And add prefix "selinux_" to each APIs like smack.
---
src/core/main.c | 4 +-
src/core/namespace.c | 4 +-
src/core/selinux-setup.c | 4 +-
src/core/socket.c | 12 +-
src/hostname/hostnamed.c | 2 +-
src/locale/localed.c | 2 +-
src
If selinux is disabled and smack is only enabled, smack label is
re-lable-ed by label_fix. To avoid, make only be labeled for selinux.
---
src/udev/udev-node.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/udev/udev-node.c b/src/udev/udev-node.c
index 9ec98bc..f4f4827
Thanks for explanation, it thread can be closed.
2014-08-18 0:41 GMT+03:00 Dave Reisner :
> On Mon, Aug 18, 2014 at 12:25:00AM +0300, Timofey Titovets wrote:
>> Good time of day, i just want to ask:
>> Systemd depend on util-linux mount command and in code we call him,
>> may have a sense to impor
On Mon, Aug 18, 2014 at 12:25:00AM +0300, Timofey Titovets wrote:
> Good time of day, i just want to ask:
> Systemd depend on util-linux mount command and in code we call him,
> may have a sense to import and cleanup code to systemd base, and just
> call function in systemd, instead of using mount
Good time of day, i just want to ask:
Systemd depend on util-linux mount command and in code we call him,
may have a sense to import and cleanup code to systemd base, and just
call function in systemd, instead of using mount command?
But only benefit what i see:
it faster, when call external comma
On Aug 17, 2014 1:33 PM, "Tomasz Torcz" wrote:
>
> On Sun, Aug 17, 2014 at 08:35:00AM -0400, Mauricio Tavares wrote:
> > So
http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html
> > makes the point that pgp is old school and should be taken to the
> > pasture to die. Lik
Hey,
maybe I'm missing something, but a user on the second seat (seat1) does
not get the right rights from logind.
$ udevadm info /dev/snd/controlC2
P: /devices/pci:00/:00:1e.0/:08:02.0/sound/card2/controlC2
N: snd/controlC2
S: snd/by-path/pci-:08:02.0
E: DEVLINKS=/dev/snd/by-
On Sun, Aug 17, 2014 at 08:35:00AM -0400, Mauricio Tavares wrote:
> So
> http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html
> makes the point that pgp is old school and should be taken to the
> pasture to die. Like upstart and inetd I take. Is there a replacement
> bu
On Friday 15 August 2014 at 15:35:06, Ivan Shapovalov wrote:
> [...]
> >
> > Ah, right. This is actually correct here. We want to make sure that the
> > root fs is remounted before we mount the other units, since this might
> > required creating additional directories to mount things on...
> >
So
http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html
makes the point that pgp is old school and should be taken to the
pasture to die. Like upstart and inetd I take. Is there a replacement
built into systemd? If not, I would like to suggest that as something
to be in
On Sunday 17 August 2014 at 11:18:25, Martti Kühne wrote:
> On Sun, Aug 17, 2014 at 7:39 AM, carstene1ns wrote:
> >
> > Package maintainer was a TU and he even re-uploaded the package now.
> > Who is at fault here? FredBezies for requesting? foutrelis for deleting?
> > keenerd for maintaini
Hi,
With --enable-compat-libs building fails like this:
CCLD libsystemd-journal.la
[...]
/tmp/ccISOiYU.ltrans1.ltrans.o: In function `sd_journal_process':
ccISOiYU.ltrans1.o:(.text+0x0): multiple definition of `sd_journal_process'
libsystemd_journal_internal_la-sd-journal.o (symbol from plu
On read-only filesystems trying to create the target will not fail with
EEXIST but with EROFS.
---
Some more cases that fail on read-only filesystems.
src/tmpfiles/tmpfiles.c | 13 ++---
1 file changed, 10 insertions(+), 3 deletions(-)
diff --git a/src/tmpfiles/tmpfiles.c b/src/tmpfiles
This avoids errors like this, when the paths are already there with the
correct permissions and owner:
chmod(/var/spool) failed: Read-only file system
---
Changes since v1:
- remember if stat() was successful and use it everywhere.
The original code checked for 'stat() >= 0'. Any reason for that
14 matches
Mail list logo