summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* units: fix minor typoLennart Poettering2014-06-061-1/+1
|
* namespace: beef up read-only bind mount logicLennart Poettering2014-06-065-31/+183
| | | | | | | Instead of blindly creating another bind mount for read-only mounts, check if there's already one we can use, and if so, use it. Also, recursively mark all submounts read-only too. Also, ignore autofs mounts when remounting read-only unless they are already triggered.
* namespace: also include /root in ProtectHome=Lennart Poettering2014-06-051-2/+2
| | | | | /root can't really be autofs, and is also a home, directory, so cover it with ProtectHome=.
* namespace: when setting up an inaccessible mount point, unmounting ↵Lennart Poettering2014-06-053-0/+76
| | | | | | | everything below This has the benefit of not triggering any autofs mount points unnecessarily.
* umount: modernizationsLennart Poettering2014-06-051-38/+27
|
* util: fix fd_cloexec(), fd_nonblock()Lennart Poettering2014-06-051-2/+2
|
* core: introduce new Restart=on-abnormal settingLennart Poettering2014-06-053-32/+129
| | | | | | | | | | | Restart=on-abnormal is similar to Restart=on-failure, but avoids restarts on unclean exit codes (but still doing restarts on all obviously unclean exits, such as timeouts, signals, coredumps, watchdog timeouts). Also see: https://fedorahosted.org/fpc/ticket/191
* update TODOLennart Poettering2014-06-051-2/+0
|
* sd-daemon: introduce sd_pid_notify() and sd_pid_notifyf()Lennart Poettering2014-06-054-133/+163
| | | | | | | | | | | | sd_pid_notify() operates like sd_notify(), however operates on a different PID (for example the parent PID of a process). Make use of this in systemd-notify, so that message are sent from the PID specified with --pid= rather than the usually shortlived PID of systemd-notify itself. This should increase the likelyhood that PID 1 can identify the cgroup that the notification message was sent from properly.
* update TODOLennart Poettering2014-06-051-3/+1
|
* socket-proxyd: port to asynchronous name resolution using sd-resolveLennart Poettering2014-06-052-132/+190
|
* update TODOLennart Poettering2014-06-051-1/+0
|
* bus: make use of sd_bus_try_close() in exit-on-idle servicesLennart Poettering2014-06-051-2/+23
|
* sd-event: restore correct timeout behaviourLennart Poettering2014-06-051-1/+4
|
* update TODOLennart Poettering2014-06-051-3/+0
|
* kdbus: when uploading bus name policy, resolve users/groups out-of-processLennart Poettering2014-06-0511-149/+530
| | | | | It's not safe invoking NSS from PID 1, hence fork off worker processes that upload the policy into the kernel for busnames.
* core: don't include /boot in effect of ProtectSystem=Lennart Poettering2014-06-052-4/+3
| | | | | | | | | | | | | This would otherwise unconditionally trigger any /boot autofs mount, which we probably should avoid. ProtectSystem= will now only cover /usr and (optionally) /etc, both of which cannot be autofs anyway. ProtectHome will continue to cover /run/user and /home. The former cannot be autofs either. /home could be, however is frequently enough used (unlikey /boot) so that it isn't too problematic to simply trigger it unconditionally via ProtectHome=.
* socket: add SocketUser= and SocketGroup= for chown()ing sockets in the file ↵Lennart Poettering2014-06-057-90/+248
| | | | | | | system This is relatively complex, as we cannot invoke NSS from PID 1, and thus need to fork a helper process temporarily.
* core: make sure we properly parse ProtectHome= and ProtectSystem=Lennart Poettering2014-06-041-2/+2
|
* ycm: update flag blacklistDave Reisner2014-06-041-0/+1
| | | | | -Wdate-time isn't known to clang, and it seems to cause errors in syntastic.
* networkd: link - intialize mac addressTom Gundersen2014-06-041-0/+4
| | | | | | Otherwise .netwrok matching on MAC address will not work. Based on patch by Dave Reisner, and bug originally reported by Max Pray.
* update TODOLennart Poettering2014-06-041-3/+1
|
* core: rename ReadOnlySystem= to ProtectSystem= and add a third value for ↵Lennart Poettering2014-06-0420-79/+147
| | | | | | | | | | also mounting /etc read-only Also, rename ProtectedHome= to ProtectHome=, to simplify things a bit. With this in place we now have two neat options ProtectSystem= and ProtectHome= for protecting the OS itself (and optionally its configuration), and for protecting the user's data.
* hwdb: fix case-sensitive matchKay Sievers2014-06-041-1/+1
|
* build-sys: accommodate gcc-4.9.0 link-time optimization (LTO) changesJohn2014-06-041-1/+1
| | | | | | | | | | | | | | | | | | systemd fails to build (symbols not found/resolved during cgls link step) under gcc-4.9.0 due to link-time optimization (lto) changes, in particular from gcc-4.9.0/NEWS: + When using a linker plugin, compiling with the -flto option now generates slim objects files (.o) which only contain intermediate language representation for LTO. Use -ffat-lto-objects to create files which contain additionally the object code. To generate static libraries suitable for LTO processing, use gcc-ar and gcc-ranlib; to list symbols from a slim object file use gcc-nm. (Requires that ar, ranlib and nm have been compiled with plugin support.) Both -flto and -ffat-lto-objects are now needed when building and linking against static libs w/LTO.
* update TODOLennart Poettering2014-06-041-6/+2
|
* core: provide /dev/ptmx as symlink in PrivateDevices= execution environmentsLennart Poettering2014-06-041-1/+4
|
* core: make sure PrivateDevices= makes /dev/log availableLennart Poettering2014-06-042-2/+6
| | | | | | | Now that we moved the actual syslog socket to /run/systemd/journal/dev-log we can actually make /dev/log a symlink to it, when PrivateDevices= is used, thus making syslog available to services using PrivateDevices=.
* initctl: move /dev/initctl fifo into /run, replace it by symlinkLennart Poettering2014-06-041-1/+2
| | | | With this change we have no fifos/sockets remaining in /dev.
* journald: move /dev/log socket to /runLennart Poettering2014-06-047-6/+39
| | | | | | This way we can make the socket also available for sandboxed apps that have their own private /dev. They can now simply symlink the socket from /dev.
* udev: guard REREADPT by exclusive lock instead of O_EXCLKay Sievers2014-06-041-2/+5
|
* socket: add new Symlinks= option for socket unitsLennart Poettering2014-06-047-16/+160
| | | | | | | | | | | With Symlinks= we can manage one or more symlinks to AF_UNIX or FIFO nodes in the file system, with the same lifecycle as the socket itself. This has two benefits: first, this allows us to remove /dev/log and /dev/initctl from /dev, thus leaving only symlinks, device nodes and directories in the /dev tree. More importantly however, this allows us to move /dev/log out of /dev, while still making it accessible there, so that PrivateDevices= can provide /dev/log too.
* udev: make sure we always get "change" for the diskKay Sievers2014-06-041-14/+39
| | | | | The kernel will return 0 for REREADPT when no partition table is found, we have to send out "change" ourselves.
* udev: guard REREADP logic with open(O_ECXL)Kay Sievers2014-06-041-1/+1
|
* udev: try first re-reading the partition tableKay Sievers2014-06-041-6/+33
| | | | | | | | | | | | | | | mounted partitions: # dd if=/dev/zero of=/dev/sda bs=1 count=1 UDEV [4157.369250] change .../0:0:0:0/block/sda (block) UDEV [4157.375059] change .../0:0:0:0/block/sda/sda1 (block) UDEV [4157.397088] change .../0:0:0:0/block/sda/sda2 (block) UDEV [4157.404842] change .../0:0:0:0/block/sda/sda4 (block) unmounted partitions: # dd if=/dev/zero of=/dev/sdb bs=1 count=1 UDEV [4163.450217] remove .../target6:0:0/6:0:0:0/block/sdb/sdb1 (block) UDEV [4163.593167] change .../target6:0:0/6:0:0:0/block/sdb (block) UDEV [4163.713982] add .../target6:0:0/6:0:0:0/block/sdb/sdb1 (block)
* socket: optionally remove sockets/FIFOs in the file system after useLennart Poettering2014-06-047-29/+89
|
* udev: link-config - fix mem leakTom Gundersen2014-06-041-1/+3
| | | | Reported by Kay.
* udev: synthesize "change' events for partitions when tools change the diskKay Sievers2014-06-041-2/+42
| | | | | | This should make sure that fdisk-like programs will automatically cause an update of all partitions, just like mkfs-like programs cause an update of the partition.
* README: mention new required user systemd-bus-proxyLennart Poettering2014-06-041-14/+11
|
* fsck: disable "-l" option for nowKay Sievers2014-06-042-2/+15
| | | | https://bugs.freedesktop.org/show_bug.cgi?id=79576#c5
* udevd: inotify - modernizationsKay Sievers2014-06-041-23/+22
|
* bus-proxy: drop priviliges if we canLennart Poettering2014-06-044-11/+40
| | | | | | Either become uid/gid of the client we have been forked for, or become the "systemd-bus-proxy" user if the client was root. We retain CAP_IPC_OWNER so that we can tell kdbus we are actually our own client.
* remove ReadOnlySystem and ProtectedHome from udevd and logindKay Sievers2014-06-042-4/+0
| | | | | logind needs access to /run/user/, udevd fails during early boot with these settings
* core: add new ReadOnlySystem= and ProtectedHome= settings for service unitsLennart Poettering2014-06-0321-4/+187
| | | | | | | | | | | | | | ReadOnlySystem= uses fs namespaces to mount /usr and /boot read-only for a service. ProtectedHome= uses fs namespaces to mount /home and /run/user inaccessible or read-only for a service. This patch also enables these settings for all our long-running services. Together they should be good building block for a minimal service sandbox, removing the ability for services to modify the operating system or access the user's private data.
* networkd: split runtime config dir from state dirTom Gundersen2014-06-035-20/+20
| | | | | | | | | | | | Configuration will be in root:root /run/systemd/network and state will be in systemd-network:systemd-network /run/systemd/netif This matches what we do for logind's seat/session state.
* udev: exclude device-mapper from block device ownership event lockingKay Sievers2014-06-031-1/+13
|
* shared: capability - don't loop over the cap bits if they are all unsetTom Gundersen2014-06-031-4/+4
|
* shared: allow drop_priviliges to drop all privsTom Gundersen2014-06-031-9/+11
|
* udev: always close lock file descriptorKay Sievers2014-06-031-6/+4
| | | | https://bugs.freedesktop.org/show_bug.cgi?id=79576
* sd-dhcp-client: allways request broadcastCamilo Aguilar2014-06-031-0/+9
| | | | | | | | | | | | | On systems which cannot receive unicast packets until its IP stack has been configured we need to request broadcast packets. We are currently not able to reliably detect when this is necessary, so set it unconditionally for now. This is set on all packets, but the DHCP server will only broadcast the packets that are necessary, and unicast the rest. For more information please refer to this thread in CoreOS: https://github.com/coreos/bugs/issues/12 [tomegun: rephrased commit message]