You are right. Apologies. I was stuck on my own work due to this issue and was
eager to get it solved too soon.
I'll spend some more time tonight digging about how other DHCP clients deal
with detecting if the interface supports link level unicast or not.
—
Sent from Mailbox
On Wed, May 28,
On Wed, May 28, 2014 at 4:13 PM, Camilo Aguilar
wrote:
> Oh, never mind, there is no rush since we are already custom patching in
> CoreOS for now.
Hey, don't get ahead of yourself. I haven't merged your patch into
CoreOS just yet ;-)
I'm fine with the patch being a temporary fix as long as we ca
Oh, never mind, there is no rush since we are already custom patching in
CoreOS for now.
On Wed, May 28, 2014 at 7:10 PM, Camilo Aguilar wrote:
> It makes total sense. I can provide that patch in addition if you like,
> But, can we merge this change for now so we can fix
> https://github.com/cor
It makes total sense. I can provide that patch in addition if you like,
But, can we merge this change for now so we can fix
https://github.com/coreos/bugs/issues/12 and create a new issue to make it
more robust?
On Wed, May 28, 2014 at 7:03 PM, Tom Gundersen wrote:
> On Wed, May 28, 2014 at 7:4
On Wed, May 28, 2014 at 7:43 PM, Camilo Aguilar
wrote:
> In systems running on hypervisors this flag needs to be set ON, so offers can
> reach
> the virtual machines.
>
> For more information please refer to this thread in CoreOS:
> https://github.com/coreos/bugs/issues/12
>
> Signed-off-by: Cam
Hi
On Wed, May 28, 2014 at 11:07 PM, Zbigniew Jędrzejewski-Szmek
wrote:
> On Wed, May 28, 2014 at 09:22:23PM +0200, Floris wrote:
>> Op Wed, 28 May 2014 20:38:17 +0200 schreef Mantas Mikulėnas
>> :
>>
>> >
>> >So the seat assignment works fine – gdm is added to the ACL.
>> >
>> >The problem is th
On Wed, May 28, 2014 at 09:22:23PM +0200, Floris wrote:
> Op Wed, 28 May 2014 20:38:17 +0200 schreef Mantas Mikulėnas
> :
>
> >
> >So the seat assignment works fine – gdm is added to the ACL.
> >
> >The problem is that the devnode is *world-readable*.
>
> and how can we fix this?
It has "always"
This is fairly simple, yet useful with netconsole. Remote socket address is not
used to obtain hostname, it would be easy to fake it via UDP anyway, which is
probably not desirable. If clients wish, they should identify themselves via
identifier field in syslog packets.
Disabled by default.
---
m
---
man/systemd-journald.service.xml | 11 +++
1 file changed, 11 insertions(+)
diff --git a/man/systemd-journald.service.xml b/man/systemd-journald.service.xml
index f0ce7aa..715 100644
--- a/man/systemd-journald.service.xml
+++ b/man/systemd-journald.service.xml
@@ -86,6 +86,17 @@
Op Wed, 28 May 2014 20:38:17 +0200 schreef Mantas Mikulėnas
:
So the seat assignment works fine – gdm is added to the ACL.
The problem is that the devnode is *world-readable*.
and how can we fix this?
tia,
floris___
systemd-devel mailing list
s
On Wed, May 28, 2014 at 2:14 AM, Peeters Simon wrote:
> 2014-05-28 1:12 GMT+02:00 Thomas H.P. Andersen :
>> From: Thomas Hindoe Paaboel Andersen
>>
>> Reuses logic from service.c and the rc-local generator.
>>
>> Note that this drops reading of chkconfig entirely. It also drops reading
>> runleve
In systems running on hypervisors this flag needs to be set ON, so offers can
reach
the virtual machines.
For more information please refer to this thread in CoreOS:
https://github.com/coreos/bugs/issues/12
Signed-off-by: Camilo Aguilar
---
src/libsystemd-network/sd-dhcp-client.c | 9
So the seat assignment works fine – gdm is added to the ACL.
The problem is that the devnode is *world-readable*.
--
Mantas Mikulėnas
On May 28, 2014 8:57 PM, "Floris" wrote:
> Op Wed, 28 May 2014 19:06:22 +0200 schreef Zbigniew Jędrzejewski-Szmek <
> zbys...@in.waw.pl>:
>
> On Wed, May 28,
Op Wed, 28 May 2014 19:06:22 +0200 schreef Zbigniew Jędrzejewski-Szmek
:
On Wed, May 28, 2014 at 05:45:01PM +0200, Floris wrote:
>Are you logged in as the same user on both seats?
>
Nobody is logged in on seat1
>I think the difference is that with `jstest`, the device doesn't
>interact with
On Wed, May 28, 2014 at 05:45:01PM +0200, Floris wrote:
> >Are you logged in as the same user on both seats?
> >
>
> Nobody is logged in on seat1
>
> >I think the difference is that with `jstest`, the device doesn't
> >interact with your seat, but *you* are interacting directly with its
> >device
Are you logged in as the same user on both seats?
Nobody is logged in on seat1
I think the difference is that with `jstest`, the device doesn't
interact with your seat, but *you* are interacting directly with its
device node, so the only thing that's checked is devnode
permissions...
When
This causes the container to shut down cleanly when the service is
stopped.
---
units/systemd-nsp...@.service.in | 1 +
1 file changed, 1 insertion(+)
diff --git a/units/systemd-nsp...@.service.in b/units/systemd-nsp...@.service.in
index ff36e90..e373628 100644
--- a/units/systemd-nsp...@.service
On 28/05/2014 10:32 PM, Zbigniew Jędrzejewski-Szmek wrote:
On Wed, May 28, 2014 at 05:42:31PM +1000, Jonathan Liu wrote:
On 28 May 2014 14:06, David Timothy Strauss wrote:
On Tue, May 27, 2014 at 10:55 PM, Jonathan Liu wrote:
I suspect one downside is that if the container takes longer than
On Wed, 28 May 2014 11:55:08 +0400
Kirill Elagin wrote:
> Might be that rfkill1 disappears after rfkill0 is switched off, if they are
> related.
Right.
Additionally, on my system one rfkill? controls multiple devices. This is why
I suggested disabling systemd state-storing at all: it works OK i
On Wed, May 28, 2014 at 5:28 PM, Floris wrote:
> Hey,
>
> I have created an udev rule for an usb hub with "loginctl attach" so every
> device I plug-in will go to seat1
> $cat /etc/udev/rules.d/72-seat-usb-pci-_00_1a_0-usb-0_1_4.rules
> TAG=="seat", ENV{ID_FOR_SEAT}=="usb-pci-_00_1a_0-usb-
Hey,
I have created an udev rule for an usb hub with "loginctl attach" so every
device I plug-in will go to seat1
$cat /etc/udev/rules.d/72-seat-usb-pci-_00_1a_0-usb-0_1_4.rules
TAG=="seat", ENV{ID_FOR_SEAT}=="usb-pci-_00_1a_0-usb-0_1_4",
ENV{ID_SEAT}="seat1"
Nevertheless, when I p
On 05/28/2014 01:52 PM, Mantas Mikulėnas wrote:
Not sure what security hole you see here. If the executable owns
cap_foo=ei (*not* cap_foo=eip), then running it will not grant any
capabilities unless its process (or the parent process) explicitly
adds them to the inheritable set...
And that's t
On Wed, May 28, 2014 at 05:42:31PM +1000, Jonathan Liu wrote:
> On 28 May 2014 14:06, David Timothy Strauss wrote:
> > On Tue, May 27, 2014 at 10:55 PM, Jonathan Liu wrote:
> >> I suspect one downside is that if the container takes longer than the
> >> timeout to shutdown then it will go on a SIG
2014-05-28 15:57 GMT+04:00 Harald Hoyer :
>
> ?? something in your real root system assigning MAC adresses to the
> interfaces?
>
> which distribution?
I'm using exherbo (gentoo like system) with latest systemd release.
--
Vasiliy Tolstov,
e-mail: v.tols...@selfip.ru
jabber: v...@selfip.ru
__
2014-05-28 15:57 GMT+04:00 Harald Hoyer :
> ?? something in your real root system assigning MAC adresses to the
> interfaces?
>
> which distribution?
>
I'm using exherbo (gentoo like system) with latest systemd release.
--
Vasiliy Tolstov,
e-mail: v.tols...@selfip.ru
jabber: v...@selfip.ru
___
On Wed, May 28, 2014 at 1:59 PM, Michael Biebl wrote:
> 2014-05-28 11:58 GMT+02:00 Thomas H.P. Andersen :
>> On Wed, May 28, 2014 at 3:38 AM, Zbigniew Jędrzejewski-Szmek
>> wrote:
>>> On Wed, May 28, 2014 at 01:12:23AM +0200, Thomas H.P. Andersen wrote:
From: Thomas Hindoe Paaboel Andersen
2014-05-28 11:58 GMT+02:00 Thomas H.P. Andersen :
> On Wed, May 28, 2014 at 3:38 AM, Zbigniew Jędrzejewski-Szmek
> wrote:
>> On Wed, May 28, 2014 at 01:12:23AM +0200, Thomas H.P. Andersen wrote:
>>> From: Thomas Hindoe Paaboel Andersen
>>>
>>> Reuses logic from service.c and the rc-local generato
On 24.05.2014 09:02, Vasiliy Tolstov wrote:
> Hello.
> I'm using dracut to create initramfs and systemd.
> Dracut configures bond and all works fine, but then it shutdowns and
> switch rooti, mac address of slave interfaces (eth0 and eth1) changed,
> but bonding mac saves the same. After that bond
On Wed, May 28, 2014 at 1:37 PM, Michal Witanowski
wrote:
>
> On 05/28/2014 12:07 AM, Serge Hallyn wrote:
>>
>> Quoting Mantas Mikulėnas (graw...@gmail.com):
>>>
>>> On Tue, May 27, 2014 at 4:31 PM, Michal Witanowski
>>> wrote:
Hi,
first of all I'd like to mark that I'm not su
On 05/28/2014 12:07 AM, Serge Hallyn wrote:
Quoting Mantas Mikulėnas (graw...@gmail.com):
On Tue, May 27, 2014 at 4:31 PM, Michal Witanowski
wrote:
Hi,
first of all I'd like to mark that I'm not sure if I'm writing in the right
place.
I have a problem with running a systemd service in "capa
On Wed, May 28, 2014 at 3:38 AM, Zbigniew Jędrzejewski-Szmek
wrote:
> On Wed, May 28, 2014 at 01:12:23AM +0200, Thomas H.P. Andersen wrote:
>> From: Thomas Hindoe Paaboel Andersen
>>
>> Reuses logic from service.c and the rc-local generator.
>>
>> Note that this drops reading of chkconfig entirel
On Tue, 27.05.14 22:14, Kirill Elagin (kirela...@gmail.com) wrote:
> >
> > The container usecase alone is already the reason why I am so very sure
> > I want this stuff, and that it needs to be in networkd, and just work. I
> > want this fully automatic, so that we can create a hundred of veth
> >
On Tue, 27.05.14 14:48, Tollef Fog Heen (tfh...@err.no) wrote:
>
> ]] Lennart Poettering
>
> > If we set up links (and especially, create them like
> > we do for veth), then hel, yeah we should be prepared to make sure
> > everybody gets an address on it.
>
> Should we also include BGP, OSPF,
16.05.2014 at 16:41 Lennart Poettering wrote:
On Fri, 16.05.14 11:00, Maciej Wereski (m.were...@partner.samsung.com)
wrote:
---
src/core/machine-id-setup.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/core/machine-id-setup.c b/src/core/machine-id-setup.c
index 2a
Heya!
http://www.freedesktop.org/software/systemd/systemd-213.tar.xz
Some new features, lots of bugfixes.
CHANGES WITH 213:
* A new "systemd-timesyncd" daemon has been added for
synchronizing the system clock across the network. It
implements an SNTP client. In contr
On 05/28/14 at 09:57am, Przemyslaw Rudy wrote:
> I use 'auto,fail' in fstab line options, however I have rootfs
> dependency to it so fail means all will fail.
How do you do that? Are you saying that you create a explicit
dependency on sysroot.mount to your xxx.mount from /etc/fstab?
Thanks
WANG
I use 'auto,fail' in fstab line options, however I have rootfs
dependency to it so fail means all will fail.
On 05/26/2014 09:12 AM, WANG Chao wrote:
> Hi, all
>
> In a pure initramfs enviroment, I want to mount a filesystem and I put
> an mount entry in /etc/fstab, so that fstab-generator could
Might be that rfkill1 disappears after rfkill0 is switched off, if they are
related.
--
Кирилл Елагин
On Wed, May 28, 2014 at 8:43 AM, Mantas Mikulėnas wrote:
> On May 28, 2014 3:25 AM, "Aaron Lewis" wrote:
> >
> > Hi,
> >
> > I'm running Arch and recently upgraded system, now every time I b
On 28 May 2014 14:06, David Timothy Strauss wrote:
> On Tue, May 27, 2014 at 10:55 PM, Jonathan Liu wrote:
>> I suspect one downside is that if the container takes longer than the
>> timeout to shutdown then it will go on a SIGKILL-ing spree... which
>> could be a problem if a container process w
On Tue, 2014-05-27 at 13:39 +0200, David Herrmann wrote:
> I strongly disagree. One major example is Wifi-P2P which requires a
> DHCP-Server for ad-hoc P2P connections. A network-daemon manages the
> local address-space, so it should also be responsible of assigning
> those ranges to an ad-hoc DHCP
On Tue, 2014-05-27 at 22:31 -0500, David Timothy Strauss wrote:
> One of the cleanest ways to do what you want is to create a
> D-Bus-activated systemd service (or socket-activated, if that's more
> appropriate). That allows activation completely outside the user's
> session without elevated privil
41 matches
Mail list logo