Re: Btrfs by default, the compression option

2020-07-09 Thread drago01
On Friday, July 10, 2020, Zachary Lym  wrote:

> > Yes, it's completely reasonable to not do it. It might seem like a big
> > change on its own, but Btrfs has had native compression for 10+ years,
> > and at least three years for most all of the workloads at Facebook. So
> > it's quite safe.
>
> But it has been eating data as recently as 2018 [1] and the Debian wiki
> warns strongly against using compression that is dated for 2020 [2].  The
> project will already see a large number of new bugs thanks to the wider
> breadth of hardware, why throw in an additional variable when you can flip
> it on in six months anyway?


Then again only for new installs. Would be better to move all of it by six
months - enabling it without taking advantage of such features would be
kind of wasteful. Also if two years is "recent" how do 6 months change
anything?


>
> 1: https://www.spinics.net/lists/linux-btrfs/msg81293.html
> 2: https://wiki.debian.org/Btrfs#Warnings
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://docs.fedoraproject.
> org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.
> fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread Przemek Klosowski via devel

On 7/9/20 10:46 AM, John M. Harris Jr wrote:

"Secure Boot" doesn't make root non-uid 0, and can't keep root from
controlling system devices, even uploading unsigned firmware to peripherals.


While it's true that a completely secure software chain doesn't really 
exist yet, we are slowly going in that direction, because it is just 
inconceivable otherwise in the world with billions of autonomous IOT 
devices---the consequences of a worm-type insecurity that would subvert 
a significant portion of Internet-connected devices are just too scary.


For instance, one possible solution used e.g. for a secure BIOS updates 
is to prevent loading firmware directly, and instead load it into a 
separate flash area. Then, reset the system:


 * existing certified firmware boots and finds the updated firmware
 * new firmware is measured and verified
 * if it passes, the old firmware copies and activates the updated firmware

So you see that you can't subvert this even with UID==0. Same thing for 
controlling system devices---with secure software chain even the 
applications can be certified and controlled. THis is not your or my 
desktop system, of course, but there is a need for systems like this.


When I hear you say that this takes away the ownership of our computers 
from us, I think that it's got to be this way for a large part of those 
billions of systems---as the saying goes, we have to stop thinking of 
computers as pets, and start seeing them as cattle. We can still have 
pets as well, but there has to be a way to herd cattle.


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[389-devel] 389 DS nightly 2020-07-10 - 95% PASS

2020-07-09 Thread vashirov
https://fedorapeople.org/groups/389ds/ci/nightly/2020/07/10/report-389-ds-base-1.4.4.4-20200709git318a3ce.fc32.x86_64.html
___
389-devel mailing list -- 389-devel@lists.fedoraproject.org
To unsubscribe send an email to 389-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/389-devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/9/20 9:15 PM, Josef Bacik wrote:
> On 7/9/20 9:30 PM, Eric Sandeen wrote:

...

>>> This test is run constantly by us, specifically because it's the error 
>>> cases that get you.  But not for crash consistency reasons, because we're 
>>> solid there.  I run them to make sure I don't have stupid things like 
>>> reference leaks or whatever in the error path.  Thanks,
>>
>> or "corrupted!" printk()s that terrify the hapless user? ;)
> 
> I'd love to know what hapless user is running xfstests.  Thanks,

*sigh*

the point is, telling the user "your filesystem is corrupted" if it's not 
actually corrupted is bad news.  Discovering that communication problem via 
xfstests does not make the concern less valid.  I was trying to gently tease 
you that the test not only discovers leaks, but also discovers terrifyingly 
inaccurate messages in response to IO errors, but I guess that didn't come 
through.

Thanks.

-Eric
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Josef Bacik

On 7/9/20 9:30 PM, Eric Sandeen wrote:

On 7/9/20 8:22 PM, Josef Bacik wrote:

On 7/9/20 7:23 PM, Eric Sandeen wrote:

On 7/9/20 4:27 PM, Eric Sandeen wrote:

On 7/9/20 3:32 PM, Davide Cavalca via devel wrote:


...


As someone on one of the teams at FB that has to deal with that, I can
assure you all the scenarios you listed can and do happen, and they
happen a lot. While we don't have the "laptop's out of battery" issue
on the production side, we have plenty of power events and unplanned
maintenances that can and will hit live machines and cut power off.
Force reboots (triggered by either humans or automation) are also not
at all uncommon. Rebuilding machines from scratch isn't free, even with
all the automation and stuff we have, so if power loss or reboot events
on machines using btrfs caused widespread corruption or other issues
I'm confident we'd have found that out pretty early on.


It is a bare minimum expectation that filesystems like btrfs, ext4, and xfs
do not suffer filesystem corruptions and inconsistencies due to reboots
and power losses.

So for the record I am in no way insinuating that btrfs is less crash-safe
than other filesystems (though I have not tested that, so if I have time
I'll throw that into the mix as well.)


So, we already have those tests in xfstests, and I put btrfs through a few
loops.  This is generic/475:

# Copyright (c) 2017 Oracle, Inc.  All Rights Reserved.
#
# FS QA Test No. 475
#
# Test log recovery with repeated (simulated) disk failures.  We kick
# off fsstress on the scratch fs, then switch out the underlying device
# with dm-error to see what happens when the disk goes down.  Having
# taken down the fs in this manner, remount it and repeat.  This test
# is a Good Enough (tm) simulation of our internal multipath failure
# testing efforts.

It fails within 2 loops.  Is it a critical failure? I don't know; the
test looks for unexpected things in dmesg, and perhaps the filter is
wrong.  But I see stack traces during the run, and message like:

[689284.484258] BTRFS: error (device dm-3) in btrfs_sync_log:3084: errno=-117 
Filesystem corrupted


You might want to change that message, then.  If it's not corrupted, I'd suggest not doing 
printk("corrupted!") because that will make people think that it's corrupted, because it 
says "Filesystem corrupted..." ;)



Yeah probably not the best, but again not something a user will generally see.



Yeah, because dm-error throws EIO, and thus we abort the transaction, which 
results in an EUCLEAN if you run fsync.  This is a scary sounding message, but 
its _exactly_ what's expected from generic/475.  I've been running this in a 
loop for an hour and the thing hasn't failed yet.  There's all sorts of scary 
messages


That's weird.  The test fails very quickly for me - again, AFAICT it fails due 
to things in dmesg that aren't recognized as safe by the test harness, but a 
variety of things - not just stack dumps - seem to trigger the failure.


Do you know what's tripping it?  Because my loop is still running happily along.




[17929.939871] BTRFS warning (device dm-13): direct IO failed ino 261 rw 
1,34817 sector 0xb8ce0 len 24576 err no 10
[17929.943099] BTRFS: error (device dm-13) in btrfs_commit_transaction:2323: 
errno=-5 IO failure (Error while writing out transaction)

again, totally expected because we're forcing EIO's at random times.


Right, of course it will get IO errors, that's why I didn't highlight those in 
my email.


so I can't say for sure.

Are btrfs devs using these tests to assess crash/powerloss resiliency
on a regular basis?  TBH I honestly did not expect to see any test
failures here, whether or not they are test artifacts; any filesystem
using xfstests as a benchmark needs to be keeping things up to date.



It depends on the config options.  Some of our transaction abort sites dump 
stack, and that trips the dmesg filter, and thus it fails.  Generally when I 
run this test I turn those options off.


It would be good, in general, to fix up the test for btrfs so that it does not 
yield false positives, if that's what this is.  Otherwise it trains people to 
ignore it or not run it


Except it doesn't, it's not failing for me now.  Like I said we pay particularly 
close attention to this test because it has a habit of finding memory leaks or 
reference accounting bugs.





This test is run constantly by us, specifically because it's the error cases 
that get you.  But not for crash consistency reasons, because we're solid 
there.  I run them to make sure I don't have stupid things like reference leaks 
or whatever in the error path.  Thanks,


or "corrupted!" printk()s that terrify the hapless user? ;)


I'd love to know what hapless user is running xfstests.  Thanks,

Josef
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 

Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/9/20 8:22 PM, Josef Bacik wrote:
> On 7/9/20 7:23 PM, Eric Sandeen wrote:
>> On 7/9/20 4:27 PM, Eric Sandeen wrote:
>>> On 7/9/20 3:32 PM, Davide Cavalca via devel wrote:
>>
>> ...
>>
 As someone on one of the teams at FB that has to deal with that, I can
 assure you all the scenarios you listed can and do happen, and they
 happen a lot. While we don't have the "laptop's out of battery" issue
 on the production side, we have plenty of power events and unplanned
 maintenances that can and will hit live machines and cut power off.
 Force reboots (triggered by either humans or automation) are also not
 at all uncommon. Rebuilding machines from scratch isn't free, even with
 all the automation and stuff we have, so if power loss or reboot events
 on machines using btrfs caused widespread corruption or other issues
 I'm confident we'd have found that out pretty early on.
>>>
>>> It is a bare minimum expectation that filesystems like btrfs, ext4, and xfs
>>> do not suffer filesystem corruptions and inconsistencies due to reboots
>>> and power losses.
>>>
>>> So for the record I am in no way insinuating that btrfs is less crash-safe
>>> than other filesystems (though I have not tested that, so if I have time
>>> I'll throw that into the mix as well.)
>>
>> So, we already have those tests in xfstests, and I put btrfs through a few
>> loops.  This is generic/475:
>>
>> # Copyright (c) 2017 Oracle, Inc.  All Rights Reserved.
>> #
>> # FS QA Test No. 475
>> #
>> # Test log recovery with repeated (simulated) disk failures.  We kick
>> # off fsstress on the scratch fs, then switch out the underlying device
>> # with dm-error to see what happens when the disk goes down.  Having
>> # taken down the fs in this manner, remount it and repeat.  This test
>> # is a Good Enough (tm) simulation of our internal multipath failure
>> # testing efforts.
>>
>> It fails within 2 loops.  Is it a critical failure? I don't know; the
>> test looks for unexpected things in dmesg, and perhaps the filter is
>> wrong.  But I see stack traces during the run, and message like:
>>
>> [689284.484258] BTRFS: error (device dm-3) in btrfs_sync_log:3084: 
>> errno=-117 Filesystem corrupted

You might want to change that message, then.  If it's not corrupted, I'd 
suggest not doing printk("corrupted!") because that will make people think that 
it's corrupted, because it says "Filesystem corrupted..." ;)

> 
> Yeah, because dm-error throws EIO, and thus we abort the transaction, which 
> results in an EUCLEAN if you run fsync.  This is a scary sounding message, 
> but its _exactly_ what's expected from generic/475.  I've been running this 
> in a loop for an hour and the thing hasn't failed yet.  There's all sorts of 
> scary messages

That's weird.  The test fails very quickly for me - again, AFAICT it fails due 
to things in dmesg that aren't recognized as safe by the test harness, but a 
variety of things - not just stack dumps - seem to trigger the failure.

> [17929.939871] BTRFS warning (device dm-13): direct IO failed ino 261 rw 
> 1,34817 sector 0xb8ce0 len 24576 err no 10
> [17929.943099] BTRFS: error (device dm-13) in btrfs_commit_transaction:2323: 
> errno=-5 IO failure (Error while writing out transaction)
> 
> again, totally expected because we're forcing EIO's at random times.

Right, of course it will get IO errors, that's why I didn't highlight those in 
my email.

>> so I can't say for sure.
>>
>> Are btrfs devs using these tests to assess crash/powerloss resiliency
>> on a regular basis?  TBH I honestly did not expect to see any test
>> failures here, whether or not they are test artifacts; any filesystem
>> using xfstests as a benchmark needs to be keeping things up to date.
>>
> 
> It depends on the config options.  Some of our transaction abort sites dump 
> stack, and that trips the dmesg filter, and thus it fails.  Generally when I 
> run this test I turn those options off.

It would be good, in general, to fix up the test for btrfs so that it does not 
yield false positives, if that's what this is.  Otherwise it trains people to 
ignore it or not run it

> This test is run constantly by us, specifically because it's the error cases 
> that get you.  But not for crash consistency reasons, because we're solid 
> there.  I run them to make sure I don't have stupid things like reference 
> leaks or whatever in the error path.  Thanks,

or "corrupted!" printk()s that terrify the hapless user? ;)

-Eric
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[EPEL-devel] Fedora EPEL 6 updates-testing report

2020-07-09 Thread updates
The following Fedora EPEL 6 Security updates need testing:
 Age  URL
   8  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-b1a8a3c29a   
putty-0.74-1.el6
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-8c3e76982e   
python-rsa-3.4.2-1.el6
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-7b550f6ce5   
python-gnupg-0.4.6-1.el6
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-cf2168a68d   
php-horde-kronolith-4.2.28-1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

gtk-gnutella-1.2.0-1.el6

Details about builds:



 gtk-gnutella-1.2.0-1.el6 (FEDORA-EPEL-2020-109ce16b2a)
 GUI based Gnutella Client

Update Information:

Update to 1.2.0  Fixes many bugs and crashes and has many improvements, see
http://gtk-gnutella.sourceforge.net/en/?page=news for more info.

ChangeLog:

* Thu Jul  9 2020 Dmitry Butskoy  - 1.2.0-1
- Upgrade to 1.2.0
- re-calculate sha1 of the stripped binary at the end of the install stage
  (when it is actually stripped in the distribution's specific way)
- provide appdata file
* Wed Jan 29 2020 Fedora Release Engineering  - 
1.1.15-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Josef Bacik

On 7/9/20 7:23 PM, Eric Sandeen wrote:

On 7/9/20 4:27 PM, Eric Sandeen wrote:

On 7/9/20 3:32 PM, Davide Cavalca via devel wrote:


...


As someone on one of the teams at FB that has to deal with that, I can
assure you all the scenarios you listed can and do happen, and they
happen a lot. While we don't have the "laptop's out of battery" issue
on the production side, we have plenty of power events and unplanned
maintenances that can and will hit live machines and cut power off.
Force reboots (triggered by either humans or automation) are also not
at all uncommon. Rebuilding machines from scratch isn't free, even with
all the automation and stuff we have, so if power loss or reboot events
on machines using btrfs caused widespread corruption or other issues
I'm confident we'd have found that out pretty early on.


It is a bare minimum expectation that filesystems like btrfs, ext4, and xfs
do not suffer filesystem corruptions and inconsistencies due to reboots
and power losses.

So for the record I am in no way insinuating that btrfs is less crash-safe
than other filesystems (though I have not tested that, so if I have time
I'll throw that into the mix as well.)


So, we already have those tests in xfstests, and I put btrfs through a few
loops.  This is generic/475:

# Copyright (c) 2017 Oracle, Inc.  All Rights Reserved.
#
# FS QA Test No. 475
#
# Test log recovery with repeated (simulated) disk failures.  We kick
# off fsstress on the scratch fs, then switch out the underlying device
# with dm-error to see what happens when the disk goes down.  Having
# taken down the fs in this manner, remount it and repeat.  This test
# is a Good Enough (tm) simulation of our internal multipath failure
# testing efforts.

It fails within 2 loops.  Is it a critical failure? I don't know; the
test looks for unexpected things in dmesg, and perhaps the filter is
wrong.  But I see stack traces during the run, and message like:

[689284.484258] BTRFS: error (device dm-3) in btrfs_sync_log:3084: errno=-117 
Filesystem corrupted



Yeah, because dm-error throws EIO, and thus we abort the transaction, which 
results in an EUCLEAN if you run fsync.  This is a scary sounding message, but 
its _exactly_ what's expected from generic/475.  I've been running this in a 
loop for an hour and the thing hasn't failed yet.  There's all sorts of scary 
messages


[17929.939871] BTRFS warning (device dm-13): direct IO failed ino 261 rw 1,34817 
sector 0xb8ce0 len 24576 err no 10
[17929.943099] BTRFS: error (device dm-13) in btrfs_commit_transaction:2323: 
errno=-5 IO failure (Error while writing out transaction)


again, totally expected because we're forcing EIO's at random times.


so I can't say for sure.

Are btrfs devs using these tests to assess crash/powerloss resiliency
on a regular basis?  TBH I honestly did not expect to see any test
failures here, whether or not they are test artifacts; any filesystem
using xfstests as a benchmark needs to be keeping things up to date.



It depends on the config options.  Some of our transaction abort sites dump 
stack, and that trips the dmesg filter, and thus it fails.  Generally when I run 
this test I turn those options off.


This test is run constantly by us, specifically because it's the error cases 
that get you.  But not for crash consistency reasons, because we're solid there. 
 I run them to make sure I don't have stupid things like reference leaks or 
whatever in the error path.  Thanks,


Josef
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[EPEL-devel] Fedora EPEL 7 updates-testing report

2020-07-09 Thread updates
The following Fedora EPEL 7 Security updates need testing:
 Age  URL
 695  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2018-3c9292b62d   
condor-8.6.11-1.el7
 434  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-bc0182548b   
bubblewrap-0.3.3-2.el7
 144  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-fa8a2e97c6   
python-waitress-1.4.3-1.el7
  84  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-19d171a465   
python34-3.4.10-5.el7
  13  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-6ad4894c0c   
jbig2dec-0.12-5.el7
  12  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-0078f6abc1   
xpdf-3.04-10.el7
  10  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-af9c6001d1   
ngircd-26-1.el7
  10  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-5d348316dd   
chromium-83.0.4103.116-3.el7
   8  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-afd5c42fd6   
coturn-4.5.1.3-1.el7
   8  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-6949cf3502   
xrdp-0.9.13.1-1.el7
   8  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-2f70f49092   
putty-0.74-1.el7
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-0f25da8099   
python-rsa-3.4.2-1.el7
   4  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-28cc1451e0   
python-gnupg-0.4.6-2.el7
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-cbcc9ca06b   
php-horde-kronolith-4.2.28-1.el7
   1  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-8dd45257ad   
seamonkey-2.53.3-1.el7


The following builds have been pushed to Fedora EPEL 7 updates-testing

gtk-gnutella-1.2.0-1.el7
python-catkin_lint-1.6.10-1.el7
rdiff-backup-2.0.3-5.el7

Details about builds:



 gtk-gnutella-1.2.0-1.el7 (FEDORA-EPEL-2020-df3ecab1c8)
 GUI based Gnutella Client

Update Information:

Update to 1.2.0  Fixes many bugs and crashes and has many improvements, see
http://gtk-gnutella.sourceforge.net/en/?page=news for more info.

ChangeLog:

* Thu Jul  9 2020 Dmitry Butskoy  - 1.2.0-1
- Upgrade to 1.2.0
- re-calculate sha1 of the stripped binary at the end of the install stage
  (when it is actually stripped in the distribution's specific way)
- provide appdata file
* Wed Jan 29 2020 Fedora Release Engineering  - 
1.1.15-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild




 python-catkin_lint-1.6.10-1.el7 (FEDORA-EPEL-2020-9d82ed87b3)
 Check catkin packages for common errors

Update Information:

Update to the latest catkin_lint release

ChangeLog:

* Thu Jul  9 2020 Scott K Logan  - 1.6.10-1
- Update to 1.6.10 (rhbz#1851568)

References:

  [ 1 ] Bug #1851568 - python-catkin_lint-1.6.10.post1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1851568




 rdiff-backup-2.0.3-5.el7 (FEDORA-EPEL-2020-d3078f1c10)
 Convenient and transparent local/remote incremental mirror/backup

Update Information:

Add requirement of python3-setuptools (Ref upstream issue #305

ChangeLog:

* Thu Jul  9 2020 Frank Crawford  2.0.3-5
- Bump to be higher than COPR version
* Thu Jul  9 2020 Frank Crawford  2.0.3-2
- Add requirement of python3-setuptools (Ref upstream issue #305)


___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org


[Bug 1854141] perl-Socket-2.030 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1854141

Fedora Update System  changed:

   What|Removed |Added

 Status|ON_QA   |CLOSED
   Fixed In Version|perl-Socket-2.030-1.fc33|perl-Socket-2.030-1.fc33
   ||perl-Socket-2.030-1.fc32
 Resolution|--- |ERRATA
Last Closed||2020-07-10 01:02:14



--- Comment #6 from Fedora Update System  ---
FEDORA-2020-57101032dc has been pushed to the Fedora 32 stable repository.
If problem still persists, please make note of it in this bug report.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 1149524] Review Request: perl-Digest-Whirlpool - Interface to Whirlpool hash algorithm

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1149524

Package Review  changed:

   What|Removed |Added

  Flags||needinfo?(dd...@cpan.org)



--- Comment #3 from Package Review  ---
This is an automatic check from review-stats script.

This review request ticket hasn't been updated for some time, but it seems
that the review is still being working out by you. If this is right, please
respond to this comment clearing the NEEDINFO flag and try to reach out the
submitter to proceed with the review.

If you're not interested in reviewing this ticket anymore, please clear the
fedora-review flag and reset the assignee, so that a new reviewer can take
this ticket.

Without any reply, this request will shortly be resetted.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


Re: Btrfs by default, the compression option

2020-07-09 Thread Zachary Lym
> Yes, it's completely reasonable to not do it. It might seem like a big
> change on its own, but Btrfs has had native compression for 10+ years,
> and at least three years for most all of the workloads at Facebook. So
> it's quite safe.

But it has been eating data as recently as 2018 [1] and the Debian wiki warns 
strongly against using compression that is dated for 2020 [2].  The project 
will already see a large number of new bugs thanks to the wider breadth of 
hardware, why throw in an additional variable when you can flip it on in six 
months anyway?

1: https://www.spinics.net/lists/linux-btrfs/msg81293.html
2: https://wiki.debian.org/Btrfs#Warnings
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/9/20 4:27 PM, Eric Sandeen wrote:
> On 7/9/20 3:32 PM, Davide Cavalca via devel wrote:

...

>> As someone on one of the teams at FB that has to deal with that, I can
>> assure you all the scenarios you listed can and do happen, and they
>> happen a lot. While we don't have the "laptop's out of battery" issue
>> on the production side, we have plenty of power events and unplanned
>> maintenances that can and will hit live machines and cut power off.
>> Force reboots (triggered by either humans or automation) are also not
>> at all uncommon. Rebuilding machines from scratch isn't free, even with
>> all the automation and stuff we have, so if power loss or reboot events
>> on machines using btrfs caused widespread corruption or other issues
>> I'm confident we'd have found that out pretty early on.
> 
> It is a bare minimum expectation that filesystems like btrfs, ext4, and xfs
> do not suffer filesystem corruptions and inconsistencies due to reboots
> and power losses.
> 
> So for the record I am in no way insinuating that btrfs is less crash-safe
> than other filesystems (though I have not tested that, so if I have time
> I'll throw that into the mix as well.)

So, we already have those tests in xfstests, and I put btrfs through a few
loops.  This is generic/475:

# Copyright (c) 2017 Oracle, Inc.  All Rights Reserved.
#
# FS QA Test No. 475
#
# Test log recovery with repeated (simulated) disk failures.  We kick
# off fsstress on the scratch fs, then switch out the underlying device
# with dm-error to see what happens when the disk goes down.  Having
# taken down the fs in this manner, remount it and repeat.  This test
# is a Good Enough (tm) simulation of our internal multipath failure
# testing efforts.

It fails within 2 loops.  Is it a critical failure? I don't know; the
test looks for unexpected things in dmesg, and perhaps the filter is
wrong.  But I see stack traces during the run, and message like:

[689284.484258] BTRFS: error (device dm-3) in btrfs_sync_log:3084: errno=-117 
Filesystem corrupted

so I can't say for sure.

Are btrfs devs using these tests to assess crash/powerloss resiliency
on a regular basis?  TBH I honestly did not expect to see any test
failures here, whether or not they are test artifacts; any filesystem
using xfstests as a benchmark needs to be keeping things up to date.

As a further test, I skipped the dmesg check, which may or may not be
finding false positives, and replaced it with a mount/umount/check cycle.
That seems to pass, so if fsck validation is complete and correct, perhaps
all is well in this regard.

-Eric
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Chris Murphy
On Thu, Jul 9, 2020 at 3:06 PM Stephen John Smoogen  wrote:
>
> That is because anyone who questions the perfection of ZFS is quickly
> burned at a stake.

I think Neal also has a good take on why, which is that it was mostly
a closed door development early on, wasn't used on heterogeneous
hardware out in the wild, upon release wasn't commonly available for
years - and just never really got the same kind of scrutiny and rumor
that Btrfs did.

>
> I don't know what it is about filesystems turning into religions that
> do not brook questioning but what I am seeing in these emails is what
> turns me off of btrfs every time it is brought up in the same way I
> couldn't stand reiser, ZFS, or various other filesystems..  I realize
> filesystems take a lot of faith as people have to put something they
> value into a leap of faith it will be there the next day.. but it
> seems to morph quickly into some sort of fanatical evangelical
> movement.

I've said this same thing in recent weeks. I don't understand it. I
don't know if you think I've done this. Certainly my experience over
10 years has been Btrfs developers have been among the least
defensive, and the first to say it doesn't meet every use case and of
course folks should use the file system that fits their requirements
the best.

> So a good reason why no one brings it up.. you learn quickly that
> questioning the perfection of any filesystem will fill your inbox with
> tirades from people.

Yeah that's kind of an obnoxious pig pen.


--
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Martin Kolman


- Original Message -
> From: "Josef Bacik" 
> To: devel@lists.fedoraproject.org
> Sent: Thursday, July 9, 2020 9:11:07 PM
> Subject: Re: Fedora 33 System-Wide Change proposal: Make btrfs the default 
> file system for desktop variants
> 
> On 7/9/20 1:51 PM, Eric Sandeen wrote:
> > On 7/6/20 12:07 AM, Chris Murphy wrote:
> >> On Fri, Jul 3, 2020 at 8:40 PM Eric Sandeen 
> >> wrote:
> >>>
> >>> On 7/3/20 1:41 PM, Chris Murphy wrote:
>  SSDs can fail in weird ways. Some spew garbage as they're
>  failing, some go read-only. I've seen both. I don't have stats on
>  how common it is for an SSD to go read-only as it fails, but once
>  it happens you cannot fsck it. It won't accept writes. If it
>  won't mount, your only chance to recover data is some kind of
>  offline scrape tool. And Btrfs does have a very very good scrape
>  tool, in terms of its success rate - UX is scary. But that can
>  and will improve.
> >>>
> >>> Ok, you and Josef have both recommended the btrfs restore
> >>> ("scrape") tool as a next recovery step after fsck fails, and I
> >>> figured we should check that out, to see if that alleviates the
> >>> concerns about recoverability of user data in the face of
> >>> corruption.
> >>>
> >>> I also realized that mkfs of an image isn't representative of an
> >>> SSD system typical of Fedora laptops, so I added "-m single" to
> >>> mkfs, because this will be the mkfs.btrfs default on SSDs (right?).
> >>> Based on Josef's description of fsck's algorithm of throwing away
> >>> any block with a bad CRC this seemed worth testing.
> >>>
> >>> I also turned fuzzing /down/ to hitting 2048 bytes out of the 1G
> >>> image, or a bit less than 1% of the filesystem blocks, at random.
> >>> This is 1/4 the fuzzing rate from the original test.
> >>>
> >>> So: -m single, fuzz 2048 bytes of 1G image, run btrfsck --repair,
> >>> mount, mount w/ recovery, and then restore ("scrape") if all that
> >>> fails, see what we get.
> >>
> >> What's the probability of this kind of corruption occurring in the
> >> real world? If the probability is so low it can't practically be
> >> computed, how do we assess the risk? And if we can't assess risk,
> >> what's the basis of concern?
> > 
> >  From 20 years of filesystem development experience, I know that people
> > run filesystem repair tools.  It's just a fact.  For a wide variety of
> > reasons - from bugs, to hardware errors, to admin errors, you name it,
> > filesystems experience corruption and inconsistencies.  At that point
> > the administrator needs a path forward.
> > 
> > "people won't need to repair btrfs" is, IMHO, the position that needs
> > to be supported, not "filesystem repair tools should be robust."
> > 
> >>> I ran 50 loops, and got:
> >>>
> >>> 46 btrfsck failures 20 mount failures
> >>>
> >>> So it ran btrfs restore 20 times; of those, 11 runs lost all or
> >>> substantially all of the files; 17 runs lost at least 1/3 of the
> >>> files.
> >>
> >> Josef states reliability of ext4, xfs, and Btrfs are in the same
> >> ballpark. He also reports one case in 10 years in which he failed to
> >> recover anything. How do you square that with 11 complete failures,
> >> trivially produced? Is there even a reason to suspect there's
> >> residual risk?
> > 
> > Extrapolating from Facebook's usecases to the fedora desktop should be
> > approached with caution, IMHO.
> > 
> > I've provided evidence that if/when damage happens for whatever reason,
> > btrfs is unable to recover in place far more often than other filesytems.
> > 
> >> When metadata is single profile, Btrfs is basically an early warning
> >> system.> The available research on uncorrectable errors, errors that drive
> >> ECC
> >> does not catch, suggests that users are decently likely to experience
> >> at least one block of corruption in the life of the drive. And that
> >> it tends to get worse up until drive failure. But there is much less
> >> chance to detect this, if the file system isn't also checksumming the
> >> vastly larger payload on a drive: the data.
> > 
> > One of the problems in this whole discussion is the assumption that
> > filesystem
> > inconsistencies only arise from disk bitflips etc; that's just not the
> > case.
> > 
> > Look, I'm just providing evidence of what I've found when re-evaluating the
> > btrfs administration/repair tools.  I've found them to be quite weak.
> > 
> >  From what I've gathered from these responses, btrfs is unique in that it
> >  is
> > /expected/ that if anything goes wrong, the administrator should be
> > prepared
> > to scrape out remaining data, re-mkfs, and start over.  If that's
> > acceptable
> > for the Fedora desktop, that's fine, but I consider it a risk that should
> > not
> > be ignored when evaluating this proposal.
> > 
> 
> Agreed, it's the very first thing I said when I was asked what are the
> downsides.  There's clearly more work to be done in the recovery arena.  How
> often do disks fail for 

Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/9/20 3:38 PM, Chris Murphy wrote:
> On Thu, Jul 9, 2020 at 1:57 PM Eric Sandeen  wrote:
>> On 7/9/20 2:11 PM, Josef Bacik wrote:
  From what I've gathered from these responses, btrfs is unique in that it 
 is
 /expected/ that if anything goes wrong, the administrator should be 
 prepared
 to scrape out remaining data, re-mkfs, and start over.  If that's 
 acceptable
 for the Fedora desktop, that's fine, but I consider it a risk that should 
 not
 be ignored when evaluating this proposal.

>>> Agreed, it's the very first thing I said when I was asked what are the 
>>> downsides.  There's clearly more work to be done in the recovery arena.  
>>> How often do disks fail for Fedora?  Do we have that data?  Is this a real 
>>> risk? Nobody can say because Fedora doesn't have data.
>> But again, let me reiterate that disk failures are far from the only
>> reason that admins need capable filesystem repair tools, in general.
>>
>> We see users running fsck all the time, for various reasons.  I can't
>> back it up, but my hunch is that bugs and misconfigurations (i.e. write
>> cache) are more often the root cause for filesystem inconsistencies.
>>
>> IMHO, focusing on physical disk failure rates is focusing too narrowly,
>> but I suppose I'm just joining the chorus of hunches and anecdotes now.
> Actually there's quite a lot of evidence of this, even though there's
> no precise estimate - not least of which these populations are
> constantly dying and reemerging, and can be batch (firmware version)
> specific. This is only the most recent such story on linux-btrfs@ (and
> warning, this reads like an alien autopsy):
> 
> https://lore.kernel.org/linux-btrfs/20200708034407.ge10...@hungrycats.org/
> 
> fsck.btrfs is a no op, same as fsck.xfs. And recently the actual
> repair utility dissuades users from running it casually.


Honestly, that's not relevant. They are no-ops because they do not need to
be run at boot time after an unclean shutdown, because the filesystems are
explicitly designed to handle that.  This is clearly stated in the man page,
the script itself, and the commit log.  In fact fsck.btrfs was copied from
fsck.xfs.

(Honestly fsck.ext[34] could be a no-op too, but for $REASONS it chooses to do
journal replay in userspace instead, via fsck.)

They are no-ops for this reason, and /not/ because fsck isn't /ever/ expected
to be needed.

-Eric
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/9/20 3:32 PM, Davide Cavalca via devel wrote:
> On Thu, 2020-07-09 at 16:15 -0400, Simo Sorce wrote:
>> However I have had bad kernels, power outages, loss of battery power
>> (laptops on too long suspend) and other random reasons to force
>> reboot
>> a system. That has been the primary case of file system checks
>> through
>> my Fedora usage. And luckily so far I never had a loss of filesystem
>> or
>> data that way, fsck always ended up solving most of the issues, and
>> whenever I lost file they ended up being temporary files I did not
>> care
>> for.
>>
>> I do not think those failures are common in Facebook fleets, so I am
>> quite skeptical FB data and failure modes are representative of
>> Fedora
>> usage as a desktop/laptop OS and therefore of the behavior of btrfs
>> in
>> those cases.
> 
> As someone on one of the teams at FB that has to deal with that, I can
> assure you all the scenarios you listed can and do happen, and they
> happen a lot. While we don't have the "laptop's out of battery" issue
> on the production side, we have plenty of power events and unplanned
> maintenances that can and will hit live machines and cut power off.
> Force reboots (triggered by either humans or automation) are also not
> at all uncommon. Rebuilding machines from scratch isn't free, even with
> all the automation and stuff we have, so if power loss or reboot events
> on machines using btrfs caused widespread corruption or other issues
> I'm confident we'd have found that out pretty early on.

It is a bare minimum expectation that filesystems like btrfs, ext4, and xfs
do not suffer filesystem corruptions and inconsistencies due to reboots
and power losses.

So for the record I am in no way insinuating that btrfs is less crash-safe
than other filesystems (though I have not tested that, so if I have time
I'll throw that into the mix as well.)

We do at times see corrupted filesystems when something has a writeback
cache w/o a battery backup, though, because then the hardware violates
its guarantees to the filesystem this is the sort of thing I'd put
in the "misconfiguration" bucket.  Which happens from time to time, and
from which it is nice to be able to recover w/o heroics.

-Eric
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Neal Gompa
On Thu, Jul 9, 2020 at 4:16 PM Simo Sorce  wrote:
>
> On Thu, 2020-07-09 at 12:56 -0700, Eric Sandeen wrote:
> > On 7/9/20 2:11 PM, Josef Bacik wrote:
> > > >  From what I've gathered from these responses, btrfs is unique in that 
> > > > it is
> > > > /expected/ that if anything goes wrong, the administrator should be 
> > > > prepared
> > > > to scrape out remaining data, re-mkfs, and start over.  If that's 
> > > > acceptable
> > > > for the Fedora desktop, that's fine, but I consider it a risk that 
> > > > should not
> > > > be ignored when evaluating this proposal.
> > > >
> > >
> > > Agreed, it's the very first thing I said when I was asked what are the 
> > > downsides.  There's clearly more work to be done in the recovery arena.  
> > > How often do disks fail for Fedora?  Do we have that data?  Is this a 
> > > real risk? Nobody can say because Fedora doesn't have data.
> >
> > But again, let me reiterate that disk failures are far from the only
> > reason that admins need capable filesystem repair tools, in general.
> >
> > We see users running fsck all the time, for various reasons.  I can't
> > back it up, but my hunch is that bugs and misconfigurations (i.e. write
> > cache) are more often the root cause for filesystem inconsistencies.
> >
> > IMHO, focusing on physical disk failure rates is focusing too narrowly,
> > but I suppose I'm just joining the chorus of hunches and anecdotes now.
>
> Anecdata,
> but I use raid-1 on all my disks (since a catastrophic failure 20 years
> ago) and that shielded me from all disk failures since then (although I
> may have had silent corruption during the years I never lost any really
> important data that way, some picture may have got lost that way
> probably but it has been inconsequential for me).
>
> However I have had bad kernels, power outages, loss of battery power
> (laptops on too long suspend) and other random reasons to force reboot
> a system. That has been the primary case of file system checks through
> my Fedora usage. And luckily so far I never had a loss of filesystem or
> data that way, fsck always ended up solving most of the issues, and
> whenever I lost file they ended up being temporary files I did not care
> for.
>
> I do not think those failures are common in Facebook fleets, so I am
> quite skeptical FB data and failure modes are representative of Fedora
> usage as a desktop/laptop OS and therefore of the behavior of btrfs in
> those cases.
>
> Note, not saying btrfs should be avoided or anything, just that we need
> more data about those failure modes and how they affect btrfs before a
> change of defaults.
>

Maybe it's not the most helpful anecdotal data, but one of my
computers has been suffering through random CPU lockups to the point
where everything freezes and I need to reboot. I'm pretty sure there's
a fault in RAM or CPU (but with everything soldered on computers these
days...), but it's been nice to see that with these issues happening
to me fairly frequently (as in now basically weekly) forcing me to
power cycle, Btrfs has withstood that perfectly. No data loss, no
corruption, no inconsistencies. Everything just works. :)

The last time I had something like this with an ext4 system, it got
torched within a month, forcing me to spend money I couldn't really
afford to spend to replace the machine. Btrfs is letting me use a bad
computer longer. :)



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread Chris Adams
Once upon a time, nick...@gmail.com  said:
> To be honest, I don't know. Do all UEFI secure boot implementations
> allow you to add your own keys to the list of trusted keys?

I believe that the Microsoft OEM Windows x86_64 distribution
requirements require UEFI, with Scure Boot enabled, and with the ability
for the system admin to add their own signing keys.  So, most every
AMD/Intel system you run across should support that.

-- 
Chris Adams 
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Przemek Klosowski via devel

On 7/9/20 8:44 AM, Kevin Kofler wrote:

Przemek Klosowski via devel wrote:

   * disk access is literally O(1) slower than RAM access

This notation is meaningless. By the definition of the O notation,
O(1)=O(1)=O(k) for any constant k.


Yes, you are right of course, but I just hope that everyone understood 
that was just a shortcut for saying that the speed ratio is somewhere 
between 1e3 and 1e5

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Simo Sorce
On Thu, 2020-07-09 at 13:32 -0700, Davide Cavalca via devel wrote:
> On Thu, 2020-07-09 at 16:15 -0400, Simo Sorce wrote:
> > However I have had bad kernels, power outages, loss of battery power
> > (laptops on too long suspend) and other random reasons to force
> > reboot
> > a system. That has been the primary case of file system checks
> > through
> > my Fedora usage. And luckily so far I never had a loss of filesystem
> > or
> > data that way, fsck always ended up solving most of the issues, and
> > whenever I lost file they ended up being temporary files I did not
> > care
> > for.
> > 
> > I do not think those failures are common in Facebook fleets, so I am
> > quite skeptical FB data and failure modes are representative of
> > Fedora
> > usage as a desktop/laptop OS and therefore of the behavior of btrfs
> > in
> > those cases.
> 
> As someone on one of the teams at FB that has to deal with that, I can
> assure you all the scenarios you listed can and do happen, and they
> happen a lot. While we don't have the "laptop's out of battery" issue
> on the production side, we have plenty of power events and unplanned
> maintenances that can and will hit live machines and cut power off.
> Force reboots (triggered by either humans or automation) are also not
> at all uncommon. Rebuilding machines from scratch isn't free, even with
> all the automation and stuff we have, so if power loss or reboot events
> on machines using btrfs caused widespread corruption or other issues
> I'm confident we'd have found that out pretty early on.

Oh this is really good to know, it is more reassuring!

Simo.

-- 
Simo Sorce
RHEL Crypto Team
Red Hat, Inc



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Stephen John Smoogen
On Thu, 9 Jul 2020 at 16:49, Chris Murphy  wrote:
>
> On Thu, Jul 9, 2020 at 1:57 PM Eric Sandeen  wrote:
> >
> > On 7/9/20 2:11 PM, Josef Bacik wrote:
> > >>
> > >>  From what I've gathered from these responses, btrfs is unique in that 
> > >> it is
> > >> /expected/ that if anything goes wrong, the administrator should be 
> > >> prepared
> > >> to scrape out remaining data, re-mkfs, and start over.  If that's 
> > >> acceptable
> > >> for the Fedora desktop, that's fine, but I consider it a risk that 
> > >> should not
> > >> be ignored when evaluating this proposal.
> > >>
> > >
> > > Agreed, it's the very first thing I said when I was asked what are the 
> > > downsides.  There's clearly more work to be done in the recovery arena.  
> > > How often do disks fail for Fedora?  Do we have that data?  Is this a 
> > > real risk? Nobody can say because Fedora doesn't have data.
> >
> > But again, let me reiterate that disk failures are far from the only
> > reason that admins need capable filesystem repair tools, in general.
> >
> > We see users running fsck all the time, for various reasons.  I can't
> > back it up, but my hunch is that bugs and misconfigurations (i.e. write
> > cache) are more often the root cause for filesystem inconsistencies.
> >
> > IMHO, focusing on physical disk failure rates is focusing too narrowly,
> > but I suppose I'm just joining the chorus of hunches and anecdotes now.
>
> Actually there's quite a lot of evidence of this, even though there's
> no precise estimate - not least of which these populations are
> constantly dying and reemerging, and can be batch (firmware version)
> specific. This is only the most recent such story on linux-btrfs@ (and
> warning, this reads like an alien autopsy):
>
> https://lore.kernel.org/linux-btrfs/20200708034407.ge10...@hungrycats.org/
>
> fsck.btrfs is a no op, same as fsck.xfs. And recently the actual
> repair utility dissuades users from running it casually.
>
> COW file systems are different. ZFS has no fsck to speak of, it can be
> harrassed badly by hardware/firmware bugs too, and yet there aren't
> many people who consider ZFS a problemed file system. How would the
> story of Btrfs be different either without dm-log-writes to this day,
> or had it already arrived in 2010?
>

That is because anyone who questions the perfection of ZFS is quickly
burned at a stake.

I don't know what it is about filesystems turning into religions that
do not brook questioning but what I am seeing in these emails is what
turns me off of btrfs every time it is brought up in the same way I
couldn't stand reiser, ZFS, or various other filesystems..  I realize
filesystems take a lot of faith as people have to put something they
value into a leap of faith it will be there the next day.. but it
seems to morph quickly into some sort of fanatical evangelical
movement.

So a good reason why no one brings it up.. you learn quickly that
questioning the perfection of any filesystem will fill your inbox with
tirades from people.




-- 
Stephen J Smoogen.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[EPEL-devel] [Fedocal] Reminder meeting : EPEL Steering Committee

2020-07-09 Thread tdawson
Dear all,

You are kindly invited to the meeting:
   EPEL Steering Committee on 2020-07-10 from 21:00:00 to 22:00:00 UTC
   At freenode@fedora-meeting

The meeting will be about:
This is the weekly EPEL Steering Committee Meeting.

A general agenda is the following:

#meetingname EPEL
#topic Intros
#topic Old Business
#topic EPEL-6
#topic EPEL-7
#topic EPEL-8
#topic Openfloor
#endmeeting




Source: https://apps.fedoraproject.org/calendar/meeting/9722/

___
epel-devel mailing list -- epel-devel@lists.fedoraproject.org
To unsubscribe send an email to epel-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/epel-devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread stan via devel
On Thu, 09 Jul 2020 23:10:46 +0300
nick...@gmail.com wrote:

> On Thu, 2020-07-09 at 11:17 -0700, stan via devel wrote:

> > That is, isn't this only an issue if the person doing the kernel
> > development hasn't generated their own key, and isn't signing their
> > kernels locally?  
> 
> To be honest, I don't know. Do all UEFI secure boot implementations
> allow you to add your own keys to the list of trusted keys?

I don't know, but I used Fedora tools to create the key pair, and
insert the public key (x86_64).  Anyway, just another data point in the
discussion.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Chris Murphy
On Thu, Jul 9, 2020 at 1:57 PM Eric Sandeen  wrote:
>
> On 7/9/20 2:11 PM, Josef Bacik wrote:
> >>
> >>  From what I've gathered from these responses, btrfs is unique in that it 
> >> is
> >> /expected/ that if anything goes wrong, the administrator should be 
> >> prepared
> >> to scrape out remaining data, re-mkfs, and start over.  If that's 
> >> acceptable
> >> for the Fedora desktop, that's fine, but I consider it a risk that should 
> >> not
> >> be ignored when evaluating this proposal.
> >>
> >
> > Agreed, it's the very first thing I said when I was asked what are the 
> > downsides.  There's clearly more work to be done in the recovery arena.  
> > How often do disks fail for Fedora?  Do we have that data?  Is this a real 
> > risk? Nobody can say because Fedora doesn't have data.
>
> But again, let me reiterate that disk failures are far from the only
> reason that admins need capable filesystem repair tools, in general.
>
> We see users running fsck all the time, for various reasons.  I can't
> back it up, but my hunch is that bugs and misconfigurations (i.e. write
> cache) are more often the root cause for filesystem inconsistencies.
>
> IMHO, focusing on physical disk failure rates is focusing too narrowly,
> but I suppose I'm just joining the chorus of hunches and anecdotes now.

Actually there's quite a lot of evidence of this, even though there's
no precise estimate - not least of which these populations are
constantly dying and reemerging, and can be batch (firmware version)
specific. This is only the most recent such story on linux-btrfs@ (and
warning, this reads like an alien autopsy):

https://lore.kernel.org/linux-btrfs/20200708034407.ge10...@hungrycats.org/

fsck.btrfs is a no op, same as fsck.xfs. And recently the actual
repair utility dissuades users from running it casually.

COW file systems are different. ZFS has no fsck to speak of, it can be
harrassed badly by hardware/firmware bugs too, and yet there aren't
many people who consider ZFS a problemed file system. How would the
story of Btrfs be different either without dm-log-writes to this day,
or had it already arrived in 2010?


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Davide Cavalca via devel
On Thu, 2020-07-09 at 16:15 -0400, Simo Sorce wrote:
> However I have had bad kernels, power outages, loss of battery power
> (laptops on too long suspend) and other random reasons to force
> reboot
> a system. That has been the primary case of file system checks
> through
> my Fedora usage. And luckily so far I never had a loss of filesystem
> or
> data that way, fsck always ended up solving most of the issues, and
> whenever I lost file they ended up being temporary files I did not
> care
> for.
> 
> I do not think those failures are common in Facebook fleets, so I am
> quite skeptical FB data and failure modes are representative of
> Fedora
> usage as a desktop/laptop OS and therefore of the behavior of btrfs
> in
> those cases.

As someone on one of the teams at FB that has to deal with that, I can
assure you all the scenarios you listed can and do happen, and they
happen a lot. While we don't have the "laptop's out of battery" issue
on the production side, we have plenty of power events and unplanned
maintenances that can and will hit live machines and cut power off.
Force reboots (triggered by either humans or automation) are also not
at all uncommon. Rebuilding machines from scratch isn't free, even with
all the automation and stuff we have, so if power loss or reboot events
on machines using btrfs caused widespread corruption or other issues
I'm confident we'd have found that out pretty early on.

Cheers
Davide
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread Simo Sorce
On Thu, 2020-07-09 at 23:10 +0300, nick...@gmail.com wrote:
> On Thu, 2020-07-09 at 11:17 -0700, stan via devel wrote:
> > On Thu, 09 Jul 2020 18:07:39 +0300
> > nick...@gmail.com wrote:
> > 
> > > Yes, that's why "secure boot" should only be an option and the user
> > > must have the option to turn it off. Otherwise, it wouldn't be
> > > possible to do any kernel development on that computer.
> > 
> > For my edification.  I build custom kernels, and sign them using
> > pesign with my own key that I generated locally, and put in the EFI
> > key
> > database. I can then boot the custom kernel in secure mode.  Couldn't
> > I
> > also sign modules if I ever generated them with that same key?
> > 
> > That is, isn't this only an issue if the person doing the kernel
> > development hasn't generated their own key, and isn't signing their
> > kernels locally?
> 
> To be honest, I don't know. Do all UEFI secure boot implementations
> allow you to add your own keys to the list of trusted keys?

In theory they should, but the interface may be broken or overly complicated.
That said you can always disable secure boot on x86_64 ... not so on ARM based 
hw.

Simo.

-- 
Simo Sorce
RHEL Crypto Team
Red Hat, Inc



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Simo Sorce
On Thu, 2020-07-09 at 12:56 -0700, Eric Sandeen wrote:
> On 7/9/20 2:11 PM, Josef Bacik wrote:
> > >  From what I've gathered from these responses, btrfs is unique in that it 
> > > is
> > > /expected/ that if anything goes wrong, the administrator should be 
> > > prepared
> > > to scrape out remaining data, re-mkfs, and start over.  If that's 
> > > acceptable
> > > for the Fedora desktop, that's fine, but I consider it a risk that should 
> > > not
> > > be ignored when evaluating this proposal.
> > > 
> > 
> > Agreed, it's the very first thing I said when I was asked what are the 
> > downsides.  There's clearly more work to be done in the recovery arena.  
> > How often do disks fail for Fedora?  Do we have that data?  Is this a real 
> > risk? Nobody can say because Fedora doesn't have data.
> 
> But again, let me reiterate that disk failures are far from the only
> reason that admins need capable filesystem repair tools, in general.
> 
> We see users running fsck all the time, for various reasons.  I can't
> back it up, but my hunch is that bugs and misconfigurations (i.e. write
> cache) are more often the root cause for filesystem inconsistencies.
> 
> IMHO, focusing on physical disk failure rates is focusing too narrowly,
> but I suppose I'm just joining the chorus of hunches and anecdotes now.

Anecdata,
but I use raid-1 on all my disks (since a catastrophic failure 20 years
ago) and that shielded me from all disk failures since then (although I
may have had silent corruption during the years I never lost any really
important data that way, some picture may have got lost that way
probably but it has been inconsequential for me).

However I have had bad kernels, power outages, loss of battery power
(laptops on too long suspend) and other random reasons to force reboot
a system. That has been the primary case of file system checks through
my Fedora usage. And luckily so far I never had a loss of filesystem or
data that way, fsck always ended up solving most of the issues, and
whenever I lost file they ended up being temporary files I did not care
for.

I do not think those failures are common in Facebook fleets, so I am
quite skeptical FB data and failure modes are representative of Fedora
usage as a desktop/laptop OS and therefore of the behavior of btrfs in
those cases.

Note, not saying btrfs should be avoided or anything, just that we need
more data about those failure modes and how they affect btrfs before a
change of defaults.

My 2c,
Simo.

-- 
Simo Sorce
RHEL Crypto Team
Red Hat, Inc



___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread nickysn
On Thu, 2020-07-09 at 11:17 -0700, stan via devel wrote:
> On Thu, 09 Jul 2020 18:07:39 +0300
> nick...@gmail.com wrote:
> 
> > Yes, that's why "secure boot" should only be an option and the user
> > must have the option to turn it off. Otherwise, it wouldn't be
> > possible to do any kernel development on that computer.
> 
> For my edification.  I build custom kernels, and sign them using
> pesign with my own key that I generated locally, and put in the EFI
> key
> database. I can then boot the custom kernel in secure mode.  Couldn't
> I
> also sign modules if I ever generated them with that same key?
> 
> That is, isn't this only an issue if the person doing the kernel
> development hasn't generated their own key, and isn't signing their
> kernels locally?

To be honest, I don't know. Do all UEFI secure boot implementations
allow you to add your own keys to the list of trusted keys?

Nikolay
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[Bug 1854753] perl-Sereal-4.015 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1854753



--- Comment #7 from Fedora Update System  ---
FEDORA-2020-43a6a0fdca has been pushed to the Fedora 32 testing repository.
In short time you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2020-43a6a0fdca`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2020-43a6a0fdca

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 1854754] perl-Sereal-Decoder-4.015 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1854754



--- Comment #7 from Fedora Update System  ---
FEDORA-2020-43a6a0fdca has been pushed to the Fedora 32 testing repository.
In short time you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2020-43a6a0fdca`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2020-43a6a0fdca

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 1854752] perl-Sereal-Encoder-4.015 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1854752



--- Comment #7 from Fedora Update System  ---
FEDORA-2020-43a6a0fdca has been pushed to the Fedora 32 testing repository.
In short time you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing
--advisory=FEDORA-2020-43a6a0fdca`
You can provide feedback for this update here:
https://bodhi.fedoraproject.org/updates/FEDORA-2020-43a6a0fdca

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information
on how to test updates.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/9/20 2:11 PM, Josef Bacik wrote:
>>
>>  From what I've gathered from these responses, btrfs is unique in that it is
>> /expected/ that if anything goes wrong, the administrator should be prepared
>> to scrape out remaining data, re-mkfs, and start over.  If that's acceptable
>> for the Fedora desktop, that's fine, but I consider it a risk that should not
>> be ignored when evaluating this proposal.
>>
> 
> Agreed, it's the very first thing I said when I was asked what are the 
> downsides.  There's clearly more work to be done in the recovery arena.  How 
> often do disks fail for Fedora?  Do we have that data?  Is this a real risk? 
> Nobody can say because Fedora doesn't have data.

But again, let me reiterate that disk failures are far from the only
reason that admins need capable filesystem repair tools, in general.

We see users running fsck all the time, for various reasons.  I can't
back it up, but my hunch is that bugs and misconfigurations (i.e. write
cache) are more often the root cause for filesystem inconsistencies.

IMHO, focusing on physical disk failure rates is focusing too narrowly,
but I suppose I'm just joining the chorus of hunches and anecdotes now.

-Eric

> Facebook does however have that data, and it's a microscopically small 
> percentage.  I agree that Facebook is vastly different from Fedora from a 
> recovery standpoint, but our workloads and hardware I think extrapolate to 
> the normal Fedora user quite well.  We drive the disks harder than the normal 
> Fedora user does of course, but in the end we're updating packages, taking 
> snapshots, and building code.  We're just doing it at 1000x what a normal 
> Fedora user does.  Thanks,
> 
> Josef
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[Bug 1855334] perl-Sereal-Encoder-4.017 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1855334

Upstream Release Monitoring  
changed:

   What|Removed |Added

Summary|perl-Sereal-Encoder-4.016   |perl-Sereal-Encoder-4.017
   |is available|is available



--- Comment #1 from Upstream Release Monitoring 
 ---
Latest upstream release: 4.017
Current version/release in rawhide: 4.011-1.fc32
URL: http://search.cpan.org/dist/Sereal-Encoder/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/8065/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 1855332] perl-Sereal-4.017 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1855332

Upstream Release Monitoring  
changed:

   What|Removed |Added

Summary|perl-Sereal-4.016 is|perl-Sereal-4.017 is
   |available   |available



--- Comment #1 from Upstream Release Monitoring 
 ---
Latest upstream release: 4.017
Current version/release in rawhide: 4.011-1.fc32
URL: http://search.cpan.org/dist/Sereal/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/7605/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 1855333] perl-Sereal-Decoder-4.017 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1855333

Upstream Release Monitoring  
changed:

   What|Removed |Added

Summary|perl-Sereal-Decoder-4.016   |perl-Sereal-Decoder-4.017
   |is available|is available



--- Comment #1 from Upstream Release Monitoring 
 ---
Latest upstream release: 4.017
Current version/release in rawhide: 4.011-1.fc32
URL: http://search.cpan.org/dist/Sereal-Decoder/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/8066/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Chris Murphy
On Thu, Jul 9, 2020 at 12:53 PM Brandon Nielsen  wrote:
>
> On 7/9/20 12:24 PM, Alexey A. wrote:
> > I agree. I think that 4GB cap is too small and 4 GB may be used quickly.
> >
> 
>
> Since the values being used seem to have been determined somewhat
> heuristically for both EarlyOOM and SwapOnZRAM, I was wondering if there
> was any prediction for how the values might change if one, the other, or
> both get switched on for Server builds?
>
> SwapOnZRAM in particular is of interest to me. I have one system with a
> workload that's bursty on memory use, and when it starts using the swap
> the system becomes unresponsive, even using active SSH sessions is not
> guaranteed until the contention clears. The last time it happened I
> found myself wondering if SwapOnZRAM would make things more pleasant. It
> certainly does on my workstation machines, especially memory limited ones.

Yeah we need to learn a little more about these cases. Spikes are very
well suited by memory base swap (zram) or cache (zswap), because they
can absorb the hit way faster than disk based swap. But those pools
can become exhausted. So if the workload is spikey but not long lived,
that's good for memory based swap. If it's enduring page out, or the
anonymous pages become stale, that's a case where we might need a way
to dump those to disk based swap still.

Eventually I'd like to see either zram's writeback cache option (to
disk, something exposed by sysfs but not by zramctl or
zram-generator), or zswap have more clear benefit in these cases. So
for those who like to experiment, I've got ideas.

Also, we can detect reclaim via cgroups. Reclaim can look like swap
thrashing in terms of IO. But it's with file pages, rather than
anonymous pages. If reclaim pressure is increasing, it means we don't
have enough swap. Or something needs to be killed off. Which is it, is
the question. So what we don't want to do is just start adding more
swap, because then we just end up back in the situation we're trying
to solve.

There is a need to choreograph a strategy between having enough of and
the right kind of swap, a user space oom killer that responds to
pressure, and resource control that ensures the apps we care about get
minimum cpu, memory, and IO.

It is possible to reincorporate disk based swap, possibly dynamically
by creating swapfiles, but use resource control to restrict IO so that
we don't get runaway swap thrashing. So even though swap partitions
are going away by default in F33, does not necessarily mean we're done
with disk based swap.

These things are super esoteric and highly technical. But it's really
been cool being part of this work happening in Fedora. The Workstation
WG has been the central launching point of the motivating factors: the
UX here is terrible, we have to do better than this. And then we get
the kernel cgroup2, mm, zram, zswap folks building really interesting
technologies to have the ability to get information about system state
and control it. The systemd folks doing the work to make it  possible
to bridge that kernel work, making it accessible to the desktop
developers - where this resource control isolation work is heavily
developed in GNOME and KDE. And then it feeds back quite quickly into
Fedora. There's a long list of developers who have done 8 bajillion
percent more work than my emails and change proposals on these
subjects.

-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 9:22:01 AM MST Alexey A. wrote:
> >You can limit the process with cgroups
> 
> In this case the process will be killed by OOM killer. Note that OOM killer
> exists by default. Limiting cgroup means the OOM killer will be invoked in
> the cgroup. With earlyoom you database server will get SIGTERM and maybe
> will gracefully shutdown.

I'm suggesting the use of cgroups on software like web browsers, that users 
complain run away with RAM, certainly not databases.

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Josef Bacik

On 7/9/20 1:51 PM, Eric Sandeen wrote:

On 7/6/20 12:07 AM, Chris Murphy wrote:

On Fri, Jul 3, 2020 at 8:40 PM Eric Sandeen 
wrote:


On 7/3/20 1:41 PM, Chris Murphy wrote:

SSDs can fail in weird ways. Some spew garbage as they're
failing, some go read-only. I've seen both. I don't have stats on
how common it is for an SSD to go read-only as it fails, but once
it happens you cannot fsck it. It won't accept writes. If it
won't mount, your only chance to recover data is some kind of
offline scrape tool. And Btrfs does have a very very good scrape
tool, in terms of its success rate - UX is scary. But that can
and will improve.


Ok, you and Josef have both recommended the btrfs restore
("scrape") tool as a next recovery step after fsck fails, and I
figured we should check that out, to see if that alleviates the
concerns about recoverability of user data in the face of
corruption.

I also realized that mkfs of an image isn't representative of an
SSD system typical of Fedora laptops, so I added "-m single" to
mkfs, because this will be the mkfs.btrfs default on SSDs (right?).
Based on Josef's description of fsck's algorithm of throwing away
any block with a bad CRC this seemed worth testing.

I also turned fuzzing /down/ to hitting 2048 bytes out of the 1G
image, or a bit less than 1% of the filesystem blocks, at random.
This is 1/4 the fuzzing rate from the original test.

So: -m single, fuzz 2048 bytes of 1G image, run btrfsck --repair,
mount, mount w/ recovery, and then restore ("scrape") if all that
fails, see what we get.


What's the probability of this kind of corruption occurring in the
real world? If the probability is so low it can't practically be
computed, how do we assess the risk? And if we can't assess risk,
what's the basis of concern?


 From 20 years of filesystem development experience, I know that people
run filesystem repair tools.  It's just a fact.  For a wide variety of
reasons - from bugs, to hardware errors, to admin errors, you name it,
filesystems experience corruption and inconsistencies.  At that point
the administrator needs a path forward.

"people won't need to repair btrfs" is, IMHO, the position that needs
to be supported, not "filesystem repair tools should be robust."


I ran 50 loops, and got:

46 btrfsck failures 20 mount failures

So it ran btrfs restore 20 times; of those, 11 runs lost all or
substantially all of the files; 17 runs lost at least 1/3 of the
files.


Josef states reliability of ext4, xfs, and Btrfs are in the same
ballpark. He also reports one case in 10 years in which he failed to
recover anything. How do you square that with 11 complete failures,
trivially produced? Is there even a reason to suspect there's
residual risk?


Extrapolating from Facebook's usecases to the fedora desktop should be
approached with caution, IMHO.

I've provided evidence that if/when damage happens for whatever reason,
btrfs is unable to recover in place far more often than other filesytems.


When metadata is single profile, Btrfs is basically an early warning
system.> The available research on uncorrectable errors, errors that drive ECC
does not catch, suggests that users are decently likely to experience
at least one block of corruption in the life of the drive. And that
it tends to get worse up until drive failure. But there is much less
chance to detect this, if the file system isn't also checksumming the
vastly larger payload on a drive: the data.


One of the problems in this whole discussion is the assumption that filesystem
inconsistencies only arise from disk bitflips etc; that's just not the case.

Look, I'm just providing evidence of what I've found when re-evaluating the
btrfs administration/repair tools.  I've found them to be quite weak.

 From what I've gathered from these responses, btrfs is unique in that it is
/expected/ that if anything goes wrong, the administrator should be prepared
to scrape out remaining data, re-mkfs, and start over.  If that's acceptable
for the Fedora desktop, that's fine, but I consider it a risk that should not
be ignored when evaluating this proposal.



Agreed, it's the very first thing I said when I was asked what are the 
downsides.  There's clearly more work to be done in the recovery arena.  How 
often do disks fail for Fedora?  Do we have that data?  Is this a real risk? 
Nobody can say because Fedora doesn't have data.


Facebook does however have that data, and it's a microscopically small 
percentage.  I agree that Facebook is vastly different from Fedora from a 
recovery standpoint, but our workloads and hardware I think extrapolate to the 
normal Fedora user quite well.  We drive the disks harder than the normal Fedora 
user does of course, but in the end we're updating packages, taking snapshots, 
and building code.  We're just doing it at 1000x what a normal Fedora user does. 
 Thanks,


Josef
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an 

Re: Bodhi 5.4.0 in production

2020-07-09 Thread Mattia Verga via devel
Il 09/07/20 15:12, Miro Hrončok ha scritto:
>
> Finally I got to testing this.
>
> The bugzilla was added to the update:
>
> https://bodhi.fedoraproject.org/updates/FEDORA-2020-c1be13ded8
>
> But it was not closed:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1851519
>
> Should I report this as a bug or am i doing something wrong? The commit is:
>
> https://src.fedoraproject.org/rpms/python-tox/c/d154cf5aabe445914123b41239243811eeac93b7?branch=master
>
> But the build was done from one clenaup commit above this. Is that relevant?
>
The feature is not completely working in Bodhi 5.4.0, a fix is ready [1] 
and it will be deployed with the next bugfix (probably 5.4.1)

Mattia

[1] https://github.com/fedora-infra/bodhi/pull/4068

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Brandon Nielsen

On 7/9/20 12:24 PM, Alexey A. wrote:

I agree. I think that 4GB cap is too small and 4 GB may be used quickly.




Since the values being used seem to have been determined somewhat 
heuristically for both EarlyOOM and SwapOnZRAM, I was wondering if there 
was any prediction for how the values might change if one, the other, or 
both get switched on for Server builds?


SwapOnZRAM in particular is of interest to me. I have one system with a 
workload that's bursty on memory use, and when it starts using the swap 
the system becomes unresponsive, even using active SSH sessions is not 
guaranteed until the contention clears. The last time it happened I 
found myself wondering if SwapOnZRAM would make things more pleasant. It 
certainly does on my workstation machines, especially memory limited ones.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/6/20 8:21 PM, Chris Murphy wrote:

...

> Yes. Also in fuzzing there is the concept of "when to stop fuzzing"
> because it's a rabbit hole, you have to come up for air at some point,
> and work on other things. But you raise a good and subtle point which
> is also that ext4 has a very good fsck built up over decades, they
> succeed today from past failures. It's no different with Btrfs.
> 
> But also there is a bias. ext4 needs fsck to succeed in the worst
> cases in order to mount the file system.

Really?

> Btrfs doesn't need that.
> Often it can tolerate a read-only mount without any other mount
> option; 

Well, this assertion can be tested, so let's do that as well;
I'll do 50 runs of:

* mkfs w/ -m single as would happen on SSD
* fuzz 2048 byte of that 1G image at random
* mount -o ro, tally mount failures
* count missing/unreachable files if mount -o ro succeeds

<50 runs later on btrfs>

16 readonly mounts failed (32% failure rate)
Within the successful mounts, 1 or more files were unreachable in 30 attempts.
Across all 50 attempts, 7720 files were lost.

Is that better than ext4, and will ext4 need fsck just to be able to mount?

<50 runs later on ext4, same strategy>

zero mount failures for ext4.
Within the successful mounts, 1 or more files were unreachable in 2 attempts.
Across all 50 attempts, 48 files were lost.

It does not seem that btrfs has any unique or superior mount -o ro
recovery capabilities, either.

> and optionally can be made more tolerant to errors while still
> mounting read-only. This is a significant difference in recovery
> strategy. An fsck is something of a risk because it is writing changes
> to the file system. It is irreversible. Btrfs takes a different view,
> which is to increase the chance of recovery without needing a risky
> repair as the first step. Once your important data is out, now try the
> repair. Good chance it works, but maybe not as good as ext4's.

That's not supported by any of these test results.

-Eric
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Adam Williamson
On Thu, 2020-07-09 at 11:09 -0700, Adam Williamson wrote:
> On Thu, 2020-07-09 at 16:45 +0200, Igor Raits wrote:
> > On Thu, 2020-07-09 at 07:36 -0700, John M. Harris Jr wrote:
> > > On Thursday, July 9, 2020 5:24:59 AM MST Petr Pisar wrote:
> > > > DNF should perform "dnf mark install fedora-repos-rawhide-modular"
> > > > action on
> > > > a system upgrade, because we want that package to be prensented on
> > > > the
> > > > system. However I worry that DNF does not possess a capability for
> > > > doing
> > > > it. (Except of injecting that command into some externally executed
> > > > script.)
> > > 
> > > Unless I'm mistaken, it should only be present if the user manually
> > > installed 
> > > it, and opted into modularity, right?
> > 
> > No, it should be installed by default.
> 
> Are you talking about upgrades here, or fresh installs?
> 
> It is not being installed on fresh installs presently, and as I read
> the ticket, that was intended, per your comment:
> https://pagure.io/fesco/issue/2114#comment-653352
> "Probably best way would be going back to "Boltron" (IIRC how that
> thing was called) and have modular repos in their own fedora-repos
> subpackage which are enabled by default, but the package **is not
> installed by default.**" (emphasis added)

Oh, looking at it again, now I see this:
https://pagure.io/fesco/issue/2406#comment-658315

which seems to suggest that FESCo expects fedora-repos-modular to be
installed out of the box. Well, in yesterday's and today's Rawhide
(default Server DVD install) it wasn't, openQA caught this. On my first
reading of #2114 I figured this was intentional and adjusted openQA to
install fedora-repos-modular , but it sounds like it's actually a bug
and comps and/or kickstarts and/or package dependencies will need to be
changed.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread stan via devel
On Thu, 09 Jul 2020 18:07:39 +0300
nick...@gmail.com wrote:

> Yes, that's why "secure boot" should only be an option and the user
> must have the option to turn it off. Otherwise, it wouldn't be
> possible to do any kernel development on that computer.

For my edification.  I build custom kernels, and sign them using
pesign with my own key that I generated locally, and put in the EFI key
database. I can then boot the custom kernel in secure mode.  Couldn't I
also sign modules if I ever generated them with that same key?

That is, isn't this only an issue if the person doing the kernel
development hasn't generated their own key, and isn't signing their
kernels locally?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Matthew Miller
On Thu, Jul 09, 2020 at 11:09:57AM -0700, Adam Williamson wrote:
> What we're dealing with now is awkward consequences of this change for
> existing installs, where we'd probably want to *keep* modular repos,
> especially if any modules are actually enabled.

Is it a terrible idea to suggest that MBS insert a "Requires:
fedora-repos-modular" into all of the packages built in that system?

-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Matthew Miller
On Thu, Jul 09, 2020 at 10:40:39AM -0700, John M. Harris Jr wrote:
> I briefly discussed the situation with bcotton, and that's how it'll handle 
> that in the future. I wasn't aware of the particular situation.

Thanks John!

-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Adam Williamson
On Thu, 2020-07-09 at 07:36 -0700, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 5:24:59 AM MST Petr Pisar wrote:
> > DNF should perform "dnf mark install fedora-repos-rawhide-modular" action on
> > a system upgrade, because we want that package to be prensented on the
> > system. However I worry that DNF does not possess a capability for doing
> > it. (Except of injecting that command into some externally executed
> > script.)
> 
> Unless I'm mistaken, it should only be present if the user manually installed 
> it, and opted into modularity, right?

The slightly missing context is that the package is new and did not
exist until a couple of days ago. Previously modular repos were part of
fedora-repos , they have now been split into a separate subpackage
which is not be installed by default on fresh installs, effectively
meaning the whole modularity system is now optional and not available
by default, only if the user runs 'dnf install fedora-repos-modular'.

What we're dealing with now is awkward consequences of this change for
existing installs, where we'd probably want to *keep* modular repos,
especially if any modules are actually enabled.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Adam Williamson
On Thu, 2020-07-09 at 16:45 +0200, Igor Raits wrote:
> On Thu, 2020-07-09 at 07:36 -0700, John M. Harris Jr wrote:
> > On Thursday, July 9, 2020 5:24:59 AM MST Petr Pisar wrote:
> > > DNF should perform "dnf mark install fedora-repos-rawhide-modular"
> > > action on
> > > a system upgrade, because we want that package to be prensented on
> > > the
> > > system. However I worry that DNF does not possess a capability for
> > > doing
> > > it. (Except of injecting that command into some externally executed
> > > script.)
> > 
> > Unless I'm mistaken, it should only be present if the user manually
> > installed 
> > it, and opted into modularity, right?
> 
> No, it should be installed by default.

Are you talking about upgrades here, or fresh installs?

It is not being installed on fresh installs presently, and as I read
the ticket, that was intended, per your comment:
https://pagure.io/fesco/issue/2114#comment-653352
"Probably best way would be going back to "Boltron" (IIRC how that
thing was called) and have modular repos in their own fedora-repos
subpackage which are enabled by default, but the package **is not
installed by default.**" (emphasis added)
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Policy for Modules in Fedora and Fedora ELN - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/ModularPolicy

== Summary ==
Establish a set of rules for Modular content in Fedora to ensure an
optimal user and packager experience.

== Owner ==
* Name: [[User:Sgallagh| Stephen Gallagher]]
* Email: sgall...@redhat.com

== Detailed Description ==
Over the last several months, members of the Modularity WG and FESCo
have been working to establish a policy for module inclusion in
Fedora. We now have a proposal that FESCo requested be taken to the
Fedora community via the Change Proposal.

There is a preview of the new policy available at
https://sgallagh.fedorapeople.org/docs/modularity/modularity/policies/


== Benefit to Fedora ==
This policy makes explicit what packagers can and cannot do with
Modules in Fedora, which should avoid future issues like those that
were seen during the Fedora 31 and Fedora 32 cycles.

== Scope ==
* Proposal owners:
The proposal is written, so minimal work remains. We may need to make
revisions or clarifications based on public feedback.

* Other developers: N/A (not a System Wide Change)
* Release engineering: N/A
N/A (not a System Wide Change)

== How To Test ==
N/A (not a System Wide Change)

== User Experience ==
N/A this is not a user-facing change.

== Dependencies ==
N/A (not a System Wide Change)

== Contingency Plan ==
* Contingency mechanism: (What to do?  Who will do it?) N/A (not a
System Wide Change)
* Contingency deadline: N/A (not a System Wide Change)
* Blocks release? N/A (not a System Wide Change)

== Documentation ==
N/A (not a System Wide Change)


-- 
Ben Cotton
He / Him / His
Senior Program Manager, Fedora & CentOS Stream
Red Hat
TZ=America/Indiana/Indianapolis
___
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org


Policy for Modules in Fedora and Fedora ELN - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Ben Cotton
https://fedoraproject.org/wiki/Changes/ModularPolicy

== Summary ==
Establish a set of rules for Modular content in Fedora to ensure an
optimal user and packager experience.

== Owner ==
* Name: [[User:Sgallagh| Stephen Gallagher]]
* Email: sgall...@redhat.com

== Detailed Description ==
Over the last several months, members of the Modularity WG and FESCo
have been working to establish a policy for module inclusion in
Fedora. We now have a proposal that FESCo requested be taken to the
Fedora community via the Change Proposal.

There is a preview of the new policy available at
https://sgallagh.fedorapeople.org/docs/modularity/modularity/policies/


== Benefit to Fedora ==
This policy makes explicit what packagers can and cannot do with
Modules in Fedora, which should avoid future issues like those that
were seen during the Fedora 31 and Fedora 32 cycles.

== Scope ==
* Proposal owners:
The proposal is written, so minimal work remains. We may need to make
revisions or clarifications based on public feedback.

* Other developers: N/A (not a System Wide Change)
* Release engineering: N/A
N/A (not a System Wide Change)

== How To Test ==
N/A (not a System Wide Change)

== User Experience ==
N/A this is not a user-facing change.

== Dependencies ==
N/A (not a System Wide Change)

== Contingency Plan ==
* Contingency mechanism: (What to do?  Who will do it?) N/A (not a
System Wide Change)
* Contingency deadline: N/A (not a System Wide Change)
* Blocks release? N/A (not a System Wide Change)

== Documentation ==
N/A (not a System Wide Change)


-- 
Ben Cotton
He / Him / His
Senior Program Manager, Fedora & CentOS Stream
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 System-Wide Change proposal: Make btrfs the default file system for desktop variants

2020-07-09 Thread Eric Sandeen
On 7/6/20 12:07 AM, Chris Murphy wrote:
> On Fri, Jul 3, 2020 at 8:40 PM Eric Sandeen 
> wrote:
>> 
>> On 7/3/20 1:41 PM, Chris Murphy wrote:
>>> SSDs can fail in weird ways. Some spew garbage as they're
>>> failing, some go read-only. I've seen both. I don't have stats on
>>> how common it is for an SSD to go read-only as it fails, but once
>>> it happens you cannot fsck it. It won't accept writes. If it
>>> won't mount, your only chance to recover data is some kind of
>>> offline scrape tool. And Btrfs does have a very very good scrape
>>> tool, in terms of its success rate - UX is scary. But that can
>>> and will improve.
>> 
>> Ok, you and Josef have both recommended the btrfs restore
>> ("scrape") tool as a next recovery step after fsck fails, and I
>> figured we should check that out, to see if that alleviates the
>> concerns about recoverability of user data in the face of
>> corruption.
>> 
>> I also realized that mkfs of an image isn't representative of an
>> SSD system typical of Fedora laptops, so I added "-m single" to
>> mkfs, because this will be the mkfs.btrfs default on SSDs (right?).
>> Based on Josef's description of fsck's algorithm of throwing away
>> any block with a bad CRC this seemed worth testing.
>> 
>> I also turned fuzzing /down/ to hitting 2048 bytes out of the 1G 
>> image, or a bit less than 1% of the filesystem blocks, at random. 
>> This is 1/4 the fuzzing rate from the original test.
>> 
>> So: -m single, fuzz 2048 bytes of 1G image, run btrfsck --repair, 
>> mount, mount w/ recovery, and then restore ("scrape") if all that 
>> fails, see what we get.
> 
> What's the probability of this kind of corruption occurring in the 
> real world? If the probability is so low it can't practically be 
> computed, how do we assess the risk? And if we can't assess risk, 
> what's the basis of concern?

From 20 years of filesystem development experience, I know that people
run filesystem repair tools.  It's just a fact.  For a wide variety of
reasons - from bugs, to hardware errors, to admin errors, you name it,
filesystems experience corruption and inconsistencies.  At that point
the administrator needs a path forward.

"people won't need to repair btrfs" is, IMHO, the position that needs
to be supported, not "filesystem repair tools should be robust."

>> I ran 50 loops, and got:
>> 
>> 46 btrfsck failures 20 mount failures
>> 
>> So it ran btrfs restore 20 times; of those, 11 runs lost all or 
>> substantially all of the files; 17 runs lost at least 1/3 of the 
>> files.
> 
> Josef states reliability of ext4, xfs, and Btrfs are in the same 
> ballpark. He also reports one case in 10 years in which he failed to 
> recover anything. How do you square that with 11 complete failures, 
> trivially produced? Is there even a reason to suspect there's
> residual risk?

Extrapolating from Facebook's usecases to the fedora desktop should be
approached with caution, IMHO.

I've provided evidence that if/when damage happens for whatever reason,
btrfs is unable to recover in place far more often than other filesytems.

> When metadata is single profile, Btrfs is basically an early warning 
> system.> The available research on uncorrectable errors, errors that drive ECC
> does not catch, suggests that users are decently likely to experience
> at least one block of corruption in the life of the drive. And that
> it tends to get worse up until drive failure. But there is much less
> chance to detect this, if the file system isn't also checksumming the
> vastly larger payload on a drive: the data.

One of the problems in this whole discussion is the assumption that filesystem
inconsistencies only arise from disk bitflips etc; that's just not the case.

Look, I'm just providing evidence of what I've found when re-evaluating the
btrfs administration/repair tools.  I've found them to be quite weak.

From what I've gathered from these responses, btrfs is unique in that it is
/expected/ that if anything goes wrong, the administrator should be prepared
to scrape out remaining data, re-mkfs, and start over.  If that's acceptable
for the Fedora desktop, that's fine, but I consider it a risk that should not
be ignored when evaluating this proposal.

-Eric
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 10:32:06 AM MST Matthew Miller wrote:
> On Thu, Jul 09, 2020 at 08:46:57AM -0700, John M. Harris Jr wrote:
> 
> > On Thursday, July 9, 2020 8:17:50 AM MST you wrote:
> > 
> > > keep private mail private idiot
> > 
> > 
> > You're responding to my post on a mailing list. I don't see any reason to
> > keep  this private. I'm not the only one on this list that you've
> > attempted to contact directly with this sort of comment either, and I
> > believe it's important that others are aware.
> 
> 
> I also don't see any reason to be required to keep unsolicited negative
> "private" emails secret. There's no agreement that they should be. However,
> I would request that you ignore them rather than bringing them back to the
> list. We can unsubscribe and moderate, but we can't do anything about
> reading and off-list replies, and I'd prefer for them to not get dragged
> back here. (My suggestion is to just ignore.)
> 
> -- 
> Matthew Miller
> 
> Fedora Project Leader

I briefly discussed the situation with bcotton, and that's how it'll handle 
that in the future. I wasn't aware of the particular situation.

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Matthew Miller
On Thu, Jul 09, 2020 at 08:46:57AM -0700, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 8:17:50 AM MST you wrote:
> > keep private mail private idiot
> 
> You're responding to my post on a mailing list. I don't see any reason to 
> keep 
> this private. I'm not the only one on this list that you've attempted to 
> contact directly with this sort of comment either, and I believe it's 
> important that others are aware.

I also don't see any reason to be required to keep unsolicited negative
"private" emails secret. There's no agreement that they should be. However,
I would request that you ignore them rather than bringing them back to the
list. We can unsubscribe and moderate, but we can't do anything about
reading and off-list replies, and I'd prefer for them to not get dragged
back here. (My suggestion is to just ignore.)

-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Btrfs by default, the compression option

2020-07-09 Thread Matthew Miller
On Wed, Jul 08, 2020 at 02:20:06PM -0700, John M. Harris Jr wrote:
> > Yeah I guess for /usr the most relevant write metric is "does it slow down
> > DNF upgrades or install operations enough to be noticeable / annoying /
> > problematic"?
> More importantly, does it hurt the performance of installed packages?

Definitely. I expect for reads the impact will be negligible in most cases
(possible improvements in some, even), but it's important to validate that.

-- 
Matthew Miller

Fedora Project Leader
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Alexey A.
>75% and 6G
>for the cap might be better.

I agree. I think that 4GB cap is too small and 4 GB may be used quickly.

>I regularly see 3 to 1 and even 4 to 1.

It's true. It's easy to get 4:1 with browser. In fact, the compression
ratio is highly dependent on the workload. I get 1.4:1 with blender, and
maybe 100:1 with compressing zeroes in tmpfs: https://imgur.com/a/XfNRedA

пт, 10 июл. 2020 г. в 01:46, Chris Murphy :

> On Thu, Jul 9, 2020 at 8:52 AM John M. Harris Jr 
> wrote:
>
> > What's the KDE SIG's rationale behind supporting this? This actively
> limits
> > the amount of RAM that end users are able to make use of. The more RAM
> the end
> > user has, the more RAM is not available for use, because EarlyOOM will
> kill
> > software long before it's able to be used. For example, on my system,
> with 6
> > GiB of RAM, this will send SIGTERM while I still have over half of a
> gigabyte
> > of RAM, and SIGKILL while I still have over a quarter of a gigabyte of
> RAM.
>
> 6G RAM means a 3G /dev/zram0 device that will use ~ 1.5G RAM *if* the
> swap device is full and we're only getting 2 to 1 compression. 2 to 1
> is conservative I regularly see 3 to 1 and even 4 to 1. But let's go
> with 2:1. This means your system has the effective benefit of running
> 9G RAM at a cost of 1.5G. i.e a net of 7.5G RAM. Without having to use
> disk based swap.
>
> Is it possible a case can be made for using zswap instead (this is not
> related to zram at all - this is compressed memory cache that acts as
> a writeback cache to an existing disk based swap)? Yes. I've made this
> argument myself, so has Alexey. And as we learn more about those use
> case and workloads, it is possible that it may be a future feature.
> It's even possible it gets rolled into zram-generator so that users
> don't have to fuss with these things. But in the meantime? We are
> learning and innovating. And by all means try to break it. No one
> wants users to have a suboptimal experience out of the box.
>
> My suggestion is to stop the 'complaining for the sake of complaining'
> phase of the feature. And move to the "when I do X Y Z, this other app
> is killed off - how to tweak this?" And then does the tweak represent
> covering an edge case? Or is it good enough to be the new default?
>
> We can certainly change the defaults in the F33 cycle for both
> swaponzram and earlyoom. In fact we can change the defaults with a
> regular update if we have clear data that we should do that. But we've
> entered the real world phase of testing. And the hypotheticals from
> just complaining isn't very useful, even if those complaints later
> turn out to be valid. Data is what will persuade.
>
> There's lots of data from Fedora IoT and other use cases out there
> that 50% RAM for the /dev/zram size is a  pretty good start. It's
> likely it could go to 75% even in the Fedora 33 time frame. So folks
> should really try to do too much with the defaults and see if they can
> get some failures or unexpected behaviors. And then see if 75%
> consistently solves it. Not that some folks might need to bump the cap
> above 4GB to see an increase if they change the fraction of memory
> used for zram.
>
> For sure this only seems like magic. The efficacy of disk based swap
> is 100%. When a page is evicted, 100% of it goes to disk and 0%
> remains in memory. For swaponzram, the efficacy depends on the
> compression ratio. It's definitely not 0% (unless it's random or
> encrypted data) and it's definitely not 100% even if it's all zeros in
> the page. But we're going to get at least 50% efficacy. The overall
> efficiency of memory utilization is still better. But yeah, in tight
> situations it could be a problem. We need to learn more. 75% and 6G
> for the cap might be better. But that also has a risk for upgrades,
> which is that now on a 6G RAM system, /dev/zram is 4.5G which might
> consume 2.3G RAM. So it's going to be a particularly special workload
> that really wants to live fully in 4+ GB of memory. If it has to do a
> bunch of paging in and out through? It's certainly going to be faster
> still than doing that same paging to/from disk based swap.
>
> And for sure it is better than the noswap case, which means 0%
> eviction efficacy. Those anonymous pages can't go anywhere, they're
> pinned in RAM. At least with a zram based swap, they take up 1/2 or
> less the memory.
>
> So it's a bit more like magic than not. It's pretty cool. But yeah we
> should try to break it.
>
>
>
> --
> Chris Murphy
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>
___

Re: SwapOnZRAM and how it affects earlyoom thresholds

2020-07-09 Thread Michael Catanzaro
On Thu, Jul 9, 2020 at 10:49 am, Rex Dieter  
wrote:

Upon reading the SwapOnZRAM feature proposal, I see it is advocating
allocating 50% of ram for swap.  I'd like folks to consider and 
evaluate how
this impacts earlyoom.  It effectively makes the earlyoom memory 
threshold
double (right?).  If so, at least think about lowering 4 to (2 or 3), 
since

that will make earlyoom's behavior closer to before swaponzram was
introduced.


Well it's min(50% of RAM, 4 GB). You never get more than 4 GB of zram.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Fedora rawhide compose report: 20200709.n.0 changes

2020-07-09 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20200708.n.0
NEW: Fedora-Rawhide-20200709.n.0

= SUMMARY =
Added images:1
Dropped images:  1
Added packages:  13
Dropped packages:23
Upgraded packages:   135
Downgraded packages: 0

Size of added packages:  89.61 MiB
Size of dropped packages:32.80 MiB
Size of upgraded packages:   2.79 GiB
Size of downgraded packages: 0 B

Size change of upgraded packages:   126.77 MiB
Size change of downgraded packages: 0 B

= ADDED IMAGES =
Image: Comp_Neuro live x86_64
Path: Labs/x86_64/iso/Fedora-Comp_Neuro-Live-x86_64-Rawhide-20200709.n.0.iso

= DROPPED IMAGES =
Image: Mate live x86_64
Path: Spins/x86_64/iso/Fedora-MATE_Compiz-Live-x86_64-Rawhide-20200708.n.0.iso

= ADDED PACKAGES =
Package: golang-github-gocomply-scap-0-0.1.20200708git27dcc4e.fc33
Summary: A GO module of the Security Content Automation Protocol (SCAP) 
Specification
RPMs:golang-github-gocomply-scap-devel
Size:173.43 KiB

Package: golang-github-zeebo-admission-3.0.1-1.fc33
Summary: Admission is a package for processing a bunch of udp packets
RPMs:golang-github-zeebo-admission-devel
Size:22.44 KiB

Package: golang-github-zeebo-incenc-0-0.1.20200708git0d92902.fc33
Summary: Incremental Encoding
RPMs:golang-github-zeebo-incenc-devel
Size:16.48 KiB

Package: golang-storj-drpc-0.0.13-1.fc33
Summary: Light replacement for gprc
RPMs:golang-storj-drpc golang-storj-drpc-devel
Size:10.49 MiB

Package: golie-0-0.1.20200708git9dd93d8.fc33
Summary: A client/server implementation of ROLIE written in GO
RPMs:golang-github-rolieup-golie-devel golie
Size:25.27 MiB

Package: gstreamer1-doc-1.17.2-2.fc33
Summary: GStreamer documentation
RPMs:gstreamer1-doc
Size:36.40 MiB

Package: libmysofa-1.1-1.fc33
Summary: C functions for reading HRTFs
RPMs:libmysofa libmysofa-devel mysofa
Size:5.70 MiB

Package: librhsm-0.0.3-1.fc33
Summary: Red Hat Subscription Manager library
RPMs:librhsm librhsm-devel
Size:260.92 KiB

Package: libspatialaudio-3.1-1.20200406gitd926a2e.fc33
Summary: Ambisonic encoding / decoding and binauralization library
RPMs:libspatialaudio libspatialaudio-devel
Size:10.86 MiB

Package: python-django-contrib-comments-1.9.2-1.fc33
Summary: The code formerly known as django.contrib.comments
RPMs:python3-django-contrib-comments
Size:199.89 KiB

Package: python-fastprogress-0.2.3-1.fc33
Summary: Progress bar for Jupyter Notebook and console
RPMs:python3-fastprogress
Size:27.88 KiB

Package: rust-enumflags2_derive-0.6.4-1.fc33
Summary: Do not use directly, use the reexport in the `enumflags2` crate
RPMs:rust-enumflags2_derive+default-devel 
rust-enumflags2_derive+not_literal-devel rust-enumflags2_derive-devel
Size:25.76 KiB

Package: uresourced-0.1.0-1.fc33
Summary: Dynamically allocate resources to the active user
RPMs:uresourced
Size:185.09 KiB


= DROPPED PACKAGES =
Package: abgraph-1.1-18.fc32
Summary: ABGraph is a simple tool to benchmark webservers
RPMs:abgraph
Size:20.32 KiB

Package: accrete-1.0-22.fc32
Summary: Accrete is a physical simulation of solar system planet formation
RPMs:accrete
Size:118.26 KiB

Package: astronomy-backgrounds-1.0-18.fc32
Summary: Desktop wallpapers with Astronomy theme
RPMs:astronomy-backgrounds
Size:1.28 MiB

Package: astronomy-bookmarks-1-23.fc32
Summary: Fedora astronomy bookmarks
RPMs:astronomy-bookmarks
Size:8.67 KiB

Package: cvsgraph-1.6.1-27.fc32
Summary: CVS/RCS repository grapher
RPMs:cvsgraph
Size:504.85 KiB

Package: cvsplot-1.7.4-23.fc32
Summary: Collect statistics from CVS controlled files
RPMs:cvsplot
Size:28.19 KiB

Package: cvsweb-3.0.6-25.fc32
Summary: Web interface for CVS repositories
RPMs:cvsweb
Size:70.40 KiB

Package: eris-1.3.23-16.fc31
Summary: Client-side session layer for Atlas-C++
RPMs:eris eris-devel
Size:2.11 MiB

Package: gcx-0.9.11-27.fc32
Summary: Data-reduction tool for CCD photometry
RPMs:gcx
Size:1.82 MiB

Package: ggobi-2.1.7-24.fc32
Summary: Open source visualization for exploring high-dimensional data
RPMs:ggobi ggobi-devel
Size:4.12 MiB

Package: ircd-ratbox-3.0.10-6.fc32
Summary: Ircd-ratbox is an advanced, stable and fast ircd
RPMs:ircd-ratbox ircd-ratbox-mkpasswd
Size:5.53 MiB

Package: mencal-2.3-20.fc32
Summary: Menstruation calendar
RPMs:mencal
Size:26.00 KiB

Package: mercator-0.3.3-15.fc31
Summary: Terrain library for WorldForge client/server
RPMs:mercator mercator-devel
Size:1.84 MiB

Package: nightfall-1.92-4.fc32
Summary: Nightfall is an astronomy application for emulation of eclipsing stars
RPMs:nightfall
Size:4.08 MiB

Package: pam_ccreds-10-21.fc32
Summary: Pam module to cache login credentials
RPMs:pam_ccreds
Size:169.19 KiB

Package: pyephem-3.7.6.0-19.fc33
Summary: Basic astronomical computations for Python
RPMs:python3-pyephem
Size:3.24 MiB

Package: ratbox

Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Chris Murphy
On Thu, Jul 9, 2020 at 8:52 AM John M. Harris Jr  wrote:

> What's the KDE SIG's rationale behind supporting this? This actively limits
> the amount of RAM that end users are able to make use of. The more RAM the end
> user has, the more RAM is not available for use, because EarlyOOM will kill
> software long before it's able to be used. For example, on my system, with 6
> GiB of RAM, this will send SIGTERM while I still have over half of a gigabyte
> of RAM, and SIGKILL while I still have over a quarter of a gigabyte of RAM.

6G RAM means a 3G /dev/zram0 device that will use ~ 1.5G RAM *if* the
swap device is full and we're only getting 2 to 1 compression. 2 to 1
is conservative I regularly see 3 to 1 and even 4 to 1. But let's go
with 2:1. This means your system has the effective benefit of running
9G RAM at a cost of 1.5G. i.e a net of 7.5G RAM. Without having to use
disk based swap.

Is it possible a case can be made for using zswap instead (this is not
related to zram at all - this is compressed memory cache that acts as
a writeback cache to an existing disk based swap)? Yes. I've made this
argument myself, so has Alexey. And as we learn more about those use
case and workloads, it is possible that it may be a future feature.
It's even possible it gets rolled into zram-generator so that users
don't have to fuss with these things. But in the meantime? We are
learning and innovating. And by all means try to break it. No one
wants users to have a suboptimal experience out of the box.

My suggestion is to stop the 'complaining for the sake of complaining'
phase of the feature. And move to the "when I do X Y Z, this other app
is killed off - how to tweak this?" And then does the tweak represent
covering an edge case? Or is it good enough to be the new default?

We can certainly change the defaults in the F33 cycle for both
swaponzram and earlyoom. In fact we can change the defaults with a
regular update if we have clear data that we should do that. But we've
entered the real world phase of testing. And the hypotheticals from
just complaining isn't very useful, even if those complaints later
turn out to be valid. Data is what will persuade.

There's lots of data from Fedora IoT and other use cases out there
that 50% RAM for the /dev/zram size is a  pretty good start. It's
likely it could go to 75% even in the Fedora 33 time frame. So folks
should really try to do too much with the defaults and see if they can
get some failures or unexpected behaviors. And then see if 75%
consistently solves it. Not that some folks might need to bump the cap
above 4GB to see an increase if they change the fraction of memory
used for zram.

For sure this only seems like magic. The efficacy of disk based swap
is 100%. When a page is evicted, 100% of it goes to disk and 0%
remains in memory. For swaponzram, the efficacy depends on the
compression ratio. It's definitely not 0% (unless it's random or
encrypted data) and it's definitely not 100% even if it's all zeros in
the page. But we're going to get at least 50% efficacy. The overall
efficiency of memory utilization is still better. But yeah, in tight
situations it could be a problem. We need to learn more. 75% and 6G
for the cap might be better. But that also has a risk for upgrades,
which is that now on a 6G RAM system, /dev/zram is 4.5G which might
consume 2.3G RAM. So it's going to be a particularly special workload
that really wants to live fully in 4+ GB of memory. If it has to do a
bunch of paging in and out through? It's certainly going to be faster
still than doing that same paging to/from disk based swap.

And for sure it is better than the noswap case, which means 0%
eviction efficacy. Those anonymous pages can't go anywhere, they're
pinned in RAM. At least with a zram based swap, they take up 1/2 or
less the memory.

So it's a bit more like magic than not. It's pretty cool. But yeah we
should try to break it.



-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


incorrect docs for forge macro extension, when using 'unknown' scm source (e.g., git.kernel.org) ?

2020-07-09 Thread PGNet Dev
I'm working on a spec, pulling source with forgemeta/scm

With known/supported scm sources (e.g., github), it works as expected, with no 
issues.

Atm, I'm trying to pull from a different source,

git.kernel.org

with this 'ofono-test.spec'

%global forgeurl
https://git.kernel.org/pub/scm/network/ofono/ofono.git
%global commit  aeeb321a72d0b84c0fe5008dc7c49f0707582ca0

%forgemeta -i -a

Name:  ofono
Version:   0
Release:   %{dist}
Summary:   ofono
License:   GPL-2.0

URL:   %{forgeurl}
Source:%{forgesource}

BuildRequires: git

%description
ofono

%prep
%forgesetup

%build

%install

%files

%changelog


"build through %prep" stage fails

rpmbuild --clean --verbose -bp ofono-test.spec
Packaging variables read or set by %forgemeta
  forgeurl0: 
https://git.kernel.org/pub/scm/network/ofono/ofono.git
  forgesource0:  #/.%{archiveext0}
  forgesetupargs0:   -c -n %{archivename0}
  extractdir0:   %{archivename0}
  commit0:   aeeb321a72d0b84c0fe5008dc7c49f0707582ca0
  distprefix0:   .%{scm0}aeeb321
  dist:  .%{scm0}aeeb321.fc32
  (snapshot date is either manually supplied or computed once 
%{_sourcedir}/%{archivename0}.%{archiveext0} is available)
warning: line 8: Possible unexpanded macro in: Release: 
  .%{scm0}aeeb321.fc32
error: Bad source: /root/rpmbuild/SOURCES/.%{archiveext0}: No 
such file or directory

Not at all clear what the actual problem is.  Since it _does_ work with 
gitbub/gitlab sources, I'd _guess_ it's a URL/source string format issue ...

Reading at


https://fedoraproject.org/wiki/Forge-hosted_projects_packaging_automation#Extending_the_macro

states

"locate the latest version of the forgemeta macro (it should be 
installed in /usr/lib/rpm/macros.d/macros.forge-srpm by fedora-rpm-macros)"

the package is installed

dnf list --installed fedora-rpm-macros
Installed Packages
fedora-rpm-macros.noarch26-8.fc32@fedora

there's no such file

ls -al /usr/lib/rpm/macros.d/macros.forge-srpm
ls: cannot access '/usr/lib/rpm/macros.d/macros.forge-srpm': No 
such file or directory

checking

rpm -ql fedora-rpm-macros
/usr/lib/rpm/macros.d/macros.fedora

and, the file's empty

cat /usr/lib/rpm/macros.d/macros.fedora
# Miscellaneous Fedora-related RPM macros.

# Currently there is nothing here.


(1) Are there up-to-date/correct docs for 'Extending the macro' ?

(2) Is there an explcit example for use with 'git.kernel.org' sources?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Alexey A.
>You can limit the process with cgroups

In this case the process will be killed by OOM killer. Note that OOM killer
exists by default. Limiting cgroup means the OOM killer will be invoked in
the cgroup. With earlyoom you database server will get SIGTERM and maybe
will gracefully shutdown.

пт, 10 июл. 2020 г. в 00:10, John M. Harris Jr :

> On Thursday, July 9, 2020 7:57:25 AM MST Reindl Harald (privat) wrote:
> > Am 09.07.20 um 16:53 schrieb John M. Harris Jr:
> > > On Thursday, July 9, 2020 6:24:41 AM MST Sergio Belkin wrote:
> > >> +1 This would be a genuine improvement for end users!
> > >
> > > In what way do you believe this will be an improvement for end users?
> By
> > > killing their software, while it's legitimately using RAM, as expected?
> > > How
> > > exactly is that beneficial? If anything, this is actively working
> against
> > > the best interests of the end user.
> >
> > could you just shutup about topics you don't understand?
>
> I understand exactly what EarlyOOM does, which is precisely why I take
> issue
> with enabling this by default.
>
> > my co-developer had a recursion in his code and after a few seconds the
> > machine was completly unresponsible due debugging the root cause
>
> That doesn't sound like anything to do with recursion, but either a memory
> leak, or unchecked allocation. It may help to limit the amount of memory
> that
> specific program can use, in order to help debug the issue.
>
> > even power-key took *15 minutes* for a clean shutdown while he was
> > tempted to hard power off the machine which is not much fun witch 32 GB
> > RAM and all sort of database services
>
> Yeah, OOM situations are never fun. However, with all sorts of database
> services, you wouldn't want something killing processes all willy nilly.
>
> > guess what was the solution: kill the fucking httpd worker before it
> > kills the system
>
> You can limit the process with cgroups, so that only the software you
> actually
> intend to limit is affected, and the rest works as you'd expect.
>
> --
> John M. Harris, Jr.
> Splentity
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: SwapOnZRAM and how it affects earlyoom thresholds

2020-07-09 Thread Chris Murphy
On Thu, Jul 9, 2020 at 9:49 AM Rex Dieter  wrote:
>
> part of some irc discussions on
> https://fedoraproject.org/wiki/Changes/KDEEarlyOOM
>
> raised my attention to related item,
> https://fedoraproject.org/wiki/Changes/SwapOnZRAM
>
> As it stands currently with earlyoom, it's default thresholds are 4% ram and
> 10% swap before it acts.  That's fine and dandy.
>
> Upon reading the SwapOnZRAM feature proposal, I see it is advocating
> allocating 50% of ram for swap.  I'd like folks to consider and evaluate how
> this impacts earlyoom.  It effectively makes the earlyoom memory threshold
> double (right?).  If so, at least think about lowering 4 to (2 or 3), since
> that will make earlyoom's behavior closer to before swaponzram was
> introduced.
>
> Thoughts?

The net effect is that earlyoom is more likely to trigger than with a
disk based swap because right now disk based swap is huge by default.
It's huge by default to accommodate a hibernation image. The most
common value I've found over a long period of time, for swap without
hibernation is 50% of RAM. So this approximates those expectations.

I'd like to hear from Alexey what he thinks about further reducing the
values in earlyoom versus possibly raising the cap in
zram-generator-defaults. I don't want to get too carried away there,
because we are applying this to upgrades (wherever the to-be-obsoleted
'zram' package exists already even if not enabled). There is an
opportunity, of course, right now and through beta testing, to keep on
testing variations on both the size of the zram device used for swap
and for earlyoom. But we also have another Fedora release, Fedora 34.
So I'm more inclined to go conservative so long as that itself isn't
causing problems.

One thing I'm a bit skeptical of with reducing earlyoom's triggers is
that free memory is needed for the recovery from an actual kill.
Usually this is just sigterm. That's the first attempt. If that
doesn't work then earlyoom issues sigkill, which is at a lower
threshold already.


-- 
Chris Murphy
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: out of Koji disk space

2020-07-09 Thread Jan Kratochvil
On Tue, 07 Jul 2020 21:11:31 +0200, Kevin Fenzi wrote:
> I am not sure what to tell you here. Perhaps you could describe the
> reason you are working on the chromium debuginfo? Is it broken? Missing?
> Less useful that normal? 

Missing. Completely.

And it is not just about enabling it (=remove its disable) because with
default Fedora building options (no -fdebug-types-section and using DWZ) the
build will fail. That is because debuginfo will exceed 4GB which is the limit
of DWARF32 format and GNU tools do not much support DWARF64.
Enable debuginfo for x86_64 and aarch64.
https://src.fedoraproject.org/rpms/chromium/pull-request/27


> All I see in this thread is that you were working on it and it increased
> disk space usage, I must have missed the background/goal here?

The goal is to have debuginfo for Chromium. Or why other Fedora packages have
debuginfo but Chromium does not?


Thanks,
Jan
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Alexey A.
>By killing their software, while it's legitimately using RAM, as expected?

Memory usage causes system hang is not legitimately using RAM. Expected
behavior is killing memory hog.

чт, 9 июл. 2020 г. в 23:53, John M. Harris Jr :

> On Thursday, July 9, 2020 6:24:41 AM MST Sergio Belkin wrote:
> > +1 This would be a genuine improvement for end users!
>
> In what way do you believe this will be an improvement for end users? By
> killing their software, while it's legitimately using RAM, as expected?
> How
> exactly is that beneficial? If anything, this is actively working against
> the
> best interests of the end user.
>
> --
> John M. Harris, Jr.
>
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: SwapOnZRAM and how it affects earlyoom thresholds

2020-07-09 Thread Ben Cotton
On Thu, Jul 9, 2020 at 11:50 AM Rex Dieter  wrote:
>
> Upon reading the SwapOnZRAM feature proposal, I see it is advocating
> allocating 50% of ram for swap.  I'd like folks to consider and evaluate how
> this impacts earlyoom.  It effectively makes the earlyoom memory threshold
> double (right?).  If so, at least think about lowering 4 to (2 or 3), since
> that will make earlyoom's behavior closer to before swaponzram was
> introduced.
>
No objections from me as KDE EarlyOOM change owner. My main concern is
that if someone disables SwapOnZRAM, the effective default EarlyOOM
threshold changes. I don't think there's any easy way to handle that,
but it's an effect we should explicitly take into account.

With my FPgM hat on, I would consider this to be a part of the Swap on
ZRAM proposal, which has been approved by FESCo and so wouldn't
require its own change proposal.

-- 
Ben Cotton
He / Him / His
Senior Program Manager, Fedora & CentOS Stream
Red Hat
TZ=America/Indiana/Indianapolis
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 Self-Contained Change proposal: NSS dbm support removal

2020-07-09 Thread Neal Gompa
On Thu, Jul 9, 2020 at 10:50 AM Daiki Ueno  wrote:
>
> Hello Igor,
>
> Sorry for the delay.
>
> Igor Raits  writes:
>
> > On Mon, 2020-06-15 at 16:10 -0400, Ben Cotton wrote:
> >> https://fedoraproject.org/wiki/Changes/NSSDBMRemoval
> >>
> >> == Summary ==
> >> Network Security Services (NSS) historically supports 2 different
> >> database backends, based on SQLite and dbm. Since Fedora 28, the
> >> SQLite backend has been used by default and the dbm backend has been
> >> deprecated ([[Changes/NSSDefaultFileFormatSql|NSS Default File Format
> >> SQL]]). This Change is about removing the support for the dbm backend
> >> entirely.
> >>
> >> == Owner ==
> >> * Name: [[User:ueno| Daiki Ueno]]
> >> * Email: du...@redhat.com
> >>
> >> == Detailed Description ==
> >> Applications that use the NSS library often use a database for
> >> storage
> >> of keys, certificates and trust. NSS supports two different storage
> >> formats, one is based on SQLite and another one is based on dbm
> >> files.
> >>
> >> Today's default file format used by NSS, used when applications omit
> >> the type parameter, is the SQLite file format, and the older dbm
> >> format has been considered as deprecated since Fedora 28, because it
> >> has several drawbacks such as lack of support for parallel access to
> >> the storage.
> >>
> >> As the default change was made 2 years ago, and NSS provides a
> >> transparent migration mechanism from the dbm format to the SQLite
> >> format, the suggestion is to completely disable the dbm backend.
> >>
> >> == Benefit to Fedora ==
> >> There are a few benefits:
> >> * By disabling the dbm database, the size of the library binary will
> >> be slightly smaller
> >> * The NSS developers will be able to focus on the new file format
> >>
> >> == Scope ==
> >> * Proposal owners:
> >> A build time environment variable (NSS_DISABLE_DBM) needs to be set.
> >>
> >> * Other developers: N/A
> >> * Policies and guidelines: N/A (not a System Wide Change)
> >> * Trademark approval: N/A (not needed for this Change)
> >>
> >> == Upgrade/compatibility impact ==
> >> The impact should be limited, as long as the users always update from
> >> the previous version. That would ensure the existing databases on the
> >> system are properly migrated. Therefore, we propose this as a Self
> >> Contained Change, rather than a System Wide Change.
> >
> > Does it mean that people who upgrade from F31 to F33 will work just
> > fine?
>
> That should, as long as the NSS databases had been created or accessed
> with the default method (that is SQLite) on F31.  On the other hand, if
> a database is created explicitly as dbm, it needs to be converted before
> upgrading to F33.
>
> If it is too worrisome, I'm willing to provide a script that checks if
> the databases on the known locations are already converted.
>

I think it'd be worth doing this, and perhaps executing this as part
of upgrading.



-- 
真実はいつも一つ!/ Always, there's only one truth!
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


SwapOnZRAM and how it affects earlyoom thresholds

2020-07-09 Thread Rex Dieter
part of some irc discussions on
https://fedoraproject.org/wiki/Changes/KDEEarlyOOM

raised my attention to related item,
https://fedoraproject.org/wiki/Changes/SwapOnZRAM

As it stands currently with earlyoom, it's default thresholds are 4% ram and 
10% swap before it acts.  That's fine and dandy.

Upon reading the SwapOnZRAM feature proposal, I see it is advocating 
allocating 50% of ram for swap.  I'd like folks to consider and evaluate how 
this impacts earlyoom.  It effectively makes the earlyoom memory threshold 
double (right?).  If so, at least think about lowering 4 to (2 or 3), since 
that will make earlyoom's behavior closer to before swaponzram was 
introduced.

Thoughts?

-- Rex
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Zbigniew Jędrzejewski-Szmek
On Thu, Jul 09, 2020 at 08:40:52AM -0700, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 7:45:07 AM MST Igor Raits wrote:
> > On Thu, 2020-07-09 at 07:36 -0700, John M. Harris Jr wrote:
> > > Unless I'm mistaken, it should only be present if the user manually
> > > installed
> > > it, and opted into modularity, right?
> > 
> > 
> > No, it should be installed by default.
> 
> What was the point of breaking it out into a separate package, if it's still 
> going to be installed on end users' systems by default?

The goal is to have continuity in behaviour and avoid surprises for
users. Existing systems behave as before, new installations get the
full set of packages available, but users who wish to may opt out.
This is also what got approved by FESCo.

> I can obviously see it 
> being removed on systems currently using modular repos as an issue, but I'm 
> not sure it makes sense to throw it on for systems not currently using it.

It is being removed without taking into account if the user has any
modular packages installed. But even if they don't, that's not what we
want/agreed to do, see above.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 8:17:50 AM MST you wrote:
> keep private mail private idiot

You're responding to my post on a mailing list. I don't see any reason to keep 
this private. I'm not the only one on this list that you've attempted to 
contact directly with this sort of comment either, and I believe it's 
important that others are aware.

> Am 09.07.20 um 17:09 schrieb John M. Harris Jr:
> > On Thursday, July 9, 2020 7:57:25 AM MST Reindl Harald (privat) wrote:
> >> my co-developer had a recursion in his code and after a few seconds the
> >> machine was completly unresponsible due debugging the root cause
> > 
> > That doesn't sound like anything to do with recursion
> 
> stop telling people what things sound like when they know the truth

It's true that I don't know your code, was just a guess.

> > but either a memory
> > leak, or unchecked allocation. It may help to limit the amount of memory
> > that specific program can use, in order to help debug the issue.
> 
> endless recursion of program code allocates endless memory, it's that
> easy and it does it pretty quick

Endless recursion will normally cause a stack overflow fairly quickly, and it 
doesn't necessarily allocate a lot more memory. I don't know what language 
you're using, but the only way that'd actually be "infinite" would be if it 
were fork()ing or exec*()ing another process. See below for my suggestions on 
protecting that, if you're interested.

> >> even power-key took *15 minutes* for a clean shutdown while he was
> >> tempted to hard power off the machine which is not much fun witch 32 GB
> >> RAM and all sort of database services
> > 
> > Yeah, OOM situations are never fun. However, with all sorts of database
> > services, you wouldn't want something killing processes all willy nilly.
> 
> that's why database services have OOMScoreAdjust=-1000 kid - they are
> not killed willy nilly

That'd be the case only if they're running as systemd units, not if they're 
spawned as a user process. For example, MySQL is spawned by Akonadi as the 
backend of KMail (and other KDE software). This wouldn't have an oom_score_adj 
set.

> >> guess what was the solution: kill the fucking httpd worker before it
> >> kills the system
> > 
> > You can limit the process with cgroups, so that only the software you
> > actually intend to limit is affected, and the rest works as you'd expect
> 
> jesus christ you don't know *before* it happens what drives crazy and
> putting arbitary limits everywhere does more harm

If you're working on something that may "run out of control", you can apply 
cgroups yourself, to that process tree. You can always remove the limits when 
you're done working on it.

The exact argument you've made against arbitrary limits is my argument against 
EarlyOOM. I hope that helps you understand where I'm coming from.

-- 
John M. Harris, Jr.
Splentity

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 7:45:07 AM MST Igor Raits wrote:
> On Thu, 2020-07-09 at 07:36 -0700, John M. Harris Jr wrote:
> > Unless I'm mistaken, it should only be present if the user manually
> > installed
> > it, and opted into modularity, right?
> 
> 
> No, it should be installed by default.

What was the point of breaking it out into a separate package, if it's still 
going to be installed on end users' systems by default? I can obviously see it 
being removed on systems currently using modular repos as an issue, but I'm 
not sure it makes sense to throw it on for systems not currently using it.

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread David Schwörer
On 7/8/20 11:15 PM, John M. Harris Jr wrote:
>>   * disk access is literally O(1) slower than RAM access
> This is just false, and you can prove that on your own system using only 
> `dd`. 
> In fact, if your system is newer than my Lenovo ThinkPad X200 Tablet, you'll 
> probably have even faster reads/writes from/to disk.
> 

Can you explain how you do this?
How do you ensure dd is not using some cache?
And how do you measure ram i/o with dd?
As far as I understand dd is not a memory benchmarking tool, not even
parallised to fully saturate the memory throughput.

Just copying to/from ramdisk with dd gave me speeds of below 2 GB/s, but
a streaming test [1] gives me 15 GB/s for copy using a single thread and
18 GB/s if I use both cores.

Using dd to copy some file, calling time sync before and after, and
adding the time after to the estimate by dd gives me an estimate of 30
MB/s for disk speed.

So the ratio is only ~1000 but I am not sure how to do it with just dd ...

But back to the point - 1000 is still way to slow and I love earlyOOM. I
wrote a script myself before I learned about earlyOOM, and I think it is
great to have earlyOOM enabled by default.

[1] https://www.cs.virginia.edu/stream/FTP/Code/Versions/stream_mpi.c
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 7:57:25 AM MST Reindl Harald (privat) wrote:
> Am 09.07.20 um 16:53 schrieb John M. Harris Jr:
> > On Thursday, July 9, 2020 6:24:41 AM MST Sergio Belkin wrote:
> >> +1 This would be a genuine improvement for end users!
> > 
> > In what way do you believe this will be an improvement for end users? By
> > killing their software, while it's legitimately using RAM, as expected?
> > How
> > exactly is that beneficial? If anything, this is actively working against
> > the best interests of the end user.
> 
> could you just shutup about topics you don't understand?

I understand exactly what EarlyOOM does, which is precisely why I take issue 
with enabling this by default.

> my co-developer had a recursion in his code and after a few seconds the
> machine was completly unresponsible due debugging the root cause

That doesn't sound like anything to do with recursion, but either a memory 
leak, or unchecked allocation. It may help to limit the amount of memory that 
specific program can use, in order to help debug the issue.

> even power-key took *15 minutes* for a clean shutdown while he was
> tempted to hard power off the machine which is not much fun witch 32 GB
> RAM and all sort of database services

Yeah, OOM situations are never fun. However, with all sorts of database 
services, you wouldn't want something killing processes all willy nilly.

> guess what was the solution: kill the fucking httpd worker before it
> kills the system

You can limit the process with cgroups, so that only the software you actually 
intend to limit is affected, and the rest works as you'd expect.

-- 
John M. Harris, Jr.
Splentity

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Michael Catanzaro
On Thu, Jul 9, 2020 at 7:51 am, John M. Harris Jr 
 wrote:

There's absolutely no justification for this, as I see it.


You're willfully ignoring what everybody else is telling you: we don't 
want out-of-control applications to bring down the desktop. GNOME 
doesn't want it, and KDE doesn't want it either. Is it so hard to 
believe...?


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread nickysn
On Thu, 2020-07-09 at 07:46 -0700, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 3:38:54 AM MST Richard Hughes wrote:
> > On Wed, 8 Jul 2020 at 22:19, John M. Harris Jr <
> > joh...@splentity.com>
> > wrote:
> > > This is not something that's beneficial here, it's only
> > > harming our users.
> > 
> > That seems exceedingly myopic to me. I'm guessing you've not been
> > following the last few years of security research, where attacking
> > the
> > firmware is now the best way to own a machine. And please don't
> > lecture me on why BIOS is more secure than UEFI, "compatibility"
> > mode
> > is implemented *on top of* the UEFI bios these days, rather than as
> > a
> > completely different software stack.
> 
> "Attacking" the firmware has always been the best option, even with
> BIOS boot 
> systems. For example, coreboot is technically a hostile payload, to
> the OEM. 
> That doesn't mean that it makes any sense to prevent the end user
> from 
> actually owning the hardware they've purchased, and doing with it
> what they 
> please.

Yes, that's why "secure boot" should only be an option and the user
must have the option to turn it off. Otherwise, it wouldn't be possible
to do any kernel development on that computer.

> 
> > > If you've got root, you can STILL do almost anything to the
> > > hardware,
> > > including disabling various "firmware protection technologies".
> > 
> > I don't think you understand what enabling SecureBoot actually
> > does.
> 
> "Secure Boot" doesn't make root non-uid 0, and can't keep root from 
> controlling system devices, even uploading unsigned firmware to
> peripherals. 
> At the point that anything but the end user gets root on a Fedora
> install, all 
> of these "security gains" provided by creating needless headache for
> those 
> running under "Secure Boot" are null and void.

Yeah, for me, it's pretty weak as a mitigation effort, because it will
usually only have some protective effect if someone already has root on
your computer, and that's already pretty bad. You don't normally want
to allow that to happen ever. And when someone has root, they can do
pretty much anything. IMHO, it's a lot of effort and inconvenience for
very little actual gain. But, that's why it should only be an option
and not mandatory. But yes, it might make sense for certain use cases.

Nikolay
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Rex Dieter
John M. Harris Jr wrote:

> On Thursday, July 9, 2020 5:25:36 AM MST Rex Dieter wrote:
>> John M. Harris Jr wrote:
>> 
>> 
>> > That's not what this discussion results from. This discussion results
>> > from
>> > somebody outside the KDE SIG deciding the KDE Spin needs EarlyOOM
>> > killing our applications at random, and ruining our desktop experience.
>> 
>> 
>> This is full of inaccurate statements
>> 
>> 1.  The KDE SIG (at least some) was made aware of this feature and were
>> ok
>> with it.  It wasn't someone outside deciding anything.
> 
> What's the KDE SIG's rationale behind supporting this? This actively
> limits the amount of RAM that end users are able to make use of. The more
> RAM the end user has, the more RAM is not available for use, because
> EarlyOOM will kill software long before it's able to be used. For example,
> on my system, with 6 GiB of RAM, this will send SIGTERM while I still have
> over half of a gigabyte of RAM, and SIGKILL while I still have over a
> quarter of a gigabyte of RAM. There's absolutely no justification for
> this, as I see it.
> 

You're welcome to your opinion, so far I do not share it.  One example: I've 
hit several times in the past where compiling something killed my box and 
made it unresponsive.  I would have loved it for something to have bailed me 
out of those situations.

I've been testing it on a laptop with only 4gb ram, and it's been working 
well for me so far.  Though I honestly think I've not yet hit any thresholds 
, primarily only doing local package builds and web browsing.  

Also, you might want to double-check your math and the configuration values 
in account here, my default earlyoom config is set with -m 4 value, and your 
comment does not take into account swap (default is threshold of 10% free).

-- Rex


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[Bug 1855334] New: perl-Sereal-Encoder-4.016 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1855334

Bug ID: 1855334
   Summary: perl-Sereal-Encoder-4.016 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Sereal-Encoder
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: de...@fateyev.com, jples...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 4.016
Current version/release in rawhide: 4.011-1.fc32
URL: http://search.cpan.org/dist/Sereal-Encoder/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/8065/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Igor Raits
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Thu, 2020-07-09 at 07:35 -0700, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 3:55:44 AM MST Igor Raits wrote:
> > I don't know where / which the fix should be: DNF, comps or both.
> > Simply putting the fedora-repos-modular in comps won't help since
> > DNF
> > is only using them when running `group install/update/remove`.
> 
> What's to fix? Sounds like a feature, not a bug. It's well reasoned
> above, 
> nothing depends on it.

While it is behaving as it technically should, this is unexpected for
the users. That's the only reason why I brought it here.

> -- 
> John M. Harris, Jr.
> 
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: 
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

- -- 
Igor Raits 
-BEGIN PGP SIGNATURE-
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=j6pN
-END PGP SIGNATURE-
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


[Bug 1855332] New: perl-Sereal-4.016 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1855332

Bug ID: 1855332
   Summary: perl-Sereal-4.016 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Sereal
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: de...@fateyev.com, perl-devel@lists.fedoraproject.org,
ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 4.016
Current version/release in rawhide: 4.011-1.fc32
URL: http://search.cpan.org/dist/Sereal/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/7605/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


[Bug 1855333] New: perl-Sereal-Decoder-4.016 is available

2020-07-09 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1855333

Bug ID: 1855333
   Summary: perl-Sereal-Decoder-4.016 is available
   Product: Fedora
   Version: rawhide
Status: NEW
 Component: perl-Sereal-Decoder
  Keywords: FutureFeature, Triaged
  Assignee: ppi...@redhat.com
  Reporter: upstream-release-monitor...@fedoraproject.org
QA Contact: extras...@fedoraproject.org
CC: de...@fateyev.com, jples...@redhat.com,
perl-devel@lists.fedoraproject.org, ppi...@redhat.com
  Target Milestone: ---
Classification: Fedora



Latest upstream release: 4.016
Current version/release in rawhide: 4.011-1.fc32
URL: http://search.cpan.org/dist/Sereal-Decoder/

Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.


Based on the information from anitya:
https://release-monitoring.org/project/8066/


-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 6:24:41 AM MST Sergio Belkin wrote:
> +1 This would be a genuine improvement for end users!

In what way do you believe this will be an improvement for end users? By 
killing their software, while it's legitimately using RAM, as expected? How 
exactly is that beneficial? If anything, this is actively working against the 
best interests of the end user.

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread nickysn
On Thu, 2020-07-09 at 07:38 -0700, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 12:26:27 AM MST Daniel P. Berrangé wrote:
> > On Wed, Jul 08, 2020 at 02:17:53PM -0700, John M. Harris Jr wrote:
> > 
> > > On Wednesday, July 8, 2020 10:04:01 AM MST Richard Hughes wrote:
> > > 
> > > > On Wed, 8 Jul 2020 at 16:48, John M. Harris Jr <
> > > > joh...@splentity.com>
> > > > wrote:
> > > > 
> > > > > needlessly disables a lot of kernel functionality
> > > > 
> > > > 
> > > > It disables functionality which can destroy platform security.
> > > 
> > > It disables functionality that users need, such as inserting
> > > their kernel
> > > 
> > > modules on their own system, or hibernating to disk. Let's be
> > > honest about
> > >  what this does. This is not something that's beneficial here,
> > > it's only
> > > harming our users.
> > 
> > Some users, not all users. Beware of making sweeping
> > generalizations.
> > 
> > I've used Fedora since Fedora Core 5 across countless machines and
> > never
> > cared about inserting custom kernel modules. Hibernating to disk is
> > not
> > something I've used on my laptops in probably 10 years either, as
> > suspend
> > to ram is generally sufficient. Again just my personal experiance.
> > 
> > There's always a tradeoff and it is likely to be different
> > depending on
> > each users needs. While SecureBoot will disable some functionality
> > it is
> > not unreasonable to think it is a net win out of the box for a
> > potentially
> > quite large portion of Fedora's userbase. 
> > 
> > Regards,
> > Daniel
> 
> Please keep in mind that it disables that functionality only because
> of 
> 'lockdown' patches applied to the Fedora kernel, it's not a normal
> part of the 
> Linux kernel when running under Secure Boot. I have no idea why the
> decision 
> to hurt users was explicitly made here, it doesn't make a lot of
> sense.

IIRC, if you sign a kernel that can load unsigned modules, you can boot
that kernel, then load a custom module, that boots a different kernel
or OS (such as Windows) and claim that secure boot was on, even though
you have modified and/or injected malicious code into the kernel. In
other words, you can circumvent the whole point of using secure boot.
If you want that, you might as well just disable secure boot. Otherwise
it is a bit like locking your front door, while leaving your back door
widely open.

You can argue all they long that secure boot doesn't bring you that
much security anyway (I'm in that camp, I don't think it's worth the
trouble for my home systems, so I disable them even on those that use
UEFI), but then, again, as long as it's not mandatory, so the user can
choose to turn it off, it should be ok. Some people might decide to
make an informed decision to enable it, and that's their decision to
make. It's a tradeoff - extra lockdown for some extra security. Maybe
only worth it for very important systems.

Nikolay
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 5:25:36 AM MST Rex Dieter wrote:
> John M. Harris Jr wrote:
> 
> 
> > That's not what this discussion results from. This discussion results
> > from
> > somebody outside the KDE SIG deciding the KDE Spin needs EarlyOOM killing
> > our applications at random, and ruining our desktop experience.
> 
> 
> This is full of inaccurate statements
> 
> 1.  The KDE SIG (at least some) was made aware of this feature and were ok 
> with it.  It wasn't someone outside deciding anything.

What's the KDE SIG's rationale behind supporting this? This actively limits 
the amount of RAM that end users are able to make use of. The more RAM the end 
user has, the more RAM is not available for use, because EarlyOOM will kill 
software long before it's able to be used. For example, on my system, with 6 
GiB of RAM, this will send SIGTERM while I still have over half of a gigabyte 
of RAM, and SIGKILL while I still have over a quarter of a gigabyte of RAM. 
There's absolutely no justification for this, as I see it.

> 2.  It's clear you don't like this feature, but characterizing it as random
>  and ruining things is going a bit far (to put it mildly).

Not at all, see the above example. Most users have more RAM than I do, not 
less, and even then, it's hurting the UX.

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 33 Self-Contained Change proposal: NSS dbm support removal

2020-07-09 Thread Daiki Ueno
Hello Igor,

Sorry for the delay.

Igor Raits  writes:

> On Mon, 2020-06-15 at 16:10 -0400, Ben Cotton wrote:
>> https://fedoraproject.org/wiki/Changes/NSSDBMRemoval
>>
>> == Summary ==
>> Network Security Services (NSS) historically supports 2 different
>> database backends, based on SQLite and dbm. Since Fedora 28, the
>> SQLite backend has been used by default and the dbm backend has been
>> deprecated ([[Changes/NSSDefaultFileFormatSql|NSS Default File Format
>> SQL]]). This Change is about removing the support for the dbm backend
>> entirely.
>>
>> == Owner ==
>> * Name: [[User:ueno| Daiki Ueno]]
>> * Email: du...@redhat.com
>>
>> == Detailed Description ==
>> Applications that use the NSS library often use a database for
>> storage
>> of keys, certificates and trust. NSS supports two different storage
>> formats, one is based on SQLite and another one is based on dbm
>> files.
>>
>> Today's default file format used by NSS, used when applications omit
>> the type parameter, is the SQLite file format, and the older dbm
>> format has been considered as deprecated since Fedora 28, because it
>> has several drawbacks such as lack of support for parallel access to
>> the storage.
>>
>> As the default change was made 2 years ago, and NSS provides a
>> transparent migration mechanism from the dbm format to the SQLite
>> format, the suggestion is to completely disable the dbm backend.
>>
>> == Benefit to Fedora ==
>> There are a few benefits:
>> * By disabling the dbm database, the size of the library binary will
>> be slightly smaller
>> * The NSS developers will be able to focus on the new file format
>>
>> == Scope ==
>> * Proposal owners:
>> A build time environment variable (NSS_DISABLE_DBM) needs to be set.
>>
>> * Other developers: N/A
>> * Policies and guidelines: N/A (not a System Wide Change)
>> * Trademark approval: N/A (not needed for this Change)
>>
>> == Upgrade/compatibility impact ==
>> The impact should be limited, as long as the users always update from
>> the previous version. That would ensure the existing databases on the
>> system are properly migrated. Therefore, we propose this as a Self
>> Contained Change, rather than a System Wide Change.
>
> Does it mean that people who upgrade from F31 to F33 will work just
> fine?

That should, as long as the NSS databases had been created or accessed
with the default method (that is SQLite) on F31.  On the other hand, if
a database is created explicitly as dbm, it needs to be converted before
upgrading to F33.

If it is too worrisome, I'm willing to provide a script that checks if
the databases on the known locations are already converted.

Regards,
-- 
Daiki Ueno
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Including local repos in a mock build

2020-07-09 Thread Pavel Raiskup
On Thursday, July 9, 2020 2:17:06 PM CEST Sam Varshavchik wrote:
> Is there a better way to include local repos in mock builds than doing  
> something like this in my /etc/mock/default.cfg:
> 
> include('fedora-32-x86_64.cfg')
> 
> config_opts['dnf.conf'] = config_opts['dnf.conf'] + """
> 
> [my]
> name=My repository
> baseurl=http://jack/repos/$releasever/$basearch
> enabled=1
> gpgcheck=0
> metadata_expire=60
> 
> """

The default.cfg is ought to be just a symlink to the config which represents
the system you are running mock on.  E.g. `fedora-32-x86_64` on Feodra 32 x86_64
host.

Otherwise I think your approach is fairly "optimal".  I'd though encourage
you to also change the `root` config option -- to not mix-up various kinds
of mock caches for the default f32 and customized f32 configs:

  $ cat my_enhanced_mock.cfg
  include('fedora-32-x86_64.cfg')

  config_opts['root'] = "my-fedora-32-x86_64"
  config_opts['dnf.conf'] = config_opts['dnf.conf'] + """
  [my]
  name=My repository
  baseurl=http://jack/repos/$releasever/$basearch
  enabled=1
  gpgcheck=0
  metadata_expire=60
  """

The default set of repositories should basically match the default
/etc/yum.repos.d content.

> I might be misremembering something, but I'm pretty sure that at some
> point in the past mock would read /etc/yum/repos.d, and grab stuff from
> my local repos without doing anything like that.

I don't think that was ever the case.  Mock tries to mimic the default
distro buildsystem behavior (the same minimal buildroot, set of packages
available in repos, etc.), and including custom repos from /etc/yum.repos.d
would certainly break the packager's assumptions.  Also, that repos would only
be useful for the `default.cfg`, nothing else.

Pavel


___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 3:38:54 AM MST Richard Hughes wrote:
> On Wed, 8 Jul 2020 at 22:19, John M. Harris Jr 
> wrote:
> > This is not something that's beneficial here, it's only
> > harming our users.
> 
> 
> That seems exceedingly myopic to me. I'm guessing you've not been
> following the last few years of security research, where attacking the
> firmware is now the best way to own a machine. And please don't
> lecture me on why BIOS is more secure than UEFI, "compatibility" mode
> is implemented *on top of* the UEFI bios these days, rather than as a
> completely different software stack.

"Attacking" the firmware has always been the best option, even with BIOS boot 
systems. For example, coreboot is technically a hostile payload, to the OEM. 
That doesn't mean that it makes any sense to prevent the end user from 
actually owning the hardware they've purchased, and doing with it what they 
please.

> > If you've got root, you can STILL do almost anything to the hardware,
> > including disabling various "firmware protection technologies".
> 
> 
> I don't think you understand what enabling SecureBoot actually does.

"Secure Boot" doesn't make root non-uid 0, and can't keep root from 
controlling system devices, even uploading unsigned firmware to peripherals. 
At the point that anything but the end user gets root on a Fedora install, all 
of these "security gains" provided by creating needless headache for those 
running under "Secure Boot" are null and void.

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Igor Raits
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Thu, 2020-07-09 at 07:36 -0700, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 5:24:59 AM MST Petr Pisar wrote:
> > DNF should perform "dnf mark install fedora-repos-rawhide-modular"
> > action on
> > a system upgrade, because we want that package to be prensented on
> > the
> > system. However I worry that DNF does not possess a capability for
> > doing
> > it. (Except of injecting that command into some externally executed
> > script.)
> 
> Unless I'm mistaken, it should only be present if the user manually
> installed 
> it, and opted into modularity, right?

No, it should be installed by default.

> -- 
> John M. Harris, Jr.
> 
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: 
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

- -- 
Igor Raits 
-BEGIN PGP SIGNATURE-
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=oXCM
-END PGP SIGNATURE-
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread James Cassell

On Thu, Jul 9, 2020, at 10:36 AM, John M. Harris Jr wrote:
> On Thursday, July 9, 2020 5:24:59 AM MST Petr Pisar wrote:
> > DNF should perform "dnf mark install fedora-repos-rawhide-modular" action on
> > a system upgrade, because we want that package to be prensented on the
> > system. However I worry that DNF does not possess a capability for doing
> > it. (Except of injecting that command into some externally executed
> > script.)
> 
> Unless I'm mistaken, it should only be present if the user manually installed 
> it, and opted into modularity, right?
> 

The agreement by FESCo was to have it as an optional component, but installed 
by default, IIUC.  It should be added to the relevant comps groups, but I think 
'yum upgrade' needs to also learn about upgrading groups.

(Side note, this is another example of where the 'yumdb' command would come in 
handy if there were a dnf equivalent; I wouldn't have been able to do those 
sqlite queries myself.)


V/r,
James Cassell
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: The future of legacy BIOS support in Fedora.

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 12:26:27 AM MST Daniel P. Berrangé wrote:
> On Wed, Jul 08, 2020 at 02:17:53PM -0700, John M. Harris Jr wrote:
> 
> > On Wednesday, July 8, 2020 10:04:01 AM MST Richard Hughes wrote:
> > 
> > > On Wed, 8 Jul 2020 at 16:48, John M. Harris Jr 
> > > wrote:
> > > 
> > > > needlessly disables a lot of kernel functionality
> > > 
> > > 
> > > 
> > > It disables functionality which can destroy platform security.
> > 
> > 
> > It disables functionality that users need, such as inserting their kernel
> > 
> > modules on their own system, or hibernating to disk. Let's be honest about
> >  what this does. This is not something that's beneficial here, it's only
> > harming our users.
> 
> 
> Some users, not all users. Beware of making sweeping generalizations.
> 
> I've used Fedora since Fedora Core 5 across countless machines and never
> cared about inserting custom kernel modules. Hibernating to disk is not
> something I've used on my laptops in probably 10 years either, as suspend
> to ram is generally sufficient. Again just my personal experiance.
> 
> There's always a tradeoff and it is likely to be different depending on
> each users needs. While SecureBoot will disable some functionality it is
> not unreasonable to think it is a net win out of the box for a potentially
> quite large portion of Fedora's userbase. 
> 
> Regards,
> Daniel

Please keep in mind that it disables that functionality only because of 
'lockdown' patches applied to the Fedora kernel, it's not a normal part of the 
Linux kernel when running under Secure Boot. I have no idea why the decision 
to hurt users was explicitly made here, it doesn't make a lot of sense.


-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 5:24:59 AM MST Petr Pisar wrote:
> DNF should perform "dnf mark install fedora-repos-rawhide-modular" action on
> a system upgrade, because we want that package to be prensented on the
> system. However I worry that DNF does not possess a capability for doing
> it. (Except of injecting that command into some externally executed
> script.)

Unless I'm mistaken, it should only be present if the user manually installed 
it, and opted into modularity, right?

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread John M. Harris Jr
On Thursday, July 9, 2020 3:55:44 AM MST Igor Raits wrote:
> I don't know where / which the fix should be: DNF, comps or both.
> Simply putting the fedora-repos-modular in comps won't help since DNF
> is only using them when running `group install/update/remove`.

What's to fix? Sounds like a feature, not a bug. It's well reasoned above, 
nothing depends on it.

-- 
John M. Harris, Jr.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Sergio Belkin
El mar., 30 jun. 2020 a las 10:26, Ben Cotton ()
escribió:

> https://fedoraproject.org/wiki/Changes/KDEEarlyOOM
>
> == Summary ==
> As [[Changes/EnableEarlyoom|Fedora Workstation did in F32]], install
> earlyoom package, and enable it by default. If both RAM and swap go below
> 10% free, earlyoom issues SIGTERM to the process with the largest
> oom_score. If both RAM and swap go below 5% free, earlyoom issues SIGKILL
> to the process with the largest oom_score. The idea is to recover from out
> of memory situations sooner, rather than the typical complete system hang
> in which the user has no other choice but to force power off.
>
> == Owner ==
> * Name: [[User:bcotton|Ben Cotton]]
> * Email: bcot...@redhat.com
>
> == Detailed Description ==
> Shamelessly copied from Workstation, which did it in the last release:
>
> Certain workloads have heavy memory demands, quickly consume all of RAM,
> and start to heavily page out to swap. (Heavy paging, is often called "swap
> thrashing" for added descriptive effect, probably because it's noticeable
> and annoying). Incidental swap usage is a good thing, it frees up memory
> for active pages used by a process. Heavy swap usage quickly leads to a
> very negative UX, because it's slow, even on modern SSDs. Due to installer
> defaults, the swap partition is made the same size as available memory (at
> install time), which can be huge. This just extends swap thrashing time.
>
> On the one hand, we want this resource hungry job to complete. On the
> other hand, we want our system to be responsive while that other work is
> going on. But once the GUI stutters or even comes to an apparent stand
> still (hang), we're really wishing the kernel oom-killer would kick in and
> free up memory, so we can start over (maybe using memory or thread limiting
> options - which arguably should be more intelligently figured out, and that
> too is a work in progress but beyond the scope of this feature).
>
> However, once in a heavy swap scenario, it's relatively common the system
> gets stuck in it, where GUI interactivity is terrible to non-existent, and
> also the kernel oom-killer doesn't trigger. From a certain point of view,
> this is working as intended. The kernel oom-killer is concerned about
> keeping the kernel running. It's not at all concerned about user space
> responsiveness.
>
> Instead of the system becoming completely unresponsive for tens of
> minutes, hours or days, this feature expects that an offending process
> (determined by oom_score, same as the kernel oom-killer) will be killed off
> within seconds or a few minutes.
>
> == Benefit to Fedora ==
>
> KDE users will be able to take advantage of the benefits Workstation users
> got from enabling earlyOOM in Fedora 32:
>
> * improved user experience by more quickly regaining control over one's
> system, rather than having to force power off in low-memory situations
> where there's aggressive swapping. Once a system becomes unresponsive, it's
> completely reasonable for the user to assume the system is lost, but that
> includes high potential for data loss.
> * reducing forced poweroff as the main work around will increase data
> collection, improving understanding of low memory situations and how to
> handle them better
> * earlyoom first sends SIGTERM to the chosen process, so it has a chance
> of a proper shutdown, unlike the kernel's oom-killer
>
> == Scope ==
> * Proposal owners:
> ** Modify {{code|
> https://pagure.io/fedora-comps/blob/master/f/comps-f33.xml.in}} to
> include earlyoom package for in {{code|kde-desktop}} section.
> ** Add {{code|
> https://src.fedoraproject.org/rpms/fedora-release/blob/master/f/80-kde.preset}}
> to include:
> 
> # enable earlyoom by default on KDE
> enable earlyoom.service
> 
>
> * Other developers: None, unless KDE-based Spins/Labs want to opt out
>
> * Release engineering: N/A
> * Policies and guidelines: N/A
> * Trademark approval: N/A
>
> == Upgrade/compatibility impact ==
> earlyoom.service will be enabled on upgrade. An upgraded system should
> exhibit the same behaviors as a newly-installed system.
>
> == How To Test ==
> * Fedora 31/32 KDE users can test today:
> ** {{code|sudo dnf install earlyoom}}
> ** {{code|sudo systemctl enable --now earlyoom}}
>
> And then attempt to cause an out of memory situation. Examples:
> ** {{code|tail /dev/zero}}
> ** https://lkml.org/lkml/2019/8/4/15
>
> == User Experience ==
> earlyoom sends SIGTERM to processes based on oom_score when both memory
> and swap have less than 10% free and SIGKILL when below 5%.
>
> == Dependencies ==
> None
>
> == Contingency Plan ==
>
> * Contingency mechanism: (What to do?  Who will do it?) Owner reverts
> changes
> * Contingency deadline: Final freeze
> * Blocks release? No
>
> == Documentation ==
> * {{code|man earlyoom}}
> * https://github.com/rfjakob/earlyoom
> * https://www.kernel.org/doc/gorman/html/understand/understand016.html
>
> == Release Notes ==
> The earlyoom service is now enabled by 

Re: Bodhi 5.4.0 in production

2020-07-09 Thread Miro Hrončok

On 22. 06. 20 9:53, Clement Verna wrote:


One high level feature worth noting :

* you can now associate BZ tickets to the automatically created rawhide updates. 
The bugs mentioned with the format "fix(es)|close(s) 
(fedora|epel|rh|rhbz)#BUG_ID"  in the changelog will be associated to the update 
and automatically closed.
More info 
https://github.com/fedora-infra/bodhi/blob/develop/docs/user/automatic_updates.rst#associate-bugs-to-automatic-updates


Finally I got to testing this.

The bugzilla was added to the update:

https://bodhi.fedoraproject.org/updates/FEDORA-2020-c1be13ded8

But it was not closed:

https://bugzilla.redhat.com/show_bug.cgi?id=1851519

Should I report this as a bug or am i doing something wrong? The commit is:

https://src.fedoraproject.org/rpms/python-tox/c/d154cf5aabe445914123b41239243811eeac93b7?branch=master

But the build was done from one clenaup commit above this. Is that relevant?

--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Kevin Kofler
Przemek Klosowski via devel wrote:
>   * disk access is literally O(1) slower than RAM access

This notation is meaningless. By the definition of the O notation, 
O(1)=O(1)=O(k) for any constant k.

Kevin Kofler
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: mingw GCC help needed: -fstack-protector and -lssp, undefined reference to `__strcpy_chk'

2020-07-09 Thread Yaakov Selkowitz
On Thu, 2020-07-09 at 00:07 +0200, Sandro Mani wrote:
> I'm working on updating the mingw toolchain [1], and am hitting the 
> situation [2] where I build with -fstack-protector in the ldflags, can 
> confirm that -lssp and -lssp_nonshared are automatically added to the 
> ldflags (seen via gcc -v [3] and strace), but I still get i.e. with this 
> minimal testcase:
> 
> #include 
> int main () {
>  return closedir (NULL);
> }
> 
> $ i686-w64-mingw32-gcc -o test.exe test.c -fstack-protector
> /usr/lib/gcc/i686-w64-mingw32/10.1.1/../../../../i686-w64-mingw32/bin/ld: 
> /usr/i686-w64-mingw32/sys-root/mingw/lib/../lib/libmingwex.a(lib32_libmingwex_a-dirent.o):(.text+0x22f):
>  
> undefined reference to `__strcpy_chk'
> collect2: error: ld returned 1 exit status

Perhaps mingw-crt should be built with -fno-stack-protector?

> OTOH, if I write
> 
> $ i686-w64-mingw32-gcc -o test.exe test.c -fstack-protector 
> /usr/i686-w64-mingw32/sys-root/mingw/bin/libssp-0.dll
> 
> it links correctly.
> 
> The only other thing which came to mind to verify is that the import 
> library references the correct dll, and this appears to be the case:
> 
> $ i686-w64-mingw32-dlltool -I 
> /usr/i686-w64-mingw32/sys-root/mingw/lib/libssp.dll.a
> libssp-0.dll
> 
> I'd appreciate any pointers as I'm pretty much in the dark here.
> 
> [1] https://copr.fedorainfracloud.org/coprs/smani/mingw-7.0.0/builds/
> 
> [2] Specifically when building mingw-gdb, which adds 
> -D_FORTIFY_SOURCES=2 internally, hence adding -fstack-protector to the 
> ldflags
> 
> [3] I.e. I gtt COLLECT_GCC_OPTIONS='-v' '-o' 'test.exe' 
> '-fstack-protector' '-mtune=generic' '-march=pentiumpro'
>   /usr/libexec/gcc/i686-w64-mingw32/10.1.1/collect2 -plugin 
> /usr/libexec/gcc/i686-w64-mingw32/10.1.1/liblto_plugin.so 
> -plugin-opt=/usr/libexec/gcc/i686-w64-mingw32/10.1.1/lto-wrapper 
> -plugin-opt=-fresolution=/tmp/cckKHr8u.res 
> -plugin-opt=-pass-through=-lmingw32 -plugin-opt=-pass-through=-lgcc 
> -plugin-opt=-pass-through=-lgcc_eh -plugin-opt=-pass-through=-lmoldname 
> -plugin-opt=-pass-through=-lmingwex -plugin-opt=-pass-through=-lmsvcrt 
> -plugin-opt=-pass-through=-lpthread -plugin-opt=-pass-through=-ladvapi32 
> -plugin-opt=-pass-through=-lshell32 -plugin-opt=-pass-through=-luser32 
> -plugin-opt=-pass-through=-lkernel32 -plugin-opt=-pass-through=-lmingw32 
> -plugin-opt=-pass-through=-lgcc -plugin-opt=-pass-through=-lgcc_eh 
> -plugin-opt=-pass-through=-lmoldname -plugin-opt=-pass-through=-lmingwex 
> -plugin-opt=-pass-through=-lmsvcrt 
> --sysroot=/usr/i686-w64-mingw32/sys-root -m i386pe -Bdynamic -o test.exe 
> /usr/i686-w64-mingw32/sys-root/mingw/lib/../lib/crt2.o 
> /usr/lib/gcc/i686-w64-mingw32/10.1.1/crtbegin.o 
> -L/usr/lib/gcc/i686-w64-mingw32/10.1.1 
> -L/usr/lib/gcc/i686-w64-mingw32/10.1.1/../../../../i686-w64-mingw32/lib/../lib
>  
> -L/usr/i686-w64-mingw32/sys-root/mingw/lib/../lib 
> -L/usr/lib/gcc/i686-w64-mingw32/10.1.1/../../../../i686-w64-mingw32/lib 
> -L/usr/i686-w64-mingw32/sys-root/mingw/lib /tmp/ccpeowDx.o 
> /usr/i686-w64-mingw32/sys-root/mingw/bin/libssp-0.dll -lssp_nonshared 
> -lssp -lmingw32 -lgcc -lgcc_eh -lmoldname -lmingwex -lmsvcrt -lpthread 
> -ladvapi32 -lshell32 -luser32 -lkernel32 -lmingw32 -lgcc -lgcc_eh 
> -lmoldname -lmingwex -lmsvcrt /usr/lib/gcc/i686-w64-mingw32/10.1.1/crtend.o

-- 
Yaakov Selkowitz
Senior Software Engineer - Platform Enablement
Red Hat, Inc.

___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Using "rawhide" for the dist-git branch for Fedora Rawhide

2020-07-09 Thread Zbigniew Jędrzejewski-Szmek
On Tue, Jul 07, 2020 at 09:44:47PM +0200, Markus Larsson wrote:
> 
> 
> On 7 July 2020 21:20:22 CEST, Matthew Miller  wrote:
> >On Tue, Jul 07, 2020 at 09:03:19PM +0200, Till Maas wrote:
> >> in https://pagure.io/fesco/issue/2410 I proposed to name the dist-git
> >> branch for Fedora Rawhide "rawhide" to clarify the purpose of that
> >> branch. There was also some feedback that Rawhide might not be the best
> >> name and it could be renamed. In that case, the branch could be named as
> >> this. This is just the first step to check if there is enough support
> >> for this to move forward. The next step would be to start a change
> >> process.
> >
> >I'm in favor of this. "Master" is not a good, functional description of the
> >Rawhide branch. It was just taking the default. Plus, as we're investigating
> >a new git system _and_ looking at packaging workflow improvements all around
> >anyway, that seems like the time.

+1

> >I don't have any strong opinion on the "Rawhide" name, although it has
> >always seemed strange to me, because of course fedoras are made of felt, not
> >rawhide. And I guess the same "hey, while we're changing things" sentiment
> >applies here.
> >
> 
> I thought Rawhide was a reference to the wild west via the tv-show by that 
> name, isn't that the case?
> As for naming, I have no emotional connection to the name rawhide and doesn't 
> see any problems with changing it. I would suggest that if it changes maybe 
> not Felt or Wool but something more descriptive like Edge, Next or Volatile.

Yeah, that's how I understood the reference. Right now I don't see a
particularly strong reason to change the name, so I'm mildly negative.
But if enough people find the name offensive, I'll reconsider.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Enable EarlyOOM on Fedora KDE - Fedora 33 Self-Contained Change proposal

2020-07-09 Thread Rex Dieter
John M. Harris Jr wrote:

> That's not what this discussion results from. This discussion results from
> somebody outside the KDE SIG deciding the KDE Spin needs EarlyOOM killing
> our applications at random, and ruining our desktop experience.

This is full of inaccurate statements

1.  The KDE SIG (at least some) was made aware of this feature and were ok 
with it.  It wasn't someone outside deciding anything.

2.  It's clear you don't like this feature, but characterizing it as random 
and ruining things is going a bit far (to put it mildly).

-- Rex
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Using "rawhide" for the dist-git branch for Fedora Rawhide

2020-07-09 Thread Zbigniew Jędrzejewski-Szmek
On Wed, Jul 08, 2020 at 11:31:20AM -0400, Matthew Miller wrote:
> On Wed, Jul 08, 2020 at 03:48:23PM +0200, Till Maas wrote:
> > Just had another idea, how about instead of branch down from the rawhide
> > branch to new branched to make Rawhide always use the fxy version that
> > it develops. So instead of creating branched f33 later we would rename
> > master to f33 now and then once we need to branch we branch of Rawhide
> > as f34? There could still be a symbolic ref called rawhide for the
> > latest rawhide for convenience. What do you think?
> 
> I do like this, because it reflects the actual process. However, it does ask
> something of our git forge web front end: what would it show by default?

I don't see much benefit from this. First, I disagree that it reflects
the process better. In almost all cases I know development is done in
the master branch, and changes from there are often either
fast-forwarded or cherry-picked into the other branches. Second, I
don't see what improvement this would bring. If we were to change the
branching pattern, that we have been successfully using for years and
that people are accustomed to, there should be some clear reason.

A change of the branching pattern is not helpful to this change,
because we would still need *some* constant name for the
master/rawhide/latest branch, so the new renamed name will still be
visible to users and used for various purposes.

And mixing the two makes the (already complicated) process of renaming more
likely to fail.

Zbyszek
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Petr Pisar
On Thu, Jul 09, 2020 at 12:55:44PM +0200, Igor Raits wrote:
> One just noticed that `dnf autoremove` is trying to remove `fedora-
> repos-modular` and `fedora-repos-rawhide-modular`.
>
[...]
> I don't know where / which the fix should be: DNF, comps or both.
> Simply putting the fedora-repos-modular in comps won't help since DNF
> is only using them when running `group install/update/remove`.
>
DNF should perform "dnf mark install fedora-repos-rawhide-modular" action on
a system upgrade, because we want that package to be prensented on the system.
However I worry that DNF does not possess a capability for doing it. (Except
of injecting that command into some externally executed script.)

-- Petr


signature.asc
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Including local repos in a mock build

2020-07-09 Thread Sam Varshavchik
Is there a better way to include local repos in mock builds than doing  
something like this in my /etc/mock/default.cfg:


include('fedora-32-x86_64.cfg')

config_opts['dnf.conf'] = config_opts['dnf.conf'] + """

[my]
name=My repository
baseurl=http://jack/repos/$releasever/$basearch
enabled=1
gpgcheck=0
metadata_expire=60

"""


I might be misremembering something, but I'm pretty sure that at some point  
in the past mock would read /etc/yum/repos.d, and grab stuff from my local  
repos without doing anything like that.




pgpINhtBkRQAI.pgp
Description: PGP signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Suppress "running pip install with root privileges" warning in RPM macros?

2020-07-09 Thread Petr Viktorin

On 2020-07-07 19:54, Miro Hrončok wrote:

1) Add a custom --no-warn-root-privileges option
2) Hide the warning when $RPM_BUILD_ROOT is set.
3) Introduce an environment variable (e.g. PIP_NOWARN_ROOT)
4) Introduce our warning upstream, but make it opt-in only.
5) Hide the warning when --root is set.

What do you think?


I like option 5 as well.
It's just a warning, not an error, because there are cases where you 
"know what you're doing", such as containers/VMs, where "sudo pip" may 
be appropriate. All uses of --root that come to my mind are such cases.


Users who follow tutorials without "knowing what they're doing" are very 
unlikely to use --root.

___
python-devel mailing list -- python-devel@lists.fedoraproject.org
To unsubscribe send an email to python-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/python-devel@lists.fedoraproject.org


PSA: dnf autoremove cleans fedora-repos-modular

2020-07-09 Thread Igor Raits
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hello,

One just noticed that `dnf autoremove` is trying to remove `fedora-
repos-modular` and `fedora-repos-rawhide-modular`.

tl;dr. fedora-repos-modular inherit installation reason from fedora-
repos (DEPENDENCY) and nothing depends on fedora-repos-modular so it is
not needed anymore (from the solver POV).

The fedora-repos is being pulled in by fedora-release-common (that is
brought by fedora-release-workstation or others). fedora-repos is not
part of the @core group in comps so its reason recorded in DNF DB is 1.

enum class TransactionItemReason : int {
UNKNOWN = 0,
DEPENDENCY = 1,
USER = 2,
CLEAN = 3, // hawkey compatibility
WEAK_DEPENDENCY = 4,
GROUP = 5
};

On my laptop:

❯ sqlite3 /var/lib/dnf/history.sqlite
sqlite> select trans_id,name,epoch,version,release,reason from
trans_item join rpm on rpm.item_id=trans_item.item_id where name like
'fedora-release%' or name like 'fedora-repos%';
1|fedora-release-common|0|33|0.8|1
1|fedora-release-identity-workstation|0|33|0.8|1
1|fedora-release-workstation|0|33|0.8|5
1|fedora-repos|0|33|0.6|1
1|fedora-repos-rawhide|0|33|0.6|1
21|fedora-release-common|0|33|0.9|1
21|fedora-release-common|0|33|0.8|1
21|fedora-release-identity-workstation|0|33|0.9|1
21|fedora-release-identity-workstation|0|33|0.8|1
21|fedora-release-workstation|0|33|0.9|5
21|fedora-release-workstation|0|33|0.8|5
143|fedora-repos-modular|0|33|0.8|1
143|fedora-repos-rawhide-modular|0|33|0.8|1
143|fedora-repos|0|33|0.8|1
143|fedora-repos|0|33|0.6|1
143|fedora-repos-rawhide|0|33|0.8|1
143|fedora-repos-rawhide|0|33|0.6|1

The packages that have been brought by the obsoletes inherit reason
(DEPENDENCY in this case) and since nothing depends on those they are
automatically cleaned up on the autoremove.

I don't know where / which the fix should be: DNF, comps or both.
Simply putting the fedora-repos-modular in comps won't help since DNF
is only using them when running `group install/update/remove`.


So sending this email just in case somebody will see this interesting
behavior.
- -- 
Igor Raits 
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEcwgJ58gsbV5f5dMcEV1auJxcHh4FAl8G97AACgkQEV1auJxc
Hh6SkBAAo4iTvTmSImNbSRAZe6VzKfUJ1gBPjgMITEueM7pxa8zlZ7g2bOpl1UiI
TD+DKI953Qk2gZcN+WBvkQO13Cef/FD/lp6nGXvyo87mOs2ThSc+a6UgufEBceVY
Z5kGCoCQnfA6JkBtRtFdMbsCvVKtSRSOFJXlW7DCybLGKizUlFPqHdug0qxGpoO2
XWldoX0Bw0F11Pr2FqujZXlcfXe5G51lkfPFnChc0a4O0+d0/AsWZJ0dM0l1ff6l
GT43t+boiw9Dwp8KEBZTh7uTWQAeLAo9UxGIs2T2oZikHNwSSo13N6nwcS6x2XYd
AaHVET5dn4tITH9WjiknS9IHy06D5MZ8pWBRs46aav52Ro6GxNYeALYdhjaM2heG
mMGkjAWkXJ0qtaRR9qi68CfQiDfQjzYe0JXEHJTrLV+Pv42OrJJJoq7NWGOJbqV0
T9DYJoO63W74q/rttMNVMIBG8GtzbTBqoxuP9ooykpAzRv2LPn1Jc1L3eEBXSO0w
QW0SH5i6v6OgajCrc813TytboOua9zDZ55ENP0dJNXjqAiznZJjqrYG3RWUJH4cA
qx6xygK3OvZHm9vuL4VnXCp4wW/TDGf8MNGF0hoF75IbRN1+nrAAtGorx9BdV2g+
SvTV1Cs9CPyOKy0Q2brILtBZq6em6JNzkFAMg5h9xoce4brbyA8=
=UXSc
-END PGP SIGNATURE-
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


  1   2   >