Re: [gentoo-dev] New tool for updating Bug summaries after package moves: bugsed

2024-12-12 Thread Alexander Neuwirth
On 12/11/24 15:08, Michał Górny wrote:

you can quickly update
hundreds of bugs filed against it


Does it need to be added to the list of exceptions [1] or is it 
considered as a manual, i.e. non-automated, script?


Cheers,
APN

[1] https://bugs.gentoo.org/bots.html



Re: [gentoo-dev] New tool for updating Bug summaries after package moves: bugsed

2024-12-12 Thread Michał Górny
On Thu, 2024-12-12 at 04:55 +, Sam James wrote:
> Could you run it over historical updates (at least from the last year)?
> I can do it if you give me whatever recipe you used as well (or if not,
> can get to it later again when bored).

It's literally:

  ./bugsed old/pkg new/pkg old/pkg2 new/pkg2...

Check the output, then the same with `-u`.

I've listed all replacement pairs for LLVM packages there, to avoid
multiple updates on bugs listing multiple LLVM packages.  For other
moves, where it is unlikely for different packages to be listed
together, this shouldn't be necessary.

-- 
Best regards,
Michał Górny



signature.asc
Description: This is a digitally signed message part


Re: [gentoo-dev] New tool for updating Bug summaries after package moves: bugsed

2024-12-12 Thread Michał Górny
On Thu, 2024-12-12 at 10:28 +0100, Alexander Neuwirth wrote:
> On 12/11/24 15:08, Michał Górny wrote:
> > you can quickly update
> > hundreds of bugs filed against it
> 
> Does it need to be added to the list of exceptions [1] or is it 
> considered as a manual, i.e. non-automated, script?

Well, I don't think it should really be considered a "bot", since it's
just a frontend script that does operations on your request.  It's not
that different from "change multiple bugs" function in Bugzilla.

-- 
Best regards,
Michał Górny



signature.asc
Description: This is a digitally signed message part


Re: [gentoo-dev] [RFC] New global USE flag: io-uring

2024-12-12 Thread Florian Schmaus
On 08/11/2024 18.20, Filip Kobierski wrote:

Hello everyone,

lately I have been looking into the io_uring functionality in the
kernel and apps that I use -- what could be a non-generic USE flag
shared by mpd and qemu?

I have noticed that currently 9 packages[1] have an io-uring USE
flag. All of them use it for enabling the use of io_uring
system calls.

The feature was introduced in 5.1 and the oldest we ship is 5.10
so I think there will be no compatibility issues.

Introducing a new io-uring global USE flag would encourage users
to enable it globally and simplify the configuration.

The USE description that I propose is
"Enable the use of io_uring system calls for efficient async IO".
Of course if there is something more fitting it should be chosen,
I have no hard opinions here.

What do you think about it?


I also think io-uring is a good candidate for a global use flag. Given 
that there where no objections, please feel encouraged to propose a 
tree-wide patch.


- Flow


OpenPGP_0x8CAC2A9678548E35.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature


[gentoo-dev] Request For Insights On Kernel Security Hardening Practices In Gentoo

2024-12-12 Thread Yinhao Hu
Dear All,

We are academic researchers from Huazhong University of Science and
Technology, China. To foster a healthier Linux kernel community and
enhance the overall security of Linux distributions, we are conducting a
study on kernel security hardening deployments across various Linux
distributions.

In our research, we analyzed kernel config files and the /proc
filesystem by installing and running multiple distribution ISO images.
This allowed us to enumerate the default deployment of kernel defense
mechanisms at runtime.

So far, we have cataloged over 50 kernel security hardening features and
documented inconsistencies in their deployment across different
distributions. The results of our analysis are accessible via the
following link:
https://docs.google.com/spreadsheets/d/17QRr04pqK1K4-VoHXW2-9KgPd4uV8Q4I-NNkV9CN8nM/edit?usp=sharing.

Given Gentoo's reputation for exceptional performance and rich features,
we conducted a detailed investigation into its kernel security hardening
strategies. To further deepen our understanding, we would greatly
appreciate your input on the following questions:

1. Effectiveness of Kernel Security Hardening

1.1 Do you consider deploying kernel security hardening features to
be an effective strategy for ensuring operating system security?

2. Configuration Strategy for Default Kernel Security Hardening Options

2.1 What are the primary criteria for selecting kernel security
hardening options in your distribution?

2.2 How are configurable security hardening features (e.g.,
unprivileged_bpf_disabled) typically set (e.g., 0, 1, or 2), and what
are the main considerations involved?

2.3 How do you balance the trade-off between side-effects (e.g.,
performance overhead) and the enhanced security introduced by kernel
security hardening?

2.4 Does the tolerance for performance overhead vary across
different application scenarios?

2.5 Are there other negative factors, such as compatibility issues,
that are considered when enabling security hardening features?

3. Customized Configurations

3.1 Do you provide different kernel security hardening
configurations tailored to specific user groups?

4. Best Practices and Recommendations

4.1 Are there any best practices or recommendations you can share
regarding kernel security hardening?

4.2 Are there relevant documents or materials available for reference?

The purpose of these questions is to gain a deeper understanding of your
security protection strategies. Your insights would be immensely
valuable to our study.

Thank you for taking the time to review our questions. We look forward
to your response.

Best regards,
Yinhao Hu, PhD candidate
huyinha...@gmail.com
Huazhong University of Science and Technology



Re: [gentoo-dev] [RFC] Unmessing mod/tracker music file flags (mikmod, modplug, openmpt)

2024-12-12 Thread James Le Cuirot
On Wed, 2024-12-11 at 11:20 +0100, Michał Górny wrote:
> Hello,
> 
> Right now we have three flags that do pretty much the same thing, via
> different libraries:
> 
> global[mikmod] Add libmikmod support to allow playing of SoundTracker-style 
> music files
> 
> global[modplug] Add libmodplug support for playing SoundTracker-style music 
> files
> media-sound/mixxx[modplug] Add libmodplug support
> 
> media-libs/sdl_audiolib[openmpt] OpenMPT decoder via media-libs/libopenmpt
> media-plugins/audacious-plugins[openmpt] Add support for OpenMPT
> media-sound/mpd[openmpt] OpenMPT decoder plugin
> media-sound/fooyin[openmpt] Build the OpenMPT input plugin using 
> media-libs/libopenmpt
> media-sound/musikcube[libopenmpt] Build plugin to support playing MOD music 
> aka tracker music through libopenmpt
> 
> Given that they are roughly used in the same way, and only a small
> subset of packages (e.g. mpv) support more than one library, how about
> settling on a single feature flag instead?  While they probably differ
> in fine details like the exact list of supported file formats,
> the overlap is wide enough to justify it.
> 
> Such as:
> 
> mod - Enable support for a variety of tracker module (.it, .mod, .s3m, .xm, 
> and more) music files

As the maintainer for OpenMPT, that works for me.


signature.asc
Description: This is a digitally signed message part