Re: [gentoo-dev] Portage QOS

2014-01-09 Thread heroxbd
Patrick Lauer  writes:

> For python things you really want  python or C instead of C++...

Well, we have boost-python to do python extensions in C++. And yes,
introducing boost as a dependency to portage is not cool.

>> I guess the dep-tree calculation is the slowest part.
> Yes, it's doing lots of silly dynamic things (backtracking), and
> portage codebase on average is not designed for speed.
>
> As a first step I would recommend profiling it and removing unneeded
> stuff (do less work!), rewriting parts in C is a lot of work and not
> needed for the first round of speedups.

Cython[1] can be used to generate C code quickly to avoid spending to much
time coding in C.

1. http://www.cython.org



Re: [gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Rick "Zero_Chaos" Farina
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 07:17 PM, Ryan Hill wrote:
> On Thu, 9 Jan 2014 17:30:46 -0600 Ryan Hill 
> wrote:
> 
>> On Thu, 09 Jan 2014 17:29:26 -0500 "Rick \"Zero_Chaos\" Farina"
>>  wrote:
>> 
>>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA1
>>> 
>>> On 01/09/2014 05:21 PM, Michał Górny wrote:
 Dnia 2014-01-09, o godz. 17:06:52 "Anthony G. Basile"
  napisał(a):
 
> On 01/09/2014 04:57 PM, Pacho Ramos wrote:
>> What are the advantages of disabling SSP to deserve that
>> "special" handling via USE flag or easily disabling it
>> appending the flag?
> 
> There are some cases where ssp could break things.  I know
> of once case right now, but its somewhat exotic.  Also,
> sometimes we *want* to break things for testing.  I'm
> thinking here of instance where we want to test a pax
> hardened kernel to see if it catches abuses of memory which
> would otherwise be caught by executables emitted from a
> hardened toolchain. Take a look at the app-admin/paxtest
> suite.
 
 Just to be clear, are we talking about potential system-wide
 breakage or single, specific packages being broken by SSP? In
 other words, are there cases when people will really want to
 disable SSP completely?
 
 Unless I'm misunderstanding something, your examples sound
 like you just want -fno-stack-protector per-package. I don't
 really think you actually want to rebuild whole gcc just to
 do some testing on a single package...
 
>>> Or just as easily set -fno-stack-protector in CFLAGS in
>>> make.conf.
>>> 
>>> I never felt manipulating cflags with use flags was a great
>>> idea, but in this case is does feel extra pointless.
>>> 
>>> Personally I don't feel this is needed, and the added benefit
>>> of clearing up a bogus "noblah" use flag makes me smile.
>>> 
>>> Zorry, do we really need this flag?
>> 
>> Yes, we do.  I want a way to disable it at a toolchain level.
> 
> Let me clarify.  I would like to be able to disable it without
> relying on CFLAGS or anything the user could fiddle with.  I need a
> big red off switch, at least for now.
> 
> 
I think if you clarify this last statement a lot of the arguments will
vanish.  I believe most of us are happy to hear your thoughts in a
little more detail, and will be swayed by them.

- -Zero
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=YP+O
-END PGP SIGNATURE-



Re: [gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Rick "Zero_Chaos" Farina
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 07:12 PM, Ryan Hill wrote:
> On Thu, 9 Jan 2014 17:41:08 -0600
> William Hubbs  wrote:
> 
>> On Fri, Jan 10, 2014 at 12:30:04AM +0100, Andreas K. Huettel wrote:
>>> Am Freitag, 10. Januar 2014, 00:26:03 schrieb Ryan Hill:

> Please avoid "noblah" use flags.
>
> http://devmanual.gentoo.org/general-concepts/use-flags/
>
> ssp flag that defaults to on is fine.

 This flag already exists and has always worked this way. 
>>>
>>> "already exists and has always worked this way" is not really a good
>>> argument. The rest of the tree sticks to guidelines, so why not here?
>>
>> Agreed again. Saying that something has always worked a certain way in
>> the past is not justification for keeping it working that way,
>> especially when there are preferred ways of doing the same thing that
>> are different.
> 
> Sure, I'm just pointing out that nothing is changing here.  It sounded like
> people were objecting to the addition of a new no* flag.  I agree we should
> change them once we can but that shouldn't block this patch.

To be clear, I don't believe the QA team has any desire to block forward
progress including this patch.
I think everyone is chomping at the bit here to see some improvement on
toolchain getting more up to date, and more with the QA policies that
have been in place for years. I realize eapi 2 wasn't "that long ago"
for some of you, but seriously, it was that long ago.

More to the point, "this specific use flag" appears to have no purpose
what-so-ever.  If a user can do exactly the same with
CFLAGS=-fno-stack-protector in make.conf, and it would be INSANE for a
package to dep on gcc[nossp] then this is has got to be one of the most
useless use flags in gentoo.

Not saying I would block this patch, not saying it has to be this
second, but I see this use flag as a small example of things in
toolchain which could probably be cleaned up if fresh eyes were to see
things.

- -Zero
> 
> 
 We don't have USE defaults yet.
>>>
>>> Now if you had said "we can't use USE defaults yet since current ebuilds
>>> are still at EAPI=0"... that would have been slightly more informative. :)
>>>
>>> (Yes I've seen that there is work going on, and I think that's good. Being 
>>> careful when modernizing makes sense here of course.)
>>
>> Right, I thought someone had updated toolchain.eclass to use a modern
>> eapi, but I hadn't seen any more on that in some time. What's the
>> latest?
> 
> I did, but I can't start using new features until I bring all the ebuilds up 
> to
> a minimum EAPI.  I'm going to start that this weekend.
> 
> 
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=lrYq
-END PGP SIGNATURE-



Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Brian Dolbec
On Thu, 2014-01-09 at 17:52 -0800, Patrick McLean wrote:
> On Fri, 10 Jan 2014 02:19:03 +0100
> Tom Wijsman  wrote:
> 
> > On Fri, 10 Jan 2014 08:31:21 +0800
> > Patrick Lauer  wrote:
> > 
> > > On 01/10/2014 08:16 AM, hero...@gentoo.org wrote:
> > > Last I checked paludis wasn't faster - on average portage was a few
> > > percents faster.
> > 
> 
> > > For python things you really want  python or C instead of C++...
> > 
> > Why is this a Python thing? What's the reason to exclude a language?
> > 
> > > So, what you wanted to ask was:
> > > "Which parts of pkgcore can be migrated into portage?"
> > 
> > Or rather: "What does it take to migrate parts of pkgcore into
> > portage?"
> 
> Why not just switch to using pkgcore as the default package manager.
> radhermit has been doing a lot of work lately getting EAPI 5 support
> added, and generally fixing bugs etc.
> 
> Since we no longer have anyone intimately familiar with the
> portage code, we should just switch to a more modern and readable
> system. Rather than having random people trying to learn the convoluted
> portage code, let's concentrate on getting pkgcore to a point where
> we can replace portage with it.
> 

Patrick  If you wish to be a part of getting pkgcore's eapi 5 fully
working your welcome to start helping out.  I can set you up with access
in the main google code repo.  Radhermit has been working mostly out of
his github account, updating the main repo.

I would very much love to get pkgcore fully functional in eapi 5.

It's speed runs circles around portage and paludis.

I have not been able to help radhermit out as yet, I have been trying to
get some other project cleaned up before delving deeper into pkgcore
code.  I have just recently taken over lead of portage (an interim
position) due to Zac stepping down and away.  So I have that added to my
todo list at the moment too. 

-- 
Brian Dolbec 


signature.asc
Description: This is a digitally signed message part


Re: [gentoo-dev] Portage Feature Request: making thirdpartymirrors easier to manage

2014-01-09 Thread Alec Warner
On Thu, Jan 9, 2014 at 8:58 PM, Michał Górny  wrote:

> Dnia 2014-01-06, o godz. 20:20:03
> "Robin H. Johnson"  napisał(a):
>
> > 2.4. For stack repos/overlays:
> > 2.4.1. No prefix: replace all prior mirrors from masters with new URLS
> in this file.
> > 2.4.2. "-" prefix: remove this URL from the list from masters.
> > 2.4.2. "+" prefix: append this URL to the list from masters.
>
> Just to be clear, what is the exact use case for this? I can't think
> of a really good reason to manipulate mirror lists in subsequent repos.
>
>
I can mostly think of bad reasons, where instead of manipulating the list,
the user should do something else (like use a local mirror.)

-A


> --
> Best regards,
> Michał Górny
>


Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Michał Górny
Dnia 2014-01-09, o godz. 18:59:26
Rich Freeman  napisał(a):

> On Thu, Jan 9, 2014 at 5:29 PM, Rick "Zero_Chaos" Farina
>  wrote:
> > I never felt manipulating cflags with use flags was a great idea, but in
> > this case is does feel extra pointless.
> >
> 
> Tend to agree, though one place I could see it being hypothetically
> useful is if we need to set a use-dep.  That is, package bar might
> have a dep on dev-lib/libfoo[-ssp] (or nossp or whatever).
> 
> However, what I don't know is whether that will be helpful.  If it is,
> then it might make sense to make an exception, otherwise I agree that
> overloading CFLAGS in USE flags is bad.

We're talking about the ssp (nossp) flag on gcc, not target ebuilds.
Ebuilds have to do stuff like '-fno-stack-protector'. The flag on gcc
rebuilds whole gcc just to change the global default.

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


Re: [gentoo-dev] Portage Feature Request: making thirdpartymirrors easier to manage

2014-01-09 Thread Michał Górny
Dnia 2014-01-06, o godz. 20:20:03
"Robin H. Johnson"  napisał(a):

> 2.4. For stack repos/overlays:
> 2.4.1. No prefix: replace all prior mirrors from masters with new URLS in 
> this file.
> 2.4.2. "-" prefix: remove this URL from the list from masters.
> 2.4.2. "+" prefix: append this URL to the list from masters.

Just to be clear, what is the exact use case for this? I can't think
of a really good reason to manipulate mirror lists in subsequent repos.

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


[gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Ryan Hill
On Thu, 09 Jan 2014 21:58:46 +0100
Magnus Granberg  wrote:

> Some time ago we discussed that we should enable stack smashing 
> (-fstack-protector) by default.  So we opened a bug to track this [1].  
> The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips, ppc, 
> ppc64 and arm will be affected by this change. 
> 
> You can turn off ssp by using the nossp USE flag or by adding 
> -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same 
> patch as Debian/Ubuntu but with some Gentoo fixes.
> 
> The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and 
> ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will 
> make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn 
> it on or off with hardened_gcc_works() that will make some sanity checks.

I went ahead and spun a new patchset for the compiler-side stuff if anyone
wants to start playing around.

- apply the eclass patch from bug #484714 (the one attached to Magnus' email
  wouldn't apply for me but maybe my mailer mangled it)
- in gcc-4.8.2.ebuild do:

-PATCH_VER="1.3"
+PATCH_VER="1.4-ssptest"
 
-PIE_VER="0.5.8"
+PIE_VER="0.5.9-ssptest"

BTW Magnus, thanks for doing this.


-- 
Ryan Hillpsn: dirtyepic_sk
   gcc-porting/toolchain/wxwidgets @ gentoo.org

47C3 6D62 4864 0E49 8E9E  7F92 ED38 BD49 957A 8463


signature.asc
Description: PGP signature


Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Tom Wijsman
On Thu, 9 Jan 2014 17:52:16 -0800
Patrick McLean  wrote:

> On Fri, 10 Jan 2014 02:19:03 +0100
> Tom Wijsman  wrote:
> 
> > Or rather: "What does it take to migrate parts of pkgcore into
> > portage?"
> 
> Why not just switch to using pkgcore as the default package manager.

Has anyone switched to pkgcore already?

It needs to work well and be wide tested before it can become a default.

> radhermit has been doing a lot of work lately getting EAPI 5 support
> added, and generally fixing bugs etc.

Are we there yet?

The thing about pkgcore is that it is perceived as running behind; and
with the lack of interest in it due to that, it seems that having it
will take some time before it lifts off the ground. Don't get me wrong,
it eventually will if we pursue it; but, when? It can take time.

> Since we no longer have anyone intimately familiar with the
> portage code, we should just switch to a more modern and readable
> system.

Agreed, but we also should keep Portage alive and kicking until then.

> Rather than having random people trying to learn the
> convoluted portage code, let's concentrate on getting pkgcore to a
> point where we can replace portage with it.

Either way, people need to learn something; and if we can't guarantee
the short term future of Portage before pkgcore becomes usable, the
long term future could rather be out of reach before you know it.

In the short term we should focus on Portage, but in the long term we
should indeed look at one or another replacement; and indeed does
pkgcore soon appear to be the most interesting option here.

To satisfy QA and Portage teams at the same time; I'm going to start
digging into repoman soon as there are 80+ bugs open for it, so in the
short term (days / weeks), I have no plans for pkgcore myself.

From there on I plan to do a software re-engineering style inspection on
the Portage base to learn and understand its convoluted structure; at
that point we can make more educated choices as to which way to go
forward, but until then ... let's just fix as much bugs as time permits.

Don't get me wrong; pkgcore is great, but it takes time for attention
to shift to it as Portage's slowly runs into more legacy code problems.

-- 
With kind regards,

Tom Wijsman (TomWij)
Gentoo Developer

E-mail address  : tom...@gentoo.org
GPG Public Key  : 6D34E57D
GPG Fingerprint : C165 AF18 AB4C 400B C3D2  ABF0 95B2 1FCD 6D34 E57D


signature.asc
Description: PGP signature


Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Patrick McLean
On Fri, 10 Jan 2014 02:19:03 +0100
Tom Wijsman  wrote:

> On Fri, 10 Jan 2014 08:31:21 +0800
> Patrick Lauer  wrote:
> 
> > On 01/10/2014 08:16 AM, hero...@gentoo.org wrote:
> > > Igor  writes:
> > > 
> > >> The ebuilds have approximately the same time to install, the
> > >> failure rate is about the same, emerge is getting slower.
> > > 
> > > I am curious about the slowness of emerge.
> > > 
> > > How about profile the portage and rewrite the time-crucial part in
> > > C/C++, or ideally, borrowing the counterpart from paludis? How
> > > feasible is that?
> > 
> > Last I checked paludis wasn't faster - on average portage was a few
> > percents faster.
> 

> > For python things you really want  python or C instead of C++...
> 
> Why is this a Python thing? What's the reason to exclude a language?
> 
> > So, what you wanted to ask was:
> > "Which parts of pkgcore can be migrated into portage?"
> 
> Or rather: "What does it take to migrate parts of pkgcore into
> portage?"

Why not just switch to using pkgcore as the default package manager.
radhermit has been doing a lot of work lately getting EAPI 5 support
added, and generally fixing bugs etc.

Since we no longer have anyone intimately familiar with the
portage code, we should just switch to a more modern and readable
system. Rather than having random people trying to learn the convoluted
portage code, let's concentrate on getting pkgcore to a point where
we can replace portage with it.

> > > I guess the dep-tree calculation is the slowest part.
> > Yes, it's doing lots of silly dynamic things (backtracking),
> 
> Exactly, without backtracking (which I can live without) it takes
> around half a minute as compared to a lot of minutes; when it started
> to take almost half an hour it was time to completely nuke
> backtracking.
> 
> Now I happily live without ever needing to enable backtracking
> again. :)
> 
> > and portage codebase on average is not designed for speed.
> 
> Yes, inspecting the profiler results has me worried; though I find
> half a minute acceptable for the amount of packages that are involved
> on my system, so, I'm less concerned but it is still interesting that
> there is the possibility to do things faster. It's just some work to
> actually get it to do that, which requires much more dedication, time
> and knowledge than doing an occasional commit.
> 
> > As a first step I would recommend profiling it and removing unneeded
> > stuff (do less work!), rewriting parts in C is a lot of work and not
> > needed for the first round of speedups.
> 
> See my other mail <20140110020218.0f6244d5@TOMWIJ-GENTOO> for recent
> profiling images; we should indeed start with dealing with the low
> hanging fruit (there are quite some 0-2% speed improvements possible),
> as that can get us to speed it up faster than trying to deal with some
> algorithmic complexity that needs far more insight to redesign, let
> alone to properly re-implement it.
> 




Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Tom Wijsman
On Fri, 10 Jan 2014 08:31:21 +0800
Patrick Lauer  wrote:

> On 01/10/2014 08:16 AM, hero...@gentoo.org wrote:
> > Igor  writes:
> > 
> >> The ebuilds have approximately the same time to install, the
> >> failure rate is about the same, emerge is getting slower.
> > 
> > I am curious about the slowness of emerge.
> > 
> > How about profile the portage and rewrite the time-crucial part in
> > C/C++, or ideally, borrowing the counterpart from paludis? How
> > feasible is that?
> 
> Last I checked paludis wasn't faster - on average portage was a few
> percents faster.

Besides that, a different Python version can also differ; I've found
Python 3.3 to be faster for both emerge and repoman. Maybe PyPy can end
up even being faster than that, but that's another subjective story;
though introducing multiple threads in Portage would be really nice,
but the GIL sits in the way:

https://wiki.python.org/moin/GlobalInterpreterLock
http://doc.pypy.org/en/latest/faq.html#does-pypy-have-a-gil-why

> For python things you really want  python or C instead of C++...

Why is this a Python thing? What's the reason to exclude a language?

> So, what you wanted to ask was:
> "Which parts of pkgcore can be migrated into portage?"

Or rather: "What does it take to migrate parts of pkgcore into portage?"

> > I guess the dep-tree calculation is the slowest part.
> Yes, it's doing lots of silly dynamic things (backtracking),

Exactly, without backtracking (which I can live without) it takes
around half a minute as compared to a lot of minutes; when it started
to take almost half an hour it was time to completely nuke backtracking.

Now I happily live without ever needing to enable backtracking again. :)

> and portage codebase on average is not designed for speed.

Yes, inspecting the profiler results has me worried; though I find half
a minute acceptable for the amount of packages that are involved on my
system, so, I'm less concerned but it is still interesting that there
is the possibility to do things faster. It's just some work to actually
get it to do that, which requires much more dedication, time and
knowledge than doing an occasional commit.

> As a first step I would recommend profiling it and removing unneeded
> stuff (do less work!), rewriting parts in C is a lot of work and not
> needed for the first round of speedups.

See my other mail <20140110020218.0f6244d5@TOMWIJ-GENTOO> for recent
profiling images; we should indeed start with dealing with the low
hanging fruit (there are quite some 0-2% speed improvements possible),
as that can get us to speed it up faster than trying to deal with some
algorithmic complexity that needs far more insight to redesign, let
alone to properly re-implement it.

-- 
With kind regards,

Tom Wijsman (TomWij)
Gentoo Developer

E-mail address  : tom...@gentoo.org
GPG Public Key  : 6D34E57D
GPG Fingerprint : C165 AF18 AB4C 400B C3D2  ABF0 95B2 1FCD 6D34 E57D


signature.asc
Description: PGP signature


Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Tom Wijsman
On Fri, 10 Jan 2014 09:16:47 +0900
hero...@gentoo.org wrote:

> Igor  writes:
> 
> > The ebuilds have approximately the same time to install, the failure
> > rate is about the same, emerge is getting slower.
> 
> I am curious about the slowness of emerge.

Try a --backtrack=0 approach, I no longer need to increase it. :)

> How about profile the portage and rewrite the time-crucial part in
> C/C++, or ideally, borrowing the counterpart from paludis? How
> feasible is that?

http://dev.gentoo.org/~tomwij/files/portage-2.2.7-python-2.7-backtrack-0.png
http://dev.gentoo.org/~tomwij/files/portage-2.2.7-python-2.7-backtrack-0-hot.png
http://dev.gentoo.org/~tomwij/files/portage-2.2.7-python-3.3-backtrack-0.png

(hot is the hotshot profiler, it internally checks on the line level
instead; 3.3's profiler is obstructed by module loading, no idea why)

> I guess the dep-tree calculation is the slowest part.

Affirmative.

-- 
With kind regards,

Tom Wijsman (TomWij)
Gentoo Developer

E-mail address  : tom...@gentoo.org
GPG Public Key  : 6D34E57D
GPG Fingerprint : C165 AF18 AB4C 400B C3D2  ABF0 95B2 1FCD 6D34 E57D


signature.asc
Description: PGP signature


Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Patrick Lauer
On 01/10/2014 08:16 AM, hero...@gentoo.org wrote:
> Igor  writes:
> 
>> The ebuilds have approximately the same time to install, the failure
>> rate is about the same, emerge is getting slower.
> 
> I am curious about the slowness of emerge.
> 
> How about profile the portage and rewrite the time-crucial part in
> C/C++, or ideally, borrowing the counterpart from paludis? How feasible
> is that?

Last I checked paludis wasn't faster - on average portage was a few
percents faster.

For python things you really want  python or C instead of C++...

So, what you wanted to ask was:
"Which parts of pkgcore can be migrated into portage?"

> I guess the dep-tree calculation is the slowest part.
Yes, it's doing lots of silly dynamic things (backtracking), and portage
codebase
on average is not designed for speed.

As a first step I would recommend profiling it and removing unneeded
stuff (do less work!), rewriting parts in C is a lot of work and not
needed for the first round of speedups.





Re: [gentoo-dev] Portage QOS

2014-01-09 Thread heroxbd
Hey Igor,

Igor  writes:

> Jeroen, tell me how many users world wide do not prefer to upgrade Gentoo
> on automated basis? There are important servers, and there are many
> cases when after upgrade server stops. Do you remember that recent udev
> change? And there are many similar cases. Imagine that your server
> is running a reactor. So what would you prefer to keep it running the
> reactor as it did flawlessly for 8 years or launch an upgrade taking
> the risks to blast yourself?
>
> Many be it's not only me, but somebody else who is thinking the same?
> Are you sure that the majority of Gentoo users are indulged in
> paranoid automated upgrade and then spending time fixing damage
> that upgrade did?
>
> Do you have a car? Why you don't change EVERY detail in your car on a new
> version on daily basis automatically?
>
> Why don't you change car as soon as a new version is released? Why not
> changing the new mouse, new keyboard, new monitor, new supply daily as
> soon as there is a new version?
>
> Not to mention that you can change daily appearances.

IMHO, the bleeding-edgeness and stability form a balance. We cannot
achieve both. Taking RHEL for example, it uses ancient software for the
sake of stability. Gentoo is way off the other extreme.

For the udev change, the upstream has been doing evil and eudev is not
introduced as the default for Gentoo (yet).

New software breaks things, and security-updated old software needs
extra care: That's the fundamental problem we couldn't circumvent.

Cheers,
Benda



Re: [gentoo-dev] Portage QOS

2014-01-09 Thread heroxbd
Igor  writes:

> The ebuilds have approximately the same time to install, the failure
> rate is about the same, emerge is getting slower.

I am curious about the slowness of emerge.

How about profile the portage and rewrite the time-crucial part in
C/C++, or ideally, borrowing the counterpart from paludis? How feasible
is that?

I guess the dep-tree calculation is the slowest part.



[gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Ryan Hill
On Thu, 9 Jan 2014 17:30:46 -0600
Ryan Hill  wrote:

> On Thu, 09 Jan 2014 17:29:26 -0500
> "Rick \"Zero_Chaos\" Farina"  wrote:
> 
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA1
> > 
> > On 01/09/2014 05:21 PM, Michał Górny wrote:
> > > Dnia 2014-01-09, o godz. 17:06:52
> > > "Anthony G. Basile"  napisał(a):
> > > 
> > >> On 01/09/2014 04:57 PM, Pacho Ramos wrote:
> > >>> What are the advantages of disabling SSP to deserve that "special"
> > >>> handling via USE flag or easily disabling it appending the flag?
> > >>
> > >> There are some cases where ssp could break things.  I know of once case 
> > >> right now, but its somewhat exotic.  Also, sometimes we *want* to break 
> > >> things for testing.  I'm thinking here of instance where we want to test 
> > >> a pax hardened kernel to see if it catches abuses of memory which would 
> > >> otherwise be caught by executables emitted from a hardened toolchain.  
> > >> Take a look at the app-admin/paxtest suite.
> > > 
> > > Just to be clear, are we talking about potential system-wide breakage
> > > or single, specific packages being broken by SSP? In other words, are
> > > there cases when people will really want to disable SSP completely?
> > > 
> > > Unless I'm misunderstanding something, your examples sound like you
> > > just want -fno-stack-protector per-package. I don't really think you
> > > actually want to rebuild whole gcc just to do some testing on a single
> > > package...
> > > 
> > Or just as easily set -fno-stack-protector in CFLAGS in make.conf.
> > 
> > I never felt manipulating cflags with use flags was a great idea, but in
> > this case is does feel extra pointless.
> > 
> > Personally I don't feel this is needed, and the added benefit of
> > clearing up a bogus "noblah" use flag makes me smile.
> > 
> > Zorry, do we really need this flag?
> 
> Yes, we do.  I want a way to disable it at a toolchain level.

Let me clarify.  I would like to be able to disable it without relying on
CFLAGS or anything the user could fiddle with.  I need a big red off switch,
at least for now.


-- 
Ryan Hillpsn: dirtyepic_sk
   gcc-porting/toolchain/wxwidgets @ gentoo.org

47C3 6D62 4864 0E49 8E9E  7F92 ED38 BD49 957A 8463


signature.asc
Description: PGP signature


[gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Ryan Hill
On Thu, 9 Jan 2014 17:41:08 -0600
William Hubbs  wrote:

> On Fri, Jan 10, 2014 at 12:30:04AM +0100, Andreas K. Huettel wrote:
> > Am Freitag, 10. Januar 2014, 00:26:03 schrieb Ryan Hill:
> > >
> > > > Please avoid "noblah" use flags.
> > > > 
> > > > http://devmanual.gentoo.org/general-concepts/use-flags/
> > > > 
> > > > ssp flag that defaults to on is fine.
> > > 
> > > This flag already exists and has always worked this way. 
> > 
> > "already exists and has always worked this way" is not really a good
> > argument. The rest of the tree sticks to guidelines, so why not here?
> 
> Agreed again. Saying that something has always worked a certain way in
> the past is not justification for keeping it working that way,
> especially when there are preferred ways of doing the same thing that
> are different.

Sure, I'm just pointing out that nothing is changing here.  It sounded like
people were objecting to the addition of a new no* flag.  I agree we should
change them once we can but that shouldn't block this patch.


> > > We don't have USE defaults yet.
> > 
> > Now if you had said "we can't use USE defaults yet since current ebuilds
> > are still at EAPI=0"... that would have been slightly more informative. :)
> > 
> > (Yes I've seen that there is work going on, and I think that's good. Being 
> > careful when modernizing makes sense here of course.)
> 
> Right, I thought someone had updated toolchain.eclass to use a modern
> eapi, but I hadn't seen any more on that in some time. What's the
> latest?

I did, but I can't start using new features until I bring all the ebuilds up to
a minimum EAPI.  I'm going to start that this weekend.



-- 
Ryan Hillpsn: dirtyepic_sk
   gcc-porting/toolchain/wxwidgets @ gentoo.org

47C3 6D62 4864 0E49 8E9E  7F92 ED38 BD49 957A 8463


signature.asc
Description: PGP signature


Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Rich Freeman
On Thu, Jan 9, 2014 at 5:29 PM, Rick "Zero_Chaos" Farina
 wrote:
> I never felt manipulating cflags with use flags was a great idea, but in
> this case is does feel extra pointless.
>

Tend to agree, though one place I could see it being hypothetically
useful is if we need to set a use-dep.  That is, package bar might
have a dep on dev-lib/libfoo[-ssp] (or nossp or whatever).

However, what I don't know is whether that will be helpful.  If it is,
then it might make sense to make an exception, otherwise I agree that
overloading CFLAGS in USE flags is bad.

Rich



[gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Ryan Hill
On Thu, 09 Jan 2014 21:58:46 +0100
Magnus Granberg  wrote:

> - use hardened && make_gcc_hard
> + if ( tc_version_is_at_least 4.8 || use hardened ) && ! use vanilla ; 
> then

s/4.8/4.8.2

Or should we wait until the next release (4.8.3 or 4.9.0)?  I think I'd
prefer it but I don't have a good reason.

What gcc-config profiles get installed after this patch?


-- 
Ryan Hillpsn: dirtyepic_sk
   gcc-porting/toolchain/wxwidgets @ gentoo.org

47C3 6D62 4864 0E49 8E9E  7F92 ED38 BD49 957A 8463


signature.asc
Description: PGP signature


Re: [gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread William Hubbs
On Fri, Jan 10, 2014 at 12:30:04AM +0100, Andreas K. Huettel wrote:
> Am Freitag, 10. Januar 2014, 00:26:03 schrieb Ryan Hill:
> >
> > > Please avoid "noblah" use flags.
> > > 
> > > http://devmanual.gentoo.org/general-concepts/use-flags/
> > > 
> > > ssp flag that defaults to on is fine.
> > 
> > This flag already exists and has always worked this way. 
> 
> "already exists and has always worked this way" is not really a good 
> argument. 
> The rest of the tree sticks to guidelines, so why not here?

Agreed again. Saying that something has always worked a certain way in
the past is not justification for keeping it working that way,
especially when there are preferred ways of doing the same thing that
are different.

> > We don't have USE defaults yet.
> 
> Now if you had said "we can't use USE defaults yet since current ebuilds are 
> still at EAPI=0"... that would have been slightly more informative. :)
> 
> (Yes I've seen that there is work going on, and I think that's good. Being 
> careful when modernizing makes sense here of course.)

Right, I thought someone had updated toolchain.eclass to use a modern
eapi, but I hadn't seen any more on that in some time. What's the
latest?

Thanks,

William



signature.asc
Description: Digital signature


Re: [gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Andreas K. Huettel
Am Freitag, 10. Januar 2014, 00:26:03 schrieb Ryan Hill:
>
> > Please avoid "noblah" use flags.
> > 
> > http://devmanual.gentoo.org/general-concepts/use-flags/
> > 
> > ssp flag that defaults to on is fine.
> 
> This flag already exists and has always worked this way. 

"already exists and has always worked this way" is not really a good argument. 
The rest of the tree sticks to guidelines, so why not here?

> We don't have USE defaults yet.

Now if you had said "we can't use USE defaults yet since current ebuilds are 
still at EAPI=0"... that would have been slightly more informative. :)

(Yes I've seen that there is work going on, and I think that's good. Being 
careful when modernizing makes sense here of course.)


-- 

Andreas K. Huettel
Gentoo Linux developer 
dilfri...@gentoo.org
http://www.akhuettel.de/



signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Anthony G. Basile

On 01/09/2014 06:13 PM, Rick "Zero_Chaos" Farina wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 06:01 PM, Anthony G. Basile wrote:

On 01/09/2014 05:21 PM, Michał Górny wrote:

Dnia 2014-01-09, o godz. 17:06:52
"Anthony G. Basile"  napisał(a):


On 01/09/2014 04:57 PM, Pacho Ramos wrote:

What are the advantages of disabling SSP to deserve that "special"
handling via USE flag or easily disabling it appending the flag?

There are some cases where ssp could break things.  I know of once case
right now, but its somewhat exotic.  Also, sometimes we *want* to break
things for testing.  I'm thinking here of instance where we want to test
a pax hardened kernel to see if it catches abuses of memory which would
otherwise be caught by executables emitted from a hardened toolchain.
Take a look at the app-admin/paxtest suite.

Just to be clear, are we talking about potential system-wide breakage
or single, specific packages being broken by SSP? In other words, are
there cases when people will really want to disable SSP completely?

Unless I'm misunderstanding something, your examples sound like you
just want -fno-stack-protector per-package. I don't really think you
actually want to rebuild whole gcc just to do some testing on a single
package...


Correct, you'd only want to turn off ssp per package and then only in
rare cases.  You should never have to rebuild gcc for this.  With ssp on
by default, gcc specs would add -fstack-protector to all builds.  If you
don't want a package build with ssp, then just do
CFLAGS="-fno-stack-protector" and you're building without ssp.


This reads very much like "the nossp use flag is useless".

I was not referring to the nossp flag.  I was simply answering Michał's 
concern about ssp and system wide breakage.  My point is that ssp on by 
default will NOT lead to system wide breakage, only per package and then 
only very very rarely.


--
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail: bluen...@gentoo.org
GnuPG FP  : 1FED FAD9 D82C 52A5 3BAB  DC79 9384 FA6E F52D 4BBA
GnuPG ID  : F52D4BBA




[gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Ryan Hill
On Thu, 09 Jan 2014 17:29:26 -0500
"Rick \"Zero_Chaos\" Farina"  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> On 01/09/2014 05:21 PM, Michał Górny wrote:
> > Dnia 2014-01-09, o godz. 17:06:52
> > "Anthony G. Basile"  napisał(a):
> > 
> >> On 01/09/2014 04:57 PM, Pacho Ramos wrote:
> >>> What are the advantages of disabling SSP to deserve that "special"
> >>> handling via USE flag or easily disabling it appending the flag?
> >>
> >> There are some cases where ssp could break things.  I know of once case 
> >> right now, but its somewhat exotic.  Also, sometimes we *want* to break 
> >> things for testing.  I'm thinking here of instance where we want to test 
> >> a pax hardened kernel to see if it catches abuses of memory which would 
> >> otherwise be caught by executables emitted from a hardened toolchain.  
> >> Take a look at the app-admin/paxtest suite.
> > 
> > Just to be clear, are we talking about potential system-wide breakage
> > or single, specific packages being broken by SSP? In other words, are
> > there cases when people will really want to disable SSP completely?
> > 
> > Unless I'm misunderstanding something, your examples sound like you
> > just want -fno-stack-protector per-package. I don't really think you
> > actually want to rebuild whole gcc just to do some testing on a single
> > package...
> > 
> Or just as easily set -fno-stack-protector in CFLAGS in make.conf.
> 
> I never felt manipulating cflags with use flags was a great idea, but in
> this case is does feel extra pointless.
> 
> Personally I don't feel this is needed, and the added benefit of
> clearing up a bogus "noblah" use flag makes me smile.
> 
> Zorry, do we really need this flag?

Yes, we do.  I want a way to disable it at a toolchain level.


-- 
Ryan Hillpsn: dirtyepic_sk
   gcc-porting/toolchain/wxwidgets @ gentoo.org

47C3 6D62 4864 0E49 8E9E  7F92 ED38 BD49 957A 8463


signature.asc
Description: PGP signature


Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Rick "Zero_Chaos" Farina
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 06:09 PM, Anthony G. Basile wrote:
> On 01/09/2014 05:29 PM, Rick "Zero_Chaos" Farina wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> On 01/09/2014 05:21 PM, Michał Górny wrote:
>>> Dnia 2014-01-09, o godz. 17:06:52
>>> "Anthony G. Basile"  napisał(a):
>>>
 On 01/09/2014 04:57 PM, Pacho Ramos wrote:
> What are the advantages of disabling SSP to deserve that "special"
> handling via USE flag or easily disabling it appending the flag?
 There are some cases where ssp could break things.  I know of once case
 right now, but its somewhat exotic.  Also, sometimes we *want* to break
 things for testing.  I'm thinking here of instance where we want to
 test
 a pax hardened kernel to see if it catches abuses of memory which would
 otherwise be caught by executables emitted from a hardened toolchain.
 Take a look at the app-admin/paxtest suite.
>>> Just to be clear, are we talking about potential system-wide breakage
>>> or single, specific packages being broken by SSP? In other words, are
>>> there cases when people will really want to disable SSP completely?
>>>
>>> Unless I'm misunderstanding something, your examples sound like you
>>> just want -fno-stack-protector per-package. I don't really think you
>>> actually want to rebuild whole gcc just to do some testing on a single
>>> package...
>>>
>> Or just as easily set -fno-stack-protector in CFLAGS in make.conf.
>>
> 
> I just reread this and we'd better be clear here.  With ssp on by
> default in gcc, if you put CFLAGS="...  -fno-stack-protector" in
> make.conf you will build your *entire* system with no ssp.  You probably
> don't want this.  You'll probably only want ssp off on a per package
> basis, in which case, add a line to package.env and set the CFLAGS for
> only that package.
> 
Of course this is EXACTLY the same as building gcc[nossp] which is what
we are discussing. So afaict you and I are in total agreement on all fronts.

- -Zero
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=AtZz
-END PGP SIGNATURE-



[gentoo-dev] Re: [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Ryan Hill
On Thu, 09 Jan 2014 16:11:28 -0500
"Rick \"Zero_Chaos\" Farina"  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> On 01/09/2014 03:58 PM, Magnus Granberg wrote:
> > Hi
> > 
> > Some time ago we discussed that we should enable stack smashing 
> > (-fstack-protector) by default.  So we opened a bug to track this [1].  
> > The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips,
> > ppc, ppc64 and arm will be affected by this change. 
> > 
> > You can turn off ssp by using the nossp USE flag or by adding 
> > -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same 
> > patch as Debian/Ubuntu but with some Gentoo fixes.
> 
> Please avoid "noblah" use flags.
> 
> http://devmanual.gentoo.org/general-concepts/use-flags/
> 
> ssp flag that defaults to on is fine.

This flag already exists and has always worked this way.  We don't have USE
defaults yet.


-- 
Ryan Hillpsn: dirtyepic_sk
   gcc-porting/toolchain/wxwidgets @ gentoo.org

47C3 6D62 4864 0E49 8E9E  7F92 ED38 BD49 957A 8463


signature.asc
Description: PGP signature


Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Rick "Zero_Chaos" Farina
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 06:01 PM, Anthony G. Basile wrote:
> On 01/09/2014 05:21 PM, Michał Górny wrote:
>> Dnia 2014-01-09, o godz. 17:06:52
>> "Anthony G. Basile"  napisał(a):
>>
>>> On 01/09/2014 04:57 PM, Pacho Ramos wrote:
 What are the advantages of disabling SSP to deserve that "special"
 handling via USE flag or easily disabling it appending the flag?
>>> There are some cases where ssp could break things.  I know of once case
>>> right now, but its somewhat exotic.  Also, sometimes we *want* to break
>>> things for testing.  I'm thinking here of instance where we want to test
>>> a pax hardened kernel to see if it catches abuses of memory which would
>>> otherwise be caught by executables emitted from a hardened toolchain.
>>> Take a look at the app-admin/paxtest suite.
>> Just to be clear, are we talking about potential system-wide breakage
>> or single, specific packages being broken by SSP? In other words, are
>> there cases when people will really want to disable SSP completely?
>>
>> Unless I'm misunderstanding something, your examples sound like you
>> just want -fno-stack-protector per-package. I don't really think you
>> actually want to rebuild whole gcc just to do some testing on a single
>> package...
>>
> Correct, you'd only want to turn off ssp per package and then only in
> rare cases.  You should never have to rebuild gcc for this.  With ssp on
> by default, gcc specs would add -fstack-protector to all builds.  If you
> don't want a package build with ssp, then just do
> CFLAGS="-fno-stack-protector" and you're building without ssp.
> 
This reads very much like "the nossp use flag is useless".

Not that Zorry needs to fix that (preexisting and all that) but it
sounds to me like it's safe to remove these types of use flags from
toolchain.

I'm really interested in dirtyepic's opinion though... sir?

Thanks,
Zero
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=6a0w
-END PGP SIGNATURE-



Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Anthony G. Basile

On 01/09/2014 05:29 PM, Rick "Zero_Chaos" Farina wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 05:21 PM, Michał Górny wrote:

Dnia 2014-01-09, o godz. 17:06:52
"Anthony G. Basile"  napisał(a):


On 01/09/2014 04:57 PM, Pacho Ramos wrote:

What are the advantages of disabling SSP to deserve that "special"
handling via USE flag or easily disabling it appending the flag?

There are some cases where ssp could break things.  I know of once case
right now, but its somewhat exotic.  Also, sometimes we *want* to break
things for testing.  I'm thinking here of instance where we want to test
a pax hardened kernel to see if it catches abuses of memory which would
otherwise be caught by executables emitted from a hardened toolchain.
Take a look at the app-admin/paxtest suite.

Just to be clear, are we talking about potential system-wide breakage
or single, specific packages being broken by SSP? In other words, are
there cases when people will really want to disable SSP completely?

Unless I'm misunderstanding something, your examples sound like you
just want -fno-stack-protector per-package. I don't really think you
actually want to rebuild whole gcc just to do some testing on a single
package...


Or just as easily set -fno-stack-protector in CFLAGS in make.conf.



I just reread this and we'd better be clear here.  With ssp on by 
default in gcc, if you put CFLAGS="...  -fno-stack-protector" in 
make.conf you will build your *entire* system with no ssp.  You probably 
don't want this.  You'll probably only want ssp off on a per package 
basis, in which case, add a line to package.env and set the CFLAGS for 
only that package.


--
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail: bluen...@gentoo.org
GnuPG FP  : 1FED FAD9 D82C 52A5 3BAB  DC79 9384 FA6E F52D 4BBA
GnuPG ID  : F52D4BBA




Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Anthony G. Basile

On 01/09/2014 05:29 PM, Rick "Zero_Chaos" Farina wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 05:21 PM, Michał Górny wrote:

Dnia 2014-01-09, o godz. 17:06:52
"Anthony G. Basile"  napisał(a):


On 01/09/2014 04:57 PM, Pacho Ramos wrote:

What are the advantages of disabling SSP to deserve that "special"
handling via USE flag or easily disabling it appending the flag?

There are some cases where ssp could break things.  I know of once case
right now, but its somewhat exotic.  Also, sometimes we *want* to break
things for testing.  I'm thinking here of instance where we want to test
a pax hardened kernel to see if it catches abuses of memory which would
otherwise be caught by executables emitted from a hardened toolchain.
Take a look at the app-admin/paxtest suite.

Just to be clear, are we talking about potential system-wide breakage
or single, specific packages being broken by SSP? In other words, are
there cases when people will really want to disable SSP completely?

Unless I'm misunderstanding something, your examples sound like you
just want -fno-stack-protector per-package. I don't really think you
actually want to rebuild whole gcc just to do some testing on a single
package...


Or just as easily set -fno-stack-protector in CFLAGS in make.conf.

I never felt manipulating cflags with use flags was a great idea, but in
this case is does feel extra pointless.

Personally I don't feel this is needed, and the added benefit of
clearing up a bogus "noblah" use flag makes me smile.

Zorry, do we really need this flag?




toolchain.eclass currently uses nossp as well as nopie.  You'd have to 
rework that to get rid of the flag.


--
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail: bluen...@gentoo.org
GnuPG FP  : 1FED FAD9 D82C 52A5 3BAB  DC79 9384 FA6E F52D 4BBA
GnuPG ID  : F52D4BBA




Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Anthony G. Basile

On 01/09/2014 05:21 PM, Michał Górny wrote:

Dnia 2014-01-09, o godz. 17:06:52
"Anthony G. Basile"  napisał(a):


On 01/09/2014 04:57 PM, Pacho Ramos wrote:

What are the advantages of disabling SSP to deserve that "special"
handling via USE flag or easily disabling it appending the flag?

There are some cases where ssp could break things.  I know of once case
right now, but its somewhat exotic.  Also, sometimes we *want* to break
things for testing.  I'm thinking here of instance where we want to test
a pax hardened kernel to see if it catches abuses of memory which would
otherwise be caught by executables emitted from a hardened toolchain.
Take a look at the app-admin/paxtest suite.

Just to be clear, are we talking about potential system-wide breakage
or single, specific packages being broken by SSP? In other words, are
there cases when people will really want to disable SSP completely?

Unless I'm misunderstanding something, your examples sound like you
just want -fno-stack-protector per-package. I don't really think you
actually want to rebuild whole gcc just to do some testing on a single
package...

Correct, you'd only want to turn off ssp per package and then only in 
rare cases.  You should never have to rebuild gcc for this.  With ssp on 
by default, gcc specs would add -fstack-protector to all builds.  If you 
don't want a package build with ssp, then just do 
CFLAGS="-fno-stack-protector" and you're building without ssp.


--
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail: bluen...@gentoo.org
GnuPG FP  : 1FED FAD9 D82C 52A5 3BAB  DC79 9384 FA6E F52D 4BBA
GnuPG ID  : F52D4BBA




Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Rick "Zero_Chaos" Farina
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 05:21 PM, Michał Górny wrote:
> Dnia 2014-01-09, o godz. 17:06:52
> "Anthony G. Basile"  napisał(a):
> 
>> On 01/09/2014 04:57 PM, Pacho Ramos wrote:
>>> What are the advantages of disabling SSP to deserve that "special"
>>> handling via USE flag or easily disabling it appending the flag?
>>
>> There are some cases where ssp could break things.  I know of once case 
>> right now, but its somewhat exotic.  Also, sometimes we *want* to break 
>> things for testing.  I'm thinking here of instance where we want to test 
>> a pax hardened kernel to see if it catches abuses of memory which would 
>> otherwise be caught by executables emitted from a hardened toolchain.  
>> Take a look at the app-admin/paxtest suite.
> 
> Just to be clear, are we talking about potential system-wide breakage
> or single, specific packages being broken by SSP? In other words, are
> there cases when people will really want to disable SSP completely?
> 
> Unless I'm misunderstanding something, your examples sound like you
> just want -fno-stack-protector per-package. I don't really think you
> actually want to rebuild whole gcc just to do some testing on a single
> package...
> 
Or just as easily set -fno-stack-protector in CFLAGS in make.conf.

I never felt manipulating cflags with use flags was a great idea, but in
this case is does feel extra pointless.

Personally I don't feel this is needed, and the added benefit of
clearing up a bogus "noblah" use flag makes me smile.

Zorry, do we really need this flag?

- -Zero
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=9pZW
-END PGP SIGNATURE-



Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Michał Górny
Dnia 2014-01-09, o godz. 17:06:52
"Anthony G. Basile"  napisał(a):

> On 01/09/2014 04:57 PM, Pacho Ramos wrote:
> > What are the advantages of disabling SSP to deserve that "special"
> > handling via USE flag or easily disabling it appending the flag?
> 
> There are some cases where ssp could break things.  I know of once case 
> right now, but its somewhat exotic.  Also, sometimes we *want* to break 
> things for testing.  I'm thinking here of instance where we want to test 
> a pax hardened kernel to see if it catches abuses of memory which would 
> otherwise be caught by executables emitted from a hardened toolchain.  
> Take a look at the app-admin/paxtest suite.

Just to be clear, are we talking about potential system-wide breakage
or single, specific packages being broken by SSP? In other words, are
there cases when people will really want to disable SSP completely?

Unless I'm misunderstanding something, your examples sound like you
just want -fno-stack-protector per-package. I don't really think you
actually want to rebuild whole gcc just to do some testing on a single
package...

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread William Hubbs
On Thu, Jan 09, 2014 at 04:11:28PM -0500, Rick "Zero_Chaos" Farina wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> On 01/09/2014 03:58 PM, Magnus Granberg wrote:
> > Hi
> > 
> > Some time ago we discussed that we should enable stack smashing 
> > (-fstack-protector) by default.  So we opened a bug to track this [1].  
> > The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips, 
> > ppc, 
> > ppc64 and arm will be affected by this change. 
> > 
> > You can turn off ssp by using the nossp USE flag or by adding 
> > -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same 
> > patch as Debian/Ubuntu but with some Gentoo fixes.
> 
> Please avoid "noblah" use flags.
> 
> http://devmanual.gentoo.org/general-concepts/use-flags/
> 
> ssp flag that defaults to on is fine.

Agreed; please do not introduce this with a "nossp" use flag.

Thanks,

William



signature.asc
Description: Digital signature


Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Pacho Ramos
El jue, 09-01-2014 a las 17:06 -0500, Anthony G. Basile escribió:
> On 01/09/2014 04:57 PM, Pacho Ramos wrote:
> > El jue, 09-01-2014 a las 21:58 +0100, Magnus Granberg escribió:
> >> Hi
> >>
> >> Some time ago we discussed that we should enable stack smashing
> >> (-fstack-protector) by default.  So we opened a bug to track this [1].
> >> The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips, 
> >> ppc,
> >> ppc64 and arm will be affected by this change.
> >>
> >> You can turn off ssp by using the nossp USE flag or by adding
> >> -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same
> >> patch as Debian/Ubuntu but with some Gentoo fixes.
> >>
> >> The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and
> >> ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will
> >> make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn
> >> it on or off with hardened_gcc_works() that will make some sanity checks.
> >>
> >> /Magnus
> > What are the advantages of disabling SSP to deserve that "special"
> > handling via USE flag or easily disabling it appending the flag?
> >
> > Thanks a lot for the info :)
> >
> >
> 
> There are some cases where ssp could break things.  I know of once case 
> right now, but its somewhat exotic.  Also, sometimes we *want* to break 
> things for testing.  I'm thinking here of instance where we want to test 
> a pax hardened kernel to see if it catches abuses of memory which would 
> otherwise be caught by executables emitted from a hardened toolchain.  
> Take a look at the app-admin/paxtest suite.
> 
> 

OK, thanks a lot, I was wondering if I would need to disable SSP on some
of the machines I maintain for some reason. Looks like keeping it
enabled is preferred instead ;)




Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Magnus Granberg
torsdag 09 januari 2014 22.57.09 skrev  Pacho Ramos:
> El jue, 09-01-2014 a las 21:58 +0100, Magnus Granberg escribió:
> > Hi
> > 
> > Some time ago we discussed that we should enable stack smashing
> > (-fstack-protector) by default.  So we opened a bug to track this [1].
> > The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips,
> > ppc, ppc64 and arm will be affected by this change.
> > 
> > You can turn off ssp by using the nossp USE flag or by adding
> > -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same
> > patch as Debian/Ubuntu but with some Gentoo fixes.
> > 
> > The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and
> > ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will
> > make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn
> > it on or off with hardened_gcc_works() that will make some sanity checks.
> > 
> > /Magnus
> 
> What are the advantages of disabling SSP to deserve that "special"
> handling via USE flag or easily disabling it appending the flag?
> 
> Thanks a lot for the info :)

If you want Gcc not to build stuff with ssp as default you turn on the nossp 
flag and rebuild Gcc.

/Magnus




Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Anthony G. Basile

On 01/09/2014 04:57 PM, Pacho Ramos wrote:

El jue, 09-01-2014 a las 21:58 +0100, Magnus Granberg escribió:

Hi

Some time ago we discussed that we should enable stack smashing
(-fstack-protector) by default.  So we opened a bug to track this [1].
The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips, ppc,
ppc64 and arm will be affected by this change.

You can turn off ssp by using the nossp USE flag or by adding
-fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same
patch as Debian/Ubuntu but with some Gentoo fixes.

The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and
ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will
make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn
it on or off with hardened_gcc_works() that will make some sanity checks.

/Magnus

What are the advantages of disabling SSP to deserve that "special"
handling via USE flag or easily disabling it appending the flag?

Thanks a lot for the info :)




There are some cases where ssp could break things.  I know of once case 
right now, but its somewhat exotic.  Also, sometimes we *want* to break 
things for testing.  I'm thinking here of instance where we want to test 
a pax hardened kernel to see if it catches abuses of memory which would 
otherwise be caught by executables emitted from a hardened toolchain.  
Take a look at the app-admin/paxtest suite.



--
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail: bluen...@gentoo.org
GnuPG FP  : 1FED FAD9 D82C 52A5 3BAB  DC79 9384 FA6E F52D 4BBA
GnuPG ID  : F52D4BBA




Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Pacho Ramos
El jue, 09-01-2014 a las 21:58 +0100, Magnus Granberg escribió:
> Hi
> 
> Some time ago we discussed that we should enable stack smashing 
> (-fstack-protector) by default.  So we opened a bug to track this [1].  
> The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips, ppc, 
> ppc64 and arm will be affected by this change. 
> 
> You can turn off ssp by using the nossp USE flag or by adding 
> -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same 
> patch as Debian/Ubuntu but with some Gentoo fixes.
> 
> The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and 
> ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will 
> make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn 
> it on or off with hardened_gcc_works() that will make some sanity checks.
> 
> /Magnus

What are the advantages of disabling SSP to deserve that "special"
handling via USE flag or easily disabling it appending the flag? 

Thanks a lot for the info :)




Re: [gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Rick "Zero_Chaos" Farina
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/09/2014 03:58 PM, Magnus Granberg wrote:
> Hi
> 
> Some time ago we discussed that we should enable stack smashing 
> (-fstack-protector) by default.  So we opened a bug to track this [1].  
> The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips, ppc, 
> ppc64 and arm will be affected by this change. 
> 
> You can turn off ssp by using the nossp USE flag or by adding 
> -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same 
> patch as Debian/Ubuntu but with some Gentoo fixes.

Please avoid "noblah" use flags.

http://devmanual.gentoo.org/general-concepts/use-flags/

ssp flag that defaults to on is fine.

Thanks,
Zero

> 
> The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and 
> ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will 
> make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn 
> it on or off with hardened_gcc_works() that will make some sanity checks.
> 
> /Magnus
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBAgAGBQJSzxCAAAoJEKXdFCfdEflKohoP/iDVryOAlunTvMtrhHYlZAXn
LTPbJRNMQ9bJB8bAd9ECRJ8Q92pAyQt+NyNgUFLtatI+UuiZM6t+dz4K0LcmMQka
n5i6ILdJ14V0BRLGhRz+Xa0ZjpnYRJjCAWrFENTDY6wHc5ni0hSb32xBg84L6j/3
HzNFIWnQOp9dw3hH5OPNQrPXndPVYZMjYTfIADSGx8/4dL9A0GWPY6AXOz08NwuC
oC+zkQi2xSXCb7eHTfkKcIW0TIOF7mFp8Z5LsdW5dm/8nCCLDVH7yxmxVyymyMpb
RnraqCghiv5WOJVsysgivtNPzBwR3ATrNk4dl2qigZSGpJcDEgF2AtSv+YAVb1Ux
wcGOJ5ZJizkMBdAo2pqUBeekXPT/LLWg1EtRvhFI3OLInhbwaHaF9kMWEmhwq2d9
sX6ZfoCmtvn4ZtG3fL++RqyK5QevKOXFCtN2pK9DVMjjgHgp6OtnmVXVCMuZTztI
uqI3XGVvDc0dNIwgxI6KIEfV4/S05Q599hLI49YJVniPknp+sUnsYIdQ+mKztwDf
XON5Fq/Yzt07G1FqZMutEpVMjeTjVckpcLgbFlWz+lO6/xIrqJUgnLUNTXTQf34r
n54Rw+WWIGUWAQqwK3bDh9N2etLzG8p8TqhzEXSCMKXP0sjbX1zzJiYl1roMMpu3
nTFjVJbwpgoaw8OR6FW4
=tSUd
-END PGP SIGNATURE-



Re: [gentoo-dev] Re: Portage QOS

2014-01-09 Thread Chris Reffett
On 01/09/2014 03:42 PM, Igor wrote:
> Hello Duncan,
> 
> Thursday, January 9, 2014, 9:59:50 PM, you wrote:
> 
> Thank you for the reply. I started to comment first... but it was more
> philosophy a mature and grown up, experienced man and I don't think
> I have right to comment it.
> 
> Statistically if you have more users the probability of the system
> survival of any architecture, philosophy or type is higher. People
> learn, they're not fixed and if they at the beginning do not share
> the philosophy of the system but they can use it - they may like it,
> understand it and follow it and support later. Many people I asked
> are not minding to help Gentoo getting better by turning on
> feedback. If you remember - feedback worked well for Perl once and
> many used it and Perl is very traditional.
> 
> It's like a chess game. You have the system in it's prime. There is
> already one fork from Gentoo. There will be more. It's inevitable. You
> have to understand that not all the developers share the same
> philosophy - and it OK.
> And they may fork Gentoo with time and pull half of the team to their
> side.
> 
> When there is a competition between systems with equal philosophy the
> only thing that stands between who is going to live and who is going
> to die is the number of users.
> The fight will focus not around philosophy or system but around gaining
> user support. The competitor can build a better, more friendly system
> sharing basically the same design and he will win it over.
> 
> To keep in power it's in your deepest interest to close the open gates that
> invite competition while the power is in your hands. This is a failure
> many grown up companies made they belive they're forever and gods. I could
> share with you privately with several examples that prove that concept
> wrong.
> 
> Your competitors will build basically the same system targeting the
> same philosophy but more user oriented, friendly. User oriented - means
> each user opinion matters.
> 
> There might be millions of users but each is treated like he is the only one.
> 
> 
> PortageQOS is small step, it's not everything or main part of the
> system, it's a just small contribution. But it will close the door and
> you'll have another peaceful 8 years to rule.
> 
Right here is the big problem: you're not looking at this from the
perspective of the average Gentoo developer. We don't care about market
share. We don't care whether we're on top for another few years. There
are several forks of Gentoo. I doubt most devs care about them. I
personally know that we're not going to compete with Debian, which has a
huge contributor, or Ubuntu or Red Hat, which have whole companies
behind them. You're selling this as if you're selling to a company which
wants to be on the top of the market and beating out competitors, and
that's not what we are. We are a source-based distro that requires some
effort from users, and people want that or they don't want it.
> What we need is a vote YES or NO. If you against it - vote NO. It's
> perfectly normal, if there would be no NO there would be no need voting.
> 
> 
>> Actually, in that regard it's very possible that gentoo's long planned
>> and worked toward cvs-to-git conversion will help finally bust that 
>> barrier for gentoo as well.  Time will tell I guess, but that's one more
>> reason to try to help make it happen.
> 
> 
> 
> 
Chris Reffett



[gentoo-dev] [PATCH] To enable ssp default in Gcc the toolchain.eclass need some changes.

2014-01-09 Thread Magnus Granberg
Hi

Some time ago we discussed that we should enable stack smashing 
(-fstack-protector) by default.  So we opened a bug to track this [1].  
The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips, ppc, 
ppc64 and arm will be affected by this change. 

You can turn off ssp by using the nossp USE flag or by adding 
-fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same 
patch as Debian/Ubuntu but with some Gentoo fixes.

The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and 
ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will 
make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn 
it on or off with hardened_gcc_works() that will make some sanity checks.

/Magnus
2013-12-31  Magnus Granberg  

	# 484714
	We Add -fstack-protector as default

--- a/eclass/toolchain.eclass	2013-12-30 21:21:05.431832881 +0100
+++ b/eclass/toolchain.eclass	2013-12-31 11:34:00.720993536 +0100
@@ -473,7 +473,9 @@ toolchain_src_prepare() {
 	do_gcc_PIE_patches
 	epatch_user
 
-	use hardened && make_gcc_hard
+	if ( tc_version_is_at_least 4.8 || use hardened ) && ! use vanilla ; then
+		make_gcc_hard
+	fi
 
 	# install the libstdc++ python into the right location
 	# http://gcc.gnu.org/PR51368
@@ -606,6 +608,12 @@ do_gcc_PIE_patches() {
 		epatch "${WORKDIR}"/piepatch/def
 	fi
 
+	BRANDING_GCC_PKGVERSION="${BRANDING_GCC_PKGVERSION}, pie-${PIE_VER}"
+}
+
+# configure to build with the hardened GCC specs as the default
+make_gcc_hard() {
+	
 	# we want to be able to control the pie patch logic via something other
 	# than ALL_CFLAGS...
 	sed -e '/^ALL_CFLAGS/iHARD_CFLAGS = ' \
@@ -618,38 +626,38 @@ do_gcc_PIE_patches() {
 -i "${S}"/gcc/Makefile.in
 	fi
 
-	BRANDING_GCC_PKGVERSION="${BRANDING_GCC_PKGVERSION}, pie-${PIE_VER}"
-}
-
-# configure to build with the hardened GCC specs as the default
-make_gcc_hard() {
-	# defaults to enable for all hardened toolchains
-	local gcc_hard_flags="-DEFAULT_RELRO -DEFAULT_BIND_NOW"
-
-	if hardened_gcc_works ; then
-		einfo "Updating gcc to use automatic PIE + SSP building ..."
-		gcc_hard_flags+=" -DEFAULT_PIE_SSP"
-	elif hardened_gcc_works pie ; then
-		einfo "Updating gcc to use automatic PIE building ..."
-		ewarn "SSP has not been enabled by default"
-		gcc_hard_flags+=" -DEFAULT_PIE"
-	elif hardened_gcc_works ssp ; then
-		einfo "Updating gcc to use automatic SSP building ..."
-		ewarn "PIE has not been enabled by default"
-		gcc_hard_flags+=" -DEFAULT_SSP"
+	# defaults to enable for all toolchains
+	local gcc_hard_flags=""
+	if use hardened ; then
+		if hardened_gcc_works ; then
+			einfo "Updating gcc to use automatic PIE + SSP building ..."
+			gcc_hard_flags+=" -DEFAULT_PIE_SSP"
+		elif hardened_gcc_works pie ; then
+			einfo "Updating gcc to use automatic PIE building ..."
+			ewarn "SSP has not been enabled by default"
+			gcc_hard_flags+=" -DEFAULT_PIE"
+		elif hardened_gcc_works ssp ; then
+			einfo "Updating gcc to use automatic SSP building ..."
+			ewarn "PIE has not been enabled by default"
+			gcc_hard_flags+=" -DEFAULT_SSP"
+		else
+			# do nothing if hardened is't supported, but don't die either
+			ewarn "hardened is not supported for this arch in this gcc version"
+			return 0
+		fi
+		# rebrand to make bug reports easier
+		BRANDING_GCC_PKGVERSION=${BRANDING_GCC_PKGVERSION/Gentoo/Gentoo Hardened}
 	else
-		# do nothing if hardened isnt supported, but dont die either
-		ewarn "hardened is not supported for this arch in this gcc version"
-		ebeep
-		return 0
+		if hardened_gcc_works ssp ; then
+			einfo "Updating gcc to use automatic SSP building ..."
+			gcc_hard_flags+=" -DEFAULT_SSP"
+		fi
 	fi
 
 	sed -i \
 		-e "/^HARD_CFLAGS = /s|=|= ${gcc_hard_flags} |" \
 		"${S}"/gcc/Makefile.in || die
 
-	# rebrand to make bug reports easier
-	BRANDING_GCC_PKGVERSION=${BRANDING_GCC_PKGVERSION/Gentoo/Gentoo Hardened}
 }
 
 # This is a historical wart.  The original Gentoo/amd64 port used:


Re: [gentoo-dev] Re: Portage QOS

2014-01-09 Thread Igor
Hello Duncan,

Thursday, January 9, 2014, 9:59:50 PM, you wrote:

Thank you for the reply. I started to comment first... but it was more
philosophy a mature and grown up, experienced man and I don't think
I have right to comment it.

Statistically if you have more users the probability of the system
survival of any architecture, philosophy or type is higher. People
learn, they're not fixed and if they at the beginning do not share
the philosophy of the system but they can use it - they may like it,
understand it and follow it and support later. Many people I asked
are not minding to help Gentoo getting better by turning on
feedback. If you remember - feedback worked well for Perl once and
many used it and Perl is very traditional.

It's like a chess game. You have the system in it's prime. There is
already one fork from Gentoo. There will be more. It's inevitable. You
have to understand that not all the developers share the same
philosophy - and it OK.
And they may fork Gentoo with time and pull half of the team to their
side.

When there is a competition between systems with equal philosophy the
only thing that stands between who is going to live and who is going
to die is the number of users.
The fight will focus not around philosophy or system but around gaining
user support. The competitor can build a better, more friendly system
sharing basically the same design and he will win it over.

To keep in power it's in your deepest interest to close the open gates that
invite competition while the power is in your hands. This is a failure
many grown up companies made they belive they're forever and gods. I could
share with you privately with several examples that prove that concept
wrong.

Your competitors will build basically the same system targeting the
same philosophy but more user oriented, friendly. User oriented - means
each user opinion matters.

There might be millions of users but each is treated like he is the only one.


PortageQOS is small step, it's not everything or main part of the
system, it's a just small contribution. But it will close the door and
you'll have another peaceful 8 years to rule.

What we need is a vote YES or NO. If you against it - vote NO. It's
perfectly normal, if there would be no NO there would be no need voting.


> Actually, in that regard it's very possible that gentoo's long planned
> and worked toward cvs-to-git conversion will help finally bust that 
> barrier for gentoo as well.  Time will tell I guess, but that's one more
> reason to try to help make it happen.




-- 
Best regards,
 Igormailto:lanthrus...@gmail.com




Re: [gentoo-dev] Re: About pam herd status

2014-01-09 Thread Markos Chandras
On 01/09/2014 08:20 PM, Mike Frysinger wrote:
> On Monday 09 December 2013 16:32:09 Markos Chandras wrote:
>> On 12/09/2013 02:21 PM, Diego Elio Pettenò wrote:
>>> On Mon, Dec 9, 2013 at 2:20 PM, Pacho Ramos  wrote:
 Hello

 Is pam team still active? I wonder about this as, recently, we have
 needed to go ahead and fix some bugs related, for example, with pambase
 and pam_ssh

 Thanks for the info :)
>>
>> So I guess it's time to call for maintainers or we should consider
>> merging this herd with another one (base?) to avoid unattended bugs for
>> a long time.
> 
> well, the sep herd was kind of by design ... i didn't want it cluttering up 
> base-system@ and it is super convenient to abdicate all PAM decisions to a 
> single herd.
> -mike
> 
I understand that but if nobody is tracking pam@ then what's the point?

-- 
Regards,
Markos Chandras



Re: [gentoo-dev] Re: About pam herd status

2014-01-09 Thread Diego Elio Pettenò
On 9 January 2014 20:20, Mike Frysinger  wrote:

>
> well, the sep herd was kind of by design ... i didn't want it cluttering up
> base-system@ and it is super convenient to abdicate all PAM decisions to a
> single herd.


Yeah the problem has been that the herd has been fundamentally a single
person, and when said single person asked for the rest of the users
of/providers for PAM to accentrate on a single package, they ignored/worked
around problems instead of reporting/discussing them.

Diego Elio Pettenò — Flameeyes
flamee...@flameeyes.eu — http://blog.flameeyes.eu/


Re: [gentoo-dev] Re: About pam herd status

2014-01-09 Thread Mike Frysinger
On Monday 09 December 2013 16:32:09 Markos Chandras wrote:
> On 12/09/2013 02:21 PM, Diego Elio Pettenò wrote:
> > On Mon, Dec 9, 2013 at 2:20 PM, Pacho Ramos  wrote:
> >> Hello
> >> 
> >> Is pam team still active? I wonder about this as, recently, we have
> >> needed to go ahead and fix some bugs related, for example, with pambase
> >> and pam_ssh
> >> 
> >> Thanks for the info :)
> 
> So I guess it's time to call for maintainers or we should consider
> merging this herd with another one (base?) to avoid unattended bugs for
> a long time.

well, the sep herd was kind of by design ... i didn't want it cluttering up 
base-system@ and it is super convenient to abdicate all PAM decisions to a 
single herd.
-mike


signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-dev] Portage QOS

2014-01-09 Thread yac
On Thu, 9 Jan 2014 11:24:25 +0400
LTHR  wrote:

> Hi All,
> 
> What do you think about implementing this:
> 
> http://forums.gentoo.org/viewtopic.php?p=7477494
> 
> I've system design in my head and could write it down with the
> implementation details. Then may be we could all review it and get to
> something we all agree upon then I could try getting a team and
> implement it.
> 
> Just a brief question - does anyone know how many ebuilds are
> assembled world wide each second?
> 

Hi,

There are some ideas that may be worth pursuing and by bottom up
approach we (me and mainly naota) started turning gentwoo [1]_ [2]_ into
a package usage stats [3]_

.. [1] http://gentwoo.elisp.net/
.. [2] https://github.com/naota/gentwoo
.. [3] https://github.com/gentoo/GenTwoo-backend

---
Jan Matějka| Gentoo Developer
https://gentoo.org | Gentoo Linux
GPG: A33E F5BC A9F6 DAFD 2021  6FB6 3EBF D45B EEB6 CA8B


signature.asc
Description: PGP signature


[gentoo-dev] Re: Portage QOS

2014-01-09 Thread Duncan
Igor posted on Thu, 09 Jan 2014 16:44:02 +0400 as excerpted:

> There is no data to tell what happens with Gentoo (to give that data is
> one of the goals of the project). We only have some formal esteems from
> unreliable sources.
> 
> According to distro watch:
> 
> In February 2012, Gentoo distro was in 19th place.
> In December 2012, Gentoo went to 22nd place.
> In December 2013, Gentoo is down to 32nd place

There was some discussion of this previously.  The conclusion was 
basically that gentooers don't tend to be the trend-watching type, nor, 
really, are we really interested in the trend-watching type, as that's 
not gentoo's base or target user. Instead, our users tend to be 
independent customizers that aren't so interested in what the majority 
thinks, but, rather find gentoo's general support for letting them make 
of their gentoo installation what they will a very good match for their 
needs.  If that's not the best match or if their needs change, the fact 
that gentoo takes more work than many distros because you have to 
actually configure and build it, tends to have them quickly off to some 
other distro that's a better fit for their less time/interest, more 
cookie-cutter needs.

In a way, then, gentoo in the Linux ecosystem is what Linux itself is in 
the more general OS ecosystem, and gentoo tends to get only the self-
selecting independent thinkers who value the ability to make their OS 
what they want while never-the-less automating much of the process (thus 
we aren't Linux from Scratch), in the same way that the same group, but 
to a somewhat lessor extent, tend to be Linux users.

And just as a significant subset of those Linux users and devs value 
their (software) freedom and independence enough to not be willing to 
sacrifice it just to have Linux more popular and maybe exceed MS, so a 
lot of Gentoo users and devs aren't willing to compromise on gentoo's 
ideals of highly customizable individuality just to see us rise in 
rankings such as distro-watch.  If it happens, great, but it won't 
greatly affect the way gentoo is developed, and if it doesn't happen, no 
big deal anyway, since that's not something we consider significant or 
important, particularly /because/ we recognize that sort of user isn't 
what gentoo's targeting in the first place.

> According to Linux Counter
> 
> In January 2012, Gentoo distro had 5.32%
> In January 2012, Gentoo had 4.04%
> In November 2013, Gentoo had 4,21%

I guess one of those January 2012s is supposed to be something 
different...

Same thing here, really, tho the reason is a bit different.

I know *I* certainly haven't registered with linuxcounter, and don't 
expect I ever will, either.  I see it as useless at best, and yet another 
way to be tracked at worst.  (I /do/ deliberately keep my browser's user-
agent string set to Linux instead of setting it to say the latest MS 
Windows version, and deliberately kept 64-bit back when 32-bit was the 
norm for similar reasons, so sites that I visit and thus care about can 
count that, but I most certainly do NOT let the various third-party 
tracing sites do their thing, using tools such as firefox plugins 
noscript, request-policy and cookie permissions, as well as privoxy, to 
help me keep that information out of third-party-tracker's hands.)

Tho interestingly, that does show percentage stabilizing or even 
increasing a bit between the second and third samples.  What it means, 
however, I'm not going to attempt to guess.  For all I know it simply 
means a few gentooers don't object to being tracked as strongly as they 
once did, which is actually slightly disturbing to me, tho it's their 
life so they get to decide, not me.

> And from my experience of Gentoo forums, gentoo.wiki - I vote for Gentoo
> at least not gaining new users.

That would be a more interesting number, there.  But you don't provide 
stats for that one, and personal perception such as yours above for those 
constantly involved is notoriously inaccurate.  Someone who left for a 
couple years and came back tends to see changes much better, for the same 
reason you don't tend to notice changes in a friend as you grow old 
together, unless you're separated for a few years and then meet again.

I wonder what the forums stats counts are.  I know there's mailing list 
activity stats as I've seen them posted occasionally, but I'm not sure if 
there's anything like that for the forums...  That would give us some 
concrete numbers to work with.

> If in several years the number of users is not increased - we can tell
> about stagnation.

As I've personally argued about Linux, if popularity comes at the cost of 
loss of freedom, etc, it's not worth it.  There's worse things than 
seeing numbers stagnate, and losing our ideals in a likely futile pursuit 
of popularity (what's the chances of gentoo topping Red Hat even if we 
forsook all that makes gentoo gentoo and tried? that's not what we're 
good at or care about) is one of them.

> I

Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Igor
Hello Jeroen,

Thursday, January 9, 2014, 7:55:42 PM, you wrote:

I was expecting you a few hours earlier, Jeroen. I knew you
wouldn't resist a terrible temptation remembering the Python Bug
that I filed from the old kernel gentoo.

For your information this is a confirmed bug in Python right now and
it is going to be fixed in 3.5

http://bugs.python.org/issue20065

Jeroen, tell me how many users world wide do not prefer to upgrade Gentoo
on automated basis? There are important servers, and there are many
cases when after upgrade server stops. Do you remember that recent udev
change? And there are many similar cases. Imagine that your server
is running a reactor. So what would you prefer to keep it running the
reactor as it did flawlessly for 8 years or launch an upgrade taking
the risks to blast yourself?

Many be it's not only me, but somebody else who is thinking the same?
Are you sure that the majority of Gentoo users are indulged in
paranoid automated upgrade and then spending time fixing damage
that upgrade did?

Do you have a car? Why you don't change EVERY detail in your car on a new
version on daily basis automatically?

Why don't you change car as soon as a new version is released? Why not
changing the new mouse, new keyboard, new monitor, new supply daily as
soon as there is a new version?

Not to mention that you can change daily appearances.

I belive that each users has the right to decide how to use Gentoo.
I have my reasons not to upgrade some servers.

And you, being a support team has no right to mock on your users
weather they're right or not. You don't make users feel bad, you
help them. One mocked user, another and there is no users to mock
about.

And you need users to mock more than they need you.

>> >> For various reasons many techs were not implemented and now Gentoo
>> >> is in a 
>> > kind of stagnation.
>> 
>> > What do you mean by that in particular? 
>> 
>> Gentoo stopped.

> https://bugs.gentoo.org/show_bug.cgi?id=298754
> https://bugs.gentoo.org/show_bug.cgi?id=439378
> https://bugs.gentoo.org/show_bug.cgi?id=455908
> https://bugs.gentoo.org/show_bug.cgi?id=495002

> It looks like the only thing that is stagnating is your Gentoo Linux
> install.





-- 
Best regards,
 Igormailto:lanthrus...@gmail.com




Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Igor
Hello Ben,

Thursday, January 9, 2014, 7:49:28 PM, you wrote:

True, thanks for noting that.

> "What are distro watch and linux counter and who cares what their opt-in 
> stats gathering says?"

> -most Gentoo users I've ever talked to

> I think if you drop the premise "Gentoo is dying, how do we fix
> it?" and just focus on "Here are some ideas on how we can improve
> Gentoo", you'll get a better response here.  From what I see (IRC
> activity, new ebuild activity, bugzilla activity, etc), our
> community seems stronger than ever.  I think a lot of us are puzzled
> that you think Gentoo has "stopped".  
>  


> You have some great ideas but this is not a sinking ship scenario.



-- 
Best regards,
 Igormailto:lanthrus...@gmail.com




Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Jeroen Roovers
On Thu, 9 Jan 2014 19:26:24 +0400
Igor  wrote:

> >> For various reasons many techs were not implemented and now Gentoo
> >> is in a 
> > kind of stagnation.
> 
> > What do you mean by that in particular? 
> 
> Gentoo stopped.

https://bugs.gentoo.org/show_bug.cgi?id=298754
https://bugs.gentoo.org/show_bug.cgi?id=439378
https://bugs.gentoo.org/show_bug.cgi?id=455908
https://bugs.gentoo.org/show_bug.cgi?id=495002

It looks like the only thing that is stagnating is your Gentoo Linux
install.


 jer



Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Ben Kohler
On Thu, Jan 9, 2014 at 6:44 AM, Igor  wrote:

>
>
> According to distro watch:
>
> ...
> According to Linux Counter
>
> ...
>

"What are distro watch and linux counter and who cares what their opt-in
stats gathering says?"
-most Gentoo users I've ever talked to

I think if you drop the premise "Gentoo is dying, how do we fix it?" and
just focus on "Here are some ideas on how we can improve Gentoo", you'll
get a better response here.  From what I see (IRC activity, new ebuild
activity, bugzilla activity, etc), our community seems stronger than ever.
 I think a lot of us are puzzled that you think Gentoo has "stopped".

You have some great ideas but this is not a sinking ship scenario.

-Ben


Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Igor
Hello Christopher,

Thursday, January 9, 2014, 6:12:37 PM, you wrote:


> you motivate your proposal by claiming the Gentoo Project stagnates which you
> relate with its decline in popularity:

>> According to Linux Counter
>> http://web.archive.org/web/2012010100*/http://linuxcounter.net/distribut
>> ions/stats.html

>> In January 2012, Gentoo distro had 5.32%
>> In January 2012, Gentoo had 4.04%
>> In November 2013, Gentoo had 4,21%

>> And from my experience of Gentoo forums, gentoo.wiki - I vote for Gentoo at
>> least not gaining new users. If in several years the number of users is not
>> increased - we can tell about stagnation.

> But let me ask this question: Is the number of users really that important to
> Gentoo? 

Should be. It looks important for Gentoo and the Gentoo developers.

For Gentoo - the more users Gentoo has the more resources it can deploy 
in development and support. May be the world domination isn't the correct 
word but a steady growth of Gentoo systems globally is a good goal. If Gentoo 
looses 1% annually in 5 years there would be no new developers motivated enough 
to push the project ahead and the old ones would think bad about investing 
their 
life in what is not gaining popularity and they will not be that enthusiastic, 
getting demoralized. Without fresh blood the crucial people will get old/tired 
and alas. 
I'm sure you don't need Gentoo only for yourself as nobody else here does. It's 
a project 
for people, the people get it running and it's the treasure the Gentoo has so 
why not 
to turn towards users? 

Try build a house, tell friends about the house, unite them in one goal and 
then build it for free and for everybody, then if the house is not working well 
- you have friends no more, next time you're alone in one huge house, 
nobody needs, nobody will help and you can't just support it on your own. 

> Since it does not strive for world domination I think all that matters
> is to keep the current userbase happy.

True. That is the goal.
 
> From your thread I do not understand
> whats wrong on that side:

>> For various reasons many techs were not implemented and now Gentoo is in a 
> kind of stagnation.

> What do you mean by that in particular? 

Gentoo stopped. The work is done but it's not a game changer. The 
ebuilds have approximately the same time to install, the failure rate is about 
the same, 
emerge is getting slower. The number of users decrease. 
It looks like this is because it's not clear where to go and what to change. 
What to change 
exactly to bring more users? Not clear. No information.

Apparently the criteria is timing. When you develop a human access interface 
the most 
reliable thing to check your work against is the time required for an average 
user to achieve the goal. 

Time is the most important in our lifes and this is the criteria that always 
works. There 
are a variety of users, with different genetics, different views, education and 
skills but you 
can find an interface that unites them all and everyone is feeling like it's 
easy. It's not an
easy task because what looks easy for a developer might look alien for his 
neighbour. 

If we decrease time required for the users to maintain Gentoo and decrease time 
for developers 
to push the project - then Gentoo will grow.

> And what is wrong with 
> bugs.gentoo.org? Wouldn't it be better to talk about how attract more 
> developers?  

Good question. 
You can't attract enough supporters not being successful or
without paying them. Supporters are the same users if you're loosing
users the number of supporters are decreasing.

The times are changed. The projects are so complicated nowadays that 
keeping them manually is practically impossible. Why drudgery? There 
are numerous jobs with which robots can do better. Human should focus 
on what machines can't do better. 

> I guess a lot unsolved bugs stem from the fact that there are too
> few that can take care of them.

And from all these bugs only 10% are critical 20% are affecting like 
1% of all users and it's not clear what to fix first. 

It's a self balancing system. How do you plan to attract more developers? 
What to offer them?

-- 
Best regards,
 Igormailto:lanthrus...@gmail.com

Re: [gentoo-dev] Portage Feature Request: making thirdpartymirrors easier to manage

2014-01-09 Thread Ben Kohler
On Mon, Jan 6, 2014 at 2:20 PM, Robin H. Johnson  wrote:

> This is a small feature request, but it will require a modification to
> PMS, so I describe it here.
>
> The present thirdpartymirrors file is unwieldy, and difficult to manage
> due to it's format with very long lines. It also doesn't permit easy
> comments. Presently commits to it look very ugly, because diffs are
> line-based, and we pack a lot into each line.
>
> I would like to make it a directory instead of a single file, and extend
> the internal syntax.
>
> I am very excited about this whole idea, this thirdpartymirrors setup
badly needs some reworking.   To me it makes the most sense to turn
thirdpartymirrors into a dir, with a file structure like:

thirdpartymirrors/mirror1
thirdpartymirrors/mirror2
thirdpartymirrors/mirror3/
thirdpartymirrors/mirror3/Asia
thirdpartymirrors/mirror3/Europe
thirdpartymirrors/mirror3/Etc
thirdpartymirrors/mirror4

I'm not sure I see much real value in allowing individual profiles to
add/remove mirrors from each group, to be honest.  Maybe I'm just not
thinking of the right scenarios.

But I really do believe just the basic changes like splitting the file so
each group gets its own file, one server per line, with comments, etc...
will be a huge help in using and maintaining these groups.

-Ben


Re: [gentoo-dev] Portage Feature Request: making thirdpartymirrors easier to manage

2014-01-09 Thread Ben Kohler
On Wed, Jan 8, 2014 at 12:37 PM, Alex Xu  wrote:
>
>
> Eww. Geographically-close files should be made available through
> GENTOO_MIRRORS and the regular distfiles system.
>

I think you may be missing the point of this proposal, or are unaware of
how profiles/thirdpartymirrors and SRC_URI="mirror://.." work.

Readability and maintanence issues aside (which themselves are huge), the
current setup with a list of literally hundreds of geographically-random
mirrors for one source, is quite often doing a disservice to our users.
 Most of the very large upstream mirror list sources are already sorted
geographically, it would be great to take advantage of this.

And to me, it seems like the proposed thirdpartymirrors/mirrorname/
setup seems quite elegant.  I'm sure it would be optional and mirror lists
that can't take advantage of this would just use a flat file at
thirdpartymirrors/mirrorname.

-Ben


Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Christopher Schwan
Hi,

you motivate your proposal by claiming the Gentoo Project stagnates which you 
relate with its decline in popularity:

> According to Linux Counter
> http://web.archive.org/web/2012010100*/http://linuxcounter.net/distribut
> ions/stats.html
> 
> In January 2012, Gentoo distro had 5.32%
> In January 2012, Gentoo had 4.04%
> In November 2013, Gentoo had 4,21%
> 
> And from my experience of Gentoo forums, gentoo.wiki - I vote for Gentoo at
> least not gaining new users. If in several years the number of users is not
> increased - we can tell about stagnation.

But let me ask this question: Is the number of users really that important to 
Gentoo? Since it does not strive for world domination I think all that matters 
is to keep the current userbase happy. From your thread I do not understand 
whats wrong on that side:

> For various reasons many techs were not implemented and now Gentoo is in a 
kind of stagnation.

What do you mean by that in particular? And what is wrong with 
bugs.gentoo.org? Wouldn't it be better to talk about how attract more 
developers? I guess a lot unsolved bugs stem from the fact that there are too 
few that can take care of them.

Cheers,
Christopher


signature.asc
Description: This is a digitally signed message part.


[gentoo-dev] Last rites: net-libs/libguac net-libs/libguac-client-rdp net-libs/libguac-client-vnc net-misc/guacd

2014-01-09 Thread Andreas Schuerch
Due to bug 497262, I will mask the following packages for removal in 30 days.

net-libs/libguac-0.6.3
net-libs/libguac-0.7.0
net-libs/libguac-client-rdp-0.6.2
net-libs/libguac-client-rdp-0.7.0
net-libs/libguac-client-rdp-0.7.1
net-libs/libguac-client-vnc-0.6.1
net-libs/libguac-client-vnc-0.7.0
net-misc/guacd-0.6.2
net-misc/guacd-0.7.0
www-apps/guacamole-0.6.2
www-apps/guacamole-0.7.0
www-apps/guacamole-0.8.0

Since guacamole-0.8.3, only net-misc/guacamole-server & www-apps/guacamole are 
needed.

Br 
Andreas 



Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Igor
Hello Alec,

Thursday, January 9, 2014, 12:12:18 PM, you wrote:


On Wed, Jan 8, 2014 at 11:24 PM, LTHR  wrote:
Hi All,


I want to start off by discussing your premise, before embarking on the overall 
goals.

You wrote:
"I'm with Gentoo for many years. For various reasons many techs were not 
implemented and now Gentoo is in a kind of stagnation. But we can give Gentoo a 
new birth with relatively little efforts and bring the distro to the whole new 
level. "

I don't actually believe your premise of stagnation. But I can put aside my 
disagreement for now.


True. There is no data to tell what happens with Gentoo (to give that data is 
one of the goals of the 
project). We only have some formal esteems from unreliable sources. 

According to distro watch: 

http://web.archive.org/web/2013070100*/http://distrowatch.com/dwres.php?resource=popularity

In February 2012, Gentoo distro was in 19th place. 
In December 2012, Gentoo went to 22nd place. 
In December 2013, Gentoo is down to 32nd place 

According to Linux Counter 
http://web.archive.org/web/2012010100*/http://linuxcounter.net/distributions/stats.html

In January 2012, Gentoo distro had 5.32%
In January 2012, Gentoo had 4.04%
In November 2013, Gentoo had 4,21% 

And from my experience of Gentoo forums, gentoo.wiki - I vote for Gentoo at 
least not gaining new users.
If in several years the number of users is not increased - we can tell about 
stagnation. 

Why new users are not with Gentoo and how to get them - good question, let's 
find out!


 Lets talk about how the overall goal of 'bringing the distro to a whole new 
level' and how 'Portage QoS' will help us get there. I don't think you covered 
these points well in your post (I will talk about the goals more below...)


I'll re-phrase the goals. 

It's all not very well thought after at this stage but immediate goals are like 
this: 


* Knowledge of the number of Gentoo distros installed world wide - knowing the 
trend how many users choose 
  Gentoo and where Gentoo is really going down|up|stands still. 
  
  You can then try different features and see how a feature is met - if the 
number of systems increase 
  then this feature is probably useful. It's a strategical job, somebody at the 
very top of the project should 
  analyze databases and make conclusions. 

* Knowledge of the ebuild popularity - what ebuilds are popular and what are 
not - what ebuild to give an extra focus 
  and what ebuild could wait

* Knowledge of ebuild quality. If some ebuilds fail on many systems - something 
is wrong and ebuild and may be portage 
  need fixing. It's especially useful to make sure that all ebuilds have 
correct dependencies, missing dependencies, etc.

* A formal esteem of portage quality 
  PortageQ = (the number of successful ebuilds/the number of all ebuild 
attempts)

  Portage speed efficiency:  
  Average time before build starts (or download starts)

  How many times portage fails itself. 

* Immediate problem detection. If the number of PortageQ went down last day - 
there is some problem. 
  (then you go to ebuild stats and see what is failing)

* Reducing load on bugtracker folks - the build problems will be detected 
automatically and solved according 
  to their importance. There will be no need to supply bug tracker with ebuild 
logs and emerge --info if 
  somebody wants to report a problem. 

* Team efficiency esteem. The stats will tell what ebuilds are failing most 
often. 

* Team automated info. When failure rate of a certain ebuild increase the 
maintainer is automatically 
  informed and he can login in web-interface and see details how exactly ebuild 
failed. 
  The same for the portage itself. Next day a maintainer could push a new 
ebuild in the portage and the 
  problem might be solved.

  It's not possible not to make mistakes. But it's possible to react on their 
consequences fast. 

* Knowledge what kernels are used by Gentoo users, how often they update their 
systems, what flags 
  are used 

2nd turn goals: 

* to integrate forums.gentoo.org and bug tracker. People are offering great 
workarounds and solutions. But 
  they're not known to the majority of Gentoo users. 

  If a e-build fails - may be there is already a solution - and we can offer 
the solutions automatically from 
  portage. Like:

  There might be some work-arounds on this problem: 
  [Gentoo Forum - qt-core ebuild fails - SOLVED] 
  htpp://forums.gentoo.org/. 

  There is a known bug on this ebuild: 
  [Gentoo Bug - qt-core ebuild fails] 
  htpp://forums.gentoo.org/. 

* to make Bug Tracker almost unmanned. We can use gathered infromation on 
failed e-builds to 
  create bugs in Bug Tracker automatically and automatically set priorities 
according to the 
  severity. 

  The severity could be assigned automatically from package popularity and 
failure rate stats.

  The users with the problems could receive e-mail automatically to follow up 
the quick arounds
  and solutions. 

Re: [gentoo-dev] Portage QOS

2014-01-09 Thread Alec Warner
On Wed, Jan 8, 2014 at 11:24 PM, LTHR  wrote:

>  Hi All,
>
>
I want to start off by discussing your premise, before embarking on the
overall goals.

You wrote:
"I'm with Gentoo for many years. For various reasons many techs were not
implemented and now Gentoo is in a kind of stagnation. But we can give
Gentoo a new birth with relatively little efforts and bring the distro to
the whole new level. "

I don't actually believe your premise of stagnation. But I can put aside my
disagreement for now. Lets talk about how the overall goal of 'bringing the
distro to a whole new level' and how 'Portage QoS' will help us get there.
I don't think you covered these points well in your post (I will talk about
the goals more below...)


> What do you think about implementing this:
>
> http://forums.gentoo.org/viewtopic.php?p=7477494
>
I've system design in my head and could write it down with the
> implementation details.
> Then may be we could all review it and get to something we all agree upon
> then I could
> try getting a team and implement it.
>

Later in your post you wrote about the goals for Porage QoS.

Time we spare time for everyone - users, developers, maintainers.
Quality in 3-5 years we improve GENTOO in a way it will be in top10
distros, the users will be happy
Automatization no time to waste to improve Gentoo for the community,
everyone with GENTOO is part of GENTOO working for GENTOO
Bug Tracking no more we spare resources deployed in the bug tracking
system. It will exist. But's it's will be extended with robotic help from
Portage QOS
Knowledge we will know exactly who, how in what way GENTOO is used and we
will create a system for USERS not vice-versa
Order we will know exactly where to go next and what to do next what focus
on next
Integrity all GENTOO users will be able to participate in project. No
matter what experience they have. We will utilize help of a great number of
supporters.

Time: Portage QoS will save everyone time. I can actually believe this in
an ideal world where developers built automation around a system like
Portage QoS. Ironically I think tool development for *developers* is an
area that we are terrible at. Perhaps Portage QoS will have an awesome
easy-to-use API that makes tool writing a breeze, I don't really know. I
don't think blaming the portage API is necessarily the key to 'all our
tools are terrible' though.

Quality: Portage QoS will improve 'quality'. Again though, we don't really
measure quality in any quantitative way. If we switch to automated
reporting of failures, quality will actually go down, if we count quality
as 'reports of problems' because now reports are automated, rather than
manual. I think the big fear here is that many teams are already
understaffed and the automated system will quickly drown them. I imagine
Portage QoS could solve the 'drowning' problem, but i haven't see many
systems handle it well.

Bug tracking: Spend less resources on bug tracking. I think there is a lot
of missed opportunity for bugs automation. The sad fact is that infra is
terrible in areas like this, because the bug system is very opaque for
non-infra folks and the infra folks involved are not interested / don't
have time to implement the automation. So I will nominally agree here (even
if the automation isn't necessarily Portage QoS;e.g. we have discussed
automated bug assignment for *years*)

Knowledge: So I think in general I agree, insofar as more information can
be helpful in making decisions. I think you should take note that there are
at least 4-5 'gentoo stats' projects that have been tried and my
understanding is that none of them are in operation today.

Future Planning (you wrote: Order): I think this segment sort of
illustrates a misunderstanding of the Gentoo project as it is today. I
don't think developers are necessarily 'confused at how Gentoo is used' or
'do not know what to work on next.' I think developers work on whatever
they find interesting (that is what I do anyway ;p)

Back to the premise of bringing the distro to a whole new level. Some of
the items above I think have merits on their own, but they still don't
guide me to your ultimate goal. You outlined some of what I presume to be
defects in Gentoo today.

Package blocks that portage does not resolve automatically
Slot conflicts that portage does not resolve automatically
Compile failures
...What else?

So part of the Portage QoS system is that users will submit their failures
and Portage QoS will serve as a knowledge base of known issues. To me, that
is still a pretty bad User Experience. Can't we just get portage to handle
these issues transparently, as per
http://forums.gentoo.org/viewtopic-t-977936.html

Just a brief question - does anyone know how many ebuilds are assembled
> world
> wide each second?
>

I bet you more apks are installed per second ;)

-A


>
>
> *--  Best regards,  LTHR  *
> mailto:lanthrus...@gmail.com 
>