[systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Leho Kraav
After upgrading systemd 208 - 212, every single cron job creates this 
flood in systemd journal:


juuni 09 09:20:01 xps14 crond[15112]: pam_unix(crond:session): session 
opened for user root by (uid=0)
juuni 09 09:20:01 xps14 systemd[15113]: pam_unix(systemd-user:session): 
session opened for user root by (uid=0)

juuni 09 09:20:01 xps14 systemd[1]: Starting user-0.slice.
juuni 09 09:20:01 xps14 systemd[1]: Created slice user-0.slice.
juuni 09 09:20:01 xps14 systemd[1]: Starting User Manager for UID 0...
juuni 09 09:20:01 xps14 systemd[1]: Starting Session 107 of user root.
juuni 09 09:20:01 xps14 systemd[1]: Started Session 107 of user root.
juuni 09 09:20:02 xps14 systemd[15113]: Starting Paths.
juuni 09 09:20:02 xps14 systemd[15113]: Reached target Paths.
juuni 09 09:20:02 xps14 systemd[15113]: Starting Timers.
juuni 09 09:20:02 xps14 systemd[15113]: Reached target Timers.
juuni 09 09:20:02 xps14 systemd[15113]: Starting Sockets.
juuni 09 09:20:02 xps14 systemd[15113]: Reached target Sockets.
juuni 09 09:20:02 xps14 systemd[15113]: Starting Basic System.
juuni 09 09:20:02 xps14 systemd[15113]: Reached target Basic System.
juuni 09 09:20:02 xps14 systemd[15113]: Starting Default.
juuni 09 09:20:02 xps14 systemd[15113]: Reached target Default.
juuni 09 09:20:02 xps14 systemd[15113]: Startup finished in 31ms.
juuni 09 09:20:02 xps14 systemd[1]: Started User Manager for UID 0.
juuni 09 09:20:02 xps14 CROND[15116]: (root) CMD (test -x 
/usr/sbin/run-crons  /usr/sbin/run-crons )
juuni 09 09:20:02 xps14 CROND[15112]: pam_unix(crond:session): session 
closed for user root

juuni 09 09:20:02 xps14 systemd[1]: Stopping User Manager for UID 0...
juuni 09 09:20:02 xps14 systemd[15113]: Stopping Default.
juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Default.
juuni 09 09:20:02 xps14 systemd[15113]: Stopping Basic System.
juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Basic System.
juuni 09 09:20:02 xps14 systemd[15113]: Stopping Paths.
juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Paths.
juuni 09 09:20:02 xps14 systemd[15113]: Stopping Timers.
juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Timers.
juuni 09 09:20:02 xps14 systemd[15113]: Stopping Sockets.
juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Sockets.
juuni 09 09:20:02 xps14 systemd[15113]: Starting Shutdown.
juuni 09 09:20:02 xps14 systemd[15113]: Reached target Shutdown.
juuni 09 09:20:02 xps14 systemd[15113]: Starting Exit the Session...
juuni 09 09:20:02 xps14 systemd[15113]: Received SIGRTMIN+24 from PID 
15128 (kill).
juuni 09 09:20:02 xps14 systemd[15114]: pam_unix(systemd-user:session): 
session closed for user root

juuni 09 09:20:02 xps14 systemd[1]: Stopped User Manager for UID 0.
juuni 09 09:20:02 xps14 systemd[1]: Stopping user-0.slice.
juuni 09 09:20:02 xps14 systemd[1]: Removed slice user-0.slice.

Can I quiet this down somehow?
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [PATCH] Add a network-pre.target to avoid firewall leaks

2014-06-09 Thread Rusty Bird
Hi Leonid,

 On Sun, Jun 08, 2014 at 12:33:44PM +, Rusty Bird wrote:

 Adding to Djalal's and Mantas's examples, the systemd host may also be
 a gateway with its firewall configured to forward only *some* packets.

 If systemd itself is a server (you mean journald really, yes?)

systemd host = The machine that systemd runs on

In the example, this machine is a gateway/router, so it's the Linux
kernel (not systemd itself or any service) that receives packets from
other machines in your network and forwards them towards their
destination.

 how can I
 protect the machine with yet another target? Why there is no way to tell
 systemd directly to start listening only after network.target is up?
 
 On a related note, what do you do about things like sshd.socket (or crap like
 cups.socket) which are not ordered against anything network-related?

network-pre.target is intended to block the initial configuration of
the network interfaces (your Ethernet card, your WiFi radio) so that
it doesn't matter what software component is listening for, or trying
to send, packets: The machine remains cut off from all* network links
until the firewall initialization succeeds.

* Except, if you bring up a network interface during early boot, e.g.
using the kernel parameter ip= or an initramfs. In that case, it's your
own responsibility to bring it down before systemd takes over. If you
care about leaks.

Rusty



signature.asc
Description: OpenPGP digital signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-network-wait-online symlinks to systemd-networkd

2014-06-09 Thread Tom Gundersen
Hi Dave,

On Sun, Jun 8, 2014 at 3:37 PM, Dave Reisner d...@falconindy.com wrote:
 Commit 2dcf7ec6ec added the following to Makefile.am:

 +GENERAL_ALIASES += \
 +   $(systemunitdir)/systemd-networkd.service 
 $(pkgsysconfdir)/system/multi-user.target.wants/systemd-networkd.service \
 +   $(systemunitdir)/systemd-networkd.service 
 $(pkgsysconfdir)/system/network-online.target.wants/systemd-networkd-wait-online.service

 Which, of course, results in systemd-networkd-wait-online being a
 symlink to systemd-networkd.  This doesn't seem correct at all.
 Shouldn't it link to systemd-networkd-wait-online.service?

Indeed, that's a copy-paste error. Feel free to fix up, or I'll do it
when I get home tonight.

 On a related topic, could we please stop shipping hardcoded symlinks in
 /etc in favor of documented reccomendations for downstream packagers?

I believe the aim here is to make ./autogen.sh c  make  sudo make
install give the recommended installation. I suppose one
alternative would be to ship some preset instead (and hook into that
from make install) which should be simpler to drop from the package?

-t
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Mantas Mikulėnas
I think there's also another problem – logind starts the user manager
instance for cronjobs while it shouldn't do so for batch stuff. Probably a
PAM configuration issue.

-- 
Mantas Mikulėnas graw...@gmail.com
On Jun 9, 2014 9:34 AM, Leho Kraav l...@kraav.com wrote:

 After upgrading systemd 208 - 212, every single cron job creates this
 flood in systemd journal:

 juuni 09 09:20:01 xps14 crond[15112]: pam_unix(crond:session): session
 opened for user root by (uid=0)
 juuni 09 09:20:01 xps14 systemd[15113]: pam_unix(systemd-user:session):
 session opened for user root by (uid=0)
 juuni 09 09:20:01 xps14 systemd[1]: Starting user-0.slice.
 juuni 09 09:20:01 xps14 systemd[1]: Created slice user-0.slice.
 juuni 09 09:20:01 xps14 systemd[1]: Starting User Manager for UID 0...
 juuni 09 09:20:01 xps14 systemd[1]: Starting Session 107 of user root.
 juuni 09 09:20:01 xps14 systemd[1]: Started Session 107 of user root.
 juuni 09 09:20:02 xps14 systemd[15113]: Starting Paths.
 juuni 09 09:20:02 xps14 systemd[15113]: Reached target Paths.
 juuni 09 09:20:02 xps14 systemd[15113]: Starting Timers.
 juuni 09 09:20:02 xps14 systemd[15113]: Reached target Timers.
 juuni 09 09:20:02 xps14 systemd[15113]: Starting Sockets.
 juuni 09 09:20:02 xps14 systemd[15113]: Reached target Sockets.
 juuni 09 09:20:02 xps14 systemd[15113]: Starting Basic System.
 juuni 09 09:20:02 xps14 systemd[15113]: Reached target Basic System.
 juuni 09 09:20:02 xps14 systemd[15113]: Starting Default.
 juuni 09 09:20:02 xps14 systemd[15113]: Reached target Default.
 juuni 09 09:20:02 xps14 systemd[15113]: Startup finished in 31ms.
 juuni 09 09:20:02 xps14 systemd[1]: Started User Manager for UID 0.
 juuni 09 09:20:02 xps14 CROND[15116]: (root) CMD (test -x
 /usr/sbin/run-crons  /usr/sbin/run-crons )
 juuni 09 09:20:02 xps14 CROND[15112]: pam_unix(crond:session): session
 closed for user root
 juuni 09 09:20:02 xps14 systemd[1]: Stopping User Manager for UID 0...
 juuni 09 09:20:02 xps14 systemd[15113]: Stopping Default.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Default.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopping Basic System.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Basic System.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopping Paths.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Paths.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopping Timers.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Timers.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopping Sockets.
 juuni 09 09:20:02 xps14 systemd[15113]: Stopped target Sockets.
 juuni 09 09:20:02 xps14 systemd[15113]: Starting Shutdown.
 juuni 09 09:20:02 xps14 systemd[15113]: Reached target Shutdown.
 juuni 09 09:20:02 xps14 systemd[15113]: Starting Exit the Session...
 juuni 09 09:20:02 xps14 systemd[15113]: Received SIGRTMIN+24 from PID
 15128 (kill).
 juuni 09 09:20:02 xps14 systemd[15114]: pam_unix(systemd-user:session):
 session closed for user root
 juuni 09 09:20:02 xps14 systemd[1]: Stopped User Manager for UID 0.
 juuni 09 09:20:02 xps14 systemd[1]: Stopping user-0.slice.
 juuni 09 09:20:02 xps14 systemd[1]: Removed slice user-0.slice.

 Can I quiet this down somehow?
 ___
 systemd-devel mailing list
 systemd-devel@lists.freedesktop.org
 http://lists.freedesktop.org/mailman/listinfo/systemd-devel

___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [systemd-netword]

2014-06-09 Thread Tom Gundersen
On 7 Jun 2014 21:57, Unknown contact+systemd...@volcanis.me wrote:

 Hello. It is said in the man systemd-netword-wait-online.service:

 systemd-networkd-wait-online is a one-shot system service that waits
 for the network to be configured. By default, it will wait for all
 links it is aware of and which are managed by
 systemd-networkd.service(8) to be fully configured or failed, and for
 at least one link to gain a carrier.

 What exactly mean configured or failed, in this context ?
 If i have two interface managed by systemd-networkd, one which is up
 and fully configured and one another that is not (like, an ethernet
 interface with no cable plugged in), does that mean this other one is
 failed ? In which state is he ?

It would be in the 'configuring' state. I.e. it is waiting for the cable to
be plugged, so it is not yet ready.

 I think (maybe wrongly) this should be precised somewhere, because I
 searched for fail in the associated man pages, and found nothing.

Indeed, this should be documented.

Cheers,

Tom
 ___
 systemd-devel mailing list
 systemd-devel@lists.freedesktop.org
 http://lists.freedesktop.org/mailman/listinfo/systemd-devel
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-213: regression with zram

2014-06-09 Thread Kai Krakow
Alexander E. Patrakov patra...@gmail.com schrieb:

 I have upgraded systemd from 212 to 213 on two my Gentoo boxes, and see
 the same regression here: zram swap space does not get activated. It
 looks like systemd tries to activate swap before the RUN+=mkswap part of
 the udev rule finishes.
 
 Here are the relevant lines from my configuration files. Are they indeed
 supposed to work, or were working only by pure luck?

I switched to zswap because of this. This also looks more appropriate for my 
workload. Maybe that's an option? At least if you do have a physical swap 
device (and in that cased I'd prefer zswap over zram).

-- 
Replies to list only preferred.

___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-213: regression with zram

2014-06-09 Thread Alexander E. Patrakov

09.06.2014 19:26, Kai Krakow wrote:

Alexander E. Patrakov patra...@gmail.com schrieb:


I have upgraded systemd from 212 to 213 on two my Gentoo boxes, and see
the same regression here: zram swap space does not get activated. It
looks like systemd tries to activate swap before the RUN+=mkswap part of
the udev rule finishes.

Here are the relevant lines from my configuration files. Are they indeed
supposed to work, or were working only by pure luck?


I switched to zswap because of this. This also looks more appropriate for my
workload. Maybe that's an option? At least if you do have a physical swap
device (and in that cased I'd prefer zswap over zram).


Please don't persuade me to hide or tolerate bugs. Even if zswap is more 
appropriate, I would like to get a comment on my zram issue from systemd 
maintainers.


--
Alexander E. Patrakov
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-network-wait-online symlinks to systemd-networkd

2014-06-09 Thread Dave Reisner
On Mon, Jun 09, 2014 at 10:12:35AM +0200, Tom Gundersen wrote:
 Hi Dave,
 
 On Sun, Jun 8, 2014 at 3:37 PM, Dave Reisner d...@falconindy.com wrote:
  Commit 2dcf7ec6ec added the following to Makefile.am:
 
  +GENERAL_ALIASES += \
  +   $(systemunitdir)/systemd-networkd.service 
  $(pkgsysconfdir)/system/multi-user.target.wants/systemd-networkd.service \
  +   $(systemunitdir)/systemd-networkd.service 
  $(pkgsysconfdir)/system/network-online.target.wants/systemd-networkd-wait-online.service
 
  Which, of course, results in systemd-networkd-wait-online being a
  symlink to systemd-networkd.  This doesn't seem correct at all.
  Shouldn't it link to systemd-networkd-wait-online.service?
 
 Indeed, that's a copy-paste error. Feel free to fix up, or I'll do it
 when I get home tonight.
 

Thanks for confirming -- pushed.

  On a related topic, could we please stop shipping hardcoded symlinks in
  /etc in favor of documented reccomendations for downstream packagers?
 
 I believe the aim here is to make ./autogen.sh c  make  sudo make
 install give the recommended installation. I suppose one
 alternative would be to ship some preset instead (and hook into that
 from make install) which should be simpler to drop from the package?

Well, hooking into 'make install' doesn't really change the end result
if there's no way to disable the hook. I strongly believe that the
overbearing majority of systemd users are installing systemd from their
distro's package manager, and not 'make install'. Since writes to /etc
in this case are likely discouraged (as they override the site admin),
it'd be really nice to separate out these additions somehow.

d
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-213: regression with zram

2014-06-09 Thread Alexander E. Patrakov

09.06.2014 20:11, Kay Sievers wrote:

On Mon, Jun 9, 2014 at 4:02 PM, Alexander E. Patrakov
patra...@gmail.com wrote:

09.06.2014 19:26, Kai Krakow wrote:


Alexander E. Patrakov patra...@gmail.com schrieb:


I have upgraded systemd from 212 to 213 on two my Gentoo boxes, and see
the same regression here: zram swap space does not get activated. It
looks like systemd tries to activate swap before the RUN+=mkswap part of
the udev rule finishes.

Here are the relevant lines from my configuration files. Are they indeed
supposed to work, or were working only by pure luck?



I switched to zswap because of this. This also looks more appropriate for
my
workload. Maybe that's an option? At least if you do have a physical swap
device (and in that cased I'd prefer zswap over zram).


Please don't persuade me to hide or tolerate bugs. Even if zswap is more
appropriate, I would like to get a comment on my zram issue from systemd
maintainers.


I don't know of anybody working on systemd, using this
horrible-to-configure facility.

I have no idea how stuff should work, but it *might* need some
ENV{SYSTEMD_READY}=0 fiddling.


Let's decompose the question then. Maybe you know how at least one of 
the steps should work.


1. Is it correct that swap units created from /etc/fstab have 
dependencies on the devices mentioned in the first column? What kind of 
dependencies?


2. At what point in time (just after getting the uevent, after setting 
sysfs attributes, after running the RUN programs) is the dependency on 
the device node considered satisfied?



Module parameters to configure devices, sysfs attributes to
re-configure pre-created dead devices, ...; given the fact, that it
is relatively recent technology, such terribly outdated and
have-always-been-broken concepts should never have been merged into
the kernel.


A valid observation, but still - the semantics need to be documented 
(even if the document says undefined) in systemd.device(5) or 
elsewhere WRT dependencies and ordering.


--
Alexander E. Patrakov
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-213: regression with zram

2014-06-09 Thread Kay Sievers
On Mon, Jun 9, 2014 at 4:31 PM, Alexander E. Patrakov
patra...@gmail.com wrote:
 09.06.2014 20:11, Kay Sievers wrote:

 On Mon, Jun 9, 2014 at 4:02 PM, Alexander E. Patrakov
 patra...@gmail.com wrote:

 09.06.2014 19:26, Kai Krakow wrote:


 Alexander E. Patrakov patra...@gmail.com schrieb:

 I have upgraded systemd from 212 to 213 on two my Gentoo boxes, and see
 the same regression here: zram swap space does not get activated. It
 looks like systemd tries to activate swap before the RUN+=mkswap part
 of
 the udev rule finishes.

 Here are the relevant lines from my configuration files. Are they
 indeed
 supposed to work, or were working only by pure luck?



 I switched to zswap because of this. This also looks more appropriate
 for
 my
 workload. Maybe that's an option? At least if you do have a physical
 swap
 device (and in that cased I'd prefer zswap over zram).


 Please don't persuade me to hide or tolerate bugs. Even if zswap is more
 appropriate, I would like to get a comment on my zram issue from systemd
 maintainers.


 I don't know of anybody working on systemd, using this
 horrible-to-configure facility.

 I have no idea how stuff should work, but it *might* need some
 ENV{SYSTEMD_READY}=0 fiddling.


 Let's decompose the question then. Maybe you know how at least one of the
 steps should work.

 1. Is it correct that swap units created from /etc/fstab have dependencies
 on the devices mentioned in the first column? What kind of dependencies?

 2. At what point in time (just after getting the uevent, after setting sysfs
 attributes, after running the RUN programs) is the dependency on the device
 node considered satisfied?

Just guessing around after looking at the rules you pasted, the devices
seem to be created unconditionally, and only later, after manual
configuration of the same devices be useful to the system. There is no
way for systemd to find that out, so systemd's dependencies on
configuration + devices + original uevents will unlikely work as
expected.

 Module parameters to configure devices, sysfs attributes to
 re-configure pre-created dead devices, ...; given the fact, that it
 is relatively recent technology, such terribly outdated and
 have-always-been-broken concepts should never have been merged into
 the kernel.

 A valid observation, but still - the semantics need to be documented (even
 if the document says undefined) in systemd.device(5) or elsewhere WRT
 dependencies and ordering.

It looks like the same model as device-mapper, MD, loop; systemd has
no native idea about them and when to bring up devices. Original
device events are suppressed with SYSTEMD_READY=0, and new events
later re-triggered when the devices are usable for systemd to pick
them up.

Kay
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] no fsck at boot

2014-06-09 Thread Colin Guthrie
'Twas brillig, and Reindl Harald at 08/06/14 13:59 did gyre and gimble:
 touch /forcefsck leads in deprecated warnings but in fact at least
 on Fedora 19 *you need it* because the fsck don't happen otherwise
 
 for sure, the last reboot of the machine below complaind too
 so why don't it happen at boot?

Via what mechanism did you trigger the fsck at boot (other than
/forcefsck)? e.g. did you pass fsck.mode=force on the kernel command
line (as the deprecated warning suggests)? Did this not trigger things
correctly?

Col


-- 

Colin Guthrie
gmane(at)colin.guthr.ie
http://colin.guthr.ie/

Day Job:
  Tribalogic Limited http://www.tribalogic.net/
Open Source:
  Mageia Contributor http://www.mageia.org/
  PulseAudio Hacker http://www.pulseaudio.org/
  Trac Hacker http://trac.edgewall.org/
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Leonid Isaev
On Mon, Jun 09, 2014 at 10:48:31AM +0300, Leho Kraav wrote:
 Date: Mon, 09 Jun 2014 10:48:31 +0300
 From: Leho Kraav l...@kraav.com
 To: Reindl Harald h.rei...@thelounge.net,
  systemd-devel@lists.freedesktop.org
 Subject: Re: [systemd-devel] How to quiet cron sessions logging with
  systemd-212?
 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101
  Thunderbird/24.5.0
 
 On 09.06.2014 10:43, Reindl Harald wrote:
 nobody cares because the developers point of view is that what is
 interesting for them needs to be also faced by the sysadmin
 
 otherwise this would be only logged in debug-mode and bugreports
 not closed: https://bugzilla.redhat.com/show_bug.cgi?id=1072368#c3
 
 frankly if that messages would at least have a prefix or a different
 process than systemd one could filter them out with rsyslog.conf
 without supress relevant boot messages
 
 
 Thanks for the info. I tried googling for this relatively hard, couldn't
 find that bug.
 
 Language on that bug is probably counterproductive, but other than that,
 some reasonably sensible way should exist to simply stop logging crap, not
 relying on just output filtering.

What you see are authpriv-level logs, so it would be a really bad idea to
suppress them, regardless of their source.

Currently, journald doesn't provide any means of log processing, so your only
choice is to filter logs when viewing them using journalctl command line or
grep/awk; you can not control what is logged when and where.

If you want log processing (multiple log directories, advanced filtering,
etc.), use syslog-ng or rsyslog. For example, one can setup a special logfile
for systemd-related messages with a given syslog facility (authpriv, daemon,
etc.).

HTH,
-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpERrsRV4Zx0.pgp
Description: PGP signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [PATCH] Add a network-pre.target to avoid firewall leaks

2014-06-09 Thread Leonid Isaev
On Mon, Jun 09, 2014 at 07:57:29AM +, Rusty Bird wrote:
 Date: Mon, 09 Jun 2014 07:57:29 +
 From: Rusty Bird rustyb...@openmailbox.org
 To: systemd-devel@lists.freedesktop.org
 Subject: Re: [systemd-devel] [PATCH] Add a network-pre.target to avoid
  firewall leaks
 
 Hi Leonid,
 
  On Sun, Jun 08, 2014 at 12:33:44PM +, Rusty Bird wrote:
 
  Adding to Djalal's and Mantas's examples, the systemd host may also be
  a gateway with its firewall configured to forward only *some* packets.
 
  If systemd itself is a server (you mean journald really, yes?)
 
 systemd host = The machine that systemd runs on
 
 In the example, this machine is a gateway/router, so it's the Linux
 kernel (not systemd itself or any service) that receives packets from
 other machines in your network and forwards them towards their
 destination.
 
  how can I
  protect the machine with yet another target? Why there is no way to tell
  systemd directly to start listening only after network.target is up?
  
  On a related note, what do you do about things like sshd.socket (or crap 
  like
  cups.socket) which are not ordered against anything network-related?
 
 network-pre.target is intended to block the initial configuration of
 the network interfaces (your Ethernet card, your WiFi radio) so that
 it doesn't matter what software component is listening for, or trying
 to send, packets: The machine remains cut off from all* network links
 until the firewall initialization succeeds.
 
 * Except, if you bring up a network interface during early boot, e.g.
 using the kernel parameter ip= or an initramfs. In that case, it's your
 own responsibility to bring it down before systemd takes over. If you
 care about leaks.

Cool. I see your point now.

Thanks,
Leonid.

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpM1WBQnbBym.pgp
Description: PGP signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-network-wait-online symlinks to systemd-networkd

2014-06-09 Thread Colin Guthrie
'Twas brillig, and Dave Reisner at 09/06/14 15:08 did gyre and gimble:
   On a related topic, could we please stop shipping hardcoded symlinks in
   /etc in favor of documented reccomendations for downstream packagers?
  
  I believe the aim here is to make ./autogen.sh c  make  sudo make
  install give the recommended installation. I suppose one
  alternative would be to ship some preset instead (and hook into that
  from make install) which should be simpler to drop from the package?
 Well, hooking into 'make install' doesn't really change the end result
 if there's no way to disable the hook. I strongly believe that the
 overbearing majority of systemd users are installing systemd from their
 distro's package manager, and not 'make install'. Since writes to /etc
 in this case are likely discouraged (as they override the site admin),
 it'd be really nice to separate out these additions somehow.

I don't necessarily disagree with the above comment but in terms of raw
numbers, how many systemd packagers are there vs. how many users wanting
to run it from their own build from source?

If there are more of the latter then the fact that it works OOTB for
them, while pushing a little bit of overhead onto the packagers seems
the correct behaviour... If, however, there are more packagers, than
catering to them seems more correct.

Kinda hard to tell the numbers but the point I wanted to make is that
you shouldn't consider the number of people installing systemd from
packages as this number is sort of irrelevant if the packager is doing
their job right regardless of the OOTB behaviour.

Col

-- 

Colin Guthrie
gmane(at)colin.guthr.ie
http://colin.guthr.ie/

Day Job:
  Tribalogic Limited http://www.tribalogic.net/
Open Source:
  Mageia Contributor http://www.mageia.org/
  PulseAudio Hacker http://www.pulseaudio.org/
  Trac Hacker http://trac.edgewall.org/
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] systemd-213: regression with zram

2014-06-09 Thread Kai Krakow
Alexander E. Patrakov patra...@gmail.com schrieb:

 09.06.2014 19:26, Kai Krakow wrote:
 Alexander E. Patrakov patra...@gmail.com schrieb:

 I have upgraded systemd from 212 to 213 on two my Gentoo boxes, and see
 the same regression here: zram swap space does not get activated. It
 looks like systemd tries to activate swap before the RUN+=mkswap part of
 the udev rule finishes.

 Here are the relevant lines from my configuration files. Are they indeed
 supposed to work, or were working only by pure luck?

 I switched to zswap because of this. This also looks more appropriate for
 my workload. Maybe that's an option? At least if you do have a physical
 swap device (and in that cased I'd prefer zswap over zram).
 
 Please don't persuade me to hide or tolerate bugs. Even if zswap is more
 appropriate, I would like to get a comment on my zram issue from systemd
 maintainers.

I didn't mean to persuade you but zram looks a little bit broken to me with 
respect to configuration. So if zswap would be an option for you, it might 
be the way to go instead of trying to work around quirks that cannot be 
fixed easily. Of course, it is only an option if you also use a physical 
swap device.

I had most success with putting zram statically into the kernel and put the 
num_devices parameter into the kernel cmdline. But still you need to 
mkswap these unprepared devices first - and that's not that easy with 
systemd. I gave up on that part because it never worked out as expected and 
instead went with zswap. However, that is a few months ago now and there 
might be options to make it work now.

But even before systemd (with openrc), I had to mkswap first, then swapon. I 
wasn't able to handle this automatically and reliably just through fstab. 
The whole process of configuring the device first, then formatting the 
device, and only then use it, makes it almost impossible to use it the way 
systemd does things (execute on discovery).

The best way to go with systemd is probably by creating a service template 
that does the above steps (configure, prepare, use) and depends on disovery 
of the devices. Then enable as many service instances as you need and do not 
put them into fstab. Something like:

# /etc/systemd/system/zram-swap@.service
...
[Service]
EnvironmentFile=/etc/conf.d/zram
ExecStartPre=echo -n $((1024*1024*$SIZE)) /sys/block/%I/disksize
ExecStartPre=/sbin/mkswap /dev/%I
ExecStart=swapon /dev/%I
ExecStop=swapoff /dev/%I

$ systemctl enable zram-swap@zram{0,1,2,3}.service

I'm leaving out the [Unit] block and the dependencies to be used because I 
have no way to test such a setup here. So it is left as an excercise. ;-)

But I think that's the only way to go. You cannot use it in fstab because 
the device is just not ready at the time when systemd parses through fstab.

-- 
Replies to list only preferred.

___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


[systemd-devel] [PATCH] tmpfiles: Fix journal file permissions broken by a606871

2014-06-09 Thread Jan Alexander Steffens (heftig)
They shouldn't be executable nor world-readable.
---
 tmpfiles.d/systemd.conf | 10 ++
 1 file changed, 6 insertions(+), 4 deletions(-)

diff --git a/tmpfiles.d/systemd.conf b/tmpfiles.d/systemd.conf
index c5910f8..d6c4da3 100644
--- a/tmpfiles.d/systemd.conf
+++ b/tmpfiles.d/systemd.conf
@@ -25,7 +25,9 @@ d /run/systemd/netif 0755 systemd-network systemd-network -
 d /run/systemd/netif/links 0755 systemd-network systemd-network -
 d /run/systemd/netif/leases 0755 systemd-network systemd-network -
 
-m /var/log/journal 2755 root systemd-journal - -
-Z /var/log/journal/%m 2755 root systemd-journal - -
-m /run/log/journal 2755 root systemd-journal - -
-Z /run/log/journal/%m 2755 root systemd-journal - -
+z /var/log/journal 2755 root systemd-journal - -
+z /var/log/journal/%m 2755 root systemd-journal - -
+z /var/log/journal/%m/* 0640 root systemd-journal - -
+z /run/log/journal 2755 root systemd-journal - -
+z /run/log/journal/%m 2755 root systemd-journal - -
+z /run/log/journal/%m/* 0640 root systemd-journal - -
-- 
2.0.0

___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] no fsck at boot

2014-06-09 Thread Reindl Harald

Am 09.06.2014 17:05, schrieb Colin Guthrie:
 'Twas brillig, and Reindl Harald at 08/06/14 13:59 did gyre and gimble:
 touch /forcefsck leads in deprecated warnings but in fact at least
 on Fedora 19 *you need it* because the fsck don't happen otherwise

 for sure, the last reboot of the machine below complaind too
 so why don't it happen at boot?
 
 Via what mechanism did you trigger the fsck at boot (other than
 /forcefsck)? e.g. did you pass fsck.mode=force on the kernel command
 line (as the deprecated warning suggests)? Did this not trigger things
 correctly?

uhm you stripped the relevant part of my message

* the filesystem has reached the time for next fsck
* the kernel says it's time
* before systemd did happended automatically
* that is why ext4 defines the fsck interval at all




signature.asc
Description: OpenPGP digital signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Reindl Harald


Am 09.06.2014 17:28, schrieb Leonid Isaev:
 On Mon, Jun 09, 2014 at 10:48:31AM +0300, Leho Kraav wrote:
 Date: Mon, 09 Jun 2014 10:48:31 +0300
 From: Leho Kraav l...@kraav.com
 To: Reindl Harald h.rei...@thelounge.net,
  systemd-devel@lists.freedesktop.org
 Subject: Re: [systemd-devel] How to quiet cron sessions logging with
  systemd-212?
 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101
  Thunderbird/24.5.0

 On 09.06.2014 10:43, Reindl Harald wrote:
 nobody cares because the developers point of view is that what is
 interesting for them needs to be also faced by the sysadmin

 otherwise this would be only logged in debug-mode and bugreports
 not closed: https://bugzilla.redhat.com/show_bug.cgi?id=1072368#c3

 frankly if that messages would at least have a prefix or a different
 process than systemd one could filter them out with rsyslog.conf
 without supress relevant boot messages

 Thanks for the info. I tried googling for this relatively hard, couldn't
 find that bug.

 Language on that bug is probably counterproductive, but other than that,
 some reasonably sensible way should exist to simply stop logging crap, not
 relying on just output filtering.
 
 What you see are authpriv-level logs, so it would be a really bad idea to
 suppress them, regardless of their source

no user needs them, there are already logs which command was
started for which user from crond with just 3 lines

Jun  9 19:01:01 rawhide CROND[1696]: (root) CMD (run-parts /etc/cron.hourly)
Jun  9 19:01:01 rawhide run-parts[1696]: (/etc/cron.hourly) starting 0anacron
Jun  9 19:01:01 rawhide run-parts[1705]: (/etc/cron.hourly) finished 0anacron
Jun  9 20:01:01 rawhide CROND[1735]: (root) CMD (run-parts /etc/cron.hourly)
Jun  9 20:01:01 rawhide run-parts[1735]: (/etc/cron.hourly) starting 0anacron
Jun  9 20:01:01 rawhide run-parts[1744]: (/etc/cron.hourly) finished 0anacron

they are introduced in that floody way with recent systemd

all the decades before crond did run fine, logs exactly what
you need to know if /var/log/secure and /var/log/crond
without writing *hundret thousands* loglines all day long
on machines with a lot of cronjobs




signature.asc
Description: OpenPGP digital signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [PATCH] tmpfiles: Fix journal file permissions broken by a606871

2014-06-09 Thread Greg KH
On Mon, Jun 09, 2014 at 08:05:35PM +0200, Jan Alexander Steffens (heftig) wrote:
 They shouldn't be executable nor world-readable.

Why do you think they should not be?

 ---
  tmpfiles.d/systemd.conf | 10 ++
  1 file changed, 6 insertions(+), 4 deletions(-)
 
 diff --git a/tmpfiles.d/systemd.conf b/tmpfiles.d/systemd.conf
 index c5910f8..d6c4da3 100644
 --- a/tmpfiles.d/systemd.conf
 +++ b/tmpfiles.d/systemd.conf
 @@ -25,7 +25,9 @@ d /run/systemd/netif 0755 systemd-network systemd-network -
  d /run/systemd/netif/links 0755 systemd-network systemd-network -
  d /run/systemd/netif/leases 0755 systemd-network systemd-network -
  
 -m /var/log/journal 2755 root systemd-journal - -
 -Z /var/log/journal/%m 2755 root systemd-journal - -
 -m /run/log/journal 2755 root systemd-journal - -
 -Z /run/log/journal/%m 2755 root systemd-journal - -
 +z /var/log/journal 2755 root systemd-journal - -
 +z /var/log/journal/%m 2755 root systemd-journal - -
 +z /var/log/journal/%m/* 0640 root systemd-journal - -
 +z /run/log/journal 2755 root systemd-journal - -
 +z /run/log/journal/%m 2755 root systemd-journal - -
 +z /run/log/journal/%m/* 0640 root systemd-journal - -

What type of system did you test this change on?  Did you try a box with
no journal at all and have it create one on startup that can then be
read by all users?

thanks,

greg k-h
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [PATCH] tmpfiles: Fix journal file permissions broken by a606871

2014-06-09 Thread Jan Alexander Steffens
On Mon, Jun 9, 2014 at 8:30 PM, Greg KH gre...@linuxfoundation.org wrote:
 Why do you think they should not be?

Executability is just nonsense, while world-readability goes against
the systemd-journald manpage, which claims that, by default, only
users in the systemd-journal system group can read journals not their
own.

 What type of system did you test this change on?  Did you try a box with
 no journal at all and have it create one on startup that can then be
 read by all users?

Just my laptop. systemd-tmpfiles kept overwriting the modes of the
journal files to 0755, even though they should be 0640 to match the
above claim.
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] no fsck at boot

2014-06-09 Thread Alexander E. Patrakov

10.06.2014 00:04, Reindl Harald wrote:


Am 09.06.2014 17:05, schrieb Colin Guthrie:

'Twas brillig, and Reindl Harald at 08/06/14 13:59 did gyre and gimble:

touch /forcefsck leads in deprecated warnings but in fact at least
on Fedora 19 *you need it* because the fsck don't happen otherwise

for sure, the last reboot of the machine below complaind too
so why don't it happen at boot?


Via what mechanism did you trigger the fsck at boot (other than
/forcefsck)? e.g. did you pass fsck.mode=force on the kernel command
line (as the deprecated warning suggests)? Did this not trigger things
correctly?


uhm you stripped the relevant part of my message

* the filesystem has reached the time for next fsck
* the kernel says it's time
* before systemd did happended automatically
* that is why ext4 defines the fsck interval at all


Please paste your /etc/fstab file. If it has 0 0 as the last two 
fields, then, of course, systemd will not call fsck. If there are 
different numbers there, sure, let's debug.


Also, now the entity that is supposed to check your root filesystem is 
dracut. Are you using it? Does the problem go away if you regenerate 
your initramfs?


--
Alexander E. Patrakov
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


[systemd-devel] Soliciting feedback for golang bindings to the systemd journal C API

2014-06-09 Thread Dan Mace
Hello!

We've been working on golang bindings to the systemd journal interface 
(sd-journal.h), as well as a higher level go API which builds on the bindings.  
The immediate goal is to replace  the use of forked calls to journalctl in a 
project.  To that end, we've been wrapping only the subset of sd-journal.h 
necessary to build the go API necessary to support existing journalctl usages.

The work is currently taking place in my fork of the go-systemd project:

  https://github.com/ironcladlou/go-systemd/compare/cgo-journal

(The only test code there is a work-in-progress scratchpad I've been using for 
iterative development- actual tests are forthcoming once we're satisfied there 
won't be any more API churn.)

We've observed a segfault during this simple test, but only once:

  http://fpaste.org/107299/14019224/

I've had no success reproducing the segfault.  My first thought was a race when 
closing the journal while dealing with the setup or execution of 
sd_journal_wait, but no amount of concurrent closing or other access to the 
sd_journal instance has led me to the same error.  Any advice for reproducing 
the segfault would be greatly appreciated.

We're interested in getting feedback on the cgo bindings and go API.  Does 
anybody else out there see a need for these bindings?  All suggestions and 
contributions are very welcome.

--
Dan Mace
OpenShift, PaaS by Red Hat
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Leonid Isaev
On Mon, Jun 09, 2014 at 08:08:43PM +0200, Reindl Harald wrote:
 Date: Mon, 09 Jun 2014 20:08:43 +0200
 From: Reindl Harald h.rei...@thelounge.net
 To: systemd-devel@lists.freedesktop.org
 Subject: Re: [systemd-devel] How to quiet cron sessions logging with
  systemd-212?
 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101
  Thunderbird/24.5.0
 
 
 
 Am 09.06.2014 17:28, schrieb Leonid Isaev:
  On Mon, Jun 09, 2014 at 10:48:31AM +0300, Leho Kraav wrote:
  Date: Mon, 09 Jun 2014 10:48:31 +0300
  From: Leho Kraav l...@kraav.com
  To: Reindl Harald h.rei...@thelounge.net,
   systemd-devel@lists.freedesktop.org
  Subject: Re: [systemd-devel] How to quiet cron sessions logging with
   systemd-212?
  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101
   Thunderbird/24.5.0
 
  On 09.06.2014 10:43, Reindl Harald wrote:
  nobody cares because the developers point of view is that what is
  interesting for them needs to be also faced by the sysadmin
 
  otherwise this would be only logged in debug-mode and bugreports
  not closed: https://bugzilla.redhat.com/show_bug.cgi?id=1072368#c3
 
  frankly if that messages would at least have a prefix or a different
  process than systemd one could filter them out with rsyslog.conf
  without supress relevant boot messages
 
  Thanks for the info. I tried googling for this relatively hard, couldn't
  find that bug.
 
  Language on that bug is probably counterproductive, but other than that,
  some reasonably sensible way should exist to simply stop logging crap, not
  relying on just output filtering.
  
  What you see are authpriv-level logs, so it would be a really bad idea to
  suppress them, regardless of their source
 
 no user needs them, there are already logs which command was
 started for which user from crond with just 3 lines

If you don't need them -- OK, but don't speak for the others. Why systemd
should be treated any differently than other programs? If it generates authpriv
messages -- they should be collected, not ignored. What about normal, i.e.
user-initiated logins -- should they be logged?

 
 Jun  9 19:01:01 rawhide CROND[1696]: (root) CMD (run-parts /etc/cron.hourly)
 Jun  9 19:01:01 rawhide run-parts[1696]: (/etc/cron.hourly) starting 0anacron
 Jun  9 19:01:01 rawhide run-parts[1705]: (/etc/cron.hourly) finished 0anacron
 Jun  9 20:01:01 rawhide CROND[1735]: (root) CMD (run-parts /etc/cron.hourly)
 Jun  9 20:01:01 rawhide run-parts[1735]: (/etc/cron.hourly) starting 0anacron
 Jun  9 20:01:01 rawhide run-parts[1744]: (/etc/cron.hourly) finished 0anacron
 
 they are introduced in that floody way with recent systemd
 
 all the decades before crond did run fine, logs exactly what
 you need to know if /var/log/secure and /var/log/crond
 without writing *hundret thousands* loglines all day long
 on machines with a lot of cronjobs

But why can't you write a syslog filter which uses facility as well as program
name? So if you believe that systemd-generated messages are useless, drop them,
or store them in a volatile location like /run/log. Something like this (in
syslog-ng language):
---
destination d_systemd { file(/run/log/systemd.log); };
filter f_daemon { facility(daemon) and not level(debug) and not \
program(systemd); };
filter f_systemd { program(systemd); };
log { source(src); filter(f_systemd); destination(d_systemd); };
---

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpz5kfVKZuoL.pgp
Description: PGP signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] no fsck at boot

2014-06-09 Thread Alexander E. Patrakov

10.06.2014 00:57, Reindl Harald wrote:


Am 09.06.2014 20:45, schrieb Alexander E. Patrakov:

10.06.2014 00:04, Reindl Harald wrote:


Am 09.06.2014 17:05, schrieb Colin Guthrie:

'Twas brillig, and Reindl Harald at 08/06/14 13:59 did gyre and gimble:

touch /forcefsck leads in deprecated warnings but in fact at least
on Fedora 19 *you need it* because the fsck don't happen otherwise

for sure, the last reboot of the machine below complaind too
so why don't it happen at boot?


Via what mechanism did you trigger the fsck at boot (other than
/forcefsck)? e.g. did you pass fsck.mode=force on the kernel command
line (as the deprecated warning suggests)? Did this not trigger things
correctly?


uhm you stripped the relevant part of my message

* the filesystem has reached the time for next fsck
* the kernel says it's time
* before systemd did happended automatically
* that is why ext4 defines the fsck interval at all


Please paste your /etc/fstab file. If it has 0 0 as the last two fields, 
then, of course, systemd will not call
fsck. If there are different numbers there, sure, let's debug.

Also, now the entity that is supposed to check your root filesystem is dracut. 
Are you using it? Does the problem
go away if you regenerate your initramfs?


i know how to deal with fstab and column 6 is not zero as well
as the initramfs is regenrated all the time because kernel
updates which are *the reason* for reboots on servers at all

what disturbs me is they warning about touch /forcefsck while
it's currently the *only* option to trigger a recommended fsck
at boot on a remote-server (and no add kernel params for that
in the grub-config and remove them after is not a sane way for
sysadmins maintaining 10,20,30 remote servers)

UUID=209aeed4-95bd-4eb0-bdfa-fb346b603ce9 /boot ext4 defaults 0 1
UUID=22f62744-8fd7-4090-aff8-b35ef38b4b74 / ext4
defaults,commit=5,inode_readahead_blks=128,noatime,nodiratime,noquota 0 1
UUID=0b95905b-02c5-444b-af9e-7615cabebb38 /mnt/data ext4
defaults,commit=5,inode_readahead_blks=128,noatime,nodiratime,noquota,nosuid  0 
2



OK.

Let's try eliminating some more reasons why fsck can be skipped.

1. The root filesystem is mounted read-write at boot [but note that this 
doesn't explain failures to check other filesystems]

2. The generator did not run for some unknown reason.
3. Some other error that got hopefully logged.

Could you please attach the output of:

ls -lR /run/systemd/generator
journalctl -b

Also, could you please try replacing some non-critical UUID=... lines 
(e.g. for /boot) in your fstab by direct device references of the form 
/dev/disk/by-uuid/209aeed4-95bd-4eb0-bdfa-fb346b603ce9 or even /dev/mdX, 
just to see if that's UUID who triggers the bug for you? To avoid 
getting an inaccessible server if that misfires, you can also append 
nofail to the options for /boot.


--
Alexander E. Patrakov
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] no fsck at boot

2014-06-09 Thread Reindl Harald


Am 09.06.2014 21:26, schrieb Alexander E. Patrakov:
 10.06.2014 00:57, Reindl Harald wrote:

 Am 09.06.2014 20:45, schrieb Alexander E. Patrakov:
 10.06.2014 00:04, Reindl Harald wrote:

 Am 09.06.2014 17:05, schrieb Colin Guthrie:
 'Twas brillig, and Reindl Harald at 08/06/14 13:59 did gyre and gimble:
 touch /forcefsck leads in deprecated warnings but in fact at least
 on Fedora 19 *you need it* because the fsck don't happen otherwise

 for sure, the last reboot of the machine below complaind too
 so why don't it happen at boot?

 Via what mechanism did you trigger the fsck at boot (other than
 /forcefsck)? e.g. did you pass fsck.mode=force on the kernel command
 line (as the deprecated warning suggests)? Did this not trigger things
 correctly?

 uhm you stripped the relevant part of my message

 * the filesystem has reached the time for next fsck
 * the kernel says it's time
 * before systemd did happended automatically
 * that is why ext4 defines the fsck interval at all

 Please paste your /etc/fstab file. If it has 0 0 as the last two fields, 
 then, of course, systemd will not call
 fsck. If there are different numbers there, sure, let's debug.

 Also, now the entity that is supposed to check your root filesystem is 
 dracut. Are you using it? Does the problem
 go away if you regenerate your initramfs?

 i know how to deal with fstab and column 6 is not zero as well
 as the initramfs is regenrated all the time because kernel
 updates which are *the reason* for reboots on servers at all

 what disturbs me is they warning about touch /forcefsck while
 it's currently the *only* option to trigger a recommended fsck
 at boot on a remote-server (and no add kernel params for that
 in the grub-config and remove them after is not a sane way for
 sysadmins maintaining 10,20,30 remote servers)

 UUID=209aeed4-95bd-4eb0-bdfa-fb346b603ce9 /boot ext4 defaults 0 1
 UUID=22f62744-8fd7-4090-aff8-b35ef38b4b74 / ext4
 defaults,commit=5,inode_readahead_blks=128,noatime,nodiratime,noquota 0 1
 UUID=0b95905b-02c5-444b-af9e-7615cabebb38 /mnt/data ext4
 defaults,commit=5,inode_readahead_blks=128,noatime,nodiratime,noquota,nosuid 
  0 2

 
 OK.
 
 Let's try eliminating some more reasons why fsck can be skipped.
 
 1. The root filesystem is mounted read-write at boot [but note that this 
 doesn't explain failures to check other
 filesystems]
 2. The generator did not run for some unknown reason.
 3. Some other error that got hopefully logged.
 
 Could you please attach the output of:
 
 ls -lR /run/systemd/generator
 journalctl -b
 
 Also, could you please try replacing some non-critical UUID=... lines (e.g. 
 for /boot) in your fstab by direct
 device references of the form 
 /dev/disk/by-uuid/209aeed4-95bd-4eb0-bdfa-fb346b603ce9 or even /dev/mdX, just 
 to see
 if that's UUID who triggers the bug for you? To avoid getting an inaccessible 
 server if that misfires, you can also
 append nofail to the options for /boot

systemd even pretends it does the fsck, i have nothing more to say
on that topic except remove the deprecation warning and output
the volume-label at least additionally to the UUID

[root@localhost:~]$ journalctl -b | grep File System
Jun 08 14:51:15 localhost systemd[1]: Starting Local File Systems.
Jun 08 14:51:15 localhost systemd[1]: Reached target Local File Systems.
Jun 08 14:51:16 localhost systemd[1]: Starting Initrd Root File System.
Jun 08 14:51:16 localhost systemd[1]: Reached target Initrd Root File System.
Jun 08 14:51:16 localhost systemd[1]: Starting Initrd File Systems.
Jun 08 14:51:16 localhost systemd[1]: Reached target Initrd File Systems.
Jun 08 14:51:19 localhost systemd[1]: Started File System Check on Root Device.
Jun 08 14:51:19 localhost systemd[1]: Starting Remount Root and Kernel File 
Systems...
Jun 08 14:51:19 localhost systemd[1]: Started Remount Root and Kernel File 
Systems.
Jun 08 14:51:19 localhost systemd[1]: Starting Local File Systems (Pre).
Jun 08 14:51:19 localhost systemd[1]: Reached target Local File Systems (Pre).
Jun 08 14:51:20 localhost systemd[1]: Starting File System Check on
/dev/disk/by-uuid/209aeed4-95bd-4eb0-bdfa-fb346b603ce9...
Jun 08 14:51:20 localhost systemd[1]: Started File System Check on
/dev/disk/by-uuid/209aeed4-95bd-4eb0-bdfa-fb346b603ce9.
Jun 08 14:51:20 localhost systemd[1]: Starting File System Check on
/dev/disk/by-uuid/0b95905b-02c5-444b-af9e-7615cabebb38...
Jun 08 14:51:21 localhost systemd[1]: Started File System Check on
/dev/disk/by-uuid/0b95905b-02c5-444b-af9e-7615cabebb38.
Jun 08 14:51:21 localhost systemd[1]: Starting Local File Systems.
Jun 08 14:51:21 localhost systemd[1]: Reached target Local File Systems.

[root@localhost:~]$ journalctl -b | grep e2fsck
Jun 08 14:51:19 localhost kernel: EXT4-fs (md127): warning: checktime reached, 
running e2fsck is recommended
Jun 08 14:51:20 localhost kernel: EXT4-fs (md126): warning: checktime reached, 
running e2fsck is recommended
Jun 08 14:51:21 localhost kernel: EXT4-fs (md125): warning: 

Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Reindl Harald


Am 09.06.2014 21:07, schrieb Leonid Isaev:
 On Mon, Jun 09, 2014 at 08:08:43PM +0200, Reindl Harald wrote:
 all the decades before crond did run fine, logs exactly what
 you need to know if /var/log/secure and /var/log/crond
 without writing *hundret thousands* loglines all day long
 on machines with a lot of cronjobs

 If you don't need them -- OK, but don't speak for the others. Why systemd
 should be treated any differently than other programs?

because Lennart to ospeaks for others the way he closed
that bugreport? why can't there be at least a config
option to disable creating them at all?

because other programs *never ever* procude *that lot* of
loglines all day long - look at the simple calculation
in the bugreport

on our production infrastrcuture these messages would be
*a lot* more than all other logs summarized

*and* they are spitted to /var/log/messages to make things worst

 But why can't you write a syslog filter which uses facility as well as program
 name? So if you believe that systemd-generated messages are useless, drop them

because you *can not* distinguish between *that* user messages
and system message sbecause they have systemd as program name
common, the PID changes and you don't want to drop *system
messages* from systemd

if they would contain a unique string / prefix to distinguish
from cronjobs triggered messages i would have written a rsyslog
filter as for a lot of other noise long ago

however - the *large amount* of that messages even if you
drop them consumes useless ressources on virtualization
clusters and blow up the systemd-journal



signature.asc
Description: OpenPGP digital signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Leonid Isaev
On Mon, Jun 09, 2014 at 09:19:20PM +0200, Reindl Harald wrote:
 [...]
 
 on our production infrastrcuture these messages would be
 *a lot* more than all other logs summarized
 
 *and* they are spitted to /var/log/messages to make things worst
 
  But why can't you write a syslog filter which uses facility as well as 
  program
  name? So if you believe that systemd-generated messages are useless, drop 
  them
 
 because you *can not* distinguish between *that* user messages
 and system message sbecause they have systemd as program name
 common, the PID changes and you don't want to drop *system
 messages* from systemd

So, systemd starts certain things on _any_ user login: be it a real user, or
a daemon. However, if you already have logs from the daemon (cron) or a login
program (login), why keep systemd-generated messages? I'd put them in a
separate file...

 
 if they would contain a unique string / prefix to distinguish

Do you have something concrete in mind?

 from cronjobs triggered messages i would have written a rsyslog
 filter as for a lot of other noise long ago
 
 however - the *large amount* of that messages even if you
 drop them consumes useless ressources on virtualization
 clusters and blow up the systemd-journal
 

If resources are an issue, don't use the journal. In my experience, it consumes
~4x space compared to syslog (on a firewall machine, after 2 months uptime)...

-- 
Leonid Isaev
GPG fingerprints: DA92 034D B4A8 EC51 7EA6  20DF 9291 EE8A 043C B8C4
  C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pgpkW9mGeOXcS.pgp
Description: PGP signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Reindl Harald

Am 09.06.2014 22:32, schrieb Leonid Isaev:
 On Mon, Jun 09, 2014 at 09:19:20PM +0200, Reindl Harald wrote:
 [...]

 on our production infrastrcuture these messages would be
 *a lot* more than all other logs summarized

 *and* they are spitted to /var/log/messages to make things worst

 But why can't you write a syslog filter which uses facility as well as 
 program
 name? So if you believe that systemd-generated messages are useless, drop 
 them

 because you *can not* distinguish between *that* user messages
 and system message sbecause they have systemd as program name
 common, the PID changes and you don't want to drop *system
 messages* from systemd
 
 So, systemd starts certain things on _any_ user login: be it a real user, or
 a daemon. However

* why do it need to do that much stuff
* why can't it keep that stuff long-running

you have already /usr/lib/systemd/systemd --user and (sd-pam)
processes for every userid ever started a cronjob running all
the time - so why flood the logs every minute again?

 if you already have logs from the daemon (cron) or a login
 program (login), why keep systemd-generated messages? I'd put them in a
 separate file...

if i can put them in a seperate file i can filter them out

 if they would contain a unique string / prefix to distinguish
 
 Do you have something concrete in mind?

systemd-user: or whatever

that would also make clear the we *do not* start all sorts
of targets, the flooding log in misleading anyways

that below is just *not true* from the users point of view

Jun  9 22:36:07 rawhide systemd[1]: Starting User Manager for UID 0...
Jun  9 22:36:07 rawhide systemd[607]: Starting Paths.
Jun  9 22:36:07 rawhide systemd[607]: Reached target Paths.
Jun  9 22:36:07 rawhide systemd[607]: Starting Timers.
Jun  9 22:36:07 rawhide systemd[607]: Reached target Timers.
Jun  9 22:36:07 rawhide systemd[607]: Starting Sockets.
Jun  9 22:36:07 rawhide systemd[607]: Reached target Sockets.
Jun  9 22:36:07 rawhide systemd[607]: Starting Basic System.
Jun  9 22:36:07 rawhide systemd[607]: Reached target Basic System.
Jun  9 22:36:07 rawhide systemd[607]: Starting Default.
Jun  9 22:36:07 rawhide systemd[607]: Reached target Default.
Jun  9 22:36:07 rawhide systemd[607]: Startup finished in 9ms.
Jun  9 22:36:07 rawhide systemd[1]: Started User Manager for UID 0.

 from cronjobs triggered messages i would have written a rsyslog
 filter as for a lot of other noise long ago

 however - the *large amount* of that messages even if you
 drop them consumes useless ressources on virtualization
 clusters and blow up the systemd-journal
 
 If resources are an issue, don't use the journal. In my experience, it 
 consumes
 ~4x space compared to syslog (on a firewall machine, after 2 months uptime)...

i don't use the journal, the configuration of journald is like below
the log-flood makes things even worser because it leads to early
rotation and purges systemctl status whatever.service informations
by purging the memory-journal

if it comes to ressource usage:

all that dropped messages (if you could drop/filter them) are
producing data and overhead in general, only because you manage
to not see things that don't mean they produce no overhead

[root@rawhide ~]# cat /etc/systemd/journald.conf
[Journal]
Storage=volatile
Compress=no
RateLimitInterval=10s
RateLimitBurst=500
RuntimeMaxUse=15M



signature.asc
Description: OpenPGP digital signature
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] no fsck at boot

2014-06-09 Thread Colin Guthrie
'Twas brillig, and Reindl Harald at 09/06/14 19:57 did gyre and gimble:
 what disturbs me is they warning about touch /forcefsck while
 it's currently the *only* option to trigger a recommended fsck
 at boot on a remote-server (and no add kernel params for that
 in the grub-config and remove them after is not a sane way for
 sysadmins maintaining 10,20,30 remote servers)

As has been mentioned numerous times, these warnings are there because
if you need to use something to force an fsck (this current problem not
withstanding) then modifying the suspect filesystem in question is a
really bad idea! The warnings are in place to cover this use case and to
discourage it as a first port of call without giving it proper thought.

In this particular case where you are actually (presumably) quite happy
with the filesystem, then using this trigger mechanism is perfectly fine
and you can ignore the warnings happy in the knowledge that you know better.

Of course there are ways (extensions or patches I forget which) to tell
grub to do something one-time only (IIRC there is a system called
rebootin which does this). Such an approach would achieve the same
simplicity you crave with the touch approach but via the kernel command
line trigger instead. This would mean you wouldn't have to manually edit
and later restore your grub command line each time and, assuming /boot
is separate from /, you could trigger all this while / is mounted ro.

Col

-- 

Colin Guthrie
gmane(at)colin.guthr.ie
http://colin.guthr.ie/

Day Job:
  Tribalogic Limited http://www.tribalogic.net/
Open Source:
  Mageia Contributor http://www.mageia.org/
  PulseAudio Hacker http://www.pulseaudio.org/
  Trac Hacker http://trac.edgewall.org/
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] Soliciting feedback for golang bindings to the systemd journal C API

2014-06-09 Thread David Timothy Strauss
The CoreOS crew has already done most of this work by writing a native
Go implementation (rather than wrapping the C APIs).
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [PATCH] tmpfiles: Fix journal file permissions broken by a606871

2014-06-09 Thread Greg KH
On Mon, Jun 09, 2014 at 08:37:18PM +0200, Jan Alexander Steffens wrote:
 On Mon, Jun 9, 2014 at 8:30 PM, Greg KH gre...@linuxfoundation.org wrote:
  Why do you think they should not be?
 
 Executability is just nonsense, while world-readability goes against
 the systemd-journald manpage, which claims that, by default, only
 users in the systemd-journal system group can read journals not their
 own.
 
  What type of system did you test this change on?  Did you try a box with
  no journal at all and have it create one on startup that can then be
  read by all users?
 
 Just my laptop. systemd-tmpfiles kept overwriting the modes of the
 journal files to 0755, even though they should be 0640 to match the
 above claim.

Ok, let me test this on a system that previously was requring this
change later tonight and let you know if it still all works properly for
me...

thanks,

greg k-h
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [PATCH v5 12/14] autoconf: xen: enable explicit preference option for xenstored preference

2014-06-09 Thread Luis R. Rodriguez
On Wed, Jun 04, 2014 at 07:52:56PM -0700, Cameron Norman wrote:
 On Wed, Jun 4, 2014 at 5:31 PM, Luis R. Rodriguez mcg...@suse.com wrote:
  On Sun, Jun 01, 2014 at 08:15:47AM +0200, Lennart Poettering wrote:
  On Fri, 30.05.14 01:29, Luis R. Rodriguez (mcg...@suse.com) wrote:
 
   I'm cc'ing a few security folks as I'd appreciate review on the ideas 
   here,
   in particular that of a launcher idea on system to replace alternatives 
   on the
   ExecStart= line of a systemd service unit file, alternative ideas are of
   course welcomed. I'm also Cc'ing systemd-devel as this subject was 
   reviewed
   a little while ago with nothing concrete being recommended but instead a 
   few
   options being now archived as possibilities. I'm looking for a bit wider
   review of the approaches and recomendations.
  
   Some general background for non xen folks: old xen requires the launch of
   a daemon which implements supports of the xenstore, which is the database
   that xen uses for information about guests / dom0. There are two 
   supported
   daemons, xenstored (C version) and oxenstored (Ocaml version) but they 
   do the
   same thing. Right now old init lets you override which one you pick 
   through
   an environment variable on /etc/{sysconfig,default}/xencommons, the 
   script
   will use the appropriate on there. Systemd doesn't let you use variables 
   on
   the ExecStart line of a service unit file so alternatives are required.
  
   The reason I'm being very careful here this could set a precedent and at
   least for the launcher idea it'd require the usage of getenv() and 
   execve(),
   and secure alternatives for these (secure_getenv(), execve_nosecurity())
   have either been merged or suggested before for Linux. The systemd 
   discussion
   is only specific to Linux but if we have a launcher we could consider it 
   for
   other supported OSes. All that said I'd like proper review of the 
   security
   implications of *all* strategies but obviously in particular the launcher
   idea. I want to tread carefuly before setting precedents.
 
  You can also just invoke a shell script from ExecStart=. I mean, we try
  to deemphesize them in the boot process, but there's nothing wrong with
  using shell, if you need to parse shell configuraiton fragments and just
  want to execute on ot another program...
 
  I tried this and it didn't work given that systemd expects sd_notify()
  to be called from the parent process, in this case the shell script.
 
 Just use exec before the daemon command. I am pretty certain it can be
 just like this:
 
 ExecStart=/bin/sh -c exec $XENSTORED
 
 xenstored then has the same PID as the sh process, and $NOTIFY_SOCKET
 works just fine.

Actually this does work on a test unit I just built. I'll proceed with
this approach since I haven't heard back from others and I think
this is the best approach now.

  Luis
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] [PATCH] tmpfiles: Fix journal file permissions broken by a606871

2014-06-09 Thread Greg KH
On Mon, Jun 09, 2014 at 08:05:35PM +0200, Jan Alexander Steffens (heftig) wrote:
 They shouldn't be executable nor world-readable.
 ---
  tmpfiles.d/systemd.conf | 10 ++
  1 file changed, 6 insertions(+), 4 deletions(-)
 
 diff --git a/tmpfiles.d/systemd.conf b/tmpfiles.d/systemd.conf
 index c5910f8..d6c4da3 100644
 --- a/tmpfiles.d/systemd.conf
 +++ b/tmpfiles.d/systemd.conf
 @@ -25,7 +25,9 @@ d /run/systemd/netif 0755 systemd-network systemd-network -
  d /run/systemd/netif/links 0755 systemd-network systemd-network -
  d /run/systemd/netif/leases 0755 systemd-network systemd-network -
  
 -m /var/log/journal 2755 root systemd-journal - -
 -Z /var/log/journal/%m 2755 root systemd-journal - -
 -m /run/log/journal 2755 root systemd-journal - -
 -Z /run/log/journal/%m 2755 root systemd-journal - -
 +z /var/log/journal 2755 root systemd-journal - -
 +z /var/log/journal/%m 2755 root systemd-journal - -
 +z /var/log/journal/%m/* 0640 root systemd-journal - -
 +z /run/log/journal 2755 root systemd-journal - -
 +z /run/log/journal/%m 2755 root systemd-journal - -
 +z /run/log/journal/%m/* 0640 root systemd-journal - -

I've tested this out and it seems to work for me, no objection from me
for this to be applied, thanks.

greg k-h
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


Re: [systemd-devel] How to quiet cron sessions logging with systemd-212?

2014-06-09 Thread Mike Gilbert
On Mon, Jun 9, 2014 at 4:42 PM, Reindl Harald h.rei...@thelounge.net wrote:

 Am 09.06.2014 22:32, schrieb Leonid Isaev:
 On Mon, Jun 09, 2014 at 09:19:20PM +0200, Reindl Harald wrote:
 [...]

 on our production infrastrcuture these messages would be
 *a lot* more than all other logs summarized

 *and* they are spitted to /var/log/messages to make things worst

 But why can't you write a syslog filter which uses facility as well as 
 program
 name? So if you believe that systemd-generated messages are useless, drop 
 them

 because you *can not* distinguish between *that* user messages
 and system message sbecause they have systemd as program name
 common, the PID changes and you don't want to drop *system
 messages* from systemd

 So, systemd starts certain things on _any_ user login: be it a real user, 
 or
 a daemon. However

 * why do it need to do that much stuff
 * why can't it keep that stuff long-running

 you have already /usr/lib/systemd/systemd --user and (sd-pam)
 processes for every userid ever started a cronjob running all
 the time - so why flood the logs every minute again?


Now that you mention it, you can cut down on a lot of the log spam by
enabling linger for root and other users which run cron jobs.

loginctl enable-linger user

This will keep a systemd user instance running so that a new one is
not spawned every time cron wakes up.
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel


[systemd-devel] HandleLidSwitch v204

2014-06-09 Thread Justin Brown
I need to run Fedora 19 (systemd 204) for a particular piece of
software on a laptop, and I'm having trouble disabling suspend when I
shut the screen. My default target is multi-user.target, and the
laptop is not connected to any external monitors. I made the following
change to /etc/systemd/logind.conf and rebooted:

HandleLidSwitch=ignore

However, the systemd is still suspending. What else do I need to
change to disable this behavior?

Thanks,
Justin
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel