help is that upstream’s rumpkernel archive was
ridiculously
large
.
We managed to work with upstream to remove unused bits from the
archive. Upstream created a new archive that instead of 1.8 GiB (!) now
“only” weighs 670 MiB.

Anyway, after a lot of building, rebuilding, and debugging and some
more with kind help from
upstream

we finally got Rumpdisk and NetDDE to run in a
Childhurd
.

GNU Guix: Guix/Hurd on a Thinkpad X60

Initial Guix/Hurd on the Thinkpad X60

Now that the last (!) core-updates merge has finally happened (thanks
everyone!), the recipe of installing Guix/Hurd has been much
simpfilied. It goes something along these lines.

  1. Install Guix/Linux on your X60,

  2. Reserve a partition and format it for the Hurd:

    mke2fs -o hurd -L hurd /dev/sdaX
  3. In your config.scm, add some code to add GRUB menuentries for
    booting the Hurd, and mount the Hurd partition under /hurd:

    (use-modules (srfi srfi-26)
                 (ice-9 match)
                 (ice-9 rdelim)
                 (ice-9 regex)
                 (gnu build file-systems))
    
    (define %hurd-menuentry-regex
      "menuentry "(GNU with the Hurd[^{"]*)".*multiboot ([^ n]*) +([^n]*)")
    (define (text->hurd-menuentry text)
      (let* ((m (string-match %hurd-menuentry-regex text))
             (label (match:substring m 1))
             (kernel (match:substring m 2))
             (arguments (match:substring m 3))
             (arguments (string-split arguments #space))
             (root (find (cute string-prefix? "root=" <>) arguments))
             (device-spec (match (string-split root #=)
                            (("root" device) device)))
             (device (hurd-device-name->device-name device-spec))
             (modules (list-matches "module ([^n]*)" text))
             (modules (map (cute match:substring <> 1) modules))
             (modules (map (cute string-split <> #space) modules)))
        (menu-entry
         (label label)
         (device device)
         (multiboot-kernel kernel)
         (multiboot-arguments arguments)
         (multiboot-modules modules))))
    
    (define %hurd-menuentries-regex
      "menuentry "(GNU with the Hurd[^{"]*)" \{([^}]|[^n]\})*n\}")
    (define (grub.cfg->hurd-menuentries grub.cfg)
      (let* ((entries (list-matches %hurd-menuentries-regex grub.cfg))
             (entries (map (cute match:substring <> 0) entries)))
        (map text->hurd-menuentry entries)))
    
    (define (hurd-menuentries)
      (let ((grub.cfg (with-input-from-file "/hurd/boot/grub/grub.cfg"
                        read-string)))
        (grub.cfg->hurd-menuentries grub.cfg)))
    
    ...
    (operating-system
       ...
      (bootloader (bootloader-configuration
                   (bootloader grub-bootloader)
                   (targets '("/dev/sda"))
                   (menu-entries (hurd-menuentries))))
      (file-systems (cons* (file-system
                             (device (file-system-label "guix"))
                             (mount-point "/")
                             (type "ext4"))
                           (file-system
                             (device (file-system-label "hurd"))
                             (mount-point "/hurd")
                             (type "ext2"))
                           %base-file-systems))
      ...)
  4. Create a config.scm for your Hurd system. You can get
    inspiration from bare-hurd.tmpl
    and inherit from %hurd-default-operating-system. Use
    grub-minimal-bootloader and add a static-networking-service-type.
    Something like:

    (use-modules (srfi srfi-1) (ice-9 match))
    (use-modules (gnu) (gnu system hurd))
    
    (operating-system
      (inherit %hurd-default-operating-system)
      (bootloader (bootloader-configuration
                   (bootloader grub-minimal-bootloader)
                   (targets '("/dev/sda"))))
      (kernel-arguments '("noide"))
    ...
      (services
        (cons*
          (service static-networking-service-type
                   (list %loopback-static-networking
                         (static-networking
                          (addresses
                           (list
                            (network-address
                             (device "eth0")
                             (value "192.168.178.37/24"))))
                          (routes
                           (list (network-route
                                  (destination "default")
                                  (gateway "192.168.178.1"))))
                          (requirement '())
                          (provision '(networking))
                          (name-servers '("192.168.178.1")))))
        ...)))
  5. Install the Hurd. Assuming you have an ext2 filesystem mounted
    on /hurd, do something like:

    guix system build --target=i586-pc-gnu vuurvlieg.hurd --verbosity=1
    sudo -E guix system init --target=i586-pc-gnu --skip-checks 
        vuurvlieg.hurd /hurd
    sudo -E guix system reconfigure vuurvlieg.scm
  6. Reboot and…

Hurray!

We now have Guix/Hurd running on
Thinkpad
.

Guix/Hurd GRUB menu on ThinkpadX60

Guix/Hurd running on ThinkpadX60

Guix/Hurd on Real Iron

While the initial manual install on the X60 was an inspiring
milestone, we can do better. As mentioned above, just recently the
installer learnt about the
Hurd
,
right after some smaller problems were addressed, like guix system init creating essential devices for the Hurd, not attempting to run a
cross-built grub-install to install Grub, soft-coding the hard-coded
part:1:device:wd0 root file-system, adding support for booting
Guix/Hurd more than once.

To install Guix/Hurd, first, build a 32bit installation image and copy
it to a USB stick:

guix system image --image-type=iso9660 --system=i686-linux gnu/system/install.scm
dd if=/gnu/store/cabba9e-image.iso of=/dev/sdX status=progress
sync

then boot it on a not-too-new machine that has wired internet
(although installation over WIFI is possible, there is currently no
WIFI support for the installed Hurd to use it). On the new Kernel
page:

Installer Kernel page

choose Hurd. Do not choose a desktop environment, that’s not
available yet. On the Network management page:

Installer Network management page

choose the new Static networking service. In the final
Configuration file step, don’t forget to edit:

Installer Configuration file page

and fill-in your IP and GATEWAY:

Installer Edit static networking

You may want to add some additional packages such as git-minimal
from (gnu packages version-control) and sqlite from (gnu packages sqlite).

If you also intend to do Guix development on the Hurd—e.g., debugging
and fixing native package builds—then you might want to include all
dependencies to build the guix package, see the
devel-hurd.tmpl
for inspiration on how to do that. Note that any package you add must
already have support for cross-building.

Good luck, and let us know if it works for you and on what kind of
machine, or why it didn’t!

What’s next?

In an earlier
post

we tried to answer the question “Why bother with the Hurd anyway?” An
obvious question because it is all too easy to get
discouraged
, to downplay or underestimate the
potential social impact of GNU and the Hurd.

The most pressing problem currently is that the guix-daemon fails
when invoking guix authenticate on the
Hurd
, which means that we cannot
easily keep our substitutes up to date. guix pull is known to work
but only by pulling from a local branch doing something like:

mkdir -p ~/src/guix
cd src/guix
git clone https://git.savannah.gnu.org/git/guix.git master
guix pull --url=~/src/guix/master

kinda like we did it in the old days. Sometimes it seems that guix
does not grok the sqlite store database. This is needs to be resolved
but as sqlite does read it this can be easily worked around by doing
something like:

mv /var/guix/db/db.sqlite /var/guix/db/db.sqlite.orig
sqlite3 /var/guix/db/db.sqlite.orig .dump > /var/guix/db/db.sqlite.dump
sqlite3 -init /var/guix/db/db.sqlite.dump /var/guix/db/db.sqlite .quit

Also, the boot process still fails to handle an unclean root file
system. Whenever the Hurd has suffered an unclean shutdown, cleaning
it must currently be done manually, e.g., by booting from the
installer USB stick.

Upstream now has decent support for 64bit (x86_64) albeit with more
bugs and fewer
packages
.
As mentioned in the overview we are now
working

to have
that

in
Guix

and have
made

some progress:

Hello Guix 64bit Hurd

more on that in another post. Other interesting task for Guix
include:

  • Have guix system reconfigure work on the Hurd,
  • Figure out WiFi support with NetDDE (and add it to installer!),
  • An isolated build
    environment
    (or better
    wait for, err, contribute to the Guile
    guix-daemon
    ?),
  • An installer running the Hurd, and,
  • Packages, packages, packages!

We tried to make Hurd development as easy and as pleasant as we could.
As you have seen, things start to work pretty nicely and there is
still plenty of work to do in Guix. In a way this is “merely
packaging” the amazing work of others. Some of the real work that
needs to be done and which is being discussed and is in progress right
now includes:

  • Audio support (this is
    sponsored by NLnet, thanks!),
  • Rumpnet,
  • SMP,
  • AArch64.

All these tasks look daunting, and indeed that’s a lot of work ahead.
But the development environment is certainly an advantage. Take an
example: surely anyone who’s hacked on device drivers or file systems
before would have loved to be able to GDB into the code, restart it, add
breakpoints and so on—that’s exactly the experience that the Hurd
offers. As for Guix, it will make it easy to test changes to the
micro-kernel and to the Hurd servers, and that too has the potential to
speed up development and make it a very nice experience.

Join #guix and #hurd on
libera.chat or the mailing
lists
and get involved!

Managing third-party packages in 9front

Posted on November 25, 2024 by Michael G
Every now and then, news from the club I’m too cool to join, the plan9/9front community, pierces the veil of coolness and enters our normal world. This time, someone accidentally made a package manager for 9front. I’ve been growing tired of manually handling random software, so I decided to find a simple way to automate the process and ended up making a sort of “package manager” for 9front¹. It’s really just a set of shell scripts that act as a frontend for git and keep a simple database of package names and URLs. Running the pkginit script will ask for a location to store the source files for installed packages (/sys/pkg by default) which will then be created if non-existent. And that’s it! No, really. Now you can provide a URL for a git repository to pkg/add. ↫ Kelly “bubstance” Glenn As I somehow expected from 9front, it’s quite a simple and elegant system. I’m not sure how well it would handle more complex package operations, but I doubt many 9front systems are complex to begin with, so this may just be enough to take some of the tedium out of managing software on 9front, as the author originally intended. One day I will be cool enough to use 9front. I just have to stay cool.

Extra – Puntata di Venerdì 22 Novembre 2024 con Gaetano Alaimo, direttore NewTuscia.it

Posted on November 24, 2024 by Michael G
DOVE SEGUIRCI

GUARDARCI IN TV SUL DIGITALE TERRESTRE:

Radio Roma News al canale 14 del DTT in tutta la Regione Lazio

Radio Roma al canale 15 del DTT in tutta la Regione Lazio

ASCOLTACI IN RADIO SU FM | DAB:

Roma 104.0 FM
Latina 87.8 FM
Rieti 91.8 FM
Viterbo 90.8 FM
Frosinone 98.8 FM

Resta aggiornato sulle notizie di Roma e della Regione Lazio tramite il quotidiano d’informazione Radioroma.it

Sito della prima radio-tv della capitale: https://www.radioroma.tv/

WhatsApp: +39 3202393833

SCARICA L’APP:

iPhone, iPad, Apple Car Play ed Apple Tv sull’Apple Store

Smartphone, Android Auto ed Android Tv su Google Play Store e Huawei su AppGallery

TIMvision, Amazon Fire Stick e WebOS Tv per Samsung LG.

COP29 termina com acordo de financiamento climático de 300 mil milhões de dólares por ano para os…

Posted on November 24, 2024 by Michael G
Depois de se ter receado que as conversações sobre o clima em Baku pudessem entrar em colapso, o martelo foi batido num acordo financeiro nas primeiras horas da manhã.

Married… with Children S01 – 03 – stores are still open

Posted on November 24, 2024 by Michael G
reminiscent movie scenes

Married… with Children S01 – 03 – stores are still open

How To Scan Your Website For Free To Find SEO Errors – Say V: Itay Verchik IVBS SEO / PPC

Posted on November 24, 2024 by Michael G
How To Scan Your Website For Free To Find SEO Errors – Say V:
https://itayverchik.com/scan-seo-errors/

Want to scan your website for SEO errors – for free? With Say V, you can perform a comprehensive analysis of your site, identify SEO issues, and take steps to improve your website’s search engine performance.

In this video, I’ll show you how to use Say V to analyze your site, detect issues like broken links, missing meta tags, content problems, and more. I’ll also guide you through fixing these errors and optimizing your site for better visibility on Google and other search engines.

Say V is an excellent tool for business owners, web developers, and digital marketers looking for a reliable, free solution to boost their SEO game.

Don’t forget to subscribe and hit the bell icon to stay updated on more SEO tutorials, digital marketing tips, and professional tools. If this video helps you, give it a thumbs up and share it with others!

In this video, you’ll learn:

How to scan your website for free using Say V.
How to identify and fix SEO errors.
Pro tips to enhance your site’s visibility on search engines.

Don’t miss more tutorials on the channel:
https://www.youtube.com/c/ItayVerchik?sub_confirmation=1

To Sign Up For The Keywords Tracking System:
https://say-v.com/

Join now the community of Webmasters and SEO Marketers completely free:
https://www.facebook.com/groups/itayverchik

To purchase Elementor Pro, the world’s best WordPress page designer:
https://trk.elementor.com/2500

Don’t Have A Web Hosting Account Yet Or Are You Just Not Satisfied With Your Existing Hosting?
Get A 25% Discount For Cloudways Web Hosting For The First 3 Months:
https://platform.cloudways.com/signup?id=314159&coupon=VERCHIK

Thank you for watching!
If you have any questions or suggestions for future topics, drop a comment below. I’d love to help!

Server monitoring (CPU, memory, storage) with rails_performance gem

Posted on November 24, 2024 by Michael G
https://github.com/igorkasyanchuk/rails_performance?tab=readme-ov-file#server-monitoring . With every new release getting closer to the NewRelic/Datadog free and self-hosted alternative 🙂 Now you can monitor your server CPU load, memory, and storage with the latest gem release.

gnuboot @ Savannah: GNU Boot November 2024 News

Posted on November 24, 2024 by Michael G

A lot has changed since the two last news from the GNU Boot project.

GNU Boot install party in Paris the 7 and 8 December 2024


People involved in the GNU Boot project will be organizing a 100% free

software install party within a bigger event that also has a regular

install party. There will also be a presentation about 100% free

software in there. The event will be mainly in French.

More details are available in French and in English in the following

link:

https://lists.gnu.org/archive/html/help-guix/2024-11/msg00112.html

GNU Boot 0.1 RC4


Many changes were made since the RC3 and since then we fixed an

important bug that prevented Trisquel from booting (If during the

Trisquel installation you chose “LVM2” and didn’t encrypt the

storage, GNU Boot images with GRUB would not find the Trisquel

installation).

Because of that we decided to do a new RC4 (release candidate 4)

and to publish new GNU Boot images.

There are still some work needed before doing a 0.1 release as we want

to make it easier for less technical users to install and use GNU

Boot, but more and more of the project structure are getting in place

(website, manual, automatic tests, guix, good development procedures,

enabling build on all distributions, etc) which then makes it easier

to contribute.

We also decided to use Guix for more of the software components

we build, and since this is a big change, we will need people to

help more with testing.

Nonfree software found again, no supported device affected.


The last announcement we made was “Nonfree software found in GNU Boot

releases again, many distros affected”[1].

Some people misunderstood it (maybe we could have been more clear):

the nonfree software that we found was code that GNU Boot didn’t use,

so it was easy to remove and it didn’t affect the supported devices in

any way.

Finding nonfree software in 100% free distribution is also common:

this is part of the work to ensure these distribution remains 100%

free.

The first time it happened in GNU Boot we publicized it to explain why

we were re-releasing some of the GNU Boot files as it could be very

scary if this happens without any public communication.

The second time we published a news about it mainly to help propagate

the information to the affected distributions and this is probably why

it was misunderstood: it was mainly targeted at GNU Boot users and

maintainers of the affected packages. We also contacted upstream and

some affected distributions directly as well but contacting everybody

takes a lot of time so having a news about it helps. At least Debian

and Trisquel fixed the issue but we still need to contact some

distributions.

After that, and probably thanks to the previous news, Leah Rowe

contacted us on one of the GNU Boot mailing lists[2] to notify us that

she also found additional similar nonfree software in GNU Boot.

So we confirmed that and promptly removed them and re-made again the

source release. And here again even if the work was delayed a bit,

this was fast to do and it doesn’t affect the supported devices in any

way.

But we also need help contacting distributions again because one of

the issue she found is very serious because it affects many

distributions and also important devices that GNU Boot doesn’t

support.

The ARM trusted firmware ships a nonfree hdcp.bin binary in its source

code. ARM trusted firmware is a dependency of u-boot that is used to

support many ARM computers in other distributions (like Guix, Debian,

etc).

As contacting affected distributions is a tedious task, we also need

help to propagate the information and contact them especially because

we don’t know if Leah intend or not to do that work (so far she didn’t

reply when asked twice about it), so it’s probably up to the GNU Boot

community as a whole (which also includes its maintainers and readers

of this news) to help here.

The details are in the commit 343515aee7ef34695ac45830fad419d9562f9c15

(“coreboot: blobs.list: arm-trusted-firmware: Remove RK3399 hdcp.bin

firmware.”) in the GNU Boot source code[3].

[1]https://savannah.gnu.org/news/?id=10684

[2]https://lists.gnu.org/archive/html/gnuboot-patches/2024-10/msg00028.html

[3]https://git.savannah.gnu.org/cgit/gnuboot.git/commit/?id=343515aee7ef34695ac45830fad419d9562f9c15

Website and documentation


Jordán (isf) has been contributing some Spanish translations of the

most important website pages (the landing, status and how to

contribute pages). This is important as it could help get more

contributors. These contributions also helped us improve the process

for accepting pseudonymous contributions and enabled us to fix issues.

The work on improving the website in general also continued. Many of

the website pages were reviewed and improved (there is a lot of work

there and mentioning it all would make the news way too long).

The website also now shows the git revision from which it is build and

we also helped the FSF fix some server configuration that created

issue with the deployment of the GNU Boot website (more details are in

the commit message[1]) by reporting the issue to them and testing the

fix.

Patches for making a manual are also being reviewed. While there isn’t

much in the manual yet, it also enables to better organize the

documentation and it has the potential to make GNU Boot more

accessible to less technical people.

The next goals is to look how to merge part of the website inside the

manual and continue improving both the website and the manual.

[1]https://git.savannah.gnu.org/cgit/gnuboot.git/commit/?id=d1df672383f6eb8d4218fdef7fbe9ec5e41803e4

Authenticating GNU Boot source code


We now have the ability to verify the source code when downloading it

from git. This is important to avoid certain type of attacks and it

also enables to write code to automatically download, verify and build

the GNU Boot source code.

The source can be verified with the following command (it requires to

have Guix installed):

 $ guix git authenticate $(git rev-parse HEAD)

  “E23C 26A5 DEEE C5FA 9CDD  D57A 57BC 26A3 6871 16F6”

  -k origin/keyring

If the authentication works it will print a message like that:

    guix git: successfully

    authenticated commit 05c09293d9660ea1f26b5b705a089b466a0aa718

The 05c09293d9660ea1f26b5b705a089b466a0aa718 might be different in

your case.

The “E23C 26A5 DEEE C5FA 9CDD D57A 57BC 26A3 6871 16F6” part in the

command above is Adrien Bourmault (neox)’s GPG key.

How to use that will be documented more in depth in the upcoming GNU

Boot manual that is currently being reviewed. Its importance will also

be explained in more details for people not familiar with the security

issues it’s meant to solve. Also note that we also welcome help for

reviewing patches.

Licensing


The GNU Boot source code has a complex history. It is based on the

last fully free software releases of Libreboot. And the Libreboot

source code history is very complex.

We found some missing authorship information in some of the files that

come from Libreboot and so we started such information from the

various git repositories that were used at some point by Libreboot or

some of the projects it was based on.

To help with this task we also added a page on the GNU Boot website

(https://www.gnu.org/software/gnuboot/web/docs/history/) to track the

status of the reconstruction of the missing authorship and to document

the GNU Boot source code history.

Upstream contributions and easier building of GNU Boot


GNU Boot is just a distribution and like most distributions, it tries

to collaborate with various upstream projects whenever possible.

Since GNU Boot relies on Guix, we improved the Guix documentation

directly to help people install Guix on Trisquel and Parabola. We also

helped Trisquel fix security issues in the Guix package by bug

reporting and testing fixes (some bugs still need to be fixed in

Parabola and Debian, and reporting issues upstream takes time).

Since we also advise to use PureOS or Trisquel to build GNU Boot we

also enabled people with Guix to produce PureOS or Trisquel chroots

with Debootstrap. This was done through contributions to Debootstrap,

and to the Guix Debootstrap package. We could then mention that in the

GNU Boot build documentation

(https://www.gnu.org/software/gnuboot/web/docs/build/) and added a

script (in contrib/start-guix-daemon.py) to support building GNU Boot

in chroots. However there are still issue with the build in chroots

that need to be fixed to producing all released files. Instructions on

how to do build in chroots is also lacking.

In addition we also added the ability to build GNU Boot with Trisquel

11 (aramo).

An apt-cacher-ng package was also contributed in Guix upstream as it

can then be used to speed-up one of the automatic tests used in GNU

Boot but the support for apt-cacher-ng was not integrated yet in GNU

Boot. Last year we also contributed a GRUB package in Guix but we

didn’t have the occasion to use it yet. It will probably happen soon

though.

Building GNU Boot


How to build GNU Boot has changed a lot since GNU Boot 0.1 RC3.

Before Guix could only be optionally used to build the website.

In addition to that, Guix is now integrated in the build system so we

can now rely on Guix packages to build GNU Boot images. This also

means that you need to install Guix to build GNU Boot images.

We currently use Guix packages to build some tests. We also build some

installation utilities for the I945 ThinkPads (ThinkPad X60, X60s,

X60T and T60) but we don’t have documentation for less technical

people yet on how to use them. We also would need help for testing

these computers as we have no idea if they still work fine or which

fully free distributions still work on them in practice.

We now also support the ‘./configure’ and ‘make’ commands to build GNU

Boot but not yet the ‘make install’ command as to work we would need

to adapt many of the scripts that are used during the build to be

compatible with that.

There is also less visible work that was done, like cleaning up a lot

of code, adding tests for code quality, documenting a bit the GNU Boot

source code structure, and so on.

Work on making GNU Boot reproducible also started. See

https://reproducible-builds.org/ or

https://en.wikipedia.org/wiki/Reproducible_builds for more detail on

the issue.

We took an extremely strict approach and put the checksum of some of

the things we build directly into GNU Boot and verify it the checksum

during the compilation. This enables us to automatically detect

issues without having to do anything.

We started to enable that for easy things, and we also added the

infrastructure to also use that in Guix packages as well by validating

one of the packages we use during automatic testing.

However at one point this guix package stopped being

reproducible. Since we wanted to keep that code (especially as it was

showing a good example of how to do it), we fixed the bug instead of

removing the test.

This then helped us detect a very subtle and interesting bug in one of

the components we use for automatic tests.

The bug could not be caught during testing because some time

information stored inside the FAT32 file system has a granularity of a

day, and since all the testing happened the same day, it was caught

only later on.

This bug was then fixed and the details are in the fix[1]. A bug

report was also opened upstream because bugs were found in diffoscope

along the way[2]. We still need to do some testing though to

understand if the bug is in diffoscope or one of the underlying

libraries (libguestfs) and then to report the remaining bugs to the

distributions we used during this work.

We also made it easier to update the checksum in the Guix package. If

you package software with Guix, this change is also a good example of

how not to break the ‘–without-tests’ option when you override the

tests in the package you contribute. The commit message[3] and the

change have more details and references on all that.

[1]https://git.savannah.gnu.org/cgit/gnuboot.git/commit/?id=4c3de49fbb3b43940b43f8fdccc8e51ee7df8f46

[2]https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/390

[3]https://git.savannah.gnu.org/cgit/gnuboot.git/commit/?id=40fcb94e2f7ab1df8d320f78311e623f801d8602

LVM2 bug


WodeShengli reported a very important bug[1]: GNU Boot images with

GRUB can’t find LVM2 partitions if the partition itself is not

encrypted. For instance if you have LVM2 and no encryption at all or

if the disk is encrypted and that on top you have LVM2, GNU Boot will

not find the partition.

Since this is an extremely serious usability issue (because images

with GRUB are supposed to work out of the box) we spent time to fix

it.

The issue was that the GRUB configuration we ship hardcoded the name

of the LVM volumes to try to boot from. Fixing it required to be able

loop over all the partitions being found, but we found no command to

do that in GRUB (which is probably why the LVM partition names were

hardcoded in the first place).

So we started adding GRUB command options to do that but while the

code worked fine, it didn’t integrate in GRUB well. So we contacted

GRUB looking for help as we would have needed to upstream our command

option in GRUB anyway.

And we were told that GRUB already had a way to do what we were

looking for so we used that to fix the issue.

We also added tests that automatically download the Trisquel installer

and installs Trisquel with LVM2 and test if GNU Boot can boot the new

Trisquel installation[2].

While this test is skipped for 32bit computers, it is still good to

have as some people will run it. The test also paves the way to add

more tests that would enable us to improve further the GRUB

configuration without breaking the boot.

[1]https://savannah.gnu.org/bugs/index.php?65663

[2]https://git.savannah.gnu.org/cgit/gnuboot.git/commit/?id=860b00bf1e798d86c8bb2a70d77633599dfa1da2

[3]https://git.savannah.gnu.org/cgit/gnuboot.git/commit/?id=9cc02ddde1e164fabfbddc8bbd3832ef9468d92d

  • Previous
  • 1
  • …
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • …
  • 821
  • Next

Recent Posts

  • Open Source email Clients
  • When and how to use benchmarking
  • How Plotly AI revolutionizes the dashboard development process
  • [TUT] LoRa & LoRaWAN – MikroTik wAP LR8 kit mit The Things Network verbinden [4K | DE]
  • Mercado aguarda Powell e olha Trump, dados e Haddad | MINUTO TOURO DE OURO – 11/02/25

Categories

  • Android
  • Linux
  • News
  • Open Source
©2025 Open World News | Powered by Superb Themes
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT