summaryrefslogtreecommitdiff
path: root/src/journal
AgeCommit message (Collapse)Author
2012-03-15man: document systemd-cat(1)Lennart Poettering
2012-03-15journal: only use uint8_t for stateFrederic Crozat
2012-03-15a couple of fixes to make llvm-analyze quietLennart Poettering
2012-03-15journalctl: add a missing 'break'Tero Roponen
There is a 'break' missing in the -q handling so, for example, 'systemd-journalctl --new-id128 -q' does nothing. This patch fixes the problem.
2012-03-15journald: don't try to roatet corrupted files when we open read-only anywayLennart Poettering
2012-03-15journald: adjust permissions for rotated filesLennart Poettering
2012-03-15journald: take corrupted files into account when calculating disk spaceLennart Poettering
2012-03-15journald: be a bit more verboseLennart Poettering
2012-03-15journald: fix calculation of disk spaceLennart Poettering
2012-03-15journald: copy metrics/compression state from template when rotatingLennart Poettering
2012-03-15journald: increase max file size to 128MBLennart Poettering
2012-03-15journal: vacuum corrupted files, tooLennart Poettering
2012-03-15journal: if we encounter a corrupted file, rotate and go onLennart Poettering
2012-03-15journald: fix typoLennart Poettering
2012-03-15journalctl: suppress messages about adm group if ACL support is not enabledLennart Poettering
2012-03-14journald: set SO_PASSEC only if selinux is enabledLennart Poettering
2012-03-14journalctl: warn if the user is not in the adm groupLennart Poettering
2012-03-14journal: fix memory leakLennart Poettering
2012-03-14journal: Don't hold pointers to journal while remappingMarti Raudsepp
Hi! I was trying out the journal and the journalctl utility sometimes crashed on me. After some debugging, I tracked it down to the fact that next_with_matches() holds the "c" object pointer through the journal_file_next_entry_for_data() call -- which apparently may re-map the journal file, invalidating the pointer. The attached patch fixes this crash for me, but being unfamiliar with the code, I don't know if I'm doing the right thing. This patch is also available from my github repository: git://github.com/intgr/systemd.git https://github.com/intgr/systemd Regards, Marti For the record, here's the original stack trace at the time of remapping: ret=0x7fff1d5cdec0) at src/journal/journal-file.c:330 ret=0x7fff1d5cdf28) at src/journal/journal-file.c:414 ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1101 i=5705, ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1147 p=6413608, data_offset=66600, direction=DIRECTION_DOWN, ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1626 direction=DIRECTION_DOWN, ret=0x7fff1d5ce120, offset=0x7fff1d5ce128) at src/journal/sd-journal.c:533 direction=DIRECTION_DOWN, ret=0x7fff1d5ce170, offset=0x7fff1d5ce178) at src/journal/sd-journal.c:595 src/journal/sd-journal.c:651 From 9266fc6a58065a7c5dab67430fd78925e519dce9 Mon Sep 17 00:00:00 2001 From: Marti Raudsepp <marti@juffo.org> Date: Fri, 9 Mar 2012 16:23:00 +0200 Subject: [PATCH] journal: Don't hold pointers to journal while remapping This would cause a segfault otherwise.
2012-03-14journald: allocate PAGE_SIZE bytes for selinux label lengthLennart Poettering
As suggested in https://bugzilla.redhat.com/show_bug.cgi?id=798760
2012-03-13journald: use SCM_SECURITY to race-freely determine peer SELinux labelLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=798760
2012-03-13socket: add option for SO_PASSECLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=798760 (Note that this work is not complete yet, as the kernel seems to send us useless data with SCM_SECURITY enabled)
2012-03-06journal: make sure to refresh window position and pointer after we linked up ↵Lennart Poettering
a data object
2012-03-05journal: fix endianness errorsFrederic Crozat
2012-02-29systemd-journald: fix endianess bugDirk Eibach
2012-02-02coredump: avoid coredump loops, divert coredump if journald itself is crashingLennart Poettering
2012-01-31load-fragment: properly parse size values denoted in bytesLennart Poettering
2012-01-31journal: increase compression threshold for objects from 64 to 512Lennart Poettering
Apparently the perfomance price for compression is to steep to apply it for all objects >= 64 and < 512 in size, as measured by Arjan Van De Ven, hence increase the threshold to 512 which yields better results.
2012-01-27log: increase socket buffers for logging by defaultLennart Poettering
2012-01-27log: never delay logging if the log server is stuck, always drop messages ↵Lennart Poettering
quickly
2012-01-22cgtop: add new cgtop toolLennart Poettering
2012-01-21journal: systemd v38 fails to build on big-endiansDan Horák
Hi, during the builds for Fedora/s390x I've found that systemd v38 fails to build on big-endian platforms. ... make[2]: Entering directory `/root/systemd' CC src/journal/libsystemd_journal_la-sd-journal.lo src/journal/sd-journal.c: In function 'init_location': src/journal/sd-journal.c:69:22: error: incompatible types when initializing type 'long unsigned int' using type 'sd_id128_t' src/journal/sd-journal.c:69:20: error: incompatible types when assigning to type 'sd_id128_t' from type 'long unsigned int' make[2]: *** [src/journal/libsystemd_journal_la-sd-journal.lo] Error 1 I see the problem in using le64toh() on the 16 bytes boot_id structure in init_location() Please see http://s390.koji.fedoraproject.org/koji/taskinfo?taskID=544375 for a full build log and attachment for a proposed fix. With regards Dan
2012-01-18journal: when sending journal data via file, place it in /dev/shm, to allow ↵Lennart Poettering
early boot operation, even if it sucks
2012-01-18journalctl: properly honour -n when -f is passed, tooLennart Poettering
2012-01-14journal: drop privileges when storing coredumpLennart Poettering
2012-01-14util: introduce FORMAT_BYTES_MAXLennart Poettering
2012-01-14journal: collect coredump up to 24M in sizeLennart Poettering
2012-01-14journal: handle empty syslog identifier properlyLennart Poettering
2012-01-14journal: fix bad memory accessLennart Poettering
2012-01-14journal: if the data to be sent is larger than the maximum datagram size ↵Lennart Poettering
resort to passing a temporary fd over native protocol
2012-01-14journal: hook up coredumping with journalLennart Poettering
2012-01-14journal: add new system-cat tool as kind of a more powerfull BSD loggerLennart Poettering
2012-01-13journal: add output mode that just prints simple messages without any ↵Lennart Poettering
decorations
2012-01-12journal: if the syslog forwarder socket is full, then don't blockLennart Poettering
2012-01-12log: make internal log api log directly to the journalLennart Poettering
2012-01-11journal: add SELinux context to all logged messagesLennart Poettering
2012-01-11journal: fix more 32/64 bit issuesLennart Poettering
2012-01-11journald: don't assume size_t and uint64_t are the sameLennart Poettering
2012-01-11journald: set group ownership of journal files to 'adm' by defaultLennart Poettering
2012-01-11journal: make requirement for ACLs optionalLennart Poettering