mirror of
https://github.com/systemd/systemd
synced 2026-03-14 00:54:46 +01:00
Compare commits
2 Commits
d7ffd4f334
...
8fc1efa88f
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
8fc1efa88f | ||
|
|
296c13dec4 |
@ -336,7 +336,7 @@ care should be taken to avoid naming conflicts. `systemd` (and in particular
|
|||||||
actual attempt to make use of the audit subsystem will fail. Note that
|
actual attempt to make use of the audit subsystem will fail. Note that
|
||||||
systemd's audit support is partially conditioned on these capabilities, thus
|
systemd's audit support is partially conditioned on these capabilities, thus
|
||||||
by dropping them you ensure that you get an entirely clean boot, as systemd
|
by dropping them you ensure that you get an entirely clean boot, as systemd
|
||||||
will make no attempt to use it. If you pass the capabilites to the payload
|
will make no attempt to use it. If you pass the capabilities to the payload
|
||||||
systemd will assume that audit is available and works, and some components
|
systemd will assume that audit is available and works, and some components
|
||||||
will subsequently fail in various ways. Note that once the kernel learnt
|
will subsequently fail in various ways. Note that once the kernel learnt
|
||||||
native support for container-virtualized audit, adding the capability to the
|
native support for container-virtualized audit, adding the capability to the
|
||||||
|
|||||||
@ -18,7 +18,7 @@
|
|||||||
* are matched by ports.
|
* are matched by ports.
|
||||||
* nr_ports and port_min fields specify a set of ports to match a user port
|
* nr_ports and port_min fields specify a set of ports to match a user port
|
||||||
* with.
|
* with.
|
||||||
* If nr_ports is 0, maching by port is bypassed, making that rule applicable
|
* If nr_ports is 0, matching by port is bypassed, making that rule applicable
|
||||||
* for all possible ports, e.g. [1, 65535] range. Thus a rule with
|
* for all possible ports, e.g. [1, 65535] range. Thus a rule with
|
||||||
* address_family and nr_ports equal to AF_UNSPEC and 0 correspondingly forms
|
* address_family and nr_ports equal to AF_UNSPEC and 0 correspondingly forms
|
||||||
* 'allow any' or 'deny any' cases.
|
* 'allow any' or 'deny any' cases.
|
||||||
|
|||||||
@ -158,17 +158,10 @@ static int print_status_info(StatusInfo *i) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (!isempty(i->os_pretty_name)) {
|
if (!isempty(i->os_pretty_name)) {
|
||||||
_cleanup_free_ char *formatted = NULL;
|
|
||||||
const char *t = i->os_pretty_name;
|
|
||||||
|
|
||||||
if (i->home_url) {
|
|
||||||
if (terminal_urlify(i->home_url, i->os_pretty_name, &formatted) >= 0)
|
|
||||||
t = formatted;
|
|
||||||
}
|
|
||||||
|
|
||||||
r = table_add_many(table,
|
r = table_add_many(table,
|
||||||
TABLE_STRING, "Operating System:",
|
TABLE_STRING, "Operating System:",
|
||||||
TABLE_STRING, t);
|
TABLE_STRING, i->os_pretty_name,
|
||||||
|
TABLE_SET_URL, i->home_url);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return table_log_add_error(r);
|
return table_log_add_error(r);
|
||||||
}
|
}
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user