aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* calendarspec: fix find_next skipping timesgentoo-229Hristo Venev2016-03-052-2/+3
| | | | reset usec when bumping hours/minutes
* time-util: check for overflow in conversion from ts to nsec_tZbigniew Jędrzejewski-Szmek2016-03-051-7/+6
| | | | CID #1320855.
* core: exclude .slice units from "systemctl isolate"Lennart Poettering2016-03-052-2/+9
| | | | Fixes: #1969
* networkd: tunnel fix tunnel addressSusant Sahani2016-03-051-6/+6
| | | | this fixes 2655
* udev/path_id: correct segmentation fault due to missing NULL checkHendrik Brueckner2016-03-051-1/+1
| | | | | | | | Running "udevadm test-builtin path_id /sys/devices/platform/" results in a segmentation fault. The problem is that udev_device_get_subsystem(dev) might return NULL in a streq() call. Solve this problem by using streq_ptr() instead.
* basic/strbuf: do not call bsearch with a null argumentZbigniew Jędrzejewski-Szmek2016-03-051-0/+4
| | | | | | | Das ist verboten! src/basic/strbuf.c:162:23: runtime error: null pointer passed as argument 2, which is declared to never be null
* udev: fix cg_unified() return code checkingLennart Poettering2016-03-051-1/+1
| | | | | | Fixes fall-out from 8b3aa503c171acdb9ec63484a8c50e2680d31e79. Fixes: #2635
* core: fix assertion checkLennart Poettering2016-03-051-1/+1
| | | | Fixes: #2632
* networkd: FIONREAD is not reliable on some socketsLennart Poettering2016-03-057-40/+64
| | | | Fixes: #2457
* time-util: map ALARM clockids to non-ALARM clockids in now()Lennart Poettering2016-03-052-3/+27
| | | | Fixes: #2597
* Add memcpy_safeZbigniew Jędrzejewski-Szmek2016-03-0512-38/+32
| | | | | | | | | | | | | | | | | ISO/IEC 9899:1999 §7.21.1/2 says: Where an argument declared as size_t n specifies the length of the array for a function, n can have the value zero on a call to that function. Unless explicitly stated otherwise in the description of a particular function in this subclause, pointer arguments on such a call shall still have valid values, as described in 7.1.4. In base64_append_width memcpy was called as memcpy(x, NULL, 0). GCC 4.9 started making use of this and assumes This worked fine under -O0, but does something strange under -O3. This patch fixes a bug in base64_append_width(), fixes a possible bug in journal_file_append_entry_internal(), and makes use of the new function to simplify the code in other places.
* core: use correct enumThomas Hindoe Paaboel Andersen2016-03-051-1/+1
| | | | from e903182e5b0daa941de47a9c08c824106cec7fe0
* configure: bump version numberLennart Poettering2016-02-111-1/+1
|
* delta: minor coding style fixesLennart Poettering2016-02-111-22/+21
| | | | no change in behaviour
* man: document that resolved cares about /etc/hostsLennart Poettering2016-02-111-0/+4
|
* Merge pull request #2581 from evverx/dev-mqueue-condLennart Poettering2016-02-111-0/+1
|\ | | | | units: don't try to mount the mqueue fs if we lack the privileges for it
| * units: don't try to mount the mqueue fs if we lack the privileges for itEvgeny Vereshchagin2016-02-111-0/+1
| | | | | | | | See https://github.com/systemd/systemd/pull/2576#discussion-diff-52592680
* | Merge pull request #2576 from poettering/random-fixesMartin Pitt2016-02-116-11/+84
|\ \ | | | | | | Random fixes
| * | core: don't choke if a unit another unit triggers vanishes during reloadLennart Poettering2016-02-113-9/+62
| | | | | | | | | | | | Fixes: #1981
| * | units: don't try to mount the FUSE fs if we lack the privileges for itLennart Poettering2016-02-101-0/+1
| | | | | | | | | | | | | | | | | | See: https://lists.freedesktop.org/archives/systemd-devel/2016-February/035740.html
| * | nss-mymachines: never resolve unmapped UIDs/GIDsLennart Poettering2016-02-101-2/+18
| | | | | | | | | | | | | | | | | | | | | | | | Don't ever permit successful user or group lookups if no UID/GID mapping is actually applied. THis way, we can be sure that nss-mymachines cannot be used to insert invalid cache entries into nscd's cache. https://bugzilla.redhat.com/show_bug.cgi?id=1285339
| * | update TODOLennart Poettering2016-02-101-0/+3
| | |
* | | build-sys: bump so versionLennart Poettering2016-02-111-2/+2
| | |
* | | build-sys: run "make hwdb-update"Lennart Poettering2016-02-113-6051/+8913
| | |
* | | fill in contributors list in NEWSLennart Poettering2016-02-111-3/+21
| |/ |/|
* | Merge pull request #2579 from evverx/TEST-1981Daniel Mack2016-02-115-2/+105
|\ \ | | | | | | tests: add test for https://github.com/systemd/systemd/issues/1981
| * | build-sys: add TEST-06-SELINUX to distEvgeny Vereshchagin2016-02-101-0/+5
| | | | | | | | | | | | This is a follow-up to https://github.com/systemd/systemd/pull/2493
| * | tests: add test for https://github.com/systemd/systemd/issues/1981Evgeny Vereshchagin2016-02-105-2/+100
| |/
* | Merge pull request #2578 from keszybz/man-pagesDaniel Mack2016-02-112-21/+16
|\ \ | | | | | | man: follow up fixes for #2575
| * | man: follow up fixes for #2575Zbigniew Jędrzejewski-Szmek2016-02-102-21/+16
| | |
* | | Merge pull request #2575 from poettering/manfixesZbigniew Jędrzejewski-Szmek2016-02-106-58/+67
|\| | | |/ |/| A variety of man page fixes
| * man: correct explanation of "systemctl is-enabled" outputLennart Poettering2016-02-101-1/+1
| | | | | | | | | | | | | | | | The "is-enabled" command doesn't care whether the symlinks are declared in the [Install] section of a unit file or not, when returning "enabled". Any alias, .wants/ or .requires/ symlinks suffice. Fixes: #975
| * man: document that ExecStartPost= is only run if ExecStart= succeededLennart Poettering2016-02-101-1/+1
| | | | | | | | Fixes: #846
| * man: document that "systemctl enable" supports abbreviated unit file namesLennart Poettering2016-02-101-4/+3
| | | | | | | | Fixes: #1502
| * man: document that nss-myhostname handles *.localhost and *.localdomain tooLennart Poettering2016-02-102-6/+6
| | | | | | | | | | | | (And similar for resolved) Fixes: #1630
| * man: document that [Install] has no effect in unit file .d/*.conf drop-insLennart Poettering2016-02-101-21/+15
| | | | | | | | | | Fixes: #1774 Fixes: #1090
| * man: document distinction between ConditionXYZ= and AssertXYZ=Lennart Poettering2016-02-101-15/+14
| | | | | | | | References: #2468
| * man: document rescue.target and emergency.target in more detailLennart Poettering2016-02-101-10/+27
|/ | | | Fixes: #2523
* Merge pull request #2574 from zonque/netclass-removeLennart Poettering2016-02-1013-237/+16
|\ | | | | cgroup: remove support for NetClass= directive
| * cgroup: remove support for NetClass= directiveDaniel Mack2016-02-1013-237/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Support for net_cls.class_id through the NetClass= configuration directive has been added in v227 in preparation for a per-unit packet filter mechanism. However, it turns out the kernel people have decided to deprecate the net_cls and net_prio controllers in v2. Tejun provides a comprehensive justification for this in his commit, which has landed during the merge window for kernel v4.5: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bd1060a1d671 As we're aiming for full support for the v2 cgroup hierarchy, we can no longer support this feature. Userspace tool such as nftables are moving over to setting rules that are specific to the full cgroup path of a task, which obsoletes these controllers anyway. This commit removes support for tweaking details in the net_cls controller, but keeps the NetClass= directive around for legacy compatibility reasons.
* | Merge pull request #2495 from heftig/masterLennart Poettering2016-02-101-62/+57
|\ \ | | | | | | tty-ask-password: Split out password sending
| * | tty-ask-password: Split out password sendingJan Alexander Steffens (heftig)2016-02-031-62/+57
| | | | | | | | | | | | | | | | | | | | | | | | This is a piece of refactoring I've done while looking for a solution to bug #2378. It separates the password sending from `parse_password`, which only needs to know about the socket path and the list of passwords to send. As a caveat, the `ask_password_tty` path needs to construct a one-password strv, too.
* | | Merge pull request #2555 from poettering/coredump-fixesLennart Poettering2016-02-1028-404/+841
|\ \ \ | |_|/ |/| | Coredump fixes and more
| * | update NEWSLennart Poettering2016-02-101-0/+33
| | |
| * | core: treat JobTimeout=0 as equivalent to JobTimeout=infinityLennart Poettering2016-02-104-15/+46
| | | | | | | | | | | | | | | | | | Corrects an incompatibility introduced with 36c16a7cdd6c33d7980efc2cd6a2211941f302b4. Fixes: #2537
| * | core: simplify how we parse TimeoutSec=, TimeoutStartSec= and TimeoutStopSec=Lennart Poettering2016-02-102-26/+30
| | | | | | | | | | | | Let's make things more obvious by placing the parse_usec() invocation directly in config_parse_service_timeout().
| * | update TODOLennart Poettering2016-02-101-11/+0
| | |
| * | coredump: dump priviliges when processing system coredumpsLennart Poettering2016-02-105-4/+20
| | | | | | | | | | | | | | | | | | | | | | | | Let's add an extra-safety net and change UID/GID to the "systemd-coredump" user when processing coredumps from system user. For coredumps of normal users we keep the current logic of processing the coredumps from the user id the coredump was created under. Fixes: https://bugs.freedesktop.org/show_bug.cgi?id=87354
| * | core: set RLIMIT_CORE to unlimited by defaultLennart Poettering2016-02-101-7/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The kernel sets RLIMIT_CORE to 0 by default. Let's bump this to unlimited by default (for systemd itself and all processes we fork off), so that the coredump hooks have an effect if they honour it. Bumping RLIMIT_CORE of course would have the effect that "core" files will end up on the system at various places, if no coredump hook is used. To avoid this, make sure PID1 sets the core pattern to the empty string by default, so that this logic is disabled. This change in defaults should be useful for all systems where coredump hooks are used, as it allows useful usage of RLIMIT_CORE from these hooks again. OTOH systems that expect that coredumps are placed under the name "core" in the current directory will break with this change. Given how questionnable this behaviour is, and given that no common distro makes use of this by default it shouldn't be too much of a loss. Also, the old behaviour may be restored by explicitly configuring a "core_pattern" of "core", and setting the default system RLIMIT_CORE to 0 again via system.conf.
| * | coredump: honour RLIMIT_CORE when saving/processing coredumpsLennart Poettering2016-02-102-8/+26
| | | | | | | | | | | | | | | | | | | | | | | | With this change processing/saving of coredumps takes the RLIMIT_CORE resource limit of the crashing process into account, given the user control whether specific processes shall core dump or not, and how large to make the core dump. Note that this effectively disables core-dumping for now, as RLIMIT_CORE defaults to 0 (i.e. is disabled) for all system processes.