Re: x32: mariadb: if defined __ILP32__ and __x86_64__ ?

2024-07-04 Thread Otto Kekäläinen
Thanks for the advice. Potential fix posted now at
https://salsa.debian.org/mariadb-team/mariadb-server/-/merge_requests/90
for team review.



Re: x32: mariadb: if defined __ILP32__ and __x86_64__ ?

2024-07-03 Thread Joel
Unsubscribe

On Wed., Jul. 3, 2024, 00:21 Otto Kekäläinen,  wrote:

> Hi!
>
> MariaDB has this piece of code that is failing on x32 as reported in
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063738
>
> tests/mysql_client_fw.c
> @@ -1442
>
> #if defined __x86_64__
>   compile_time_assert(sizeof(MYSQL) == 1272);
> #elif defined __i386__
>   compile_time_assert(sizeof(MYSQL) == 964);
> #endif
>
> How should I fix this for x32? What is the preprocessor if clause and
> can I safely assume the size is 964?
>
> Previous x32 builds passed before upstream introduced this change.
> References:
> - https://wiki.debian.org/X32Port
> - https://buildd.debian.org/status/logs.php?pkg=mariadb=x32
> - https://salsa.debian.org/mariadb-team/mariadb-server
>
>


Re: x32: mariadb: if defined __ILP32__ and __x86_64__ ?

2024-07-03 Thread наб
Hi!

On Tue, Jul 02, 2024 at 09:05:14PM -0700, Otto Kekäläinen wrote:
> tests/mysql_client_fw.c
> @@ -1442
> 
> #if defined __x86_64__
>   compile_time_assert(sizeof(MYSQL) == 1272);
> #elif defined __i386__
>   compile_time_assert(sizeof(MYSQL) == 964);
> #endif
> 
> How should I fix this for x32? What is the preprocessor if clause and
> can I safely assume the size is 964?
The comment before this reads
/*
  this limited check is enough, if sizeof(MYSQL) changes, it changes
  everywhere
*/
so this looks like an ABI stability check,
validating not that MYSQL should be Some Specific Size,
but that it's The Size It Was Last Time.

IMO turn the first line into
  #if defined(__x86_64__) && !defined(__ILP32__)
since they did actually just want to check
if the size is the same they measured on amd64 and i386.

And if it were to change on either of these two,
it would change everywhere (apparently).

Best,


signature.asc
Description: PGP signature


Re: x32: mariadb: if defined __ILP32__ and __x86_64__ ?

2024-07-03 Thread Bernd Petrovitsch

Hi all!

On 03/07/2024 06:05, Otto Kekäläinen wrote:
[...]

MariaDB has this piece of code that is failing on x32 as reported in
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063738

tests/mysql_client_fw.c
@@ -1442

#if defined __x86_64__


#if defined(__x86_64__) && !defined(__ILP32__)


   compile_time_assert(sizeof(MYSQL) == 1272);
#elif defined __i386__
   compile_time_assert(sizeof(MYSQL) == 964);
#endif

How should I fix this for x32? What is the preprocessor if clause and
can I safely assume the size is 964?


Kind regards,
Bernd
--
Bernd Petrovitsch  Email : be...@petrovitsch.priv.at
 There is NO CLOUD, just other people's computers. - FSFE
 LUGA : http://www.luga.at



Re: x32: mariadb: if defined __ILP32__ and __x86_64__ ?

2024-07-03 Thread Bernd Petrovitsch

Hi all!

sent too fast:

On 03/07/2024 12:31, Bernd Petrovitsch wrote:
[...]

On 03/07/2024 06:05, Otto Kekäläinen wrote:
[...]

MariaDB has this piece of code that is failing on x32 as reported in
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063738

tests/mysql_client_fw.c
@@ -1442

#if defined __x86_64__


#if defined(__x86_64__) && !defined(__ILP32__)


Of course you need more but the __ILP32__ symbol is
typically used to distinguish x32 from amd64.
To illustrate it it, e.g.
 snip ---
#if defined __x86_64__
#if defined __ILP32__
   compile_time_assert(sizeof(MYSQL) == 964);   // x32
#else
   compile_time_assert(sizeof(MYSQL) == 1272);  // amd64
#endif
#elif defined __i386__
   compile_time_assert(sizeof(MYSQL) == 964);   // ix86
#endif
 snip ---


   compile_time_assert(sizeof(MYSQL) == 1272);
#elif defined __i386__
   compile_time_assert(sizeof(MYSQL) == 964);
#endif

How should I fix this for x32? What is the preprocessor if clause and
can I safely assume the size is 964?
 
Kind regards,

  Bernd
--
Bernd Petrovitsch  Email : be...@petrovitsch.priv.at
 There is NO CLOUD, just other people's computers. - FSFE
 LUGA : http://www.luga.at



Re: Bug#1057050 closed by Debian FTP Masters (reply to Patrick Franz ) (Bug#1057050: fixed in qt6-multimedia 6.6.1-1)

2024-04-03 Thread John Paul Adrian Glaubitz
Control: reopen -1

Hi,

looks like this didn't work:

> https://buildd.debian.org/status/fetch.php?pkg=qt6-multimedia=powerpc=6.4.2-11=1705003199=0

Reopening the bug therefore.

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913



Re: python-cryptography vs. stainless steel ports

2024-03-14 Thread Helge Deller

On 3/14/24 06:53, Thorsten Glaser wrote:

Dixi quod…


Is there a chance your team could fork the old python-cryptography
source package (3.4.8-2) and do something like:


Apparently, pyopenssl needs to also be forked as it wraps the above
and, between 21.0.0-1 and 22.1.0-1, it began requiring the rust
version of python-cryptography ☹


And gstreamer1.0 seems to depend on rust as well, which blocks
glade and as such some gnome apps:
https://buildd.debian.org/status/package.php?p=gstreamer1.0=sid

Helge



Re: python-cryptography vs. stainless steel ports

2024-03-14 Thread Thorsten Glaser
Dixi quod…

>Is there a chance your team could fork the old python-cryptography
>source package (3.4.8-2) and do something like:

Apparently, pyopenssl needs to also be forked as it wraps the above
and, between 21.0.0-1 and 22.1.0-1, it began requiring the rust
version of python-cryptography ☹

bye,
//mirabilos
-- 
 exceptions: a truly awful implementation of quite a nice idea.
 just about the worst way you could do something like that, afaic.
 it's like anti-design.   that too… may I quote you on that?
 sure, tho i doubt anyone will listen ;)



Re: python-cryptography vs. stainless steel ports

2024-03-11 Thread Thorsten Glaser
Jérémy Lal dixit:

>Anyone had experience with the version 3.3 to 38.0 migration ?
>Maybe the API didn't change that much.

We cannot go past 3.4 because newer versions (starting at 38)
have a hard dependency on rust stuff.

bye,
//mirabilos
-- 
Solange man keine schmutzigen Tricks macht, und ich meine *wirklich*
schmutzige Tricks, wie bei einer doppelt verketteten Liste beide
Pointer XORen und in nur einem Word speichern, funktioniert Boehm ganz
hervorragend.   -- Andreas Bogk über boehm-gc in d.a.s.r



Re: python-cryptography vs. stainless steel ports

2024-03-11 Thread Jérémy Lal
Le lun. 11 mars 2024 à 21:53, Thorsten Glaser  a écrit :

> Jérémy Lal dixit:
>
> >While I'm very much concerned about architectures and compatibility,
> >it seems that for python-cryptography, it's a sinking boat:
> >The end of a very discussion dates from february, 2021 - 3 years ago:
> >https://github.com/pyca/cryptography/issues/5771#issuecomment-775990406
>
> Ouch.
>
> cbmuser also has hopes for rustc_codegen_gcc, but I believe that
> quite a way off for regular use in Debian yet and won’t hold my
> breath.
>
> So, perhaps at least do palliative care for the 3.8-based package
> in the meantime?

Porters can help, but we don’t know the python ecosystem well.


Anyone had experience with the version 3.3 to 38.0 migration ?
Maybe the API didn't change that much.


Re: python-cryptography vs. stainless steel ports

2024-03-11 Thread Thorsten Glaser
Jérémy Lal dixit:

>While I'm very much concerned about architectures and compatibility,
>it seems that for python-cryptography, it's a sinking boat:
>The end of a very discussion dates from february, 2021 - 3 years ago:
>https://github.com/pyca/cryptography/issues/5771#issuecomment-775990406

Ouch.

cbmuser also has hopes for rustc_codegen_gcc, but I believe that
quite a way off for regular use in Debian yet and won’t hold my
breath.

So, perhaps at least do palliative care for the 3.8-based package
in the meantime?

Porters can help, but we don’t know the python ecosystem well.

bye,
//mirabilos
-- 
Gast: „Ein Bier, bitte!“
Wirt: „Geht auch alkoholfrei?“
Gast: „Geht auch Spielgeld?“



Re: python-cryptography vs. stainless steel ports

2024-03-11 Thread Jérémy Lal
Le lun. 11 mars 2024 à 20:17, Thorsten Glaser  a écrit :

> Hi,
>
> we have still the situation that the current python-cryptography,
> having rather heavy rust ecosystem dependencies, cannot be built
> on some debian-ports architectures.
>
> This situation is not likely to go away:
>
> • some ports are unlikely to meet the dependencies soon
> • new ports won’t meet them at first even if they may meet
>   them later (riscv64 and loong64 now meet them)
>
> For the t64 transition, I *think* I can just binNMU the last
> version that worked and porter-upload that, but that’s not a
> workable long-term solution, especially when python transitions
> come, etc.
>
> Is there a chance your team could fork the old python-cryptography
> source package (3.4.8-2) and do something like:
>
> • rename its python3-cryptography binary package to
>   python3-cryptography-rustless or something
> • let that Provide python3-cryptography in the same version
>
> Making python3-cryptography-rustless available on all arches
> has the benefit that people can test that their code will work
> on ports arches without having to bother installing one of them.
>
> I’m not entirely sure that having python3-cryptography-rustless
> Provides python3-cryptography, then other packages B-D/Depends
> python3-cryptography will work; IIRC, there was something about
> the first alternative must not be virtual and buildds won’t use
> second+ alternatives. In that case, we’ll instead need the
> python3-cryptography-rustless source package to build a second
> binary package python3-cryptography either as arch:all but in a
> lower version than the python-cryptography’s (if that’s okay),
> or as arch:any on just the affected architectures (which will
> end up being an annoying to maintain whitelist) that Depends
> python3-cryptography-rustless, to keep things installable on
> the buildds.
>
> With this in unstable proper, debian-ports will have a much
> easier job, and maintainers (both of the python3-cryptography
> ecosystem/packages and of software using it) can more easily
> test things work, and your team can apply whatever new policy
> changes, dh-* helpers, etc. to the 3.4.8-based package, and
> backport bugfixes, etc. (and perhaps there’s even an upstream
> fork?).
>
> The arches currently split as:
>
> • alpha 3.4.8-2
> • hppa  3.4.8-2
> • hurd-amd643.4.8-2
> • hurd-arm64unknown, probably 3.x
> • hurd-i386 3.4.8-2
> • ia64  3.4.8-2
> • loong64   41.0.7-5
> • m68k  3.4.8-2
> • powerpc   41.0.7-3
> • ppc64 41.0.7-5
> • sh4   3.4.8-2
> • sparc64   41.0.7-5
> • x32   38.0.4-4
>
> (x32 seems to be lagging in the rust department, too…)
>
> Since this exists mostly to help d-ports, it would be fine to
> open an RC bug against it early to prevent it from showing up
> in releases, if desired.
>
> Thanks for considering,
> //mirabilos, helping out m68k for the time_t transition again
> --
> When he found out that the m68k port was in a pretty bad shape, he did
> not, like many before him, shrug and move on; instead, he took it upon
> himself to start compiling things, just so he could compile his shell.
> How's that for dedication. -- Wouter, about my Debian/m68k revival
>

While I'm very much concerned about architectures and compatibility,
it seems that for python-cryptography, it's a sinking boat:
The end of a very discussion dates from february, 2021 - 3 years ago:
https://github.com/pyca/cryptography/issues/5771#issuecomment-775990406


Re: Bug#1040062: dpkg-dev: Please drop pie-{compile,link}.spec

2023-11-26 Thread Adrian Bunk
On Fri, Nov 24, 2023 at 01:53:04AM +0100, Guillem Jover wrote:
> Hi!

Hi Guillem!

Apologies for not replying to these emails earlier.

> On Tue, 2023-10-31 at 10:52:40 +0100, Guillem Jover wrote:
>...
> > If PIE (via specs files) appears to work on x32, and changing the
> > defaults in gcc is too much to bother, I think leaving it as is looks
> > fine by me. But if this is causing problems as well and the x32 porters
> > (if there's any remaining :), want to mask it alongside the other ports,
> > let me know and I can also flip the switch for that one.
> 
> If the porters would also like to see x32 masked, let me know and I
> can also include it, otherwise I'll leave it as it is now.

AFAIK for all ports architectures except Hurd and hppa the other Adrian
is a porter, so should be able to ACK it.

As I already wrote in [1] there is architecture other than alpha/ia64/x32
where the pie specs did actually enable PIE.

On m68k and sh4 the specs might still be passed and cause FTBFS in 
packages like gluegen2 that pass LDFLAGS to ld, but there is no
PIE enabling effect.

> Thanks,
> Guillem

cu
Adrian

[1] https://lists.debian.org/debian-alpha/2023/10/msg2.html



Re: Bug#1040062: dpkg-dev: Please drop pie-{compile,link}.spec

2023-11-23 Thread Guillem Jover
Hi!

On Tue, 2023-10-31 at 10:52:40 +0100, Guillem Jover wrote:
> I guess I could do it the other way, and given this is apparently
> causing issues as reported by Adrian, and as seen recently from
> the referenced bug report which might require patching a specific
> package to disable PIE there, I'm inclined to completely mask PIE
> in dpkg-buildflags for alpha and ia64 in around a couple of weeks,
> if I don't hear anything.

I've now queued locally a commit masking this for alpha and ia64 and
will be including it in dpkg 1.22.2, probably by the end of the weekend.
To the porters, please let me know if you'd prefer these not to be
masked.

> If PIE (via specs files) appears to work on x32, and changing the
> defaults in gcc is too much to bother, I think leaving it as is looks
> fine by me. But if this is causing problems as well and the x32 porters
> (if there's any remaining :), want to mask it alongside the other ports,
> let me know and I can also flip the switch for that one.

If the porters would also like to see x32 masked, let me know and I
can also include it, otherwise I'll leave it as it is now.

Thanks,
Guillem



Re: Happy 30 Years Debian Project

2023-11-04 Thread mi


> Happy Birthday 30 years of the Debian Linux Project

yay !

and q2!



Re: Bug#1040062: dpkg-dev: Please drop pie-{compile,link}.spec

2023-10-31 Thread Guillem Jover
Hi!

On Tue, 2023-07-04 at 13:12:48 +0300, Adrian Bunk wrote:
> On Tue, Jul 04, 2023 at 09:23:43AM +0200, Guillem Jover wrote:
> > On Sun, 2023-07-02 at 00:02:46 +0300, Adrian Bunk wrote:
> > > There are some problems with this:
> > >
> > > 1. PIE should either be default or not be used
> > >
> > > I suspect x32 might be able to default to PIE without problems
> > > (there might just not be enough interest left to change the default).
> > >
> > > On alpha the toolchain has already become quite brittle
> > > with frequent issues like (reproducible) linker segfaults,
> > > any variations that affects the toolchain are bad.
> > >
> > > It is for the port maintainers to decide whether or not PIE
> > > is considered stable on a port, and accordingly either make
> > > it default (which also avoids the other issues below) or not.
> > >
> > > It is clear that a non-PIE architecture would no longer be
> > > considered suitable as release architecture.
> >
> > In general the way this is handled in dpkg, is that if the flags
> > supposedly work on that arch they are allowed, but if they are not
> > supported or are broken then they are masked.

I recalled this report before the 1.22.1 release, but didn't feel it
appropriate to push a last minute change for it, before giving some
advance notice, and because I was also expecting some word from the
relevant arch porters.

I guess I could do it the other way, and given this is apparently
causing issues as reported by Adrian, and as seen recently from
the referenced bug report which might require patching a specific
package to disable PIE there, I'm inclined to completely mask PIE
in dpkg-buildflags for alpha and ia64 in around a couple of weeks,
if I don't hear anything.

> > > Please drop pie-{compile,link}.spec, on the architectures
> > > where it has any effect it is doing more harm than good.
> >
> > For example hppa has pie masked for build flags. If the porters for
> > alpha and/or ia64 consider that they should also get pie masked for
> > those arches, I'm fine doing the changes. Although that means on those
> > ports it will not be possible to enable pie at all, even if asked for
> > explicitly, as in «hardening=+pie».
>
> Semi-PIE non-release architectures shouldn't exist, PIE on an·
> architecture should be a binary option decided by the porters
> for this architecture.
>
> If there are any porters left on an architecture and they consider PIE·
> stable, they can always ask the gcc maintainer to change the default.[1]
>
> >...
> > > The lowest effort fix would be to patch debian/rules of affected
> > > packages to disable hardening=+pie on affected architectures,
> > > but that would still be spending time on working around a problem
> > > that shouldn't exist.
> >
> > Yeah, that does not look like the right thing to be spending time on.
> >...
>
> As long as we have at least one semi-PIE architecture, this is the only·
> realistic option for porters. If the porters for alpha and/or ia64 want·
> to have pie masked, such changes will still be required for x32.

If PIE (via specs files) appears to work on x32, and changing the
defaults in gcc is too much to bother, I think leaving it as is looks
fine by me. But if this is causing problems as well and the x32 porters
(if there's any remaining :), want to mask it alongside the other ports,
let me know and I can also flip the switch for that one.

Thanks,
Guillem



Re: Kernel 6.5 from Experimental working

2023-09-07 Thread Luna Jernberg
Also updated this to 6.5.1 today and still works

Den tors 7 sep. 2023 kl 08:37 skrev Luna Jernberg :
>
> Hey!
>
> Just installed Kernel 6.5 from experimental during Debcamp 2023 on my
> ThinkPad Edge 0217A16 and it works as intended on this laptop :)
>
> //Luna bittin Jernberg 



Re: Happy 30 Years Debian Project

2023-08-16 Thread Tuco Ramirez
Happy Birthday Debian

By the way, thank you all who put any amount of work on Debian. 

Thank you Ian.

On August 16, 2023 11:31:35 AM UTC, Luna Jernberg  wrote:
>Happy Birthday 30 years of the Debian Linux Project
>
>https://www.gamingonlinux.com/2023/08/happy-debian-day-going-30-years-strong/
>https://wiki.debian.org/DebianDay/2023
>https://wiki.debian.org/DebianHistory?action=AttachFile=get=Debian-announcement-1993-pic-by-Ian_Murdock.png
>


Re: unbreaking LibreOffices tests on at least release architectures

2023-07-28 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> Hi,
>
> Am 22.07.23 um 16:09 schrieb Andreas Schwab:
>> On Jul 22 2023, Rene Engelhard wrote:
>>
>>> Am 22.07.23 um 15:53 schrieb Andreas Schwab:
 On Jul 22 2023, Rene Engelhard wrote:

> Does opensuse have some public git/$VCS?
 https://build.opensuse.org/package/live_build_log/openSUSE:Factory:RISCV/libreoffice/standard/riscv64
>>> Thanks...
>>>
>>> But maybe I am too blind.
>>>
>>> I don't see the actual spec + related files anywhere?
>> See Overview:
>>
>> https://build.opensuse.org/package/show/openSUSE:Factory:RISCV/libreoffice
>
> Thanks.
>
>
> I don't see anyone obvious there (except not running *any* test) there
> offhand, though.

I tried to enable the smoketest, but it fails even on x86-64:

https://build.opensuse.org/project/show/home:Andreas_Schwab:riscv:libreoffice

Since I don't know much about the libreoffice sources, I have just
copied the %check section from an old revision of our libreoffice
package.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-27 Thread Hendrik Boom
On Fri, Jul 21, 2023 at 11:03:28AM +1000, Finn Thain wrote:
> On Fri, 21 Jul 2023, Dave Chinner wrote:
> 
> > > I suspect that this is one of those catch-22 situations: distros are 
> > > going to enable every feature under the sun. That doesn't mean that 
> > > anyone is actually _using_ them these days.
> 
> I think the value of filesystem code is not just a question of how often 
> it gets executed -- it's also about retaining access to the data collected 
> in archives, museums, galleries etc. that is inevitably held in old 
> formats.

t the very least, keep enough system around that the files in obsolete 
file-systems can be read and converted to current file-systems.

-- hendrik



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Jeffrey Walton
On Sat, Jul 22, 2023 at 8:10 AM Rene Engelhard  wrote:
>
> Am 22.07.23 um 14:02 schrieb Andreas Schwab:
> > On Jun 18 2023, Rene Engelhard wrote:
> >
> >> For riscv64 I already pointed that out in the thread starting at
> >> https://lists.debian.org/debian-riscv/2023/06/msg0.html, but for the
> >> other architectures there is the mail now. riscv64 is different because
> >> the failures are even more big than any other down below and it's actually
> >> a new architecture anyway.
> > Libreoffice is actually basically working on riscv64.
>
> Yes. _basically_. (Only with -O0 or maybe -Os as upstreams makefile
> says, though)

Be careful of -Os. I test one of my C++ libraries with it in the
library's test suite. Based on unexplained crashes with -Os, I believe
GCC produces bad code with -Os on occasion.

I do not recommend using -Os in production based on my experience.

Jeff



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 16:09 schrieb Andreas Schwab:

On Jul 22 2023, Rene Engelhard wrote:


Am 22.07.23 um 15:53 schrieb Andreas Schwab:

On Jul 22 2023, Rene Engelhard wrote:


Does opensuse have some public git/$VCS?

https://build.opensuse.org/package/live_build_log/openSUSE:Factory:RISCV/libreoffice/standard/riscv64

Thanks...

But maybe I am too blind.

I don't see the actual spec + related files anywhere?

See Overview:

https://build.opensuse.org/package/show/openSUSE:Factory:RISCV/libreoffice


Thanks.


I don't see anyone obvious there (except not running *any* test) there 
offhand, though. Even many system-libraries - as I do. Except maybe gcc 
12 vs. gcc 13 which might affect the optimization breakage...



Will have look some more, though. (And retry with gcc 13 which is 
default in Debian now, too)



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> Am 22.07.23 um 15:53 schrieb Andreas Schwab:
>> On Jul 22 2023, Rene Engelhard wrote:
>>
>>> Does opensuse have some public git/$VCS?
>> https://build.opensuse.org/package/live_build_log/openSUSE:Factory:RISCV/libreoffice/standard/riscv64
>
> Thanks...
>
> But maybe I am too blind.
>
> I don't see the actual spec + related files anywhere?

See Overview:

https://build.opensuse.org/package/show/openSUSE:Factory:RISCV/libreoffice

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> Does opensuse have some public git/$VCS?

https://build.opensuse.org/package/live_build_log/openSUSE:Factory:RISCV/libreoffice/standard/riscv64

> (Though I would more bet of some system evironment thingy)

Perhaps it is a matter of using a good java.  Have you tried java 19 or
20?

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard



Am 22.07.23 um 15:53 schrieb Andreas Schwab:

On Jul 22 2023, Rene Engelhard wrote:


Does opensuse have some public git/$VCS?

https://build.opensuse.org/package/live_build_log/openSUSE:Factory:RISCV/libreoffice/standard/riscv64


Thanks...

But maybe I am too blind.

I don't see the actual spec + related files anywhere?


Repositories isn't it either, it just gives me (src)rpms. I could look 
there, but...



(Though I would more bet of some system evironment thingy)

Perhaps it is a matter of using a good java.  Have you tried java 19 or
20?


No, 17 only.

The test extension in the smoketest indeed is Java, but given this also 
affects python extensions (lightproof) I'd bet it 's a general, non-Java 
issue. Even if Java was broken lightproof should have worked.



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 15:07 schrieb Andreas Schwab:

Which gives the smoketest test failure here I pointed out (again) in my
other mail.

$ find /usr/lib64/libreoffice/ -name "*smoke*"
/usr/lib64/libreoffice/program/classes/smoketest.jar

How can I run that?


You can't from that, ttbomk. You miss other files needed which are not 
ending up in  the installation.



You build it and run make subsequentcheck in smoketest (or a general 
make check). But you might need to build prereqs first, see


https://salsa.debian.org/libreoffice-team/libreoffice/libreoffice/-/blob/master/rules#L2340 
ff.



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 15:02 schrieb Andreas Schwab:

On Jul 22 2023, Rene Engelhard wrote:


https://lists.debian.org/debian-riscv/2023/07/msg00014.html is for manual
thing. And the IRC log shows that even libreoffice-lightproof-en etc don't
appear as bundled extensions.

$ unopkg list --bundled
All deployed bundled extensions:

Identifier: org.openoffice.en.hunspell.dictionaries
   Version: 2022.05.01
   URL: vnd.sun.star.expand:$BUNDLED_EXTENSIONS/lightproof-en
   is registered: yes
   Media-Type: application/vnd.sun.star.package-bundle
   Description:
   bundled Packages: {
   URL: 
vnd.sun.star.expand:$BUNDLED_EXTENSIONS/lightproof-en/Lightproof.components
   is registered: yes
   Media-Type: application/vnd.sun.star.uno-components
   Description:

   URL: vnd.sun.star.expand:$BUNDLED_EXTENSIONS/lightproof-en/Linguistic.xcu
   is registered: yes
   Media-Type: application/vnd.sun.star.configuration-data
   Description:

   }


Interesting.


Now the question is what is different between openSUSEs libreoffice 
package and Debians...


Does opensuse have some public git/$VCS?

(Though I would more bet of some system evironment thingy)


Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> Hi,
>
> Am 22.07.23 um 14:28 schrieb Andreas Schwab:
>> On Jul 22 2023, Rene Engelhard wrote:
>>
>>> Yes. _basically_. (Only with -O0 or maybe -Os as upstreams makefile says,
>>> though)
>> On openSUSE Factory, libreoffice is built with the usual compiler flags,
>> wich includes full optimisation and hardening.
>
> Which gives the smoketest test failure here I pointed out (again) in my
> other mail.

$ find /usr/lib64/libreoffice/ -name "*smoke*"
/usr/lib64/libreoffice/program/classes/smoketest.jar

How can I run that?

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> https://lists.debian.org/debian-riscv/2023/07/msg00014.html is for manual
> thing. And the IRC log shows that even libreoffice-lightproof-en etc don't
> appear as bundled extensions.

$ unopkg list --bundled
All deployed bundled extensions:

Identifier: org.openoffice.en.hunspell.dictionaries
  Version: 2022.05.01
  URL: vnd.sun.star.expand:$BUNDLED_EXTENSIONS/lightproof-en
  is registered: yes
  Media-Type: application/vnd.sun.star.package-bundle
  Description:
  bundled Packages: {
  URL: 
vnd.sun.star.expand:$BUNDLED_EXTENSIONS/lightproof-en/Lightproof.components
  is registered: yes
  Media-Type: application/vnd.sun.star.uno-components
  Description:

  URL: vnd.sun.star.expand:$BUNDLED_EXTENSIONS/lightproof-en/Linguistic.xcu
  is registered: yes
  Media-Type: application/vnd.sun.star.configuration-data
  Description:

  }

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> And that includes LibreOffice-bundled extensions like the
> english,hungarian,russian grammar checker for example. Ot external finnish
> spellchecking, hyphenation and grammer checking. Or turkish spellchecing.
>
> And those are extensions written in python which neither register when
> registering manually nor when being installed as bundled extensions (see
> the discussion in this thread, not going to reiterate)

How can I test that?  I have never used libreoffice before, so I don't
know what to look for.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> Yes. _basically_. (Only with -O0 or maybe -Os as upstreams makefile says,
> though)

On openSUSE Factory, libreoffice is built with the usual compiler flags,
wich includes full optimisation and hardening.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jul 22 2023, Rene Engelhard wrote:

> Just not registering or unregistering *any* extension.

What does that mean?  I haven't seen any errors about extensions.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 14:34 schrieb Andreas Schwab:

On Jul 22 2023, Rene Engelhard wrote:


And that includes LibreOffice-bundled extensions like the
english,hungarian,russian grammar checker for example. Ot external finnish
spellchecking, hyphenation and grammer checking. Or turkish spellchecing.

And those are extensions written in python which neither register when
registering manually nor when being installed as bundled extensions (see
the discussion in this thread, not going to reiterate)

How can I test that?  I have never used libreoffice before, so I don't
know what to look for.


https://lists.debian.org/debian-riscv/2023/07/msg00010.html

https://lists.debian.org/debian-riscv/2023/07/msg00014.html


(some of them says mips64el, but as said in my other replies, the 
smoketest failure is the same symptom there, just on riscv64 actual 
unopkg add does nothing effectively.)



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 14:28 schrieb Andreas Schwab:

On Jul 22 2023, Rene Engelhard wrote:


Yes. _basically_. (Only with -O0 or maybe -Os as upstreams makefile says,
though)

On openSUSE Factory, libreoffice is built with the usual compiler flags,
wich includes full optimisation and hardening.


Which gives the smoketest test failure here I pointed out (again) in my 
other mail.



Regards.


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 14:25 schrieb Andreas Schwab:

On Jul 22 2023, Rene Engelhard wrote:


Just not registering or unregistering *any* extension.

What does that mean?  I haven't seen any errors about extensions.


Do you run the testsuite?

Especially the smoketest?


And you are replying to exactly a thread which (later) talks about 
extensions being broken. So I wonder why you didn' t take the previous 
mails into account?



https://lists.debian.org/debian-riscv/2023/07/msg00014.html is for 
manual thing. And the IRC log shows that even libreoffice-lightproof-en 
etc don't appear as bundled extensions.


https://lists.debian.org/debian-riscv/2023/07/msg1.html is for the 
smoketest (that one's mips64el, but same symptom on riscv64)



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 14:09 schrieb Rene Engelhard:
And that included packaged extensions so if they install but don't work 
that's a grave bug.


And that includes LibreOffice-bundled extensions like the 
english,hungarian,russian grammar checker for example. Ot external 
finnish spellchecking, hyphenation and grammer checking. Or turkish 
spellchecing.


And those are extensions written in python which neither register when 
registering manually nor when being installed as bundled extensions (see 
the discussion in this thread, not going to reiterate)


(Whether one needs the NLPSolver or Wiki Publisher or so can definitely 
be discussed, though)


Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Andreas Schwab
On Jun 18 2023, Rene Engelhard wrote:

> For riscv64 I already pointed that out in the thread starting at
> https://lists.debian.org/debian-riscv/2023/06/msg0.html, but for the
> other architectures there is the mail now. riscv64 is different because
> the failures are even more big than any other down below and it's actually
> a new architecture anyway.

Libreoffice is actually basically working on riscv64.  I have tested it
with openSUSE Tumbleweed on BeagleV Beta and Hifive Unmatched (with an
AMD graphics card).

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."



Re: unbreaking LibreOffices tests on at least release architectures

2023-07-22 Thread Rene Engelhard

Hi,

Am 22.07.23 um 14:02 schrieb Andreas Schwab:

On Jun 18 2023, Rene Engelhard wrote:


For riscv64 I already pointed that out in the thread starting at
https://lists.debian.org/debian-riscv/2023/06/msg0.html, but for the
other architectures there is the mail now. riscv64 is different because
the failures are even more big than any other down below and it's actually
a new architecture anyway.

Libreoffice is actually basically working on riscv64.


Yes. _basically_. (Only with -O0 or maybe -Os as upstreams makefile 
says, though)



Which can be enough, but also can be not.


  I have tested it
with openSUSE Tumbleweed on BeagleV Beta and Hifive Unmatched (with an
AMD graphics card).


Just not registering or unregistering *any* extension. Neither manually 
nor if installing any bundled extension.


At least here.


And that included packaged extensions so if they install but don't work 
that's a grave bug.



Regards,


Rene



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-21 Thread Theodore Ts'o
On Fri, Jul 21, 2023 at 06:14:04PM +1000, Finn Thain wrote:
> 
> I'm not blaming the unstable API for the bugs, I'm blaming it for the 
> workload. A stable API (like a userspace API) decreases the likelihood 
> that overloaded maintainers have to orphan a filesystem implementation.

You are incorrect.  The HFS file system has gotten zero development
attention and the bugs were not the result of the API changes.  The
main issue here is that the HFS file system does not have maintainer,
and decreasing the workload will not magically make someone appear
with deep knowledge of that particular part of the code base.

It's also the case that the actual amount of work on the "overloaded
maintainers" caused by API changes is minimal --- it's dwarfed by
syzbot noise (complaints from syzbot that aren't really bugs, or for
really outré threat models).

API changes within the kernel are the responsibility of the people
making the change.  For example, consider all of the folio changes
that have been landing in the kernel; the amount of extra work on the
part of most file system maintainers is minimal, because it's the
people making the API changes who update the file system.  I won't say
that it's _zero_ work, because file system maintainers review the
changes, and we run regression tests, and we sometimes need to point
out when a bug has been introduced --- at which point the person
making the API change has the responsibility of fixing or reverting
the change.

An unstable API are much painful for out-of-tree kernel code.  But
upstream kernel developers aren't really concerned with out-of-tree
kernel code, except to point out that the work of the people who are
promulgated out-of-tree modules would be much less if they actually
got them cleaned up and made acceptable for upstream inclusion.

- Ted



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-21 Thread Finn Thain
On Fri, 21 Jul 2023, Matthew Wilcox wrote:

> 
> You've misunderstood.  Google have decided to subject the entire kernel 
> (including obsolete unmaintained filesystems) to stress tests that it's 
> never had before.  IOW these bugs have been there since the code was 
> merged.  There's nothing to back out.  There's no API change to blame. 
> It's always been buggy and it's never mattered before.
> 

I'm not blaming the unstable API for the bugs, I'm blaming it for the 
workload. A stable API (like a userspace API) decreases the likelihood 
that overloaded maintainers have to orphan a filesystem implementation. 



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Matthew Wilcox
On Fri, Jul 21, 2023 at 11:03:28AM +1000, Finn Thain wrote:
> On Fri, 21 Jul 2023, Dave Chinner wrote:
> 
> > > I suspect that this is one of those catch-22 situations: distros are 
> > > going to enable every feature under the sun. That doesn't mean that 
> > > anyone is actually _using_ them these days.
> 
> I think the value of filesystem code is not just a question of how often 
> it gets executed -- it's also about retaining access to the data collected 
> in archives, museums, galleries etc. that is inevitably held in old 
> formats.

That's an argument for adding support to tar, not for maintaining
read/write support.

> > We need to much more proactive about dropping support for unmaintained 
> > filesystems that nobody is ever fixing despite the constant stream of 
> > corruption- and deadlock- related bugs reported against them.
> 
> IMO, a stream of bug reports is not a reason to remove code (it's a reason 
> to revert some commits).
> 
> Anyway, that stream of bugs presumably flows from the unstable kernel API, 
> which is inherently high-maintenance. It seems that a stable API could be 
> more appropriate for any filesystem for which the on-disk format is fixed 
> (by old media, by unmaintained FLOSS implementations or abandoned 
> proprietary implementations).

You've misunderstood.  Google have decided to subject the entire kernel
(including obsolete unmaintained filesystems) to stress tests that it's
never had before.  IOW these bugs have been there since the code was
merged.  There's nothing to back out.  There's no API change to blame.
It's always been buggy and it's never mattered before.

It wouldn't be so bad if Google had also decided to fund people to fix
those bugs, but no, they've decided to dump them on public mailing lists
and berate developers into fixing them.



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Finn Thain
On Fri, 21 Jul 2023, Dave Chinner wrote:

> > I suspect that this is one of those catch-22 situations: distros are 
> > going to enable every feature under the sun. That doesn't mean that 
> > anyone is actually _using_ them these days.

I think the value of filesystem code is not just a question of how often 
it gets executed -- it's also about retaining access to the data collected 
in archives, museums, galleries etc. that is inevitably held in old 
formats.

> 
> We need to much more proactive about dropping support for unmaintained 
> filesystems that nobody is ever fixing despite the constant stream of 
> corruption- and deadlock- related bugs reported against them.
> 

IMO, a stream of bug reports is not a reason to remove code (it's a reason 
to revert some commits).

Anyway, that stream of bugs presumably flows from the unstable kernel API, 
which is inherently high-maintenance. It seems that a stable API could be 
more appropriate for any filesystem for which the on-disk format is fixed 
(by old media, by unmaintained FLOSS implementations or abandoned 
proprietary implementations).

Being in userspace, I suppose FUSE could be a stable API though I imagine 
it's not ideal in the sense that migrating kernel code there would be 
difficult. Maybe userspace NFS 4 would be a better fit? (I've no idea, I'm 
out of my depth in /fs...)

Ideally, kernel-to-userspace code migration would be done with automatic 
program transformation -- otherwise it would become another stream of 
bugs.



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Linus Torvalds
On Thu, 20 Jul 2023 at 15:37, Matthew Wilcox  wrote:
>
> I think you're missing the context.  There are bugs in how this filesystem
> handles intentionally-corrupted filesystems.  That's being reported as
> a critical bug because apparently some distributions automount HFS/HFS+
> filesystems presented to them on a USB key.  Nobody is being paid to fix
> these bugs.  Nobody is volunteering to fix these bugs out of the kindness
> of their heart.  What choice do we have but to remove the filesystem,
> regardless of how many happy users it has?

You're being silly.

We have tons of sane options. The obvious one is "just don't mount
untrusted media".

Now, the kernel doesn't know which media is trusted or not, since the
kernel doesn't actually see things like /etc/mtab and friends. So we
in the kernel can't do that, but distros should have a very easy time
just fixing their crazy models.

Saying that the kernel should remove a completely fine filesystem just
because some crazy use-cases that nobody cares about are broken, now
*that* just crazy.

Now, would it be good to have a maintainer for hgs? Obviously. But no,
we don't remove filesystems just because they don't have maintainers.

And no, we have not suddenly started saying "users don't matter".

  Linus



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Matthew Wilcox
On Thu, Jul 20, 2023 at 05:38:52PM -0400, Jeffrey Walton wrote:
> On Thu, Jul 20, 2023 at 2:39 PM Matthew Wilcox  wrote:
> >
> > On Thu, Jul 20, 2023 at 07:50:47PM +0200, John Paul Adrian Glaubitz wrote:
> > > > Then we should delete the HFS/HFS+ filesystems.  They're orphaned in
> > > > MAINTAINERS and if distros are going to do such a damnfool thing,
> > > > then we must stop them.
> > >
> > > Both HFS and HFS+ work perfectly fine. And if distributions or users are 
> > > so
> > > sensitive about security, it's up to them to blacklist individual features
> > > in the kernel.
> > >
> > > Both HFS and HFS+ have been the default filesystem on MacOS for 30 years
> > > and I don't think it's justified to introduce such a hard compatibility
> > > breakage just because some people are worried about theoretical evil
> > > maid attacks.
> > >
> > > HFS/HFS+ mandatory if you want to boot Linux on a classic Mac or PowerMac
> > > and I don't think it's okay to break all these systems running Linux.
> >
> > If they're so popular, then it should be no trouble to find somebody
> > to volunteer to maintain those filesystems.  Except they've been
> > marked as orphaned since 2011 and effectively were orphaned several
> > years before that (the last contribution I see from Roman Zippel is
> > in 2008, and his last contribution to hfs was in 2006).
> 
> One data point may help.. I've been running Linux on an old PowerMac
> and an old Intel MacBook since about 2014 or 2015 or so. I have needed
> the HFS/HFS+ filesystem support for about 9 years now (including that
> "blessed" support for the Apple Boot partition).
> 
> There's never been a problem with Linux and the Apple filesystems.
> Maybe it speaks to the maturity/stability of the code that already
> exists. The code does not need a lot of attention nowadays.
> 
> Maybe the orphaned status is the wrong metric to use to determine
> removal. Maybe a better metric would be installation base. I.e., how
> many users use the filesystem.

I think you're missing the context.  There are bugs in how this filesystem
handles intentionally-corrupted filesystems.  That's being reported as
a critical bug because apparently some distributions automount HFS/HFS+
filesystems presented to them on a USB key.  Nobody is being paid to fix
these bugs.  Nobody is volunteering to fix these bugs out of the kindness
of their heart.  What choice do we have but to remove the filesystem,
regardless of how many happy users it has?



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Dave Chinner
On Thu, Jul 20, 2023 at 02:27:50PM -0400, Jeff Layton wrote:
> On Thu, 2023-07-20 at 18:59 +0100, Matthew Wilcox wrote:
> > On Thu, Jul 20, 2023 at 07:50:47PM +0200, John Paul Adrian Glaubitz wrote:
> > > > Then we should delete the HFS/HFS+ filesystems.  They're orphaned in
> > > > MAINTAINERS and if distros are going to do such a damnfool thing,
> > > > then we must stop them.
> > > 
> > > Both HFS and HFS+ work perfectly fine. And if distributions or users are 
> > > so
> > > sensitive about security, it's up to them to blacklist individual features
> > > in the kernel.
> > > 
> > > Both HFS and HFS+ have been the default filesystem on MacOS for 30 years
> > > and I don't think it's justified to introduce such a hard compatibility
> > > breakage just because some people are worried about theoretical evil
> > > maid attacks.
> > > 
> > > HFS/HFS+ mandatory if you want to boot Linux on a classic Mac or PowerMac
> > > and I don't think it's okay to break all these systems running Linux.
> > 
> > If they're so popular, then it should be no trouble to find somebody
> > to volunteer to maintain those filesystems.  Except they've been
> > marked as orphaned since 2011 and effectively were orphaned several
> > years before that (the last contribution I see from Roman Zippel is
> > in 2008, and his last contribution to hfs was in 2006).
> 
> I suspect that this is one of those catch-22 situations: distros are
> going to enable every feature under the sun. That doesn't mean that
> anyone is actually _using_ them these days.
> 
> Is "staging" still a thing? Maybe we should move these drivers into the
> staging directory and pick a release where we'll sunset it, and then see
> who comes out of the woodwork?

No, the train wreck of filesystems in staging proved that it wasn't
a viable process.

We should just follow the same process as we are using for reiser -
mark it as deprecated in place, pick a date that we are going to
remove it, then add a warning (both runtime, in kconfig and probably
in the kernel filesystem documentation) that it is deprecated and
support is going to be removed at a certain date.

We should be applying the same criteria and process for all the
other filesystems that are orphaned, too. We need to much more
proactive about dropping support for unmaintained filesystems that
nobody is ever fixing despite the constant stream of
corruption- and deadlock- related bugs reported against them.

-Dave.
-- 
Dave Chinner
da...@fromorbit.com



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Jeffrey Walton
On Thu, Jul 20, 2023 at 2:39 PM Matthew Wilcox  wrote:
>
> On Thu, Jul 20, 2023 at 07:50:47PM +0200, John Paul Adrian Glaubitz wrote:
> > > Then we should delete the HFS/HFS+ filesystems.  They're orphaned in
> > > MAINTAINERS and if distros are going to do such a damnfool thing,
> > > then we must stop them.
> >
> > Both HFS and HFS+ work perfectly fine. And if distributions or users are so
> > sensitive about security, it's up to them to blacklist individual features
> > in the kernel.
> >
> > Both HFS and HFS+ have been the default filesystem on MacOS for 30 years
> > and I don't think it's justified to introduce such a hard compatibility
> > breakage just because some people are worried about theoretical evil
> > maid attacks.
> >
> > HFS/HFS+ mandatory if you want to boot Linux on a classic Mac or PowerMac
> > and I don't think it's okay to break all these systems running Linux.
>
> If they're so popular, then it should be no trouble to find somebody
> to volunteer to maintain those filesystems.  Except they've been
> marked as orphaned since 2011 and effectively were orphaned several
> years before that (the last contribution I see from Roman Zippel is
> in 2008, and his last contribution to hfs was in 2006).

One data point may help.. I've been running Linux on an old PowerMac
and an old Intel MacBook since about 2014 or 2015 or so. I have needed
the HFS/HFS+ filesystem support for about 9 years now (including that
"blessed" support for the Apple Boot partition).

There's never been a problem with Linux and the Apple filesystems.
Maybe it speaks to the maturity/stability of the code that already
exists. The code does not need a lot of attention nowadays.

Maybe the orphaned status is the wrong metric to use to determine
removal. Maybe a better metric would be installation base. I.e., how
many users use the filesystem.

Jeff



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Jeff Layton
On Thu, 2023-07-20 at 18:59 +0100, Matthew Wilcox wrote:
> On Thu, Jul 20, 2023 at 07:50:47PM +0200, John Paul Adrian Glaubitz wrote:
> > > Then we should delete the HFS/HFS+ filesystems.  They're orphaned in
> > > MAINTAINERS and if distros are going to do such a damnfool thing,
> > > then we must stop them.
> > 
> > Both HFS and HFS+ work perfectly fine. And if distributions or users are so
> > sensitive about security, it's up to them to blacklist individual features
> > in the kernel.
> > 
> > Both HFS and HFS+ have been the default filesystem on MacOS for 30 years
> > and I don't think it's justified to introduce such a hard compatibility
> > breakage just because some people are worried about theoretical evil
> > maid attacks.
> > 
> > HFS/HFS+ mandatory if you want to boot Linux on a classic Mac or PowerMac
> > and I don't think it's okay to break all these systems running Linux.
> 
> If they're so popular, then it should be no trouble to find somebody
> to volunteer to maintain those filesystems.  Except they've been
> marked as orphaned since 2011 and effectively were orphaned several
> years before that (the last contribution I see from Roman Zippel is
> in 2008, and his last contribution to hfs was in 2006).

I suspect that this is one of those catch-22 situations: distros are
going to enable every feature under the sun. That doesn't mean that
anyone is actually _using_ them these days.

Is "staging" still a thing? Maybe we should move these drivers into the
staging directory and pick a release where we'll sunset it, and then see
who comes out of the woodwork?

Cheers,
-- 
Jeff Layton 



Re: [syzbot] [hfs?] WARNING in hfs_write_inode

2023-07-20 Thread Matthew Wilcox
On Thu, Jul 20, 2023 at 07:50:47PM +0200, John Paul Adrian Glaubitz wrote:
> > Then we should delete the HFS/HFS+ filesystems.  They're orphaned in
> > MAINTAINERS and if distros are going to do such a damnfool thing,
> > then we must stop them.
> 
> Both HFS and HFS+ work perfectly fine. And if distributions or users are so
> sensitive about security, it's up to them to blacklist individual features
> in the kernel.
> 
> Both HFS and HFS+ have been the default filesystem on MacOS for 30 years
> and I don't think it's justified to introduce such a hard compatibility
> breakage just because some people are worried about theoretical evil
> maid attacks.
> 
> HFS/HFS+ mandatory if you want to boot Linux on a classic Mac or PowerMac
> and I don't think it's okay to break all these systems running Linux.

If they're so popular, then it should be no trouble to find somebody
to volunteer to maintain those filesystems.  Except they've been
marked as orphaned since 2011 and effectively were orphaned several
years before that (the last contribution I see from Roman Zippel is
in 2008, and his last contribution to hfs was in 2006).



Re: LibreOffice bridges/smoketest on mips(64)el (was: Re: unbreaking LibreOffices tests on at least release architectures)

2023-07-04 Thread Adrian Bunk
On Mon, Jul 03, 2023 at 09:31:29PM +0200, Rene Engelhard wrote:
> Hi,
> 
> Am 25.06.23 um 13:37 schrieb Rene Engelhard:
> > > what about the
> > > following:
> > > - make all test failures fatal on a*64 (since upstream tests these), and
> > > - make smoketest failures fatal on all architectures (including ports)
> 
> That was implemented (+ two more important tests) in experimental. See
> https://buildd.debian.org/status/package.php?p=libreoffice
> 
> It does
> - bridgetest
> - smoketest
> - pyuno
> 
> What fails for release archs astonishingly is only mips(64)el.

It also failed on riscv64 (and powerpc), so that seems to be
a criteria that catches the known-broken builds.

>...
> This test extension to be installed is a Java extension.
> So I am running a nojava build on eller now... I don't really like disabling
> Java since this opens Pandoras box but for mips64el we probably could do
> that.

It would also hint at a MIPS problem in LibreOffice,
which might or might not be specific to Java.

AFAIK OpenJDK on MIPS does not have any known major issues.

The Zero build of OpenJDK on MIPS is of course slow,
but that's also true on armel where the build succeeded.

> Regards,
> 
> Rene

cu
Adrian

BTW: The MIPS-specific discussion should continue on debian-mips instead
 of debian-ports. 



Re: LibreOffice bridges/smoketest on mips(64)el (was: Re: unbreaking LibreOffices tests on at least release architectures)

2023-07-03 Thread Rene Engelhard

Hi,

Am 03.07.23 um 21:31 schrieb Rene Engelhard:

Am 25.06.23 um 13:37 schrieb Rene Engelhard:

what about the
following:
- make all test failures fatal on a*64 (since upstream tests these), and
- make smoketest failures fatal on all architectures (including ports)


That was implemented (+ two more important tests) in experimental. See
https://buildd.debian.org/status/package.php?p=libreoffice


https://buildd.debian.org/status/package.php?p=libreoffice=experimental

of course.

Regards,

Rene



LibreOffice bridges/smoketest on mips(64)el (was: Re: unbreaking LibreOffices tests on at least release architectures)

2023-07-03 Thread Rene Engelhard

Hi,

Am 25.06.23 um 13:37 schrieb Rene Engelhard:

what about the
following:
- make all test failures fatal on a*64 (since upstream tests these), and
- make smoketest failures fatal on all architectures (including ports)


That was implemented (+ two more important tests) in experimental. See
https://buildd.debian.org/status/package.php?p=libreoffice

It does
- bridgetest
- smoketest
- pyuno

What fails for release archs astonishingly is only mips(64)el. Let's 
continue on -mips...


For that matter mipsel seems to be even more broken. A --without-java 
builds also breaks at the smoketest with a segfault (tried on eller):


That said even the most important test fails. The bridgetest:

[build BIN] testtools
S=/PKGBUILDDIR  I=$S/instdir  
W=$S/workdir   mkdir -p $W/Module/nonl10n/  touch 
$W/Module/nonl10n/testtools
S=/PKGBUILDDIR  I=$S/instdir  
W=$S/workdir  
LD_LIBRARY_PATH=${LD_LIBRARY_PATH:+$LD_LIBRARY_PATH:}$I/program:$I/program 
  $I/program/uno.bin -s com.sun.star.test.bridge.BridgeTest -- 
com.sun.star.test.bridge.CppTestObject 
-env:LO_BUILD_LIB_DIR=file://$W/LinkTarget/Library 
-env:URE_MORE_SERVICES=file://$W/Rdb/uno_services.rdb 
-env:URE_MORE_TYPES=file://$W/UnoApiTarget/bridgetest.rdb

[build MOD] testtools
S=/PKGBUILDDIR  I=$S/instdir  
W=$S/workdir   mkdir -p $W/Module/

  touch $W/Module/testtools
### bool does not match! failed
### char does not match! failed
### byte does not match! failed
### short does not match! failed
### unsigned short does not match! failed
### long does not match! failed
### unsigned long does not match! failed
### hyper does not match! failed
### unsigned hyper does not match! failed
### enum does not match! failed
### byte2 does not match! failed
### short2 does not match! failed
struct comparison test failed
ppc-style alignment test failed
ppc64-style alignment test failed
### bool does not match! failed
### char does not match! failed
### byte does not match! failed
### short does not match! failed
### unsigned short does not match! failed
### long does not match! failed
### unsigned long does not match! failed
### hyper does not match! failed
### unsigned hyper does not match! failed
### enum does not match! failed
### byte2 does not match! failed
### short2 does not match! failed
recursive test results failed
remote multi failed: 11 != -1715038976
local multi failed: 11 != -1715038976
standard test failed
exception occurred: error: test failed! at 
./testtools/source/bridgetest/bridgetest.cxx:1271


 error: error: test failed! at 
./testtools/source/bridgetest/bridgetest.cxx:1271
 dying...make[3]: *** 
[/PKGBUILDDIR/testtools/CustomTarget_uno_test.mk:25: 
/PKGBUILDDIR/workdir/CustomTarget/testtools/uno_test.done] 
Error 1


So the smoketest isn't even ran.

-> mipsel is fundamentally broken and libreoffice probably be removed 
from it.


For mips64el I do have some hope as the failure is

[build CUT] smoketest
S=/PKGBUILDDIR  I=$S/instdir  
W=$S/workdir   mkdir -p $W/CppunitTest/  rm -fr 
$W/CppunitTest/smoketest.test.user  cp -r $W/unittest 
$W/CppunitTest/smoketest.test.user 
rm -fr $W/CppunitTest/smoketest.test.core  mkdir 
$W/CppunitTest/smoketest.test.core  cd 
$W/CppunitTest/smoketest.test.core  (  MAX_CONCURRENCY=4 
MOZILLA_CERTIFICATE_FOLDER=dbm: SAL_DISABLE_SYNCHRONOU
S_PRINTER_DETECTION=1 SAL_USE_VCLPLUGIN=svp LIBO_LANG=C 
LD_LIBRARY_PATH=${LD_LIBRARY_PATH:+$LD_LIBRARY_PATH:}$I/program:$I/program:$W/UnpackedTarball/cppunit/src/cppunit/.libs 
$W/LinkTarget/Executable/cppunittester $W
/LinkTarget/CppunitTest/libtest_smoketest.so --headless 
-env:BRAND_BASE_DIR=file://$S/instdir 
-env:BRAND_SHARE_SUBDIR=share 
-env:BRAND_SHARE_RESOURCE_SUBDIR=program/resource 
-env:UserInstallation=
file://$W/CppunitTest/smoketest.test.user 
-env:UNO_TYPES=file://$I/program/types.rdb 
file://$I/program/types/offapi.rdb 
-env:UNO_SERVICES=file://$W/Rdb/ure/services.rdb 
-env:URE_BIN_DIR=file://$I/program
-env:URE_INTERNAL_LIB_DIR=file://$I/program 
-env:LO_LIB_DIR=file://$I/program 
-env:LO_JAVA_DIR=file://$I/program/classes --protector 
$W/LinkTarget/Library/unoexceptionprotector.so unoexceptionprotector 
--protector $W/LinkTarget/Library/un
obootstrapprotector.so unobootstrapprotector 
-env:arg-soffice=path:$I/program/soffice 
-env:arg-user=$W/CustomTarget/smoketest 
-env:arg-env=LD_LIBRARY_PATH${LD_LIBRARY_PATH+=$LD_LIBRARY_PATH} 
-env:arg-testarg.smoketest.doc=$W
/Zip/smoketestdoc.sxw 
-env:CPPUNITTESTTARGET=$W/CppunitTest/smoketest.test  ) 
21

[_RUN_] (anonymous namespace)::Test::test

(process:2108170): dconf-CRITICAL **: 05:13:49.716: unable to create 
directory '/run/user/2952/dconf': Permission denied.  dconf will not 
work properly.

Fontconfig error: No writable cache directories
Fontconfig error: No writable cache directories

(process:2108244): dconf-CRITICAL **: 05:13:50.371: unable to create 
directory '/run/user/2952/dconf': Permission denied.  dconf will not 
work properly.

Fontconfig error: No writable cache directories
Fontconfig 

Re: unbreaking LibreOffices tests on at least release architectures

2023-06-25 Thread Rene Engelhard

Hi,

Am 20.06.23 um 10:25 schrieb Adrian Bunk:

On Tue, Jun 20, 2023 at 05:52:44AM +0200, Rene Engelhard wrote:

Hi,

Am 19.06.23 um 23:29 schrieb Rene Engelhard:

The pragmatic option would be to run only a smoketest for build success
on architectures not tested by upstream.

And have Format->Character in Impress crash with Bus error like on
mipsel? That doesn't sound too good for basic quality.

There is a "smoketest" but it does just basic start. open, close stuff.
Not even basic usage.

That said, that is the smoketest on mipsel:
...

Assuming the smoketest currently also fails on riscv64,


It thankfully does, because it fails the smoketest (:-)) because its 
"does a (Java) extension install?" test fails.


(Which autopkgtest disables and makes an own test out of this anyway.)


what about the
following:
- make all test failures fatal on a*64 (since upstream tests these), and
- make smoketest failures fatal on all architectures (including ports)


Sounds OKish, but that won't help the architectures even failing the 
smoketest.



For that matter mipsel seems to be even more broken. A --without-java 
builds also breaks at the smoketest with a segfault (tried on eller):


m -rf /home/rene/libreoffice-7.5.4/workdir/CustomTarget/smoketest
mkdir -p /home/rene/libreoffice-7.5.4/workdir/CustomTarget/smoketest/user
cp /home/rene/libreoffice-7.5.4/qadevOOo/qa/registrymodifications.xcu 
/home/rene/libreoffice-7.5.4/workdir/CustomTarget/smoketest/user

[build CUT] smoketest
S=/home/rene/libreoffice-7.5.4 && I=$S/instdir && W=$S/workdir &&  mkdir 
-p $W/CppunitTest/ && rm -fr $W/CppunitTest/smoketest.test.user && cp -r 
$W/unittest $W/CppunitTest/smoketest.test.user &&    rm -fr 
$W/CppunitTest/smoketest.test.core && mkdir 
$W/CppunitTest/smoketest.test.core && cd 
$W/CppunitTest/smoketest.test.core && (  MAX_CONCURRENCY=4 
MOZILLA_CERTIFICATE_FOLDER=dbm: 
SAL_DISABLE_SYNCHRONOUS_PRINTER_DETECTION=1 SAL_USE_VCLPLUGIN=svp 
LIBO_LANG=C 
LD_LIBRARY_PATH=${LD_LIBRARY_PATH:+$LD_LIBRARY_PATH:}"$I/program:$I/program":$W/UnpackedTarball/cppunit/src/cppunit/.libs 
$W/LinkTarget/Executable/cppunittester $W/L
inkTarget/CppunitTest/libtest_smoketest.so --headless 
"-env:BRAND_BASE_DIR=file://$S/instdir" "-env:BRAND_SHARE_SUBDIR=share" 
"-env:BRAND_SHARE_RESOURCE_SUBDIR=program/resource" 
"-env:UserInstallation=file://$W/CppunitTest/smoketest.test.user" 
"-env:UNO_TYPES=file://$I/program/types.rdb 
file://$I/program/types/offapi.rdb" 
"-env:UNO_SERVICES=file://$W/Rdb/ure/services.rdb" 
-env:URE_BIN_DIR=file://$I/program 
-env:URE_INTERNAL_LIB_DIR=file://$I/program 
-env:LO_LIB_DIR=file://$I/program 
-env:LO_JAVA_DIR=file://$I/program/classes --protector 
$W/LinkTarget/Library/unoexceptionprotector.so unoexceptionprotector 
--protector $W/Lin
kTarget/Library/unobootstrapprotector.so unobootstrapprotector 
-env:arg-soffice=path:$I/program/soffice 
-env:arg-user=$W/CustomTarget/smoketest 
-env:arg-env=LD_LIBRARY_PATH"${LD_LIBRARY_PATH+=$LD_LIBRARY_PATH}" 
-env:arg-testarg.smoketest.doc=$W/Zip/smoketestdoc.sxw 
"-env:CPPUNITTESTTARGET=$W/CppunitTest/smoketest.test"  ) 2>&1

[_RUN_] (anonymous namespace)::Test::test


Fatal exception: Signal 11
Stack:
/home/rene/libreoffice-7.5.4/instdir/program/libuno_sal.so.3(+0x49b08)[0x77ec9b08]
/home/rene/libreoffice-7.5.4/instdir/program/libuno_sal.so.3(+0x49d38)[0x77ec9d38]
linux-vdso.so.1(+0x550)[0x7ff4e550]
/home/rene/libreoffice-7.5.4/instdir/program/libuno_cppu.so.3(+0x15d94)[0x772d5d94]
/home/rene/libreoffice-7.5.4/instdir/program/libuno_cppu.so.3(+0x1d1fc)[0x772dd1fc]
/home/rene/libreoffice-7.5.4/instdir/program/libuno_cppu.so.3(uno_copyAndConvertData+0x30)[0x772da974]
/home/rene/libreoffice-7.5.4/instdir/program/libgcc3_uno.so(+0xbf8c)[0x6ca0bf8c]
/home/rene/libreoffice-7.5.4/instdir/program/libgcc3_uno.so(+0xcbc4)[0x6ca0cbc4]
/home/rene/libreoffice-7.5.4/instdir/program/libreflectionlo.so(+0x2942c)[0x63fc942c]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(+0x94ca0)[0x76794ca0]
/home/rene/libreoffice-7.5.4/instdir/program/libsvllo.so(_ZN14SfxBroadcaster9BroadcastERK7SfxHint+0x6c)[0x75f93a3c]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(_ZN11SbxVariable9BroadcastE9SfxHintId+0x16c)[0x768986e8]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(_ZN8SbxValueC2ERKS_+0xb0)[0x768906c8]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(_ZN11SbxVariableC2ERKS_+0x44)[0x76898874]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(_ZN9SbxMethodC1ERKS_+0x50)[0x768881f4]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(+0x13d69c)[0x7683d69c]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(+0x13e3cc)[0x7683e3cc]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(+0x131008)[0x76831008]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(+0xb4534)[0x767b4534]
/home/rene/libreoffice-7.5.4/instdir/program/libsblo.so(+0xb5378)[0x767b5378]

Re: unbreaking LibreOffices tests on at least release architectures

2023-06-20 Thread Paul Wise
On Tue, 2023-06-20 at 22:46 +0200, Kurt Roeckx wrote:

> Can I suggest that if you file a few bugs and add some information in
> it so that maybe someone can look at it? If it only affects one
> architecture, send a mail to that list asking for help.

PS: when filing architecture-specific bugs, please also set the BTS
usertags and XCC the ports lists for the architectures effected.

https://wiki.debian.org/Teams/Debbugs/ArchitectureTags

-- 
bye,
pabs

https://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Re: unbreaking LibreOffices tests on at least release architectures

2023-06-20 Thread Kurt Roeckx
Can I suggest that if you file a few bugs and add some information in it so 
that maybe someone can look at it? If it only affects one architecture, send a 
mail to that list asking for help.

Kurt

Re: unbreaking LibreOffices tests on at least release architectures

2023-06-20 Thread Rene Engelhard

Hi,

Am 20.06.23 um 16:52 schrieb Kurt Roeckx:

On Tue, Jun 20, 2023 at 05:52:44AM +0200, Rene Engelhard wrote:

Hi,

Am 19.06.23 um 23:29 schrieb Rene Engelhard:

The pragmatic option would be to run only a smoketest for build success
on architectures not tested by upstream.

And have Format->Character in Impress crash with Bus error like on
mipsel? That doesn't sound too good for basic quality.

There is a "smoketest" but it does just basic start. open, close stuff.
Not even basic usage.

That said, that is the smoketest on mipsel:

The problem with a mail like this is that it really doesn't help anybody
in understanding the problem. As porter, it will probably take a lot of
time to get to the point where you can start looking at what the problem
might be. It contains lots of information, but it's not clear what the
problem is and what needs to be looked at.

Except by just starting to build and run into an issue

(process:8700): dconf-CRITICAL **: 02:36:13.575: unable to create directory
'/run/user/2952/dconf': Permission denied.  dconf will not work properly.

(process:8708): dconf-CRITICAL **: 02:36:19.328: unable to create directory
'/run/user/2952/dconf': Permission denied.  dconf will not work properly.

(process:8815): dconf-CRITICAL **: 02:36:52.467: unable to create directory
'/run/user/2952/dconf': Permission denied.  dconf will not work properly.

Is this something the porter should look at? Is is relevant?


No. That also happens everywhere, also on amd64/arm64.



Fatal exception: Signal 11

It's a segfault,

I know :)

this should normally be trivial for you to debug,
but is probably complicated for a porter to find out how to do things
like attaching a debugger to the relevant process.


Well, the command line is there, but I see the point.

Still one could talk about this... I yet have to hear from any porter 
talking about actual issues (and the buildlogs *are* there).



Stack:
/<>/instdir/program/libuno_sal.so.3(+0x49b18)[0x77d69b18]
/<>/instdir/program/libuno_sal.so.3(+0x49d48)[0x77d69d48]
/usr/lib/jvm/java-17-openjdk-mipsel/lib/server/libjvm.so(+0x537b8c)[0x62417b8c]

Is this some openjdk problem, not a problem in libreoffice problem?


In this specific case probably openjdk. I was juat answering Adrian on 
the smoketest.


Actually I run a --disable-java build on eller right now.


./smoketest/smoketest.cxx:187:(anonymous namespace)::Test::test
assertion failed
- Expression: connection_.isStillAlive()

So the (TCP?) connection is not alive? Why not? That doesn't seem to be
platform specific. Is that a problem in the test suite, and not
libreoffice itself?


Because libreoffice crashed, "obviously", so there of course is no 
connection anymore.


The point here is that it even crashes at startup so probably being 
completely broken. (and I am not surprised)



unknown:0:(anonymous namespace)::Test::test
tearDown() failed
- An uncaught exception of type com.sun.star.lang.DisposedException
- Binary URP bridge already disposed at ./binaryurp/source/bridge.cxx:1048

(anonymous namespace)::Test::test finished in: 76764ms
smoketest.cxx:187:Assertion
Test name: (anonymous namespace)::Test::test
assertion failed
- Expression: connection_.isStillAlive()

##Failure Location unknown## : Error
Test name: (anonymous namespace)::Test::test
tearDown() failed
- An uncaught exception of type com.sun.star.lang.DisposedException

And then the test suite crashes because it can't actually deal
with the previous the assertion failure, and the segfault above
is not relevant at all?


It crashes because libreoffice crashed, the connection is not there and 
therefore not alive. Yes, I can read that.


As said, I was just pointing at a smoketest example.



The most likely thing is that this is not a platform specific issue,
but a either a general issue that just shows up on some platforms for
whatever reason, or some problem in an other piece of software that
libreoffice is using that does have a pratform specific issue.



This specific one might be, yes.


That's probably not true for the other architectures' failures. (E.g. 
the Bus error I mentioned earlier or the powerpcs having 
"Trace/breakpoint trap (core dumped)" or s390x or armel crashing in 
loading tiff files.


And that is all only the first failure on earch archs, there's more, 
there's gazillions of failures in  the architectures' build logs.



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-20 Thread Kurt Roeckx
On Tue, Jun 20, 2023 at 05:52:44AM +0200, Rene Engelhard wrote:
> Hi,
> 
> Am 19.06.23 um 23:29 schrieb Rene Engelhard:
> > > The pragmatic option would be to run only a smoketest for build success
> > > on architectures not tested by upstream.
> > 
> > And have Format->Character in Impress crash with Bus error like on
> > mipsel? That doesn't sound too good for basic quality.
> > 
> > There is a "smoketest" but it does just basic start. open, close stuff.
> > Not even basic usage.
> 
> That said, that is the smoketest on mipsel:

The problem with a mail like this is that it really doesn't help anybody
in understanding the problem. As porter, it will probably take a lot of
time to get to the point where you can start looking at what the problem
might be. It contains lots of information, but it's not clear what the
problem is and what needs to be looked at.

> (process:8700): dconf-CRITICAL **: 02:36:13.575: unable to create directory
> '/run/user/2952/dconf': Permission denied.  dconf will not work properly.
> 
> (process:8708): dconf-CRITICAL **: 02:36:19.328: unable to create directory
> '/run/user/2952/dconf': Permission denied.  dconf will not work properly.
> 
> (process:8815): dconf-CRITICAL **: 02:36:52.467: unable to create directory
> '/run/user/2952/dconf': Permission denied.  dconf will not work properly.

Is this something the porter should look at? Is is relevant? 

> Fatal exception: Signal 11

It's a segfault, this should normally be trivial for you to debug,
but is probably complicated for a porter to find out how to do things
like attaching a debugger to the relevant process.

> Stack:
> /<>/instdir/program/libuno_sal.so.3(+0x49b18)[0x77d69b18]
> /<>/instdir/program/libuno_sal.so.3(+0x49d48)[0x77d69d48]
> /usr/lib/jvm/java-17-openjdk-mipsel/lib/server/libjvm.so(+0x537b8c)[0x62417b8c]

Is this some openjdk problem, not a problem in libreoffice problem?

> ./smoketest/smoketest.cxx:187:(anonymous namespace)::Test::test
> assertion failed
> - Expression: connection_.isStillAlive()

So the (TCP?) connection is not alive? Why not? That doesn't seem to be
platform specific. Is that a problem in the test suite, and not
libreoffice itself?

> unknown:0:(anonymous namespace)::Test::test
> tearDown() failed
> - An uncaught exception of type com.sun.star.lang.DisposedException
> - Binary URP bridge already disposed at ./binaryurp/source/bridge.cxx:1048
> 
> (anonymous namespace)::Test::test finished in: 76764ms
> smoketest.cxx:187:Assertion
> Test name: (anonymous namespace)::Test::test
> assertion failed
> - Expression: connection_.isStillAlive()
> 
> ##Failure Location unknown## : Error
> Test name: (anonymous namespace)::Test::test
> tearDown() failed
> - An uncaught exception of type com.sun.star.lang.DisposedException

And then the test suite crashes because it can't actually deal
with the previous the assertion failure, and the segfault above
is not relevant at all?

The most likely thing is that this is not a platform specific issue,
but a either a general issue that just shows up on some platforms for
whatever reason, or some problem in an other piece of software that
libreoffice is using that does have a pratform specific issue.


Kurt



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-20 Thread Kirsten Bromilow
Stop sending these emails please! 

Sent from my iPhone

> On 20 Jun 2023, at 09:42, Adrian Bunk  wrote:
> 
> On Tue, Jun 20, 2023 at 05:52:44AM +0200, Rene Engelhard wrote:
>> Hi,
>> 
>> Am 19.06.23 um 23:29 schrieb Rene Engelhard:
 The pragmatic option would be to run only a smoketest for build success
 on architectures not tested by upstream.
>>> 
>>> And have Format->Character in Impress crash with Bus error like on
>>> mipsel? That doesn't sound too good for basic quality.
>>> 
>>> There is a "smoketest" but it does just basic start. open, close stuff.
>>> Not even basic usage.
>> 
>> That said, that is the smoketest on mipsel:
>> ...
> 
> Assuming the smoketest currently also fails on riscv64, what about the 
> following:
> - make all test failures fatal on a*64 (since upstream tests these), and
> - make smoketest failures fatal on all architectures (including ports)
> 
>> Regards,
>> 
>> Rene
> 
> cu
> Adrian
> 



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-20 Thread Adrian Bunk
On Tue, Jun 20, 2023 at 05:52:44AM +0200, Rene Engelhard wrote:
> Hi,
> 
> Am 19.06.23 um 23:29 schrieb Rene Engelhard:
> > > The pragmatic option would be to run only a smoketest for build success
> > > on architectures not tested by upstream.
> > 
> > And have Format->Character in Impress crash with Bus error like on
> > mipsel? That doesn't sound too good for basic quality.
> > 
> > There is a "smoketest" but it does just basic start. open, close stuff.
> > Not even basic usage.
> 
> That said, that is the smoketest on mipsel:
>...

Assuming the smoketest currently also fails on riscv64, what about the 
following:
- make all test failures fatal on a*64 (since upstream tests these), and
- make smoketest failures fatal on all architectures (including ports)

> Regards,
> 
> Rene

cu
Adrian



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-19 Thread Jeffrey Walton
On Mon, Jun 19, 2023 at 11:50 PM Rene Engelhard  wrote:
>
> Am 20.06.23 um 00:03 schrieb Jeffrey Walton:
> >
> > You can usually uncover them by building the package with CFLAGS=" ...
> > -fsanitize=undefined ... " and CXXFLAGS=" ... -fsanitize=undefined ...
> > ". The UBsan sanitizer operates on real data. There are no false
> > positives.
>
> I'd personally assume this isn't UB since upstream builds with UBsan for
> testing (admittedly not on mipsel, though). But once can investigate here...

Yeah, there's a caveat: you have to have complete self tests. If the
project lacks complete self tests, then you may not uncover the bug.

You can run the program in production with a sanitizer build. It may
uncover cases that were lacking in the test cases.

And it's unfortunate some arches lack Asan and UBsan support. They are
such powerful tools. Sometimes you can tease-out the UB on a different
arch. Sometimes you can't.

Jeff



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-19 Thread Rene Engelhard

Hi,

Am 19.06.23 um 23:29 schrieb Rene Engelhard:

The pragmatic option would be to run only a smoketest for build success
on architectures not tested by upstream.


And have Format->Character in Impress crash with Bus error like on 
mipsel? That doesn't sound too good for basic quality.


There is a "smoketest" but it does just basic start. open, close stuff. 
Not even basic usage.


That said, that is the smoketest on mipsel:

[build CUT] smoketest
S=/<> && I=$S/instdir && W=$S/workdir &&  mkdir -p 
$W/CppunitTest/ && rm -fr $W/CppunitTest/smoketest.test.user && cp -r 
$W/unittest $W/CppunitTest/smoketest.test.user &&rm -fr 
$W/CppunitTest/smoketest.test.core && mkdir 
$W/CppunitTest/smoketest.test.core && cd 
$W/CppunitTest/smoketest.test.core && (  MAX_CONCURRENCY=4 
MOZILLA_CERTIFICATE_FOLDER=dbm: 
SAL_DISABLE_SYNCHRONOUS_PRINTER_DETECTION=1 SAL_USE_VCLPLUGIN=svp 
LIBO_LANG=C 
LD_LIBRARY_PATH=${LD_LIBRARY_PATH:+$LD_LIBRARY_PATH:}"$I/program:$I/program":$W/UnpackedTarball/cppunit/src/cppunit/.libs 
$W/LinkTarget/Executable/cppunittester 
$W/LinkTarget/CppunitTest/libtest_smoketest.so --headless 
"-env:BRAND_BASE_DIR=file://$S/instdir" "-env:BRAND_SHARE_SUBDIR=share" 
"-env:BRAND_SHARE_RESOURCE_SUBDIR=program/resource" 
"-env:UserInstallation=file://$W/CppunitTest/smoketest.test.user" 
"-env:UNO_TYPES=file://$I/program/types.rdb 
file://$I/program/types/offapi.rdb" 
"-env:UNO_SERVICES=file://$W/Rdb/ure/services.rdb" 
-env:URE_BIN_DIR=file://$I/program 
-env:URE_INTERNAL_LIB_DIR=file://$I/program 
-env:LO_LIB_DIR=file://$I/program 
-env:LO_JAVA_DIR=file://$I/program/classes --protector 
$W/LinkTarget/Library/unoexceptionprotector.so unoexceptionprotector 
--protector $W/LinkTarget/Library/unobootstrapprotector.so 
unobootstrapprotector   -env:arg-soffice=path:$I/program/soffice 
-env:arg-user=$W/CustomTarget/smoketest 
-env:arg-env=LD_LIBRARY_PATH"${LD_LIBRARY_PATH+=$LD_LIBRARY_PATH}" 
-env:arg-testarg.smoketest.doc=$W/Zip/smoketestdoc.sxw 
"-env:CPPUNITTESTTARGET=$W/CppunitTest/smoketest.test"  ) 2>&1

[_RUN_] (anonymous namespace)::Test::test

(process:8700): dconf-CRITICAL **: 02:36:13.575: unable to create 
directory '/run/user/2952/dconf': Permission denied.  dconf will not 
work properly.


(process:8708): dconf-CRITICAL **: 02:36:19.328: unable to create 
directory '/run/user/2952/dconf': Permission denied.  dconf will not 
work properly.


(process:8815): dconf-CRITICAL **: 02:36:52.467: unable to create 
directory '/run/user/2952/dconf': Permission denied.  dconf will not 
work properly.



Fatal exception: Signal 11
Stack:
/<>/instdir/program/libuno_sal.so.3(+0x49b18)[0x77d69b18]
/<>/instdir/program/libuno_sal.so.3(+0x49d48)[0x77d69d48]
/usr/lib/jvm/java-17-openjdk-mipsel/lib/server/libjvm.so(+0x537b8c)[0x62417b8c]
./smoketest/smoketest.cxx:187:(anonymous namespace)::Test::test
assertion failed
- Expression: connection_.isStillAlive()

unknown:0:(anonymous namespace)::Test::test
tearDown() failed
- An uncaught exception of type com.sun.star.lang.DisposedException
- Binary URP bridge already disposed at ./binaryurp/source/bridge.cxx:1048

(anonymous namespace)::Test::test finished in: 76764ms
smoketest.cxx:187:Assertion
Test name: (anonymous namespace)::Test::test
assertion failed
- Expression: connection_.isStillAlive()

##Failure Location unknown## : Error
Test name: (anonymous namespace)::Test::test
tearDown() failed
- An uncaught exception of type com.sun.star.lang.DisposedException
- Binary URP bridge already disposed at ./binaryurp/source/bridge.cxx:1048

Failures !!!
Run: 1   Failure total: 2   Failures: 1   Errors: 1
make[3]: *** [/<>/solenv/gbuild/CppunitTest.mk:121: 
/<>/workdir/CppunitTest/smoketest.test] Error 1


Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-19 Thread Rene Engelhard

Hi,

Am 20.06.23 um 00:03 schrieb Jeffrey Walton:


You can usually uncover them by building the package with CFLAGS=" ...
-fsanitize=undefined ... " and CXXFLAGS=" ... -fsanitize=undefined ...
". The UBsan sanitizer operates on real data. There are no false
positives.


I'd personally assume this isn't UB since upstream builds with UBsan for 
testing (admittedly not on mipsel, though). But once can investigate here...


Regards,

Rene




Re: unbreaking LibreOffices tests on at least release architectures

2023-06-19 Thread Adrian Bunk
On Mon, Jun 19, 2023 at 11:29:34PM +0200, Rene Engelhard wrote:
>...
> Am 19.06.23 um 23:19 schrieb Adrian Bunk:
>...
> > For such a complex package I would expect 32bit breakage in every
> > release if upstream no longer tests on 32bit.
> Indeed, though at least for 32bit *build* issues they keep fixing them if I
> report them.
> > The pragmatic option would be to run only a smoketest for build success
> > on architectures not tested by upstream.
> 
> And have Format->Character in Impress crash with Bus error like on mipsel?
> That doesn't sound too good for basic quality.
> 
> There is a "smoketest" but it does just basic start. open, close stuff. Not
> even basic usage.

Let's be realistic regarding the available options, because the one you 
want is not available.

You want every !a*64 architecture to have a porter spending time on 
fixing libreoffice.

And thinking this through, since regressions in new upstream versions
are expected to be frequent you want new upstream versions of libreoffice
blocked from testing migration by any regression on one architecture
until a porter for this architecture has fixed the regression.

A new architecture like riscv64 might have enough porters for fixing 
issues once or for some limited duration. That's it.

For each architecture you have the options:
1. declare libreoffice good enough on this architecture, or
2. don't build libreoffice on this architecture

There is no third option that architectures will provide porters fixing 
your package all the time.

There are several other packages of comparable complexity, size and 
testsuite (e.g. mozjs* or rustc). For a successful build they are using 
either just a smoketest, or a maximum number of tolerable testsuite 
failures.

> Regards,
> 
> Rene

cu
Adrian



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-19 Thread Jeffrey Walton
On Mon, Jun 19, 2023 at 5:30 PM Rene Engelhard  wrote:
>
> Hi,
>
> Am 19.06.23 um 23:19 schrieb Adrian Bunk:
> > On Sun, Jun 18, 2023 at 09:31:05AM +0200, Rene Engelhard wrote:
> >> ...
> >> I won't be of much help here unfortunately, except
> >> maybe testing patches, but then again there's porterboxes
> >> ...
> > You are the only one who could realistically debug many of these.
> >
> > E.g. on armel it says:
> >Fatal exception: Signal 6
> >Stack:
> >/<>/instdir/program/libuno_sal.so.3(+0x3c2e4)[0xb6ec32e4]
> >/<>/instdir/program/libuno_sal.so.3(+0x3c534)[0xb6ec3534]
> >
> > /lib/arm-linux-gnueabi/libc.so.6(__default_rt_sa_restorer+0x0)[0xb6ad58f0]
> >/lib/arm-linux-gnueabi/libc.so.6(+0x7f47c)[0xb6b1e47c]
> >/lib/arm-linux-gnueabi/libc.so.6(gsignal+0x14)[0xb6ad4360]
> >Aborted (core dumped)
> >
> > Fixing something like this would involve generating a backtrace,
> > and then you are likely the only person in Debian who could tell
> > what is actually going on there.
>
> Not really.
>
> > There are likely also build or debug tricks you know that a porter would
> > not know.
>
> True, I can help with those if needed.
>
> (As I already pointed out for zelenka, though it's basically setting
> some variables in rules)
>
> > Debugging something like this is only feasible with reasonable effort if
> > a porter who knows the port with its caveats debugs it together with a
> > package maintainer who knows the internals of the package.
>
> I didn't say I was not helping, I said I am of no help if it comes to
> actually fix it if it involves architecture knowledge.
>
> [...]
>
> > For such a complex package I would expect 32bit breakage in every
> > release if upstream no longer tests on 32bit.
> Indeed, though at least for 32bit *build* issues they keep fixing them
> if I report them.
> > The pragmatic option would be to run only a smoketest for build success
> > on architectures not tested by upstream.
>
> And have Format->Character in Impress crash with Bus error like on
> mipsel? That doesn't sound too good for basic quality.
>
> There is a "smoketest" but it does just basic start. open, close stuff.
> Not even basic usage.

Related, bus errors are usually due to unaligned data accesses.
Programmers casting from one type to another when when they shouldn't,
like:

typedef unsigned char byte;
...
byte buffer[32];

readBuffer(buffer);
double d = *(double *)buffer;

That is undefined behavior because a byte buffer is a byte buffer, and
it is not a double. That can result in a bus error on some platforms.
You may get lucky and the byte buffer may be aligned for double. Or it
may not be.

In contrast, this would be Ok because the byte buffer is really a double object:

typedef unsigned char byte;
...
double d;
byte* buffer = (bytes*)

readBuffer(buffer);
double dd = *(double *)buffer;

You can usually uncover them by building the package with CFLAGS=" ...
-fsanitize=undefined ... " and CXXFLAGS=" ... -fsanitize=undefined ...
". The UBsan sanitizer operates on real data. There are no false
positives.

You don't need to be a porter to build and run with sanitizers.
However, you do need an arch-specific machine. Or possibly a Debian
chroot.

Jeff



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-19 Thread Adrian Bunk
On Sun, Jun 18, 2023 at 09:31:05AM +0200, Rene Engelhard wrote:
>...
> I won't be of much help here unfortunately, except
> maybe testing patches, but then again there's porterboxes
>...

You are the only one who could realistically debug many of these.

E.g. on armel it says:
  Fatal exception: Signal 6
  Stack:
  /<>/instdir/program/libuno_sal.so.3(+0x3c2e4)[0xb6ec32e4]
  /<>/instdir/program/libuno_sal.so.3(+0x3c534)[0xb6ec3534]
  /lib/arm-linux-gnueabi/libc.so.6(__default_rt_sa_restorer+0x0)[0xb6ad58f0]
  /lib/arm-linux-gnueabi/libc.so.6(+0x7f47c)[0xb6b1e47c]
  /lib/arm-linux-gnueabi/libc.so.6(gsignal+0x14)[0xb6ad4360]
  Aborted (core dumped)

Fixing something like this would involve generating a backtrace,
and then you are likely the only person in Debian who could tell
what is actually going on there.

There are likely also build or debug tricks you know that a porter would 
not know.

Debugging something like this is only feasible with reasonable effort if 
a porter who knows the port with its caveats debugs it together with a
package maintainer who knows the internals of the package.


On Mon, Jun 19, 2023 at 12:04:45AM +0200, Kurt Roeckx wrote:
>...
> Do you think Debian doesn't have any developers/porters anymore?
>...

For porters that's actually close to being true.

There were times when porter numbers for a release architecture were 
numbers like 6 or 9.

No release architecture in bookworm had more than 2 porters.

No porters were required on amd64, the number of distinct people who are 
listed as porter for one or more of the 8 other bookworm release 
architecture is 5 DDs and 2 non-DDs.


On Sun, Jun 18, 2023 at 09:31:05AM +0200, Rene Engelhard wrote:
>...
> For riscv64 I already pointed that out in the thread starting at
> https://lists.debian.org/debian-riscv/2023/06/msg0.html, but for the
> other architectures there is the mail now. riscv64 is different because
> the failures are even more big than any other down below and it's actually a
> new architecture anyway.
>
> Also note I am not talking about the debian-ports architectures. Those I
> forgot and I have no problems making them stay into "testsuite ran but
> results ignored" set.
>
> Right now, the only architectures where the test actually work (ignoring the
> occassional breakage on arm64 which is fixed upstream since they do
> aarch64 flatpak builds) is amd64 and arm64.
>
> With various different 32-bit, endian and whatever else breakage
> ppopping up the other architectures constantly were moved in the set
> where the testsuite was run but the results were ignored. For s390x,
> where the macros tests hangs it even was in the set where the tests even
> were not ran, since a hang then also ends up in
> "E: Build killed with signal TERM after 150 minutes of inactivity".
>
> This was sweeping under the carpet for sure, but this was needed due to
> it being a release architecture :(
>...

For such a complex package I would expect 32bit breakage in every 
release if upstream no longer tests on 32bit.

The pragmatic option would be to run only a smoketest for build success 
on architectures not tested by upstream.


cu
Adrian



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-19 Thread Rene Engelhard

Hi,

Am 19.06.23 um 23:19 schrieb Adrian Bunk:

On Sun, Jun 18, 2023 at 09:31:05AM +0200, Rene Engelhard wrote:

...
I won't be of much help here unfortunately, except
maybe testing patches, but then again there's porterboxes
...

You are the only one who could realistically debug many of these.

E.g. on armel it says:
   Fatal exception: Signal 6
   Stack:
   /<>/instdir/program/libuno_sal.so.3(+0x3c2e4)[0xb6ec32e4]
   /<>/instdir/program/libuno_sal.so.3(+0x3c534)[0xb6ec3534]
   /lib/arm-linux-gnueabi/libc.so.6(__default_rt_sa_restorer+0x0)[0xb6ad58f0]
   /lib/arm-linux-gnueabi/libc.so.6(+0x7f47c)[0xb6b1e47c]
   /lib/arm-linux-gnueabi/libc.so.6(gsignal+0x14)[0xb6ad4360]
   Aborted (core dumped)

Fixing something like this would involve generating a backtrace,
and then you are likely the only person in Debian who could tell
what is actually going on there.


Not really.


There are likely also build or debug tricks you know that a porter would
not know.


True, I can help with those if needed.

(As I already pointed out for zelenka, though it's basically setting 
some variables in rules)



Debugging something like this is only feasible with reasonable effort if
a porter who knows the port with its caveats debugs it together with a
package maintainer who knows the internals of the package.


I didn't say I was not helping, I said I am of no help if it comes to 
actually fix it if it involves architecture knowledge.


[...]


For such a complex package I would expect 32bit breakage in every
release if upstream no longer tests on 32bit.
Indeed, though at least for 32bit *build* issues they keep fixing them 
if I report them.

The pragmatic option would be to run only a smoketest for build success
on architectures not tested by upstream.


And have Format->Character in Impress crash with Bus error like on 
mipsel? That doesn't sound too good for basic quality.


There is a "smoketest" but it does just basic start. open, close stuff. 
Not even basic usage.



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Jan Engelhardt
On Sunday 2023-06-18 23:37, Rob Landley wrote:

>On 6/18/23 14:58, Rene Engelhard wrote:
>>> Three years ago Samba maintainer Jeremy Allison lamented that "Both GPLv3 
>>> and
>>> the AGPL have been rejected soundly by most developers" and talked about 
>>> how he
>>> regretted the move and the damage it had done to the project,
>>> https://archive.org/details/copyleftconf2020-allison
>> 
>> Can we please talk about the actual issue at and - that is not the license.
>
>The issue is the number of developers engaging with this package have declined
>to the point problems have gone unnoticed and unfixed for a long time.

That may be a general problem not specific to Libreoffice, or any
one particular project.

As software grows to accomodate more features, it reaches a size
where it is "good enough" for users that they no longer feel a need
to invest time anymore as their needs are already satisfied, while at
the same time, it has become so large for others to not want to touch
it anymore.

Chromium sucks to touch. On the other hand, the Linux kernel has
evermore developers each round, and Linux distros have more packages
than ever before. So not all seems to be bad? Modularization seems
key, and that may just be what separates projects.



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Rob Landley
On 6/18/23 15:19, Rene Engelhard wrote:
> Besides that it would also have been clear from actually reading the IRC 
> log which incidentially also says

Good to know what the expectations for participation are.

>> This is the same GPLv3 package that Red Hat just dropped support for?
> 
> As I said in my other reply,  even if it was GPLv3 it wouldn't be 
> relevant at all.
> 
> LibreOffice is not GPLv3 though and never was.

I paid close attention to the project's launch back in the day.

Back when LibreOffice forked away Oratroll's acquisition of Sun in 2010, they
used (L)GPLv3 to prevent OpenOffice from merging their changes. Then OpenOffice
got unloaded on apache.org after the fact, and it all got weirdly political.
Then Google bought Writely and did google docs which could edit and save a word
file which scooped up most of the userbase, and LibreOffice decided it should
also run in a web browser...

https://lwn.net/Articles/637830/

I know they regretted their GPLv3 stance early on, and were talking about NEW
code being in a different license:

https://lwn.net/Articles/498898/

But last I'd heard, while Apache's version had audited to relicense LibreOffice
had not yet done a full audit:

https://lwn.net/Articles/927096/

*shrug* I acknowledge I'm out of date here. If you say they're not v3 anymore,
good for them. Seems I'm not the only one who hadn't heard about it, though.
The last couple cubicle farms I consulted at still had LibreOffice on their "not
allowed" lists, but the most recent of those was 2021 so that's old news.

I only spoke up on the perception you were advocating for the removal of
architectures I care about. Glad to hear that's not the case. Back to lurking...

Rob



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Kurt Roeckx



On June 18, 2023 11:37:55 PM GMT+02:00, Rob Landley  wrote:
>On 6/18/23 14:58, Rene Engelhard wrote:
>>> Three years ago Samba maintainer Jeremy Allison lamented that "Both GPLv3 
>>> and
>>> the AGPL have been rejected soundly by most developers" and talked about 
>>> how he
>>> regretted the move and the damage it had done to the project,
>>> https://archive.org/details/copyleftconf2020-allison
>> 
>> Can we please talk about the actual issue at and - that is not the license.
>
>The issue is the number of developers engaging with this package have declined
>to the point problems have gone unnoticed and unfixed for a long time.
>
>>> How long has the problem you're treating as a crisis been brewing?
>> 
>> Far too long, as I said it was swept under


I have a hard time understanding what you're trying to say. Do you think Debian 
doesn't have any developers/porters anymore? Or maybe that they're not actually 
using it for a desktop, and so the package isn't actually useful to anybody?


Kurt



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Rob Landley
On 6/18/23 14:58, Rene Engelhard wrote:
>> Three years ago Samba maintainer Jeremy Allison lamented that "Both GPLv3 and
>> the AGPL have been rejected soundly by most developers" and talked about how 
>> he
>> regretted the move and the damage it had done to the project,
>> https://archive.org/details/copyleftconf2020-allison
> 
> Can we please talk about the actual issue at and - that is not the license.

The issue is the number of developers engaging with this package have declined
to the point problems have gone unnoticed and unfixed for a long time.

>> How long has the problem you're treating as a crisis been brewing?
> 
> Far too long, as I said it was swept under the carpet for too long.

Because the developers went away.

Rob



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Rene Engelhard

Hi again,

some more comments.

Am 18.06.23 um 21:28 schrieb Rob Landley:
No, that's how I read it too. You said getting the _architectures_ 
removed, not

getting libreoffice removed from those architectures.


That is hilarious. The subject says we are talking about LibreOffice 
here, not generally about Debian.


I might have written architectures, but from the context it should have 
been clear. Anyway, I corrected it.



Of course I mean "getting those architectures removed from unstable"
*for libreoffice*.


here.

Besides that it would also have been clear from actually reading the IRC 
log which incidentially also says


"17:24 < elbrus> if I were you, I'd make them fatal everywhere and ask
for removal from architectures where reasonable tests fail
17:25 < elbrus> extreme case you only ship on amd64 and arm64"


(libreoffice) *removal from architectures*


This is the same GPLv3 package that Red Hat just dropped support for?


As I said in my other reply,  even if it was GPLv3 it wouldn't be 
relevant at all.


LibreOffice is not GPLv3 though and never was.



How long has the problem you're treating as a crisis been brewing?


Basically ever since people ported, the tests back then pass and then 
new tests broke and noone seriously cared until me as not-porter needed 
to sweep it under the carpet eo get it "ready" for release (because it 
otherwise was supposed to be removed).


Or since people added a new arch in LibreOffice but didn't dare of 
finishing it so that even the important tests pass.



Even if it works now, who says that with ignored tests something 
fundamental breaks (like python thingies in riscv64, which is a integral 
part of many LO things). Or some basic functionality? Causing a RC bug 
which is unfixable for me.



Replying with something completely unrelated doesn't help here. No idea 
why you bring up GPLv3 or RH stopping support for it (which is bad for 
this case, though, since at least they did fix some tests on s390x etc., 
but we actually do have porters, too) here on a mail which just aims at 
porting LibreOffice / making it actually pass its tests to improve quality.



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Rene Engelhard

Hi,

Am 18.06.23 um 21:28 schrieb Rob Landley:

Of course I mean "getting those architectures removed from unstable"

*for libreoffice*.

This is the same GPLv3 package that Red Hat just dropped support for?

GPLv3 doesn't have anything to do with this here.

https://lwn.net/Articles/933525/

Indeed.

When gcc switched to GPLv3 llvm appeared. When Samba switched to GPLv3 Apple
wrote their own and Linux grew the ksmbd in-kernel server.

Three years ago Samba maintainer Jeremy Allison lamented that "Both GPLv3 and
the AGPL have been rejected soundly by most developers" and talked about how he
regretted the move and the damage it had done to the project,
https://archive.org/details/copyleftconf2020-allison


Can we please talk about the actual issue at and - that is not the license.


That is the tests being broken on anything except amd64 and arm64.


How long has the problem you're treating as a crisis been brewing?


Far too long, as I said it was swept under the carpet for too long.


Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Rob Landley
On 6/18/23 03:45, Rene Engelhard wrote:> Am 18.06.23 um 10:32 schrieb Rene
Engelhard:
 I don't really like sweeping it under the carpet again and would
 actually pursue the "getting those architectures removed from unstable"
 way pointed out and (implicitely) approved/suggested by the release 
 team...
>>> You want Debian to drop support for all architectures except amd64 and 
>>> arm64
>>> because a single package doesn't pass its testsuite on the other 
>>> architectures?
>> 
>> If the "porters" of those architectures don't care about the tests, yes, 
>> this would be the ultimate result.
>> 
>> And as the release team agrees with me...
> 
> Well, actually I was too tired still. But  the tone from my initial mail 
> was quite clear. I know you WANT to misread that and I fell into that trap

No, that's how I read it too. You said getting the _architectures_ removed, not
getting libreoffice removed from those architectures.

> Of course I mean "getting those architectures removed from unstable" 
> *for libreoffice*.

This is the same GPLv3 package that Red Hat just dropped support for?

https://lwn.net/Articles/933525/

When gcc switched to GPLv3 llvm appeared. When Samba switched to GPLv3 Apple
wrote their own and Linux grew the ksmbd in-kernel server.

Three years ago Samba maintainer Jeremy Allison lamented that "Both GPLv3 and
the AGPL have been rejected soundly by most developers" and talked about how he
regretted the move and the damage it had done to the project,
https://archive.org/details/copyleftconf2020-allison

How long has the problem you're treating as a crisis been brewing?

Rob



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Omer Turpault



> Le 18 juin 2023 à 13:37, Steve McIntyre  a écrit :
> 
> On Sun, Jun 18, 2023 at 10:32:55AM +0200, Rene Engelhard wrote:
>> Hi,
>> 
>>> Am 18.06.23 um 10:19 schrieb John Paul Adrian Glaubitz:
>>> On Sun, 2023-06-18 at 09:31 +0200, Rene Engelhard wrote:
 Also note I am not talking about the debian-ports architectures. Those I
 forgot and I have no problems making them stay into "testsuite ran but
 results ignored" set.
>>> Why did you send this mail exclusively to debian-ports then?
>> 
>> I (obviously) wrongly assumed  that this was the magic address which
>> duplicates to every port.
>> 
>> Must have misremembered.
> 
> It still does - I got this copy via the debian-arm list...
> 
> -- 
> Steve McIntyre, Cambridge, UK.st...@einval.com
> "This dress doesn't reverse." -- Alden Spiess
> 
Same for me, I received it through the Debian-ppc list

-someone


Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Steve McIntyre
On Sun, Jun 18, 2023 at 10:32:55AM +0200, Rene Engelhard wrote:
>Hi,
>
>Am 18.06.23 um 10:19 schrieb John Paul Adrian Glaubitz:
>> On Sun, 2023-06-18 at 09:31 +0200, Rene Engelhard wrote:
>> > Also note I am not talking about the debian-ports architectures. Those I
>> > forgot and I have no problems making them stay into "testsuite ran but
>> > results ignored" set.
>> Why did you send this mail exclusively to debian-ports then?
>
>I (obviously) wrongly assumed  that this was the magic address which
>duplicates to every port.
>
>Must have misremembered.

It still does - I got this copy via the debian-arm list...

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"This dress doesn't reverse." -- Alden Spiess



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Rene Engelhard

Hi again.

Am 18.06.23 um 10:32 schrieb Rene Engelhard:

I don't really like sweeping it under the carpet again and would
actually pursue the "getting those architectures removed from unstable"
way pointed out and (implicitely) approved/suggested by the release 
team...
You want Debian to drop support for all architectures except amd64 and 
arm64
because a single package doesn't pass its testsuite on the other 
architectures?


If the "porters" of those architectures don't care about the tests, yes, 
this would be the ultimate result.


And as the release team agrees with me...


Well, actually I was too tired still. But  the tone from my initial mail 
was quite clear. I know you WANT to misread that and I fell into that trap


Of course I mean "getting those architectures removed from unstable" 
*for libreoffice*. (which again should be obvious), not removing those 
architectures from unstable alltogether.



Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread Rene Engelhard

Hi,

Am 18.06.23 um 10:19 schrieb John Paul Adrian Glaubitz:

On Sun, 2023-06-18 at 09:31 +0200, Rene Engelhard wrote:

Also note I am not talking about the debian-ports architectures. Those I
forgot and I have no problems making them stay into "testsuite ran but
results ignored" set.

Why did you send this mail exclusively to debian-ports then?


I (obviously) wrongly assumed  that this was the magic address which 
duplicates to every port.


Must have misremembered.


Right now, the only architectures where the test actually work (ignoring
the occassional breakage on arm64 which is fixed upstream since they do
aarch64 flatpak builds) is amd64 and arm64.
(...)
I don't really like sweeping it under the carpet again and would
actually pursue the "getting those architectures removed from unstable"
way pointed out and (implicitely) approved/suggested by the release team...

You want Debian to drop support for all architectures except amd64 and arm64
because a single package doesn't pass its testsuite on the other architectures?


If the "porters" of those architectures don't care about the tests, yes, 
this would be the ultimate result.


And as the release team agrees with me...


Regards,


Rene



Re: unbreaking LibreOffices tests on at least release architectures

2023-06-18 Thread John Paul Adrian Glaubitz
Hello!

On Sun, 2023-06-18 at 09:31 +0200, Rene Engelhard wrote:
> Also note I am not talking about the debian-ports architectures. Those I
> forgot and I have no problems making them stay into "testsuite ran but
> results ignored" set.

Why did you send this mail exclusively to debian-ports then?

> Right now, the only architectures where the test actually work (ignoring 
> the occassional breakage on arm64 which is fixed upstream since they do
> aarch64 flatpak builds) is amd64 and arm64.
> (...)
> I don't really like sweeping it under the carpet again and would 
> actually pursue the "getting those architectures removed from unstable" 
> way pointed out and (implicitely) approved/suggested by the release team...

You want Debian to drop support for all architectures except amd64 and arm64
because a single package doesn't pass its testsuite on the other architectures?

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913



Re: numpy - scipy circular build requires makes both packages unbuildable on ia64 and x32

2023-01-30 Thread John Paul Adrian Glaubitz
Hi Mattias!

On Mon, 2023-01-30 at 17:21 +0100, Mattias Ellert wrote:
> Dependency installability problem for numpy on ia64:
> 
> numpy build-depends on:
> - python3-scipy:ia64
> python3-scipy depends on missing:
> - python3:ia64 (< 3.11)
> 
> Dependency installability problem for numpy on x32:
> 
> numpy build-depends on:
> - python3-scipy:x32
> python3-scipy depends on missing:
> - python3:x32 (< 3.11)
> (...)
> Can something be done about this?

I just built and uploaded numpy for x32 manually, I will do that for
ia64 later, as the porterbox is currently offline (should be back up
shortly).

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913



Re: enabling link time optimizations in package builds

2022-07-01 Thread Timo Röhling

Hi Matthias,

* Matthias Klose  [2022-06-17 10:18]:
The proposal is to turn on LTO by default on most 64bit release 
architectures. Not proposing to do this on 32bit architectures because 
of the limited address space at link time, and up to now nobody tested 
LTO on 32bit archs.  In test rebuilds, there were 373 packages 
(dd-list in the wiki page) found not to build with link time 
optimizations for various reasons.  These range from easily fixable 
issues in symbols files to some upstream issues.  The idea is to fix 
as many of these as possible, and then change the packaging for the 
others to just turn off LTO in the package build.


In one of my packages, turning on LTO did not fail the build, but
exposed a dormant static initialization bug, as LTO apparently
messes with the initialization order [1]. I'd expect more bugs of
this kind to come up once LTO is enabled by default.

Cheers
Timo

[1] https://github.com/isl-org/Open3D/issues/4747

--
⢀⣴⠾⠻⢶⣦⠀   ╭╮
⣾⠁⢠⠒⠀⣿⡁   │ Timo Röhling   │
⢿⡄⠘⠷⠚⠋⠀   │ 9B03 EBB9 8300 DF97 C2B1  23BF CC8C 6BDD 1403 F4CA │
⠈⠳⣄   ╰╯


signature.asc
Description: PGP signature


Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-17 Thread Lennart Sorensen
On Fri, Apr 15, 2022 at 09:07:10AM +0200, Elmar Stellnberger wrote:
>   That is not correct. You can make use of SSE instructions also in
> x86_32/i386 mode.
> 
> I found f.i.:
> https://gcc.gcc.gnu.narkive.com/k0KqaZF2/i386-sse-test-question

Well x86_64 uses it all the time, not just optionally, and twice the
registers still matters.

-- 
Len Sorensen



Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-15 Thread Hendrik Boom
On Fri, Apr 15, 2022 at 10:18:17AM -0400, Hendrik Boom wrote:
...
...
> 
> And i you're runnin Lisp programs, you'll definitely want a 32-bit 
> architecture, because Lisp fills memory with addresses.  But you can do that 
> with add-architecture i286.

Typo:  Of course I meant i386.

> 
> -- hendrik
> 



Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-15 Thread Hendrik Boom
On Fri, Apr 15, 2022 at 10:12:23AM +0200, Elmar Stellnberger wrote:
> On 14.04.22 15:45, Levis Yarema wrote:
> > Is there in deed any reason to prefer amd64 over i586 if you have the
> > choice and a machine with 2GB RAM or less, apart from perhaps long term
> > support?
> > 
> 
>   Depends on the application. Encryption and decryption
> requiring the simulation of very larger integers shall be faster
> when being based on 64bit integers. However these are rather
> special purposes.
>   CPU and memory intense applications like the SAT-solver I am
> developing on the other hand will be faster on i386 since a
> memory reference/ pointer only requires 4 byte instead of 8
> byte. Smaller size will yield less memory access cycles and more
> cache hits and that can make an application considerably faster.
> It is the cache that is effectively more important than the
> register layout. Some SAT-solvers like f.i. the DNNF-c2d are
> only available for Linux/i386, not for amd64.
>   Concerning general purpose applications normal integers keep
> to be 32bit even on amd64. Note the sizeof(int). This is also
> for the rationale described above. x86_32 programs can even be
> smaller on disk and in memory. I personally don´t think that
> there is much reason to use amd64 with 2GB ram or less, except
> for bigint calculations.
>   Note however that with a 64bit kernel you can execute programs
> in a 64bit and 32bit chroot while this is impossible with a
> 32bit kernel. This is a reason why many people boot with a 64bit
> kernel but use a 32bit installation. As for certain CPU and
> memory intense programs you can run them as i386 binary even on
> an x86_64 root given that i386 system libararies are installed
> which is possible with dpkg --add-architecture i386.
> 

And i you're runnin Lisp programs, you'll definitely want a 32-bit 
architecture, because Lisp fills memory with addresses.  But you can do that 
with add-architecture i286.

-- hendrik



Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-15 Thread Elmar Stellnberger

On 14.04.22 15:45, Levis Yarema wrote:

Is there in deed any reason to prefer amd64 over i586 if you have the
choice and a machine with 2GB RAM or less, apart from perhaps long term
support?



  Depends on the application. Encryption and decryption
requiring the simulation of very larger integers shall be faster
when being based on 64bit integers. However these are rather
special purposes.
  CPU and memory intense applications like the SAT-solver I am
developing on the other hand will be faster on i386 since a
memory reference/ pointer only requires 4 byte instead of 8
byte. Smaller size will yield less memory access cycles and more
cache hits and that can make an application considerably faster.
It is the cache that is effectively more important than the
register layout. Some SAT-solvers like f.i. the DNNF-c2d are
only available for Linux/i386, not for amd64.
  Concerning general purpose applications normal integers keep
to be 32bit even on amd64. Note the sizeof(int). This is also
for the rationale described above. x86_32 programs can even be
smaller on disk and in memory. I personally don´t think that
there is much reason to use amd64 with 2GB ram or less, except
for bigint calculations.
  Note however that with a 64bit kernel you can execute programs
in a 64bit and 32bit chroot while this is impossible with a
32bit kernel. This is a reason why many people boot with a 64bit
kernel but use a 32bit installation. As for certain CPU and
memory intense programs you can run them as i386 binary even on
an x86_64 root given that i386 system libararies are installed
which is possible with dpkg --add-architecture i386.



Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-15 Thread Elmar Stellnberger

On 15.04.22 04:50, Lennart Sorensen wrote:

On Thu, Apr 14, 2022 at 03:45:37PM +0200, Levis Yarema wrote:

Is there in deed any reason to prefer amd64 over i586 if you have the
choice and a machine with 2GB RAM or less, apart from perhaps long term
support?


Twice the registers and sse instructions for fpu rather than x87?



  That is not correct. You can make use of SSE instructions also in 
x86_32/i386 mode.


I found f.i.:
https://gcc.gcc.gnu.narkive.com/k0KqaZF2/i386-sse-test-question



Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-14 Thread Lennart Sorensen
On Thu, Apr 14, 2022 at 03:45:37PM +0200, Levis Yarema wrote:
> Is there in deed any reason to prefer amd64 over i586 if you have the
> choice and a machine with 2GB RAM or less, apart from perhaps long term
> support?

Twice the registers and sse instructions for fpu rather than x87?

-- 
Len Sorensen



Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-14 Thread Levis Yarema
Is there in deed any reason to prefer amd64 over i586 if you have the
choice and a machine with 2GB RAM or less, apart from perhaps long term
support?

Am Do., 14. Apr. 2022 um 10:38 Uhr schrieb Paul Wise :

> On Tue, 2022-04-12 at 05:59 +0200, Friedhelm Waitzmann wrote:
>
> > And if it is indeed possible, how can I switch from i386 to
> > amd64?  Can this be done with the apt tools?  Then during the
> > migrating some packages will be from amd64 already while others
> > will be still i386.  How does that go right?
>
> If your hardware supports it, you can either reinstall from scratch or
> cross-grade an existing install from i386 to amd64, either using the
> crossgrader tool or more manual methods of doing the same thing.
>
> https://packages.debian.org/crossgrader
> https://wiki.debian.org/CrossGrading
>
> --
> bye,
> pabs
>
> https://wiki.debian.org/PaulWise
>


Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-14 Thread Elmar Stellnberger

On 14.04.22 10:37, Paul Wise wrote:

On Tue, 2022-04-12 at 05:59 +0200, Friedhelm Waitzmann wrote:


And if it is indeed possible, how can I switch from i386 to
amd64?  Can this be done with the apt tools?  Then during the
migrating some packages will be from amd64 already while others
will be still i386.  How does that go right?


If your hardware supports it, you can either reinstall from scratch or
cross-grade an existing install from i386 to amd64, either using the
crossgrader tool or more manual methods of doing the same thing.

https://packages.debian.org/crossgrader
https://wiki.debian.org/CrossGrading



  If I had to do it, I would just upgrade to Debian 11. It is most easy 
 to do and you do not need things like a crossgrader tool. Though the 
procedure seems somewhat difficult to me, it is interesting to know that 
something like crossgrading exists and where you find documentation 
about it.




Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-14 Thread Paul Wise
On Tue, 2022-04-12 at 05:59 +0200, Friedhelm Waitzmann wrote:

> And if it is indeed possible, how can I switch from i386 to 
> amd64?  Can this be done with the apt tools?  Then during the 
> migrating some packages will be from amd64 already while others 
> will be still i386.  How does that go right?

If your hardware supports it, you can either reinstall from scratch or
cross-grade an existing install from i386 to amd64, either using the
crossgrader tool or more manual methods of doing the same thing.

https://packages.debian.org/crossgrader
https://wiki.debian.org/CrossGrading

-- 
bye,
pabs

https://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-13 Thread Jeffrey Walton
On Wed, Apr 13, 2022 at 1:22 PM Marianne Bayoy  wrote:
>
> Unsubscribe

https://www.debian.org/MailingLists/unsubscribe



Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-13 Thread Marianne Bayoy
Unsubscribe

Le mar. 12 avr. 2022, 12 h 27 a.m., Friedhelm Waitzmann <
fach220408.fw...@xoxy.net> a écrit :

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Dear Moritz!
>
> Moritz Mühlenhoff:
> >Friedhelm Waitzmann wrote:
> >>> For the oldstable distribution (buster), these problems have
> >>> been fixed in version 91.8.0esr-1~deb10u1.
> >>
> >>  Where can I get this from for buster and architecture i386?
> >> <
> http://security.debian.org/debian-security/dists/buster/updates/main/binary-i386/Packages.xz
> >
> >>  does not have it.
>
> >The Firefox ESR91 series triggers an internal compiler error
> >with the GCC version included in Debian 10, so there's no build
> >available currently.
>
> Thank you for defining this.
>
>
> >There's one for Debian 11 (where GCC builds it correctly),
> >
>
> In the near future I will migrate to Debian 11.
>
>
> >but I'd instead suggest to switch to amd64 instead.
> >
>
> You mean, that it is possible to run amd64 on my old hardware
>
>
> 1#
>
> vendor_id   : GenuineIntel
> cpu family  : 6
> model   : 22
> model name  : Intel(R) Celeron(R) CPU  440  @ 2.00GHz
> stepping: 1
> microcode   : 0x43
> cpu MHz : 1229.629
> cache size  : 512 KB
>
> and
>
> 2#
>
> vendor_id   : GenuineIntel
> cpu family  : 15
> model   : 2
> model name  : Intel(R) Pentium(R) 4 CPU 2.00GHz
> stepping: 4
> cpu MHz : 1993.656
> cache size  : 512 KB
>
> ?
>
> And if it is indeed possible, how can I switch from i386 to
> amd64?  Can this be done with the apt tools?  Then during the
> migrating some packages will be from amd64 already while others
> will be still i386.  How does that go right?
>
>
>
> I suggest, that further discussing should take place in
> debian-amd64@lists.debian.org.
>
>
>
> Kind regards,
> Friedhelm
>
>
> My OpenPGP‐Key:
>
> - -BEGIN PGP PUBLIC KEY BLOCK-
>
> mQENBFoCvhgBCADnymmMgAzxsUqP9GPSK+QJATL4w/C8KS7ghUdu7TT4mdEfMfgI
> BteRnqWJvLzlBFlQRBEXQphxfgtAdTAZDdAlcyXkcA19Sb0Z09/oQgPe4vp99Cnp
> kq2GPOxSk6YQrfs4FF6p4lsQUz0TKONSztZGo4VSyT1G+LpsSxm7Q1YUzpO4j5fy
> XfPMB/TdhpJbKlE4yVldwVdt4+Gc8oTeohVkZZtVx9bplmaVLaj35HrRTupj75IS
> tooF5dTVLQVhQYKqDCd2DKiZiUuKt6K9ZtrpmjnWaWRayKmJdJ14R8/Q7VfSyXOx
> fLb4DNDz4FNUPOvHdXYjhsTz1U6v1kaddMXdABEBAAG0E0ZyaWVkaGVsbSBXYWl0
> em1hbm6JAWAEEwEKAEoCGwECHgECF4ALCw0JCgwICwcEAwIIFQoJCAsDAgEFFgMC
> AQACGQEFCQuP3SgWIQRGyPH+W3hgUPhyflPQtV81ksAM7QUCYbLp7wAKCRDQtV81
> ksAM7cr5B/wO1khGTl3dAh46DY2jxe3jTfPvicbQgZQVwOhhP2FPKIFC8dYVCEHk
> oYQapW47YXufw/Qw71GILfMtZemiUJpHwa/thCPtP3clE53ZqsEdArHDX2ZYm3Ol
> qDTxMuilQCDfGuatg6MVQ8SlUbhcGIGyr4O4cPeDe0kmUOQhp8wKTXkmhq3Yml5+
> 2XRu69TZUNsQh3TPi50hR+RB0YjI+KTBKYSanAYM44Bj6mti6+06UkRVMaFxLVzS
> BAEyTf/SBaKkJq4cKe+gCzcc/Gg8jrxKVcQRPdUxOlvWUiYT5FYRaFuklgDW4B+g
> 23FdO6RkE0Z+g/oLeAYSqj/JMfjv77bFtBlmYWNoMjIwNDA4LmZ3bnNwQHhveHku
> bmV0iQFdBBMBCgBHFiEERsjx/lt4YFD4cn5T0LVfNZLADO0FAmJQFg8CGwEFCQuP
> 3SgLCw0JCgwICwcEAwIIFQoJCAsDAgEFFgMCAQACHgECF4AACgkQ0LVfNZLADO2V
> ygf9HQWjolhnGRNWG5845lh2uTrm/5q19+hKwnQHx7HApZia09kXp7QpxTCmSmnq
> skWto08U/iT1sPqFTOojOZAM6e4zr7kz/VJksJx8lswUkTRyGXqGEQoQ7bZvd6XR
> Yu0ZKfNNZhvjfPzzwyp+85lWWIaNA0cQyIa6BRzlNhgCbyLhksy4GDkzoBPxhNOp
> mboohSVOnLjrUbQpfKCDJtAaNps95+4gv2t8JPtyFcZW9qKWFRIdJJvamc3lp4Il
> JwzXRElB1htSHQb4SA2VN9M6ALdnfZXXT+H8UKKek+joE8Xm15FX83E5pmrE/8lp
> imVg0s0BAUd0DxVj6zj4SI9yhrkBDQRaAsK/AQgAyBEE1hjgZ6F33GPSkfxsFqsN
> L5lQrRTQtx5GKPt5UnIKK00TAevGoI8VDftuP6Fpp9kFJ+HSAiW3M+8S70H3UnbW
> 8AFofSd28AUvnnhP4ATwRcVm35+HYUge4lKiy5bEvDS9bALJqlW9sHBUF+gebrmh
> 0CgvD0sQSUE4PLAuHFUJG8/fezReXGB2MSVAbu8NXHdlJ6vPr5ERlg7A0JFR9Knx
> s8PoI/1hd73mwGld9/Xo3xByDbJ7Uejjt3HpNZf9eOq3XPp02dpKsOQEB2QxxPHI
> TcBH8IBZY78BJHq9UD4g3fD904oIvs38BzvX/WAMO9W0k1ZLfF1zyR0+QXQweQAR
> AQABiQJEBBgBAgAPAhsCBQJcRWq9BQkU+H0OASnAXSAEGQECAAYFAloCwr8ACgkQ
> gEIvCiHZTet1zwf/TUmPpwnBgoA6AXILI5R/NvZit30mbExa6byBOK9vEbGS8pSu
> L/GN5tzTmyJoGbLNc24h8w6FwcoxE0xJSUJKp7nO95NWD/kO5n8alJZN9ph8I2yt
> Cl3dhzZKw8+j+WBwTrKLdDP5lfarI0gz6+N1UtFH4U+tUCq56DQqu46xyTS5ASeM
> iO/8Ykej9LiObZv9QYwnKkhM8y+Dw9dkPfIsqt47uE4j4czpJ4qv8236oV/luR44
> 8cCud5G7ZGxBj6DSnitZM2lbq5yTlIZ3EEvu/I9dE/vsPaWQmGeo6S03FJ8+S6Xn
> eP8mgYWl9YGJTjDvUg3FU9fXfHzCuFtZ/1YZvAkQ0LVfNZLADO2zEggAi3myJcVA
> yiftlZSkTrId9LNeQtXCw7tkJcuaGIC/FWJQhVofcp2CuEAm26w9xRN39Tp7pi2r
> fta/xykj0iYNjmqgi7MWK6pZOY/LCTEOMfYiWX4LCJ89f51y2TTmWwgfWXxFVe8y
> lyRMC1N2CXEd5xsEKA1ZI5vF3ikjVkMBAtLGiSxcyBi8YbcDFG4/fTBNpeEvXZ6n
> CusDDYCArwFiQi4mRtDbZXBZIBVE+jwYlzw0bz3EeqkPFMJ/pvuWeQ5R9LSuVYhh
> aVieqoLXmK6uwQLoJOFx67KX+BoEPpkVa/FmDhfpguQrKz5/Eq1Lhy8P28EAhLSG
> Ar1XuxedRos/pLkBDQRaAsFpAQgAm4sZiVbFI6YpR3yDFpe7qOkkWmlk+7MT8cAa
> j5Ltm+mXqf7ZHDNeX9mzMNBZeoUBCztp0n/N0Iu5T7MmEJV/rrJa0N8ezjY9kDTX
> xUmLRmXTM/AM7Jg6dsIOf/lrd2TAagUkf/nYS9Sxx7/MvWESis3uYw8aqpuXjS0t
> FgaG3umvTfvgI2SamuZTkdt9KmoqKCFcf5qjNk7PeY0REVYUp0/mfyPDo7s33yOm
> P0x9wy6zeZ4OKAsSETvARj8WafUT7vikVuZEtfiLolT741y2VtvyBICooLsVZ6Pf
> MMle4newVhbZeJAjUTdxoE4T+B1vMICsbNw2/zsYtM/9KKvWpwARAQABiQElBBgB
> 

Re: amd64 running on Intel Celeron and Pentium? (was: [SECURITY] [DSA 5113-1] firefox-esr security update)

2022-04-13 Thread Paul Daniel
unsubscribe

On Tue, Apr 12, 2022 at 12:27 AM Friedhelm Waitzmann <
fach220408.fw...@xoxy.net> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Dear Moritz!
>
> Moritz Mühlenhoff:
> >Friedhelm Waitzmann wrote:
> >>> For the oldstable distribution (buster), these problems have
> >>> been fixed in version 91.8.0esr-1~deb10u1.
> >>
> >>  Where can I get this from for buster and architecture i386?
> >> <
> http://security.debian.org/debian-security/dists/buster/updates/main/binary-i386/Packages.xz
> >
> >>  does not have it.
>
> >The Firefox ESR91 series triggers an internal compiler error
> >with the GCC version included in Debian 10, so there's no build
> >available currently.
>
> Thank you for defining this.
>
>
> >There's one for Debian 11 (where GCC builds it correctly),
> >
>
> In the near future I will migrate to Debian 11.
>
>
> >but I'd instead suggest to switch to amd64 instead.
> >
>
> You mean, that it is possible to run amd64 on my old hardware
>
>
> 1#
>
> vendor_id   : GenuineIntel
> cpu family  : 6
> model   : 22
> model name  : Intel(R) Celeron(R) CPU  440  @ 2.00GHz
> stepping: 1
> microcode   : 0x43
> cpu MHz : 1229.629
> cache size  : 512 KB
>
> and
>
> 2#
>
> vendor_id   : GenuineIntel
> cpu family  : 15
> model   : 2
> model name  : Intel(R) Pentium(R) 4 CPU 2.00GHz
> stepping: 4
> cpu MHz : 1993.656
> cache size  : 512 KB
>
> ?
>
> And if it is indeed possible, how can I switch from i386 to
> amd64?  Can this be done with the apt tools?  Then during the
> migrating some packages will be from amd64 already while others
> will be still i386.  How does that go right?
>
>
>
> I suggest, that further discussing should take place in
> debian-amd64@lists.debian.org.
>
>
>
> Kind regards,
> Friedhelm
>
>
> My OpenPGP‐Key:
>
> - -BEGIN PGP PUBLIC KEY BLOCK-
>
> mQENBFoCvhgBCADnymmMgAzxsUqP9GPSK+QJATL4w/C8KS7ghUdu7TT4mdEfMfgI
> BteRnqWJvLzlBFlQRBEXQphxfgtAdTAZDdAlcyXkcA19Sb0Z09/oQgPe4vp99Cnp
> kq2GPOxSk6YQrfs4FF6p4lsQUz0TKONSztZGo4VSyT1G+LpsSxm7Q1YUzpO4j5fy
> XfPMB/TdhpJbKlE4yVldwVdt4+Gc8oTeohVkZZtVx9bplmaVLaj35HrRTupj75IS
> tooF5dTVLQVhQYKqDCd2DKiZiUuKt6K9ZtrpmjnWaWRayKmJdJ14R8/Q7VfSyXOx
> fLb4DNDz4FNUPOvHdXYjhsTz1U6v1kaddMXdABEBAAG0E0ZyaWVkaGVsbSBXYWl0
> em1hbm6JAWAEEwEKAEoCGwECHgECF4ALCw0JCgwICwcEAwIIFQoJCAsDAgEFFgMC
> AQACGQEFCQuP3SgWIQRGyPH+W3hgUPhyflPQtV81ksAM7QUCYbLp7wAKCRDQtV81
> ksAM7cr5B/wO1khGTl3dAh46DY2jxe3jTfPvicbQgZQVwOhhP2FPKIFC8dYVCEHk
> oYQapW47YXufw/Qw71GILfMtZemiUJpHwa/thCPtP3clE53ZqsEdArHDX2ZYm3Ol
> qDTxMuilQCDfGuatg6MVQ8SlUbhcGIGyr4O4cPeDe0kmUOQhp8wKTXkmhq3Yml5+
> 2XRu69TZUNsQh3TPi50hR+RB0YjI+KTBKYSanAYM44Bj6mti6+06UkRVMaFxLVzS
> BAEyTf/SBaKkJq4cKe+gCzcc/Gg8jrxKVcQRPdUxOlvWUiYT5FYRaFuklgDW4B+g
> 23FdO6RkE0Z+g/oLeAYSqj/JMfjv77bFtBlmYWNoMjIwNDA4LmZ3bnNwQHhveHku
> bmV0iQFdBBMBCgBHFiEERsjx/lt4YFD4cn5T0LVfNZLADO0FAmJQFg8CGwEFCQuP
> 3SgLCw0JCgwICwcEAwIIFQoJCAsDAgEFFgMCAQACHgECF4AACgkQ0LVfNZLADO2V
> ygf9HQWjolhnGRNWG5845lh2uTrm/5q19+hKwnQHx7HApZia09kXp7QpxTCmSmnq
> skWto08U/iT1sPqFTOojOZAM6e4zr7kz/VJksJx8lswUkTRyGXqGEQoQ7bZvd6XR
> Yu0ZKfNNZhvjfPzzwyp+85lWWIaNA0cQyIa6BRzlNhgCbyLhksy4GDkzoBPxhNOp
> mboohSVOnLjrUbQpfKCDJtAaNps95+4gv2t8JPtyFcZW9qKWFRIdJJvamc3lp4Il
> JwzXRElB1htSHQb4SA2VN9M6ALdnfZXXT+H8UKKek+joE8Xm15FX83E5pmrE/8lp
> imVg0s0BAUd0DxVj6zj4SI9yhrkBDQRaAsK/AQgAyBEE1hjgZ6F33GPSkfxsFqsN
> L5lQrRTQtx5GKPt5UnIKK00TAevGoI8VDftuP6Fpp9kFJ+HSAiW3M+8S70H3UnbW
> 8AFofSd28AUvnnhP4ATwRcVm35+HYUge4lKiy5bEvDS9bALJqlW9sHBUF+gebrmh
> 0CgvD0sQSUE4PLAuHFUJG8/fezReXGB2MSVAbu8NXHdlJ6vPr5ERlg7A0JFR9Knx
> s8PoI/1hd73mwGld9/Xo3xByDbJ7Uejjt3HpNZf9eOq3XPp02dpKsOQEB2QxxPHI
> TcBH8IBZY78BJHq9UD4g3fD904oIvs38BzvX/WAMO9W0k1ZLfF1zyR0+QXQweQAR
> AQABiQJEBBgBAgAPAhsCBQJcRWq9BQkU+H0OASnAXSAEGQECAAYFAloCwr8ACgkQ
> gEIvCiHZTet1zwf/TUmPpwnBgoA6AXILI5R/NvZit30mbExa6byBOK9vEbGS8pSu
> L/GN5tzTmyJoGbLNc24h8w6FwcoxE0xJSUJKp7nO95NWD/kO5n8alJZN9ph8I2yt
> Cl3dhzZKw8+j+WBwTrKLdDP5lfarI0gz6+N1UtFH4U+tUCq56DQqu46xyTS5ASeM
> iO/8Ykej9LiObZv9QYwnKkhM8y+Dw9dkPfIsqt47uE4j4czpJ4qv8236oV/luR44
> 8cCud5G7ZGxBj6DSnitZM2lbq5yTlIZ3EEvu/I9dE/vsPaWQmGeo6S03FJ8+S6Xn
> eP8mgYWl9YGJTjDvUg3FU9fXfHzCuFtZ/1YZvAkQ0LVfNZLADO2zEggAi3myJcVA
> yiftlZSkTrId9LNeQtXCw7tkJcuaGIC/FWJQhVofcp2CuEAm26w9xRN39Tp7pi2r
> fta/xykj0iYNjmqgi7MWK6pZOY/LCTEOMfYiWX4LCJ89f51y2TTmWwgfWXxFVe8y
> lyRMC1N2CXEd5xsEKA1ZI5vF3ikjVkMBAtLGiSxcyBi8YbcDFG4/fTBNpeEvXZ6n
> CusDDYCArwFiQi4mRtDbZXBZIBVE+jwYlzw0bz3EeqkPFMJ/pvuWeQ5R9LSuVYhh
> aVieqoLXmK6uwQLoJOFx67KX+BoEPpkVa/FmDhfpguQrKz5/Eq1Lhy8P28EAhLSG
> Ar1XuxedRos/pLkBDQRaAsFpAQgAm4sZiVbFI6YpR3yDFpe7qOkkWmlk+7MT8cAa
> j5Ltm+mXqf7ZHDNeX9mzMNBZeoUBCztp0n/N0Iu5T7MmEJV/rrJa0N8ezjY9kDTX
> xUmLRmXTM/AM7Jg6dsIOf/lrd2TAagUkf/nYS9Sxx7/MvWESis3uYw8aqpuXjS0t
> FgaG3umvTfvgI2SamuZTkdt9KmoqKCFcf5qjNk7PeY0REVYUp0/mfyPDo7s33yOm
> P0x9wy6zeZ4OKAsSETvARj8WafUT7vikVuZEtfiLolT741y2VtvyBICooLsVZ6Pf
> MMle4newVhbZeJAjUTdxoE4T+B1vMICsbNw2/zsYtM/9KKvWpwARAQABiQElBBgB
> AgAPAhsMBQJcRWqNBQkU+H5mAAoJENC1XzWSwAztix8IAN+/SZI+fr6AkLuC0X+0
> 

Re: KHADIJAH send 3 kisses

2022-01-18 Thread Luna Jernberg
porn spam :(

On Tue, Jan 18, 2022 at 12:27 PM pooran silve 
wrote:

> website url https://vznsmsn.page.link/H3Ed
>
>


Re: Porter roll call for Debian Bookworm

2022-01-13 Thread YunQiang Su
Sandro Tosi  于2022年1月14日周五 13:54写道:
>
> YunQiang,
>
> On Tue, Jan 4, 2022 at 9:48 AM PICCA Frederic-emmanuel
>  wrote:
> >
> >
> > > > In case #1000435 (matplotlib crashes on mips64el) is not already on
> > > > your radar, would you please take a look?
> > > >
> > >
> > > Thank you. I will work on it right now.
> >
> > Hello, I just added some information about this problem on this bug
> >
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001168#72
> >
> > it seems to me that this is something related to gcc-11.  If I build 
> > matplotlib with gcc-10 there is no more crash.
>
> did you have a chance to look at it yet? there's quite a substantial
> number of packages depending on matplotlib that cant migrate to

OK. I will have a look at this now.

> testing until this issue is fixed, so we'd greatly appreciate it if
> you can investigate it soon.
>
> Thanks,
> --
> Sandro "morph" Tosi
> My website: http://sandrotosi.me/
> Me at Debian: http://wiki.debian.org/SandroTosi
> Twitter: https://twitter.com/sandrotosi



-- 
YunQiang Su



Re: Porter roll call for Debian Bookworm

2022-01-13 Thread Sandro Tosi
YunQiang,

On Tue, Jan 4, 2022 at 9:48 AM PICCA Frederic-emmanuel
 wrote:
>
>
> > > In case #1000435 (matplotlib crashes on mips64el) is not already on
> > > your radar, would you please take a look?
> > >
> >
> > Thank you. I will work on it right now.
>
> Hello, I just added some information about this problem on this bug
>
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001168#72
>
> it seems to me that this is something related to gcc-11.  If I build 
> matplotlib with gcc-10 there is no more crash.

did you have a chance to look at it yet? there's quite a substantial
number of packages depending on matplotlib that cant migrate to
testing until this issue is fixed, so we'd greatly appreciate it if
you can investigate it soon.

Thanks,
-- 
Sandro "morph" Tosi
My website: http://sandrotosi.me/
Me at Debian: http://wiki.debian.org/SandroTosi
Twitter: https://twitter.com/sandrotosi



Re: Porter roll call for Debian Bookworm

2022-01-04 Thread PICCA Frederic-emmanuel


> > In case #1000435 (matplotlib crashes on mips64el) is not already on
> > your radar, would you please take a look?
> >
> 
> Thank you. I will work on it right now.

Hello, I just added some information about this problem on this bug

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001168#72

it seems to me that this is something related to gcc-11.  If I build matplotlib 
with gcc-10 there is no more crash.

I think that I reach my peter principe with this last effort :))

Cheers

Frederic



Re: Porter roll call for Debian Bookworm

2021-12-30 Thread Manuel A. Fernandez Montecelo

Hello,

2021-10-02 11:57 Graham Inggs:

Hi

We are doing a roll call for porters of all prospective release
architectures.  If you are an active porter behind one of these
architectures [1] and intend to continue for the development cycle of
Debian Bookworm (est. release mid-2023), please respond with a signed
email containing the following before Saturday, January 1, 2022:

* Which architectures are you committing to be an active porter for?
* Please describe recent relevant porter contributions.
* Are you running/using Debian testing or sid on said port(s)?
* Are you testing/patching d-i for the port(s)?

Please note that no response is required for amd64 because our
toolchain maintainers are happy to support amd64 as-is.

Feel free to use the following template as your reply:
[...]


I have been working on the riscv64 port since 2015 or so, even if the
successful and definitive initial bootstrap only happened in 2018.  Some
people joined from the start and more people joined lately, but I have a
keen interest in pushing this port further :)

Thus, I am an active porter for riscv64 and I intend to continue for the
development cycle of Debian Bookworm (est. release mid-2023).

In the last year or two the contributions were a bit diminished for a
variety of issues (especially in the realm of attending bugs and looking
at specific issues of packages and submitting patches), and will
continue to be this way for a while, but I hope to pick-up pace again
during this development cycle.


For riscv64, I plan to:

- maintain buildds

--- I have set-up or was involved in getting hardware and necessary
resources and setting up most of the buildds of the architecture so
far, and I plan to continue doing this in the foreseeable future

- maintain/provide hardware for (or assist with) automated tests on ci.d.n,
  jenkins.d.n (etc.)

--- I though about doing do this in the past, I think that it's a good
idea to do this if new suitable hardware becomes available, but
there's been scarcity until now.

- run a Debian testing or unstable system on port that I use regularly

- test (most|all) packages on this architecture

--- not sure if saying (most|all) is realistic with the current size of
the archive, but I hope to use regularly the most important
packages by using them on real systems.

The following I will try to do as more time becomes available, and
paying more attention if this port is considered to be supported for
bookworm and becoming a more official architecture (but other people
with interest in riscv64 are also working on these areas):

- fix toolchain issues
- triage arch-specific bugs
- fix arch-related bugs
- triage d-i bugs
- test d-i regularly
- fix d-i bugs/issues


I am a DD.

--
Manuel A. Fernandez Montecelo 


signature.asc
Description: PGP signature


Re: Porter roll call for Debian Bookworm

2021-12-26 Thread YunQiang Su
Graham Inggs  于2021年12月26日周日 21:58写道:
>
> Hi YunQiang Su
>
> On Sun, 26 Dec 2021 at 11:17, YunQiang Su  wrote:
> >
> >   For mipsel and mips64el, I
> >   - test most packages on this architecture
> >   - run a Debian testing or unstable system on port that I use regularly
> >   - fix toolchain issues
> >   - triage arch-specific bugs
> >   - fix arch-related bugs
> >   - triage d-i bugs
> >   - test d-i regularly
> >   - fix d-i bugs/issues
> >   - maintain buildds
> >   - maintain/provide hardware for (or assist with) automated tests on 
> > ci.d.n,
> > jenkins.d.n (etc.)
> >
> > I am a DD.
>
> Thanks for your response!
>
> In case #1000435 (matplotlib crashes on mips64el) is not already on
> your radar, would you please take a look?
>

Thank you. I will work on it right now.

> Regards
> Graham



-- 
YunQiang Su



Re: Porter roll call for Debian Bookworm

2021-12-26 Thread Vagrant Cascadian
On 2021-10-02, Graham Inggs wrote:
>  * Which architectures are you committing to be an active porter for?

armhf, arm64


>  * Please describe recent relevant porter contributions.

Maintaining u-boot (bootloader used on many arm64 and armhf plaforms),
arm-trusted-firmware (arm64 firmware), and occasional debian-installer,
linux and initramfs-tools contributions for specific hardware.


>   I am an active porter for the following architectures and I intend to
>   continue for the development cycle of Debian Bookworm
>   (est. release mid-2023):
>

For armhf and arm64, I:

>   - test (most|all) packages on this architecture

I maintain the armhf build machines for tests.reproducible-builds.org
which currently runs package builds for the whole archive in sid,
experimental, bookworm and bullseye chroots. The build machines are a
mix of arm64 and armhf capable machines.


>   - run a Debian testing or unstable system on port that I use regularly

I run mobian on arm64, which is currently bookworm based, working
towards complete inclusion in debian. I may start using an arm64 laptop
(pinebook pro) regularly, probably running bookworm.


>   - triage arch-specific bugs
>   - fix arch-related bugs
>   - triage d-i bugs
>   - test d-i regularly
>   - fix d-i bugs/issues

Not systematically or regularly, but occasionally as the need arises.


I am a DD.


live well,
  vagrant


signature.asc
Description: PGP signature


Re: Porter roll call for Debian Bookworm

2021-12-26 Thread Graham Inggs
Hi YunQiang Su

On Sun, 26 Dec 2021 at 11:17, YunQiang Su  wrote:
>
>   For mipsel and mips64el, I
>   - test most packages on this architecture
>   - run a Debian testing or unstable system on port that I use regularly
>   - fix toolchain issues
>   - triage arch-specific bugs
>   - fix arch-related bugs
>   - triage d-i bugs
>   - test d-i regularly
>   - fix d-i bugs/issues
>   - maintain buildds
>   - maintain/provide hardware for (or assist with) automated tests on ci.d.n,
> jenkins.d.n (etc.)
>
> I am a DD.

Thanks for your response!

In case #1000435 (matplotlib crashes on mips64el) is not already on
your radar, would you please take a look?

Regards
Graham



Re: Porter roll call for Debian Bookworm

2021-12-26 Thread YunQiang Su
  For mipsel and mips64el, I
  - test most packages on this architecture
  - run a Debian testing or unstable system on port that I use regularly
  - fix toolchain issues
  - triage arch-specific bugs
  - fix arch-related bugs
  - triage d-i bugs
  - test d-i regularly
  - fix d-i bugs/issues
  - maintain buildds
  - maintain/provide hardware for (or assist with) automated tests on ci.d.n,
jenkins.d.n (etc.)

I am a DD.

-- 
YunQiang Su



  1   2   3   4   5   6   7   8   9   10   >