Hi Burkhard, Mark, Peder,
On Thu, 2005-09-29 at 09:19 +0200, Peder Hedlund wrote:
On Wed, 28 Sep 2005, Mark Knecht wrote:
[cut]
I would suggest looking at how shm is mounted in your
distro and
whether users are given access. On my Gentoo machine I have
this in fstab:
shm /dev/shm tmpfs
nodev,nosuid,noexec 0 0
Make sure you have support for shm and tmpfs in the kernel.
(I think SHM is default but you have select
"Virtual memory filesystem support" under Filesystems/Pseudo fs)
If you have that you shouldn't have to have any entry in fstab;
the kernel automounts /dev/shm with 1777 permissions.
I've read that having fstab mount /dev/shm after the kernel has mounted
it might cause xruns.
The fstab entry, I think, is only for 2.4 kernels.
Sorry for not noting it was a permission issue with shm. I had compiled
"Virtual memory filesystem support" in the kernel. I have this situation
for /dev/shm:
drwxr-xr-x 3 root root 60 2005-09-29 11:05 shm
Now, manually changing the permissions to /dev/shm with chmod works (in
the sense that I can start jack from normal user). Manually mounting shm
in this way:
# mount -t tmpfs shm /dev/shm
works too, giving
drwxrwxrwt 2 root root 40 2005-09-29 11:25 shm
unmounting shm I return to have the bad permission. If I put the stanza
in the fstab I get (well, obviously) the right permission on boot.
How can I obtain that shm is mounted on boot with the right permission
without the fstab entry? It really matters that fstab entry?
Thanks for the help.
Best Regards,
~ Antonio