<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in user@.service.m4.in</title>
    <link>http://src.iws.cs.ovgu.de/source/rss/systemd/units/user@.service.m4.in</link>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2005</copyright>
    <generator>Java</generator>
    <item>
        <title>Set user@.service TasksMax=infinity
    
    The user manager is still limited by its parent slice user-UID.slice,
    which defaults to 4096 tasks. However, it no longer has an additional
    limit of 512 tasks.
    
    Fixes #1955.</title>
        <description>/systemd/units/user@.service.m4.in - 8c277ddd275607a17be4e7d322158e8e17004daf</description>
        <pubDate></pubDate>
        <dc:creator>Jan Alexander Steffens (heftig) &lt;jan.steffens@gmail.com&gt;</dc:creator>
    </item>

    <item>
        <title>build-sys: remove commented-out m4 from user@.service
    
    Otherwise this actually remains in the generated unit in /usr/lib.
    
    If you want to keep it commented out, a m4-compatible way would be:
    
        m4_ifdef(`HAVE_SMACK',
        dnl Capabilities=cap_mac_admin=i
        dnl SecureBits=keep-caps
        )</title>
        <description>/systemd/units/user@.service.m4.in - cf5a8997515dc5fc96f34385ad153e4b213b4705</description>
        <pubDate></pubDate>
        <dc:creator>Mantas Mikulėnas  &lt;grawity@gmail.com&gt;</dc:creator>
    </item>

    <item>
        <title>build-sys: turn off SMACK capabilities stuff for now, since it is incompatible with nspawn</title>
        <description>/systemd/units/user@.service.m4.in - 1f3ba2bb4f65b56ee77b098d8ab34766db55cf0a</description>
        <pubDate></pubDate>
        <dc:creator>Lennart Poettering &lt;lennart@poettering.net&gt;</dc:creator>
    </item>

    <item>
        <title>bus-proxy: cloning smack label
    
    When dbus client connects to systemd-bus-proxyd through
    Unix domain socket proxy takes client's smack label and sets for itself.
    
    It is done before and independent of dropping privileges.
    
    The reason of such soluton is fact that tests of access rights
    performed by lsm may take place inside kernel, not only
    in userspace of recipient of message.
    
    The bus-proxyd needs CAP_MAC_ADMIN to manipulate its label.
    
    In case of systemd running in system mode, CAP_MAC_ADMIN
    should be added to CapabilityBoundingSet in service file of bus-proxyd.
    
    In case of systemd running in user mode ('systemd --user')
    it can be achieved by addition
    Capabilities=cap_mac_admin=i and SecureBits=keep-caps
    to user@.service file
    and setting cap_mac_admin+ei on bus-proxyd binary.</title>
        <description>/systemd/units/user@.service.m4.in - dd5ae4c36c89da5dbe8d1628939b26c00db98753</description>
        <pubDate></pubDate>
        <dc:creator>Przemyslaw Kedzierski &lt;p.kedzierski@samsung.com&gt;</dc:creator>
    </item>

    <item>
        <title>build-sys: fix generation of user@.service</title>
        <description>/systemd/units/user@.service.m4.in - 4acbce79798347cddf1e1d42e9be571e0a041873</description>
        <pubDate></pubDate>
        <dc:creator>Zbigniew Jędrzejewski-Szmek  &lt;zbyszek@in.waw.pl&gt;</dc:creator>
    </item>

</channel>
</rss>

