OpenVPN 2.6 Beta released

2022-12-06 Thread David Sommerseth
Hi, This is just a heads-up that the OpenVPN community has released OpenVPN 2.6 beta 1. While this release includes several nice new features, one important one requires more attention - Kernel based Data Channel Offload (DCO). The DCO support has already been available in the OpenVPN 3 Linux

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Michael Catanzaro via devel
No. He probably doesn't even know about this proposal yet, since it was just published yesterday. This is not the sort of thing that matters for desktop performance, where we care about orders of magnitude rather than a few percent improvement here or there. Even if extra bounds checking makes c

Re: Review Request: ImageMagick7

2022-12-06 Thread Sérgio Basto
On Tue, 2022-12-06 at 11:22 -0500, PGNet Dev wrote: > > > As I said earlier in the thread: of the 25 reverse dependencies of > > the > > ImageMagick libraries, only five don't build[1]. > > > > Further analysis indicates that dvdauthor has a patch in > > openSUSE[2], > > but the fix breaks suppor

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Gary Buhrmaster
On Tue, Dec 6, 2022 at 7:04 PM Michael Catanzaro via devel wrote: > Red Hat's desktop performance engineer Since you bring up RH's performance engineer, have they done performance evaluation on _FORTIFY_SOURCE=3? And while I understand that until the eval is reviewed and reproduced no fina

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Josh Boyer
On Tue, Dec 6, 2022 at 2:01 PM Stephen Smoogen wrote: > > > > On Tue, 6 Dec 2022 at 13:50, Josh Boyer wrote: >> >> On Tue, Dec 6, 2022 at 11:27 AM Neal Gompa wrote: >> > >> > On Tue, Dec 6, 2022 at 7:54 AM Josh Boyer >> > wrote: >> > > >> > > On Tue, Dec 6, 2022 at 1:43 AM Terry Barnaby wrote

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Michael Catanzaro via devel
Red Hat's desktop performance engineer has repeatedly rejected use of DWARF as impractical and outlandish, including on this mailing list [1] and most recently at [2]. [1] https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/UV65DSMPINEE6KWNI5MBH3MBQ26JHNNJ/ [2]

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Richard W.M. Jones
On Tue, Dec 06, 2022 at 05:52:16PM -, Andrii Nakryiko wrote: > > On Tue, Dec 06, 2022 at 03:12:19AM +, Gary Buhrmaster wrote: > > > > Note that is not a fully equivalent scenario. The no-omit-frame-pointer > > proposal was only offering a functional debugging benefit to a fairly > > small

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Tue, Dec 6, 2022 at 12:56 PM Andrii Nakryiko wrote: > > On Tue, Dec 6, 2022 at 10:06 AM Gary Buhrmaster > > > > > My full comment in that blog post is: > > > > "We need a proper study of performance and code size to understand the > > magnitude of the impact created by _FORTIFY_SOURCE=3 additi

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Stephen Smoogen
On Tue, 6 Dec 2022 at 13:50, Josh Boyer wrote: > On Tue, Dec 6, 2022 at 11:27 AM Neal Gompa wrote: > > > > On Tue, Dec 6, 2022 at 7:54 AM Josh Boyer > wrote: > > > > > > On Tue, Dec 6, 2022 at 1:43 AM Terry Barnaby > wrote: > > > > > > > > On 05/12/2022 16:00, Jarek Prokop wrote: > > > > > > >

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread przemek klosowski via devel
Andrii, copilot to pilot, you are responding to Jakub Jelinek's points, not Neal's. Jakub is a compiler/toolchain engineer with considerable experience, so when he talks about compiler technology involved in tracing execution flow, I am inclined to believe him. I understand that your experie

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Jakub Jelinek
On Tue, Dec 06, 2022 at 05:46:11PM -, Andrii Nakryiko wrote: > Now, about prologues/epilogues. What percentage of useful workload is spent > in those? Tiny fraction of a percent at best? Even if we don't get accurate > stack trace in such cases it doesn't matter in the grand scheme of things.

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Andrii Nakryiko
> On Tue, Dec 6, 2022 at 10:06 AM Gary Buhrmaster > > My full comment in that blog post is: > > "We need a proper study of performance and code size to understand the > magnitude of the impact created by _FORTIFY_SOURCE=3 additional > runtime code generation. However the performance and code siz

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Andrii Nakryiko
> On Tue, Dec 06, 2022 at 03:12:19AM +, Gary Buhrmaster wrote: > > Note that is not a fully equivalent scenario. The no-omit-frame-pointer > proposal was only offering a functional debugging benefit to a fairly > small number of users who are also developers, while adding a likely > performanc

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Andrii Nakryiko
> On Tue, Dec 06, 2022 at 08:13:51AM -0500, Neal Gompa wrote: > > That is nonsense. Even with -fno-omit-frame-pointers, you can't rely > on frame pointers, they are not accurate in function prologues and epilogues > and they are total garbage e.g. in a lot of functions written in assembly. First

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Vít Ondruch
Dne 06. 12. 22 v 17:09 Terry Barnaby napsal(a): On 06/12/2022 15:56, Vít Ondruch wrote: Dne 06. 12. 22 v 16:44 Terry Barnaby napsal(a): On 06/12/2022 10:40, Dominik 'Rathann' Mierzejewski wrote: On Tuesday, 06 December 2022 at 07:43, Terry Barnaby wrote: [...] My view is that compat version

Summary/Minutes from today's FESCo Meeting (2022-12-06)

2022-12-06 Thread Miro Hrončok
=== #fedora-meeting: FESCO (2022-12-06) === Meeting started by mhroncok at 17:00:22 UTC. The full logs are available at https://meetbot.fedoraproject.org/fedora-meeting/2022-12-06/fesco.2022-12-06-17.00.log.html . Meeting summary

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Josh Boyer
On Tue, Dec 6, 2022 at 11:27 AM Neal Gompa wrote: > > On Tue, Dec 6, 2022 at 7:54 AM Josh Boyer wrote: > > > > On Tue, Dec 6, 2022 at 1:43 AM Terry Barnaby wrote: > > > > > > On 05/12/2022 16:00, Jarek Prokop wrote: > > > > > > > > > On 12/5/22 14:57, Peter Robinson wrote: > > > > > > On Mon, De

Re: Review Request: ImageMagick7

2022-12-06 Thread Neal Gompa
On Tue, Dec 6, 2022 at 11:30 AM Kevin Kofler via devel wrote: > > Neal Gompa wrote: > > While that is true, *I* don't like doing that if I don't have to. I'd > > rather try to get things fixed upstream in tandem. Upstreams tend to > > appreciate that in my experience. :) > > Sure, but it tends to

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Kevin Kofler via devel
Terry Barnaby wrote: > Well in this case I have created a suitable compat lib, all I did was > re-introduce the bits to the SPEC file that removed the building of the > compat lib and we are fine. I haven't separated it out from the main > ncurses SPEC through and have only done this locally as I h

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Michael Cronenworth
On 12/5/22 5:39 AM, Terry Barnaby wrote: With the latest release of Fedora37 we were hit with an issue where the ncurses-compat-libs RPM had been depreciated. Due to this some of the tools we use would no longer install from their respective RPM's or their tar based installs would not run as th

Re: Review Request: ImageMagick7

2022-12-06 Thread Kevin Kofler via devel
Neal Gompa wrote: > While that is true, *I* don't like doing that if I don't have to. I'd > rather try to get things fixed upstream in tandem. Upstreams tend to > appreciate that in my experience. :) Sure, but it tends to be significantly more work. Upstreams need to support several platforms at

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Neal Gompa
On Tue, Dec 6, 2022 at 7:54 AM Josh Boyer wrote: > > On Tue, Dec 6, 2022 at 1:43 AM Terry Barnaby wrote: > > > > On 05/12/2022 16:00, Jarek Prokop wrote: > > > > > > On 12/5/22 14:57, Peter Robinson wrote: > > > > On Mon, Dec 5, 2022 at 12:01 PM Vitaly Zaitsev via devel > > wrote: > > > > On 05/

Re: Review Request: ImageMagick7

2022-12-06 Thread PGNet Dev
As I said earlier in the thread: of the 25 reverse dependencies of the ImageMagick libraries, only five don't build[1]. Further analysis indicates that dvdauthor has a patch in openSUSE[2], but the fix breaks support for GraphicsMagick as an alternative. I want to rework that patch so it doesn'

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Ewoud Kohl van Wijngaarden
On Tue, Dec 06, 2022 at 03:44:37PM +, Terry Barnaby wrote: On 06/12/2022 10:40, Dominik 'Rathann' Mierzejewski wrote: On Tuesday, 06 December 2022 at 07:43, Terry Barnaby wrote: [...] My view is that compat versions of the commonly used shared libraries for programs that are used on Redhat7

Re: Review Request: ImageMagick7

2022-12-06 Thread Neal Gompa
On Tue, Dec 6, 2022 at 10:49 AM Kevin Kofler via devel wrote: > > Neal Gompa wrote: > > There are actually > > other packages I could fix in Fedora with patches from openSUSE or > > PLD, but they need more work to not break compatibility with building > > with GraphicsMagick (which these packages

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Terry Barnaby
On 06/12/2022 15:56, Vít Ondruch wrote: Dne 06. 12. 22 v 16:44 Terry Barnaby napsal(a): On 06/12/2022 10:40, Dominik 'Rathann' Mierzejewski wrote: On Tuesday, 06 December 2022 at 07:43, Terry Barnaby wrote: [...] My view is that compat versions of the commonly used shared libraries for progra

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Jarek Prokop
Hi, first off, sorry if my write-up seemed a bit harsh, this was the last time I am trying to respond to a change proposal late at night :). On 12/6/22 14:14, Siddhesh Poyarekar wrote: On Mon, Dec 5, 2022 at 7:35 PM Jaroslav Prokop wrote: Default C and C++ compiler flags to build packages i

Re: Review Request: ImageMagick7

2022-12-06 Thread Neal Gompa
On Tue, Dec 6, 2022 at 10:17 AM Michael Cronenworth wrote: > > On 12/6/22 8:31 AM, Neal Gompa wrote: > > There's a very important difference between September 2017 and now: we > > know someone else already did it! > > Great. Good luck. > > > As an aside: I don't appreciate the "high horse" comment

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Vít Ondruch
Dne 06. 12. 22 v 16:44 Terry Barnaby napsal(a): On 06/12/2022 10:40, Dominik 'Rathann' Mierzejewski wrote: On Tuesday, 06 December 2022 at 07:43, Terry Barnaby wrote: [...] My view is that compat versions of the commonly used shared libraries for programs that are used on Redhat7 should be kep

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Gary Buhrmaster
On Tue, Dec 6, 2022 at 3:42 PM Siddhesh Poyarekar wrote: > I have added a performance note[1] in the proposal. Thank you. ___ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora

Re: Review Request: ImageMagick7

2022-12-06 Thread Kevin Kofler via devel
Neal Gompa wrote: > There are actually > other packages I could fix in Fedora with patches from openSUSE or > PLD, but they need more work to not break compatibility with building > with GraphicsMagick (which these packages in question support), so > using IM6 there for now is fine while that gets

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Terry Barnaby
On 06/12/2022 10:40, Dominik 'Rathann' Mierzejewski wrote: On Tuesday, 06 December 2022 at 07:43, Terry Barnaby wrote: [...] My view is that compat versions of the commonly used shared libraries for programs that are used on Redhat7 should be kept available until most people are not producing pr

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Tue, Dec 6, 2022 at 10:26 AM Gary Buhrmaster wrote: > > On Tue, Dec 6, 2022 at 3:16 PM Siddhesh Poyarekar wrote: > > > My full comment in that blog post is: > > > > "We need a proper study of performance and code size to understand the > > magnitude of the impact created by _FORTIFY_SOURCE=3 a

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Gary Buhrmaster
On Tue, Dec 6, 2022 at 3:16 PM Siddhesh Poyarekar wrote: > My full comment in that blog post is: > > "We need a proper study of performance and code size to understand the > magnitude of the impact created by _FORTIFY_SOURCE=3 additional > runtime code generation. However the performance and code

Re: Review Request: ImageMagick7

2022-12-06 Thread Michael Cronenworth
On 12/6/22 8:31 AM, Neal Gompa wrote: There's a very important difference between September 2017 and now: we know someone else already did it! Great. Good luck. As an aside: I don't appreciate the "high horse" comment, considering during most of this discussion, I was doing the work and evalu

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Tue, Dec 6, 2022 at 10:06 AM Gary Buhrmaster wrote: > > On Tue, Dec 6, 2022 at 12:47 PM Siddhesh Poyarekar > wrote: > > > Overall even if there is a miniscule performance overhead, I > > reckon the reward is much higher. > > I am curious how you can claim there is only a > minuscule performan

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Gary Buhrmaster
On Tue, Dec 6, 2022 at 12:47 PM Siddhesh Poyarekar wrote: > Overall even if there is a miniscule performance overhead, I > reckon the reward is much higher. I am curious how you can claim there is only a minuscule performance overhead without doing any benchmarks? I am not claiming the overhead

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Tue, Dec 6, 2022 at 9:55 AM Siddhesh Poyarekar wrote: > > On Tue, Dec 6, 2022 at 8:14 AM Siddhesh Poyarekar wrote: > > > Please provide a proper "how to test" section, I cannot fix what I cannot > > > test or compare results when I have no idea what I am seeing. > > > > > > Actually, last tim

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Tue, Dec 6, 2022 at 8:14 AM Siddhesh Poyarekar wrote: > > Please provide a proper "how to test" section, I cannot fix what I cannot > > test or compare results when I have no idea what I am seeing. > > > > Actually, last time I heard about number of packages, it was around 50k > > (not source

Re: Review Request: ImageMagick7

2022-12-06 Thread Neal Gompa
On Tue, Dec 6, 2022 at 8:26 AM Michael Cronenworth wrote: > > On 12/5/22 5:41 PM, Neal Gompa wrote: > > But in general, it looks like an upgrade to ImageMagick 7 will be > > rather easy to do. > > Hi Neal, > > I appreciate your eagerness here, but it is a little misled. > > Version 7 is radically

Upcoming Fedora Linux 38 deadlines

2022-12-06 Thread Ben Cotton
Hi everyone, As you prepare for the end of the year, it's time to be thinking about your F38 plans. Here are the upcoming F38 Change proposal deadlines: * 2022-12-21: Deadline for Changes requiring infrastructure changes * 2022-12-27: Deadline for System-Wide Changes and Changes requiring a mass

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Tue, Dec 6, 2022 at 5:45 AM Jakub Jelinek wrote: > > On Tue, Dec 06, 2022 at 11:13:38AM +0100, Vitaly Zaitsev via devel wrote: > > On 05/12/2022 20:58, Ben Cotton wrote: > > > Replace the current `_FORTIFY_SOURCE=2` with `_FORTIFY_SOURCE=3` to > > > improve mitigation of security issues arising

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Jakub Jelinek
On Tue, Dec 06, 2022 at 08:13:51AM -0500, Neal Gompa wrote: > "may improve" is proven to be "does improve significantly". We had That is nonsense. Even with -fno-omit-frame-pointers, you can't rely on frame pointers, they are not accurate in function prologues and epilogues and they are total gar

Re: Review Request: ImageMagick7

2022-12-06 Thread Michael Cronenworth
On 12/5/22 5:41 PM, Neal Gompa wrote: But in general, it looks like an upgrade to ImageMagick 7 will be rather easy to do. Hi Neal, I appreciate your eagerness here, but it is a little misled. Version 7 is radically different than version 6. Most (I don't have an exact figure) packages in Fe

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Tue, Dec 6, 2022 at 4:05 AM Richard W.M. Jones wrote: > > On Tue, Dec 06, 2022 at 01:35:04AM +0100, Jaroslav Prokop wrote: > > On 12/5/22 20:58, Ben Cotton wrote: > > > > The core change to bring in this mitigation is to change the default > > build flags in `redhat-rpm-config` so that

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Mon, Dec 5, 2022 at 10:20 PM Gary Buhrmaster wrote: > > On Mon, Dec 5, 2022 at 10:53 PM Neal Gompa wrote: > > > It has a similar impact that turning back on frame pointers would. > > > > Cf. > > https://developers.redhat.com/articles/2022/09/17/gccs-new-fortification-level#the_gains_of_improv

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Mon, Dec 5, 2022 at 7:35 PM Jaroslav Prokop wrote: > Default C and C++ compiler flags to build packages in Fedora currently > includes `-Wp,-D_FORTIFY_SOURCE=2`, which enables fortification of > some functions in glibc, thus providing some mitigation against buffer > overflows. Since glibc 2.3

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Neal Gompa
On Tue, Dec 6, 2022 at 7:50 AM Siddhesh Poyarekar wrote: > > On Mon, Dec 5, 2022 at 5:53 PM Neal Gompa wrote: > > > > On Mon, Dec 5, 2022 at 3:17 PM Gary Buhrmaster > > wrote: > > > > > > On Mon, Dec 5, 2022 at 7:58 PM Ben Cotton wrote: > > > > > > > > https://fedoraproject.org/wiki/Changes/Add

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Josh Boyer
On Tue, Dec 6, 2022 at 1:43 AM Terry Barnaby wrote: > > On 05/12/2022 16:00, Jarek Prokop wrote: > > > On 12/5/22 14:57, Peter Robinson wrote: > > On Mon, Dec 5, 2022 at 12:01 PM Vitaly Zaitsev via devel > wrote: > > On 05/12/2022 12:39, Terry Barnaby wrote: > > I am wondering what Fedora's polic

Re: Review Request: ImageMagick7

2022-12-06 Thread Nico Kadel-Garcia
On Sat, Dec 3, 2022 at 5:57 AM Vitaly Zaitsev via devel wrote: > > On 03/12/2022 00:30, Sérgio Basto wrote: > > The proposal now is to keep ImageMagick 6 and make a new package with > > ImageMagick 7 , when we have all applications use only ImageMagick 7, > > we move the sources from ImageMagick7

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Mon, Dec 5, 2022 at 5:53 PM Neal Gompa wrote: > > On Mon, Dec 5, 2022 at 3:17 PM Gary Buhrmaster > wrote: > > > > On Mon, Dec 5, 2022 at 7:58 PM Ben Cotton wrote: > > > > > > https://fedoraproject.org/wiki/Changes/Add_FORTIFY_SOURCE%3D3_to_distribution_build_flags > > > > > > > It is my vague

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Siddhesh Poyarekar
On Mon, Dec 5, 2022 at 3:17 PM Gary Buhrmaster wrote: > > On Mon, Dec 5, 2022 at 7:58 PM Ben Cotton wrote: > > > > https://fedoraproject.org/wiki/Changes/Add_FORTIFY_SOURCE%3D3_to_distribution_build_flags > > > > It is my vague recollection (I could easily be wrong, so > correct me as appropriate

Re: Review Request: ImageMagick7

2022-12-06 Thread Sérgio Basto
On Sun, 2022-12-04 at 21:06 -0600, Richard Shaw wrote: > On Sun, Dec 4, 2022 at 6:32 PM Sérgio Basto > wrote: > > Final statement, instead of wasting my time and energy on > > arguments, > > Imagemagick7 could already be built on rawhide if someone had done > > the > > package review for me > > >

Re: SPDX Statistics

2022-12-06 Thread Michael J Gruber
> false negative - especially > the *-fonts because they declare the license using macro, which I am unable > to process > (yet).| Can I put the new tags in the same macro, e.g.: ``` %global foundry ADF -%global fontlicense GPLv2+ with exceptions +%global fontlicense GPL-2

Fedora rawhide compose report: 20221206.n.0 changes

2022-12-06 Thread Fedora Rawhide Report
OLD: Fedora-Rawhide-20221205.n.0 NEW: Fedora-Rawhide-20221206.n.0 = SUMMARY = Added images:0 Dropped images: 0 Added packages: 11 Dropped packages:0 Upgraded packages: 109 Downgraded packages: 0 Size of added packages: 3.51 MiB Size of dropped packages:0

Re: Some reasons I really dislike buildroot overrides and would like us to get rid of them soon

2022-12-06 Thread Kevin Kofler via devel
Adam Williamson wrote: > On Mon, 2022-12-05 at 22:44 +0100, Kevin Kofler via devel wrote: >> Mattia Verga via devel wrote: >> > Or let's just get rid of Bodhi and trust all packagers to "know exactly >> > what they are doing with their package". >> >> Yes please! > > Exhibits 1 through 2636 for

Assess impact of package changes with the mass prebuilder

2022-12-06 Thread Frederic Berat
Hello Fedora community, The Christmas period is coming, and soon after the Fedora mass rebuild will come and may lead to the creation of a bunch of FTBFS bugzillas. I'd like to share with you the availability of a tool that we started to develop this year, which aims to help developers to assess

Re: Policy on supporting old and external software packages and compat RPMS

2022-12-06 Thread Dominik 'Rathann' Mierzejewski
On Tuesday, 06 December 2022 at 07:43, Terry Barnaby wrote: [...] > My view is that compat versions of the commonly used shared libraries > for programs that are used on Redhat7 should be kept available until > most people are not producing programs for that system at least > +nyears and then I gue

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Jakub Jelinek
On Tue, Dec 06, 2022 at 11:13:38AM +0100, Vitaly Zaitsev via devel wrote: > On 05/12/2022 20:58, Ben Cotton wrote: > > Replace the current `_FORTIFY_SOURCE=2` with `_FORTIFY_SOURCE=3` to > > improve mitigation of security issues arising from buffer overflows in > > packages in Fedora. > > AFAIK, _

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Vitaly Zaitsev via devel
On 05/12/2022 20:58, Ben Cotton wrote: Replace the current `_FORTIFY_SOURCE=2` with `_FORTIFY_SOURCE=3` to improve mitigation of security issues arising from buffer overflows in packages in Fedora. AFAIK, _FORTIFY_SOURCE=3 enables runtime checks for every mem*() function call. This should resu

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Jarek Prokop
On 12/6/22 10:08, Richard W.M. Jones wrote: On Tue, Dec 06, 2022 at 08:59:03AM +, Richard W.M. Jones wrote: I don't believe the proposal is that everyone *has* to use this (or at least, I hope not). Even existing _FORTIFY_SOURCE=2 is optional. I'd like to know what the problems are that a

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Richard W.M. Jones
On Tue, Dec 06, 2022 at 08:59:03AM +, Richard W.M. Jones wrote: > I don't believe the proposal is that everyone *has* to use this (or at > least, I hope not). Even existing _FORTIFY_SOURCE=2 is optional. I'd > like to know what the problems are that affect systemd however. It's mentioned in

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Richard W.M. Jones
On Tue, Dec 06, 2022 at 01:35:04AM +0100, Jaroslav Prokop wrote: > On 12/5/22 20:58, Ben Cotton wrote: > > The core change to bring in this mitigation is to change the default > build flags in `redhat-rpm-config` so that packages build by default > with `-Wp,-D_FORTIFY_SOURCE=3`. There

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Richard W.M. Jones
On Tue, Dec 06, 2022 at 08:19:22AM +, Daniel P. Berrangé wrote: > On Tue, Dec 06, 2022 at 03:12:19AM +, Gary Buhrmaster wrote: > > On Mon, Dec 5, 2022 at 10:53 PM Neal Gompa wrote: > > > > > It has a similar impact that turning back on frame pointers would. > > > > > > Cf. > > > https://

Re: F38 proposal: Add _FORTIFY_SOURCE=3 to distribution build flags (System-Wide Change proposal)

2022-12-06 Thread Daniel P . Berrangé
On Tue, Dec 06, 2022 at 03:12:19AM +, Gary Buhrmaster wrote: > On Mon, Dec 5, 2022 at 10:53 PM Neal Gompa wrote: > > > It has a similar impact that turning back on frame pointers would. > > > > Cf. > > https://developers.redhat.com/articles/2022/09/17/gccs-new-fortification-level#the_gains_o

Re: Some reasons I really dislike buildroot overrides and would like us to get rid of them soon

2022-12-06 Thread Mattia Verga via devel
Il 06/12/22 00:08, Adam Williamson ha scritto: > On Mon, 2022-12-05 at 22:44 +0100, Kevin Kofler via devel wrote: >> Mattia Verga via devel wrote: >>> Or let's just get rid of Bodhi and trust all packagers to "know exactly >>> what they are doing with their package". >> Yes please! > Exhibits 1 thr