summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2012-09-19logind: if a lid-switch lock was taken while the lid was closed, recheck lid ↵Lennart Poettering
status when the lock is released
2012-09-19logind: properly parse handle-lid-switch inhibitorLennart Poettering
2012-09-19man: document new inhibitor typesLennart Poettering
2012-09-19logind: rework power key/suspend key/lid switch handlingLennart Poettering
http://lists.freedesktop.org/archives/systemd-devel/2012-September/006604.html https://bugzilla.gnome.org/show_bug.cgi?id=680689 This changes the meaning of the HandlePowerKey=/HandleSleepKey=/HandleLidSwitch= setting of logind.conf
2012-09-19journal: when comparing two entries from separate files make sure we ↵Lennart Poettering
reposition the mmap window The mmap cache doesn't guarantee that we can look at two files at the same time. Hence make sure to look at the entries to compare one after the other, instead of at the same time when comparing them, and reposition the window in between.
2012-09-19mount: reword directory empty warning a bitLennart Poettering
2012-09-19systemctl: warn about triggering units only at the endZbigniew Jędrzejewski-Szmek
Instead of checking each unit separately, check once at the end. This should avoid spurious warnings about a service being triggerable by other stuff.
2012-09-19systemctl: properly report successZbigniew Jędrzejewski-Szmek
Systemctl would always return 1, because it treated uninteresting dbus messages ("job added") as errors. Just ignore everything apart from interesting ("job removed") messages.
2012-09-19systemctl: use automatic cleanup once moreZbigniew Jędrzejewski-Szmek
Semantics are slightly different, because before unit_name_mangle returning NULL was ignored, and now it is reported as oom. But unit_name_mangle only returns NULL on oom.
2012-09-19systemctl: use automatic cleanupZbigniew Jędrzejewski-Szmek
Introduce a helper method to unref dbus messages and use it.
2012-09-18core: move ManagerRunningAs to sharedZbigniew Jędrzejewski-Szmek
Note: I did s/MANAGER/SYSTEMD/ everywhere, even though it makes the patch quite verbose. Nevertheless, keeping MANAGER prefix in some places, and SYSTEMD prefix in others would just lead to confusion down the road. Better to rip off the band-aid now.
2012-09-18automount: also whine if an automount directory is not emptyLennart Poettering
2012-09-18mount: notify the user if we over-mount a non-empty directoryLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=858266
2012-09-18mount: don't mount securityfs in a containerLennart Poettering
2012-09-18unit-printf: add specifiers for the host name, machine id, boot idLennart Poettering
2012-09-18unit-printf: before resolving exec context specifiers check whether the ↵Lennart Poettering
object actually has an exec context
2012-09-18unit: split unit_printf() and friends into its own .c fileLennart Poettering
2012-09-18unit: fix %f resolvingLennart Poettering
2012-09-18journalctl: don't choke on entries with no MESSAGE= fieldLennart Poettering
https://bugs.freedesktop.org/show_bug.cgi?id=50177
2012-09-18target: imply default ordering for PartsOf deps as wellLennart Poettering
2012-09-18execute: apply PAM logic only to main process if PermissionsStartOnly is setLennart Poettering
https://bugs.freedesktop.org/show_bug.cgi?id=54176
2012-09-18selinux: rework method tail, make it into a nulstr arrayLennart Poettering
2012-09-18selinux: use existing library calls for audit dataLennart Poettering
2012-09-18selinux: prefer source path over fragment pathLennart Poettering
2012-09-18util: introduce get_process_gid()Lennart Poettering
2012-09-18selinux: add bus service access controlDaniel J Walsh
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This patch adds the ability to look at the calling process that is trying to do dbus calls into systemd, then it checks with the SELinux policy to see if the calling process is allowed to do the activity. The basic idea is we want to allow NetworkManager_t to be able to start and stop ntpd.service, but not necessarly mysqld.service. Similarly we want to allow a root admin webadm_t that can only manage the apache environment. systemctl enable httpd.service, systemctl disable iptables.service bad. To make this code cleaner, we really need to refactor the dbus-manager.c code. This has just become a huge if-then-else blob, which makes doing the correct check difficult. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iEYEARECAAYFAlBJBi8ACgkQrlYvE4MpobOzTwCdEUikbvRWUCwOb83KlVF0Nuy5 lRAAnjZZNuc19Z+aNxm3k3nwD4p/JYco =yops -----END PGP SIGNATURE-----
2012-09-18logind: split up inhibit acquire policyLennart Poettering
2012-09-17journald: log when we fail to forward messages to syslogLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=847207
2012-09-17log: avoid function loopLennart Poettering
https://bugs.freedesktop.org/show_bug.cgi?id=54766
2012-09-17conf-parser: don't unescape parsed configuration strings by defaultLennart Poettering
In many cases this might have a negative effect since we drop escaping from strings where we better shouldn't have dropped it. If unescaping makes sense for some settings we can readd it later again, on a per-case basis. https://bugs.freedesktop.org/show_bug.cgi?id=54522
2012-09-17logind: make VT reservation logic compatible with containersLennart Poettering
2012-09-17main: newer kernels return EINVAL if we invoke reboot() in a container ↵Lennart Poettering
lacking perms, deal with it
2012-09-17util: various cleanups for printing boot statusLennart Poettering
2012-09-17utmp: read the right timestampLennart Poettering
2012-09-17main: when transitioning from initrd to the main system log to kmsgLennart Poettering
When the new PID is invoked the journal socket from the initrd might still be around. Due to the default log target being journal we'd log to that initially when the new main systemd initializes even if the kernel command line included a directive to redirect systemd's logging elsewhere. With this fix we initially always log to kmsg now, if we are PID1, and only after parsing the kernel cmdline try to open the journal if that's desired. (The effective benefit of this is that SELinux performance data is now logged again to kmsg like it used to be.)
2012-09-17hwclock: always set the kernel's timezoneKay Sievers
Properly tell the kernel at bootup, and any later time zone changes, the actual system time zone. Things like the kernel's FAT filesystem driver needs the actual time zone to calculate the proper local time to use for the on-disk time stamps. https://bugzilla.redhat.com/show_bug.cgi?id=802198
2012-09-17main: bump up RLIMIT_NOFILE for systemd itselfLennart Poettering
For setups with many listening sockets the default kernel resource limit of 1024 fds is not enough. Bump this up to 64K to avoid any limitations in this regard. We are careful to pass on the kernel default to daemons however, since normally resource limits are a good to enforce, especially since select() can't handle fds > 1023.
2012-09-17journald: properly update perms on freshly rotate user journalsLennart Poettering
2012-09-17service: don't hit an assert if a service unit changes type and we get a ↵Lennart Poettering
spurious event from before
2012-09-17udev: add btrfs supportKay Sievers
All "btrfs" file systems will be registered with the kernel when they show up. Incomplete multi-device volumes will set SYSTEMD_READY=0, to prevent access until the volume is complete and fully registered.
2012-09-17logind: make sure there's always a getty available on TTY6Lennart Poettering
Previously, if X allocated all 6 TTYs (for multi-session for example) no getty would be available anymore to guarantee console-based logins. With the new ReserveVT= switch in logind.conf we can now choose one VT (6 by default) that will always be subject to autovt-style activation, i.e. we'll always have a getty on TTY6, and X will never take possession of it.
2012-09-17build-sys: __secure_getenv lost dunder in libc 2.17Zbigniew Jędrzejewski-Szmek
2012-09-16tmpfiles: use write(2) for the 'w' actionDave Reisner
This resolves problems with filesystems which do not implement the aio_write file operation. In this case, the kernel will fall back using a loop writing technique for each pointer in a received iovec. The result is strange errors in dmesg such as: [ 31.855871] elevator: type not found [ 31.856262] elevator: switch to [ 31.856262] failed It does not make sense to implement a synchronous aio_write method for sysfs as this isn't a real filesystem where a reasonable use case for using writev exists, nor is there an expectation that tmpfiles will be used to write more data than can be reasonably written in a single write syscall. In addition, some sysfs attrs are currently buggy and will NOT reject the second write with the newline, causing the sysfs value to be zeroed out. This of course should be fixed in the kernel regardless of any wrongdoing in userspace, but this simple change makes us immune to such a bug. This change means that we do not write a trailing newline by default, as the expected use case of 'w' is for sysfs and procfs. In exchange, honor C-style backslash escapes so that if the newline is really needed, the user can add it.
2012-09-16socket: prevent signed integer overflowDave Reisner
src/core/socket.c:588:25: error: overflow in implicit constant conversion src/core/socket.c:589:17: error: overflow in implicit constant conversion
2012-09-16nspawn: fix memleak introduced with automatic cleanupZbigniew Jędrzejewski-Szmek
6b2d0e8 introduced a memleak instead of fixing one. Fix both.
2012-09-16nspawn: use automatic cleanup for umaskZbigniew Jędrzejewski-Szmek
2012-09-16nspawn: _cleanup_free_ moreZbigniew Jędrzejewski-Szmek
2012-09-16nspawn: use automatic cleanupZbigniew Jędrzejewski-Szmek
This one actually clears up a (totally harmless) memleak.
2012-09-16nspawn: mount tmpfs on /dev/shmZbigniew Jędrzejewski-Szmek
Most things seem to function fine without /dev/shm, but it is expected to be there (quoting linux/Documentation/filesystems/tmpfs.txt: glibc 2.2 and above expects tmpfs to be mounted at /dev/shm for POSIX shared memory (shm_open, shm_unlink)). Since /tmp/ is already mounted as tmpfs, it would be enough to mkdir /tmp/shm and chmod it. Mounting it separately has the advantage that it can be easily remounted to change the quota.
2012-09-16install: use automatic cleanupZbigniew Jędrzejewski-Szmek