Re: Potential (security) issue for beginners/non-experts when release is End Of Life: Fedora doesn’t consider the behavior of beginners/non-experts sufficiently

2023-08-13 Thread Matthew Garrett
On Sat, Aug 12, 2023 at 12:07:05PM +0200, Leon Fauster via devel wrote:

> Please do not clutter the user experience with such _additional_
> informations. The user on such workstations are not always the
> administrator and such informations would not help/change the
> situation either. I actually do a lot of config work to disable
> such UI "features". For my case the user does not even understands
> or notice it when a major upgrade was done (albeit some UI improvments).
> Of course the active usage of Gnome software or dnf could and should
> provide such information in a prominent way ...

I think it's reasonable that this should be something under admin 
control, but for the common default scenario where the single uesr is 
also the admin it seems reasonable to let the user know that they'll no 
longer receive security updates?
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Restricting automounting of uncommon filesystems?

2023-07-22 Thread Matthew Garrett
On Sat, Jul 22, 2023 at 10:32:01AM +0200, drago01 wrote:

> Which file systems are considered uncommon in that context? And aren't most
> attacks based on file systems used by windows, which makes them "common" ?
> (Extfat, NTFS, VFAT)

Any attack here is going to be OS-specific - a vulnerability in a 
filesystem used by Windows is massively unlikely to be present in Linux. 
If your goal is to compromise a Linux device then the attack surface 
available to you (right now) is everything that's present in Linux. For 
removable devices I'd argue that anything other than exfat and vfat are 
probably uncommon, but could be convinced that ext4 and xfs made sense 
as well (and maybe ntfs since I assume some people do want to transfer 
data on USB hard drives)
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Restricting automounting of uncommon filesystems?

2023-07-22 Thread Matthew Garrett
On Sat, Jul 22, 2023 at 10:12:33AM -0400, Neal Gompa wrote:

> Several years ago, SUSE distributions moved to disabling the modules
> by default for a number of filesystems, but making it pretty easy to
> turn them back on:
> https://github.com/openSUSE/suse-module-tools/pull/5

The problem there is that if you install a module you need for a static 
mount, you open yourself up to attack via automounts.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Restricting automounting of uncommon filesystems?

2023-07-22 Thread Matthew Garrett
A discussion within Debian again brought up the problem that:

1) Automounting of removable media exposes the kernel to a lot of 
untrusted input 
2) Kernel upstream are not terribly concerned with ensuring that kernel 
filesystems are resilient against deliberately malformed filesystems so 
are mostly not proactively looking for bugs there
3) Uncommonly used filesystems are less likely to be tested against 
adverse input in the real world and so are more likely to contain 
exploitable bugs

There are various cases where people do need to make use of uncommon 
filesystems, but the majority of them aren't related to removable media. 
udisks2 supports setting the UDISKS_AUTO variable to 0 on devices that
shouldn't be automounted, which means something like:

SUBSYSTEM!="block", GOTO="udisks_insecure_fs_end"
ENV{ID_FS_TYPE}=="hfs", ENV{UDISKS_AUTO}="0"
# repeat as necessary for anything else that shouldn't be automounted
LABEL="udisks_insecure_fs_end"

ought to be enough. So:

a) Does this seem like a good idea?
b) If so, is dealing with it via udev rules the right approach? This way 
seems desktop-agnostic
c) Where should it ship, and what should the process be for disabling it 
for people who need this functionality?

Long-term I'd love to see more work put into having FUSE support for 
these and leaving the in-kernel fs to stuff we know is trustworthy, but 
that's rather more work.
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue


Re: Vague proposal: ship prebuilt initramfs images

2020-01-21 Thread Matthew Garrett
On Tue, Jan 21, 2020 at 12:43:47PM +, Matthew Garrett wrote:

> configinitrd file1 file2 file3
> initrd initramfs1.img initramfs2.img CONFIG

Huh - it seems like grub may already support this? It looks like:

initrd initramfs.img newc:/etc/crypttab:/boot/crypttab

will add /boot/crypttab to the initramfs as /etc/crypttab. Haven't 
tested this yet, though, and it's entirely undocumented.

-- 
Matthew Garrett | mj...@srcf.ucam.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Vague proposal: ship prebuilt initramfs images

2020-01-21 Thread Matthew Garrett
On Tue, Jan 21, 2020 at 11:25:29AM +0100, Hans de Goede wrote:

> For the size problem one approach which I think is worthwhile at least
> for the x86/workstation case is making one initrd with the most common
> stuff in there (say i915,nouveau and amd GPU drivers + NVME and AHCI
> disk support, maybe some eMMC support) and another which contains
> "everything" and then rework the dracut host-only code so that we can
> leverage it to figure out which variant we want.

Yeah, the important thing is that we have known values - there's no real 
problem with there being a large number of known values, so shipping 
multiple images (potentially to be combined if necessary) is entirely 
reasonable from that perspective.

> So b it is, I actually suggested b. on a discussion about how to set
> the keyboard map for the initrd (for full disk encryption) which currently
> is a problem for rpm-ostree / SilverBlue which uses pre-generated
> initrds with no custom config in there.

Ok. I'll look into adding support to grub for reading some files and 
assembling them into an image. My rough idea here would be something 
like:

configinitrd file1 file2 file3
initrd initramfs1.img initramfs2.img CONFIG

where the first command generates the image and the second command 
causes it to be placed at the end of the final cpio blob?

-- 
Matthew Garrett | mj...@srcf.ucam.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Vague proposal: ship prebuilt initramfs images

2020-01-21 Thread Matthew Garrett
On Tue, Jan 21, 2020 at 09:09:16AM +0100, Petr Pisar wrote:
> On Tue, Jan 21, 2020 at 12:57:50AM +0000, Matthew Garrett wrote:
> > Any thoughts on this?
> > 
> Properly measured system must measure all inputs. If you move the varying
> bits from initramfs to another file, a boot loader will have to measure that
> another file. At the end that's exactly what GRUB2 does. It measures any
> loaded file.

Yes, I wrote that code. The point of measurements is to be able to make 
a policy determination. If the contents of a file aren't security 
relevant then you don't care about its contents, but you do want to 
ensure that it ends up in a position where it can't interfere with any 
other security relevant codepath. In that scenario you want to measure 
the path, not the contents (or, rather, you can measure both and the 
policy agent can ignore the contents)

> In my opinon, your proposal does not solve the problem. It actually makes
> things worse because the booted code would become bigger and probably slower.

I'm not clear how that follows.

-- 
Matthew Garrett | mj...@srcf.ucam.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Vague proposal: ship prebuilt initramfs images

2020-01-21 Thread Matthew Garrett
On Tue, Jan 21, 2020 at 12:29:13AM -0700, Chris Murphy wrote:

> What about the on-going cost: downloading ~80M initramfs for each kernel
> update; systemd-analyze on NVMe says initrd time is  2.5s for a host-only
> ~25M initramfs. No-host-only initramfs is about 3x bigger. If the size to
> time relationship is linear, that's a chunk of extra time. Maybe there's a
> way to improve the read performance in the bootloader to compensate?

I don't see this as an obligatory choice - users should still be free to 
generate images locally instead. I'm certainly willing to do the work on 
performance calculations if there's no absolute objection to the idea.

> Any expected hardware with TPM2 but without UEFI?

Not on x86 - the PC client spec for TPM2 only covers UEFI.

> If the first initramfs contains systemd, could systemd start things in
> parallel while unpacking a second initramfs?

The straightforward implementation involves the kernel unpacking all the 
initramfs archives before it starts init. In theory we could add 
functionality to the kernel to expose additional archives to userland 
rather than have the kernel unpack them, but that's not currently 
achievable - and it's one of those situations where we'd need to be very 
careful about ensuring there's no potential for races.

> I take it you've found some liability with measuring a locally produced
> initramfs?

You'd need a trusted mechanism for passing the new initramfs 
measurements to whatever's verifying the measurements. That's not easy.

-- 
Matthew Garrett | mj...@srcf.ucam.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Vague proposal: ship prebuilt initramfs images

2020-01-20 Thread Matthew Garrett
Measured boot involves generating cryptographic measurements of boot 
components and configuration and using that to either control access to 
a local secret (in the case of sealing secrets to a TPM) or proving to 
another device (eg, a remote server or a local phone) what was booted. 
We're shipping most of the infrastructure to do this, but we're still 
left with a pretty fundamental problem - we need to know what the 
expected values are in order to know whether something's been tampered 
with or not.

For many components this isn't a huge problem (we build and distribute 
the files - users can extract them and calculate the appropriate 
measurements, and maybe long term we'll be able to ship the measurements 
in a digestable way), but our initramfs images are generated on the user 
system and include system-specific data. This makes it impractical to 
know the expected measurements in advance.

I've been thinking about ways to solve this for a while, and I'm coming 
to the conclusion that the best plan is probably to just ship pre-built 
initramfs images. I can think of three main reasons to want to use 
system-specific images:

1) They're smaller. By default we're already generating a generic image 
for rescue purposes, so disk space isn't the concern here - we're 
largely looking at losing boot speed. As machines have got faster this 
is probably not a huge deal.

2) They contain machine-specific configuration. Some of this can be 
passed on the kernel command line instead (eg, the machine ID), but we'd 
need answers for the rest. I can think of a couple of solutions:

 a) Stick the config in UEFI variables. It's small enough that we 
wouldn't run out.
 b) Extend grub to read some config files and synthesise an initramfs 
image for them. If we measure the paths that those images use then 
we don't need to worry about the contents as long as the tools that 
read the config can't be subverted via that configuration.

3) User customisation, such as including extra tooling. grub supports 
loading multiple initramfs images. Packages that right now install stuff 
in the initramfs could instead ship a prebuilt image that grub could 
append to the main initramfs. This would allow for things like 
overriding Plymouth themes, and we could ship the measurements for these 
pre-built images in order to allow them to be validated.

Any thoughts on this?

-- 
Matthew Garrett | mj...@srcf.ucam.org
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: TPMs, measured boot and remote attestation in Fedora

2016-04-25 Thread Matthew Garrett
On Sat, Apr 23, 2016 at 02:57:55PM +0200, Kevin Kofler wrote:
> Matthew Garrett wrote:
> > Measured boot is a process whereby each component in the boot chain
> > "measures" the next component. In the TPM 1.x world (which is where most
> > of us still are), that measurement is in the form of a SHA1 hash of the
> > next component. So, on a BIOS system, the firmware measures itself, the
> > firmware measures its configuration, the firmware measures any option
> > ROMs on plugin cards, the firmware measures the MBR of the disk, the MBR
> > measures the grub stage 1, the grub stage 1 measures the grub stage 2,
> > the grub stage 2 measures the kernel and so on.
> 
> Yet another Treacherous Computing "feature" that nobody needs!

I need to know if somebody has modified my firmware.

> > Remote attestation is a mechanism by which a remote machine can request
> > (but not compel) another machine to provide evidence of the PCR state.
> > The TPM provides a signed bundle of information including the PCR values
> > and the event log, and the remote machine verifies that the signature
> > corresponds to the key it expected to see.
> 
> How does the remote machine know that what is answering is a physical TPM 
> and not a software emulation? Does it need to have the individual TPM's 
> public key in advance?

Three ways:

1) If you only care that it's *a* TPM, you validate the certificate 
chain from the endorsement key and ensure that it chains back to an 
intermediate certificate corresponding to a TPM vendor

2) If you care that it's a specific TPM, yes, you need to know the 
public key in advance

3) If you fall into (1) but it's socially unacceptable for you to demand 
a specific TPM key because that's a uniquely identifiable piece of data 
about the machine, you use a trusted privacy CA that validates (1) and 
then issues a new certificate

In the general case, (1) is unacceptable for privacy reasons. (3) is 
impractical because nobody has actually built the privacy CA 
infrastructure. As a result, remote attestation is only practical in 
constrained corporate environments, not those where there's a risk to 
individual freedom.

-- 
Matthew Garrett | mj...@srcf.ucam.org
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: TPMs, measured boot and remote attestation in Fedora

2016-04-22 Thread Matthew Garrett
On Thu, Apr 21, 2016 at 02:35:21PM +0200, Harald Hoyer wrote:
> On 08.04.2016 18:56, Matthew Garrett wrote:
> > initrd is certainly a more difficult one. One thing we can do is work on 
> > making dracut builds reproducible - that way they should be consistent 
> > across identical machines in a cluster.
> > 
> 
> dracut already supports reproducible builds:
> $ man dracut
> […]
>--reproducible
>Create reproducible images.
> 
> needs cpio with "--reproducible" support though

Oh, wonderful! Is there a reason that isn't default in Fedora?

-- 
Matthew Garrett | mj...@srcf.ucam.org
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: TPMs, measured boot and remote attestation in Fedora

2016-04-08 Thread Matthew Garrett
On Fri, Apr 08, 2016 at 11:36:33AM +0200, Florian Weimer wrote:
> On 04/08/2016 10:28 AM, Matthew Garrett wrote:
> > With what we now know about malicious actors targeting the system boot 
> > chain (even down to the firmware), this kind of TPM-based work is a 
> > vital part of helping keep our users secure.
> 
> On the other hand, it can easily be abused to restrict user freedom.
> For example, video streaming sites might not be willing to serve content
> to users who cannot cryptographically prove they are running an approved
> operating system with an approved browser.

The practical issues around enforcing this kind of remote attestation 
have proven to be sufficiently intractable that literally nobody has 
ever ended up doing it (I thought Netflix had for ChromeOS devices - it 
turned out I was wrong).

> Remote attestation only works with a trusted counterpart who rejects
> access once a breach is detected.  Who do you expect to be the
> counterpart for Fedora users?  Is there anyone who offers such a service
> without also requiring to use their own operating system?

Openstack has some support for this, although I wouldn't recommend using 
it. The setup I'm envisaging is for server deployments within a single 
administrative domain - this way it's entirely under the control of 
whoever controls the machines anyway.

-- 
Matthew Garrett | mj...@srcf.ucam.org
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: TPMs, measured boot and remote attestation in Fedora

2016-04-08 Thread Matthew Garrett
On Fri, Apr 08, 2016 at 09:23:07AM +, Petr Pisar wrote:

> I'm curious how you would predict hash of initramfs because it is
> generated on the host and depends on dracut configuration and presence
> of various optionally installed packages.

initrd is certainly a more difficult one. One thing we can do is work on 
making dracut builds reproducible - that way they should be consistent 
across identical machines in a cluster.

-- 
Matthew Garrett | mj...@srcf.ucam.org
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: TPMs, measured boot and remote attestation in Fedora

2016-04-08 Thread Matthew Garrett
On Fri, Apr 08, 2016 at 09:09:23AM +, Gregory Maxwell wrote:

> The TPM style of remote attest is quite unfriendly to free software.
> It puts basically the entire operating system in the trusted domain,
> and you cannot change even a bit of it without "breaking the seal".
> So if you want any use of remote attest at all, there is a huge swath
> of your system which are are "compelled" under threat of loss of
> access to whatever functionality remote-attest was providing to make
> no modification-- or even, potentially, no upgrade to a very new or
> less common version.

Remote attestation is primarily useful within a single administrative 
domain. Outside that case it's far too easy to subvert (easiest 
approach: simply add a second TPM to your system and program whatever 
PCRs you want), and the privacy concerns remain sufficiently problematic 
that I don't see anybody pushing for it in the near future.

> I think any time invested to make remote attest of any kind work would
> better be spent on support for Intel SGX, which creates limited
> remote-attestable sandboxes which (assuming Intel made no mistakes :)
> ) have strong security and confidentiality regardless of what else is
> running on the system. These sandboxes also have no outside access
> except via limited channels, so (again assuming no mistakes/backdoors
> on Intel's part); and the published security model is stronger (e.g.
> encrypted ram) and more suitable for user-friendly uses (for example,
> it would be straight-forward to use SGX to implement a bitcoin wallet
> that could enforce user specified transfer limits, even against a
> total security compromise of the host-- and if the RA part is as
> usuable as it could be, even prove to third party auditors that your
> keys have these security properties (the RA functionality for SGX is
> not yet documented in public, AFAIK)).

SGX has some interesting properties, but it's unhelpful in the rather 
more common case of "I'm running a bunch of servers and I want to know 
that they're trustworthy before I give them access to resources". 
Rearchitecting a large number of apps into a more SGXy world is a far 
from trivial task.

-- 
Matthew Garrett | mj...@srcf.ucam.org
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


TPMs, measured boot and remote attestation in Fedora

2016-04-08 Thread Matthew Garrett
ware-level security.

-- 
Matthew Garrett | mj...@srcf.ucam.org
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: hibernation support - lack of distro-wide coordination between systemd, dracut, anaconda, pm-utils and maybe more?

2015-04-15 Thread Matthew Garrett
On Tue, Apr 14, 2015 at 12:39:04AM +, Zbigniew Jędrzejewski-Szmek wrote:

 Yeah, hibernation is automatically invoked when battery runs low

Is this actually the default behaviour?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Half-OT: Secure boot and thirdy party kernel modules

2014-07-06 Thread Matthew Garrett
On Sun, Jul 06, 2014 at 02:10:45PM -0300, Sergio Belkin wrote:

 I've found that Oracle VirtualBox kernel module are not signed so I have to
 disable secure boot. Oracle says that is not a VirtualBox bug. And Fedora
 cannot sign it because of license, can it?

Correct. You can generate your own key, enroll it with mokutil and 
then sign the modules with that key.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: libgcrypt soname bump in rawhide

2014-07-02 Thread Matthew Garrett
On Thu, Jul 03, 2014 at 12:35:26AM +0800, Christopher Meng wrote:

 It's a burden for downstream to ship such a compat- package for chrome
 only, and chrome is not a part of Fedora.

Maintaining software in general is a burden, but we do it for the 
benefit of our users anyway. The best case scenario would certainly be 
for Google to update their packages, but if they don't then how does 
rendering the package uninstallable benefit our users who want to 
install it?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: libgcrypt soname bump in rawhide

2014-07-02 Thread Matthew Garrett
On Thu, Jul 03, 2014 at 01:20:26AM +0800, Christopher Meng wrote:
 On Thu, Jul 3, 2014 at 1:11 AM, Matthew Garrett mj...@srcf.ucam.org wrote:
  Maintaining software in general is a burden, but we do it for the
  benefit of our users anyway. The best case scenario would certainly be
  for Google to update their packages, but if they don't then how does
  rendering the package uninstallable benefit our users who want to
  install it?
 
 I don't think they don't if you could give google-chrome-unstable a try.

I don't follow. My understanding was that all the Chrome builds were 
generic RPMs rather than tracking a specific branch of Fedora, so how 
does the rate of development releases do anything to help us get them to 
update their packages to build against a more recent gcrypt?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: [fedora-arm] ExcludeArch tracker doesn't appear to be effective

2014-06-12 Thread Matthew Garrett
On Thu, Jun 12, 2014 at 11:39:00AM +0100, Richard W.M. Jones wrote:
  grub2
 
 ARM (32 bit) boots using u-boot.  Aarch64 machines will boot using
 grub2 (or is that grub2-efi? - you know better than I do :-)

This one's purely excluded from 32-bit ARM. The source package is grub2 
regardless of the firmware interface used.

 (3) Out of 15000 packages, only about 100 don't build on ARM, and
 there are at most 50 missing bugs to fully comply with policy.

I didn't go through the list of FTBFS to figure out whether there are 
other cases, but yeah, the situation certainly isn't dreadful.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-12 Thread Matthew Garrett
On Fri, Jun 13, 2014 at 01:50:32AM +0200, Kevin Kofler wrote:
 Matthew Miller wrote:
  Kevin, I disagree. A positive tone to discussion is important even when
  speaking the truth.
 
 There was no negative tone in Matthew Garrett's original message:
  If the Fedora/ARM community don't care about feature parity with x86, 
  then we should just drop them back to secondary status.
 
 There was nothing impolite or insulting in there. It might be impopular with 
 the ARM people, but it's still a valid point that had to be made, and 
 shouldn't have been retracted.

In context, there was absolutely an impolite tone - it confounded there 
being no interest in making a single package work on ARM with the Fedora 
ARM community having no interest in feature parity. These are not 
actually the same thing, and the fact that I equated them was 
inappropriate.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: [fedora-arm] ExcludeArch tracker doesn't appear to be effective

2014-06-11 Thread Matthew Garrett
On Wed, Jun 11, 2014 at 09:14:24AM +0100, Richard W.M. Jones wrote:

 This ought to improve greatly with 64 bit ARM, where Red Hat are
 pushing for everything to support UEFI booting and ACPI for hardware
 description.  A single upstream open source kernel should [eventually]
 be able to boot on every aarch64 machine, even ones that have not been
 seen before.

UEFI should be an improvement in this respect, but there's really no 
fundamental benefit to using ACPI rather than DTB for hardware 
description.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: [fedora-arm] ExcludeArch tracker doesn't appear to be effective

2014-06-11 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 11:29:41PM +0100, Matthew Garrett wrote:

 Ok, I was entirely unaware of that, and it does change things. Thanks 
 for letting me know. I'll look into whether it's practical to generate a 
 list of all the existing ExcludeArch packages and automatically check 
 whether they have tracker bugs filed - does that seem helpful? It 
 *would* be good to have meaningful metrics on this, but I don't want 
 there to be excessive process overhead.

I pulled git and have the following for ExclusiveArch: %{arm}:

gda
Agda-stdlib
amplab-tachyon
avgtime
avogadro
avro
clpeak
compat-gcc-32
compat-gcc-34
cqrlog
derelict
dustmite
dyninst
elk
floppy-support
ghc-ForSyDe
gl3n
glusterfs-hadoop
grub2
grub-customizer
gtkd
hadoop
hbase
hfsplus-tools
hive
hledger
jogl
joystick-support
keepass
ldc
liveusb-creator
Macaulay2
mcollective-qpid-plugin
numactl
numad
numatop
nwchem
ocaml-cil
ocaml-gsl
patchelf
perftest
perl-Alien-ROOT
perl-qpid
perl-SOOT
pig
pure
pure-glpk
pyode
qt-creator
root
rootplot
sbt
scilab
seamonkey
solr
sparkleshare
sys_basher
tango
urjtag
wine-mono
zfs-fuse


That's 60. In addition, the following packages are ExclusiveArch: in 
such a way that ARM is left out but PPC support is claimed:

gprolog
mono-bouncycastle
nant
pvs-sbcl
xsupplicant

for a total of 65. Of those:

compat-gcc32
compat-gcc34
floppy-support
grub
grub-customizer
joystick-support
liveusb-creator
numactl
numad
numatop

seem entirely legitimate. That's 55 packages, several of which can be 
blamed on a small number of missing dependencies.

That's git master. In F20 the number is about the same, which I'm going 
to assume means that there were some fixes and around the same number of 
excludes added.

(This ignores packages that are ExclusiveArch: %ix86 x86_64 because 
that's probably unfair - if the maintainer genuinely believes that it 
makes sense for the package to be x86 only then that's fair)

So, two conclusions from this:

1) People are very bad at following policy here. The majority of the 
packages that are marked ExcludeArch: arm are not in the tracker bug, 
and most of those don't appear to have a bug filed at all.

2) The rate at which things are being fixed appears to be uninfluenced 
by (1) - the number of bugs on the tracker may have increased, but the 
number of packages actually excluded on ARM hasn't. This means that I 
was grossly overestimating how many packages were broken. I made an 
assertion without collecting accurate data first, and came to the wrong 
conclusion. I apologise for that.

I'll look at filing bugs against packages that don't appear to have bugs 
filed, and I'll attempt to add them to the tracker where they exist but 
aren't listed.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 07:54:26AM +0100, Richard W.M. Jones wrote:
 On Mon, Jun 09, 2014 at 10:20:46PM +0100, Matthew Garrett wrote:
  On Mon, Jun 09, 2014 at 08:43:07PM +0100, Richard W.M. Jones wrote:
  
   Can we excludearch %{arm} for this one?
  
  Why? It's a bug that it doesn't build on ARM. Refusing to build it 
  doesn't fix the bug, and then someone else will crash into the same 
  issue when they dare to build something that needs llvm.
 
 It seems the alternative is hfsplus-tools doesn't work at all for
 anyone.

Eh. We're constrained by our own policies here, not by anything 
fundamental - LLVM being broken on ARM ought to mean that our ARM 
product is worse, not that everything else is dragged down to the same 
level.

 BTW this package is also affected by the -fstack-protector-strong LLVM
 bug, but that is simple to work around.

Yeah that complaint is completely fair.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 05:23:01PM +0100, Richard W.M. Jones wrote:
 On Tue, Jun 10, 2014 at 03:45:57PM +0100, Matthew Garrett wrote:
  Eh. We're constrained by our own policies here, not by anything 
  fundamental - LLVM being broken on ARM ought to mean that our ARM 
  product is worse, not that everything else is dragged down to the same 
  level.
 
 So .. ExcludeArch %{arm} should be added?  I'm not clear what you're
 saying here.

ExcludeArch implies that it's acceptable that it doesn't build on ARM 
and removes the incentive for anyone to fix it. It's not.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 06:14:03PM +0100, Richard W.M. Jones wrote:
 On Tue, Jun 10, 2014 at 06:00:05PM +0100, Matthew Garrett wrote:
  ExcludeArch implies that it's acceptable that it doesn't build on ARM 
  and removes the incentive for anyone to fix it. It's not.
 
 There's a process for handling this, which is to create (if required)
 a Fedora bug for the package, and then attach it to this tracker:
 
 https://bugzilla.redhat.com/show_bug.cgi?id=F-ExcludeArch-ARM
 
 Then add ExcludeArch to the package, mentioning the particular bug.

I've never seen this actually result in the bug being fixed in leaf 
packages.

 I'm going to go ahead and do this now, since otherwise we won't have
 hfsplus-tools at all for any user.

This is inappropriate. The bug is in LLVM, not hfsplus-tools. Quoting 
from the guidelines:

ExcludeArch should only be set when the architecture is not relevant 
for the package, the package is non-functional on the architecture, or 
the code does not compile cleanly for the architecture.

The code compiles fine, LLVM then fucks up linking.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 06:34:31PM +0100, Richard W.M. Jones wrote:

 The bug that I'm actually fixing is that we haven't had a successful
 hfsplus-tools build in nearly a year.

Ok. Once the build's done let's remove the ExcludeArch so it continues 
to show up as a failure in mass builds. It can be restored if we 
actually need to make any code changes.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 06:44:06PM +0100, Richard W.M. Jones wrote:
 On Tue, Jun 10, 2014 at 06:39:52PM +0100, Matthew Garrett wrote:
  Ok. Once the build's done let's remove the ExcludeArch so it continues 
  to show up as a failure in mass builds. It can be restored if we 
  actually need to make any code changes.
 
 Where is the Fedora policy that we should break builds so that we can
 collectively remember there is a bug in a particular architecture?
 That's what Bugzilla is for.

Having it show up on the FTBFS list sparked a discussion that noted 
upstream movement on this. If it hadn't been there we wouldn't have 
noticed, and even once LLVM is fixed this would probably have remained 
ExcludeArch: arm.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 07:05:56PM +0100, Richard W.M. Jones wrote:

 In this case however I don't think much productive came from this
 discussion we had about hfsplus-tools.  Obviously no one wants
 hfsplus-tools and/or clang enough on Fedora/ARM that they are prepared
 to fix it.  So I think we should just drop it on ARM, and let anyone
 who wants it, fix it later (or reenable %{arm} if clang gets fixed).

If the Fedora/ARM community don't care about feature parity with x86, 
then we should just drop them back to secondary status.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

ExcludeArch tracker doesn't appear to be effective

2014-06-10 Thread Matthew Garrett
https://bugzilla.redhat.com/show_bug.cgi?id=485251 is depressing. Nine 
bugs have been closed - of these, one is a review request that was 
dropped, two were incorrectly closed after an ExcludeArch was added and 
one was closed as a duplicate. Further, one bug was just unsubscribed 
from the tracker after tests were disabled. We've correctly fixed *five* 
packages that have been flagged as FTBFS on ARM. At this rate of fixing, 
and given the rate at which new bugs are added, ARM will never build the 
entire archive.

Fedora is supposed to provide a consistent experience across primary 
architectures. Having a subset of our packages fail to build on ARM 
means that's not true, and the current state of affairs clearly violates 
point 8 of the architecture promotion requirements. How can we fix this?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 07:11:53PM +0100, Matthew Garrett wrote:
 On Tue, Jun 10, 2014 at 07:05:56PM +0100, Richard W.M. Jones wrote:
 
  In this case however I don't think much productive came from this
  discussion we had about hfsplus-tools.  Obviously no one wants
  hfsplus-tools and/or clang enough on Fedora/ARM that they are prepared
  to fix it.  So I think we should just drop it on ARM, and let anyone
  who wants it, fix it later (or reenable %{arm} if clang gets fixed).
 
 If the Fedora/ARM community don't care about feature parity with x86, 
 then we should just drop them back to secondary status.

That was overly critical of me and did nothing to actually further the 
discussion. I apologise.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Improving the state of ARM

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 07:05:56PM +0100, Richard W.M. Jones wrote:

 In this case however I don't think much productive came from this
 discussion we had about hfsplus-tools.  Obviously no one wants
 hfsplus-tools and/or clang enough on Fedora/ARM that they are prepared
 to fix it.  So I think we should just drop it on ARM, and let anyone
 who wants it, fix it later (or reenable %{arm} if clang gets fixed).

Let me try this again. The aim is for Fedora to provide an experience 
that's consistent across primary architectures to the extent that is 
reasonably possible. If people don't care about that, we have a problem. 
The nature of that problem depends on who is failing to do the caring:

1) If the ARM maintainers don't care about ARM being equivalent to x86, 
that's a serious problem that is (with luck) easily fixable. On the 
other hand, if they care but don't have sufficient resources to fix 
things, that's a smaller problem but probably less easily fixed, 
because:

2) If individual package maintainers don't care about ARM, there's 
really not a lot we can do. They weren't involved in the decision to 
make ARM primary. They probably don't plan on installing Fedora on any 
ARM systems, so they gain no personal benefit from fixing it. What kind 
of incentives can we provide? Threaten to drop their packages? That 
would provide consistency, but it ends up being a rather limiting 
strategy.

Honestly the most practical solution would seem to be a concerted effort 
from the ARM team to fix these up - the assumption that individual 
package maintainers will take care of things isn't realistic. But given 
that they're busy getting arm64 into a good state, I don't know how 
reasonable that is given the available resources.

I think there's a real problem if ARM continues to languish behind x86's 
feature set, and I think it's realistic to ask whether that problem is 
sufficiently serious for demoting it. But that's clearly not the most 
desirable outcome, and so I'd really prefer us to figure out a way to 
fix things. Improving code portability benefits us, our users and the 
ecosystem as a whole.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: [fedora-arm] ExcludeArch tracker doesn't appear to be effective

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 09:12:35PM +0100, Peter Robinson wrote:

 So at the moment there's around 15,000 source packages in Fedora
 mainline and you're getting depressed over exactly 24 of them? I'm not
 sure how 24 packages is providing a inconsistent experience. In some
 cases the maintainer of the package hasn't bothered to close the bug
 when support was added, in some cases ARM was added incorrectly. For
 example just before mass rebuild we added Ada support which closed out
 around 2 dozen other packages we didn't build prior.

What's depressing is the trend, not the absolute count. I'd expected it 
to head rapidly towards zero after the first release, but instead it's 
still growing.

 Ultimately I fail to see how missing 20 odd packages out of 15,000 odd
 fails to provide a consistent experience across primary
 architectures so if there's something more specific and constructive
 you'd like to provide it would be useful or is this just a random rant
 because your bored?

Anyone who has a usecase that relies on one of those packages will have 
an inconsistent experience if they attempt to reproduce it on ARM. 
That's harmful. It makes us look bad. It gives the appearance that we're 
willing to release a worse product simply in order to claim ARM support.

 Ultimately we've been working hard to provide as consistent
 environment on ARM as possible and improving all the time and all you
 seem to do is randomly come in Magpie style and shit on something
 without any other visible involvement in the ARM process or community
 or any context and pick on something of random like a bully. If you've
 got constructive criticism feel free to engage properly to assist us
 in improving and coming up to your exacting standards but this means
 of bullying tactics isn't the way to do it.

I don't think the current state of the ARM port is good enough. That's 
not a reflection on the people involved. That's not a criticism of the 
amount of effort that's been made. I just want to know how we can get 
from where we currently are to where we want to be. Individual package 
maintainers seem happy to just add an ExcludeArch, maybe file a bug 
against upstream and then forget about the issue. Given a lack of direct 
incentive for them to care about ARM, that's not terribly surprising. 
What can we do about that? Is the only realistic answer to find the 
resources to have a team to hunt down and fix portability issues that 
are sufficiently far from the core that the existing ARM community can't 
justify the time? And if so, is there any way we can make that happen?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: [fedora-arm] ExcludeArch tracker doesn't appear to be effective

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 09:49:58PM +0100, Peter Robinson wrote:
  What's depressing is the trend, not the absolute count. I'd expected it
  to head rapidly towards zero after the first release, but instead it's
  still growing.
 
 Is it? Where's your proof? From the patches and dealings with it
 personally that's not my understanding and if it is the case it's not
 due to the ARM team but because packagers aren't following the
 packaging process and in this case we actively fix them when we're
 made aware of the incident.

In the past 6 months, 6 bugs added, 2 bugs closed - 
https://bugzilla.redhat.com/show_activity.cgi?id=485251 .

  Anyone who has a usecase that relies on one of those packages will have
  an inconsistent experience if they attempt to reproduce it on ARM.
  That's harmful. It makes us look bad. It gives the appearance that we're
  willing to release a worse product simply in order to claim ARM support.
 
 And if they engage with us about that experience we do our best to
 deal with them where possible. There's a few cases where I'm aware of
 that we don't package because the HW is actively not supported on ARM
 or similar style cases. In those cases I would argue that it's better
 not to build the packages as arguably no experience is better
 experience than a bad experience especially if there's potential of
 issues that offer a worse experience, hardware breakage or data
 corruption. The fact is that the x86 and ARM use cases don't match up
 100% and I don't see the point in trying to glue those together 100%
 for the sake of a check box.

Where there's reliance on specific hardware functionality that's absent 
then yes, absolutely, there's no benefit in building the packages. 
Figuring out how to communicate that to users isn't an entirely solved 
problem, but with luck nobody's actually buying ARM hardware with 
unrealistic expectations of its functionality.

But I can't find any examples of those in the tracker. They all seem to 
be cases where packages are either missing dependencies, take too long 
to build or are just missing support. They're code. We can fix them.

  I don't think the current state of the ARM port is good enough. That's
  not a reflection on the people involved. That's not a criticism of the
  amount of effort that's been made. I just want to know how we can get
  from where we currently are to where we want to be.
 
 Well why didn't you say that from the start rather than coming in and
 bullying the people actively involved and make them feel like the
 massive effort myself and many others have been putting in is useless
 and a waste of time. Don't be a Magpie Board Member and fly in and
 shit over everything and than fly awau with no concept of what's
 happening below. Every time you've had any attempt at opinion that's
 the way you've done it and all you do is get all our backs up and make
 the problem worse rather than better.

I'm genuinely sorry if I gave the impression of bullying here. I want to 
feel comfortable pointing at the ARM port as an equal to the x86_64 one. 
I don't feel entirely comfortable doing so at the moment, and the 
current process doesn't seem to be getting us to the point where I would 
be.

   Individual package
  maintainers seem happy to just add an ExcludeArch, maybe file a bug
  against upstream and then forget about the issue. Given a lack of direct
  incentive for them to care about ARM, that's not terribly surprising.
  What can we do about that? Is the only realistic answer to find the
  resources to have a team to hunt down and fix portability issues that
  are sufficiently far from the core that the existing ARM community can't
  justify the time? And if so, is there any way we can make that happen?
 
 I'm not sure I agree with your outline here, you've given no real
 concrete examples here. I agree there's no real incentive but there's
 over 15,000 source packages in Fedora and there's less than 100 (last
 time I looked, unfortunately there's no easy way off checking this
 without downloading the entire src.rpms or checking out all 15K git
 repos) or so excluded from ARM and the vast majority of those are due
 to HW support. There's some like D where upstream has yet to port the
 stack. I'm sure there's others I'm unaware of but it's not because of
 the ARM team but rather the packager following procedures or engaging
 us for assistance.

The quantity of the archive that's built and working on ARM so far is a 
testament to the amount of effort that the ARM community have put into 
this port. The question is how to finish that. All I'm saying here is 
that the current approach of filing bugs doesn't appear to be resulting 
in people actually fixing their packages. It's unreasonable to expect 
you to do all of it. So what do we do?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http

Re: [fedora-arm] ExcludeArch tracker doesn't appear to be effective

2014-06-10 Thread Matthew Garrett
On Tue, Jun 10, 2014 at 10:52:19PM +0100, Peter Robinson wrote:
 On Tue, Jun 10, 2014 at 10:20 PM, Matthew Garrett mj...@srcf.ucam.org wrote:
  In the past 6 months, 6 bugs added, 2 bugs closed -
  https://bugzilla.redhat.com/show_activity.cgi?id=485251 .
 
 If you're going on just the bug tracker possibly but there's a lot of
 stuff we fix and enhance that doesn't even make the that tracker, the
 Ada stuff I mentioned earlier is but one example. Rightly or wrongly
 it's not the canonical source of information. For example if I
 discover an exclude arch I'll generally just go and fix it rather than
 spending the time to open a bug, fix it myself and then close it
 myself. Just go and read the rawhide reports. If that's what you want
 us to do to give a warm fuzzy feeling of progress I don't see it
 as a time effective agile way of necessarily dealing with it. Feel
 free to suggest alternatives :-)

Ok, I was entirely unaware of that, and it does change things. Thanks 
for letting me know. I'll look into whether it's practical to generate a 
list of all the existing ExcludeArch packages and automatically check 
whether they have tracker bugs filed - does that seem helpful? It 
*would* be good to have meaningful metrics on this, but I don't want 
there to be excessive process overhead.

  Where there's reliance on specific hardware functionality that's absent
  then yes, absolutely, there's no benefit in building the packages.
  Figuring out how to communicate that to users isn't an entirely solved
  problem, but with luck nobody's actually buying ARM hardware with
  unrealistic expectations of its functionality.
 
  But I can't find any examples of those in the tracker. They all seem to
  be cases where packages are either missing dependencies, take too long
  to build or are just missing support. They're code. We can fix them.
 
 Are you offering to do so? For example some time ago I approached one
 of the root maintainers (comes out of CERN I believe) and they said
 they didn't see the point nor have the time to maintain anything other
 than x86 at this time. Should we fork it and support it just to say
 we're feature complete with x86 just because it's code? Well maybe,
 but I'm not sure in that case it would add value to the distro for the
 expenditure of time and we've had exactly zero enquires about it (and
 it's 3 dependencies in the tracker). In the case of Hadoop there might
 possibly be value (and in later releases the issues might even have
 been fixed) but again we've had no queries and so we've focused on
 things people want. In the case of Ada we had some requests for
 support since F-20 was released so we've added that for F-21.

Yeah, I think where it's practical for us to maintain feature 
compatibility we should do so even if upstream disagree. We make 
modifications to upstream code all the time in order to meet Fedora 
policy.

As for who should be doing that work - well, yeah. That's kind of my 
point. Responsibility for this kind of thing is really something we 
should have figured out prior to promotion, and I'm sorry that I didn't 
think about it in a more timely manner. I'm looking for answers here, 
not insisting that anyone take on more work.

  I'm genuinely sorry if I gave the impression of bullying here. I want to
  feel comfortable pointing at the ARM port as an equal to the x86_64 one.
  I don't feel entirely comfortable doing so at the moment, and the
  current process doesn't seem to be getting us to the point where I would
  be.
 
 Well you need to engage with us better. Every time you make an
 appearance it appears to us all it's just to bully us. People
 genuinely shudder when your nick appears on on the channel and I've
 had 3 people thank me for replying so they don't have to.

That's unfortunate. I'm sorry. I'll try to ensure that I'm interacting 
in a more productive way.

 So moving on from that why don't you feel comfortable pointing to
 the ARM port? I'm aware we're still not perfect but it was always
 going to be a road to improvement.

Basically that you're still not perfect, to the extent that anything in 
Fedora is. I'd have been significantly happier if more time had been 
spent on, for instance, Anaconda before ARM was promoted. But 
realistically there's obviously a tension between perfectionism and 
maintaining enthusiasm - especially with the longer F21 cycle, I suspect 
the right decisions were made at the time.

 We're supporting massively more hardware now than we were at F-20
 release time and the types of HW are getting better with the likes of
 the Tegra K1 supporting full desktop equivalent graphics and we might
 even have the support for that upstream in time for F-21 release, the
 open graphics drivers are improving that they might be usable in that
 timeframe too. Those were problems that were well known when we went
 to primary and the path is basically what was agreed and mapped out in
 that regards.

The work that's been done

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-10 Thread Matthew Garrett
On Wed, Jun 11, 2014 at 01:53:12AM +0200, Kevin Kofler wrote:
 Matthew Garrett wrote:
  Eh. We're constrained by our own policies here, not by anything
  fundamental - LLVM being broken on ARM ought to mean that our ARM
  product is worse, not that everything else is dragged down to the same
  level.
 
 Didn't YOU vote for ARM as a primary architecture, and even actively lobby 
 for it? Now you get to pick the (poisoned) fruit…

Er. No? I think you're confusing me with someone else.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-09 Thread Matthew Garrett
On Mon, Jun 09, 2014 at 05:07:14PM +0100, Richard W.M. Jones wrote:
 On Sun, Jun 01, 2014 at 11:24:09AM +0200, Till Maas wrote:
  hfsplus-toolsajax, ajax 
 
 Just to be clear, is hfsplus-tools still at risk of being removed or not?

It's required in order to build x86 install images, so not really.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Current FTBFS packages (was Re: [ACTION REQUIRED] Retiring packages for Fedora 21)

2014-06-09 Thread Matthew Garrett
On Mon, Jun 09, 2014 at 08:43:07PM +0100, Richard W.M. Jones wrote:

 Can we excludearch %{arm} for this one?

Why? It's a bug that it doesn't build on ARM. Refusing to build it 
doesn't fix the bug, and then someone else will crash into the same 
issue when they dare to build something that needs llvm.

--  
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Considering GNOME 3.12 as an F20 update

2014-04-03 Thread Matthew Garrett
On Thu, Apr 03, 2014 at 10:20:30AM -0400, Matthias Clasen wrote:

 Did any of your gnome-shell extensions break ?

Isn't this inevitable? If any extensions only claim to support 3.10 then 
they'll stop working until updated.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Considering GNOME 3.12 as an F20 update

2014-04-03 Thread Matthew Garrett
On Thu, Apr 03, 2014 at 04:57:10PM +0200, Miloslav Trmač wrote:
 2014-04-03 16:52 GMT+02:00 Matthew Garrett mj...@srcf.ucam.org:
  Isn't this inevitable? If any extensions only claim to support 3.10 then
  they'll stop working until updated.
 
 One, at least theoretical, way to resolve this would be to update all
 extensions hosted at extensions.gnome.org to support 3.12.

Don't the extensions end up in the user's home directory? How can we 
forcibly update them?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Considering GNOME 3.12 as an F20 update

2014-04-03 Thread Matthew Garrett
On Thu, Apr 03, 2014 at 11:11:58AM -0400, Stephen Gallagher wrote:

 One option we could look into would be for GNOME to set this option on
 by default for a month or so to give extension authors time to catch
 up while not breaking any user extension that works unmodified.

My understanding was that there was no mechanism for automatically 
updating extensions at present.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 System Wide Change: lbzip2 as default bzip2 implementation

2014-04-02 Thread Matthew Garrett
On Wed, Apr 02, 2014 at 05:14:53PM -0400, Al Dunsmuir wrote:

 This  implementation  has  been built and extensively tested using the
 current  release  of the real bzip2 library. Substituting a completely
 different  library  implementation without going through extensive and
 explicit validating and testing is risky and unreasonable. At best, it
 would   complicate   problem  reporting,  reproduction,  analysis  and
 correction.

The suggestion is to replace the tool, not the library.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Help understanding Anaconda source - walk through needed.

2014-03-24 Thread Matthew Garrett
On Mon, Mar 24, 2014 at 07:21:51PM +, Aaron Gray wrote:
 The HP Dl140 G3 has MCA based graphics. F20 seems to be mainly fixed
 apart from MCA based Anaconda, which gets the resolution wrong, the
 screen being too small for the Anaconda graphics.
 VESA setup mode works fine however.

Ah. You mean MGA, not MCA. It's entirely possible that there's a bug in 
the mgag200 driver that's resulting in a failure to get the correct 
EDID, but that's a kernel bug rather than an anaconda one.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 06:25:03AM -0400, Jan Lieskovsky wrote:

 One hypothetical [*] scenario coming to my mind being the users might be
 willing to provide customized policy content to Fedora installation. Let's
 suppose the case there is a SCAP content for vulnerability checking (and 
 ensuring
 some restrictions) for Fedora systems. Something like is done for Red Hat 
 Enterprise Linux case:
https://www.redhat.com/security/data/metrics/

This seems pretty niche. The cost associated with it is UI that makes no 
sense to most users but is presented to them by default anyway. I think 
we should concentrate on finding a way to make this possible without 
compromising the common case.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 09:25:16AM -0400, Eric H. Christensen wrote:

 I disagree with this assessment.  The workstation is exactly where much of 
 these hardening needs to take place.  I can't see an installation that 
 wouldn't benefit from this feature.

If there's a default policy that would make sense for most workstation 
users, we should just make that the default. If there isn't, how are we 
going to educate users as to which choice they should be making? *I* 
don't understand the terms used in the proposed UI, so I'd be willing to 
put money on the number of potential users who do being pretty close to 
statistically indistinguishable from 0.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 12:38:59PM -0400, Jan Lieskovsky wrote:

 I am afraid there isn't a default policy that would suit every possible
 use case Fedora OS can be used at. Yes, there's something like common
 understanding / agreement which technologies can be considered safe at
 current level of (security) knowledge (i.e. that certain cryptographic
 algorithms should be preferred for usage before the others etc.)

selinux doesn't suit every possible use case that Fedora supports 
either. But we still default to it being enabled with a targeted policy 
and provide no installer UI to let people change that.

 But the current Fedora defaults approach has one limitation - even when
 we set up the defaults reasonable enough, there is possibility users
 can return back to the use of less secure ways (example how many users
 are still using telnet or rsh today?)

Well, yes. If you're deploying in an environment where you want to make 
it impossible for users to disable security features, you shouldn't be 
allowing those users to choose their own security policy. That's not an 
argument for putting it in the installer UI.

  If there isn't, how are we
  going to educate users as to which choice they should be making?
 
 We can do the following (three alternatives comes to mind):
 * use sane defaults, allow the less secure ones (if I am not wrong
   this is the current approach),

Yes, a user can edit /etc/selinux/config to disable selinux. They can 
also modify the mmap_min_addr sysctl. But we don't offer those choices 
in the installer, because there's no way that most users are going to be 
able to make an informed decision about what these values should be set 
to or what the associated compromises are.
 
  *I*
  don't understand the terms used in the proposed UI,
 
 Can you be more concrete which term(s) you don't understand? Maybe you are
 right and the concept needs to be better explained / presented differently 
 prior wider adoption [**].

What is a Data stream? What is a Checklist? How do I know which ones 
to pick?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 02:51:10PM -0400, Steve Grubb wrote:
 On Friday, March 14, 2014 03:00:20 PM Matthew Garrett wrote:
  If there's a default policy that would make sense for most workstation 
  users, we should just make that the default.
 
 Right now there is just one policy. In there future there could be several. I 
 could see a server specific, workstation specific, virt specific, PCI, USGCB, 
 STIG, common criteria, etc.

Having separate server, workstation and cloud products means we can 
apply separate defaults without requiring user interaction. Beyond that, 
why would an end user want to choose common criteria during an 
interactive install? Isn't that something that should be imposed on them 
by their local admin?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 02:57:33PM -0400, Steve Grubb wrote:
 On Friday, March 14, 2014 06:53:42 PM Matthew Garrett wrote:
  Having separate server, workstation and cloud products means we can
  apply separate defaults without requiring user interaction. Beyond that,
  why would an end user want to choose common criteria during an
  interactive install? Isn't that something that should be imposed on them
  by their local admin?
 
 Yes, and I believe the kick start would do that. I would also even see a case 
 where an admin takes the base policy and tailors it with site specific 
 settings 
 and puts that into effect instead of the default one we provide. I like the 
 idea of choice.

Exactly, this is functionality that makes sense for enterprise and 
automated deployments. I don't see it making sense for an interactive 
install.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 02:39:51PM -0400, Eric H. Christensen wrote:
 On Fri, Mar 14, 2014 at 03:00:20PM +, Matthew Garrett wrote:
  If there's a default policy that would make sense for most workstation 
  users, we should just make that the default. If there isn't, how are we 
  going to educate users as to which choice they should be making? *I* 
  don't understand the terms used in the proposed UI, so I'd be willing to 
  put money on the number of potential users who do being pretty close to 
  statistically indistinguishable from 0.
 
 I'm all for creating a recommended hardening policy that users can opt 
 into at install time.  This feature would allow us to provide that 
 kind of data to the end user.  If the user decides to not implement a 
 policy that would simply yield the same outcome as we have today.

How does the average user make an informed decision about whether an 
available security policy is appropriate for them?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 03:06:06PM -0400, Eric H. Christensen wrote:

 You're making an assumption that I wouldn't want my personal box to be 
 hardened at install or that the enterprise has an automated way of 
 doing a deployments.  Why make it harder to use the operating system 
 when a simpler way of configuration has been suggested?

I'm making the assumption that you, as someone with sufficient knowledge 
of the field to make an informed choice, are capable of performing 
additional steps in order to ensure that your system meets additional 
security criteria.

 The feature isn't going to be a massive change to the UI and only adds 
 to the awareness that users have a choice on how hardened their system 
 is at install time.  Whether you chose to use it is your business.

It's not going to be a massive change? It's an entire additional spoke 
in the UI. That *is* a massive change. Users will click on it. Users 
will be confused by it. They'll choose inappropriate options and then 
complain that their software doesn't work, and then they'll either take 
resources from our limited support pool or give up and install something 
else instead.

The job of the installer is to make it as easy as possible for the user 
to end up with a working system. Adding options that make it 
straightforward for the user to end up with a non-working system is a 
backwards step.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 03:41:30PM -0400, Eric H. Christensen wrote:
 On Fri, Mar 14, 2014 at 07:31:55PM +, Matthew Garrett wrote:
  How does the average user make an informed decision about whether an 
  available security policy is appropriate for them?
 
 I guess we'll have to describe the different policies and provide 
 approprate documentation/education.  You know, pretty much how we get 
 users to understand whether or not they should encrypt their hard 
 drives or assign the first user as an administrator or anything else 
 they do with their computer.

The failure mode of making the wrong choice regarding an encrypted 
partition or the default user being an administrator involves the system 
*continuing to work*. The failure mode of making the wrong choice 
regarding security policy is that things you expect to work mysteriously 
don't.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 03:56:47PM -0400, Eric H. Christensen wrote:
 On Fri, Mar 14, 2014 at 07:45:53PM +, Matthew Garrett wrote:
  The failure mode of making the wrong choice regarding an encrypted 
  partition or the default user being an administrator involves the system 
  *continuing to work*. The failure mode of making the wrong choice 
  regarding security policy is that things you expect to work mysteriously 
  don't.
 
 What exactly do you think would be done with one of these policies?  You seem 
 to think that an incorrect choice will brick a system.

If an incorrect choice means that the software the user wants to run 
won't run, that's going to be a problem for the user. And we presumably 
expect that some software won't run, because otherwise we'd be enabling 
that security feature by default? A user who accidentally installs a 
profile that enables FIPS compliance is going to have a bad time, for 
instance.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-14 Thread Matthew Garrett
On Fri, Mar 14, 2014 at 06:24:36PM -0400, Eric H. Christensen wrote:
 On Fri, Mar 14, 2014 at 08:01:53PM +, Matthew Garrett wrote:
  If an incorrect choice means that the software the user wants to run 
  won't run, that's going to be a problem for the user. And we presumably 
  expect that some software won't run, because otherwise we'd be enabling 
  that security feature by default? A user who accidentally installs a 
  profile that enables FIPS compliance is going to have a bad time, for 
  instance.
 
 No, that's not exactly it.  I've pointed out reasons why defaults 
 usually suck (security-wise).  I've yet to see a hardened system make 
 software fail.  I'd love some examples of your concerns.  I also don't 
 understand why FIPS compliance will make a user have a bad time since 
 I've been on systems that were fully FIPS compliant and didn't have 
 any problems.

You don't think it would upset users to have their kernel panic if 
they accidentally tried to load an inappropriately signed module? What 
happens if I ssh to a server that doesn't implement any of the 
FIPS-approved algorithms? Why is Firefox suddenly asking for a password 
before I can visit https sites? Why won't Firefox speak https to a bunch 
of sites?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-13 Thread Matthew Garrett
How would this alter the default user installation experience?
-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-13 Thread Matthew Garrett
On Thu, Mar 13, 2014 at 01:40:53PM -0400, Jan Lieskovsky wrote:

 Of course, in the case they wouldn't like to configure any security
 policy and use just vanilla Fedora installation, the can ignore
 the security section, configure just those sections as configured
 (required to be configured) now (e.g. INSTALLATION SOURCE, SOFTWARE
 SELECTION etc.), and click the Begin Installation button. In that
 case no security profile would be applied.

The demos seem to cover the case where there's already data provided 
from the Kickstart file. What options are presented to the user if 
there's no oscap entry in Kickstart? Is the user expected to provide a 
path to download a policy?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F21 Self Contained Change: Security Policy In The Installer

2014-03-13 Thread Matthew Garrett
On Thu, Mar 13, 2014 at 02:45:58PM -0400, Jan Lieskovsky wrote:
  The demos seem to cover the case where there's already data provided
  from the Kickstart file. What options are presented to the user if
  there's no oscap entry in Kickstart? Is the user expected to provide a
  path to download a policy?
 
 Yes, there are two ways how to provide the policy - either via kickstart
 or via GUI by entering the HTTP / FTP URI [*] of the policy (in RPM
 package format) and clicking the Fetch data button.

Ok. I'm kind of struggling to imagine the scenario where a user actually 
wants to do that. What's the use-case for providing UI rather than 
limiting deployment to Kickstart?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Out of virtual memory on ARM builder

2014-02-14 Thread Matthew Garrett
On Fri, Feb 14, 2014 at 04:00:09PM -0600, Mátyás Selmeci wrote:

 This may be a stupid question, but can you solve this by putting
 more swap on those builders?

It depends. If the system is sufficiently resource constrained that 
malloc() is actually telling you that you're not going to the moon, more 
RAM will help. But what's more likely is that it's running out of 
process address space - a 32 bit process can only address 3GB of address 
space (which isn't necessarily all RAM), no matter how much RAM is 
available[1]. Adding more RAM isn't going to help there. Getting rid of 
32-bit build systems is.

[1] On x86, anyway. I don't know what the ARM VM split is.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: f20, anaconda, net install and video out of range ....

2014-02-07 Thread Matthew Garrett
On Fri, Feb 07, 2014 at 11:19:38AM -0500, Paul Wouters wrote:
 On Thu, 6 Feb 2014, Adam Williamson wrote:
 
 painstakingly hand-weeding something like M*a's ldetect-lst you can get
 some minor benefits, like doing this kind of distinction where we want
 to load the native driver for a real card but not qemu's emulated
 cirrus.
 
 You are telling me it is hard to detect the real physical card versus
 the emulated card? Come on! You can even make that decision by looking
 at the cpu type. If your cpu is QEMU Virtual CPU, how about using the
 virtual cirrus driver

Oh, that's not difficult - it'd be possible to make the cirrus driver 
bail on virtualised hardware (easy to detect, just check whether there's 
a KMS driver bound). But that would still require someone to care about 
maintaining the cirrus driver, which nobody does.

 Taking out everyone who tries to run fedora or rhel7 using a physical
 cirrus card IMHO is just sloppy and lazy. Yes, people still run P-III
 servers with SCSI disks and cirrus cards. In fact, I think you will
 see it more within the enterprise then outside it.

As Adam points out, nobody's running RHEL7 on a physical cirrus card. 
However, we'd still expect the vesa driver to work, and the fact that it 
doesn't is a bug[1]. Nobody ever added exa support to Cirrus, so it's 
not like you'd see any meaningful difference in performance.

[1] I mean plausibly it's a bug in this particular Cirrus video BIOS, 
but it'd be nice to actually figure that out.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: New UEFI guide on the wiki

2014-02-05 Thread Matthew Garrett
On Tue, Feb 04, 2014 at 04:18:27PM -0700, Chris Murphy wrote:

 Does anyone know why the convention is to create the ESP as the first 
 partition?

Because that's the only configuration anyone's likely to have tested.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: New UEFI guide on the wiki

2014-02-05 Thread Matthew Garrett
On Tue, Feb 04, 2014 at 02:45:29PM -0800, Andrew Lutomirski wrote:
 On Tue, Feb 4, 2014 at 2:41 PM, Adam Williamson awill...@redhat.com wrote:
  You're making a fatal mistake: assuming some kind of sense on the part
  of firmware authors. ;)
 
 Not really -- I figure that either the firmware is only parsing the
 protective MBR (in which case the existence of an ESP won't even be
 detectable) or that the firmware actually supports UEFI, in which case
 I'd be fairly impressed if it matters.

You're missing the not uncommon case of UEFI firmware with CSM forcibly 
enabled and no UEFI boot option which was much of the market between 
2009 and 2011. These implementations will frequently understand GPT well 
enough to decide that a disk isn't BIOS bootable, but won't let you 
perform a UEFI boot instead.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: New UEFI guide on the wiki

2014-02-04 Thread Matthew Garrett
On Tue, Feb 04, 2014 at 04:42:23PM +0100, Jochen Schmitt wrote:
 On Mon, Feb 03, 2014 at 08:14:06PM -0800, Andrew Lutomirski wrote:
 
  (This is a particular pain point for me -- my main development box was
  originally installed as BIOS, and I switched it to UEFI, and I'm sure
  I did it wrong because the boot process is impressively finicky.)
 
 If your hard disc is GPT partition the movement from BIOS to UEFI boot
 shoot be very easy. You have to install grub2-efi and create the configuration
 file on /boot/efi/EFI/fedora/grub.cfg.

…and configure the UEFI boot options, which you can't do because you're 
not running under UEFI and so have no access to UEFI runtime services. 
The workarounds required for this will tend to be vendor specific, 
although ensuring that you have the fallback loader supplied by shim may 
work in many cases.

 3.) On my MacBoot Pro (late 2013) I required the usage of the
 linux16/initrd16 commands instead of linux/initrd commands for 
 the BIOS-mode boot.

Yeah it's really a mistake for us to be using the linux/initrd commands 
under any circumstances.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: New UEFI guide on the wiki

2014-02-04 Thread Matthew Garrett
On Tue, Feb 04, 2014 at 10:30:58AM -0800, Andrew Lutomirski wrote:
 On Tue, Feb 4, 2014 at 10:19 AM, Chris Murphy li...@colorremedies.com wrote:
 
  On Feb 4, 2014, at 10:42 AM, Andrew Lutomirski l...@mit.edu wrote:
 
  I think that half the difficulty here is that UEFI is annoying and the
  other half is that both GRUB2 and efibootmgr are miserable.
 
  For single OS installs, you shouldn't have to interact with any of those 
  things. shim.efi, or shim via fallback.efi (?) will even do a fallback boot 
  of Fedora if NVRAM has somehow been vanquished.
 
 How does firmware find shim.efi?  Is it installed as bootx64.efi?
 IIRC that approach used to be frowned upon.

It installs a fallback loader as bootx64.efi which then creates new boot 
entries for any installed operating systems it can find.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: New UEFI guide on the wiki

2014-02-04 Thread Matthew Garrett
On Tue, Feb 04, 2014 at 11:49:06AM -0800, Andrew Lutomirski wrote:

 What failed?  I'm guessing that userspace improvements since then have
 mostly fixed this.  I've never seen any problem on F18 (IIRC) and up
 with GPT partition tables being BIOS-booted.  It seems to Just Work
 (tm).

Some firmware sees a GPT label and refuses to even attempt a BIOS boot. 
We tried this back in F16, tried further by violating the spec as it 
stood at the time and marking the protective MBR bootable and discovered 
that there are still systems where this just doesn't work.

 Also, isn't this already sort of necessary on large disks?

There's not really anything else we can do in that case, so we make a 
best effort and if it doesn't work then, well.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: I want to turn on a part of the kernel to make SELinux checking more stringent.

2014-01-26 Thread Matthew Garrett
On Sun, Jan 26, 2014 at 08:38:25PM +, Richard W.M. Jones wrote:

 JONESFORTH, a public domain FORTH I wrote, is written in x86 assembler
 and prefers to put its threaded interpreter at address 0.

Can you change its preference? Permitting the mapping of executable code 
at address 0 makes it much easier to exploit null pointer 
vulnerabilities in the kernel. Recent (within the past few years…) 
kernels will refuse to let you mmap stuff below 64K or so regardless of 
selinux policy, so this may break on other distributions as well.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: RFC: what to do with ums when the X server is not suid root ?

2014-01-20 Thread Matthew Garrett
On Mon, Jan 20, 2014 at 10:08:01AM +0100, Hans de Goede wrote:

 So now it is time to start looking into some of the corner cases, or rather at
 the elephant in the room. What about non-kms drivers. We still have the vesa
 driver around as most prominent example, and this is useful for some oddball
 cards and for cards which are too new.

-mga is probably also still relevant in some small number of cases. We 
can probably kill -cirrus. That would leave -openchrome, which I think 
is probably only really relevant for OLPC? What's the situation with the 
binary nvidia and amd drivers?

 I would like to not break the vesa driver, while still killing the suid bit on
 the X server.

It's probably worth considering whether porting uvesafb to kms would be 
worthwhile, and then just using -modesetting.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: RFC: what to do with ums when the X server is not suid root ?

2014-01-20 Thread Matthew Garrett
On Mon, Jan 20, 2014 at 04:48:55PM +0100, Hans de Goede wrote:
 Hi,
 On 01/20/2014 03:18 PM, Matthew Garrett wrote:
 -mga is probably also still relevant in some small number of cases.
 
 Don't we've a kms driver for those? Or you mean for mga cards not supported by
 the kms driver?

The KMS driver only supports the g200 cores embedded in some server 
chipsets, it doesn't handle real hardware. We've already dropped 3D 
support for those chips, though, so it's arguably not of great 
importance. The only real difference in functionality by dropping -mga 
would be losing multihead support, and I don't think anyone ever made 
that work on the UMS driver without the HAL blob.

 We can probably kill -cirrus. That would leave -openchrome, which I think
 is probably only really relevant for OLPC? What's the situation with the
 binary nvidia and amd drivers?
 
 Oh, I completely did not think about the binary drivers yet. Ugh. AFAIK those
 are not compatible with kms, so the helper for other ums drivers would just do
 the right thing there since there would be no kms capable card to be found in 
 /dev.

The binary drivers don't need iopl(), so the only real question is 
whether they need root for anything else. It may just be permissions on 
device nodes, in which case we can probably just special-case them?

 It's probably worth considering whether porting uvesafb to kms would be
 worthwhile, and then just using -modesetting.
 
 Yes that is something I was thinking about too, that would be an interesting 
 approach,
 it would make it somewhat harder for people to use binary drivers, but not 
 impossible.

I don't see it being any harder than the blacklisting of nouveau/radeon 
that's already required.

 And then we could simply forget about supporting ums at all I guess.

That would be certainly be a glorious flying-car future.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: RFC: what to do with ums when the X server is not suid root ?

2014-01-20 Thread Matthew Garrett
On Mon, Jan 20, 2014 at 03:58:23PM +, Richard W.M. Jones wrote:
 On Mon, Jan 20, 2014 at 02:18:22PM +, Matthew Garrett wrote:
   We can probably kill -cirrus.
 
 qemu?  (I know that people should be using QXL, but cirrus is still
 the default in plain qemu, and IMHO simpler and more secure.)

We have KMS support for the qemu cirrus, so you can just use 
-modesetting.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: RFC: what to do with ums when the X server is not suid root ?

2014-01-20 Thread Matthew Garrett
On Mon, Jan 20, 2014 at 10:19:30AM -0800, Andrew Lutomirski wrote:

 Does uvesafb actually work?  I submitted a patch to the uvesafb kernel
 driver a few months back, and not only is the upstream link [1][2] to
 the v86d helper dead, but no one on the dri-devel list answered my
 request to see if anyone had a copy.  Fedora does not appear to
 package a copy (at least yum whatprovides '*/v86d' doesn't come up
 with anything).  This means that I got a patch into upstream drm and
 that it's quite possible that no one (or maybe a grand total of one
 person) has ever tested.

It'd be pretty straightforward to re-implement the helper if it's 
vanished entirely - we haven't retired libx86, and the rest is pretty 
trivial.

 Or do you mean the older pre-uvesafb driver?

That's problematic from the You have to provide a fixed resolution on 
the kernel command line perspective.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: RFC: what to do with ums when the X server is not suid root ?

2014-01-20 Thread Matthew Garrett
On Mon, Jan 20, 2014 at 04:50:09PM +, Peter Robinson wrote:

 Isn't -cirrus still used by virt in a number of cases? I know -mga is
 used as a gpu chipset on a number of relatively new server platforms.
 What about -vmware?

Virt can use the cirrus kms driver, the server matrox is supported by 
mgag200 and doesn't the vmwgfx driver cover vmware?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: RFC: what to do with ums when the X server is not suid root ?

2014-01-20 Thread Matthew Garrett
On Mon, Jan 20, 2014 at 10:54:22AM -0800, Andrew Lutomirski wrote:
 On Mon, Jan 20, 2014 at 10:40 AM, Matthew Garrett mj...@srcf.ucam.org wrote:
  It'd be pretty straightforward to re-implement the helper if it's
  vanished entirely - we haven't retired libx86, and the rest is pretty
  trivial.
 
 OTOH, if it has indeed vanished entirely, then maybe we could argue
 that there can't be any users and therefore it's okay if the driver
 stops working in F21.

People are using -vesa right now, not uvesafb.

 Going forward, if the simpledrm stuff ever starts being fully
 functional, then it should provide a working, if rather crappy, way to
 get fixed-resolution graphics running on any new-enough system.

Non-EFI systems are still going to need some mechanism for calling out 
to userspace for setting a mode.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Best practice for multiple version/OS boot?

2013-11-25 Thread Matthew Garrett
On Mon, Nov 25, 2013 at 05:27:34PM +0100, Tomasz Torcz wrote:
 On Mon, Nov 25, 2013 at 08:28:59AM -0700, Pete Travis wrote:
  
  Enough people have asked this sort of question that Chris Roberts and I
  started hacking on a Guide to address it. Suggestions, criticisms, or
  contributions are equally welcome.
  
  [1] https://git.fedorahosted.org/cgit/docs/multiboot-guide.git/
 
   Maybe some GSoC task to implement Boot Loader Spec in GRUB?
 http://www.freedesktop.org/wiki/Specifications/BootLoaderSpec/

We're not going to implement the boot loader spec as written - the EFI 
system partition is always going to remain at /boot/efi, not /boot. This 
is a situation that's already allowed by the spec, so fixing it would 
just be a matter of deleting the section about using the ESP as $BOOT.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Packaging changes for libev in Rawhide

2013-11-23 Thread Matthew Garrett
On Sat, Nov 23, 2013 at 01:47:49PM -0500, Simo Sorce wrote:
 On Tue, 2013-11-19 at 15:30 +0800, Mathieu Bridon wrote:
  Upstream itself requires the pkgconfig file for libev.
  
  That's just a terrible idea, as it means libverto won't build on e.g
  Debian, or with the upstream libev.
  
  libverto should be fixed upstream here IMHO.
 
 Libverto builds against both libevent and libev being a event loop
 abstraction library, if you make libev and libevent conflict libeverto
 cannot be built anymore.

But it requires patches to libev that aren't upstream in order to build? 
One alternative would be to package the libev headers twice, one in the 
upstream location and once in the Fedora-specific location. The latter 
package could then include the pkgconfig file.

This is still a bad solution. If libverto needs to link against both 
then libverto upstream should really work with libev and libevent 
upstream to find a solution that'll work for all distributions, rather 
than being limited to Fedora hacks.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Packaing question: need some includes from kernel source

2013-11-19 Thread Matthew Garrett
On Tue, Nov 19, 2013 at 10:47:12AM -0600, Chris Adams wrote:
 I'm looking at packaing mpt-status (get status info from LSI MPT SAS
 RAID controllers) for Fedora and EPEL.  However, to build, it needs some
 include files from the kernel source, specifically from the
 drivers/message/fusion directory.  I've built an RPM using an extra
 tarball of all the .h files under that directory (using the 3.11.7
 kernel source), and it works (and it also works on an older kernel under
 RHEL 6).

If the headers describe a stable interface that should be used by 
userland then it's a kernel bug that they're not being exported. If they 
don't, you shouldn't use them.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Packaing question: need some includes from kernel source

2013-11-19 Thread Matthew Garrett
On Tue, Nov 19, 2013 at 01:31:20PM -0600, Chris Adams wrote:
 Once upon a time, Matthew Garrett mj...@srcf.ucam.org said:
  If the headers describe a stable interface that should be used by 
  userland then it's a kernel bug that they're not being exported. If they 
  don't, you shouldn't use them.
 
 I believe the headers describe what is intended to be a stable
 interface.  Would that be something I should bring up on linux-kernel?

Probably better to look the driver up in MAINTAINERS and contact the 
people there.

 If the interface is supposed to be stable, asking upstream kernel to
 change isn't going to help make a package any time soon (and likely
 never for EPEL).  Is it permissible to carry the necessary headers in
 the SRPM until they are no longer needed?

From a technical perspective? Sure. Better to do that than add a 
gratuitous additional package.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Draft Workstation WG Governance Charter

2013-10-30 Thread Matthew Garrett
On Wed, Oct 30, 2013 at 09:01:52AM -0400, Josh Boyer wrote:

 The Fedora Workstation Work Group has nine voting members, with one
 member selected by the Fedora Engineering Steering Committee as the
 liaison to FESCo.

Is the FESCo appointed member one of the nine voting members?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Target Display Mode in Fedora

2013-10-15 Thread Matthew Garrett
On Tue, Oct 15, 2013 at 09:36:32AM -0600, Chris Murphy wrote:

 Or maybe Intel would be forthcoming. It's their hardware.

Not in this case. Target display mode is a vendor extension, and 
switching it will be vendor specific.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F20 System Wide Change: ARM as primary Architecture

2013-10-15 Thread Matthew Garrett
On Tue, Oct 15, 2013 at 12:42:44PM -0400, Carlos O'Donell wrote:
 On 10/14/2013 10:55 AM, Matthew Garrett wrote:
  Did the arm32 portions of this end up being completed for F20?
 
 For 32-bit ARM on f20:
 
 - Stack guard:
   - Existing glibc support provides stack guard value in global
 variable and is used by existing runtime. Regression tests are
 passing in glibc testsuite. Verified working. Upstream verified
 that global variable is the best compromise for performance across
 all 32-bit ARM targets (TLS will be too slow in the average case).

What's the effective difference in security between this and the 
existing ports?

 - Pointer mangling:
   - Not supported.

Do we ship it in the x86 ports?

 Upstream glibc 2.19 summary:
 
 - Stack guard support already present using global variable.
 
 - Will have pointer encryption support using global variable, 
   and could be a candidate for backport to f20.

Cool. This is a runtime change, right? There's no requirement for a 
rebuild to take advantage of it?

 Do we need pointer mangling? If so then we need someone to file an
 f20 specific bug so the glibc team can look at backporting the fix.
 I won't commit to it until I review exactly what might need changing.

The aim was for parity of important features, but it doesn't seem like 
we've ever advertised pointer guard as a Fedora feature so I'm not 
personally that worried.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F20 System Wide Change: ARM as primary Architecture

2013-10-15 Thread Matthew Garrett
On Tue, Oct 15, 2013 at 02:16:28PM -0400, Carlos O'Donell wrote:

 Pointer mangling is useful, but we can roll that change into an update
 and it should not in my opinion block F20.
 
 I've filed:
 Bug 1019452 - [ARM] Backport pointer mangling support from upstream.
 https://bugzilla.redhat.com/show_bug.cgi?id=1019452

Great. Thanks, Carlos!

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Target Display Mode in Fedora

2013-10-15 Thread Matthew Garrett
On Tue, Oct 15, 2013 at 11:52:41AM -0600, Chris Murphy wrote:
 
 On Oct 15, 2013, at 10:36 AM, Matthew Garrett mj...@srcf.ucam.org wrote:
 
  On Tue, Oct 15, 2013 at 09:36:32AM -0600, Chris Murphy wrote:
  
  Or maybe Intel would be forthcoming. It's their hardware.
  
  Not in this case. Target display mode is a vendor extension, and 
  switching it will be vendor specific.
 
 
 Too bad. I wonder if this switching extension is being obfuscated from 
 reverse engineering with these smart cables Apple's producing.

I can't see how. It works fine without any kind of special cable.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F20 System Wide Change: ARM as primary Architecture

2013-10-14 Thread Matthew Garrett
On Thu, Jul 11, 2013 at 01:39:21AM -0400, Carlos O'Donell wrote:

 Next steps:
 - Verify libssp works correctly on 32-bit ARM.
 - Look at enhancing the existing support in glibc.
   - Add TLS stack guard.
   - Add TLS pointer guard.
   - Add pointer mangle/demangle support.
 - Enhance aarch64 to support the same set of features.

Did the arm32 portions of this end up being completed for F20?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Fedora Working Groups: Call for Self-Nominations

2013-10-11 Thread Matthew Garrett
On Fri, Oct 11, 2013 at 03:58:41PM +0200, Miloslav Trmač wrote:

 No, the intent was very much to change what the resulting desktop
 prioritizes.  Quite a few FESCo members would be rather disappointed
 if the new Workstation ended up just an unchanged GNOME[1].

? The intent was very much for the working group to set their own 
priorities. I don't see any role for FESCo in making that decision.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Fedora Working Groups: Call for Self-Nominations

2013-10-11 Thread Matthew Garrett
On Fri, Oct 11, 2013 at 03:53:39PM +, Jóhann B. Guðmundsson wrote:

 Did someone even bother to reach out to the community and ask them
 how they would like to move forward?
 ( Not that I recall any thread doing just that )

It was discussed at Flock. It was discussed on this mailing list. The 
community representatives on FESCo and the board discussed it. All of 
this happened in public. Which community do you feel was given no 
opportunity to represent their opinions?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Fedora Working Groups: Call for Self-Nominations

2013-10-11 Thread Matthew Garrett
On Fri, Oct 11, 2013 at 04:19:00PM +, Jóhann B. Guðmundsson wrote:
 On 10/11/2013 03:59 PM, Matthew Garrett wrote:
 community representatives on FESCo and the board discussed it. All of
 this happened in public. Which community do you feel was given no
 opportunity to represent their opinions?
 
 
 For the first not everybody is subscribed to the list, secondly not
 everyone can and never will be able to attend flock or other events.

Fedora development takes place on this list.

 Was there any attempt to reach out to the relevant sub-community was
 there a mail or discussion held on the server list even if only to
 see who where active on it?

Given that the last mail to the server list was over 18 months ago, the 
answer is that there's nobody active on it.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Fedora Working Groups: Call for Self-Nominations

2013-10-11 Thread Matthew Garrett
On Fri, Oct 11, 2013 at 04:33:24PM +, Jóhann B. Guðmundsson wrote:
 On 10/11/2013 04:27 PM, Matthew Garrett wrote:
 Was there any attempt to reach out to the relevant sub-community was
 there a mail or discussion held on the server list even if only to
 see who where active on it?
 Given that the last mail to the server list was over 18 months ago, the
 answer is that there's nobody active on it.
 
 In other words it was not done.

Because there's no active server sub-community. The people interested in 
server work are working within the general Fedora development community, 
which means devel@ is the appropriate list to reach them.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Fedora Working Groups: Call for Self-Nominations

2013-10-11 Thread Matthew Garrett
On Fri, Oct 11, 2013 at 04:47:34PM +, Jóhann B. Guðmundsson wrote:
 On 10/11/2013 04:41 PM, Matthew Garrett wrote:
 Because there's no active server sub-community. The people interested in
 server work are working within the general Fedora development community,
 which means devel@ is the appropriate list to reach them.
 
 That's quite the assumption and based on that I assume the next step
 planned is to kill the server list and just mobiles the people
 interested here right. shrug

If people doing server development work feel that they'd be better doing 
so on a separate mailing list, that option's there. But given the number 
of server-related discussions we've had on this list, they don't seem to 
currently feel that.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Proposal: AppData files in all application packages?

2013-09-13 Thread Matthew Garrett
On Thu, Sep 12, 2013 at 05:39:29PM -0500, Dennis Gilmore wrote:

 I really do not think we can integrate this into our release processes
 right now.

What work would need to be done in order to make it possible to 
integrate this into the release process?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: 19 (Schrödinger’s Cat)

2013-09-05 Thread Matthew Garrett
On Fri, Sep 06, 2013 at 12:33:40AM +0200, Reindl Harald wrote:

 whay is Fedora starting with this crap exatly with the
 release having a short-minded name with special chars
 not properly handeled by the whole OS?

You're sending email to the development mailing list, so you're 
presumably a developer. In which case, perhaps you'd be willing to spend 
the time that you're currently using to send angry mails to the list to 
improve grub's support for Unicode characters when using VGA text mode?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: 19 (Schrödinger’s Cat)

2013-09-05 Thread Matthew Garrett
Maybe something like (the incredibly ugly) 
http://www.codon.org.uk/~mjg59/tmp/mapping.diff

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Graphics driver support in F21+

2013-08-27 Thread Matthew Garrett
On Tue, Aug 27, 2013 at 04:30:25PM -0400, john.flor...@dart.biz wrote:
  From: mj...@srcf.ucam.org
  On Tue, Aug 27, 2013 at 02:54:46PM +, Jóhann B. Guðmundsson wrote:
  
   From this point forward only graphics driver that have kms support
   will be allow to be packaged and shipped in the distribution
  
  Only if you want to drop VESA support.
 
 Please don't drop that.  I have a large install base of SBCs using geode 
 and some on savage and s3virge IIRC.  I need at least the VESA fallback, 
 although I suspect that may not suffice in some cases.

Yeah, I don't think anyone's planning on dropping VESA support. It's 
just that supporting it at the moment means that we continue to support 
some UMS drivers, which makes it difficult to stick to a KMS or 
nothing approach.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Graphics driver support in F21+

2013-08-27 Thread Matthew Garrett
On Tue, Aug 27, 2013 at 02:54:46PM +, Jóhann B. Guðmundsson wrote:

 From this point forward only graphics driver that have kms support
 will be allow to be packaged and shipped in the distribution

Only if you want to drop VESA support.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: BlueZ Status in Fedora.

2013-08-18 Thread Matthew Garrett
On Sun, Aug 18, 2013 at 02:28:34PM -0700, Ryan Rix wrote:

 Basically we ship Fedora 20 in a state where one only of our major desktop 
 environments supports bluetooth in a stable fashion? That seems kind of like 
 a 
 disaster waiting to happen.

The current release blocking desktops are Gnome and KDE. If those are 
broken then F20 doesn't ship - if they're working, it ships. It'd be 
unfortunate to ship a release that doesn't support the non-blocking 
desktops, but (right now) it's fundamentally up to them to provide the 
development effort to ensure that they have a full feature set.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2013-08-14)

2013-08-16 Thread Matthew Garrett
On Thu, Aug 15, 2013 at 03:43:27PM -0400, Jóhann B. Guðmundsson wrote:
 On 08/15/2013 03:16 PM, drago01 wrote:
 Suddenly? They always have been supported that even dates back to
 the Redhat Linux days ...
 
 
 I should clarify what I'm talking about is the discussion of
 officially supporting upgrading while you probably mean it has
 been technically possible which has indeed been available for a long
 time.

It's supported in that it's expected to work, and if it doesn't work 
it's a valid bug and should be fixed or relnoted. That's been the 
intention forever, and like I said, if QA aren't testing that then QA 
should be testing that.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2013-08-14)

2013-08-15 Thread Matthew Garrett
On Thu, Aug 15, 2013 at 09:40:01AM -0400, Paul Wouters wrote:
 On Thu, 15 Aug 2013, Matthew Garrett wrote:
 
 I want increased participation in the creation of Fedora, which is a
 product with a defined set of software shipped as default. I'm also
 happy with people working to make it practical to use Fedora as the
 basis for derived products (such as the spins and remixes), providing
 that they don't compromise the product that we're producing.
 
 I feel that people mostly say fedora is for testing. It is somewhat
 supported by responses to upgrade problems to a new version which
 invariable are along the lines of we don't support that upgrade
 path/method.

What's wrong with fedup?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2013-08-14)

2013-08-15 Thread Matthew Garrett
On Thu, Aug 15, 2013 at 01:02:42PM -0400, Jóhann B. Guðmundsson wrote:

 Well whomever choose to decide that we support upgrades in the
 first place bypassed the QA community entirely in making that
 decision as well as to which tool is preferred,supported or
 recommended.

If QA is testing something other than the supported upgrade mechanism, 
then QA should rectify that. The communication has been very clear - 
if fedup fails to upgrade then that's considered a bug, and if any other 
approach fails then it may not be.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2013-08-14)

2013-08-15 Thread Matthew Garrett
On Thu, Aug 15, 2013 at 03:02:37PM -0400, Jóhann B. Guðmundsson wrote:

 Our release criteria and everything we defined *after* we found out
 that we suddenly supported upgrades is solid which is not what I was
 saying or referring to.

We've always supported upgrades. Before fedup, preupgrade was the 
supported upgrade mechanism. That's been true as long as I've been 
involved in Red Hat.

 Could you point me to the individual(s) and the discussion to
 support upgrades in the first place, took place so we in the QA
 community can finally see who made the decision to open that pandora
 box and why?

Preupgrade was accepted into Fedora 8, so you'd probably need to go back 
and review the feature discussion from then.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2013-08-14)

2013-08-15 Thread Matthew Garrett
Oh, and to clarify - upgrades were supported even before then, but 
required booting Anaconda from new install media. That's been true since 
the Red Hat Linux days, so years before Fedora even existed.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2013-08-14)

2013-08-14 Thread Matthew Garrett
On Wed, Aug 14, 2013 at 05:32:15PM -0400, Jóhann B. Guðmundsson wrote:

 Putting one of those at a higher level by default, by recommendation
 or even just by placing it on the front web page puts the others at
 disadvantage and will hinder growth and participation in the
 relevant sub-communities which will result in worse product and in
 turn will have negative outcome for the project in whole. At least
 that is how I see it.

Some projects are objectively better than other projects. Some projects 
may not be objectively better but are more closely aligned with our 
release schedule and support cycles. Some projects are actively 
developed in Fedora and as such can be more cleanly integrated into the 
distribution.

Making it easier for users to obtain those projects is doing our users a 
service. It is not our responsibility to encourage growth and 
development of other projects that don't make things better for our 
users, and so it's inappropriate to provide equivalent promotion.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2013-08-14)

2013-08-14 Thread Matthew Garrett
On Wed, Aug 14, 2013 at 06:49:17PM -0400, Jóhann B. Guðmundsson wrote:
 On 08/14/2013 06:04 PM, Matthew Garrett wrote:
 Some projects are objectively better than other projects. Some projects
 may not be objectively better but are more closely aligned with our
 release schedule and support cycles. Some projects are actively
 developed in Fedora and as such can be more cleanly integrated into the
 distribution.
 
 As soon as we slip that argument no longer stands and we always slip...

We suck, so we should keep on sucking? Come on. Our inability to 
maintain a schedule is the result of a wide variety of factors that we 
can improve, not an inherent reality.

 Making it easier for users to obtain those projects is doing our users a
 service. It is not our responsibility to encourage growth and
 development of other projects that don't make things better for our
 users, and so it's inappropriate to provide equivalent promotion.
 
 
 You do realize that each sub community is trying to reach out to
 their own target users, even an single application might be reaching
 to a specific target audience so in that perspective there is no
 such thing as our users.

If you visit fedoraproject.org and click on Download now, you'll get a 
64-bit x86 desktop live image. Those are our de-facto target users. The 
proposal under discussion actually broadens that slightly by making it 
clearer that we offer three separate first-class products for three 
different user-cases.

You seem to be arguing for a different scenario, one where arbitrary 
subsets of the Fedora package set are advertised equally. That's not the 
status quo, and so I think you need to follow this proposal's lead and 
come up with a solid argument for how your position improves Fedora and 
what technical and policy changes are needed to get there.

 So in other words what to take from your response is that you are
 saying that you do not want increased participation in the project
 as whole and or only for specific areas of the project?

I want increased participation in the creation of Fedora, which is a 
product with a defined set of software shipped as default. I'm also 
happy with people working to make it practical to use Fedora as the 
basis for derived products (such as the spins and remixes), providing 
that they don't compromise the product that we're producing.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Excludearch/Exclusivearch reminder

2013-08-07 Thread Matthew Garrett
On Wed, Aug 07, 2013 at 02:36:48PM -0600, Kevin Fenzi wrote:

 If you exclude arm support for now, please file a bug against your
 package with the information about the missing arm support and then
 add F-ExcludeArch-arm to the Blocks field on your bug. This will make
 the arm team aware of the issue, as well as FESCo to track what items
 are missing for full primary promotion. 

Did this get set on packages that had ExcludeArch added while Arm was 
still secondary?

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Summary of accepted Fedora 20 Changes - week 30

2013-07-28 Thread Matthew Garrett
On Sun, Jul 28, 2013 at 09:56:16AM +0300, Oron Peled wrote:
 On Saturday 27 July 2013 18:36:23 Matthew Garrett wrote:
  Really? I'd expect most users to be using gmail at this point. Any
  solution needs to account for them as well.
 
 1. By the same logic we can ship just a browser, why bother building
LibreOffice if many use just google-docs?

Because not everyone uses Google Docs, and so any solution needs to 
account for those who don't as well.

 2. People can still use gmail and other online services like twitter
via desktop applications (in my case kmail and choqok respectively).

But most don't, and therefore an error reporting scheme that depends on 
users running a local mail client is inappropriate.

 Last side note: helping non-expert people get used to quality local
 applications which have convenient defaults, is part of the push
 for Freedom -- if both your data and your applications are locked
 in vertical clouds, you aren't left with too much freedom.

There are benefits in running local applications, especially when it 
comes to freedom. However, we are unable to force our users to run local 
applications. We therefore need a mechanism for providing error data to 
users that doesn't require them to run a local application.

-- 
Matthew Garrett | mj...@srcf.ucam.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

  1   2   3   4   5   6   7   >