Re: *countable infinities only

2012-06-01 Thread Nicu Buculei

On 05/31/2012 05:13 PM, Chris Adams wrote:


Please don't spread FUD like this.  You are wrong for a couple of
reasons:

- Secure boot is required to be able to be disabled on x86 (the only
   platform Fedora will support it).

- Users can generate their own keys, enroll them in the secure boot
   firmware, and use those keys to sign their kernels.


I am not sure I fully understand the technical part about UEFI so please 
make it clear for me: I can generate my own keys, enroll them in the 
secure boot firmware and then *continue* using the machine in a *dual 
boot* with Windows 8?


The presence on my own boot keys will make Windows 8 unbootable on that 
machine or not?


--
nicu :: http://nicubunu.ro :: http://nicubunu.blogspot.com/
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: vfsmount mnt_parent element change

2012-06-01 Thread Niels de Vos
On Thu, May 31, 2012 at 10:26 PM, Shelby, James james.she...@nrel.gov wrote:
 I'm trying to find out the changes in the kernel relating the 3.2 to 3.3 
 changes in relation to the vfsmount structure change as we use an application 
 that uses the mnt_parent element that no longer exists in the source.  I 
 looked at the Documentation directory for the kernel in Fedora 16 but it has 
 references to mnt_parent still (linux-3.3.7/Documentation/filesystems).  I 
 saw a bug reference that has this being moved to the mount structure however 
 I don't get any results with grep on the entire source tree for mnt_parent.

 Can anyone point me to a document that has the structure change so that I can 
 modify this source accordingly?

mnt_parent has moved to struct mount (in fs/mount.h), see commit
0714a533 and 3376f34f.

 Thanks
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: another upgrade, another disaster

2012-06-01 Thread Caterpillar
2012/5/31 Adam Williamson awill...@redhat.com

  Third bug: after preupgrade finished to download fc17 packages, I
  rebooted, but grub did not have a “upgrade system” entry. So the
  computer is not upgradable with preupgrade.

 Need more information.

 Could it be? https://bugzilla.redhat.com/show_bug.cgi?id=826537#c27

 So now, developers say that they need more people to do beta testing,
  but my question is: if at least 80% userbase had troubles with grub
  showing old kernels, is it possible that nobody of testers had this
  problem? I really don't think so.

 No, that is not the case. See above. The issues with old kernel sticking
 around after upgrade were already known and reported before release.

 The #820351 case is fundamentally more or less impossible to solve
 entirely, outside of sticking Epochs in the kernel package. So there was
 no point holding up the release for that. The #820340 case is specific
 to preupgrade and isn't a showstopper, so we didn't hold the release for
 that one either. There is an upgrade currently in testing that ought to
 fix it.

 Please apologize me, but if #820340 was not a showstopper, so which bug
should be a showstopper? I am very disappointed with that, because
preupgrade is the official supported way to upgrade Fedora versions
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Bryn M. Reeves
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 05/31/2012 07:21 PM, Gerry Reno wrote:
 Not yet.  But HDD technology is changing rapidly.  Just look at
 hybrid drives, SSD.
 
 No reason they could not add this capability.

Not really. Both of these have been in development for years and have
only started to look mainstream fairly recently.

Look at the time that passed between IDEMA standardising advanced
(4KiB) sectoring and the time that that took to actually make it to
the market (not to mention that most of those parts are running in
compatibility mode today).

ATA has some existing security extensions to allow a drive to be
locked but these prevent any access until a correct password is
presented (and don't appear to be that secure against a well resourced
attacker).

If read-only support was standardised tomorrow it'd still be a number
of years before widespread support became available.

About the best you could do today would be to use an external drive
with a write-protect switch or to wire up the physical WP jumper on
the drive to an external switch on the case (I wouldn't flick it while
the system is running ;).

Regards,
Bryn.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/Ih3wACgkQ6YSQoMYUY96v7ACfUV2nSsW4iAQDwTXXWz75cpMb
fN0AoKHV48bethNR/GKaUdNtnfeNMWlL
=mZVJ
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: another upgrade, another disaster

2012-06-01 Thread Michal Schmidt

On 06/01/2012 10:37 AM, Caterpillar wrote:

Please apologize me, but if #820340 was not a showstopper, so which bug
should be a showstopper?


The bug
 * does not cause data loss
 * is easy to recover from
 * seems to be fixable with an update
= Not what I'd call a showstopper.

Michal
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Bryn M. Reeves
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 05/31/2012 08:03 PM, Gregory Maxwell wrote:
 I wasn't responding to MJG, I was responding to Peter— who said I
 was wrong in the message where I was stating that a freedom is
 being lost, and has subsequently spoken more clearly on the
 position— and Byrn. It seemed to me that they were arguing that the
 freedom of fedora wasn't being compromised here.  My understanding
 has been refined by further discussion, though I'm still not
 completely sure if all people actually take the loss of freedom
 seriously, or if they do but just can't accept the idea that the
 alternative is actually an option.

If you read my posts carefully you might have noticed that I have not
actually taken a position on this feature. I was only responding to
the tone and content of your message which I still feel was
unnecessarily alarmist and not adding anything to the discussion.

I am not working on this feature and I'm quite capable of telling my
system's firmware to do what I want so there's little practical
implication for me.

I see the arguments on both sides and I regret that we appear to be
between a rock and a hard place here.

At the same time I have a lot of trust in the people who are working
on this in Fedora and I have faith that the project will try to seek
the best compromise between the freedoms we value and the realities of
the market and environment we find ourselves in.

Invoking the conspiracy card on these discussions and decisions really
just takes us further into the mire.

Regards,
Bryn.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/IlYIACgkQ6YSQoMYUY95jdgCgtG2ZjWfbZ1eFbV7FJLlvvIrQ
6KcAoLY4Vfca42XC7eby578EOpENakaY
=1HB5
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: As we develop SELinux we are adding new labels to homedir content

2012-06-01 Thread Lennart Poettering
On Thu, 31.05.12 15:44, Daniel J Walsh (dwa...@redhat.com) wrote:

Heya,

 We have added file trans by name rules to policy to fix a lot of
 files/directories being created with the correct label.
 
 We have problems on Distribution updates (F16-F17) though, where there is a
 files/directories in the homedir that are mislabeled.
 
 We have restorecond -u  which we run in F15/F16 which examines the homedir
 and fixes any files directories it finds mislabeled in ~.  If it finds a dir
 which is mislabeled, it will relabel the directory and all of its children.
 We have turned this tool off by default on the desktop in F17, because
 filename transition rules are doing a pretty good job of maintaining the
 labels in the homedir.  But this tool never did a great job of fixing
 mislabeled subdirs, if the top level directory in the homedir was labeled
 correctly.
 You can enable this tool with /etc/xdg/autostart/restorecond.desktop
 
 One possible fix to this would be to force a system relabel on everything on
 upgrades, while this would fix the labels, it is considered to time consuming.
 (restorecon -R -v / or touch /.autorelabel)

 Another option would be to just relabel /home (# restorecon -R -v /home) at
 upgrade time.  But this would also be time consuming. And would not catch the
 cases where the homedir is not in /home. 

I am strongly for this option. Allowing the user to login while the
relabel is still in progress (like it would with restorecond, right?)
sounds like a really bad idea... I mean, incorrect labels when used just
lead to more incorrect labels, no? And incorrect labels also result in
access errors? Both sound like something to avoid...

To me it appears that preupgrade should really take care of this on all
Fedora release updates.

If the relabelling is slow, maybe we can do something about that? Do you
know why it is slow? Is this more IO bound? Or is the label lookup slow
and this is CPU bound? If the latter it might be possible to parallelize
the relabelling?

(I wouldn't care too much about homedirs outside of /home. A not in the
release notes for such cases should suffice)

Lennart

-- 
Lennart Poettering - Red Hat, Inc.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: another upgrade, another disaster

2012-06-01 Thread Panu Matilainen

On 05/31/2012 10:24 PM, Adam Williamson wrote:

On Thu, 2012-05-31 at 15:08 -0400, Neal Becker wrote:


But we can, and should, at least try to make our systems tolerant of failures.
Just because we can't test everything.  Defensive programming.


Sure. As someone else said, though, that's an issue in rpm if
anywhere...


Dunno what kind of failures you're referring to here (not saying rpm 
doesn't have any, just that it's not clear to me in this context), but
the vast majority of upgrade-related issues are not so much in rpm but 
anaconda/preupgrade/yum level of things.


(One of) the recurring themes is
1) user has a system with bunch of non-default packages installed
2) user does an anaconda-upgrade with a DVD
3) anaconda blasts through the upgrade ignoring anything it can't upgrade
4) yum barfs on the resulting broken dependency mess

Anaconda (and perhaps preupgrade as well, I dont know it well enough to 
comment) could be stricter and refuse to upgrade unless all dependencies 
are met, either through user adding/adjusting (3rd party) repositories 
as necessary or removing all offending packages, but that'd perhaps just 
create a different kind of PITA.


It'd help if yum learned how to fix (at least some) pre-existing 
problems instead of just complaining and giving up.


One thing that might also help is changing anaconda  preupgrade to use 
yum distro-sync equivalent instead of the regular upgrade.


- Panu -


--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Michael scherer
On Thu, May 31, 2012 at 01:55:35PM -0500, Chris Adams wrote:
 Once upon a time, Peter Jones pjo...@redhat.com said:
  That's why we didn't simply ask vendors to ship our key.  That would be
  /less/ equitable to other distributions than the solution we're looking at
  right now.
 
 Has any thought been given to setting up group between various Open
 Source distributions (Linux, BSD) to be a Secure Boot signer (with
 security-oriented rules about what gets signed, probably similar to
 whatever Microsoft is using today) and then getting vendors to include
 the master key along site Microsoft's?

The last attempt to do something similar I can think of would be cacert.
Afaik, they are still being audited to be added to Firefox, and i think
they would be happy to explain all the issues they faced on that road.

-- 
Michael Scherer
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Bryn M. Reeves
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 05/31/2012 10:42 PM, Adam Williamson wrote:
 On Thu, 2012-05-31 at 15:07 -0400, Gerry Reno wrote:
 
 Yes, all these would currently support what I'm suggesting.
 Actually, if you're willing to flip a lot of switches, you
 could probably make your / a raid5 of floppies, but the
 performance would be suboptimal.
 
 -J
 
 
 Ok, now you're just being silly.
 
 Behold:
 
 http://www.wired.com/gadgetlab/2009/05/five-disk-floppy-raid-4mb-of-blistering-fast-storage/

Hey,
 
you might be joking but I used to demo MD RAID in Red Hat classes
using a dinky little 4-port USB1 hub (with a Shadowman logo) and four
Red Hat branded USB keys.

Worked great :-)

Regards,
Bryn.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/ImxUACgkQ6YSQoMYUY96GcgCg0Hl2mIPTJRx4wPUujN4fPVex
fL8An1E/1Gd6DQwgzC36hXm2HFk6mCbX
=xv75
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: another upgrade, another disaster

2012-06-01 Thread Michael scherer
On Fri, Jun 01, 2012 at 01:18:23PM +0300, Panu Matilainen wrote:
 On 05/31/2012 10:24 PM, Adam Williamson wrote:
 On Thu, 2012-05-31 at 15:08 -0400, Neal Becker wrote:
 
 But we can, and should, at least try to make our systems tolerant of 
 failures.
 Just because we can't test everything.  Defensive programming.
 
 Sure. As someone else said, though, that's an issue in rpm if
 anywhere...
 
 Dunno what kind of failures you're referring to here (not saying rpm
 doesn't have any, just that it's not clear to me in this context),
 but
 the vast majority of upgrade-related issues are not so much in rpm
 but anaconda/preupgrade/yum level of things.
 
 (One of) the recurring themes is
 1) user has a system with bunch of non-default packages installed
 2) user does an anaconda-upgrade with a DVD
 3) anaconda blasts through the upgrade ignoring anything it can't upgrade
 4) yum barfs on the resulting broken dependency mess
 
 Anaconda (and perhaps preupgrade as well, I dont know it well enough
 to comment) could be stricter and refuse to upgrade unless all
 dependencies are met, either through user adding/adjusting (3rd
 party) repositories as necessary or removing all offending packages,
 but that'd perhaps just create a different kind of PITA.

It would be much better to refuse to upgrade than to break later in weird way, 
since users perception would be different.

First, they would either ask for help and then someone could explain what is 
wrong.

This would also reduce the number of failed upgrade and therefor the number of 
bugs
that cannot be reproduced, thus making them likely easier to spot and fix.

-- 
Michael Scherer
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: another upgrade, another disaster

2012-06-01 Thread Panu Matilainen

On 06/01/2012 01:39 PM, Michael scherer wrote:

On Fri, Jun 01, 2012 at 01:18:23PM +0300, Panu Matilainen wrote:

On 05/31/2012 10:24 PM, Adam Williamson wrote:

On Thu, 2012-05-31 at 15:08 -0400, Neal Becker wrote:


But we can, and should, at least try to make our systems tolerant of failures.
Just because we can't test everything.  Defensive programming.


Sure. As someone else said, though, that's an issue in rpm if
anywhere...


Dunno what kind of failures you're referring to here (not saying rpm
doesn't have any, just that it's not clear to me in this context),
but
the vast majority of upgrade-related issues are not so much in rpm
but anaconda/preupgrade/yum level of things.

(One of) the recurring themes is
1) user has a system with bunch of non-default packages installed
2) user does an anaconda-upgrade with a DVD
3) anaconda blasts through the upgrade ignoring anything it can't upgrade
4) yum barfs on the resulting broken dependency mess

Anaconda (and perhaps preupgrade as well, I dont know it well enough
to comment) could be stricter and refuse to upgrade unless all
dependencies are met, either through user adding/adjusting (3rd
party) repositories as necessary or removing all offending packages,
but that'd perhaps just create a different kind of PITA.


It would be much better to refuse to upgrade than to break later in weird way,
since users perception would be different.

First, they would either ask for help and then someone could explain what is 
wrong.

This would also reduce the number of failed upgrade and therefor the number of 
bugs
that cannot be reproduced, thus making them likely easier to spot and fix.



Yup. AFAICS anaconda doesn't even so much as warn about broken 
dependencies on upgrade, giving users a false sense of things being all 
peaches when in reality it could be creating an enormous mess. Witness 
eg https://bugzilla.redhat.com/show_bug.cgi?id=826686 and 
https://bugzilla.redhat.com/show_bug.cgi?id=826621 - a user might think 
twice before proceeding with an upgrade creating 150-200 broken 
dependencies, all of which silently ignored atm.


- Panu -

- Panu -
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Miloslav Trmač
On Fri, Jun 1, 2012 at 1:15 AM, Sergio Durigan Junior
sergi...@redhat.com wrote:
 On Thursday, May 31 2012, Ralf Corsepius wrote:
 So I'll patch sort to default to /var/tmp rather than /tmp.

 Please don't.  As many pointed out, there are many disadvantages in
 doing this, and I really do not think we should be fixing (sic) our
 apps because of such a controversial feature.  `sort' and other programs
 have been working right like this for *years*; introducing such change
 would mean please give me more bugs, as Ralf pointed out.

To remind everyone about the state of this change:
* It was approved by FESCo for Fedora 18
* It was implemented
Therefore, it is reasonable to assume that Fedora 18 will ship with
this change, and applications need to be updated to handle the change,
or we will have a more broken Fedora 18.  Advising people not to patch
programs won't make Fedora 18 less broken at this point.

So, please, if you are a package maintainer, for each package:
1. (fedpkg prep)
2. (grep -irl 'te\?mp' .)
3. Manually review the results for code that could be broken by making
/tmp a tmpfs
4. Prepare patches, and either get them accepted upstream, or add them
to your Fedora package.

If you are anyone: Please suggest improvements to the instructions
above to reduce the number of false positives.

If you are the feature owners: Please read through all of the previous
discussions mentioning specific things that would be broken, and file
the bugs yourselves - don't rely on the single person out of thousands
to have read the e-mail.

If you don't like the change: Sorry.  I don't like the change either,
but now we need focus on making Fedora 18 less broken.  Alternatively,
you could ask FESCo to reconsider - but before doing so, please review
the FESCo meeting minutes from April 4 and the following devel@
threads, and make sure you have _new_ arguments.  Repeating things
that were already raised is unlikely to persuade FESCo.
Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

F17: wvdial broken

2012-06-01 Thread Xose Vazquez Perez


the bug is 45 days old: https://bugzilla.redhat.com/812651
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Steve Clark

On 05/31/2012 09:14 PM, Kevin Kofler wrote:

Chris Adams wrote:

- Secure boot is required to be able to be disabled on x86 (the only
platform Fedora will support it).

And this is exactly why we should just require our users to disable it!

I don't see any advantage at all from supporting this feature, just
problems:
* extra restrictions added to GRUB and the kernel to comply with the
security (lockout) requirements. Even if they're all conditional on
secure boot being enabled (are they really?), that still means extra code
which can cause extra breakage even when running in normal mode (the one
every Free Software user should be using).
* possible GPL violation. Did Red Hat Legal have a look at the plans
already? Are they sure they're compliant with the GPL, v2 when it comes to
the kernel, v3 when it comes to GRUB 2? (What's sure is that they aren't
compliant with the spirit of the GPL, whatever version!)
* ineffectiveness of the added restrictions: Can't you still bring up a
Blue Pill with a Window$ VM even with only unsigned userspace apps? And if
we don't even allow those, where's the freedom?
* exercising your freedom to change the kernel (or even just to load an out-
of-tree module!) requires you to disable Secure (Restricted) Boot anyway,
so why support the restricted mode? (As much as I hate proprietary drivers,
you can definitely expect a horde of their users showing up at your door
with a pitchfork...)
* implicit endorsement of M$ and their signature racket (including a
monetary payment to their racketing partner Veri$ign -- was that already
made?). It might even lead M$ to drop the requirement to allow disabling
Secure Boot (or even invert it into a prohibition as on ARM!), arguing
that Linux (sic, should be GNU/Linux) supports it too anyway.
* dependence on the racket, which can change its terms at any moment.

Just saying disable 'Secure' Boot in the BIOS is the easiest solution to
the problem. I remember the days where one had to disable PlugPlay
Operating System in the BIOS to get GNU/Linux to boot at all on some
machines, it didn't cause any real problems.

 Kevin Kofler


+100


--
Stephen Clark
*NetWolves*
Director of Technology
Phone: 813-579-3200
Fax: 813-882-0209
Email: steve.cl...@netwolves.com
http://www.netwolves.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: As we develop SELinux we are adding new labels to homedir content

2012-06-01 Thread Bill Peck

On 06/01/2012 06:14 AM, Lennart Poettering wrote:

On Thu, 31.05.12 15:44, Daniel J Walsh (dwa...@redhat.com) wrote:

Heya,


We have added file trans by name rules to policy to fix a lot of
files/directories being created with the correct label.

We have problems on Distribution updates (F16-F17) though, where there is a
files/directories in the homedir that are mislabeled.

We have restorecond -u  which we run in F15/F16 which examines the homedir
and fixes any files directories it finds mislabeled in ~.  If it finds a dir
which is mislabeled, it will relabel the directory and all of its children.
We have turned this tool off by default on the desktop in F17, because
filename transition rules are doing a pretty good job of maintaining the
labels in the homedir.  But this tool never did a great job of fixing
mislabeled subdirs, if the top level directory in the homedir was labeled
correctly.
You can enable this tool with /etc/xdg/autostart/restorecond.desktop

One possible fix to this would be to force a system relabel on everything on
upgrades, while this would fix the labels, it is considered to time consuming.
(restorecon -R -v / or touch /.autorelabel)

Another option would be to just relabel /home (# restorecon -R -v /home) at
upgrade time.  But this would also be time consuming. And would not catch the
cases where the homedir is not in /home.

I am strongly for this option. Allowing the user to login while the
relabel is still in progress (like it would with restorecond, right?)
sounds like a really bad idea... I mean, incorrect labels when used just
lead to more incorrect labels, no? And incorrect labels also result in
access errors? Both sound like something to avoid...

To me it appears that preupgrade should really take care of this on all
Fedora release updates.

If the relabelling is slow, maybe we can do something about that? Do you
know why it is slow? Is this more IO bound? Or is the label lookup slow
and this is CPU bound? If the latter it might be possible to parallelize
the relabelling?

(I wouldn't care too much about homedirs outside of /home. A not in the
release notes for such cases should suffice)

Lennart



How does this affect home dirs which are served over nfs?
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Alexey I. Froloff
On Fri, Jun 01, 2012 at 01:21:25PM +0200, Miloslav Trmač wrote:
 Therefore, it is reasonable to assume that Fedora 18 will ship with
 this change, and applications need to be updated to handle the change,
 or we will have a more broken Fedora 18.  Advising people not to patch
 programs won't make Fedora 18 less broken at this point.
I was using /tmp on tmpfs (with $TMPDIR poining inside of /tmp)
for several years in ALT Linux.  And by use I mean build
packages using mock-like tool that creates chroots in $TMPDIR.
During all these years, my biggest problem was that tmpfs by
default allocates half of physical RAM for partition.  So I just
allocated big enough swap and added a line to /etc/fstab with
appropriate size= option.

Having /tmp on tmpfs is not THAT scary, is you ask me...

-- 
Regards,--
Sir Raorn.   --- http://thousandsofhate.blogspot.com/


signature.asc
Description: Digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread phantomjinx
On 06/01/2012 12:58 PM, Steve Clark wrote:
 On 05/31/2012 09:14 PM, Kevin Kofler wrote:
 Chris Adams wrote:
 - Secure boot is required to be able to be disabled on x86 (the only
 platform Fedora will support it).
 And this is exactly why we should just require our users to disable it!

 I don't see any advantage at all from supporting this feature, just 
 problems:
 * extra restrictions added to GRUB and the kernel to comply with the 
 security (lockout) requirements. Even if they're all conditional on 
 secure boot being enabled (are they really?), that still means extra code 
 which can cause extra breakage even when running in normal mode (the one 
 every Free Software user should be using).
 * possible GPL violation. Did Red Hat Legal have a look at the plans 
 already? Are they sure they're compliant with the GPL, v2 when it comes to 
 the kernel, v3 when it comes to GRUB 2? (What's sure is that they aren't 
 compliant with the spirit of the GPL, whatever version!)
 * ineffectiveness of the added restrictions: Can't you still bring up a 
 Blue Pill with a Window$ VM even with only unsigned userspace apps? And if 
 we don't even allow those, where's the freedom?
 * exercising your freedom to change the kernel (or even just to load an out-
 of-tree module!) requires you to disable Secure (Restricted) Boot anyway, 
 so why support the restricted mode? (As much as I hate proprietary drivers, 
 you can definitely expect a horde of their users showing up at your door 
 with a pitchfork…)
 * implicit endorsement of M$ and their signature racket (including a 
 monetary payment to their racketing partner Veri$ign – was that already 
 made?). It might even lead M$ to drop the requirement to allow disabling 
 Secure Boot (or even invert it into a prohibition as on ARM!), arguing 
 that Linux (sic, should be GNU/Linux) supports it too anyway.
 * dependence on the racket, which can change its terms at any moment.

 Just saying disable 'Secure' Boot in the BIOS is the easiest solution to 
 the problem. I remember the days where one had to disable PlugPlay 
 Operating System in the BIOS to get GNU/Linux to boot at all on some 
 machines, it didn't cause any real problems.

 Kevin Kofler

 +100
 
 
 -- 
 Stephen Clark
 *NetWolves*
 Director of Technology
 Phone: 813-579-3200
 Fax: 813-882-0209
 Email: steve.cl...@netwolves.com
 http://www.netwolves.com
 
 
 N�n�r)em�h�yhiם�w^��

+100

-- 
Paul Richardson

  * p.g.richard...@phantomjinx.co.uk
  * pgrichard...@linux.com


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: sys/sysctl.h and bits/sysctl.h in rawhide/f18?

2012-06-01 Thread Kaleb S. KEITHLEY

On 05/31/2012 02:00 PM, Jim Meyering wrote:

Kaleb Keithley wrote:

About a week ago I did a scratch build of one of my packages that
includessys/sysctl.h  and it built successfully.

Today I did another scratch build and it broke with:

...
Making all in src
   CC fuse-helpers.lo
   CC fuse-resolve.lo
   CC fuse-bridge.lo
   CC misc.lo
In file included from fuse-helpers.c:24:0:
/usr/include/sys/sysctl.h:63:25: fatal error: bits/sysctl.h: No such
file or directory
compilation terminated.
...


I noticed that today and reported it:

 http://bugzilla.redhat.com/827040


I note that a new build of glibc, including glibc-headers occurred late 
yesterday (2012-05-31), but the fix was not included.


Is there an ETA for when this will be fixed? I'm probably not the only 
one that this is affecting.


Thanks,

--

Kaleb
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

[perl-CPAN-Meta-Requirements] Skip some tests on bootstrap

2012-06-01 Thread Petr Pisar
commit bd2d1f1502f9db5573f9205af2d6532ad2f3d000
Author: Petr Písař ppi...@redhat.com
Date:   Fri Jun 1 14:38:15 2012 +0200

Skip some tests on bootstrap

 perl-CPAN-Meta-Requirements.spec |   12 +++-
 1 files changed, 11 insertions(+), 1 deletions(-)
---
diff --git a/perl-CPAN-Meta-Requirements.spec b/perl-CPAN-Meta-Requirements.spec
index cea9895..3c92ad3 100644
--- a/perl-CPAN-Meta-Requirements.spec
+++ b/perl-CPAN-Meta-Requirements.spec
@@ -1,6 +1,6 @@
 Name:   perl-CPAN-Meta-Requirements
 Version:2.122
-Release:1%{?dist}
+Release:2%{?dist}
 Summary:Set of version requirements for a CPAN dist
 License:GPL+ or Artistic
 Group:  Development/Libraries
@@ -13,9 +13,12 @@ BuildRequires:  perl(File::Find)
 BuildRequires:  perl(File::Temp)
 BuildRequires:  perl(Scalar::Util)
 BuildRequires:  perl(Test::More)
+%if !%{defined perl_bootstrap}
 BuildRequires:  perl(Test::Script)
+%endif
 BuildRequires:  perl(version) = 0.77
 # for author/release tests
+%if !%{defined perl_bootstrap}
 BuildRequires:  
perl(Perl::Critic::Policy::Lax::ProhibitStringyEval::ExceptForRequire)
 BuildRequires:  perl(Pod::Coverage::TrustPod)
 BuildRequires:  perl(Pod::Wordlist::hanekomu)
@@ -27,6 +30,7 @@ BuildRequires:  perl(Test::Portability::Files)
 BuildRequires:  perl(Test::Requires)
 BuildRequires:  perl(Test::Spelling) aspell-en
 BuildRequires:  perl(Test::Version)
+%endif
 
 Requires:   perl(:MODULE_COMPAT_%(eval `%{__perl} -V:version`; echo 
$version))
 
@@ -59,6 +63,9 @@ find %{buildroot} -type f -name .packlist -exec rm -f {} \;
 %{_fixperms} %{buildroot}/*
 
 %check
+%if %{defined perl_bootstrap}
+rm -rf xt
+%endif
 make test TEST_FILES=t/*.t xt/*/*.t
 
 %files
@@ -67,6 +74,9 @@ make test TEST_FILES=t/*.t xt/*/*.t
 %{_mandir}/man3/*
 
 %changelog
+* Fri Jun 01 2012 Petr Pisar ppi...@redhat.com
+- Skip some tests on bootstrap
+
 * Mon May 07 2012 Iain Arnell iarn...@gmail.com 2.122-1
 - update to latest upstream version
 
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Re: *countable infinities only

2012-06-01 Thread Jon Ciesla
On Fri, Jun 1, 2012 at 5:36 AM, Bryn M. Reeves b...@redhat.com wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 05/31/2012 10:42 PM, Adam Williamson wrote:
 On Thu, 2012-05-31 at 15:07 -0400, Gerry Reno wrote:

 Yes, all these would currently support what I'm suggesting.
 Actually, if you're willing to flip a lot of switches, you
 could probably make your / a raid5 of floppies, but the
 performance would be suboptimal.

 -J


 Ok, now you're just being silly.

 Behold:

 http://www.wired.com/gadgetlab/2009/05/five-disk-floppy-raid-4mb-of-blistering-fast-storage/

 Hey,

 you might be joking but I used to demo MD RAID in Red Hat classes
 using a dinky little 4-port USB1 hub (with a Shadowman logo) and four
 Red Hat branded USB keys.

 Worked great :-)

Actually, with enough PCI USB port cards, USB hubs, and thumb drives,
you could use MD RAID and possibly LVM to make a poor-person's SAN.
Hot-swappable drives and all.

-J

 Regards,
 Bryn.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.12 (GNU/Linux)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

 iEYEARECAAYFAk/ImxUACgkQ6YSQoMYUY96GcgCg0Hl2mIPTJRx4wPUujN4fPVex
 fL8An1E/1Gd6DQwgzC36hXm2HFk6mCbX
 =xv75
 -END PGP SIGNATURE-
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel



-- 
http://cecinestpasunefromage.wordpress.com/

in your fear, seek only peace
in your fear, seek only love

-d. bowie
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Roman Rakus

On 05/31/2012 12:18 PM, Lennart Poettering wrote:

On Wed, 30.05.12 19:04, Garrett Holmstrom (gho...@fedoraproject.org) wrote:


If you have an explicit /tmp entry in fstab things should continue to
work the same as before. If you don't then you will now get a tmpfs on
/tmp by default.

What does an fstab entry that means, leave /tmp on the / filesystem, look
like?

See the feature page.

To turn this feature off, do:

systemctl mask tmp.mount

Lennart

Is enough to edit /etc/fstab? If not, why? Any benefits to have it 
directly in systemd?


RR
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Bryn M. Reeves
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/01/2012 01:51 PM, Jon Ciesla wrote:
 Actually, with enough PCI USB port cards, USB hubs, and thumb
 drives, you could use MD RAID and possibly LVM to make a
 poor-person's SAN. Hot-swappable drives and all.

And with LIO in the kernel you can even export it over fibre channel
or FCoE! Happy days! :)

Bryn.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/IvrEACgkQ6YSQoMYUY94nOACgszBwn4D4EHl3oWakWXx/XOMH
RpMAn2RKxav49G3/pnXx3UqK7rmcaFV8
=ndBc
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: As we develop SELinux we are adding new labels to homedir content

2012-06-01 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/01/2012 06:14 AM, Lennart Poettering wrote:
 On Thu, 31.05.12 15:44, Daniel J Walsh (dwa...@redhat.com) wrote:
 
 Heya,
 
 We have added file trans by name rules to policy to fix a lot of 
 files/directories being created with the correct label.
 
 We have problems on Distribution updates (F16-F17) though, where there is
 a files/directories in the homedir that are mislabeled.
 
 We have restorecond -u  which we run in F15/F16 which examines the
 homedir and fixes any files directories it finds mislabeled in ~.  If it
 finds a dir which is mislabeled, it will relabel the directory and all of
 its children. We have turned this tool off by default on the desktop in
 F17, because filename transition rules are doing a pretty good job of
 maintaining the labels in the homedir.  But this tool never did a great
 job of fixing mislabeled subdirs, if the top level directory in the
 homedir was labeled correctly. You can enable this tool with
 /etc/xdg/autostart/restorecond.desktop
 
 One possible fix to this would be to force a system relabel on everything
 on upgrades, while this would fix the labels, it is considered to time
 consuming. (restorecon -R -v / or touch /.autorelabel)
 
 Another option would be to just relabel /home (# restorecon -R -v /home)
 at upgrade time.  But this would also be time consuming. And would not
 catch the cases where the homedir is not in /home.
 
 I am strongly for this option. Allowing the user to login while the relabel
 is still in progress (like it would with restorecond, right?) sounds like a
 really bad idea... I mean, incorrect labels when used just lead to more
 incorrect labels, no? And incorrect labels also result in access errors?
 Both sound like something to avoid...
 
 To me it appears that preupgrade should really take care of this on all 
 Fedora release updates.
 
 If the relabelling is slow, maybe we can do something about that? Do you 
 know why it is slow? Is this more IO bound? Or is the label lookup slow and
 this is CPU bound? If the latter it might be possible to parallelize the
 relabelling?
 
 (I wouldn't care too much about homedirs outside of /home. A not in the 
 release notes for such cases should suffice)
 
 Lennart
 

Well it is slow in the same sense as find /home would be slow, restorecon is
using fts or ntfs to walk the file system and reads in the SELinux Context
(getxattr), asks SELinux what it should be labeled (matchpathcon), does a
compare, if they are different, does a setxattr on the inode.  Depends on the
number of inodes in the /home dir.

You could time it doing a restorecon -R -v /home right now, my system which
has piled up a ton of crap and exploded development pools takes nearly 2 
minutes.

time restorecon -R  /home

real1m42.677s
user0m41.747s
sys 0m39.888s


If you had Huge file systems it could take a large amount of time.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/IwAYACgkQrlYvE4MpobPrhwCgtn+VhZimc5uD6xHZoSqHwC/O
+KYAoLM0Ahv5PkumbCxT1GBU1oAL2MI7
=Qvnv
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: As we develop SELinux we are adding new labels to homedir content

2012-06-01 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/01/2012 08:10 AM, Bill Peck wrote:
 On 06/01/2012 06:14 AM, Lennart Poettering wrote:
 On Thu, 31.05.12 15:44, Daniel J Walsh (dwa...@redhat.com) wrote:
 
 Heya,
 
 We have added file trans by name rules to policy to fix a lot of 
 files/directories being created with the correct label.
 
 We have problems on Distribution updates (F16-F17) though, where there
 is a files/directories in the homedir that are mislabeled.
 
 We have restorecond -u  which we run in F15/F16 which examines the
 homedir and fixes any files directories it finds mislabeled in ~.  If
 it finds a dir which is mislabeled, it will relabel the directory and
 all of its children. We have turned this tool off by default on the
 desktop in F17, because filename transition rules are doing a pretty
 good job of maintaining the labels in the homedir.  But this tool never
 did a great job of fixing mislabeled subdirs, if the top level
 directory in the homedir was labeled correctly. You can enable this
 tool with /etc/xdg/autostart/restorecond.desktop
 
 One possible fix to this would be to force a system relabel on
 everything on upgrades, while this would fix the labels, it is
 considered to time consuming. (restorecon -R -v / or touch
 /.autorelabel)
 
 Another option would be to just relabel /home (# restorecon -R -v
 /home) at upgrade time.  But this would also be time consuming. And
 would not catch the cases where the homedir is not in /home.
 I am strongly for this option. Allowing the user to login while the 
 relabel is still in progress (like it would with restorecond, right?) 
 sounds like a really bad idea... I mean, incorrect labels when used just 
 lead to more incorrect labels, no? And incorrect labels also result in 
 access errors? Both sound like something to avoid...
 
 To me it appears that preupgrade should really take care of this on all 
 Fedora release updates.
 
 If the relabelling is slow, maybe we can do something about that? Do you 
 know why it is slow? Is this more IO bound? Or is the label lookup slow 
 and this is CPU bound? If the latter it might be possible to parallelize 
 the relabelling?
 
 (I wouldn't care too much about homedirs outside of /home. A not in the 
 release notes for such cases should suffice)
 
 Lennart
 
 
 How does this affect home dirs which are served over nfs?


It would not, restorecon checks to see if the file system supports SELinux
labels, if not it exits immediately.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/IwLkACgkQrlYvE4MpobNAAQCfS/CgjBpA/Lpa9Jq5PK836MAw
i9EAn1woncYuNKpCP8XILq1FtK3Y+PEq
=47g+
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

projectM

2012-06-01 Thread Jameson
Unfortunately, I'm no longer in a position to maintain the projectM
packages (libprojectM, libprojectM-qt, projectM-jack,
projectM-libvisual, and projectM-pulseaudio), so I will need to orphan
these.  If anyone would like to pick these up, feel free to come to me
with questions, or help.

Thanks,
=-Jameson
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Brian Wheeler


On 06/01/2012 08:12 AM, Alexey I. Froloff wrote:

my biggest problem was that tmpfs by
default allocates half of physical RAM for partition.  So I just
allocated big enough swap and added a line to /etc/fstab with
appropriate size= option.


And how is a random user supposed to know this?  So if things start 
acting up the answer is to add more swap and mess with fstab?  WTF?  So 
now any software which uses /tmp for *gasp* temporary space is now 
potentially broken depending on the size of the temporary data.


Sorry guys, this feature sucks.  The rationale was and is handwavy at 
best and none of the legitimate concerns which have been raised have 
been answered in any meaningful fashion.  There have never been any 
numbers showing the IO/power benefit claims are true.





--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
drago01 wrote:
 The advantages is that things just work (tm).

They just work as long as you don't try to actually exercise one of the 
freedoms we stand for. Or even just install an out-of-tree kernel module 
such as the ones from RPM Fusion. I don't think this is something we should 
endorse, also because our endorsement may entice M$ to change away from the 
current situation (Secure Boot optional) which is certainly a compromise 
in their eyes.

 No one will stop you (or anyone else) from disabling it.

It's as easy as setting an option in the firmware (BIOS) setup, so I don't 
see why we can't just require it from everyone.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: As we develop SELinux we are adding new labels to homedir content

2012-06-01 Thread Lennart Poettering
On Fri, 01.06.12 09:13, Daniel J Walsh (dwa...@redhat.com) wrote:

  (I wouldn't care too much about homedirs outside of /home. A not in the 
  release notes for such cases should suffice)
  
  Lennart
  
 
 Well it is slow in the same sense as find /home would be slow, restorecon is
 using fts or ntfs to walk the file system and reads in the SELinux Context
 (getxattr), asks SELinux what it should be labeled (matchpathcon), does a
 compare, if they are different, does a setxattr on the inode.  Depends on the
 number of inodes in the /home dir.
 
 You could time it doing a restorecon -R -v /home right now, my system which
 has piled up a ton of crap and exploded development pools takes nearly 2 
 minutes.
 
 time restorecon -R  /home
 
 real  1m42.677s
 user  0m41.747s
 sys   0m39.888s
 
 
 If you had Huge file systems it could take a large amount of time.

On my system here (with SSD) this appears to be CPU bound, not IO
bound. Hence optimizing this to be fully parallelized might be worth a
try?

Lennart

-- 
Lennart Poettering - Red Hat, Inc.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Kevin Kofler
Brian Wheeler wrote:
 And how is a random user supposed to know this?  So if things start
 acting up the answer is to add more swap and mess with fstab?  WTF?  So
 now any software which uses /tmp for gasp temporary space is now
 potentially broken depending on the size of the temporary data.
 
 Sorry guys, this feature sucks.  The rationale was and is handwavy at
 best and none of the legitimate concerns which have been raised have
 been answered in any meaningful fashion.  There have never been any
 numbers showing the IO/power benefit claims are true.

+1, /tmp on tmpfs is NOT helpful.

(That said, we have even bigger problems coming up with Restricted 
(Secure) Boot!)

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Matthew Miller
On Thu, May 31, 2012 at 02:59:09PM +0200, Lennart Poettering wrote:
  Well, not just FHS, but traditional usage within Red Hat and Fedora. For
  as long as I can remember, /tmp has had a 10-day retention and /var/tmp
  30-day.
  Does that matter?
 We still have 10d and 30d clean-up for that. With one addition though:
 /tmp is also flushed on reboot.

I know, but if people who want something not-ram-backed are switching to
/var/tmp, they're _also_ getting this different clean-up behavior as a
side-effect. (Different in that it went from 10 to 30.)

-- 
Matthew Miller mat...@mattdm.org
Senior Systems Architect -- Instructional  Research Computing Services
Harvard School of Engineering  Applied Sciences
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Ralf Corsepius

On 06/01/2012 02:12 PM, Alexey I. Froloff wrote:

On Fri, Jun 01, 2012 at 01:21:25PM +0200, Miloslav Trmač wrote:

Therefore, it is reasonable to assume that Fedora 18 will ship with

I certainly disagree ... this change is not reasonable.


this change, and applications need to be updated to handle the change,
or we will have a more broken Fedora 18.  Advising people not to patch
programs won't make Fedora 18 less broken at this point.

I was using /tmp on tmpfs (with $TMPDIR poining inside of /tmp)
for several years in ALT Linux.  And by use I mean build
packages using mock-like tool that creates chroots in $TMPDIR.
During all these years, my biggest problem was that tmpfs by
default allocates half of physical RAM for partition.  So I just
allocated big enough swap and added a line to /etc/fstab with
appropriate size= option.

Having /tmp on tmpfs is not THAT scary, is you ask me...


If you ask me (I did the same for some time (Fedora 13-14 era) ) the 
typical symptoms of /tmp on tmpfs are sporatic, non-deterministic 
malfunctions.


I guess is, struggling with these sporadic malfunction will become an FAQ.


Finally, using /var/tmp instead of /tmp for temporary files (c.f. the 
sort case in another thread) contradicts the primary purpose of /tmp 
on tmpfs: *speed*


In other words, moving current /tmp use-cases to /var/tmp will not gain 
you any speed-wise.


Ralf

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Gerry Reno

So everyone needs to go out and buy twice as much RAM so F18+ can run /tmp as 
tmpfs without causing memory shortfalls
for everything else they do.

That's crazy.

.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: projectM

2012-06-01 Thread Brendan Jones

On 06/01/2012 03:24 PM, Jameson wrote:

Unfortunately, I'm no longer in a position to maintain the projectM
packages (libprojectM, libprojectM-qt, projectM-jack,
projectM-libvisual, and projectM-pulseaudio), so I will need to orphan
these.  If anyone would like to pick these up, feel free to come to me
with questions, or help.

Thanks,
=-Jameson

I'll take these on.

Brendan
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Pádraig Brady
On 06/01/2012 02:47 PM, Ralf Corsepius wrote:
 On 06/01/2012 02:12 PM, Alexey I. Froloff wrote:
 On Fri, Jun 01, 2012 at 01:21:25PM +0200, Miloslav Trmač wrote:
 Therefore, it is reasonable to assume that Fedora 18 will ship with
 I certainly disagree ... this change is not reasonable.
 
 this change, and applications need to be updated to handle the change,
 or we will have a more broken Fedora 18.  Advising people not to patch
 programs won't make Fedora 18 less broken at this point.
 I was using /tmp on tmpfs (with $TMPDIR poining inside of /tmp)
 for several years in ALT Linux.  And by use I mean build
 packages using mock-like tool that creates chroots in $TMPDIR.
 During all these years, my biggest problem was that tmpfs by
 default allocates half of physical RAM for partition.  So I just
 allocated big enough swap and added a line to /etc/fstab with
 appropriate size= option.

 Having /tmp on tmpfs is not THAT scary, is you ask me...
 
 If you ask me (I did the same for some time (Fedora 13-14 era) ) the typical 
 symptoms of /tmp on tmpfs are sporatic, non-deterministic malfunctions.
 
 I guess is, struggling with these sporadic malfunction will become an FAQ.
 
 
 Finally, using /var/tmp instead of /tmp for temporary files (c.f. the sort 
 case in another thread) contradicts the primary purpose of /tmp on tmpfs: 
 *speed*
 
 In other words, moving current /tmp use-cases to /var/tmp will not gain you 
 any speed-wise.

Not all /tmp user-cases need to move to /var/tmp

sort is special in this regard in that it only uses
external files when there isn't enough RAM.
I.E. is expects it to be slower (larger).

cheers,
Pádraig.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Matthew Miller
On Thu, May 31, 2012 at 09:27:03AM -0400, Brian Wheeler wrote:
 The wiki page lists the features as:
[...]
 * /tmp is automatically flushed at boot.
 It seems like adding an rm to the startup sequence would do this with less 
 surprises.

Wait, hold on a sec. Again, not necessarily a problem but we should be clear
on this. With /tmp in RAM, it's not flushed at _boot_, but at _shutdown_
(clean or not). That may be detrimental to fixing problems (like surprise
reboots). The benefit may be worth that downside but we should at least
document the distinction.

I'm going edit the wiki but I'm not sure what exact wording should be. I
guess the *benefit* is clean /tmp on boot and discussion of the
implication should be elsewhere -- the user experience section, I think.

 The page says the user experience should barely change -- which I think is 
 really downplaying the scope of this change.

Right. I made some edits there.


-- 
Matthew Miller mat...@mattdm.org
Senior Systems Architect -- Instructional  Research Computing Services
Harvard School of Engineering  Applied Sciences
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

supercat anybody working on it?

2012-06-01 Thread Adrian Alves
Hey guys am about to package this app:
http://supercat.nosredna.net/


anybody is working on it? just for case.

Regards, Adrian.-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Alexey I. Froloff
On Fri, Jun 01, 2012 at 09:27:16AM -0400, Brian Wheeler wrote:
  my biggest problem was that tmpfs by
  default allocates half of physical RAM for partition.  So I just
  allocated big enough swap and added a line to /etc/fstab with
  appropriate size= option.
 And how is a random user supposed to know this?
In Soviet ALT Linux we didn't care about random users ;-)

In perfect world random user must be smart enough to read the
documentation.  However, this implies, that such documentation
exists and easily accessed (which at first sight is true for
Fedora).

 So if things start acting up the answer is to add more swap and
 mess with fstab?  WTF?
This is up to Release Managers.  Reasonable defaults in
installer, documentation, etc...

 So now any software which uses /tmp for *gasp* temporary space
 is now potentially broken depending on the size of the
 temporary data.
Well, no software should use /tmp directly, IMO.  There's nice
environment variable $TMPDIR.  You can always point it to
$HOME/tmp for example.  And you can always turn it off if you
really need to.

 Sorry guys, this feature sucks.
I like this feature, and there should be easy, well documented
way to turn it off.  I personally don't see a reason why it
should be off by default.

-- 
Regards,--
Sir Raorn.   --- http://thousandsofhate.blogspot.com/


signature.asc
Description: Digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

systemd: no device ever becomes pluggable

2012-06-01 Thread Thomas Sailer
I've upgraded a few machines to Fedora 17.

One of them does not boot anymore. No device ever becomes plugged, thus
systemd eventually times out waiting for the disk device
(dev-sda1.device) and drops into the emergency shell.

The device is there and accessible;
udevadm trigger --type=devices --action==add does generate add events
(as seen by udevmonitor)

Strangely, though, none of the devices have a sysfs path; also, I only
have the two disk devices mentioned in fstab, while on working machines
I have many more.

Can somebody give me a hint on what goes wrong, or on how to debug this
further?

Thanks,
Tom


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: mounted external ext4 causes high kworker cpu

2012-06-01 Thread Jeff Moyer
Chris Murphy li...@colorremedies.com writes:

 On Apr 27, 2012, at 9:53 AM, Jeff Moyer wrote:

 Chris Murphy li...@colorremedies.com writes:
 
 Normally top reports CPU line, sy at 0.4% when idle. If I format an
 external Firewire disk as btrfs and mount it, it remains at 0.4%. If I
 reformat as XFS and mount it, again top reports sy at 0.4%. However,
 if I reformat as ext4 and mount it, sy runs at 3.5%. These two
 processes are now at the top of top's results:
 
 kworker/1:2
 kworker/0:4
 
 Each uses on average 1.9% CPU. The light on the external drive flashes
 4x per second. There are no processes using the disk at all while this
 is going on. If I umount it, the pulsing stops. If I remount it, the
 pulsing resumes as does the slightly higher CPU consumption.
 
 This doesn't happen with the same hardware mounted XFS or btrfs or
 HFS+.
 
 Odd?
 
 Sounds like lazy itable init.  Try mkfs -t ext4 -E lazy_itable_init=0.

 This is happening on internal disks, targeted for Fedora
 installation. I can hear it once install is complete, still booted
 from DVD media. Is this a bug?

So long as the file system is mounted and the itable initialization is
not complete, I would expect the initialization to continue.  Does that
answer your question?

Cheers,
Jeff
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Ales Ledvinka
Hi.

Firebird sql or the name it used to have before. Not sure if it was default 
configuration or still behaves the same. But it used to do similar thing sort 
does for some queries. Anyone? Current example but shipped with F18 from that 
area?

- Original Message -
From: Pádraig Brady p...@draigbrady.com
To: Development discussions related to Fedora devel@lists.fedoraproject.org
Cc: Roberto Ragusa m...@robertoragusa.it
Sent: Thursday, May 31, 2012 12:45:36 PM
Subject: Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

On 05/31/2012 08:14 AM, Roberto Ragusa wrote:
 On 05/31/2012 02:40 AM, Lennart Poettering wrote:
 Heya!

 Please be aware that since the most recent systemd uploads /tmp is now
 in tmpfs by default in Rawhide/F18.
 [...]
 This will most likely lead to a problem or two with software that isn't
 happy about /tmp being small.
 
 For example sort.

This is a good example because `sort` algorithmically needs
something below RAM in the memory hierarchy (i.e. bigger),
but with the same persistence characteristics of /tmp.

Currently `sort` defaults to $TMPDIR or if not set '/tmp'.

Now /var/tmp should be more persistent which we don't need,
but shouldn't be an issue, but should also not be in RAM
and so is more appropriate.

So I'll patch sort to default to /var/tmp rather than /tmp.

I'm a little worried about the general availability of /var/tmp.
I know I've created distros without it at least.

For my own reference, sort does support a list of tmp dirs,
but it'll need to be tweaked to support non existent dirs:

  $ seq 10 | sort -T /foo -T /tmp -S1M
  sort: cannot create temporary file in `/foo': No such file or directory

`tac` from coreutils also needs a similar patch.

cheers,
Pádraig.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Gregory Maxwell
On Fri, Jun 1, 2012 at 9:50 AM, Gerry Reno gr...@verizon.net wrote:
 So everyone needs to go out and buy twice as much RAM so F18+ can run /tmp as 
 tmpfs without causing memory shortfalls
 for everything else they do.
 That's crazy.

Thats not true (and I've used tmpfs for tmp for years, so I'm speaking
from experience)— tmpfs is backed by swap on demand. Just add the
space that you would have used for /tmp to your swap.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Fenzi
On Fri, 1 Jun 2012 12:21:36 +0200
Michael scherer m...@zarb.org wrote:

 On Thu, May 31, 2012 at 01:55:35PM -0500, Chris Adams wrote:
  Once upon a time, Peter Jones pjo...@redhat.com said:
   That's why we didn't simply ask vendors to ship our key.  That
   would be /less/ equitable to other distributions than the
   solution we're looking at right now.
  
  Has any thought been given to setting up group between various Open
  Source distributions (Linux, BSD) to be a Secure Boot signer (with
  security-oriented rules about what gets signed, probably similar to
  whatever Microsoft is using today) and then getting vendors to
  include the master key along site Microsoft's?
 
 The last attempt to do something similar I can think of would be
 cacert. Afaik, they are still being audited to be added to Firefox,
 and i think they would be happy to explain all the issues they faced
 on that road.

Well, I'm a bit skeptical there, since they can't even license their ca
stuff such that Fedora can actually distribute it. ;( 

kevin



signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Steve Clark

On 06/01/2012 10:23 AM, Alexey I. Froloff wrote:

On Fri, Jun 01, 2012 at 09:27:16AM -0400, Brian Wheeler wrote:

my biggest problem was that tmpfs by
default allocates half of physical RAM for partition.  So I just
allocated big enough swap and added a line to /etc/fstab with
appropriate size= option.

And how is a random user supposed to know this?

In Soviet ALT Linux we didn't care about random users ;-)

In perfect world random user must be smart enough to read the
documentation.  However, this implies, that such documentation
exists and easily accessed (which at first sight is true for
Fedora).


So if things start acting up the answer is to add more swap and
mess with fstab?  WTF?

This is up to Release Managers.  Reasonable defaults in
installer, documentation, etc...


So now any software which uses /tmp for *gasp* temporary space
is now potentially broken depending on the size of the
temporary data.

Well, no software should use /tmp directly, IMO.  There's nice
environment variable $TMPDIR.  You can always point it to
$HOME/tmp for example.  And you can always turn it off if you
really need to.


Sorry guys, this feature sucks.

I like this feature, and there should be easy, well documented
way to turn it off.  I personally don't see a reason why it
should be off by default.


Since most user don't know anything about this why not leave it off and the 
sophisticated power
user can turn it on, since It is trivial to do.


--
Stephen Clark
*NetWolves*
Director of Technology
Phone: 813-579-3200
Fax: 813-882-0209
Email: steve.cl...@netwolves.com
http://www.netwolves.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Cosimo Cecchi
On Fri, 2012-06-01 at 03:14 +0200, Kevin Kofler wrote:
 Chris Adams wrote:
  - Secure boot is required to be able to be disabled on x86 (the only
  platform Fedora will support it).
 
 And this is exactly why we should just require our users to disable it!

I don't want to jump in the technicality of this discussion, but I can
only hope any solution that *requires* users to fiddle with BIOS
settings in order to install Fedora won't be seriously considered as
viable.

Regards,
Cosimo

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Richard W.M. Jones
On Fri, Jun 01, 2012 at 11:05:26AM -0400, Gregory Maxwell wrote:
 On Fri, Jun 1, 2012 at 9:50 AM, Gerry Reno gr...@verizon.net wrote:
  So everyone needs to go out and buy twice as much RAM so F18+ can run /tmp 
  as tmpfs without causing memory shortfalls
  for everything else they do.
  That's crazy.
 
 Thats not true (and I've used tmpfs for tmp for years, so I'm speaking
 from experience)— tmpfs is backed by swap on demand. Just add the
 space that you would have used for /tmp to your swap.

The *default* limit for tmpfs is half of physical RAM (swap is not
counted).  So *if* tmp-on-tmpfs is left at the defaults then
increasing physical RAM might be necessary.  I haven't bothered to
look at how tmp-on-tmpfs is implemented in systemd though.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://et.redhat.com/~rjones/virt-top
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Gerry Reno
On 06/01/2012 11:05 AM, Gregory Maxwell wrote:
 On Fri, Jun 1, 2012 at 9:50 AM, Gerry Reno gr...@verizon.net wrote:
 So everyone needs to go out and buy twice as much RAM so F18+ can run /tmp 
 as tmpfs without causing memory shortfalls
 for everything else they do.
 That's crazy.
 Thats not true (and I've used tmpfs for tmp for years, so I'm speaking
 from experience)— tmpfs is backed by swap on demand. Just add the
 space that you would have used for /tmp to your swap.

Wait a minute.  Back in this thread it says that half of RAM is allocated to 
the tmpfs for /tmp.

Plus the purported benefit from this is causing less write cycles on SSD.  (See 
Wiki page)

That may have been a benefit a few years ago but newer SSD's will gain almost 
nothing from this because of the enormous
number of write cycles they handle.


This feature may have some benefits but I think they are infinitesimally 
small.

.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Gerry Reno
On 06/01/2012 11:18 AM, Cosimo Cecchi wrote:
 On Fri, 2012-06-01 at 03:14 +0200, Kevin Kofler wrote:
 Chris Adams wrote:
 - Secure boot is required to be able to be disabled on x86 (the only
 platform Fedora will support it).
 And this is exactly why we should just require our users to disable it!
 I don't want to jump in the technicality of this discussion, but I can
 only hope any solution that *requires* users to fiddle with BIOS
 settings in order to install Fedora won't be seriously considered as
 viable.

 Regards,
 Cosimo


The better solution would be for users for want SecureBoot to have to set it in 
the BIOS.  It should be disabled by default.

Windows is the OS with all the attack vectors open.   Users of every other OS 
should not be hostage to this SecureBoot
by default.


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Brian Wheeler



On 06/01/2012 10:23 AM, Alexey I. Froloff wrote:

On Fri, Jun 01, 2012 at 09:27:16AM -0400, Brian Wheeler wrote:

my biggest problem was that tmpfs by
default allocates half of physical RAM for partition.  So I just
allocated big enough swap and added a line to /etc/fstab with
appropriate size= option.

And how is a random user supposed to know this?

In Soviet ALT Linux we didn't care about random users ;-)

So that means that random users care about YOU!


In perfect world random user must be smart enough to read the
documentation.  However, this implies, that such documentation
exists and easily accessed (which at first sight is true for
Fedora).


Sure.  When there's mystery problems , who is going to think oh yeah, 
/tmp is in ram now and chrome just wrote a big temp file...better go 
look up how to add swap?  I'm going to guess 'nearly nobody'



So if things start acting up the answer is to add more swap and
mess with fstab?  WTF?

This is up to Release Managers.  Reasonable defaults in
installer, documentation, etc...



The thing is, the amount of reasonable swap is now not a function of 
just RAM overflow but also /tmp usage -- which is something that can 
vary dramatically at runtime.



So now any software which uses /tmp for *gasp* temporary space
is now potentially broken depending on the size of the
temporary data.

Well, no software should use /tmp directly, IMO.  There's nice
environment variable $TMPDIR.  You can always point it to
$HOME/tmp for example.  And you can always turn it off if you
really need to.


Sure, no software _should_ use it directly, but it happens a lot...and 
not in packages which are in the repo:  home grown and third party.   
Additionally, there's 20+ years of habit to break for a lot of people 
and that's not something you can easily patch.  Running things like 
grep \\ 404\  apache.log  /tmp/404s.log is pretty ingrained for many 
people.


I'll probably turn it off because I've been down this road with Solaris 
and it sucked.  I will grant that the linux implementation is better, 
but I want RAM to be used for the running software and if its not being 
used for that, caching what's actively being used.



Sorry guys, this feature sucks.

I like this feature, and there should be easy, well documented
way to turn it off.  I personally don't see a reason why it
should be off by default.



Well, since I'm probably going to turn it off, can someone give me a 
good reason why it should be turned _on_ by default?  For me, the 
Benefit to Fedora bullets are not compelling.


--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Gregory Maxwell
On Fri, Jun 1, 2012 at 11:27 AM, Gerry Reno gr...@verizon.net wrote:
 Wait a minute.  Back in this thread it says that half of RAM is allocated to 
 the tmpfs for /tmp.
 Plus the purported benefit from this is causing less write cycles on SSD.  
 (See Wiki page)
 That may have been a benefit a few years ago but newer SSD's will gain almost 
 nothing from this because of the enormous
 number of write cycles they handle.

You're not understanding the word allocate in the same way it
actually behaves.  It does not reserve memory. The default maximum
size (think of it as a quota) of a tmpfs mount is half whatever amount
of actual ram you have. You can expand or shrink a tmpfs mount using
the size= mount option.

Memory is not actually used until things are stored there, and if the
result is memory pressure the kernel will intelligently page out the
least used pages. (e.g. tmp files that haven't been accessed in a long
time, or inactive application memory instead of an actively accessed
file on tmp), per the normal vm policy.

Because that disk activity only happens when the kernel decides that
it wants the memory for something else it doesn't happen at all in a
great many cases especially for short lived files.

 This feature may have some benefits but I think they are infinitesimally 
 small.

The feature may be adopted/promoted on the basis of SSD writecycle
preservation, but tmpfs also offers considerable performance
improvements for workloads that create/remove files in /tmp at high
speed— which is the reason that many people have been using tmpfs for
/tmp on many systems for much longer than SSDs have existed.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Chris Adams
Once upon a time, Gerry Reno gr...@verizon.net said:
 Wait a minute.  Back in this thread it says that half of RAM is allocated to 
 the tmpfs for /tmp.

Not exactly.  The default size limit for a tmpfs mount is half of RAM;
the RAM is not allocated exclusively to the tmpfs.  The files in a tmpfs
mount live in the page cache and can be swapped out if needed.

-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Jesse Keating

On 06/01/2012 08:30 AM, Gerry Reno wrote:

The better solution would be for users for want SecureBoot to have to
set it in the BIOS.  It should be disabled by default.

Windows is the OS with all the attack vectors open.   Users of every
other OS should not be hostage to this SecureBoot by default.


You say this as if we have any control over this, whatsoever.  The vast 
majority of PCs on the market are designed to run Windows.  They come 
with Windows pre-installed.  In order to come with Windows 8 
pre-installed, they will have to enable secure boot at the factory. 
There is no stopping this.


--
Jesse Keating
Fedora -- Freedom² is a feature!
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Cosimo Cecchi wrote:
 I don't want to jump in the technicality of this discussion, but I can
 only hope any solution that requires users to fiddle with BIOS
 settings in order to install Fedora won't be seriously considered as
 viable.

Sorry, but it's the ONLY viable solution. Any solution that removes users' 
freedom (and that's the case of ANY solution which leaves Secure Boot 
enabled) cannot be seriously considered as viable.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Richard W.M. Jones
On Fri, Jun 01, 2012 at 03:35:45PM +0200, Kevin Kofler wrote:
 (That said, we have even bigger problems coming up with Restricted 
 (Secure) Boot!)

To be fair, this problem is not one of our own doing.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://et.redhat.com/~rjones/virt-top
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Alexey I. Froloff
On Fri, Jun 01, 2012 at 11:27:01AM -0400, Gerry Reno wrote:
 Wait a minute.  Back in this thread it says that half of RAM is
 allocated to the tmpfs for /tmp.
No-no-no!  Default tmpfs size is half of physical RAM, that's
all.  That doesn't mean that is stays in RAM forever.

$ df -h /tmp
Filesystem  Size  Used Avail Use% Mounted on
tmpfs24G  1.9M   24G   1% /tmp
$ free -m
 total   used   free sharedbuffers cached
Mem: 15987  14653   1333  0328   8402
-/+ buffers/cache:   5922  10065
Swap:31251 55  31196

$ dd if=/dev/zero of=/tmp/file bs=1M count=10240
10240+0 records in
10240+0 records out
10737418240 bytes (11 GB) copied, 9.02507 s, 1.2 GB/s
$ df -h /tmp
Filesystem  Size  Used Avail Use% Mounted on
tmpfs24G   11G   14G  42% /tmp
$ free -m
 total   used   free sharedbuffers cached
Mem: 15987  15892 95  0 13  10105
-/+ buffers/cache:   5773  10213
Swap:31251   1464  29787

$ dd if=/dev/zero of=/tmp/enother-file bs=1M count=10240 
10240+0 records in
10240+0 records out
10737418240 bytes (11 GB) copied, 57.2924 s, 187 MB/s
$ free -m   
 total   used   free sharedbuffers cached
Mem: 15987  15886100  0  4  10251
-/+ buffers/cache:   5630  10357
Swap:31251  10482  20769

$ rm -f /tmp/file /tmp/enother-file 
$ df -h /tmp
Filesystem  Size  Used Avail Use% Mounted on
tmpfs24G  1.9M   24G   1% /tmp
$ free -m  
 total   used   free sharedbuffers cached
Mem: 15987   5718  10268  0  5146
-/+ buffers/cache:   5566  10420
Swap:31251108  31143


-- 
Regards,--
Sir Raorn.   --- http://thousandsofhate.blogspot.com/


signature.asc
Description: Digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Brian Wheeler



On 06/01/2012 11:35 AM, Gregory Maxwell wrote:

Because that disk activity only happens when the kernel decides that
it wants the memory for something else it doesn't happen at all in a
great many cases especially for short lived files.

...

The feature may be adopted/promoted on the basis of SSD writecycle
preservation, but tmpfs also offers considerable performance
improvements for workloads that create/remove files in /tmp at high
speed— which is the reason that many people have been using tmpfs for
/tmp on many systems for much longer than SSDs have existed.


Um, aren't both of those benefits the same as one would get when using 
ext4's delayed allocation?


Does anyone have any actual numbers for the performance increase?  I've 
never seen any numbers, but I've heard the claim repeatedly.

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Chris Adams
Once upon a time, Gerry Reno gr...@verizon.net said:
 The better solution would be for users for want SecureBoot to have to set it 
 in the BIOS.  It should be disabled by default.
 
 Windows is the OS with all the attack vectors open.   Users of every other OS 
 should not be hostage to this SecureBoot
 by default.

As has been repeatedly shown, Windows is the common attack vector in
large part because it is the widest deployed system, and users (of any
OS) are idiots that will click Ok if you give them a pop-up that says
I'm going to delete all your files right now.

Linux gets a high number of attacks as well, but mostly in the server
space today (password scanning on SSH, POP3, IMAP, SMTP AUTH, and common
web hosting control panels such as Plesk and cPanel).  PHP and common
PHP packages (such as phpBB) have had vulnerabilities that get leveraged
to attack the underlying OS.

There's a reason Fedora has things like chkrootkit and rkhunter.

-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Gerry Reno wrote:
 The better solution would be for users for want SecureBoot to have to set
 it in the BIOS.  It should be disabled by default.
 
 Windows is the OS with all the attack vectors open.   Users of every other
 OS should not be hostage to this SecureBoot by default.

While I couldn't agree more, unfortunately, that isn't up to us to decide. 
The decision is theoretically up to the hardware vendors, and in practice 
their hands are tied by M$'s logo requirements.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Chris Adams
Once upon a time, Brian Wheeler bdwhe...@indiana.edu said:
 Um, aren't both of those benefits the same as one would get when using 
 ext4's delayed allocation?

Delayed allocation still has to flush metadata changes to storage
regularly as well as possibly read metadata from storage to find
available inodes, while tmpfs only has to touch storage under pressure
from high RAM utilization.

-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread drago01
On Fri, Jun 1, 2012 at 3:30 PM, Kevin Kofler kevin.kof...@chello.at wrote:
 drago01 wrote:
 The advantages is that things just work (tm).

 They just work as long as you don't try to actually exercise one of the
 freedoms we stand for.

Which one?

 Or even just install an out-of-tree kernel module
 such as the ones from RPM Fusion.

You can disable secure boot (unless we find a better solution) ...
adding secure boot support won't make this any harder.

 I don't think this is something we should
 endorse, also because our endorsement may entice M$ to change away from the
 current situation (Secure Boot optional) which is certainly a compromise
 in their eyes.

I doubt that but well we both can't know that beforehand so this point is moot.

 No one will stop you (or anyone else) from disabling it.

 It's as easy as setting an option in the firmware (BIOS) setup, so I don't
 see why we can't just require it from everyone.

It is easy for you, for me, for pretty much everyone on this mailing
list but there are different types of users out there.
And you effectively want to limit those users to a proprietary OS
(they cannot even try our live images anymore).
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: supercat anybody working on it?

2012-06-01 Thread Richard W.M. Jones
On Fri, Jun 01, 2012 at 11:15:06AM -0300, Adrian Alves wrote:
 Hey guys am about to package this app:
 http://supercat.nosredna.net/
 
 anybody is working on it? just for case.

No, at least they haven't filed any review bugs in Bugzilla:

https://bugzilla.redhat.com/buglist.cgi?quicksearch=ALL+supercat

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://et.redhat.com/~rjones/virt-top
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Alexey I. Froloff
On Fri, Jun 01, 2012 at 11:31:21AM -0400, Brian Wheeler wrote:
 Well, since I'm probably going to turn it off, can someone give me a 
 good reason why it should be turned _on_ by default?  For me, the 
 Benefit to Fedora bullets are not compelling.
One good reason is to separate /tmp from /.  When choosing
between failed sort and failed passwd (or anything else, that
modifies files in /), both because of No space left on device
error I prefer failed sort and working passwd.

And tmpfs is faster than any other filesystem, and easily resized
both ways.

-- 
Regards,--
Sir Raorn.   --- http://thousandsofhate.blogspot.com/


signature.asc
Description: Digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread drago01
On Fri, Jun 1, 2012 at 5:40 PM, Kevin Kofler kevin.kof...@chello.at wrote:
 Cosimo Cecchi wrote:
 I don't want to jump in the technicality of this discussion, but I can
 only hope any solution that requires users to fiddle with BIOS
 settings in order to install Fedora won't be seriously considered as
 viable.

 Sorry, but it's the ONLY viable solution. Any solution that removes users'
 freedom (and that's the case of ANY solution which leaves Secure Boot
 enabled) cannot be seriously considered as viable.

Secureboot support does *NOT* limit your freedom as long as it is
optional (the default setting does not matter).

You are either making more complex for everyone or for those that want
do develop kernel development, run out of tree drivers etc.

In case enabled secureboot is the only option (i.e we somehow refuse
to boot with it disabled) then (and only then) you can talk about
removed freedom otherwise this is just FUD.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reminder: Fedora 15 end of life on 2012-06-26

2012-06-01 Thread Dennis Gilmore
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Greetings. 

This is a reminder email about the end of life process for Fedora 15. 

Fedora 15 will reach end of life on 2012-06-26, and no further updates
will be pushed out after that time. Additionally, with the recent
release of Fedora 17, no new packages will be added to the Fedora 15
collection. 

Please see http://fedoraproject.org/wiki/DistributionUpgrades for more
information on upgrading from Fedora 15 to a newer release. 


Dennis
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.18 (GNU/Linux)

iEYEARECAAYFAk/Hs9cACgkQkSxm47BaWfdD0ACfe3hnA637Qb+TRFy9pbe3ZekH
MxwAnRNKH5/CfWmfTEp4Jd1eltOuQKdQ
=NRnZ
-END PGP SIGNATURE-
___
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: another upgrade, another disaster

2012-06-01 Thread Reindl Harald


Am 01.06.2012 11:25, schrieb Michal Schmidt:
 On 06/01/2012 10:37 AM, Caterpillar wrote:
 Please apologize me, but if #820340 was not a showstopper, so which bug
 should be a showstopper?
 
 The bug
  * does not cause data loss
  * is easy to recover from

for you and for me
not for the majority of users

  * seems to be fixable with an update

how do you do the update if your system does not boot?
it is not sure that a kernel from the oldr release boots

 = Not what I'd call a showstopper

depends on the point of view

at a minimum it should be granted that the kernel of the new
distribution version is the default after dist-upgrade



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Reindl Harald


Am 01.06.2012 16:23, schrieb Alexey I. Froloff:

 Sorry guys, this feature sucks.
 I like this feature, and there should be easy, well documented
 way to turn it off.  I personally don't see a reason why it
 should be off by default

so you can add 1 line to /etc/fstab since many years
this feature is another having solution, searching for problem

DO NOT SPIT USELESS DATA IN MY RAM PER DEFAULT BECAUSE RAM
IS EXPENSIVE STORAGE AND USED FOR BETTER THINGS

but why forcing majority of users do the same to get
a usefull behavior? it is not smart to waste RAM with
temp-data and force every software with large temp-data
to get fixed write it somewhere else

 Well, no software should use /tmp directly, IMO.  There's nice
 environment variable $TMPDIR.

what does this change?

finally most software will be fixed to not use it at
all and spit in /var/tmp and render /tmp useless

for many years it was a perfect setup to make a own partition
or use in case of virtual machines even a own vdisk for /tmp
because there can be large data which you do not
want on a 4 GB small / and now the defaults are changed
to spit tmp-data in the root-fs

yes, powerusers can change this (and will) as also they could
use tmpfs all over the time - but it is a wrong DEFAULT




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Reindl Harald


Am 31.05.2012 12:45, schrieb Pádraig Brady:
 Currently `sort` defaults to $TMPDIR or if not set '/tmp'.
 
 Now /var/tmp should be more persistent which we don't need,
 but shouldn't be an issue, but should also not be in RAM
 and so is more appropriate.
 
 So I'll patch sort to default to /var/tmp rather than /tmp

thank you for breaking setups of well thought virtual machines
on expensive SAN storages with a as small as possible rootfs
with a own virtual disk for /tmp with new defaults

in such setups the new behavior results in a full rootfs

also having many virtual machines on a host means you
try to allocate as less as possible RAM for each of them
which makes the new defaults unuseable and no swapping
is not smart in context of virualization

/tmp in RAm is another change for the sake of the change



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Reindl Harald


Am 01.06.2012 17:05, schrieb Gregory Maxwell:
 On Fri, Jun 1, 2012 at 9:50 AM, Gerry Reno gr...@verizon.net wrote:
 So everyone needs to go out and buy twice as much RAM so F18+ can run /tmp 
 as tmpfs without causing memory shortfalls
 for everything else they do.
 That's crazy.
 
 Thats not true (and I've used tmpfs for tmp for years, so I'm speaking
 from experience)— tmpfs is backed by swap on demand. Just add the
 space that you would have used for /tmp to your swap

well designed machines do NOT swap and have not alligend
swap at all - in the case of virtualization you MUST NOT
enforce swapping if you really like perofrmance

even in 100 years there will be installations of people
having 50,80,100 or more vurtual machine son a host and
try to allocate only needed ressourcs

wasting RAM a a default is only bad in such cases

but however, since most packagers starting to move all
their temp stuff to /var/tmp we well not noitice any
changes except that you have to mount the tmp-vdisk
to /var/tmp istead /tmp



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Reindl Harald


Am 01.06.2012 17:35, schrieb Gregory Maxwell:
 The feature may be adopted/promoted on the basis of SSD writecycle
 preservation, but tmpfs also offers considerable performance
 improvements for workloads that create/remove files in /tmp at high
 speed— which is the reason that many people have been using tmpfs for
 /tmp on many systems for much longer than SSDs have existed

pff and this is a generic worklaod for MAJORITY of the user-base?
no? hmm wait a minute...

if it is not why should DEFAULTS are changed and a unknown amount
of packages broken/fixed/patched to no longer touch /tmp and
blow all temorary stuff to /var/tmp

the MINORITY can add the line in /etc/fstab since ten years and be
happy as all the time before - the rest does not need it or is even
hurted by the change

what currently happens is that based on a exotic workload majority
of users and packagers are forced to act in a way few people
thought may be nice



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Reindl Harald


Am 01.06.2012 17:44, schrieb Gerry Reno:
 Well, I don't have any workloads that are doing high-speed create/remove of 
 file in /tmp.
 And I don't think most people have any of those types of workloads either.
 
 Wouldn't it make sense that people with those types of workloads could enable 
 /tmp on tmpfs?   
 Rather than making it the default for everyone.

they can since many years, now all others have to learn how
fix back the setup for their workloads

echo tmpfs  /tmp  tmpfs  defaults,noatime,nodiratime,noexec,size=500m  
/etc/fstab

changes in fedora are often not for the userbase
they are often only for the sake of the change



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Reindl Harald


Am 01.06.2012 17:52, schrieb Alexey I. Froloff:
 One good reason is to separate /tmp from /.  When choosing
 between failed sort and failed passwd (or anything else, that
 modifies files in /), both because of No space left on device
 error I prefer failed sort and working passwd.

and exatly the opposite happens for systems which
are well designed and have a seperate /tmp because
as side-effect of this feature all osrt of
applications are patched to spit their stuff
to /var/tmp and back to rootfs

does nobody of the feautre owners realize that this
is not smart nor bring any benefit at all?



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Gerry Reno
On 06/01/2012 11:52 AM, Alexey I. Froloff wrote:
 On Fri, Jun 01, 2012 at 11:31:21AM -0400, Brian Wheeler wrote:
 Well, since I'm probably going to turn it off, can someone give me a 
 good reason why it should be turned _on_ by default?  For me, the 
 Benefit to Fedora bullets are not compelling.
 One good reason is to separate /tmp from /.  When choosing
 between failed sort and failed passwd (or anything else, that
 modifies files in /), both because of No space left on device
 error I prefer failed sort and working passwd.

 And tmpfs is faster than any other filesystem, and easily resized
 both ways.

Has anyone even done any real testing of this across the spectrum of 
installation types?

How is this going to affect VM installations where RAM and swap is usually very 
minimal levels?  256mb or 512mb in many
instances.

.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Gregory Maxwell wrote:
 My understanding is that some of the relevant legal minds believe that
 Microsoft's you can disable it concession forecloses the possibility
 of a successful legal attack on this— the law may care about the
 anti-competativeness of this stuff, but not so much as to care about a
 $99 signing key or some minor install time hurdle. (and the fact that
 fedora is willing to plan this probably justifies this position).
 
 It was arguably a strategic error to blow the whistle in advance and
 give Microsoft time to compromise. Their first attempt was much more
 likely to have created a civil cause of action as well as to have run
 afoul on antitrust grounds.   But I can hardly blame anyone for
 trying.  Hindsight 20/20 and all that.

If having the option to disable the crap even if it's enabled by default is 
sufficient to not be anti-competitive, then they would have done just that 
after being sued. So I don't think letting them go the most restrictive 
possible way and then sueing would have been any more effective than what 
actually happened.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Chris Adams
Once upon a time, Reindl Harald h.rei...@thelounge.net said:
 DO NOT SPIT USELESS DATA IN MY RAM PER DEFAULT BECAUSE RAM
 IS EXPENSIVE STORAGE AND USED FOR BETTER THINGS

Actually, the data written to /tmp _always_ goes through the page cache
and is held in RAM (at least for a bit).  Since many things in /tmp are
short-lived, they'll stay in the page cache for life.  The difference
between /tmp-on-storage and /tmp-on-tmpfs is that tmpfs has no overhead
for reading metadata from storage, allocating space, flushing updated
metadata, etc.; the files just only exist in the same page cache they
would have been in all along.

-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Cosimo Cecchi
On Fri, 2012-06-01 at 17:54 +0200, drago01 wrote:
 On Fri, Jun 1, 2012 at 5:40 PM, Kevin Kofler kevin.kof...@chello.at wrote:
  Cosimo Cecchi wrote:
  I don't want to jump in the technicality of this discussion, but I can
  only hope any solution that requires users to fiddle with BIOS
  settings in order to install Fedora won't be seriously considered as
  viable.
 
  Sorry, but it's the ONLY viable solution. Any solution that removes users'
  freedom (and that's the case of ANY solution which leaves Secure Boot
  enabled) cannot be seriously considered as viable.
 
 Secureboot support does *NOT* limit your freedom as long as it is
 optional (the default setting does not matter).

The point I'm trying to make is the default setting might actually be
the most important thing that matters when it comes to new users that
want to install Fedora.

- You need to disable SecureBoot in the BIOS settings in order to
install Fedora
- BIOS settings? What's that? Oh a blueish DOS-like command-line thing?
Freaky. Disable SecureBoot? Why on earth would I want to make my system
less secure? *screw this Linux thing*

Cosimo

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Chris Adams
Once upon a time, Reindl Harald h.rei...@thelounge.net said:
 thank you for breaking setups of well thought virtual machines
 on expensive SAN storages with a as small as possible rootfs
 with a own virtual disk for /tmp with new defaults

If you are mounting a filesystem on /tmp, it'll be in /etc/fstab and
still work exactly as before (if not, that's a bug and should be treated
as such).

-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Peter Jones wrote:
 Next year if we don't implement some form of Secure Boot support, the
 majority of Fedora users will not be able to install Fedora on new
 machines.

Nonsense. They will be able to install it very easily, they just need to set 
a single boolean in their BIOS setup from Enabled to Disabled.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: systemd: no device ever becomes pluggable

2012-06-01 Thread Lennart Poettering
On Fri, 01.06.12 16:25, Thomas Sailer (sai...@sailer.dynip.lugs.ch) wrote:

 I've upgraded a few machines to Fedora 17.
 
 One of them does not boot anymore. No device ever becomes plugged, thus
 systemd eventually times out waiting for the disk device
 (dev-sda1.device) and drops into the emergency shell.
 
 The device is there and accessible;
 udevadm trigger --type=devices --action==add does generate add events
 (as seen by udevmonitor)
 
 Strangely, though, none of the devices have a sysfs path; also, I only
 have the two disk devices mentioned in fstab, while on working machines
 I have many more.
 
 Can somebody give me a hint on what goes wrong, or on how to debug this
 further?

Does udev properly start up? Do you see the systemd tag in the output
of udevadm info -qall -p/sys/class/block/sda1?

Lennart

-- 
Lennart Poettering - Red Hat, Inc.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Peter Jones wrote:
 Nothing is being swept under the rug here. You have the same access to the
 mailing list as I do. We're looking for ideas, and we're putting forth a
 plan that we're willing to implement. If you can come up with a better
 idea, that would be wonderful.

The better idea is the obvious one: Just have your users disable the crappy 
feature in their firmware. (It's required to be optional even my M$.)

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Andrew McNabb
On Fri, Jun 01, 2012 at 11:44:12AM -0400, Gerry Reno wrote:
 
 Well, I don't have any workloads that are doing high-speed create/remove of 
 file in /tmp.
 
 And I don't think most people have any of those types of workloads either.

I do, but ext4 handles my workload marvelously.  For high-speed
create/remove, /tmp appears as though it were a tmpfs without any of the
drawbacks.  The details of performance probably depend on each
individual workload, but it would be nice to see evidence that tmpfs is
really a noticeable benefit for a variety of workloads.

 Wouldn't it make sense that people with those types of workloads could enable 
 /tmp on tmpfs?   
 
 Rather than making it the default for everyone.

That seems like a very reasonable approach, and if tmpfs turns out to be
an obvious improvement for most users, then the default could be
reconsidered in the future.

--
Andrew McNabb
http://www.mcnabbs.org/andrew/
PGP Fingerprint: 8A17 B57C 6879 1863 DE55  8012 AB4D 6098 8826 6868
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Tom Callaway
On 06/01/2012 11:30 AM, Gerry Reno wrote:

 The better solution would be for users for want SecureBoot to have to set it 
 in the BIOS.  It should be disabled by default.

I do not disagree with you. Microsoft does. They have the influence over
the hardware OEMs. We do not. They are forcing the OEMs to enable it by
default.

Feel free to tell your OEM vendor to disable it by default. They will
not get that hardware Windows 8 Certified, won't be able to OEM preload
Windows 8 on it, if they disable it by default. Who do you think they
are going to go with at the end of the day?

Now, let us operate on the assumption that SecureBoot is enabled by
default, and that the majority of PCs are going to come with Windows 8
pre-installed.

Do we want to support dual-booting with Windows 8? Microsoft describes
SecureBoot enablement as Required for Windows 8 client [1]? What does
that mean? We're not sure. At best, it means that BitLocker isn't going
to work, at worst, big chunks of Windows 8 functionality will simply
refuse to function until you turn SecureBoot back on.

Microsoft isn't even planning on supporting dual-booting of Windows 7
and Windows 8:

If you are dual booting, it depends on whether you are booting into
another trusted operating system, van der Hoeven said. One discussion we
are having is…[with] this first firmware OK boot manager OK handshake,
you can't have a version of that that works with Windows 7. Windows 7
doesn't have the ability to check firmware. The firmware can check and
make sure it is assigned a Windows 7 boot loader. Truly, right now
today, if you want to have secure boot and you want to dual boot Windows
8 and Windows 7, you need to turn secure boot off in firmware. We are
thinking about having a way that you can go ahead and make that work,
but that's not POR [plan of record] today. [2]

So, if we want to be able to provide a dual-boot configuration with
Windows 8 (fully functional) and Fedora, how do we do it? Matthew has
come up with a way.

And if you don't care about dual-booting or SecureBoot, turn it off in
the UEFI Firmware, and Fedora continues to work just as it did before.
It's not an all-or-nothing approach. But I think it is short-sighted
(and arrogant of us) to simply say to people who have no idea what UEFI
stands for, Hey, this Fedora isn't for you, go find someone smart
enough to help you.

We include wireless device firmware even though it isn't free. And we
don't like doing that, but it is the only way to get wireless support
out of the box in Fedora.

We're proposing providing a signed bootloader to enable Fedora to run in
SecureBoot environments, even though it is immensely distasteful and
questionably non-free. And we don't like doing that, but it is the only
way we've come up with to get Fedora support out of the box on the next
generation of hardware.

If you can come up with a better way to boot Fedora on SecureBoot
enabled hardware, we're all listening.

~tom

==
Fedora Project

[1]: http://video.ch9.ms/build/2011/slides/HW-457T_van_der_Hoeven.pptx
[2]:
http://redmondmag.com/articles/2011/09/23/windows-8-dual-boot-possible-if-secure-boot-disabled.aspx
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Gerry Reno
On 06/01/2012 12:07 PM, Kevin Kofler wrote:
 Peter Jones wrote:
 Next year if we don't implement some form of Secure Boot support, the
 majority of Fedora users will not be able to install Fedora on new
 machines.
 Nonsense. They will be able to install it very easily, they just need to set 
 a single boolean in their BIOS setup from Enabled to Disabled.

 Kevin Kofler



And what happens to all the people who now dual-boot both Linux and Windows.

How can you boot Windows w/SecureBoot  and  Linux w/o SecureBoot?

.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Peter Jones wrote:

 On 05/31/2012 11:47 AM, Gregory Maxwell wrote:
 Is this all set in stone?

 No. We've spent some time thinking about all of this and are happy that
 we
 can  implement it in the Fedora 18 timescale, but there's always the
 possibility that we've missed something or that a new idea will come up.
 If we can increase user freedom without making awful compromises
 somewhere else then we'll do it.
 
 This, I believe, is Matthew's way of saying that this is not all set in
 stone, and that we'd encourage you to come up with better ideas because we
 don't like this all that much.

But why are you making this decision in the first place?

This:
1. is a technical decision which affects the entirety of Fedora, and thus 
MUST go through a FESCo vote to be implemented, AND
2. affects the core values of Fedora, and thus MUST go through a Board vote 
to be implemented.

It is not acceptable that the kernel and GRUB maintainers are trying to 
sneak this in through the backdoor with no mandate whatsoever from our 
governance structure.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Simo Sorce
On Fri, 2012-06-01 at 11:02 -0500, Chris Adams wrote:
 Once upon a time, Reindl Harald h.rei...@thelounge.net said:
  thank you for breaking setups of well thought virtual machines
  on expensive SAN storages with a as small as possible rootfs
  with a own virtual disk for /tmp with new defaults
 
 If you are mounting a filesystem on /tmp, it'll be in /etc/fstab and
 still work exactly as before (if not, that's a bug and should be treated
 as such).

Chris, the problem is that now you have to add a /tmp filesystem,
before /tmp was just a normal directory in root.

It means that for fedora 18 upward but not for any other you now have to
remember to go and change this default, because honestly /tmp in RAM for
a virtual machine is just stupid if you end up using the swap file (btw
I disable the swap on my machine often exactly to avoid having the
machine trashing and using swap, when I really do not need it to).

It may be a good idea for beefy single user laptops but for anything
else it is probably more a regression than help as moving stuff from a
normal file system to swap is just going to add memory pressure to the
kernel and nothing else.

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: Action required: Rawhide: /tmp is now on tmpfs

2012-06-01 Thread DJ Delorie

I'm going to chime in once to add my thoughts...  It's already way too
late for me to influence the decision (first I heard of it is it's
decided) so my only recourse is to add it to the long list of things
I have to undo after installing Fedora.

 Sorry guys, this feature sucks.

+1 on this feature sucks.  Perhaps not for the same reasons.  It's
mostly for this one:

 And how is a random user supposed to know this?

I think any time we make a fundamental change without making the user
aware of this change and CHOOSING it, we have failed the user.  How to
fix this?  I don't know, but perhaps...

* Install should ask the user what they want.  Since /tmp needs to be
  set up early, it needs to be done in initrd anyway.

* some post-install GUI/TUI that says the following systematic
  changes are now available, please decide if you want them

* other ideas

A note from the About Fedora web page:

We also believe in empowering others to . . .

These choices are being made without empowering the users at all,
since the changes happen without warning them, advising them, or
letting them choose beforehand.  IMHO this is the wrong way to do it.

It seems to me this is part of a larger pattern: Fedora (or upstream)
announces that some major change has been decided.  There is a heated
debate over whether it was a good idea or not.  Nothing changes.  Is
this the new Fedora process?  Force change on users then ignore their
complaints?  That seems to be my Fedora-user experience.

Also, anyone who says they should read the documentation is
delusional.  They don't read it.

 So everyone needs to go out and buy twice as much RAM so F18+ can
 run /tmp as tmpfs without causing memory shortfalls for everything
 else they do.

My system is already maxxed out on RAM, I can't buy any more, and
*yes* I need that RAM to be process RAM:

 total   used   free sharedbuffers cached
Mem:  24739484   198151804924304  046007521428024
-/+ buffers/cache:   13786404   10953080
Swap:  2056312 8160721240240

 With /tmp in RAM, it's not flushed at _boot_, but at _shutdown_

Losing /tmp on system crashes makes it harder to diagnose them, if
there's information in /tmp relevent to the crash.  There have been
*lots* of time I've gone digging through /tmp looking for some interim
file that turned out to be not so temporary.

 Just add the space that you would have used for /tmp to your swap.

My /tmp (/) is 1.2TB (It will be 3TB after this weekend's upgrade).
It's unrealistic to add that much swap.  Yes, I've had times when I
need lots of /tmp space, and I don't want to flush my I/O buffers or
running programs to get it.  I/O buffers are more important to me than
/tmp speed.

Has anyone even compared the performance of tmpfs-on-swap vs
tmp-on-ext?  I'm contemplating *removing* my swap because the system
slows to a crawl anytime swap is needed.  If tmp is on swap, how is
process performance affected?

 The *default* limit for tmpfs is half of physical RAM

I.e. the default limit on tmpfs is to make half your RAM unavailable
to programs and buffers.  Given how bloated software is becoming
(Fedora is no exception), this is a step backwards.


In conclusion, /tmp on tmpfs is a non-starter for me, and will be
changed on my systems as soon as possible.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Adam Jackson wrote:
 False.  Quoting from Matthew's original post:
 
 A system in custom mode should allow you to delete all existing keys
 and replace them with your own. After that it's just a matter of
 re-signing the Fedora bootloader (like I said, we'll be providing tools
 and documentation for that) and you'll have a computer that will boot
 Fedora but which will refuse to boot any Microsoft code.

Removing the M$ key is not viable because the firmware on some peripheral 
hardware will be signed only with the M$ key.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Lennart Poettering
On Fri, 01.06.12 16:19, Richard W.M. Jones (rjo...@redhat.com) wrote:

 On Fri, Jun 01, 2012 at 11:05:26AM -0400, Gregory Maxwell wrote:
  On Fri, Jun 1, 2012 at 9:50 AM, Gerry Reno gr...@verizon.net wrote:
   So everyone needs to go out and buy twice as much RAM so F18+ can run 
   /tmp as tmpfs without causing memory shortfalls
   for everything else they do.
   That's crazy.
  
  Thats not true (and I've used tmpfs for tmp for years, so I'm speaking
  from experience)— tmpfs is backed by swap on demand. Just add the
  space that you would have used for /tmp to your swap.
 
 The *default* limit for tmpfs is half of physical RAM (swap is not
 counted).  So *if* tmp-on-tmpfs is left at the defaults then
 increasing physical RAM might be necessary.  I haven't bothered to
 look at how tmp-on-tmpfs is implemented in systemd though.

I think most folks here really misunderstand what tmpfs is. It's not
actually strictly RAM that is used for it, it's *pageable* memory after
all. tmpfs is basically RAM preferred, and swap it if we are under
pressure. ext3 otoh means must be on disk in the end, but cache in RAM
as much as you want. The difference here is hence not really whether
things go to disk eventually or not, or whether this takes away precious
RAM, because both use disk and both can use RAM. The difference is that
the kernel is relieved from the requirement to guarantee integrity on
disk, and to write everything to disk ultimately at all if it doesn't
otherwise need to. And that's what makes things a bit faster, and
reduces general IO load and wakeups.

Beyond that it's also kind of nice that this way stuff from /tmp is
allocated from a different pool as the rest of the OS so that we can
easily apply different limits, but that's just a nice side benefit.

I think most of the noise in this flame thread is due to a
misunderstanding how modern memory management works and the assumption
that having an explicit size limit on /tmp was a bad thing, even though
it actually is a good thing... In fact, we need much stronger limits
than what tmpfs currently provides: per-user limits on the usage of
/tmp. But that's something for the future...

Lennart

-- 
Lennart Poettering - Red Hat, Inc.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Fenzi
On Fri, 01 Jun 2012 18:13:32 +0200
Kevin Kofler kevin.kof...@chello.at wrote:

 But why are you making this decision in the first place?

What decision ? 

They explained the issues and problem and came up with what they would
recommend we do. No decision has been made. 

 This:
 1. is a technical decision which affects the entirety of Fedora, and
 thus MUST go through a FESCo vote to be implemented, AND
 2. affects the core values of Fedora, and thus MUST go through a
 Board vote to be implemented.

 It is not acceptable that the kernel and GRUB maintainers are trying
 to sneak this in through the backdoor with no mandate whatsoever from
 our governance structure.

I honestly don't know what to say to you here... did you bother to
actually read the post? There's no sneaking, no decision, this is just
bringing the issue up for feedback. There will be a feature for FESCo,
there will be voting, all that stuff. Perhaps someone will come up with
a better solution by then. 

Attacking them for this as  sneak this in through the backdoor is
insulting. 

kevin




signature.asc
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Gregory Maxwell
On Fri, Jun 1, 2012 at 11:09 AM, Reindl Harald h.rei...@thelounge.net wrote:
 well designed machines do NOT swap and have not alligend
 swap at all - in the case of virtualization you MUST NOT
 enforce swapping if you really like perofrmance

I'm sorry, I couldn't quite hear you— perhaps more all-caps would help? :-)

The dogmatic 'swap is bad for performance' is justified only because
writing/reading a slow disk is bad for performance.

Tmpfs helps your system avoid disk i/o by giving your system more
flexibility in how it manages all of the available temporary space.

It's something that people who are very concerned with swap impact on
performance should appreciate greatly.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Debarshi Ray wrote:
 By the way, I am assuming that you know that one can't modify Firefox and
 redistribute it as Firefox without certification.

I've been pointing out this issue in several threads. That's exactly why 
Fedora should finally follow Debian's lead and just rename Firefox.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Gerry Reno
On 06/01/2012 12:10 PM, Gerry Reno wrote:
 On 06/01/2012 12:07 PM, Kevin Kofler wrote:
 Peter Jones wrote:
 Next year if we don't implement some form of Secure Boot support, the
 majority of Fedora users will not be able to install Fedora on new
 machines.
 Nonsense. They will be able to install it very easily, they just need to set 
 a single boolean in their BIOS setup from Enabled to Disabled.

 Kevin Kofler


 And what happens to all the people who now dual-boot both Linux and Windows.

 How can you boot Windows w/SecureBoot  and  Linux w/o SecureBoot?

 .

How are you going to dual-boot:
Windows-8  and Windows-7
Windows-8  and Windows-XP
Windows-8  and Windows 2008 Server

Windows-8  and Fedora 16
Windows-8  and Fedora 17
Windows-8  and Fedora 18





-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Gerry Reno
On 06/01/2012 12:30 PM, Kevin Kofler wrote:
 Debarshi Ray wrote:
 By the way, I am assuming that you know that one can't modify Firefox and
 redistribute it as Firefox without certification.
 I've been pointing out this issue in several threads. That's exactly why 
 Fedora should finally follow Debian's lead and just rename Firefox.

 Kevin Kofler


It's not going to matter b/c Chrome is eating Firefox lunch as far as market 
share.

.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Peter Jones wrote:
 I can see the loss of freedom, and I find it unfortunate, but despite
 what you've said above, you *are* distorting it. There's nothing you
 won't be able to do that you could do before. Doing it the same way
 will be harder than it was.

Then why are we not just requiring those steps from everyone?

Steps:
1. Disable Secure Boot (link to FSF explanation on what it really is)
2. Install Fedora

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: [HEADS-UP] Rawhide: /tmp is now on tmpfs

2012-06-01 Thread Guido Grazioli
2012/6/2 Gregory Maxwell gmaxw...@gmail.com:
 On Fri, Jun 1, 2012 at 11:09 AM, Reindl Harald h.rei...@thelounge.net wrote:
 well designed machines do NOT swap and have not alligend
 swap at all - in the case of virtualization you MUST NOT
 enforce swapping if you really like perofrmance

 I'm sorry, I couldn't quite hear you— perhaps more all-caps would help? :-)

 The dogmatic 'swap is bad for performance' is justified only because
 writing/reading a slow disk is bad for performance.

 Tmpfs helps your system avoid disk i/o by giving your system more
 flexibility in how it manages all of the available temporary space.

 It's something that people who are very concerned with swap impact on
 performance should appreciate greatly.
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel

Is all this discussion about performance, optimization and
memory management based on some benchmarks as well,
or it is only a feels like flame?



-- 
Guido Grazioli guido.grazi...@gmail.com
Via Parri 11 48011 - Alfonsine (RA) (Italy)
3 Baltic Circuit - 3030 Point Cook - VIC (Australia)
Mobile: +39 347 1017202 (10-18 GMT+12)
Key FP = 7040 F398 0DED A737 7337  DAE1 12DC A698 5E81 2278
Linked in: http://www.linkedin.com/in/guidograzioli
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Gerry Reno
On 06/01/2012 12:10 PM, Gerry Reno wrote:
 On 06/01/2012 12:07 PM, Kevin Kofler wrote:
 Peter Jones wrote:
 Next year if we don't implement some form of Secure Boot support, the
 majority of Fedora users will not be able to install Fedora on new
 machines.
 Nonsense. They will be able to install it very easily, they just need to set 
 a single boolean in their BIOS setup from Enabled to Disabled.

 Kevin Kofler


 And what happens to all the people who now dual-boot both Linux and Windows.

 How can you boot Windows w/SecureBoot  and  Linux w/o SecureBoot?

 .

How are you going to dual-boot:
Windows-8  and Windows-7
Windows-8  and Windows-XP
Windows-8  and Windows 2008 Server

Windows-8  and Fedora 16
Windows-8  and Fedora 17
Windows-8  and Fedora 18





-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Debarshi Ray
 By the way, I am assuming that you know that one can't modify Firefox and
 redistribute it as Firefox without certification.
 
 I've been pointing out this issue in several threads. That's exactly why 
 Fedora should finally follow Debian's lead and just rename Firefox.

Cool. Why not?

But then, you also know that trademarks have no bearing on software freedom.
Right? ;-)

Happy hacking,
Debarshi

-- 
KR is like the Bible. The fervent read it from end to end, the religious
keep a copy.  -- Arjun Shankar


pgpXt4GEE8zCj.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Kevin Kofler
Gerry Reno wrote:
 How are you going to dual-boot:
 Windows-8  and Windows-7
 Windows-8  and Windows-XP
 Windows-8  and Windows 2008 Server
 
 Windows-8  and Fedora 16
 Windows-8  and Fedora 17
 Windows-8  and Fedora 18
 
 

You can't without changing the settings each time (or cracking Window$ 8 to 
remove the Secure Boot requirement, if such a patch comes out). But that's 
M$'s fault. As you already pointed out, it also affects multi-boots of 
different versions of their own OS.

Kevin Kofler

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Matthew Garrett
On Fri, Jun 01, 2012 at 06:16:37PM +0200, Kevin Kofler wrote:
 Adam Jackson wrote:
  False.  Quoting from Matthew's original post:
  
  A system in custom mode should allow you to delete all existing keys
  and replace them with your own. After that it's just a matter of
  re-signing the Fedora bootloader (like I said, we'll be providing tools
  and documentation for that) and you'll have a computer that will boot
  Fedora but which will refuse to boot any Microsoft code.
 
 Removing the M$ key is not viable because the firmware on some peripheral 
 hardware will be signed only with the M$ key.

It may be a little more awkward for desktops because you may have to 
handle the Microsoft-signed UEFI drivers on your graphics and network 
cards, but this is also solvable. I'm looking at ways to implement a 
tool to allow you to automatically whitelist the installed drivers.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: another upgrade, another disaster

2012-06-01 Thread Adam Williamson
On Fri, 2012-06-01 at 13:18 +0300, Panu Matilainen wrote:
 On 05/31/2012 10:24 PM, Adam Williamson wrote:
  On Thu, 2012-05-31 at 15:08 -0400, Neal Becker wrote:
 
  But we can, and should, at least try to make our systems tolerant of 
  failures.
  Just because we can't test everything.  Defensive programming.
 
  Sure. As someone else said, though, that's an issue in rpm if
  anywhere...
 
 Dunno what kind of failures you're referring to here (not saying rpm 
 doesn't have any, just that it's not clear to me in this context), but

Read back in the thread. The specific 'disaster' that triggered the
thread initially is described thus by the reporter:

It seems to have all gone wrong when cpio failed, because a python package had 
been installed using pip into the (default) system dirs.  The conflict IIRC 
happens because pip installs a dir where cpio expects a file (or vice-versa).

AFAIK that's at the rpm level, if we're talking cpio failure.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: *countable infinities only

2012-06-01 Thread Gerry Reno
On 06/01/2012 12:45 PM, Matthew Garrett wrote:
 On Fri, Jun 01, 2012 at 06:16:37PM +0200, Kevin Kofler wrote:
 Adam Jackson wrote:
 False.  Quoting from Matthew's original post:

 A system in custom mode should allow you to delete all existing keys
 and replace them with your own. After that it's just a matter of
 re-signing the Fedora bootloader (like I said, we'll be providing tools
 and documentation for that) and you'll have a computer that will boot
 Fedora but which will refuse to boot any Microsoft code.
 Removing the M$ key is not viable because the firmware on some peripheral 
 hardware will be signed only with the M$ key.
 It may be a little more awkward for desktops because you may have to 
 handle the Microsoft-signed UEFI drivers on your graphics and network 
 cards, but this is also solvable. I'm looking at ways to implement a 
 tool to allow you to automatically whitelist the installed drivers.


We are all, Microsoft included, headed for signature-HELL.

This is going to gum up the entire x86 hardware ecosystem to such a point and 
Microsoft will rue the day they ever
dreamt up this nonsense.


.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

  1   2   3   >