summaryrefslogtreecommitdiff
path: root/src/journal
AgeCommit message (Collapse)Author
2012-04-13nspawn: fake /dev/kmsg and /proc/kmsg as fifoLennart Poettering
2012-04-13fix a couple of things found with the llvm static analyzerLennart Poettering
2012-04-12journal: fix missing variable initializationLennart Poettering
2012-04-12journald: add missing flag to open()Lennart Poettering
2012-04-12relicense to LGPLv2.1 (with exceptions)Lennart Poettering
We finally got the OK from all contributors with non-trivial commits to relicense systemd from GPL2+ to LGPL2.1+. Some udev bits continue to be GPL2+ for now, but we are looking into relicensing them too, to allow free copy/paste of all code within systemd. The bits that used to be MIT continue to be MIT. The big benefit of the relicensing is that closed source code may now link against libsystemd-login.so and friends.
2012-04-11put acl.la in 'if HAVE_ACL' and rename acl.[ch] to acl-util.[ch]Kay Sievers
2012-04-10rename basic.la to shared.la and put selinux deps in shared-selinx.laKay Sievers
Only 34 of 74 tools need libselinux linked, and libselinux is a pain with its unconditional library constructor.
2012-04-10util: move ACL code into internal libraryKay Sievers
2012-04-10util: move all to shared/ and split external dependencies in separate ↵Kay Sievers
internal libraries Before: $ ldd /lib/systemd/systemd-timestamp linux-vdso.so.1 => (0x00007fffb05ff000) libselinux.so.1 => /lib64/libselinux.so.1 (0x00007f90aac57000) libcap.so.2 => /lib64/libcap.so.2 (0x00007f90aaa53000) librt.so.1 => /lib64/librt.so.1 (0x00007f90aa84a000) libc.so.6 => /lib64/libc.so.6 (0x00007f90aa494000) /lib64/ld-linux-x86-64.so.2 (0x00007f90aae90000) libdl.so.2 => /lib64/libdl.so.2 (0x00007f90aa290000) libattr.so.1 => /lib64/libattr.so.1 (0x00007f90aa08a000) libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f90a9e6e000) After: $ ldd systemd-timestamp linux-vdso.so.1 => (0x00007fff3cbff000) libselinux.so.1 => /lib64/libselinux.so.1 (0x00007f5eaa1c3000) librt.so.1 => /lib64/librt.so.1 (0x00007f5ea9fbb000) libc.so.6 => /lib64/libc.so.6 (0x00007f5ea9c04000) /lib64/ld-linux-x86-64.so.2 (0x00007f5eaa3fc000) libdl.so.2 => /lib64/libdl.so.2 (0x00007f5ea9a00000) libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f5ea97e4000)
2012-04-03logind: log with AUTH facilityLennart Poettering
2012-04-02journal: implicitly add code location to all messages logged with the native ↵Lennart Poettering
interface This logic can be turned off by defining SD_JOURNAL_SUPPRESS_LOCATION before including sd-journal.h. This also saves/restores errno in all logging functions, in order to be useful as logging calls without side-effects. This also adds a couple of __unlikely__ around the early checks in the logging calls, in order to minimize the runtime impact.
2012-04-02journal: decrease default mmap window size to allow a bigger number of ↵Lennart Poettering
journals to be traversed in parallel
2012-03-30rename /etc/systemd/systemd-{login,journal}d.conf to {login,journal}d.confKay Sievers
2012-03-27journal: properly handle if we interleave files with different boot idsLennart Poettering
If we try to locate a monotonic time in a file that doesn't have any entries with the matching boot id, then don't fail on it, simply fall back to calendar time.
2012-03-27cat: fix priority typeLennart Poettering
Needs to be "int", not "char". Spotted by Frederic Crozat.
2012-03-27journalctl: add --local switchLennart Poettering
2012-03-22add sparse support to detect endianness bugFrederic Crozat
le16/32/64_t type should be used when storing little-endian value header to integrate with sparse from Josh Triplett <josh@joshtriplett.org>
2012-03-21journal: PAGE_SIZE is not known on ppc and other archsLennart Poettering
Let's use NAME_MAX, as suggested by Dan Walsh
2012-03-21journal: react with immediate rotation to a couple of more errorsLennart Poettering
2012-03-16man: document systemd-journalctl(1)Lennart Poettering
2012-03-15man: document systemd-journald.conf(5)Lennart Poettering
2012-03-15man: document systemd-cat(1)Lennart Poettering
2012-03-15journal: only use uint8_t for stateFrederic Crozat
2012-03-15a couple of fixes to make llvm-analyze quietLennart Poettering
2012-03-15journalctl: add a missing 'break'Tero Roponen
There is a 'break' missing in the -q handling so, for example, 'systemd-journalctl --new-id128 -q' does nothing. This patch fixes the problem.
2012-03-15journald: don't try to roatet corrupted files when we open read-only anywayLennart Poettering
2012-03-15journald: adjust permissions for rotated filesLennart Poettering
2012-03-15journald: take corrupted files into account when calculating disk spaceLennart Poettering
2012-03-15journald: be a bit more verboseLennart Poettering
2012-03-15journald: fix calculation of disk spaceLennart Poettering
2012-03-15journald: copy metrics/compression state from template when rotatingLennart Poettering
2012-03-15journald: increase max file size to 128MBLennart Poettering
2012-03-15journal: vacuum corrupted files, tooLennart Poettering
2012-03-15journal: if we encounter a corrupted file, rotate and go onLennart Poettering
2012-03-15journald: fix typoLennart Poettering
2012-03-15journalctl: suppress messages about adm group if ACL support is not enabledLennart Poettering
2012-03-14journald: set SO_PASSEC only if selinux is enabledLennart Poettering
2012-03-14journalctl: warn if the user is not in the adm groupLennart Poettering
2012-03-14journal: fix memory leakLennart Poettering
2012-03-14journal: Don't hold pointers to journal while remappingMarti Raudsepp
Hi! I was trying out the journal and the journalctl utility sometimes crashed on me. After some debugging, I tracked it down to the fact that next_with_matches() holds the "c" object pointer through the journal_file_next_entry_for_data() call -- which apparently may re-map the journal file, invalidating the pointer. The attached patch fixes this crash for me, but being unfamiliar with the code, I don't know if I'm doing the right thing. This patch is also available from my github repository: git://github.com/intgr/systemd.git https://github.com/intgr/systemd Regards, Marti For the record, here's the original stack trace at the time of remapping: ret=0x7fff1d5cdec0) at src/journal/journal-file.c:330 ret=0x7fff1d5cdf28) at src/journal/journal-file.c:414 ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1101 i=5705, ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1147 p=6413608, data_offset=66600, direction=DIRECTION_DOWN, ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1626 direction=DIRECTION_DOWN, ret=0x7fff1d5ce120, offset=0x7fff1d5ce128) at src/journal/sd-journal.c:533 direction=DIRECTION_DOWN, ret=0x7fff1d5ce170, offset=0x7fff1d5ce178) at src/journal/sd-journal.c:595 src/journal/sd-journal.c:651 From 9266fc6a58065a7c5dab67430fd78925e519dce9 Mon Sep 17 00:00:00 2001 From: Marti Raudsepp <marti@juffo.org> Date: Fri, 9 Mar 2012 16:23:00 +0200 Subject: [PATCH] journal: Don't hold pointers to journal while remapping This would cause a segfault otherwise.
2012-03-14journald: allocate PAGE_SIZE bytes for selinux label lengthLennart Poettering
As suggested in https://bugzilla.redhat.com/show_bug.cgi?id=798760
2012-03-13journald: use SCM_SECURITY to race-freely determine peer SELinux labelLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=798760
2012-03-13socket: add option for SO_PASSECLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=798760 (Note that this work is not complete yet, as the kernel seems to send us useless data with SCM_SECURITY enabled)
2012-03-06journal: make sure to refresh window position and pointer after we linked up ↵Lennart Poettering
a data object
2012-03-05journal: fix endianness errorsFrederic Crozat
2012-02-29systemd-journald: fix endianess bugDirk Eibach
2012-02-02coredump: avoid coredump loops, divert coredump if journald itself is crashingLennart Poettering
2012-01-31load-fragment: properly parse size values denoted in bytesLennart Poettering
2012-01-31journal: increase compression threshold for objects from 64 to 512Lennart Poettering
Apparently the perfomance price for compression is to steep to apply it for all objects >= 64 and < 512 in size, as measured by Arjan Van De Ven, hence increase the threshold to 512 which yields better results.
2012-01-27log: increase socket buffers for logging by defaultLennart Poettering