On 2014-12-10 22:37, Lennart Poettering wrote:
> On Tue, 09.12.14 18:26, Lennart Poettering (lenn...@poettering.net) wrote:
>
> Przemyslaw,
>
>>> +++ b/units/u...@.service.m4.in
>>> @@ -0,0 +1,23 @@
>>> +# This file is part of systemd.
>>> +#
>>> +# systemd is free software; you can redistribut
On Tue, 09.12.14 18:26, Lennart Poettering (lenn...@poettering.net) wrote:
Przemyslaw,
> > +++ b/units/u...@.service.m4.in
> > @@ -0,0 +1,23 @@
> > +# This file is part of systemd.
> > +#
> > +# systemd is free software; you can redistribute it and/or modify it
> > +# under the terms of the GN
On Tue, 09.12.14 12:17, Przemyslaw Kedzierski (p.kedzier...@samsung.com) wrote:
> When dbus client connects to systemd-bus-proxyd through
> Unix domain socket proxy takes client's smack label and sets for itself.
>
> It is done before and independent of dropping privileges.
>
> The reason of suc
When dbus client connects to systemd-bus-proxyd through
Unix domain socket proxy takes client's smack label and sets for itself.
It is done before and independent of dropping privileges.
The reason of such soluton is fact that tests of access rights
performed by lsm may take place inside kernel,
On Mon, 01.12.14 11:47, Przemyslaw Kedzierski (p.kedzier...@samsung.com) wrote:
> Hello
> Could you take a look at my patch?
Sorry for the delay, I have a huge backlog of unreviewed patches, and
am now working through them!
Lennart
--
Lennart Poettering, Red Hat
___
On Thu, 13.11.14 18:11, Przemyslaw Kedzierski (p.kedzier...@samsung.com) wrote:
Looks pretty good, but I coudln't apply it. There's something wrong
with the patch the deletion/renaming of the service files doesn't
work. Did you create this patch with git-format-patch?
> if (is_unix) {
>
Hello
Could you take a look at my patch?
Regards
Przemyslaw Kedzierski
___
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel
When dbus client connects to systemd-bus-proxyd through
Unix domain socket proxy takes client's smack label and sets for itself.
It is done before and independent of dropping privileges.
The reason of such soluton is fact that tests of access rights
performed by lsm may take place inside kernel,
On Thu, 06.11.14 11:44, Przemyslaw Kedzierski (p.kedzier...@samsung.com) wrote:
> When dbus client connects to systemd-bus-proxyd through
> Unix domain socket proxy takes client's smack label and sets for itself.
>
> It is done before and independent of dropping privileges.
>
> The reason of suc
When dbus client connects to systemd-bus-proxyd through
Unix domain socket proxy takes client's smack label and sets for itself.
It is done before and independent of dropping privileges.
The reason of such soluton is fact that tests of access rights
performed by lsm may take place inside kernel,
10 matches
Mail list logo