Here's how you get yum to list all the configured repos, without actually connecting to any of them (e.g. if your system is offline):
yum -C repolist all
The "-C" option tells yum to use the local cache, no matter how old the cache is.
This site is really just an easy way for me to keep notes on system administration, programming, and other topics. You'd have to be really bored to read it!
We recently started using Symantec 12.1.5 on our Linux systems at work. I installed the client on a test system and immediately had issues with LiveUpdate:
/opt/Symantec/symantec_antivirus/sav liveupdate -u
Picked up JAVA_TOOL_OPTIONS:
Command failed: Problem with LiveUpdate.
Check that java directory is in PATH
Unable to perform update
In liveupdt.log:
Apr 1, 2015 11:32:26 AM There was a failure in reading the settings from the .conf file.
Apr 1, 2015 11:32:26 AM org.bouncycastle.jce.provider.BouncyCastleProvider
Apr 1, 2015 11:32:26 AM JLU received a DeleteSetting command.
Running Liveupdate in debug mode:
java -cp /opt/Symantec/LiveUpdate/jlu.jar com.symantec.liveupdate.LiveUpdate -d
Using character set UTF-8
Command-line Product Selections to update:
(ProdName, Version, Lang, ItemSeqName, SeqNum)
Debug - output[nIdx] = uid=0(root) gid=0(root) groups=0(root) context=unconfined_u:unconfined_r:unconfined_java_t:s0-s0:c0.c1023
Adding JLU to the current command line
JLU Linux, 3.10, English, LiveUpdateSeq, 26
Trying to load jar file from /opt/Symantec/LiveUpdate/bcprov-jdk15on-148.jar
Trying to load jar file from current directory or mentioned in classpath
JLUException [
Nested Exception is:
[ java.lang.ClassNotFoundException ] org.bouncycastle.jce.provider.BouncyCastleProvider
java.lang.ClassNotFoundException: org.bouncycastle.jce.provider.BouncyCastleProvider
at java.net.URLClassLoader.findClass(Unknown Source)
[...]
I will leave out the frustrating troubleshooting my coworker and I did and give you the reason: Our security configuration specifies that we set the "noexec" mount option on /tmp.
Unfortunately, the Symantec install script requires exec on /tmp to install correctly. Specifically, it creates some temporary scripts in /tmp and runs them to install the BC (bouncycastle) provider. Here's an excerpt from the sepjlu-install.log:
Java LiveUpdate version 3.10 Build 26.
Extracted out unixinstall.sh to /tmp/1427202521861/unixinstall.sh.
Extracted out unixuninstall.sh to /tmp/1427202521861/unixuninstall.sh.
Extracted out liveupdate.conf to /tmp/1427202521861/liveupdate.conf.
Extracted out bcprov-jdk15on-148.jar to /tmp/1427202521861/bcprov-jdk15on-148.jar.
Copied /opt/Symantec/LiveUpdate/jlu.jar to /tmp/1427202521861/jlu-3.10.0.26.jar.
Error running /tmp/1427202521861/unixinstall.sh with reason: java.io.IOException: Cannot run program "/tmp/1427202521861/unixinstall.sh": error=13, Permission denied.
The script is supposed to copy bcprov-jdk15on-148.jar into $SYMROOT/LiveUpdate/, but obviously because "noexec" was set on /tmp, it couldn't run.
So in full, the solution is:
mount -o remount,exec /tmp
$INSTALLER_DIR/install.sh -i
mount -o remount,noexec /tmp
WARNING: AIDE detected prelinked binary objects on your system but the prelink tool (/usr/sbin/prelink) is missing!
WARNING: prelinked files will be processed without a prelink undo operation! Please install prelink to fix this.
This is because at one point, I did in fact use prelink. However, I had many issues with aide and prelink and finally just got fed up and removed it. Before doing that you're supposed to undo the prelink, but apparently I missed a file. But aide didn't tell me which one!
I couldn't find any information on the net about how to determine whether a binary is prelinked, so here's the answer:
readelf -S | grep prelink
If the binary is prelinked, you'll get something like:
[30] .gnu.prelink_undo PROGBITS 0000000000000000 000e4790
But what if you don't know which file is prelinked? And /etc/prelink.cache is non-existent (because someone removed it) or empty?
In that case, you have to examine every ELF binary on the system. I elected to break this into two steps. First, find all the ELF binaries:
find / -type f ! -path "/sys/*" ! -path "/dev/*" ! -path "/proc/*" \
! -path "/opt/splunk/var/*" ! -path "/mnt/*" ! -path "/media/*" ! -path "/srv/*" \
! -path "/net/*" ! -path "/selinux/*" | xargs file | grep ELF | cut -f1 -d':' \
> /tmp/elffiles
Now that you have a list of all the ELF binaries, test each of them to find out if they are prelinked. I did not use xargs in this case because although readelf works on multiple files, when combined with grep it would be hard to tell which of the arguments in the long argument list is the culprit:
for file in $(cat /tmp/elffiles) ; do
readelf -S $file | grep -q prelink
if [ $? -eq 0 ]; then echo $file is prelinked ; fi
done
I realize the above doesn't handle paths with spaces or other weird characters. I guess I'm lucky my system didn't have any of those.
Novell SuSE Linux ES 11 MS Windows Server 2012 Red Hat Ent Linux 6 Red Hat Ent Linux 7 SUSE Linux ES 12 MS Windows Server 2012 R2/SP MS Windows 2008 R2
Binaries are at: http://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverId=3XDPP
HTML version of manual: http://www.dell.com/support/Manuals/us/en/19/Topic/poweredge-rc-h730/PERC_CLI_RG_Pub-v1/en-us
PDF of manual: http://topics-cdn.dell.com/pdf/poweredge-rc-h730_Reference%20Guide_en-us.pdf
#!/usr/bin/expect set timeout 120 spawn "./vmware-install.pl" expect "Press enter to display " { send "\r" } expect "vSphere Software Development Kit License Agreement" { send "q" } expect "Do you accept" { send "yes\r" } expect "Do you want to install precompiled Perl modules for RHEL" { send "\r" } expect "In which directory do you want to install the executable files" { send "\r" } # Wait for installation to finish expect EOF
auth required /lib/security/$ISA/pam_tally2.so deny=5 unlock_time=900However, I later found that if you're running dovecot (version 0.99.11-9 -- maybe it's been fixed since then), it doesn't reset the tally on a successful login; i.e. it does not call pam_setcred. So, if the user is only logging in via dovecot, and they are checking mail at an interval less than your reset time, eventually the account will get locked out!
account required /lib/security/$ISA/pam_tally2.so
sudo -s
dmesg | lessto find the disk device.
ntfsresize -n -s 32079M /dev/sdaIf you don't get any errors, proceed by removing the -n option. If you get an error that the partition size cannot exceed the device size, reduce the size by 1MB (e.g. 32078M).
parted /dev/sdb mklabel gpt mkpart primary 0 3571900M quitThen:
mkfs.ext3 /dev/sdb1Making the EXT3 FS took about 22 minutes.