On 2017년 11월 13일 09:53, Kai Krakow wrote:
> Am Sun, 12 Nov 2017 18:14:38 +0100
> schrieb Stefan Schweter :
>
>> Hi systemd-users,
>>
>> I tried to add a memory limit for a user service unit (inspired by
>> [1]), it looks like:
>>
>> [Service]
>> #
>> MemoryAccounting=true
>> MemoryLimit=1G
>>
To redirect stdout/stderr to file add 'file' option to
StandardOutput/StandardError. And to specify the file path, add
StandardOutputFile/StandardErrorFile option.
If only set StandardOutput/StandardError to 'file' without set of
StandardOutputFile/StandardErrorFile option, then it will be
redirect
On 2015년 05월 19일 11:44, WaLyong Cho wrote:
> To redirect stdout/stderr to file add 'file' option to
> StandardOutput/StandardError. And to specify the file path, add
> StandardOutputFile/StandardErrorFile option.
> If only set StandardOutput/StandardError to
On 2015년 05월 19일 12:53, Andrei Borzenkov wrote:
> В Tue, 19 May 2015 11:49:45 +0900
> WaLyong Cho пишет:
>
>> On 2015년 05월 19일 11:44, WaLyong Cho wrote:
>>> To redirect stdout/stderr to file add 'file' option to
>>> StandardOutput/Stand
Hi,
As you may know, Android has properties.
http://developer.android.com/reference/java/util/Properties.html
In the desktop side, it maybe similar with configuration system such
like gconf.
I hope the configurations are supporting write protected(ro) and
writable(rw). To control this, I think n
---
src/bootchart/bootchart.c| 38 +-
src/bootchart/bootchart.conf | 1 +
src/bootchart/bootchart.h| 1 +
src/bootchart/svg.c | 65 +---
4 files changed, 70 insertions(+), 35 deletions(-)
diff --git a/src/bootchart
Hi,
I want to find best solution on our case. Our product is mobile device.
But I don't think that is only problem of mobile device. That also can
be problem of laptop. So, please comment to me.
We have some of services are always running after system is started up
as default. They don't need to
Hi,
Now, I'm looking for a method to a service be activated on special DBus
signal. If a process is running for waiting some of DBus signal this can
be useful.
I already told with Simon in DBus mailing list.
see this thread:
http://lists.freedesktop.org/archives/dbus/2015-March/016607.html
Simo
Hi,
In recent systemd(from some month ago), when a unit has a mask for cpu
or blockio or memory, this mask is also propagated to siblings by
unit_get_target_mask().
According to some of comments, it seems intentional.
Could anyone explain why?
In our system, some of service have MemoryLimit= opt
On 03/27/2015 05:33 AM, David Timothy Strauss wrote:
> On Tue, Mar 24, 2015 at 4:29 AM, WaLyong Cho wrote:
>> Could anyone explain why?
>
> An admin using CPUShares= or a similar proportional CGroup controller
> probably assumes that setting the shares to twice the defa
Some of cgroup properties does not affect to sibling
cgroups. CPUShares and BlockIOWeight are only needed to be propagated.
---
src/core/cgroup.c | 29 -
src/core/cgroup.h | 2 ++
2 files changed, 30 insertions(+), 1 deletion(-)
diff --git a/src/core/cgroup.c b/src/co
On 03/28/2015 09:25 AM, David Timothy Strauss wrote:
On Thu, Mar 26, 2015 at 7:33 PM, WaLyong Cho wrote:
Thanks, understood. But I think this propagation is needed only for
taking weight argument such like CPUShares=weight,
StartupCPUShares=weight, BlockIOWeight=weight,
StartupBlockIOWeight
On 03/31/2015 05:13 AM, David Timothy Strauss wrote:
> On Fri, Mar 27, 2015 at 7:56 PM, WaLyong Cho wrote:
>> Hmm, it seems not. When I added MemoryLimit= option to just one service,
>> cgroups for every unit were generated on memory cgroup.
>
> It looks
On 2015년 04월 09일 01:48, Lennart Poettering wrote:
> On Tue, 24.03.15 20:29, WaLyong Cho (walyong@samsung.com) wrote:
>
>> Hi,
>>
>> In recent systemd(from some month ago), when a unit has a mask for cpu
>> or blockio or memory, this mask is
On 2015년 04월 09일 02:05, Lennart Poettering wrote:
> On Mon, 23.03.15 17:54, WaLyong Cho (walyong@samsung.com) wrote:
>
>> Hi,
>>
>> Now, I'm looking for a method to a service be activated on special DBus
>> signal. If a process is running for waiting some o
If a service does not consume CPU during some time(can be configured
by ExitOnIdleSec=) and set to stopped on idle state(ExitOnIdle=), the
service will be stopped. This can be useful if the service provides
some of activation methods.
---
src/core/load-fragment-gperf.gperf.m4 | 2 +
src/core/serv
On 04/21/2015 12:10 AM, Lennart Poettering wrote:
> On Mon, 20.04.15 23:56, WaLyong Cho (walyong@samsung.com) wrote:
>
>> If a service does not consume CPU during some time(can be configured
>> by ExitOnIdleSec=) and set to stopped on idle state(ExitOnIdle=), the
>>
Hello,
I'm looking for a proper way what method to map PID between host and
container.
In case of systemctl, if I know pid in container(let's call this pid_c)
then I can find the pid in sight of host(let's call this pid_h) by using
"systemctl -M {container} pid_c" in host shell. But I can not fin
And add prefix "selinux_" to each APIs like smack.
---
src/core/main.c | 4 +-
src/core/namespace.c | 4 +-
src/core/selinux-setup.c | 4 +-
src/core/socket.c | 12 +-
src/hostname/hostnamed.c | 2 +-
src/locale/localed.c | 2 +-
src
If selinux is disabled and smack is only enabled, smack label is
re-lable-ed by label_fix. To avoid, make only be labeled for selinux.
---
src/udev/udev-node.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/udev/udev-node.c b/src/udev/udev-node.c
index 9ec98bc..f4f4827
On 08/18/2014 10:09 PM, Lennart Poettering wrote:
> On Mon, 18.08.14 15:06, WaLyong Cho (walyong@samsung.com) wrote:
>
>> And add prefix "selinux_" to each APIs like smack.
>
> I am a bit concerned about this, as "selinux_" is really the prefix the
>
If selinux is disabled and smack is only enabled, smack label is
re-lable-ed by label_fix. To avoid, make only be labeled for selinux.
---
src/udev/udev-node.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/udev/udev-node.c b/src/udev/udev-node.c
index fa10d04..e237363
use {selinux/smack}-label.ch instread of {selinux/smack}-util.ch
move selinux label APIs to selinux-label.ch
use label_{selinxu/smack}_ prefix
---
Makefile.am | 8 +-
src/core/condition.c | 4 +-
src/core/execute.c| 2 +-
src/core/main.c |
On 08/21/2014 08:05 AM, Lennart Poettering wrote:
> On Wed, 20.08.14 14:22, WaLyong Cho (walyong@samsung.com) wrote:
>
>> use {selinux/smack}-label.ch instread of {selinux/smack}-util.ch
>> move selinux label APIs to selinux-label.ch
>> use label_{selinxu/smack}_ pre
If selinux is disabled and smack is only enabled, smack label is
relable-ed by label_fix. To avoid, make only be labeled for selinux.
---
src/udev/udev-node.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/udev/udev-node.c b/src/udev/udev-node.c
index 6a9788b..00ade2c
move selinux label APIs to selinux-label.ch
And label_{selinxu/smack}_ prefix are changed to mac_{selinux/smack}_
respectively.
---
src/core/main.c | 4 +-
src/core/namespace.c | 4 +-
src/core/selinux-setup.c | 4 +-
src/core/socket.c | 24 +--
src/h
On 08/21/2014 12:58 PM, WaLyong Cho wrote:
> move selinux label APIs to selinux-label.ch
> And label_{selinxu/smack}_ prefix are changed to mac_{selinux/smack}_
Ah, sorry, label_{selinxu/smack}_ should be {selinux/smack}_label_
WaLyong
> res
There is no Bofore= or After= dependencies between
systemd-journald.service and systemd-tmpfiles-setup.service. So if both
"/run/log/journal" and "/var/log/journal" does not exist then those can
be make as root:root and also its ids directory and journal files. To
make sure, do chown systemd-journa
This case really shouldn't be happen. (But actually sometime that was
happen.) Eeven if happened we maybe want to see the bootchart exclude
not printable processes.
---
src/bootchart/svg.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/src/bootchart/svg.c b/src/bootchart/svg.c
index 135883
move selinux label APIs to selinux-label.ch. And each security label
apis have mac_{selinux/smack}_ prefix.
---
src/core/main.c | 4 +-
src/core/namespace.c | 4 +-
src/core/selinux-setup.c | 4 +-
src/core/socket.c | 24 +--
src/hostname/hostnamed.c
On 08/27/2014 04:54 AM, Lennart Poettering wrote:
> On Tue, 26.08.14 21:52, Lennart Poettering (lenn...@poettering.net) wrote:
>
>>
>> On Thu, 21.08.14 12:58, WaLyong Cho (walyong@samsung.com) wrote:
>>
>>> If selinux is disabled and smack is only enabled,
On 08/27/2014 03:49 AM, Lennart Poettering wrote:
> On Tue, 26.08.14 18:11, Mantas Mikulėnas (graw...@gmail.com) wrote:
>
>> On Tue, Aug 26, 2014 at 5:07 PM, WaLyong Cho wrote:
>>>
>>> This case really shouldn't be happen. (But actually sometime that was
>
runtime journal is migrated to system journal when only
"/run/systemd/journal/flushed" exist. It's ok but according to this
the system journal directory size(max use) can be over the config. If
journal is not rotated during some time the journal directory can be
remained as over the config(or defau
On 08/28/2014 09:33 PM, WaLyong Cho wrote:
> runtime journal is migrated to system journal when only
> "/run/systemd/journal/flushed" exist. It's ok but according to this
> the system journal directory size(max use) can be over the config. If
> journal is not rotated d
On 08/27/2014 02:55 AM, Lennart Poettering wrote:
> On Tue, 26.08.14 15:43, WaLyong Cho (walyong@samsung.com) wrote:
>
>> There is no Bofore= or After= dependencies between
>> systemd-journald.service and systemd-tmpfiles-setup.service. So if both
>> "/run/log/j
(I will happy there is already similar method already exist.)
systemd already has similar functionality "systemd-run" but that is only
for scope or service unit. I think that is useful run a service without
unit file on permanent storage.
As a similar method, is it possible to generate or configu
If selinux is disabled and smack is only enabled, smack label is
relable-ed by label_fix. To avoid, make only be labeled for selinux.
---
src/udev/udev-node.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/udev/udev-node.c b/src/udev/udev-node.c
index f46638f..3c49482
rebased again. It make a conflict by long pending.
WaLyong Cho (2):
label: rearrange mandatory access control(MAC) apis
udev: do NOT re-label smack
src/core/main.c | 4 +-
src/core/namespace.c | 4 +-
src/core/selinux-setup.c | 4 +-
src/core/socket.c
move selinux label APIs to selinux-label.ch. And each security label
apis have mac_{selinux/smack}_ prefix.
---
src/core/main.c | 4 +-
src/core/namespace.c | 4 +-
src/core/selinux-setup.c | 4 +-
src/core/socket.c | 24 +--
src/hostname/hostnamed.c
On 09/12/2014 12:54 AM, David Herrmann wrote:
> Hi
>
> On Thu, Sep 11, 2014 at 10:45 AM, WaLyong Cho wrote:
>> (I will happy there is already similar method already exist.)
>>
>> systemd already has similar functionality "systemd-run" but that is only
>&
---
src/shared/label.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/src/shared/label.c b/src/shared/label.c
index 02b41f0..b6af38d 100644
--- a/src/shared/label.c
+++ b/src/shared/label.c
@@ -252,9 +252,10 @@ fail:
int label_get_our_label(char **label) {
int r
On 09/24/2014 10:25 AM, Zbigniew Jędrzejewski-Szmek wrote:
> On Tue, Sep 23, 2014 at 04:16:55PM +0900, WaLyong Cho wrote:
>> ---
>> src/shared/label.c | 3 ++-
>> 1 file changed, 2 insertions(+), 1 deletion(-)
>>
>> diff --git a/src/shared/label.c b/src/shared/
It similar with StartTransientUnit but the NewTransientUnit does not
start the unit immediately. Newly generated transient unit can be
activated by "systemctl start".
---
src/core/dbus-manager.c| 99 +-
src/core/org.freedesktop.systemd1.conf | 4 ++
If systemd-run is called with timer option, then systemd-run call
NewTransientUnit with service unit. And also call StartTransientUnit
with timer unit which has same name with the service. So actually, two
method call is coming and two transient unit is generated. One is
service and the other is ti
---
src/core/dbus-timer.c | 140 ++
src/core/dbus-timer.h | 3 ++
src/core/timer.c | 10
3 files changed, 153 insertions(+)
diff --git a/src/core/dbus-timer.c b/src/core/dbus-timer.c
index f1f8c54..5f0b80e 100644
--- a/src/core/dbus-tim
---
src/resolve/resolved.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/src/resolve/resolved.c b/src/resolve/resolved.c
index ef416e5..d612938 100644
--- a/src/resolve/resolved.c
+++ b/src/resolve/resolved.c
@@ -26,6 +26,7 @@
#include "resolved-manager.h"
#include "resolved-conf.h"
+#in
---
src/core/execute.c| 2 +-
src/core/main.c | 4 ++--
src/core/namespace.c | 4 ++--
src/core/selinux-setup.c | 4 ++--
src/core/socket.c | 26 +-
src/hostname/hostnamed.c | 2 +-
src/lo
If selinux is disabled and smack is only enabled, smack label is
relable-ed by label_fix. To avoid, make only be labeled for selinux.
---
src/udev/udev-node.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/udev/udev-node.c b/src/udev/udev-node.c
index 9796672..6dd4e74
move label apis to selinux-util.ch or smack-util.ch appropriately.
---
src/shared/label.c| 554 --
src/shared/label.h| 31 +--
src/shared/mkdir-label.c | 26 +++
src/shared/mkdir.h| 2 +-
src/shared/selinux-util.c | 481 +
On 10/23/2014 12:56 AM, Lennart Poettering wrote:
On Tue, 07.10.14 14:20, WaLyong Cho (walyong@samsung.com) wrote:
If systemd-run is called with timer option, then systemd-run call
NewTransientUnit with service unit. And also call StartTransientUnit
with timer unit which has same name with
On 10/23/2014 06:12 AM, Lennart Poettering wrote:
> On Thu, 16.10.14 16:59, WaLyong Cho (walyong@samsung.com) wrote:
>
>> -if (smack_label_ip_in_fd(fd, s->smack_ip_in) < 0)
>> -log_error_unit(UNIT(s)->id, &q
On 10/23/2014 06:13 AM, Lennart Poettering wrote:
> On Thu, 16.10.14 16:59, WaLyong Cho (walyong@samsung.com) wrote:
>
>> If selinux is disabled and smack is only enabled, smack label is
>> relable-ed by label_fix. To avoid, make only be labeled for selinux.
>> ---
From: WaLyong Cho
move label apis to selinux-util.ch or smack-util.ch appropriately.
---
src/shared/label.c| 554 --
src/shared/label.h| 31 +--
src/shared/mkdir-label.c | 26 +++
src/shared/mkdir.h| 2 +-
src/shared
From: WaLyong Cho
---
src/core/execute.c| 2 +-
src/core/main.c | 4 ++--
src/core/namespace.c | 4 ++--
src/core/selinux-setup.c | 4 ++--
src/core/socket.c | 26 +-
src/hostname/hostnamed.c | 2 +-
src
As we know we can make a direcory or link or file or some others by
using tmpfiles.d. But we can not apply mac_label on there when after
that is genreated.
How about add mac_label field on tmpfiles.d? Actually, now we can not
assign a mac_label to newly generated directory. So we make a script
whi
On 10/23/2014 05:34 PM, WaLyong Cho wrote:
> As we know we can make a direcory or link or file or some others by
> using tmpfiles.d. But we can not apply mac_label on there when after
> that is genreated.
>
> How about add mac_label field on tmpfiles.d? Actually, now we can
On 10/24/2014 07:56 AM, Lennart Poettering wrote:
> On Thu, 23.10.14 17:23, WaLyong Cho (walyong@gmail.com) wrote:
>
> Heya!
>
> I merged both patches now! Thanks!
>
> After merging I reworked quite a bit more code to make the selinux
> and smack bits work more s
On 10/23/2014 06:13 AM, Lennart Poettering wrote:
> On Thu, 16.10.14 16:59, WaLyong Cho (walyong@samsung.com) wrote:
>
>> If selinux is disabled and smack is only enabled, smack label is
>> relable-ed by label_fix. To avoid, make only be labeled for selinux.
>> ---
From: WaLyong Cho
If selinux is disabled and smack is only enabled, smack label is
relable-ed by label_fix. To avoid, make only be labeled for selinux.
---
src/udev/udev-node.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/udev/udev-node.c b/src/udev/udev-node.c
index
---
src/shared/selinux-util.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/src/shared/selinux-util.c b/src/shared/selinux-util.c
index 1eddd17..bb27328 100644
--- a/src/shared/selinux-util.c
+++ b/src/shared/selinux-util.c
@@ -128,6 +128,9 @@ int mac_selinux_fix(const char *path, bool ig
On 10/23/2014 12:28 AM, Lennart Poettering wrote:
> On Thu, 11.09.14 17:45, WaLyong Cho (walyong@samsung.com) wrote:
>
>> (I will happy there is already similar method already exist.)
>>
>> systemd already has similar functionality "systemd-run" but that is
On 10/24/2014 07:16 PM, Lennart Poettering wrote:
> On Fri, 24.10.14 13:51, WaLyong Cho (walyong@gmail.com) wrote:
>
>> ---
>> src/shared/selinux-util.c | 3 +++
>> 1 file changed, 3 insertions(+)
>>
>> diff --git a/src/shared/selinux-util.c b/src/sh
---
src/core/dbus-job.c | 2 +-
src/core/dbus-manager.c | 68 +++
src/core/dbus-snapshot.c | 2 +-
src/core/dbus-unit.c | 8 +++---
src/core/dbus.c | 8 +++---
src/core/main.c | 4 +--
src/core/selinux-access.c | 46
On 10/23/2014 12:42 AM, Lennart Poettering wrote:
> On Tue, 07.10.14 14:20, WaLyong Cho (walyong@samsung.com) wrote:
>
>> +assert(message);
>> +
>> +if (streq(name, "OnActiveSec") ||
>> +streq(name, "OnBootSec&q
On 10/23/2014 12:56 AM, Lennart Poettering wrote:
> On Tue, 07.10.14 14:20, WaLyong Cho (walyong@samsung.com) wrote:
>
>> If systemd-run is called with timer option, then systemd-run call
>> NewTransientUnit with service unit. And also call StartTransientUnit
>> with t
On 10/28/2014 07:22 PM, Lennart Poettering wrote:
> On Tue, 28.10.14 12:09, WaLyong Cho (walyong@samsung.com) wrote:
>
>>> The AccuracySec= and WakeSystem= stuff I think we don't need to cover
>>> with a command line argument of its own, we can cover that with
&
Supported timer options --on-active=, --on-boot=, --on-startup=,
--on-unit-active=, --on-unit-inactive=, --on-calendar=. Each options
corresponding with OnActiveSec=, OnBootSec=, OnStartupSec=,
OnUnitActiveSec=, OnUnitInactiveSec= of timer respectively.
---
man/systemd-run.xml | 42 +
---
Makefile.am | 7 ++
src/shared/.gitignore| 1 +
src/shared/unit-name.c | 22
src/shared/unit-name.h | 26 +
src/shared/unit-property-scope.gperf | 202 +++
5 files changed, 258 i
---
src/core/dbus-timer.c | 159 ++
src/core/dbus-timer.h | 3 +
src/core/timer.c | 4 ++
3 files changed, 166 insertions(+)
diff --git a/src/core/dbus-timer.c b/src/core/dbus-timer.c
index f1f8c54..e916f5a 100644
--- a/src/core/dbus-timer.
---
src/core/dbus-manager.c | 123 +---
1 file changed, 105 insertions(+), 18 deletions(-)
diff --git a/src/core/dbus-manager.c b/src/core/dbus-manager.c
index c54abd3..bba4b27 100644
--- a/src/core/dbus-manager.c
+++ b/src/core/dbus-manager.c
@@ -615,6
---
src/core/dbus-unit.c | 24 ++--
1 file changed, 10 insertions(+), 14 deletions(-)
diff --git a/src/core/dbus-unit.c b/src/core/dbus-unit.c
index 9b13c6e..2d1862c 100644
--- a/src/core/dbus-unit.c
+++ b/src/core/dbus-unit.c
@@ -859,20 +859,16 @@ static int bus_unit_set_tran
---
src/shared/utf8.c| 87
src/shared/utf8.h| 1 +
src/test/test-utf8.c | 30 ++
3 files changed, 118 insertions(+)
diff --git a/src/shared/utf8.c b/src/shared/utf8.c
index 9353559..5245604 100644
--- a/src/shared/utf8.
---
src/bootchart/svg.c | 10 +++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/src/bootchart/svg.c b/src/bootchart/svg.c
index faf377e..e5569e1 100644
--- a/src/bootchart/svg.c
+++ b/src/bootchart/svg.c
@@ -39,6 +39,7 @@
#include "svg.h"
#include "bootchart.h"
#include "
In case of systemd has "_" label and run as root, if a service file
has "User=" option and the command line file has a special SMACK label
then systemd will fail to execute the command. Generally, SMACK label
is ignored for the root. But if a service has a "User=" then systemd
will call setresuid()
On 11/06/2014 11:54 PM, Lennart Poettering wrote:
> On Tue, 04.11.14 17:35, WaLyong Cho (walyong@samsung.com) wrote:
>
>> In case of systemd has "_" label and run as root, if a service file
>> has "User=" option and the command line file has a special SM
On 11/07/2014 03:30 AM, Lennart Poettering wrote:
> On Fri, 07.11.14 03:18, WaLyong Cho (walyong@gmail.com) wrote:
>
>> On 11/06/2014 11:54 PM, Lennart Poettering wrote:
>>> On Tue, 04.11.14 17:35, WaLyong Cho (walyong@samsung.com) wrote:
>>>
>>>>
On 11/07/2014 09:35 AM, Lennart Poettering wrote:
> On Fri, 07.11.14 04:17, WaLyong Cho (walyong@gmail.com) wrote:
>
>> SMACK64
>> Used to make access control decisions. In almost all cases
>> the label given to a new filesystem object will be the label
>
On 11/08/2014 01:36 AM, Lennart Poettering wrote:
> On Fri, 07.11.14 15:43, WaLyong Cho (walyong@samsung.com) wrote:
>
>> On 11/07/2014 09:35 AM, Lennart Poettering wrote:
>>> On Fri, 07.11.14 04:17, WaLyong Cho (walyong@gmail.com) wrote:
>>>
>>&g
On 11/10/2014 08:57 PM, Simon McVittie wrote:
> On 09/11/14 02:08, Casey Schaufler wrote:
>> Thus, dbus is a fine example where SMACK64EXEC is a bad idea. Because you
>> want a system bus and a user bus with different attributes you want it to get
>> the Smack label at launch time, just like you do
On 11/10/2014 10:26 PM, Lennart Poettering wrote:
> On Fri, 07.11.14 10:03, Casey Schaufler (ca...@schaufler-ca.com) wrote:
>
>> Calling it SmackLabel= instead of SmackLabelExec= would be fine as
>> far as I'm concerned. SmackLabel= is more consistent with SELinuxContext=
>> and AppArmorProfile=,
On 11/11/2014 04:10 AM, Lennart Poettering wrote:
> On Tue, 11.11.14 00:43, WaLyong Cho (walyong@samsung.com) wrote:
>
>> On 11/10/2014 10:26 PM, Lennart Poettering wrote:
>>> On Fri, 07.11.14 10:03, Casey Schaufler (ca...@schaufler-ca.com) wrote:
>>>
>>
---
src/bootchart/svg.c | 10 +++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/src/bootchart/svg.c b/src/bootchart/svg.c
index faf377e..e5569e1 100644
--- a/src/bootchart/svg.c
+++ b/src/bootchart/svg.c
@@ -39,6 +39,7 @@
#include "svg.h"
#include "bootchart.h"
#include "
---
src/shared/utf8.c| 39 +++
src/shared/utf8.h| 1 +
src/test/test-utf8.c | 25 +
3 files changed, 65 insertions(+)
diff --git a/src/shared/utf8.c b/src/shared/utf8.c
index 8702ceb..0b6c38e 100644
--- a/src/shared/utf8.c
+++ b
---
Makefile.am | 7 ++
src/shared/.gitignore| 1 +
src/shared/unit-name.c | 22
src/shared/unit-name.h | 26 +
src/shared/unit-property-scope.gperf | 202 +++
5 files changed, 258 i
---
src/core/dbus-manager.c | 123 +---
1 file changed, 105 insertions(+), 18 deletions(-)
diff --git a/src/core/dbus-manager.c b/src/core/dbus-manager.c
index c54abd3..bba4b27 100644
--- a/src/core/dbus-manager.c
+++ b/src/core/dbus-manager.c
@@ -615,6
---
src/core/dbus-timer.c | 159 ++
src/core/dbus-timer.h | 3 +
src/core/timer.c | 4 ++
3 files changed, 166 insertions(+)
diff --git a/src/core/dbus-timer.c b/src/core/dbus-timer.c
index f1f8c54..e916f5a 100644
--- a/src/core/dbus-timer.
Supported timer options --on-active=, --on-boot=, --on-startup=,
--on-unit-active=, --on-unit-inactive=, --on-calendar=. Each options
corresponding with OnActiveSec=, OnBootSec=, OnStartupSec=,
OnUnitActiveSec=, OnUnitInactiveSec= of timer respectively.
---
man/systemd-run.xml | 42 +
---
Makefile.am| 9 +
units/systemd-bootchart.service.in | 17 +
2 files changed, 26 insertions(+)
create mode 100644 units/systemd-bootchart.service.in
diff --git a/Makefile.am b/Makefile.am
index 1aef242..b682606 100644
--- a/Makefile.am
+++ b/M
Hello,
I'd made two different services. One has *CPUSchedulingPolicy=rr* and
the others has *CPUShares=*.
# cat foo.service
[Unit]
Description=foo has CPUSchedulingPolicy=
[Service]
RemainAfterExit=yes
ExecStart=/bin/true
CPUSchedulingPolicy=rr
# cat bar.service
[Unit]
Description=bar has CPUSh
---
README | 3 +++
1 file changed, 3 insertions(+)
diff --git a/README b/README
index aefb349..70d1105 100644
--- a/README
+++ b/README
@@ -82,6 +82,9 @@ REQUIREMENTS:
CONFIG_CGROUP_SCHED
CONFIG_FAIR_GROUP_SCHED
+Required for CPUQuota in resource control unit sett
On 10/28/2014 01:06 AM, Umut Tezduyar Lindskog wrote:
> On Wed, Oct 22, 2014 at 7:44 PM, Lennart Poettering
> wrote:
>> On Tue, 02.09.14 10:06, Umut Tezduyar Lindskog (u...@tezduyar.com) wrote:
>>
>>> Hi,
>>>
>>> I would like to start a configurable set of services first and the
>>> services are w
In case of systemd has "_" label and run as root, if a service file
has "User=" option and the command line file has a special SMACK label
then systemd will fail to access to given file. SMACK label is ignored
for root uid processes. But if a service has a "User=" then systemd
will call setresuid()
On 11/24/2014 02:36 AM, Zbigniew Jędrzejewski-Szmek wrote:
> On Fri, Nov 21, 2014 at 03:16:01PM +0900, WaLyong Cho wrote:
>> In case of systemd has "_" label and run as root, if a service file
>> has "User=" option and the command line file has a special SMACK
In service file, if the file has some of special SMACK label in
ExecStart= and systemd has no permission for the special SMACK label
then permission error will occurred. To resolve this, systemd should
be able to set its SMACK label to something accessible of ExecStart=.
So introduce new SmackProce
The smackfs root was changed few month ago. But some of systems are
still using old smackfs root. For compatibility, add smackfs root
configure option. Default is /sys/fs/smackfs.
---
Makefile.am | 1 +
configure.ac| 7 +++
src/core/mount-setup.c | 2 +-
src/core/smack
---
src/core/dbus-manager.c | 123 +---
1 file changed, 105 insertions(+), 18 deletions(-)
diff --git a/src/core/dbus-manager.c b/src/core/dbus-manager.c
index 0994d7b..643aa8b 100644
--- a/src/core/dbus-manager.c
+++ b/src/core/dbus-manager.c
@@ -615,6
---
src/core/dbus-timer.c | 159 ++
src/core/dbus-timer.h | 3 +
src/core/timer.c | 4 ++
3 files changed, 166 insertions(+)
diff --git a/src/core/dbus-timer.c b/src/core/dbus-timer.c
index f1f8c54..e916f5a 100644
--- a/src/core/dbus-timer.
Supported timer options --on-active=, --on-boot=, --on-startup=,
--on-unit-active=, --on-unit-inactive=, --on-calendar=. Each options
corresponding with OnActiveSec=, OnBootSec=, OnStartupSec=,
OnUnitActiveSec=, OnUnitInactiveSec= of timer respectively.
---
man/systemd-run.xml | 42 +
---
Makefile.am | 7 ++
src/shared/.gitignore| 1 +
src/shared/unit-name.c | 22
src/shared/unit-name.h | 26 +
src/shared/unit-property-scope.gperf | 202 +++
5 files changed, 258 i
Supported timer options --on-active=, --on-boot=, --on-startup=,
--on-unit-active=, --on-unit-inactive=, --on-calendar=. Each options
corresponding with OnActiveSec=, OnBootSec=, OnStartupSec=,
OnUnitActiveSec=, OnUnitInactiveSec= of timer respectively.
---
man/systemd-run.xml | 42 +
1 - 100 of 158 matches
Mail list logo