1
1
mirror of https://github.com/systemd/systemd-stable.git synced 2025-01-11 05:17:44 +03:00
Commit Graph

14461 Commits

Author SHA1 Message Date
Armin K
2141e47892 build-sys: Do not distribute generated udev service files
They are already in nodist_systemunit_DATA and if they are
shipped, they contain hardcoded paths to udevadm and
systemd-udevd which will cause them to fail to start when
rootprefix != prefix and rootlibdir != libdir.
2014-02-27 01:11:59 -05:00
Kieran Clancy
77e8ff6974 hwdb: keymaps for Samsung 900X3E/900X3F
Keymaps for Samsung 900X3E and 900X3F should be the same as for other
models in the series.

I have also moved the comment for '# Series 9' to the right place
2014-02-27 00:48:26 -05:00
Zbigniew Jędrzejewski-Szmek
0b6b7c2004 journalctl: refuse extra arguments with --verify and similar
Positional arguments only make sense with the default action.
For other actions, complain instead of ignoring them silently.
2014-02-27 00:43:24 -05:00
Uoti Urpala
47d80904a1 logs-show: fix corrupt output with empty messages
If a message had zero length, journalctl would print no newline, and
two output lines would be concatenated. Fix. The problem was
introduced in commit 31f7bf1994 ("logs-show: print multiline
messages"). Affected short and verbose output modes.

Before fix:

Feb 09 21:16:17 glyph dhclient[1323]: Feb 09 21:16:17 glyph NetworkManager[788]: <info> (enp4s2): DHCPv4 state changed nbi -> preinit

after:

Feb 09 21:16:17 glyph dhclient[1323]:
Feb 09 21:16:17 glyph NetworkManager[788]: <info> (enp4s2): DHCPv4 state changed nbi -> preinit
2014-02-27 00:43:24 -05:00
Tom Gundersen
911f4d4d60 build-sys: networkd - simplify makefile fragment 2014-02-26 23:16:34 +01:00
Lennart Poettering
aef831369c mount: don't fire PropertiesChanged signals for mounts that are stopped 2014-02-26 04:32:03 +01:00
Lennart Poettering
ff5f34d08c mount: don't send out PropertiesChanged message if actually nothing got changed 2014-02-26 04:32:03 +01:00
Lennart Poettering
dd7a22a990 mount: minor modernization 2014-02-26 04:32:03 +01:00
Zbigniew Jędrzejewski-Szmek
1ae383a8a3 Use /var/run/dbus/system_bus_socket for the D-Bus socket 2014-02-25 21:26:42 -05:00
Lennart Poettering
47bc23c18c README: document that /var/run must be a symlink → /run 2014-02-26 02:54:37 +01:00
Lennart Poettering
df1e020461 Revert back to /var/run at a couple of problems
This partially reverts 41a55c46ab

Some specifications we want to stay compatibility actually document
/var/run, not /run, and we should stay compatible with that. In order to
make sure our D-Bus implementation works on any system, regardless if
running systemd or not, we should always use /var/run which is the
only path mandated by the D-Bus spec.

Similar, glibc hardcodes the utmp location to /var/run, and this is
exposed in _UTMP_PATH in limits.h, hence let's stay in sync with this
public API, too.

We simply do not support systems where /var/run is not a symlink → /run.
Hence both are equivalent. Staying compatible with upstream
specifications hence weighs more than cleaning up superficial
appearance.
2014-02-26 02:47:43 +01:00
Zbigniew Jędrzejewski-Szmek
41a55c46ab Replace /var/run with /run in remaining places
/run was already used almost everywhere, fix the remaining places
for consistency.
2014-02-25 20:41:24 -05:00
Lennart Poettering
f513e420c8 exec: imply NoNewPriviliges= only when seccomp filters are used in user mode 2014-02-26 02:28:52 +01:00
Lennart Poettering
9c423fbf2a update TODO 2014-02-26 02:19:28 +01:00
Lennart Poettering
538b08707a build-sys: add missing makefile symlinks 2014-02-26 02:19:28 +01:00
Lennart Poettering
4298d0b512 core: add new RestrictAddressFamilies= switch
This new unit settings allows restricting which address families are
available to processes. This is an effective way to minimize the attack
surface of services, by turning off entire network stacks for them.

This is based on seccomp, and does not work on x86-32, since seccomp
cannot filter socketcall() syscalls on that platform.
2014-02-26 02:19:28 +01:00
Lennart Poettering
9875fd7875 nspawn: no need for duplicate checks against EEXIST 2014-02-26 02:19:28 +01:00
Lennart Poettering
7c66bae2ff seccomp: we should control NO_NEW_PRIVS on our own, not let seccomp do this for us 2014-02-26 02:19:28 +01:00
Tom Gundersen
fe6b2d55bc networkd: add basic support for MACVLANs 2014-02-25 21:19:08 +01:00
Tom Gundersen
e3ab0c0e19 man: refer to systemd.net{work,dev}(5) from systemd-networkd(8) 2014-02-25 19:50:26 +01:00
Tom Gundersen
eac684ef1c man: split out systemd.net{work,dev}(5) from systemd-networkd(8) 2014-02-25 19:30:40 +01:00
Tom Gundersen
1ff28eaee3 man: split out systemd.link(5) from udev(7) 2014-02-25 17:04:13 +01:00
Tom Gundersen
c7f3ba1ecd man: networkd - clarify that multiple addresses/routes are supported 2014-02-25 16:06:45 +01:00
Tomasz Torcz
b3e4387351 fix typo in iDRAC network interface name: irdac->idrac 2014-02-25 14:05:20 +01:00
Jasper St. Pierre
9c413373d2 login: Allow calling org.freedesktop.login1.Seat.SwitchTo 2014-02-25 13:14:55 +01:00
David Herrmann
3e6b205f81 login: set pos-slot to fallback on pos-eviction
If we evict a session position, we open the position slot for future
sessions. However, there might already be another session on the same
position if both were started on the same VT. This is currently done if
gdm spawns the session on its own Xserver.

Hence, look for such a session on pos-eviction and claim the new slot
immediately.
2014-02-25 13:10:42 +01:00
Ansgar Burchardt
949138ccc3 NEWS: fix typo 2014-02-25 13:02:50 +01:00
David Herrmann
a1937e679f login: fix pos-array allocation
GREEDY_REALLOC takes a pointer to the real size, not the array-width as
argument. Therefore, our array is currently way to small to keep the seat
positions.

Introduce GREEDY_REALLOC0_T() as typed version of GREEDY_REALLOC and store
the array-width instead of array-size.
2014-02-25 12:22:31 +01:00
Lennart Poettering
23fae27185 update TODO 2014-02-25 02:37:59 +01:00
Lennart Poettering
67dd87c51b NEWS: fix typo 2014-02-25 02:37:59 +01:00
Lennart Poettering
c74e630d0c nspawn: add new switch --network-macvlan= to add a macvlan device to the container 2014-02-25 02:37:59 +01:00
Zbigniew Jędrzejewski-Szmek
bdd13f6be4 Remove dead lines in various places
As pointed-out by clang -Wunreachable-code.

No behaviour changes.
2014-02-24 19:24:14 -05:00
Lennart Poettering
e9a2e453bb hostnamectl: read virtualization/architecture from remote side
This way we make this more network/container transparent and also do not
require any client side privileges.
2014-02-25 01:03:30 +01:00
Lennart Poettering
7452394e2e core: expose architecture as a bus property, so that we can easily query it remotely 2014-02-25 00:50:38 +01:00
Lennart Poettering
085afe36cb core: add global settings for enabling CPUAccounting=, MemoryAccounting=, BlockIOAccounting= for all units at once 2014-02-24 23:50:10 +01:00
Lennart Poettering
4e72e29a39 update TODO 2014-02-24 21:23:19 +01:00
Kay Sievers
ed28905eec NEWS: fix typos 2014-02-24 20:20:25 +01:00
Lennart Poettering
62ca29b81b build-sys: bump revisions and version 2014-02-24 19:25:00 +01:00
Lennart Poettering
ae0e60fbbc architecture: apparently there is LE ppc now 2014-02-24 19:21:18 +01:00
Lennart Poettering
d27893efdf NEWS: add note about ifunc 2014-02-24 19:13:39 +01:00
Lennart Poettering
43c71255b3 NEWS: prepare for release of 210 2014-02-24 18:34:12 +01:00
Łukasz Stelmach
b9c1bc28eb smack: rework security labeling for multiple frameworks 2014-02-24 17:37:41 +01:00
Łukasz Stelmach
e49d3c0167 smack: set loaded_policy in smack_setup()
With loaded_policy set to true mount_setup() relabels /dev properly.
2014-02-24 17:36:13 +01:00
Łukasz Stelmach
2453d7e447 smack: relabel directories and files created by systemd
Systemd creates directories in /dev. These directories will
get the label of systemd, which is the label of the System
domain, which is not accessable to everyone. Relabel the
directories, files and symlinks created so that they can be
generally used.

Based on a patch by Casey Schaufler <casey@schaufler-ca.com>.
2014-02-24 17:36:06 +01:00
Lennart Poettering
650264033f update TODO 2014-02-24 17:36:06 +01:00
Michal Sekletar
3a3c71c197 hostnamed: correct error message
We are not parsing timezone data.
2014-02-24 16:48:32 +01:00
Lennart Poettering
2d62c530d2 logind: detect whether the system is docked, and if it is inhibit lid switch processing
This should make operation nicer with docking stations, but will not
cover anything that does not implement SW_DOCK.
2014-02-24 16:22:23 +01:00
Lennart Poettering
539237644e update TODO 2014-02-24 15:35:20 +01:00
Zbigniew Jędrzejewski-Szmek
7143555ce8 units/serial-getty@.service: add [Install] section
This makes it easier to manually enable and disable
specific gettys, and also mirrors getty@.service.

http://lists.freedesktop.org/archives/systemd-devel/2014-February/017329.html
2014-02-24 08:07:34 -05:00
Thomas Hindoe Paaboel Andersen
248fab742d virt: make Virtualization an anonymous enum
This makes llvm happy when we assign an error code to the variable.
2014-02-24 13:26:44 +01:00