Commit Graph

1078 Commits

Author SHA1 Message Date
Lennart Poettering
485ccf9a5b man: minor man page fix 2010-08-06 21:36:58 +02:00
Lennart Poettering
4502d22cb8 util: when formatting timestamps return '0' for 0 timestamps instead of empty string 2010-08-06 21:34:11 +02:00
Lennart Poettering
c593cfe164 sd-daemon: fix compilation on old systems lacking SOCK_CLOEXEC 2010-08-06 21:34:11 +02:00
Kay Sievers
b9911f4434 update fixme 2010-08-06 13:23:50 +02:00
Lennart Poettering
7e551fbd68 build-sys: prepare new release 2010-08-06 12:15:54 +02:00
Lennart Poettering
6908d3842a man: document %triggerin usage 2010-08-06 11:59:37 +02:00
Lennart Poettering
ee6cb28869 device: properly handle devices that are referenced before they show up 2010-08-06 04:17:51 +02:00
Lennart Poettering
3c661fadd5 cgroup: if the system bus cannot be found, send cgroup empty msg directly to init proces 2010-08-06 03:21:50 +02:00
Lennart Poettering
2e81c8a557 manager: downgrade a few log msgs regarding conflicting but fixable jobs 2010-08-06 02:58:46 +02:00
Lennart Poettering
75d287d3ae automount: order automount units after fsck, too 2010-08-06 02:23:45 +02:00
Lennart Poettering
8519e861a8 units: add missing fsck.target file 2010-08-06 01:32:16 +02:00
Lennart Poettering
922cc00119 units: split fsck.target from sysinit.target for suse compat 2010-08-06 01:30:20 +02:00
Lennart Poettering
0ff4cdd967 main: automatically spawn a getty on the kernel configured serial console 2010-08-06 00:42:24 +02:00
Lennart Poettering
48a21c9b37 manager: fix conflicting job check 2010-08-05 20:49:35 +02:00
Lennart Poettering
674a6e4d0c manager: when breaking ordering cycle show full cycle loop 2010-08-05 20:39:45 +02:00
Lennart Poettering
30609d9c18 units: always send HUP when dealing with shells/gettys/logins 2010-08-05 20:29:11 +02:00
Lennart Poettering
d4054675b1 service: read special startup dirs only on the respective distros 2010-08-05 20:28:51 +02:00
Lennart Poettering
95978cf8a6 selinux: minor error handling fix 2010-08-05 19:50:03 +02:00
Lennart Poettering
eeaafddcb5 service: always sort services from suse B runlevel before services from normal runlevels 2010-08-05 19:50:03 +02:00
Michal Schmidt
a042efad57 reboot: handle -p switch properly
https://bugzilla.redhat.com/show_bug.cgi?id=618678
2010-08-05 19:50:03 +02:00
Lennart Poettering
6319292f15 selinux: fix labels only when configured for it 2010-08-05 19:50:02 +02:00
Kay Sievers
7d49c54770 units: getty - suse: login wants SIGHUP 2010-08-04 18:56:35 +02:00
Kay Sievers
00a11ba982 units: suse - reboot: do not wait for tty 2010-08-04 14:21:01 +02:00
Lennart Poettering
183ae5f99b reboot: don't wait for input tty 2010-08-04 14:17:18 +02:00
Lennart Poettering
804bbed8f4 prepare new release 2010-08-04 01:30:40 +02:00
Lennart Poettering
ccbe77e993 units: remove redundant ordering dependency 2010-08-04 01:27:26 +02:00
Lennart Poettering
5b1fe56a8b selinux: rework selinux tests a little 2010-08-04 01:07:38 +02:00
Lennart Poettering
f7f4cccb2a selinux: fix if vs. ifdef mixup 2010-08-04 00:40:19 +02:00
Lennart Poettering
14a35a84fa units: make sure that prefdm wins over the getty if both are pulled in 2010-08-03 23:58:23 +02:00
Lennart Poettering
a48bcc46be units: add conflicts between prefdm and getty@tty1 to avoid race for tty1 2010-08-03 23:53:17 +02:00
Daniel J Walsh
56cf987fe7 Systemd is causing mislabeled devices to be created and then attempting to read them.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/28/2010 05:57 AM, Kay Sievers wrote:
> On Wed, Jul 28, 2010 at 11:43, Lennart Poettering
> <lennart@poettering.net> wrote:
>> On Mon, 26.07.10 16:42, Daniel J Walsh (dwalsh@redhat.com) wrote:
>>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file
>>> type=1400 audit(1280174589.476:7): avc:  denied  { read } for  pid=1
>>> comm="systemd" name="autofs" dev=devtmpfs ino=9482
>>> scontext=system_u:system_r:init_t:s0
>>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file
>>> type=1400 audit(1280174589.476:8): avc:  denied  { read } for  pid=1
>>> comm="systemd" name="autofs" dev=devtmpfs ino=9482
>>> scontext=system_u:system_r:init_t:s0
>>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file
>>>
>>> Lennart, we talked about this earlier.  I think this is caused by the
>>> modprobe calls to create /dev/autofs.  Since udev is not created at the
>>> point that init loads the kernel modules, the devices get created with
>>> the wrong label.  Once udev starts the labels get fixed.
>>>
>>> I can allow init_t to read device_t chr_files.
>>
>> Hmm, I think a cleaner fix would be to make systemd relabel this device
>> properly before accessing it? Given that this is only one device this
>> should not be a problem for us to maintain, I think? How would the
>> fixing of the label work? Would we have to spawn restorecon for this, or
>> can we actually do this in C without too much work?
>
> I guess we can just do what udev is doing, and call setfilecon(), with
> a context of an earlier matchpathcon().
>
> Kay
> _______________________________________________
> systemd-devel mailing list
> systemd-devel@lists.freedesktop.org
> http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Here is the updated patch with a fix for the labeling of /dev/autofs
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkxQMyoACgkQrlYvE4MpobNviACfWgxsjW2xzz1qznFex8RVAQHf
gIEAmwRmRcLvGqYtwQaZ3WKIg8wmrwNk
=pC2e
2010-08-03 23:45:22 +02:00
Lennart Poettering
8b33e5ca72 update fixme 2010-08-03 23:29:18 +02:00
Tomasz Torcz
cebf8b2092 socket: Allow selection of TCP Congestion Avoidance algorithm to socket
Hi,

attached path extends socket configurables with another
knob - TCP Congestion Avoidance selection. Linux implements
handful of those, useful in various situations. For example,
TCP Low Priority may be used by FTP service to gracefully
yield bandwidth for more important TCP/IP streams.

Until recently TCP_CONGESTION was Linux-specific, recently
FreeBSD 8 and OpenSolaris gained compatible support.
2010-08-03 23:23:47 +02:00
Lennart Poettering
07424048b5 update fixme 2010-08-03 23:22:30 +02:00
Kay Sievers
2ab7076c6f fixme update 2010-08-03 23:18:04 +02:00
Lennart Poettering
d5ca5f1185 telinit: forward to upstart, if not booted with systemd 2010-07-24 02:33:38 +02:00
Lennart Poettering
ec7f7f2006 systemctl: don't use the systemd bus to talk to upstart 2010-07-24 02:23:40 +02:00
Lennart Poettering
385771fcf0 systemctl: don't hit an assert when we are run from a non-systemd boot 2010-07-24 01:56:13 +02:00
Lennart Poettering
e054f8333d main: disable NSS disabling logic for now, since this is incompatible with rpm 2010-07-24 01:29:21 +02:00
Lennart Poettering
ee5762e378 systemctl: fold systemd-install into systemctl 2010-07-24 00:53:33 +02:00
Lennart Poettering
9d8a57fff1 systemctl: support force-reload and condrestart as aliases for reload-or-try-restart 2010-07-23 05:24:45 +02:00
Lennart Poettering
85e5760d4f install: default to minimal realization mode 2010-07-23 05:24:24 +02:00
Lennart Poettering
ea4a240dc2 systemctl: accept -p more than once 2010-07-23 05:24:05 +02:00
Daniel J Walsh
7a58bfa4ae socket: SELinux support for socket creation.
It seems to work on my machine.

/proc/1/fd/20	system_u:system_r:system_dbusd_t:s0

/proc/1/fd/21	system_u:system_r:avahi_t:s0

And the AVC's seem to have dissapeared when a confined app trys to
connect to dbus or avahi.

If you run with this patch and selinux-policy-3.8.8-3.fc14.noarch
You should be able to boot in enforcing mode.
2010-07-23 05:12:13 +02:00
Robert "arachnist" Gerus
28322e1eb6 sshd, tmux and others are broken when /dev/pts is mounted with "-o nodev" 2010-07-23 05:12:13 +02:00
Lennart Poettering
25da667e1a build-sys: prepare release 4 2010-07-22 02:52:26 +02:00
Lennart Poettering
218362d22c units: add [Install] section to getty.target and remote-fs.target 2010-07-22 02:39:21 +02:00
Lennart Poettering
5e5c6cd737 update fixme 2010-07-22 02:26:27 +02:00
Lennart Poettering
d3d91d10c9 build-sys: fix compatibility with vala 0.9 2010-07-22 02:21:42 +02:00
Lennart Poettering
50f2a90dae update fixme 2010-07-21 20:26:44 +02:00