17 Live can be
booted without it. F18 works fine for me without it in QEMU, but freezes
on real hardware. Not sure why, it happens with regular F18Alpha too.
Some race condition systemd bug?
--
Serge
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
he following line closely:
# mv -f /root /etc /usr/; ln -s usr/root usr/etc /
It actually does not hit the /tmp case (mount-bind is used instead of
symlink). But that's solely because of systemd becoming extremely
unhappy when /tmp is a symlink.
--
Serge
--
devel mailing list
devel@lists
linux issues were already taken care of. Most
of the work is already done. It's not a new suggestion, it's the same
UsrMove, but now it can bring some new features.
--
Serge
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
pe now. So it should be either
backed out, or moved forward and fixed. That's what I'm trying to do.
> we have/had RHEL customer(s) who kept /usr on AFS and were able to boot
> just using the stuff in /bin and /sbin. This is no longer a viable option
> with
> Fedora, and presum
re not listed on a wiki page?
[1] https://plus.google.com/u/0/115547683951727699051/posts/DiGcrjDaKEb
--
Serge
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
>
> >> [1] https://bugzilla.redhat.com/show_bug.cgi?id=1658311
> >
> > You should reach out to Tom or Serge for comments :-)
> >
>
> The recommended solution for now is to filter out flags that clang does
> not support.
>
> See for example:
> https:
the case.
Why are you using clang to compile the package? The safe step is to use gcc, ot
if clang is needed, to strip -fstack-clash-protection
from the flags passed to clang, but that's not future-proof (clang may end up
supporting that flag).
Hope it helps,
Serge
__
On Wed, Feb 06, 2019 at 12:51:54AM +, Tom Hughes wrote:
> On 06/02/2019 00:47, Christoph Junghans wrote:
>
> >While packaging up votca-csg-1.5, I ran into some tests failing:
> >https://github.com/votca/csg/issues/326
> >but this only happens on ppc64le under epel7. (So I expect boost-1.53
> >
Hi folks,
we're preparing an update of the LLVM package from 12.0.0rc1 to 12.0.0.
In addition the package the llvm team maintain, the following packages needs a
rebuild:
annobin-0:9.65
bindgen-0:0.57.0
clazy-0:1.9
doxygen-1:1.9.1
gnome-builder-0:3.40.0
mesa-dri-drivers-0
Quoting Miloslav Trmač (m...@volny.cz):
> Stefan Schulze Frielinghaus píše v Út 26. 01. 2010 v 11:16 +0100:
> > On Mon, 2010-01-25 at 14:48 -0600, Garrett Holmstrom wrote:
> > > On Mon, Jan 25, 2010 at 11:54 AM, Till Maas wrote:
> > > > On Mon, Jan 25, 2010 at 12:45:26PM -0500, Mike McLean wrote:
erhaps achieve the
> same result, but not in a way which I consider sane.
>
> All in all I think it's a shame that the original proposal didn't work
> out at this time. Having binaries owned by bin:bin does have Unix (but
> not Linux AFAIK) tradition behind it.
And rem
Quoting Richard Zidlicky (r...@linux-m68k.org):
> On Wed, Jan 27, 2010 at 11:11:41AM -0600, Serge E. Hallyn wrote:
>
> > > All in all I think it's a shame that the original proposal didn't work
> > > out at this time. Having binaries owned by bin:bin does ha
aw,cap_net_admin+eip /usr/bin/tshark
>
> This is useful to avoid having setuid binary, but how will regular
> users get access to the wireshark group? Maybe through policykit?
The originally quoted URL also says:
# groupadd -g wireshark
# usermod -a -G wireshark gerald
-serge
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
min+eip /usr/bin/dumpcap
> >> # setcap cap_net_raw,cap_net_admin+eip /usr/bin/tshark
> >>
> >> Suggestions? Ideas? Spec file patches?
> >
> > rpm supposedly has native support for capabilities. That would mean that you
> > don't need to call setc
14 matches
Mail list logo