summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* core: don't use uninitialized errnoLennart Poettering2015-09-051-1/+1
|
* machine: clarify that /var/lib/containers is legacyLennart Poettering2015-09-051-1/+1
|
* TODO: update networkd sectionDavid Herrmann2015-09-051-2/+1
| | | | | Remove two freshly implemented features, and add TSO support as a new one.
* Merge pull request #1140 from poettering/sd-event-signalsDavid Herrmann2015-09-0530-337/+948
|\ | | | | A variety of sd-event, sd-login and cgroup fixes
| * sd-login: minor header commenting improvementsLennart Poettering2015-09-051-14/+14
| |
| * sd-login: add new sd_pid_get_cgroup() APILennart Poettering2015-09-056-8/+102
| | | | | | | | | | | | | | | | | | | | This adds a new sd_pid_get_cgroup() call to sd-login which may be used to query the control path of a process. This is useful for programs when making use of delegation units, in order to figure out which subtree has been delegated. In light of the unified control group hierarchy this is finally safe to do, hence let's add a proper API for it, to make it easier to use this.
| * cgroups: delegation to unprivileged services is safe in the unified hierarchyLennart Poettering2015-09-041-4/+9
| | | | | | | | | | | | Delegation to unpriviliged processes is safe in the unified hierarchy, hence allow it. This has the benefit of permitting "systemd --user" instances to further partition their resources between user services.
| * sd-login: rework error handlingLennart Poettering2015-09-049-101/+323
| | | | | | | | | | | | Makre sure we always return sensible errors for the various, following the same rules, and document them in a comment in sd-login.c. Also, update all relevant man pages accordingly.
| * sd-event: make sure RT signals are not droppedLennart Poettering2015-09-042-139/+357
| | | | | | | | | | | | | | | | | | RT signals operate in a queue, and we should be careful to never merge two queued signals into one. Hence, makes sure we only ever dequeue a single signal at a time and leave the remaining ones queued in the signalfd. In order to implement correct priorities for the signals introduce one signalfd per priority, so that we only process the highest priority signal at a time.
| * test: add one more test case for parse_pid()Lennart Poettering2015-09-041-0/+3
| |
| * nspawn: enable all controllers we can for the "payload" subcgroup we createLennart Poettering2015-09-042-1/+8
| | | | | | | | | | | | | | In the unified hierarchy delegating controller access is safe, hence make sure to enable all controllers for the "payload" subcgroup if we create it, so that the container will have all controllers enabled the nspawn service itself has.
| * cgroup: always read the supported controllers from the root cgroup of the ↵Lennart Poettering2015-09-042-2/+22
| | | | | | | | | | | | | | local container Otherwise we might end up thinking that we support more controllers than actually enabled for the container we are running in.
| * cgroup: fix potential access of uninitialized variableLennart Poettering2015-09-041-1/+1
| |
| * cgroup-util: make cg_pid_get_path() return -ENODATA when controller can't be ↵Lennart Poettering2015-09-041-1/+1
| | | | | | | | | | | | | | | | found If the controller managed by systemd cannot found in /proc/$PID/cgroup, return ENODATA, the usual error for cases where the data being looked for does not exist, even if the process does.
| * cgroup: fix potential bad memory accessLennart Poettering2015-09-041-2/+2
| |
| * cgroup: make sure cg_is_empty_recursive() returns 1 for non-existing cgroupsLennart Poettering2015-09-041-0/+2
| | | | | | | | | | | | Previously, on the legacy hierarchy a non-existing cgroup was considered identical to an empty one, but the unified hierarchy the check for a non-existing one returned ENOENT.
| * cgroup: when comparing agent paths, use path_equal()Lennart Poettering2015-09-041-1/+1
| | | | | | | | | | After all a path is a path is a path and we should use path_equal() to comapre those.
| * audit: audit calls should return ENODATA when process are not in an audit ↵Lennart Poettering2015-09-042-5/+12
| | | | | | | | | | | | | | session ENODATA is how we usually indicate such "missing info" cases, so we should do this here, too.
| * util: document why parse_uid() returns ENXIOLennart Poettering2015-09-042-1/+7
| | | | | | | | | | | | parse_uid() returns EINVAL for invalid strings, but ENXIO for the (uid_t) -1 user ids in order to distinguish these two cases. Document this.
| * core: split up manager_get_unit_by_pid()Lennart Poettering2015-09-043-9/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | Let's move the actual cgroup part of it into a new separate function manager_get_unit_by_pid_cgroup(), and then make manager_get_unit_by_pid() just a wrapper that also checks the two pid hashmaps. Then, let's make sure the various calls that want to deliver events to the owners of a PID check both hashmaps and the cgroup and deliver the event to *each* of them. OTOH make sure bus calls like GetUnitByPID() continue to check the PID hashmaps first and the cgroup only as fallback.
| * cgroup: move controller to dirname translation into join_path_legacy()Lennart Poettering2015-09-041-16/+13
| | | | | | | | Let's simplify things a bit.
| * util: add new uid_is_valid() callLennart Poettering2015-09-043-7/+23
| | | | | | | | | | | | This simply factors out the uid validation checks from parse_uid() and uses them everywhere. This simply verifies that the passed UID is neither 64bit -1 nor 32bit -1.
| * macro: introduce new PID_TO_PTR macros and make use of themLennart Poettering2015-09-046-24/+27
| | | | | | | | | | | | | | This adds a new PID_TO_PTR() macro, plus PTR_TO_PID() and makes use of it wherever we maintain processes in a hash table. Previously we sometimes used LONG_TO_PTR() and other times ULONG_TO_PTR() for that, hence let's make this more explicit and clean up things.
| * man: always use the same example in nss module documentationLennart Poettering2015-09-042-4/+4
| | | | | | | | | | | | | | | | Show the same recommended example file in all three man pages, just highlight the different, relevant parts. This should be less confusing for users, and clarify what we actually recommend how /etc/nsswitch.conf is set up.
* | Merge pull request #1157 from dvdhrm/logind-wallfixDaniel Mack2015-09-051-4/+6
|\ \ | | | | | | login: fix NULL-deref on wall_message
| * | login: fix NULL-deref on wall_messageDavid Herrmann2015-09-051-4/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We treat an empty wall-message equal to a NULL wall-message since: commit 5744f59a3ee883ef3a78214bd5236157acdc35ba Author: Lennart Poettering <lennart@poettering.net> Date: Fri Sep 4 10:34:47 2015 +0200 logind: treat an empty wall message like a NULL one Fix the shutdown scheduler to not deref a NULL pointer, but properly check for an empty wall-message. Fixes: #1120
* | | Merge pull request #1145 from ↵Daniel Mack2015-09-051-0/+2
|\ \ \ | | | | | | | | | | | | | | | | systemd-mailing-devs/1441372815-12195-1-git-send-email-hdegoede@redhat.com hwdb: Add Thinkpad T550 / W550s to 70-pointingstick.hwdb
| * | | hwdb: Add Thinkpad T550 / W550s to 70-pointingstick.hwdbHans de Goede2015-09-041-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Like many other recent thinkpads the factory default pointingstick sensitivity on these devices is quite low, making the pointingstick very slow in moving the cursor. This extends the existing hwdb rules for tweaking the sensitivity to also apply to the T550 / W550s models. BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1200717
* | | | Merge pull request #1150 from evverx/update-systemctl-completionLennart Poettering2015-09-051-2/+20
|\ \ \ \ | | | | | | | | | | shell-completion: update systemctl bash completion
| * | | | shell-completion: update systemctl bash completionEvgeny Vereshchagin2015-09-041-2/+20
| | | | | | | | | | | | | | | | | | | | | | | | | Many new options have been added since the bash completion was last updated.
* | | | | Merge pull request #1149 from martinpitt/fix-dhcp-error-codesLennart Poettering2015-09-052-6/+6
|\ \ \ \ \ | | | | | | | | | | | | networkd: adjust error codes for nonexisting DHCP data
| * | | | | networkd: adjust error codes for nonexisting DHCP dataMartin Pitt2015-09-042-6/+6
| | |/ / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Commit 0339cd770 changed libsystemd-network's error code for missing DHCP lease data from ENOENT to ENODATA. Adjust networkd accordingly. This fixes interfaces being stuck in "degraded/configuring" mode forever. https://github.com/systemd/systemd/issues/1147
* | | | | Merge pull request #1146 from martinpitt/masterLennart Poettering2015-09-054-3/+9
|\ \ \ \ \ | |_|_|/ / |/| | | | tests: Skip tests which need to access /sys/fs/cgroup if that is not …
| * | | | tests: Skip tests which need to access /sys/fs/cgroup if that is not availableMartin Pitt2015-09-044-3/+9
| |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Commit efdb023 ("core: unified cgroup hierarchy support") introduced a new error ENOEXEC in cg_unified() if /sys/fs/cgroup/ is not available. Adjust the "skip" checks in various tests accordingly. Add a corresponding "skip" check to test-bus-creds as well, as sd_bus_creds_new_from_pid() now calls cg_unified() as well. This re-fixes "make check" in build chroots without /sys/fs/cgroup. https://github.com/systemd/systemd/issues/1132
* / / / NEWS: add entries for v226David Herrmann2015-09-051-0/+61
|/ / / | | | | | | | | | | | | Initial set of features for the upcoming v226 release next week. This is mostly about the unified cgroup hierarchy and DHCP.
* | | Merge pull request #1142 from dvdhrm/proxy-nofileLennart Poettering2015-09-041-0/+5
|\ \ \ | | | | | | | | bus-proxy: increase NOFILE limit
| * | | bus-proxy: increase NOFILE limitDavid Herrmann2015-09-041-0/+5
| | |/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The bus-proxy manages the kdbus connections of all users on the system (regarding the system bus), hence, it needs an elevated NOFILE. Otherwise, a single user can trigger ENFILE by opening NOFILE connections to the bus-proxy. Note that the bus-proxy still does per-user accounting, indirectly via the proxy/fake API of kdbus. Hence, the effective per-user limit is not raised by this. However, we now prevent one user from consuming the whole FD limit of the shared proxy. Also note that there is no *perfect* way to set this. The proxy is a shared object, so it needs a larger NOFILE limit than the highest limit of all users. This limit can be changed dynamically, though. Hence, we cannot protect against it. However, a raised NOFILE limit is a privilege, so we just treat it as such and basically allow these privileged users to be able to consume more resources than normal users (and, maybe, cause some limits to be exceeded by this). Right now, kdbus hard-codes 1024 max connections per user on each bus. However, we *must not* rely on this. This limits could be easily dropped entirely, as the NOFILE limit is a suitable limit on its on.
* | | Merge pull request #1141 from poettering/logind-fixesDaniel Mack2015-09-041-9/+12
|\ \ \ | |/ / |/| | Various logind fixes
| * | logind: when parsing a boolean via sd-bus the type must be "int"Lennart Poettering2015-09-041-1/+1
| | | | | | | | | | | | And not bool.
| * | logind: treat an empty wall message like a NULL oneLennart Poettering2015-09-041-8/+11
|/ /
* | hwdb: Update database of Bluetooth company identifiersMarcel Holtmann2015-09-041-0/+33
| |
* | udev: ignore ENOEXEC from cgroup lookupDavid Herrmann2015-09-031-1/+1
| | | | | | | | | | | | The recent cgroup-rework changed the error code for un-mounted cgroupfs to ENOEXEC. Make sure udev ignores it just like ENOENT and does not spill warnings on the screen.
* | Merge pull request #1127 from neheb/masterDaniel Mack2015-09-031-0/+9
|\ \ | | | | | | hwdb: Add Mionix Mouse
| * | Add Mionix MouseMangix2015-09-031-0/+9
| |/
* | Merge pull request #1134 from reverendhomer/patch-1Lennart Poettering2015-09-031-4/+1
|\ \ | | | | | | cgroup-util: Removed unreachable statement in cg_get_path
| * | cg_get_path: Removed unreachable statementreverendhomer2015-09-031-4/+1
|/ / | | | | | | controller cannot be NULL because if-statement in L509 has return Coverity #1322379
* | Merge pull request #1123 from phomes/scope-no-bool-vs-intLennart Poettering2015-09-031-1/+1
|\ \ | | | | | | scope: do not compare a bool return with "<= 0"
| * | scope: do not compare a bool return with "<= 0"Thomas Hindoe Paaboel Andersen2015-09-021-1/+1
| |/
* | Merge pull request #1126 from phomes/indentation2Lennart Poettering2015-09-032-2/+2
|\ \ | |/ |/| tree-wide: fix indentation
| * tree-wide: fix indentationThomas Hindoe Paaboel Andersen2015-09-022-2/+2
|/