Re: ld terminated with signal 9 [Killed]

2015-02-19 Thread Marek Skalický
Dan Horák píše v Čt 19. 02. 2015 v 20:12 +0100:
> On Thu, 19 Feb 2015 19:51:38 +0100
> Marek Skalický  wrote:
> 
> > Hi,
> > I were trying to compile f22 mongoDB package with enabled
> > _hardened_build . And it always failed with:
> > 
> > collect2: fatal error: ld terminated with signal 9 [Killed]
> > compilation terminated.
> > scons: *** [build/linux2/ssl/use-system-all/usev8/mongo/mongod] Error
> > 1 scons: building terminated because of errors.
> > RPM build errors:
> > error: Bad exit status from /var/tmp/rpm-tmp.NWmAoC (%build)
> > Bad exit status from /var/tmp/rpm-tmp.NWmAoC (%build)
> > Child return code was: 1
> > 
> > (log file
> > https://kojipkgs.fedoraproject.org//work/tasks/8167/8998167/build.log)
> > 
> > I've tried it four times and compilation failed always in different
> > place (linking different binaries). Without enabled hardening it
> > builds fine. (On 9 Jan with a little older version I tried scratch
> > hardened build and it also worked fine)
> > 
> > Where could be problem? Is it possible, that there isn't enough
> > memory?
> 
> yes, looks as an out-of-memory situation, you can try switching to -g1
> in CFLAGS for lesser debug infos (see eg. webkitgtk4) or using -j1 for
> make if there would be more jobs competing for memory
> 
> 
>   Dan
> 
> PS: please send the link to the task, not to the log directly


These task failed with this problem:
https://koji.fedoraproject.org/koji/taskinfo?taskID=8998165
https://koji.fedoraproject.org/koji/taskinfo?taskID=8997879
https://koji.fedoraproject.org/koji/taskinfo?taskID=8995972
https://koji.fedoraproject.org/koji/taskinfo?taskID=8994536

Thanks for suggesting -g1. I will try it...

Marek


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: [Test-Announce] Fedora 22 Branched 20150218 nightly compose nominated for testing

2015-02-19 Thread Adam Williamson
On Thu, 2015-02-19 at 08:38 -0600, Michael Cronenworth wrote:
> On 02/18/2015 01:21 PM, adamw...@fedoraproject.org wrote:
> > 
> > https://fedoraproject.org/wiki/Test_Results:Fedora_22_Branched_20150218_Installation
> > 
> 
> Text-mode installation does not work - noted in the matrix.

Thanks!

Failure reports are *much* more useful, though, if you file a bug and 
include a link to it. The syntax is:

{{fail|username|bug#}}

e.g.

{{fail|adamwill|1234567}}

or you can of course use relval report-results.

> The installation source spoke does not work. No matter what I 
> choose, even
> specifying a repo URL, anaconda says it cannot find a valid 
> installation source.

Thanks for the report, I'll take a look at that and see if I can 
reproduce and figure out what's going on.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Christopher Meng
I'd like to know the performance loss estimated/examined by FESCO, or
I think it's a bad idea on i686 systems, it's already slow enough.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

libuv soname bump

2015-02-19 Thread T.C. Hollingsworth
I have just updated libuv in F22 and rawhide to the 1.x series (1.4.0
to be exact) which introduces a proper soname upstream that is bumped
from the previous Fedora package.

libuv currently only has two dependencies in Fedora.  One dependent,
moarvm, has already been rebuilt.  The other, nodejs, will use the
newly introduced compat-libuv010 package for the life of the Fedora 22
release.  It will be updated to the new 0.12 release for F23, which
can use the new libuv.  This compat package will then be retired.

No new packages in Fedora should depend on compat-libuv010.  Please
instead use the main libuv package, as many changes released in the
v1.x series were focused on making the library more useful to
consumers besides nodejs.

Thanks,
-T.C.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Dave Johansen
On Thu, Feb 19, 2015 at 12:34 PM, Till Maas  wrote:

> On Thu, Feb 19, 2015 at 08:15:19PM +0100, Jakub Jelinek wrote:
>
> > I've never argumented against the goal that web browser or all network
> aware
> > services should be PIEs, after all, why would we (Ulrich Drepper and
> myself)
> > add the PIE support into the toolchain otherwise?
> > I'm just not convinced most of the unpriviledged programs should be PIEs.
>
> Thanks to e.g. e-mail about any program can be made to run untrusted
> data, e.g. PDF readers, office suites, image viewers, if you open an
> attachment of the respective type. Therefore it makes a sane default
> IMHO. It is also something to attract users that care about security
> very much to Fedora.
>

https://software.intel.com/en-us/blogs/2014/12/26/new-optimizations-for-x86-in-upcoming-gcc-50-32bit-pic-mode
https://gcc.gnu.org/ml/gcc/2004-06/msg01956.html

>From those articles, it sounds like it's a worst case 5-10% hit. I agree
that's kind of annoying and a lot of my stuff doesn't even run connected to
the internet, but if that 5-10% worst case hit that will usually be
imperceptible can prevent my machine from being bitten by some malware that
got on the network because someone plugged in a USB drive they shouldn't
have, then I'm all for it.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Till Maas
On Thu, Feb 19, 2015 at 08:15:19PM +0100, Jakub Jelinek wrote:

> I've never argumented against the goal that web browser or all network aware
> services should be PIEs, after all, why would we (Ulrich Drepper and myself)
> add the PIE support into the toolchain otherwise?
> I'm just not convinced most of the unpriviledged programs should be PIEs.

Thanks to e.g. e-mail about any program can be made to run untrusted
data, e.g. PDF readers, office suites, image viewers, if you open an
attachment of the respective type. Therefore it makes a sane default
IMHO. It is also something to attract users that care about security
very much to Fedora.

Regards
Till
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Reindl Harald


Am 19.02.2015 um 20:15 schrieb Jakub Jelinek:

On Thu, Feb 19, 2015 at 07:58:10PM +0100, Reindl Harald wrote:

Am 19.02.2015 um 19:48 schrieb Till Maas:

On Thu, Feb 19, 2015 at 07:07:45PM +0100, Jakub Jelinek wrote:


Even on x86_64 it was quite a measurable slowdown last time I've benchmarked
it, now in F22+ we might have smaller slowdown with the x86_64 copyreloc for


Which packages are there that do not process untrusted data and are
slowed down much?


none these days don't process untrusted data and "slowed down much" needs to
be defined very well and not only by a syntectitc benchmark throwing numbers
around - if it is not noticeable by a user it don't exist and security was,
is and always will be a compromise between user expierience

in other words: leave me in piece with generic benchmarks and things faster
in theory not look at the time for recovery when machines where compromised

i ran all network aware services with my own build-overrides with
-fstack-protector-all long before fedora considered -fstack-protector-srtong
with *zero* difference for daily workloads as example


I've never argumented against the goal that web browser or all network aware
services should be PIEs, after all, why would we (Ulrich Drepper and myself)
add the PIE support into the toolchain otherwise?
I'm just not convinced most of the unpriviledged programs should be PIEs.


because malware don't need root privileges to do a lot of harm

on enduser machines most data is feeded to "unpriviledged programs" and 
i have not seen much packages the last few years without a CVE - better 
be safe than sorry!




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 07:58:10PM +0100, Reindl Harald wrote:
> 
> Am 19.02.2015 um 19:48 schrieb Till Maas:
> >On Thu, Feb 19, 2015 at 07:07:45PM +0100, Jakub Jelinek wrote:
> >
> >>Even on x86_64 it was quite a measurable slowdown last time I've benchmarked
> >>it, now in F22+ we might have smaller slowdown with the x86_64 copyreloc for
> >
> >Which packages are there that do not process untrusted data and are
> >slowed down much?
> 
> none these days don't process untrusted data and "slowed down much" needs to
> be defined very well and not only by a syntectitc benchmark throwing numbers
> around - if it is not noticeable by a user it don't exist and security was,
> is and always will be a compromise between user expierience
> 
> in other words: leave me in piece with generic benchmarks and things faster
> in theory not look at the time for recovery when machines where compromised
> 
> i ran all network aware services with my own build-overrides with
> -fstack-protector-all long before fedora considered -fstack-protector-srtong
> with *zero* difference for daily workloads as example

I've never argumented against the goal that web browser or all network aware
services should be PIEs, after all, why would we (Ulrich Drepper and myself)
add the PIE support into the toolchain otherwise?
I'm just not convinced most of the unpriviledged programs should be PIEs.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: ld terminated with signal 9 [Killed]

2015-02-19 Thread Dan Horák
On Thu, 19 Feb 2015 19:51:38 +0100
Marek Skalický  wrote:

> Hi,
> I were trying to compile f22 mongoDB package with enabled
> _hardened_build . And it always failed with:
> 
> collect2: fatal error: ld terminated with signal 9 [Killed]
> compilation terminated.
> scons: *** [build/linux2/ssl/use-system-all/usev8/mongo/mongod] Error
> 1 scons: building terminated because of errors.
> RPM build errors:
> error: Bad exit status from /var/tmp/rpm-tmp.NWmAoC (%build)
> Bad exit status from /var/tmp/rpm-tmp.NWmAoC (%build)
> Child return code was: 1
> 
> (log file
> https://kojipkgs.fedoraproject.org//work/tasks/8167/8998167/build.log)
> 
> I've tried it four times and compilation failed always in different
> place (linking different binaries). Without enabled hardening it
> builds fine. (On 9 Jan with a little older version I tried scratch
> hardened build and it also worked fine)
> 
> Where could be problem? Is it possible, that there isn't enough
> memory?

yes, looks as an out-of-memory situation, you can try switching to -g1
in CFLAGS for lesser debug infos (see eg. webkitgtk4) or using -j1 for
make if there would be more jobs competing for memory


Dan

PS: please send the link to the task, not to the log directly
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 07:48:30PM +0100, Till Maas wrote:
> On Thu, Feb 19, 2015 at 07:07:45PM +0100, Jakub Jelinek wrote:
> 
> > Even on x86_64 it was quite a measurable slowdown last time I've benchmarked
> > it, now in F22+ we might have smaller slowdown with the x86_64 copyreloc for
> 
> Which packages are there that do not process untrusted data and are
> slowed down much?

Well, IMHO it should be the proponents of the change to show that it isn't
significant.  As an example I've given gcc.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Reindl Harald


Am 19.02.2015 um 19:48 schrieb Till Maas:

On Thu, Feb 19, 2015 at 07:07:45PM +0100, Jakub Jelinek wrote:


Even on x86_64 it was quite a measurable slowdown last time I've benchmarked
it, now in F22+ we might have smaller slowdown with the x86_64 copyreloc for


Which packages are there that do not process untrusted data and are
slowed down much?


none these days don't process untrusted data and "slowed down much" 
needs to be defined very well and not only by a syntectitc benchmark 
throwing numbers around - if it is not noticeable by a user it don't 
exist and security was, is and always will be a compromise between user 
expierience


in other words: leave me in piece with generic benchmarks and things 
faster in theory not look at the time for recovery when machines where 
compromised


i ran all network aware services with my own build-overrides with 
-fstack-protector-all long before fedora considered 
-fstack-protector-srtong with *zero* difference for daily workloads as 
example


these days one simple rule: if you can improve security *than do it*



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

ld terminated with signal 9 [Killed]

2015-02-19 Thread Marek Skalický
Hi,
I were trying to compile f22 mongoDB package with enabled
_hardened_build . And it always failed with:

collect2: fatal error: ld terminated with signal 9 [Killed]
compilation terminated.
scons: *** [build/linux2/ssl/use-system-all/usev8/mongo/mongod] Error 1
scons: building terminated because of errors.
RPM build errors:
error: Bad exit status from /var/tmp/rpm-tmp.NWmAoC (%build)
Bad exit status from /var/tmp/rpm-tmp.NWmAoC (%build)
Child return code was: 1

(log file https://kojipkgs.fedoraproject.org//work/tasks/8167/8998167/build.log)

I've tried it four times and compilation failed always in different place 
(linking different binaries). Without enabled hardening it builds fine.
(On 9 Jan with a little older version I tried scratch hardened build and it 
also worked fine)

Where could be problem? Is it possible, that there isn't enough memory?

Thanks,
M.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Till Maas
On Thu, Feb 19, 2015 at 07:07:45PM +0100, Jakub Jelinek wrote:

> Even on x86_64 it was quite a measurable slowdown last time I've benchmarked
> it, now in F22+ we might have smaller slowdown with the x86_64 copyreloc for

Which packages are there that do not process untrusted data and are
slowed down much?

Regards
Till
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Minutes from Env-and-Stacks WG meeting (2015-02-19)

2015-02-19 Thread Honza Horak

==
#fedora-meeting-2: Env and Stacks (2015-02-19)
==


Meeting started by hhorak at 18:02:53 UTC. The full logs are available
at
http://meetbot.fedoraproject.org/fedora-meeting-2/2015-02-19/env-and-stacks.2015-02-19-18.02.log.html
.



Meeting summary
---
* Follow-ups -- any changes from last week?  (hhorak, 18:09:10)

* Dockerfiles recommended tips  (hhorak, 18:15:21)
  * LINK: https://fedoraproject.org/wiki/Env_and_Stacks/Tasklist
(hhorak, 18:15:45)
  * LINK:
https://fedoraproject.org/wiki/User:Hhorak/Draft/task-dockerfile-rules
(hhorak, 18:15:55)
  * ACTION: phracek to get in touch with marek, author of JBoss Docker
images best practices  (hhorak, 18:24:10)

* Some info about beaker @ fedoraproject and potential Env&Stack use
  cases  (hhorak, 18:24:39)
  * LINK: http://beaker.fedoraproject.org/   (hhorak, 18:25:28)
  * The initial use case was to run installer tests in
http://beaker.fedoraproject.org/  (hhorak, 18:27:44)
  * LINK: https://bitbucket.org/fedoraqa/fedora-beaker-tests   (hhorak,
18:27:54)

* Open Floor  (hhorak, 18:40:48)
  * RpmOstree change was approved, hooray!  (hhorak, 18:47:09)
  * LINK: https://fedoraproject.org/wiki/Changes/RpmOstree   (hhorak,
18:47:09)

Meeting ended at 18:48:17 UTC.




Action Items

* phracek to get in touch with marek, author of JBoss Docker images best
  practices




Action Items, by person
---
* phracek
  * phracek to get in touch with marek, author of JBoss Docker images
best practices
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* hhorak (53)
* phracek (16)
* walters (12)
* zodbot (4)
* bkabrda (0)
* ttomecek (0)
* sicampbell (0)
* vpavlin (0)
* juhp (0)
* ncoghlan (0)




Generated by `MeetBot`_ 0.1.4

.. _`MeetBot`: http://wiki.debian.org/MeetBot
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 01:02:29PM -0500, Adam Jackson wrote:
> On Thu, 2015-02-19 at 18:05 +0100, Jakub Jelinek wrote:
> > On Thu, Feb 19, 2015 at 06:00:41PM +0100, Till Maas wrote:
> > > I plan to change this to 1 now in Rawhide for the upcoming Fedora 23
> > > feature:
> > > https://bugzilla.redhat.com/show_bug.cgi?id=1192183
> > > 
> > > Since I did not get any feedback from the redhat-rpm-config maintainers
> > > on the bug, do you want to comment on the change?
> > 
> > I'm opposed to that change and have said that multiple times, but if FESCO
> > ruled on this already, I guess I have to give up.
> 
> Nothing's forever, it can always be changed back.  At some level I had
> difficulty caring about the issue since amd64 is effectively already all
> PIC anyway.  Is there a reason to not want it beyond losing a register
> on an already broken ABI?

Even on x86_64 it was quite a measurable slowdown last time I've benchmarked
it, now in F22+ we might have smaller slowdown with the x86_64 copyreloc for
PIE stuff, but it hasn't been benchmarked yet.
The PIC register isn't the only reason for slow down, got accesses are
another, relative relocations that COW lots of pages another, instruction
sizes (%rip) vs. non-PC relative another.
On i?86 the slowdown is of course much more significant, then we have
various other arches like arm, aarch64, ... where we probably don't have
benchmark data.  And x86_64 is right now the only target with copyreloc for
PIEs, so all the other arches get the additional hit of plenty got
dereferences everywhere.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Adam Jackson
On Thu, 2015-02-19 at 18:05 +0100, Jakub Jelinek wrote:
> On Thu, Feb 19, 2015 at 06:00:41PM +0100, Till Maas wrote:
> > I plan to change this to 1 now in Rawhide for the upcoming Fedora 23
> > feature:
> > https://bugzilla.redhat.com/show_bug.cgi?id=1192183
> > 
> > Since I did not get any feedback from the redhat-rpm-config maintainers
> > on the bug, do you want to comment on the change?
> 
> I'm opposed to that change and have said that multiple times, but if FESCO
> ruled on this already, I guess I have to give up.

Nothing's forever, it can always be changed back.  At some level I had
difficulty caring about the issue since amd64 is effectively already all
PIC anyway.  Is there a reason to not want it beyond losing a register
on an already broken ABI?

- ajax

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 06:00:41PM +0100, Till Maas wrote:
> On Thu, Feb 19, 2015 at 10:42:02AM +0100, Jakub Jelinek wrote:
> > On Thu, Feb 19, 2015 at 09:37:16AM +, Richard W.M. Jones wrote:
> > > The thing is, I'm not adding -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> > > explicitly in the real program.  It's being added to everything by
> > > something in RPM.  I'm not exactly sure what, maybe %{configure}?
> > > 
> > > So I don't know how to control this behaviour in a real autotools-using
> > > program.
> > 
> > I admit I haven't looked at rawhide redhat-rpm-config, perhaps somebody
> > broke something, but usually there is:
> > %_hardening_cflags  -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1
> > # we don't escape symbols '~', '"', etc. so be careful when changing this
> > %_hardening_ldflags -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> > 
> > #_hardened_build0
> 
> I plan to change this to 1 now in Rawhide for the upcoming Fedora 23
> feature:
> https://bugzilla.redhat.com/show_bug.cgi?id=1192183
> 
> Since I did not get any feedback from the redhat-rpm-config maintainers
> on the bug, do you want to comment on the change?

I'm opposed to that change and have said that multiple times, but if FESCO
ruled on this already, I guess I have to give up.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Till Maas
On Thu, Feb 19, 2015 at 10:42:02AM +0100, Jakub Jelinek wrote:
> On Thu, Feb 19, 2015 at 09:37:16AM +, Richard W.M. Jones wrote:
> > The thing is, I'm not adding -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> > explicitly in the real program.  It's being added to everything by
> > something in RPM.  I'm not exactly sure what, maybe %{configure}?
> > 
> > So I don't know how to control this behaviour in a real autotools-using
> > program.
> 
> I admit I haven't looked at rawhide redhat-rpm-config, perhaps somebody
> broke something, but usually there is:
> %_hardening_cflags  -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1
> # we don't escape symbols '~', '"', etc. so be careful when changing this
> %_hardening_ldflags -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> 
> #_hardened_build0

I plan to change this to 1 now in Rawhide for the upcoming Fedora 23
feature:
https://bugzilla.redhat.com/show_bug.cgi?id=1192183

Since I did not get any feedback from the redhat-rpm-config maintainers
on the bug, do you want to comment on the change?

Regards
Till
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: How to install Rawhide?

2015-02-19 Thread Michael Schwendt
On Wed, 18 Feb 2015 22:24:47 -0800, Adam Williamson wrote:

> Today's - 2015-02-18 - F22 nightlies seem not to have any anaconda 
> showstoppers, so for now probably using one of them is the best way to 
> install F22.

Thanks! Fetched it.

Also the -02-18 one for Rawhide x86_64 Live Workstation, which started
fine and managed to install, too. Haven't rebooted yet, though. Somewhat
odd, something was causing lots of CPU+fan usage during install, and whenever
I switched to vc and fired up "top", polkitd was at the top and disappeared
quickly, and the fans slowed down again.

The check for weak passwords was a pain, btw. ;-)

Oh, the irony, that I had to download ISO images multiple times before
I could manage to install something - instead of being able to use "fedup".
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Easiest way to debug build failures on rawhide?

2015-02-19 Thread Dave Johansen
On Wed, Feb 18, 2015 at 9:54 AM, Marcin Juszkiewicz  wrote:

> On 18.02.2015 16:31, Miroslav Suchý wrote:
> > On 02/18/2015 04:12 PM, Dave Johansen wrote:
> >> I'm running into an issue where odb won't build on rawhide (
> http://koji.fedoraproject.org/koji/taskinfo?taskID=8966447
> >> ) and I need to be able to take a look at the config.log file but it's
> not available from the standard koji output.
> >>
> >> So what's the easiest way for me to get access to that file? Do I have
> to install rawhide in a virtual machine and do
> >> the build myself? Or is there a simpler way to get access to other
> outputs from a build?
> >
> > mock -r fedora-rawhide-x86_64 --no-cleanup-after your.src.rpm
> >
> > and then investigate
> > /var/lib/mock/fedora-rawhide-x86_64/root/builddir/build/BUILD/
> >
> > or
> >   mock -r fedora-rawhide-x86_64 --shell
> > and you are inside of that build chroot.
>
> For such situations I have simple script:
>
> -
> #!/bin/bash
>
> SRCRPM=$1
>
> X=X
> LC_ALL=C LANG=C mock $SRCRPM \
> --resultdir=~mjuszkie/rpmbuild/mock/`basename $SRCRPM` \
> --verbose \
> --no-cleanup-after \
> --uniqueext=$SRCRPM $2 && X=Y
>
> if [ $X == X ]; then
> echo ""
> mock --shell --uniqueext=$SRCRPM $2
> fi
>
> mock --clean --uniqueext=$SRCRPM $2
>
> -
>
> Use is simple: "hrwmock.sh *.src.rpm" (to change build target I just add
> "-r fedora-21-aarch64").
>

Using mock did the trick.
Thanks,
Dave
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Easiest way to debug build failures on rawhide?

2015-02-19 Thread Dave Johansen
On Wed, Feb 18, 2015 at 8:36 AM, Paul Howarth  wrote:

> On 18/02/15 15:12, Dave Johansen wrote:
>
>> I'm running into an issue where odb won't build on rawhide (
>> http://koji.fedoraproject.org/koji/taskinfo?taskID=8966447 ) and I need
>> to be able to take a look at the config.log file but it's not available
>> from the standard koji output.
>>
>> So what's the easiest way for me to get access to that file? Do I have
>> to install rawhide in a virtual machine and do the build myself? Or is
>> there a simpler way to get access to other outputs from a build?
>>
>
> Try something like this:
>
> %{configure} || { cat config.log ; exit 1 }
>
> The config.log content would then appear in build.log
>

That's a nifty trick that I'll definitely keep in my back pocket.
Thanks,
Dave
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Results of a test mass rebuild of rawhide/x86_64 with gcc-5.0.0-0.5.fc22

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 04:12:43PM +0100, Frantisek Kluknavsky wrote:
> a list of things that usually break with each new gcc (like fortran modules)
> would be nice to avoid a lot of pain with debugging. Does it already exist?
> 
> WxGTK keeps a string WX_BUILD_OPTIONS_SIGNATURE currently saying "2.8 (no
> debug,Unicode,compiler with C++ ABI 1002,wx containers,compatible with
> 2.4,compatible with 2.6)" and it is checked at runtime. C++ ABI is supposed
> to be unchanged in Fedora 22. This string changed anyway because
> __GXX_ABI_VERSION in gcc changed. Is this expected/correct? Each freshly
> rebuilt wx application will crash now. After wxGTK is rebuilt, each old
> application will crash. A provenpackager should probably step in.

That is a WxGTK bug.  __GXX_ABI_VERSION can change, but usually the result
is still ABI compatible, g++ emits just some aliases when mangling has
changed.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Results of a test mass rebuild of rawhide/x86_64 with gcc-5.0.0-0.5.fc22

2015-02-19 Thread Frantisek Kluknavsky

Hi,

a list of things that usually break with each new gcc (like fortran 
modules) would be nice to avoid a lot of pain with debugging. Does it 
already exist?


WxGTK keeps a string WX_BUILD_OPTIONS_SIGNATURE currently saying "2.8 
(no debug,Unicode,compiler with C++ ABI 1002,wx containers,compatible 
with 2.4,compatible with 2.6)" and it is checked at runtime. C++ ABI is 
supposed to be unchanged in Fedora 22. This string changed anyway 
because __GXX_ABI_VERSION in gcc changed. Is this expected/correct? Each 
freshly rebuilt wx application will crash now. After wxGTK is rebuilt, 
each old application will crash. A provenpackager should probably step in.


Have a nice day,

Fero
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: [Test-Announce] Fedora 22 Branched 20150218 nightly compose nominated for testing

2015-02-19 Thread Michael Cronenworth

On 02/18/2015 01:21 PM, adamw...@fedoraproject.org wrote:


https://fedoraproject.org/wiki/Test_Results:Fedora_22_Branched_20150218_Installation


Text-mode installation does not work - noted in the matrix.

The installation source spoke does not work. No matter what I choose, even 
specifying a repo URL, anaconda says it cannot find a valid installation source.


I'm not a normal tester of Fedora n+1 so I cannot say when this broke.
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones
On Thu, Feb 19, 2015 at 11:45:01AM +0100, Jakub Jelinek wrote:
> On Thu, Feb 19, 2015 at 10:37:46AM +, Richard W.M. Jones wrote:
> > On Thu, Feb 19, 2015 at 11:35:17AM +0100, Jakub Jelinek wrote:
> > > On Thu, Feb 19, 2015 at 10:30:50AM +, Richard W.M. Jones wrote:
> > > > info gcc, of course yes.  -DPIC is not documented at all, and the
> > > > various pie/pic options are obscure to say the least.
> > > 
> > > Why should -DPIC be documented?  -D is documented.  -DPIC means define
> > > macro PIC to 1.  There is no magic in that beyond, just a convention,
> > > used e.g. by libtool, so that some sources can do things conditional on
> > > whether they are compiled as position independent or not.  Of course, gcc
> > > also predefines __pic__/__PIC__/__pie__/__PIE__ macros depending on 
> > > command
> > > line options.
> > 
> > Can I ask you a simple question?  Which of:
> > 
> > -DPIE
> > -fPIE
> > -fpie
> > 
> > should I use when compiling and/or linking binaries for Rawhide?
> 
> It depends.  If you want to compile/link position independent binaries,
> use -fpie (-fPIE if you get linker errors on certain architectures if your
> binaries are too big) to compile and -pie to link.
> If you want normal binaries, no specific options in either case.
> If you want to follow the redhat-rpm-config %_hardened_build, i.e. build
> PIEs if it is 1 and normal binaries if it is 0, make sure you pass
> %{optflags} aka $RPM_OPT_FLAGS to the compiler driver when compiling and
> %{__global_ldflags} to the compiler driver when linking.
> Overriding CFLAGS/CXXFLAGS globally to -fpie or -fPIE and LDFLAGS to -pie
> if your package builds both binaries and shared libraries won't really work,
> because you might end up compiling shared library objects with -fpie rather
> than -fpic or try to link shared libraries with -shared -pie.

Thanks - I have linked this post to the BZ and closed it.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
libguestfs lets you edit virtual machines.  Supports shell scripting,
bindings from many languages.  http://libguestfs.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 10:37:46AM +, Richard W.M. Jones wrote:
> On Thu, Feb 19, 2015 at 11:35:17AM +0100, Jakub Jelinek wrote:
> > On Thu, Feb 19, 2015 at 10:30:50AM +, Richard W.M. Jones wrote:
> > > info gcc, of course yes.  -DPIC is not documented at all, and the
> > > various pie/pic options are obscure to say the least.
> > 
> > Why should -DPIC be documented?  -D is documented.  -DPIC means define
> > macro PIC to 1.  There is no magic in that beyond, just a convention,
> > used e.g. by libtool, so that some sources can do things conditional on
> > whether they are compiled as position independent or not.  Of course, gcc
> > also predefines __pic__/__PIC__/__pie__/__PIE__ macros depending on command
> > line options.
> 
> Can I ask you a simple question?  Which of:
> 
> -DPIE
> -fPIE
> -fpie
> 
> should I use when compiling and/or linking binaries for Rawhide?

It depends.  If you want to compile/link position independent binaries,
use -fpie (-fPIE if you get linker errors on certain architectures if your
binaries are too big) to compile and -pie to link.
If you want normal binaries, no specific options in either case.
If you want to follow the redhat-rpm-config %_hardened_build, i.e. build
PIEs if it is 1 and normal binaries if it is 0, make sure you pass
%{optflags} aka $RPM_OPT_FLAGS to the compiler driver when compiling and
%{__global_ldflags} to the compiler driver when linking.
Overriding CFLAGS/CXXFLAGS globally to -fpie or -fPIE and LDFLAGS to -pie
if your package builds both binaries and shared libraries won't really work,
because you might end up compiling shared library objects with -fpie rather
than -fpic or try to link shared libraries with -shared -pie.

I haven't seen any recent redhat-rpm-config change in koji though.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones
On Thu, Feb 19, 2015 at 10:37:46AM +, Richard W.M. Jones wrote:
> On Thu, Feb 19, 2015 at 11:35:17AM +0100, Jakub Jelinek wrote:
> > On Thu, Feb 19, 2015 at 10:30:50AM +, Richard W.M. Jones wrote:
> > > info gcc, of course yes.  -DPIC is not documented at all, and the
> > > various pie/pic options are obscure to say the least.
> > 
> > Why should -DPIC be documented?  -D is documented.  -DPIC means define
> > macro PIC to 1.  There is no magic in that beyond, just a convention,
> > used e.g. by libtool, so that some sources can do things conditional on
> > whether they are compiled as position independent or not.  Of course, gcc
> > also predefines __pic__/__PIC__/__pie__/__PIE__ macros depending on command
> > line options.
> 
> Can I ask you a simple question?  Which of:
> 
> -DPIE
> -fPIE
> -fpie

Missed one:

  -pie

Reading the thread that Padraig pointed to, it seems as if
_hardened_build should be adding the right flags already.  It looks as
if the packager should not need to add flags at all (they would be
added automatically by %{configure}).  So a second question would be,
why doesn't it?

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-builder quickly builds VMs from scratch
http://libguestfs.org/virt-builder.1.html
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones
On Thu, Feb 19, 2015 at 11:35:17AM +0100, Jakub Jelinek wrote:
> On Thu, Feb 19, 2015 at 10:30:50AM +, Richard W.M. Jones wrote:
> > info gcc, of course yes.  -DPIC is not documented at all, and the
> > various pie/pic options are obscure to say the least.
> 
> Why should -DPIC be documented?  -D is documented.  -DPIC means define
> macro PIC to 1.  There is no magic in that beyond, just a convention,
> used e.g. by libtool, so that some sources can do things conditional on
> whether they are compiled as position independent or not.  Of course, gcc
> also predefines __pic__/__PIC__/__pie__/__PIE__ macros depending on command
> line options.

Can I ask you a simple question?  Which of:

-DPIE
-fPIE
-fpie

should I use when compiling and/or linking binaries for Rawhide?

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-p2v converts physical machines to virtual machines.  Boot with a
live CD or over the network (PXE) and turn machines into KVM guests.
http://libguestfs.org/virt-v2v
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 10:30:50AM +, Richard W.M. Jones wrote:
> info gcc, of course yes.  -DPIC is not documented at all, and the
> various pie/pic options are obscure to say the least.

Why should -DPIC be documented?  -D is documented.  -DPIC means define
macro PIC to 1.  There is no magic in that beyond, just a convention,
used e.g. by libtool, so that some sources can do things conditional on
whether they are compiled as position independent or not.  Of course, gcc
also predefines __pic__/__PIC__/__pie__/__PIE__ macros depending on command
line options.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones
On Thu, Feb 19, 2015 at 11:23:18AM +0100, Jakub Jelinek wrote:
> On Thu, Feb 19, 2015 at 10:11:07AM +, Richard W.M. Jones wrote:
> > 
> > I'm still no closer to being able to fix the problem.
> > 
> > I have to add -fPIE (or is that -pie or -fpie or -DPIE) to every
> > executable?  Upstream?  Will that break on some platforms/architectures?
> 
> It really should be just about using the %{optflags} and
> %{__global_ldflags} consistently, unless somebody introduced recently a
> redhat-rpm-config bug.
> 
> > And indeed what is the difference between -fPIE / -pie / -fpie /
> > -fPIC / -fpic / -DPIC / etc?  Where is this stuff documented?
> 
> Have you tried something so obvious as man gcc ?

info gcc, of course yes.  -DPIC is not documented at all, and the
various pie/pic options are obscure to say the least.

The GCC 5 documentation is not online, but here is what
GCC 4.9.2 has to say:

https://gcc.gnu.org/onlinedocs/gcc-4.9.2/gcc/Code-Gen-Options.html#Code-Gen-Options#index-PIC-2613

I've written compilers (two of them, from scratch) and this stuff
barely makes sense.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-builder quickly builds VMs from scratch
http://libguestfs.org/virt-builder.1.html
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 10:11:07AM +, Richard W.M. Jones wrote:
> 
> I'm still no closer to being able to fix the problem.
> 
> I have to add -fPIE (or is that -pie or -fpie or -DPIE) to every
> executable?  Upstream?  Will that break on some platforms/architectures?

It really should be just about using the %{optflags} and
%{__global_ldflags} consistently, unless somebody introduced recently a
redhat-rpm-config bug.

> And indeed what is the difference between -fPIE / -pie / -fpie /
> -fPIC / -fpic / -DPIC / etc?  Where is this stuff documented?

Have you tried something so obvious as man gcc ?

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones

I'm still no closer to being able to fix the problem.

I have to add -fPIE (or is that -pie or -fpie or -DPIE) to every
executable?  Upstream?  Will that break on some platforms/architectures?

And indeed what is the difference between -fPIE / -pie / -fpie /
-fPIC / -fpic / -DPIC / etc?  Where is this stuff documented?

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 09:51:33AM +, Richard W.M. Jones wrote:
> There is definitely new/different behaviour in Rawhide, and recently.
> 
> Also I was only able to see the new behaviour by updating from gcc 4.x
> -> gcc 5.  ie. Updating redhat-rpm-config isn't what causes the
> problem.

Well, gcc 4.x (or gcc 5 configured against any linker but very
recent one) on x86_64 sometimes used to tollerate incorrect linking of
-fpie/-fPIE compiled objects into shared libraries (it would still assume
in optimizations that local definitions can't be interposed, but if you
weren't trying to do that, perhaps it would happen to work).  gcc 5 on
x86_64 configured against recent linker assumes PIEs can use copy
relocations and therefore you can get various linker errors if you try to
link -fpie/-fPIE compiled objects into shared libraries.  Don't do that.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones
On Thu, Feb 19, 2015 at 10:42:02AM +0100, Jakub Jelinek wrote:
> On Thu, Feb 19, 2015 at 09:37:16AM +, Richard W.M. Jones wrote:
> > The thing is, I'm not adding -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> > explicitly in the real program.  It's being added to everything by
> > something in RPM.  I'm not exactly sure what, maybe %{configure}?
> > 
> > So I don't know how to control this behaviour in a real autotools-using
> > program.
> 
> I admit I haven't looked at rawhide redhat-rpm-config, perhaps somebody
> broke something, but usually there is:
> %_hardening_cflags  -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1
> # we don't escape symbols '~', '"', etc. so be careful when changing this
> %_hardening_ldflags -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> 
> #_hardened_build0
> %_hardened_cflags   %{?_hardened_build:%{_hardening_cflags}}
> %_hardened_ldflags  %{?_hardened_build:%{_hardening_ldflags}}
> 
> %__global_cflags-O2 -g -pipe -Wall -Werror=format-security 
> -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong 
> --param=ssp-buffer-size=4 -grecord-gcc-switches %{_hardened_cflags}
> %__global_ldflags   -Wl,-z,relro %{_hardened_ldflags}
> 
> and thus e.g. %{configure} should add the *-hardened-cc1 to
> CFLAGS/CXXFLAGS/FFLAGS etc. and *-hardened-ld to LDFLAGS.

There is definitely new/different behaviour in Rawhide, and recently.

Also I was only able to see the new behaviour by updating from gcc 4.x
-> gcc 5.  ie. Updating redhat-rpm-config isn't what causes the
problem.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-builder quickly builds VMs from scratch
http://libguestfs.org/virt-builder.1.html
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 09:37:16AM +, Richard W.M. Jones wrote:
> The thing is, I'm not adding -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> explicitly in the real program.  It's being added to everything by
> something in RPM.  I'm not exactly sure what, maybe %{configure}?
> 
> So I don't know how to control this behaviour in a real autotools-using
> program.

I admit I haven't looked at rawhide redhat-rpm-config, perhaps somebody
broke something, but usually there is:
%_hardening_cflags  -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1
# we don't escape symbols '~', '"', etc. so be careful when changing this
%_hardening_ldflags -specs=/usr/lib/rpm/redhat/redhat-hardened-ld

#_hardened_build0
%_hardened_cflags   %{?_hardened_build:%{_hardening_cflags}}
%_hardened_ldflags  %{?_hardened_build:%{_hardening_ldflags}}

%__global_cflags-O2 -g -pipe -Wall -Werror=format-security 
-Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong 
--param=ssp-buffer-size=4 -grecord-gcc-switches %{_hardened_cflags}
%__global_ldflags   -Wl,-z,relro %{_hardened_ldflags}

and thus e.g. %{configure} should add the *-hardened-cc1 to
CFLAGS/CXXFLAGS/FFLAGS etc. and *-hardened-ld to LDFLAGS.

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones

And in another case I had (qemu), it's not predictable.  If you just
compile part of qemu twice, the first time it gives the error and the
second time not.

I had to add this hack to qemu.spec:

http://pkgs.fedoraproject.org/cgit/qemu.git/commit/?id=6c3741c2769a21542a34716fa9188e520887a803

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-builder quickly builds VMs from scratch
http://libguestfs.org/virt-builder.1.html
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones
On Thu, Feb 19, 2015 at 10:22:03AM +0100, Jakub Jelinek wrote:
> On Thu, Feb 19, 2015 at 09:14:32AM +, Richard W.M. Jones wrote:
> > 
> > https://bugzilla.redhat.com/show_bug.cgi?id=1194167
> > 
> > Basically everything in Rawhide which uses the normal RPM
> > opt flags will now have to be compiled with -fPIC, otherwise
> > you get errors like:
> > 
> > /usr/bin/ld: /tmp/ccqyK5ia.o: relocation R_X86_64_32S against 
> > `virConnectOpen' can not be used when making a shared object; recompile 
> > with -fPIC
> > 
> > This is somewhat surprising ..
> 
> Of course not.  But, anything you link with
> -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
> has to be compiled with
> -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1
> The latter will supply -fPIE by default if you don't specify
> -fno-pic/-fpic/-fPIC/-fpie/-fPIE explicitly on the command line,
> similarly to how redhat-hardened-ld supplies -pie if -shared is not given.
> The rule is simple, objects to be linked into shared libraries
> have to be compiled with -fpic or -fPIC.
> Objects linked into position independent binaries have to be compiled
> with -fpie or -fPIE or -fpic or -fPIC (the latter two being less efficient
> for PIEs, on the other side can be linked into shared libraries too).
> Objects linked into position dependent binaries can be compiled with any of
> -fno-pic/-fpic/-fPIC/-fpie/-fPIE (-fno-pic is the default if you don't use
> -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 and is the most efficient
> -flag for position dependent binaries).

The thing is, I'm not adding -specs=/usr/lib/rpm/redhat/redhat-hardened-ld
explicitly in the real program.  It's being added to everything by
something in RPM.  I'm not exactly sure what, maybe %{configure}?

So I don't know how to control this behaviour in a real autotools-using
program.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-builder quickly builds VMs from scratch
http://libguestfs.org/virt-builder.1.html
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Jakub Jelinek
On Thu, Feb 19, 2015 at 09:14:32AM +, Richard W.M. Jones wrote:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1194167
> 
> Basically everything in Rawhide which uses the normal RPM
> opt flags will now have to be compiled with -fPIC, otherwise
> you get errors like:
> 
> /usr/bin/ld: /tmp/ccqyK5ia.o: relocation R_X86_64_32S against 
> `virConnectOpen' can not be used when making a shared object; recompile with 
> -fPIC
> 
> This is somewhat surprising ..

Of course not.  But, anything you link with
-specs=/usr/lib/rpm/redhat/redhat-hardened-ld
has to be compiled with
-specs=/usr/lib/rpm/redhat/redhat-hardened-cc1
The latter will supply -fPIE by default if you don't specify
-fno-pic/-fpic/-fPIC/-fpie/-fPIE explicitly on the command line,
similarly to how redhat-hardened-ld supplies -pie if -shared is not given.
The rule is simple, objects to be linked into shared libraries
have to be compiled with -fpic or -fPIC.
Objects linked into position independent binaries have to be compiled
with -fpie or -fPIE or -fpic or -fPIC (the latter two being less efficient
for PIEs, on the other side can be linked into shared libraries too).
Objects linked into position dependent binaries can be compiled with any of
-fno-pic/-fpic/-fPIC/-fpie/-fPIE (-fno-pic is the default if you don't use
-specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 and is the most efficient
-flag for position dependent binaries).

Jakub
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

So everything in Rawhide must be compiled with -fPIC?

2015-02-19 Thread Richard W.M. Jones

https://bugzilla.redhat.com/show_bug.cgi?id=1194167

Basically everything in Rawhide which uses the normal RPM
opt flags will now have to be compiled with -fPIC, otherwise
you get errors like:

/usr/bin/ld: /tmp/ccqyK5ia.o: relocation R_X86_64_32S against `virConnectOpen' 
can not be used when making a shared object; recompile with -fPIC

This is somewhat surprising ..

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct