Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread Neil Williams
On Sun, 8 May 2016 00:51:57 +0200
Pierre Ynard  wrote:

> > My recommendation would be going to jessie[1], it has whole four
> > years of support left. Anything you need from unstable can be
> > backported.  
> 
> Hopefully the downgrade path would be workable.

Backports can help with that - those are built in stable, so will have
the same compiler options as stable.

Start by commenting out all sources pointing at unstable, add sources
for jessie and jessie-backports and investigate which packages are
installed at a higher version without backports. If some are missing
and you think you need those versions, you can always do a local
backport by rebuilding in jessie and ask on the backports list to see
if someone else needs the same backport. (Leave one source pointing at
deb-src: for testing, source only for backport builds.)
 
> > What kind of solution would you propose? We can't exactly add
> > preinst guards to every single package. The only package that's
> > depended on by (almost) all compiled code is libc6, but because of
> > symbols handling the dependency is usually libc6 (>= 2.15) or such
> > rather than (>= 2.22-7).  
> 
> I was thinking more along the lines of adding some central check in
> dpkg maybe, that detects the lack of i686 support and errors out on
> new, incompatible packages. Discriminating packages could be as
> simple as a by-passable check on the build/release date. But then
> this is a bit late to implement in advance.

It's not about simply blocking installs - the package to be installed is
being upgraded for a reason, so blocking the install just blocks the
bug fix or blocks upgrades of other dependent packages, until the
binary is rebuilt in stable. That's why the advice is to move this box
to stable - ask for backports of any packages which need updates from
testing.

You have four years to decide whether to replace this hardware or
continue running jessie without support.

-- 


Neil Williams
=
http://www.linux.codehelp.co.uk/



pgp3rfDRI8DYQ.pgp
Description: OpenPGP digital signature


Re: Debian i386 architecture now requires a 686-class processor

2016-05-08 Thread Holger Levsen
On Sun, May 08, 2016 at 10:44:29AM +0800, Paul Wise wrote:
> d-d-a is mostly for developers, you might like to reach our users via
> the Debian publicity team:

running unstable is not for users who don't know how to deal with
breakage. dealing with breakage involves reading d-d-a.


-- 
cheers,
Holger


signature.asc
Description: Digital signature


Re: Debian i386 architecture now requires a 686-class processor

2016-05-08 Thread Paul Wise
On Sun, May 8, 2016 at 6:21 PM, Holger Levsen wrote:

> running unstable is not for users who don't know how to deal with
> breakage. dealing with breakage involves reading d-d-a.

I was thinking to give users running affected hardware more warning
than reading the release notes in the next stable release.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread The Wanderer
On 2016-05-08 at 03:45, Neil Williams wrote:

> On Sun, 8 May 2016 00:51:57 +0200 Pierre Ynard 
> wrote:

>> I was thinking more along the lines of adding some central check
>> in dpkg maybe, that detects the lack of i686 support and errors out
>> on new, incompatible packages. Discriminating packages could be as
>> simple as a by-passable check on the build/release date. But then
>> this is a bit late to implement in advance.
> 
> It's not about simply blocking installs - the package to be installed
> is being upgraded for a reason, so blocking the install just blocks
> the bug fix or blocks upgrades of other dependent packages, until
> the binary is rebuilt in stable. That's why the advice is to move
> this box to stable - ask for backports of any packages which need
> updates from testing.
> 
> You have four years to decide whether to replace this hardware or
> continue running jessie without support.

I read this suggestion as being less about this particular box, and more
about preventing (other) people from having this breakage happen
unexpectedly. In this particular case, it's already too late, after all.

Even if running unstable, I would certainly expect that something which
is known to break certain types of systems this badly would be announced
at package install time, giving me a chance to cancel the install... and
the more so considering that people keep talking about tracking sid as
being a reasonable thing to do, although I myself decided years ago from
experience that it was a bad idea.

-- 
   The Wanderer

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man. -- George Bernard Shaw



signature.asc
Description: OpenPGP digital signature


Re: Debian i386 architecture now requires a 686-class processor

2016-05-08 Thread Andreas Metzler
Holger Levsen  wrote:
> On Sun, May 08, 2016 at 10:44:29AM +0800, Paul Wise wrote:
>> d-d-a is mostly for developers, you might like to reach our users via
>> the Debian publicity team:

> running unstable is not for users who don't know how to deal with
> breakage. dealing with breakage involves reading d-d-a.

This is not a sid-exclusive issue, it also applies (or will soon apply)
to testing.

cu Andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'



Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread Marc Haber
On Sun, 08 May 2016 07:18:40 -0400, The Wanderer
 wrote:
>Even if running unstable, I would certainly expect that something which
>is known to break certain types of systems this badly would be announced
>at package install time, giving me a chance to cancel the install... and
>the more so considering that people keep talking about tracking sid as
>being a reasonable thing to do, although I myself decided years ago from
>experience that it was a bad idea.

Tracking sid is a good idea if you can debug and fix breakages. If you
want to be warned for disruptions, use something that we actually
released.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Fingerprint-GUI?

2016-05-08 Thread gregor herrmann
On Sun, 08 May 2016 11:28:50 +0800, Paul Wise wrote:

> > Is there an effort to package fingerprint-GUI?
> Generally you can answer this by looking at wnpp bugs:
> https://www.debian.org/devel/wnpp/
> There is a search interface here:
> http://wnpp.debian.net/

Or from the command line:

% wnpp-check fingerprint
(RFP - #666990) http://bugs.debian.org/666990 fingerprint-gui

(wnpp-check is in the devscripts package.)
 

Cheers,
gregor

-- 
 .''`.  Homepage https://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer -  https://www.debian.org/
 `. `'  Member of VIBE!AT & SPI, fellow of the Free Software Foundation Europe
   `-   NP: Carole King: Home Again


signature.asc
Description: Digital Signature


Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread The Wanderer
On 2016-05-08 at 08:20, Marc Haber wrote:

> On Sun, 08 May 2016 07:18:40 -0400, The Wanderer 
>  wrote:
> 
>> Even if running unstable, I would certainly expect that something
>> which is known to break certain types of systems this badly would
>> be announced at package install time, giving me a chance to cancel
>> the install... and the more so considering that people keep talking
>> about tracking sid as being a reasonable thing to do, although I
>> myself decided years ago from experience that it was a bad idea.
> 
> Tracking sid is a good idea if you can debug and fix breakages. If
> you want to be warned for disruptions, use something that we
> actually released.

I agree, but I have seen people on debian-user advocating tracking sid
by preference over testing as a recommended practice, even to the point
of arguing against people who recommend otherwise. (Of whom I have seen
fewer than I would have expected.)

If the people who have been given this advice have been following it,
there are people out there who certainly do not appear to be technically
competent but who are nonetheless tracking sid.

-- 
   The Wanderer

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man. -- George Bernard Shaw



signature.asc
Description: OpenPGP digital signature


Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread Neil Williams
On Sun, 08 May 2016 07:18:40 -0400
The Wanderer  wrote:

> On 2016-05-08 at 03:45, Neil Williams wrote:
> 
> > On Sun, 8 May 2016 00:51:57 +0200 Pierre Ynard 
> > wrote:  
> 
> Even if running unstable, I would certainly expect that something
> which is known to break certain types of systems this badly would be
> announced at package install time, giving me a chance to cancel the
> install... 

It's unstable - I've been running unstable on my main development
laptop for ten years, most of the time that something has broken my
system, I've had to be the one to report it! Some of those bugs have
caused this level of breakage. It's also an issue of workload and
whether there is a realistic likelihood of that breakage. The
expectation is that users of unstable are not running production
systems and that changes like this can be introduced in unstable with
notices on d-d-a and - if those changes are to get into the release,
the release notes.

Some of the problems can be anticipated (package migrations etc.) and
even some of those go wrong. The rest of the problems in unstable only
become apparent to the maintainer after a bug has been filed.

Some of these problems could disable packages completely but what
happens is a bug report for the version in unstable and a fix in
unstable. That's how unstable works.

When unstable does break like this, users of unstable need to be ready
to downgrade packages themselves, debug the failure themselves, write
sensible bug reports and contribute to stopping that breakage getting
into testing. Unstable does, sometimes, generate a high level
interrupt, I don't see that this is something that can be avoided.
That's why unstable is not suitable for production systems.

I haven't had that many interruptions whilst using unstable, overall,
but enough that I strongly advise any production system to use stable
with backports or possibly testing.

> and the more so considering that people keep talking about
> tracking sid as being a reasonable thing to do, although I myself
> decided years ago from experience that it was a bad idea.

The purpose of sid cannot be fulfilled if nobody uses it but those who
do use it have to accept being the front line for the problems that
need to be fixed before causing problems in testing (and thereby
backports & the next stable).

With current migration priorities, those using unstable only have 5
days to upgrade and test the upgraded packages. Upgrading unstable once
a month doesn't work, once a week is sub-optimal too. I still enjoy
having unstable, I use it to preempt problems in stable and backports
(where my production systems do rely on things working). Unstable is
not suitable for production systems itself and it makes no sense to try
and turn it into some kind of second testing. (Personally, I wouldn't
use testing on production systems either - unless the number and scale
of the backports to stable make that unmanageable.)

-- 


Neil Williams
=
http://www.linux.codehelp.co.uk/



pgpSsToncjCaj.pgp
Description: OpenPGP digital signature


Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread The Wanderer
On 2016-05-08 at 09:09, Neil Williams wrote:

> On Sun, 08 May 2016 07:18:40 -0400 The Wanderer
>  wrote:
> 
>> On 2016-05-08 at 03:45, Neil Williams wrote:
>> 
>>> On Sun, 8 May 2016 00:51:57 +0200 Pierre Ynard
>>>  wrote:
>> 
>> Even if running unstable, I would certainly expect that something
>> which is known to break certain types of systems this badly would
>> be announced at package install time, giving me a chance to cancel
>> the install...
> 
> It's unstable - I've been running unstable on my main development
> laptop for ten years, most of the time that something has broken my
> system, I've had to be the one to report it! Some of those bugs have
> caused this level of breakage.

Yes, that's part of the 'bargain' of running unstable.

The difference is that, presumably, the fact that the change which led
to that breakage would in fact so break things was not known in advance.

I certainly do not expect such notification for every breakage which
occurs in unstable. I was speaking only about cases where the fact that
the breakage would occur was known in advance (which is the case here,
because the breakage is an intentional feature removal), and where the
breakage itself would be "bad enough" (in this case, essentially total).

Off the top of my head, I can't actually think of another case where the
breakage was both known in advance and expected to be total. If this
case really is that unique, that would seem to be a point in favor of
its being exceptional enough to warrant special notification measures.

> It's also an issue of workload and whether there is a realistic
> likelihood of that breakage. The expectation is that users of
> unstable are not running production systems

That expectation is perhaps not being properly communicated to the user
base, then; as mentioned elsewhere, I have seen people who apparently
know what they're doing advocating to people who apparently do not that
tracking unstable is preferable to tracking testing.

-- 
   The Wanderer

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man. -- George Bernard Shaw



signature.asc
Description: OpenPGP digital signature


Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread Adam Borowski
On Sun, May 08, 2016 at 02:20:45PM +0200, Marc Haber wrote:
> Tracking sid is a good idea if you can debug and fix breakages. If you
> want to be warned for disruptions, use something that we actually
> released.

Another way is to use btrfs (or zfs or perhaps LVM snapshots): whenever
something goes south in a way that's not trivial to recover, you can
restore with a couple commands and reboot.  And if unbootable because,
for example, someone removed support for your CPU, you boot with
subvol=backups/sys-2016-05-07.

-- 
How to exploit the Bible for weight loss:
Pr28:25: he that putteth his trust in the ʟᴏʀᴅ shall be made fat.



Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread Adam Borowski
On Sun, May 08, 2016 at 09:00:12AM -0400, The Wanderer wrote:
> I agree, but I have seen people on debian-user advocating tracking sid
> by preference over testing as a recommended practice, even to the point
> of arguing against people who recommend otherwise. (Of whom I have seen
> fewer than I would have expected.)

>From what I've seen, debian-user has a negative signal-to-noise ratio, so
such an advice is not unexpected.

-- 
How to exploit the Bible for weight loss:
Pr28:25: he that putteth his trust in the ʟᴏʀᴅ shall be made fat.



Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread Ben Hutchings
On Sun, 2016-05-08 at 09:36 -0400, The Wanderer wrote:
> On 2016-05-08 at 09:09, Neil Williams wrote:
> 
> > 
> > On Sun, 08 May 2016 07:18:40 -0400 The Wanderer
> >  wrote:
> > 
> > > 
> > > On 2016-05-08 at 03:45, Neil Williams wrote:
> > > 
> > > > 
> > > > On Sun, 8 May 2016 00:51:57 +0200 Pierre Ynard
> > > >  wrote:
> > > Even if running unstable, I would certainly expect that something
> > > which is known to break certain types of systems this badly would
> > > be announced at package install time, giving me a chance to cancel
> > > the install...
> > It's unstable - I've been running unstable on my main development
> > laptop for ten years, most of the time that something has broken my
> > system, I've had to be the one to report it! Some of those bugs have
> > caused this level of breakage.
> Yes, that's part of the 'bargain' of running unstable.
> 
> The difference is that, presumably, the fact that the change which led
> to that breakage would in fact so break things was not known in advance.
> 
> I certainly do not expect such notification for every breakage which
> occurs in unstable. I was speaking only about cases where the fact that
> the breakage would occur was known in advance (which is the case here,
> because the breakage is an intentional feature removal), and where the
> breakage itself would be "bad enough" (in this case, essentially total).
[...]

You should probably blame me for not announcing the decision earlier,
as I proposed and drove this change.  However, the removal of the '586'
kernel flavour should have provided some early warning of the change -
linux-image-586 was changed to depend (indirectly) on
linux-image-4.3.0-1-686, which would fail to boot.  At that time the
old kernel image would remain installed as a fallback, so this was
recoverable.

Ben.

-- 
Ben Hutchings
I haven't lost my mind; it's backed up on tape somewhere.

signature.asc
Description: This is a digitally signed message part


Re: Fingerprint-GUI?

2016-05-08 Thread Marvin Renich
* Andrew Shadura  [160507 17:27]:
> Fingerprint readers are insecure, and that's something that can't be
> fixed. I'd prefer to see fewer fingerprint-related software packages
> in Debian rather than more.

I cringe when I see blanket statements like this from security
advocates.  Instead of saying "get rid of fingerprint readers", your
efforts would be more beneficial if they were directed towards education
of both the downsides of a particular technology and how to determine if
the security problems associated with it outweigh the benefits.

Your statement is analogous to saying that deadbolts are not going to
stop an experienced burglar who has cased your house, so all hardware
stores should stop selling deadbolts and only sell bank-vault-style door
locks.

I know of at least one fast food chain that uses fingerprint readers to
allow their employees to clock in and out.  Can an employee take
advantage of the insecurity of fingerprint readers to get a coworker to
clock him in early?  Probably.  If he does it regularly, will he get
caught?  Probably.  Do the risks to the fast food chain outweigh the
convenience of the technology?  I seriously doubt it.

I would like to see security advocates espousing use-case-based
security, rather than just saying "it isn't secure, so don't use it."

...Marvin



Re: Bug#823465: dpkg: Won't run at all on i586 Pentium MMX due to illegal instruction

2016-05-08 Thread Marc Haber
On Sun, 8 May 2016 16:40:22 +0200, Adam Borowski 
wrote:
>On Sun, May 08, 2016 at 02:20:45PM +0200, Marc Haber wrote:
>> Tracking sid is a good idea if you can debug and fix breakages. If you
>> want to be warned for disruptions, use something that we actually
>> released.
>
>Another way is to use btrfs (or zfs or perhaps LVM snapshots): whenever
>something goes south in a way that's not trivial to recover, you can
>restore with a couple commands and reboot.  And if unbootable because,
>for example, someone removed support for your CPU, you boot with
>subvol=backups/sys-2016-05-07.

btrfs has suffered severe regressions since kernel 4.4, with the btrfs
upstream community only offering advice like "don't use so many
snapshots" or "say goodbye to existing snapshots, backup, format with
latest btrfs-tools, restore".

This is, unfortunately, not a filesystem that I'd trust to keep my
data, despite not having _lost_ actual data other than snapshots, but
those bugs and the suggested remedies do not fit my expectations.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Bug#823779: ITP: geronimo-servlet-3.0-spec -- Geronimo API implementation of the Servlet 3.0 spec

2016-05-08 Thread Christopher Hoskin
Package: wnpp
Severity: wishlist
Owner: Christopher Hoskin 

* Package name: geronimo-servlet-3.0-spec
  Version : 1.0
  Upstream Author : The Apache Software Foundation
* URL : 
http://svn.apache.org/viewvc/geronimo/specs/tags/geronimo-servlet_3.0_spec-1.0/
* License : Apache-2.0
  Programming Lang: Java
  Description : Geronimo API implementation of the Servlet 3.0 spec

Apache Geronimo is an open source server runtime that integrates the best open 
source projects to create Java/OSGi server runtimes that meet the needs of 
enterprise developers and system administrators. Its most popular distribution 
is a fully certified Java EE 6 application server runtime.

Geronimo API implementation of the Servlet 3.0 spec (javax.servlet classes) 

I intend to maintain this package within the Java Packaging Team. I will 
require a sponsor.



Bug#823789: ITP: python-pytest-pep8 -- py.test plugin for efficiently checking PEP8 compliance

2016-05-08 Thread Daniel Kahn Gillmor
Package: wnpp
Severity: wishlist
Owner: Daniel Kahn Gillmor 

* Package name: python-pytest-pep8
  Version : 1.0.6
  Upstream Author : Holger Krekel 
* URL : http://bitbucket.org/hpk42/pytest-pep8/
* License : MIT
  Programming Lang: Python
  Description : py.test plugin for efficiently checking PEP8 compliance

This is a plugin to the pytest framework that checks PEP8 compliance.

--

I plan to upload this as part of the DPMT.

It is part of the test toolchain for some python modules, so it may be
most useful as a build-dep.



Re: How to change config script for multiarch?

2016-05-08 Thread Helmut Grohne
On Wed, Feb 10, 2016 at 11:03:04AM +0100, Bastien ROUCARIES wrote:
> On Wed, Feb 10, 2016 at 10:59 AM, Alastair McKinstry
> > In particular, for any non-standard variables, you can read them, by eg:
> >
> > f90_compiler=$(pkg-config mypkg --variable=f90_compiler)
> >
> > Its probably a good idea to document the config script as deprecated
> > in output, the man page, etc.
> 
> (2) wrapper are not cross build safe...

This seems less than constructive, so let me briefly follow up on how to
make it work properly.

The first misconception I see in this thread is that somehow pkg-config
is good and foo-config is bad. It's not as simple as that. Have a look
at libpython3-dev. It ships e.g. x86_64-linux-gnu-python3-config. By
prefixing the script with the triplet, we can treat it very much like
libraries that are being placed in multiarch locations.

In order for pkg-config to be "better" than your foo-config script, you
need to tell it about the current host architecture by prefixing it with
the triplet. Instead of calling pkg-config, you should be calling
$DEB_HOST_GNU_TYPE-pkg-config. The tricky question is: Where to obtain
that value. The answer is: By parsing $0.

So when converting your foo-config scripts to use pkg-config, you can go
ahead and parse $0. Use that triplet instead of encoding it into your
script. Then each libfoo-dev instance can place the same (shared)
foo-config script in a shared location and place individual symbolic
links with the prefix at it. Alternatively, you can do like python and
ship plain files in triplet-prefixed locations. No pkg-config. Still
M-A:same safe.

It is worth noting that pkg-config has a head-start here. It implements
the parsing of $0 for you. It also improves the client side.  For this
change to work properly, consumers must call your foo-config with the
triplet prefix. When you use autotools, it'll automatically prefer the
prefixed pkg-config over the plain one (unless your pkg-config code is
home-grown).

It's not like pkg-config is the silver bullet here. It just helps you
solve some of the integration problems.

Finally, turning Multi-Arch off for libfoo-dev packages may sound bad,
but in many cases it is actually harmless to practical cross building.
libgpg-error-dev has it turned off and still works well in practise.

There is a trade-off between backwards compatibility, multiarch support
and time investment to be made in these cases. I do not believe that
pkg-config is the one-size-fits-all answer.

Helmut



Re: How to change config script for multiarch?

2016-05-08 Thread Simon McVittie
On Mon, 09 May 2016 at 06:47:38 +0200, Helmut Grohne wrote:
> In order for pkg-config to be "better" than your foo-config script, you
> need to tell it about the current host architecture by prefixing it with
> the triplet. Instead of calling pkg-config, you should be calling
> $DEB_HOST_GNU_TYPE-pkg-config. The tricky question is: Where to obtain
> that value. The answer is: By parsing $0.

The reason this works is that third-party configure scripts (for users of
foo) normally call the PKG_PROG_PKG_CONFIG Autoconf macro, either directly
or via PKG_CHECK_MODULES or PKG_CHECK_EXISTS, and PKG_PROG_PKG_CONFIG
correctly uses AC_PATH_TOOL to look for the tuple-prefixed version before
the unprefixed version.

If users of foo normally call foo-config directly, no amount of adding
prefixes is going to make them cross-build without modification.

S