aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* fix lingering references to /var/lib/{backlight,random-seed}gentoo-208Dave Reisner2013-10-083-3/+3
| | | | This should have been part of ef5bfcf668e6029faa78534dfe.
* acpi: make sure we never free an uninitialized pointerLennart Poettering2013-10-081-1/+1
|
* cryptsetup: fix OOM handling when parsing mount optionsLennart Poettering2013-10-081-5/+6
|
* journald: add missing error checkLennart Poettering2013-10-081-0/+2
|
* bus: fix potentially uninitialized memory accessLennart Poettering2013-10-081-2/+2
|
* dbus: fix return value of dispatch_rqueue()Lennart Poettering2013-10-081-2/+2
|
* modules-load: fix error handlingLennart Poettering2013-10-081-2/+2
|
* efi: never call qsort on potentially NULL arraysLennart Poettering2013-10-081-1/+2
|
* strv: don't access potentially NULL string arraysLennart Poettering2013-10-081-1/+3
|
* mkdir: pass a proper function pointer to mkdir_safe_internalLennart Poettering2013-10-081-1/+1
|
* tmpfiles.d: include setgid perms for /run/log/journalDave Reisner2013-10-081-0/+2
| | | | | | | 4608af4333d0f7f5 set permissions for journal storage on persistent disk but not the volatile storage. ref: https://bugs.archlinux.org/task/37170
* gpt-auto-generator: exit immediately if in containerZbigniew Jędrzejewski-Szmek2013-10-081-0/+8
| | | | | Otherwise we get an ugly warning when running systemd in a container.
* systemd: order remote mounts from mountinfo before remote-fs.targetZbigniew Jędrzejewski-Szmek2013-10-081-1/+4
| | | | | | | | Usually the network is stopped before filesystems are umounted. Ordering network filesystems before remote-fs.target means that their unmounting will be performed earlier, and can terminate sucessfully. https://bugs.freedesktop.org/show_bug.cgi?id=70002
* manager: when verifying whether clients may change environment using selinux ↵Lennart Poettering2013-10-081-3/+3
| | | | | | check for "reload" rather "reboot" This appears to be a copy/paste error.
* logind: fix bus introspection data for TakeControl()Lennart Poettering2013-10-081-1/+1
|
* mount: check for NULL before reading pm->whatDave Reisner2013-10-081-1/+1
| | | | | | | Since a57f7e2c828b85, a mount unit with garbage in it would cause systemd to crash on loading it. ref: https://bugs.freedesktop.org/show_bug.cgi?id=70148
* utf8: fix utf8_is_printableZbigniew Jędrzejewski-Szmek2013-10-082-2/+4
|
* shared/util: fix off-by-one error in tag_to_udev_nodeDave Reisner2013-10-082-2/+4
| | | | | Triggered false negatives when encoding a string which needed every character to be escaped, e.g. "LABEL=/".
* acpi-fptd: fix memory leak in acpi_get_boot_usecLukas Nykryn2013-10-081-1/+1
|
* cgroup: there's no point in labelling cgroupfs dirs, so let's not do thatv208Lennart Poettering2013-10-023-81/+41
| | | | | | | This allows us to get rid of the dep on libsystemd-label for cgroup management. https://bugs.freedesktop.org/show_bug.cgi?id=69966
* build-sys: mkdir.[ch] should be in libsystemd-sharedLennart Poettering2013-10-021-3/+3
| | | | Otherwise, why is mkdir-label.[ch] split out?
* build-ss: prepare new releaseLennart Poettering2013-10-023-7/+94
|
* hashmap: randomize hash functions a bitLennart Poettering2013-10-014-41/+85
|
* Update TODODavid Herrmann2013-10-011-2/+0
| | | | Remove "logind fbdev removal" as it is no longer supported.
* logind: remove fbdev session-device supportDavid Herrmann2013-10-012-17/+2
| | | | | | | fbdev does not support access-handover so it is quite useless to route it through logind. If compositors want to use it they ought to open it themselves. It's highly recommended to be ignored entirely, though. fbdev is about to be deprecated in the kernel.
* logind: run with CAP_SYS_ADMINDavid Herrmann2013-10-011-1/+1
| | | | | | | | | DRM Master access requires CAP_SYS_ADMIN, yay! Add it to the capability bounding set for systemd-logind. As CAP_SYS_ADMIN actually allows a huge set of actions, this mostly renders the restriction-set useless. Anyway, patches are already pending to reduce the restriction on the kernel side. But these won't really make it into any stable-release so for now we're stuck with CAP_SYS_ADMIN.
* logind: send PropertyChanged during deactivationDavid Herrmann2013-10-011-1/+3
| | | | | | We only send the PropertyChanged signal for the to-be-activated session but not for the to-be-deactivated one. Fix that so both listeners get notified about the new state.
* logind: check whether first drmSetMaster succeededDavid Herrmann2013-10-011-7/+23
| | | | | | | | | | | | The initial drmSetMaster may fail if there is an active master already. We must not assume that all existing clients comply to logind rules. We check for this during session-activation already but didn't during device setup. Fix this by checking the return code. As drmSetMaster has had horrible return codes in the past (0 for failure? EINVAL for denied access, ..) we need to be quite pedantic. To guarantee an open file-descriptor we need to close the device and reopen it without master if setting master failed first.
* logind: fix session-device dbus notifyDavid Herrmann2013-10-011-4/+8
| | | | | | | Had this fix lying around here for some time. Thanks to missing type-checking for va-args we passed in the actual major/minor values instead of pointers to it. Fix it by saving the values on the stack first and passing in the pointers.
* kernel-install: add compat with 'installkernel'Tom Gundersen2013-10-011-3/+9
| | | | | | | | | | | If 'kernel-install' is called as 'installkernel' it will be compatible with the syntax used by the kernel's build system. This means it can be called by doing 'make install' in a kernel build directory, if the correct symlink has been installed (which we don't do by default yet). [Edit harald@redhat.com: removed basename and use shift]
* update TODOLennart Poettering2013-10-011-0/+2
|
* core: whenever a new PID is passed to us, make sure we watch itLennart Poettering2013-10-011-6/+15
|
* util.c: ignore pollfd.revent for loop_read/loop_writeChen Jie2013-10-011-4/+8
| | | | Let read()/write() report any error/EOF.
* units: Add SHELL environment variableEvan Callicoat2013-10-011-0/+1
| | | | | | | | With the advent of systemd --user sessions, it's become very interesting to spawn X as a user unit, as well as accompanying processes that may have previously been in a .xinitrc/.xsession, or even just to replace a collection of XDG/GDM/KDM/etc session files with independent systemd --user units. The simplest case here would be to login on a tty, with the traditional /usr/sbin/login "login manager". However, systemd --user (spawned by user@.service) is at the top level of the slice for the user, and does not inherit any environment variables from the login process. Given the number of common applications which rely on SHELL being set in the environment, it seems like the cleanest way to provide this variable is to set it to %s in the user@.service. Ideally in the long-term, applications which rely on SHELL being set should be fixed to just grab it from getpwnam() or similar, but until that becomes more common, I propose this simple change to make user sessions a little bit nicer out of the box.
* build-sys: don't fallback to upstart defaultsLennart Poettering2013-10-011-1/+1
|
* systemctl: remove legacy upstart compatibilityCristian Rodríguez2013-10-011-93/+0
|
* smack-setup: fix path to Smack/CIPSO mappingsPatrick McCarty2013-10-011-1/+1
| | | | | | The correct path to the dir with CIPSO mappings is /etc/smack/cipso.d/; /etc/smack/cipso is a file that can include these mappings as well, though it is no longer supported in upstream libsmack.
* Revert "build-sys: link libsystemd-login with libsystemd-label.la"Kay Sievers2013-10-011-1/+0
| | | | | | | | | | | Systemd-logind does not pull in cg_create(), if we unconditionally link this, all users of systemd-logind qill need the label stuff and therefore link against selinux. It is probably a build-system issue, or something that need to be sorted out in a differnt way than linking not needed libs. This reverts commit ceadabb102b05b237bfab11e1f742975ee4daeb1.
* Update TODOLennart Poettering2013-10-011-0/+2
|
* hashmap: size hashmap bucket array dynamicallyLennart Poettering2013-10-013-38/+143
| | | | | | | | | | Instead of fixing the hashmap bucket array to 127 entries dynamically size it, starting with a smaller one of 31. As soon as a fill level of 75% is reached, quadruple the size, and so on. This should siginficantly optimize the lookup time in large tables (from O(n) back to O(1)), and save memory on smaller tables (which most are).
* local: fix memory leak when putting together locale settingsLennart Poettering2013-10-014-21/+30
| | | | | | | | | Also, we need to use proper strv_env_xyz() calls when putting together the environment array, since otherwise settings won't be properly overriden. And let's get rid of strv_appendf(), is overkill and there was only one user.
* main: don't free fds array twiceLennart Poettering2013-10-011-0/+1
|
* logs-show.c: show all messages for a sliceZbigniew Jędrzejewski-Szmek2013-10-012-3/+22
|
* build-sys: link libsystemd-login with libsystemd-label.laMichał Górny2013-10-011-0/+1
| | | | | | | | libsystemd-login.la uses cg_create() that currently seems to be a part of libsystemd-label.la. However, it doesn't link against that library and it seems that none of the (unconditional) libraries it uses do. In the end, people end up getting «undefined reference to `cg_create'» when trying to build e.g. dbus.
* man: mention the systemd homepage from systemd(1)Lennart Poettering2013-09-301-0/+1
|
* update TODOLennart Poettering2013-09-301-0/+2
|
* man: link cgroups api docs from relevant man pagesLennart Poettering2013-09-302-0/+10
|
* set IgnoreOnIsolate=true for systemd-cryptsetup@.serviceAndrey Borzenkov2013-09-291-0/+1
| | | | | | | | | When crypttab contains noauto, cryptsetup service does not have any explicit dependencies. If service is started later manually (directly or via mount dependency) it will be stopped on isolate. mount units already have IgnoreOnIsolate set by default. Set it by default for cryptsetup units as well.
* Fix buffer overrun when enumerating filesZbigniew Jędrzejewski-Szmek2013-09-292-53/+36
| | | | | | https://bugs.freedesktop.org/show_bug.cgi?id=69887 Based-on-a-patch-by: Hans Petter Jansson <hpj@copyleft.no>
* kmod-static-nodes: condition execution on modules.devnameDave Reisner2013-09-281-0/+1
|