Re: [systemd-devel] [systemd][cgroup in container] problem with cgroup hierarchy in container

2014-03-07 Thread Daniel P. Berrange
On Thu, Mar 06, 2014 at 07:54:05PM +0100, Lennart Poettering wrote: > On Thu, 06.03.14 16:55, Dariusz Michaluk (d.micha...@samsung.com) wrote: > > > > > On 05.03.2014 19:16, Lennart Poettering wrote: > > >nspawn and libvirt-lxc mostly follow the same code paths and register > > >via machined... S

[systemd-devel] Process ordering within a 'dependency level'

2014-03-07 Thread Allmeroth, Robert
Hi, I tried to optimize my embedded configuration but I stumbled over the following problem: Let's assume systemd identified 10 processes on 'dependency level 0'. They all can/should be started first/immediately. Since they cannot be started at the same time - they start sequential with some l

[systemd-devel] [PATCH] Add CAP_MAC_OVERRIDE in logind and hostnamed units

2014-03-07 Thread Maciej Wereski
--- units/systemd-hostnamed.service.in |2 +- units/systemd-logind.service.in|2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/units/systemd-hostnamed.service.in b/units/systemd-hostnamed.service.in index 3f5ef75..ac7d9b6 100644 --- a/units/systemd-hostnamed.servic

Re: [systemd-devel] [systemd][cgroup in container] problem with cgroup hierarchy in container

2014-03-07 Thread Dariusz Michaluk
On 07.03.2014 10:39, Daniel P. Berrange wrote: Can someone file a bug against libvirt for this and we'll look at not doing this. https://bugzilla.redhat.com/show_bug.cgi?id=1073891 -- Dariusz Michaluk Samsung R&D Institute Poland Samsung Electronics d.micha...@samsung.com ___

Re: [systemd-devel] [PATCH] Add CAP_MAC_OVERRIDE in logind and hostnamed units

2014-03-07 Thread Zbigniew Jędrzejewski-Szmek
What is it needed for? Zbyszek ___ systemd-devel mailing list systemd-devel@lists.freedesktop.org http://lists.freedesktop.org/mailman/listinfo/systemd-devel

[systemd-devel] [PATCH] systemd: powerd initctl support

2014-03-07 Thread Hannes Reinecke
Old versions of powerd will be using the initctl fifo to signal state changes. To maintain backward compability systemd should be interpreting these messages, too. Signed-off-by: Hannes Reinecke --- src/initctl/initctl.c | 71 ++- 1 file changed, 7

Re: [systemd-devel] [PATCH] Add CAP_MAC_OVERRIDE in logind and hostnamed units

2014-03-07 Thread Maciej Wereski
07.03.2014 at 14:27 Zbigniew Jędrzejewski-Szmek wrote: What is it needed for? To fix SMACK: [8.715491] type=1400 audit(946708910.490:2): lsm=SMACK fn=smack_inode_permission action=denied subject="System" object="_" requested=w pid=2324 comm="systemd-logind" dev="tmpfs" ino=11023 [

Re: [systemd-devel] [PATCH] Add CAP_MAC_OVERRIDE in logind and hostnamed units

2014-03-07 Thread Zbigniew Jędrzejewski-Szmek
On Fri, Mar 07, 2014 at 02:41:07PM +0100, Maciej Wereski wrote: > 07.03.2014 at 14:27 Zbigniew Jędrzejewski-Szmek wrote: > > >What is it needed for? > > To fix SMACK: > > [8.715491] type=1400 audit(946708910.490:2): lsm=SMACK > fn=smack_inode_permission action=denied subject="System" object

Re: [systemd-devel] [PATCH] core: add startup resource control option

2014-03-07 Thread WaLyong Cho
On 03/06/2014 03:40 AM, David Timothy Strauss wrote: > When is startup considered over? I'd like if it meant before the > WantedBy unit was started so this value still has use for arbitrary > startup. > Lennard suggested this idea. http://lists.freedesktop.org/archives/systemd-devel/2014-March/01

[systemd-devel] Pid 1/ systemd scope was Re: Talks comparing systemd and launchd.

2014-03-07 Thread David Farning
On Thu, Mar 6, 2014 at 5:42 PM, David Timothy Strauss wrote: > On Thu, Mar 6, 2014 at 2:57 PM, David Farning wrote: >> Now my philosophical sticking point is how big pid1 should be to do >> what it needs to do. Practically, I am trying to understand where >> those boundaries should be and how to

[systemd-devel] [HEADS-UP] Discoverable Partitions Spec

2014-03-07 Thread Lennart Poettering
Heya! Since yesterday systemd in git can now discover root, /home, /srv and swap partitions automatically based on GPT type GUIDs, thus making /etc/fstab unnecessary for simple setups. I have now put together something like a spec describing the logic behind that, and what it is good for: http:/

[systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Lukasz Pawelczyk
Problem: Has anyone thought about a mechanism to limit/remove an access to a device during an application runtime? Meaning we have an application that has an open file descriptor to some /dev/node and depending on *something* it gains or looses the access to it gracefully (with or without a notific

[systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Lukasz Pawelczyk
Problem: Has anyone thought about a mechanism to limit/remove an access to a device during an application runtime? Meaning we have an application that has an open file descriptor to some /dev/node and depending on *something* it gains or looses the access to it gracefully (with or without a notific

Re: [systemd-devel] [HEADS-UP] Discoverable Partitions Spec

2014-03-07 Thread Mantas Mikulėnas
On Fri, Mar 7, 2014 at 8:26 PM, Lennart Poettering wrote: > Heya! > > Since yesterday systemd in git can now discover root, /home, /srv and > swap partitions automatically based on GPT type GUIDs, thus making > /etc/fstab unnecessary for simple setups. > > I have now put together something like a

[systemd-devel] synchronizing user service

2014-03-07 Thread Alec Leamas
Dear list, Being a systemd dummie, I have a problem. It's a about running a service as a user, which needs to synchronize with a systemd service. Since the service needs to be part of the session, I presume that a /systemd/user service isn't really the way to go (?): This leaves me with the probl

Re: [systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Greg KH
On Fri, Mar 07, 2014 at 07:46:44PM +0100, Lukasz Pawelczyk wrote: > Problem: > Has anyone thought about a mechanism to limit/remove an access to a > device during an application runtime? Meaning we have an application > that has an open file descriptor to some /dev/node and depending on > *somethin

Re: [systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Lennart Poettering
On Fri, 07.03.14 19:45, Lukasz Pawelczyk (hav...@gmail.com) wrote: > Problem: > Has anyone thought about a mechanism to limit/remove an access to a > device during an application runtime? Meaning we have an application > that has an open file descriptor to some /dev/node and depending on > *someth

Re: [systemd-devel] [HEADS-UP] Discoverable Partitions Spec

2014-03-07 Thread Lennart Poettering
On Fri, 07.03.14 20:47, Mantas Mikulėnas (graw...@gmail.com) wrote: > > On Fri, Mar 7, 2014 at 8:26 PM, Lennart Poettering > wrote: > > Heya! > > > > Since yesterday systemd in git can now discover root, /home, /srv and > > swap partitions automatically based on GPT type GUIDs, thus making > > /

Re: [systemd-devel] synchronizing user service

2014-03-07 Thread Lennart Poettering
On Fri, 07.03.14 19:58, Alec Leamas (leamas.a...@gmail.com) wrote: > Dear list, > > Being a systemd dummie, I have a problem. It's a about running a > service as a user, which needs to synchronize with a systemd service. What do you mean by "synchronize"? > Since the service needs to be part of

Re: [systemd-devel] synchronizing user service

2014-03-07 Thread Alec Leamas
Sorry for not being clear. The priob On 3/7/14, Lennart Poettering wrote: > On Fri, 07.03.14 19:58, Alec Leamas (leamas.a...@gmail.com) wrote: > >> Dear list, >> >> Being a systemd dummie, I have a problem. It's a about running a >> service as a user, which needs to synchronize with a systemd ser

Re: [systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Lukasz Pawelczyk
On 7 Mar 2014, at 20:09, Greg KH wrote: > On Fri, Mar 07, 2014 at 07:46:44PM +0100, Lukasz Pawelczyk wrote: >> Problem: >> Has anyone thought about a mechanism to limit/remove an access to a >> device during an application runtime? Meaning we have an application >> that has an open file descript

Re: [systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Lukasz Pawelczyk
On 7 Mar 2014, at 20:24, Lennart Poettering wrote: > On Fri, 07.03.14 19:45, Lukasz Pawelczyk (hav...@gmail.com) wrote: > >> Problem: >> Has anyone thought about a mechanism to limit/remove an access to a >> device during an application runtime? Meaning we have an application >> that has an ope

Re: [systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Greg KH
On Fri, Mar 07, 2014 at 09:45:28PM +0100, Lukasz Pawelczyk wrote: > > On 7 Mar 2014, at 20:09, Greg KH wrote: > > > On Fri, Mar 07, 2014 at 07:46:44PM +0100, Lukasz Pawelczyk wrote: > >> Problem: > >> Has anyone thought about a mechanism to limit/remove an access to a > >> device during an appli

Re: [systemd-devel] Suspending access to opened/active /dev/nodes during application runtime

2014-03-07 Thread Lennart Poettering
On Fri, 07.03.14 21:51, Lukasz Pawelczyk (hav...@gmail.com) wrote: > >> Problem: > >> Has anyone thought about a mechanism to limit/remove an access to a > >> device during an application runtime? Meaning we have an > >> application that has an open file descriptor to some /dev/node and > >> depen

Re: [systemd-devel] [HEADS-UP] Discoverable Partitions Spec

2014-03-07 Thread Andrey Borzenkov
В Fri, 7 Mar 2014 20:37:12 +0100 Lennart Poettering пишет: > On Fri, 07.03.14 20:47, Mantas Mikulėnas (graw...@gmail.com) wrote: > > > > > On Fri, Mar 7, 2014 at 8:26 PM, Lennart Poettering > > wrote: > > > Heya! > > > > > > Since yesterday systemd in git can now discover root, /home, /srv and

Re: [systemd-devel] [HEADS-UP] Discoverable Partitions Spec

2014-03-07 Thread Alexander E. Patrakov
2014-03-08 1:37 GMT+06:00 Lennart Poettering : > And for the root disk we declare explicitly that installers may only > drop the root= param from the kernel cmdline if the OS is installed as > first root partition on the disk. Otherwise it *must* specify it to make > sure the right partition is fou

[systemd-devel] [patch] Fix AC_PATH_PROG usage in configure.ac for systems with (still) bin vs. sbin distiction

2014-03-07 Thread Samuli Suominen
If eg. setcap is in /sbin and user is building as a normal user without $PATH having /sbin, the build system will default to /usr/sbin/setcap as it's defined in AC_PATH_PROG and fail during the build with 'setcap: command not found' For example, my $PATH as normal user: $ echo $PATH /usr/local/bi