summaryrefslogtreecommitdiffstats
path: root/src/getty-generator (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-06-04networkd: link - intialize mac addressTom Gundersen1-0/+4
Otherwise .netwrok matching on MAC address will not work. Based on patch by Dave Reisner, and bug originally reported by Max Pray.
2014-06-04update TODOLennart Poettering1-3/+1
2014-06-04core: rename ReadOnlySystem= to ProtectSystem= and add a third value for ↵Lennart Poettering20-79/+147
also mounting /etc read-only Also, rename ProtectedHome= to ProtectHome=, to simplify things a bit. With this in place we now have two neat options ProtectSystem= and ProtectHome= for protecting the OS itself (and optionally its configuration), and for protecting the user's data.
2014-06-04hwdb: fix case-sensitive matchKay Sievers1-1/+1
2014-06-04build-sys: accommodate gcc-4.9.0 link-time optimization (LTO) changesJohn1-1/+1
systemd fails to build (symbols not found/resolved during cgls link step) under gcc-4.9.0 due to link-time optimization (lto) changes, in particular from gcc-4.9.0/NEWS: + When using a linker plugin, compiling with the -flto option now generates slim objects files (.o) which only contain intermediate language representation for LTO. Use -ffat-lto-objects to create files which contain additionally the object code. To generate static libraries suitable for LTO processing, use gcc-ar and gcc-ranlib; to list symbols from a slim object file use gcc-nm. (Requires that ar, ranlib and nm have been compiled with plugin support.) Both -flto and -ffat-lto-objects are now needed when building and linking against static libs w/LTO.
2014-06-04update TODOLennart Poettering1-6/+2
2014-06-04core: provide /dev/ptmx as symlink in PrivateDevices= execution environmentsLennart Poettering1-1/+4
2014-06-04core: make sure PrivateDevices= makes /dev/log availableLennart Poettering2-2/+6
Now that we moved the actual syslog socket to /run/systemd/journal/dev-log we can actually make /dev/log a symlink to it, when PrivateDevices= is used, thus making syslog available to services using PrivateDevices=.
2014-06-04initctl: move /dev/initctl fifo into /run, replace it by symlinkLennart Poettering1-1/+2
With this change we have no fifos/sockets remaining in /dev.
2014-06-04journald: move /dev/log socket to /runLennart Poettering7-6/+39
This way we can make the socket also available for sandboxed apps that have their own private /dev. They can now simply symlink the socket from /dev.
2014-06-04udev: guard REREADPT by exclusive lock instead of O_EXCLKay Sievers1-2/+5
2014-06-04socket: add new Symlinks= option for socket unitsLennart Poettering7-16/+160
With Symlinks= we can manage one or more symlinks to AF_UNIX or FIFO nodes in the file system, with the same lifecycle as the socket itself. This has two benefits: first, this allows us to remove /dev/log and /dev/initctl from /dev, thus leaving only symlinks, device nodes and directories in the /dev tree. More importantly however, this allows us to move /dev/log out of /dev, while still making it accessible there, so that PrivateDevices= can provide /dev/log too.
2014-06-04udev: make sure we always get "change" for the diskKay Sievers1-14/+39
The kernel will return 0 for REREADPT when no partition table is found, we have to send out "change" ourselves.
2014-06-04udev: guard REREADP logic with open(O_ECXL)Kay Sievers1-1/+1
2014-06-04udev: try first re-reading the partition tableKay Sievers1-6/+33
mounted partitions: # dd if=/dev/zero of=/dev/sda bs=1 count=1 UDEV [4157.369250] change .../0:0:0:0/block/sda (block) UDEV [4157.375059] change .../0:0:0:0/block/sda/sda1 (block) UDEV [4157.397088] change .../0:0:0:0/block/sda/sda2 (block) UDEV [4157.404842] change .../0:0:0:0/block/sda/sda4 (block) unmounted partitions: # dd if=/dev/zero of=/dev/sdb bs=1 count=1 UDEV [4163.450217] remove .../target6:0:0/6:0:0:0/block/sdb/sdb1 (block) UDEV [4163.593167] change .../target6:0:0/6:0:0:0/block/sdb (block) UDEV [4163.713982] add .../target6:0:0/6:0:0:0/block/sdb/sdb1 (block)
2014-06-04socket: optionally remove sockets/FIFOs in the file system after useLennart Poettering7-29/+89
2014-06-04udev: link-config - fix mem leakTom Gundersen1-1/+3
Reported by Kay.
2014-06-04udev: synthesize "change' events for partitions when tools change the diskKay Sievers1-2/+42
This should make sure that fdisk-like programs will automatically cause an update of all partitions, just like mkfs-like programs cause an update of the partition.
2014-06-04README: mention new required user systemd-bus-proxyLennart Poettering1-14/+11
2014-06-04fsck: disable "-l" option for nowKay Sievers2-2/+15
https://bugs.freedesktop.org/show_bug.cgi?id=79576#c5
2014-06-04udevd: inotify - modernizationsKay Sievers1-23/+22
2014-06-04bus-proxy: drop priviliges if we canLennart Poettering4-11/+40
Either become uid/gid of the client we have been forked for, or become the "systemd-bus-proxy" user if the client was root. We retain CAP_IPC_OWNER so that we can tell kdbus we are actually our own client.
2014-06-04remove ReadOnlySystem and ProtectedHome from udevd and logindKay Sievers2-4/+0
logind needs access to /run/user/, udevd fails during early boot with these settings
2014-06-03core: add new ReadOnlySystem= and ProtectedHome= settings for service unitsLennart Poettering21-4/+187
ReadOnlySystem= uses fs namespaces to mount /usr and /boot read-only for a service. ProtectedHome= uses fs namespaces to mount /home and /run/user inaccessible or read-only for a service. This patch also enables these settings for all our long-running services. Together they should be good building block for a minimal service sandbox, removing the ability for services to modify the operating system or access the user's private data.
2014-06-03networkd: split runtime config dir from state dirTom Gundersen5-20/+20
Configuration will be in root:root /run/systemd/network and state will be in systemd-network:systemd-network /run/systemd/netif This matches what we do for logind's seat/session state.
2014-06-03udev: exclude device-mapper from block device ownership event lockingKay Sievers1-1/+13
2014-06-03shared: capability - don't loop over the cap bits if they are all unsetTom Gundersen1-4/+4
2014-06-03shared: allow drop_priviliges to drop all privsTom Gundersen1-9/+11
2014-06-03udev: always close lock file descriptorKay Sievers1-6/+4
https://bugs.freedesktop.org/show_bug.cgi?id=79576
2014-06-03sd-dhcp-client: allways request broadcastCamilo Aguilar1-0/+9
On systems which cannot receive unicast packets until its IP stack has been configured we need to request broadcast packets. We are currently not able to reliably detect when this is necessary, so set it unconditionally for now. This is set on all packets, but the DHCP server will only broadcast the packets that are necessary, and unicast the rest. For more information please refer to this thread in CoreOS: https://github.com/coreos/bugs/issues/12 [tomegun: rephrased commit message]
2014-06-03resolved: run as unpriviliged "systemd-resolve" userTom Gundersen4-3/+25
This service is not yet network facing, but let's prepare nonetheless. Currently all caps are dropped, but some may need to be kept in the future.
2014-06-03configure: networkd no longer requires kmodTom Gundersen1-2/+0
Reported by Samuli Suominen.
2014-06-03networkd: drop CAP_SYS_MODULETom Gundersen8-79/+6
Rely on modules being built-in or autoloaded on-demand. As networkd is a network facing service, we want to limits its capabilities, as much as possible. Also, we may not have CAP_SYS_MODULE in a container, and we want networkd to work the same there. Module autoloading does not always work, but should be fixed by the kernel patch f98f89a0104454f35a: 'net: tunnels - enable module autoloading', which is currently in net-next and which people may consider backporting if they want tunneling support without compiling in the modules. Early adopters may also use a module-load.d snippet and order systemd-modules-load.service before networkd to force the module loading of tunneling modules. This sholud fix the various build issues people have reported.
2014-06-02networkd: introduce vti tunnelSusant Sahani5-3/+115
This patch enables vti tunnel support. example conf: file : vti.netdev [NetDev] Name=vti-tun Kind=vti MTUBytes=1480 [Tunnel] Local=X.X.X.X Remote=X.X.X.X file: vti.network [Match] Name=em1 [Network] Tunnel=vti-tun TODO: Add more attributes for vti tunnel IFLA_VTI_IKEY IFLA_VTI_OKEY
2014-06-02networkd: sit-tunnel add support for pmtudiscSusant Sahani4-0/+11
This patch adds path of mtu discovery for sit tunnel. To enable/disable DiscoverPathMTU is introduced. Example configuration file: sit.netdev [NetDev] Name=sit-tun Kind=sit MTUBytes=1480 [Tunnel] DiscoverPathMTU=1 Local=X.X.X.X Remote=X.X.X.X By default pmtudisc is turned on , if DiscoverPathMTU is missing from the config. To turn it off DiscoverPathMTU=0 needs to be set.
2014-06-02networkd: introduce gre tunnelSusant Sahani2-0/+127
This patch enables gre tunnel support. example conf: file : gre.netdev [NetDev] Name=gre-tun Kind=gre MTUBytes=1480 [Tunnel] Local=X.X.X.X Remote=X.X.X.X file: gre.network [Match] Name=em1 [Network] Tunnel=gre-tun TODO: Add more attributes for gre tunnel IFLA_GRE_IFLAGS IFLA_GRE_IFLAGS IFLA_GRE_IKEY IFLA_GRE_OKEY
2014-06-02networkd-netdev: fix white spaceSusant Sahani1-1/+0
2014-06-02networkd: introduce veth device supportSusant Sahani5-1/+144
This patch adds veth device support to networkd. Example conf: File: veth.netdev [NetDev] Name=veth-test Kind=veth [Peer] Name=veth-peer
2014-06-02resolved: move resolv.conf to resolved's runtime dirTom Gundersen3-7/+7
2014-06-02tmpfiles: systemd.conf - fix ownership of network directoriesTom Gundersen1-3/+3
2014-06-01keyboard: add Plantronics .Audio mute buttonZbigniew Jędrzejewski-Szmek1-0/+8
https://bugs.freedesktop.org/show_bug.cgi?id=79495
2014-06-01README: document the new "systemd-network" user we require for systemd-networkdLennart Poettering1-0/+5
2014-06-01networkd: run as unpriviliged "systemd-network" userLennart Poettering3-4/+24
This allows us to run networkd mostly unpriviliged with the exception of CAP_NET_* and CAP_SYS_MODULE. I'd really like to get rid of the latter though...
2014-06-01units: remove CAP_SYS_PTRACE capability from hostnamed/networkdLennart Poettering2-2/+2
The ptrace capability was only necessary to detect virtualizations environments. Since we changed the logic to determine this to not require priviliges, there's no need to carry the CAP_SYS_PTRACE capability anymore.
2014-06-01timesyncd: split privilege dropping code out of timesyncd so that we can ↵Lennart Poettering4-70/+74
make use of it from other daemons too This is preparation to make networkd work as unpriviliged user.
2014-06-01tty-ask-password-agent: Do tell what directory we failed to openCristian Rodríguez1-1/+1
2014-06-01udev-builtin-keyboard: do tell on which device EVIOCSKEYCODE failed.Cristian Rodríguez1-1/+1
I am getting "Error calling EVIOCSKEYCODE (scan code 0xc022d, key code 418): Invalid argument", the error message does not tell on which specific device the problem is, add that info.
2014-05-31util: ignore_file should not allow files ending with '~'Thomas Hindoe Paaboel Andersen1-1/+1
ignore_file currently allows any file ending with '~' while it seems that the opposite was intended: a228a22fda4faa9ecb7c5a5e499980c8ae5d2a08
2014-05-30units: use KillMode=mixed for systemd-nspawn@.serviceJonathan Liu1-0/+1
This causes the container to shut down cleanly when the service is stopped.
2014-05-30fsck: include device name in the message about missing fsckZbigniew Jędrzejewski-Szmek1-2/+4