Bug#775613: systemd: why is /run/systemd/inhibit/1.ref inherited?

2015-01-17 Thread Russell Coker
Package: systemd Version: 215-9 Severity: normal type=AVC msg=audit(1421538903.417:232): avc: denied { use } for pid=23546 comm="kded4" path="/run/systemd/inhibit/1.ref" dev="tmpfs" ino=91124 scontext=rjc:user_r:user_t:s0-s0:c0.c1023 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=fd

Bug#775651: systemd: /run/user/$UID directories are created with type tmpfs_t on SE Linux

2015-01-17 Thread Russell Coker
Package: systemd Version: 215-9 Severity: normal # grep auditallow local.te auditallow domain tmpfs_t:dir create; # grep granted /var/log/audit/audit.log type=AVC msg=audit(1421563773.398:239): avc: granted { create } for pid=4302 comm="systemd" name="systemd" scontext=system_u:system_r:init_t

Bug#775651: systemd: /run/user/$UID directories are created with type tmpfs_t on SE Linux

2015-01-18 Thread Russell Coker
On Mon, 19 Jan 2015, Michael Biebl wrote: > unfortunately I don't have any selinux knowledge at all, so I don't have > the slightest idea how this (or your earlier bug #775613) should be > addressed. > > Help is most welcome. Would you like me to give you root access on a virtual machine that d

Re: [DSE-Dev] Bug#796693: selinux-basics: Has init script in runlevel S but no matching service file

2015-09-14 Thread Russell Coker
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796693 What do you suggest that we do in regard to this bug? The problem we have is that this isn't like your typical service script (most of which start daemons etc). It has more in common with a fsck than any other operation on a non-SE syst

Bug#800417: systemd: leaks a unix stream socket file handle

2015-09-28 Thread Russell Coker
Package: systemd Version: 215-17+deb8u2 Severity: minor The following lines from the output of dmesg show that systemd (init_t) is leaking socket file handle 7748 when spawning kmod. It should either close the file handle before calling exec() or set FD_CLOEXEC. In this case it's a minor bug (

Bug#725357: SE Linux + systemd is a likely combination

2015-09-29 Thread Russell Coker
As systemd is the default init in Jessie it's expected that most SE Linux systems running Debian will be affected. I have been running systemd on most of my servers since Wheezy. -- My Main Blog http://etbe.coker.com.au/ My Documents Bloghttp://doc.coker.com.au/ __

Bug#775613: systemd: why is /run/systemd/inhibit/1.ref inherited?

2015-09-30 Thread Russell Coker
On Thu, 1 Oct 2015 08:00:45 AM Michael Biebl wrote: > On Sun, 18 Jan 2015 11:07:40 +1100 Russell Coker > wrote: > > Package: systemd > > Version: 215-9 > > Severity: normal > > > > > > type=AVC msg=audit(1421538903.417:232): avc: denied { use }

Bug#800417: systemd: leaks a unix stream socket file handle

2015-10-02 Thread Russell Coker
On Thu, 1 Oct 2015 12:59:08 AM Michael Biebl wrote: > Can you reproduce this problem with systemd v226 from unstable/testing? Yes. It happens with version 226-3. > If so, it would be great if you can file this issue upstream at > https://github.com/systemd/systemd/issues OK. -- My Main Blog

backport to Jessie

2016-02-13 Thread Russell Coker
I'm trying to rebuild the latest Systemd from Unstable on Jessie to get the benefit of the latest SE Linux patches. 6c26 = 1:2.24-9~), --- >libcap-dev (>= 1:2.24-8), 28c28 = 2.9.0-3+exp2) , --- >libap

Re: backport to Jessie

2016-02-16 Thread Russell Coker
Thanks for your advice. I've disabled apparmor support and everything is fine now. On Mon, 15 Feb 2016 02:22:37 AM Martin Pitt wrote: > Hello Russell, > > Russell Coker [2016-02-13 20:55 +1100]: > > <libcap-dev (>= 1:2.24-9~), > > --- > >

Bug#815534: systemd: should migrate config from /etc/udev/rules.d/70-persistent-net.rules

2016-02-21 Thread Russell Coker
Package: systemd Version: 229-1 Severity: important To preserve the functionality of systems where the sysadmin deliberately named interfaces as well as systems where the sysadmin just configured things to work with the defaults that udev put in 70-persistent-net.rules I think that the upgrade o

Bug#815534: systemd: should migrate config from /etc/udev/rules.d/70-persistent-net.rules

2016-02-22 Thread Russell Coker
On Mon, 22 Feb 2016 07:00:01 PM Martin Pitt wrote: > > To preserve the functionality of systems where the sysadmin deliberately > > named interfaces as well as systems where the sysadmin just configured > > things to work with the defaults that udev put in > > 70-persistent-net.rules I think that t

Bug#834228: systemd: /run/utmp is created with the wrong SE Linux context

2016-08-13 Thread Russell Coker
Package: systemd Version: 231-1 Severity: normal Tags: upstream The file /run/utmp is created with the wrong type on SE Linux systems. The program that creates is should either run restorecon or have internal code to set the correct context (as most of systemd does). I think it's being created b

Bug#834228: adding that line doesn't fix it

2016-11-17 Thread Russell Coker
Adding the line in question makes no difference. The way you see if it worked is you run restorecon and see if it reports doing anything, if everything is OK restorecon will do nothing. Below is an example. # restorecon -v /run/utmp restorecon reset /run/utmp context system_u:object_r:var_run

Bug#834228: more info

2016-11-18 Thread Russell Coker
~/systemd-tmpfiles --create /usr/lib/tmpfiles.d/systemd.conf I copied /bin/systemd-tmpfiles to /root (so I can give it a different context). When I run the above command after logging in as root:sysadm_r it sets the correct context. But when I delete /run/utmp and run it again it doesn't recr

Bug#834228: policy bug

2016-12-07 Thread Russell Coker
reassign 834228 selinux-policy-default thanks Turns out this was a policy bug. I'll fix it soon. -- My Main Blog http://etbe.coker.com.au/ My Documents Bloghttp://doc.coker.com.au/ ___ Pkg-systemd-maintainers mailing list Pkg-systemd-main

Bug#851143: systemd: doesn't use all the mount options from /etc/fstab when mounting on boot

2017-01-12 Thread Russell Coker
Package: systemd Version: 232-8 Severity: normal When I boot a server that mounts a filesystem via NFS it ignores the context= mount option to set a SE Linux context of the files. What I want is to use the type mail_spool_t for a NFS mounted mail spool instead of the default nfsd_rw_t (a generic

Bug#851933: Work around

2017-01-19 Thread Russell Coker
If you can't fix the code before the Stretch freeze please call "restorecon /lib/udev/hwdb.bin" after running systemd-hwdb. -- Sent from my Nexus 6P with K-9 Mail. ___ Pkg-systemd-maintainers mailing list Pkg-systemd-maintainers@lists.alioth.debian.or

Bug#851933: udev: /lib/udev/hwdb.bin gets wrong SE Linux label

2017-01-19 Thread Russell Coker
Package: udev Version: 232-12 Severity: normal The command "systemd-hwdb --usr update" as run from /var/lib/dpkg/info/udev.postinst creates the file /lib/udev/hwdb.bin and assigns it the SE Linux context "system_u:object_r:default_t:s0" when it should have "system_u:object_r:bin_t:s0" with the cur

Bug#858335: systemd: should usr /run instead of /var/run

2017-03-21 Thread Russell Coker
Package: systemd Version: 232-20 Severity: normal https://lists.fedoraproject.org/pipermail/devel/2011-March/150031.html The use of a /run tmpfs started in March 2011. I think it's time for all software to use /run directly not via the /var/run symlink. Among other things we have special code i

Bug#858335: systemd: should usr /run instead of /var/run

2017-03-22 Thread Russell Coker
On Tuesday, 21 March 2017 10:43:57 AM AEDT Felipe Sateler wrote: > > # strings /usr/lib/systemd/libsystemd-shared-232.so|grep var.run.dbus > > kernel:path=/sys/fs/kdbus/0-system/bus;unix:path=/var/run/dbus/system_bus_ > > socket > As you already know, this is the canonical address and has not been

Bug#859003: systemd-container: strange permissions on /dev/pts/ptmx

2017-03-29 Thread Russell Coker
Package: systemd-container Version: 232-22 Severity: normal # grep pts /proc/mounts devpts /dev/pts devpts rw,seclabel,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000 0 0 # ls -l /dev/pts/ptmx c-. 1 root root 5, 2 Mar 20 21:51 /dev/pts/ptmx The above is from a regular Debian/unstable

Bug#859003: systemd-container: strange permissions on /dev/pts/ptmx

2017-03-29 Thread Russell Coker
On Thu, 30 Mar 2017 01:00:33 AM Felipe Sateler wrote: > From the kernel documentation: > > As an option instead of placing a /dev/ptmx device node at /dev/ptmx > > it is possible to place a symlink to /dev/pts/ptmx at /dev/ptmx or > > to bind mount /dev/ptx/ptmx to /dev/ptmx. If you opt for using

Bug#851143: systemd: doesn't use all the mount options from /etc/fstab when mounting on boot

2017-05-22 Thread Russell Coker
reopen 851143 thanks > > Could you attach the output of > > systemctl status mail.mount > > systemctl show mail.mount > > Since I don't have a selinux enabled system so I could try and reproduce > this and no further information was provided, I'm closing this bug report. > > Please reopen if you

Bug#851143: systemd: doesn't use all the mount options from /etc/fstab when mounting on boot

2017-05-22 Thread Russell Coker
On Tue, 23 May 2017 02:49:21 AM Michael Biebl wrote: > > Sorry for the delay in responding. I've attached those files. > > The configuration you attached doesn't seem to match up. > E.g. the original fstab didn't have x-systemd.automount. I've set the system to not use automount, rebooted it, an

Bug#887419: systemd: should depend on udev

2018-01-16 Thread Russell Coker
Package: systemd Version: 232-25+deb9u1 Severity: normal On a vm at linode.com /home wouldn't be mounted (mount would hang forever with x-systemd.automount and abort leading to sulogin without it) and swap wouldn't be enabled when udev wasn't installed. udev was in "rc" state, so maybe a "dpkg --

Bug#753790: systemd: process 1 should load new versions of shared objects

2014-07-04 Thread Russell Coker
Source: systemd Version: all Severity: normal https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753726 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753727 The above bugs concern the ability of library packages to request that systemd use the new version on an upgrade. I don't think it's rea

Bug#753790: systemd: process 1 should load new versions of shared objects

2014-07-04 Thread Russell Coker
On Sat, 5 Jul 2014 04:40:33 Michael Biebl wrote: > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753726 > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753727 > > > > The above bugs concern the ability of library packages to request that > > systemd use the new version on an upgrade.

Bug#756725: systemd: should reboot even it umount / fails

2014-07-31 Thread Russell Coker
Package: systemd Version: 44-11+deb7u4 Severity: normal Today I had a server fail to restart when I ran the "reboot" command. When I got to it I saw the following on the console: Could not remount as read-only /: Device or resource busy Not all file systems unmounted, 1 left. Cannot finalize rema

systemd-tmpfile

2014-10-12 Thread Russell Coker
Below is part of the dmesg output on a SE Linux server and ls output showing what it matches to. Why is systemd-tmpfile trying to do a chmod type operation on directories such as /var? I haven't filed a bug report because I'm not sure it's a bug. I didn't post to debian-devel because that wou