| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|\ \
| | |
| | | |
core: allow using seccomp without no_new_privs when unprivileged
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Until now, using any form of seccomp while being unprivileged (User=)
resulted in systemd enabling no_new_privs.
There's no need for doing this because:
* We trust the filters we apply
* If User= is set and a process wants to apply a new seccomp filter, it
will need to set no_new_privs itself
An example of application that might want seccomp + !no_new_privs is a
program that wants to run as an unprivileged user but uses file
capabilities to start a web server on a privileged port while
benefitting from a restrictive seccomp profile.
We now keep the privileges needed to do seccomp before calling
enforce_user() and drop them after the seccomp filters are applied.
If the syscall filter doesn't allow the needed syscalls to drop the
privileges, we keep the previous behavior by enabling no_new_privs.
|
|\ \
| | |
| | | |
Two small documentation cleanups
|
| |/
| |
| |
| |
| |
| |
| | |
https://archive.kernel.org/oldwiki/btrfs.wiki.kernel.org/index.php/Manpage/btrfs(5).html
says "This wiki has been archived and the content is no longer updated."
and redirects to https://btrfs.readthedocs.io/en/latest/btrfs-man5.html.
Let's move all the btrfs links to btrfs.readthedocs.io.
|
| |
| |
| |
| | |
kernel-install
|
| |
| |
| |
| |
| |
| |
| |
| | |
parameters
This makes "kernel-install inspect" work more "kernel-install add": if
the version or kernel image is specified as "-" or omitted we'll make it
up.
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Let's make kernel-install a bit easier to use:
If the kernel version is not specified, let's imply "uname -r", so that
we regnerate the entries for the current kernel.
If the kernel image is not specified let's imply using
/usr/lib/modules/$version/vmlinuz, i.e. the location distros like Fedora
drop the kernel into, which we generally recommend people to use.
If the kernel is not found there, don't try to automatically pick the
kernel path, and fail, as before.
|
|/
|
|
|
| |
This simply dumps the dirs in /usr/lib/modules/ and whether they contain
a vmlinuz binary.
|
|\
| |
| | |
cgroup: add support for memory.peak
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Linux's Control Group v2 interfaces exposes memory.peak, which contains the
"max memory usage recorded for the cgroup and its descendants since the
creation of the cgroup."
This commit adds a new property "MemoryPeak" for units and makes "systemctl
show" display this value if it is available.
Fixes #29878.
Signed-off-by: Florian Schmaus <flo@geekplace.eu>
|
| |
| |
| |
| |
| | |
Currently only supported for the "inspect" verb as "add" and "remove"
require figuring out what to do with plugins.
|
|\ \
| | |
| | | |
Documentation cleanup
|
| | | |
|
| | |
| | |
| | |
| | |
| | | |
We added version information, so now each bullet point contains multiple
paragraphs, so we need proper sentences.
|
| | |
| | |
| | |
| | |
| | |
| | | |
<ulinks> contents are used to generate a SEE ALSO section at the
bottom of a man page, so we need to include the title, without additional
words, in the content.
|
| | |
| | |
| | |
| | | |
Closes https://github.com/systemd/systemd/issues/29814.
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
As pointed out in https://github.com/systemd/systemd/issues/29814, we need to
use phrases are are meaningful on their own, because the man page formatter
creates a list at the bottom. With <ulink>see docs</ulink>, we end up with:
NOTES:
1. see docs
https://some.url/page
2. see docs
https://some.url/page2
which is not very useful :(
Also, the text inside the tag should not include punctuation.
Python helper:
from xml_helper import xml_parse
for p in glob.glob('../man/*.xml'):
t = xml_parse(p)
ulinks = t.iterfind('.//ulink')
for ulink in ulinks:
if ulink.text is None: continue
text = ' '.join(ulink.text.split())
print(f'{p}: {text}')
|
| |
| |
| |
| | |
allows to -> allows one to
|
| |
| |
| |
| | |
Fixes 8702496bfb0205764569782a9a2ebd11fd80e5e8
|
| |
| |
| |
| | |
Follow up to b6f2e6860220aa89550f690b12246c4e8eb6e908
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
In mkosi, we can't use kernel-install directly but we do want to
mimick its behavior as much as possible. Let's make that easier by
making it easy to fetch data from kernel-install as JSON.
To get all the necessary data, we extend the inspect verb to also
allow passing in a kernel version and initrds, to mimick the "add"
verb. The kernel version is used to determine the "Entry Directory",
and in absence of auto-detection of kernel version in kernel-install
we have to allow users to pass it.
We also add --no-pager while we're at it.
|
| | |
|
|/
|
|
|
|
|
|
| |
This changes how the "extra" command line arguments passed to vmspawn
are handled.
Previously they were appended to the QEMU command line directly.
Now they are appended to the kernel command line using SMBIOS instead.
|
| |
|
|\
| |
| | |
man/NEWS update for sleep.conf
|
| |
| |
| |
| | |
Follow-up for 1f82c21dce
|
|/ |
|
|
|
|
| |
Support confexts for portable services
|
|\
| |
| | |
new pcrlock tool for generating signed PCR policies for PCR 0, 1, 4, …
|
| | |
|
|\ \
| | |
| | | |
systemd-vmspawn implementation that only supports disk images
|
| | | |
|
|\ \ \
| |_|/
|/| | |
network: add meson option to install default configs
|
| | | |
|
|/ /
| |
| |
| |
| |
| | |
option is received
For #29564.
|
|/ |
|
|
|
|
| |
Apparently this has been forgotten a couple of times.
|
|
|
| |
If one sets the SystemMaxUse=64G by the current documentation would expect that each files size would be around 1/8 of this value (8G), althought if the SystemMaxFileSize is not explicit set, it has a max of 128M per file.
|
| |
|
|
|
|
|
|
| |
service manager's own env block
Fixes: #29414
|
|
|
|
| |
Follow-up for ba87a61d05d637be9f0b21707f7fe3b0a74c5a05.
|
|
|
|
|
|
|
| |
If the property is set, networkd manages the interface only when its
value is "io.systemd.Network".
Closes #29768.
|
|\
| |
| | |
Doc fixes
|
| |
| |
| |
| |
| |
| |
| | |
It confuses users when they cannot find respective environment variables
with config that is supposes for (x)inetd activated service only.
Fix: #29670
|
| | |
|
|\ \
| | |
| | | |
network-generator: add new mode ip=link-local
|
| |/ |
|
|/
|
|
|
|
|
|
| |
This module reads password from kernel keyring and sets it as PAM authtok.
It's inspired by gdm's pam_gdm, which reads the LUKS password stored by
systemd-cryptsetup, so Gnome Keyring can be automatically unlocked if set
to the same password (when autologin is enabled so the user doesn't enter
a password in gdm).
|
|
|
|
|
| |
These options were previously reused by the DHCPv6 client from the
DHCPv4 client settings. Let's separate them for consistency.
|