Age | Commit message (Collapse) | Author | |
---|---|---|---|
2010-08-20 | dbus: follow standardized fdo PropertiesChanged signal spec | Lennart Poettering | |
2010-08-14 | emacs: make sure nobody accidently adds tabs to our sources | Lennart Poettering | |
2010-08-11 | selinux: split off selinux calls into seperate file label.c | Lennart Poettering | |
2010-08-11 | clang: fix numerous little issues found with clang-analyzer | Lennart Poettering | |
2010-08-11 | socket: disable GC for pre-allocated per-connection service until it is used | Lennart Poettering | |
2010-08-09 | manager: when two pending jobs conflict, keep the one that "conflicts", ↵ | Lennart Poettering | |
remove the one that is "conflicted" This gives the writer of units control which unit is kept and which is stopped when two units conflict. | |||
2010-08-03 | Systemd is causing mislabeled devices to be created and then attempting to ↵ | Daniel J Walsh | |
read them. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 07/28/2010 05:57 AM, Kay Sievers wrote: > On Wed, Jul 28, 2010 at 11:43, Lennart Poettering > <lennart@poettering.net> wrote: >> On Mon, 26.07.10 16:42, Daniel J Walsh (dwalsh@redhat.com) wrote: >>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file >>> type=1400 audit(1280174589.476:7): avc: denied { read } for pid=1 >>> comm="systemd" name="autofs" dev=devtmpfs ino=9482 >>> scontext=system_u:system_r:init_t:s0 >>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file >>> type=1400 audit(1280174589.476:8): avc: denied { read } for pid=1 >>> comm="systemd" name="autofs" dev=devtmpfs ino=9482 >>> scontext=system_u:system_r:init_t:s0 >>> tcontext=system_u:object_r:device_t:s0 tclass=chr_file >>> >>> Lennart, we talked about this earlier. I think this is caused by the >>> modprobe calls to create /dev/autofs. Since udev is not created at the >>> point that init loads the kernel modules, the devices get created with >>> the wrong label. Once udev starts the labels get fixed. >>> >>> I can allow init_t to read device_t chr_files. >> >> Hmm, I think a cleaner fix would be to make systemd relabel this device >> properly before accessing it? Given that this is only one device this >> should not be a problem for us to maintain, I think? How would the >> fixing of the label work? Would we have to spawn restorecon for this, or >> can we actually do this in C without too much work? > > I guess we can just do what udev is doing, and call setfilecon(), with > a context of an earlier matchpathcon(). > > Kay > _______________________________________________ > systemd-devel mailing list > systemd-devel@lists.freedesktop.org > http://lists.freedesktop.org/mailman/listinfo/systemd-devel Here is the updated patch with a fix for the labeling of /dev/autofs -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAkxQMyoACgkQrlYvE4MpobNviACfWgxsjW2xzz1qznFex8RVAQHf gIEAmwRmRcLvGqYtwQaZ3WKIg8wmrwNk =pC2e | |||
2010-08-03 | socket: Allow selection of TCP Congestion Avoidance algorithm to socket | Tomasz Torcz | |
Hi, attached path extends socket configurables with another knob - TCP Congestion Avoidance selection. Linux implements handful of those, useful in various situations. For example, TCP Low Priority may be used by FTP service to gracefully yield bandwidth for more important TCP/IP streams. Until recently TCP_CONGESTION was Linux-specific, recently FreeBSD 8 and OpenSolaris gained compatible support. | |||
2010-07-23 | socket: SELinux support for socket creation. | Daniel J Walsh | |
It seems to work on my machine. /proc/1/fd/20 system_u:system_r:system_dbusd_t:s0 /proc/1/fd/21 system_u:system_r:avahi_t:s0 And the AVC's seem to have dissapeared when a confined app trys to connect to dbus or avahi. If you run with this patch and selinux-policy-3.8.8-3.fc14.noarch You should be able to boot in enforcing mode. | |||
2010-07-20 | socket: fix access mode verification of FIFOs | Lennart Poettering | |
2010-07-19 | systemctl: introduce reset-maintenance command | Lennart Poettering | |
2010-07-17 | execute: bump up log level of executed processes that failed | Lennart Poettering | |
2010-07-16 | socket: prepare for proper selinux labelling of sockets | Lennart Poettering | |
2010-07-16 | socket: don't allow mixing of accepting and non-accepting sockets in the ↵ | Lennart Poettering | |
same unit | |||
2010-07-13 | socket: when going down, flush all queued sockets | Lennart Poettering | |
2010-07-13 | socket: when the socket is supposed to stop, don't accept any connections ↵ | Lennart Poettering | |
anymore | |||
2010-07-12 | execute: optionally ignore return status of invoked commands | Lennart Poettering | |
2010-07-10 | service: allow immediate stopping while starting | Lennart Poettering | |
2010-07-10 | execute: add ability to configure the kill signal | Lennart Poettering | |
2010-07-09 | socket: fix loading of .service files for .socket files | Lennart Poettering | |
2010-07-08 | install: various improvements | Lennart Poettering | |
Rename --start to --realize, to make things less confusing when doing "systemctl stop --realize foo.service". Introduce --realize=reload. Don't talk to systemd when run within a chroot, or when systemd isn't running. | |||
2010-07-08 | execute: if the main process of a service already owns the TTY, don't wait ↵ | Lennart Poettering | |
for acquiring it again in the reload/stop step | |||
2010-07-08 | dbus: make errors reported via D-Bus more useful | Lennart Poettering | |
2010-07-04 | dbus: complete exec status coverage | Lennart Poettering | |
2010-07-03 | unit: add DefaultDependencies= setting | Lennart Poettering | |
In order to simplify writing of unit files introduce default dependencies that are added to all units unless explictly disabled in a unit. This option can be switched off for select units that are involved in early boot-up ot late system shutdown, This should simplify service files for most normal daemons, but breaks existing service files for software involved in early boot (notably udev), which need to be updated for a DefaultDependencies=no setting) | |||
2010-07-03 | unit: simplify things a little by introducing API to add two dependencies in ↵ | Lennart Poettering | |
one step | |||
2010-07-01 | man: document socket units | Lennart Poettering | |
2010-07-01 | socket: on ipv6 try to use IPV6_UNICAST_HOPS sockopt | Lennart Poettering | |
2010-07-01 | unit: shorten active state enums to make systemctl output nicer | Lennart Poettering | |
2010-07-01 | unit: add new abstracted maintenance state for units | Lennart Poettering | |
2010-07-01 | socket: make various socket/pipe options configurable | Lennart Poettering | |
2010-06-19 | service: require KillMode=control-group when PAM is enabled | Lennart Poettering | |
2010-06-19 | unit: get rid of various unnecessary casts | Lennart Poettering | |
2010-06-19 | don't use 'long long' unless we have a really good reason to | Lennart Poettering | |
2010-06-19 | socket: enforce limit on number of concurrent connections | Lennart Poettering | |
2010-06-17 | service: rework PID parsing logic everywhere | Lennart Poettering | |
2010-06-16 | tcpwrap: execute tcpwrap check in forked client, to avoid blocking name ↵ | Lennart Poettering | |
lookups in main systemd process | |||
2010-06-16 | socket: add optional libwrap support | Lennart Poettering | |
2010-06-16 | typo: the correct spelling is maintenance not maintainance | Lennart Poettering | |
2010-06-16 | notify: add minimal readiness/status protocol for spawned daemons | Lennart Poettering | |
2010-06-05 | socket: verify socket type properly when desrializing | Lennart Poettering | |
2010-05-24 | path: add .path unit type for monitoring files | Lennart Poettering | |
2010-05-24 | timer: fully implement timer units | Lennart Poettering | |
2010-05-21 | socket: fix parsing of bind_ipv6_only | Lennart Poettering | |
2010-05-20 | socket: fix error handling | Lennart Poettering | |
2010-05-20 | socket: format IPv4-in-IPv6 addresses as IPv4 addresses for instance name | Lennart Poettering | |
2010-05-16 | build-sys: move source files to subdirectory | Lennart Poettering | |