There was a thread about C7 bash completion back in August last year, but it doesnt have answers for this problem.Example: yum install /path/to/local/package works fine with tab completion to fill in the path and package bits.However, yum –debugleve..
Author : isdtor
We have a working PXE setup. Ive tried to adapt it to UEFI as per RHEL6 manual, but the client wont boot.Strangely, tcpdump shows that the client tries to download all files via tftp from the dhcp server rather than the TFTP server (they are differen..
I am testing a CentOS 7.6 kickstart installation. After kickstart was initiated, the installation stops at some point where a sort of table is printed underInstallation, and the item that fails is 4 – Software selection, Error checking software selectio..
..
Is it not possible to use an nfs based repo for kickstart under CentOS 7.5?E.g.repo –name=epel –baseurl=file://server/path/to/local/copy/of/epelWith trial and error I figured out that this is the correct syntax to use for an nfs-based repo. But packa..
OT for this list, but maybe I can get some pointers – how hard is it to get some packages updated in EPEL? The project web site sends you from link to link, and the ML web interface is horrible. No interest here to become a package maintainer or regu..
Taking first steps on CentOS 7 1804.Logging into the Gnome/Gnome classic desktop from gdm works only for root. For other users, the screen flashes and the login screen returns. KDE/Plasma login is successful but ends up with a black screen with mo..
Delivered as per https://access.redhat.com/articles/3311301. This is good news. Backporting those updates across three gcc versions does not look like the easiest exercise to me.$ rpm -qp –changelog gcc-4.4.7-18.el6_9.2.x86_64.rpm |head -n 6* Wed ..
Does anyone know if Red Hat are working on backporting improved mitigation techniques and features from newer, 4.14.14+ kernels?$ grep . /sys/devices/system/cpu/vulnerabilities/*/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI/sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerab..
We are seeing high load developing over time on some machines that have dozens of user sessions. One common characteristic is that dbus-daemon uses near 100% cpu.Red Hat seems to be aware of the problem, but the solutions are available to subscrib..
Recent Comments