Displaying 20 results from an estimated 700 matches similar to: "[PATCH] customize: fix running commands on the same architecture"
2015 Aug 27
1
[PATCH v2] customize: Use setarch when running commands on i686 guest
v2: Fix problem when running multiple commands.
2020 May 04
1
[common PATCH] mltools: add run_in_guest_command helper
Add an helper function to run a command in the guest, checking for the
host/guest compatibility. This is mostly extracted from the internal
do_run helper currently in the Customize_run module of virt-customize.
---
mltools/tools_utils.ml | 50 +++++++++++++++++++++++++++++++++++++++++
mltools/tools_utils.mli | 10 +++++++++
2 files changed, 60 insertions(+)
diff --git a/mltools/tools_utils.ml
2015 Aug 27
1
[PATCH] customize: Use setarch when running commands on i686 guest (RHBZ#1256405).
When running (eg) dnf on a 32 bit i686 guest when the host is 64 bit
x86_64, dnf believes it is running on a 64 bit machine and so tries to
install x86_64 packages. We can 'trick' dnf into believing it's a 32
bit machine using the setarch program.
$ virt-builder fedora-22 --arch i686 --install 'gperf'
...
[ 27.4] Installing packages: gperf
...
Running transaction test
Error:
2020 May 04
7
[PATCH 0/4] sysprep: add FreeIPA offline unenrollment (RHBZ#1789592)
This patch series adds a new virt-sysprep operation to offline unenroll
a guest from FreeIPA. It does so by removing some configuration files
and certificates.
It requires a change in libguestfs-common before the series is applied.
Pino Toscano (4):
customize: port do_run to run_in_guest_command
sysprep: add a update_system_ca_store side effect
sysprep: ca-certificates: request system CA
2015 Mar 10
4
Glibc sources?
> Okay, thanks. I really don't need _EXACT_ match, but close. Again, my
> aim is to equip GlibC with some logging facilities IF anyone is using the
> gethostbyname(). Given the help from this list, I was able to rebuild
> GlibC for CentOS and am testing my stuff now.
>
> I appreciate your help on this matter. Not knowing where the knobs are was
> the hardest part. I
2015 Oct 29
7
[PATCH 0/7] v2v: Miscellaneous refactorings.
Just refactoring.
Rich.
2011 Dec 09
4
[LLVMdev] [PATCH] Add the disable_aslr option that will disable the address space layout randomization under AddressSanitizer on 10.6
On Fri, Dec 9, 2011 at 11:16 AM, Eric Christopher <echristo at apple.com>wrote:
>
> On Dec 9, 2011, at 11:12 AM, Kostya Serebryany wrote:
>
> > Yes, we have no ASRL with -no_pie.
> > Can we disable ASRL even with -pie?
> > On linux we can do it with "setarch x86_64 -R".
> >
>
> You asked about link time. Now it sounds like you're talking
2011 Dec 09
0
[LLVMdev] [PATCH] Add the disable_aslr option that will disable the address space layout randomization under AddressSanitizer on 10.6
On Dec 9, 2011, at 11:23 AM, Kostya Serebryany wrote:
>
>
> On Fri, Dec 9, 2011 at 11:16 AM, Eric Christopher <echristo at apple.com> wrote:
>
> On Dec 9, 2011, at 11:12 AM, Kostya Serebryany wrote:
>
> > Yes, we have no ASRL with -no_pie.
> > Can we disable ASRL even with -pie?
> > On linux we can do it with "setarch x86_64 -R".
> >
2015 Mar 11
2
Glibc sources?
> -----Original Message-----
> From: centos-bounces at centos.org [mailto:centos-bounces at centos.org] On Behalf Of Les Mikesell
> Sent: Tuesday, March 10, 2015 6:02 PM
> To: CentOS mailing list
> Subject: Re: [CentOS] Glibc sources?
>
> On Tue, Mar 10, 2015 at 5:47 PM, ANDY KENNEDY <ANDY.KENNEDY at adtran.com> wrote:
> >>
> > How do I tell rpmbuild to
2011 Dec 09
2
[LLVMdev] [PATCH] Add the disable_aslr option that will disable the address space layout randomization under AddressSanitizer on 10.6
Yes, we have no ASRL with -no_pie.
Can we disable ASRL even with -pie?
On linux we can do it with "setarch x86_64 -R".
Another question: if asan would require -no_pie on Mac, will this be a
serious limitation?
Thanks,
--kcc
On Fri, Dec 9, 2011 at 11:07 AM, Eric Christopher <echristo at apple.com>wrote:
> Options when creating a main executable
> -pie This
2011 Dec 09
0
[LLVMdev] [PATCH] Add the disable_aslr option that will disable the address space layout randomization under AddressSanitizer on 10.6
On Dec 9, 2011, at 11:12 AM, Kostya Serebryany wrote:
> Yes, we have no ASRL with -no_pie.
> Can we disable ASRL even with -pie?
> On linux we can do it with "setarch x86_64 -R".
>
You asked about link time. Now it sounds like you're talking about runtime?
> Another question: if asan would require -no_pie on Mac, will this be a serious limitation?
>
If asan
2013 Oct 09
2
[PATCH 0/1] Porting klibc to arm64
On Wed, 9 Oct 2013 10:44:27 +0000 (UTC)
Thorsten Glaser <tg at mirbsd.de> wrote:
> Anil Singhar dixit:
>
> >Manual testing as provided within the package has been done with all
> >tests passing. This includes the units tests available under
> >usr/klibc/tests, usr/utils, usr/dash and usr/gzip. For dash and
> >gzip, only sanity testing has been done.
>
>
2013 Oct 09
0
[PATCH 0/1] Porting klibc to arm64
Hi Neil / Thorsten,
The full test result is attached.
Thanks and Regards,
Anil
-------------------------------------------------------------------------------------------------------------------------------
root at genericarmv8:~/anilss/AArch64/mksh_44-1/mksh# ./mksh test.sh -p
$PWD/mksh
Testing mksh for conformance:
# $MirOS: src/bin/mksh/check.t,v 1.599 2013/02/24 14:22:41 tg Exp $
2011 Dec 09
2
[LLVMdev] [PATCH] Add the disable_aslr option that will disable the address space layout randomization under AddressSanitizer on 10.6
On Dec 9, 2011, at 11:46 AM, Alexander Potapenko wrote:
>> Link time is of course better.
>> But if there is a syscall (like the one used by setarch) we could call it
>> and reexec.
>> Using setenv("DYLD_NO_PIE")+reexec looks gross to me.
> There's posix_spawnattr_setflags() that can do the job
>
2015 Sep 29
0
[PATCH v2 2/2] customize: get zypper to eat licenses and gpg keys
Without these flags --install will most likely fail as the GPG key
may no be imported in the guest image.
---
customize/customize_run.ml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/customize/customize_run.ml b/customize/customize_run.ml
index 9d97522..ad0ab7f 100644
--- a/customize/customize_run.ml
+++ b/customize/customize_run.ml
@@ -116,7 +116,7 @@ exec >>%s
2019 Jan 25
0
[klibc:update-dash] parser: use pgetc_eatbnl() in more places
Commit-ID: acd0936c5f8b4f5d94065ca46714d17e6a882cf2
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=acd0936c5f8b4f5d94065ca46714d17e6a882cf2
Author: Harald van Dijk <harald at gigawatt.nl>
AuthorDate: Thu, 8 Mar 2018 08:37:11 +0100
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Fri, 25 Jan 2019 02:57:21 +0000
[klibc] parser: use pgetc_eatbnl()
2020 Mar 28
0
[klibc:update-dash] dash: parser: use pgetc_eatbnl() in more places
Commit-ID: a4659bfa776f24f790c3ec071c5c9ef9459cdb70
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=a4659bfa776f24f790c3ec071c5c9ef9459cdb70
Author: Harald van Dijk <harald at gigawatt.nl>
AuthorDate: Thu, 8 Mar 2018 08:37:11 +0100
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sat, 28 Mar 2020 21:42:54 +0000
[klibc] dash: parser: use
2006 Dec 02
1
How to install rkhunter properly
Hi list,
after a bit of struggling I found out how to cleanly install rkhunter
... maybe this is useful for you:
* Download rkhunter (I downloaded v 1.2.8)
* mv /etc/rpm/platform /root/etc_rpm_platform
* setarch i386 rpmbuild -ta --target=i386 rkhunter-1.2.8.tar.gz
* mv /root/etc_rpm_platform /etc/rpm/platform
* rpm -ivh /usr/src/redhat/RPMS/noarch/rkhunter-1.2.8-1.noarch.rpm
* wget
2011 Dec 09
0
[LLVMdev] [PATCH] Add the disable_aslr option that will disable the address space layout randomization under AddressSanitizer on 10.6
> Link time is of course better.
> But if there is a syscall (like the one used by setarch) we could call it
> and reexec.
> Using setenv("DYLD_NO_PIE")+reexec looks gross to me.
There's posix_spawnattr_setflags() that can do the job
(http://reverse.put.as/2011/08/11/how-gdb-disables-aslr-in-mac-os-x-lion/),
but the necessary flag appeared only in Lion.
To the best of my
2006 Feb 02
1
Borland Database Engine related installer issue (Portal GT-D)
I am attempting to install the Portal GT-D mud client
(www.gameaxle.com) on top of wine-0.9.6-1.fc4 which I then
reconfigured using winetools-0.9-3jo after failing to install MS
Office XP Pro (which I never did get to work either, but I found some
references saying that it wasn't likely to). IE6 installed and runs
for what it is worth. I run the setup program in the style the wine
tools use