summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-09-24util: Add test for parse_cpu_setFilipe Brandenburger
2015-09-24util: refactor cpu_set parsing into its own functionFilipe Brandenburger
Use the new code in config_parse_cpu_affinity2. Tested by modifying CPUAffinity=... setting in /etc/systemd/system.conf and reloading the daemon, then checking ^Cpus_allowed in /proc/1/status to confirm the correct CPU mask is in place.
2015-09-24Merge pull request #1377 from evverx/man-systemd-sliceLennart Poettering
man: systemd.slice: add link to cgroups api docs
2015-09-24Merge pull request #1376 from dvdhrm/hostnamed-argcLennart Poettering
hostnamed: drop redundant code
2015-09-24hostnamed: drop redundant codeDavid Herrmann
Doing argc checks once is enough enough enough enough.
2015-09-24man: systemd.slice: add link to cgroups api docsEvgeny Vereshchagin
systemd.scope and systemd.resource-control contain that link. systemd.slice should contain it too.
2015-09-24Merge pull request #1374 from olof/autoconf_gcrypt_depLennart Poettering
build-sys: only use AM_PATH_LIBGCRYPT macro if it exists
2015-09-24Merge pull request #1370 from ↵Daniel Mack
systemd-mailing-devs/1443091642-5853-1-git-send-email-brueckner@linux.vnet.ibm.com s390: add personality support
2015-09-24build-sys: only use AM_PATH_LIBGCRYPT macro if it existsOlof Johansson
If gcrypt's m4 macro files aren't installed, with this change, gcrypt will be disabled --- unless gcrypt support was explicitly requested by passing --enable-gcrypt to configure, in which case it will fail. Without this change, autoconf would fail either way with not being able to resolve AM_PATH_LIBGCRYPT.
2015-09-24s390: add personality supportHendrik Brueckner
Introduce personality support for Linux on z Systems to run particular services with a 64-bit or 31-bit personality.
2015-09-24Merge pull request #1366 from pocek/sd-event-fixesLennart Poettering
sd-event: fix prepare priority queue comparison function
2015-09-24Merge pull request #1332 from thom311/masterTom Gundersen
sd-dhcp6: ensure canceling lease timers and refactor setting lease
2015-09-24Merge pull request #1356 from pfl/dhcp6_suspendTom Gundersen
DHCPv6 suspend fixes
2015-09-24sd-event: fix prepare priority queue comparison functionKrzysztof Kotlenga
Otherwise a disabled event source can get swapped with an enabled one and cause a severe sd-event malfunction. http://lists.freedesktop.org/archives/systemd-devel/2015-September/034356.html
2015-09-23Merge pull request #1363 from msekletar/ldconfigLennart Poettering
units: run ldconfig also when cache is unpopulated
2015-09-23Merge pull request #1365 from floppym/kcmpLennart Poettering
Add fallback for kcmp() in case __NR_kcmp is undefined
2015-09-23Add fallback for kcmp() in case __NR_kcmp is undefinedMike Gilbert
IA64 is missing this syscall as of linux-4.2. This works around it until the necessary kernel patch gets merged.
2015-09-23units: run ldconfig also when cache is unpopulatedMichal Sekletar
2015-09-23Merge pull request #1349 from dvdhrm/sync-pamLennart Poettering
core: make setup_pam() synchronous
2015-09-23Merge pull request #1358 from jengelh/masterDaniel Mack
build: remove AC_FUNC_MALLOC
2015-09-23Merge pull request #1357 from again4you/devel/fix_smack_sd_pam_#2Lennart Poettering
exec: fix the wrong SMACK labeling of (sd-pam) daemon v3
2015-09-23Merge pull request #1355 from evverx/systemd-run-manLennart Poettering
man: systemd-run: run bash with --send-sighup
2015-09-23Merge pull request #1345 from georgmu/fix_accept_raLennart Poettering
Set accept_ra to "2" if enabled in config
2015-09-23build: remove AC_FUNC_MALLOCJan Engelhardt
What is the rationale to have AC_FUNC_MALLOC? It does not actually abort the configure run if an "unsuitable" malloc was found, and instead just replaces malloc by rpl_malloc, for which systemd however has no definition, either. Remove the call.
2015-09-23man: systemd-run: run bash with --send-sighupEvgeny Vereshchagin
When bash is interactive it ignores SIGTERM. SIGHUP indicates to bash that the connection has been severed. `systemctl stop` doesn't wait TimeoutStopSec secs.
2015-09-23mising: add __NR_memfd_create syscall number for s390Hendrik Brueckner
2015-09-23exec: move mac_smack_apply_pid() and setup_pam() to same condition blockSangjung Woo
This cleans up exec_child() function by moving mac_smack_apply_pid() and setup_pam() to the same condition block, since both of them have the same condition (i.e params->apply_permissions). It improves readability without changing its operation.
2015-09-23networkd: Wait for DHCPv6 before announcing link configuredPatrik Flykt
Wait until DHCPv6 has acquired an address before announcing the link to be configured. Log the DHCPv6 lease lost event.
2015-09-23sd-dhcp6-client: Properly handle DHCPv6 client restart after resumePatrik Flykt
Whenever a Router Advertisement is received, dhcp6_configure() will be called. A Router Advertisment can also instruct DHCPv6 to start acquiring IPv6 addresses in manged mode, if it previously was handling only other information. As an Router Advertisment is also received after the DHCPv6 client has resumed from a suspend, fix the function not to assume DHCPv6 is currently running, but instead try to restart it. Handle sd_dhcp6_start() returning -EALREADY indicating that the DHCPv6 client was already running. Collect all client unrefs in one place to unclutter the error handling. Fixes https://github.com/systemd/systemd/issues/963
2015-09-23test-dhcp6-client: Update test case due to changed semanticsPatrik Flykt
Update the test case to stop the ongoing Information Request exchange before unsetting its state. To keep the test case callback verification simpler, temporarily unset the callback function before stopping.
2015-09-23sd-dhcp6-client: Prevent setting and restarting of DHCPv6 clientPatrik Flykt
Prevent modifications to index, MAC address, DUID and Information Request while the DHCPv6 client is running. Require the DHCPv6 client to be stopped first instead of always unconditionally restarting it if the caller calls sd_dhcp6_client_start() more than once. With this change, handling of for example incoming Router Advertisments becomes much easier.
2015-09-23exec: call setup_pam() after SMACK labelingSangjung Woo
When 'SmackProcessLabel=' is used in user@.service file, all processes launched in systemd user session should be labeled as the designated name of 'SmackProcessLabel' directive. However, if systemd has its own smack label using '--with-smack-run-label' configuration, '(sd-pam)' is labeled as the specific name of '--with-smack-run-label'. If 'SmackProcessLabel=' is used in user@.service file without '--with-smack-run-label' configuration, (sd-pam) is labeled as "_" since systemd (i.e. pid=1) is labeled as "_". This is mainly because setup_pam() function is called before applying smack label to child process. This patch fixes it by calling setup_pam() after setting the smack label.
2015-09-23Merge pull request #1341 from filbranden/werror2David Herrmann
Check behavior of -Werror=shadow before deciding to use it
2015-09-23update NEWSDaniel Mack
2015-09-23Merge pull request #1339 from alkino/masterDaniel Mack
Hook more properties for transient units
2015-09-23Set accept_ra to "2" if enabled in configGeorg Müller
This causes the kernel to accept router advertisments even if ip forwarding is enabled for this interface. This fixes #1340.
2015-09-23Hook more properties for transient unitsNicolas Cornu
systemd-run can now launch units with WorkingDirectory, RootDirectory set.
2015-09-23core: make setup_pam() synchronousDavid Herrmann
If we spawn a unit with a non-empty 'PAMName=', we fork off a child-process _inside_ the unit, known as '(sd-pam)', which watches the session. It waits for the main-process to exit and then finishes it via pam_close_session(3). However, the '(sd-pam)' setup is highly asynchronous. There is no guarantee that process gets spawned before we finish the unit setup. Therefore, there might be a root-owned process inside of the cgroup of the unit, thus causing cg_migrate() to error-out with EPERM. This patch makes setup_pam() synchronous and waits for the '(sd-pam)' setup to finish before continuing. This guarantees that setresuid(2) was at least tried before we continue with the child setup of the real unit. Note that if setresuid(2) fails, we already warn loudly about it. You really must make sure that you own the passed user if using 'PAMName='. It seems very plausible to rely on that assumption.
2015-09-23Merge pull request #1346 from dvdhrm/user-shutdownLennart Poettering
core: fix shutdown of --user
2015-09-23Merge pull request #1348 from larsu/masterLennart Poettering
busctl: also monitor messages to SERVICE arguments
2015-09-23busctl: also monitor messages to SERVICE argumentsLars Uebernickel
Add a 'destination' match rule for every SERVICE argument in addition to the 'sender' rule. This is consistent with busctl(1), which documents monitor as dumping "messages to or from this peer".
2015-09-22core: fix shutdown of --userDavid Herrmann
Shutting down a user session currently fails with: Sep 22 22:35:38 david-t2 systemd[640]: Reached target Shutdown. Sep 22 22:35:38 david-t2 systemd[640]: Starting Exit the Session... Sep 22 22:35:38 david-t2 systemd[640]: Received SIGRTMIN+24 from PID 659 (kill). Sep 22 22:35:38 david-t2 systemd[640]: Shutting down. Sep 22 22:35:38 david-t2 systemd[640]: Not executed by init (PID 1). Sep 22 22:35:38 david-t2 systemd[640]: Critical error while doing system shutdown: Operation not permitted This is a regression from: commit 287419c119ef961db487a281162ab037eba70c61 Author: Alban Crequy <alban.crequy@gmail.com> Date: Fri Sep 18 13:37:34 2015 +0200 containers: systemd exits with non-zero code Make sure we never ever execute systemd-shutdown from within a user-manager. Restore the previous behavior by partially reverting given commit.
2015-09-22Merge pull request #1342 from filbranden/gitignore1David Herrmann
build-sys: add new test binaries to .gitignore
2015-09-22build-sys: add new test binaries to .gitignoreFilipe Brandenburger
2015-09-22build-sys: Check behavior of -Werror=shadow before deciding to use itFilipe Brandenburger
gcc versions 4.6 and earlier used to complain when a local variable shadows a global function, 4.7 and above only complain if a local variable shadows a global variable. Fix this by checking whether gcc 4.7+ behavior is in place before deciding to use -Werror=shadow in $(CFLAGS), by using a custom test program source that shadows a global function with a local variable and confirming that -Werror=shadow does not make the compile to break. Tested: - On gcc 4.7 and 4.8, confirmed nothing changed (other than the order of the -Werror=shadow argument, going to the end of CFLAGS.) - On gcc 4.6, confirmed by looking at the config.log output that the check for -Werror=shadow failed and it was not included in CFLAGS. - Ran `make V=1` to confirm -Werror=shadow was still in use, introduced a bogus shadowing issue and confirmed it was caught when building with a recent gcc.
2015-09-22build-sys: properly quote m4 macro arguments in CC_CHECK_FLAGS_APPENDFilipe Brandenburger
The variables should be quoted inside [...] to avoid double macro expansion. This is currently not an issue, since the values (-W...) are not really macros, but we might as well just fix that issue now. Tested by re-running autogen.sh and comparing the value of OUR_CFLAGS in the generated Makefile. Ran a full build from a clean tree to confirm no other issues were introduced.
2015-09-22Merge pull request #1338 from kaysievers/pamLennart Poettering
pam: systemd-user - call selinux module
2015-09-22udev: ata_id - ATA_ID_SATA_CAPABILITY == 76Kay Sievers
2015-09-22pam: systemd-user - call selinux moduleKay Sievers
https://bugzilla.redhat.com/show_bug.cgi?id=1262933
2015-09-22update TODOLennart Poettering