Age | Commit message (Collapse) | Author | |
---|---|---|---|
2013-12-25 | bus: conditionally set cookie_reply/timeout and update kdbus.h | Kay Sievers | |
2013-12-25 | bus: update kdbus.h | Kay Sievers | |
2013-12-25 | bus: set cookie_reply and update kdbus.h | Kay Sievers | |
2013-12-25 | bus: also write debug logs about messages we send | Lennart Poettering | |
2013-12-25 | bus: be a bit more verbose when debug mode is on | Lennart Poettering | |
2013-12-25 | shared: fix getpeername_pretty() for AF_UNIX sockets | Lennart Poettering | |
2013-12-25 | unit: include peer identity in description of per-connection ↵ | Lennart Poettering | |
socket-activated services | |||
2013-12-24 | sleep-config: fix useless check for swapfile type | Dave Reisner | |
Since 0c6f1f4ea49 the check was useless, because the kernel will ever only write "partition" or "file" there. OTOH, it is possible that "\\040(deleted)" (escaped " (deleted)") will be added for removed files. This should not happen, so add a warning to detect those cases. | |||
2013-12-24 | tmpfiles: introduce the concept of unsafe operations | Zbigniew Jędrzejewski-Szmek | |
Various operations done by systemd-tmpfiles may only be safely done at boot (e.g. removal of X lockfiles in /tmp, creation of /run/nologin). Other operations may be done at any point in time (e.g. setting the ownership on /{run,var}/log/journal). This distinction is largely orthogonal to the type of operation. A new switch --unsafe is added, and operations which should only be executed during bootup are marked with an exclamation mark in the configuration files. systemd-tmpfiles.service is modified to use this switch, and guards are added so it is hard to re-start it by mistake. If we install a new version of systemd, we actually want to enforce some changes to tmpfiles configuration immediately. This should now be possible to do safely, so distribution packages can be modified to execute the "safe" subset at package installation time. /run/nologin creation is split out into a separate service, to make it easy to override. https://bugzilla.redhat.com/show_bug.cgi?id=1043212 https://bugzilla.redhat.com/show_bug.cgi?id=1045849 | |||
2013-12-24 | man,units: tmpfiles.d(5) cleanup | Zbigniew Jędrzejewski-Szmek | |
Condition for /lib (necessary for split /usr) was missing from the unit. Some changes which were done in tmpfiles.d(5) were not carried over to systemd-tmpfiles(1). Also use markup where possible. | |||
2013-12-24 | bus: properly shift cgroup data returned from kdbus by the container's root ↵ | Lennart Poettering | |
before parsing | |||
2013-12-24 | bus: fix return message if StartServiceByName() in the driver fails due | Lennart Poettering | |
to non-existing service | |||
2013-12-24 | busctl: show service/session a name belongs to in the list of names | Lennart Poettering | |
Also, don't show machine name by default as this might cause timeouts on non-responding peers. | |||
2013-12-24 | log: log_error() and friends add a newline after each line anyway, so avoid ↵ | Lennart Poettering | |
including it in the log strings | |||
2013-12-24 | util: don't accept an empty peer label as valid | Lennart Poettering | |
2013-12-24 | bus: only accept kdbus creds if they are valid | Lennart Poettering | |
This allows userspace to fake kdbus creds via struct ucred in the proxy, without making the recieving side choke on the missing fields of the kdbus struct, more precisel pid_starttime and tid | |||
2013-12-24 | util: unify SO_PEERCRED/SO_PEERSEC invocations | Lennart Poettering | |
Introduce new call getpeercred() which internally just uses SO_PEERCRED but checks if the returned data is actually useful due to namespace quirks. | |||
2013-12-24 | bus: fix hello ioctl buffer size calculation | Lennart Poettering | |
2013-12-24 | bus: make gcc shut up | Lennart Poettering | |
2013-12-24 | bus: fake client side creds in the proxy to the caller's creds | Lennart Poettering | |
2013-12-23 | hwdb: Add SDIO product ID for Marvell SD8897 WLAN function | Marcel Holtmann | |
2013-12-24 | bus: allow peeking signatures recusively inside of containers | Lennart Poettering | |
Previously we invalidated the peeked signature as soon as the caller would recurse into a container, making stack based handling difficult. With this change we will keep the peeked signature around until the user advances to the next field. | |||
2013-12-24 | update TODO | Lennart Poettering | |
2013-12-23 | bus: fix assert when serializing fixed size struct to gvariant | Lennart Poettering | |
2013-12-23 | bus: don't attach KDBUS_ITEM_ID to match ioctl() if we don't need it | Lennart Poettering | |
2013-12-23 | bus: fix sender match creation on kdbus | Lennart Poettering | |
2013-12-23 | sd-event: make sd_event_add_signal() fail with EBUSY if signal is not blocked | Lennart Poettering | |
2013-12-23 | core: when we close the notify fd, we also need to free its event source | Lennart Poettering | |
2013-12-23 | units: systemd-machined now exits on idle and we shouldn't try to restart it ↵ | Lennart Poettering | |
then | |||
2013-12-23 | units: limit caps for bus proxyd and driverd services | Lennart Poettering | |
2013-12-23 | sd-event: fix return code of sd_event_run() | Lennart Poettering | |
2013-12-23 | machinectl: fix success check when getting pty from within container | Lennart Poettering | |
2013-12-23 | bus-proxyd: init cleanup variable | Kay Sievers | |
2013-12-23 | bus: update kdbus.h | Kay Sievers | |
2013-12-23 | bus: when getting a kdbus connection into a container wait first for child, ↵ | Lennart Poettering | |
then read message There's no EOF generated for AF_UNIX/SOCK_DGRAM sockets, hence let's wait for the child first to see if it succeeded, only then read the socket. | |||
2013-12-23 | bus: when we are connected to a bus, then do not assume peer creds are ↵ | Lennart Poettering | |
useful as message creds | |||
2013-12-23 | util: when we try to read /proc/cmdline in a container, read /proc/1/cmdline ↵ | Lennart Poettering | |
instead | |||
2013-12-23 | log: als turn on debug logging in non-PID1 if /proc/cmdline contains "debug" | Lennart Poettering | |
2013-12-23 | bus: make sure sd_bus_emit_properties_changed_strv() doesn't return ENOENT ↵ | Lennart Poettering | |
if no properties with a change flag are in the interface | |||
2013-12-23 | bus: write debug message when we get a method call we cannot handle | Lennart Poettering | |
2013-12-22 | delta: if prefix is specified, only show overrides there | Zbigniew Jędrzejewski-Szmek | |
systemd-delta /run/systemd/system will show all unit overrides in /run, etc. | |||
2013-12-22 | delta: fix delta for drop-ins | Zbigniew Jędrzejewski-Szmek | |
Also, fix highlighting, add more debug statements, make const tables static and global, run path_kill_slashes only at entry. | |||
2013-12-23 | bus: make sure to request peer cred only after connect(), not before | Lennart Poettering | |
2013-12-23 | bus: always talk to the full dbus driver object | Lennart Poettering | |
2013-12-23 | bus-proxyd: synthesize NameAcquire/NameLost signals for socket clients | Lennart Poettering | |
2013-12-23 | update TODO | Lennart Poettering | |
2013-12-23 | bus: use memcpy() rather than unbounded strcpy() | Lennart Poettering | |
2013-12-23 | bus: switch kdbus bloom filter over to SipHash (from MurmurHash3) | Lennart Poettering | |
Let's try to standardize on a single non-cryptographic hash algorithm, and for that SipHash appears to be the best answer. With this change there are two other hash functions left in systemd: an older version of MurmurHash embedded into libudev for the bloom filters in udev messages (which is hard to update, given that the we probably should stay compatible with older versions of the library). And lookup3 in the journal files (which we could replace for new files, but which is probably not worth the work). | |||
2013-12-23 | libudev: ship the original MurmurHash2.[ch] file | Kay Sievers | |
2013-12-22 | loginctl: fix output of type with class | Mantas Mikulėnas | |