BMLFS
BMLFS copied to clipboard
Beyond Musl Linux From Scratch - Build Recipes for MLFS [Musl Linux From Source]
Command segfaults: ``` $ udisksctl power-off -b /dev/sdb (udisksctl power-off:19392): GLib-GIO-CRITICAL **: 15:05:24.205: g_dbus_interface_dup_object: assertion 'G_IS_DBUS_INTERFACE (interface_)' failed Segmentation fault [22835.388282] udisksctl[20742]: segfault at 0 ip 00007fe7c110ee6f sp 00007ffc2282c540 error...
>By the way, talking about "alternatives", what about linking Shadow to OpenPAM (in BMLFS, in the case) instead of Linux-PAM? I didn't found many information about why most distributions link...
Blueman will crash when launched from a wayland session: ``` $ blueman-applet blueman-applet 14.58.35 ERROR PluginManager:90 load_plugin: Unable to load plugin module GameControllerWakelock Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/blueman/main/PluginManager.py",...
When compiling: ``` Entering directory mpg123. /usr/bin/ld: mpg123.plugin.o: in function `DecodeState::DecodeState(char const*, VFSFile&, bool, bool)': /src/audacious-plugins-4.1/src/mpg123/mpg123.cc:150: undefined reference to `mpg123_replace_reader_handle' /usr/bin/ld: /src/audacious-plugins-4.1/src/mpg123/mpg123.cc:165: undefined reference to `mpg123_open_handle' /usr/bin/ld: mpg123.plugin.o: in function...
Installed LLVM-14.0.0 in `/opt/build`. LLVM compiles and installs, but cannot compile binaries/libraries: ``` $ echo 'int main(){}' > dummy.c $ clang dummy.c -v -Wl,--verbose &> dummy.log $ grep failed dummy.log...
I think that would be a great experiment.
librsvg-2.50.7 compiles fine with a downloaded pre-built rust toolchain from www.rust-lang.org but when used, it segfaults: ``` [35343.845037] nwggrid-server[5960]: segfault at 55c6956e8a88 ip 00007f0fd6b54455 sp 00007ffcd58e6930 error 4 in librsvg-2.so.2.47.0[7f0fd6648000+579000]...
In a 32-bit chroot for CMLFS, openssh stalls when executing configure script: ``` checking whether OpenSSL has NID_X9_62_prime256v1... yes checking whether OpenSSL has NID_secp384r1... yes checking whether OpenSSL has NID_secp521r1......
There is a critical vulnerability (CVE-2024-9680) in Firefox. Update to at least 131.0.0 or 128.3.1 (for ESR)