https://bugzilla.novell.com/show_bug.cgi?id=809119 https://bugzilla.novell.com/show_bug.cgi?id=809119#c2 --- Comment #2 from Jiří Suchomel <jsuchome@suse.com> 2013-03-13 11:38:22 UTC --- OK, few tries. How can I know about SYSTEMCTL_OPTIONS? It is not among environment variables, if that was the question. systemctl list-jobs JOB UNIT TYPE STATE 1 multi-user.target start waiting 53 YaST2-Se...-Stage.service start running 56 systemd-...ead-done.timer start waiting 57 YaST2-Firstboot.service start waiting 58 systemd-...nlevel.service start waiting 60 SuSEfire...2_init.service start waiting 88 getty.target start waiting 89 getty@tty1.service start waiting 103 SuSEfirewall2.service start waiting 9 jobs listed. linux-xfmo:~ # dmesg | grep systemd [ 1.819035] systemd-udevd[94]: starting version 195 [ 4.987240] systemd[1]: systemd 195 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ; suse) [ 4.987473] systemd[1]: Detected virtualization 'oracle'. [ 5.242554] systemd[1]: Inserted module 'autofs4' [ 5.258985] systemd[1]: Set hostname to <linux.site>. [ 5.908160] systemd[1]: Starting Forward Password Requests to Wall Directory Watch. [ 5.908333] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [ 5.908372] systemd[1]: Starting Syslog Socket. [ 5.908681] systemd[1]: Listening on Syslog Socket. [ 5.908693] systemd[1]: Starting Remote File Systems. [ 5.908930] systemd[1]: Reached target Remote File Systems. [ 5.908945] systemd[1]: Started Collect Read-Ahead Data. [ 5.908953] systemd[1]: Started Replay Read-Ahead Data. [ 5.908985] systemd[1]: Starting /dev/initctl Compatibility Named Pipe. [ 5.909394] systemd[1]: Listening on /dev/initctl Compatibility Named Pipe. [ 5.909405] systemd[1]: Starting Delayed Shutdown Socket. [ 5.909678] systemd[1]: Listening on Delayed Shutdown Socket. [ 5.909706] systemd[1]: Starting Encrypted Volumes. [ 5.909981] systemd[1]: Reached target Encrypted Volumes. [ 5.910202] systemd[1]: Starting udev Kernel Socket. [ 5.910455] systemd[1]: Listening on udev Kernel Socket. [ 5.910591] systemd[1]: Starting udev Control Socket. [ 5.910978] systemd[1]: Listening on udev Control Socket. [ 5.911023] systemd[1]: Starting Arbitrary Executable File Formats File System Automount Point. [ 5.911571] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [ 5.911583] systemd[1]: Expecting device dev-disk-by\x2did-ata\x2dVBOX_HARDDISK_VB3bd73e29\x2d014feeb8\x2dpart1.device... [ 5.911745] systemd[1]: Starting Journal Socket. [ 5.912104] systemd[1]: Listening on Journal Socket. [ 5.928100] systemd[1]: Starting Load Kernel Modules... [ 5.937887] systemd[1]: Starting Setup Virtual Console... [ 5.946216] systemd[1]: Mounting POSIX Message Queue File System... [ 5.973137] systemd[1]: Started Set Up Additional Binary Formats. [ 5.973298] systemd[1]: Mounting Huge Pages File System... [ 5.979613] systemd[1]: Starting Create dynamic rule for /dev/root link... [ 5.990823] systemd[1]: Starting Journal Service... [ 5.999782] systemd[1]: Started Journal Service. [ 6.002425] systemd[1]: Starting LSB: Set default boot entry if called... [ 6.010511] systemd[1]: Started File System Check on Root Device. [ 6.010570] systemd[1]: Starting Remount Root and Kernel File Systems... [ 6.025496] systemd[1]: Started Load Kernel Modules. [ 6.156696] systemd[1]: Starting Apply Kernel Variables... [ 6.162704] systemd[1]: Mounted FUSE Control File System. [ 6.162823] systemd[1]: Mounted Configuration File System. [ 7.463253] systemd-journald[210]: Received SIGUSR1 [ 8.221902] systemd-udevd[261]: starting version 195 # systemctl status SuSEfirewall2.service SuSEfirewall2.service - SuSEfirewall2 phase 2 Loaded: loaded (/usr/lib/systemd/system/SuSEfirewall2.service; enabled) Active: inactive (dead) CGroup: name=systemd:/system/SuSEfirewall2.service Mar 13 11:11:33 linux.site systemd[1]: Stopped SuSEfirewall2 phase 2. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.