| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
We already determine the architecture of disk images and make a choice,
and store it per partition. Let's make this accessible globally.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
And also: by default, for the systemd-user service and for local
sessions (i.e. those assigned to a seat): let's imply CAP_WAKE_SYSTEM
for them by default. Yes, let's pass one specific capability by default to local
unprivileged users.
The capability services exactly once purpose: to allow system wake-up
from suspend via alarm clocks, hence is relatively limited in focus. By
adding this tools such as GNOME's Alarm Clock app can simply allocate a
CLOCK_REALTIME_ALARM (or ask systemd --user to do this) timer and it
will wake up the system as necessary.
Note that systemd --user will not pass the ambient caps on by default,
so even with this change, individual services need to use
AmbientCapabilities= to pass this on to the individual programs.
Fixes: #17564 #21382
|
| |
|
|
|
|
|
| |
In particular the ambieht caps field is useful: we can use it later to
pass caps such as CAP_WAKE_ALARM to regular users on login.
|
|
|
|
| |
This is a cleaner approach to 59833064742310bfccf028b0278811ba5cff8dcf.
|
|
|
|
| |
For whatever reason, ARM does not define __ILP32__.
|
|
|
|
|
|
|
| |
We checked ERRNO_IS_NOT_SUPPORTED on a possible positive non-error code,
which isn't right.
Fix that. Also add caching, since we are about to call this more often.
|
|
|
|
|
|
|
| |
If CONFIG_PSI_DEFAULT_DISABLED is set in the kernel, then the PSI files
will be there, and you can open them, but read()/write() will fail.
Which is terrible, since that happens so late. But anyway, handle this
gracefully.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Let's log exactly at one place about failed writing of log lines to
journal file: in shall_try_append_again().
Then, if we decide to suppress a retry-after-vacuum because we already
vacuumed anyway then say this explicitly as "supressed rotation",
because that's what we do here.
This removes triplicate logging about the same error, and logs exactly
once, plus optional one "suppressed rotation" message. (plus more debug
output). The triplicate logging was bad in particular because it had no
understanding of the actual error codes and just showed generic UNIX
error strings ("Not a XENIX named type file"). By relying on
shall_try_append_again() to do all logging we now get very clean error
strings for all conditions.
Fixes: #26496
|
|
|
|
|
|
|
|
| |
it with %m
We always want to pass the error code along with the log call, so that
it can add it to structured logging, even if the format string does not
contain %m.
|
|
|
|
|
| |
in this case we really cannot proceed and fail. Let's log about this
loudly, since we simply fail the operation to write anything.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
None of these conditions are real issues, but they can simply happen
because we just swtched from /run to /var as backend for logging and
there are old files from different boots with different systemd versions
and so on.
Let's not make more noise than necessary: still log, but not consider it
a warning, but just some normal thing.
We are handling these issues safely after all: by rotating and starting
anew, i.e. there's no reason to be concerned.
|
| |
|
|
|
|
| |
passed in, not just some
|
|
|
|
|
|
|
|
|
|
|
| |
If the default target is masked, `systemctl get-default` prints
Failed to get default target: Operation not possible due to RF-kill
That's a bit too cryptic, so let's make it clear what's actually
happening.
Fixes #26589.
|
|
|
|
|
| |
These are failing since https://github.com/systemd/systemd/pull/26409
disable for now
|
|
|
|
|
|
|
|
|
|
|
|
| |
This reverts commit df4524cb3796529b435af309f5e6a2d92bcdaaa0.
This commit is just wrong. The thing is that we *don't* know
automatically that the partition contains a swap image, because it could
be encrypted.
Hence revert.
Fixes: #26595
|
|\
| |
| | |
sd-login: add sd_uid_get_login_time interface #26574
|
| | |
|
| | |
|
| | |
|
|\ \
| | |
| | | |
service manager env var clean-up fixes
|
| |/
| |
| |
| |
| | |
Let's add some more env vars we nowadays set for activated services to
the list of env vars we strip from the environment block we pass on.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
We should check alignment *after* determining the pointer points into
our pool, not before. Otherwise might might end up checking alignment of
the pointer relative to our base, even though it is taken relative to
some other base.
Follow-up for: a2b052b29f8bc141e94a4af95d1653a38a57eaeb
See: https://github.com/systemd/systemd/pull/26393#issuecomment-1442295012
|
| |
| |
| |
| |
| |
| | |
This is a follow-up for b1712fabd1702640b04b0acdbba2d78294313a4d which
was prepped for 253, but merged into early 254 development cycle. It
thus had the symbol it adds at the wrong symver. Fix thta.
|
|\ \
| | |
| | | |
fix parse_timestamp()
|
| | |
| | |
| | |
| | | |
timezone
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
spec
If the timezone is specified with a number e.g. +0900 or so, then
let's parse the time as a UTC, and adjust it with the specified time
shift.
Otherwise, if an area has timezone change, e.g.
---
Africa/Casablanca Sun Jun 17 01:59:59 2018 UT = Sun Jun 17 01:59:59 2018 +00 isdst=0 gmtoff=0
Africa/Casablanca Sun Jun 17 02:00:00 2018 UT = Sun Jun 17 03:00:00 2018 +01 isdst=1 gmtoff=3600
Africa/Casablanca Sun Oct 28 01:59:59 2018 UT = Sun Oct 28 02:59:59 2018 +01 isdst=1 gmtoff=3600
Africa/Casablanca Sun Oct 28 02:00:00 2018 UT = Sun Oct 28 03:00:00 2018 +01 isdst=0 gmtoff=3600
---
then we could not determine isdst from the timezone (+01 in the above)
and mktime() will provide wrong results.
Fixes #26370.
|
| | |
| | |
| | |
| | | |
As mktime() does not use timezone neme.
|
| | |
| | |
| | |
| | | |
No functional changes, just refactoring.
|
| | |
| | |
| | |
| | | |
No functional change, just refactoring.
|
| | |
| | |
| | |
| | |
| | | |
And move the check with USEC_TIMESTAMP_FORMATTABLE_MAX at the end,
as usec_add() can handle overflow correctly.
|
| | |
| | |
| | |
| | | |
No functional change, just refactoring.
|
| | |
| | |
| | |
| | | |
The input string may come from command line, config files.
|
| | | |
|