• Unraid OS version 6.8.0-rc1 available


    limetech

    New in Unraid OS 6.8 release:

     

    The unRAIDServer.plg file (update OS) still downloads the new release zip file to RAM but then extracts directly to USB flash boot device.  You will probably notice a slight difference in speed of extract messages.  There is still a 'sync' command at the end, which causes each device to spin up serially as Linux kernel syncs each device (why does kernel do this serially? I have no idea).  I am tempted to remove this because a Reboot of course spins everything up in parallel, but I'm concerned about users out there who might just hit Reset button and USB flash write data is not fully written. 

     

    Forms based authentication
    If you have set a root password for your server, upon boot you'll now see a nice login form.  There still is only one user for Unraid so for username enter root.  This form should be compatible with all major password managers out there.  We always recommend using a strong password.  We have auto-logout set to 1 hour.

     

    Linux kernel 5.3

    • default scheduler now 'mq-deadline'
    • enabled Huge Page support, though no UI control yet
    • binfmt_misc support
    • added "Vega 10 Reset bug" patch
    • more device drivers

     

    Some out-of-tree (oot) drivers are currently omitted either because the source code doesn't compile or driver doesn't work with the 5.3 kernel:

    • Intel ixgbe [does not build] (using in-tree driver)
    • Highpoint r750 [does not work]
    • Highpoint rr3740a [does not build]

     

    This is always the risk with including vendor-supplied drivers.  Until the vendor fixes their code we must omit their driver.

     

    md/unraid driver
    Introduced "multi-stream" support:

    • Reads on devices which are not being written should run at full speed.  In addition, if you have set the md_write_method tunable to "reconstruct write", then while writing, if any read streams are detected, the write method is switched to "read/modifywrite".
    • Parity sync/check should run at full speed by default.
    • Parity sync/check can be throttled back in presence of other active streams.
    • The "stripe pool" resource is automatically shared evenly between all active streams.

     

    As a result got rid of some Tunables:

    • md_sync_window
    • md_sync_thresh

    and added some tunables:

    • md_queue_limit
    • md_sync_limit

     

    Please refer to Settings/Disk Settings help text for description of these settings.

     

    Remaining issue: some users have reported slower parity sync/check rates for very wide arrays (20+ devices) vs. 6.7 and earlier releases - we are still studying this problem.


    WireGuard support - available as a plugin via Community Apps.  Our WireGuard implementation and UI is still a work-in-process; for this reason we have made this available as a plugin, though the latest WireGuard module is included in our Linux kernel.  Full WireGuard implementation will be merged into Unraid OS itself in a future release.  I want to give special thanks to @bonienl who wrote the plugin with lots of guidance from @ljm42 - thank you!  I also should give a shout out to @NAS who got us rolling on this.  If you don't know about WireGuard it's something to look into!

     

    Guide here:


    WS-Discovery support - Finally you can get rid of SMBv1 and get reliable Windows network discovery.  This feature is configured on the Settings/SMB Settings page and enabled by default.

    • Also on same settings page is Enable NetBIOS setting.  This is enabled by default, however if you no longer have need for NetBIOS discovery you can turn it off.  When turned off, Samba is configured to accept only SMBv2 protocol and higher.
    • Added mDNS client support in Unraid OS.  This means, for example, from an Unraid OS terminal session to ping another Unraid OS server on your network you can use (e.g., 'tower'):
      ping tower.local
      instead of
      ping tower
      Note the latter will still work if you have NetBIOS enabled.

     

    User Share File System (shfs) changes:

    • Integrated FUSE-3 - This should increase performance of User Share File System somewhat.
    • Fixed bug with hard link support.  Previously a 'stat' on two directory entries referring to same file would return different i-node numbers, thus making it look like two independent files.  This has been fixed however there is a config setting on Settings/Global Share Settings called "Tunable (support hard links)".  The default is Yes, but with certain very old media and DVD players which access shares via NFS, you may need to set this to No.
    • Note: if you have custom config/extra.cfg file, get rid of it.


    Other improvements/bug fixes:

    • Format - during Format any running parity sync/check is automatically Paused and then resumed upon Format completion.
    • Encryption - an entered passphrase is not saved to any file.  Also included an API for Unassigned devices plugin to open encrypted volumes.
    • Fixed bug where multi-device btrfs pool was leaving metadata set to dup instead of raid1.
    • Several other small bug fixes and improvements.
    • Numerous base package updates.

     

    Finally - please note that AFP is now deprecated and we plan to remove in Unraid 6.9 release.

     

    Version 6.8.0-rc1 2019-10-11

    Base distro:

    • aaa_elflibs: version 15.0 build 11
    • acpid: version 2.0.32
    • at-spi2-atk: version 2.34.0
    • at-spi2-core: version 2.34.0
    • atk: version 2.34.1
    • bash: version 5.0.011
    • btrfs-progs: version 5.2.2
    • bzip2: version 1.0.8
    • ca-certificates: version 20190826
    • cifs-utils: version 6.9
    • cryptsetup: version 2.2.1
    • curl: version 7.66.0
    • dbus: version 1.12.16
    • dbus-glib: version 0.110
    • dhcpcd: version 8.0.6
    • docker: version 19.03.3
    • e2fsprogs: version 1.45.4
    • encodings: version 1.0.5
    • etc: version 15.0
    • ethtool: version 5.3
    • expat: version 2.2.9
    • file: version 5.37
    • findutils: version 4.7.0
    • freetype: version 2.10.1
    • fuse3: version 3.6.2
    • gdbm: version 1.18.1
    • gdk-pixbuf2: version 2.38.2
    • git: version 2.23.0
    • glib2: version 2.62.0
    • glibc-solibs: version 2.30
    • glibc-zoneinfo: version 2019c
    • glibc: version 2.30
    • glu: version 9.0.1
    • gnutls: version 3.6.10
    • gtk+3: version 3.24.10
    • harfbuzz: version 2.6.0
    • haveged: version 1.9.8
    • hostname: version 3.22
    • hwloc: version 1.11.13
    • icu4c: version 64.2
    • intel-microcode: version 20190918
    • iproute2: version 5.3.0
    • iptables: version 1.8.3
    • iputils: version 20190709
    • irqbalance: version 1.6.0
    • less: version 551
    • libICE: version 1.0.10
    • libX11: version 1.6.8
    • libXi: version 1.7.10
    • libXt: version 1.2.0
    • libarchive: version 3.4.0
    • libcap-ng: version 0.7.10
    • libcroco: version 0.6.13
    • libdrm: version 2.4.99
    • libedit: version 20190324_3.1
    • libevdev: version 1.7.0
    • libevent: version 2.1.11
    • libgcrypt: version 1.8.5
    • libgudev: version 233
    • libjpeg-turbo: version 2.0.3
    • libnftnl: version 1.1.4
    • libnl3: version 3.5.0
    • libpcap: version 1.9.1
    • libpciaccess: version 0.16
    • libpng: version 1.6.37
    • libpsl: version 0.21.0
    • librsvg: version 2.44.14
    • libseccomp: version 2.4.1
    • libssh2: version 1.9.0
    • libtasn1: version 4.14
    • libusb: version 1.0.23
    • libvirt-php: version 0.5.5
    • libvirt: version 5.7.0 (CVE-2019-10161, CVE-2019-10166, CVE-2019-10167, CVE-2019-10168)
    • libwebp: version 1.0.3
    • libzip: version 1.5.2
    • logrotate: version 3.15.1
    • lsof: version 4.93.2
    • lsscsi: version 0.30
    • lvm2: version 2.03.05
    • lz4: version 1.9.1
    • mkfontscale: version 1.2.1
    • mozilla-firefox: version 68.0.2 (CVE-2019-11751, CVE-2019-11746, CVE-2019-11744, CVE-2019-11742, CVE-2019-11736, CVE-2019-11753, CVE-2019-11752, CVE-2019-9812, CVE-2019-11741, CVE-2019-11743, CVE-2019-11748, CVE-2019-11749, CVE-2019-5849, CVE-2019-11750, CVE-2019-11737, CVE-2019-11738, CVE-2019-11747, CVE-2019-11734, CVE-2019-11735, CVE-2019-11740, CVE-2019-11754, CVE-2019-9811, CVE-2019-11711, CVE-2019-11712, CVE-2019-11713, CVE-2019-11714, CVE-2019-11729, CVE-2019-11715, CVE-2019-11716, CVE-2019-11717, CVE-2019-1 1718, CVE-2019-11719, CVE-2019-11720, CVE-2019-11721, CVE-2019-11730, CVE-2019-11723, CVE-2019-11724, CVE-2019-11725, CVE-2019-11727, CVE-2019-11728, CVE-2019-11710, CVE-2019-11709)
    • nano: version 4.5
    • ncurses: version 6.1_20190720
    • net-tools: version 20181103_0eebece
    • nettle: version 3.5.1
    • nghttp2: version 1.39.2
    • nginx: version 1.16.1 (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516)
    • nodejs: version 10.16.3
    • nss-mdns: version 0.14.1
    • ntp: version 4.2.8p13
    • openldap-client: version 2.4.48
    • openssh: version 8.0p1
    • openssl-solibs: version 1.1.1d
    • openssl: version 1.1.1d
    • p11-kit: version 0.23.18.1
    • pcre2: version 10.33
    • php: version 7.2.23 (CVE-2019-11042, CVE-2019-11041)
    • pixman: version 0.38.4
    • pkgtools: version 15.0
    • procps-ng: version 3.3.15
    • qemu: version 4.1.0 (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
    • qrencode: version 4.0.2
    • rpcbind: version 1.2.5
    • rsyslog: version 8.1908.0
    • samba: version 4.10.8 (CVE-2019-10197)
    • sdparm: version 1.10
    • sessreg: version 1.1.2
    • setxkbmap: version 1.3.2
    • sg3_utils: version 1.44
    • shadow: version 4.7
    • shared-mime-info: version 1.12
    • sqlite: version 3.29.0
    • sysvinit-scripts: version 2.1
    • sysvinit: version 2.96
    • talloc: version 2.3.0
    • tdb: version 1.4.2
    • tevent: version 0.10.1
    • ttyd: version 1.5.2
    • usbutils: version 012
    • util-linux: version 2.34
    • wget: version 1.20.3
    • wireguard: version 0.0.20190913
    • wsdd: version 20180618 build 2
    • xauth: version 1.1
    • xclock: version 1.0.9
    • xfsprogs: version 5.2.1
    • xkeyboard-config: version 2.27
    • xorg-server: version 1.20.5
    • xrandr: version 1.5.1
    • xterm: version 348
    • xwininfo: version 1.1.5
    • zstd: version 1.4.3

    Linux kernel:

    • version 5.3.6
    • default scheduler now mq-deadline
    • CONFIG_BINFMT_MISC: Kernel support for MISC binaries
    • CONFIG_DEBUG_FS: Debug Filesystem
    • CONFIG_HUGETLBFS: HugeTLB file system support
    • CONFIG_ICE: Intel(R) Ethernet Connection E800 Series Support
    • CONFIG_IGC: Intel(R) Ethernet Controller I225-LM/I225-V support
    • CONFIG_MLX5_CORE_IPOIB: Mellanox 5th generation network adapters (connectX series) IPoIB offloads support
    • CONFIG_SCSI_SMARTPQI: Microsemi PQI Driver
    • CONFIG_WIREGUARD: IP: WireGuard secure network tunnel
    • patch: fix_vega_reset (user request)
    • patch: increase BLK_MAX_REQUEST_COUNT from 16 to 32
    • oot: LimeTech md/unraid: version 2.9.10 (multi-stream support)
    • oot: Highpoint rsnvme: version v1.2.16_19_05_06
    • oot: Tehuti tn40xx: version 0.3.6.17.2
    • oot: omitted: Intel ixgbe [does not build] (using in-tree driver)
    • oot: omitted: Highpoint r750 [does not work]
    • oot: omitted: Highpoint rr3740a [does not build]

    Management:

    • fix btrfs bug where converting from single to multiple pool did not balance metadata to raid1, and converting from multiple to single did not balance metadata back to single.
    • auto-mount hugetlbfs to support kernel huge pages
    • emhttpd: do not write /root/keyfile if encryption passphrase provided via webGUI
    • fstab: mount USB flash boot device with root-only access
    • nginx.conf: configure all nginx worker threads to run as 'root'.
    • start/stop WireGuard upon server start/shutdown
    • support forms-based authentication
    • shfs: support FUSE3 API changes; hard links report same st_ino; hard link support configurable
    • support disabling NetBIOS, and set Samba 'min server procotol' and 'min client protocol' to SMB2 if disabled
    • support WS-Discovery method
    • support mDNS local name resolution via avahi
    • extract OS upgrade directly to USB flash
    • webgui: Revamp Banner Warning System
    • webgui: Fix custom case png not surviving reboot
    • webgui: Enhanced display of network settings
    • webgui: Open banner system to 3rd party apps
    • webgui: Modified notify script to allow overriding email recipients in notification settings
    • webgui: Allow Safari to use websockets
    • webgui: Select case correction + replace MD1510 for AVS-10/4
    • webgui: Font, Icon and image cleanup
    • webgui: Added AFP deprecated notice
    • webgui: Changed config folder of TELEGRAM
    • webgui: Add share access to user edit
    • webgui: Added cache and disk type to shares page
    • webgui: Aligned management page layout
    • webgui: Added conditional UPnP setting on Management page
    • webgui: Support wireguard plugin in download.php
    • webgui: Added UPnP to access script (to support WireGuard plugin)
    • webgui: Made notify script compatible with 6.8 new security scheme
    • webgui: Fixed misalignment of absent disk on Main page
    • webgui: Update ArrayDevices.page help text
    • webgui: show warning on login page when browser cookies are disabled
    • webgui: Fixed docker container update state
    • webgui: Added VM XML files to diagnostics
    • webgui: Telegram notification agent: enable group chat IDs, update helper description
    • webgui: Integrate CAs Plugin Helper
    • webgui: Switch download routine to be PHP Curl
    • webgui: Change PluginHelpers download to be PHP Curl
    • webgui: dockerMan - Deprecate TemplateURL
    • webgui: Fixed: footer always on foreground
    • webgui: Plugin Helpers: Follow redirects on downloads
    • webgui: dockerMan: Redownload Icon if URL changes
    • webgui: If a page is loaded via https, prevent it from loading resources via http (ie, block mixed content)
    • webgui: Ensure spinner always ontop
    • webgui: Allow outside click to close popups
    • webgui: Use complete HTML documents in popups
    • webgui: Standardize on lang="en"
    • webgui: Added 'F1' key to toggle help text
    • webgui: Main page: consolidate spin up/down action and device status into one
    • webgui: support changed tunables on Disk Settings page

    Edited by limetech

    • Like 6
    • Thanks 4



    User Feedback

    Recommended Comments



    8 hours ago, glennv said:

    seriuosly fingers crossed that ixgbe support is fixed and included in final release as 10g intel card(s) are my main cards in my unraid boxes.

    would be a nogo without.

    wait and pray ........

    Intel 10Gbit support is included - but we're using the kernel "in-tree" ixgbe driver instead of Intel "out-of-tree" ixgbe driver (tree refers to the Linux kernel source code tree).

     

    If you really need extra functionality provided by the Intel driver you can do more than pray, you can complain here:

    https://sourceforge.net/p/e1000/bugs/

    Link to comment
    8 hours ago, JoeUnraidUser said:

    That's just ridiculous.  I should be able to properly run a script on a Linux system.  At boot I am running several perl, bash, and python scripts with many different parameters.

    The USB boot flash is FAT32 file system which does not support *nix style permission bits.  There are also other restrictions with FAT32, for example no symlinks, no hard links.

    Link to comment
    3 hours ago, Niklas said:

    I want to use the functions that duplicati provides like backup rotation, monitoring, encrypting, send to cloud and so on. Guess we have to copy the flash to another location using user scripts with rights modified to get duplicati to read it. Feels less secure but backups are very important. 

    Why can't you run it as 'root' user?

    Link to comment
    16 minutes ago, limetech said:

    Why can't you run it as 'root' user?

    It's a docker container. Don't know how to run it as root. Hmm

     

    I use it to backup flash, some appdata and important array stuff, encrypted and uploaded to Onedrive with smart retention. Web gui

    Edit: I can probably work around it.

    Edited by Niklas
    Link to comment
    2 hours ago, doron said:

    So while fmask=77 might help considering future non-root users, I fail to see how fmask=177 helps

    You don't understand what fmask and dmask do when mounting FAT32 volumes.  They are octal values that turn off corresponding permission bits.  It causes all files to have only owner RW bits set and all directories to have only owner RWX bits set.

     

    There are sensitive files stored on the flash such as your actual passwd file and ssh keys.  We are not going to change this back the way it was.  The USB boot flash was never meant to store anything other than files necessary to boot and config files.  You might notice that since day 1 we have copied the 'go' file to /tmp and executed it from there.

     

    Sorry this is an inconvenience but there are many workarounds.

    • Like 3
    Link to comment
    On 10/12/2019 at 1:55 PM, limetech said:

    I've tried on a couple servers and get full speed doing 'md5sum' of a file.

     

    You can experiment with 2 tunables on Settings/Disk Settings page:

    enable ncq

    nr_requests

    I suggest start with Auto on both.  To set 'auto' for nr_requests, click in the field and delete any value set there (so field is blank) and then click Apply.  You will then need to reboot for that setting to take effect.

    Setting both to 'auto' tells Unraid to not change those values from what the kernel sets.

    If this doesn't help next change would be to disable ncq.

    If that doesn't help, maybe something different with that driver and more research needed.

    Continue follow read performance issue, I try above suggestion but result same. Then I make test on another machine and same problem found.

     

    1.thumb.png.6970f95d348d5f68cff80c0b7d938594.png

     

    In above setup,

    - Array disks ( Harddisk and SSD ) also got slow problem, but SSD faster (~110MB/s) then Harddisk (~60MB/s)

    - Cache pool in RAID0 or RAID1 speed normal.

     

    2.thumb.png.c49e5c2c9d701b3fbda71ef14fe41ea4.png

     

    In above setup, I assign same SSD as cache ( no format, nothing change ), speed was normal ~511MB/s

     

    All harddisk connect to LSI HBA and SSD connect to onboard. So problem not on hardware, just array pool ( software ) issue.

     

    In my point of view, it worse then 6.7.

     

     

    Edited by Benson
    Link to comment

    Could we get a toggle added to gui to disable IPV6 for Ntpd for those of us who don't use ipv6 in our networks?

     

    ntpd[2511]: bind(19) AF_INET6 fe80::434:4cff:fe46:a14b%14#123 flags 0x11 failed: Cannot assign requested address

    ntpd[2511]: failed to init interface for address fe80::434:4cff:fe46:a14b%14

    Link to comment
    58 minutes ago, Dazog said:

    Could we get a toggle added to gui to disable IPV6 for Ntpd for those of us who don't use ipv6 in our networks?

    Settings -> Network Settings -> Network protocol -> IPv4 only

     

    EDIT - OK, I see this in my IPv4 system log once also:

    Oct 11 20:38:14 Tower ntpd[1876]: bind(19) AF_INET6 fe80::7462:deff:fe79:8567%12#123 flags 0x11 failed: Cannot assign requested address
    Oct 11 20:38:14 Tower ntpd[1876]: unable to create socket on br0 (3) for fe80::7462:deff:fe79:8567%12#123
    Oct 11 20:38:14 Tower ntpd[1876]: failed to init interface for address fe80::7462:deff:fe79:8567%12

    Is it causing a problem or just don't like seeing it in the log? 

     

    (Just trying to help triage ;) )

    Edited by ljm42
    Link to comment
    2 hours ago, limetech said:

    The USB boot flash was never meant to store anything other than files necessary to boot and config files.  You might notice that since day 1 we have copied the 'go' file to /tmp and executed it from there.

    Yet, I can export the Flash Drive via SMB, make it public (or Secure or Private if I assign a user with Read/Write permission), and do anything I want from there.  And you tell me that you don't want to give me the same privileges from the Linux side...

    Link to comment
    4 hours ago, limetech said:

    You don't understand what fmask and dmask do when mounting FAT32 volumes.  They are octal values that turn off corresponding permission bits.  It causes all files to have only owner RW bits set and all directories to have only owner RWX bits set.

    Actually I do understand, quite well in fact. Which is why I commented that it makes sense to me to set fmask & dmask to 77 (which is 077). The bit that made me wonder is disabling of the X bit for root (which is what's caused by your setting fmask to 177 as opposed to 077).

    Quote

    There are sensitive files stored on the flash such as your actual passwd file and ssh keys. 

    Understood and appreciated. However this is unrelated to turning off the X bit for root. This is the only bit I'm concerned with.

    Quote

    We are not going to change this back the way it was.

    Nor should you. It makes good sense to make all these files inaccessible to non-root users. 

    Bottom line - perhaps you want to reconsider the one bit - X bit for root. It has nothing to do with access to the sensitive files; these will be fully protected from non-root snoopers with dmask=77 and fmask=77.

     

    Thanks!

     

    Edited by doron
    Link to comment
    6 hours ago, Frank1940 said:

    In 6.8.0-rc-1, When using the Krusader Docker, I get this error message:

    image.thumb.png.59b9178c69a37846cff6b6aec5858449.png

     

    I did find a solution to this problem.  What I did was to run the Krusader Docker as 'root'.  Anyone, who wants the details to what I did, can find it in the Krusader Docker Support thread.  I have the feeling that this solution may work on a lot of other Dockers...

    • Thanks 1
    Link to comment
    25 minutes ago, Frank1940 said:

    I did find a solution to this problem.  What I did was to run the Krusader Docker as 'root'.  Anyone, who wants the details to what I did, can find it in the Krusader Docker Support thread.  I have the feeling that this solution may work on a lot of other Dockers...

    Works fine with the Duplicati Docker too. Thanks.

    Edited by Niklas
    Link to comment
    28 minutes ago, Frank1940 said:

    I did find a solution to this problem.  What I did was to run the Krusader Docker as 'root'.  Anyone, who wants the details to what I did, can find it in the Krusader Docker Support thread.  I have the feeling that this solution may work on a lot of other Dockers...

    Good answer.

    Link to comment
    5 hours ago, ljm42 said:

    Settings -> Network Settings -> Network protocol -> IPv4 only

     

    EDIT - OK, I see this in my IPv4 system log once also:

    
    Oct 11 20:38:14 Tower ntpd[1876]: bind(19) AF_INET6 fe80::7462:deff:fe79:8567%12#123 flags 0x11 failed: Cannot assign requested address
    Oct 11 20:38:14 Tower ntpd[1876]: unable to create socket on br0 (3) for fe80::7462:deff:fe79:8567%12#123
    Oct 11 20:38:14 Tower ntpd[1876]: failed to init interface for address fe80::7462:deff:fe79:8567%12

    Is it causing a problem or just don't like seeing it in the log? 

     

    (Just trying to help triage ;) )

    It's harmless, I googled it.

     

    It appears when NTPD is set to look for IPV4/6 at boot. But since I am Ipv4 only. 

    If it fails. and prints that error.

    Reading up, if we can disable ipv6 and restart NTPD with a Gui option, it will be IPV4 only. 

    I know my ask is VERY minor, like a 6.8.1 or 6.8.54 request :)

     

     

    Edited by Dazog
    Link to comment

    What should the disk tunables enable_NCQ and nr_requests be set to in this version? I made notes before I upgraded and they were previously set to Auto and 128, respectively. Now they are set to Auto and Auto. The GUI help suggests that Auto NCQ uses the disks' default (which amounts to a queue length of 32) but I always thought that Unraid preferred NCQ to be off (a queue length of 1) because Linux handles queueing better than the disks' firmware. So has the meaning of Auto changed for that tunable?

    Link to comment
    20 minutes ago, John_M said:

    What should the disk tunables enable_NCQ and nr_requests be set to in this version? I made notes before I upgraded and they were previously set to Auto and 128, respectively. Now they are set to Auto and Auto. The GUI help suggests that Auto NCQ uses the disks' default (which amounts to a queue length of 32) but I always thought that Unraid preferred NCQ to be off (a queue length of 1) because Linux handles queueing better than the disks' firmware. So has the meaning of Auto changed for that tunable?

    Those tunables date back to I think kernel 2.6 days, maybe even 2.4.  There have been huge changes in block I/O layer over the years and for most things the kernel "decides" the best settings.  Honestly I barely experimented with those settings and nothing I tried seemed to make much difference. YMMV

    • Thanks 1
    Link to comment
    5 hours ago, doron said:

    Understood and appreciated. However this is unrelated to turning off the X bit for root. This is the only bit I'm concerned with.

    Turning on the 'x' bit for files makes them all executable.  This is not correct for all the files on the flash.  The only executable script on the flash is the 'go' file and optionally a 'stop' file, both of which are copied to /tmp and executed from there.  I don't want all the files to appear executable and I don't want someone trying to execute 'make_bootable' directly from the flash.

     

    Seriously how big of an issue is this really?  What scripts are you storing on the flash?

    Link to comment
    8 hours ago, Benson said:

    Continue follow read performance issue, I try above suggestion but result same. Then I make test on another machine and same problem found.

    Please open a separate bug report for this issue.  This thread is not the place to debug issues.  thx

    Link to comment
    On 10/11/2019 at 9:46 PM, limetech said:

    re: WireGuard

     

    Beware the developers themselves describe this as a "work-in-progress":

    https://www.wireguard.com/#work-in-progress

     

    and the wg module has not yet been merged into Linux mainline kernel:

    https://kubemag.net/news/wireguard-going-to-be-merged-into-linux-kernel

     

    We do keep up with changes:

    https://git.kernel.org/pub/scm/linux/kernel/git/zx2c4/WireGuard.git/

     

    with sufficient warnings in place: We've been using it quite a long time now and this tech is really cool!

    So just to be sure, is wireguard baked in-kernel for Unraid, or does the plugin run in userspace?

    Link to comment

    thx for nice build but now i can´t wake up my server via wol after going to sleep....

     

    any tipps?

    Link to comment
    14 hours ago, ljm42 said:

    Settings -> Network Settings -> Network protocol -> IPv4 only

     

    EDIT - OK, I see this in my IPv4 system log once also:

    
    Oct 11 20:38:14 Tower ntpd[1876]: bind(19) AF_INET6 fe80::7462:deff:fe79:8567%12#123 flags 0x11 failed: Cannot assign requested address
    Oct 11 20:38:14 Tower ntpd[1876]: unable to create socket on br0 (3) for fe80::7462:deff:fe79:8567%12#123
    Oct 11 20:38:14 Tower ntpd[1876]: failed to init interface for address fe80::7462:deff:fe79:8567%12

    Is it causing a problem or just don't like seeing it in the log? 

     

    (Just trying to help triage ;) )

    harmless

    Link to comment
    4 hours ago, limetech said:

    Seriously how big of an issue is this really?  What scripts are you storing on the flash?

    It's small. As you say, there are workarounds. I was thinking about the principle of least surprise, or "how many things will break with alt A vs. alt B.".

    For me its some logic for setting up /root/keyfile ; for others it might be something else. Anyway - minor annoyance at most, easy to resolve.

     

    Link to comment



    Guest
    This is now closed for further comments

  • Status Definitions

     

    Open = Under consideration.

     

    Solved = The issue has been resolved.

     

    Solved version = The issue has been resolved in the indicated release version.

     

    Closed = Feedback or opinion better posted on our forum for discussion. Also for reports we cannot reproduce or need more information. In this case just add a comment and we will review it again.

     

    Retest = Please retest in latest release.


    Priority Definitions

     

    Minor = Something not working correctly.

     

    Urgent = Server crash, data loss, or other showstopper.

     

    Annoyance = Doesn't affect functionality but should be fixed.

     

    Other = Announcement or other non-issue.