Hi,
I rebooted some CEPH servers with 24 HDs and do get some messages for
some of the disks:
[ 519.667055] XFS (sdk1): Mounting V4 Filesystem
[ 519.692307] XFS (sdk1): Ending clean mount
[ 519.781975] attempt to access beyond end of device
[ 519.781984] sdk1: rw=0, want=1560774288, limit=1560774287
All disks are xfs formated and currently I don't see any problem on the
CEPH side.
But I have a bad feeling.
I updated the kernel too from kernel-3.10.0-514.21.1 to
kernel-3.10.0-514.26.1, …
[View More]but nothing changed.
Any hints, suggestions?
Thanks & regards . Götz
[View Less]
My thanks to all that responded to my posting about our virtual
machine CentOS 6 system start-up issue. I found the alternative
boot options to be the most helpful. Interrupting the boot-up
process with Alt-d or Escape allowed me to see what appears to
be a quite normal string of start, install and mount activity.
However, this process ends with the system hanging at the point
below:
Starting ipmidetectd: ipmidetectd: No nodes configured [FAILED]
Starting sendmail:
It is …
[View More]not clear to me whether the boot-up process is hanging due
to the failed starting of ipmidetectd or sendmail, but I suspect
that the ipmidetectd start up failure is the actual cause. It is
not clear whether any IPMI related features were ever installed.
Interrupting the boot-up process and selecting Run Level 1 results
in a functioning system. Starting with other Run Levels results
in the incomplete boot-up process noted previously. Using the
"service network start" command yielded functional network and
internet connectivity. This enabled the successful execution of
yum update. The update consisted of kernel and other updates
with a total download size of 274 MB.
After this update, the boot-up process still hangs at the point
indicated above. Why this is happening is still a mystery and
if it actually is IPMI related, why would this be appropriate
or even needed in a CentOS system that is running on VirualBox.
There is no IPMI related hardware accessible to the virtual
CentOS system or on the Windows 7 host system. It would be
good if the IPMI start-up could be disabled.
[View Less]
Hi,
Here's the warning that Yum currently displays:
** Found 3 pre-existing rpmdb problem(s), 'yum check' output follows:
ipa-client-4.4.0-14.el7.centos.7.x86_64 has installed conflicts
freeipa-client: ipa-client-4.4.0-14.el7.centos.7.x86_64
ipa-client-common-4.4.0-14.el7.centos.7.noarch has installed conflicts
freeipa-client-common: ipa-client-common-4.4.0-14.el7.centos.7.noarch
ipa-common-4.4.0-14.el7.centos.7.noarch has installed conflicts
freeipa-common: ipa-common-4.4.0-14.el7.centos.7.…
[View More]noarch
Any suggestions what I can do about that? (BTW, I don't use IPA)
Cheers,
Niki
--
Microlinux - Solutions informatiques durables
7, place de l'église - 30730 Montpezat
Web : http://www.microlinux.fr
Mail : info(a)microlinux.fr
Tél. : 04 66 63 10 32
[View Less]
Hello Guys,
While i work out the snapper on fedora 25 I've learnd more about python
and snapper.
Here the changes:
Snapper:
Created a combat util-linux 2.24.2 from fedora 20, static only.
This make snapper rollback available (needfull thing). Tryed to patch
snapper, there are to many changes. This will not breake centos 7
system. Only works for x86 / amd64 only this days & Centos 7, removed
many condition.
Grub2-Btrfs:
Removed "Requires: grub2", because that will install grub2 on
efi …
[View More]systems.
yum-plugin-snapper:
- Add gpl v3 for now
- Complete rewrote the plugin against the snapper dbus interface.
- filesystem root level check
- add single shot option, as it was on fedora before I patched it.
- more flexible as other ones I saw around.
- conflicts yum-plugin-fs-snapshot
Everything can be found at:
https://copr.fedorainfracloud.org/coprs/andybe/Centos7Btrfs/
Snapper-Gui:
Needs epel-release because of python34
python34-pygobject3 is one of the badest hack inside spec file. I wanne
see it run with snapper-gui and compile on copr.
can be found at
https://copr.fedorainfracloud.org/coprs/andybe/CentOS7Python34/packages
/
Everything was tested on a Virtual Machine:
- Snapper-GUI
- snapper rollback
- yum-plugin - every option.
- grub2-btrfs
The only thing I still want to care is the grub2-btrfs plugin,
so it fits to CentOS 7. Then the personal project is done.
At this time I will reinstall CentOS on my laptop on btrfs and use
backup by send & receive on a blockdevice ZFS at my home server or
other storage with btrfs. I will see. Hopefully turn work into fun :-).
Sincerely
Andy
PS: It's up to you to get a taste on.
[View Less]
Hi,
I just moved my main mail account and web content from a low-cost
(low-quality) provider to my own root server running CentOS 7. I
transferred the domain name from DNS management to my registrar,
configured BIND, Apache, Postfix, Dovecot, NTP, SELinux, etc. Now things
are running rather nicely. One thing is puzzling me though.
The updated mail server DNS seems to have spread around so far.
$ host -t mx microlinux.fr
microlinux.fr mail is handled by 10 mail.microlinux.fr.
Unfortunately, …
[View More]some hosts seem to still keep the old DNS information,
which was:
$ host -t mx microlinux.fr
microlinux.fr mail is handled by 10 mx1.nfrance.com.
In your experience, what's the "longest" a DNS cache is configured to
keep outdated information? A day? A week? A month? Longer?
Cheers,
Niki
[View Less]
I have a new system with an AMD Ryzen 1600 CPU and I'm trying to run
CentOS, so far without success. The only information I could find was
a post reporting that CentOS 7 would crash during installation on a
Ryzen system: https://www.centos.org/forums/viewtopic.php?t=61831 .
I tried updating to the latest elrepo "mainline stable" kernel,
version 4.11 (by booting from a live CD and using chroot to enter
CentOS: that worked), but the system still doesn't work properly.
I'm using CentOS 6 but I'…
[View More]ll switch to CentOS 7 if that will help. (But
I assume that if installing the latest kernel didn't help, neither
would going to CentOS 7.)
Any suggestions? Is it known whether the next version will work
properly with Ryzen?
Yves Bellefeuille
<yan(a)storm.ca>
[View Less]
We transfer files from a VAN provider at 15 minute intervals using
rsync over ssh. The setup is somewhat complicated in that the VAN
will not permit direct rsync access and so we establish the link via
sshfs and then mount remote location as local.
My question is, given the above conditions and the following rsync
command:
/usr/bin/rsync --chmod=o+r --chmod=g+w --itemize-changes
--remove-sent-files --times /var/spool/imanet/pick_up/*
/var/spool/imanet/drop_off
Under what circumstances …
[View More]would a file containing data at the remote
end (/var/spool/imanet/pick_up/) arrive at our end
(/var/spool/imanet/drop_off) as an empty file? No transmission errors
were logged and multiple files were transferred during the same
session. All but one arrived with their contents intact.
--
*** e-Mail is NOT a SECURE channel ***
Do NOT transmit sensitive data via e-Mail
Do NOT open attachments nor follow links sent by e-Mail
James B. Byrne mailto:ByrneJB@Harte-Lyne.ca
Harte & Lyne Limited http://www.harte-lyne.ca
9 Brockley Drive vox: +1 905 561 1241
Hamilton, Ontario fax: +1 905 561 0757
Canada L8E 3C3
[View Less]
Do you know this?
Dario
------- Messaggio inoltrato -------
Da: stan <stanl-fedorauser(a)vfemail.net>
Reply-to: Community support for Fedora users
<users(a)lists.fedoraproject.org>
A: users(a)lists.fedoraproject.org
Oggetto: CIA Outlaw Country attack against CentOS / Rhel (and Fedora?)
Is this credible?
Data: Thu, 29 Jun 2017 15:51:43 -0700
Wikileaks released a document about an attack against CentOS / Rhel.
https://wikileaks.org/vault7/#OutlawCountry
Here's the text, there …
[View More]are some docs there also.
OutlawCountry
29 June, 2017
Today, June 29th 2017, WikiLeaks publishes documents from the
OutlawCountry project of the CIA that targets computers running the
Linux operating system. OutlawCountry allows for the redirection of all
outbound network traffic on the target computer to CIA controlled
machines for ex- and infiltration purposes. The malware consists of a
kernel module that creates a hidden netfilter table on a Linux target;
with knowledge of the table name, an operator can create rules that
take precedence over existing netfilter/iptables rules and are
concealed from an user or even system administrator.
The installation and persistence method of the malware is not described
in detail in the document; an operator will have to rely on the
available CIA exploits and backdoors to inject the kernel module into a
target operating system. OutlawCountry v1.0 contains one kernel module
for 64-bit CentOS/RHEL 6.x; this module will only work with default
kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT
rules to the PREROUTING chain.
My first take is that this doesn't represent a very serious threat. Do
you disagree?
_______________________________________________
users mailing list -- users(a)lists.fedoraproject.org
To unsubscribe send an email to users-leave(a)lists.fedoraproject.org
--
Dario Lesca
(inviato dal mio Linux Fedora 25 Workstation)
[View Less]