Age | Commit message (Collapse) | Author | |
---|---|---|---|
2014-11-27 | kdbus: set kernel attach mask before creating the first bus | Lennart Poettering | |
2014-11-27 | sd-bus: set creds info for "org.freedesktop.DBus.Local" generated messages, too | Lennart Poettering | |
2014-11-27 | sd-bus: when we get the list of well-known names back from kdbus we ↵ | Lennart Poettering | |
shouldn't confuse the empty list with unknown information | |||
2014-11-27 | sd-bus: deal with whitespace in matches | Lennart Poettering | |
2014-11-27 | sd-bus: unify logic how we patch the message source of driver messages | Lennart Poettering | |
2014-11-27 | sd-bus: fake valid well-known-names metadata for faked bus messages | Lennart Poettering | |
2014-11-27 | sd-bus: optimize how we generate the well-known-names lists in messages from ↵ | Lennart Poettering | |
kdbus | |||
2014-11-27 | sd-bus: be stricter with mismatches between dbus1 and kdbus message headers | Lennart Poettering | |
2014-11-27 | bus-proxy: check passed parameter signature of all driver method calls | Lennart Poettering | |
2014-11-27 | networkd: fix kernel rtnl receive buffer overrun error | Alin Rauta | |
We got the following error when running systemd on a device with many ports: "rtnl: kernel receive buffer overrun Event source 'rtnl-receive-message' returned error, disabling: No buffer space available" I think the kernel socket receive buffer queue should be increased. The default value is taken from: "/proc/sys/net/core/rmem_default", but we can overwrite it using SO_RCVBUF socket option. This is already done in networkd for other sockets. For example, the bus socket (sd-bus/bus-socket.c) has a receive queue of 8MB. In our case, the default is 208KB. Increasing the buffer receive queue for manager socket to 512KB should be enough to get rid of the above error. [tomegun: bump the limit even higher to 8M] | |||
2014-11-27 | bus: prefix custom endpoints with "$UID-" | David Herrmann | |
The kdbus module will later get a policy that endpoint-names are restricted to "<uid>-<name>" just like bus-names. Make sure that systemd is already compatible to that. | |||
2014-11-26 | sd-bus: make sure that when we connect to the system bus we have enough ↵ | Lennart Poettering | |
creds to make security decisions | |||
2014-11-26 | sd-bus: update kdbus.h from upstream | Lennart Poettering | |
2014-11-26 | sd-bus: given that the kernel now passes the auxgroups list as 32bit array ↵ | Lennart Poettering | |
to us, no need to convert to uid_t manually This way, we can save one allocation and avoid copying the array unnecesarily. | |||
2014-11-26 | bus: update kdbus.h (ABI break) | David Herrmann | |
We changed creds to u32, so fix systemd sd-bus to acknowledge that. | |||
2014-11-26 | bus-kernel: when installing an activator, ask for any kind of metadata to be ↵ | Lennart Poettering | |
attached to incoming messages We don't know what the activated service might want in the end, hence enable everything current and future, just to be sure. | |||
2014-11-26 | sd-bus: don't clobber return values on failure in bus_kernel_open_bus_fd() | Lennart Poettering | |
2014-11-26 | sd-bus: set per-bus attach flag requirement mask to ANY | Lennart Poettering | |
On the system and user busses we create it's the receiver that chooses which metadata is attched, not the sender, hence set the requirement mask to ANY, to allow any current of future credential bit to be attached. | |||
2014-11-26 | sd-bus: add suppot for renegotiating message credential attach flags | Lennart Poettering | |
2014-11-26 | sd-bus: use free_and_strdup() where appropriate | Lennart Poettering | |
This simplifies things a bit and makes sure we free any previously set creds component before writing in a new one. | |||
2014-11-25 | core: show log message about process triggering kdbus service activation | Lennart Poettering | |
2014-11-25 | sd-bus: react properly to EOVERFLOW by generating a log message about ↵ | Lennart Poettering | |
dropped broadcast messages and proceeding | |||
2014-11-25 | kdbus: update header file to current upstream version | Lennart Poettering | |
2014-11-25 | kdbus: minor simplification | Lennart Poettering | |
2014-11-25 | sd-bus: fix error handling when receiving invalid service name | Lennart Poettering | |
Also, properly keep track of incoming additional service names. | |||
2014-11-25 | sd-bus: properly handle non-initialized audit records attached to incoming ↵ | Lennart Poettering | |
kernel messages | |||
2014-11-25 | sd-bus: properly copy selinux label and description field when duplicating ↵ | Lennart Poettering | |
creds object | |||
2014-11-25 | sd-bus: add supplementary groups list to creds object | Lennart Poettering | |
2014-11-25 | busctl: if no parameter is specified for "busctl status" show credentials of ↵ | Lennart Poettering | |
bus owner | |||
2014-11-25 | sd-bus: properly handle uninitialized audit creds from kdbus | Lennart Poettering | |
2014-11-25 | sd-bus: don't fail when querying creds and dbus1 refuses to tell us the ↵ | Lennart Poettering | |
selinux context | |||
2014-11-25 | busctl: add new --augment-creds= switch for controlling whether shown ↵ | Lennart Poettering | |
credential data shall be augment with data from /proc | |||
2014-11-25 | sd-bus: update to current kernel version, by splitting off the extended ↵ | Lennart Poettering | |
KDBUS_ITEM_PIDS structure from KDBUS_ITEM_CREDS Also: - adds support for euid, suid, fsuid, egid, sgid, fsgid fields. - makes augmentation of creds with data from /proc explicitly controllable to give apps better control over this, given that this is racy. - enables augmentation for kdbus connections (previously we only did it for dbus1). This is useful since with recent kdbus versions it is possible for clients to control the metadata they want to send. - changes sd_bus_query_sender_privilege() to take the euid of the client into consideration, if known - when we don't have permissions to read augmentation data from /proc, don't fail, just don't add the data in | |||
2014-11-25 | busctl: improve readability a bit | Lennart Poettering | |
2014-11-25 | bus: change creds dumping order to be more close to internal storage order | Lennart Poettering | |
2014-11-25 | sd-bus: don't blindly take incomplete ucred bits from AF_UNIX when ↵ | Lennart Poettering | |
constructing message | |||
2014-11-21 | busctl: add --timeout= option to specify method call timeout | Lennart Poettering | |
2014-11-21 | busctl: add options to control message header flags when invoking methods | Lennart Poettering | |
2014-11-21 | busctl: show property values in "introspect" output, add "set-property" ↵ | Lennart Poettering | |
command, and support both a terse and a verbose output format | |||
2014-11-21 | busctl: when --address is specified do not assume we connect to a full bus | Lennart Poettering | |
2014-11-21 | busctl: use canned error message on parse failure | Lennart Poettering | |
2014-11-21 | sd-bus: create clean error when a property Set() call with incorrect ↵ | Lennart Poettering | |
signature is passed in | |||
2014-11-20 | busctl: pass error output to stdout (rather than stderr) when generate tree ↵ | Lennart Poettering | |
for all objects This is a ton more useful when some services fail, since we continue crawling then and output everything to a pager. | |||
2014-11-20 | busctl: improve output of service creds | Lennart Poettering | |
2014-11-20 | busctl: add new "introspect" verb for introspecting objects | Lennart Poettering | |
2014-11-20 | sd-bus: refuse properties that claim to be both writable and constant at the ↵ | Lennart Poettering | |
same time | |||
2014-11-20 | busctl: split out introspection parser from tree logic so that we can reuse ↵ | Lennart Poettering | |
it for a future "busctl introspect" command | |||
2014-11-17 | bus-socket: fix CID#996290 Unchecked return value | Susant Sahani | |
2014-11-14 | bus-proxy: properly check for bus name prefixes when enforcing policy | Lennart Poettering | |
2014-11-14 | busctl: introduce busctl "get-property" command for reading and dumping ↵ | Lennart Poettering | |
object properties |