And now add user-mode-linux also.
[EMAIL PROTECTED]:~ $ dpkg -l | grep sysvinit
ii sysvinit 2.86.ds1-34
System-V-like init utilities
ii sysvinit-utils2.86.ds1-34
System-V-like utilities
23:17:15
[EMA
On Thu, 07 Sep 2006, Mario 'BitKoenig' Holbe wrote:
> Well, then probably have a look at ifupdown and resolvconf too :)
They're known offenders, yes. But to fix them, we need a proper
early-writeable-filesystem, first. And /dev/shm is not it, it is only being
abused as so.
That said, /dev/shm c
On Thu, Sep 07, 2006 at 04:36:40PM +0200, Petter Reinholdtsen wrote:
> This is not supposed to work. The /dev/shm file system is to be only
> used by the shm functions in glibc, as all other use would polute the
> name space for shared memory segments. I discovered misuse of
> /dev/shm/ in checkr
tags 386368 + wontfix
thanks
[Mario 'BitKoenig' Holbe]
> could you please consider removal of the noexec flag from the /dev/shm
> mount... Mounting it noexec breaks bind-mounts to /tmp on Debian systems
> because dpkg runs files from /tmp (for preconfiguration).
This is not supposed to work. The
Package: initscripts
Version: 2.86.ds1-16
Hello,
could you please consider removal of the noexec flag from the /dev/shm
mount... Mounting it noexec breaks bind-mounts to /tmp on Debian systems
because dpkg runs files from /tmp (for preconfiguration).
Bind-mounting /dev/shm to /tmp instead of cre
5 matches
Mail list logo