Re: RPM for libblocksruntime?

2018-01-04 Thread Miroslav Suchý
Dne 3.1.2018 v 20:44 Ron Olson napsal(a):
> I know this has come up before, though I apologize that I couldn't find the 
> info, but what is preventing Fedora from
> including "libblocksruntime" as an available RPM? Debian provides it:
> 
> https://packages.debian.org/source/jessie/libblocksruntime
> 
> and it's a requirement for compiling Apple's Swift programming language on 
> Fedora.
> 
> If it's just a question of somebody doing it, I'm happy to volunteer assuming 
> there isn't some hard-block that would
> prevent it from being accepted.

No. It is not in Fedora and neither in package review queue.

So feel free to package it.

There is one package in Copr
  https://copr.fedorainfracloud.org/coprs/tcg/devel/package/libblocksruntime/
you can use it as your starting point.

Miroslav
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Specs coding standard (Was: Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache)

2018-01-04 Thread Tomasz Kłoczko
On 3 January 2018 at 22:51, Adam Williamson  wrote:
[..]
> If you still want to do it, I mean, you do you, but it would be a
> *terrible* idea to bundle clear and obvious technical improvements in
> with the idea of some kind of spec style guide (and enforcement).
> Please treat it as an entirely separate proposal. Thanks.

I'm not proposing such spec style guide in native language.
This could be done by simple indentation script over which must be
filtered every spec file.
I've already posted example of such script. This script needs to be
updated (because in this form it was used more than decade ago) then
used.
On first time all spec files should be used and each new enhancements.

Indentation is it is not a mater personal preferences. It is the same
IMPORTANT as using exact indentation in C or other languages source
code. it makes spec files code easier to read and understand by other
people. It makes easier to find bugs by simple relaying on some coding
patterns.
I remember that on start use such indentation tool was possible not
only bring the same style but find as well some number spec of CODING
BUGS.
Generally what I'm proposing is not kind of revolution but more
evolution by use initially only few coding patterns which I've already
listed like:
- put in exact order spec fields in spec preamble
- format all %description to 80 cols
- put in spec exact order of %packages, %files and other sections
- substitute exact strings to use macros

After this such list can be extended and each time after passing
agreement/voting to use exact new patterns all specs should be changed
in one go.
At some point on git server side this script could be hooked into
commit filters to refuse commits of the specs if this script will be
able to add some changes.
In other words apply exact coding standard should be kind of continuous process.

kloczek
PS. I was wrong that it will be possible to modify 90% of the specs
automatically.
In reality proportions are completely opposite and only less than 10%
is possible to change using some text substitution.
This is clear indicator how really bad is with all Fedora spec common
coding standards.
-- 
Tomasz Kłoczko | LinkedIn: http://lnkd.in/FXPWxH
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


src.fedoraproject.org pull request merging

2018-01-04 Thread Florian Weimer

How is this supposed to work?  I clicked on Merge in:

  https://src.fedoraproject.org/rpms/glibc/pull-request/3

But the task remains in the PENDING state, apparently indefinitely:

“
Waiting

We are waiting for your task to finish. This page should be refreshed 
automatically, but if not click Here


Your task is currently PENDING
”

Thanks,
Florian
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: src.fedoraproject.org pull request merging

2018-01-04 Thread Pierre-Yves Chibon
On Thu, Jan 04, 2018 at 09:44:44AM +0100, Florian Weimer wrote:
> How is this supposed to work?  I clicked on Merge in:
> 
>   https://src.fedoraproject.org/rpms/glibc/pull-request/3
> 
> But the task remains in the PENDING state, apparently indefinitely:
> 
> “
> Waiting
> 
> We are waiting for your task to finish. This page should be refreshed
> automatically, but if not click Here
> 
> Your task is currently PENDING
> ”

It looks like the workers did not survived the reboot from yesterday, I just
restarted them, so it may take a little while to process all the pending tasks
but it will get to it eventually :)


Thanks for the heads-up and sorry for the inconvenience.

Pierre
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-04 Thread Samuel Rakitničan
If I am not mistaken, EPEL still needs quite large chunk of such
scriptlets[1]. What would be the best way to maintain a SPEC file for
both.

https://fedoraproject.org/wiki/EPEL:Packaging#Scriptlets
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-04 Thread Vít Ondruch
EPEL is maintained in separate branch and git is good in cherrypicking.
That should be enough IMO.


Vít


Dne 4.1.2018 v 10:23 Samuel Rakitničan napsal(a):
> If I am not mistaken, EPEL still needs quite large chunk of such
> scriptlets[1]. What would be the best way to maintain a SPEC file for
> both.
>
> https://fedoraproject.org/wiki/EPEL:Packaging#Scriptlets
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Fwd: Retiring OmegaT and considerations about its dependencies

2018-01-04 Thread Ismael Olea
Just reporting these actions:

Retired package:

   - https://src.fedoraproject.org/rpms/OmegaT/

Orphaned packages:

   - https://src.fedoraproject.org/rpms/vldocking
   - https://src.fedoraproject.org/rpms/svnkit/
   - https://src.fedoraproject.org/rpms/sqljet/
   - https://src.fedoraproject.org/rpms/gnudiff/
   - https://src.fedoraproject.org/rpms/sequence-library/
   - https://src.fedoraproject.org/rpms/htmlparser/

Transfered main admin packages:

   - https://src.fedoraproject.org/rpms/snip/
   - https://src.fedoraproject.org/rpms/jsap/
   - https://src.fedoraproject.org/rpms/rundoc


FYI

-- Forwarded message --
From: Ismael Olea 
Date: Wed, Jan 3, 2018 at 2:41 PM
Subject: Retiring OmegaT and considerations about its dependencies
To: Discussion list for java related Fedora development <
java-de...@lists.fedoraproject.org>



Hi all:

I delayed this for time enough. It's impossible to me to keep updated OmegaT
in Fedora. Their development rhythm is pretty nice but they are adding
frequent new dependencies and I can't make the effort to add them to
Fedora. The good part is I'm working in the Flatpak approach which is less
strict with dependencies and is multidistro too so Fedora users will get an
alternative in the coming weeks.. Retiring OmegaT bring to discuss what to
do with the dependencies which I honestly prefer to abandon.

This is the situation:

Packages to retire:

   - OmegaT, for the explained reasons (last version in Fedora: 2.6.3, last
   version upstream: 3.6.0/4.1.3)
   - svnkit, only used by OmegaT and broken in the current Fedora version
   - sqljet, only required by OmegaT and svnkit, broken in Fedora too
   - sequence-library, only required by svnkit and broken too

OmegaT exclusive dependencies to be orphaned/retired:

   - gnudfif
   - htmlparser
   - vldocking

OmegaT dependencies I want to delegate bc used by other package:

   - jsap, used by java-wakeonlan

Actions:

   - Since I supposed there would be no interest on them I'll retire OmegaT,
   svnkit, sqljet and sequence-library
   - I'm gladly transfer maintenance of gnudiff, htmlparser and vldocking
   to anyone interest, so I'm going to orphan them
   - This message is cc:'d to Leamas, the maintainer of java-wakeonlan to
   offer him the ownership, if he declines I'll orphan it too.


I'm open to your feedback, if any.

Thanks!

-- 

Ismael Olea

http://olea.org/diario/



-- 

Ismael Olea

http://olea.org/diario/
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F28 Self Contained Change: Fontconfig 2.13

2018-01-04 Thread Jan Kurik
= Proposed Self Contained Change: Fontconfig 2.13 =
https://fedoraproject.org/wiki/Changes/Fontconfig_2.13

Change owner(s):
* Akira TAGOH 

Update fontconfig package to the latest version.


== Detailed Description ==
Update fontconfig package to the latest version which contains the
following features and bug fixes:

* config file description support
* allow sharing caches under the bind-mounted dirs
* improve footprint on creating caches
* variable fonts suppport


== Scope ==
* Proposal owners:
Package new version of fontconfig bug fixes (if any)

Other developers:
N/A (not a System Wide Change)

Release engineering:
#7223: https://pagure.io/releng/issue/7223

List of deliverables:
N/A (not a System Wide Change)

Policies and guidelines:
N/A (not a System Wide Change)

Trademark approval:
N/A (not needed for this Change)
-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


GSoC Organization Applications Open Today

2018-01-04 Thread Brian Exelbierd
Hi All,

I am going to start working on the Fedora GSoC Organizational application.  I 
will also work on the structure for suggesting projects.  

# If you want to mentor

Please use this time to start thinking about potential projects for GSoC 
Students.  There are no wiki pages to update yet - you'll hear about those 
soon.  (I think we might try something new this year to try and get more 
feedback on ideas).

# If you want to help in a general or administrative way

Contact me directly off list and we can figure out what works for you

regards,

bex
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F28 Self Contained Change: Japanese Default Fonts to Google Noto

2018-01-04 Thread Jan Kurik
= Proposed Self Contained Change: Japanese Default Fonts to Google Noto =
https://fedoraproject.org/wiki/Changes/JPDefaultFontsToNoto

Change owner(s):
* Akira TAGOH 

Changes the default fonts for Japanese to Google Noto.


== Detailed Description ==
Changes the default fonts for Japanese to Google Noto. each typefaces
will be changed as the following:
* sans-serif
* * VL Gothic -> Noto Sans JP

* serif
* * (No default serif) -> Noto Serif JP

* monospace
* * VL Gothic -> Noto Sans Mono CJK JP


== Scope ==
* Proposal owners:
- Update packages with the proper priority of fontconfig config file
(vlgothic*fonts and google-cjk-noto-*-jp-fonts)
- Update comps

* Other developers:
N/A (not a System Wide Change)

* Release engineering:
#7224: https://pagure.io/releng/issue/7224

* List of deliverables:
N/A (not a System Wide Change)

* Policies and guidelines:
N/A (not a System Wide Change)

* Trademark approval:
N/A (not needed for this Change)
-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F28 Self Contained Change: Korean Default Fonts to Google Noto

2018-01-04 Thread Jan Kurik
= Proposed Self Contained Change: Korean Default Fonts to Google Noto =
https://fedoraproject.org/wiki/Changes/KRDefaultFontsToNoto

Change owner(s):
* Akira TAGOH 

Changes the default fonts for Korean to Google Noto.


== Detailed Description ==
Changes the default fonts for Korean to Google Noto. each typefaces
will be changed as the following:
* sans-serif
* * VL Gothic -> Noto Sans KR

* serif
* * (No default serif) -> Noto Serif KR

* monospace
* * VL Gothic -> Noto Sans Mono CJK KR


== Scope ==
* Proposal owners:
- Update packages with proper priority of fontconfig config file
(naver-nanum-gothic*fonts and google-cjk-noto-*-kr-fonts)
- Update comps

* Other developers:
N/A (not a System Wide Change)

* Release engineering:
#7225: https://pagure.io/releng/issue/7225

* List of deliverables:
N/A (not a System Wide Change)

* Policies and guidelines:
N/A (not a System Wide Change)

* Trademark approval:
N/A (not needed for this Change)

-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F28 Self Contained Change: VirtualBox Guest Integration

2018-01-04 Thread Jan Kurik
= Proposed Self Contained Change: VirtualBox Guest Integration =
https://fedoraproject.org/wiki/Changes/VirtualBox_Guest_Integration

Change owner(s):
* Hans de Goede 

VirtualBox is popular, easy to use virtual-machine software. The
purpose of this change is to ship the VirtualBox guest-drivers and
-tools by default in the Fedora workstation product.


== Detailed Description ==
VirtualBox runs on Windows. MacOS and Linux and is used by many users
to try it Linux for the first time. As such it is important for Fedora
to work well in VirtualBox virtual-machines. Like other
virtual-machines VirtualBox virtual-machines can offer an enhanced
user-experience when some VirtualBox specific guest-drivers and
guest-tools are installed. This change is about adding the
guest-drivers to the Fedora kernel package, packaging the
userspace-tools (VirtualBox Guest Additions) and adding the VirtualBox
Guest Additions package to the default package list for the
Workstation product.


== Scope ==
* Proposal owners:
- The VirtualBox guest drivers have been merged into linux-next and
will be in 4.16, the kernel-release with which F28 will ship. The
separate vboxsf kernel-driver has been submitted upstream and is
awaiting review upstream. If the vboxsf driver does not get accepted
upstream in time we can ship with VirtualBox guest integration without
shared-folder support.
- Package VirtualBox Guest Additions userspace parts (Review Request)
- Add VirtualBox Guest Additions package to the default package list
for the Workstation product

* Other developers:
N/A (not a System Wide Change)

* Release engineering:
https://pagure.io/releng/issue/6880

* List of deliverables:
N/A (not a System Wide Change)

* Policies and guidelines:
N/A (not a System Wide Change)

* Trademark approval:
N/A (not needed for this Change)
-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: EXTERNAL: Re: After suspension

2018-01-04 Thread Wells, Roger K.

On 01/02/2018 01:18 PM, Al Stone wrote:

On 12/26/2017 12:23 PM, Wells, Roger K. wrote:

Small inconvenience but new and annoying:
Machine is Thinkpad x260
uname -a: Linux rwells-x260 4.14.7-300.fc27.x86_64 #1 SMP Mon Dec 18 16:06:12
UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
Desktop: Gnome 3.26.4-1.fc27.x86_64

When the lid is opened on the suspended machine the screen saver appears and the
clock proceeds to update until
the enter key is hit.  Then the clock stops updating for 27 seconds followed by
the login entry dialog appearing.
Then everything is back to normal.
This began right after the upgrade from F26 to F27 and has persisted through one
or two subsequent routine updates.
There are inconsistencies, sometimes it only does it when there is only wireless
connections and no wired options.
Sometimes it doesn't do it at all, no pattern here.
Sometimes the 27 second delay is much shorter but this is quite rare.
I have been running Fedora/Gnome for years and have never seen this.

Any thoughts or things to try to help pin it down will be appreciated.

thanks

There have been a lot of recent changes in ACPI code for suspend and hibernate;
it's always possible that something got tweaked in a recent kernel that could
affect this particular model of machine.

That being said, the 27 second delay sounds like the laptop hibernated (not
suspended); if you waited a variable length of time to open the lid again, it
might explain some of the variation -- sometimes it suspended, sometimes it was
caught before hibernation was complete, sometime it was caught after it had
fully hibernated.  The other things that occur to me are that perhaps hibernate
was not working before for this model of laptop and now it does; or, the power
settings changed defaults, or did not retain settings when updating; or, some
of the recent changes for lid notification aren't quite right for this laptop
(there have been a few cases of that).  Those are some of the places where I
would start looking, at least...

It turns out that this delay only occurs when the suspend happened when 
an external filesystem is mounted.
In this case a cifs mount, and IIRC there have been some issues related 
to version changes that necessitated specifying "vers=1.0" in the fstab 
file.

I will do some experiments and report back if anything interesting develops.

--
Roger Wells, P.E.
leidos
221 Third St
Newport, RI 02840
401-847-4210 (voice)
401-849-1585 (fax)
roger.k.we...@leidos.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F28 System Wide Change: GHC 8.2

2018-01-04 Thread Jan Kurik
= System Wide Change: GHC 8.2 =
https://fedoraproject.org/wiki/Changes/GHC_8.2


Change owner(s):
* Jens Petersen 
* Haskell_SIG 

Update the Haskell GHC compiler from major version 8.0.2 to 8.2.2.


== Detailed Description ==
This change involves updating the GHC Haskell compiler in Fedora to
the latest major version and rebuilding all the Haskell packages in
Fedora with it.
GHC 8.2 bring a number of important performance improvements and new
features, including improved DWARF support and support for the
Backpack modular packaging system. There are more details the upstream
release notes linked below.


== Scope ==
* Proposal owners: rebuild updated Haskell packages in f28-ghc
 - we will base package versions off [LTS 10]
 - installation of shared libraries in common directory to speed up
startup of executables

* Other developers:
None really, Haskell SIG can rebuild all packages as far as possible

* Release engineering:
https://pagure.io/releng/issue/7216

* List of deliverables:
Updated Fedora packages

* Policies and guidelines:
None planned, but will review

* Trademark approval:
N/A (not needed for this Change)
-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F28 System Wide Change: Hardening Flags Updates for Fedora 28

2018-01-04 Thread Jan Kurik
= System Wide Change: Hardening Flags Updates for Fedora 28 =
https://fedoraproject.org/wiki/Changes/HardeningFlags28

Change owner(s):
* Florian Weimer 


This system-wide change covers changes to the hardening flags in Fedora 28.


== Detailed Description ==
* Compile all binaries with stack clash protection
(-fstack-clash-protection). As a result, all stack overflows (i.e.,
situations where the allocated stack is completely exhausted) will
reliably result in crashes.

* Enable C++ standard library hardening with -D_GLIBCXX_ASSERTIONS.
This turns on cheap range checks for C++ arrays, vectors, and strings.

* Enable control flow protection on x86-64 using -fcf-protection=full -mcet.

* Enable .got.plt isolation in binutils, to support a read-only GOT
with lazy binding on systems which provide support for memory
protection keys.


== Scope ==
* Proposal owners:
Propose changes to redhat-rpm-config to implement the new flags.
redhat-rpm-config: Enable -fstack-clash-protection

* Other developers:
The redhat-rpm-config changes need to be merged. For packages which
bypass the RPM compiler flags injection mechanism, developers need to
manually implement the new flags.

* Release engineering:
#7220: https://pagure.io/releng/issue/7220

* List of deliverables: Not affected

* Policies and guidelines:
N/A (not needed for this Change; covered by the existing Packaging Guidelines)

* Trademark approval:
N/A (not needed for this Change)
-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: [Proposal] Mass change: remove executing gtk-update-icon-cache in %post/%postu/%postrans to update hicolor theme cache

2018-01-04 Thread Tomasz Kłoczko
On 4 January 2018 at 10:23, Samuel Rakitničan
 wrote:
> If I am not mistaken, EPEL still needs quite large chunk of such
> scriptlets[1]. What would be the best way to maintain a SPEC file for
> both.

$ rpm -q --filetriggers glib2
transfiletriggerin scriptlet (using /bin/sh) -- /usr/lib64/gio/modules
gio-querymodules-64 /usr/lib64/gio/modules &> /dev/null || :
transfiletriggerpostun scriptlet (using /bin/sh) -- /usr/lib64/gio/modules
gio-querymodules-64 /usr/lib64/gio/modules &> /dev/null || :
transfiletriggerin scriptlet (using /bin/sh) -- /usr/share/glib-2.0/schemas
glib-compile-schemas /usr/share/glib-2.0/schemas &> /dev/null || :
[ -e /app/share/glib-2.0/schemas ] && glib-compile-schemas
/app/share/glib-2.0/schemas &> /dev/null || :
transfiletriggerpostun scriptlet (using /bin/sh) -- /usr/share/glib-2.0/schemas
glib-compile-schemas /usr/share/glib-2.0/schemas &> /dev/null || :
[ -e /app/share/glib-2.0/schemas ] && glib-compile-schemas
/app/share/glib-2.0/schemas &> /dev/null || :

So as you see https://fedoraproject.org/wiki/EPEL:Packaging#Scriptlets
art can be now removed and all those %post/%postun/posttrans glib
schema caches updates  can be removed as well.
This is on my ToDo list however feel free take care remove this part
from Fedora documentation and wipe out all those scriptlets as well.

I really do not understand why someone who introduced those file
triggers did not take care update Fedora documentation and apply all
specs to remove all %post/%postun/posttrans. What is the reason? Just
laziness or to high level of the Fedora bureaucracy making such mass
changes to difficult?

kloczek
-- 
Tomasz Kłoczko | LinkedIn: http://lnkd.in/FXPWxH
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-04 Thread Kevin Kofler
Brendan Conoboy wrote:
> This is probably where the "AMD is safe" rumor started, but that is
> only 1/3, maybe 2/3.  Now that the context is public let's be clear:
> even AMD processors are vulnerable without the patched kernel Adam has
> asked for help testing.

But the patched kernel that was pushed includes this patch:
https://src.fedoraproject.org/cgit/rpms/kernel.git/tree/x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch?h=f27&id=4c66c4ff79b96a5725f65cc7447dff3d2e851fd8
which means the changes have no effect whatsoever on AMD CPUs unless you
explicitly boot with pti=on.

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

2018-01-04 Thread Clemens Eisserer
>> This is probably where the "AMD is safe" rumor started, but that is
>> only 1/3, maybe 2/3.  Now that the context is public let's be clear:
>> even AMD processors are vulnerable without the patched kernel Adam has
>> asked for help testing.
>
> But the patched kernel that was pushed includes this patch:
> https://src.fedoraproject.org/cgit/rpms/kernel.git/tree/x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch?h=f27&id=4c66c4ff79b96a5725f65cc7447dff3d2e851fd8
> which means the changes have no effect whatsoever on AMD CPUs unless you
> explicitly boot with pti=on.

As far as currently known, AMD CPUs are not affected by "meltdown" -
the security vulnerability which pti tries to close.
There are other issues known as "Spectre" where pti does not help and
which does not only affect Intel CPUs.

Best regards, Clemens
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


FYI Fwd: Status of the second bootstrap of Fedora/RISC-V

2018-01-04 Thread Richard W.M. Jones
- Forwarded message from "Richard W.M. Jones"  -

Date: Thu, 4 Jan 2018 11:29:51 +
From: "Richard W.M. Jones" 
To: sw-...@groups.riscv.org
Subject: [sw-dev] Status of the second bootstrap of Fedora/RISC-V

I've almost reached the end of the allotted time available for
bootstrapping Fedora/RISC-V for a second time, so this is a status
report describing what I found and how far I got.

Background
--

Fedora is a binary Linux distribution.  I first bootstrapped Fedora on
RISC-V at the end of 2016 (the "first bootstrap").
https://fedoraproject.org/wiki/Architectures/RISC-V

To do a Linux distro sanely we need full ABI guarantees at least
between userspace and the kernel, so that involves mainly glibc and
the kernel, and at that time the ABI was changing which meant we would
need to go through the very costly process of re-bootstrapping
everything multiple times.  So after porting a large percentage (I
think about 1/3rd) of all Fedora packages to the (then-) old glibc, I
stopped work on it for about a year.

glibc is supposed to go upstream in a few months from now, and that
will guarantee a stable ABI between userspace and the kernel, allowing
us to sanely build a Linux distro.  I therefore put aside some time
now to practice bootstrapping Fedora again (the "second bootstrap").
When glibc finally goes upstream we will need to do the third and
final bootstrap, and from that point on older Fedora/RISC-V releases
will be used to build each new Fedora release.

Bootstrapping stages


[These are historically named and based on the stages we used for
aarch64.]

stages 1 & 2: QEMU and cross-compiler are built from riscv-qemu and
riscv-tools.
https://github.com/rwmjones/fedora-riscv-bootstrap/blob/1858bd496378ddcce88a63c5ceda5483d7b4fdbe/Makefile#L21
https://github.com/rwmjones/fedora-riscv-bootstrap/blob/1858bd496378ddcce88a63c5ceda5483d7b4fdbe/Makefile#L71

stage 3: We build a minimal Fedora/x86_64 chroot and remove all x86_64
ELF binaries and libraries.  Using the hosted cross-compiler we build
RISC-V binaries and libraries and to replace the x86 ones.  We then
build a disk image from the chroot (it has many other hacky aspects to
it) and boot it under qemu.
https://github.com/rwmjones/fedora-riscv-bootstrap/blob/1858bd496378ddcce88a63c5ceda5483d7b4fdbe/Makefile#L117

The stage 3 disk image is just enough to run ‘rpmbuild’ and ‘gcc’ and
a small handful of other tools, which is just enough to build RPMs.
https://github.com/rwmjones/fedora-riscv-bootstrap/blob/1858bd496378ddcce88a63c5ceda5483d7b4fdbe/Makefile#L1386

stage 4: Using only RPMs generated from stage 3 we build a pristine
disk image.  This disk image contains only files controlled by RPMs
[actually there are two additional files needed: /init and a poweroff
binary, both eventually will be replaced by systemd].
https://github.com/rwmjones/fedora-riscv-bootstrap/blob/1858bd496378ddcce88a63c5ceda5483d7b4fdbe/Makefile#L1420

Using the stage 4 disk image we then build the rest of the Fedora
packages.  This requires some manual intervention, usually to break
circular chains of dependencies of which there are many.  There is
also an autobuilder which can build packages from Fedora
alphabetically or by shadowing the Fedora Koji build system.

The autobuilder will need rewriting at some point since it can be made
much more efficient now that we have working networking.

Status of the second bootstrap
--

I spent about 10 working days on this, and got a large part of the way
through stage 3.  You can see the status and download built packages
here: https://github.com/rwmjones/fedora-riscv-bootstrap
There is also a stage3 disk image here: http://oirase.annexia.org/riscv/

The eagle-eyed will notice that I'm still building some Fedora 24/25
packages (latest is Fedora 27).  This is because those packages
contain all the fixes from the first time around so it's convenient to
use them for the moment.  Even with these packages it should be
sufficient to build Fedora 27 in stage 4 (particularly as packages get
replaced with the new versions as we go along).

Unfortunately I did not yet get a working stage 4 disk image.  A glibc
RPM is required for stage 4 since almost all packages depend on it,
but the glibc build is hanging at some point for unclear reasons.
Debugging anything inside the stage 3 QEMU instance is a recipe for
pain and also debugging tools don't work inside stage 3.

QEMU user networking (with virtio-net virtual device) worked fine for
me, but I wasn't able to compile enough dependencies to get dhcp to
work.

Problems


There is definitely a problem with GCC miscompiling with -O2 (which
can be worked around using -O0).  It affected at least 4 packages, but
I was not able to produce any sort of minimal test case or common
cause.  The issue is being tracked in:
https://github.com/riscv/riscv-gcc/issues/100

There is some bug in the kernel which causes it to hit a BUG_ON in
fs/buffer.c

Fedora Rawhide-20180104.n.0 compose check report

2018-01-04 Thread Fedora compose checker
Missing expected images:

Workstation live i386
Kde live i386

Failed openQA tests: 20/128 (x86_64), 4/22 (i386), 1/2 (arm)

New failures (same test did not fail in Rawhide-20180103.n.0):

ID: 184123  Test: x86_64 Server-dvd-iso base_services_start
URL: https://openqa.fedoraproject.org/tests/184123
ID: 184144  Test: i386 Everything-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/184144
ID: 184180  Test: x86_64 Atomic-dvd_ostree-iso install_default
URL: https://openqa.fedoraproject.org/tests/184180
ID: 184190  Test: x86_64 universal install_sata@uefi
URL: https://openqa.fedoraproject.org/tests/184190
ID: 184202  Test: x86_64 universal install_xfs
URL: https://openqa.fedoraproject.org/tests/184202
ID: 184222  Test: x86_64 universal install_software_raid@uefi
URL: https://openqa.fedoraproject.org/tests/184222
ID: 184258  Test: i386 universal upgrade_2_desktop_32bit
URL: https://openqa.fedoraproject.org/tests/184258
ID: 184268  Test: i386 universal upgrade_desktop_32bit
URL: https://openqa.fedoraproject.org/tests/184268
ID: 184269  Test: i386 universal install_package_set_kde
URL: https://openqa.fedoraproject.org/tests/184269

Old failures (same test failed in Rawhide-20180103.n.0):

ID: 184130  Test: x86_64 Server-dvd-iso server_role_deploy_domain_controller
URL: https://openqa.fedoraproject.org/tests/184130
ID: 184176  Test: x86_64 KDE-live-iso desktop_notifications_postinstall
URL: https://openqa.fedoraproject.org/tests/184176
ID: 184177  Test: arm Minimal-raw_xz-raw.xz 
install_arm_image_deployment_upload
URL: https://openqa.fedoraproject.org/tests/184177
ID: 184205  Test: x86_64 universal install_iscsi
URL: https://openqa.fedoraproject.org/tests/184205
ID: 184218  Test: x86_64 universal install_package_set_kde
URL: https://openqa.fedoraproject.org/tests/184218
ID: 184230  Test: x86_64 universal upgrade_minimal_64bit
URL: https://openqa.fedoraproject.org/tests/184230
ID: 184231  Test: x86_64 universal upgrade_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/184231
ID: 184232  Test: x86_64 universal upgrade_server_64bit
URL: https://openqa.fedoraproject.org/tests/184232
ID: 184233  Test: x86_64 universal upgrade_server_domain_controller
URL: https://openqa.fedoraproject.org/tests/184233
ID: 184235  Test: x86_64 universal upgrade_2_desktop_64bit
URL: https://openqa.fedoraproject.org/tests/184235
ID: 184236  Test: x86_64 universal upgrade_2_server_64bit
URL: https://openqa.fedoraproject.org/tests/184236
ID: 184237  Test: x86_64 universal upgrade_kde_64bit
URL: https://openqa.fedoraproject.org/tests/184237
ID: 184238  Test: x86_64 universal upgrade_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/184238
ID: 184239  Test: x86_64 universal upgrade_2_minimal_64bit
URL: https://openqa.fedoraproject.org/tests/184239
ID: 184240  Test: x86_64 universal upgrade_2_kde_64bit
URL: https://openqa.fedoraproject.org/tests/184240
ID: 184241  Test: x86_64 universal upgrade_2_desktop_encrypted_64bit
URL: https://openqa.fedoraproject.org/tests/184241

Soft failed openQA tests: 67/128 (x86_64), 17/22 (i386)
(Tests completed, but using a workaround for a known bug)

New soft failures (same test did not soft fail in Rawhide-20180103.n.0):

ID: 184140  Test: i386 Server-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/184140
ID: 184141  Test: i386 Server-dvd-iso install_default
URL: https://openqa.fedoraproject.org/tests/184141
ID: 184162  Test: i386 Workstation-boot-iso install_default
URL: https://openqa.fedoraproject.org/tests/184162
ID: 184253  Test: i386 universal install_blivet_no_swap
URL: https://openqa.fedoraproject.org/tests/184253
ID: 184254  Test: i386 universal install_package_set_minimal
URL: https://openqa.fedoraproject.org/tests/184254
ID: 184255  Test: i386 universal install_repository_http_graphical
URL: https://openqa.fedoraproject.org/tests/184255
ID: 184256  Test: i386 universal install_software_raid
URL: https://openqa.fedoraproject.org/tests/184256
ID: 184257  Test: i386 universal install_btrfs
URL: https://openqa.fedoraproject.org/tests/184257
ID: 184259  Test: i386 universal install_simple_encrypted
URL: https://openqa.fedoraproject.org/tests/184259
ID: 184260  Test: i386 universal install_blivet_xfs
URL: https://openqa.fedoraproject.org/tests/184260
ID: 184261  Test: i386 universal install_scsi_updates_img
URL: https://openqa.fedoraproject.org/tests/184261
ID: 184262  Test: i386 universal install_ext3
URL: https://openqa.fedoraproject.org/tests/184262
ID: 184263  Test: i386 universal install_lvmthin
URL: https://openqa.fedoraproject.org/tests/184263
ID: 184264  Test: i386 universal install_blivet_ext3
URL: https://openqa.fedoraproject.org/tests/184264
ID: 184265  Test: i386 universal install_blivet_btrfs
URL: https://openqa.fedoraproject.org/tests/184265
ID: 184266  Test: i386 

F28 System Wide Change: Strong crypto settings

2018-01-04 Thread Jan Kurik
= System Wide Change: Strong crypto settings =
https://fedoraproject.org/wiki/Changes/StrongCryptoSettings

Change owner(s):
* Nikos Mavrogiannopoulos 


This change is about updating the current system-wide crypto policy to
disable legacy and unused cryptographic protocols.


== Detailed Description ==
Fedora includes several cryptographic components who's security
doesn't remain constant over time. Algorithms such as (cryptographic)
hashing and encryption typically have a lifetime after which they are
considered either too risky to use or plain insecure. That would mean
we need to phase out such algorithms from the default settings, or
completely disable if they could cause irreparable issue.

While in the past we did not disable algorithms in a consistent way
(different applications utilized different policies), today we have a
system-wide policy followed by a large part of Fedora components. That
allows us to move consistently and deprecate algorithms system-wide.
For rationale see RFC 7457 for a more complete list of attacks taking
advantage of legacy crypto algorithms.

The propose changes for default policy are:

* Keep only TLS 1.2 (and TLS 1.3 when available) as enabled protocols
and move the TLS 1.x, x<=1 to legacy level.
* Require finite field parameters (RSA, Diffie-Hellman) of 2048 and
more in the default settings

That is a policy of:

LEGACY
 MACs: All HMAC with SHA1 or better + all modern MACs (poly1305 etc)
 Curves: all prime >= 255 bits (including bernstein curves)
 Signature algorithms: SHA-1 hash or better (not RIPEMD)
 Ciphers: all available > 112-bit key, >= 128-bit block (no rc4, but with 3DES)
 key exchange: ECDHE, RSA, DHE
 DH params size: >=1024
 RSA params size: >=1024
 TLS protocols: TLS >= 1.0

DEFAULT
 MACs: All HMAC with SHA1 or better + all modern MACs (poly1305 etc)
 Curves: all prime >= 255 bits (including bernstein curves)
 Signature algorithms: with SHA-1 hash or better
 Ciphers: >= 128-bit key, >= 128-bit block (aes, camellia, chacha20,
including aes-cbc)
 key exchange: ECDHE, RSA, DHE
 DH params size: >= 2048
 RSA params size: >= 2048
 TLS protocols: TLS >= 1.2

FUTURE
 MACs: All HMAC with SHA256 or better + all modern MACs (poly1305 etc)
 Curves: all prime >= 384 bits (including bernstein curves)
 Signature algorithms: SHA-384 hash or better
 Ciphers: >= 256-bit key, >= 128-bit block, only Authenticated
Encryption (AE) ciphers
 key exchange: ECDHE, DHE
 DH params size: >= 3072
 RSA params size: >= 3072
 TLS protocols: TLS >= 1.2



== Scope ==
* Proposal owners:
The policies include in crypto-policies package need to be updated.

* Other developers:
  * Crypto policies are updated to the settings above
  * OpenSSL is updated to allow setting policies for TLS versions

* Release engineering:
#7235: https://pagure.io/releng/issue/7235

* List of deliverables:
  * Crypto policies are updated to the settings above
  * OpenSSL, NSS, GnuTLS and all applications covered under the Fedora
Crypto Policies follow the new crypto settings.

* Policies and guidelines:
No changes to packaging or other guidelines is needed.

* Trademark approval:
N/A (not needed for this Change)
-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


F28 Self Contained Change: Glibc collation update and sync with cldr

2018-01-04 Thread Jan Kurik
= Proposed Self Contained Change: Glibc collation update and sync with cldr =
https://fedoraproject.org/wiki/Changes/Glibc_collation_update_and_sync_with_cldr

Change owner(s):
* Mike Fabian 


Update collation data in glibc to an ISO file from 2015 (in sync with
Unicode 8.0.0) and sync collation rules of the locales with CLDR.


== Detailed Description ==
The collation data in glibc is extremely out of date, most locales
base their collation rules on an iso14651_t1_common file which has not
been updated for probably more than 15 years. Therefore, all
characters added in later Unicode versions are missing and not sorted
at all which causes bugs like [[1]]. This change is about updating
that iso146541_t1_common file to the latest available version from ISO
which is from 2015 and up-to-date with Unicode 8.0.0. Because
additions and changes in the syntax of the new iso146541_t1_common
file, updating that file requires changing the collation rules of
almost all locales. Because all these collation rules have to be
touched anyway, this is a good opportunity to fix bugs in the
collation ruies and sync them with the collation rules in CLDR.

== Scope ==
* Proposal owners:
Work with upstream, file bugs and provide patches where required.

* Other developers:
This change will impact glibc and everything which sorts strings using
the collation functions from glibc. Other Developers do not need to
make any changes from their end, but they need to watch how their
application behaves with improved localedata. We need proper testing
to see that it does not break any application.

* Release engineering:
#7234: https://pagure.io/releng/issue/7234

List of deliverables:
N/A (not a System Wide Change)

Policies and guidelines:
No, this change does not require any updates to Policies or packaging
guideline updates.

Trademark approval:
N/A (not needed for this Change)
-- 
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: EXTERNAL: Re: After suspension

2018-01-04 Thread Al Stone
On 01/04/2018 06:18 AM, Wells, Roger K. wrote:
> On 01/02/2018 01:18 PM, Al Stone wrote:
>> On 12/26/2017 12:23 PM, Wells, Roger K. wrote:
>>> Small inconvenience but new and annoying:
>>> Machine is Thinkpad x260
>>> uname -a: Linux rwells-x260 4.14.7-300.fc27.x86_64 #1 SMP Mon Dec 18 
>>> 16:06:12
>>> UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
>>> Desktop: Gnome 3.26.4-1.fc27.x86_64
>>>
>>> When the lid is opened on the suspended machine the screen saver appears 
>>> and the
>>> clock proceeds to update until
>>> the enter key is hit.  Then the clock stops updating for 27 seconds 
>>> followed by
>>> the login entry dialog appearing.
>>> Then everything is back to normal.
>>> This began right after the upgrade from F26 to F27 and has persisted 
>>> through one
>>> or two subsequent routine updates.
>>> There are inconsistencies, sometimes it only does it when there is only 
>>> wireless
>>> connections and no wired options.
>>> Sometimes it doesn't do it at all, no pattern here.
>>> Sometimes the 27 second delay is much shorter but this is quite rare.
>>> I have been running Fedora/Gnome for years and have never seen this.
>>>
>>> Any thoughts or things to try to help pin it down will be appreciated.
>>>
>>> thanks
>> There have been a lot of recent changes in ACPI code for suspend and 
>> hibernate;
>> it's always possible that something got tweaked in a recent kernel that could
>> affect this particular model of machine.
>>
>> That being said, the 27 second delay sounds like the laptop hibernated (not
>> suspended); if you waited a variable length of time to open the lid again, it
>> might explain some of the variation -- sometimes it suspended, sometimes it 
>> was
>> caught before hibernation was complete, sometime it was caught after it had
>> fully hibernated.  The other things that occur to me are that perhaps 
>> hibernate
>> was not working before for this model of laptop and now it does; or, the 
>> power
>> settings changed defaults, or did not retain settings when updating; or, some
>> of the recent changes for lid notification aren't quite right for this laptop
>> (there have been a few cases of that).  Those are some of the places where I
>> would start looking, at least...
>>
> It turns out that this delay only occurs when the suspend happened when an
> external filesystem is mounted.
> In this case a cifs mount, and IIRC there have been some issues related to
> version changes that necessitated specifying "vers=1.0" in the fstab file.
> I will do some experiments and report back if anything interesting develops.
> 

Interesting.  Could there be an ordering dependency somewhere on resume?  E.g.,
I need to start file system but can't do that until network is ready but the
info I need to start the network is on the file system ... some weirdness like
that?

-- 
ciao,
al
---
Al Stone
Software Engineer
Red Hat, Inc.
a...@redhat.com
---
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: EXTERNAL: Re: After suspension

2018-01-04 Thread Nico Kadel-Garcia
On Thu, Jan 4, 2018 at 8:18 AM, Wells, Roger K.  wrote:

> It turns out that this delay only occurs when the suspend happened when an
> external filesystem is mounted.
> In this case a cifs mount, and IIRC there have been some issues related to
> version changes that necessitated specifying "vers=1.0" in the fstab file.
> I will do some experiments and report back if anything interesting develops.

If you have external network mounts, such as CIFS and NFS, you might
consider using autofs or automounts or whatever your OS supports,
rather than /etc/fstab mounts, to enable them by default. There's
nothing quite like needing to resolve an uncommitted change, or a
release a mount that is being opened by a GUI file browser, to mess
with reboot processes.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Self Introduction: Kevin Howell

2018-01-04 Thread Silvia Sánchez
Hi Kevin!

Welcome aboard and and happy new year!  Good to have you here around.

Kind regards,
Silvia
FAS: Lailah



2018-01-03 19:28 GMT+01:00 Kevin Howell :

> Hi folks,
>
> I'm a Red Hat employee since 2014 and have been a long-time user of
> Fedora. On the job I work on mostly subscription-manager (
> https://github.com/candlepin/subscription-manager ) and also candlepin (
> https://github.com/candlepin/candlepin ). I dabble in various other tiny
> side-projects (feel free to see https://github.com/kahowell if curious),
> and have contributed a few PRs to a few other open source projects.
>
> I'm hoping to get started in packaging for Fedora, especially for
> packaging subscription-manager and related packages, and I also aspire to
> package other projects (outside of my day job) at some point.
>
> I'm looking for sponsorship into the packager group for this purpose.
> Lately, I've been doing most of the release work for subscription-manager
> (and packaging for RHEL).
>
> I go by khowell at Red Hat and Fedora; I'm kahowell on GitHub and FreeNode.
>
> Also, Happy 2018!
>
> Warm regards,
> Kevin Howell
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
>
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 System Wide Change: Hardening Flags Updates for Fedora 28

2018-01-04 Thread John Reiser

On 01/04/2018 05:28 AM, Jan Kurik wrote:

= System Wide Change: Hardening Flags Updates for Fedora 28 =
https://fedoraproject.org/wiki/Changes/HardeningFlags28


This change might be on a fast track to failure.


== Detailed Description ==
* Compile all binaries with stack clash protection
(-fstack-clash-protection). As a result, all stack overflows (i.e.,
situations where the allocated stack is completely exhausted) will
reliably result in crashes.


"All stack overflows"?  That would be a feat.  I tried to test, but:
  There is no such flag in gcc-7.2.1-2 (current f27).
  updates-testing for f27 has no update for gcc.
  Fedora 28 Rawhide 20180103.n.0 nightly compose cannot run Terminal.


* Enable control flow protection on x86-64 using -fcf-protection=full -mcet.


The wiki page
  https://fedoraproject.org/wiki/Changes/HardeningFlags28
links to (Documentation: Flow Enforcement Technology)
  
https://software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf%7CControl
which displays that site's HTTP-404 "Link not found" catch-all.

I'd comment on the wiki page, but cannot login because I have only FAS "cla" 
access.
I tried to get "cla+1" by joining a group, but the only groups
with Join buttons were Marketing-related, and I'm not interested there.

--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 System Wide Change: Hardening Flags Updates for Fedora 28

2018-01-04 Thread Matthew Miller
On Thu, Jan 04, 2018 at 10:37:03AM -0800, John Reiser wrote:
> I'd comment on the wiki page, but cannot login because I have only FAS "cla" 
> access.
> I tried to get "cla+1" by joining a group, but the only groups
> with Join buttons were Marketing-related, and I'm not interested there.

Posting here is probably better than commenting on the wiki page,
anyway -- I don't think people reliably track the wiki discussion
pages.

-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 Self Contained Change: Glibc collation update and sync with cldr

2018-01-04 Thread nicolas . mailhot
Hi,

Shouldn't iso definition files (or unicode.org files) have their own package, 
so they are not buried deep inside glibc, and it is clear a periodic upstream 
sync is necessary ?

Regards,

-- 
Nicolas Mailhot
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 System Wide Change: Hardening Flags Updates for Fedora 28

2018-01-04 Thread Adam Jackson
On Thu, 2018-01-04 at 14:28 +0100, Jan Kurik wrote:
> = System Wide Change: Hardening Flags Updates for Fedora 28 =
> https://fedoraproject.org/wiki/Changes/HardeningFlags28
> 
> Change owner(s):
> * Florian Weimer 
> 
> 
> This system-wide change covers changes to the hardening flags in
> Fedora 28.

I'm mostly in favor of this, but as the perpetrator of the current
hardening flag hack in r-r-c, I really do wish there was a better way
to set these defaults than -specs=blah. The current implementation is
fragile and leaks out to the rest of the OS in weird ways.

I'm aware that fixing this "sanely" would probably require fixing the
toolchain to (allow us to) declare more intent about the destination of
an ET_REL object when it's being built; fine, let's do that.

Is anyone looking at this change from that perspective?

- ajax
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


linux-firmware, microcode_ctl, libvirt, qemu updates?

2018-01-04 Thread Chuck Anderson
Red Hat has released linux-firmware, microcode_ctl, libvirt, and qemu
updates in addition to the kernel updates to mitigate against Meltdown
and Spectre.  Is anyone working on those updates for Fedora?  Is there
anything I can do to help with those?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: linux-firmware, microcode_ctl, libvirt, qemu updates?

2018-01-04 Thread Josh Boyer
On Thu, Jan 4, 2018 at 3:55 PM, Chuck Anderson  wrote:
> Red Hat has released linux-firmware, microcode_ctl, libvirt, and qemu
> updates in addition to the kernel updates to mitigate against Meltdown
> and Spectre.  Is anyone working on those updates for Fedora?  Is there
> anything I can do to help with those?

I'll be looking into linux-firmware.  As far as I'm aware, there was
nothing specific pushed upstream recently.  If updates have shipped in
RHEL I'd need to see if they added out-of-tree patches or if we're
already covered by the fact that we keep linux-firmware very up to
date.

josh
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 System Wide Change: Hardening Flags Updates for Fedora 28

2018-01-04 Thread John Reiser

== Detailed Description ==
* Compile all binaries with stack clash protection
(-fstack-clash-protection). As a result, all stack overflows (i.e.,
situations where the allocated stack is completely exhausted) will
reliably result in crashes.


Rawhide-Live gcc-7.2.1-5.fc28.x86_64 recognizes -fstack-clash-protection
but the flag has no effect on generated code.

https://bugzilla.redhat.com/show_bug.cgi?id=1531283
   "-fstack-clash-protection fails to check some stack allocations"

--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 Self Contained Change: Glibc collation update and sync with cldr

2018-01-04 Thread Rafal Luzynski
4.01.2018 16:59 Jan Kurik  wrote:
> [...] Therefore, all
> characters added in later Unicode versions are missing and not sorted
> at all which causes bugs like [[1]].

Seems like a link is missing.

While at this, there is one more change in glibc, not directly related
with this one but kinda similar. The ldconfig utility now forces the
"C" sorting order while processing the files from /etc/ld.so.conf.d
directory. Previously the sorting order was locale dependent which could
be the same as the default "C" locale or slightly different. I'm not
aware of any Fedora package where the order of the config files does
matter, there was an example from Debian where they allow installing
multiple versions of the same library and they add numerical prefixes
to the file names to enforce the order. However, I hope this heads up
is worth posting.

Links:

https://sourceware.org/bugzilla/show_bug.cgi?id=22505
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=7d38eb3
https://sourceware.org/ml/libc-alpha/2017-12/msg00048.html

Regards,

Rafal
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 Self Contained Change: Glibc collation update and sync with cldr

2018-01-04 Thread Rafal Luzynski
4.01.2018 20:19 nicolas.mail...@laposte.net wrote:
>
>
> Hi,
>
> Shouldn't iso definition files (or unicode.org files) have their own package,
> so they are not buried deep inside glibc, and it is clear a periodic upstream
> sync is necessary ?
>

I'm afraid it would be a huge effort to implement this because,
as you have already noticed, the locale data are already buried
deep inside glibc upstream. The process would require unbundling
them and then either repackaging from the same source or update
from CLDR if CLDR is newer than glibc. It's easier to contribute
upstream and get a complete glibc tarball with CLDR data updated.

OTOH, the locale data from glibc are already split into subpackages
(langpacks) but the aim is not to distribute them all together
(e.g., in a Live DVD) and not to force the user to install them all.
They are still built from the same tarball.

Regards,

Rafal
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 Self Contained Change: Glibc collation update and sync with cldr

2018-01-04 Thread R P Herrold
On Fri, 5 Jan 2018, Rafal Luzynski wrote:

> be the same as the default "C" locale or slightly different. I'm not
> aware of any Fedora package where the order of the config files does
> matter

apache cares in /etc/httpd/conf.d/ with virtual host 
enablement on ports along with multiple vhosts

udev does in /etc/udev/rules.d/ notwithstanding a convention 
of doing manual application order with leading digits

Indeed an undocumented switch mid release in RHEL 7 from a 
'ls' type enumeration of a single directory, to a 'find' one 
not constrained by '-maxdepth' causes us some heartburn, as we 
previously had 'stashed' un-used initscripts ?? I fergit ?? 
down in
/etc/sysconfig/network-scripts/attic/ 

that were mysteriously being applied.  Not sort order related 
on the last, but still, I would tread lightly here

-- Russ herrold
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 Self Contained Change: Glibc collation update and sync with cldr

2018-01-04 Thread Rafal Luzynski
5.01.2018 00:22 R P Herrold  wrote:
>
>
> On Fri, 5 Jan 2018, Rafal Luzynski wrote:
>
> > be the same as the default "C" locale or slightly different. I'm not
> > aware of any Fedora package where the order of the config files does
> > matter
>
> apache cares in /etc/httpd/conf.d/ with virtual host
> enablement on ports along with multiple vhosts
> [...]

Sorry, I was not precise enough. I meant only files placed in
/etc/ld.so.conf.d which may (and usually do) belong to different
packages. So, again, I'm not aware of any Fedora package which puts
a config file into /etc/ld.so.conf.d and cares about whether this
config file is processed by ldconfig before or after other config
files.

Of course, other utilities may have also other config files and may
have some rules of their order. They are not changed. This is a change
only in ldconfig utility which belongs to glibc.

Regards,

Rafal
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: F28 System Wide Change: Hardening Flags Updates for Fedora 28

2018-01-04 Thread John Reiser

== Detailed Description ==
* Compile all binaries with stack clash protection
(-fstack-clash-protection). As a result, all stack overflows (i.e.,
situations where the allocated stack is completely exhausted) will
reliably result in crashes.


Further investigation reveals that the intent is to insure that
for each thread the in-use portion of the stack has no "holes" of pages
that are not mapped and present in the virtual memory of the process,
and any interval of stack pages belongs to exactly one thread.
The mechanism is an explicit probe which writes ~0 into [one word on]
each page [incrementally] whenever a new page or pages might be added
to the stack such that there could be a gap of PAGE_SIZE or more.
Infinite recursion is aborted by demanding (assuming) that a page
with PROT_NONE separates the growing edge of the stack from any
non-stack pages.

The mechanism has consequences that I have not seen mentioned in the 
documentation:

1) Each on-stack allocation (both fixed- and variable-sized [alloca()])
always is present and "dirty".  The stack probe (or the incremental growth
of <= PAGE_SIZE bytes at a time) forces it to consume separate, real RAM.
In a local declaration such as this, the comment is not valid:
char temp[100];  /* only a prefix matters for resource consumption 
*/

2) The explicit write by the stack probe can mask a memcheck(valgrind) 
violation,
at least until memcheck groks the probe.

3) The stack must be at least one page of real RAM, with at least
one terminating guard page that has PROT_NONE.  No more threads
with small stacks packed sequentially adjacent.

4) All code must be generated by a compiler that enforces the probing policy,
and all language support run-time routines also must enforce the policy.
No mixing of old or foreign compilers with the new gcc.
No mixing of old or foreign C libraries with the new glibc.
Direct use by an app developer of the 'clone' system call is forbidden.

--
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org