summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2012-03-30rename /etc/systemd/systemd-{login,journal}d.conf to {login,journal}d.confKay Sievers
2012-03-28job: add debug prints where job type gets changedMichal Schmidt
2012-03-28job: fix loss of ordering with restart jobsMichal Schmidt
Suppose that foo.service/start is a job waiting on other job bar.service/start to finish. And then foo.service/restart is enqueued (not using --ignore-dependencies). Currently this makes foo.service start immediately, forgetting about the ordering to bar.service. The runnability check for JOB_RESTART jobs looks only at dependencies for stopping. That's actually correct, because restart jobs should be treated the same as stop jobs at first. The bug is that job_run_and_invalidate() does not treat them exactly the same as stop jobs. unit_start() gets called without checking for the runnability of the converted JOB_START job. The fix is to simplify the switch in job_run_and_invalidate(). Handle JOB_RESTART identically to JOB_STOP. Also simplify the handling of JOB_TRY_RESTART - just convert it to JOB_RESTART if the unit is active and let it fall through to the JOB_RESTART case. Similarly for JOB_RELOAD_OR_START - have a fall through to JOB_START. In job_finish_and_invalidate() it's not necessary to check for JOB_TRY_RESTART with JOB_DONE, because JOB_TRY_RESTART jobs will have been converted to JOB_RESTART already. Speeding up the restart of services in "auto-restart" state still works as before. Improves: https://bugzilla.redhat.com/show_bug.cgi?id=753586 but it's still not perfect. With this fix the try-restart action will wait for the restart to complete in the right order, but the optimal behaviour would be to finish quickly (without disturbing the start job).
2012-03-27journal: properly handle if we interleave files with different boot idsLennart Poettering
If we try to locate a monotonic time in a file that doesn't have any entries with the matching boot id, then don't fail on it, simply fall back to calendar time.
2012-03-27cat: fix priority typeLennart Poettering
Needs to be "int", not "char". Spotted by Frederic Crozat.
2012-03-27journalctl: add --local switchLennart Poettering
2012-03-26man: minor typo in reference to manual pageElan Ruusamäe
2012-03-22logind: close FIFO before ending sessions cleanlyLennart Poettering
For clean session endings ask logind explicitly to get rid of the FIFO before closing it so that the FIFO logic doesn't result in su/sudo to be terminated immediately.
2012-03-22logind: extend comment about X11 socket symlinkLennart Poettering
2012-03-22add sparse support to detect endianness bugFrederic Crozat
le16/32/64_t type should be used when storing little-endian value header to integrate with sparse from Josh Triplett <josh@joshtriplett.org>
2012-03-22binfmt: fix apply loopLennart Poettering
Noticed by Sergey Ptashnick
2012-03-22main: added support for loading IMA custom policiesRoberto Sassu
This is an S/MIME signed message The new function ima_setup() loads an IMA custom policy from a file in the default location '/etc/ima/ima-policy', if present, and writes it to the path 'ima/policy' in the security filesystem. This function is executed at early stage in order to avoid that some file operations are not measured by IMA and it is placed after the initialization of SELinux because IMA needs the latter (or other security modules) to understand LSM-specific rules. This feature is enabled by default and can be disabled by providing the option '--disable-ima' to the configure script. Signed-off-by: Roberto Sassu <roberto.sassu@polito.it> Acked-by: Gianluca Ramunno <ramunno@polito.it>
2012-03-22systemd: mount the securityfs filesystem at early stageRoberto Sassu
This is an S/MIME signed message The mount of the securityfs filesystem is now performed in the main systemd executable as it is used by IMA to provide the interface for loading custom policies. The unit file 'units/sys-kernel-security.mount' has been removed because it is not longer necessary. Signed-off-by: Roberto Sassu <roberto.sassu@polito.it> Acked-by: Gianluca Ramunno <ramunno@polito.it>
2012-03-21journal: PAGE_SIZE is not known on ppc and other archsLennart Poettering
Let's use NAME_MAX, as suggested by Dan Walsh
2012-03-21journal: react with immediate rotation to a couple of more errorsLennart Poettering
2012-03-20sysctl: accept multiple passed configuration filesLennart Poettering
2012-03-20modules-load: drop /lib from search path if we don't have it split offLennart Poettering
2012-03-20bmfmt: allow passing more than one config file nameLennart Poettering
2012-03-20remove GTK piecesMichal Schmidt
They've moved to systemd-ui.
2012-03-16util: never follow symlinks in rm_rf_children()Michal Schmidt
The function checks if the entry is a directory before recursing, but there is a window between the check and the open, during which the directory could be replaced with a symlink. CVE-2012-1174 https://bugzilla.redhat.com/show_bug.cgi?id=803358
2012-03-16man: document systemd-journalctl(1)Lennart Poettering
2012-03-15man: document systemd-journald.conf(5)Lennart Poettering
2012-03-15man: document systemd-cat(1)Lennart Poettering
2012-03-15journal: only use uint8_t for stateFrederic Crozat
2012-03-15a couple of fixes to make llvm-analyze quietLennart Poettering
2012-03-15journalctl: add a missing 'break'Tero Roponen
There is a 'break' missing in the -q handling so, for example, 'systemd-journalctl --new-id128 -q' does nothing. This patch fixes the problem.
2012-03-15journald: don't try to roatet corrupted files when we open read-only anywayLennart Poettering
2012-03-15journald: adjust permissions for rotated filesLennart Poettering
2012-03-15journald: take corrupted files into account when calculating disk spaceLennart Poettering
2012-03-15journald: be a bit more verboseLennart Poettering
2012-03-15journald: fix calculation of disk spaceLennart Poettering
2012-03-15journald: copy metrics/compression state from template when rotatingLennart Poettering
2012-03-15journald: increase max file size to 128MBLennart Poettering
2012-03-15journal: vacuum corrupted files, tooLennart Poettering
2012-03-15journal: if we encounter a corrupted file, rotate and go onLennart Poettering
2012-03-15nspawn: mount /etc/timezone into nspawn environment tooLennart Poettering
2012-03-15journald: fix typoLennart Poettering
2012-03-15journalctl: suppress messages about adm group if ACL support is not enabledLennart Poettering
2012-03-15virt: the pidns controller does not exist anymoreLennart Poettering
2012-03-14journald: set SO_PASSEC only if selinux is enabledLennart Poettering
2012-03-14journalctl: warn if the user is not in the adm groupLennart Poettering
2012-03-14journal: fix memory leakLennart Poettering
2012-03-14journal: Don't hold pointers to journal while remappingMarti Raudsepp
Hi! I was trying out the journal and the journalctl utility sometimes crashed on me. After some debugging, I tracked it down to the fact that next_with_matches() holds the "c" object pointer through the journal_file_next_entry_for_data() call -- which apparently may re-map the journal file, invalidating the pointer. The attached patch fixes this crash for me, but being unfamiliar with the code, I don't know if I'm doing the right thing. This patch is also available from my github repository: git://github.com/intgr/systemd.git https://github.com/intgr/systemd Regards, Marti For the record, here's the original stack trace at the time of remapping: ret=0x7fff1d5cdec0) at src/journal/journal-file.c:330 ret=0x7fff1d5cdf28) at src/journal/journal-file.c:414 ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1101 i=5705, ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1147 p=6413608, data_offset=66600, direction=DIRECTION_DOWN, ret=0x7fff1d5ce0a0, offset=0x7fff1d5ce098) at src/journal/journal-file.c:1626 direction=DIRECTION_DOWN, ret=0x7fff1d5ce120, offset=0x7fff1d5ce128) at src/journal/sd-journal.c:533 direction=DIRECTION_DOWN, ret=0x7fff1d5ce170, offset=0x7fff1d5ce178) at src/journal/sd-journal.c:595 src/journal/sd-journal.c:651 From 9266fc6a58065a7c5dab67430fd78925e519dce9 Mon Sep 17 00:00:00 2001 From: Marti Raudsepp <marti@juffo.org> Date: Fri, 9 Mar 2012 16:23:00 +0200 Subject: [PATCH] journal: Don't hold pointers to journal while remapping This would cause a segfault otherwise.
2012-03-14log: introduce log_metavLennart Poettering
2012-03-14pkg-config: bring unit search path order in sync with the codeLennart Poettering
2012-03-14path-lookup: rearrange things so that the system path order follows the user ↵Lennart Poettering
path order
2012-03-14conf: when looking for configurations look in /etc first, in /run secondLennart Poettering
After long consideration we came to the conclusion that user configuration in /etc should always override the (generally computer generated) configuration in /run. User configuration should always be what matters over anything else. Hence rearrange the search orders accordingly. In general this should change very little as overriding like this is seldomn done so far, and the order between /etc and /usr stays the same.
2012-03-14machine-id: initialize from $container_uuid if not set otherwiseLennart Poettering
This is a result of the discussions on https://bugs.freedesktop.org/show_bug.cgi?id=46894
2012-03-14journald: allocate PAGE_SIZE bytes for selinux label lengthLennart Poettering
As suggested in https://bugzilla.redhat.com/show_bug.cgi?id=798760
2012-03-14socket: make sure that the name for per-connection services are uniqueLennart Poettering
If a client connects to us repeatedly always using the same source port and we instantiate a service for the incoming connection this might clash with an old instance. Hence, include the connection number, the same way we do it for AF_UNIX to make connections unique. https://bugs.freedesktop.org/show_bug.cgi?id=45297