Re: Thoughts welcome: interface between automated test gating and the "critical path"

2022-08-29 Thread DJ Delorie

It sounds to me like the problem is "how do we best use the available
automated test resources?" so I'll answer accordingly.  Ignore me if I
misunderstood ;-)

We currently have a small list of packages that are gated behind openQA,
and insufficient openQA resources to expand this list to all packages.

We also have a gating system based on karma, where users provide the QA
manually.  At least, one hopes.  The karma system has some
configurability for how much karma is needed, and for how long, etc.

What about a merger of those systems, where the openQA results count as
a type of user, contributing to the status?  Give each package a "QA
Priority" that ranges from "full gating" to "five second rule", where
the openQA resources and the user work together to prioritize and test
packages according to need:

* full gating requires all openQA tests to pass AND meet karma
  requirements, openQA does these first.

* partial gating is like above, but either one (openQA or karma) can be
  sufficient if enough time passes.

* reject only allows an openQA failure to reject an update, but the lack
  of openQA success need not stop it if it has enough karma. (glibc uses
  this paradigm - a ci/cd failure is an automatic reject, but a ci/cd
  pass adds nothing to the consensus needed)

... and so on down the list. Each user, including openQA, can "vote" a
pass or fail, and the rules say how all those passes and fails result in
the update's overall pass or fail.

This would allow the openQA resources to prioritize updates that it
knows *needs* openQA results, which allocating spare cycles to packages
that could benefit from testing but don't require it.  It also means
that additional openQA resources can be put to use immediately, while
still allowing for growth in critical path size, without being wasted on
unseen results.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Dusty Mabe


On 8/22/22 20:44, Adam Williamson wrote:
> Hey folks! I apologize for the wide distribution, but this seemed like
> a bug it'd be appropriate to get a wide range of input on.
> 
> There's a bug that was proposed as an F37 Beta blocker:
> https://bugzilla.redhat.com/show_bug.cgi?id=1907030
> 
> it's quite an old bug, but up until recently, the summary was
> apparently accurate - dnf would run out of memory with 512M of RAM, but
> was OK with 1G. However, as of quite recently, on F36 at least (not
> sure if anyone's explicitly tested F37), dnf operations are commonly
> failing on VMs/containers with 1G of RAM due to running out of RAM and
> getting OOM-killed.
> 
> There's some discussion in the bug about what might be causing this and
> potential ways to resolve it, and please do dig into/contribute to that
> if you can, but the other question here I guess is: how much do we care
> about this? How bad is it that you can't reliably run dnf operations on
> top of a minimal Fedora environment with 1G of RAM?

I think we need to stop thinking about this as just a single computer
problem.

In a containerized world you could have numerous containers running dnf
operations on a machine at any given time. Making the dnf operations take
less memory means we'll hit many fewer issues as single machines are
able to run many dnf operations at a given moment.

> 
> This obviously has some overlap with our stated hardware requirements,
> so here they are for the record:
> 
> https://docs.fedoraproject.org/en-US/fedora/latest/release-notes/welcome/Hardware_Overview/
> 
> that specifies 2GB as the minimum memory for "the default
> installation", by which I think it's referring to a default Workstation
> install, though this should be clarified. But then there's a "Low
> memory installations" boxout, which suggests that "users with less than
> 768MB of system memory may have better results performing a minimal
> install and adding to it afterward", which kinda is recommending that
> people do exactly the thing that doesn't work (do a minimal install
> then use dnf on it), and implying it'll work.
> 
> After some consideration I don't think it makes sense to take this bug
> as an F37 blocker, since it already affects F36, and that's what I'll
> be suggesting at the next blocker review meeting. However, it does seem
> a perfect candidate for prioritized bug status, and I've nominated it
> for that.
> 
> I guess if folks can chime in with thoughts here and/or in the bug
> report, maybe a consensus will emerge on just how big of an issue this
> is (and how likely it is to get fixed). There will presumably be a
> FESCo ticket related to prioritized bug status too.
> 
> Thanks folks!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[rpms/perl-Astro-FITS-CFITSIO] PR #1: Update to 1.16

2022-08-29 Thread Orion Poplawski

orion opened a new pull-request against the project: `perl-Astro-FITS-CFITSIO` 
that you are following:
``
Update to 1.16
``

To reply, visit the link below
https://src.fedoraproject.org/rpms/perl-Astro-FITS-CFITSIO/pull-request/1
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2120427] perl-Astro-FITS-CFITSIO-1.16 is available

2022-08-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2120427

Orion Poplawski  changed:

   What|Removed |Added

 Depends On||2122431





Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=2122431
[Bug 2122431] Review Request: perl-Alien-CFITSIO - Build and Install the
CFITSIO library
-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2120427
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Request for testing: Fedora 37 pre-Beta validation tests

2022-08-29 Thread Adam Williamson
Hey folks!

So we're in freeze for Fedora 37 Beta now, and the first go/no-go
meeting should be on September 8.

It would be really great if we can get the validation tests run now so
we can find any remaining blocker bugs in good time to get them fixed.
Right now the blocker list looks short, but there are definitely some
tests that have not been run.

You can use the testcase_stats view to find tests that need running:

https://openqa.fedoraproject.org/testcase_stats/37/

For each validation test set (Base, Desktop etc.) it shows when each
test was last performed. So you can easily look for Basic and Beta
tests that have not yet been run. We need to run all of these.

You can enter results using `relval report-results`, or edit the
summary results page at
https://fedoraproject.org/wiki/Test_Results:Current_Summary . That's a
redirect link which will always point to the validation results page
for the currently-nominated compose, which right now is 20220826.n.0.

Sumantro will be running a validation 'test week' starting on
Wednesday, so you can drop by the Fedora Test Day room on
chat.fedoraproject.org to hang out with other testers and get any help
you need in testing. See
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org/message/KVVU6JVOKF4WI4ZS6AFLB7IVBCCNKFCX/
for that announcement.

Thanks folks!
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Demi Marie Obenour
On 8/22/22 20:44, Adam Williamson wrote:
> Hey folks! I apologize for the wide distribution, but this seemed like
> a bug it'd be appropriate to get a wide range of input on.
> 
> There's a bug that was proposed as an F37 Beta blocker:
> https://bugzilla.redhat.com/show_bug.cgi?id=1907030
> 
> it's quite an old bug, but up until recently, the summary was
> apparently accurate - dnf would run out of memory with 512M of RAM, but
> was OK with 1G. However, as of quite recently, on F36 at least (not
> sure if anyone's explicitly tested F37), dnf operations are commonly
> failing on VMs/containers with 1G of RAM due to running out of RAM and
> getting OOM-killed.
> 
> There's some discussion in the bug about what might be causing this and
> potential ways to resolve it, and please do dig into/contribute to that
> if you can, but the other question here I guess is: how much do we care
> about this? How bad is it that you can't reliably run dnf operations on
> top of a minimal Fedora environment with 1G of RAM?
> 
> This obviously has some overlap with our stated hardware requirements,
> so here they are for the record:
> 
> https://docs.fedoraproject.org/en-US/fedora/latest/release-notes/welcome/Hardware_Overview/
> 
> that specifies 2GB as the minimum memory for "the default
> installation", by which I think it's referring to a default Workstation
> install, though this should be clarified. But then there's a "Low
> memory installations" boxout, which suggests that "users with less than
> 768MB of system memory may have better results performing a minimal
> install and adding to it afterward", which kinda is recommending that
> people do exactly the thing that doesn't work (do a minimal install
> then use dnf on it), and implying it'll work.
> 
> After some consideration I don't think it makes sense to take this bug
> as an F37 blocker, since it already affects F36, and that's what I'll
> be suggesting at the next blocker review meeting. However, it does seem
> a perfect candidate for prioritized bug status, and I've nominated it
> for that.
> 
> I guess if folks can chime in with thoughts here and/or in the bug
> report, maybe a consensus will emerge on just how big of an issue this
> is (and how likely it is to get fixed). There will presumably be a
> FESCo ticket related to prioritized bug status too.
> 
> Thanks folks!

This could be a problem for Qubes OS, so adding Marek in case he has something
to say about the subject.  Qubes OS does have 1G of swap by default, which
might help.
-- 
Sincerely,
Demi Marie Obenour (she/her/hers)


OpenPGP_0xB288B55FFF9C22C1.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Thoughts welcome: interface between automated test gating and the "critical path"

2022-08-29 Thread Kevin Fenzi
On Mon, Aug 29, 2022 at 03:50:02PM -0700, Adam Williamson wrote:
...snip...
> 
> I can think of I guess four options:
> 
> 1. Broaden the definition of the "critical path" somehow. We could just
> write in that it includes FreeIPA functionality, I guess, though that
> seems special purpose. We could broaden it to include any functionality
> covered by the release criteria, which would be quite a big increase
> but seems like a reasonable and concise definition. Or we could write
> in that it includes any functionality that is exercised by the gating
> openQA tests, though that seems a bit arbitrary - there's no
> particularly great organizing principle to the openQA tests we choose
> to run on updates, if I'm honest, it's a sort of grab bag I came up
> with.

I think this one is best... perhaps we could add something like 'and
such package groups as working groups decide are critical to their
edition' ?

kevin


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Thoughts welcome: interface between automated test gating and the "critical path"

2022-08-29 Thread Adam Williamson
Hi folks!

I have one of those definitional quandaries and I figured I'd throw it
at the lists for some input.

Right now, we kind of take advantage of the "critical path" concept for
automated update testing and gating via openQA.

openQA does not test all updates, only critical path updates plus
updates containing any package on a short allowlist.

Bodhi and Greenwave do not gate all updates on the openQA tests since
not all updates are tested; again we use the critpath definition. If an
update is critical path, it gets gated on the openQA tests. If it
isn't, it doesn't.

If you've been paying attention, that means there's a bit of a hole:
the packages on the 'allowlist'. These are tested, but not gated.

What's on the allowlist? Basically, FreeIPA-related packages. We have a
good set of FreeIPA tests in openQA, and both I and the FreeIPA team
wanted relevant updates to be tested with them. But those packages are
not on the critical path. So I set up this 'allowlist' mechanism.

However, the lack of gating kinda sucks. I would much prefer if we
could gate these updates as well as just testing them.

The obvious thing to do is add the FreeIPA-related packages to the
critical path, but that really is not supported by the critical path
definition:

https://fedoraproject.org/wiki/Critical_path_package

which defines it as packages required to "perform the most fundamental
actions on a system", with a list of specific areas, none of which is
"run a domain server".

So...what to do?

I can think of I guess four options:

1. Broaden the definition of the "critical path" somehow. We could just
write in that it includes FreeIPA functionality, I guess, though that
seems special purpose. We could broaden it to include any functionality
covered by the release criteria, which would be quite a big increase
but seems like a reasonable and concise definition. Or we could write
in that it includes any functionality that is exercised by the gating
openQA tests, though that seems a bit arbitrary - there's no
particularly great organizing principle to the openQA tests we choose
to run on updates, if I'm honest, it's a sort of grab bag I came up
with.

2. Keep the current "critical path" concept but define a broader group
of "gated packages" somewhere (could be comps or somewhere else). This
would require engineering work - we'd have to touch probably the openQA
scheduler, Bodhi, and greenwave configs. It's also another maintenance
burden.

3. Add gating config to each allowlisted package repo's gating.yml one
by one. I don't really like this option. It'd be a chunk of work to do
initially, and multiples the maintenance required when the list of
tests to gate on changes for some reason.

4. Do nothing, just keep only gating things that are "critical path" on
the current definition. In a utopian future, we'd manage to deploy
openQA in the cloud or get a giant pile of super fast servers so we
could test and gate *every* update, and this wouldn't be an issue any
more.

What do folks think? Any preferences? Thanks!
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: sqlcipher soname change in rawhide

2022-08-29 Thread Carl George
On Fri, Aug 26, 2022 at 3:59 PM Fabio Valentini  wrote:
>
> On Fri, Aug 26, 2022, 21:20 Demi Marie Obenour  wrote:
>>
>> On 8/26/22 06:12, Fabio Valentini wrote:
>> > On Fri, Aug 26, 2022 at 3:12 AM Carl George  wrote:
>> >>
>> >> sqlcipher has been requested to be built in epel9 [0].  Rather than
>> >> branching it from the current rawhide version, I plan to update
>> >> rawhide to the latest upstream version first [1].  This involves an
>> >> soname change from libsqlcipher-3.34.1.so.0 to
>> >> libsqlcipher-3.39.2.so.0.  This will require six packages to be
>> >> rebuilt.
>> >>
>> >> [root@f38-container:~]# repoquery --repo 
>> >> rawhide-source,rawhide-modular-source \
>> >>> --quiet --queryformat '%{name}' --archlist src --whatrequires 
>> >>> sqlcipher-devel
>> >> libgda
>> >> python-peewee
>> >> sqlitebrowser
>> >> [root@f38-container:~]# repoquery --repo 
>> >> rawhide-source,rawhide-modular-source \
>> >>> --quiet --queryformat '%{name}' --archlist src --whatrequires 
>> >>> 'pkgconfig(sqlcipher)'
>> >> kmymoney
>> >> rust-libsqlite3-sys
>> >> skrooge
>> >
>> > Please do not rebuild rust-libsqlite3-sys. It is a source-only package
>> > that does not ship any compiled code.
>> > All packages built from rust-libsqlite3-sys are noarch (i.e. they
>> > can't - by definition - contain architecture-specific binaries).
>> > Any built binaries that link against libsqlcipher are only used for
>> > tests, but not shipped with built packages.
>>
>> Rust FFI uses the ABI, not the API, so if rust-libsqlite3-sys is based on 
>> bindgen
>> then the generated Rust code will need to be recreated.
>
>
> Yes, and that happens on-the-fly in the crate's build.rs script, so 
> rebuilding the package has zero effect, because the bindings are *always* 
> generated from headers at build-time, and are not included in the package at 
> all.
>
> Fabio
>
>
>> --
>> Sincerely,
>> Demi Marie Obenour (she/her/hers)
>> ___
>> devel mailing list -- devel@lists.fedoraproject.org
>> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
>> Fedora Code of Conduct: 
>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives: 
>> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>> Do not reply to spam, report it: 
>> https://pagure.io/fedora-infrastructure/new_issue
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it: 
> https://pagure.io/fedora-infrastructure/new_issue

Thanks for the heads up on rust-libsqlite3-sys.  I also realized that
python-peewee doesn't link against this either, so I dropped that one
from the rebuild too.  I've completed the rebuilds in a side tag and
merged it.

https://bodhi.fedoraproject.org/updates/FEDORA-2022-647b3781fd

-- 
Carl George
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
Done. Both packages build, install, and work perfectly.

Thanks for all the advice.

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2122028] perl-Data-Dmp-0.242 is available

2022-08-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2122028

Fedora Update System  changed:

   What|Removed |Added

 Status|MODIFIED|ON_QA



--- Comment #2 from Fedora Update System  ---
FEDORA-2022-8c3a9a8af4 has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh
--advisory=FEDORA-2022-8c3a9a8af4`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2022-8c3a9a8af4

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122028
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Strong crypto settings: phase 3, forewarning 2/2 (System-Wide Change proposal)

2022-08-29 Thread Miro Hrončok

On 29. 08. 22 20:30, Ben Cotton wrote:

https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Forewarning2

== Summary ==

Cryptographic policies will be tightened in Fedora ''38''-39,
SHA-1 signatures will no longer be trusted by default.
Fedora ''38'' will do a "jump scare", introducing the change but then
reverting it in time for Beta.
Test your setup with TEST-FEDORA39 today and file bugs in advance so
you won't get bit by Fedora ''38''-39.


It is my opinion that breaking things on purpose ("jump scaring") is not a 
friendly way of making things happen. Sure, when other options are exhausted, 
let's consider it as an extreme option, but maybe we can figure something else 
out first.


Have you for example considered:

 - changing the default in Copr and rebuilding the distro, seeing what breaks?
 - changing the default in ELN only first?

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: hardened memory allocate port to linux-fedora system for secutiry

2022-08-29 Thread Daniel Micay via devel
On Mon, Aug 15, 2022 at 07:39:46PM -0700, John Reiser wrote:
> On 8/13/22, Demi Marie Obenour wrote:
> > On 8/13/22, Kevin Kofler via devel wrote:
> > > martin luther wrote:
> > > > should we implement https://github.com/GrapheneOS/hardened_malloc/
> > > > it is hardened memory allocate it will increase the security of fedora
> > > > according to the graphene os team it can be ported to linux as well need
> > > > to look at it
> > 
> > CCing Daniel Micay who wrote hardened_malloc.
> > 
> > > There are several questions that come up:  [[snip]]
> 
> It seems to me that hardened_malloc could increase working set and RAM
> desired by something like 10% compared to glibc for some important workloads,
> such as Fedora re-builds.  From page 22 of [1] (attached here; 203KB), the 
> graph
> of number of requests versus requested size shows that blocks of size <= 128
> were requested tens to thousands of times more often than all the rest.

The lightweight configuration, hardened_malloc uses substantially less
memory for small allocations than glibc malloc.

None of the GrapheneOS or hardened_malloc developers or project members
has proposed that Fedora switch to hardened_malloc, but it would reduce
rather than increasing memory usage if you used in without the slab
quarantine features. Slab canaries use extra memory too, but the
overhead is lower than glibc metadata overhead. The sample lightweight
configuration still uses slab canaries.

If you bolted on a jemalloc-style array-based thread cache or a
problematic TCMalloc-style one as was copied for glibc, then you would
be able to get comparable performance and better scalability than glibc
malloc, but that is outside the scope of what hardened_malloc is
intended to provide. We aren't trying to serve that niche in
hardened_malloc. It does not mean that glibc malloc is well suited to
being the chosen allocator. That really can't be justified for any
technical reasons. If you replaced glibc malloc with jemalloc, the only
people who would be unhappy are people who care about the loss of ASLR
bits from chunk alignment, which if you make the chunks small enough and
configure ASLR properly really doesn't matter on 64-bit. I can't think
of a case where glibc malloc would be better than jemalloc with small
chunk sizes when using either 4k pages with a 48-bit address space or
larger pages. glibc malloc's overall design is simply not competitive
anymore, and it wastes tons of memory from both metadata overhead and
also fragmentation. I can't really understand what justification there
would be for not replacing it outright with a more modern design and
adding the necessary additional APIs required for that as we did
ourselves for our own security-focused allocator.

> For sizes from 0 through 128, the "Size classes" section of README.md of [2]
> documents worst-case internal fragmentation (in "slabs") of 93.75% to 11.72%.
> That seems too high.  Where are actual measurements for workloads such as
> Fedora re-builds?

The minimum alignment is 16 bytes. glibc malloc has far more metadata
overhead, internal and external fragmentation than hardened_malloc in
reality. It has headers on allocations, rounds to much less fine grained
bucket sizes and fragments all the memory with the traditional dlmalloc
style approach. There was a time when that approach was a massive
improvement over past ones but that time was the 90s, not 2022.

> (Also note that the important special case of malloc(0), which is analogous
> to (gensym) of Lisp and is implemented internally as malloc(1), consumes
> 16 bytes and has a fragmentation of 93.75% for both glibc and hardened_malloc.
> The worst fragmentation happens for *every* call to malloc(0), which occurred
> about 800,000 times in the sample.  Yikes!)

glibc malloc has headers giving it more than 100% pure overhead for a 16
byte allocation. It cannot do finer grained rounding than we do for 16
through 128 bytes, and sticking headers on allocations makes it far
worse. It also gets even worse with aligned allocations, such as common
64 byte aligned allocations, where slab allocation means any allocation
up to the page size already has their natural alignment such as 64 byte
for 64 byte, 128 byte for 128 byte, 256 byte for 256 byte, etc.

0 byte doesn't really make sense to compare because in hardened_malloc
it's a pointer to non-allocated pages with PROT_NONE memory protection.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[EPEL-devel] Re: Adding Package to side-tag

2022-08-29 Thread Kevin Fenzi
On Sun, Aug 28, 2022 at 07:38:31PM +1000, Frank Crawford wrote:
> On Sat, 2022-08-27 at 14:58 -0500, Maxwell G via epel-devel wrote:
> > n 22/08/27 04:03PM, Frank Crawford wrote:
> > > While building two related new packages for EPEL9 with a
> > > chainbuild,
> > > the second one failed, however, now I am trying to work out how to
> > > specify the completed package in the build for the second package.
> > > 
> > > I have tried creating a side-tag and add the completed build to the
> > > side-tag, then building the second package in that side-tag, but it
> > > still claims that it can't find the first package, which it
> > > requires to
> > > build.
> > 
> > Can you please provide more information? What are the
> > builds/packages?
> > What commands did you run? How did you add the first package to the
> > side
> > tag? Did you wait for the side tag repo to refresh before trying to
> > build the second package?
> 
> I think you answered my issue here, I did not allow sufficient time for
> the repo to refresh before submitting the second build.
> 
> For reference, the packages were python-zipp-0.5.1-1.el9 and python-
> importlib-metadata-4.6.3-2.el9 and the commands I ran were:
> 
> fedpkg request-side-tag
> koji wait-repo 
> koji tag-pkg  python-zipp-0.5.1-1.el9
> fedpkg build --target=
> 
> It looks like I needed to do another "koji wait-repo " between the
> tag-pkg and build, but I will say that it is not obvious in any of the
> documentation I could find, that this needed.

:( Which documentation were you looking at for this?
We should try and update it...

The wait repo is needed because you added a build and now it needs to
regenerate the repodata to include it.

kevin


signature.asc
Description: PGP signature
___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Test-Announce] [Call for Action] Fedora 37 Pre-Beta Validation Event kicks off 2022-08-31 through 2022-08-07

2022-08-29 Thread Sumantro Mukherjee
Hey All,

Some of you may know from my presentation at Nest '22 about the
Validation events that are getting added!
Historically, Fedora QA has relied on a lot of contributor feedback.
Mostly, we have set up multiple
ways how to capture the results and there has been no better time than
to start capturing feedback about the composes as
a part of the Release Validation Event!

As the name suggests, we will be validating composes throughout a week
and we will do it twice per cycle, once for pre-beta and other for
pre-final. Validation Events such as this are done to invite more
community folks to test the latest compose(s) for each day and help
fill the
Release Validation Matrix leading up to the Final Go/No-Go meeting.

We will start this Validation Event with the compose for 2022-08-31[0]
and the respective "current" validation page can be found [1].
As the days change, so will the latest composes and thus will be the
current validation pages. Feel free to jump in anytime, and
submit validation results on the "current" validation page.

You can use "relval" [2] to submit reports for composes as well apart
from the regular editing wiki pages. I will be posting about the
new images and the QA candidates on this list every day and will be up
for taking any question there is!


[0] https://kojipkgs.fedoraproject.org/compose/branched/
[1] https://fedoraproject.org/wiki/Test_Results:Current_Summary
[2] https://pagure.io/fedora-qa/relval


-- 
//sumantro
Fedora QE
TRIED AND PERSONALLY TESTED, ERGO TRUSTED
___
test-announce mailing list -- test-annou...@lists.fedoraproject.org
To unsubscribe send an email to test-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/test-annou...@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2115572] Please build perl-Number-Bytes-Human for EPEL 9

2022-08-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2115572

Fedora Update System  changed:

   What|Removed |Added

 Status|NEW |MODIFIED



--- Comment #7 from Fedora Update System  ---
FEDORA-EPEL-2022-8f153e6706 has been submitted as an update to Fedora EPEL 9.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-8f153e6706


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2115572
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: F38 proposal: Strong crypto settings: phase 3, forewarning 2/2 (System-Wide Change proposal)

2022-08-29 Thread Ben Cotton
On Mon, Aug 29, 2022 at 2:30 PM Ben Cotton  wrote:
>
> * Release engineering:  Not sure if mass-rebuild is required if we
> land the change right after f38 branch-off. Maybe a "preview"
> mass-rebuild can be done with a special build in the F37 timeframe to
> cut down on F38 FTBFS.

Please file an issue with releng: https://pagure.io/releng/new_issue

This is required by FESCo for all System-Wide Change proposals anyway.


-- 
Ben Cotton
He / Him / His
Fedora Program Manager
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


F38 proposal: Strong crypto settings: phase 3, forewarning 2/2 (System-Wide Change proposal)

2022-08-29 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Forewarning2

== Summary ==

Cryptographic policies will be tightened in Fedora ''38''-39,
SHA-1 signatures will no longer be trusted by default.
Fedora ''38'' will do a "jump scare", introducing the change but then
reverting it in time for Beta.
Test your setup with TEST-FEDORA39 today and file bugs in advance so
you won't get bit by Fedora ''38''-39.


== Owner ==

* Name: [[User:Asosedkin| Alexander Sosedkin]]
* Email: asose...@redhat.com


== Detailed Description ==

Secure defaults are an evermoving target.
Fedora 28 had [[Changes/StrongCryptoSettings|StrongCryptoSettings]].
Fedora 33 had [[Changes/StrongCryptoSettings2|StrongCryptoSettings2]].
Fedora 39 should have [[Changes/StrongCryptoSettings3|StrongCryptoSettings3]].

By Fedora 39, the policies will be, in TLS perspective:
 LEGACY
  MACs: All HMAC with SHA1 or better + all modern MACs (Poly1305 etc.)
  Curves: all prime >= 255 bits (including Bernstein curves)
  Signature algorithms: SHA-1 hash or better (no DSA)
  Ciphers: all available > 112-bit key, >= 128-bit block (no RC4 or 3DES)
  Key exchange: ECDHE, RSA, DHE (no DHE-DSS)
  DH params size: >=2048
  RSA params size: >=2048
  TLS protocols: TLS >= 1.2

 DEFAULT
  MACs: All HMAC with SHA1 or better + all modern MACs (Poly1305 etc.)
  Curves: all prime >= 255 bits (including Bernstein curves)
  Signature algorithms: with SHA-224 hash or better (no DSA)
  Ciphers: >= 128-bit key, >= 128-bit block (AES, ChaCha20, including AES-CBC)
  Key exchange: ECDHE, RSA, DHE (no DHE-DSS)
  DH params size: >= 2048
  RSA params size: >= 2048
  TLS protocols: TLS >= 1.2

 FUTURE
  MACs: All HMAC with SHA256 or better + all modern MACs (Poly1305 etc.)
  Curves: all prime >= 255 bits (including Bernstein curves)
  Signature algorithms: SHA-256 hash or better (no DSA)
  Ciphers: >= 256-bit key, >= 128-bit block, only Authenticated
Encryption (AE) ciphers
  Key exchange: ECDHE, DHE
  DH params size: >= 3072
  RSA params size: >= 3072
  TLS protocols: TLS >= 1.2

The flagship change this time will be distrusting SHA-1 signatures
on the cryptographic library level, affecting more than just TLS.

OpenSSL will start blocking signature creation and verification by default,
with the fallout anticipated to be wide enough
for us to roll out the change across multiple cycles
with multiple forewarnings
to give developers and maintainers ample time to react:

Fedora 36:
* SHA-1 signatures are distrusted in FUTURE policy (opt-in)
* TEST-FEDORA39 policy is provided
* creating and verifying SHA-1 signatures is logged to ease reporting bugs

Fedora 37 
[[Changes/StrongCryptoSettings3Forewarning3|StrongCryptoSettings3Forewarning1]]:
* (was initially reserved to implement logging of SHA-1 signature operations)

'''Fedora 38 
[[Changes/StrongCryptoSettings3Forewarning3|StrongCryptoSettings3Forewarning2]]''':
* policies are updated, most notably
* SHA-1 signatures are distrusted in DEFAULT policy
* changes are reverted in branched f38 in time for Beta and do not reach users

Fedora 39 [[Changes/StrongCryptoSettings3|StrongCryptoSettings3]]:
* changes reach users

The plan is subject to change if it goes sideways somewhere along the way.

So, in Fedora 36, 37 and ''38 released'' distrusting SHA-1 signatures
will be opt-in.
In ''Fedora 38 rawhide'' and Fedora 39 distrusting SHA-1 signatures
will happen by default.


== Feedback ==

[https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/thread/VVLHQAWI3IQ7NRLKMUHJ27JV3V2JAFDP
A discussion]
has been raised on fedora-devel,
[https://lwn.net/Articles/887832 a summary] is available on LWN.

A change has the potential to prove disruptive and controversial,
with much effort being focused on stretching it out in time.

There seems to be a consensus that the change has to be done eventually,
but the ideal means of implementing it are in no way clear.
The decision to discover code reliant on SHA-1 signatures
by blocking creation/verification has not gathered many fans,
but not many alternative proposals have been raised in return.
A notable one, making the library somehow log the offending operations,
has been incorporated in the proposal,
though the effectiveness of it is yet to be seen in practice.
Another notable takeaway point is the need to call for testing,
which would be done in form of writing four Fedora Changes
and testing SHA-1 signature distrusting during Fedora 37 & ''38'' Test Days.
The change owner doesn't see the plan as an ideal one
and continues to be open for feedback.


== Benefit to Fedora ==

Fedora 39 will ship with more secure defaults
to better match the everchanging landscape of cryptographic practices.
TLS 1.0 / 1.1 protocol version will be disabled
as they're [https://datatracker.ietf.org/doc/rfc8996 deprecated],
minimum key sizes will be raised to keep up with the computational advances etc.

Distrusting SHA-1 signatures specifically is expected to trigger
a topical distribution-wide 

F38 proposal: Strong crypto settings: phase 3, forewarning 2/2 (System-Wide Change proposal)

2022-08-29 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/StrongCryptoSettings3Forewarning2

== Summary ==

Cryptographic policies will be tightened in Fedora ''38''-39,
SHA-1 signatures will no longer be trusted by default.
Fedora ''38'' will do a "jump scare", introducing the change but then
reverting it in time for Beta.
Test your setup with TEST-FEDORA39 today and file bugs in advance so
you won't get bit by Fedora ''38''-39.


== Owner ==

* Name: [[User:Asosedkin| Alexander Sosedkin]]
* Email: asose...@redhat.com


== Detailed Description ==

Secure defaults are an evermoving target.
Fedora 28 had [[Changes/StrongCryptoSettings|StrongCryptoSettings]].
Fedora 33 had [[Changes/StrongCryptoSettings2|StrongCryptoSettings2]].
Fedora 39 should have [[Changes/StrongCryptoSettings3|StrongCryptoSettings3]].

By Fedora 39, the policies will be, in TLS perspective:
 LEGACY
  MACs: All HMAC with SHA1 or better + all modern MACs (Poly1305 etc.)
  Curves: all prime >= 255 bits (including Bernstein curves)
  Signature algorithms: SHA-1 hash or better (no DSA)
  Ciphers: all available > 112-bit key, >= 128-bit block (no RC4 or 3DES)
  Key exchange: ECDHE, RSA, DHE (no DHE-DSS)
  DH params size: >=2048
  RSA params size: >=2048
  TLS protocols: TLS >= 1.2

 DEFAULT
  MACs: All HMAC with SHA1 or better + all modern MACs (Poly1305 etc.)
  Curves: all prime >= 255 bits (including Bernstein curves)
  Signature algorithms: with SHA-224 hash or better (no DSA)
  Ciphers: >= 128-bit key, >= 128-bit block (AES, ChaCha20, including AES-CBC)
  Key exchange: ECDHE, RSA, DHE (no DHE-DSS)
  DH params size: >= 2048
  RSA params size: >= 2048
  TLS protocols: TLS >= 1.2

 FUTURE
  MACs: All HMAC with SHA256 or better + all modern MACs (Poly1305 etc.)
  Curves: all prime >= 255 bits (including Bernstein curves)
  Signature algorithms: SHA-256 hash or better (no DSA)
  Ciphers: >= 256-bit key, >= 128-bit block, only Authenticated
Encryption (AE) ciphers
  Key exchange: ECDHE, DHE
  DH params size: >= 3072
  RSA params size: >= 3072
  TLS protocols: TLS >= 1.2

The flagship change this time will be distrusting SHA-1 signatures
on the cryptographic library level, affecting more than just TLS.

OpenSSL will start blocking signature creation and verification by default,
with the fallout anticipated to be wide enough
for us to roll out the change across multiple cycles
with multiple forewarnings
to give developers and maintainers ample time to react:

Fedora 36:
* SHA-1 signatures are distrusted in FUTURE policy (opt-in)
* TEST-FEDORA39 policy is provided
* creating and verifying SHA-1 signatures is logged to ease reporting bugs

Fedora 37 
[[Changes/StrongCryptoSettings3Forewarning3|StrongCryptoSettings3Forewarning1]]:
* (was initially reserved to implement logging of SHA-1 signature operations)

'''Fedora 38 
[[Changes/StrongCryptoSettings3Forewarning3|StrongCryptoSettings3Forewarning2]]''':
* policies are updated, most notably
* SHA-1 signatures are distrusted in DEFAULT policy
* changes are reverted in branched f38 in time for Beta and do not reach users

Fedora 39 [[Changes/StrongCryptoSettings3|StrongCryptoSettings3]]:
* changes reach users

The plan is subject to change if it goes sideways somewhere along the way.

So, in Fedora 36, 37 and ''38 released'' distrusting SHA-1 signatures
will be opt-in.
In ''Fedora 38 rawhide'' and Fedora 39 distrusting SHA-1 signatures
will happen by default.


== Feedback ==

[https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/VVLHQAWI3IQ7NRLKMUHJ27JV3V2JAFDP
A discussion]
has been raised on fedora-devel,
[https://lwn.net/Articles/887832 a summary] is available on LWN.

A change has the potential to prove disruptive and controversial,
with much effort being focused on stretching it out in time.

There seems to be a consensus that the change has to be done eventually,
but the ideal means of implementing it are in no way clear.
The decision to discover code reliant on SHA-1 signatures
by blocking creation/verification has not gathered many fans,
but not many alternative proposals have been raised in return.
A notable one, making the library somehow log the offending operations,
has been incorporated in the proposal,
though the effectiveness of it is yet to be seen in practice.
Another notable takeaway point is the need to call for testing,
which would be done in form of writing four Fedora Changes
and testing SHA-1 signature distrusting during Fedora 37 & ''38'' Test Days.
The change owner doesn't see the plan as an ideal one
and continues to be open for feedback.


== Benefit to Fedora ==

Fedora 39 will ship with more secure defaults
to better match the everchanging landscape of cryptographic practices.
TLS 1.0 / 1.1 protocol version will be disabled
as they're [https://datatracker.ietf.org/doc/rfc8996 deprecated],
minimum key sizes will be raised to keep up with the computational advances etc.

Distrusting SHA-1 signatures specifically is expected to trigger
a topical distribution-wide 

Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Chris Murphy


On Mon, Aug 29, 2022, at 11:12 AM, Chris Murphy wrote:
> On Mon, Aug 29, 2022, at 11:10 AM, Adam Williamson wrote:

>> There *is* a workaround, BTW - I didn't mention this in my original
>> mail, and probably should have. At least according to discussion in the
>> bug, microdnf works OK. So you can use that instead.
>
> Yes, but will you be able to install it? Yes you could go to koji, 
> download the correct RPMs, and have rpm do it without dnf but... that'd 
> be a pretty saucy work around.

Can microdnf and dnf co-exist? If so, maybe the non-desktops should just 
include microdnf along side dnf? Or is this potentially a trap where microdnf 
can also fail for the same reason (i.e. it's not dnf, it's the size of the repo 
metadata)?


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
Thanks to Sergio and everyone who helped me get this up and running. If you 
have time to offer any feedback it would be greatly appreciated. All the 
relevant links are:

  https://github.com/cowboysmall-apps/hid-ite8291r3-kmod
  https://pagure.io/hid-ite8291r3-kmod
  https://copr.fedorainfracloud.org/coprs/cowboysmall/hid-ite8291r3-kmod/

Thanks again for your time and patience,

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Barry


> On 29 Aug 2022, at 04:25, Adam Williamson  wrote:
> 
> Hey folks! I apologize for the wide distribution, but this seemed like
> a bug it'd be appropriate to get a wide range of input on.
> 
> There's a bug that was proposed as an F37 Beta blocker:
> https://bugzilla.redhat.com/show_bug.cgi?id=1907030
> 
> it's quite an old bug, but up until recently, the summary was
> apparently accurate - dnf would run out of memory with 512M of RAM, but
> was OK with 1G. However, as of quite recently, on F36 at least (not
> sure if anyone's explicitly tested F37), dnf operations are commonly
> failing on VMs/containers with 1G of RAM due to running out of RAM and
> getting OOM-killed.
> 
> There's some discussion in the bug about what might be causing this and
> potential ways to resolve it, and please do dig into/contribute to that
> if you can, but the other question here I guess is: how much do we care
> about this? How bad is it that you can't reliably run dnf operations on
> top of a minimal Fedora environment with 1G of RAM?
> 
> This obviously has some overlap with our stated hardware requirements,
> so here they are for the record:
> 
> https://docs.fedoraproject.org/en-US/fedora/latest/release-notes/welcome/Hardware_Overview/
> 
> that specifies 2GB as the minimum memory for "the default
> installation", by which I think it's referring to a default Workstation
> install, though this should be clarified. But then there's a "Low
> memory installations" boxout, which suggests that "users with less than
> 768MB of system memory may have better results performing a minimal
> install and adding to it afterward", which kinda is recommending that
> people do exactly the thing that doesn't work (do a minimal install
> then use dnf on it), and implying it'll work.

I have seen dnf fail to work on my 2GiB Rpi 4 with f36.
What I did to workaround this was install the kernel on its own,
then dnf update the rest.

So it’s only 1GiB systems that are effected.

I also have a 1GiB digital ocean VM that happens to not see this issue.

I suspect it may be certain packages that make this more likely to fail.

Barry



> 
> After some consideration I don't think it makes sense to take this bug
> as an F37 blocker, since it already affects F36, and that's what I'll
> be suggesting at the next blocker review meeting. However, it does seem
> a perfect candidate for prioritized bug status, and I've nominated it
> for that.
> 
> I guess if folks can chime in with thoughts here and/or in the bug
> report, maybe a consensus will emerge on just how big of an issue this
> is (and how likely it is to get fixed). There will presumably be a
> FESCo ticket related to prioritized bug status too.
> 
> Thanks folks!
> -- 
> Adam Williamson
> Fedora QA
> IRC: adamw | Twitter: adamw_ha
> https://www.happyassassin.net
> 
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it: 
> https://pagure.io/fedora-infrastructure/new_issue
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Leslie S Satenstein via devel
What is the contents of /etc/dnf/dnf.conf
It might help to see if there is a setting therein that is causing the 
mentioned issue.

Regards 
 Leslie
 Leslie Satenstein
Montréal Québec, Canada

 

On Sunday, August 28, 2022 at 11:24:30 p.m. EDT, Adam Williamson 
 wrote:  
 
 Hey folks! I apologize for the wide distribution, but this seemed like
a bug it'd be appropriate to get a wide range of input on.

There's a bug that was proposed as an F37 Beta blocker:
https://bugzilla.redhat.com/show_bug.cgi?id=1907030

it's quite an old bug, but up until recently, the summary was
apparently accurate - dnf would run out of memory with 512M of RAM, but
was OK with 1G. However, as of quite recently, on F36 at least (not
sure if anyone's explicitly tested F37), dnf operations are commonly
failing on VMs/containers with 1G of RAM due to running out of RAM and
getting OOM-killed.

There's some discussion in the bug about what might be causing this and
potential ways to resolve it, and please do dig into/contribute to that
if you can, but the other question here I guess is: how much do we care
about this? How bad is it that you can't reliably run dnf operations on
top of a minimal Fedora environment with 1G of RAM?

This obviously has some overlap with our stated hardware requirements,
so here they are for the record:

https://docs.fedoraproject.org/en-US/fedora/latest/release-notes/welcome/Hardware_Overview/

that specifies 2GB as the minimum memory for "the default
installation", by which I think it's referring to a default Workstation
install, though this should be clarified. But then there's a "Low
memory installations" boxout, which suggests that "users with less than
768MB of system memory may have better results performing a minimal
install and adding to it afterward", which kinda is recommending that
people do exactly the thing that doesn't work (do a minimal install
then use dnf on it), and implying it'll work.

After some consideration I don't think it makes sense to take this bug
as an F37 blocker, since it already affects F36, and that's what I'll
be suggesting at the next blocker review meeting. However, it does seem
a perfect candidate for prioritized bug status, and I've nominated it
for that.

I guess if folks can chime in with thoughts here and/or in the bug
report, maybe a consensus will emerge on just how big of an issue this
is (and how likely it is to get fixed). There will presumably be a
FESCo ticket related to prioritized bug status too.

Thanks folks!
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net

___
kde mailing list -- k...@lists.fedoraproject.org
To unsubscribe send an email to kde-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/k...@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue
  ___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2122247] New: Upgrade perl-Exporter-Tiny to 1.004000

2022-08-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2122247

Bug ID: 2122247
   Summary: Upgrade perl-Exporter-Tiny to 1.004000
   Product: Fedora
   Version: rawhide
   URL: https://metacpan.org/release/Exporter-Tiny
Status: NEW
 Component: perl-Exporter-Tiny
  Assignee: p...@city-fan.org
  Reporter: jples...@redhat.com
QA Contact: extras...@fedoraproject.org
CC: p...@city-fan.org, perl-devel@lists.fedoraproject.org
  Target Milestone: ---
Classification: Fedora



Latest Fedora delivers 1.002002 version. Upstream released 1.004000. When you
have free time, please upgrade it.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122247
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Chris Murphy


On Mon, Aug 29, 2022, at 11:10 AM, Adam Williamson wrote:
> On Mon, 2022-08-29 at 10:53 +0200, Fabio Valentini wrote:
>> On Mon, Aug 29, 2022 at 9:53 AM Brian (bex) Exelbierd
>>  wrote:
>> > 
>> > I wonder if we should take another approach here. Assuming no serious bugs 
>> > in dnf, rather than tuning dnf for low memory environments could we 
>> > suggest those folks use Fedora Silverblue, CoreOS, or IoT?
>> 
>> Just speaking for myself: I have Fedora installations on 1G RAM VM
>> servers that I've been upgrading for many years now, and they just
>> keep chugging along as of Fedora 35. If I would need to either 1) pay
>> twice the money per month to keep this setup, or 2) spend a few days
>> reprovisioning the servers with Fedora CoreOS 36 (assuming it doesn't
>> suffer from the same problem), then I'd consider neither of these
>> options a desirable outcome.
>
> There *is* a workaround, BTW - I didn't mention this in my original
> mail, and probably should have. At least according to discussion in the
> bug, microdnf works OK. So you can use that instead.

Yes, but will you be able to install it? Yes you could go to koji, download the 
correct RPMs, and have rpm do it without dnf but... that'd be a pretty saucy 
work around.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Adam Williamson
On Mon, 2022-08-29 at 10:53 +0200, Fabio Valentini wrote:
> On Mon, Aug 29, 2022 at 9:53 AM Brian (bex) Exelbierd
>  wrote:
> > 
> > I wonder if we should take another approach here. Assuming no serious bugs 
> > in dnf, rather than tuning dnf for low memory environments could we suggest 
> > those folks use Fedora Silverblue, CoreOS, or IoT?
> 
> Just speaking for myself: I have Fedora installations on 1G RAM VM
> servers that I've been upgrading for many years now, and they just
> keep chugging along as of Fedora 35. If I would need to either 1) pay
> twice the money per month to keep this setup, or 2) spend a few days
> reprovisioning the servers with Fedora CoreOS 36 (assuming it doesn't
> suffer from the same problem), then I'd consider neither of these
> options a desirable outcome.

There *is* a workaround, BTW - I didn't mention this in my original
mail, and probably should have. At least according to discussion in the
bug, microdnf works OK. So you can use that instead.
-- 
Adam Williamson
Fedora QA
IRC: adamw | Twitter: adamw_ha
https://www.happyassassin.net

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: [fedora-arm] Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Chris Murphy


On Mon, Aug 29, 2022, at 4:49 AM, Hans de Goede wrote:

> 1. ZRAM helps a lot here, but I guess with containers when limiting them
> to 1G you really only get 1G since ZRAM works on the system level not
> the container level. In the VM case though ZRAM should help, is ZRAM
> enabled ?  ZRAM is enabled by default for Workstation installs, but
> maybe not in other installs ?

swap on zram is used on all Fedora variants except CoreOS.


> 2. Maybe there are some other processes also taking up more RAM
> then expected causing extra memory pressure ?

I've found 'below' (in Fedora repo) very useful in tracking down processes that 
are contributing to memory, cpu, or io pressure - using cgroups accounting. 
It's possible to zoom in on a cgroup, see individual processes, their memory, 
io, cpu and swap activity. Pressure (PSI) is useful because it results in 
latencies, potentially everywhere else. So when you suspect bad behavior in 
your app, it might be because something else is soaking resources. Your app 
might be legitimately putting memory or cpu or io pressure on the system, 
that's the primary purpose of the setup, to service that app. So it can 
sometimes be difficult to figure out whether your app's resource requirements 
are reasonable/normal or if it's run away.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2122028] perl-Data-Dmp-0.242 is available

2022-08-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2122028



--- Comment #1 from Fedora Update System  ---
FEDORA-2022-8c3a9a8af4 has been submitted as an update to Fedora 37.
https://bodhi.fedoraproject.org/updates/FEDORA-2022-8c3a9a8af4


-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122028
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2122028] perl-Data-Dmp-0.242 is available

2022-08-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2122028

Jitka Plesnikova  changed:

   What|Removed |Added

 Status|ASSIGNED|MODIFIED
   Fixed In Version||perl-Data-Dmp-0.242-1.fc38




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122028
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Leigh Scott
> I'm guessing I need to provide a separate common package containing the 
> non-binary
> files - i.e. udev configs, license, readme, and so on. So the akmod, or the 
> kmod package
> implicitly expects a corresponding common package to be made available? 
> Anything need to
> be done specifically to make this work as expected? 
> 
> J.K.

You add this to the hid-ite8291r3 (common) package.

Provides:   %{name}-kmod-common = %{version}
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Packaging a cross-compilation environment (wasi-libc)

2022-08-29 Thread Jan Staněk
To better collaborate on this, I've pushed my working copy of the
package to gitlab [1]. It's a bit experimental (i.e. it tries to use
source-git [2] approach to development), but should allow any
interested party to review what I'm doing :)

Integration with COPR is on my TODO list.

[1]: https://gitlab.com/khx/fedora/wasi-libc
[2]: https://docs.fedoraproject.org/en-US/ci/source-git/

Florian Weimer  writes:
> You can try to replace the current version with dlmalloc 2.7.2, which
> still comes with the previous public domain dedication:
>
>   
>
> We can also ask Doug Lea if he can go back to the previous public domain
> dedication.

I've got some comments on the wasi-libc issue that another malloc might
work as well. Nevertheless, I'll try to contact Doug Lea with the
explanation and see where that leads.

Thanks!
--
Jan Staněk
Software Engineer, Red Hat
jsta...@redhat.com   irc: jstanek


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: [fedora-arm] Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Dan Čermák
Hi,

Adam Williamson  writes:

> Hey folks! I apologize for the wide distribution, but this seemed like
> a bug it'd be appropriate to get a wide range of input on.
>
> There's a bug that was proposed as an F37 Beta blocker:
> https://bugzilla.redhat.com/show_bug.cgi?id=1907030
>
> it's quite an old bug, but up until recently, the summary was
> apparently accurate - dnf would run out of memory with 512M of RAM, but
> was OK with 1G. However, as of quite recently, on F36 at least (not
> sure if anyone's explicitly tested F37), dnf operations are commonly
> failing on VMs/containers with 1G of RAM due to running out of RAM and
> getting OOM-killed.
>
> There's some discussion in the bug about what might be causing this and
> potential ways to resolve it, and please do dig into/contribute to that
> if you can, but the other question here I guess is: how much do we care
> about this? How bad is it that you can't reliably run dnf operations on
> top of a minimal Fedora environment with 1G of RAM?
>
> This obviously has some overlap with our stated hardware requirements,
> so here they are for the record:
>
> https://docs.fedoraproject.org/en-US/fedora/latest/release-notes/welcome/Hardware_Overview/
>
> that specifies 2GB as the minimum memory for "the default
> installation", by which I think it's referring to a default Workstation
> install, though this should be clarified. But then there's a "Low
> memory installations" boxout, which suggests that "users with less than
> 768MB of system memory may have better results performing a minimal
> install and adding to it afterward", which kinda is recommending that
> people do exactly the thing that doesn't work (do a minimal install
> then use dnf on it), and implying it'll work.
>
> After some consideration I don't think it makes sense to take this bug
> as an F37 blocker, since it already affects F36, and that's what I'll
> be suggesting at the next blocker review meeting. However, it does seem
> a perfect candidate for prioritized bug status, and I've nominated it
> for that.

I agree, this needn't block F37, but I still think that this should be
fixed. Unless I use microdnf, I cannot upgrade my VPS with 1GB RAM that
happily hosts my home page, which is quite a bummer and a bit of a shame
to be honest.


Cheers,

Dan
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora 37 compose report: 20220829.n.0 changes

2022-08-29 Thread Fedora Rawhide Report
OLD: Fedora-37-20220828.n.0
NEW: Fedora-37-20220829.n.0

= SUMMARY =
Added images:1
Dropped images:  3
Added packages:  0
Dropped packages:0
Upgraded packages:   0
Downgraded packages: 0

Size of added packages:  0 B
Size of dropped packages:0 B
Size of upgraded packages:   0 B
Size of downgraded packages: 0 B

Size change of upgraded packages:   0 B
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Astronomy_KDE live x86_64
Path: Labs/x86_64/iso/Fedora-Astronomy_KDE-Live-x86_64-37-20220829.n.0.iso

= DROPPED IMAGES =
Image: Cloud_Base vagrant-virtualbox x86_64
Path: 
Cloud/x86_64/images/Fedora-Cloud-Base-Vagrant-37-20220828.n.0.x86_64.vagrant-virtualbox.box
Image: Container_Minimal_Base docker aarch64
Path: 
Container/aarch64/images/Fedora-Container-Minimal-Base-37-20220828.n.0.aarch64.tar.xz
Image: Cloud_Base vagrant-libvirt x86_64
Path: 
Cloud/x86_64/images/Fedora-Cloud-Base-Vagrant-37-20220828.n.0.x86_64.vagrant-libvirt.box

= ADDED PACKAGES =

= DROPPED PACKAGES =

= UPGRADED PACKAGES =

= DOWNGRADED PACKAGES =
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
I'm guessing I need to provide a separate common package containing the 
non-binary files - i.e. udev configs, license, readme, and so on. So the akmod, 
or the kmod package implicitly expects a corresponding common package to be 
made available? Anything need to be done specifically to make this work as 
expected? 

J.K.
 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


[Bug 2122028] perl-Data-Dmp-0.242 is available

2022-08-29 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=2122028

Jitka Plesnikova  changed:

   What|Removed |Added

   Doc Type|--- |If docs needed, set a value
 Status|NEW |ASSIGNED




-- 
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2122028
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
After removing the sub-package references I am now getting:

  dnf install ./akmod-hid-ite8291r3-0.0-1.fc36.1.x86_64.rpm 
./hid-ite8291r3-kmod-0.0-1.fc36.1.x86_64.rpm 
  Last metadata expiration check: 0:06:33 ago on Mon 29 Aug 2022 13:39:50.
  Error: 
   Problem: conflicting requests
- nothing provides hid-ite8291r3-kmod-common >= 0.0 needed by 
akmod-hid-ite8291r3-0.0-1.fc36.1.x86_64
  (try to add '--skip-broken' to skip uninstallable packages)

Any idea?

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Marcus Müller
Because it's typically not an option in these kinds of VMs – you'd need 
to create a swapfile, enable it, before you could launch the first DNF 
command. Ideally, disable it after, as chances are a certain bookseller 
is billing you per IOPS.


It's completely out of the questions for (e.g. cgroups) limited 
containers, which can't even tell the kernel to enable swap.


Best,
Marcus

On 8/29/22 12:12, Roberto Ragusa wrote:

On 8/29/22 09:19, Zbigniew Jędrzejewski-Szmek wrote:

On Mon, Aug 22, 2022 at 05:44:26PM -0700, Adam Williamson wrote:



it's quite an old bug, but up until recently, the summary was
apparently accurate - dnf would run out of memory with 512M of RAM, but
was OK with 1G. However, as of quite recently, on F36 at least (not
sure if anyone's explicitly tested F37), dnf operations are commonly
failing on VMs/containers with 1G of RAM due to running out of RAM and
getting OOM-killed.


The discussion in the bug indicates that this memory growth is 
related to

loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, 
/usr/bin,

/usr/sbin), out into a separate lazilly-loaded file.
If it is currently loading stuff that is not really used in the 
computation,

this is a perfect case where swap could help (things would be written
to swap and then forgot on deallocation).
Unfortunately, swap is for some reason considered out-of-fashion, even in
these memory constrained set ups.

Regards.


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Colin Walters


On Mon, Aug 29, 2022, at 3:52 AM, Brian (bex) Exelbierd wrote:

> I use Fedora IoT on GCPs free tier offering and it is fine. I a, 
> assuming `rpm-ostree install` doesn’t have this issue. 

It does have the issue. 

rpm-ostree links to libdnf which is doing all the same things.
As I commented in the bug though, to do default image based updates, rpm-ostree 
very intentionally *does not* load the repo metadata, it's just replicating the 
filesystem tree, which takes very little memory.

The issue really has nothing to do with the client side - it's all about the 
*repository metadata size*.  That's why I reassigned the bug to "distribution".

The reason this bug isn't hitting RHEL right now is simply just because the 
default RHEL repositories are much smaller - also crucially things like many 
-devel packages are in a separate repository.

I don't see a need to rehash all of this *again* - the linked BZ already 
contains everything said in this thread, and the BZ itself is mainly rehashing 
a 4 year old thread https://pagure.io/fesco/issue/1955
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: [fedora-arm] Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Sandro

On 29-08-2022 10:49, Hans de Goede wrote:




I guess if folks can chime in with thoughts here and/or in the bug
report, maybe a consensus will emerge on just how big of an issue this
is (and how likely it is to get fixed). There will presumably be a
FESCo ticket related to prioritized bug status too.


I still have quite a few x86_64 tablets with only 1G RAM, so I personally
definitely care about this.

With that said I do regularly run dnf on them without issues,
although I think most of the 1G models I have are still at F35...



Still I wonder why this is an issue in some cases:

1. ZRAM helps a lot here, but I guess with containers when limiting them
to 1G you really only get 1G since ZRAM works on the system level not
the container level. In the VM case though ZRAM should help, is ZRAM
enabled ?  ZRAM is enabled by default for Workstation installs, but
maybe not in other installs ?


I ran into this on a RaspberryPi 3 with 1G of RAM and 1G of zram. That's 
the default configuration of F35 (Server Edition). I since added a 512M 
swapfile to the setup and my last 'dnf upgrade', yesterday was not 
killed by systemd.


When dnf was killed by systemd-oomd, I was able to switch to microdnf, 
which allowed me to continue.



2. Maybe there are some other processes also taking up more RAM
then expected causing extra memory pressure ?


That's possible. But the main issue appears to be with dnf. For ARM it's 
currently recommended to turn off dnf-makecache [1], which I actually 
intended to use to check for security related updates.


But there's PackageKit also running on the system, triggered by Cockpit 
update checks. PackageKit is keeping its own cache, iirc, and it's 
equally resource hungry.


Maybe settling for one package backend would be an option at least for 
the Server Edition? Personally, I could do without cockpit-packagekit, 
but others might want a replacement using (lib)dnf.


Bottom line: I care about this getting solved. But, if documented, 
there's no need for it to block F37 (Beta).


[1] 
https://fedoraproject.org/wiki/Architectures/ARM/Fedora_Linux_35#Tips_&_Tricks


-- Sandro
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
Done. Thanks for the feedback.

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Packaging a cross-compilation environment (wasi-libc)

2022-08-29 Thread Florian Weimer
* Jan Staněk:

> The main issue I'm fighting with currently is the CC0-licensed dlmalloc
> and it's possible replacement with the musl one.
> It seems that the dlmalloc is used mainly because it does not need
> a mmap-like capabilities on the system; WebAssembly does not provide that.
> I'm yet to succesfully compile the libc with any other malloc
> implementation – any help or pointers appreciated.

You can try to replace the current version with dlmalloc 2.7.2, which
still comes with the previous public domain dedication:

  

We can also ask Doug Lea if he can go back to the previous public domain
dedication.

Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: adding this software in default repo

2022-08-29 Thread Daniel Gonçalves
According to documentation sciter could be replaced by Flutter [1]. But 
unfortunately there is no support for wayland [2]


[1] : https://github.com/rustdesk/rustdesk#dependencies
[2] : https://github.com/rustdesk/rustdesk#change-wayland-to-x11-xorg


Le 2022-08-29 11:31, Clément DAVID a écrit :

Hello Martin,

At least the sciter [1] dependency does not match the open-source
criteria for being included ; maybe the server can be included.

[1]: https://sciter.com/

Regards,

davidcl

Le lun. 29 août 2022 à 11:24, martin luther
 a écrit :


https://github.com/rustdesk/rustdesk
can we add this in default fedora repo it qualify for everything to
be in fedora repo
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines:
https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:


https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Leigh Scott
> Here is a link to the code:
> 
> https://github.com/cowboysmall-apps/hid-ite8291r3-kmod
> 
> any help would be appreciated.
> 
> Thanks in advance,
> 
> J.K.
Drop the sub-package as it isn't correct to have it the kmod package.

https://github.com/cowboysmall-apps/hid-ite8291r3-kmod/blob/main/hid-ite8291r3-kmod.spec#L41

You will need to package it separately. 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Packaging a cross-compilation environment (wasi-libc)

2022-08-29 Thread Jan Staněk
Hello all again!

Some good news: With a gentle poking [1], the wasi-libc now have a
tagged version(s) - or at least tags corresponding to the version
used in a WASI-SDK. That should help us better agreement on which
version to use down the road.

[1]: https://github.com/WebAssembly/wasi-libc/issues/317

Josh Stone  writes:
> It might be fine to share this, as long as you are not patching upstream
> wasi-libc in some weird way. Rust's use is pretty minimal from vanilla
> sources, and mostly only updated when we need compatibility to build
> with a new Clang, in wasi-libc's Makefile "check-symbols" target.

I'm hoping we will be able to build it as-is; the only thing I'm now
currently patching is the Makefile, so that it picks up CFLAGS from
the environment. These flags get filtered to only those applicable
to the wasm32-wasi target.

The main issue I'm fighting with currently is the CC0-licensed dlmalloc
and it's possible replacement with the musl one.
It seems that the dlmalloc is used mainly because it does not need
a mmap-like capabilities on the system; WebAssembly does not provide that.
I'm yet to succesfully compile the libc with any other malloc
implementation – any help or pointers appreciated.

I've also opened an inquiry about this upstream [3];
we'll see how that goes.

[3]: https://github.com/WebAssembly/wasi-libc/issues/319
--
Jan Staněk
Software Engineer, Red Hat
jsta...@redhat.com   irc: jstanek


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Fedora rawhide compose report: 20220829.n.0 changes

2022-08-29 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20220828.n.0
NEW: Fedora-Rawhide-20220829.n.0

= SUMMARY =
Added images:1
Dropped images:  1
Added packages:  4
Dropped packages:0
Upgraded packages:   58
Downgraded packages: 0

Size of added packages:  1.36 MiB
Size of dropped packages:0 B
Size of upgraded packages:   328.69 MiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   13.38 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Astronomy_KDE live x86_64
Path: Labs/x86_64/iso/Fedora-Astronomy_KDE-Live-x86_64-Rawhide-20220829.n.0.iso

= DROPPED IMAGES =
Image: Design_suite live x86_64
Path: Labs/x86_64/iso/Fedora-Design_suite-Live-x86_64-Rawhide-20220828.n.0.iso

= ADDED PACKAGES =
Package: perl-File-Slurper-0.013-4.module_f38+15350+fda584f5
Summary: Simple, sane and efficient module to slurp a file
RPMs:perl-File-Slurper
Size:21.33 KiB

Package: perl-PerlIO-utf8_strict-0.009-4.module_f38+15350+fda584f5
Summary: Fast and correct UTF-8 I/O
RPMs:perl-PerlIO-utf8_strict
Size:105.11 KiB

Package: python-sphinx-reredirects-0.1.1-1.fc38
Summary: Handle redirects for moved pages in Sphinx documentation
RPMs:python-sphinx-reredirects-doc python3-sphinx-reredirects
Size:222.84 KiB

Package: rofi-wayland-1.7.5+wayland1-1.fc38
Summary: Fork of rofi with Wayland support
RPMs:rofi-wayland
Size:1.02 MiB


= DROPPED PACKAGES =

= UPGRADED PACKAGES =
Package:  asahi-scripts-20220821-3.fc38
Old package:  asahi-scripts-20220712-1.fc38
Summary:  Miscellaneous admin scripts for Asahi Linux
RPMs: dracut-config-asahi update-m1n1 update-vendor-firmware
Added RPMs:   dracut-config-asahi update-m1n1
Size: 27.97 KiB
Size change:  18.02 KiB
Changelog:
  * Sat Aug 27 2022 Davide Cavalca  20220821-1
  - Update to 20220821

  * Sat Aug 27 2022 Davide Cavalca  20220821-2
  - Add update-m1n1 subpackage

  * Sun Aug 28 2022 Davide Cavalca  20220821-3
  - Add dracut-config-asahi subpackage


Package:  cachelib-16^20220314gitbd22b0e-6.fc38
Old package:  cachelib-16^20220314gitbd22b0e-5.fc38
Summary:  Pluggable caching engine for scale high performance cache services
RPMs: cachelib cachelib-devel
Size: 6.72 MiB
Size change:  877 B
Changelog:
  * Sun Aug 28 2022 Mamoru TASAKA  
16^20220314gitbd22b0e-6
  - drop patches no longer needed - fixed in gcc side


Package:  cowsay-3.7.0-6.fc38
Old package:  cowsay-3.7.0-5.fc38
Summary:  Configurable speaking/thinking cow
RPMs: cowsay
Size: 51.92 KiB
Size change:  263 B
Changelog:
  * Mon Aug 22 2022 Hans Ulrich Niedermann  - 3.7.0-6
  - ship /etc/cowsay/cowpath.d directory


Package:  cppcheck-2.9-1.fc38
Old package:  cppcheck-2.8.2-2.fc37
Summary:  Tool for static C/C++ code analysis
RPMs: cppcheck cppcheck-gui cppcheck-htmlreport
Size: 17.41 MiB
Size change:  243.88 KiB
Changelog:
  * Sun Aug 28 2022 Wolfgang St??ggl  - 2.9-1
  - Update to 2.9


Package:  daggy-2.1.3-1.fc38
Old package:  daggy-2.1.2-2.fc36
Summary:  Data Aggregation Utility and developer library
RPMs: daggy daggy-devel
Size: 611.67 KiB
Size change:  1.18 KiB
Changelog:
  * Wed Jul 20 2022 Fedora Release Engineering  - 
2.1.2-3
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild

  * Sun Aug 28 2022 Mikhail Milovidov  - 
2.1.3-1.fc36
  - Updated daggy version up to 2.1.3


Package:  distribution-gpg-keys-1.77-1.fc38
Old package:  distribution-gpg-keys-1.76-1.fc38
Summary:  GPG keys of various Linux distributions
RPMs: distribution-gpg-keys distribution-gpg-keys-copr
Size: 39.86 MiB
Size change:  1.45 MiB
Changelog:
  * Sun Aug 28 2022 Miroslav Such??  1.77-1
  - Add openEuler GPG Key
  - update copr keys
  - Add Oracle Linux 9 key
  - Add Fedora 10 key


Package:  fcitx5-5.0.18-3.fc38
Old package:  fcitx5-5.0.18-2.fc37
Summary:  Next generation of fcitx
RPMs: fcitx5 fcitx5-autostart fcitx5-data fcitx5-devel
Size: 10.25 MiB
Size change:  16.12 KiB
Changelog:
  * Sun Aug 28 2022 Qiyu Yan  5.0.18-3
  - add weak dep: fcitx5-configtool (#2122011)


Package:  fmt-9.1.0-1.fc38
Old package:  fmt-9.0.0-2.fc37
Summary:  Small, safe and fast formatting library for C++
RPMs: fmt fmt-devel
Size: 1.19 MiB
Size change:  8.04 KiB
Changelog:
  * Sun Aug 28 2022 Vitaly Zaitsev  - 9.1.0-1
  - Updated to version 9.1.0.


Package:  fzf-0.33.0-1.fc38
Old package:  fzf-0.32.0-1.fc37
Summary:  A command-line fuzzy finder written in Go
RPMs: fzf
Size: 3.85 MiB
Size change:  934 B
Changelog:
  * Mon Aug 29 2022 Elliott Sales de Andrade  
0.33.0-1
  - Update to latest version (#2116702)


Package:  gdisk-1.0.9-4.fc38
Old package:  gdisk-1.0.9-3.fc37
Summary:  An fdisk-like partitioning tool for GPT disks
RPMs: gdisk
Size: 983.71 KiB
Size change:  2.83 KiB
Changelog:
  * Wed Aug 24 2022

Re: adding this software in default repo

2022-08-29 Thread Vitaly Zaitsev via devel

On 29/08/2022 11:21, martin luther wrote:

can we add this in default fedora repo it qualify for everything to be in 
fedora repo


Sure.

1. 
https://docs.fedoraproject.org/en-US/package-maintainers/Joining_the_Package_Maintainers/


2. https://docs.fedoraproject.org/en-US/packaging-guidelines/Rust/

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Dealing with projects using git submodules

2022-08-29 Thread Vitaly Zaitsev via devel

On 28/08/2022 22:10, Richard Shaw wrote:
Ahh, but that would include the whole tree / commit history / 
everything, right? Not just the version/tag I want.


--exclude=.git

--
Sincerely,
  Vitaly Zaitsev (vit...@easycoding.org)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Sérgio Basto
On Mon, 2022-08-29 at 10:32 +, Jerry Kiely wrote:
> Thanks so much. Making lots of progress now. The process has
> completed, and seems to be working. This is the contents of the
> result directory:
> 
>  ls -la
>  total 212
>  drwxrwsr-x. 1 jerry mock   432 Aug 29 11:07 .
>  drwxrwsr-x. 1 root  mock    48 Aug 29 11:07 ..
>  -rw-r--r--. 1 jerry mock 23454 Aug 29 11:07 akmod-hid-ite8291r3-0.0-
> 1.fc36.1.x86_64.rpm
>  -rw-rw-r--. 1 jerry mock 17705 Aug 29 11:07 build.log
>  -rw-r--r--. 1 jerry mock 15621 Aug 29 11:07 hid-ite8291r3-0.0-
> 1.fc36.1.x86_64.rpm
>  -rw-r--r--. 1 jerry mock 21253 Aug 29 11:07 hid-ite8291r3-kmod-0.0-
> 1.fc36.1.src.rpm
>  -rw-rw-r--. 1 jerry mock  3217 Aug 29 11:07 hw_info.log
>  -rw-rw-r--. 1 jerry mock 15748 Aug 29 11:07 installed_pkgs.log
>  -rw-r--r--. 1 jerry mock  6509 Aug 29 11:07 kmod-hid-ite8291r3-0.0-
> 1.fc36.1.x86_64.rpm
>  -rw-rw-r--. 1 jerry mock 97891 Aug 29 11:07 root.log
>  -rw-rw-r--. 1 jerry mock   883 Aug 29 11:07 state.log
> 
> Can I now install the akmod rpm to see if it works? Or do I need to
> do anything else? Please excuse my questions - this is my first RPM
> project and I am finding it quite difficult.
> 
> Thanks again to everyone for all of your time and patience,

$ rfpkg --release f35  mockbuild -N --root fedora-35-x86_64-
rpmfusion_free

(...)
Wrote: /builddir/build/RPMS/akmod-hid-ite8291r3-0.0-1.fc35.1.x86_64.rpm
Wrote: /builddir/build/RPMS/kmod-hid-ite8291r3-0.0-1.fc35.1.x86_64.rpm
Wrote: /builddir/build/RPMS/hid-ite8291r3-0.0-1.fc35.1.x86_64.rpm

# dnf install /var/lib/mock/fedora-35-x86_64/result/akmod-hid-
ite8291r3-0.0-1.fc35.1.x86_64.rpm /var/lib/mock/fedora-35-
x86_64/result/hid-ite8291r3-0.0-1.fc35.1.x86_64.rpm 

# akmods

(...)
Building rpms failed; see /var/cache/akmods/hid-ite8291r3/0.0-1.1-for-
5.19.4-100.fc35.x86_64.failed.log for details


$ vi /var/cache/akmods/hid-ite8291r3/0.0-1.1-for-5.19.4-
100.fc35.x86_64.failed.log

(...)
Makefile:9: *** missing separator.  Stop.

> 
> J.K.
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue

-- 
Sérgio M. B.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
Thanks so much. Making lots of progress now. The process has completed, and 
seems to be working. This is the contents of the result directory:

 ls -la
 total 212
 drwxrwsr-x. 1 jerry mock   432 Aug 29 11:07 .
 drwxrwsr-x. 1 root  mock48 Aug 29 11:07 ..
 -rw-r--r--. 1 jerry mock 23454 Aug 29 11:07 
akmod-hid-ite8291r3-0.0-1.fc36.1.x86_64.rpm
 -rw-rw-r--. 1 jerry mock 17705 Aug 29 11:07 build.log
 -rw-r--r--. 1 jerry mock 15621 Aug 29 11:07 
hid-ite8291r3-0.0-1.fc36.1.x86_64.rpm
 -rw-r--r--. 1 jerry mock 21253 Aug 29 11:07 
hid-ite8291r3-kmod-0.0-1.fc36.1.src.rpm
 -rw-rw-r--. 1 jerry mock  3217 Aug 29 11:07 hw_info.log
 -rw-rw-r--. 1 jerry mock 15748 Aug 29 11:07 installed_pkgs.log
 -rw-r--r--. 1 jerry mock  6509 Aug 29 11:07 
kmod-hid-ite8291r3-0.0-1.fc36.1.x86_64.rpm
 -rw-rw-r--. 1 jerry mock 97891 Aug 29 11:07 root.log
 -rw-rw-r--. 1 jerry mock   883 Aug 29 11:07 state.log

Can I now install the akmod rpm to see if it works? Or do I need to do anything 
else? Please excuse my questions - this is my first RPM project and I am 
finding it quite difficult.

Thanks again to everyone for all of your time and patience,

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Leigh Scott
> Thanks for the reply - I'll try this later.
> 
> Can you point me at the documentation for the process please? I can find docs 
> and
> tutorials on building standard RPMs - the hello tutorial for example - but I 
> can't
> find any documentation anywhere for building RPMs for kernel module, or for 
> building RPMs
> for RPMFusion.
> 
> Thanks in advance,
> 
> J.K.
Try

https://rpmfusion.org/Packaging/KernelModules/Kmods2#Mini-FAQ
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Roberto Ragusa

On 8/29/22 09:19, Zbigniew Jędrzejewski-Szmek wrote:

On Mon, Aug 22, 2022 at 05:44:26PM -0700, Adam Williamson wrote:



it's quite an old bug, but up until recently, the summary was
apparently accurate - dnf would run out of memory with 512M of RAM, but
was OK with 1G. However, as of quite recently, on F36 at least (not
sure if anyone's explicitly tested F37), dnf operations are commonly
failing on VMs/containers with 1G of RAM due to running out of RAM and
getting OOM-killed.


The discussion in the bug indicates that this memory growth is related to
loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, /usr/bin,
/usr/sbin), out into a separate lazilly-loaded file.

If it is currently loading stuff that is not really used in the computation,
this is a perfect case where swap could help (things would be written
to swap and then forgot on deallocation).
Unfortunately, swap is for some reason considered out-of-fashion, even in
these memory constrained set ups.

Regards.

--
   Roberto Ragusamail at robertoragusa.it
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Fabio Valentini
On Mon, Aug 29, 2022 at 10:47 AM Jerry Kiely  wrote:
>
> spectool executed successfully.
>
>   spectool -g hid-ite8291r3-kmod.spec 
>   
>  ✔
>   Downloading: 
> https://github.com/pobrn/hid-ite8291r3/archive/48e04cb96517f8574225ebabb286775feb942ef5/hid-ite8291r3-48e04cb.tar.gz
>   |  12.1 KiB Elapsed Time: 0:00:00
>   Downloaded: hid-ite8291r3-48e04cb.tar.gz
>
> but executing the same command after failed again.
>
>   rfpkg mockbuild -N --root fedora-36-x86_64-rpmfusion_free   
>   
>  ✔
>   sources file doesn't exist. Source files download skipped.
>   Failed to get repository name from Git url or pushurl
>   Failed to get ns from Git url or pushurl
>   Could not execute mockbuild: 
> /home/jerry/Workspace/Research/RPM/Modules/hid-ite8291r3-kmod is not a valid 
> repo

This failure is caused because you use fedpkg / rfpkg for building a
package outside a dist-git repository (see "Failed to get repository
name" and "Failed to get ns (namespace)" errors).
I recommend building the .src.rpm file with "rpmbuild -bs *.spec"
instead, and then run the mock build with "mock -r
fedora-36-x86_64-rpmfusion_free ./*.src.rpm".

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: adding this software in default repo

2022-08-29 Thread Clément DAVID
Hello Martin,

At least the sciter [1] dependency does not match the open-source criteria
for being included ; maybe the server can be included.

[1]: https://sciter.com/

Regards,
davidcl


Le lun. 29 août 2022 à 11:24, martin luther 
a écrit :

> https://github.com/rustdesk/rustdesk
> can we add this in default fedora repo it qualify for everything to be in
> fedora repo
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


adding this software in default repo

2022-08-29 Thread martin luther
https://github.com/rustdesk/rustdesk
can we add this in default fedora repo it qualify for everything to be in 
fedora repo
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
Here is the code:

  https://github.com/cowboysmall-apps/hid-ite8291r3-kmod

I tried to post the link a few minutes ago but it failed. Any help or advice 
would be greatly appreciated.

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
Here is a link to the code:

https://github.com/cowboysmall-apps/hid-ite8291r3-kmod

any help would be appreciated.

Thanks in advance,

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Fabio Valentini
On Mon, Aug 29, 2022 at 9:53 AM Brian (bex) Exelbierd
 wrote:
>
> I wonder if we should take another approach here. Assuming no serious bugs in 
> dnf, rather than tuning dnf for low memory environments could we suggest 
> those folks use Fedora Silverblue, CoreOS, or IoT?

Just speaking for myself: I have Fedora installations on 1G RAM VM
servers that I've been upgrading for many years now, and they just
keep chugging along as of Fedora 35. If I would need to either 1) pay
twice the money per month to keep this setup, or 2) spend a few days
reprovisioning the servers with Fedora CoreOS 36 (assuming it doesn't
suffer from the same problem), then I'd consider neither of these
options a desirable outcome.

> I use Fedora IoT on GCPs free tier offering and it is fine. I a, assuming 
> `rpm-ostree install` doesn’t have this issue.

rpm-ostree uses libdnf under the hood, so it might suffer from the
same issue ...

I wonder, what actually caused this issue? Are there just so many
packages with so many files now that the metadata has just grown
beyond a specific threshold (again)? Or are there underlying bugs /
inefficiencies in dnf that lead to more RAM use that would be
necessary? If it's the former, then "fixing" the problem will probably
need to wait for "DNF5", but if it's the latter, that's something we
could actually fix *now*?

Fabio
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: [fedora-arm] Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Hans de Goede
Hi,

On 8/23/22 02:44, Adam Williamson wrote:
> Hey folks! I apologize for the wide distribution, but this seemed like
> a bug it'd be appropriate to get a wide range of input on.
> 
> There's a bug that was proposed as an F37 Beta blocker:
> https://bugzilla.redhat.com/show_bug.cgi?id=1907030
> 
> it's quite an old bug, but up until recently, the summary was
> apparently accurate - dnf would run out of memory with 512M of RAM, but
> was OK with 1G. However, as of quite recently, on F36 at least (not
> sure if anyone's explicitly tested F37), dnf operations are commonly
> failing on VMs/containers with 1G of RAM due to running out of RAM and
> getting OOM-killed.
> 
> There's some discussion in the bug about what might be causing this and
> potential ways to resolve it, and please do dig into/contribute to that
> if you can, but the other question here I guess is: how much do we care
> about this? How bad is it that you can't reliably run dnf operations on
> top of a minimal Fedora environment with 1G of RAM?
> 
> This obviously has some overlap with our stated hardware requirements,
> so here they are for the record:
> 
> https://docs.fedoraproject.org/en-US/fedora/latest/release-notes/welcome/Hardware_Overview/
> 
> that specifies 2GB as the minimum memory for "the default
> installation", by which I think it's referring to a default Workstation
> install, though this should be clarified. But then there's a "Low
> memory installations" boxout, which suggests that "users with less than
> 768MB of system memory may have better results performing a minimal
> install and adding to it afterward", which kinda is recommending that
> people do exactly the thing that doesn't work (do a minimal install
> then use dnf on it), and implying it'll work.
> 
> After some consideration I don't think it makes sense to take this bug
> as an F37 blocker, since it already affects F36, and that's what I'll
> be suggesting at the next blocker review meeting. However, it does seem
> a perfect candidate for prioritized bug status, and I've nominated it
> for that.
> 
> I guess if folks can chime in with thoughts here and/or in the bug
> report, maybe a consensus will emerge on just how big of an issue this
> is (and how likely it is to get fixed). There will presumably be a
> FESCo ticket related to prioritized bug status too.

I still have quite a few x86_64 tablets with only 1G RAM, so I personally
definitely care about this.

With that said I do regularly run dnf on them without issues,
although I think most of the 1G models I have are still at F35...

Still I wonder why this is an issue in some cases:

1. ZRAM helps a lot here, but I guess with containers when limiting them
to 1G you really only get 1G since ZRAM works on the system level not
the container level. In the VM case though ZRAM should help, is ZRAM
enabled ?  ZRAM is enabled by default for Workstation installs, but
maybe not in other installs ?

2. Maybe there are some other processes also taking up more RAM
then expected causing extra memory pressure ?

Regards,

Hans
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
spectool executed successfully.

  spectool -g hid-ite8291r3-kmod.spec   
 ✔ 
  Downloading: 
https://github.com/pobrn/hid-ite8291r3/archive/48e04cb96517f8574225ebabb286775feb942ef5/hid-ite8291r3-48e04cb.tar.gz
  |  12.1 KiB Elapsed Time: 0:00:00 

 
  Downloaded: hid-ite8291r3-48e04cb.tar.gz

but executing the same command after failed again.

  rfpkg mockbuild -N --root fedora-36-x86_64-rpmfusion_free 
 ✔ 
  sources file doesn't exist. Source files download skipped.
  Failed to get repository name from Git url or pushurl
  Failed to get ns from Git url or pushurl
  Could not execute mockbuild: 
/home/jerry/Workspace/Research/RPM/Modules/hid-ite8291r3-kmod is not a valid 
repo

I feel like I am lost - could you point me at the relevant documentation?

J.K.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: CPE Weekly Update - Week 34 2022

2022-08-29 Thread Michal Konecny
The main reason for this is added infographics, which is better to read 
on blogpost than e-mail. Also the CentOS account works with most of the 
Fedora services, so you shouldn't have issue to subscribe to these services.


Michal

On 27. 08. 22 7:48, Maxwell G via devel wrote:


Aug 26, 2022 7:02:06 AM Michal Konecny :

If you want to receive weekly reports by emails in the future, please 
subscribe to either https://communityblog.fedoraproject.org/ or 
https://discussion.fedoraproject.org/c/news/commblog/61. We will stop 
sending them in the future.
Why is that? I appreciate getting the updates as a clean, plain text 
email that doesn't require clicking external links to read.


Also,  I'd venture that not every CentOS person is interested in the 
Fedora blog or forums.

--
Best,

Maxwell G (@gotmax23)
Pronouns: He/Him/His

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: problem creating a kernel module rpm package

2022-08-29 Thread Jerry Kiely
Thanks for the reply - I'll try this later.

Can you point me at the documentation for the process please? I can find docs 
and tutorials on building standard RPMs - the hello tutorial for example - but 
I can't find any documentation anywhere for building RPMs for kernel module, or 
for building RPMs for RPMFusion.

Thanks in advance,

J.K. 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Brian (bex) Exelbierd
On Mon, Aug 29, 2022 at 5:24 AM Adam Williamson 
wrote:

> Hey folks! I apologize for the wide distribution, but this seemed like
> a bug it'd be appropriate to get a wide range of input on.
>
> There's a bug that was proposed as an F37 Beta blocker:
> https://bugzilla.redhat.com/show_bug.cgi?id=1907030
>
> it's quite an old bug, but up until recently, the summary was
> apparently accurate - dnf would run out of memory with 512M of RAM, but
> was OK with 1G. However, as of quite recently, on F36 at least (not
> sure if anyone's explicitly tested F37), dnf operations are commonly
> failing on VMs/containers with 1G of RAM due to running out of RAM and
> getting OOM-killed.


I wonder if we should take another approach here. Assuming no serious bugs
in dnf, rather than tuning dnf for low memory environments could we suggest
those folks use Fedora Silverblue, CoreOS, or IoT?

I use Fedora IoT on GCPs free tier offering and it is fine. I a, assuming
`rpm-ostree install` doesn’t have this issue.

Regards,

bex



>
> There's some discussion in the bug about what might be causing this and
> potential ways to resolve it, and please do dig into/contribute to that
> if you can, but the other question here I guess is: how much do we care
> about this? How bad is it that you can't reliably run dnf operations on
> top of a minimal Fedora environment with 1G of RAM?
>
> This obviously has some overlap with our stated hardware requirements,
> so here they are for the record:
>
>
> https://docs.fedoraproject.org/en-US/fedora/latest/release-notes/welcome/Hardware_Overview/
>
> that specifies 2GB as the minimum memory for "the default
> installation", by which I think it's referring to a default Workstation
> install, though this should be clarified. But then there's a "Low
> memory installations" boxout, which suggests that "users with less than
> 768MB of system memory may have better results performing a minimal
> install and adding to it afterward", which kinda is recommending that
> people do exactly the thing that doesn't work (do a minimal install
> then use dnf on it), and implying it'll work.
>
> After some consideration I don't think it makes sense to take this bug
> as an F37 blocker, since it already affects F36, and that's what I'll
> be suggesting at the next blocker review meeting. However, it does seem
> a perfect candidate for prioritized bug status, and I've nominated it
> for that.
>
> I guess if folks can chime in with thoughts here and/or in the bug
> report, maybe a consensus will emerge on just how big of an issue this
> is (and how likely it is to get fixed). There will presumably be a
> FESCo ticket related to prioritized bug status too.
>
> Thanks folks!
> --
> Adam Williamson
> Fedora QA
> IRC: adamw | Twitter: adamw_ha
> https://www.happyassassin.net
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
-- 
Don't rush to reply to this email.  Enjoy work/life balance.  I read email
once a day and am in the CE(S)T timezone.  If you have an urgent email,
ping me, and consider other mediums in the future.

Brian "bex" Exelbierd (he/him/his)
​Business Strategist for Communities and Developers
Red Hat Enterprise Linux
@bexelbie | http://www.winglemeyer.org
bexel...@redhat.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Heads-up / for discussion: dnf not working with 1G of RAM or less

2022-08-29 Thread Zbigniew Jędrzejewski-Szmek
On Mon, Aug 22, 2022 at 05:44:26PM -0700, Adam Williamson wrote:
> Hey folks! I apologize for the wide distribution, but this seemed like
> a bug it'd be appropriate to get a wide range of input on.
> 
> There's a bug that was proposed as an F37 Beta blocker:
> https://bugzilla.redhat.com/show_bug.cgi?id=1907030
> 
> it's quite an old bug, but up until recently, the summary was
> apparently accurate - dnf would run out of memory with 512M of RAM, but
> was OK with 1G. However, as of quite recently, on F36 at least (not
> sure if anyone's explicitly tested F37), dnf operations are commonly
> failing on VMs/containers with 1G of RAM due to running out of RAM and
> getting OOM-killed.

The discussion in the bug indicates that this memory growth is related to
loading of the full filepath dataset. We have been discussing splitting
out the non-primary-filepath-data (i.e. paths that are not /etc, /usr/bin,
/usr/sbin), out into a separate lazilly-loaded file. If we manage to do
that, we'll kill two birds with one stone:

- initial download of repo metadata on every freakin' dnf operation can
  go down from 80 to 20 MB
- the peak memory use will go down

Apparently DNF5 makes this possible.
My vote is: yes, this is an issue. No, we shouldn't block F37 on this.
Apparently the only reasonable way to tackle this is with a major rework
of DNF, so let's get it right with DNF5.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Self-introduction: Tommy Nguyen

2022-08-29 Thread Tommy Nguyen
Hello all,

I've been using Fedora for many years and recently became interesting
in QA testing. My interest developed when I wanted to test programs
before they reached stable so that I could ensure that I wouldn't be
surprised by an update. But I find the QA process to be kind of find
and useful.

My previous experience includes maintaining a website (see footer) and
I have a few COPR packages as well. 

I'm not really interested in joining currently as I probably will not
be able to commit, but I'd like to keep testing, filing bug reports and
be useful in some way.

Thanks.

--
Site: https://linuxguideandhints.com/
COPR: https://copr.fedorainfracloud.org/coprs/remyabel/
IRC: remyabel2
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Self Introduction to fedora-devel and package sponsorship

2022-08-29 Thread Benson Muite



On 8/29/22 09:10, Federico Pellegrin wrote:



Hello all,
It's been a while that I'm following the list and finally wanted to do a 
small self introduction.


I'm Federico, currently living nearby Munich and working at ESO (the 
European Southern Observatory), somehow split, although many topics 
overlap, between build systems and distribution management on one side, 
and real-time systems for the observatories we manage (the currently 
running VLT and the upcoming ELT).

Welcome Frederico! You may also consider joining the SciTech SIG:
https://fedoraproject.org/wiki/Category:SciTech_SIG


Many thanks!
Federico



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Self Introduction to fedora-devel and package sponsorship

2022-08-29 Thread Federico Pellegrin
Hello all,
It's been a while that I'm following the list and finally wanted to do a
small self introduction.

I'm Federico, currently living nearby Munich and working at ESO (the
European Southern Observatory), somehow split, although many topics
overlap, between build systems and distribution management on one side, and
real-time systems for the observatories we manage (the currently running
VLT and the upcoming ELT).
My colleague Piotr introduced himself not long ago, mentioning also how we
are moving to Fedora (with most of the current systems running on CentOS or
similar, anyhow RPM based) and therefore our interest in contributing more
actively to Fedora grew quite some.

I have quite some experience in packaging (and related topics such as
crosscompilation) and did some small contributions with MRs for a few
Fedora packages. I've some contributed as well in a series of other OSS
projects (more embedded, build systems and ci/cd related topics). Till the
damn CoVid situation started, I was quite a regular also at some OSS
events, such as FOSDEM (and the usually related CentOS Dojo), OSS-eu and
various DevOps/Jenkins events. So I have the feeling I may have seen or
listened to some of the participants in the list also someplace there.

Coming back to packaging: I've moved in the last weeks a non-responsive
maintaner ticket (https://pagure.io/fesco/issue/2856) for a package
(bumpversion) I made a PR and was hoping in case to jump in if noone is
interested in maintaining it.
I've also opened, and looking for a sponsor, a ticket to add a new package
to the distribution, the Robot framework for testing which we use
extensively and find it may be interesting to others as well (
https://bugzilla.redhat.com/show_bug.cgi?id=2087143). I have a couple other
packages we use at ESO that would like in case to propose as new packages
to Fedora (some work here:
https://github.com/fedepell/rpms-specs/tree/master/python), but maybe one
thing at a time!

Many thanks!
Federico
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: GTK 2 removal from RHEL 10+

2022-08-29 Thread Tomáš Popela
Hi Sérgio,

Dne so 27. 8. 2022 21:53 uživatel Sérgio Basto  napsal:

> As Kevin Kofler (more or less) wrote in "Pcre Deprecation" thread,
> maybe we should be prepared to support pcre-1 forever and IMO we also
> can extend the concept to other packages, btw GTK2 is one of them .
>
>
> Checking on rawhide gtk2 still have 385 packages that depend on gtk2
> ...


Please don't mix apple and oranges - the email is about RHEL and not about
Fedora. We don't have any intentions for removing GTK 2 from Fedora (at
least not for the foreseeable future) and even if that would happen, we
would orphan the package so anyone from the community can step in.

Bye,
Tom
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: GTK 2 removal from RHEL 10+

2022-08-29 Thread Tomáš Popela
Hi Kevin,

Dne so 27. 8. 2022 1:44 uživatel Kevin Kofler via devel <
devel@lists.fedoraproject.org> napsal:

> Tomáš Popela wrote:
> > This is an early heads-up about GTK 2 removal from RHEL 10+ (the gtk2
> > package was marked as unwanted in ELN with
> >
> https://github.com/minimization/content-resolver-input/commit/b6d44e496f46bd2444e8e24dd3e9113b326817ac
> ).
>
> I suppose it could be carried in EPEL if needed.


Yes, definitely someone can come in and package it in EPEL if they want to.

Or is somebody attempting
> to veto that too?
>

I don't see why anyone would do that.

Bye,
Tom
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue