Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Knapp
As a normal hobby users, the biggest risk that I see is downloading a
blend from the net and opening it. This is not something we are likely
to give up. So, warning or not, what good is it? I need some way to
know if the file is good or bad. I don't see an answer. I would say a
good third of the users or more download blends for learning at least
and often for producing their own stuff.



-- 
Douglas E Knapp

Creative Commons Film Group, Helping people make open source movies
with open source software!
http://douglas.bespin.org/CommonsFilmGroup/phpBB3/index.php

Massage in Gelsenkirchen-Buer:
http://douglas.bespin.org/tcm/ztab1.htm
Please link to me and trade links with me!

Open Source Sci-Fi mmoRPG Game project.
http://sf-journey-creations.wikispot.org/Front_Page
http://code.google.com/p/perspectiveproject/
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Knapp
On Wed, Jun 5, 2013 at 8:03 AM, Knapp magick.c...@gmail.com wrote:
 As a normal hobby users, the biggest risk that I see is downloading a
 blend from the net and opening it. This is not something we are likely
 to give up. So, warning or not, what good is it? I need some way to
 know if the file is good or bad. I don't see an answer. I would say a
 good third of the users or more download blends for learning at least
 and often for producing their own stuff.

What might be much more useful is a program that load a blend and tell
me what it might do. For example, does it run scripts, does it have
crazy large data sets? If it runs scripts then it should be able to
show me them. It should look at the data sizes that the blend will use
and make guesses if it is too large. Naturally it should only open the
blend as data and not as blender would.
-- 
Douglas E Knapp

Creative Commons Film Group, Helping people make open source movies
with open source software!
http://douglas.bespin.org/CommonsFilmGroup/phpBB3/index.php

Massage in Gelsenkirchen-Buer:
http://douglas.bespin.org/tcm/ztab1.htm
Please link to me and trade links with me!

Open Source Sci-Fi mmoRPG Game project.
http://sf-journey-creations.wikispot.org/Front_Page
http://code.google.com/p/perspectiveproject/
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Campbell Barton
On Wed, Jun 5, 2013 at 4:21 PM, Knapp magick.c...@gmail.com wrote:
 On Wed, Jun 5, 2013 at 8:03 AM, Knapp magick.c...@gmail.com wrote:
 As a normal hobby users, the biggest risk that I see is downloading a
 blend from the net and opening it. This is not something we are likely
 to give up. So, warning or not, what good is it? I need some way to
 know if the file is good or bad. I don't see an answer. I would say a
 good third of the users or more download blends for learning at least
 and often for producing their own stuff.

 What might be much more useful is a program that load a blend and tell
 me what it might do. For example, does it run scripts, does it have
 crazy large data sets? If it runs scripts then it should be able to
 show me them. It should look at the data sizes that the blend will use
 and make guesses if it is too large. Naturally it should only open the
 blend as data and not as blender would.
 --
 Douglas E Knapp

Such a tool isn't so hard to write, see this python module which loads
up blend files without using blender.
http://blender-aid.googlecode.com/svn/trunk/src/blendfile.py
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] platform maintainers: request to update exr lib to 2.0

2013-06-05 Thread Jürgen Herrmann
Hi Dalai,

have you tried to build a RelWithDebInfo Build of OpenEXR?
This could help to track down the Error if the Debug Lib doesn't help.

/Jürgen

Am 05. Juni 2013 um 10:40 schrieb Dalai Felinto dfeli...@gmail.com:

 I found where the crash is (still no idea why it's crashing):

 #
 openexr_api.cpp::imb_load_openexr (...)
 (...)
  Mem_IStream *membuf = new Mem_IStream(mem, size);
 #

 To get there I had to build a debug build and replace the linking to:

 \lib\windows\openexr\lib\IlmImf.lib
 instead of:
 \lib\windows\openexr\lib\IlmImf_d.lib

 And it consistently breaks on Release for windows and 64, but not for Debug.
 Any clues on how to debug this?

 --
 Dalai

 --
 blendernetwork.org/member/dalai-felinto
 www.dalaifelinto.com


 2013/6/3 Jürgen Herrmann shadow...@me.com:
  Hi Dalai,
 
  I can recompile the libs tomorrow. I'll contact you when I am done.
  I doubt that this will change anything though. The header that was missing 
  wasn't installed by the CMake build routine it was not missing at compile 
  time.
  It was just omitted by the install script.
  But nevertheless I'll try to recompile them for you.
  Otherwise we should try to report a bug to the OpenEXR devs. It could be an 
  error in the libs.
 
  /Jürgen
 
  Am 03.06.2013 um 20:58 schrieb Dalai Felinto dfeli...@gmail.com:
 
  Hi again,
 
  The new OIIO libraries don't make any difference. OIIO depends on
  OpenEXR and not the other way around. So although that could I can't
  see how they would change things.
 
  I remember when you first uploaded the libraries you forgot a header
  file (which I'm using in the code). I wonder if it's related and the
  first release build is buggy. The ideal would be to rebuild OpenEXR
  for release and hope it fixes the problem.
 
  If you don't want to commit the libs without knowing they will fix the
  problem you can put them on blender.org ftp incoming folder. (or poke
  me on IRC and we can find a solution).
 
  (or checkout the svn code for multiview, it should be easy to
  reproduce the problem in your windows station)
 
  Thanks,
  Dalai
 
 
  --
  blendernetwork.org/member/dalai-felinto
  www.dalaifelinto.com
 
 
  2013/6/2 Jürgen Herrmann shadow...@me.com:
  Hi Dalai,
 
  Thomas Dinges asked me to downgrade OIIO to 1.1.11 just today.
  Please try to do a SVN update on your libs and compile again using these.
  These problems are strange...
  I will have a closer look on this tomorrow.
 
  /Jürgen
 
  Am 02.06.2013 um 20:16 schrieb Dalai Felinto dfeli...@gmail.com:
 
  Hi Jurgen,
  I think the problem is the release library.
 
  Even with cmake+msvc the exr sample image fails when I build release.
  And I just tested with the 1.2 oiio libraries and I still get the same
  error with scons+msvc debug.
 
  Remember that you forgot to include a header in your first commit of
  the library? I wonder if that was somehow also missing when you built
  it. I don't know.
 
  --
  Dalai
  ___
  Bf-committers mailing list
  Bf-committers@blender.org
  http://lists.blender.org/mailman/listinfo/bf-committers
  ___
  Bf-committers mailing list
  Bf-committers@blender.org
  http://lists.blender.org/mailman/listinfo/bf-committers
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


[Bf-committers] CUDA performance analysis (with my experimental changes)

2013-06-05 Thread Doug Gale
I modified the the CUDA renderer to take environment variable overrides 
to allow a performance test to iterate through several combinations of 
parameters.

The code has many performance optimizations that I have made to 
eliminate redundant memory allocations, using all asynchronous 
operations (all memory copies and kernel launches), using two streams 
fed from a single thread (interleaved 1:1 between them) each processing 
a separate tile, and using a RenderBuffers pool to eliminate those 
allocations and frees.

Surprisingly, the largest register count with the smallest warp size had 
the best time! Best time has 33% occupancy.

Tested on SM 2.0 hardware (single GTX 580) rendered from command line. 
Display driver is nvidia-experimental-310. Scene is the BMW scene with 
the default size (1280x600), percent at 75% (result is 960x450), tile 
size at the default 64x64. Using CUDA 5.0 toolkit on Linux Mint 14 Mate 
64-bit.Linux kernel is 3.5.0-28-generic. CPU is 6-core Core I7 990x 
Extreme Edition 12MB L3. PCIe 16x bus. 20GB 1066 RAM in triple channel 
configuration. Bus interface is 16x PCIe.


*registers* *warp size* *optimization*  *time (s)
*
63  64  3   70.80
63  64  2   70.81
63  64  1   70.87
63  64  0   70.96
63  64  4   71.03
42  64  3   72.10
42  64  0   72.17
42  64  4   72.21
32  64  0   72.44
42  64  2   72.47
32  64  4   72.49
63  256 4   72.61
63  256 3   72.65
63  256 1   72.70
32  64  2   72.77
42  64  1   72.78
32  64  1   72.82
63  256 2   73.09
63  256 0   73.27
32  64  3   73.55
42  256 3   74.16
42  256 0   74.26
42  256 2   74.34
42  256 4   74.39
42  256 1   74.42
32  256 2   74.57
32  256 4   74.57
32  256 0   74.60
24  64  3   74.62
32  256 3   74.70
24  64  1   74.75
24  64  2   75.09
32  256 1   75.15
24  64  4   75.30
24  64  0   75.39
24  256 3   76.90
20  64  1   76.92
20  64  2   77.12
20  64  0   77.14
20  64  3   77.14
24  256 1   77.42
24  256 2   77.64
20  64  4   77.65
24  256 0   78.31
20  256 1   79.21
20  256 4   79.23
20  256 2   79.43
*20**256*   *3* *79.75*
24  256 4   79.81
20  256 0   79.83
32  10242   100.93
32  10243   100.95
32  10240   101.25
32  10244   101.28
32  10241   101.47
24  10242   105.52
24  10240   105.62
24  10244   106.00
24  10243   106.39
24  10241   106.53
20  10241   111.51
20  10242   111.61
20  10243   111.69
20  10240   111.74
20  10244   111.84


The following combinations fail due to insufficient resources:

/42//1024/  /2/ /failed/
/63//1024/  /4/ /failed/
/42//1024/  /4/ /failed/
/63//1024/  /1/ /failed/
/63//1024/  /2/ /failed/
/42//1024/  /0/ /failed/
/42//1024/  /1/ /failed/
/63//1024/  /0/ /failed/
/42//1024/  /3/ /failed/
/63//1024/  /3/ /failed/


I am going to re-run the analysis with even smaller warp sizes to see 
what happens.

-Doug

___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Ton Roosendaal
Hi,

I've checked some history of past discussions (including sandboxing Python) and 
to me it seems we still accept too much risk here. As a team (and for me as 
Blender Foundation chairman) I feel it's a big responsibility to not waive away 
so easily.

More over - it's a disaster waiting to be happening one day. It would be 
unforgivable if we didn't at least help users to have a basic security in place.

The discussion is also getting too much complicated by knowledgable people who 
point out that there's always another vulnerability or other methods to bypass 
any security feature. IMHO that's irrelevant, should never be a reason to 
ignore it altogether.

We should be able to bring down this topic to a basic and sensible minimal 
protection we provide for users.

Can we form some kindof workgroup to investigate it further and define a 
proposal for actions? Or a roadmap? 

And: is there a consensis to make the default startup install have 'autorun' 
disabled, with a notifier in the top header about it?

-Ton-


Ton Roosendaal  -  t...@blender.org   -   www.blender.org
Chairman Blender Foundation - Producer Blender Institute
Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands



On 5 Jun, 2013, at 8:25, Campbell Barton wrote:

 On Wed, Jun 5, 2013 at 4:21 PM, Knapp magick.c...@gmail.com wrote:
 On Wed, Jun 5, 2013 at 8:03 AM, Knapp magick.c...@gmail.com wrote:
 As a normal hobby users, the biggest risk that I see is downloading a
 blend from the net and opening it. This is not something we are likely
 to give up. So, warning or not, what good is it? I need some way to
 know if the file is good or bad. I don't see an answer. I would say a
 good third of the users or more download blends for learning at least
 and often for producing their own stuff.
 
 What might be much more useful is a program that load a blend and tell
 me what it might do. For example, does it run scripts, does it have
 crazy large data sets? If it runs scripts then it should be able to
 show me them. It should look at the data sizes that the blend will use
 and make guesses if it is too large. Naturally it should only open the
 blend as data and not as blender would.
 --
 Douglas E Knapp
 
 Such a tool isn't so hard to write, see this python module which loads
 up blend files without using blender.
 http://blender-aid.googlecode.com/svn/trunk/src/blendfile.py
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers

___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Ton Roosendaal
Hi,

Here's just some ideas to investigate:

1) Better location for temp saves

- remove /tmp/ usage from our default, and move it to sane a path inside user 
space. We can call this sandbox or so, which (on first use) could also be 
confirmed by users to be used as such.

- sandbox paths could simply be the ones without / or // or C:\\ etc.

2) Communicate to users all saving C/C++ code well

- Each save of a file should be printed in terminals.

- Only allow non-user approved saves to files in sandbox (like temp files). 

- All other saves by tools should go by design via user confirmations (popup 
save-over). For tools with standard output paths (bakes, caches, anim render) 
only relative paths should be allowed (without confirmation).

3) Formalize definition of trusted source better.

- Any .blend file with absolute output paths could be marked untrusted by 
default.

- Macs (and Windows?) already have a way to detect a downloaded file, which can 
marked to be untrusted .blend.

- Blender files can also get a User identifier struct, which can be used for 
various ways to mark files 'trusted' or not. 
In its simplest implementation it can just store an identifier string (copied 
from userpref) to mark files as saved by myself. 

4) Replace Python's os module

- For standard releases, the os module could follow same file save rules as our 
C code does. Untrusted files could default be allowed to use sandbox only.

-Ton-


Ton Roosendaal  -  t...@blender.org   -   www.blender.org
Chairman Blender Foundation - Producer Blender Institute
Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands



On 5 Jun, 2013, at 13:24, Ton Roosendaal wrote:

 Hi,
 
 I've checked some history of past discussions (including sandboxing Python) 
 and to me it seems we still accept too much risk here. As a team (and for me 
 as Blender Foundation chairman) I feel it's a big responsibility to not waive 
 away so easily.
 
 More over - it's a disaster waiting to be happening one day. It would be 
 unforgivable if we didn't at least help users to have a basic security in 
 place.
 
 The discussion is also getting too much complicated by knowledgable people 
 who point out that there's always another vulnerability or other methods to 
 bypass any security feature. IMHO that's irrelevant, should never be a reason 
 to ignore it altogether.
 
 We should be able to bring down this topic to a basic and sensible minimal 
 protection we provide for users.
 
 Can we form some kindof workgroup to investigate it further and define a 
 proposal for actions? Or a roadmap? 
 
 And: is there a consensis to make the default startup install have 'autorun' 
 disabled, with a notifier in the top header about it?
 
 -Ton-
 
 
 Ton Roosendaal  -  t...@blender.org   -   www.blender.org
 Chairman Blender Foundation - Producer Blender Institute
 Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands
 
 
 
 On 5 Jun, 2013, at 8:25, Campbell Barton wrote:
 
 On Wed, Jun 5, 2013 at 4:21 PM, Knapp magick.c...@gmail.com wrote:
 On Wed, Jun 5, 2013 at 8:03 AM, Knapp magick.c...@gmail.com wrote:
 As a normal hobby users, the biggest risk that I see is downloading a
 blend from the net and opening it. This is not something we are likely
 to give up. So, warning or not, what good is it? I need some way to
 know if the file is good or bad. I don't see an answer. I would say a
 good third of the users or more download blends for learning at least
 and often for producing their own stuff.
 
 What might be much more useful is a program that load a blend and tell
 me what it might do. For example, does it run scripts, does it have
 crazy large data sets? If it runs scripts then it should be able to
 show me them. It should look at the data sizes that the blend will use
 and make guesses if it is too large. Naturally it should only open the
 blend as data and not as blender would.
 --
 Douglas E Knapp
 
 Such a tool isn't so hard to write, see this python module which loads
 up blend files without using blender.
 http://blender-aid.googlecode.com/svn/trunk/src/blendfile.py
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers
 
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers

___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Bassam Kurdali
On Wed, 2013-06-05 at 14:35 +0200, Ton Roosendaal wrote:
 Hi,
 
 Here's just some ideas to investigate:
 
 1) Better location for temp saves

1) is actually really nice, /tmp has issues on some systems still and we
often move the default to inside the home dir. esp. some systems don't
keep /tmp between boots which has caused data loss sometimes.

 2) Communicate to users all saving C/C++ code well
 
saves initiated by a user (not by a script, tool, autosave or node save)
should probably allowed anywhere the user has permission. also the user
should have an easy way to make a file trusted.

 3) Formalize definition of trusted source better.
 
 - Any .blend file with absolute output paths could be marked untrusted by 
 default.
 
 - Macs (and Windows?) already have a way to detect a downloaded file, which 
 can marked to be untrusted .blend.
 
 - Blender files can also get a User identifier struct, which can be used for 
 various ways to mark files 'trusted' or not. 
 In its simplest implementation it can just store an identifier string (copied 
 from userpref) to mark files as saved by myself. 
 
Once you get into this the trusted thing can be forged; I'm guessing
some cyptography / security people have to weigh in on how to stop that.
 4) Replace Python's os module
 
Please don't!
We use python OS module so much for pipeline scripts, and I can't
imagine other studios just don't do this. Replacing it with something
crippled for security would be a huge annoyance - yes we can build our
own, but for us at least we depend on external collaborators running on
their own systems - sometimes our builds don't work for them. Things
that we need to do are in the file manipulation range, such as moving or
renaming large numbers of files, we access our share for the project in
an absolute path in the root (this was standard practice before I got
here) etc. etc. Messing with OS module would be pretty bad for us, and I
don't know what would make it safe other than removing most of it's
functionality anyway (the only thing safe is probably file path
joining/splitting)
 -Ton-
 
 
 Ton Roosendaal  -  t...@blender.org   -   www.blender.org
 Chairman Blender Foundation - Producer Blender Institute
 Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands
 
 
 
 On 5 Jun, 2013, at 13:24, Ton Roosendaal wrote:
 
  Hi,
  
  I've checked some history of past discussions (including sandboxing Python) 
  and to me it seems we still accept too much risk here. As a team (and for 
  me as Blender Foundation chairman) I feel it's a big responsibility to not 
  waive away so easily.
  
  More over - it's a disaster waiting to be happening one day. It would be 
  unforgivable if we didn't at least help users to have a basic security in 
  place.
  
  The discussion is also getting too much complicated by knowledgable people 
  who point out that there's always another vulnerability or other methods to 
  bypass any security feature. IMHO that's irrelevant, should never be a 
  reason to ignore it altogether.
  
  We should be able to bring down this topic to a basic and sensible minimal 
  protection we provide for users.
  
  Can we form some kindof workgroup to investigate it further and define a 
  proposal for actions? Or a roadmap? 
  
  And: is there a consensis to make the default startup install have 
  'autorun' disabled, with a notifier in the top header about it?
  
  -Ton-
  
  
  Ton Roosendaal  -  t...@blender.org   -   www.blender.org
  Chairman Blender Foundation - Producer Blender Institute
  Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands
  
  
  
  On 5 Jun, 2013, at 8:25, Campbell Barton wrote:
  
  On Wed, Jun 5, 2013 at 4:21 PM, Knapp magick.c...@gmail.com wrote:
  On Wed, Jun 5, 2013 at 8:03 AM, Knapp magick.c...@gmail.com wrote:
  As a normal hobby users, the biggest risk that I see is downloading a
  blend from the net and opening it. This is not something we are likely
  to give up. So, warning or not, what good is it? I need some way to
  know if the file is good or bad. I don't see an answer. I would say a
  good third of the users or more download blends for learning at least
  and often for producing their own stuff.
  
  What might be much more useful is a program that load a blend and tell
  me what it might do. For example, does it run scripts, does it have
  crazy large data sets? If it runs scripts then it should be able to
  show me them. It should look at the data sizes that the blend will use
  and make guesses if it is too large. Naturally it should only open the
  blend as data and not as blender would.
  --
  Douglas E Knapp
  
  Such a tool isn't so hard to write, see this python module which loads
  up blend files without using blender.
  http://blender-aid.googlecode.com/svn/trunk/src/blendfile.py
  ___
  Bf-committers mailing list

Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Ton Roosendaal
Hi,

 Things
 that we need to do are in the file manipulation range, such as moving or
 renaming large numbers of files

Well, that you can do outside Blender via regular Python too?

Further - if we can make file manipulations in the UI work sane/safe (and 
usable still), the hacked os module would just do same :) You will also define 
your own blends to be 'trusted' and allow scripts there to write anywhere you 
want (or not).

-Ton-


Ton Roosendaal  -  t...@blender.org   -   www.blender.org
Chairman Blender Foundation - Producer Blender Institute
Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands



On 5 Jun, 2013, at 16:19, Bassam Kurdali wrote:

 On Wed, 2013-06-05 at 14:35 +0200, Ton Roosendaal wrote:
 Hi,
 
 Here's just some ideas to investigate:
 
 1) Better location for temp saves
 
 1) is actually really nice, /tmp has issues on some systems still and we
 often move the default to inside the home dir. esp. some systems don't
 keep /tmp between boots which has caused data loss sometimes.
 
 2) Communicate to users all saving C/C++ code well
 
 saves initiated by a user (not by a script, tool, autosave or node save)
 should probably allowed anywhere the user has permission. also the user
 should have an easy way to make a file trusted.
 
 3) Formalize definition of trusted source better.
 
 - Any .blend file with absolute output paths could be marked untrusted by 
 default.
 
 - Macs (and Windows?) already have a way to detect a downloaded file, which 
 can marked to be untrusted .blend.
 
 - Blender files can also get a User identifier struct, which can be used for 
 various ways to mark files 'trusted' or not. 
 In its simplest implementation it can just store an identifier string 
 (copied from userpref) to mark files as saved by myself. 
 
 Once you get into this the trusted thing can be forged; I'm guessing
 some cyptography / security people have to weigh in on how to stop that.
 4) Replace Python's os module
 
 Please don't!
 We use python OS module so much for pipeline scripts, and I can't
 imagine other studios just don't do this. Replacing it with something
 crippled for security would be a huge annoyance - yes we can build our
 own, but for us at least we depend on external collaborators running on
 their own systems - sometimes our builds don't work for them. Things
 that we need to do are in the file manipulation range, such as moving or
 renaming large numbers of files, we access our share for the project in
 an absolute path in the root (this was standard practice before I got
 here) etc. etc. Messing with OS module would be pretty bad for us, and I
 don't know what would make it safe other than removing most of it's
 functionality anyway (the only thing safe is probably file path
 joining/splitting)
 -Ton-
 
 
 Ton Roosendaal  -  t...@blender.org   -   www.blender.org
 Chairman Blender Foundation - Producer Blender Institute
 Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands
 
 
 
 On 5 Jun, 2013, at 13:24, Ton Roosendaal wrote:
 
 Hi,
 
 I've checked some history of past discussions (including sandboxing Python) 
 and to me it seems we still accept too much risk here. As a team (and for 
 me as Blender Foundation chairman) I feel it's a big responsibility to not 
 waive away so easily.
 
 More over - it's a disaster waiting to be happening one day. It would be 
 unforgivable if we didn't at least help users to have a basic security in 
 place.
 
 The discussion is also getting too much complicated by knowledgable people 
 who point out that there's always another vulnerability or other methods to 
 bypass any security feature. IMHO that's irrelevant, should never be a 
 reason to ignore it altogether.
 
 We should be able to bring down this topic to a basic and sensible minimal 
 protection we provide for users.
 
 Can we form some kindof workgroup to investigate it further and define a 
 proposal for actions? Or a roadmap? 
 
 And: is there a consensis to make the default startup install have 
 'autorun' disabled, with a notifier in the top header about it?
 
 -Ton-
 
 
 Ton Roosendaal  -  t...@blender.org   -   www.blender.org
 Chairman Blender Foundation - Producer Blender Institute
 Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands
 
 
 
 On 5 Jun, 2013, at 8:25, Campbell Barton wrote:
 
 On Wed, Jun 5, 2013 at 4:21 PM, Knapp magick.c...@gmail.com wrote:
 On Wed, Jun 5, 2013 at 8:03 AM, Knapp magick.c...@gmail.com wrote:
 As a normal hobby users, the biggest risk that I see is downloading a
 blend from the net and opening it. This is not something we are likely
 to give up. So, warning or not, what good is it? I need some way to
 know if the file is good or bad. I don't see an answer. I would say a
 good third of the users or more download blends for learning at least
 and often for 

Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread mein
In reply to Ton Roosendaal (t...@blender.org):

 From: Ton Roosendaal t...@blender.org
 Date: Wed, 5 Jun 2013 14:35:16 +0200
 To: bf-blender developers bf-committers@blender.org
 X-Mailer: Apple Mail (2.1283)
 Subject: Re: [Bf-committers] Please turn off Auto Run Python Scripts by
  default
 Reply-To: bf-blender developers bf-committers@blender.org
 
 Hi,
 
 3) Formalize definition of trusted source better.
 
 - Any .blend file with absolute output paths could be marked untrusted by 
 default.
 
 - Macs (and Windows?) already have a way to detect a downloaded file, which 
 can marked to be untrusted .blend.
 
 - Blender files can also get a User identifier struct, which can be used for 
 various ways to mark files 'trusted' or not. 
 In its simplest implementation it can just store an identifier string (copied 
 from userpref) to mark files as saved by myself. 

And we could create a file that stores oked identifiers.
Similar to ssh's known_hosts
If you open a file with an unknown identifier ask do you really want to
open the file, and do you want to store that identifier as trusted.

Kent
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Jason van Gumster

Ton Roosendaal t...@blender.org wrote:

 Hi,
 
  Things
  that we need to do are in the file manipulation range, such as moving or
  renaming large numbers of files
 
 Well, that you can do outside Blender via regular Python too?
 
 Further - if we can make file manipulations in the UI work sane/safe (and
 usable still), the hacked os module would just do same :) You will also
 define your own blends to be 'trusted' and allow scripts there to write
 anywhere you want (or not).
 
 -Ton-

This is likely to be problematic. I know I've relied on the os module for a
number of my own internal scripts for pipeline as well as other tasks... and
not just for file I/O. For example, the subprocess library is likely a huge
security hole, but it's incredibly useful (almost required) for calling
programs that don't have a Python API (or only a python2 API). Sure, a lot of
these things could be done outside of Blender, but it's far more convenient to
have it inside... especially for external artists who don't roll their own
Blender.

In addition to my own esoteric scripts, I'd be curious about how this might
impact Import/Export scripts as well as external renderers.

  -Jason
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Shrinidhi Rao
Disabling os module might cause a lot of problems. Pipeline and other batch
scripts rely on it a lot.
We also use a lot of absolute path in our pipeline scripts since we move a
lot of files across directories for version control  , publishing to the
next stage , import directories of the stages , etc ., etc . using relative
paths causes a lot of problems here .
A cli option to disable all this security thingies would be great boon if
at all the security measures are implemented.


On Wed, Jun 5, 2013 at 8:46 PM, Jason van Gumster 
ja...@handturkeystudios.com wrote:


 Ton Roosendaal t...@blender.org wrote:

  Hi,
 
   Things
   that we need to do are in the file manipulation range, such as moving
 or
   renaming large numbers of files
 
  Well, that you can do outside Blender via regular Python too?
 
  Further - if we can make file manipulations in the UI work sane/safe (and
  usable still), the hacked os module would just do same :) You will also
  define your own blends to be 'trusted' and allow scripts there to write
  anywhere you want (or not).
 
  -Ton-

 This is likely to be problematic. I know I've relied on the os module for a
 number of my own internal scripts for pipeline as well as other tasks...
 and
 not just for file I/O. For example, the subprocess library is likely a huge
 security hole, but it's incredibly useful (almost required) for calling
 programs that don't have a Python API (or only a python2 API). Sure, a lot
 of
 these things could be done outside of Blender, but it's far more
 convenient to
 have it inside... especially for external artists who don't roll their own
 Blender.

 In addition to my own esoteric scripts, I'd be curious about how this might
 impact Import/Export scripts as well as external renderers.

   -Jason
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers




-- 

regards
- shrinidhi


Even god fails to understand a human until his death!
http://www.linkedin.com/in/shrinidhi666
https://github.com/shrinidhi666



http://www.imdb.com/name/nm3025616
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Ton Roosendaal
Hi,

I am not proposing to make advanced system adminstration entirely impossible. 
It's just not a sane default to release, nor to give to everyone in a studio.

The challenge is to find out a good, sane and usable way to configure Blender 
securely.

It could work all fine for people in studios on daily work, and for occasional 
users who play with Blender and download files. And it could work for the TD to 
do massive data manipulations.

Needless to say: if you run a movie making bizz, you also will set up accounts 
and permissions in a way you protect valuable data. A user accidentally 
deleting every shot is not fun ever.

-Ton-


Ton Roosendaal  -  t...@blender.org   -   www.blender.org
Chairman Blender Foundation - Producer Blender Institute
Entrepotdok 57A  -  1018AD Amsterdam  -  The Netherlands



On 5 Jun, 2013, at 17:29, Shrinidhi Rao wrote:

 Disabling os module might cause a lot of problems. Pipeline and other batch
 scripts rely on it a lot.
 We also use a lot of absolute path in our pipeline scripts since we move a
 lot of files across directories for version control  , publishing to the
 next stage , import directories of the stages , etc ., etc . using relative
 paths causes a lot of problems here .
 A cli option to disable all this security thingies would be great boon if
 at all the security measures are implemented.
 
 
 On Wed, Jun 5, 2013 at 8:46 PM, Jason van Gumster 
 ja...@handturkeystudios.com wrote:
 
 
 Ton Roosendaal t...@blender.org wrote:
 
 Hi,
 
 Things
 that we need to do are in the file manipulation range, such as moving
 or
 renaming large numbers of files
 
 Well, that you can do outside Blender via regular Python too?
 
 Further - if we can make file manipulations in the UI work sane/safe (and
 usable still), the hacked os module would just do same :) You will also
 define your own blends to be 'trusted' and allow scripts there to write
 anywhere you want (or not).
 
 -Ton-
 
 This is likely to be problematic. I know I've relied on the os module for a
 number of my own internal scripts for pipeline as well as other tasks...
 and
 not just for file I/O. For example, the subprocess library is likely a huge
 security hole, but it's incredibly useful (almost required) for calling
 programs that don't have a Python API (or only a python2 API). Sure, a lot
 of
 these things could be done outside of Blender, but it's far more
 convenient to
 have it inside... especially for external artists who don't roll their own
 Blender.
 
 In addition to my own esoteric scripts, I'd be curious about how this might
 impact Import/Export scripts as well as external renderers.
 
  -Jason
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers
 
 
 
 
 -- 
 
 regards
 - shrinidhi
 
 
 Even god fails to understand a human until his death!
 http://www.linkedin.com/in/shrinidhi666
 https://github.com/shrinidhi666
 
 
 
 http://www.imdb.com/name/nm3025616
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers

___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Campbell Barton
Hacked os module isn't really an option, Python uses this for its
internal operations all over the place - a lot of python modules are
written in Python so these would break.

In python3.3 module dir...
find -name *.py | xargs grep \bos\. | wc -l
-- 7833

Attempting to let Python do its own thing but sandbox Blender scripts
also cant work well,

In the BGE we did have some basic security (disable some modules 
open()... iirc),
But this is trivially easy to workaround - as in one line of python to
get access to the real modules/functions.

The only way I could see this working would be to do this on a libc
level - replacing pythons own calls to open() / fopen() etc. But this
also gives high risk of breaking Python its self.
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Jace Priester
Another +1 for not changing the OS module, or anything else for that
matter. I use lots of python system-related modules, including OS, in my
import/export/interop pipeline. If it is broken I will most likely not be
using blender anymore (seriously).

Additionally, I don't believe security in blend files is an issue anyway.
If you have accepted a file from an untrusted source and opened it, YOU are
the security risk, not the program you opened it with. AVIs, DOCs, and
various other data files have had and still do have security risks
associated with them (whether internal scripts are allowed to run or not).
This problem is certainly not unique to blend files, and certainly not due
solely to the fact that blender allows python scripts to run. This is a
non-issue.

The Trusted Source checkbox is a nice feature, I guess, but realistically
I've never used it because I want all blends to open and work as intended
by the creator. If I think it might be a malicious file, I don't accept it
in the first place. That's where security starts, and ultimately ends.


On Wed, Jun 5, 2013 at 10:55 AM, Campbell Barton ideasma...@gmail.comwrote:

 Hacked os module isn't really an option, Python uses this for its
 internal operations all over the place - a lot of python modules are
 written in Python so these would break.

 In python3.3 module dir...
 find -name *.py | xargs grep \bos\. | wc -l
 -- 7833

 Attempting to let Python do its own thing but sandbox Blender scripts
 also cant work well,

 In the BGE we did have some basic security (disable some modules 
 open()... iirc),
 But this is trivially easy to workaround - as in one line of python to
 get access to the real modules/functions.

 The only way I could see this working would be to do this on a libc
 level - replacing pythons own calls to open() / fopen() etc. But this
 also gives high risk of breaking Python its self.
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers




-- 


--
Jace Priester
Threespace Imaging
jacepries...@threespaceimaging.com
559-284-0904
--
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Cycles benchmark as promised.

2013-06-05 Thread Jürgen Herrmann
Yay, 

I am done.
http://download.shadowrom.de/Benchmark.pdf
While doing this benchmark I tried to replace the math library used with the
AMD libm implementation.
This was actually slower on all systems (even the amd system) so I left
these results out.

The more I read about MSVC the more I have the feeling that the compiler
doesn’t optimize math functions properly.
GCC seems to be way better on that.

/Jürgen

-Ursprüngliche Nachricht-
Von: bf-committers-boun...@blender.org
[mailto:bf-committers-boun...@blender.org] Im Auftrag von Jürgen Herrmann
Gesendet: Dienstag, 4. Juni 2013 21:29
An: bf-committers@blender.org
Betreff: [Bf-committers] Cycles benchmark as promised.

Alright…

 

I said I will do a benchmark, so here it is (partial)

 

I am not done yet but wanted to share the first draft with you guys before I
go to sleep.

I’ll add in another test system tomorrow and refine the visualization.

 

You can download the pdf file here:

http://download.shadowrom.de/Benchmark.pdf

 

This is really getting interesting *g*

 

/Jürgen

 

___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers

___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Please turn off Auto Run Python Scripts by default

2013-06-05 Thread Campbell Barton
On Thu, Jun 6, 2013 at 5:21 AM, Jace Priester
jacepries...@threespaceimaging.com wrote:
 Another +1 for not changing the OS module, or anything else for that
 matter. I use lots of python system-related modules, including OS, in my
 import/export/interop pipeline. If it is broken I will most likely not be
 using blender anymore (seriously).

 Additionally, I don't believe security in blend files is an issue anyway.
 If you have accepted a file from an untrusted source and opened it, YOU are
 the security risk, not the program you opened it with. AVIs, DOCs, and
 various other data files have had and still do have security risks
 associated with them (whether internal scripts are allowed to run or not).
 This problem is certainly not unique to blend files, and certainly not due
 solely to the fact that blender allows python scripts to run. This is a
 non-issue.

 The Trusted Source checkbox is a nice feature, I guess, but realistically
 I've never used it because I want all blends to open and work as intended
 by the creator. If I think it might be a malicious file, I don't accept it
 in the first place. That's where security starts, and ultimately ends.

Developer working on the bug tracker you have to open many blend files
created by random users, so the assurance those blend files wont run
arbitrary python code is something I'm glad to have.

Changing trusted defaults, communicating to user more clearly what
they do, adding option in header to reload-trusted, area all fine.
But I'd stop short of actually making decisions for users, eg, not
letting a script write to some location they would normally be allowed
to or limiting python functionality to the point useful operations are
disabled.

If we start turning off useful features it makes it a challenge for
script authors to workaround and knowing how CPython is designed they
will surely be able to do it without much effort. Then we just loose a
lot of dev time trying to secure something that is inherently
insecure.

Trying to sandbox python is more of a research project - perhaps we
can setup a state where pythons internals are temporarily disabled to
the point files cant be modified, or pre-process python bytecode and
disallow certain features, but I see this as a time sink - at that
point we probably should be asking ourselves why we use Python at all,
and not something like Lua or check on pypy which can be sand-boxed
apparently.
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] Cycles benchmark as promised.

2013-06-05 Thread Yousef Hurfoush
hi

from these results it seems the fastest in cpu and gpu is mingw (with one 
exception for msvc).
i think as a freelance 30-40% of render time reduction is a big advantage, has 
anyone tested the mingw openmp fix?

Regards
Yousef Harfoush
ba...@msn.com



 From: shadow...@me.com
 To: bf-committers@blender.org
 Date: Wed, 5 Jun 2013 21:57:11 +0200
 Subject: Re: [Bf-committers] Cycles benchmark as promised.
 
 Yay, 
 
 I am done.
 http://download.shadowrom.de/Benchmark.pdf
 While doing this benchmark I tried to replace the math library used with the
 AMD libm implementation.
 This was actually slower on all systems (even the amd system) so I left
 these results out.
 
 The more I read about MSVC the more I have the feeling that the compiler
 doesn’t optimize math functions properly.
 GCC seems to be way better on that.
 
 /Jürgen
 
 -Ursprüngliche Nachricht-
 Von: bf-committers-boun...@blender.org
 [mailto:bf-committers-boun...@blender.org] Im Auftrag von Jürgen Herrmann
 Gesendet: Dienstag, 4. Juni 2013 21:29
 An: bf-committers@blender.org
 Betreff: [Bf-committers] Cycles benchmark as promised.
 
 Alright…
 
  
 
 I said I will do a benchmark, so here it is (partial)
 
  
 
 I am not done yet but wanted to share the first draft with you guys before I
 go to sleep.
 
 I’ll add in another test system tomorrow and refine the visualization.
 
  
 
 You can download the pdf file here:
 
 http://download.shadowrom.de/Benchmark.pdf
 
  
 
 This is really getting interesting *g*
 
  
 
 /Jürgen
 
  
 
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers
 
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers
  
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


Re: [Bf-committers] platform maintainers: request to update exr lib to 2.0

2013-06-05 Thread Dalai Felinto
 have you tried to build a RelWithDebInfo Build of OpenEXR?

I tried, but if I build Blender as debug using the openexr build as
Release with Debug Info it crashes at launch:
http://www.pasteall.org/42864

I've been debugging via a computer I have access via RDC so it's
really annoying btw.

Leaving this RelWithDebInfo aside and focusing on the original problem
(library working in debug but not in release), does any one have a
clue on what can cause that? Namespace conflict? ...? ...?

--
Dalai

2013/6/5 Jürgen Herrmann shadow...@me.com:
 Hi Dalai,

 have you tried to build a RelWithDebInfo Build of OpenEXR?
 This could help to track down the Error if the Debug Lib doesn't help.

 /Jürgen

 Am 05. Juni 2013 um 10:40 schrieb Dalai Felinto dfeli...@gmail.com:

 I found where the crash is (still no idea why it's crashing):

 #
 openexr_api.cpp::imb_load_openexr (...)
 (...)
  Mem_IStream *membuf = new Mem_IStream(mem, size);
 #

 To get there I had to build a debug build and replace the linking to:

 \lib\windows\openexr\lib\IlmImf.lib
 instead of:
 \lib\windows\openexr\lib\IlmImf_d.lib

 And it consistently breaks on Release for windows and 64, but not for Debug.
 Any clues on how to debug this?

 --
 Dalai

 --
 blendernetwork.org/member/dalai-felinto
 www.dalaifelinto.com


 2013/6/3 Jürgen Herrmann shadow...@me.com:
  Hi Dalai,
 
  I can recompile the libs tomorrow. I'll contact you when I am done.
  I doubt that this will change anything though. The header that was missing 
  wasn't installed by the CMake build routine it was not missing at compile 
  time.
  It was just omitted by the install script.
  But nevertheless I'll try to recompile them for you.
  Otherwise we should try to report a bug to the OpenEXR devs. It could be 
  an error in the libs.
 
  /Jürgen
 
  Am 03.06.2013 um 20:58 schrieb Dalai Felinto dfeli...@gmail.com:
 
  Hi again,
 
  The new OIIO libraries don't make any difference. OIIO depends on
  OpenEXR and not the other way around. So although that could I can't
  see how they would change things.
 
  I remember when you first uploaded the libraries you forgot a header
  file (which I'm using in the code). I wonder if it's related and the
  first release build is buggy. The ideal would be to rebuild OpenEXR
  for release and hope it fixes the problem.
 
  If you don't want to commit the libs without knowing they will fix the
  problem you can put them on blender.org ftp incoming folder. (or poke
  me on IRC and we can find a solution).
 
  (or checkout the svn code for multiview, it should be easy to
  reproduce the problem in your windows station)
 
  Thanks,
  Dalai
 
 
  --
  blendernetwork.org/member/dalai-felinto
  www.dalaifelinto.com
 
 
  2013/6/2 Jürgen Herrmann shadow...@me.com:
  Hi Dalai,
 
  Thomas Dinges asked me to downgrade OIIO to 1.1.11 just today.
  Please try to do a SVN update on your libs and compile again using these.
  These problems are strange...
  I will have a closer look on this tomorrow.
 
  /Jürgen
 
  Am 02.06.2013 um 20:16 schrieb Dalai Felinto dfeli...@gmail.com:
 
  Hi Jurgen,
  I think the problem is the release library.
 
  Even with cmake+msvc the exr sample image fails when I build release.
  And I just tested with the 1.2 oiio libraries and I still get the same
  error with scons+msvc debug.
 
  Remember that you forgot to include a header in your first commit of
  the library? I wonder if that was somehow also missing when you built
  it. I don't know.
 
  --
  Dalai
  ___
  Bf-committers mailing list
  Bf-committers@blender.org
  http://lists.blender.org/mailman/listinfo/bf-committers
  ___
  Bf-committers mailing list
  Bf-committers@blender.org
  http://lists.blender.org/mailman/listinfo/bf-committers
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers
 ___
 Bf-committers mailing list
 Bf-committers@blender.org
 http://lists.blender.org/mailman/listinfo/bf-committers
___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers


[Bf-committers] I have a build error r57168.

2013-06-05 Thread Jürgen Herrmann
By the way,

what's wrong with the buildbots for Windows builds? I wanted to download a 
recent build for comparison but it seems that they are offline?

___
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers