mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
2019
December
November
October
List overview
Download
Dev
----- 2024 -----
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
----- 2019 -----
December 2019
November 2019
October 2019
dev@openeuler.org
11 participants
3372 discussions
Start a n
N
ew thread
yocto & embedded sig例会
by openEuler conference
07 Mar '23
07 Mar '23
您好! sig-embedded SIG 邀请您参加 2023-03-09 14:30 召开的Zoom会议(自动录制) 会议主题:yocto & embedded sig例会 会议内容: 欢迎申报议题 会议链接:https://us06web.zoom.us/j/86922335127?pwd=eUZBcFVGZmZzRFEyc0dJbjFJelNoUT09
会议纪要:https://etherpad.openeuler.org/p/sig-embedded-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-embedded SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-09 14:30, The subject of the conference is yocto & embedded sig例会, Summary: 欢迎申报议题 You can join the meeting at
https://us06web.zoom.us/j/86922335127?pwd=eUZBcFVGZmZzRFEyc0dJbjFJelNoUT09
. Add topics at
https://etherpad.openeuler.org/p/sig-embedded-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
SDS双周例会
by openEuler conference
07 Mar '23
07 Mar '23
您好! sig-SDS SIG 邀请您参加 2023-03-07 10:00 召开的Zoom会议(自动录制) 会议主题:SDS双周例会 会议内容: 1,社区需求进展 会议链接:https://us06web.zoom.us/j/89835472372?pwd=Z3UvYWFpRXBJY29iVS8zdXk5TFFLdz09
会议纪要:https://etherpad.openeuler.org/p/sig-SDS-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-SDS SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-07 10:00, The subject of the conference is SDS双周例会, Summary: 1,社区需求进展 You can join the meeting at
https://us06web.zoom.us/j/89835472372?pwd=Z3UvYWFpRXBJY29iVS8zdXk5TFFLdz09
. Add topics at
https://etherpad.openeuler.org/p/sig-SDS-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
2
1
0
0
【请阅】openEuler社区2023年02月运作报告
by openEuler
06 Mar '23
06 Mar '23
1
0
0
0
openEuler update_20230301版本发布公告
by muyuying
05 Mar '23
05 Mar '23
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230301发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230301发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230301发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230301发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/11)提供 update_ 20230308 版本。 openEuler-20.03-LTS-SP1 Update 20230301 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题5个,已知漏洞24个。目前版本分支剩余待修复缺陷43个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKH?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2023-24580 python-django 7.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2021-33639 kernel 6.7 CVE-2023-26545 kernel 5.3 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6E9JM:例行分析python-urllib3补丁,需要补丁回合<
https://gitee.com/open_euler/dashboard?issue_id=I6E9JM
> python-urllib3 #I6AA06:【20.03-LTS-SP1-update-0111】【arm/x86】执行sosreport -a报错“TypeError: 'NoneType' object is not iterable”<
https://gitee.com/open_euler/dashboard?issue_id=I6AA06
> sos #I63KFX:自动化测试FC卡不显示FC卡的型号信息<
https://gitee.com/open_euler/dashboard?issue_id=I63KFX
> oec-hardware #I4RU21:回合社区补丁<
https://gitee.com/open_euler/dashboard?issue_id=I4RU21
> dnf-plugins-core #I6BO2R:【openEuler 1.0-LTS】【OLK-5.10】新增中断重入告警维测<
https://gitee.com/open_euler/dashboard?issue_id=I6BO2R
> kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I490MU Uncaught exception in get_tokens_unprocessed python-pygments Programming-language I4F8YQ integer overflow in start_input_bmp libjpeg-turbo Desktop I4F903 Unexpect-exit in start_input_tga libjpeg-turbo Desktop I4F913 Timeout in tjDecompress2 libjpeg-turbo Desktop I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4K6R7 memleak in wrap_nettle_mpi_init gnutls sig-security-facility I4K6UI Timeout in _asn1_find_up gnutls sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6IU04 【update20230228-22.03-lts-sp1】amcrypt-ossl 命令执行失败 amanda Application I6IU77 【update20230228-22.03-lts-sp1】amaespipe命令执行失败 amanda Application openEuler-20.03-LTS-SP3 Update 20230301 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞23个。目前版本分支剩余待修复缺陷 14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKI?from=project-i…
CVE修复: 需求类型 软件包 优先级 CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2023-24580 python-django 7.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2021-33639 kernel 6.7 CVE-2023-26545 kernel 5.3 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6E9JM:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I4RADS:【20.03-LTS-SP1】log4j升级失败 log4j #I63KFX:自动化测试FC卡不显示FC卡的型号信息 oec-hardware #I4RU21:回合社区补丁 dnf-plugins-core #I6BO2R:【openEuler 1.0-LTS】【OLK-5.10】新增中断重入告警维测 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I4UMEV [openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 kernel Kernel I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6ITY0 【update20230228-20.03-lts-sp3】amcrypt-ossl 命令执行失败 amanda Application I6IUAO 【update20230228-20.03-lts-sp3】amaespipe命令执行失败 amanda Application openEuler-22.03-LTS Update 20230301 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞29个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKJ?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2023-22796 rubygem-activesupport 7.5 CVE-2022-44566 rubygem-activerecord 7.5 CVE-2023-22794 rubygem-activerecord 8.8 CVE-2023-24580 python-django 7.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2023-26081 epiphany 0 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2021-33639 kernel 6.7 CVE-2023-0597 kernel 5.5 CVE-2023-0615 kernel 5.5 CVE-2020-10775 ovirt-engine 5.3 CVE-2022-44789 mujs 8.8 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6E9JM:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 #I6GM47:openEuler-22.03-LTS-SP1分支unbound为何未合入社区已知#610 #611问题 unbound #I63KFX:自动化测试FC卡不显示FC卡的型号信息 oec-hardware #I57PCI:python3-dnf-plugin-post-transaction-actions子包缺少目录 dnf-plugins-core #I6IRK0:update_0301 避免全量升级出现文件冲突 cups openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6IU0H 【update20230228-22.03-lts】amcrypt-ossl 命令执行失败 amanda Application I6IU1P 【update20230228-22.03-lts】amaespipe命令执行失败 amanda Application openEuler-22.03-LTS SP1 Update 20230301 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题16个,已知漏洞24个。目前版本分支剩余待修复缺陷23个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKG?from=project-i…
CVE修复: CVE 仓库 score CVE-2023-0687 glibc 9.8 CVE-2023-25153 containerd 5.5 CVE-2023-25173 containerd 7.8 CVE-2022-48337 emacs 7.8 CVE-2022-48338 emacs 7.3 CVE-2022-48339 emacs 7.3 CVE-2022-44566 rubygem-activerecord 7.5 CVE-2023-22794 rubygem-activerecord 8.8 CVE-2023-24580 python-django 7.5 CVE-2022-3560 pesign 5.5 CVE-2022-4304 nodejs 5.9 CVE-2022-4450 nodejs 7.5 CVE-2023-0215 nodejs 7.5 CVE-2023-0286 nodejs 7.4 CVE-2022-38266 leptonica 6.5 CVE-2023-0056 haproxy 4.3 CVE-2023-25725 haproxy 7.5 CVE-2022-37704 amanda 6.7 CVE-2022-37705 amanda 6.7 CVE-2022-44789 mujs 8.8 CVE-2022-4450 edk2 7.5 CVE-2023-0215 edk2 7.5 CVE-2023-0286 edk2 7.4 CVE-2023-0401 edk2 7.5 Bugfix: issue 仓库 #I6FF6H:glib2社区补丁回合 glib2 #I6CA2Y:update_20230201-修复glib2-static安装时找不到sysprof-capture-static安装依赖 sysprof #I6HRK9:删除.a库文件并添加make依赖 c-ares #I6HL17:samba 22.03-LTS-SP1升级 samba #I6CGPC:verdor.obscpio文件包缺少stringio-3.0.1.gem obs-bundled-gems #I6GM47:openEuler-22.03-LTS-SP1分支unbound为何未合入社区已知#610 #611问题 unbound #I63KFX:自动化测试FC卡不显示FC卡的型号信息 oec-hardware #I6IRWV:update-0301 fix update conflict of devel and help cups #I6IS21:update-0301 disable static library libXxf86vm #I6GJ7I:安装摘要信息引导界面--root密码输入框,密码输入框眼睛图标含义未汉化 anaconda #I5WLDC:Upgrade to latest release [dnf-plugins-core: 4.0.24 -> 4.3.1] dnf-plugins-core #I6I9HY:delete static library libtirpc #I6IAVJ:delete static library ipset #I6IBB9:delete static library nghttp2 #I6IBLQ:delete static library libdnet #I6E9JM:例行分析python-urllib3补丁,需要补丁回合 python-urllib3 openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I657VS 【22.03_LTS_SP1_RC2】【x86/arm】dde-api存在不安全的编译选项PIE、STRIP dde-api sig-DDE I657VT 【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP dde-daemon sig-DDE I657VX 【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator存在不安全的编译选项PIE、STRIP deepin-dbus-generator sig-DDE I657W0 【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP deepin-editor sig-DDE I657W3 【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP deepin-graphics-driver-manager sig-DDE I657W7 【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP deepin-system-monitor sig-DDE I6583U 【22.03_LTS_SP1_RC2】【x86/arm】startdde存在不安全的编译选项PIE、STRIP startdde sig-DDE I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6IU04 【update20230228-22.03-lts-sp1】amcrypt-ossl 命令执行失败 amanda Application I6IU77 【update20230228-22.03-lts-sp1】amaespipe命令执行失败 amanda Application 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE: 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-23919 I6GFMF 1.26 7.5 nodejs sig-nodejs CVE-2023-23918 I6GFMC 1.26 7.5 nodejs sig-nodejs CVE-2023-24998 I6GH6P 1.55 7.5 apache-commons-fileupload dev-utils CVE-2023-26242 I6GMYX 2.11 7.8 risc-v-kernel sig-RISC-V CVE-2022-48340 I6GQAI 2.26 7.5 glusterfs Storage CVE-2023-23009 I6GTCD 2.91 7.5 libreswan System-tool CVE-2023-26314 I6GYV6 3.14 8.8 mono Base-service CVE-2022-4384 I6DBAC 3.84 6.5 stream CVE-2023-25586 I6DKU7 4.66 0.0 mingw-binutils sig-compat-winapp CVE-2023-25586 I6DKU4 4.66 0.0 binutils Compiler CVE-2022-4304 I6DKV8 4.68 5.9 edk2 Virt CVE-2022-4203 I6DKUZ 4.68 0.0 compat-openssl11 CVE-2023-25585 I6DKUW 4.68 0.0 mingw-binutils sig-compat-winapp CVE-2023-25587 I6DKUV 4.68 0.0 mingw-binutils sig-compat-winapp CVE-2022-4203 I6DKUU 4.68 0.0 edk2 Virt CVE-2023-25585 I6DKUP 4.68 0.0 binutils Compiler CVE-2023-25587 I6DKUO 4.68 0.0 binutils Compiler CVE-2022-4304 I6DKUI 4.68 5.9 compat-openssl11 CVE-2023-25584 I6DSPJ 5.26 0.0 binutils Compiler CVE-2023-25588 I6DSPH 5.26 0.0 mingw-binutils sig-compat-winapp CVE-2023-25584 I6DSPB 5.26 0.0 mingw-binutils sig-compat-winapp CVE-2023-25588 I6DSP8 5.26 0.0 binutils Compiler CVE-2023-21864 I6DZ7V 6.11 4.9 mysql Others CVE-2023-21870 I6DZ7O 6.11 4.9 mysql Others CVE-2023-21866 I6DZ7K 6.11 4.9 mysql Others CVE-2023-21874 I6DZ7A 6.11 2.7 mysql Others CVE-2023-21868 I6DZ76 6.11 6.5 mysql Others CVE-2023-21863 I6DZ6V 6.11 4.9 mysql Others CVE-2023-21869 I6DZ6M 6.11 5.5 mysql Others CVE-2023-21836 I6DZ9K 6.12 4.9 mysql Others CVE-2023-21871 I6DZ99 6.12 4.9 mysql Others CVE-2023-21865 I6DZ8X 6.12 4.9 mysql Others CVE-2023-21872 I6DZ8C 6.12 5.5 mysql Others CVE-2023-21867 I6DZ84 6.12 4.9 mysql Others CVE-2023-21873 I6DZ7Z 6.12 4.9 mysql Others CVE-2023-25166 I6E2G8 6.26 6.5 python-odo sig-python-modules CVE-2022-41862 I6E3MO 6.51 0.0 postgresql DB CVE-2023-20938 I6DKVG 8.15 8.8 kernel Kernel CVE-2023-1077 I6I7UG 8.64 7.0 risc-v-kernel sig-RISC-V CVE-2023-1077 I6I7UB 8.64 7.0 kernel Kernel CVE-2022-25937 I6EUG8 10.35 6.5 openstack-glance sig-openstack CVE-2023-0767 I6F4QN 11.65 0.0 firefox Application CVE-2023-25730 I6F4RP 11.66 0.0 firefox Application CVE-2023-25739 I6F4RO 11.66 0.0 firefox Application CVE-2023-25736 I6F4RN 11.66 0.0 firefox Application CVE-2023-25738 I6F4RM 11.66 0.0 firefox Application CVE-2023-25731 I6F4RL 11.66 0.0 firefox Application CVE-2023-25735 I6F4RK 11.66 0.0 firefox Application CVE-2023-25740 I6F4RJ 11.66 0.0 firefox Application CVE-2023-25744 I6F4RI 11.66 0.0 firefox Application CVE-2023-25746 I6F4RH 11.66 0.0 firefox Application CVE-2023-25742 I6F4RG 11.66 0.0 firefox Application CVE-2023-25728 I6F4RF 11.66 0.0 firefox Application CVE-2023-25737 I6F4RE 11.66 0.0 firefox Application CVE-2023-25734 I6F4RD 11.66 0.0 firefox Application CVE-2023-25745 I6F4RA 11.66 0.0 firefox Application CVE-2023-25743 I6F4R8 11.66 0.0 firefox Application CVE-2023-25741 I6F4R6 11.66 0.0 firefox Application CVE-2023-25729 I6F4R2 11.66 0.0 firefox Application CVE-2023-25732 I6F4QX 11.66 0.0 firefox Application CVE-2023-25733 I6F4QT 11.66 0.0 firefox Application CVE-2023-26242 I6GMYH 11.86 7.8 kernel Kernel CVE-2022-27672 I6FB6C 12.16 0.0 kernel Kernel CVE-2022-38090 I6FDF4 12.28 0.0 microcode_ctl System-tool CVE-2022-33196 I6FDF2 12.28 0.0 microcode_ctl System-tool CVE-2023-23934 I6FDE3 12.28 3.5 python-werkzeug Programming-language CVE-2023-0778 I6FEKK 12.53 0.0 podman sig-CloudNative CVE-2016-3092 I6JLSA 12.97 7.5 struts sig-Java CVE-2023-20052 I6FMJU 13.2 0.0 clamav Others CVE-2023-20032 I6FMJ3 13.2 0.0 clamav Others CVE-2023-0616 I6FOOO 13.39 0.0 thunderbird sig-desktop-apps openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org
<
https://radiatest.openeuler.org/
> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D94F60.32558360]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it
1
0
0
0
openEuler 23.03 RC2版本release公告
by Wangwei (Bessel)
03 Mar '23
03 Mar '23
Dear all, openEuler 23.03 RC2版本版本全量需求均已合入,版本组件基线也已通过社区release sig评审,版本经过CI/CD验证可稳定重复构建,满足RC2版本发布质量标准,社区各SIG组及所有爱好者可下载并试用。 本次版本包含 openEuler 23.03版本的几乎全量组件(少量持续编译/构建失败包清单详见邮件附件1),版本测试能力/策略由 openEuler QA SIG团队指导,社区各个SIG组自主开展组件自验证,社区一起协作支撑openEuler 23.03版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler创新版本的问题点,更可以支撑社区一起持续优化提升百万级openEuler用户的体验! 下一个版本里程碑点(预计在2023/03/08)将会提供 RC3 版本。 openEuler 23.03版本release plan公示链接:
https://gitee.com/openeuler/release-management/blob/master/openEuler-23.03/…
openEuler 23.03 RC2版本下载链接:
http://121.36.84.172/dailybuild/EBS-openEuler-23.03/rc2_openeuler-2023-03-0…
openEuler 23.03 RC2版本发布质量评估规范公示链接:
https://gitee.com/openeuler/QA/blob/master/Test_Checklist/%E7%A4%BE%E5%8C%B…
openEuler 23.03 RC2版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果; 社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiaTest:
https://radiatest.openeuler.org
目前openEuler 23.03版本还存在较多未解决的issue,集中在单包构建、部分特性功能启动失败、存在不安全的编译选项等问题,希望社区开发者协作解决,一起支撑openEuler 23.03版本的顺利发布。 附件1: 当前构建失败问题清单 任务ID 任务标题 任务负责人 I6GCHU 【EBS】 tensorflow build problem in openEuler:23.03 weidongkl I6GCJE 【EBS】hadoop build problem in openEuler:23.03 陈强 I6HK2K 【EBS】tcmu-runner build problem in openEuler:23.03:Epol liuzhiqiang I6HK7B 【EBS】 pki-core build problem in openEuler:23.03:Epol 曹东霞 I6HK88 【EBS】networking-generic-switch build problem in openEuler:23.03:Epol 王玺源 I6HNR7 【EBS】caja-extensions build problem in openEuler:23.03:Epol longcheng I6GBZ0 【EBS】yocto-opkg-utils安装缺依赖在openEuler:23.03 张伟刚 I6GDCI 【EBS】python-nbxmpp在openEuler:23.03工程安装失败问题 唐杰 I6IIUU 【EBS】tracker 在openEler:23.03持续编译失败阻塞ISO制作 陈棋德 I6IV3Z 【OBS&EBS】dpu-utilities build problem in openEuler:23.03:Epol 苏伟锋 I6IV4L 【OBS&EBS】system-config-users build problem in openEuler:23.03:Epol 李国强 I6IV5K 【OBS&EBS】system-config-users-docs build problem in openEuler:23.03:Epol 李国强 I6IVY9 python-glanceclient安装依赖未闭环 王玺源 I6J1SX 【EBS】ovirt-web-ui build problem in openEuler:23.03:Epol 杨昭 I6J1TX 【EBS】 arangodb build problem in openEuler:23.03:Epol Lostway I6J1VA 【EBS】 lld-15 build problem in openEuler:23.03:Epol cf_zhao I6J1W3 【EBS】ros_comm build problem in openEuler:23.03:Epol anchuanxu I6J20T 【EBS】python-clufter build problem in openEuler:23.03:Epol 曹东霞 I6J22D 【EBS】glade3 build problem in openEuler:23.03:Epol 唐杰 I6J22Z 【EBS】ovirt-engine-ui-extensions build problem in openEuler:23.03:Epol 杨昭 附件2: release-plan Stage name Begin time End time Days Note Collect key features 2022/12/01 2023/1/15 46 收集23.03版本关键特性(各SIG自行录入release-plan) Develop 2023/1/4 2023/2/20 46 特性完成开发和自验证,代码提交合入23.03 内核升级 2023/1/4 2023/1/16 12 master主线升级内核到6.1 BaseOS构建 2023/1/16 2023/1/31 15 Master主线BaseOS构建,基础包能用 BaseOS测试 2023/2/1 2023/2/3 3 内核升级后BaseOS可用 分支全量Build 2023/2/6 2023/2/10 4 从master拉23.03分支,完成分支全量构建,基础包升级完毕 Alpha 2023/2/13 2023/2/22 4 软件包升级完成,首版本发布 Test round 1 2023/2/23 2023/3/1 5 版本启动测试,内核冻结 Test round 2 <- here 2023/3/2 2023/3/7 5 Test round 3 2023/3/8 2023/3/12 5 特性合入冻结,不再接纳新特性代码合入 Test round 4 2023/3/13 2023/3/17 5 Test round 5 2023/3/20 2023/3/22 3 Release 2023/3/30 2023/3/30 1 BR 王伟(openEuler release SIG)
1
0
0
0
回复:RE: 回复:答复: 您好 关于内核大页特性怎么开启,需要请教一下
by 常新
03 Mar '23
03 Mar '23
那在x86上和ARM上存在的这种差异,是因为在两个架构上对于mmap的实现差异导致的嘛,还是说现在非对齐情况下使用暂时就是一种未定义行为会导致不确定的结果 ---原始邮件--- 发件人: "Zhoukang (A)"<zhoukang7(a)huawei.com> 发送时间: 2023年3月3日(周五) 下午4:30 收件人: "Liuzixian"<liuzixian4(a)huawei.com>gt;;"常新"<x_xiny(a)qq.com>gt;;"dev(a)openeuler.org"<dev(a)openeuler.org>gt;; 抄送: "lvying"<lvying6(a)huawei.com>gt;;"linfeilong"<linfeilong(a)huawei.com>gt;; 主题: RE: 回复:答复: 您好 关于内核大页特性怎么开启,需要请教一下 相关讨论, 请抄送 dev(a)openeuler.org, 方便后续搜索类似问题 From: Liuzixian <liuzixian4(a)huawei.com> Sent: Friday, March 3, 2023 4:26 PM To: 常新 <x_xiny(a)qq.com> Cc: Zhoukang (A) <zhoukang7(a)huawei.com>gt;; lvying <lvying6(a)huawei.com>gt;; linfeilong <linfeilong(a)huawei.com> Subject: 答复: 回复:答复: 您好 关于内核大页特性怎么开启,需要请教一下 动态库的实现代码没有加这个约束,但目前我们认为支持非对齐的动态库较复杂,且未看到支持非对齐的需求,后期可能考虑删除。 写文档时考虑到实际产品均对齐使用,因此增加了约束限制,并且openEuler没有验证非对齐场景。 发件人: 常新 <x_xiny(a)qq.com> 发送时间: 2023年3月3日 15:36 收件人: Liuzixian <liuzixian4(a)huawei.com> 主题: 回复:答复: 您好 关于内核大页特性怎么开启,需要请教一下 你好,文档上有一个约束条件,要求2m对齐,动态库也受这个约束嘛,我试了一下,在x86平台上动态库也受这个约束,但是在ARM平台上好像动态库不受限制, 我跑的是这个用例tst-ld-use-hugpage.c里面的用例 环境设置为 sysctl fs.exec-use-hugetld=1 export LD_HUGEPAGE_LIB=1 HUGEPAGE_PROBE没有设置, 也没有对动态库和二进制文件进行标记, 执行了 echo 200 > /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages, 2209分支x86版本中动态库没有被大页映射,KernelPageSize全部都是4k的,但是ARM平台上动态库被映射了2m的大页,是x86和ARM约束条件不一样吗,还是这是一个bug ---原始邮件--- 发件人: "Liuzixian"<liuzixian4(a)huawei.com> 发送时间: 2023年2月9日(周四) 上午9:21 收件人: "x_xiny"<x_xiny(a)qq.com>gt;; 主题: 答复: 您好 关于内核大页特性怎么开启,需要请教一下
22.09版本文档链接:https://docs.openeuler.org/zh/docs/22.09/docs/A-Tune/native-tur…
发件人: Liuzixian <> 发送时间: 2023年2月9日 9:20 收件人: '常新' <x_xiny(a)qq.com> 抄送: Zhoukang (A) <zhoukang7(a)huawei.com>gt;; linfeilong <linfeilong(a)huawei.com> 主题: 答复: 您好 关于内核大页特性怎么开启,需要请教一下 22.09版本使用sysctl开关(exec-use-hugetlb)
PR中的这个commit增加了该开关:https://gitee.com/openeuler/kernel/commit/1efdacff482d86…
环境变量改为sysctl的理由如下: 1、 内核原生不支持判断环境变量,不符合社区使用方式 2、 22.03还有内核启动参数exec-hugepages进行控制,调试时不如sysctl方便,在22.09合并到sysctl中 3、 有使用者反馈业务启动代码有sudo app_start这样切换用户的场景,无法继承环境变量。 如果您有关于该特性使用方式的建议,也可以反馈给我们。 发件人: 常新 <x_xiny(a)qq.com> 发送时间: 2023年2月8日 17:48 收件人: Liuzixian <liuzixian4(a)huawei.com> 抄送: Zhoukang (A) <zhoukang7(a)huawei.com> 主题: 您好 关于内核大页特性怎么开启,需要请教一下 您好,有个问题向您请教一下,我看见你们已经在kernel2209分支上合入了大页的特性,这个在5.10上怎么开启
https://gitee.com/openeuler/kernel/pulls/59
我看见开启大页功能这个在4.19内核版本上可以通过设置环境变量的方式 export HUGEPAGE_ELF=1的方式开启 看这里是通过加了几个补丁做了这么一个功能,
https://gitee.com/openeuler/native-turbo/blob/master/kernel-patch/kernel-4.…
我在5.10内核上没有看见相关的代码,如果开启这个功能的话,是需要同步这些补丁吗? 或者有没有相关的文档呀 感谢
1
0
0
0
Re: 回复:答复: 您好 关于内核大页特性怎么开启,需要请教一下
by Zhoukang (A)
03 Mar '23
03 Mar '23
相关讨论, 请抄送 dev(a)openeuler.org<mailto:dev@openeuler.org>, 方便后续搜索类似问题 From: Liuzixian <liuzixian4(a)huawei.com> Sent: Friday, March 3, 2023 4:26 PM To: 常新 <x_xiny(a)qq.com> Cc: Zhoukang (A) <zhoukang7(a)huawei.com>; lvying <lvying6(a)huawei.com>; linfeilong <linfeilong(a)huawei.com> Subject: 答复: 回复:答复: 您好 关于内核大页特性怎么开启,需要请教一下 动态库的实现代码没有加这个约束,但目前我们认为支持非对齐的动态库较复杂,且未看到支持非对齐的需求,后期可能考虑删除。 写文档时考虑到实际产品均对齐使用,因此增加了约束限制,并且openEuler没有验证非对齐场景。 发件人: 常新 <x_xiny(a)qq.com<mailto:x_xiny@qq.com>> 发送时间: 2023年3月3日 15:36 收件人: Liuzixian <liuzixian4(a)huawei.com<mailto:liuzixian4@huawei.com>> 主题: 回复:答复: 您好 关于内核大页特性怎么开启,需要请教一下 你好,文档上有一个约束条件,要求2m对齐,动态库也受这个约束嘛,我试了一下,在x86平台上动态库也受这个约束,但是在ARM平台上好像动态库不受限制, 我跑的是这个用例tst-ld-use-hugpage.c里面的用例 环境设置为 sysctl fs.exec-use-hugetld=1 export LD_HUGEPAGE_LIB=1 HUGEPAGE_PROBE没有设置, 也没有对动态库和二进制文件进行标记, 执行了 echo 200 > /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages, 2209分支x86版本中动态库没有被大页映射,KernelPageSize全部都是4k的,但是ARM平台上动态库被映射了2m的大页,是x86和ARM约束条件不一样吗,还是这是一个bug ---原始邮件--- 发件人: "Liuzixian"<liuzixian4(a)huawei.com<mailto:liuzixian4@huawei.com>> 发送时间: 2023年2月9日(周四) 上午9:21 收件人: "x_xiny"<x_xiny(a)qq.com<mailto:x_xiny@qq.com>>; 主题: 答复: 您好 关于内核大页特性怎么开启,需要请教一下
22.09版本文档链接:https://docs.openeuler.org/zh/docs/22.09/docs/A-Tune/native-tur…
发件人: Liuzixian <> 发送时间: 2023年2月9日 9:20 收件人: '常新' <x_xiny(a)qq.com<mailto:x_xiny@qq.com>> 抄送: Zhoukang (A) <zhoukang7(a)huawei.com<mailto:zhoukang7@huawei.com>>; linfeilong <linfeilong(a)huawei.com<mailto:linfeilong@huawei.com>> 主题: 答复: 您好 关于内核大页特性怎么开启,需要请教一下 22.09版本使用sysctl开关(exec-use-hugetlb)
PR中的这个commit增加了该开关:https://gitee.com/openeuler/kernel/commit/1efdacff482d86…
环境变量改为sysctl的理由如下: 1、 内核原生不支持判断环境变量,不符合社区使用方式 2、 22.03还有内核启动参数exec-hugepages进行控制,调试时不如sysctl方便,在22.09合并到sysctl中 3、 有使用者反馈业务启动代码有sudo app_start这样切换用户的场景,无法继承环境变量。 如果您有关于该特性使用方式的建议,也可以反馈给我们。 发件人: 常新 <x_xiny(a)qq.com<mailto:x_xiny@qq.com>> 发送时间: 2023年2月8日 17:48 收件人: Liuzixian <liuzixian4(a)huawei.com<mailto:liuzixian4@huawei.com>> 抄送: Zhoukang (A) <zhoukang7(a)huawei.com<mailto:zhoukang7@huawei.com>> 主题: 您好 关于内核大页特性怎么开启,需要请教一下 您好,有个问题向您请教一下,我看见你们已经在kernel2209分支上合入了大页的特性,这个在5.10上怎么开启
https://gitee.com/openeuler/kernel/pulls/59
我看见开启大页功能这个在4.19内核版本上可以通过设置环境变量的方式 export HUGEPAGE_ELF=1的方式开启 看这里是通过加了几个补丁做了这么一个功能,
https://gitee.com/openeuler/native-turbo/blob/master/kernel-patch/kernel-4.…
我在5.10内核上没有看见相关的代码,如果开启这个功能的话,是需要同步这些补丁吗? 或者有没有相关的文档呀 感谢
1
0
0
0
eBPF SIG双周例会
by openEuler conference
03 Mar '23
03 Mar '23
您好! sig-ebpf SIG 邀请您参加 2023-03-08 14:15 召开的Zoom会议(自动录制) 会议主题:eBPF SIG双周例会 会议链接:https://us06web.zoom.us/j/85604355408?pwd=UWQwSmtMSVZuUlAvWHk3R3NvdjFQdz09
会议纪要:https://etherpad.openeuler.org/p/sig-ebpf-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-ebpf SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-08 14:15, The subject of the conference is eBPF SIG双周例会, You can join the meeting at
https://us06web.zoom.us/j/85604355408?pwd=UWQwSmtMSVZuUlAvWHk3R3NvdjFQdz09
. Add topics at
https://etherpad.openeuler.org/p/sig-ebpf-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
Storage sig 例会
by openEuler conference
03 Mar '23
03 Mar '23
您好! Storage SIG 邀请您参加 2023-03-03 10:00 召开的Zoom会议 会议主题:Storage sig 例会 会议内容: storage sig例会 会议链接:https://us06web.zoom.us/j/86475095897?pwd=U2RMK1A1TVhzcjR0S3VYVDZybm54UT09
会议纪要:https://etherpad.openeuler.org/p/Storage-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler Storage SIG invites you to attend the Zoom conference will be held at 2023-03-03 10:00, The subject of the conference is Storage sig 例会, Summary: storage sig例会 You can join the meeting at
https://us06web.zoom.us/j/86475095897?pwd=U2RMK1A1TVhzcjR0S3VYVDZybm54UT09
. Add topics at
https://etherpad.openeuler.org/p/Storage-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
2
2
0
0
sig-K8sDistro 三月月度例会
by openEuler conference
02 Mar '23
02 Mar '23
您好! sig-K8sDistro SIG 邀请您参加 2023-03-06 14:00 召开的Zoom会议(自动录制) 会议主题:sig-K8sDistro 三月月度例会 会议内容: 1.OKD UPI方式部署流程介绍。 2.NestOS 23.03版本开发进展与计划 会议链接:https://us06web.zoom.us/j/89903270605?pwd=TnYwbk1hdUpoWEV4QWdnSDBINkZnZz09
会议纪要:https://etherpad.openeuler.org/p/sig-K8sDistro-meetings
温馨提醒:建议接入会议后修改参会人的姓名,也可以使用您在gitee.com的ID
更多资讯尽在:https://openeuler.org/zh/
Hello! openEuler sig-K8sDistro SIG invites you to attend the Zoom conference(auto recording) will be held at 2023-03-06 14:00, The subject of the conference is sig-K8sDistro 三月月度例会, Summary: 1.OKD UPI方式部署流程介绍。 2.NestOS 23.03版本开发进展与计划 You can join the meeting at
https://us06web.zoom.us/j/89903270605?pwd=TnYwbk1hdUpoWEV4QWdnSDBINkZnZz09
. Add topics at
https://etherpad.openeuler.org/p/sig-K8sDistro-meetings
. Note: You are advised to change the participant name after joining the conference or use your ID at
gitee.com
. More information:
https://openeuler.org/en/
1
0
0
0
← Newer
1
...
103
104
105
106
107
108
109
...
338
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
Results per page:
10
25
50
100
200