Keyboard issue with SL6.2RC1

2012-02-02 Thread Bill Maidment
Hi
I've just installed SL6.2RC1 as a KVM guest on a SL6.1 host. Yum updates done 
on both.
When I start a terminal I find that the Ctrl keys are ignored, e.g. doing 
Ctrl-C just gives a lower case c.
Is this an issue for anyone installing SL6.2RC1 as a host, or is it something 
to do with qemu-kvm on SL6.1?

Cheers
Bill Maidment
IT Consultant to Elgas Ltd
Phone: 02 4294 3649


Re: From where does fsck failure prompt root passwd come?

2012-02-02 Thread Yasha Karant
Thank you for the suggestion.  I am top-posting my response rather than 
bottom-posting (I have repeatedly been informed that bottom-posting is 
required for this list) because you top-posted.  As you can read, 
/sbin/sulogin from a regular shell works, although as it requires su 
first, it is unclear what sulogin actually accomplishes in this case. 
To verify that this successful operation was not due to the input coming 
via a Xwindows Gnome application, I also ran the same sequence from a 
plain non-GUI terminal screen (ctrl-alt-F4) with the identical success. 
 Obviously, something is different after a fsck failure during boot. 
As a separate test, I will try single user mode -- but this requires 
exiting my present work that I simply cannot do at this moment.


[ykarant@jb344 ~]$ /sbin/sulogin
sulogin: only root can run sulogin.
[ykarant@jb344 ~]$ su
Password:
[root@jb344 ykarant]# /sbin/sulogin
Give root password for maintenance
(or type Control-D to continue):
[root@jb344 ~]# whoami
root
[root@jb344 ~]# exit
exit
[root@jb344 ykarant]# exit
exit
[ykarant@jb344 ~]$

Yasha Karant

On 02/02/2012 03:04 PM, Yannick Perret wrote:

Yannick Perret a écrit :

Hello,

the only place I found that have the "Give root password" in
/sbin/sulogin.
# strings /sbin/sulogin | grep "Give ro"
Give root password for maintenance
which is part of sysvinit-tools package.

'sulogin' is only called from /etc/rc.sysinit as far as I know (in
boot sequence).

Did you try to run /sbin/sulogin on a running machine? It will ask you
root password, and it could be interresting to check if it can works
outside the boot sequence.


I mean (I was not clear): it do works on a SL4 / SL5 machine. It could
be interresting to see if it does not work for you, in which case it may
help to track the reason of this behavior.

--
Y.

Regards,
--
Y.


Yasha Karant a écrit :

I have been discussing the failure mode that I have observed:

also documented in

https://bugzilla.redhat.com/show_bug.cgi?id=636628

after fsck fails during a (re)boot

Give root password for maintenance
(or type Control-D to continue):

At this stage, at every second key stroke, it reports "Login
incorrect." and
repeats the above "Give root password...".

as an endless loop.

The argument has been presented on this list that it is the root user
failure to configure a password into grub.conf or other bootloading
or initialization applications/routines configuration or input data
files.

I have been discussing this issue with a number of experienced
systems persons, and none of us accept this argument, especially as
without special intervention or configuration, the expected behavior
was displayed on EL 4 and 5, as well as several other non-TUV
distributions. Expected behavior: whatever root password was encoded
into the /etc/shadow file is used by the routine that handles "Give
root password for maintenance" is accepted, and not at every second
key stroke would it report "Login incorrect."

When the system is first installed from physical media such as a
bootable DVD (for EL, this is with every major release, e.g., EL 4,
EL 5, EL 6, etc.), and a root password is required to be set during
installation, this password is put in an encrypted form in the
appropriate file in /etc (e.g., /etc/shadow) and wherever else it
might be required (e.g., in /boot if the particular implementation
were to require this). Moreover, for fsck to run during the boot
process, even if /boot is on a separate partition from / (root
partition), the fsck executable is on a partition that must have been
mounted, and thus /etc/shadow should be available. Hence, the
(encrypted) password should be available.

The bug is that the password entry routine (as in response to the
prompt "Give root password for maintenance") does not accept the full
vector of characters for the root password including the Enter
keystroke that terminates the vector.

As there are correspondents to this list that evidently feel the
above arguments to be incorrect, references to the relevant Linux
source code sections and design documents (e.g., state machine chart
for the sequence that contains "Give root password for maintenance")
greatly would be appreciated.



Re: From where does fsck failure prompt root passwd come?

2012-02-02 Thread Yannick Perret

Yannick Perret a écrit :

Hello,

the only place I found that have the "Give root password" in 
/sbin/sulogin.

# strings /sbin/sulogin | grep "Give ro"
Give root password for maintenance
which is part of sysvinit-tools package.

'sulogin' is only called from /etc/rc.sysinit as far as I know (in 
boot sequence).


Did you try to run /sbin/sulogin on a running machine? It will ask you 
root password, and it could be interresting to check if it can works 
outside the boot sequence.


I mean (I was not clear): it do works on a SL4 / SL5 machine. It could 
be interresting to see if it does not work for you, in which case it may 
help to track the reason of this behavior.


--
Y.

Regards,
--
Y.


Yasha Karant a écrit :

I have been discussing the failure mode that I have observed:

also documented in

https://bugzilla.redhat.com/show_bug.cgi?id=636628

after fsck fails during a (re)boot

Give root password for maintenance
(or type Control-D to continue):

At this stage, at every second key stroke, it reports "Login 
incorrect." and

repeats the above "Give root password...".

as an endless loop.

The argument has been presented on this list that it is the root user 
failure to configure a password into grub.conf or other bootloading 
or initialization applications/routines configuration or input data 
files.


I have been discussing this issue with a number of experienced 
systems persons, and none of us accept this argument, especially as 
without special intervention or configuration, the expected behavior 
was displayed on EL 4 and 5, as well as several other non-TUV 
distributions.  Expected behavior:  whatever root password was 
encoded into the /etc/shadow file is used by the routine that handles 
"Give root password for maintenance" is accepted, and not at every 
second key stroke would it report "Login incorrect."


When the system is first installed from physical media such as a 
bootable DVD (for EL, this is with every major release, e.g., EL 4, 
EL 5, EL 6, etc.), and a root password is required to be set during 
installation, this password is put in an encrypted form in the 
appropriate file in /etc (e.g., /etc/shadow) and wherever else it 
might be required (e.g., in /boot if the particular implementation 
were to require this).  Moreover, for fsck to run during the boot 
process, even if /boot is on a separate partition from / (root 
partition), the fsck executable is on a partition that must have been 
mounted, and thus /etc/shadow should be available.  Hence, the 
(encrypted) password should be available.


The bug is that the password entry routine (as in response to the 
prompt "Give root password for maintenance") does not accept the full 
vector of characters for the root password including the Enter 
keystroke that terminates the vector.


As there are correspondents to this list that evidently feel the 
above arguments to be incorrect, references to the relevant Linux 
source code sections and design documents (e.g., state machine chart 
for the sequence that contains "Give root password for maintenance") 
greatly would be appreciated.




Re: From where does fsck failure prompt root passwd come?

2012-02-02 Thread Yannick Perret

Hello,

the only place I found that have the "Give root password" in /sbin/sulogin.
# strings /sbin/sulogin | grep "Give ro"
Give root password for maintenance
which is part of sysvinit-tools package.

'sulogin' is only called from /etc/rc.sysinit as far as I know (in boot 
sequence).


Did you try to run /sbin/sulogin on a running machine? It will ask you 
root password, and it could be interresting to check if it can works 
outside the boot sequence.


Regards,
--
Y.


Yasha Karant a écrit :

I have been discussing the failure mode that I have observed:

also documented in

https://bugzilla.redhat.com/show_bug.cgi?id=636628

after fsck fails during a (re)boot

Give root password for maintenance
(or type Control-D to continue):

At this stage, at every second key stroke, it reports "Login 
incorrect." and

repeats the above "Give root password...".

as an endless loop.

The argument has been presented on this list that it is the root user 
failure to configure a password into grub.conf or other bootloading or 
initialization applications/routines configuration or input data files.


I have been discussing this issue with a number of experienced systems 
persons, and none of us accept this argument, especially as without 
special intervention or configuration, the expected behavior was 
displayed on EL 4 and 5, as well as several other non-TUV 
distributions.  Expected behavior:  whatever root password was encoded 
into the /etc/shadow file is used by the routine that handles "Give 
root password for maintenance" is accepted, and not at every second 
key stroke would it report "Login incorrect."


When the system is first installed from physical media such as a 
bootable DVD (for EL, this is with every major release, e.g., EL 4, EL 
5, EL 6, etc.), and a root password is required to be set during 
installation, this password is put in an encrypted form in the 
appropriate file in /etc (e.g., /etc/shadow) and wherever else it 
might be required (e.g., in /boot if the particular implementation 
were to require this).  Moreover, for fsck to run during the boot 
process, even if /boot is on a separate partition from / (root 
partition), the fsck executable is on a partition that must have been 
mounted, and thus /etc/shadow should be available.  Hence, the 
(encrypted) password should be available.


The bug is that the password entry routine (as in response to the 
prompt "Give root password for maintenance") does not accept the full 
vector of characters for the root password including the Enter 
keystroke that terminates the vector.


As there are correspondents to this list that evidently feel the above 
arguments to be incorrect, references to the relevant Linux source 
code sections and design documents (e.g., state machine chart for the 
sequence that contains "Give root password for maintenance") greatly 
would be appreciated.




From where does fsck failure prompt root passwd come?

2012-02-02 Thread Yasha Karant

I have been discussing the failure mode that I have observed:

also documented in

https://bugzilla.redhat.com/show_bug.cgi?id=636628

after fsck fails during a (re)boot

Give root password for maintenance
(or type Control-D to continue):

At this stage, at every second key stroke, it reports "Login incorrect." and
repeats the above "Give root password...".

as an endless loop.

The argument has been presented on this list that it is the root user 
failure to configure a password into grub.conf or other bootloading or 
initialization applications/routines configuration or input data files.


I have been discussing this issue with a number of experienced systems 
persons, and none of us accept this argument, especially as without 
special intervention or configuration, the expected behavior was 
displayed on EL 4 and 5, as well as several other non-TUV distributions. 
 Expected behavior:  whatever root password was encoded into the 
/etc/shadow file is used by the routine that handles "Give root password 
for maintenance" is accepted, and not at every second key stroke would 
it report "Login incorrect."


When the system is first installed from physical media such as a 
bootable DVD (for EL, this is with every major release, e.g., EL 4, EL 
5, EL 6, etc.), and a root password is required to be set during 
installation, this password is put in an encrypted form in the 
appropriate file in /etc (e.g., /etc/shadow) and wherever else it might 
be required (e.g., in /boot if the particular implementation were to 
require this).  Moreover, for fsck to run during the boot process, even 
if /boot is on a separate partition from / (root partition), the fsck 
executable is on a partition that must have been mounted, and thus 
/etc/shadow should be available.  Hence, the (encrypted) password should 
be available.


The bug is that the password entry routine (as in response to the prompt 
"Give root password for maintenance") does not accept the full vector of 
characters for the root password including the Enter keystroke that 
terminates the vector.


As there are correspondents to this list that evidently feel the above 
arguments to be incorrect, references to the relevant Linux source code 
sections and design documents (e.g., state machine chart for the 
sequence that contains "Give root password for maintenance") greatly 
would be appreciated.


Yasha Karant


Re: CUPS doesn't offer Ledger as a paper size

2012-02-02 Thread Mark Stodola

James M Pulver wrote:

We've got a Brother MFC-j5910 which is working great networked via the brother 
LPD and CUPS driver, except if you want to print 11x17 / Tabloid. The printer 
for some reason doesn't support that, and instead supports the less common 
17x11 / Ledger format. If I use a program that allows you to set a CUSTOM paper 
size of 17x11, it prints as expected (well, not really, I have to still change 
to landscape when it should be portrait for that size configuration)... The 
issue I have is, on Windows computers using the standard CUPS drivers shared 
over SAMBA, I can't select a custom paper size (and most users on Linux expect 
to use Tabloid, not a custom paper size)...

Any ideas what I should do here? CUPS is on a SL5 server.

--
James Pulver
LEPP Computer Group
Cornell University
  
You should be able to modify the ppd file in /etc/cups/ppd/.  You can 
add/modify paper dimensions as needed there.  I'd start by cloning the 
Ledger entry, naming it Tabloid (or whatever), then adjusting the 
dimensions to the orientation you want.  Restart cups after editing.


-Mark

--
Mr. Mark V. Stodola
Digital Systems Engineer

National Electrostatics Corp.
P.O. Box 620310
Middleton, WI 53562-0310 USA
Phone: (608) 831-7600
Fax: (608) 831-9591


Re: [SCIENTIFIC-LINUX-USERS] Netbackup 7.1 BMR and SL6.1 creating boot CD

2012-02-02 Thread Pat Riehecky

On 02/02/2012 10:40 AM, James M Pulver wrote:

I've got netbackup up and running fine on SL6.1. I'm trying to create the boot 
CD for my Linux clients (windows worked fine), but get this:
Select one of the following options:

 1.  Create a new Shared Resource Tree.
 2.  Create a new CD image based Shared Resource Tree.
 3.  Copy an existing Shared Resource Tree to a new location.
 4.  Import a Shared Resource Tree.
 5.  Modify an existing Shared Resource Tree.
 6.  Delete an existing Shared Resource Tree.
 7.  List Shared Resource Trees available on this server.
 8.  Quit.

Enter your selection (1-8) [1] : 1
Enter the name of the SRT to create : 64BitSL
Enter the description of the new SRT : 64 bit SL6.1
V-128-312 Unsupported Linux release: Scientific Linux release 6.1 (Carbon)
Enter the desired RedHat level () :

I've entered everything I can find around the web from Red Hat Enterprise Linux 
Server 6 to 2.6, but it just returns with Enter the desired RedHat level (): ...

Any ideas what I should put there?

--
James Pulver
LEPP Computer Group
Cornell University


Do you know how it is trying to detect the 'RedHat' level?  Some scripts 
(say
redhat-rpm-config found in SL6) look first for 'Red Hat' and then the 
version.  Since we say Scientific Linux, it may be getting caught up on 
that.


Pat

--
Pat Riehecky
Scientific Linux Developer


CUPS doesn't offer Ledger as a paper size

2012-02-02 Thread James M Pulver
We've got a Brother MFC-j5910 which is working great networked via the brother 
LPD and CUPS driver, except if you want to print 11x17 / Tabloid. The printer 
for some reason doesn't support that, and instead supports the less common 
17x11 / Ledger format. If I use a program that allows you to set a CUSTOM paper 
size of 17x11, it prints as expected (well, not really, I have to still change 
to landscape when it should be portrait for that size configuration)... The 
issue I have is, on Windows computers using the standard CUPS drivers shared 
over SAMBA, I can't select a custom paper size (and most users on Linux expect 
to use Tabloid, not a custom paper size)...

Any ideas what I should do here? CUPS is on a SL5 server.

--
James Pulver
LEPP Computer Group
Cornell University


Re: coreutils for 64 bit

2012-02-02 Thread Stephen J. Gowdy

Hi Andrey,
	Why would you want a block size in GB? I don't know what the 
actual limit for dd itself is, although it does seem to be exactly 2GiB.


regards,

Stephen.

On Thu, 2 Feb 2012, Andrey Y. Shevel wrote:



Hi Stephen,

thank you for your reply.

==
[root@pcfarm-10 ~]# rpm -qa --queryformat "%{NAME}-%{VERSION}.%{ARCH}\n" | 
grep coreutils

policycoreutils-1.33.12.x86_64
policycoreutils-newrole-1.33.12.x86_64
coreutils-5.97.x86_64
policycoreutils-gui-1.33.12.x86_64
=

And obviously


[root@pcfarm-10 ~]# arch
x86_64
===


The result is prety same as I shown earlier.

And the same I see at CERN

===
[lxplus427] /afs/cern.ch/user/s/shevel > dd if=/dev/zero of=/tmp/testx64 
bs=3GB count=1

0+1 records in
0+1 records out
2147479552 bytes (2.1 GB) copied, 5.91242 seconds, 363 MB/s
[lxplus427] /afs/cern.ch/user/s/shevel > rpm -q --file /bin/dd
coreutils-5.97-34.el5
[lxplus427] /afs/cern.ch/user/s/shevel >  rpm -qa --queryformat 
"%{NAME}-%{VERSION}.%{ARCH}\n" | grep coreutil

policycoreutils-1.33.12.x86_64
coreutils-5.97.x86_64
policycoreutils-gui-1.33.12.x86_64
===





As far as I understand the main question is "is there 64 bit dd version which 
can operate more then 2GB value for BS in SL anyway?"


Any answer (yes or no) is good to know.

Many thanks,

Andrey


On Wed, 1 Feb 2012, Stephen J. Gowdy wrote:


Date: Wed, 1 Feb 2012 19:10:14 +0100 (CET)
From: Stephen J. Gowdy 
To: Andrey Y. Shevel 
Cc: SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV
Subject: Re: coreutils for 64 bit

Exactly if you type "man rpm" it will show you how you get it to print 
the arch string (usually i686 or x86_64). Since you seem unabel to read a 
man page what you want to type is;


rpm -qa --queryformat "%{NAME}-%{VERSION}.%{ARCH}\n" | grep coreutils

(or miss out the VERSION if you want to see somethign similar to yum)

On Wed, 1 Feb 2012, Andrey Y. Shevel wrote:



 Hi Stephen,

 thanks for the reply.

 I am not sure that I do understand you (sorry for my stupidity).

 I have
 ===
 [root@pcfarm-10 ~]# yum list | grep coreutil
 Failed to set locale, defaulting to C
 coreutils.x86_64 5.97-34.el5 installed
 policycoreutils.x86_64   1.33.12-14.8.el5 installed
 policycoreutils-gui.x86_64   1.33.12-14.8.el5 installed
 policycoreutils-newrole.x86_64   1.33.12-14.8.el5 installed
 [root@pcfarm-10 ~]# rpm -q --file /bin/dd
 coreutils-5.97-34.el5
 =

 Presumably all packages are appropriate (they have suffix x86_64) as 
shown

 by yum.

 At the same time rpm does show packages without above suffixes

 =
 [root@pcfarm-10 ~]# rpm -qa | grep coreutil
 policycoreutils-1.33.12-14.8.el5
 policycoreutils-newrole-1.33.12-14.8.el5
 coreutils-5.97-34.el5
 policycoreutils-gui-1.33.12-14.8.el5
 =




 On Wed, 1 Feb 2012, Stephen J. Gowdy wrote:

>  Date: Wed, 1 Feb 2012 11:32:40 +0100 (CET)
>  From: Stephen J. Gowdy 
>  To: Andrey Y Shevel 
>  Cc: SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV
>  Subject: Re: coreutils for 64 bit
> >  It says it only copied 2.1GB. You are runnig a 64bit OS. You 
reinstalld >  the same coreutils package. You need to change the format of 
the package >  names from "rpm -qa" if you want to see the architecture 
("man rpm" >  should help you figure out how).

> >  On Wed, 1 Feb 2012, Andrey Y Shevel wrote:
> > >   Hi,
> > > >   I just paid attention that utility 'dd' uses just 2 GB even I 
use > >   greater

> >   block size (BS). For example
> > > >   =
> >   [root@pcfarm-10 ~]# dd if=/dev/zero of=/mnt/sdb/TestFile-S1 bs=12GB
> >   count=1
> >   0+1 records in
> >   0+1 records out
> >   2147479552 bytes (2.1 GB) copied, 15.8235 seconds, 136 MB/s
> >   
> > > >   BTW,
> > > >   [root@pcfarm-10 ~]# uname -a
> >   Linux pcfarm-10.pnpi.spb.ru 2.6.18-274.17.1.el5xen #1 SMP Tue Jan 10
> >   16:41:16 EST 2012 x86_64 x86_64 x86_64 GNU/Linux
> >   [root@pcfarm-10 ~]# cat /etc/issue
> >   Scientific Linux SL release 5.7 (Boron)
> >   Kernel \r on an \m
> > > > > > > > > >   I decided to reinstall coreutils:
> > > >   [root@pcfarm-10 ~]# yum reinstall coreutils.x86_64
> >   Failed to set locale, defaulting to C
> >   Loaded plugins: kernel-module
> >   Setting up Reinstall Process
> >   Resolving Dependencies
> >   --> Running transaction check
> >   ---> Package coreutils.x86_64 0:5.97-34.el5 set to be updated
> >   --> Finished Dependency Resolution
> >   Beginning Kernel Module Plugin
> >   Finished Kernel Module Plugin
> > > >   Dependencies Resolved
> > > > 
===

> >   Package  Arch  Version
> >   Repository
> >   Size
> > 
===

Netbackup 7.1 BMR and SL6.1 creating boot CD

2012-02-02 Thread James M Pulver
I've got netbackup up and running fine on SL6.1. I'm trying to create the boot 
CD for my Linux clients (windows worked fine), but get this:
Select one of the following options:

1.  Create a new Shared Resource Tree.
2.  Create a new CD image based Shared Resource Tree.
3.  Copy an existing Shared Resource Tree to a new location.
4.  Import a Shared Resource Tree.
5.  Modify an existing Shared Resource Tree.
6.  Delete an existing Shared Resource Tree.
7.  List Shared Resource Trees available on this server.
8.  Quit.

Enter your selection (1-8) [1] : 1
Enter the name of the SRT to create : 64BitSL
Enter the description of the new SRT : 64 bit SL6.1
V-128-312 Unsupported Linux release: Scientific Linux release 6.1 (Carbon)
Enter the desired RedHat level () :

I've entered everything I can find around the web from Red Hat Enterprise Linux 
Server 6 to 2.6, but it just returns with Enter the desired RedHat level (): ...

Any ideas what I should put there?

--
James Pulver
LEPP Computer Group
Cornell University


Re: coreutils for 64 bit

2012-02-02 Thread Andrey Y. Shevel

Hi Stephen,

thank you for your reply.

==
[root@pcfarm-10 ~]# rpm -qa --queryformat "%{NAME}-%{VERSION}.%{ARCH}\n" | 
grep coreutils

policycoreutils-1.33.12.x86_64
policycoreutils-newrole-1.33.12.x86_64
coreutils-5.97.x86_64
policycoreutils-gui-1.33.12.x86_64
=

And obviously


[root@pcfarm-10 ~]# arch
x86_64
===


The result is prety same as I shown earlier.

And the same I see at CERN

===
[lxplus427] /afs/cern.ch/user/s/shevel > dd if=/dev/zero of=/tmp/testx64 
bs=3GB count=1

0+1 records in
0+1 records out
2147479552 bytes (2.1 GB) copied, 5.91242 seconds, 363 MB/s
[lxplus427] /afs/cern.ch/user/s/shevel > rpm -q --file /bin/dd
coreutils-5.97-34.el5
[lxplus427] /afs/cern.ch/user/s/shevel >  rpm -qa --queryformat 
"%{NAME}-%{VERSION}.%{ARCH}\n" | grep coreutil

policycoreutils-1.33.12.x86_64
coreutils-5.97.x86_64
policycoreutils-gui-1.33.12.x86_64
===





As far as I understand the main question is "is there 64 bit dd version 
which can operate more then 2GB value for BS in SL anyway?"


Any answer (yes or no) is good to know.

Many thanks,

Andrey


On Wed, 1 Feb 2012, Stephen J. Gowdy wrote:


Date: Wed, 1 Feb 2012 19:10:14 +0100 (CET)
From: Stephen J. Gowdy 
To: Andrey Y. Shevel 
Cc: SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV
Subject: Re: coreutils for 64 bit

Exactly if you type "man rpm" it will show you how you get it to print 
the arch string (usually i686 or x86_64). Since you seem unabel to read a man 
page what you want to type is;


rpm -qa --queryformat "%{NAME}-%{VERSION}.%{ARCH}\n" | grep coreutils

(or miss out the VERSION if you want to see somethign similar to yum)

On Wed, 1 Feb 2012, Andrey Y. Shevel wrote:



 Hi Stephen,

 thanks for the reply.

 I am not sure that I do understand you (sorry for my stupidity).

 I have
 ===
 [root@pcfarm-10 ~]# yum list | grep coreutil
 Failed to set locale, defaulting to C
 coreutils.x86_64 5.97-34.el5 installed
 policycoreutils.x86_64   1.33.12-14.8.el5 installed
 policycoreutils-gui.x86_64   1.33.12-14.8.el5 installed
 policycoreutils-newrole.x86_64   1.33.12-14.8.el5 installed
 [root@pcfarm-10 ~]# rpm -q --file /bin/dd
 coreutils-5.97-34.el5
 =

 Presumably all packages are appropriate (they have suffix x86_64) as shown
 by yum.

 At the same time rpm does show packages without above suffixes

 =
 [root@pcfarm-10 ~]# rpm -qa | grep coreutil
 policycoreutils-1.33.12-14.8.el5
 policycoreutils-newrole-1.33.12-14.8.el5
 coreutils-5.97-34.el5
 policycoreutils-gui-1.33.12-14.8.el5
 =




 On Wed, 1 Feb 2012, Stephen J. Gowdy wrote:

>  Date: Wed, 1 Feb 2012 11:32:40 +0100 (CET)
>  From: Stephen J. Gowdy 
>  To: Andrey Y Shevel 
>  Cc: SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV
>  Subject: Re: coreutils for 64 bit
> 
>  It says it only copied 2.1GB. You are runnig a 64bit OS. You reinstalld 
>  the same coreutils package. You need to change the format of the package 
>  names from "rpm -qa" if you want to see the architecture ("man rpm" 
>  should help you figure out how).
> 
>  On Wed, 1 Feb 2012, Andrey Y Shevel wrote:
> 
> >   Hi,
> > 
> >   I just paid attention that utility 'dd' uses just 2 GB even I use 
> >   greater

> >   block size (BS). For example
> > 
> >   =

> >   [root@pcfarm-10 ~]# dd if=/dev/zero of=/mnt/sdb/TestFile-S1 bs=12GB
> >   count=1
> >   0+1 records in
> >   0+1 records out
> >   2147479552 bytes (2.1 GB) copied, 15.8235 seconds, 136 MB/s
> >   
> > 
> >   BTW,
> > 
> >   [root@pcfarm-10 ~]# uname -a

> >   Linux pcfarm-10.pnpi.spb.ru 2.6.18-274.17.1.el5xen #1 SMP Tue Jan 10
> >   16:41:16 EST 2012 x86_64 x86_64 x86_64 GNU/Linux
> >   [root@pcfarm-10 ~]# cat /etc/issue
> >   Scientific Linux SL release 5.7 (Boron)
> >   Kernel \r on an \m
> > 
> > 
> > 
> > 
> >   I decided to reinstall coreutils:
> > 
> >   [root@pcfarm-10 ~]# yum reinstall coreutils.x86_64

> >   Failed to set locale, defaulting to C
> >   Loaded plugins: kernel-module
> >   Setting up Reinstall Process
> >   Resolving Dependencies
> >   --> Running transaction check
> >   ---> Package coreutils.x86_64 0:5.97-34.el5 set to be updated
> >   --> Finished Dependency Resolution
> >   Beginning Kernel Module Plugin
> >   Finished Kernel Module Plugin
> > 
> >   Dependencies Resolved
> > 
> >   ===

> >   Package  Arch  Version
> >   Repository
> >   Size
> >   
===
> >   Reinstalling:
> >   coreutilsx86_645.97-34.el5 
> >   sl-base

> >   3.6 M
> > 
> >   Transaction Summary

> >   
==

Bug report: Page allocation failure with virtio-net in kvm guest on 2.6.32-220.4.1

2012-02-02 Thread Benjamin Reiter, Aginion IT-Consulting

Page allocation failure with virtio-net in kvm guest on 2.6.32-220.4.1

Reproducibly after a couple minutes or hours and 100 MB - 30GB of 
network traffic (NFS) the network interface in the guest goes down. The 
guest can be shut down from the host via acpi event.


This does only happen with the virtio net driver, with e1000 the guest 
is stable for days.


Host and guest run 2.6.32-220.4.1.el6.x86_64

Host runs kvm version 0.12.1.2-2.209.el6_2.4.x86_64





Feb  2 13:04:02 host656 kernel: rpciod/0: page allocation failure. 
order:0, mode:0x20
Feb  2 13:04:02 host656 kernel: Pid: 1081, comm: rpciod/0 Not tainted 
2.6.32-220.4.1.el6.x86_64 #1

Feb  2 13:04:02 host656 kernel: Call Trace:
Feb  2 13:04:02 host656 kernel:   [] ? 
__alloc_pages_nodemask+0x77f/0x940
Feb  2 13:04:02 host656 kernel: [] ? 
alloc_pages_current+0xaa/0x110
Feb  2 13:04:02 host656 kernel: [] ? 
try_fill_recv+0x262/0x280 [virtio_net]
Feb  2 13:04:02 host656 kernel: [] ? 
netif_receive_skb+0x58/0x60
Feb  2 13:04:02 host656 kernel: [] ? 
virtnet_poll+0x42d/0x8d0 [virtio_net]
Feb  2 13:04:02 host656 kernel: [] ? 
net_rx_action+0x103/0x2f0
Feb  2 13:04:02 host656 kernel: [] ? 
__do_softirq+0xc1/0x1d0
Feb  2 13:04:02 host656 kernel: [] ? 
call_softirq+0x1c/0x30
Feb  2 13:04:02 host656 kernel:   [] ? 
do_softirq+0x65/0xa0
Feb  2 13:04:02 host656 kernel: [] ? 
local_bh_enable+0x9a/0xb0
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_rcv_established+0x107/0x800
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_v4_do_rcv+0x2e3/0x430
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_write_xmit+0x1f6/0x9e0
Feb  2 13:04:02 host656 kernel: [] ? 
release_sock+0x65/0xe0
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_sendmsg+0x73c/0xa10
Feb  2 13:04:02 host656 kernel: [] ? 
sock_sendmsg+0x11a/0x150
Feb  2 13:04:02 host656 kernel: [] ? 
pvclock_clocksource_read+0x58/0xd0
Feb  2 13:04:02 host656 kernel: [] ? 
autoremove_wake_function+0x0/0x40
Feb  2 13:04:02 host656 kernel: [] ? 
enqueue_entity+0x125/0x420
Feb  2 13:04:02 host656 kernel: [] ? 
kernel_sendmsg+0x41/0x60
Feb  2 13:04:02 host656 kernel: [] ? 
xs_send_kvec+0x8e/0xa0 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
xs_sendpages+0x173/0x220 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
xs_tcp_send_request+0x5d/0x160 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
xprt_transmit+0x83/0x2e0 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
call_transmit+0x1d8/0x2c0 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
__rpc_execute+0x5e/0x2a0 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
rpc_async_schedule+0x0/0x20 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
rpc_async_schedule+0x15/0x20 [sunrpc]
Feb  2 13:04:02 host656 kernel: [] ? 
worker_thread+0x170/0x2a0
Feb  2 13:04:02 host656 kernel: [] ? 
autoremove_wake_function+0x0/0x40
Feb  2 13:04:02 host656 kernel: [] ? 
worker_thread+0x0/0x2a0

Feb  2 13:04:02 host656 kernel: [] ? kthread+0x96/0xa0
Feb  2 13:04:02 host656 kernel: [] ? child_rip+0xa/0x20
Feb  2 13:04:02 host656 kernel: [] ? kthread+0x0/0xa0
Feb  2 13:04:02 host656 kernel: [] ? child_rip+0x0/0x20
Feb  2 13:04:02 host656 kernel: rpciod/0: page allocation failure. 
order:0, mode:0x20
Feb  2 13:04:02 host656 kernel: Pid: 1081, comm: rpciod/0 Not tainted 
2.6.32-220.4.1.el6.x86_64 #1

Feb  2 13:04:02 host656 kernel: Call Trace:
Feb  2 13:04:02 host656 kernel:   [] ? 
__alloc_pages_nodemask+0x77f/0x940
Feb  2 13:04:02 host656 kernel: [] ? 
kmem_getpages+0x62/0x170
Feb  2 13:04:02 host656 kernel: [] ? 
fallback_alloc+0x1ba/0x270
Feb  2 13:04:02 host656 kernel: [] ? 
cache_grow+0x2cf/0x320
Feb  2 13:04:02 host656 kernel: [] ? 
cache_alloc_node+0x99/0x160
Feb  2 13:04:02 host656 kernel: [] ? 
__alloc_skb+0x7a/0x180
Feb  2 13:04:02 host656 kernel: [] ? 
kmem_cache_alloc_node_notrace+0x6f/0x130
Feb  2 13:04:02 host656 kernel: [] ? 
__kmalloc_node+0x7b/0x100
Feb  2 13:04:02 host656 kernel: [] ? 
__alloc_skb+0x7a/0x180
Feb  2 13:04:02 host656 kernel: [] ? 
__netdev_alloc_skb+0x36/0x60
Feb  2 13:04:02 host656 kernel: [] ? 
virtnet_poll+0x1b2/0x8d0 [virtio_net]
Feb  2 13:04:02 host656 kernel: [] ? 
net_rx_action+0x103/0x2f0
Feb  2 13:04:02 host656 kernel: [] ? 
__do_softirq+0xc1/0x1d0
Feb  2 13:04:02 host656 kernel: [] ? 
call_softirq+0x1c/0x30
Feb  2 13:04:02 host656 kernel:   [] ? 
do_softirq+0x65/0xa0
Feb  2 13:04:02 host656 kernel: [] ? 
local_bh_enable+0x9a/0xb0
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_rcv_established+0x107/0x800
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_v4_do_rcv+0x2e3/0x430
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_write_xmit+0x1f6/0x9e0
Feb  2 13:04:02 host656 kernel: [] ? 
release_sock+0x65/0xe0
Feb  2 13:04:02 host656 kernel: [] ? 
tcp_sendmsg+0x73c/0xa10
Feb  2 13:04:02 host656 kernel: [] ? 
sock_sendmsg+0x11a/0x150
Feb  2 13:04:02 host656 kernel: [] ? 
pvclock_clocksource_read+0x58/0xd0
Feb  2 13:04:02 host656 kernel: [] ? 
autoremove_wake_function+0x0/0x40
Feb  2 13:04:02 host656 kernel: [] ? 
enqueue_entity+0x125/0x420
Feb  2 13:04:02 host656 kernel: [] ? 
kernel_sendmsg+0x41/0x60
Feb  2 13:04:02 h

Re: serious bug in boot sequence when fsck is required

2012-02-02 Thread Nico Kadel-Garcia
On Wed, Feb 1, 2012 at 9:04 PM, jdow  wrote:
> On 2012/02/01 15:38, Tom H wrote:
>>
>> On Wed, Feb 1, 2012 at 6:05 PM, Nico Kadel-Garcia
>>  wrote:
>>>

>>> This is not normally considered a "bug". The software is not doing
>>> anything that is not expected or undocumented. It's a *risk*, and some
>>> folks might think it's a security flaw. But the burden of storing and
>>> managing  separate password for deployed systems is not, hirsorically,
>>> taken up by default. It would have to be written into the OS instaler
>>> to apply on the existing boot loader software. So it's not set by
>>> default.
>>
>>
>> It's not a bug; it's a TUV decision. Requiring the root password for
>> single user mode can be set through "/etc/sysconfig/init".
>>
>> As Nico's shown, you can also set a grub password to prevent anyone
>> from adding "init=/bin/sh"/"init=/bin/bash" to the "kernel" line
>> without that password.
>
>
> It is a bug, IIRC. The original complaint is that it claims it is ready
> to accept the root password and something prevents it by causing the
> login prompt to recycle with each character typed. That has been declared
> a TUV bug. I think somebody mentioned there might be a fix for it that has
> not percolated through yet. It'd be worth checking TUV's bugzilla.

This is Yasha's original issue, *separate* from password protection
for the boot loader. Yasha brought up what he considered a  separate
"bug", that the init=/bin/sh stunt works by default, and that is what
I've been saying "that's not a bug, it's a documented part of how
things work, please don't derive software behavior from first
principles and then say 'that's a bug' when it doesn't work the way
you thing".  It's tempting, and I've done it myself, but it leads to
confusion.

The broken root password handling is a distinct problem. It's clearly
a failure, but  is probably not a boot loader bug. The system had a
corrupted filesystem due to an unmanaged shutdown during a power
failure. The state of such a system is unpredictable, and it's
unfair to blame the bug on the boot loader when the filesystem may be
hosed and demonstrably needs to be fsck'ed. No one can fix that for
you from the installed software side, because the state of the data on
the disks is unreliable and cannot be trusted to be reliable software.
It has to be fixed  That's what rescue and recovery media are *for*.

I'd be curious if Yasha can *now* reboot into fsck requiring mode.
Yasha? Do you feel like testing that? You could use 'tune2fs' to lower
the max-mount-counts to, say, 3, and reboot a couple of times to get
it do demand an fsck.