summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2013-05-16bus: put together messages with memfd payload correctlyLennart Poettering
2013-05-16utmp: turn systemd-update-utmp-shutdown.service into a normal runtime serviceLennart Poettering
With this change systemd-update-utmp-shutdown.service is replaced by systemd-update-utmp.service which is started at boot and stays around until shutdown. This allows us to properly order the unit against both /var/log and auditd. https://bugzilla.redhat.com/show_bug.cgi?id=853104 https://bugs.freedesktop.org/show_bug.cgi?id=64365
2013-05-15bus: add support for adding memfds into message payloadLennart Poettering
2013-05-14journalctl: add -k/--dmesgZbigniew Jędrzejewski-Szmek
2013-05-14sd-journal: check if the pointers passed are the sameThomas Hindoe Paaboel Andersen
2013-05-14keymap: Add support for Eject button on MSI GE60/GE70Johan Heikkilä
2013-05-15bus: rework message struct to keep header with fields in same malloc() blockLennart Poettering
This allows us to guarantee that the first payload_vec we pass to the kernel for each message is guaranteed to include the full header and all its field.
2013-05-15bus: add macro for iterating through body parts of a messageLennart Poettering
2013-05-15bus: minor fixesLennart Poettering
2013-05-15bus: seal off memfds when sealing messagesLennart Poettering
2013-05-14bus: fix allocation of body parts from memfdLennart Poettering
2013-05-14bus: properly handle message bodies that are a chain of memory areas rather ↵Lennart Poettering
than a single one
2013-05-14bus: add and use UINT64_TO_PTR()Kay Sievers
2013-05-13journald-stream: typo in error message.Auke Kok
2013-05-13bus: test-bus-memfd - use pread()/pwrite()Kay Sievers
2013-05-13bus: update test-bus-memfdKay Sievers
2013-05-12bus: remove KDBUS_MAKE_ACCESS_WORLD, remove (n_payload > 2) checkKay Sievers
KDBUS_MAKE_ACCESS_WORLD is no longer needed, the kernel creates the kdbus device node with the uid/gid of the caller now.
2013-05-11Add support for ConditionSecurity=imaAuke Kok
Just as with SMACK, we don't really know if a policy has been loaded or not, as the policy interface is write-only. Assume therefore that if ima is present in securityfs that it is enabled. Update the man page to reflect that "ima" is a valid option now as well.
2013-05-11Re-indent with spaces.Auke Kok
2013-05-11bus: update test-bus-memfdKay Sievers
2013-05-10bus: fix test-bus-memfdKay Sievers
2013-05-10bus: fix error check in memfd codeLennart Poettering
2013-05-10bus: extend memfd testLennart Poettering
2013-05-10nspawn: only warn about audit when booting the containerDave Reisner
The audit subsystem isn't relevant when nspawn is only being used as a chroot.
2013-05-10bus: add new API for kdbus memfd functionalityLennart Poettering
2013-05-10kdbus: update kdbus.h from upstreamKay Sievers
2013-05-10bus: catch up with latest kdbusLennart Poettering
2013-05-10bus: add sd_bus_message_append_string_space() for zero-copy string appendingLennart Poettering
2013-05-09nspawn: Include netlink headers rather than using #ifdefColin Walters
This is a better fix than e13e1fad8b231e187bd5de3ce668411bdcd3ac1a for failing to compile without audit that 77b6e19458f37cfde127ec6aa9494c0ac45ad890 introduced.
2013-05-09Fix previous commit for !HAVE_AUDITColin Walters
2013-05-09systemd-python: allow threads around flushZbigniew Jędrzejewski-Szmek
flush() is potentially costly.
2013-05-09systemd-python: use consistent indentationZbigniew Jędrzejewski-Szmek
2013-05-10audit: since audit is apparently never going to be fixed for containers tell ↵Lennart Poettering
the user what's going on Let's try to be helpful to the user and give him a hint what he can do to make nspawn work with normal OS containers. https://bugzilla.redhat.com/show_bug.cgi?id=893751
2013-05-09Start ctrl-alt-del.target irreversiblyEelco Dolstra
This makes ctrl-alt-del reboots more robust, just like "systemctl reboot".
2013-05-09systemd-python: wrap sd_login_monitorZbigniew Jędrzejewski-Szmek
2013-05-09bus: add API for appending/reading fixed arraysLennart Poettering
2013-05-08condition, man: Add support for ConditionSecurity=smackKarol Lewandowski
According to Documentation/security/Smack.txt: In keeping with the intent of Smack, configuration data is minimal and not strictly required. The most important configuration step is mounting the smackfs pseudo filesystem. This means that checking the mount point should be enough.
2013-05-08systemd-python: add wrappers for easy functions in sd-loginZbigniew Jędrzejewski-Szmek
sd_get_uids, sd_get_seats, sd_get_sessions, and sd_get_machine_names.
2013-05-08systemd-python: add __version__ stringsZbigniew Jędrzejewski-Szmek
2013-05-08Rearrange a few fields to reduce holesZbigniew Jędrzejewski-Szmek
2013-05-07hostnamectl: suppress outputting of pretty hostname field in status if emptyLennart Poettering
2013-05-07hostname: only suppress setting of pretty hostname if it is non-equal to the ↵Lennart Poettering
static hostname and if the static hostname is set, too https://bugzilla.redhat.com/show_bug.cgi?id=957814
2013-05-07journald: don't recalculate the ACL maskLennart Poettering
Otherwise we might end up with executable files if some default ACL is set for the journal directory.
2013-05-07build-sys: support builds without EAs againLennart Poettering
2013-05-07hashmap: document trivial_hash_func()Lennart Poettering
2013-05-07kmod-setup: properly iterate through module tableLennart Poettering
Previously we skipped every second entry. This also cleans up much of the code and removes some dead code.
2013-05-07systemd-sleep: it is not an error if the config file is missingZbigniew Jędrzejewski-Szmek
2013-05-07login: add missing _public_ to sd_get_machine_names()Lennart Poettering
2013-05-07journald: be more careful when we try to flush the runtime journal to disk ↵systemd/v203Lennart Poettering
and the disk is close to being full Bump the minimal size of the journal so that we can be sure creating the journal file will always succeed. Previously the minimum size was smaller than a empty jounral file...
2013-05-06core: escape unit name from udevMUNEDA Takahiro
This patch escapes a unit name which was derived from udev. Please imagine following udev rule. ACTION=="online|offline", TAG+="systemd", ENV{SYSTEMD_WANTS}="muneda@%p.service" ACTION=="online|offline", TAG+="systemd", ENV{SYSTEMD_WANTS}="muneda@%r.service" ACTION=="online|offline", TAG+="systemd", ENV{SYSTEMD_WANTS}="muneda@%S.service" When unit name is derived from udev via udev_device_get_property_value(), the name may contains '/' if ENV{SYSTEMD_WANTS} has the udev options $devpath(%p), $root(%r), or $sys(%S). However, '/' is a invalid char for unit name so processing of this rule fails as Invalid argument with following message. Apr 22 13:21:37 localhost systemd[1]: Failed to load device unit: Invalid argument Apr 22 13:21:37 localhost systemd[1]: Failed to process udev device event: Invalid argument This patch escapes those invalid chars in a unit name. Tested with 202, and confirmed to apply cleanly on top of commit 195f8e36. Thanks, Takahiro