summaryrefslogtreecommitdiffstats
path: root/man/pam_systemd.xml (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-06-02test: add test for sha256Yu Watanabe2-0/+52
2022-06-02sha256: use memcpy() when result buffer is unalignedYu Watanabe1-19/+20
Fixes #23578.
2022-06-01src: The return value of server_vacuum () is not used and could be modified ↵Li kunyu2-4/+2
to void type
2022-05-31sd-bus: drop constant argument for message_extend_fields()Yu Watanabe1-5/+5
2022-05-31sd-bus: drop D-Bus version 2 format supportYu Watanabe11-2376/+367
It seems the format is used only by kdbus.
2022-05-31sd-bus: merge message_peek_fields() and buffer_peek()Yu Watanabe1-32/+25
2022-05-31sd-bus: make several functions staticYu Watanabe2-24/+6
And drop 'bus_' prefix from them.
2022-05-31sd-bus: use UINT32_MAXYu Watanabe3-4/+4
2022-05-31sd-bus: drop unnecessary castYu Watanabe1-1/+1
2022-05-31sd-bus: drop redundant conditionYu Watanabe1-2/+1
By the previous commit, ALIGN8() is always equal to or greater than the argument.
2022-05-31sd-bus: use ALIGN8()Yu Watanabe1-1/+1
2022-05-31boot: use ALIGN4()Yu Watanabe2-5/+5
2022-05-31macro: make ALIGN4() and ALIGN8() also return SIZE_MAX on overflowYu Watanabe2-19/+8
This also drops unused ALIGN4_PTR(), ALIGN8_PTR(), and ALIGN_TO_PTR().
2022-05-31tree-wide: use ALIGN_PTR()Yu Watanabe4-8/+8
2022-05-31Move message repeatAlexander Shopov2-7/+7
Original catalog file is in English Move the repeating German message to German catalog Signed-off-by: Alexander Shopov <ash@kambanaria.org>
2022-05-31Update Bulgarian translationAlexander Shopov2-295/+412
po: catalog: Bring bg.po and catalog file to 100% Signed-off-by: Alexander Shopov <ash@kambanaria.org>
2022-05-31portable: fix command option in commentYu Watanabe1-4/+4
Follow-up for edea370222eec3d185dd84a7d9e942ec5933af63.
2022-05-31boot: Use xstrdup8/16Jan Janssen3-23/+22
Note that xstrdup is now safe to call with a NULL pointer and will just return NULL in that case.
2022-05-31boot: Add xstrdup8/16Jan Janssen6-23/+124
2022-05-31boot: Use memcmp/memcpy/memsetJan Janssen15-42/+42
2022-05-31boot: Add memcmp/memcpy/memsetJan Janssen3-1/+127
2022-05-31boot: Use strsize8/16Jan Janssen4-8/+8
2022-05-31boot: Add strsize8/16Jan Janssen2-0/+26
2022-05-31boot: Use strchr8/16Jan Janssen4-19/+6
2022-05-31boot: Add strchr8/16Jan Janssen3-0/+42
2022-05-31boot: Use strcpy8/16Jan Janssen1-2/+2
2022-05-31boot: Add strcpy8/16Jan Janssen3-0/+52
2022-05-31boot: Use strtolower8/16Jan Janssen1-2/+2
2022-05-31boot: Add strtolower8/16Jan Janssen3-0/+40
2022-05-31boot: Use strcmp16 for cpio sortingJan Janssen3-4/+4
2022-05-31boot: Use strcmp8/16Jan Janssen6-98/+63
This also replaces streq and similar functions for consistency. Note that streq16 is null pointer safe, so streq_ptr can be safely replaced too.
2022-05-31boot: Add strcmp8/16Jan Janssen3-0/+204
2022-05-31boot: Use strlen8/16Jan Janssen9-48/+33
The casts in this and the next few commits are curently necessary because CHAR8 is defined as uint8_t in gnu-efi, while char is signed. Once we switch from gnu-efi typedefs to stdint types, the casts will be dropped.
2022-05-31boot: Add strlen8/16Jan Janssen4-0/+98
2022-05-31boot: Use stddef.h offsetofJan Janssen1-2/+1
2022-05-31seccomp: fix a typo in error messageFrantisek Sumsal1-1/+1
2022-05-31docs: fix typo XBOOOTLDR -> XBOOTLDRMatthias Lisin1-1/+1
2022-05-31Simplify random number selectionJason A. Donenfeld20-203/+141
We currently have a convoluted and complex selection of which random numbers to use. We can simplify this down to two functions that cover all of our use cases: 1) Randomness for crypto: this one needs to wait until the RNG is initialized. So it uses getrandom(0). If that's not available, it polls on /dev/random, and then reads from /dev/urandom. This function returns whether or not it was successful, as before. 2) Randomness for other things: this one uses getrandom(GRND_INSECURE). If it's not available it uses getrandom(GRND_NONBLOCK). And if that would block, then it falls back to /dev/urandom. And if /dev/urandom isn't available, it uses the fallback code. It never fails and doesn't return a value. These two cases match all the uses of randomness inside of systemd. I would prefer to make both of these return void, and get rid of the fallback code, and simply assert in the incredibly unlikely case that /dev/urandom doesn't exist. But Luca disagrees, so this commit attempts to instead keep case (1) returning a return value, which all the callers already check, and fix the fallback code in (2) to be less bad than before. For the less bad fallback code for (2), we now use auxval and some timestamps, together with various counters representing the invocation, hash it all together and provide the output. Provided that AT_RANDOM is secure, this construction is probably okay too, though notably it doesn't have any forward secrecy. Fortunately, it's only used by random_bytes() and not by crypto_random_bytes().
2022-05-30cgroup-util: Properly handle conditions where cgroup.threads is empty after ↵msizanoen11-3/+12
SIGKILL but processes still remain After sending a SIGKILL to a process, the process might disappear from `cgroup.threads` but still show up in `cgroup.procs` and still remains in the cgroup and cause migrating new processes to `Delegate=yes` cgroups to fail with `-EBUSY`. This is especially likely for heavyweight processes that consume more kernel CPU time to clean up. Fix this by only returning 0 when both `cgroup.threads` and `cgroup.procs` are empty.
2022-05-30man/nspawn: os-release is only checked for booted containersBenjamin Franzke1-1/+1
/etc/os-release existence is only enforced in --boot mode, therefore the term "starting" (which also applies to chroot-like mode) is substituted with "booting" in this context.
2022-05-30man/nspawn: add a sentence-connecting adverb to machinectl noteBenjamin Franzke1-1/+1
The recommendation to use machinectl login/shell instead of trying to combine two distinct container instances seemed a litte bit out of context and is now combined via "rather".
2022-05-30man/nspawn: fix boot-option related wordingBenjamin Franzke1-4/+4
2022-05-30core: make unit_add_two_dependencies() or friends return 1 on changedYu Watanabe1-9/+13
Follow-up for f971def3c23d780aab99d988bd71b94931d74be6.
2022-05-30core/unit: fix notification about unit dependency changeYu Watanabe1-10/+9
This also makes unit_add_dependency() return 1 only when a dependency is added.
2022-05-30esp: fix typoYu Watanabe1-1/+1
Follow-up for 13d7c841a24f784995a000230706f259c4baec96.
2022-05-30coccinelle: don't try to use IN_SET() in assert_cc()Frantisek Sumsal1-5/+17
Since assert_cc() requires an integral constant expression.
2022-05-30doc: fix typoYu Watanabe1-5/+5
Follow-ups for #23504.
2022-05-30journal: return & log in one statementFrantisek Sumsal1-4/+3
2022-05-30analyze: use IN_SET() in one more placeFrantisek Sumsal1-1/+1
2022-05-30test: add coverage for #23481Frantisek Sumsal1-0/+8
Provide some coverage for systemd/systemd#23481. Without 794da5a: ``` [ 34.730815] testsuite-29.sh[600]: + portablectl detach --now --runtime --enable /tmp/rootdir minimal-app0 Stopping minimal-app0-foo.service... [ OK ] Stopped minimal-app0-foo.service. Stopping minimal-app0.service... [ OK ] Stopped minimal-app0.service. [ 34.878050] testsuite-29.sh[1383]: ================================================================= [ 34.878421] testsuite-29.sh[1383]: ==1383==ERROR: LeakSanitizer: detected memory leaks [ 34.878784] testsuite-29.sh[1383]: Direct leak of 48 byte(s) in 2 object(s) allocated from: [ 34.879174] testsuite-29.sh[1383]: #0 0x7fdf9c8b0f8c in reallocarray (/lib64/libasan.so.6+0xaef8c) [ 34.879554] testsuite-29.sh[1383]: #1 0x7fdf9b4270f5 in unit_file_changes_add ../src/shared/install.c:282 [ 34.879926] testsuite-29.sh[1383]: #2 0x7fdf9b2ad9e5 in bus_deserialize_and_dump_unit_file_changes ../src/shared/bus-unit-util.c:2688 [ 34.880267] testsuite-29.sh[1383]: #3 0x40bc27 in maybe_enable_disable ../src/portable/portablectl.c:582 [ 34.880673] testsuite-29.sh[1383]: #4 0x40ef56 in maybe_stop_disable ../src/portable/portablectl.c:810 [ 34.881064] testsuite-29.sh[1383]: #5 0x410bc2 in detach_image ../src/portable/portablectl.c:924 [ 34.881493] testsuite-29.sh[1383]: #6 0x7fdf9b5df424 in dispatch_verb ../src/shared/verbs.c:103 [ 34.881953] testsuite-29.sh[1383]: #7 0x41604a in run ../src/portable/portablectl.c:1427 [ 34.882459] testsuite-29.sh[1383]: #8 0x416106 in main ../src/portable/portablectl.c:1430 [ 34.882947] testsuite-29.sh[1383]: #9 0x7fdf99d5de8f in __libc_start_call_main (/lib64/libc.so.6+0x44e8f) [ 34.883368] testsuite-29.sh[1383]: Indirect leak of 104 byte(s) in 2 object(s) allocated from: [ 34.883732] testsuite-29.sh[1383]: #0 0x7fdf9c85b8f7 in strdup (/lib64/libasan.so.6+0x598f7) [ 34.884089] testsuite-29.sh[1383]: #1 0x7fdf9b4271aa in unit_file_changes_add ../src/shared/install.c:288 [ 34.884508] testsuite-29.sh[1383]: #2 0x7fdf9b2ad9e5 in bus_deserialize_and_dump_unit_file_changes ../src/shared/bus-unit-util.c:2688 [ 34.884926] testsuite-29.sh[1383]: #3 0x40bc27 in maybe_enable_disable ../src/portable/portablectl.c:582 [ 34.885307] testsuite-29.sh[1383]: #4 0x40ef56 in maybe_stop_disable ../src/portable/portablectl.c:810 [ 34.885647] testsuite-29.sh[1383]: #5 0x410bc2 in detach_image ../src/portable/portablectl.c:924 [ 34.885987] testsuite-29.sh[1383]: #6 0x7fdf9b5df424 in dispatch_verb ../src/shared/verbs.c:103 [ 34.886271] testsuite-29.sh[1383]: #7 0x41604a in run ../src/portable/portablectl.c:1427 [ 34.886557] testsuite-29.sh[1383]: #8 0x416106 in main ../src/portable/portablectl.c:1430 [ 34.886892] testsuite-29.sh[1383]: #9 0x7fdf99d5de8f in __libc_start_call_main (/lib64/libc.so.6+0x44e8f) [ 34.887187] testsuite-29.sh[1383]: Indirect leak of 2 byte(s) in 2 object(s) allocated from: [ 34.887520] testsuite-29.sh[1383]: #0 0x7fdf9c85b8f7 in strdup (/lib64/libasan.so.6+0x598f7) [ 34.887797] testsuite-29.sh[1383]: #1 0x7fdf9b427249 in unit_file_changes_add ../src/shared/install.c:296 [ 34.888117] testsuite-29.sh[1383]: #2 0x7fdf9b2ad9e5 in bus_deserialize_and_dump_unit_file_changes ../src/shared/bus-unit-util.c:2688 [ 34.888434] testsuite-29.sh[1383]: #3 0x40bc27 in maybe_enable_disable ../src/portable/portablectl.c:582 [ 34.888693] testsuite-29.sh[1383]: #4 0x40ef56 in maybe_stop_disable ../src/portable/portablectl.c:810 [ 34.888990] testsuite-29.sh[1383]: #5 0x410bc2 in detach_image ../src/portable/portablectl.c:924 [ 34.889254] testsuite-29.sh[1383]: #6 0x7fdf9b5df424 in dispatch_verb ../src/shared/verbs.c:103 [ 34.889580] testsuite-29.sh[1383]: #7 0x41604a in run ../src/portable/portablectl.c:1427 [ 34.889877] testsuite-29.sh[1383]: #8 0x416106 in main ../src/portable/portablectl.c:1430 [ 34.890193] testsuite-29.sh[1383]: #9 0x7fdf99d5de8f in __libc_start_call_main (/lib64/libc.so.6+0x44e8f) [ 34.890482] testsuite-29.sh[1383]: SUMMARY: AddressSanitizer: 154 byte(s) leaked in 6 allocation(s). ``` With 794da5a: ``` [ OK ] Started minimal-app0.service. [ 36.794367] testsuite-29.sh[600]: + portablectl detach --now --runtime --enable /tmp/rootdir minimal-app0 Stopping minimal-app0-foo.service... [ OK ] Stopped minimal-app0-foo.service. Stopping minimal-app0.service... [ OK ] Stopped minimal-app0.service. [ 36.851251] testsuite-29.sh[600]: + umount /tmp/rootdir ```