|
From: Andrzej O. <an...@ma...> - 2014-11-10 17:29:15
|
Dear Heiko, Since my attempts with backport encountered some problems, especially in the context of grsec, I wanted to ask you about the plans for the transition to the 3.14 kernel line - whether and, if so, when are you planning to upgrade? Maybe my efforts are completely unnecessary? Ready-backports does not compile with kernel 3.2.63 patched grsec smoothly. The least problems give backports of 3.10 if only for iwlwifi wireless. If successful, also would require source code analysis. Meanwhile, the line is 3.14 has grsec from some time and seems is selected to be the successor to the kernel line 3.2. I suspect that only you Could upgrade D-L to the kernel line 3.14 --- unless it requires a change in the compiler, and probably changes in the build environment. That's why I thought to ask you about the plans. Best regards -- Andrzej Odyniec |
|
From: Heiko Z. <he...@zu...> - 2014-11-21 13:37:18
|
Andrzej, Sorry for the late answer. I have currently no plans to upgrade the Kernel. Being on the latest Kernel has historically caused us some grief with the kernel patches. That's why we're currently using the "stable long-term" kernel. I didn't realize that 3.14 is a new long-term kernel and I agree that we should try to switch to that. Anybody should be able to replace the Kernel. The initial fun is with the main kernel config, then the additional patches. We should also make a decision on which Kernel patches we actually want to keep in the distro. Some of the problematic ones might not even be used anymore by anybody. I'd say replace it and see what happens. ;-) Heiko Quoting Andrzej Odyniec <an...@ma...>: > Dear Heiko, > > Since my attempts with backport encountered some problems, especially in the > context of grsec, I wanted to ask you about the plans for the transition to > the 3.14 kernel line - whether and, if so, when are you planning to upgrade? > Maybe my efforts are completely unnecessary? > > Ready-backports does not compile with kernel 3.2.63 patched grsec smoothly. > The least problems give backports of 3.10 if only for iwlwifi wireless. If > successful, also would require source code analysis. > > Meanwhile, the line is 3.14 has grsec from some time and seems is selected to > be the successor to the kernel line 3.2. > > I suspect that only you Could upgrade D-L to the kernel line 3.14 --- unless > it requires a change in the compiler, and probably changes in the build > environment. > > That's why I thought to ask you about the plans. > > Best regards > > -- > Andrzej Odyniec > > ------------------------------------------------------------------------------ > _______________________________________________ > Devil-linux-develop mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-develop -- Regards Heiko Zuerker |
|
From: Andrzej O. <an...@ma...> - 2014-12-03 17:25:56
|
Heiko, I started to try, although I had recently a lot of other activities. - We need to update aufs3, because the old is not compiling with 3.14 kernel - Keepalived, even this with git, do not want to compile with 3.14 so turned it off for now - Motion, including the one with svn, do not want to compile, so too turned it off for now too - Iptables must be raised to 1.4.21 - Unfortunately, gcc 4.4.5 is not sufficient because it does not support plug-ins, so as for now I raised gcc to 4.5.1; Of course I had to pick up a gcc-hardened; I took hardened patches from lfs; maybe I should raise gcc higher? - Kernel needs now to build bc, so I installed 1.06 In spite of this kernel build process stopped at aufs3; anything goes wrong and I have a little read about aufs; perhaps my manual controlled prepare for aufs3 did not properly. So kernel line upgrade is not so simple. But I do not resign Best regards Andrzej Odyniec --- Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast. http://www.avast.com |
|
From: Heiko Z. <he...@zu...> - 2014-12-03 18:44:31
|
Andrzej, That's the same trouble I usually have to go through when we upgrade the kernel. In regards to GCC, let's go to the highest possible that still compiles our sources. You'll find there will be some incompatibilities too. Hang in there! Heiko Quoting Andrzej Odyniec <an...@ma...>: > Heiko, > > I started to try, although I had recently a lot of other activities. > - We need to update aufs3, because the old is not compiling with 3.14 kernel > - Keepalived, even this with git, do not want to compile with 3.14 so turned > it off for now > - Motion, including the one with svn, do not want to compile, so too > turned it > off for now too > - Iptables must be raised to 1.4.21 > - Unfortunately, gcc 4.4.5 is not sufficient because it does not support > plug-ins, so as for now I raised gcc to 4.5.1; Of course I had to pick up a > gcc-hardened; I took hardened patches from lfs; maybe I should raise > gcc higher? > - Kernel needs now to build bc, so I installed 1.06 > > In spite of this kernel build process stopped at aufs3; anything goes wrong > and I have a little read about aufs; perhaps my manual controlled prepare for > aufs3 did not properly. > > So kernel line upgrade is not so simple. But I do not resign > > Best regards > > Andrzej Odyniec > > --- > Ta wiadomość została sprawdzona na obecność wirusów przez > oprogramowanie antywirusowe Avast. > http://www.avast.com > > > ------------------------------------------------------------------------------ > Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server > from Actuate! Instantly Supercharge Your Business Reports and Dashboards > with Interactivity, Sharing, Native Excel Exports, App Integration & more > Get technology previously reserved for billion-dollar corporations, FREE > http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk > _______________________________________________ > Devil-linux-develop mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-develop -- Regards Heiko Zuerker |
|
From: Serge L. <ser...@gm...> - 2014-12-04 18:13:51
|
Hi Andrzej,
works for me, x86_64 only.
> GNU C Library (GNU libc) stable release version 2.19, by Roland McGrath et al.
...
> Compiled by GNU CC version 4.8.3.
> Compiled on a Linux 3.14.17 system on 2014-08-15.
aufs has the following structure:
root:/data/build/tmp/aufs# ls -1 ../aufs/
aufs-util
aufs3-standalone
scripts:
scripts/prepare
...
build )
...
if [ "$CONFIG_ETCFS" = "AUFS" ]; then
echo "Patching AUFS"
if [ ! -f $KERNELDIR/.done_aufs_patch ]; then
AUFSDIR=$(find_src_dir aufs)
patch -d $KERNELDIR -p1 -i
${AUFSDIR}/aufs3-standalone/aufs3-kbuild.patch || exit 1
patch -d $KERNELDIR -p1 -i
${AUFSDIR}/aufs3-standalone/aufs3-base.patch || exit 1
patch -d $KERNELDIR -p1 -i
${AUFSDIR}/aufs3-standalone/aufs3-mmap.patch || exit 1
patch -d $KERNELDIR -p1 -i
${AUFSDIR}/aufs3-standalone/aufs3-standalone.patch || exit 1
rm -f ${AUFSDIR}/aufs3-standalone/include/linux/Kbuild
rm -f ${AUFSDIR}/aufs3-standalone/include/uapi/linux/Kbuild
cp -dpvR ${AUFSDIR}/aufs3-standalone/{fs,Documentation,include}
$KERNELDIR/ || exit 1
touch $KERNELDIR/.done_aufs_patch
fi
set_kernel_option CONFIG_AUFS_FS m
set_kernel_option CONFIG_AUFS_HINOTIFY n
set_kernel_option CONFIG_AUFS_HNOTIFY y
set_kernel_option CONFIG_AUFS_BRANCH_MAX_127 y
set_kernel_option CONFIG_AUFS_BRANCH_MAX_511 n
set_kernel_option CONFIG_AUFS_BRANCH_MAX_1023 n
set_kernel_option CONFIG_AUFS_BRANCH_MAX_32767 n
set_kernel_option CONFIG_AUFS_SBILIST y
set_kernel_option CONFIG_AUFS_EXPORT n
set_kernel_option CONFIG_AUFS_BR_RAMFS n
set_kernel_option CONFIG_AUFS_SHWH n
set_kernel_option CONFIG_AUFS_RDU n
set_kernel_option CONFIG_AUFS_PROC_MAP n
set_kernel_option CONFIG_AUFS_SP_IATTR n
set_kernel_option CONFIG_AUFS_SHWH n
set_kernel_option CONFIG_AUFS_BR_RAMFS n
set_kernel_option CONFIG_AUFS_DEBUG n
set_kernel_option CONFIG_AUFS_HFSNOTIFY y
fi
and scripts/aufs :
build )
if [ "$CONFIG_ETCFS" = "AUFS" ]; then
#fix me
replace_str $KERNELDIR/include/uapi/linux/aufs_type.h
"__user" " "
cd aufs-util || exit 1
CPPFLAGS="-I $KERNELDIR/usr/include
-I../aufs2-standalone/include" make KDIR=$KERNELDIR all || exit 1
fi
;;
install )
if [ "$CONFIG_ETCFS" = "AUFS" ]; then
cp -dpvR aufs-util/aufs.5 $CDDIR/usr/share/man/man5/ || exit 1
cd aufs-util || exit 1
mkdir -p $TMPDIR/{sbin,usr/bin} || exit 1
mkdir -p $TMPDIR/etc/default || exit 1
make KDIR=$KERNELDIR DESTDIR=$TMPDIR install || exit 1
cp -dpvR $TMPDIR/etc/* $ETCDIR/etc/ || exit 1
rm -rf $TMPDIR/etc || exit 1
cp -dpvR $TMPDIR/* $CDDIR/ || exit 1
rm -rf $TMPDIR || exit 1
fi
;;
Thanks,
Serge
On 12/03/2014 09:25 AM, Andrzej Odyniec wrote:
> Heiko,
>
> I started to try, although I had recently a lot of other activities.
> - We need to update aufs3, because the old is not compiling with 3.14 kernel
> - Keepalived, even this with git, do not want to compile with 3.14 so turned
> it off for now
> - Motion, including the one with svn, do not want to compile, so too turned it
> off for now too
> - Iptables must be raised to 1.4.21
> - Unfortunately, gcc 4.4.5 is not sufficient because it does not support
> plug-ins, so as for now I raised gcc to 4.5.1; Of course I had to pick up a
> gcc-hardened; I took hardened patches from lfs; maybe I should raise gcc higher?
> - Kernel needs now to build bc, so I installed 1.06
>
> In spite of this kernel build process stopped at aufs3; anything goes wrong
> and I have a little read about aufs; perhaps my manual controlled prepare for
> aufs3 did not properly.
>
> So kernel line upgrade is not so simple. But I do not resign
>
> Best regards
>
> Andrzej Odyniec
>
> ---
> Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast.
> http://www.avast.com
>
>
> ------------------------------------------------------------------------------
> Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
> from Actuate! Instantly Supercharge Your Business Reports and Dashboards
> with Interactivity, Sharing, Native Excel Exports, App Integration & more
> Get technology previously reserved for billion-dollar corporations, FREE
> http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
> _______________________________________________
> Devil-linux-develop mailing list
> Dev...@li...
> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
>
|
|
From: Andrzej O. <an...@ma...> - 2014-12-06 02:59:00
|
Dear Serge,
Thanks for scripts. I modified my. I try to make full automated DL-build with
new kernel. And after try with kernel alone I upgraded gcc sources and started
again full build. But now some packages before linux kernel are not compiling
probably because of loader. So now I upgraded binutils and try again. I think,
I will need many tries. But I don't resign.
Yours
Andrzej Odyniec
W dniu 2014-12-04 o 19:13, Serge Leschinsky pisze:
> Hi Andrzej,
>
> works for me, x86_64 only.
>
> > GNU C Library (GNU libc) stable release version 2.19, by Roland McGrath et al.
> ...
> > Compiled by GNU CC version 4.8.3.
> > Compiled on a Linux 3.14.17 system on 2014-08-15.
>
>
> aufs has the following structure:
>
> root:/data/build/tmp/aufs# ls -1 ../aufs/
> aufs-util
> aufs3-standalone
>
>
> scripts:
>
> scripts/prepare
> ...
> build )
> ...
> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
> echo "Patching AUFS"
> if [ ! -f $KERNELDIR/.done_aufs_patch ]; then
> AUFSDIR=$(find_src_dir aufs)
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-kbuild.patch || exit 1
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-base.patch || exit 1
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-mmap.patch || exit 1
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-standalone.patch || exit 1
> rm -f ${AUFSDIR}/aufs3-standalone/include/linux/Kbuild
> rm -f ${AUFSDIR}/aufs3-standalone/include/uapi/linux/Kbuild
> cp -dpvR ${AUFSDIR}/aufs3-standalone/{fs,Documentation,include}
> $KERNELDIR/ || exit 1
> touch $KERNELDIR/.done_aufs_patch
> fi
>
> set_kernel_option CONFIG_AUFS_FS m
> set_kernel_option CONFIG_AUFS_HINOTIFY n
> set_kernel_option CONFIG_AUFS_HNOTIFY y
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_127 y
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_511 n
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_1023 n
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_32767 n
> set_kernel_option CONFIG_AUFS_SBILIST y
> set_kernel_option CONFIG_AUFS_EXPORT n
> set_kernel_option CONFIG_AUFS_BR_RAMFS n
> set_kernel_option CONFIG_AUFS_SHWH n
> set_kernel_option CONFIG_AUFS_RDU n
> set_kernel_option CONFIG_AUFS_PROC_MAP n
> set_kernel_option CONFIG_AUFS_SP_IATTR n
> set_kernel_option CONFIG_AUFS_SHWH n
> set_kernel_option CONFIG_AUFS_BR_RAMFS n
> set_kernel_option CONFIG_AUFS_DEBUG n
> set_kernel_option CONFIG_AUFS_HFSNOTIFY y
> fi
>
>
> and scripts/aufs :
>
> build )
> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
> #fix me
> replace_str $KERNELDIR/include/uapi/linux/aufs_type.h
> "__user" ""
> cd aufs-util || exit 1
> CPPFLAGS="-I $KERNELDIR/usr/include
> -I../aufs2-standalone/include" make KDIR=$KERNELDIR all || exit 1
> fi
> ;;
>
> install )
> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
> cp -dpvR aufs-util/aufs.5 $CDDIR/usr/share/man/man5/ || exit 1
> cd aufs-util || exit 1
> mkdir -p $TMPDIR/{sbin,usr/bin} || exit 1
> mkdir -p $TMPDIR/etc/default || exit 1
> make KDIR=$KERNELDIR DESTDIR=$TMPDIR install || exit 1
> cp -dpvR $TMPDIR/etc/* $ETCDIR/etc/ || exit 1
> rm -rf $TMPDIR/etc || exit 1
> cp -dpvR $TMPDIR/* $CDDIR/ || exit 1
> rm -rf $TMPDIR || exit 1
> fi
> ;;
>
> Thanks,
> Serge
--
Andrzej Odyniec
|
|
From: Heiko Z. <he...@zu...> - 2014-12-10 13:48:00
|
Andrzej,
I don't recall, but is it possible that I actually removed the
"--fatal-warnings" from the patch?
Can you compare with the original version from the LFS website?
I don't think it makes sense to modify every package. Actually the
right approach would be to find/create patches that will correct the
compiler warnings and replace the less secure code. But that's a lot
of work...
Heiko
Quoting Andrzej Odyniec <an...@ma...>:
> Dear All,
>
> After several attempts with different combinations, it appears that at the
> beginning I will build D-L with kernel 3.14 using gcc-4.5.3. And here I need
> your opinion please.
>
> Fpie-1 patch to 4.4.5 contains the default setting -no-fatal-warning and the
> same lfs patch to 4.5.3 no longer provides the default setting for this
> option(s). So compilation (linking) stops on tmpnam, mktemp or
> textrel warnings.
>
> What would you have suggested: Setting the option -no-fatal-warnings or
> --no-warn-shared-textrel in every script, which will crash gcc-4.5.3
> compilation patched using existing lfs patches or doing myself a patch to the
> default setting of these options, as it was with gcc-4.4.5?
>
> Regards
>
> Andrzej Odyniec
>
>
> Serge Leschinsky wrote:
>> Hi Andrzej,
>>
>> works for me, x86_64 only.
>>
>> > GNU C Library (GNU libc) stable release version 2.19, by Roland
>> McGrath et al.
>> ...
>> > Compiled by GNU CC version 4.8.3.
>> > Compiled on a Linux 3.14.17 system on 2014-08-15.
>>
>>
>> aufs has the following structure:
>>
>> root:/data/build/tmp/aufs# ls -1 ../aufs/
>> aufs-util
>> aufs3-standalone
>>
>>
>> scripts:
>>
>> scripts/prepare
>> ...
>> build )
>> ...
>> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
>> echo "Patching AUFS"
>> if [ ! -f $KERNELDIR/.done_aufs_patch ]; then
>> AUFSDIR=$(find_src_dir aufs)
>> patch -d $KERNELDIR -p1 -i
>> ${AUFSDIR}/aufs3-standalone/aufs3-kbuild.patch || exit 1
>> patch -d $KERNELDIR -p1 -i
>> ${AUFSDIR}/aufs3-standalone/aufs3-base.patch || exit 1
>> patch -d $KERNELDIR -p1 -i
>> ${AUFSDIR}/aufs3-standalone/aufs3-mmap.patch || exit 1
>> patch -d $KERNELDIR -p1 -i
>> ${AUFSDIR}/aufs3-standalone/aufs3-standalone.patch || exit 1
>> rm -f ${AUFSDIR}/aufs3-standalone/include/linux/Kbuild
>> rm -f ${AUFSDIR}/aufs3-standalone/include/uapi/linux/Kbuild
>> cp -dpvR
>> ${AUFSDIR}/aufs3-standalone/{fs,Documentation,include}
>> $KERNELDIR/ || exit 1
>> touch $KERNELDIR/.done_aufs_patch
>> fi
>>
>> set_kernel_option CONFIG_AUFS_FS m
>> set_kernel_option CONFIG_AUFS_HINOTIFY n
>> set_kernel_option CONFIG_AUFS_HNOTIFY y
>> set_kernel_option CONFIG_AUFS_BRANCH_MAX_127 y
>> set_kernel_option CONFIG_AUFS_BRANCH_MAX_511 n
>> set_kernel_option CONFIG_AUFS_BRANCH_MAX_1023 n
>> set_kernel_option CONFIG_AUFS_BRANCH_MAX_32767 n
>> set_kernel_option CONFIG_AUFS_SBILIST y
>> set_kernel_option CONFIG_AUFS_EXPORT n
>> set_kernel_option CONFIG_AUFS_BR_RAMFS n
>> set_kernel_option CONFIG_AUFS_SHWH n
>> set_kernel_option CONFIG_AUFS_RDU n
>> set_kernel_option CONFIG_AUFS_PROC_MAP n
>> set_kernel_option CONFIG_AUFS_SP_IATTR n
>> set_kernel_option CONFIG_AUFS_SHWH n
>> set_kernel_option CONFIG_AUFS_BR_RAMFS n
>> set_kernel_option CONFIG_AUFS_DEBUG n
>> set_kernel_option CONFIG_AUFS_HFSNOTIFY y
>> fi
>>
>>
>> and scripts/aufs :
>>
>> build )
>> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
>> #fix me
>> replace_str $KERNELDIR/include/uapi/linux/aufs_type.h
>> "__user" " "
>> cd aufs-util || exit 1
>> CPPFLAGS="-I $KERNELDIR/usr/include
>> -I../aufs2-standalone/include" make KDIR=$KERNELDIR all || exit 1
>> fi
>> ;;
>>
>> install )
>> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
>> cp -dpvR aufs-util/aufs.5
>> $CDDIR/usr/share/man/man5/ || exit 1
>> cd aufs-util || exit 1
>> mkdir -p $TMPDIR/{sbin,usr/bin} || exit 1
>> mkdir -p $TMPDIR/etc/default || exit 1
>> make KDIR=$KERNELDIR DESTDIR=$TMPDIR install || exit 1
>> cp -dpvR $TMPDIR/etc/* $ETCDIR/etc/ || exit 1
>> rm -rf $TMPDIR/etc || exit 1
>> cp -dpvR $TMPDIR/* $CDDIR/ || exit 1
>> rm -rf $TMPDIR || exit 1
>> fi
>> ;;
>>
>> Thanks,
>> Serge
>>
>>
>> On 12/03/2014 09:25 AM, Andrzej Odyniec wrote:
>>
>>> Heiko,
>>>
>>> I started to try, although I had recently a lot of other activities.
>>> - We need to update aufs3, because the old is not compiling with
>>> 3.14 kernel
>>> - Keepalived, even this with git, do not want to compile with 3.14
>>> so turned
>>> it off for now
>>> - Motion, including the one with svn, do not want to compile, so
>>> too turned it
>>> off for now too
>>> - Iptables must be raised to 1.4.21
>>> - Unfortunately, gcc 4.4.5 is not sufficient because it does not support
>>> plug-ins, so as for now I raised gcc to 4.5.1; Of course I had to pick up a
>>> gcc-hardened; I took hardened patches from lfs; maybe I should
>>> raise gcc higher?
>>> - Kernel needs now to build bc, so I installed 1.06
>>>
>>> In spite of this kernel build process stopped at aufs3; anything goes wrong
>>> and I have a little read about aufs; perhaps my manual controlled
>>> prepare for
>>> aufs3 did not properly.
>>>
>>> So kernel line upgrade is not so simple. But I do not resign
>>>
>>> Best regards
>>>
>>> Andrzej Odyniec
>>>
>>> ---
>>> Ta wiadomość została sprawdzona na obecność wirusów przez
>>> oprogramowanie antywirusowe Avast.
>>> http://www.avast.com
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
>>> from Actuate! Instantly Supercharge Your Business Reports and Dashboards
>>> with Interactivity, Sharing, Native Excel Exports, App Integration & more
>>> Get technology previously reserved for billion-dollar corporations, FREE
>>> http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
>>> _______________________________________________
>>> Devil-linux-develop mailing list
>>> Dev...@li...
>>> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
>>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
>> from Actuate! Instantly Supercharge Your Business Reports and Dashboards
>> with Interactivity, Sharing, Native Excel Exports, App Integration & more
>> Get technology previously reserved for billion-dollar corporations, FREE
>> http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
>> _______________________________________________
>> Devil-linux-develop mailing list
>> Dev...@li...
>> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
>
>
> --
> Andrzej Odyniec
>
> <an...@ma...>
> Rada Nadzorcza Macrologic SA
> ul. Kłopotowskiego 22, 03-717 Warszawa
> tel. +48-222566332, kom. +48-601276572
> Skype: andrzej.odyniec
> Rejestr: Sąd Rejonowy dla m.st. Warszawy,
> XIII Wydział Gospodarczy Krajowego
> Rejestru Sądowego, numer 0000045462
> Numer identyfikacji podatkowej: PL 5220002825
> Kapitał zakładowy: 1888719 zł opłacony w całości
>
> ---
> Ta wiadomość została sprawdzona na obecność wirusów przez
> oprogramowanie antywirusowe Avast.
> http://www.avast.com
>
>
> ------------------------------------------------------------------------------
> Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
> from Actuate! Instantly Supercharge Your Business Reports and Dashboards
> with Interactivity, Sharing, Native Excel Exports, App Integration & more
> Get technology previously reserved for billion-dollar corporations, FREE
> http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
> _______________________________________________
> Devil-linux-develop mailing list
> Dev...@li...
> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
--
Regards
Heiko Zuerker
|
|
From: Heiko Z. <he...@zu...> - 2015-01-17 22:20:54
|
Andrzej,
Looks like our hand is going to be forced and we need to move to the
newer kernel.
Unfortunately AUFS doesn't work anymore with the latest 3.2 kernel and
it's not supported anymore for those versions....
Heiko
Quoting Heiko Zuerker <he...@zu...>:
> Sounds good.
>
> Heiko
>
> Quoting Andrzej Odyniec <an...@ma...>:
>
>> Heiko Zuerker wrote:
>>> Andrzej,
>>>
>>> I don't recall, but is it possible that I actually removed the
>>> "--fatal-warnings" from the patch?
>>> Can you compare with the original version from the LFS website?
>>
>> Heiko, you don't. This situation is in original lfs patches. I
>> think, this is
>> policy decision of Robert Connolly at lfs. In this same patch at 4.5.1 and
>> 4.5.3 he added intentionally in gcc.c line:
>> + %{!no-fatal-warnings:--fatal-warnings} "
>>
>> So this is current policy. And generally: proper decision.
>>
>>> I don't think it makes sense to modify every package. Actually the
>>> right approach would be to find/create patches that will correct the
>>> compiler warnings and replace the less secure code. But that's a lot
>>> of work...
>>
>> Yes, this is lot of work. Some packages can be upgraded to version without
>> this warnings. But i.e. gzip is not corrected from old times. So there is
>> needed patch in gcc or CC="gcc -no-fatal-warnings" in the script.
>>
>> For first time I will use modified myself pie patch at 4.5.3 for find other
>> problems. After I will try to do statistics about packages generating
>> warnings. And after I will report this. We will think, what is better.
>>
>> Regards
>>
>> --
>> Andrzej Odyniec
--
Regards
Heiko Zuerker
|
|
From: Andrzej O. <an...@ma...> - 2014-12-10 13:23:18
|
Dear All,
After several attempts with different combinations, it appears that at the
beginning I will build D-L with kernel 3.14 using gcc-4.5.3. And here I need
your opinion please.
Fpie-1 patch to 4.4.5 contains the default setting -no-fatal-warning and the
same lfs patch to 4.5.3 no longer provides the default setting for this
option(s). So compilation (linking) stops on tmpnam, mktemp or textrel warnings.
What would you have suggested: Setting the option -no-fatal-warnings or
--no-warn-shared-textrel in every script, which will crash gcc-4.5.3
compilation patched using existing lfs patches or doing myself a patch to the
default setting of these options, as it was with gcc-4.4.5?
Regards
Andrzej Odyniec
Serge Leschinsky wrote:
> Hi Andrzej,
>
> works for me, x86_64 only.
>
> > GNU C Library (GNU libc) stable release version 2.19, by Roland McGrath et al.
> ...
> > Compiled by GNU CC version 4.8.3.
> > Compiled on a Linux 3.14.17 system on 2014-08-15.
>
>
> aufs has the following structure:
>
> root:/data/build/tmp/aufs# ls -1 ../aufs/
> aufs-util
> aufs3-standalone
>
>
> scripts:
>
> scripts/prepare
> ...
> build )
> ...
> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
> echo "Patching AUFS"
> if [ ! -f $KERNELDIR/.done_aufs_patch ]; then
> AUFSDIR=$(find_src_dir aufs)
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-kbuild.patch || exit 1
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-base.patch || exit 1
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-mmap.patch || exit 1
> patch -d $KERNELDIR -p1 -i
> ${AUFSDIR}/aufs3-standalone/aufs3-standalone.patch || exit 1
> rm -f ${AUFSDIR}/aufs3-standalone/include/linux/Kbuild
> rm -f ${AUFSDIR}/aufs3-standalone/include/uapi/linux/Kbuild
> cp -dpvR ${AUFSDIR}/aufs3-standalone/{fs,Documentation,include}
> $KERNELDIR/ || exit 1
> touch $KERNELDIR/.done_aufs_patch
> fi
>
> set_kernel_option CONFIG_AUFS_FS m
> set_kernel_option CONFIG_AUFS_HINOTIFY n
> set_kernel_option CONFIG_AUFS_HNOTIFY y
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_127 y
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_511 n
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_1023 n
> set_kernel_option CONFIG_AUFS_BRANCH_MAX_32767 n
> set_kernel_option CONFIG_AUFS_SBILIST y
> set_kernel_option CONFIG_AUFS_EXPORT n
> set_kernel_option CONFIG_AUFS_BR_RAMFS n
> set_kernel_option CONFIG_AUFS_SHWH n
> set_kernel_option CONFIG_AUFS_RDU n
> set_kernel_option CONFIG_AUFS_PROC_MAP n
> set_kernel_option CONFIG_AUFS_SP_IATTR n
> set_kernel_option CONFIG_AUFS_SHWH n
> set_kernel_option CONFIG_AUFS_BR_RAMFS n
> set_kernel_option CONFIG_AUFS_DEBUG n
> set_kernel_option CONFIG_AUFS_HFSNOTIFY y
> fi
>
>
> and scripts/aufs :
>
> build )
> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
> #fix me
> replace_str $KERNELDIR/include/uapi/linux/aufs_type.h
> "__user" " "
> cd aufs-util || exit 1
> CPPFLAGS="-I $KERNELDIR/usr/include
> -I../aufs2-standalone/include" make KDIR=$KERNELDIR all || exit 1
> fi
> ;;
>
> install )
> if [ "$CONFIG_ETCFS" = "AUFS" ]; then
> cp -dpvR aufs-util/aufs.5 $CDDIR/usr/share/man/man5/ || exit 1
> cd aufs-util || exit 1
> mkdir -p $TMPDIR/{sbin,usr/bin} || exit 1
> mkdir -p $TMPDIR/etc/default || exit 1
> make KDIR=$KERNELDIR DESTDIR=$TMPDIR install || exit 1
> cp -dpvR $TMPDIR/etc/* $ETCDIR/etc/ || exit 1
> rm -rf $TMPDIR/etc || exit 1
> cp -dpvR $TMPDIR/* $CDDIR/ || exit 1
> rm -rf $TMPDIR || exit 1
> fi
> ;;
>
> Thanks,
> Serge
>
>
> On 12/03/2014 09:25 AM, Andrzej Odyniec wrote:
>
>>Heiko,
>>
>>I started to try, although I had recently a lot of other activities.
>>- We need to update aufs3, because the old is not compiling with 3.14 kernel
>>- Keepalived, even this with git, do not want to compile with 3.14 so turned
>>it off for now
>>- Motion, including the one with svn, do not want to compile, so too turned it
>>off for now too
>>- Iptables must be raised to 1.4.21
>>- Unfortunately, gcc 4.4.5 is not sufficient because it does not support
>>plug-ins, so as for now I raised gcc to 4.5.1; Of course I had to pick up a
>>gcc-hardened; I took hardened patches from lfs; maybe I should raise gcc higher?
>>- Kernel needs now to build bc, so I installed 1.06
>>
>>In spite of this kernel build process stopped at aufs3; anything goes wrong
>>and I have a little read about aufs; perhaps my manual controlled prepare for
>>aufs3 did not properly.
>>
>>So kernel line upgrade is not so simple. But I do not resign
>>
>>Best regards
>>
>>Andrzej Odyniec
>>
>>---
>>Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast.
>>http://www.avast.com
>>
>>
>>------------------------------------------------------------------------------
>>Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
>>from Actuate! Instantly Supercharge Your Business Reports and Dashboards
>>with Interactivity, Sharing, Native Excel Exports, App Integration & more
>>Get technology previously reserved for billion-dollar corporations, FREE
>>http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
>>_______________________________________________
>>Devil-linux-develop mailing list
>>Dev...@li...
>>https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
>>
>
>
>
> ------------------------------------------------------------------------------
> Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
> from Actuate! Instantly Supercharge Your Business Reports and Dashboards
> with Interactivity, Sharing, Native Excel Exports, App Integration & more
> Get technology previously reserved for billion-dollar corporations, FREE
> http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
> _______________________________________________
> Devil-linux-develop mailing list
> Dev...@li...
> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
--
Andrzej Odyniec
<an...@ma...>
Rada Nadzorcza Macrologic SA
ul. Kłopotowskiego 22, 03-717 Warszawa
tel. +48-222566332, kom. +48-601276572
Skype: andrzej.odyniec
Rejestr: Sąd Rejonowy dla m.st. Warszawy,
XIII Wydział Gospodarczy Krajowego
Rejestru Sądowego, numer 0000045462
Numer identyfikacji podatkowej: PL 5220002825
Kapitał zakładowy: 1888719 zł opłacony w całości
---
Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast.
http://www.avast.com
|
|
From: Andrzej O. <an...@ma...> - 2014-12-10 15:02:01
|
Heiko Zuerker wrote:
> Andrzej,
>
> I don't recall, but is it possible that I actually removed the
> "--fatal-warnings" from the patch?
> Can you compare with the original version from the LFS website?
Heiko, you don't. This situation is in original lfs patches. I think, this is
policy decision of Robert Connolly at lfs. In this same patch at 4.5.1 and
4.5.3 he added intentionally in gcc.c line:
+ %{!no-fatal-warnings:--fatal-warnings} "
So this is current policy. And generally: proper decision.
> I don't think it makes sense to modify every package. Actually the
> right approach would be to find/create patches that will correct the
> compiler warnings and replace the less secure code. But that's a lot
> of work...
Yes, this is lot of work. Some packages can be upgraded to version without
this warnings. But i.e. gzip is not corrected from old times. So there is
needed patch in gcc or CC="gcc -no-fatal-warnings" in the script.
For first time I will use modified myself pie patch at 4.5.3 for find other
problems. After I will try to do statistics about packages generating
warnings. And after I will report this. We will think, what is better.
Regards
--
Andrzej Odyniec
---
Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast.
http://www.avast.com
|
|
From: Heiko Z. <he...@zu...> - 2014-12-10 15:26:50
|
Sounds good.
Heiko
Quoting Andrzej Odyniec <an...@ma...>:
> Heiko Zuerker wrote:
>> Andrzej,
>>
>> I don't recall, but is it possible that I actually removed the
>> "--fatal-warnings" from the patch?
>> Can you compare with the original version from the LFS website?
>
> Heiko, you don't. This situation is in original lfs patches. I think, this is
> policy decision of Robert Connolly at lfs. In this same patch at 4.5.1 and
> 4.5.3 he added intentionally in gcc.c line:
> + %{!no-fatal-warnings:--fatal-warnings} "
>
> So this is current policy. And generally: proper decision.
>
>> I don't think it makes sense to modify every package. Actually the
>> right approach would be to find/create patches that will correct the
>> compiler warnings and replace the less secure code. But that's a lot
>> of work...
>
> Yes, this is lot of work. Some packages can be upgraded to version without
> this warnings. But i.e. gzip is not corrected from old times. So there is
> needed patch in gcc or CC="gcc -no-fatal-warnings" in the script.
>
> For first time I will use modified myself pie patch at 4.5.3 for find other
> problems. After I will try to do statistics about packages generating
> warnings. And after I will report this. We will think, what is better.
>
> Regards
>
> --
> Andrzej Odyniec
>
> ---
> Ta wiadomość została sprawdzona na obecność wirusów przez
> oprogramowanie antywirusowe Avast.
> http://www.avast.com
>
>
> ------------------------------------------------------------------------------
> Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
> from Actuate! Instantly Supercharge Your Business Reports and Dashboards
> with Interactivity, Sharing, Native Excel Exports, App Integration & more
> Get technology previously reserved for billion-dollar corporations, FREE
> http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
> _______________________________________________
> Devil-linux-develop mailing list
> Dev...@li...
> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
--
Regards
Heiko Zuerker
|
|
From: Andrzej O. <an...@ma...> - 2015-01-19 19:50:31
|
Heiko Zuerker wrote:
> Andrzej,
>
> Looks like our hand is going to be forced and we need to move to the
> newer kernel.
>
> Unfortunately AUFS doesn't work anymore with the latest 3.2 kernel and
> it's not supported anymore for those versions....
Heiko,
But AUFS is in colission with grsec in three files. Because of this I can't
compile kernel with grsec. This stopped me temporarily. But I think about
source analysis. In recent months I've been busy at work and in the family.
Some grandchildren grow up and the other is born. Already 14 :) So I planned
to read collisional sources for about two weeks. Mayby you will be faster?
Near all rest was compiling using gcc 4.5.3 patched for fpie-1 and nonfatal
warning. All I did is:
%{nonow:-z lazy;:-z now} }}\
%{!no-fatal-warnings:--fatal-warnings} "
instead
%{nonow:-z lazy;:-z now} }}"
in fpie-1 patch.
But as I said -- grsec kernel is not compiling because of colision with aufs.
Andrzej
---
Ta wiadomość została sprawdzona na obecność wirusów przez oprogramowanie antywirusowe Avast.
http://www.avast.com
|
|
From: Heiko Z. <he...@zu...> - 2015-01-20 14:18:27
|
Andrzej,
I'm not sure how much time I'll have myself. Family is the priority
(and work of course), no question about that. But Devil-Linux should
come right behind that! ;-)
Looks like the aufs mmap patch is supposed to solve the issue with the
3.2 kernel, but this one collides with grsecurity. Is it the same
issue for the kernel you've been working on?
My plan was to see if I can modify the 3.2 mmap patch to work
grsecurity. That should be the quickest. Switching to a new Kernel
takes a lot of testing, that's why I don't want to rush that one.
Heiko
Quoting Andrzej Odyniec <an...@ma...>:
> Heiko Zuerker wrote:
>> Andrzej,
>>
>> Looks like our hand is going to be forced and we need to move to the
>> newer kernel.
>>
>> Unfortunately AUFS doesn't work anymore with the latest 3.2 kernel and
>> it's not supported anymore for those versions....
>
> Heiko,
>
> But AUFS is in colission with grsec in three files. Because of this I can't
> compile kernel with grsec. This stopped me temporarily. But I think about
> source analysis. In recent months I've been busy at work and in the family.
> Some grandchildren grow up and the other is born. Already 14 :) So I planned
> to read collisional sources for about two weeks. Mayby you will be faster?
>
> Near all rest was compiling using gcc 4.5.3 patched for fpie-1 and nonfatal
> warning. All I did is:
>
> %{nonow:-z lazy;:-z now} }}\
> %{!no-fatal-warnings:--fatal-warnings} "
>
> instead
>
> %{nonow:-z lazy;:-z now} }}"
>
> in fpie-1 patch.
>
> But as I said -- grsec kernel is not compiling because of colision with aufs.
>
> Andrzej
>
> ---
> Ta wiadomość została sprawdzona na obecność wirusów przez
> oprogramowanie antywirusowe Avast.
> http://www.avast.com
>
>
> ------------------------------------------------------------------------------
> New Year. New Location. New Benefits. New Data Center in Ashburn, VA.
> GigeNET is offering a free month of service with a new server in Ashburn.
> Choose from 2 high performing configs, both with 100TB of bandwidth.
> Higher redundancy.Lower latency.Increased capacity.Completely compliant.
> http://p.sf.net/sfu/gigenet
> _______________________________________________
> Devil-linux-develop mailing list
> Dev...@li...
> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
--
Regards
Heiko Zuerker
|
|
From: Heiko Z. <he...@zu...> - 2015-01-22 02:54:54
|
Hey,
I changed a few things around in the build system, to help make our
life easier. (Not checked-in yet)
The grsecurity patch is now applied via the prepare script (like most
of the other kernel patches) and AUFS is applied right afterwards.
I was also able to modify the aufs-mmap patch for 3.2, to work with
grsecurity.
My compile is running, we'll see if it will finish. Hopefully I'll
have some time this weekend to test it...
Heiko
Quoting Heiko Zuerker <he...@zu...>:
> Andrzej,
>
> I'm not sure how much time I'll have myself. Family is the priority
> (and work of course), no question about that. But Devil-Linux should
> come right behind that! ;-)
>
> Looks like the aufs mmap patch is supposed to solve the issue with the
> 3.2 kernel, but this one collides with grsecurity. Is it the same
> issue for the kernel you've been working on?
> My plan was to see if I can modify the 3.2 mmap patch to work
> grsecurity. That should be the quickest. Switching to a new Kernel
> takes a lot of testing, that's why I don't want to rush that one.
>
> Heiko
>
> Quoting Andrzej Odyniec <an...@ma...>:
>
>> Heiko Zuerker wrote:
>>> Andrzej,
>>>
>>> Looks like our hand is going to be forced and we need to move to the
>>> newer kernel.
>>>
>>> Unfortunately AUFS doesn't work anymore with the latest 3.2 kernel and
>>> it's not supported anymore for those versions....
>>
>> Heiko,
>>
>> But AUFS is in colission with grsec in three files. Because of this I can't
>> compile kernel with grsec. This stopped me temporarily. But I think about
>> source analysis. In recent months I've been busy at work and in the family.
>> Some grandchildren grow up and the other is born. Already 14 :) So I planned
>> to read collisional sources for about two weeks. Mayby you will be faster?
>>
>> Near all rest was compiling using gcc 4.5.3 patched for fpie-1 and nonfatal
>> warning. All I did is:
>>
>> %{nonow:-z lazy;:-z now} }}\
>> %{!no-fatal-warnings:--fatal-warnings} "
>>
>> instead
>>
>> %{nonow:-z lazy;:-z now} }}"
>>
>> in fpie-1 patch.
>>
>> But as I said -- grsec kernel is not compiling because of colision
>> with aufs.
>>
>> Andrzej
>>
>> ---
>> Ta wiadomość została sprawdzona na obecność wirusów przez
>> oprogramowanie antywirusowe Avast.
>> http://www.avast.com
>>
>>
>> ------------------------------------------------------------------------------
>> New Year. New Location. New Benefits. New Data Center in Ashburn, VA.
>> GigeNET is offering a free month of service with a new server in Ashburn.
>> Choose from 2 high performing configs, both with 100TB of bandwidth.
>> Higher redundancy.Lower latency.Increased capacity.Completely compliant.
>> http://p.sf.net/sfu/gigenet
>> _______________________________________________
>> Devil-linux-develop mailing list
>> Dev...@li...
>> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
>
>
>
> --
>
> Regards
> Heiko Zuerker
>
> ------------------------------------------------------------------------------
> New Year. New Location. New Benefits. New Data Center in Ashburn, VA.
> GigeNET is offering a free month of service with a new server in Ashburn.
> Choose from 2 high performing configs, both with 100TB of bandwidth.
> Higher redundancy.Lower latency.Increased capacity.Completely compliant.
> http://p.sf.net/sfu/gigenet
> _______________________________________________
> Devil-linux-develop mailing list
> Dev...@li...
> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
--
Regards
Heiko Zuerker
|
|
From: Heiko Z. <he...@zu...> - 2015-08-15 13:07:33
|
Andrzej,
Could you please tarball the work you have done with the newer kernel,
so I can continue working on it?
I just saw that grsecurity will drop support for the 3.2 kernel series
by the end of the year. This means we'll have to upgrade to 3.14,
which is the latest long-term kernel version grsecurity supports.
Heiko
Quoting Heiko Zuerker <he...@zu...>:
> Hey,
>
> I changed a few things around in the build system, to help make our
> life easier. (Not checked-in yet)
> The grsecurity patch is now applied via the prepare script (like most
> of the other kernel patches) and AUFS is applied right afterwards.
> I was also able to modify the aufs-mmap patch for 3.2, to work with
> grsecurity.
> My compile is running, we'll see if it will finish. Hopefully I'll
> have some time this weekend to test it...
>
> Heiko
>
> Quoting Heiko Zuerker <he...@zu...>:
>
>> Andrzej,
>>
>> I'm not sure how much time I'll have myself. Family is the priority
>> (and work of course), no question about that. But Devil-Linux should
>> come right behind that! ;-)
>>
>> Looks like the aufs mmap patch is supposed to solve the issue with the
>> 3.2 kernel, but this one collides with grsecurity. Is it the same
>> issue for the kernel you've been working on?
>> My plan was to see if I can modify the 3.2 mmap patch to work
>> grsecurity. That should be the quickest. Switching to a new Kernel
>> takes a lot of testing, that's why I don't want to rush that one.
>>
>> Heiko
>>
>> Quoting Andrzej Odyniec <an...@ma...>:
>>
>>> Heiko Zuerker wrote:
>>>> Andrzej,
>>>>
>>>> Looks like our hand is going to be forced and we need to move to the
>>>> newer kernel.
>>>>
>>>> Unfortunately AUFS doesn't work anymore with the latest 3.2 kernel and
>>>> it's not supported anymore for those versions....
>>>
>>> Heiko,
>>>
>>> But AUFS is in colission with grsec in three files. Because of this I can't
>>> compile kernel with grsec. This stopped me temporarily. But I think about
>>> source analysis. In recent months I've been busy at work and in the family.
>>> Some grandchildren grow up and the other is born. Already 14 :) So
>>> I planned
>>> to read collisional sources for about two weeks. Mayby you will be faster?
>>>
>>> Near all rest was compiling using gcc 4.5.3 patched for fpie-1 and nonfatal
>>> warning. All I did is:
>>>
>>> %{nonow:-z lazy;:-z now} }}\
>>> %{!no-fatal-warnings:--fatal-warnings} "
>>>
>>> instead
>>>
>>> %{nonow:-z lazy;:-z now} }}"
>>>
>>> in fpie-1 patch.
>>>
>>> But as I said -- grsec kernel is not compiling because of colision
>>> with aufs.
>>>
>>> Andrzej
>>>
>>> ---
>>> Ta wiadomość została sprawdzona na obecność wirusów przez
>>> oprogramowanie antywirusowe Avast.
>>> http://www.avast.com
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> New Year. New Location. New Benefits. New Data Center in Ashburn, VA.
>>> GigeNET is offering a free month of service with a new server in Ashburn.
>>> Choose from 2 high performing configs, both with 100TB of bandwidth.
>>> Higher redundancy.Lower latency.Increased capacity.Completely compliant.
>>> http://p.sf.net/sfu/gigenet
>>> _______________________________________________
>>> Devil-linux-develop mailing list
>>> Dev...@li...
>>> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
>>
>>
>>
>> --
>>
>> Regards
>> Heiko Zuerker
>>
>> ------------------------------------------------------------------------------
>> New Year. New Location. New Benefits. New Data Center in Ashburn, VA.
>> GigeNET is offering a free month of service with a new server in Ashburn.
>> Choose from 2 high performing configs, both with 100TB of bandwidth.
>> Higher redundancy.Lower latency.Increased capacity.Completely compliant.
>> http://p.sf.net/sfu/gigenet
>> _______________________________________________
>> Devil-linux-develop mailing list
>> Dev...@li...
>> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
>
>
>
> --
>
> Regards
> Heiko Zuerker
>
> ------------------------------------------------------------------------------
> New Year. New Location. New Benefits. New Data Center in Ashburn, VA.
> GigeNET is offering a free month of service with a new server in Ashburn.
> Choose from 2 high performing configs, both with 100TB of bandwidth.
> Higher redundancy.Lower latency.Increased capacity.Completely compliant.
> http://p.sf.net/sfu/gigenet
> _______________________________________________
> Devil-linux-develop mailing list
> Dev...@li...
> https://lists.sourceforge.net/lists/listinfo/devil-linux-develop
--
Regards
Heiko Zuerker
|