Commit Graph

1212 Commits

Author SHA1 Message Date
Lennart Poettering
d4054675b1 service: read special startup dirs only on the respective distros 2010-08-05 20:28:51 +02:00
Lennart Poettering
95978cf8a6 selinux: minor error handling fix 2010-08-05 19:50:03 +02:00
Lennart Poettering
eeaafddcb5 service: always sort services from suse B runlevel before services from normal runlevels 2010-08-05 19:50:03 +02:00
Michal Schmidt
a042efad57 reboot: handle -p switch properly
https://bugzilla.redhat.com/show_bug.cgi?id=618678
2010-08-05 19:50:03 +02:00
Lennart Poettering
6319292f15 selinux: fix labels only when configured for it 2010-08-05 19:50:02 +02:00
Kay Sievers
7d49c54770 units: getty - suse: login wants SIGHUP 2010-08-04 18:56:35 +02:00
Kay Sievers
00a11ba982 units: suse - reboot: do not wait for tty 2010-08-04 14:21:01 +02:00
Lennart Poettering
183ae5f99b reboot: don't wait for input tty 2010-08-04 14:17:18 +02:00
Lennart Poettering
804bbed8f4 prepare new release 2010-08-04 01:30:40 +02:00
Lennart Poettering
ccbe77e993 units: remove redundant ordering dependency 2010-08-04 01:27:26 +02:00
Lennart Poettering
5b1fe56a8b selinux: rework selinux tests a little 2010-08-04 01:07:38 +02:00
Lennart Poettering
f7f4cccb2a selinux: fix if vs. ifdef mixup 2010-08-04 00:40:19 +02:00
Lennart Poettering
14a35a84fa units: make sure that prefdm wins over the getty if both are pulled in 2010-08-03 23:58:23 +02:00
Lennart Poettering
a48bcc46be units: add conflicts between prefdm and getty@tty1 to avoid race for tty1 2010-08-03 23:53:17 +02:00
Daniel J Walsh
56cf987fe7 Systemd is causing mislabeled devices to be created and then attempting to read them.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/28/2010 05:57 AM, Kay Sievers wrote:
> On Wed, Jul 28, 2010 at 11:43, Lennart Poettering
> <lennart@poettering.net> wrote:
>> On Mon, 26.07.10 16:42, Daniel J Walsh (dwalsh@redhat.com) wrote:
>>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file
>>> type=1400 audit(1280174589.476:7): avc:  denied  { read } for  pid=1
>>> comm="systemd" name="autofs" dev=devtmpfs ino=9482
>>> scontext=system_u:system_r:init_t:s0
>>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file
>>> type=1400 audit(1280174589.476:8): avc:  denied  { read } for  pid=1
>>> comm="systemd" name="autofs" dev=devtmpfs ino=9482
>>> scontext=system_u:system_r:init_t:s0
>>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file
>>>
>>> Lennart, we talked about this earlier.  I think this is caused by the
>>> modprobe calls to create /dev/autofs.  Since udev is not created at the
>>> point that init loads the kernel modules, the devices get created with
>>> the wrong label.  Once udev starts the labels get fixed.
>>>
>>> I can allow init_t to read device_t chr_files.
>>
>> Hmm, I think a cleaner fix would be to make systemd relabel this device
>> properly before accessing it? Given that this is only one device this
>> should not be a problem for us to maintain, I think? How would the
>> fixing of the label work? Would we have to spawn restorecon for this, or
>> can we actually do this in C without too much work?
>
> I guess we can just do what udev is doing, and call setfilecon(), with
> a context of an earlier matchpathcon().
>
> Kay
> _______________________________________________
> systemd-devel mailing list
> systemd-devel@lists.freedesktop.org
> http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Here is the updated patch with a fix for the labeling of /dev/autofs
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkxQMyoACgkQrlYvE4MpobNviACfWgxsjW2xzz1qznFex8RVAQHf
gIEAmwRmRcLvGqYtwQaZ3WKIg8wmrwNk
=pC2e
2010-08-03 23:45:22 +02:00
Lennart Poettering
8b33e5ca72 update fixme 2010-08-03 23:29:18 +02:00
Tomasz Torcz
cebf8b2092 socket: Allow selection of TCP Congestion Avoidance algorithm to socket
Hi,

attached path extends socket configurables with another
knob - TCP Congestion Avoidance selection. Linux implements
handful of those, useful in various situations. For example,
TCP Low Priority may be used by FTP service to gracefully
yield bandwidth for more important TCP/IP streams.

Until recently TCP_CONGESTION was Linux-specific, recently
FreeBSD 8 and OpenSolaris gained compatible support.
2010-08-03 23:23:47 +02:00
Lennart Poettering
07424048b5 update fixme 2010-08-03 23:22:30 +02:00
Kay Sievers
2ab7076c6f fixme update 2010-08-03 23:18:04 +02:00
Lennart Poettering
d5ca5f1185 telinit: forward to upstart, if not booted with systemd 2010-07-24 02:33:38 +02:00
Lennart Poettering
ec7f7f2006 systemctl: don't use the systemd bus to talk to upstart 2010-07-24 02:23:40 +02:00
Lennart Poettering
385771fcf0 systemctl: don't hit an assert when we are run from a non-systemd boot 2010-07-24 01:56:13 +02:00
Lennart Poettering
e054f8333d main: disable NSS disabling logic for now, since this is incompatible with rpm 2010-07-24 01:29:21 +02:00
Lennart Poettering
ee5762e378 systemctl: fold systemd-install into systemctl 2010-07-24 00:53:33 +02:00
Lennart Poettering
9d8a57fff1 systemctl: support force-reload and condrestart as aliases for reload-or-try-restart 2010-07-23 05:24:45 +02:00
Lennart Poettering
85e5760d4f install: default to minimal realization mode 2010-07-23 05:24:24 +02:00
Lennart Poettering
ea4a240dc2 systemctl: accept -p more than once 2010-07-23 05:24:05 +02:00
Daniel J Walsh
7a58bfa4ae socket: SELinux support for socket creation.
It seems to work on my machine.

/proc/1/fd/20	system_u:system_r:system_dbusd_t:s0

/proc/1/fd/21	system_u:system_r:avahi_t:s0

And the AVC's seem to have dissapeared when a confined app trys to
connect to dbus or avahi.

If you run with this patch and selinux-policy-3.8.8-3.fc14.noarch
You should be able to boot in enforcing mode.
2010-07-23 05:12:13 +02:00
Robert "arachnist" Gerus
28322e1eb6 sshd, tmux and others are broken when /dev/pts is mounted with "-o nodev" 2010-07-23 05:12:13 +02:00
Lennart Poettering
25da667e1a build-sys: prepare release 4 2010-07-22 02:52:26 +02:00
Lennart Poettering
218362d22c units: add [Install] section to getty.target and remote-fs.target 2010-07-22 02:39:21 +02:00
Lennart Poettering
5e5c6cd737 update fixme 2010-07-22 02:26:27 +02:00
Lennart Poettering
d3d91d10c9 build-sys: fix compatibility with vala 0.9 2010-07-22 02:21:42 +02:00
Lennart Poettering
50f2a90dae update fixme 2010-07-21 20:26:44 +02:00
Lennart Poettering
3a2776bc86 service: save/restore status text string 2010-07-21 05:16:45 +02:00
Lennart Poettering
cc42e0817f job: make sure restart jobs are readded to the run queue after conversion to start jobs 2010-07-21 05:16:31 +02:00
Lennart Poettering
a7f241db3f unit: deduce following unit value dynamically instead of statically, to avoid dangling pointers 2010-07-21 05:00:29 +02:00
Lennart Poettering
672c48cc06 pam: remove only sessions we ourselves created in the first place 2010-07-21 04:32:44 +02:00
Lennart Poettering
294d81f124 load: make sure that unit files in /etc/ always take precedence, even over link targets, to make them easily overrdiable 2010-07-21 03:28:10 +02:00
Lennart Poettering
8f05424d50 unit: allow symlinking unit files to /dev/null 2010-07-21 03:13:15 +02:00
Lennart Poettering
c24eb49e6a exec: extend variable substitution to support splitting variable values into seperate arguments 2010-07-21 02:57:35 +02:00
Lennart Poettering
9d25f5ed7b sysv: do not add sysv services that are not enabled in /etc/rcN.d/ to network.target or other LSB-style Provides: targets 2010-07-20 22:30:45 +02:00
Lennart Poettering
84b00965b7 hostname: properly deal with unset hostname in fedora configuration 2010-07-20 21:34:25 +02:00
Lennart Poettering
2cc59dbfe0 systemctl: always disable color when output goes into a file 2010-07-20 21:04:32 +02:00
Lennart Poettering
d8d5ab981a manager: write serialization to /dev/.systemd/ instead of /dev/shm 2010-07-20 20:54:33 +02:00
Lennart Poettering
36adffeab0 fedora: make sure the gettys are run before X starts up 2010-07-20 20:42:46 +02:00
Lennart Poettering
de0200fca5 socket: fix access mode verification of FIFOs 2010-07-20 20:40:49 +02:00
Lennart Poettering
8fe914ec81 device: do not merge devices
Don't try to merge devices that have been created via dependencies when
they appear in the system and can be recognized as the same.  Instead,
simply continue to maintain them independently of each other, however
with the same state cycle. Why? Because otherwise we'd have a hard time
to seperate the dependencies after the devices are unplugged again and
we hence cannot be sure anymore that next time the device is plugged in
it will carry the same names.

Example: if one depndency refers to dev-sda.device and another one to
dev-by-id-xxxyyy.device we only learn at time of plug in of the device
that it is actually the same device that was ment. In the moment the
device is unplugged again we won't know anymore their relation to each
other and the next time the harddisk is plugged it might even appear as
dev-by-id-xxxyyy.device and dev-sdb.service. To ensure the dependencies
continue to have the meaning they were intended to have let's hence keep
the .device objects seperate all the time, even when they are plugged
in.

This patch also introduces a new Following= property which points from
the various .device units of a specific device to the main .device unit
for it. This can be used by the client side to figure out the relation
of the .device units to each other and even filter units from display.
2010-07-20 20:33:24 +02:00
Lennart Poettering
5632e3743d systemctl: introduce reset-maintenance command 2010-07-19 04:08:07 +02:00
Lennart Poettering
b9975629f0 man: extend man pages a little 2010-07-18 02:11:38 +02:00